Received: by 2002:a05:7412:518d:b0:e2:908c:2ebd with SMTP id fn13csp447499rdb; Thu, 5 Oct 2023 10:22:05 -0700 (PDT) X-Google-Smtp-Source: AGHT+IEjM3DAiciXM+NOiATOsRribGKELOfnhB1Lj+YuJUpd78FbFDai6Mvc41VAVIykLco4XhFT X-Received: by 2002:a05:6808:491:b0:3a9:9bb6:7fe with SMTP id z17-20020a056808049100b003a99bb607femr5829082oid.21.1696526524736; Thu, 05 Oct 2023 10:22:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1696526524; cv=none; d=google.com; s=arc-20160816; b=Anq5RJ0U7jivUP66Mog8fP39yzC7qR4H8prh/V0h0EjShR58feXOyiaLM6PxuU2mC6 NBw9eOq8SLyjhzPM54kHlcwRMcOoRvw05gq7HjdCv3FNEwB3lMdh1Zh8PicDTz55P/S5 Ug0hm0qeeAFV8W5tQM7q3QYqRsUgE4zkeeCJnvO8VIEDMzKtwzYXy0zjhN/fQJQHyzXy LpsLBbpG0o7C47m217m+WgMVlmPJeE3rRuCuFGmObriSDf78jC36Pp/zt2alT4ZZvuGz jVZnztWiP9zuGitwkzksODWKFdEw2WY93/w34Se+r74krV1wnd41rNYX7pKjNJdp38uW MbKg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language:cc:to :subject:from:user-agent:mime-version:date:message-id:dkim-signature; bh=CnzOVAYxsodjctC05aqml+twu9UDVsuakS0jGmFKSgg=; fh=hfPaP4Z9pwgLB9Jt+mB1JTFo7vSldOLA8v/VCPZYrLI=; b=xDXXfiwk2W+KTwYs8RknVNnqCTTC/NubuhUFF4NQkqFqUD91YGn0Pw8hjyxjk443WL mddOXwolr4KEbVMDaFE8tw0UgHqxslnxEJZUxyCKgJhY/DHQPHuccCThFvPilSdPPSH3 fmN0Hp8BX5oqF2ZjmvGY7urg3+NkVSZLXRvwYZwa8zSgX/zJdLpqdfbGl9n1yUA+Ew2a ct12W3humjx5YoeC8m7wuPz+cKgECr15m07wCgvDMN8f81L6pSDLtOD/meJu6Az0k2WP nnnwW2H76hZIt9Gf7HbnLvb0hXr36EjTU8wPldZTTfTEQkq+T4ZoPZNMFicPjnwBv9Mk qumQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b=GKCx8x4l; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from snail.vger.email (snail.vger.email. [2620:137:e000::3:7]) by mx.google.com with ESMTPS id l193-20020a6391ca000000b00578da80ac3dsi1802320pge.80.2023.10.05.10.22.04 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 05 Oct 2023 10:22:04 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) client-ip=2620:137:e000::3:7; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b=GKCx8x4l; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by snail.vger.email (Postfix) with ESMTP id A0B288343523; Thu, 5 Oct 2023 10:22:03 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at snail.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230452AbjJERVy (ORCPT + 99 others); Thu, 5 Oct 2023 13:21:54 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39746 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229449AbjJERVS (ORCPT ); Thu, 5 Oct 2023 13:21:18 -0400 Received: from mail-lf1-x136.google.com (mail-lf1-x136.google.com [IPv6:2a00:1450:4864:20::136]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E353E3267 for ; Thu, 5 Oct 2023 10:15:45 -0700 (PDT) Received: by mail-lf1-x136.google.com with SMTP id 2adb3069b0e04-50325ce89e9so1656502e87.0 for ; Thu, 05 Oct 2023 10:15:45 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1696526144; x=1697130944; darn=vger.kernel.org; h=content-transfer-encoding:content-language:cc:to:subject:from :user-agent:mime-version:date:message-id:from:to:cc:subject:date :message-id:reply-to; bh=CnzOVAYxsodjctC05aqml+twu9UDVsuakS0jGmFKSgg=; b=GKCx8x4lu2N3xZo9hMM/st0BpEttdovAusaled4eDXXWM69rqukJW17Dh5g4xJJE8a sXoXofmKjsow8pzHbMRDKti7Bqp/24DuUiNJ2hE4Ui446V/sa1PRWP+CuafudtbAEJrv LgrTYTptyXPFcK9W1hh+NaRYOhIEQc3NCSBS00d4sfVWx6Si5g2oMuJWBkpaWXuUFMj0 CeRUpZvrBaSqnI/IvH63RsPG4VNj2N86f73SnY3favt2XJmXxmU6uweFupvHig8XixEw PBTc6OyxeHYTLHYJlumImKrxA6Y4VhC5iUrUOuagyzSxozwIvz5U+r6dU47Oqjc48U6m rjug== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1696526144; x=1697130944; h=content-transfer-encoding:content-language:cc:to:subject:from :user-agent:mime-version:date:message-id:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=CnzOVAYxsodjctC05aqml+twu9UDVsuakS0jGmFKSgg=; b=EjXwB3+qtuWNJ24CQnu6fZte0re5uKrWBNe1uL9B50vvpNg3zeOcB7VeaKZRW0O5vn kOUfEPqpbSNQcOVK8ZASPyH9rQoZlBuG1zcU41C74OOS5Qb4UdWRHCcSeuidZzJGSN3t zGiLc/IpAhGfGfv0VXNs41Z3VnBljj1SAFJAf6dOqpSLA1RZVFIPDzgESur6U76rYobu WOaShv884enB30kT+1l0t1Kf1Ys/+eNN2zY9YSTj4rGpBhTc1HehCX3TLT0kVbn0+cY4 FILNFwfjtoLY7WnDMbV0Qnyf5hHEfYzAqi1PzQyKlHiHijb5ULuTyNxYiR9dWyKv5OpO ds9A== X-Gm-Message-State: AOJu0Yy0OhwCn+GXz8Zu0pVhFiulE9qukx/N2UOcLz0A4xZtE4hHfOsU 7xtKRePrwWAq/wBsmWSK/bkcSKEw1z3Jgw== X-Received: by 2002:a05:6512:114d:b0:500:79f7:1738 with SMTP id m13-20020a056512114d00b0050079f71738mr5822724lfg.17.1696526144024; Thu, 05 Oct 2023 10:15:44 -0700 (PDT) Received: from [192.168.0.9] (88-114-1-11.elisa-laajakaista.fi. [88.114.1.11]) by smtp.gmail.com with ESMTPSA id n15-20020ac2490f000000b004fe2de20d88sm365031lfi.232.2023.10.05.10.15.43 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Thu, 05 Oct 2023 10:15:43 -0700 (PDT) Message-ID: Date: Thu, 5 Oct 2023 20:15:43 +0300 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.12.0 From: =?UTF-8?Q?Tatu_Heikkil=c3=a4?= Subject: (Bisected) Accessing opened Bitlocker partition leads to memory fault and kernel panic on Imac8,1 To: herbert@gondor.apana.org.au Cc: linux-kernel@vger.kernel.org, dm-devel@redhat.com, snitzer@kernel.org Content-Language: en-US Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (snail.vger.email [0.0.0.0]); Thu, 05 Oct 2023 10:22:03 -0700 (PDT) Hello, I think you and the lists are right recipients, forgive me if not, I've never reported kernel bugs before. Naively this seems a crypto issue and Herbert Xu from crypto maintainers made the buggy commit, but it edits drivers/md/dm_crypt.c maintained by dm-devel people per MAINTAINERS, so I'm going by that. At the center of the issue is my Imac8,1 and an external 2TB SSD with 5 partitions: an EFI+MBR portable Arch Linux install with LUKS encrypted ext4 /home, and a 1.7TB exFAT encrypted with Bitlocker. Mounting the LUKS partition works fine on all my 4 computers (Imac8,1, Imac12,2, two generic Intels; Fedora's GNOME gvfs volume monitor often crashes on mount using this drive), and mounting the Bitlocker partition works on all other computers, but my Imac8,1. On my other computers, I can boot into the portable install which automounts the Bitlocker partition fine. However, on my Imac8,1, regardless if I boot into the external drive's portable Arch Linux install, or use the Imac's own internal Debian testing install, any post-6.4 kernel reliably panics (50+ times so far, 100% of the time) when accessing the unlocked Bitlocker volume: # cryptsetup open /dev/sdb5 --type bitlk crucial Enter passphrase for /dev/sdb5: # mount /dev/mapper/crucial temp [kernel immediately panics if I try to tab-complete the mount point, making the shell also access the decrypted device I assume, or try to run the command] I originally ran into this when mounting using XFCE's Thunar implementation. Using it, the mount fails with "Operation was cancelled" and the system crashes within a minute. Git bisect lead me to: # first bad commit: [e3023094dffb41540330fb0c74cd3a019cd525c2] dm crypt: Avoid using MAX_CIPHER_BLOCKSIZE If I git revert e3023094dffb41540330fb0c74cd3a019cd525c2 on current Linus' git master, the issue goes away. So I'm personally not all that affected anymore (if I'm ready to compile my kernels from now on), and I understand that you have no clear way to reproduce this as it seems strongly bound to hardware, but seems like this could point to a potentially serious security issue since it involves both crypto and undefined behaviour. Kdump dmesg logs (the error output is not completely consistent between panics) & .config can be found in a dummy Bugzilla report https://bugzilla.kernel.org/show_bug.cgi?id=217982 Please let me know if I can help you in any way. I don't mind using this as a gateway to learn more about kernel debugging etc. Best regards, Tatu Heikkilä