[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Spiped 1.4.x segfaults on i386
Yep, this indeed fixes the problem. Thank you for your helpful and fast
response.
On Thu, Oct 9, 2014, at 03:24 AM, Colin Percival wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> On 10/08/14 01:06, Denis Krienb�hl wrote:
> > I did that and got the following results:
> >
> > (gdb) p key $1 = (const uint8_t *) 0xbfa8a85c ""
> >
> > (gdb) p rkeys $2 = (__m128i *) 0x8a8b7c8
>
> Thanks, that's exactly what I was hoping to see. The problem is that the
> SSE instructions used require the AES round keys to be stored aligned to
> 16-byte boundaries, and the malloc on your system is providing unaligned
> allocations.
>
> Can you try the attached patch? In a clean source tree,
> # patch < rkeys-align.patch
> # make all
> and then you should find that it works again.
>
> - --
> Colin Percival
> Security Officer Emeritus, FreeBSD | The power to serve
> Founder, Tarsnap | www.tarsnap.com | Online backups for the truly
> paranoid
>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v2.0.22 (FreeBSD)
>
> iEYEARECAAYFAlQ145kACgkQOM7KaQxqam4z8ACdHZ9lOrEoKKrAm4G2ucfM3XbJ
> bLQAni51EQ3YfuDHbfkwbbcGNrlzj0Qt
> =ripw
> -----END PGP SIGNATURE-----
> Email had 2 attachments:
> + rkeys-align.patch
> 1k (text/plain)
> + rkeys-align.patch.sig
> 1k (application/pgp-signature)