Harald Koenig changed bug 1175908
What Removed Added
Flags needinfo?(koenig@linux.de)  

Comment # 9 on bug 1175908 from
(In reply to Harald Koenig from comment #8)
> > Can you try to attach your encrypted root device with cryptsetup(8) directly
> > for the failing case (assuming that the emergency shell is started) ?
> 
> there is only systemd-cryptsetup in the initrd.
> will reboot and reply later...

$ strace -fo O -s999 /usr/lib/systemd/systemd-cryptsetup attach cr /dev/sda5
Please enter passphrase for disk Samsung_SSD_850_EVO_2TB (cr):
Set cipher aes, mode cbc-essiv:sha256, key size 256 bits for device /dev/sda5.
[  377.736756] device-mapper: table: 254:0: crypt: Error allocating crypto tfm
device-mapper: reload ioctl on cr (254:0) failed: No such file or directory
Failed to activate with specified passphrase: Invalid argument


dmesg output:
[    7.611008] Console: switching to colour frame buffer device 240x67
[    7.634358] i915 0000:00:02.0: fb0: i915drmfb frame buffer device
[   16.169035] device-mapper: table: 254:0: crypt: Error allocating crypto tfm
[   16.169054] device-mapper: ioctl: error adding target to table
[  245.056425] EXT4-fs (sda3): mounted filesystem with ordered data mode. Opts:
(null)
[  377.736756] device-mapper: table: 254:0: crypt: Error allocating crypto tfm
[  377.736780] device-mapper: ioctl: error adding target to table


strace shows that /etc/crypttab is not accessed/opened at all

strace output:
2774  openat(AT_FDCWD, "/etc/fstab", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such
file or directory)
2774  ioctl(0, TCGETS, {B38400 opost isig icanon echo ...}) = 0
2774  ioctl(0, TCGETS, {B38400 opost isig icanon echo ...}) = 0
2774  inotify_init1(IN_NONBLOCK|IN_CLOEXEC) = 7
2774  request_key("user", "cryptsetup", NULL, 0) = -1 ENOKEY (Required key not
available)
2774  inotify_add_watch(7, "/run/systemd/ask-password", IN_ATTRIB) = 1
2774  openat(AT_FDCWD, "/dev/tty", O_RDWR|O_NOCTTY|O_CLOEXEC) = 8
2774  ioctl(8, TCGETS, {B38400 opost isig icanon echo ...}) = 0
2774  ioctl(1, TCGETS, {B38400 opost isig icanon echo ...}) = 0
2774  ioctl(2, TCGETS, {B38400 opost isig icanon echo ...}) = 0
2774  write(8, "\33[0;1;39m", 9)        = 9
2774  write(8, "Please enter passphrase for disk Samsung_SSD_850_EVO_2TB
(cr):", 62) = 62
2774  write(8, " ", 1)                  = 1
2774  write(8, "\33[0;38;5;245m", 13)   = 13
2774  write(8, "(press TAB for no echo) ", 24) = 24
2774  write(8, "\33[0m", 4)             = 4
...
2774  read(8, "\n", 1)                  = 1
2774  request_key("user", "cryptsetup", NULL, 0) = -1 ENOKEY (Required key not
available)
2774  add_key("user", "cryptsetup", "Dim2vP4r", 8, KEY_SPEC_USER_KEYRING) =
581660211
2774  keyctl(KEYCTL_SET_TIMEOUT, 581660211, 150) = 0
2774  openat(AT_FDCWD, "/run/systemd/ask-password",
O_RDONLY|O_NOFOLLOW|O_CLOEXEC|O_PATH) = 9
2774  fstat(9, {st_mode=S_IFDIR|0755, st_size=40, ...}) = 0
2774  utimensat(AT_FDCWD, "/proc/self/fd/9", NULL, 0) = 0
2774  close(9)                          = 0
2774  write(8, "\n", 1)                 = 1
2774  ioctl(8, SNDCTL_TMR_STOP or TCSETSW, {B38400 opost isig icanon echo ...})
= 0
2774  close(7)                          = 0
2774  close(8)                          = 0
2774  writev(2, [{iov_base="Set cipher aes, mode cbc-essiv:sha256, key size 256
bits for device /dev/sda5.", iov_len=78}, {iov_base="\n", iov_len=1}], 2) = 79
2774  ioctl(3, DM_LIST_VERSIONS, {version=4.1.0, data_size=16384,
data_start=312, flags=DM_EXISTS_FLAG} => {version=4.42.0, data_size=488,
data_start=312, flags=DM_EXISTS_FLAG, ...}) = 0
2774  ioctl(3, DM_TABLE_STATUS, {version=4.0.0, data_size=16384,
data_start=312, name="cr", flags=DM_EXISTS_FLAG|DM_NOFLUSH_FLAG} =>
{version=4.42.0, data_size=16384, data_start=312, name="cr",
flags=DM_EXISTS_FLAG|DM_NOFLUSH_FLAG}) = -1 ENXIO (No such device or address)
2774  futex(0x7f622a3e1e00, FUTEX_WAKE_PRIVATE, 2147483647) = 0
2774  lseek(6, 4096, SEEK_SET)          = 4096
2774  read(6, "H'\367a=\21"..., 128000) = 128000
2774  ioctl(3, DM_LIST_VERSIONS, {version=4.1.0, data_size=16384,
data_start=312, flags=DM_EXISTS_FLAG} => {version=4.42.0, data_size=488,
data_start=312, flags=DM_EXISTS_FLAG, ...}) = 0
2774  ioctl(3, DM_TABLE_STATUS, {version=4.0.0, data_size=16384,
data_start=312, name="cr", flags=DM_EXISTS_FLAG|DM_NOFLUSH_FLAG} =>
{version=4.42.0, data_size=16384, data_start=312, name="cr",
flags=DM_EXISTS_FLAG|DM_NOFLUSH_FLAG}) = -1 ENXIO (No such device or address)
2774  stat("/dev/sda5", {st_mode=S_IFBLK|0660, st_rdev=makedev(0x8, 0x5), ...})
= 0
2774  openat(AT_FDCWD, "/dev/sda5", O_RDWR|O_EXCL) = 7
2774  ioctl(7, BLKROGET, [0])           = 0
2774  ioctl(7, BLKGETSIZE64, [536870912000]) = 0
2774  close(7)                          = 0
2774  openat(AT_FDCWD, "/dev/sda5", O_RDONLY) = 7
2774  ioctl(7, BLKRAGET, [1024])        = 0
2774  close(7)                          = 0
2774  openat(AT_FDCWD, "/dev/urandom", O_RDONLY) = 7
2774  read(7, "\356\344", 2)            = 2
2774  semget(0xd4de4ee, 1, IPC_CREAT|IPC_EXCL|0600) = 1
2774  semctl(1, 0, SETVAL, 0x1)         = 0
2774  semctl(1, 0, GETVAL, NULL)        = 1
2774  close(7)                          = 0
2774  semtimedop(1, [{0, 1, 0}], 1, NULL) = 0
2774  semctl(1, 0, GETVAL, NULL)        = 2
2774  ioctl(3, DM_DEV_CREATE, {version=4.0.0, data_size=16384, name="cr",
uuid="CRYPT-LUKS1-00000000000000000000000000000000-cr", flags=DM_EXISTS_FLAG}
=> {version=4.42.0, data_size=305, dev=makedev(0xfe, 0), name="cr",
uuid="CRYPT-LUKS1-00000000000000000000000000000000-cr", target_count=0,
open_count=0, event_nr=0, flags=DM_EXISTS_FLAG}) = 0
2774  ioctl(3, DM_TABLE_LOAD, {version=4.0.0, data_size=16384, data_start=312,
dev=makedev(0xfe, 0), target_count=1,
flags=DM_EXISTS_FLAG|DM_PERSISTENT_DEV_FLAG|DM_SECURE_DATA_FLAG, ...},
0x557a323af760) = -1 ENOENT (No such file or directory)
2774  writev(2, [{iov_base="device-mapper: reload ioctl on cr (254:0) failed:
No such file or directory", iov_len=75}, {iov_base="\n", iov_len=1}], 2) = 76
2774  semget(0xd4de4ee, 1, 000)         = 1
2774  semctl(1, 0, GETVAL, NULL)        = 2
2774  semtimedop(1, [{0, -1, IPC_NOWAIT}], 1, NULL) = 0
2774  semget(0xd4de4ee, 1, 000)         = 1
2774  semtimedop(1, [{0, 1, 0}], 1, NULL) = 0
2774  semctl(1, 0, GETVAL, NULL)        = 2
2774  ioctl(3, DM_DEV_REMOVE, {version=4.0.0, data_size=16384, name="cr",
event_nr=6350062, flags=DM_EXISTS_FLAG|DM_SECURE_DATA_FLAG} => {version=4.42.0,
data_size=305, name="cr",
uuid="CRYPT-LUKS1-00000000000000000000000000000000-cr",
flags=DM_EXISTS_FLAG|DM_UEVENT_GENERATED_FLAG}) = 0
2774  semget(0xd4de4ee, 1, 000)         = 1
2774  semctl(1, 0, GETVAL, NULL)        = 2
2774  semtimedop(1, [{0, -1, IPC_NOWAIT}], 1, NULL) = 0
2774  semtimedop(1, [{0, 0, 0}], 1, NULL) = 0
2774  semctl(1, 0, IPC_RMID, NULL)      = 0
2774  writev(2, [{iov_base="Failed to activate with specified passphrase:
Invalid argument", iov_len=62}, {iov_base="\n", iov_len=1}], 2) = 63
2774  close(3)                          = 0
2774  close(6)                          = 0
2774  close(5)                          = 0
2774  close(4)                          = 0
2774  exit_group(1)                     = ?


You are receiving this mail because: