Re: [RFC][PATCH 2/4] AES assembler implementation for x86_64

2005-04-18 Thread Andreas Steinmetz
Denis Vlasenko wrote: > On Sunday 17 April 2005 22:20, Andreas Steinmetz wrote: > >>The attached patch contains Gladman's in-kernel code for key schedule >>and table generation modified to fit to my assembler implementation, >>-- >>Andreas Steinmetz

Re: [RFC][PATCH 2/4] AES assembler implementation for x86_64

2005-04-18 Thread Andreas Steinmetz
Denis Vlasenko wrote: On Sunday 17 April 2005 22:20, Andreas Steinmetz wrote: The attached patch contains Gladman's in-kernel code for key schedule and table generation modified to fit to my assembler implementation, -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED

Re: [RFC][PATCH 0/4] AES assembler implementation for x86_64

2005-04-18 Thread Andreas Steinmetz
James Morris wrote: Please cc Herbert Xu on kernel crypto patches, he's the frontline maintainer of it now. - James Already done on request by Herbert Xu himself. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] - To unsubscribe from this list: send the line

Re: [RFC][PATCH 0/4] AES assembler implementation for x86_64

2005-04-18 Thread Andreas Steinmetz
Andi Kleen wrote: On what CPUs did you benchmark? I suppose results will vary a lot between AMD and Intel x86-64 CPUs. AMD. I don't have any Intel around. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] - To unsubscribe from this list: send the line unsubscribe linux

Re: [RFC][PATCH 0/4] AES assembler implementation for x86_64

2005-04-18 Thread Andreas Steinmetz
there will be some changes required). -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] - To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: [RFC][PATCH 2/4] AES assembler implementation for x86_64

2005-04-18 Thread Andreas Steinmetz
Denis Vlasenko wrote: On Monday 18 April 2005 12:01, Andreas Steinmetz wrote: Denis Vlasenko wrote: On Sunday 17 April 2005 22:20, Andreas Steinmetz wrote: The attached patch contains Gladman's in-kernel code for key schedule and table generation modified to fit to my assembler

Re: [RFC][PATCH 4/4] AES assembler implementation for x86_64

2005-04-17 Thread Andreas Steinmetz
t; This doesn't make any difference. > > I think the former version was better readable, but that's no strong > opinion. This was only personal preference during development and actually you're right, the former version is better readable. -- Andreas Steinmetz

[RFC][PATCH 3/4] AES assembler implementation for x86_64

2005-04-17 Thread Andreas Steinmetz
The attached patch contains the x86_64 arch specific Makefile stuff. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] diff -rNu linux-2.6.11.2.orig/arch/x86_64/Makefile linux-2.6.11.2/arch/x86_64/Makefile --- linux-2.6.11.2.orig/arch/x86_64/Makefile2005-03-09 09:12

[RFC][PATCH 4/4] AES assembler implementation for x86_64

2005-04-17 Thread Andreas Steinmetz
The attached patch contains the required changes for the crypto Kconfig to enable the usage of the x86_64 AES assembler implementation. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] diff -rNu linux-2.6.11.2.orig/crypto/Kconfig linux-2.6.11.2/crypto/Kconfig --- linux

[RFC][PATCH 2/4] AES assembler implementation for x86_64

2005-04-17 Thread Andreas Steinmetz
The attached patch contains Gladman's in-kernel code for key schedule and table generation modified to fit to my assembler implementation, -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] diff -rNu linux-2.6.11.2.orig/arch/x86_64/crypto/aes.c linux-2.6.11.2/arch/x86_64

[RFC][PATCH 1/4] AES assembler implementation for x86_64

2005-04-17 Thread Andreas Steinmetz
The attached patch contains my AES assembler implementation for x86_64. This includes only encrypt/decrypt as Gladman's in-kernel code is used for key schedule and table generation. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] diff -rNu linux-2.6.11.2.orig/arch/x86_64

[RFC][PATCH 0/4] AES assembler implementation for x86_64

2005-04-17 Thread Andreas Steinmetz
happen that it may take a while until I can reply as I'm regularly offline due to my current daytime job requirements. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message

[RFC][PATCH 0/4] AES assembler implementation for x86_64

2005-04-17 Thread Andreas Steinmetz
happen that it may take a while until I can reply as I'm regularly offline due to my current daytime job requirements. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] - To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL

[RFC][PATCH 1/4] AES assembler implementation for x86_64

2005-04-17 Thread Andreas Steinmetz
The attached patch contains my AES assembler implementation for x86_64. This includes only encrypt/decrypt as Gladman's in-kernel code is used for key schedule and table generation. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] diff -rNu linux-2.6.11.2.orig/arch/x86_64

[RFC][PATCH 2/4] AES assembler implementation for x86_64

2005-04-17 Thread Andreas Steinmetz
The attached patch contains Gladman's in-kernel code for key schedule and table generation modified to fit to my assembler implementation, -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] diff -rNu linux-2.6.11.2.orig/arch/x86_64/crypto/aes.c linux-2.6.11.2/arch/x86_64

[RFC][PATCH 4/4] AES assembler implementation for x86_64

2005-04-17 Thread Andreas Steinmetz
The attached patch contains the required changes for the crypto Kconfig to enable the usage of the x86_64 AES assembler implementation. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] diff -rNu linux-2.6.11.2.orig/crypto/Kconfig linux-2.6.11.2/crypto/Kconfig --- linux

[RFC][PATCH 3/4] AES assembler implementation for x86_64

2005-04-17 Thread Andreas Steinmetz
The attached patch contains the x86_64 arch specific Makefile stuff. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] diff -rNu linux-2.6.11.2.orig/arch/x86_64/Makefile linux-2.6.11.2/arch/x86_64/Makefile --- linux-2.6.11.2.orig/arch/x86_64/Makefile2005-03-09 09:12

Re: [RFC][PATCH 4/4] AES assembler implementation for x86_64

2005-04-17 Thread Andreas Steinmetz
, but that's no strong opinion. This was only personal preference during development and actually you're right, the former version is better readable. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] - To unsubscribe from this list: send the line unsubscribe linux-kernel

Re: [PATCH encrypted swsusp 1/3] core functionality

2005-04-15 Thread Andreas Steinmetz
reset the suspend header via software_resume() if booted with noresume? Currently this code path does nothing. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to

Re: [PATCH encrypted swsusp 1/3] core functionality

2005-04-15 Thread Andreas Steinmetz
attack and completely ignoring the > much more common "stole my laptop" attack. > Thats because you have already have a solution for "stolen while suspended" with dm-crypt and initrd/initramfs but you don't have a solution for "rooted after resume". -- A

Re: [PATCH encrypted swsusp 1/3] core functionality

2005-04-15 Thread Andreas Steinmetz
lace reduces this problem to a single potentially problematic sector. If this risk is then still too high for you then there's always the possiblity to use a sledgehammer :-) -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] - To unsubscribe from this list: send the line

Re: [PATCH encrypted swsusp 1/3] core functionality

2005-04-15 Thread Andreas Steinmetz
this problem to a single potentially problematic sector. If this risk is then still too high for you then there's always the possiblity to use a sledgehammer :-) -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] - To unsubscribe from this list: send the line unsubscribe linux

Re: [PATCH encrypted swsusp 1/3] core functionality

2005-04-15 Thread Andreas Steinmetz
ignoring the much more common stole my laptop attack. Thats because you have already have a solution for stolen while suspended with dm-crypt and initrd/initramfs but you don't have a solution for rooted after resume. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED

Re: [PATCH encrypted swsusp 1/3] core functionality

2005-04-15 Thread Andreas Steinmetz
the suspend header via software_resume() if booted with noresume? Currently this code path does nothing. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] - To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL PROTECTED] More

Re: [PATCH encrypted swsusp 1/3] core functionality

2005-04-13 Thread Andreas Steinmetz
Herbert Xu wrote: > On Wed, Apr 13, 2005 at 02:59:28PM +0200, Andreas Steinmetz wrote: > >>Herbert Xu wrote: >> >>>What's wrong with using swap over dmcrypt + initramfs? People have >>>already used that to do encrypted swsusp. >> >>No

Re: [PATCH encrypted swsusp 1/3] core functionality

2005-04-13 Thread Andreas Steinmetz
es to config and docs, but I'll attach them again nevertheless. BTW: it was quite clear to me that this can't make 2.6.12 and that 2.6.13 might be a bit early. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] --- linux-2.6.11.2/kernel/power/Kconfig.ast 2005-04-10 20:44:48.

Re: [PATCH encrypted swsusp 1/3] core functionality

2005-04-13 Thread Andreas Steinmetz
h keys, ... This may lead to nasty surprises that can occur after weeks or months. (*) unencrypted from the point of view of the running system. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] - To unsubscribe from this list: send the line "unsubscribe linux-kernel&q

Re: 2.6.11 acpi battery state readout as source of keyboard/touchpad troubles

2005-04-13 Thread Andreas Steinmetz
Pavel Machek wrote: > CONFIG_ACPI_DEBUG enabled by chance? > Pavel # CONFIG_ACPI_DEBUG is not set -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] - To unsubscribe from this list: send the line "

Re: 2.6.11 acpi battery state readout as source of keyboard/touchpad troubles

2005-04-13 Thread Andreas Steinmetz
Pavel Machek wrote: CONFIG_ACPI_DEBUG enabled by chance? Pavel # CONFIG_ACPI_DEBUG is not set -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] - To unsubscribe from this list: send the line unsubscribe

Re: [PATCH encrypted swsusp 1/3] core functionality

2005-04-13 Thread Andreas Steinmetz
, ... This may lead to nasty surprises that can occur after weeks or months. (*) unencrypted from the point of view of the running system. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] - To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message

Re: [PATCH encrypted swsusp 1/3] core functionality

2005-04-13 Thread Andreas Steinmetz
, but I'll attach them again nevertheless. BTW: it was quite clear to me that this can't make 2.6.12 and that 2.6.13 might be a bit early. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] --- linux-2.6.11.2/kernel/power/Kconfig.ast 2005-04-10 20:44:48.0 +0200

Re: [PATCH encrypted swsusp 1/3] core functionality

2005-04-13 Thread Andreas Steinmetz
Herbert Xu wrote: On Wed, Apr 13, 2005 at 02:59:28PM +0200, Andreas Steinmetz wrote: Herbert Xu wrote: What's wrong with using swap over dmcrypt + initramfs? People have already used that to do encrypted swsusp. Nothing. The problem is the fact that after resume there is then unencrypted

2.6.12rc2: Oops with pcmcia ide flash disk

2005-04-12 Thread Andreas Steinmetz
2.6.12rc2 oopses during eject of a pcmcia ide flash disk on x86_64. 2.6.11.2 works fine. Attached is the kernel config and the oops itself. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] Apr 12 14:22:45 gringo kernel: cs: memory probe 0x0c-0x0f: excluding

Re: [PATCH encrypted swsusp 1/3] core functionality

2005-04-12 Thread Andreas Steinmetz
Here comes the next incarnation, this time against 2.6.12rc2. Unfortunately only compile tested as 2.6.12rc2 happily oopses away (vanilla from kernel.org, oops already sent to lkml). Please let me know if you want any further changes. -- Andreas Steinmetz SPAMmers use

Re: [PATCH encrypted swsusp 1/3] core functionality

2005-04-12 Thread Andreas Steinmetz
Rafael J. Wysocki wrote: > Hi, > > On Monday, 11 of April 2005 18:11, Andreas Steinmetz wrote: > >>Pavel Machek wrote: >> >>>Was it really neccessary to include "union u"? I don't like its name, >> >>Here comes the patch with this r

Re: [PATCH] zero disk pages used by swsusp on resume

2005-04-12 Thread Andreas Steinmetz
Rafael J. Wysocki wrote: > Hi, > > On Monday, 11 of April 2005 19:02, Andreas Steinmetz wrote: > >>Rafael J. Wysocki wrote: >> >>>Hi, >>> >>>On Monday, 11 of April 2005 12:37, Oliver Neukum wrote: >>> >>> >>

Re: [PATCH encrypted swsusp 1/3] core functionality

2005-04-12 Thread Andreas Steinmetz
. This way, the essential >>>part of the code would be easier to grasp (Pavel?). >> >>Agreed. Actually I do not care where messages are printed, but >>returning different code for different errors seems right. > > > Hm. You probably don't want

Re: [PATCH encrypted swsusp 1/3] core functionality

2005-04-12 Thread Andreas Steinmetz
errors seems right. Hm. You probably don't want suspend-related messages to be printed during resume (this function is called in two different places)? :-) Rafael Will be changed. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] - To unsubscribe from

Re: [PATCH] zero disk pages used by swsusp on resume

2005-04-12 Thread Andreas Steinmetz
Rafael J. Wysocki wrote: Hi, On Monday, 11 of April 2005 19:02, Andreas Steinmetz wrote: Rafael J. Wysocki wrote: Hi, On Monday, 11 of April 2005 12:37, Oliver Neukum wrote: Am Sonntag, 10. April 2005 22:14 schrieb Pavel Machek: Hi! Oliver Neukum wrote: What is the point in doing

Re: [PATCH encrypted swsusp 1/3] core functionality

2005-04-12 Thread Andreas Steinmetz
Rafael J. Wysocki wrote: Hi, On Monday, 11 of April 2005 18:11, Andreas Steinmetz wrote: Pavel Machek wrote: Was it really neccessary to include union u? I don't like its name, Here comes the patch with this reverted. I'm now using casts when 'abusing' the space for encryption. Furthermore

Re: [PATCH encrypted swsusp 1/3] core functionality

2005-04-12 Thread Andreas Steinmetz
Here comes the next incarnation, this time against 2.6.12rc2. Unfortunately only compile tested as 2.6.12rc2 happily oopses away (vanilla from kernel.org, oops already sent to lkml). Please let me know if you want any further changes. -- Andreas Steinmetz SPAMmers use

2.6.12rc2: Oops with pcmcia ide flash disk

2005-04-12 Thread Andreas Steinmetz
2.6.12rc2 oopses during eject of a pcmcia ide flash disk on x86_64. 2.6.11.2 works fine. Attached is the kernel config and the oops itself. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] Apr 12 14:22:45 gringo kernel: cs: memory probe 0x0c-0x0f: excluding

Re: [PATCH] zero disk pages used by swsusp on resume

2005-04-11 Thread Andreas Steinmetz
es from mm to mainline one can additionally protect the swap partition used for suspend with dm-crypt and collect the key at resume time via initrd. In this case the disk is then not only protected against the average thief but also against the professinal one as long as the flash disk is secure. And

Re: [PATCH encrypted swsusp 1/3] core functionality

2005-04-11 Thread Andreas Steinmetz
encrypted suspend image guards against data gathering after resume/reboot (the latter when mkswap is used). -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EM

Re: [PATCH encrypted swsusp 1/3] core functionality

2005-04-11 Thread Andreas Steinmetz
Pavel Machek wrote: > Was it really neccessary to include "union u"? I don't like its name, Here comes the patch with this reverted. I'm now using casts when 'abusing' the space for encryption. Furthermore the iv set up in the tfm is used instead of the local copy. -- Andr

Re: Oops in swsusp

2005-04-11 Thread Andreas Steinmetz
Rafael J. Wysocki wrote: > Hi, > > On Monday, 11 of April 2005 01:17, Andreas Steinmetz wrote: > >>Pavel, >>during testing of the encrypted swsusp_image on x86_64 I did get an Oops >>from time to time at memcpy+11 called from swsusp_save+1090 which turns >>out

Re: [PATCH encrypted swsusp 3/3] documentation

2005-04-11 Thread Andreas Steinmetz
Bodo Eggert wrote: > Andreas Steinmetz <[EMAIL PROTECTED]> wrote: > > >>+If you want to store your suspend image encrypted with a temporary >>+key to prevent data gathering after resume you must compile >>+crypto and the aes algorithm into the kernel - mod

Re: [PATCH encrypted swsusp 1/3] core functionality

2005-04-11 Thread Andreas Steinmetz
L; > + } > + > + if(sizeof(key) < crypto_tfm_alg_min_keysize(tfm)) { > > same here. > > Was it really neccessary to include "union u"? I don't like its name, > and perhaps few casts are better than this. If not, it probably should > go in separate pa

Re: Oops in swsusp

2005-04-11 Thread Andreas Steinmetz
Rafael J. Wysocki wrote: > Hi, > > On Monday, 11 of April 2005 01:17, Andreas Steinmetz wrote: > >>Pavel, >>during testing of the encrypted swsusp_image on x86_64 I did get an Oops >>from time to time at memcpy+11 called from swsusp_save+1090 which turns >>out

Re: [PATCH encrypted swsusp 1/3] core functionality

2005-04-11 Thread Andreas Steinmetz
ot; but this can only used to look for the existence of specially crafted files which are not stored on disk during software suspend. I should, however, use crypto_cipher_en/decrypt instead of crypto_cipher_en/decrypt_iv as I actually wanted to use the iv in the tfm I did set up with crypto_cipher_se

Re: [PATCH encrypted swsusp 1/3] core functionality

2005-04-11 Thread Andreas Steinmetz
on disk during software suspend. I should, however, use crypto_cipher_en/decrypt instead of crypto_cipher_en/decrypt_iv as I actually wanted to use the iv in the tfm I did set up with crypto_cipher_set_iv instead of the local copy. Going to fix that. -- Andreas Steinmetz

Re: Oops in swsusp

2005-04-11 Thread Andreas Steinmetz
Rafael J. Wysocki wrote: Hi, On Monday, 11 of April 2005 01:17, Andreas Steinmetz wrote: Pavel, during testing of the encrypted swsusp_image on x86_64 I did get an Oops from time to time at memcpy+11 called from swsusp_save+1090 which turns out to be the memcpy in copy_data_pages

Re: [PATCH encrypted swsusp 1/3] core functionality

2005-04-11 Thread Andreas Steinmetz
neccessary to include union u? I don't like its name, and perhaps few casts are better than this. If not, it probably should go in separate patch, and ASAP. I'll revert this and use few casts. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] - To unsubscribe from this list

Re: [PATCH encrypted swsusp 3/3] documentation

2005-04-11 Thread Andreas Steinmetz
Bodo Eggert wrote: Andreas Steinmetz [EMAIL PROTECTED] wrote: +If you want to store your suspend image encrypted with a temporary +key to prevent data gathering after resume you must compile +crypto and the aes algorithm into the kernel - modules won't work +as they cannot be loaded at resume

Re: Oops in swsusp

2005-04-11 Thread Andreas Steinmetz
Rafael J. Wysocki wrote: Hi, On Monday, 11 of April 2005 01:17, Andreas Steinmetz wrote: Pavel, during testing of the encrypted swsusp_image on x86_64 I did get an Oops from time to time at memcpy+11 called from swsusp_save+1090 which turns out to be the memcpy in copy_data_pages

Re: [PATCH encrypted swsusp 1/3] core functionality

2005-04-11 Thread Andreas Steinmetz
Pavel Machek wrote: Was it really neccessary to include union u? I don't like its name, Here comes the patch with this reverted. I'm now using casts when 'abusing' the space for encryption. Furthermore the iv set up in the tfm is used instead of the local copy. -- Andreas Steinmetz

Re: [PATCH encrypted swsusp 1/3] core functionality

2005-04-11 Thread Andreas Steinmetz
suspend image guards against data gathering after resume/reboot (the latter when mkswap is used). -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] - To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL PROTECTED] More majordomo

Re: [PATCH] zero disk pages used by swsusp on resume

2005-04-11 Thread Andreas Steinmetz
there in the first place (oh well, but one needs to suspend from time to time). -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] - To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL PROTECTED] More majordomo info at http

[PATCH encrypted swsusp 1/3] core functionality

2005-04-10 Thread Andreas Steinmetz
The following patch adds the core functionality for the encrypted suspend image. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] --- linux-2.6.11.2/kernel/power/swsusp.c.ast2005-04-10 14:08:55.0 +0200 +++ linux-2.6.11.2/kernel/power/swsusp.c2005-04

[PATCH encrypted swsusp 3/3] documentation

2005-04-10 Thread Andreas Steinmetz
The following patch adds some information for encrypted suspend to the swsusp documentation. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] --- linux-2.6.11.2/Documentation/power/swsusp.txt.ast 2005-04-10 21:07:01.0 +0200 +++ linux-2.6.11.2/Documentation

[PATCH encrypted swsusp 2/3] configuration

2005-04-10 Thread Andreas Steinmetz
The following patch includes the necessary kernel configuration option. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] --- linux-2.6.11.2/kernel/power/Kconfig.ast 2005-04-10 20:44:48.0 +0200 +++ linux-2.6.11.2/kernel/power/Kconfig 2005-04-10 21:01

Oops in swsusp

2005-04-10 Thread Andreas Steinmetz
). This Oops seems to be unrelated to the encrypted image addition as I didn't touch any code in that area. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL

[PATCH encrypted swsusp 0/3] encrypted swsusp image

2005-04-10 Thread Andreas Steinmetz
) and probably needs testing on other platforms. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.

Re: [PATCH] zero disk pages used by swsusp on resume

2005-04-10 Thread Andreas Steinmetz
of the swap partition in this case is useful during resume so this fits nicely together. BTW: I spent my day on implementing the encryption of the suspend image and will send patches after a few more tests. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] - To unsubscribe from this lis

Re: [PATCH] zero disk pages used by swsusp on resume

2005-04-10 Thread Andreas Steinmetz
Oliver Neukum wrote: > What is the point in doing so after they've rested on the disk for ages? The point is not physical access to the disk but data gathering after resume or reboot. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] - To unsubscribe from this list: s

Re: [PATCH] zero disk pages used by swsusp on resume

2005-04-10 Thread Andreas Steinmetz
nt from mobile phone. Sorry for poor formatting. The only remark I do have here is that swsusp would then depend on crypto so the swsusp encryption should be a config option. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] - To unsubscribe from this list: send the li

[PATCH] zero disk pages used by swsusp on resume

2005-04-10 Thread Andreas Steinmetz
. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] --- linux-2.6.11.2/kernel/power/swsusp.c.ast2005-04-10 14:08:55.0 +0200 +++ linux-2.6.11.2/kernel/power/swsusp.c2005-04-10 14:24:10.0 +0200 @@ -112,6 +112,10 @@ static struct swsusp_info swsusp_info

[PATCH] zero disk pages used by swsusp on resume

2005-04-10 Thread Andreas Steinmetz
. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] --- linux-2.6.11.2/kernel/power/swsusp.c.ast2005-04-10 14:08:55.0 +0200 +++ linux-2.6.11.2/kernel/power/swsusp.c2005-04-10 14:24:10.0 +0200 @@ -112,6 +112,10 @@ static struct swsusp_info swsusp_info

Re: [PATCH] zero disk pages used by swsusp on resume

2005-04-10 Thread Andreas Steinmetz
for poor formatting. The only remark I do have here is that swsusp would then depend on crypto so the swsusp encryption should be a config option. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] - To unsubscribe from this list: send the line unsubscribe linux-kernel

Re: [PATCH] zero disk pages used by swsusp on resume

2005-04-10 Thread Andreas Steinmetz
Oliver Neukum wrote: What is the point in doing so after they've rested on the disk for ages? The point is not physical access to the disk but data gathering after resume or reboot. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] - To unsubscribe from this list: send

Re: [PATCH] zero disk pages used by swsusp on resume

2005-04-10 Thread Andreas Steinmetz
image and will send patches after a few more tests. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] - To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo

[PATCH encrypted swsusp 0/3] encrypted swsusp image

2005-04-10 Thread Andreas Steinmetz
) and probably needs testing on other platforms. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] - To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo

Oops in swsusp

2005-04-10 Thread Andreas Steinmetz
). This Oops seems to be unrelated to the encrypted image addition as I didn't touch any code in that area. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] - To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL PROTECTED] More

[PATCH encrypted swsusp 2/3] configuration

2005-04-10 Thread Andreas Steinmetz
The following patch includes the necessary kernel configuration option. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] --- linux-2.6.11.2/kernel/power/Kconfig.ast 2005-04-10 20:44:48.0 +0200 +++ linux-2.6.11.2/kernel/power/Kconfig 2005-04-10 21:01

[PATCH encrypted swsusp 3/3] documentation

2005-04-10 Thread Andreas Steinmetz
The following patch adds some information for encrypted suspend to the swsusp documentation. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] --- linux-2.6.11.2/Documentation/power/swsusp.txt.ast 2005-04-10 21:07:01.0 +0200 +++ linux-2.6.11.2/Documentation

[PATCH encrypted swsusp 1/3] core functionality

2005-04-10 Thread Andreas Steinmetz
The following patch adds the core functionality for the encrypted suspend image. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] --- linux-2.6.11.2/kernel/power/swsusp.c.ast2005-04-10 14:08:55.0 +0200 +++ linux-2.6.11.2/kernel/power/swsusp.c2005-04

2.6.11 acpi battery state readout as source of keyboard/touchpad troubles

2005-03-30 Thread Andreas Steinmetz
by the state readout are definitely nasty. Any ideas? -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.

2.6.11 acpi battery state readout as source of keyboard/touchpad troubles

2005-03-30 Thread Andreas Steinmetz
by the state readout are definitely nasty. Any ideas? -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] - To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org

Re: Problems with SCSI tape rewind / verify on 2.4.29

2005-03-02 Thread Andreas Steinmetz
Andrew Morton wrote: (what's a BSF?) Backward space count files (man mt). -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo inf

Re: Problems with SCSI tape rewind / verify on 2.4.29

2005-03-02 Thread Andreas Steinmetz
Andrew Morton wrote: (what's a BSF?) Backward space count files (man mt). -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] - To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL PROTECTED] More majordomo info at http

Re: Odd data corruption problem with LVM/ReiserFS

2005-02-22 Thread Andreas Steinmetz
for good. The major question for me is now usability of md/dm for any purpose with 2.6.x. For me this is a showstopper for any kind of 2.6 production use. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] - To unsubscribe from this list: send the line "unsubscribe linux-k

Re: Odd data corruption problem with LVM/ReiserFS

2005-02-22 Thread Andreas Steinmetz
for good. The major question for me is now usability of md/dm for any purpose with 2.6.x. For me this is a showstopper for any kind of 2.6 production use. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] - To unsubscribe from this list: send the line unsubscribe linux-kernel

Re: Odd data corruption problem with LVM/ReiserFS

2005-02-21 Thread Andreas Steinmetz
. This caused actual damage all over the place and I had to restore from the last checkpoint I made. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTE

Re: Odd data corruption problem with LVM/ReiserFS

2005-02-21 Thread Andreas Steinmetz
disk (that saved me from terrible trouble). Currently I can only warn to not use reiserfs with dm/md on 2.6. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL

Re: Odd data corruption problem with LVM/ReiserFS

2005-02-21 Thread Andreas Steinmetz
disk (that saved me from terrible trouble). Currently I can only warn to not use reiserfs with dm/md on 2.6. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] - To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL PROTECTED

Re: Odd data corruption problem with LVM/ReiserFS

2005-02-21 Thread Andreas Steinmetz
. This caused actual damage all over the place and I had to restore from the last checkpoint I made. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] - To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL PROTECTED] More

<    1   2