Rebuilding the kernel with CRYPTO_AES_NI_INTEL=y (and for that matter 
CRYPTO_PCRYPT=y) produces the expected result (ie, hw-encryption) - even in 
the...

FS (say, ext4) stacked on LV stacked on VG stacked on PV stacked on dm-crypt 
blockdev stacked on partition

... case (which, now that I have a "working" setup, I've since switched back to 
using).


So perhaps the right thing to do is to provide a _very_ early hook to modprobe 
arch-specific crypto modules (at least, until the crypto folk implement some 
kind of runtime patching) ?


I see that...

/usr/share/initramfs-tools/scripts/local-top/cryptroot

... already contains...

activate_evms(): for module in ... ; do modprobe -q $module; done

... as well as later on...

setup_mapping(): modprobe -q dm_crypt

... so we're already dealing with the readily identifiable/ predictable 
topologies, and their dependancies.


Perhaps we could grow a configurable* (in /etc/default or 
/etc/initramfs-tools/conf.d/ or elsewhere) which would let us shoot ourselves 
in the foot with happy abandon?


Please let me know if such a beast already exists - it's completely possible 
I'm just too dense to see where.


* nb: I just don't see much point in adding auto-detect logic for these cases 
myself (it'll just add to the maintenance burden and create failure modes where 
we need it least - this is the rootfs and swap we're talking about here).



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to