[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Spiped 1.4.x segfaults on i386



Yep, this indeed fixes the problem. Thank you for your helpful and fast
response.

On Thu, Oct 9, 2014, at 03:24 AM, Colin Percival wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> On 10/08/14 01:06, Denis Krienb�hl wrote:
> > I did that and got the following results:
> > 
> > (gdb) p key $1 = (const uint8_t *) 0xbfa8a85c ""
> > 
> > (gdb) p rkeys $2 = (__m128i *) 0x8a8b7c8
> 
> Thanks, that's exactly what I was hoping to see.  The problem is that the
> SSE instructions used require the AES round keys to be stored aligned to
> 16-byte boundaries, and the malloc on your system is providing unaligned
> allocations.
> 
> Can you try the attached patch?  In a clean source tree,
> # patch < rkeys-align.patch
> # make all
> and then you should find that it works again.
> 
> - -- 
> Colin Percival
> Security Officer Emeritus, FreeBSD | The power to serve
> Founder, Tarsnap | www.tarsnap.com | Online backups for the truly
> paranoid
> 
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v2.0.22 (FreeBSD)
> 
> iEYEARECAAYFAlQ145kACgkQOM7KaQxqam4z8ACdHZ9lOrEoKKrAm4G2ucfM3XbJ
> bLQAni51EQ3YfuDHbfkwbbcGNrlzj0Qt
> =ripw
> -----END PGP SIGNATURE-----
> Email had 2 attachments:
> + rkeys-align.patch
>   1k (text/plain)
> + rkeys-align.patch.sig
>   1k (application/pgp-signature)