• Home
  • Help
  • Search
  • Login
  • Register
  Show Posts
Pages: [1]
1  Linux Stuff / Kernel / Re: 2.6.30-rc8 cryptsetup support on: October 02, 2009, 01:13:57 PM
I just tried the README-2.6.31-rc7-00165-g97f6ce5 kernel. It works fine with cryptsetup, but samba has a bug with this kernel (causes "Failed to read all inotify data" errors all the time).

I then tried the 2.6.31.1 kernel with your configuration from the kernel above (from /proc/config.gz). cryptsetup luksOpen crashed with this one.

Finally I switched back to the stock kernel which works stable with cryptsetup and Samba. Undecided
2  Linux Stuff / Kernel / Re: 2.6.30-rc8 cryptsetup support on: September 03, 2009, 12:05:56 AM
There's a commit note from Aug 27th:

This adds support for Marvell's Cryptographic Engines and Security Accelerator (CESA) which can be found on a few SoC.
Tested with dm-crypt.

http://git.marvell.com/?p=orion.git;a=commit;h=24eb3f0cb48da8244d8c02bcb38e003e9c94522f
3  Linux Stuff / Kernel / Re: 2.6.30-rc8 cryptsetup support on: August 31, 2009, 12:18:13 AM
That's great news! Grin I'll give it a try as soon as I find the time (within the next 3 weeks I guess).

Could you please post details on the script you used or even the script itself? I guess you started on the newest one (http://sheeva.with-linux.com/sheeva/2.6.30.5/sheeva-2.6.30.5.config). What changes did you make?
Did you use the Marvell or the kernel.org sources? Did you apply any of the patches from sheeva.with-linux.com/sheeva/2.6.30.5?

As you tried a new release candidate it seems the problem has been fixed somewhere between 2.8.30 and 2.8.31.
4  Linux Stuff / Kernel / Re: 2.6.30-rc8 cryptsetup support on: August 21, 2009, 12:46:56 AM
I have given up. I'm still running the old system that came with the box. I'd really like to update to some extra modules but I don't have a clue how to fix this. There weren't many replies, probably not many people are using encryption at all.

It also seems that the old version supports the hardware encryption, while the newer ones from this site dont (see post from rshitrit).
5  Linux Stuff / Kernel / Re: 2.6.30-rc8 cryptsetup support on: July 06, 2009, 04:34:25 AM
I compiled my kernel based on the same configuration (last try with the 2.6.30 tag sources) but added modules I thought are neccessary (device-mapper, aesXXX, loop devices). Didn't work anyway.
I have no experience in this but I would expect a clearer error messages if a required module was missing than the expection shown above.
6  Linux Stuff / Kernel / Re: 2.6.30-rc8 cryptsetup support on: June 21, 2009, 01:00:15 PM
A short benchmark without and with aes encryption through cryptsetup. I just don't know if it's already using the hardware AES or not. The 2.6.30-rc8 includes the hardware AES driver, but obviously no one here is using cryptsetup Cry and I'm no kernel expert.
 
Code:
/dev/sda:
 Timing cached reads:   422 MB in  2.00 seconds = 210.60 MB/sec
 Timing buffered disk reads:   92 MB in  3.04 seconds =  30.21 MB/sec
root@sheeva:~# hdparm -tT /dev/mapper/speicher

/dev/mapper/speicher:
 Timing cached reads:   410 MB in  2.01 seconds = 204.47 MB/sec
 Timing buffered disk reads:   50 MB in  3.06 seconds =  16.35 MB/sec
root@sheeva:~#
7  Linux Stuff / Kernel / Re: 2.6.30-rc8 new release on: June 21, 2009, 12:55:43 PM
I'm using
  mtdparts=nand_mtd:0x100000@0x000000(u-boot)ro,0x00500000@0x00100000(uImage),0x1fa00000@0x00600000(rootfs)

and get

root@sheeva:~# cat /proc/mtd
dev:    size   erasesize  name
mtd0: 00100000 00020000 "u-boot"
mtd1: 00500000 00020000 "uImage"
mtd2: 1fa00000 00020000 "rootfs"

I also flashed a self-compiled kernel but did not touch the SZ_SIZE option. I had to use cat instead of nandwrite because the image was not block-aligned... maybe SZ_SIZE helps here.

Maybe there's another way to set these values in a configuration file after the kernel has booted?
8  Linux Stuff / Kernel / Re: 2.6.30-rc8 cryptsetup support on: June 20, 2009, 03:02:59 AM
Isn't anyone using cryptsetup on the current release candidate? I really would like to update to 2.6.30...  Embarrassed
9  Linux Stuff / Kernel / Re: 2.6.30-rc8 new release on: June 20, 2009, 03:00:36 AM
The following commands configure uboot to load the uimage from an ext2 formatted usb-stick (there's also a fat load command, see help). It also tells the kernel the layout of the data in nand and that the root file-system is also on the usb-stick.

You need to save the arcNumber and mainlineLinux variables to nand and reset before booting. Then you set the other variables for the next boot. Use the flash utilities to reprogram any of the partitions and reboot.

I'm not sure, if it's cleat that the MTD partitions are only setup by the kernel arguments. There's no partition table that needs to be changed. Just uboot at address 0, bootcmd telling from which address to load the kernel and the kernel flags tellng the MTD driver where to setup mtd block devices. The setup of mtd0 and mtd1 are only for convenience to use them in nandwrite, they are not used by the operating system.

Code:
setenv arcNumber 2097
setenv mainlineLinux yes
saveenv
reset
...
setenv bootargs 'console=ttyS0,115200 mtdparts=nand_mtd:0x100000@0x000000(u-boot),0x00500000@0x00100000(uImage),0x1fa00000@0x00600000(rootfs) root=/dev/sda1 rootdelay=10 rw'
setenv bootcmd 'usb start; ext2load usb 0:1 0x8000000 /uImage; bootm 0x8000000; reset'
boot
10  Linux Stuff / Kernel / 2.6.30-rc8 cryptsetup support on: June 17, 2009, 12:10:29 PM
Hi,

I'm currently using the default kernel which supports cryptsetup. Now I tried to boot from a USB stick using the 2.6.30-rc8 kernel. As it does not include SHA256 and device mapper support, I downloaded the config from http://sheeva.with-linux.com/sheeva/ added both and recompiled kernel and modules.

Using this compiled kernel, after entering the passphrase I get a NULL pointer exception. I'm not sure if I missed another module or if this is a bug in the kernel sources (current git version from git://git.marvell.com/orion.git).

I'm using the default cipher aes-cbc-essiv:sha256 (cryptsetup luksOpen /dev/sda s)

Did any of you ever use cryptsetup on the 2.6.30-rc8 kernel? Any hints on the exception below?

Is cryptsetup already using the hardware aes?

Code:
kernel BUG at kernel/workqueue.c:191!
Unable to handle kernel NULL pointer dereference at virtual address 00000000
pgd = de99c000
[00000000] *pgd=1f244031, *pte=00000000, *ppte=00000000
Internal error: Oops: 817 [#1] PREEMPT
Modules linked in: dm_crypt dm_mod ipv6
CPU: 0    Not tainted  (2.6.30-04051-gd51634f #4)
PC is at _etext+0xffc1dd0c/0x1db30
LR is at _etext+0xffc30f88/0x1db30
pc : [<c002ed0c>]    lr : [<c0041f88>]    psr: 40000013
sp : df38db50  ip : df38daa8  fp : df38db5c
r10: de81c000  r9 : e0bf7020  r8 : 00000000
r7 : df947e00  r6 : de81c000  r5 : de8ca560  r4 : de939000
r3 : 00000000  r2 : df38c000  r1 : df38daa8  r0 : 00000029
Flags: nZcv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment user
Control: 0005317f  Table: 1e99c000  DAC: 00000015
Process cryptsetup (pid: 1775, stack limit = 0xdf38c270)
---[ end trace 1531ce7cf72b88dd ]---
note: cryptsetup[1775] exited with preempt_count 1
BUG: scheduling while atomic: cryptsetup/1775/0x40000002
Modules linked in: dm_crypt dm_mod ipv6
[<c00309c0>] (_etext+0xffc1f9c0/0x1db30) from [<c037296c>] (_etext+0xfff6196c/0x1db30)
[<c037296c>] (_etext+0xfff6196c/0x1db30) from [<c0039be0>] (_etext+0xffc28be0/0x1db30)
[<c0039be0>] (_etext+0xffc28be0/0x1db30) from [<c03732c0>] (_etext+0xfff622c0/0x1db30)
[<c03732c0>] (_etext+0xfff622c0/0x1db30) from [<c00a14f4>] (_etext+0xffc904f4/0x1db30)
[<c00a14f4>] (_etext+0xffc904f4/0x1db30) from [<c00a2918>] (_etext+0xffc91918/0x1db30)
[<c00a2918>] (_etext+0xffc91918/0x1db30) from [<c003ed14>] (_etext+0xffc2dd14/0x1db30)
[<c003ed14>] (_etext+0xffc2dd14/0x1db30) from [<c0042c4c>] (_etext+0xffc31c4c/0x1db30)
[<c0042c4c>] (_etext+0xffc31c4c/0x1db30) from [<c004430c>] (_etext+0xffc3330c/0x1db30)
[<c004430c>] (_etext+0xffc3330c/0x1db30) from [<c002f168>] (_etext+0xffc1e168/0x1db30)
[<c002f168>] (_etext+0xffc1e168/0x1db30) from [<c0031a10>] (_etext+0xffc20a10/0x1db30)
[<c0031a10>] (_etext+0xffc20a10/0x1db30) from [<c0376ac4>] (_etext+0xfff65ac4/0x1db30)
[<c0376ac4>] (_etext+0xfff65ac4/0x1db30) from [<c002b24c>] (_etext+0xffc1a24c/0x1db30)
[<c002b24c>] (_etext+0xffc1a24c/0x1db30) from [<c0374b8c>] (_etext+0xfff63b8c/0x1db30)
Exception stack(0xdf38db08 to 0xdf38db50)
db00:                   00000029 df38daa8 df38c000 00000000 de939000 de8ca560
db20: de81c000 df947e00 00000000 e0bf7020 de81c000 df38db5c df38daa8 df38db50
db40: c0041f88 c002ed0c 40000013 ffffffff
[<c0374b8c>] (_etext+0xfff63b8c/0x1db30) from [<c0041f88>] (_etext+0xffc30f88/0x1db30)

Thanks
Michael
Pages: [1]