[FS#3479] padlock-aes and padlock-sha 2 modules could not be probed

OpenWrt Bugs openwrt-bugs at lists.openwrt.org
Fri Nov 27 13:12:28 EST 2020


THIS IS AN AUTOMATED MESSAGE, DO NOT REPLY.

The following task has a new comment added:

FS#3479 - padlock-aes and padlock-sha 2 modules could not be probed
User who did this - UAb5eSMn (UAb5eSMn)

----------
If you try to load the modules on a CPU without padlock support (made by AMD or Intel), that message is expected. It's harmless.

On my VIA Nano CPU, the modules load just fine:

root at OpenWrt:~# uname -a
Linux OpenWrt 5.4.80 #0 SMP Fri Nov 27 09:59:14 2020 x86_64 GNU/Linux

root at OpenWrt:~# cat /proc/cpuinfo 
processor       : 0
vendor_id       : CentaurHauls
cpu family      : 6
model           : 15
model name      : VIA Nano processor L2200 at 1600MHz
stepping        : 2
cpu MHz         : 800.000
cache size      : 1024 KB
physical id     : 0
siblings        : 1
core id         : 0
cpu cores       : 1
apicid          : 0
initial apicid  : 0
fpu             : yes
fpu_exception   : yes
cpuid level     : 10
wp              : yes
flags           : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat clflush acpi mmx fxsr sse sse2 ss tm pbe syscall nx fxsr_opt rdtscp lm constant_tsc arch_perfmon rep_good nopl cpuid pni monitor est tm2 ssse3 cx16 xtpr rng rng_en ace ace_en ace2 phe phe_en lahf_lm pti
bugs            : cpu_meltdown spectre_v1 spectre_v2 spec_store_bypass l1tf mds swapgs itlb_multihit
bogomips        : 3199.35
clflush size    : 64
cache_alignment : 128
address sizes   : 36 bits physical, 48 bits virtual
power management:

root at OpenWrt:~# opkg install kmod-crypto-hw-padlock
Installing kmod-crypto-hw-padlock (5.4.80-1) to root...
Downloading https://downloads.openwrt.org/snapshots/targets/x86/64/kmods/5.4.80-1-903dfbc2845461e00bbefdb612660239/kmod-crypto-hw-padlock_5.4.80-1_x86_64.ipk
Installing kmod-crypto-hash (5.4.80-1) to root...
Downloading https://downloads.openwrt.org/snapshots/targets/x86/64/kmods/5.4.80-1-903dfbc2845461e00bbefdb612660239/kmod-crypto-hash_5.4.80-1_x86_64.ipk
Installing kmod-crypto-null (5.4.80-1) to root...
Downloading https://downloads.openwrt.org/snapshots/targets/x86/64/kmods/5.4.80-1-903dfbc2845461e00bbefdb612660239/kmod-crypto-null_5.4.80-1_x86_64.ipk
Installing kmod-crypto-aead (5.4.80-1) to root...
Downloading https://downloads.openwrt.org/snapshots/targets/x86/64/kmods/5.4.80-1-903dfbc2845461e00bbefdb612660239/kmod-crypto-aead_5.4.80-1_x86_64.ipk
Installing kmod-crypto-pcompress (5.4.80-1) to root...
Downloading https://downloads.openwrt.org/snapshots/targets/x86/64/kmods/5.4.80-1-903dfbc2845461e00bbefdb612660239/kmod-crypto-pcompress_5.4.80-1_x86_64.ipk
Installing kmod-crypto-manager (5.4.80-1) to root...
Downloading https://downloads.openwrt.org/snapshots/targets/x86/64/kmods/5.4.80-1-903dfbc2845461e00bbefdb612660239/kmod-crypto-manager_5.4.80-1_x86_64.ipk
Configuring kmod-crypto-hash.
Configuring kmod-crypto-null.
Configuring kmod-crypto-aead.
Configuring kmod-crypto-pcompress.
Configuring kmod-crypto-manager.
Configuring kmod-crypto-hw-padlock.

root at OpenWrt:~# dmesg
....
[  388.379314] kmodloader: loading kernel modules from /etc/modules.d/*
[  388.387299] padlock_aes: Using VIA PadLock ACE for AES algorithm.
[  388.393443] padlock_aes: VIA Nano stepping 2 detected: enabling workaround.
[  388.401264] padlock_sha: Using VIA PadLock ACE for SHA1/SHA256 algorithms.
[  388.409372] kmodloader: done loading kernel modules from /etc/modules.d/*
[  388.439357] kmodloader: loading kernel modules from /etc/modules.d/*
[  388.447131] kmodloader: done loading kernel modules from /etc/modules.d/*
[  388.474329] kmodloader: loading kernel modules from /etc/modules.d/*
[  388.482175] kmodloader: done loading kernel modules from /etc/modules.d/*
[  388.525735] kmodloader: loading kernel modules from /etc/modules.d/*
[  388.533609] kmodloader: done loading kernel modules from /etc/modules.d/*
[  388.564017] kmodloader: loading kernel modules from /etc/modules.d/*
[  388.571833] kmodloader: done loading kernel modules from /etc/modules.d/*

root at OpenWrt:~# lsmod | grep -e padlock
padlock_aes            16384  0 
padlock_sha            16384  0 


----------

More information can be found at the following URL:
https://bugs.openwrt.org/index.php?do=details&task_id=3479#comment9050

You are receiving this message because you have requested it from the Flyspray bugtracking system.  If you did not expect this message or don't want to receive mails in future, you can change your notification settings at the URL shown above.



More information about the openwrt-bugs mailing list