Date: Sat, 23 Jun 2018 14:37:04 +0000 From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 229222] 11.2-PRERELEASE panic-General Protection Fault, aesni_encrypt_cbc implicated Message-ID: <bug-229222-227-xY1jZFI81L@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-229222-227@https.bugs.freebsd.org/bugzilla/> References: <bug-229222-227@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D229222 --- Comment #13 from dewayne@heuristicsystems.com.au --- (In reply to Konstantin Belousov from comment #12) Using "make __MAKE_CONF=3D/dev/null" so no influence of make.conf settings.= The uptime is less than 10 minutes. kgdb /pd2/tmp/destR/usr/lib/debug/boot/kernel/kernel.debug /var/crash/vmcore.last GNU gdb 6.1.1 [FreeBSD] Copyright 2004 Free Software Foundation, Inc. GDB is free software, covered by the GNU General Public License, and you are welcome to change it and/or distribute copies of it under certain condition= s. Type "show copying" to see the conditions. There is absolutely no warranty for GDB. Type "show warranty" for details. This GDB was configured as "amd64-marcel-freebsd"... Unread portion of the kernel message buffer: [490] [490] [490] Fatal trap 9: general protection fault while in kernel mode [490] cpuid =3D 4; apic id =3D 04 [490] instruction pointer =3D 0x20:0xffffffff808e7d89 [490] stack pointer =3D 0x0:0xfffffe06892d9068 [490] frame pointer =3D 0x0:0xfffffe06892d9138 [490] code segment =3D base 0x0, limit 0xfffff, type 0x1b [490] =3D DPL 0, pres 1, long 1, def32 0, gran 1 [490] processor eflags =3D interrupt enabled, resume, IOPL =3D 0 [490] current process =3D 22887 (ssh) [490] trap number =3D 9 [490] panic: general protection fault [490] cpuid =3D 4 [490] Uptime: 8m10s [490] Dumping 1125 out of 24507 MB:..2%..12%..22%..32%..42%..52%..62%..72%..82%..92% Reading symbols from /pd2/tmp/destR/usr/lib/debug/boot/kernel/mac_ifoff.ko.debug...done. Loaded symbols for /pd2/tmp/destR/usr/lib/debug/boot/kernel/mac_ifoff.ko.de= bug Reading symbols from /pd2/tmp/destR/usr/lib/debug/boot/kernel/cpufreq.ko.debug...done. Loaded symbols for /pd2/tmp/destR/usr/lib/debug/boot/kernel/cpufreq.ko.debug Reading symbols from /pd2/tmp/destR/usr/lib/debug/boot/kernel/coretemp.ko.debug...done. Loaded symbols for /pd2/tmp/destR/usr/lib/debug/boot/kernel/coretemp.ko.deb= ug Reading symbols from /pd2/tmp/destR/usr/lib/debug/boot/kernel/uplcom.ko.debug...done. Loaded symbols for /pd2/tmp/destR/usr/lib/debug/boot/kernel/uplcom.ko.debug Reading symbols from /pd2/tmp/destR/usr/lib/debug/boot/kernel/ucom.ko.debug...done. Loaded symbols for /pd2/tmp/destR/usr/lib/debug/boot/kernel/ucom.ko.debug #0 doadump (textdump=3D<value optimized out>) at pcpu.h:230 230 pcpu.h: No such file or directory. in pcpu.h (kgdb) list *0xffffffff808e7d89 0xffffffff808e7d89 is in aesni_decrypt_cbc (aesencdec.h:102). 97 f =3D _mm_aesdec_si128(f, keysched[i + 1]); 98 g =3D _mm_aesdec_si128(g, keysched[i + 1]); 99 h =3D _mm_aesdec_si128(h, keysched[i + 1]); 100 } 101 102 out[0] =3D _mm_aesdeclast_si128(a, keysched[i + 1]); 103 out[1] =3D _mm_aesdeclast_si128(b, keysched[i + 1]); 104 out[2] =3D _mm_aesdeclast_si128(c, keysched[i + 1]); 105 out[3] =3D _mm_aesdeclast_si128(d, keysched[i + 1]); 106 out[4] =3D _mm_aesdeclast_si128(e, keysched[i + 1]); Current language: auto; currently minimal (kgdb) 107 out[5] =3D _mm_aesdeclast_si128(f, keysched[i + 1]); 108 out[6] =3D _mm_aesdeclast_si128(g, keysched[i + 1]); 109 out[7] =3D _mm_aesdeclast_si128(h, keysched[i + 1]); 110 } 111 112 /* rounds is passed in as rounds - 1 */ 113 static inline __m128i 114 aesni_enc(int rounds, const __m128i *keysched, const __m128i from) 115 { 116 __m128i tmp; (kgdb) disassemble 0xffffffff808e7d89 Dump of assembler code for function aesni_decrypt_cbc: 0xffffffff808e7ba0 <aesni_decrypt_cbc+0>: push %rbp 0xffffffff808e7ba1 <aesni_decrypt_cbc+1>: mov %rsp,%rbp 0xffffffff808e7ba4 <aesni_decrypt_cbc+4>: push %r15 0xffffffff808e7ba6 <aesni_decrypt_cbc+6>: push %r14 0xffffffff808e7ba8 <aesni_decrypt_cbc+8>: push %r13 0xffffffff808e7baa <aesni_decrypt_cbc+10>: push %r12 0xffffffff808e7bac <aesni_decrypt_cbc+12>: push %rbx 0xffffffff808e7bad <aesni_decrypt_cbc+13>: sub $0xa8,%rsp 0xffffffff808e7bb4 <aesni_decrypt_cbc+20>: mov %rcx,%r9 0xffffffff808e7bb7 <aesni_decrypt_cbc+23>: movdqu (%r8),%xmm8 0xffffffff808e7bbc <aesni_decrypt_cbc+28>: mov %rdx,%r8 0xffffffff808e7bbf <aesni_decrypt_cbc+31>: shr $0x4,%r8 0xffffffff808e7bc3 <aesni_decrypt_cbc+35>: mov %rdx,%r11 0xffffffff808e7bc6 <aesni_decrypt_cbc+38>: shr $0x7,%r11 0xffffffff808e7bca <aesni_decrypt_cbc+42>: je 0xffffffff808e7e96 <aesni_decrypt_cbc+758> 0xffffffff808e7bd0 <aesni_decrypt_cbc+48>: lea -0x1(%rdi),%eax 0xffffffff808e7bd3 <aesni_decrypt_cbc+51>: mov %rdx,%rbx 0xffffffff808e7bd6 <aesni_decrypt_cbc+54>: and $0xffffffffffffff80,= %rbx 0xffffffff808e7bda <aesni_decrypt_cbc+58>: test %eax,%eax 0xffffffff808e7bdc <aesni_decrypt_cbc+60>: jle 0xffffffff808e7eab <aesni_decrypt_cbc+779> 0xffffffff808e7be2 <aesni_decrypt_cbc+66>: mov %rbx,-0x30(%rbp) 0xffffffff808e7be6 <aesni_decrypt_cbc+70>: mov %rdx,-0x38(%rbp) 0xffffffff808e7bea <aesni_decrypt_cbc+74>: movslq %edi,%rax 0xffffffff808e7bed <aesni_decrypt_cbc+77>: shl $0x4,%rax 0xffffffff808e7bf1 <aesni_decrypt_cbc+81>: add %rsi,%rax 0xffffffff808e7bf4 <aesni_decrypt_cbc+84>: mov %rax,-0x40(%rbp) 0xffffffff808e7bf8 <aesni_decrypt_cbc+88>: mov $0x200000000,%rax 0xffffffff808e7c02 <aesni_decrypt_cbc+98>: mov %edi,%ebx 0xffffffff808e7c04 <aesni_decrypt_cbc+100>: mov %edi,%r14d 0xffffffff808e7c07 <aesni_decrypt_cbc+103>: not %r14d 0xffffffff808e7c0a <aesni_decrypt_cbc+106>: and $0x1,%r14d 0xffffffff808e7c0e <aesni_decrypt_cbc+110>: sub %r14,%rbx 0xffffffff808e7c11 <aesni_decrypt_cbc+113>: xor %r15d,%r15d 0xffffffff808e7c14 <aesni_decrypt_cbc+116>: mov %r9,%rcx 0xffffffff808e7c17 <aesni_decrypt_cbc+119>: mov %rdi,-0x48(%rbp) 0xffffffff808e7c1b <aesni_decrypt_cbc+123>: nopl 0x0(%rax,%rax,1) 0xffffffff808e7c20 <aesni_decrypt_cbc+128>: movdqu (%rcx),%xmm9 0xffffffff808e7c25 <aesni_decrypt_cbc+133>: movdqu 0x10(%rcx),%xmm0 0xffffffff808e7c2a <aesni_decrypt_cbc+138>: movdqu 0x20(%rcx),%xmm7 0xffffffff808e7c2f <aesni_decrypt_cbc+143>: movdqu 0x30(%rcx),%xmm6 0xffffffff808e7c34 <aesni_decrypt_cbc+148>: movdqu 0x40(%rcx),%xmm5 0xffffffff808e7c39 <aesni_decrypt_cbc+153>: movdqu 0x50(%rcx),%xmm4 0xffffffff808e7c3e <aesni_decrypt_cbc+158>: movdqu 0x60(%rcx),%xmm3 ---Type <return> to continue, or q <return> to quit--- 0xffffffff808e7c43 <aesni_decrypt_cbc+163>: movdqu 0x70(%rcx),%xmm2 0xffffffff808e7c48 <aesni_decrypt_cbc+168>: movdqa (%rsi),%xmm10 0xffffffff808e7c4d <aesni_decrypt_cbc+173>: movdqa 0x10(%rsi),%xmm1 0xffffffff808e7c52 <aesni_decrypt_cbc+178>: pxor %xmm10,%xmm9 0xffffffff808e7c57 <aesni_decrypt_cbc+183>: pxor %xmm10,%xmm0 0xffffffff808e7c5c <aesni_decrypt_cbc+188>: pxor %xmm10,%xmm7 0xffffffff808e7c61 <aesni_decrypt_cbc+193>: pxor %xmm10,%xmm6 0xffffffff808e7c66 <aesni_decrypt_cbc+198>: pxor %xmm10,%xmm5 0xffffffff808e7c6b <aesni_decrypt_cbc+203>: pxor %xmm10,%xmm4 0xffffffff808e7c70 <aesni_decrypt_cbc+208>: pxor %xmm10,%xmm3 0xffffffff808e7c75 <aesni_decrypt_cbc+213>: pxor %xmm10,%xmm2 0xffffffff808e7c7a <aesni_decrypt_cbc+218>: cmp $0x2,%edi 0xffffffff808e7c7d <aesni_decrypt_cbc+221>: jne 0xffffffff808e7ca0 <aesni_decrypt_cbc+256> 0xffffffff808e7c7f <aesni_decrypt_cbc+223>: mov $0x1,%r13d 0xffffffff808e7c85 <aesni_decrypt_cbc+229>: test %r14d,%r14d 0xffffffff808e7c88 <aesni_decrypt_cbc+232>: jne 0xffffffff808e7d3f <aesni_decrypt_cbc+415> 0xffffffff808e7c8e <aesni_decrypt_cbc+238>: jmpq 0xffffffff808e7d83 <aesni_decrypt_cbc+483> 0xffffffff808e7c93 <aesni_decrypt_cbc+243>: nopw %cs:0x0(%rax,%rax,1) 0xffffffff808e7ca0 <aesni_decrypt_cbc+256>: mov $0x300000000,%rdi 0xffffffff808e7caa <aesni_decrypt_cbc+266>: mov %rax,%r10 0xffffffff808e7cad <aesni_decrypt_cbc+269>: mov $0x1,%r13d 0xffffffff808e7cb3 <aesni_decrypt_cbc+275>: nopw %cs:0x0(%rax,%rax,1) 0xffffffff808e7cc0 <aesni_decrypt_cbc+288>: aesdec %xmm1,%xmm9 0xffffffff808e7cc6 <aesni_decrypt_cbc+294>: aesdec %xmm1,%xmm0 0xffffffff808e7ccb <aesni_decrypt_cbc+299>: aesdec %xmm1,%xmm7 0xffffffff808e7cd0 <aesni_decrypt_cbc+304>: aesdec %xmm1,%xmm6 0xffffffff808e7cd5 <aesni_decrypt_cbc+309>: aesdec %xmm1,%xmm5 0xffffffff808e7cda <aesni_decrypt_cbc+314>: aesdec %xmm1,%xmm4 0xffffffff808e7cdf <aesni_decrypt_cbc+319>: aesdec %xmm1,%xmm3 0xffffffff808e7ce4 <aesni_decrypt_cbc+324>: aesdec %xmm1,%xmm2 0xffffffff808e7ce9 <aesni_decrypt_cbc+329>: mov %r10,%r12 0xffffffff808e7cec <aesni_decrypt_cbc+332>: sar $0x1c,%r12 0xffffffff808e7cf0 <aesni_decrypt_cbc+336>: movdqa (%rsi,%r12,1),%xmm1 0xffffffff808e7cf6 <aesni_decrypt_cbc+342>: aesdec %xmm1,%xmm9 0xffffffff808e7cfc <aesni_decrypt_cbc+348>: aesdec %xmm1,%xmm0 0xffffffff808e7d01 <aesni_decrypt_cbc+353>: aesdec %xmm1,%xmm7 0xffffffff808e7d06 <aesni_decrypt_cbc+358>: aesdec %xmm1,%xmm6 0xffffffff808e7d0b <aesni_decrypt_cbc+363>: aesdec %xmm1,%xmm5 0xffffffff808e7d10 <aesni_decrypt_cbc+368>: aesdec %xmm1,%xmm4 0xffffffff808e7d15 <aesni_decrypt_cbc+373>: aesdec %xmm1,%xmm3 0xffffffff808e7d1a <aesni_decrypt_cbc+378>: aesdec %xmm1,%xmm2 0xffffffff808e7d1f <aesni_decrypt_cbc+383>: add $0x2,%r13 0xffffffff808e7d23 <aesni_decrypt_cbc+387>: mov %rdi,%rdx ---Type <return> to continue, or q <return> to quit--- 0xffffffff808e7d26 <aesni_decrypt_cbc+390>: sar $0x1c,%rdx 0xffffffff808e7d2a <aesni_decrypt_cbc+394>: movdqa (%rsi,%rdx,1),%xmm1 0xffffffff808e7d2f <aesni_decrypt_cbc+399>: add %rax,%r10 0xffffffff808e7d32 <aesni_decrypt_cbc+402>: add %rax,%rdi 0xffffffff808e7d35 <aesni_decrypt_cbc+405>: cmp %r13,%rbx 0xffffffff808e7d38 <aesni_decrypt_cbc+408>: jne 0xffffffff808e7cc0 <aesni_decrypt_cbc+288> 0xffffffff808e7d3a <aesni_decrypt_cbc+410>: test %r14d,%r14d 0xffffffff808e7d3d <aesni_decrypt_cbc+413>: je 0xffffffff808e7d83 <aesni_decrypt_cbc+483> 0xffffffff808e7d3f <aesni_decrypt_cbc+415>: shl $0x20,%r13 0xffffffff808e7d43 <aesni_decrypt_cbc+419>: mov $0x100000000,%rdx 0xffffffff808e7d4d <aesni_decrypt_cbc+429>: add %rdx,%r13 0xffffffff808e7d50 <aesni_decrypt_cbc+432>: aesdec %xmm1,%xmm2 0xffffffff808e7d55 <aesni_decrypt_cbc+437>: aesdec %xmm1,%xmm3 0xffffffff808e7d5a <aesni_decrypt_cbc+442>: aesdec %xmm1,%xmm4 0xffffffff808e7d5f <aesni_decrypt_cbc+447>: aesdec %xmm1,%xmm5 0xffffffff808e7d64 <aesni_decrypt_cbc+452>: aesdec %xmm1,%xmm6 0xffffffff808e7d69 <aesni_decrypt_cbc+457>: aesdec %xmm1,%xmm7 0xffffffff808e7d6e <aesni_decrypt_cbc+462>: aesdec %xmm1,%xmm0 0xffffffff808e7d73 <aesni_decrypt_cbc+467>: sar $0x1c,%r13 0xffffffff808e7d77 <aesni_decrypt_cbc+471>: aesdec %xmm1,%xmm9 0xffffffff808e7d7d <aesni_decrypt_cbc+477>: movdqa (%rsi,%r13,1),%xmm1 0xffffffff808e7d83 <aesni_decrypt_cbc+483>: aesdeclast %xmm1,%xmm9 0xffffffff808e7d89 <aesni_decrypt_cbc+489>: movdqa %xmm9,-0xd0(%rbp) 0xffffffff808e7d92 <aesni_decrypt_cbc+498>: mov -0x40(%rbp),%rdx 0xffffffff808e7d96 <aesni_decrypt_cbc+502>: movdqa (%rdx),%xmm1 0xffffffff808e7d9a <aesni_decrypt_cbc+506>: aesdeclast %xmm1,%xmm0 0xffffffff808e7d9f <aesni_decrypt_cbc+511>: movdqa %xmm0,-0xc0(%rbp) 0xffffffff808e7da7 <aesni_decrypt_cbc+519>: aesdeclast %xmm1,%xmm7 0xffffffff808e7dac <aesni_decrypt_cbc+524>: movdqa %xmm7,-0xb0(%rbp) 0xffffffff808e7db4 <aesni_decrypt_cbc+532>: aesdeclast %xmm1,%xmm6 0xffffffff808e7db9 <aesni_decrypt_cbc+537>: movdqa %xmm6,-0xa0(%rbp) 0xffffffff808e7dc1 <aesni_decrypt_cbc+545>: aesdeclast %xmm1,%xmm5 0xffffffff808e7dc6 <aesni_decrypt_cbc+550>: movdqa %xmm5,-0x90(%rbp) 0xffffffff808e7dce <aesni_decrypt_cbc+558>: aesdeclast %xmm1,%xmm4 0xffffffff808e7dd3 <aesni_decrypt_cbc+563>: movdqa %xmm4,-0x80(%rbp) 0xffffffff808e7dd8 <aesni_decrypt_cbc+568>: aesdeclast %xmm1,%xmm3 0xffffffff808e7ddd <aesni_decrypt_cbc+573>: movdqa %xmm3,-0x70(%rbp) 0xffffffff808e7de2 <aesni_decrypt_cbc+578>: aesdeclast %xmm1,%xmm2 0xffffffff808e7de7 <aesni_decrypt_cbc+583>: movdqa %xmm2,-0x60(%rbp) 0xffffffff808e7dec <aesni_decrypt_cbc+588>: pxor %xmm8,%xmm9 0xffffffff808e7df1 <aesni_decrypt_cbc+593>: movups (%rcx),%xmm0 0xffffffff808e7df4 <aesni_decrypt_cbc+596>: movups 0x10(%rcx),%xmm1 0xffffffff808e7df8 <aesni_decrypt_cbc+600>: movdqu 0x20(%rcx),%xmm2 0xffffffff808e7dfd <aesni_decrypt_cbc+605>: movdqu 0x30(%rcx),%xmm3 ---Type <return> to continue, or q <return> to quit--- 0xffffffff808e7e02 <aesni_decrypt_cbc+610>: movdqu %xmm9,(%rcx) 0xffffffff808e7e07 <aesni_decrypt_cbc+615>: xorps -0xc0(%rbp),%xmm0 0xffffffff808e7e0e <aesni_decrypt_cbc+622>: movups %xmm0,0x10(%rcx) 0xffffffff808e7e12 <aesni_decrypt_cbc+626>: xorps -0xb0(%rbp),%xmm1 0xffffffff808e7e19 <aesni_decrypt_cbc+633>: movups %xmm1,0x20(%rcx) 0xffffffff808e7e1d <aesni_decrypt_cbc+637>: pxor -0xa0(%rbp),%xmm2 0xffffffff808e7e25 <aesni_decrypt_cbc+645>: movdqu %xmm2,0x30(%rcx) 0xffffffff808e7e2a <aesni_decrypt_cbc+650>: movups 0x40(%rcx),%xmm0 0xffffffff808e7e2e <aesni_decrypt_cbc+654>: pxor -0x90(%rbp),%xmm3 0xffffffff808e7e36 <aesni_decrypt_cbc+662>: movdqu %xmm3,0x40(%rcx) 0xffffffff808e7e3b <aesni_decrypt_cbc+667>: movdqu 0x50(%rcx),%xmm1 0xffffffff808e7e40 <aesni_decrypt_cbc+672>: xorps -0x80(%rbp),%xmm0 0xffffffff808e7e44 <aesni_decrypt_cbc+676>: movups %xmm0,0x50(%rcx) 0xffffffff808e7e48 <aesni_decrypt_cbc+680>: pxor -0x70(%rbp),%xmm1 0xffffffff808e7e4d <aesni_decrypt_cbc+685>: movdqu 0x60(%rcx),%xmm0 0xffffffff808e7e52 <aesni_decrypt_cbc+690>: movdqu %xmm1,0x60(%rcx) 0xffffffff808e7e57 <aesni_decrypt_cbc+695>: movdqu 0x70(%rcx),%xmm8 0xffffffff808e7e5d <aesni_decrypt_cbc+701>: pxor -0x60(%rbp),%xmm0 0xffffffff808e7e62 <aesni_decrypt_cbc+706>: movdqu %xmm0,0x70(%rcx) 0xffffffff808e7e67 <aesni_decrypt_cbc+711>: sub $0xffffffffffffff80,= %rcx 0xffffffff808e7e6b <aesni_decrypt_cbc+715>: add $0x1,%r15 0xffffffff808e7e6f <aesni_decrypt_cbc+719>: cmp %r11,%r15 0xffffffff808e7e72 <aesni_decrypt_cbc+722>: mov -0x48(%rbp),%rdi 0xffffffff808e7e76 <aesni_decrypt_cbc+726>: jne 0xffffffff808e7c20 <aesni_decrypt_cbc+128> 0xffffffff808e7e7c <aesni_decrypt_cbc+732>: add -0x30(%rbp),%r9 0xffffffff808e7e80 <aesni_decrypt_cbc+736>: mov -0x38(%rbp),%rdx 0xffffffff808e7e84 <aesni_decrypt_cbc+740>: shl $0x3,%r11 0xffffffff808e7e88 <aesni_decrypt_cbc+744>: cmp %r11,%r8 0xffffffff808e7e8b <aesni_decrypt_cbc+747>: ja 0xffffffff808e8012 <aesni_decrypt_cbc+1138> 0xffffffff808e7e91 <aesni_decrypt_cbc+753>: jmpq 0xffffffff808e8160 <aesni_decrypt_cbc+1472> 0xffffffff808e7e96 <aesni_decrypt_cbc+758>: xor %r11d,%r11d 0xffffffff808e7e99 <aesni_decrypt_cbc+761>: shl $0x3,%r11 0xffffffff808e7e9d <aesni_decrypt_cbc+765>: cmp %r11,%r8 0xffffffff808e7ea0 <aesni_decrypt_cbc+768>: ja 0xffffffff808e8012 <aesni_decrypt_cbc+1138> 0xffffffff808e7ea6 <aesni_decrypt_cbc+774>: jmpq 0xffffffff808e8160 <aesni_decrypt_cbc+1472> 0xffffffff808e7eab <aesni_decrypt_cbc+779>: mov %r11,%rax 0xffffffff808e7eae <aesni_decrypt_cbc+782>: mov %r9,%rcx 0xffffffff808e7eb1 <aesni_decrypt_cbc+785>: nopw %cs:0x0(%rax,%rax,1) 0xffffffff808e7ec0 <aesni_decrypt_cbc+800>: movdqu (%rcx),%xmm0 0xffffffff808e7ec4 <aesni_decrypt_cbc+804>: movdqu 0x10(%rcx),%xmm7 0xffffffff808e7ec9 <aesni_decrypt_cbc+809>: movdqu 0x20(%rcx),%xmm1 ---Type <return> to continue, or q <return> to quit--- 0xffffffff808e7ece <aesni_decrypt_cbc+814>: movdqu 0x30(%rcx),%xmm6 0xffffffff808e7ed3 <aesni_decrypt_cbc+819>: movdqu 0x40(%rcx),%xmm5 0xffffffff808e7ed8 <aesni_decrypt_cbc+824>: movdqu 0x50(%rcx),%xmm4 0xffffffff808e7edd <aesni_decrypt_cbc+829>: movdqu 0x60(%rcx),%xmm10 0xffffffff808e7ee3 <aesni_decrypt_cbc+835>: movdqu 0x70(%rcx),%xmm9 0xffffffff808e7ee9 <aesni_decrypt_cbc+841>: movdqa (%rsi),%xmm2 0xffffffff808e7eed <aesni_decrypt_cbc+845>: movdqa 0x10(%rsi),%xmm3 0xffffffff808e7ef2 <aesni_decrypt_cbc+850>: pxor %xmm2,%xmm0 0xffffffff808e7ef6 <aesni_decrypt_cbc+854>: pxor %xmm2,%xmm7 0xffffffff808e7efa <aesni_decrypt_cbc+858>: pxor %xmm2,%xmm1 0xffffffff808e7efe <aesni_decrypt_cbc+862>: pxor %xmm2,%xmm6 0xffffffff808e7f02 <aesni_decrypt_cbc+866>: pxor %xmm2,%xmm5 0xffffffff808e7f06 <aesni_decrypt_cbc+870>: pxor %xmm2,%xmm4 0xffffffff808e7f0a <aesni_decrypt_cbc+874>: pxor %xmm2,%xmm10 0xffffffff808e7f0f <aesni_decrypt_cbc+879>: pxor %xmm2,%xmm9 0xffffffff808e7f14 <aesni_decrypt_cbc+884>: aesdeclast %xmm3,%xmm0 0xffffffff808e7f19 <aesni_decrypt_cbc+889>: movdqa %xmm0,-0xd0(%rbp) 0xffffffff808e7f21 <aesni_decrypt_cbc+897>: aesdeclast %xmm3,%xmm7 0xffffffff808e7f26 <aesni_decrypt_cbc+902>: movdqa %xmm7,-0xc0(%rbp) 0xffffffff808e7f2e <aesni_decrypt_cbc+910>: aesdeclast %xmm3,%xmm1 0xffffffff808e7f33 <aesni_decrypt_cbc+915>: movdqa %xmm1,-0xb0(%rbp) 0xffffffff808e7f3b <aesni_decrypt_cbc+923>: aesdeclast %xmm3,%xmm6 0xffffffff808e7f40 <aesni_decrypt_cbc+928>: movdqa %xmm6,-0xa0(%rbp) 0xffffffff808e7f48 <aesni_decrypt_cbc+936>: aesdeclast %xmm3,%xmm5 0xffffffff808e7f4d <aesni_decrypt_cbc+941>: movdqa %xmm5,-0x90(%rbp) 0xffffffff808e7f55 <aesni_decrypt_cbc+949>: aesdeclast %xmm3,%xmm4 0xffffffff808e7f5a <aesni_decrypt_cbc+954>: movdqa %xmm4,-0x80(%rbp) 0xffffffff808e7f5f <aesni_decrypt_cbc+959>: aesdeclast %xmm3,%xmm10 0xffffffff808e7f65 <aesni_decrypt_cbc+965>: movdqa %xmm10,-0x70(%rbp) 0xffffffff808e7f6b <aesni_decrypt_cbc+971>: aesdeclast %xmm3,%xmm9 0xffffffff808e7f71 <aesni_decrypt_cbc+977>: movdqa %xmm9,-0x60(%rbp) 0xffffffff808e7f77 <aesni_decrypt_cbc+983>: pxor %xmm8,%xmm0 0xffffffff808e7f7c <aesni_decrypt_cbc+988>: movups (%rcx),%xmm1 0xffffffff808e7f7f <aesni_decrypt_cbc+991>: movdqu 0x10(%rcx),%xmm2 0xffffffff808e7f84 <aesni_decrypt_cbc+996>: movdqu 0x20(%rcx),%xmm3 0xffffffff808e7f89 <aesni_decrypt_cbc+1001>: movdqu 0x30(%rcx),%xmm4 0xffffffff808e7f8e <aesni_decrypt_cbc+1006>: movdqu %xmm0,(%rcx) 0xffffffff808e7f92 <aesni_decrypt_cbc+1010>: xorps -0xc0(%rbp),%xmm1 0xffffffff808e7f99 <aesni_decrypt_cbc+1017>: movups %xmm1,0x10(%rcx) 0xffffffff808e7f9d <aesni_decrypt_cbc+1021>: pxor -0xb0(%rbp),%xmm2 0xffffffff808e7fa5 <aesni_decrypt_cbc+1029>: movdqu %xmm2,0x20(%rcx) 0xffffffff808e7faa <aesni_decrypt_cbc+1034>: pxor -0xa0(%rbp),%xmm3 0xffffffff808e7fb2 <aesni_decrypt_cbc+1042>: movdqu %xmm3,0x30(%rcx) 0xffffffff808e7fb7 <aesni_decrypt_cbc+1047>: movups 0x40(%rcx),%xmm0 0xffffffff808e7fbb <aesni_decrypt_cbc+1051>: pxor -0x90(%rbp),%xmm4 0xffffffff808e7fc3 <aesni_decrypt_cbc+1059>: movdqu %xmm4,0x40(%rcx) ---Type <return> to continue, or q <return> to quit--- 0xffffffff808e7fc8 <aesni_decrypt_cbc+1064>: xorps -0x80(%rbp),%xmm0 0xffffffff808e7fcc <aesni_decrypt_cbc+1068>: movdqu 0x50(%rcx),%xmm1 0xffffffff808e7fd1 <aesni_decrypt_cbc+1073>: movups %xmm0,0x50(%rcx) 0xffffffff808e7fd5 <aesni_decrypt_cbc+1077>: movdqu 0x60(%rcx),%xmm0 0xffffffff808e7fda <aesni_decrypt_cbc+1082>: pxor -0x70(%rbp),%xmm1 0xffffffff808e7fdf <aesni_decrypt_cbc+1087>: movdqu %xmm1,0x60(%rcx) 0xffffffff808e7fe4 <aesni_decrypt_cbc+1092>: movdqu 0x70(%rcx),%xmm8 0xffffffff808e7fea <aesni_decrypt_cbc+1098>: pxor -0x60(%rbp),%xmm0 0xffffffff808e7fef <aesni_decrypt_cbc+1103>: movdqu %xmm0,0x70(%rcx) 0xffffffff808e7ff4 <aesni_decrypt_cbc+1108>: sub $0xffffffffffffff80,= %rcx 0xffffffff808e7ff8 <aesni_decrypt_cbc+1112>: add $0xffffffffffffffff,= %rax 0xffffffff808e7ffc <aesni_decrypt_cbc+1116>: jne 0xffffffff808e7ec0 <aesni_decrypt_cbc+800> 0xffffffff808e8002 <aesni_decrypt_cbc+1122>: add %rbx,%r9 0xffffffff808e8005 <aesni_decrypt_cbc+1125>: shl $0x3,%r11 0xffffffff808e8009 <aesni_decrypt_cbc+1129>: cmp %r11,%r8 0xffffffff808e800c <aesni_decrypt_cbc+1132>: jbe 0xffffffff808e8160 <aesni_decrypt_cbc+1472> 0xffffffff808e8012 <aesni_decrypt_cbc+1138>: lea -0x1(%rdi),%eax 0xffffffff808e8015 <aesni_decrypt_cbc+1141>: movslq %eax,%rbx 0xffffffff808e8018 <aesni_decrypt_cbc+1144>: mov %rbx,%r10 0xffffffff808e801b <aesni_decrypt_cbc+1147>: shl $0x4,%r10 0xffffffff808e801f <aesni_decrypt_cbc+1151>: add %rsi,%r10 0xffffffff808e8022 <aesni_decrypt_cbc+1154>: movslq %edi,%rcx 0xffffffff808e8025 <aesni_decrypt_cbc+1157>: shl $0x4,%rcx 0xffffffff808e8029 <aesni_decrypt_cbc+1161>: add %rsi,%rcx 0xffffffff808e802c <aesni_decrypt_cbc+1164>: cmp $0x1,%ebx 0xffffffff808e802f <aesni_decrypt_cbc+1167>: jle 0xffffffff808e80b3 <aesni_decrypt_cbc+1299> 0xffffffff808e8035 <aesni_decrypt_cbc+1173>: nopw %cs:0x0(%rax,%rax,1) 0xffffffff808e8040 <aesni_decrypt_cbc+1184>: movdqu (%r9),%xmm0 0xffffffff808e8045 <aesni_decrypt_cbc+1189>: movdqa (%rsi),%xmm1 0xffffffff808e8049 <aesni_decrypt_cbc+1193>: pxor %xmm0,%xmm1 0xffffffff808e804d <aesni_decrypt_cbc+1197>: mov $0x1,%ebx 0xffffffff808e8052 <aesni_decrypt_cbc+1202>: nopw %cs:0x0(%rax,%rax,1) 0xffffffff808e8060 <aesni_decrypt_cbc+1216>: movslq %ebx,%rbx 0xffffffff808e8063 <aesni_decrypt_cbc+1219>: mov %rbx,%rdi 0xffffffff808e8066 <aesni_decrypt_cbc+1222>: shl $0x4,%rdi 0xffffffff808e806a <aesni_decrypt_cbc+1226>: aesdec (%rsi,%rdi,1),%xmm1 0xffffffff808e8070 <aesni_decrypt_cbc+1232>: lea 0x1(%rbx),%edi 0xffffffff808e8073 <aesni_decrypt_cbc+1235>: movslq %edi,%rdi 0xffffffff808e8076 <aesni_decrypt_cbc+1238>: shl $0x4,%rdi 0xffffffff808e807a <aesni_decrypt_cbc+1242>: aesdec (%rsi,%rdi,1),%xmm1 0xffffffff808e8080 <aesni_decrypt_cbc+1248>: add $0x2,%ebx 0xffffffff808e8083 <aesni_decrypt_cbc+1251>: cmp %eax,%ebx 0xffffffff808e8085 <aesni_decrypt_cbc+1253>: jl 0xffffffff808e8060 <aesni_decrypt_cbc+1216---Type <return> to continue, or q <return> to quit-= -- > 0xffffffff808e8087 <aesni_decrypt_cbc+1255>: aesdec (%r10),%xmm1 0xffffffff808e808d <aesni_decrypt_cbc+1261>: aesdeclast (%rcx),%xmm1 0xffffffff808e8092 <aesni_decrypt_cbc+1266>: pxor %xmm8,%xmm1 0xffffffff808e8097 <aesni_decrypt_cbc+1271>: movdqu %xmm1,(%r9) 0xffffffff808e809c <aesni_decrypt_cbc+1276>: add $0x10,%r9 0xffffffff808e80a0 <aesni_decrypt_cbc+1280>: add $0x1,%r11 0xffffffff808e80a4 <aesni_decrypt_cbc+1284>: movdqa %xmm0,%xmm8 0xffffffff808e80a9 <aesni_decrypt_cbc+1289>: cmp %r8,%r11 0xffffffff808e80ac <aesni_decrypt_cbc+1292>: jne 0xffffffff808e8040 <aesni_decrypt_cbc+1184> 0xffffffff808e80ae <aesni_decrypt_cbc+1294>: jmpq 0xffffffff808e8160 <aesni_decrypt_cbc+1472> 0xffffffff808e80b3 <aesni_decrypt_cbc+1299>: lea -0x1(%r8),%rax 0xffffffff808e80b7 <aesni_decrypt_cbc+1303>: test $0x10,%dl 0xffffffff808e80ba <aesni_decrypt_cbc+1306>: jne 0xffffffff808e80c9 <aesni_decrypt_cbc+1321> 0xffffffff808e80bc <aesni_decrypt_cbc+1308>: mov %r11,%rdi 0xffffffff808e80bf <aesni_decrypt_cbc+1311>: cmp %r11,%rax 0xffffffff808e80c2 <aesni_decrypt_cbc+1314>: jne 0xffffffff808e8100 <aesni_decrypt_cbc+1376> 0xffffffff808e80c4 <aesni_decrypt_cbc+1316>: jmpq 0xffffffff808e8160 <aesni_decrypt_cbc+1472> 0xffffffff808e80c9 <aesni_decrypt_cbc+1321>: movdqu (%r9),%xmm0 0xffffffff808e80ce <aesni_decrypt_cbc+1326>: movdqa (%rsi),%xmm1 0xffffffff808e80d2 <aesni_decrypt_cbc+1330>: pxor %xmm0,%xmm1 0xffffffff808e80d6 <aesni_decrypt_cbc+1334>: aesdec (%r10),%xmm1 0xffffffff808e80dc <aesni_decrypt_cbc+1340>: aesdeclast (%rcx),%xmm1 0xffffffff808e80e1 <aesni_decrypt_cbc+1345>: pxor %xmm8,%xmm1 0xffffffff808e80e6 <aesni_decrypt_cbc+1350>: movdqu %xmm1,(%r9) 0xffffffff808e80eb <aesni_decrypt_cbc+1355>: add $0x10,%r9 0xffffffff808e80ef <aesni_decrypt_cbc+1359>: mov %r11,%rdi 0xffffffff808e80f2 <aesni_decrypt_cbc+1362>: or $0x1,%rdi 0xffffffff808e80f6 <aesni_decrypt_cbc+1366>: movdqa %xmm0,%xmm8 0xffffffff808e80fb <aesni_decrypt_cbc+1371>: cmp %r11,%rax 0xffffffff808e80fe <aesni_decrypt_cbc+1374>: je 0xffffffff808e8160 <aesni_decrypt_cbc+1472> 0xffffffff808e8100 <aesni_decrypt_cbc+1376>: sub %rdi,%r8 0xffffffff808e8103 <aesni_decrypt_cbc+1379>: nopw %cs:0x0(%rax,%rax,1) 0xffffffff808e8110 <aesni_decrypt_cbc+1392>: movdqu (%r9),%xmm0 0xffffffff808e8115 <aesni_decrypt_cbc+1397>: movdqa (%rsi),%xmm1 0xffffffff808e8119 <aesni_decrypt_cbc+1401>: pxor %xmm0,%xmm1 0xffffffff808e811d <aesni_decrypt_cbc+1405>: aesdec (%r10),%xmm1 0xffffffff808e8123 <aesni_decrypt_cbc+1411>: aesdeclast (%rcx),%xmm1 0xffffffff808e8128 <aesni_decrypt_cbc+1416>: pxor %xmm8,%xmm1 0xffffffff808e812d <aesni_decrypt_cbc+1421>: movdqu 0x10(%r9),%xmm8 ---Type <return> to continue, or q <return> to quit--- 0xffffffff808e8133 <aesni_decrypt_cbc+1427>: movdqu %xmm1,(%r9) 0xffffffff808e8138 <aesni_decrypt_cbc+1432>: movdqa (%rsi),%xmm1 0xffffffff808e813c <aesni_decrypt_cbc+1436>: pxor %xmm8,%xmm1 0xffffffff808e8141 <aesni_decrypt_cbc+1441>: aesdec (%r10),%xmm1 0xffffffff808e8147 <aesni_decrypt_cbc+1447>: aesdeclast (%rcx),%xmm1 0xffffffff808e814c <aesni_decrypt_cbc+1452>: pxor %xmm0,%xmm1 0xffffffff808e8150 <aesni_decrypt_cbc+1456>: movdqu %xmm1,0x10(%r9) 0xffffffff808e8156 <aesni_decrypt_cbc+1462>: add $0x20,%r9 0xffffffff808e815a <aesni_decrypt_cbc+1466>: add $0xfffffffffffffffe,= %r8 0xffffffff808e815e <aesni_decrypt_cbc+1470>: jne 0xffffffff808e8110 <aesni_decrypt_cbc+1392> 0xffffffff808e8160 <aesni_decrypt_cbc+1472>: add $0xa8,%rsp 0xffffffff808e8167 <aesni_decrypt_cbc+1479>: pop %rbx 0xffffffff808e8168 <aesni_decrypt_cbc+1480>: pop %r12 0xffffffff808e816a <aesni_decrypt_cbc+1482>: pop %r13 0xffffffff808e816c <aesni_decrypt_cbc+1484>: pop %r14 0xffffffff808e816e <aesni_decrypt_cbc+1486>: pop %r15 0xffffffff808e8170 <aesni_decrypt_cbc+1488>: pop %rbp 0xffffffff808e8171 <aesni_decrypt_cbc+1489>: retq End of assembler dump. (kgdb) backtrace #0 doadump (textdump=3D<value optimized out>) at pcpu.h:230 #1 0xffffffff805aef86 in kern_reboot (howto=3D260) at /smallblocks/src/sys/kern/kern_shutdown.c:383 #2 0xffffffff805af2fd in vpanic (fmt=3D<value optimized out>, ap=3D<value optimized out>) at /smallblocks/src/sys/kern/kern_shutdown.c:776 #3 0xffffffff805af193 in panic (fmt=3D<value optimized out>) at /smallblocks/src/sys/kern/kern_shutdown.c:707 #4 0xffffffff808e097f in trap_fatal (frame=3D0xfffffe06892d8fa0, eva=3D0) at /smallblocks/src/sys/amd64/amd64/trap.c:877 #5 0xffffffff808dffa5 in trap (frame=3D0xfffffe06892d8fa0) at pcpu.h:230 #6 0xffffffff808c2bae in calltrap () at /smallblocks/src/sys/amd64/amd64/exception.S:231 #7 0xffffffff808e7d89 in aesni_decrypt_cbc (rounds=3D<value optimized out>, key_schedule=3D0xfffff800122508f0, len=3D160, buf=3D0xfffff80050ad6200 "?\025\rz=E2=96=92=E2=96=92&HF=E2=96=92_=E2=96=92>ov\bV\2068\005k\r{d=E2=96= =92C=E2=96=92\220c=E2=96=92j=E2=96=92=D4=B8=E2=96=92=E2=96=92~=E2=96=92=E2= =96=926=E2=96=92=E2=96=92=E2=96=92\227K\217@=E2=96=92=E2=96=92=E2=96=92ai= =E2=96=92=E2=96=92ll\v\216#f=E2=96=92=E2=96=92\f=E2=96=92)=E2=96=92\211|=E2= =96=92=E2=96=92=E2=96=929ep=E2=96=92\031=E2=96=92)V=E2=96=92=E2=96=92=E2=96= =92momo/\036,=E2=96=92m=E2=96=92\003\177-{=E2=96=92.'\005RJnK=E2=96=92=E2= =96=92r\"\226s=E2=96=92\231=E2=96=92\203=E2=96=92 v\020P=E2=96=92\202\r\207\037L=E2=96=923=E2=96=92\004{\002g_o=E2=96=92%\201= =CD=A8=E2=96=92\235e=E2=96=92\235\206?=E2=96=92@=E2=96=92=E2=96=92$D\"Y**\f= \t\214eject=3D5.*", iv=3D<value optimized out>) at aesencdec.h:102 #8 0xffffffff808e41dc in aesni_process (dev=3D<value optimized out>, crp=3D0xfffff8015ea94bb0, hint=3D<value optimized out>) at /smallblocks/src/sys/crypto/aesni/aesni.c:609 #9 0xffffffff8080cab3 in crypto_dispatch (crp=3D0xfffff8015ea94bb0) at /smallblocks/src/sys/opencrypto/crypto.c:844 #10 0xffffffff8080f6a7 in cryptof_ioctl (fp=3D<value optimized out>, cmd=3D3223085927, data=3D0xfffffe06892d9410, active_cred=3D<value optimized out>, td=3D<v= alue optimized out>) at /smallblocks/src/sys/opencrypto/cryptodev.c:849 #11 0xffffffff806046d2 in kern_ioctl (td=3D<value optimized out>, fd=3D6, com=3D3223085927, data=3D<value optimized out>) at file.h:323 #12 0xffffffff8060445d in sys_ioctl (td=3D0xfffff8015eb18000, uap=3D0xfffffe06892d94e8) at /smallblocks/src/sys/kern/sys_generic.c:745 #13 0xffffffff802dbe1c in freebsd32_ioctl (td=3D0xfffff8015eb18000, uap=3D0xfffff8015eb18538) at /smallblocks/src/sys/compat/freebsd32/freebsd32_ioctl.c:470 #14 0xffffffff809092fc in ia32_syscall (frame=3D0xfffffe06892d9ab8) at subr_syscall.c:132 #15 0xffffffff808c3bf6 in int0x80_syscall_common () at ia32_exception.S:76 #16 0x0000000000000000 in ?? () (kgdb) p/x *(struct trapframe *)0xfffffe06892d8fa0 $1 =3D {tf_rdi =3D 0xb00000000, tf_rsi =3D 0xfffff800122508f0, tf_rdx =3D 0= x100000000, tf_rcx =3D 0xfffff80050ad6200, tf_r8 =3D 0xa, tf_r9 =3D 0xfffff80050ad620= 0, tf_rax =3D 0x200000000, tf_rbx =3D 0x9, tf_rbp =3D 0xfffffe06892d9138, tf_r10 =3D 0xa00000000, tf= _r11 =3D 0x1, tf_r12 =3D 0x80, tf_r13 =3D 0xa0, tf_r14 =3D 0x1, tf_r15 =3D 0x0, tf_trapno =3D 0x9, tf_fs= =3D 0x13, tf_gs =3D 0x1b, tf_addr =3D 0x0, tf_flags =3D 0x1, tf_es =3D 0x3b, tf_ds =3D 0x3b, tf_err= =3D 0x0, tf_rip =3D 0xffffffff808e7d89, tf_cs =3D 0x20, tf_rflags =3D 0x10206, tf_= rsp =3D 0xfffffe06892d9068, tf_ss =3D 0x0} (kgdb) quit --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-229222-227-xY1jZFI81L>