sys-kernel/hardened-sources-2.6.20-r6 sys-fs/cryptsetup-luks-1.0.4-r3 All PAX systems are enabled. # cryptsetup luksOpen /dev/md/d1p1 haufen Enter LUKS passphrase: key slot 0 unlocked. *** stack smashing detected ***: cryptsetup - terminated cryptsetup: stack smashing attack in function __crypt_luks_open - terminated Report to http://bugs.gentoo.org/ Killed Reproducible: Always Steps to Reproduce: # cryptsetup -c aes-lrw-benbi -s 384 luksFormat /dev/md/d1p1 WARNING! ======== This will overwrite data on /dev/md/d1p1 irrevocably. Are you sure? (Type uppercase yes): YES Enter LUKS passphrase: Verify passphrase: Command successful. Actual Results: Everything working fine afterwards. Mapping is up and usable, only that message about stack smashing is frightening... Important: The Problem only occurs with LRW. When using CBC instead, everything works fine.
sys-fs/cryptsetup-1.0.5 (~x86) fixes this. You might want to set it stable.