These modules allow the kernel to manage virtual block devices and handle encryption/decryption with LUKS (Linux Unified Key Setup):
- dm_mod Core device-mapper module required for LUKS to function. Provides the framework for mapping one block device onto another.
- dm_crypt Handles the actual transparent encryption/decryption of data as it is read from or written to a block device.
Checking available/loaded cryptography modules:
$ lsmod | grep -E 'dm_crypt|dm_mod|aes|cbc|xts'
Typical entries:
- dm_mod
- dm_crypt
- cbc
- xts
- aes_x86_64
Loading dm_mod or dm_crypt
$ sudo modprobe dm_mod
or:
$ sudo modprobe dm_crypt
LUKS commonly uses AES with modes like XTS or CBC. Check which mode your volume uses:
$ sudo cryptsetup luksDump /dev/sdX
Then load the appropriate cipher:
$ sudo modprobe aes
$ sudo modprobe aes_x86_64 # Hardware-accelerated AES, if available
$ sudo modprobe xts
$ sudo modprobe cbc
Then, again, check available/loaded cryptography modules:
$ lsmod | grep -E 'dm_crypt|dm_mod|aes|cbc|xts'
Now you should be able to use LUKS.