Krzysztof, please try to cc the appropriate people/list.
I've added linux-crypto and the people who touched aesni-intel since
3.6, and am re-quoting the whole email (except for the continuation
oopses that won't be relevant)
It seems to crash on the very first instruction of _aesni_enc1, which is just a
movaps (KEYP), KEY
where on x86-32, KEYP is %edi and KEY is %xmm2.
In the oops register dump, %edi is 0xf169fe64, which looks like a
valid kernel pointer (depending on amount of memory), but it looks
like the problem is that it's not 16-byte aligned.
I dunno. None of the asm code seems to have changed since 3.6 afaik,
so some calling code change triggers this? Guys, ideas?
Linus
On Thu, Oct 18, 2012 at 8:53 AM, Krzysztof Kolasa <[email protected]> wrote:
> after mount crypted device (volume, pendrive) kernel crash on HP machine
> (mounting on AMILO Pro v3405 working properly ), rs232 console output :
>
> [ 124.613648] general protection fault: 0000 [#1] SMP
> [ 124.672862] Modules linked in: dm_crypt fglrx(PO) bnep rfcomm bluetooth
> binfmt_misc snd_hda_codec_hdmi snd_hda_codec_idt snd_hda_ine
> [ 125.356439] Pid: 55, comm: kworker/0:1 Tainted: P O
> 3.7.0-rc1-winsoft-pae #1 Hewlett-Packard HP ProBook 6560b/1619
> [ 125.490351] EIP: 0060:[<f85bb2bc>] EFLAGS: 00010216 CPU: 0
> [ 125.555762] EIP is at _aesni_enc1+0x0/0x9c [aesni_intel]
> [ 125.619087] EAX: c1959000 EBX: 00000001 ECX: f001392c EDX: f06de000
> [ 125.693829] ESI: f169fdb4 EDI: f169fe64 EBP: f169fda4 ESP: f169fd30
> [ 125.768578] DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068
> [ 125.832951] CR0: 80050033 CR2: b7710000 CR3: 01963000 CR4: 000407f0
> [ 125.907694] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
> [ 125.982436] DR6: ffff0ff0 DR7: 00000400
> [ 126.028115] Process kworker/0:1 (pid: 55, ti=f169e000 task=f1679940
> task.ti=f169e000)
> [ 126.121547] Stack:
> [ 126.145429] f85bb2b4 00000008 f169fe34 f85703a9 f169fe64 c1959000
> f06de000 00000008
> [ 126.237894] 00000200 00000000 f06de000 f23b3bc0 f06de000 f23b3bc0
> f06de000 f00138f4
> [ 126.330358] 00000000 00000200 f001390c 00000000 00000200 00000000
> 00000000 f001392c
> [ 126.422804] Call Trace:
> [ 126.451881] [<f85bb2b4>] ? aesni_enc+0x1c/0x24 [aesni_intel]
> [ 126.520399] [<f85703a9>] ? init_tfm+0x129/0x250 [xts]
> [ 126.581652] [<f85bbd6e>] xts_decrypt+0x7e/0xc0 [aesni_intel]
> [ 126.650174] [<c15c5a95>] ? notifier_call_chain+0x45/0x60
> [ 126.714543] [<c107f61d>] ? update_curr+0x20d/0x380
> [ 126.772681] [<c1142f48>] ? __kmalloc+0xd8/0x1f0
> [ 126.827715] [<c11077f3>] ? mempool_kmalloc+0x13/0x20
> [ 126.887935] [<f85bb298>] ? aesni_set_key+0x1d8/0x1d8 [aesni_intel]
> [ 126.962681] [<f85bb960>] ? __aes_encrypt+0x30/0x30 [aesni_intel]
> [ 127.035353] [<f855e157>] ablk_decrypt+0x47/0xb0 [ablk_helper]
> [ 127.104912] [<f8ae1c9b>] crypt_convert+0x26b/0x2d0 [dm_crypt]
> [ 127.174468] [<f8ae23b0>] kcryptd_crypt+0x280/0x360 [dm_crypt]
> [ 127.244028] [<c10647a0>] process_one_work+0x110/0x380
> [ 127.305282] [<c15c97b3>] ? common_interrupt+0x33/0x38
> [ 127.366537] [<c10624a0>] ? wake_up_worker+0x30/0x30
> [ 127.425716] [<f8ae2130>] ? crypt_convert_init.isra.15+0x70/0x70
> [dm_crypt]
> [ 127.508768] [<c10651d9>] worker_thread+0x119/0x350
> [ 127.566910] [<c10650c0>] ? manage_workers+0x260/0x260
> [ 127.628164] [<c1069854>] kthread+0x94/0xa0
> [ 127.678001] [<c1070000>] ? blocking_notifier_chain_unregister+0x50/0xa0
> [ 127.757938] [<c15c91b7>] ret_from_kernel_thread+0x1b/0x28
> [ 127.823350] [<c10697c0>] ? flush_kthread_worker+0x90/0x90
> [ 127.888757] Code: 31 c0 5f c3 8d 76 00 57 53 8b 7c 24 0c 8b 44 24 10 8b
> 54 24 14 8b 9f e0 01 00 00 0f 10 02 e8 08 00 00 00 0f 11 004
> [ 128.113500] EIP: [<f85bb2bc>] _aesni_enc1+0x0/0x9c [aesni_intel] SS:ESP
> 0068:f169fd30
> [ 128.207699] ---[ end trace ff0828d34a0b516e ]---
>
> subsequent errors after the above kernel crash (one cpu 100% busy) :
>
> [ 128.262830] BUG: scheduling while atomic: kworker/0:1/55/0x10000001
.. snipped - not interesting, since a kworker dying will always result
in lots of noise.
--
To unsubscribe from this list: send the line "unsubscribe linux-crypto" in
the body of a message to [email protected]
More majordomo info at http://vger.kernel.org/majordomo-info.html