Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754878Ab3FKR0n (ORCPT ); Tue, 11 Jun 2013 13:26:43 -0400 Received: from mx1.redhat.com ([209.132.183.28]:23135 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752287Ab3FKR0l (ORCPT ); Tue, 11 Jun 2013 13:26:41 -0400 Date: Tue, 11 Jun 2013 13:26:24 -0400 From: Dave Jones To: Linux Kernel Cc: jussi.kivilinna@iki.fi, herbert@gondor.hengli.com.au Subject: GPF in aesni_xts_crypt8 (3.10-rc5) Message-ID: <20130611172624.GA20496@redhat.com> Mail-Followup-To: Dave Jones , Linux Kernel , jussi.kivilinna@iki.fi, herbert@gondor.apana.org.au MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 3518 Lines: 65 Just found that 3.10-rc doesn't boot on my laptop with encrypted disk. general protection fault: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC Modules linked in: xfs libcrc32c dm_crypt crc32c_intel ghash_clmulni_intel aesni_intel glue_helper ablk_helper i915 i2c_algo_bit drm_kms_helper drm i2c_core video CPU: 1 PID: 53 Comm: kworker/1:1 Not tainted 3.10.0-rc5+ #5 Hardware name: LENOVO 2356JK8/2356JK8, BIOS G7ET94WW (2.54 ) 04/30/2013 Workqueue: kcryptd kcryptd_crypt [dm_crypt] task: ffff880135c58000 ti: ffff880135c54000 task.ti: ffff880135c54000 RIP: 0010:[] [] aesni_xts_crypt8+0x42/0x1e0 [aesni_intel] RSP: 0018:ffff880135c55b68 EFLAGS: 00010282 RAX: ffffffffa0142eb8 RBX: 0000000000000080 RCX: 00000000000000f0 RDX: ffff8801316eeaa8 RSI: ffff8801316eeaa8 RDI: ffff88012fd84440 RBP: ffff880135c55b70 R08: ffff8801304fe118 R09: 0000000000000020 R10: 00000000000000f0 R11: ffffffffa0142eb8 R12: ffff8801316eeb28 R13: 0000000000000080 R14: ffff8801316eeb28 R15: 0000000000000180 FS: 0000000000000000(0000) GS:ffff880139400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000039e88bc720 CR3: 0000000001c0b000 CR4: 00000000001407e0 Stack: ffffffffa0143683 ffff880135c55c40 ffffffffa00602fb ffff880135c55c70 ffffffffa0146060 0000000001ad0190 ffffffffa0146060 ffffea0004c5bb80 ffff8801316eeaa8 ffffea0004c5bb80 ffff8801316eeaa8 ffff8801304fe0c0 Call Trace: [] ? aesni_xts_dec8+0x13/0x20 [aesni_intel] [] glue_xts_crypt_128bit+0x10b/0x1c0 [glue_helper] [] xts_decrypt+0x4b/0x50 [aesni_intel] [] ablk_decrypt+0x4f/0xd0 [ablk_helper] [] crypt_convert+0x352/0x3b0 [dm_crypt] [] kcryptd_crypt+0x355/0x4e0 [dm_crypt] [] ? process_one_work+0x1a5/0x700 [] process_one_work+0x211/0x700 [] ? process_one_work+0x1a5/0x700 [] worker_thread+0x11b/0x3a0 [] ? process_one_work+0x700/0x700 [] kthread+0xed/0x100 [] ? insert_kthread_work+0x80/0x80 [] ret_from_fork+0x7c/0xb0 [] ? insert_kthread_work+0x80/0x80 Code: 8d 04 25 b8 2e 14 a0 41 0f 44 ca 4c 0f 44 d8 66 44 0f 6f 14 25 00 70 14 a0 41 0f 10 18 44 8b 8f e0 01 00 00 48 01 cf 66 0f 6f c3 <66> 0f ef 02 f3 0f 7f 1e 66 44 0f 70 db 13 66 0f d4 db 66 41 0f RIP [] aesni_xts_crypt8+0x42/0x1e0 [aesni_intel] RSP 0: 8d 04 25 b8 2e 14 a0 lea 0xffffffffa0142eb8,%eax 7: 41 0f 44 ca cmove %r10d,%ecx b: 4c 0f 44 d8 cmove %rax,%r11 f: 66 44 0f 6f 14 25 00 movdqa 0xffffffffa0147000,%xmm10 16: 70 14 a0 19: 41 0f 10 18 movups (%r8),%xmm3 1d: 44 8b 8f e0 01 00 00 mov 0x1e0(%rdi),%r9d 24: 48 01 cf add %rcx,%rdi 27: 66 0f 6f c3 movdqa %xmm3,%xmm0 2b:* 66 0f ef 02 pxor (%rdx),%xmm0 <-- trapping instruction 2f: f3 0f 7f 1e movdqu %xmm3,(%rsi) 33: 66 44 0f 70 db 13 pshufd $0x13,%xmm3,%xmm11 39: 66 0f d4 db paddq %xmm3,%xmm3 3d: 66 data16 3e: 41 rex.B 3f: -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/