Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 23 Jun 2018 14:37:04 +0000
From:      bugzilla-noreply@freebsd.org
To:        bugs@FreeBSD.org
Subject:   [Bug 229222] 11.2-PRERELEASE panic-General Protection Fault, aesni_encrypt_cbc implicated
Message-ID:  <bug-229222-227-xY1jZFI81L@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-229222-227@https.bugs.freebsd.org/bugzilla/>
References:  <bug-229222-227@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D229222

--- Comment #13 from dewayne@heuristicsystems.com.au ---
(In reply to Konstantin Belousov from comment #12)
Using "make __MAKE_CONF=3D/dev/null" so no influence of make.conf settings.=
  The
uptime is less than 10 minutes.

kgdb /pd2/tmp/destR/usr/lib/debug/boot/kernel/kernel.debug
/var/crash/vmcore.last
GNU gdb 6.1.1 [FreeBSD]
Copyright 2004 Free Software Foundation, Inc.
GDB is free software, covered by the GNU General Public License, and you are
welcome to change it and/or distribute copies of it under certain condition=
s.
Type "show copying" to see the conditions.
There is absolutely no warranty for GDB.  Type "show warranty" for details.
This GDB was configured as "amd64-marcel-freebsd"...

Unread portion of the kernel message buffer:
[490]
[490]
[490] Fatal trap 9: general protection fault while in kernel mode
[490] cpuid =3D 4; apic id =3D 04
[490] instruction pointer       =3D 0x20:0xffffffff808e7d89
[490] stack pointer             =3D 0x0:0xfffffe06892d9068
[490] frame pointer             =3D 0x0:0xfffffe06892d9138
[490] code segment              =3D base 0x0, limit 0xfffff, type 0x1b
[490]                   =3D DPL 0, pres 1, long 1, def32 0, gran 1
[490] processor eflags  =3D interrupt enabled, resume, IOPL =3D 0
[490] current process           =3D 22887 (ssh)
[490] trap number               =3D 9
[490] panic: general protection fault
[490] cpuid =3D 4
[490] Uptime: 8m10s
[490] Dumping 1125 out of 24507
MB:..2%..12%..22%..32%..42%..52%..62%..72%..82%..92%

Reading symbols from
/pd2/tmp/destR/usr/lib/debug/boot/kernel/mac_ifoff.ko.debug...done.
Loaded symbols for /pd2/tmp/destR/usr/lib/debug/boot/kernel/mac_ifoff.ko.de=
bug
Reading symbols from
/pd2/tmp/destR/usr/lib/debug/boot/kernel/cpufreq.ko.debug...done.
Loaded symbols for /pd2/tmp/destR/usr/lib/debug/boot/kernel/cpufreq.ko.debug
Reading symbols from
/pd2/tmp/destR/usr/lib/debug/boot/kernel/coretemp.ko.debug...done.
Loaded symbols for /pd2/tmp/destR/usr/lib/debug/boot/kernel/coretemp.ko.deb=
ug
Reading symbols from
/pd2/tmp/destR/usr/lib/debug/boot/kernel/uplcom.ko.debug...done.
Loaded symbols for /pd2/tmp/destR/usr/lib/debug/boot/kernel/uplcom.ko.debug
Reading symbols from
/pd2/tmp/destR/usr/lib/debug/boot/kernel/ucom.ko.debug...done.
Loaded symbols for /pd2/tmp/destR/usr/lib/debug/boot/kernel/ucom.ko.debug
#0  doadump (textdump=3D<value optimized out>) at pcpu.h:230
230     pcpu.h: No such file or directory.
        in pcpu.h
(kgdb) list *0xffffffff808e7d89
0xffffffff808e7d89 is in aesni_decrypt_cbc (aesencdec.h:102).
97                      f =3D _mm_aesdec_si128(f, keysched[i + 1]);
98                      g =3D _mm_aesdec_si128(g, keysched[i + 1]);
99                      h =3D _mm_aesdec_si128(h, keysched[i + 1]);
100             }
101
102             out[0] =3D _mm_aesdeclast_si128(a, keysched[i + 1]);
103             out[1] =3D _mm_aesdeclast_si128(b, keysched[i + 1]);
104             out[2] =3D _mm_aesdeclast_si128(c, keysched[i + 1]);
105             out[3] =3D _mm_aesdeclast_si128(d, keysched[i + 1]);
106             out[4] =3D _mm_aesdeclast_si128(e, keysched[i + 1]);
Current language:  auto; currently minimal
(kgdb)
107             out[5] =3D _mm_aesdeclast_si128(f, keysched[i + 1]);
108             out[6] =3D _mm_aesdeclast_si128(g, keysched[i + 1]);
109             out[7] =3D _mm_aesdeclast_si128(h, keysched[i + 1]);
110     }
111
112     /* rounds is passed in as rounds - 1 */
113     static inline __m128i
114     aesni_enc(int rounds, const __m128i *keysched, const __m128i from)
115     {
116             __m128i tmp;
(kgdb) disassemble 0xffffffff808e7d89
Dump of assembler code for function aesni_decrypt_cbc:
0xffffffff808e7ba0 <aesni_decrypt_cbc+0>:       push   %rbp
0xffffffff808e7ba1 <aesni_decrypt_cbc+1>:       mov    %rsp,%rbp
0xffffffff808e7ba4 <aesni_decrypt_cbc+4>:       push   %r15
0xffffffff808e7ba6 <aesni_decrypt_cbc+6>:       push   %r14
0xffffffff808e7ba8 <aesni_decrypt_cbc+8>:       push   %r13
0xffffffff808e7baa <aesni_decrypt_cbc+10>:      push   %r12
0xffffffff808e7bac <aesni_decrypt_cbc+12>:      push   %rbx
0xffffffff808e7bad <aesni_decrypt_cbc+13>:      sub    $0xa8,%rsp
0xffffffff808e7bb4 <aesni_decrypt_cbc+20>:      mov    %rcx,%r9
0xffffffff808e7bb7 <aesni_decrypt_cbc+23>:      movdqu (%r8),%xmm8
0xffffffff808e7bbc <aesni_decrypt_cbc+28>:      mov    %rdx,%r8
0xffffffff808e7bbf <aesni_decrypt_cbc+31>:      shr    $0x4,%r8
0xffffffff808e7bc3 <aesni_decrypt_cbc+35>:      mov    %rdx,%r11
0xffffffff808e7bc6 <aesni_decrypt_cbc+38>:      shr    $0x7,%r11
0xffffffff808e7bca <aesni_decrypt_cbc+42>:      je     0xffffffff808e7e96
<aesni_decrypt_cbc+758>
0xffffffff808e7bd0 <aesni_decrypt_cbc+48>:      lea    -0x1(%rdi),%eax
0xffffffff808e7bd3 <aesni_decrypt_cbc+51>:      mov    %rdx,%rbx
0xffffffff808e7bd6 <aesni_decrypt_cbc+54>:      and    $0xffffffffffffff80,=
%rbx
0xffffffff808e7bda <aesni_decrypt_cbc+58>:      test   %eax,%eax
0xffffffff808e7bdc <aesni_decrypt_cbc+60>:      jle    0xffffffff808e7eab
<aesni_decrypt_cbc+779>
0xffffffff808e7be2 <aesni_decrypt_cbc+66>:      mov    %rbx,-0x30(%rbp)
0xffffffff808e7be6 <aesni_decrypt_cbc+70>:      mov    %rdx,-0x38(%rbp)
0xffffffff808e7bea <aesni_decrypt_cbc+74>:      movslq %edi,%rax
0xffffffff808e7bed <aesni_decrypt_cbc+77>:      shl    $0x4,%rax
0xffffffff808e7bf1 <aesni_decrypt_cbc+81>:      add    %rsi,%rax
0xffffffff808e7bf4 <aesni_decrypt_cbc+84>:      mov    %rax,-0x40(%rbp)
0xffffffff808e7bf8 <aesni_decrypt_cbc+88>:      mov    $0x200000000,%rax
0xffffffff808e7c02 <aesni_decrypt_cbc+98>:      mov    %edi,%ebx
0xffffffff808e7c04 <aesni_decrypt_cbc+100>:     mov    %edi,%r14d
0xffffffff808e7c07 <aesni_decrypt_cbc+103>:     not    %r14d
0xffffffff808e7c0a <aesni_decrypt_cbc+106>:     and    $0x1,%r14d
0xffffffff808e7c0e <aesni_decrypt_cbc+110>:     sub    %r14,%rbx
0xffffffff808e7c11 <aesni_decrypt_cbc+113>:     xor    %r15d,%r15d
0xffffffff808e7c14 <aesni_decrypt_cbc+116>:     mov    %r9,%rcx
0xffffffff808e7c17 <aesni_decrypt_cbc+119>:     mov    %rdi,-0x48(%rbp)
0xffffffff808e7c1b <aesni_decrypt_cbc+123>:     nopl   0x0(%rax,%rax,1)
0xffffffff808e7c20 <aesni_decrypt_cbc+128>:     movdqu (%rcx),%xmm9
0xffffffff808e7c25 <aesni_decrypt_cbc+133>:     movdqu 0x10(%rcx),%xmm0
0xffffffff808e7c2a <aesni_decrypt_cbc+138>:     movdqu 0x20(%rcx),%xmm7
0xffffffff808e7c2f <aesni_decrypt_cbc+143>:     movdqu 0x30(%rcx),%xmm6
0xffffffff808e7c34 <aesni_decrypt_cbc+148>:     movdqu 0x40(%rcx),%xmm5
0xffffffff808e7c39 <aesni_decrypt_cbc+153>:     movdqu 0x50(%rcx),%xmm4
0xffffffff808e7c3e <aesni_decrypt_cbc+158>:     movdqu 0x60(%rcx),%xmm3
---Type <return> to continue, or q <return> to quit---
0xffffffff808e7c43 <aesni_decrypt_cbc+163>:     movdqu 0x70(%rcx),%xmm2
0xffffffff808e7c48 <aesni_decrypt_cbc+168>:     movdqa (%rsi),%xmm10
0xffffffff808e7c4d <aesni_decrypt_cbc+173>:     movdqa 0x10(%rsi),%xmm1
0xffffffff808e7c52 <aesni_decrypt_cbc+178>:     pxor   %xmm10,%xmm9
0xffffffff808e7c57 <aesni_decrypt_cbc+183>:     pxor   %xmm10,%xmm0
0xffffffff808e7c5c <aesni_decrypt_cbc+188>:     pxor   %xmm10,%xmm7
0xffffffff808e7c61 <aesni_decrypt_cbc+193>:     pxor   %xmm10,%xmm6
0xffffffff808e7c66 <aesni_decrypt_cbc+198>:     pxor   %xmm10,%xmm5
0xffffffff808e7c6b <aesni_decrypt_cbc+203>:     pxor   %xmm10,%xmm4
0xffffffff808e7c70 <aesni_decrypt_cbc+208>:     pxor   %xmm10,%xmm3
0xffffffff808e7c75 <aesni_decrypt_cbc+213>:     pxor   %xmm10,%xmm2
0xffffffff808e7c7a <aesni_decrypt_cbc+218>:     cmp    $0x2,%edi
0xffffffff808e7c7d <aesni_decrypt_cbc+221>:     jne    0xffffffff808e7ca0
<aesni_decrypt_cbc+256>
0xffffffff808e7c7f <aesni_decrypt_cbc+223>:     mov    $0x1,%r13d
0xffffffff808e7c85 <aesni_decrypt_cbc+229>:     test   %r14d,%r14d
0xffffffff808e7c88 <aesni_decrypt_cbc+232>:     jne    0xffffffff808e7d3f
<aesni_decrypt_cbc+415>
0xffffffff808e7c8e <aesni_decrypt_cbc+238>:     jmpq   0xffffffff808e7d83
<aesni_decrypt_cbc+483>
0xffffffff808e7c93 <aesni_decrypt_cbc+243>:     nopw   %cs:0x0(%rax,%rax,1)
0xffffffff808e7ca0 <aesni_decrypt_cbc+256>:     mov    $0x300000000,%rdi
0xffffffff808e7caa <aesni_decrypt_cbc+266>:     mov    %rax,%r10
0xffffffff808e7cad <aesni_decrypt_cbc+269>:     mov    $0x1,%r13d
0xffffffff808e7cb3 <aesni_decrypt_cbc+275>:     nopw   %cs:0x0(%rax,%rax,1)
0xffffffff808e7cc0 <aesni_decrypt_cbc+288>:     aesdec %xmm1,%xmm9
0xffffffff808e7cc6 <aesni_decrypt_cbc+294>:     aesdec %xmm1,%xmm0
0xffffffff808e7ccb <aesni_decrypt_cbc+299>:     aesdec %xmm1,%xmm7
0xffffffff808e7cd0 <aesni_decrypt_cbc+304>:     aesdec %xmm1,%xmm6
0xffffffff808e7cd5 <aesni_decrypt_cbc+309>:     aesdec %xmm1,%xmm5
0xffffffff808e7cda <aesni_decrypt_cbc+314>:     aesdec %xmm1,%xmm4
0xffffffff808e7cdf <aesni_decrypt_cbc+319>:     aesdec %xmm1,%xmm3
0xffffffff808e7ce4 <aesni_decrypt_cbc+324>:     aesdec %xmm1,%xmm2
0xffffffff808e7ce9 <aesni_decrypt_cbc+329>:     mov    %r10,%r12
0xffffffff808e7cec <aesni_decrypt_cbc+332>:     sar    $0x1c,%r12
0xffffffff808e7cf0 <aesni_decrypt_cbc+336>:     movdqa (%rsi,%r12,1),%xmm1
0xffffffff808e7cf6 <aesni_decrypt_cbc+342>:     aesdec %xmm1,%xmm9
0xffffffff808e7cfc <aesni_decrypt_cbc+348>:     aesdec %xmm1,%xmm0
0xffffffff808e7d01 <aesni_decrypt_cbc+353>:     aesdec %xmm1,%xmm7
0xffffffff808e7d06 <aesni_decrypt_cbc+358>:     aesdec %xmm1,%xmm6
0xffffffff808e7d0b <aesni_decrypt_cbc+363>:     aesdec %xmm1,%xmm5
0xffffffff808e7d10 <aesni_decrypt_cbc+368>:     aesdec %xmm1,%xmm4
0xffffffff808e7d15 <aesni_decrypt_cbc+373>:     aesdec %xmm1,%xmm3
0xffffffff808e7d1a <aesni_decrypt_cbc+378>:     aesdec %xmm1,%xmm2
0xffffffff808e7d1f <aesni_decrypt_cbc+383>:     add    $0x2,%r13
0xffffffff808e7d23 <aesni_decrypt_cbc+387>:     mov    %rdi,%rdx
---Type <return> to continue, or q <return> to quit---
0xffffffff808e7d26 <aesni_decrypt_cbc+390>:     sar    $0x1c,%rdx
0xffffffff808e7d2a <aesni_decrypt_cbc+394>:     movdqa (%rsi,%rdx,1),%xmm1
0xffffffff808e7d2f <aesni_decrypt_cbc+399>:     add    %rax,%r10
0xffffffff808e7d32 <aesni_decrypt_cbc+402>:     add    %rax,%rdi
0xffffffff808e7d35 <aesni_decrypt_cbc+405>:     cmp    %r13,%rbx
0xffffffff808e7d38 <aesni_decrypt_cbc+408>:     jne    0xffffffff808e7cc0
<aesni_decrypt_cbc+288>
0xffffffff808e7d3a <aesni_decrypt_cbc+410>:     test   %r14d,%r14d
0xffffffff808e7d3d <aesni_decrypt_cbc+413>:     je     0xffffffff808e7d83
<aesni_decrypt_cbc+483>
0xffffffff808e7d3f <aesni_decrypt_cbc+415>:     shl    $0x20,%r13
0xffffffff808e7d43 <aesni_decrypt_cbc+419>:     mov    $0x100000000,%rdx
0xffffffff808e7d4d <aesni_decrypt_cbc+429>:     add    %rdx,%r13
0xffffffff808e7d50 <aesni_decrypt_cbc+432>:     aesdec %xmm1,%xmm2
0xffffffff808e7d55 <aesni_decrypt_cbc+437>:     aesdec %xmm1,%xmm3
0xffffffff808e7d5a <aesni_decrypt_cbc+442>:     aesdec %xmm1,%xmm4
0xffffffff808e7d5f <aesni_decrypt_cbc+447>:     aesdec %xmm1,%xmm5
0xffffffff808e7d64 <aesni_decrypt_cbc+452>:     aesdec %xmm1,%xmm6
0xffffffff808e7d69 <aesni_decrypt_cbc+457>:     aesdec %xmm1,%xmm7
0xffffffff808e7d6e <aesni_decrypt_cbc+462>:     aesdec %xmm1,%xmm0
0xffffffff808e7d73 <aesni_decrypt_cbc+467>:     sar    $0x1c,%r13
0xffffffff808e7d77 <aesni_decrypt_cbc+471>:     aesdec %xmm1,%xmm9
0xffffffff808e7d7d <aesni_decrypt_cbc+477>:     movdqa (%rsi,%r13,1),%xmm1
0xffffffff808e7d83 <aesni_decrypt_cbc+483>:     aesdeclast %xmm1,%xmm9
0xffffffff808e7d89 <aesni_decrypt_cbc+489>:     movdqa %xmm9,-0xd0(%rbp)
0xffffffff808e7d92 <aesni_decrypt_cbc+498>:     mov    -0x40(%rbp),%rdx
0xffffffff808e7d96 <aesni_decrypt_cbc+502>:     movdqa (%rdx),%xmm1
0xffffffff808e7d9a <aesni_decrypt_cbc+506>:     aesdeclast %xmm1,%xmm0
0xffffffff808e7d9f <aesni_decrypt_cbc+511>:     movdqa %xmm0,-0xc0(%rbp)
0xffffffff808e7da7 <aesni_decrypt_cbc+519>:     aesdeclast %xmm1,%xmm7
0xffffffff808e7dac <aesni_decrypt_cbc+524>:     movdqa %xmm7,-0xb0(%rbp)
0xffffffff808e7db4 <aesni_decrypt_cbc+532>:     aesdeclast %xmm1,%xmm6
0xffffffff808e7db9 <aesni_decrypt_cbc+537>:     movdqa %xmm6,-0xa0(%rbp)
0xffffffff808e7dc1 <aesni_decrypt_cbc+545>:     aesdeclast %xmm1,%xmm5
0xffffffff808e7dc6 <aesni_decrypt_cbc+550>:     movdqa %xmm5,-0x90(%rbp)
0xffffffff808e7dce <aesni_decrypt_cbc+558>:     aesdeclast %xmm1,%xmm4
0xffffffff808e7dd3 <aesni_decrypt_cbc+563>:     movdqa %xmm4,-0x80(%rbp)
0xffffffff808e7dd8 <aesni_decrypt_cbc+568>:     aesdeclast %xmm1,%xmm3
0xffffffff808e7ddd <aesni_decrypt_cbc+573>:     movdqa %xmm3,-0x70(%rbp)
0xffffffff808e7de2 <aesni_decrypt_cbc+578>:     aesdeclast %xmm1,%xmm2
0xffffffff808e7de7 <aesni_decrypt_cbc+583>:     movdqa %xmm2,-0x60(%rbp)
0xffffffff808e7dec <aesni_decrypt_cbc+588>:     pxor   %xmm8,%xmm9
0xffffffff808e7df1 <aesni_decrypt_cbc+593>:     movups (%rcx),%xmm0
0xffffffff808e7df4 <aesni_decrypt_cbc+596>:     movups 0x10(%rcx),%xmm1
0xffffffff808e7df8 <aesni_decrypt_cbc+600>:     movdqu 0x20(%rcx),%xmm2
0xffffffff808e7dfd <aesni_decrypt_cbc+605>:     movdqu 0x30(%rcx),%xmm3
---Type <return> to continue, or q <return> to quit---
0xffffffff808e7e02 <aesni_decrypt_cbc+610>:     movdqu %xmm9,(%rcx)
0xffffffff808e7e07 <aesni_decrypt_cbc+615>:     xorps  -0xc0(%rbp),%xmm0
0xffffffff808e7e0e <aesni_decrypt_cbc+622>:     movups %xmm0,0x10(%rcx)
0xffffffff808e7e12 <aesni_decrypt_cbc+626>:     xorps  -0xb0(%rbp),%xmm1
0xffffffff808e7e19 <aesni_decrypt_cbc+633>:     movups %xmm1,0x20(%rcx)
0xffffffff808e7e1d <aesni_decrypt_cbc+637>:     pxor   -0xa0(%rbp),%xmm2
0xffffffff808e7e25 <aesni_decrypt_cbc+645>:     movdqu %xmm2,0x30(%rcx)
0xffffffff808e7e2a <aesni_decrypt_cbc+650>:     movups 0x40(%rcx),%xmm0
0xffffffff808e7e2e <aesni_decrypt_cbc+654>:     pxor   -0x90(%rbp),%xmm3
0xffffffff808e7e36 <aesni_decrypt_cbc+662>:     movdqu %xmm3,0x40(%rcx)
0xffffffff808e7e3b <aesni_decrypt_cbc+667>:     movdqu 0x50(%rcx),%xmm1
0xffffffff808e7e40 <aesni_decrypt_cbc+672>:     xorps  -0x80(%rbp),%xmm0
0xffffffff808e7e44 <aesni_decrypt_cbc+676>:     movups %xmm0,0x50(%rcx)
0xffffffff808e7e48 <aesni_decrypt_cbc+680>:     pxor   -0x70(%rbp),%xmm1
0xffffffff808e7e4d <aesni_decrypt_cbc+685>:     movdqu 0x60(%rcx),%xmm0
0xffffffff808e7e52 <aesni_decrypt_cbc+690>:     movdqu %xmm1,0x60(%rcx)
0xffffffff808e7e57 <aesni_decrypt_cbc+695>:     movdqu 0x70(%rcx),%xmm8
0xffffffff808e7e5d <aesni_decrypt_cbc+701>:     pxor   -0x60(%rbp),%xmm0
0xffffffff808e7e62 <aesni_decrypt_cbc+706>:     movdqu %xmm0,0x70(%rcx)
0xffffffff808e7e67 <aesni_decrypt_cbc+711>:     sub    $0xffffffffffffff80,=
%rcx
0xffffffff808e7e6b <aesni_decrypt_cbc+715>:     add    $0x1,%r15
0xffffffff808e7e6f <aesni_decrypt_cbc+719>:     cmp    %r11,%r15
0xffffffff808e7e72 <aesni_decrypt_cbc+722>:     mov    -0x48(%rbp),%rdi
0xffffffff808e7e76 <aesni_decrypt_cbc+726>:     jne    0xffffffff808e7c20
<aesni_decrypt_cbc+128>
0xffffffff808e7e7c <aesni_decrypt_cbc+732>:     add    -0x30(%rbp),%r9
0xffffffff808e7e80 <aesni_decrypt_cbc+736>:     mov    -0x38(%rbp),%rdx
0xffffffff808e7e84 <aesni_decrypt_cbc+740>:     shl    $0x3,%r11
0xffffffff808e7e88 <aesni_decrypt_cbc+744>:     cmp    %r11,%r8
0xffffffff808e7e8b <aesni_decrypt_cbc+747>:     ja     0xffffffff808e8012
<aesni_decrypt_cbc+1138>
0xffffffff808e7e91 <aesni_decrypt_cbc+753>:     jmpq   0xffffffff808e8160
<aesni_decrypt_cbc+1472>
0xffffffff808e7e96 <aesni_decrypt_cbc+758>:     xor    %r11d,%r11d
0xffffffff808e7e99 <aesni_decrypt_cbc+761>:     shl    $0x3,%r11
0xffffffff808e7e9d <aesni_decrypt_cbc+765>:     cmp    %r11,%r8
0xffffffff808e7ea0 <aesni_decrypt_cbc+768>:     ja     0xffffffff808e8012
<aesni_decrypt_cbc+1138>
0xffffffff808e7ea6 <aesni_decrypt_cbc+774>:     jmpq   0xffffffff808e8160
<aesni_decrypt_cbc+1472>
0xffffffff808e7eab <aesni_decrypt_cbc+779>:     mov    %r11,%rax
0xffffffff808e7eae <aesni_decrypt_cbc+782>:     mov    %r9,%rcx
0xffffffff808e7eb1 <aesni_decrypt_cbc+785>:     nopw   %cs:0x0(%rax,%rax,1)
0xffffffff808e7ec0 <aesni_decrypt_cbc+800>:     movdqu (%rcx),%xmm0
0xffffffff808e7ec4 <aesni_decrypt_cbc+804>:     movdqu 0x10(%rcx),%xmm7
0xffffffff808e7ec9 <aesni_decrypt_cbc+809>:     movdqu 0x20(%rcx),%xmm1
---Type <return> to continue, or q <return> to quit---
0xffffffff808e7ece <aesni_decrypt_cbc+814>:     movdqu 0x30(%rcx),%xmm6
0xffffffff808e7ed3 <aesni_decrypt_cbc+819>:     movdqu 0x40(%rcx),%xmm5
0xffffffff808e7ed8 <aesni_decrypt_cbc+824>:     movdqu 0x50(%rcx),%xmm4
0xffffffff808e7edd <aesni_decrypt_cbc+829>:     movdqu 0x60(%rcx),%xmm10
0xffffffff808e7ee3 <aesni_decrypt_cbc+835>:     movdqu 0x70(%rcx),%xmm9
0xffffffff808e7ee9 <aesni_decrypt_cbc+841>:     movdqa (%rsi),%xmm2
0xffffffff808e7eed <aesni_decrypt_cbc+845>:     movdqa 0x10(%rsi),%xmm3
0xffffffff808e7ef2 <aesni_decrypt_cbc+850>:     pxor   %xmm2,%xmm0
0xffffffff808e7ef6 <aesni_decrypt_cbc+854>:     pxor   %xmm2,%xmm7
0xffffffff808e7efa <aesni_decrypt_cbc+858>:     pxor   %xmm2,%xmm1
0xffffffff808e7efe <aesni_decrypt_cbc+862>:     pxor   %xmm2,%xmm6
0xffffffff808e7f02 <aesni_decrypt_cbc+866>:     pxor   %xmm2,%xmm5
0xffffffff808e7f06 <aesni_decrypt_cbc+870>:     pxor   %xmm2,%xmm4
0xffffffff808e7f0a <aesni_decrypt_cbc+874>:     pxor   %xmm2,%xmm10
0xffffffff808e7f0f <aesni_decrypt_cbc+879>:     pxor   %xmm2,%xmm9
0xffffffff808e7f14 <aesni_decrypt_cbc+884>:     aesdeclast %xmm3,%xmm0
0xffffffff808e7f19 <aesni_decrypt_cbc+889>:     movdqa %xmm0,-0xd0(%rbp)
0xffffffff808e7f21 <aesni_decrypt_cbc+897>:     aesdeclast %xmm3,%xmm7
0xffffffff808e7f26 <aesni_decrypt_cbc+902>:     movdqa %xmm7,-0xc0(%rbp)
0xffffffff808e7f2e <aesni_decrypt_cbc+910>:     aesdeclast %xmm3,%xmm1
0xffffffff808e7f33 <aesni_decrypt_cbc+915>:     movdqa %xmm1,-0xb0(%rbp)
0xffffffff808e7f3b <aesni_decrypt_cbc+923>:     aesdeclast %xmm3,%xmm6
0xffffffff808e7f40 <aesni_decrypt_cbc+928>:     movdqa %xmm6,-0xa0(%rbp)
0xffffffff808e7f48 <aesni_decrypt_cbc+936>:     aesdeclast %xmm3,%xmm5
0xffffffff808e7f4d <aesni_decrypt_cbc+941>:     movdqa %xmm5,-0x90(%rbp)
0xffffffff808e7f55 <aesni_decrypt_cbc+949>:     aesdeclast %xmm3,%xmm4
0xffffffff808e7f5a <aesni_decrypt_cbc+954>:     movdqa %xmm4,-0x80(%rbp)
0xffffffff808e7f5f <aesni_decrypt_cbc+959>:     aesdeclast %xmm3,%xmm10
0xffffffff808e7f65 <aesni_decrypt_cbc+965>:     movdqa %xmm10,-0x70(%rbp)
0xffffffff808e7f6b <aesni_decrypt_cbc+971>:     aesdeclast %xmm3,%xmm9
0xffffffff808e7f71 <aesni_decrypt_cbc+977>:     movdqa %xmm9,-0x60(%rbp)
0xffffffff808e7f77 <aesni_decrypt_cbc+983>:     pxor   %xmm8,%xmm0
0xffffffff808e7f7c <aesni_decrypt_cbc+988>:     movups (%rcx),%xmm1
0xffffffff808e7f7f <aesni_decrypt_cbc+991>:     movdqu 0x10(%rcx),%xmm2
0xffffffff808e7f84 <aesni_decrypt_cbc+996>:     movdqu 0x20(%rcx),%xmm3
0xffffffff808e7f89 <aesni_decrypt_cbc+1001>:    movdqu 0x30(%rcx),%xmm4
0xffffffff808e7f8e <aesni_decrypt_cbc+1006>:    movdqu %xmm0,(%rcx)
0xffffffff808e7f92 <aesni_decrypt_cbc+1010>:    xorps  -0xc0(%rbp),%xmm1
0xffffffff808e7f99 <aesni_decrypt_cbc+1017>:    movups %xmm1,0x10(%rcx)
0xffffffff808e7f9d <aesni_decrypt_cbc+1021>:    pxor   -0xb0(%rbp),%xmm2
0xffffffff808e7fa5 <aesni_decrypt_cbc+1029>:    movdqu %xmm2,0x20(%rcx)
0xffffffff808e7faa <aesni_decrypt_cbc+1034>:    pxor   -0xa0(%rbp),%xmm3
0xffffffff808e7fb2 <aesni_decrypt_cbc+1042>:    movdqu %xmm3,0x30(%rcx)
0xffffffff808e7fb7 <aesni_decrypt_cbc+1047>:    movups 0x40(%rcx),%xmm0
0xffffffff808e7fbb <aesni_decrypt_cbc+1051>:    pxor   -0x90(%rbp),%xmm4
0xffffffff808e7fc3 <aesni_decrypt_cbc+1059>:    movdqu %xmm4,0x40(%rcx)
---Type <return> to continue, or q <return> to quit---
0xffffffff808e7fc8 <aesni_decrypt_cbc+1064>:    xorps  -0x80(%rbp),%xmm0
0xffffffff808e7fcc <aesni_decrypt_cbc+1068>:    movdqu 0x50(%rcx),%xmm1
0xffffffff808e7fd1 <aesni_decrypt_cbc+1073>:    movups %xmm0,0x50(%rcx)
0xffffffff808e7fd5 <aesni_decrypt_cbc+1077>:    movdqu 0x60(%rcx),%xmm0
0xffffffff808e7fda <aesni_decrypt_cbc+1082>:    pxor   -0x70(%rbp),%xmm1
0xffffffff808e7fdf <aesni_decrypt_cbc+1087>:    movdqu %xmm1,0x60(%rcx)
0xffffffff808e7fe4 <aesni_decrypt_cbc+1092>:    movdqu 0x70(%rcx),%xmm8
0xffffffff808e7fea <aesni_decrypt_cbc+1098>:    pxor   -0x60(%rbp),%xmm0
0xffffffff808e7fef <aesni_decrypt_cbc+1103>:    movdqu %xmm0,0x70(%rcx)
0xffffffff808e7ff4 <aesni_decrypt_cbc+1108>:    sub    $0xffffffffffffff80,=
%rcx
0xffffffff808e7ff8 <aesni_decrypt_cbc+1112>:    add    $0xffffffffffffffff,=
%rax
0xffffffff808e7ffc <aesni_decrypt_cbc+1116>:    jne    0xffffffff808e7ec0
<aesni_decrypt_cbc+800>
0xffffffff808e8002 <aesni_decrypt_cbc+1122>:    add    %rbx,%r9
0xffffffff808e8005 <aesni_decrypt_cbc+1125>:    shl    $0x3,%r11
0xffffffff808e8009 <aesni_decrypt_cbc+1129>:    cmp    %r11,%r8
0xffffffff808e800c <aesni_decrypt_cbc+1132>:    jbe    0xffffffff808e8160
<aesni_decrypt_cbc+1472>
0xffffffff808e8012 <aesni_decrypt_cbc+1138>:    lea    -0x1(%rdi),%eax
0xffffffff808e8015 <aesni_decrypt_cbc+1141>:    movslq %eax,%rbx
0xffffffff808e8018 <aesni_decrypt_cbc+1144>:    mov    %rbx,%r10
0xffffffff808e801b <aesni_decrypt_cbc+1147>:    shl    $0x4,%r10
0xffffffff808e801f <aesni_decrypt_cbc+1151>:    add    %rsi,%r10
0xffffffff808e8022 <aesni_decrypt_cbc+1154>:    movslq %edi,%rcx
0xffffffff808e8025 <aesni_decrypt_cbc+1157>:    shl    $0x4,%rcx
0xffffffff808e8029 <aesni_decrypt_cbc+1161>:    add    %rsi,%rcx
0xffffffff808e802c <aesni_decrypt_cbc+1164>:    cmp    $0x1,%ebx
0xffffffff808e802f <aesni_decrypt_cbc+1167>:    jle    0xffffffff808e80b3
<aesni_decrypt_cbc+1299>
0xffffffff808e8035 <aesni_decrypt_cbc+1173>:    nopw   %cs:0x0(%rax,%rax,1)
0xffffffff808e8040 <aesni_decrypt_cbc+1184>:    movdqu (%r9),%xmm0
0xffffffff808e8045 <aesni_decrypt_cbc+1189>:    movdqa (%rsi),%xmm1
0xffffffff808e8049 <aesni_decrypt_cbc+1193>:    pxor   %xmm0,%xmm1
0xffffffff808e804d <aesni_decrypt_cbc+1197>:    mov    $0x1,%ebx
0xffffffff808e8052 <aesni_decrypt_cbc+1202>:    nopw   %cs:0x0(%rax,%rax,1)
0xffffffff808e8060 <aesni_decrypt_cbc+1216>:    movslq %ebx,%rbx
0xffffffff808e8063 <aesni_decrypt_cbc+1219>:    mov    %rbx,%rdi
0xffffffff808e8066 <aesni_decrypt_cbc+1222>:    shl    $0x4,%rdi
0xffffffff808e806a <aesni_decrypt_cbc+1226>:    aesdec (%rsi,%rdi,1),%xmm1
0xffffffff808e8070 <aesni_decrypt_cbc+1232>:    lea    0x1(%rbx),%edi
0xffffffff808e8073 <aesni_decrypt_cbc+1235>:    movslq %edi,%rdi
0xffffffff808e8076 <aesni_decrypt_cbc+1238>:    shl    $0x4,%rdi
0xffffffff808e807a <aesni_decrypt_cbc+1242>:    aesdec (%rsi,%rdi,1),%xmm1
0xffffffff808e8080 <aesni_decrypt_cbc+1248>:    add    $0x2,%ebx
0xffffffff808e8083 <aesni_decrypt_cbc+1251>:    cmp    %eax,%ebx
0xffffffff808e8085 <aesni_decrypt_cbc+1253>:    jl     0xffffffff808e8060
<aesni_decrypt_cbc+1216---Type <return> to continue, or q <return> to quit-=
--
>
0xffffffff808e8087 <aesni_decrypt_cbc+1255>:    aesdec (%r10),%xmm1
0xffffffff808e808d <aesni_decrypt_cbc+1261>:    aesdeclast (%rcx),%xmm1
0xffffffff808e8092 <aesni_decrypt_cbc+1266>:    pxor   %xmm8,%xmm1
0xffffffff808e8097 <aesni_decrypt_cbc+1271>:    movdqu %xmm1,(%r9)
0xffffffff808e809c <aesni_decrypt_cbc+1276>:    add    $0x10,%r9
0xffffffff808e80a0 <aesni_decrypt_cbc+1280>:    add    $0x1,%r11
0xffffffff808e80a4 <aesni_decrypt_cbc+1284>:    movdqa %xmm0,%xmm8
0xffffffff808e80a9 <aesni_decrypt_cbc+1289>:    cmp    %r8,%r11
0xffffffff808e80ac <aesni_decrypt_cbc+1292>:    jne    0xffffffff808e8040
<aesni_decrypt_cbc+1184>
0xffffffff808e80ae <aesni_decrypt_cbc+1294>:    jmpq   0xffffffff808e8160
<aesni_decrypt_cbc+1472>
0xffffffff808e80b3 <aesni_decrypt_cbc+1299>:    lea    -0x1(%r8),%rax
0xffffffff808e80b7 <aesni_decrypt_cbc+1303>:    test   $0x10,%dl
0xffffffff808e80ba <aesni_decrypt_cbc+1306>:    jne    0xffffffff808e80c9
<aesni_decrypt_cbc+1321>
0xffffffff808e80bc <aesni_decrypt_cbc+1308>:    mov    %r11,%rdi
0xffffffff808e80bf <aesni_decrypt_cbc+1311>:    cmp    %r11,%rax
0xffffffff808e80c2 <aesni_decrypt_cbc+1314>:    jne    0xffffffff808e8100
<aesni_decrypt_cbc+1376>
0xffffffff808e80c4 <aesni_decrypt_cbc+1316>:    jmpq   0xffffffff808e8160
<aesni_decrypt_cbc+1472>
0xffffffff808e80c9 <aesni_decrypt_cbc+1321>:    movdqu (%r9),%xmm0
0xffffffff808e80ce <aesni_decrypt_cbc+1326>:    movdqa (%rsi),%xmm1
0xffffffff808e80d2 <aesni_decrypt_cbc+1330>:    pxor   %xmm0,%xmm1
0xffffffff808e80d6 <aesni_decrypt_cbc+1334>:    aesdec (%r10),%xmm1
0xffffffff808e80dc <aesni_decrypt_cbc+1340>:    aesdeclast (%rcx),%xmm1
0xffffffff808e80e1 <aesni_decrypt_cbc+1345>:    pxor   %xmm8,%xmm1
0xffffffff808e80e6 <aesni_decrypt_cbc+1350>:    movdqu %xmm1,(%r9)
0xffffffff808e80eb <aesni_decrypt_cbc+1355>:    add    $0x10,%r9
0xffffffff808e80ef <aesni_decrypt_cbc+1359>:    mov    %r11,%rdi
0xffffffff808e80f2 <aesni_decrypt_cbc+1362>:    or     $0x1,%rdi
0xffffffff808e80f6 <aesni_decrypt_cbc+1366>:    movdqa %xmm0,%xmm8
0xffffffff808e80fb <aesni_decrypt_cbc+1371>:    cmp    %r11,%rax
0xffffffff808e80fe <aesni_decrypt_cbc+1374>:    je     0xffffffff808e8160
<aesni_decrypt_cbc+1472>
0xffffffff808e8100 <aesni_decrypt_cbc+1376>:    sub    %rdi,%r8
0xffffffff808e8103 <aesni_decrypt_cbc+1379>:    nopw   %cs:0x0(%rax,%rax,1)
0xffffffff808e8110 <aesni_decrypt_cbc+1392>:    movdqu (%r9),%xmm0
0xffffffff808e8115 <aesni_decrypt_cbc+1397>:    movdqa (%rsi),%xmm1
0xffffffff808e8119 <aesni_decrypt_cbc+1401>:    pxor   %xmm0,%xmm1
0xffffffff808e811d <aesni_decrypt_cbc+1405>:    aesdec (%r10),%xmm1
0xffffffff808e8123 <aesni_decrypt_cbc+1411>:    aesdeclast (%rcx),%xmm1
0xffffffff808e8128 <aesni_decrypt_cbc+1416>:    pxor   %xmm8,%xmm1
0xffffffff808e812d <aesni_decrypt_cbc+1421>:    movdqu 0x10(%r9),%xmm8
---Type <return> to continue, or q <return> to quit---
0xffffffff808e8133 <aesni_decrypt_cbc+1427>:    movdqu %xmm1,(%r9)
0xffffffff808e8138 <aesni_decrypt_cbc+1432>:    movdqa (%rsi),%xmm1
0xffffffff808e813c <aesni_decrypt_cbc+1436>:    pxor   %xmm8,%xmm1
0xffffffff808e8141 <aesni_decrypt_cbc+1441>:    aesdec (%r10),%xmm1
0xffffffff808e8147 <aesni_decrypt_cbc+1447>:    aesdeclast (%rcx),%xmm1
0xffffffff808e814c <aesni_decrypt_cbc+1452>:    pxor   %xmm0,%xmm1
0xffffffff808e8150 <aesni_decrypt_cbc+1456>:    movdqu %xmm1,0x10(%r9)
0xffffffff808e8156 <aesni_decrypt_cbc+1462>:    add    $0x20,%r9
0xffffffff808e815a <aesni_decrypt_cbc+1466>:    add    $0xfffffffffffffffe,=
%r8
0xffffffff808e815e <aesni_decrypt_cbc+1470>:    jne    0xffffffff808e8110
<aesni_decrypt_cbc+1392>
0xffffffff808e8160 <aesni_decrypt_cbc+1472>:    add    $0xa8,%rsp
0xffffffff808e8167 <aesni_decrypt_cbc+1479>:    pop    %rbx
0xffffffff808e8168 <aesni_decrypt_cbc+1480>:    pop    %r12
0xffffffff808e816a <aesni_decrypt_cbc+1482>:    pop    %r13
0xffffffff808e816c <aesni_decrypt_cbc+1484>:    pop    %r14
0xffffffff808e816e <aesni_decrypt_cbc+1486>:    pop    %r15
0xffffffff808e8170 <aesni_decrypt_cbc+1488>:    pop    %rbp
0xffffffff808e8171 <aesni_decrypt_cbc+1489>:    retq
End of assembler dump.
(kgdb) backtrace
#0  doadump (textdump=3D<value optimized out>) at pcpu.h:230
#1  0xffffffff805aef86 in kern_reboot (howto=3D260)
    at /smallblocks/src/sys/kern/kern_shutdown.c:383
#2  0xffffffff805af2fd in vpanic (fmt=3D<value optimized out>, ap=3D<value
optimized out>)
    at /smallblocks/src/sys/kern/kern_shutdown.c:776
#3  0xffffffff805af193 in panic (fmt=3D<value optimized out>)
    at /smallblocks/src/sys/kern/kern_shutdown.c:707
#4  0xffffffff808e097f in trap_fatal (frame=3D0xfffffe06892d8fa0, eva=3D0)
    at /smallblocks/src/sys/amd64/amd64/trap.c:877
#5  0xffffffff808dffa5 in trap (frame=3D0xfffffe06892d8fa0) at pcpu.h:230
#6  0xffffffff808c2bae in calltrap () at
/smallblocks/src/sys/amd64/amd64/exception.S:231
#7  0xffffffff808e7d89 in aesni_decrypt_cbc (rounds=3D<value optimized out>,
    key_schedule=3D0xfffff800122508f0, len=3D160,
    buf=3D0xfffff80050ad6200
"?\025\rz=E2=96=92=E2=96=92&HF=E2=96=92_=E2=96=92>ov\bV\2068\005k\r{d=E2=96=
=92C=E2=96=92\220c=E2=96=92j=E2=96=92=D4=B8=E2=96=92=E2=96=92~=E2=96=92=E2=
=96=926=E2=96=92=E2=96=92=E2=96=92\227K\217@=E2=96=92=E2=96=92=E2=96=92ai=
=E2=96=92=E2=96=92ll\v\216#f=E2=96=92=E2=96=92\f=E2=96=92)=E2=96=92\211|=E2=
=96=92=E2=96=92=E2=96=929ep=E2=96=92\031=E2=96=92)V=E2=96=92=E2=96=92=E2=96=
=92momo/\036,=E2=96=92m=E2=96=92\003\177-{=E2=96=92.'\005RJnK=E2=96=92=E2=
=96=92r\"\226s=E2=96=92\231=E2=96=92\203=E2=96=92
v\020P=E2=96=92\202\r\207\037L=E2=96=923=E2=96=92\004{\002g_o=E2=96=92%\201=
=CD=A8=E2=96=92\235e=E2=96=92\235\206?=E2=96=92@=E2=96=92=E2=96=92$D\"Y**\f=
\t\214eject=3D5.*",
iv=3D<value optimized out>) at aesencdec.h:102
#8  0xffffffff808e41dc in aesni_process (dev=3D<value optimized out>,
crp=3D0xfffff8015ea94bb0,
    hint=3D<value optimized out>) at
/smallblocks/src/sys/crypto/aesni/aesni.c:609
#9  0xffffffff8080cab3 in crypto_dispatch (crp=3D0xfffff8015ea94bb0)
    at /smallblocks/src/sys/opencrypto/crypto.c:844
#10 0xffffffff8080f6a7 in cryptof_ioctl (fp=3D<value optimized out>,
cmd=3D3223085927,
    data=3D0xfffffe06892d9410, active_cred=3D<value optimized out>, td=3D<v=
alue
optimized out>)
    at /smallblocks/src/sys/opencrypto/cryptodev.c:849
#11 0xffffffff806046d2 in kern_ioctl (td=3D<value optimized out>, fd=3D6,
com=3D3223085927,
    data=3D<value optimized out>) at file.h:323
#12 0xffffffff8060445d in sys_ioctl (td=3D0xfffff8015eb18000,
uap=3D0xfffffe06892d94e8)
    at /smallblocks/src/sys/kern/sys_generic.c:745
#13 0xffffffff802dbe1c in freebsd32_ioctl (td=3D0xfffff8015eb18000,
uap=3D0xfffff8015eb18538)
    at /smallblocks/src/sys/compat/freebsd32/freebsd32_ioctl.c:470
#14 0xffffffff809092fc in ia32_syscall (frame=3D0xfffffe06892d9ab8) at
subr_syscall.c:132
#15 0xffffffff808c3bf6 in int0x80_syscall_common () at ia32_exception.S:76
#16 0x0000000000000000 in ?? ()
(kgdb) p/x *(struct trapframe *)0xfffffe06892d8fa0
$1 =3D {tf_rdi =3D 0xb00000000, tf_rsi =3D 0xfffff800122508f0, tf_rdx =3D 0=
x100000000,
  tf_rcx =3D 0xfffff80050ad6200, tf_r8 =3D 0xa, tf_r9 =3D 0xfffff80050ad620=
0, tf_rax
=3D 0x200000000,
  tf_rbx =3D 0x9, tf_rbp =3D 0xfffffe06892d9138, tf_r10 =3D 0xa00000000, tf=
_r11 =3D
0x1, tf_r12 =3D 0x80,
  tf_r13 =3D 0xa0, tf_r14 =3D 0x1, tf_r15 =3D 0x0, tf_trapno =3D 0x9, tf_fs=
 =3D 0x13,
tf_gs =3D 0x1b,
  tf_addr =3D 0x0, tf_flags =3D 0x1, tf_es =3D 0x3b, tf_ds =3D 0x3b, tf_err=
 =3D 0x0,
  tf_rip =3D 0xffffffff808e7d89, tf_cs =3D 0x20, tf_rflags =3D 0x10206, tf_=
rsp =3D
0xfffffe06892d9068,
  tf_ss =3D 0x0}
(kgdb) quit

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-229222-227-xY1jZFI81L>