[Bug 1149066] New: cannot open encrypted volume with genereted service
http://bugzilla.suse.com/show_bug.cgi?id=1149066 Bug ID: 1149066 Summary: cannot open encrypted volume with genereted service Classification: openSUSE Product: openSUSE Tumbleweed Version: Current Hardware: Other OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Basesystem Assignee: bnc-team-screening@forge.provo.novell.com Reporter: msuchanek@suse.com QA Contact: qa-bugs@suse.de Found By: --- Blocker: --- # cryptsetup status usb /dev/mapper/usb is inactive. # cryptsetup open --key-file /etc/usbkey /dev/disk/by-uuid/98b904aa-5b37-476e-a690-5c73cc93a5b7 usb # cryptsetup status usb /dev/mapper/usb is active. type: LUKS1 cipher: aes-xts-plain64 keysize: 512 bits key location: dm-crypt device: /dev/sda sector size: 512 offset: 4096 sectors size: 30027776 sectors mode: read/write # cryptsetup close usb # systemctl daemon-reload # systemctl start systemd-cryptsetup@cr_usb.service Please enter passphrase for disk Cruzer_Fit (cr_usb): ^C # cat /etc/crypttab cr_mmcblk0p3 UUID=c0587206-aaa9-4e93-98be-d7ee30d6b12c cr_usb UUID=98b904aa-5b37-476e-a690-5c73cc93a5b7 /etc/usbkey nofail Each line is in the form name encrypted-device password options The third field specifies the encryption password. If the field is not present or the password is set to "none" or "-", the password has to be manually entered during system boot. Otherwise, the field is interpreted as an absolute path to a file containing the encryption password. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1149066
Michal Suchanek
http://bugzilla.suse.com/show_bug.cgi?id=1149066
http://bugzilla.suse.com/show_bug.cgi?id=1149066#c1
--- Comment #1 from Michal Suchanek
cat /var/run/systemd/generator/systemd-cryptsetup@cr_usb.service # Automatically generated by systemd-cryptsetup-generator
[Unit] Description=Cryptography Setup for %I Documentation=man:crypttab(5) man:systemd-cryptsetup-generator(8) man:systemd-cryptsetup@.service(8) SourcePath=/etc/crypttab DefaultDependencies=no Conflicts=umount.target IgnoreOnIsolate=true After=cryptsetup-pre.target RequiresMountsFor=/etc/usbkey BindsTo=dev-disk-by\x2duuid-98b904aa\x2d5b37\x2d476e\x2da690\x2d5c73cc93a5b7.device After=dev-disk-by\x2duuid-98b904aa\x2d5b37\x2d476e\x2da690\x2d5c73cc93a5b7.device Before=umount.target [Service] Type=oneshot RemainAfterExit=yes TimeoutSec=0 KeyringMode=shared OOMScoreAdjust=500 ExecStart=/usr/lib/systemd/systemd-cryptsetup attach 'cr_usb' '/dev/disk/by-uuid/98b904aa-5b37-476e-a690-5c73cc93a5b7' '/etc/usbkey' 'nofail' ExecStop=/usr/lib/systemd/systemd-cryptsetup detach 'cr_usb' -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1149066
http://bugzilla.suse.com/show_bug.cgi?id=1149066#c2
Michal Suchanek
http://bugzilla.suse.com/show_bug.cgi?id=1149066
http://bugzilla.suse.com/show_bug.cgi?id=1149066#c3
Franck Bui
# systemctl daemon-reload # systemctl start systemd-cryptsetup@cr_usb.service Please enter passphrase for disk Cruzer_Fit (cr_usb): ^C
My guess is that you just interrupted systemctl here but PID1 is still trying to activate the job you queued with systemctl. systemctl was simply waiting for systemd-cryptsetup@cr_usb.service to be running. You killed it but this had no effects the queued job itself. After pressing ^C, what does "systemctl status systemd-cryptsetup@cr_usb.service" show ? -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1149066
http://bugzilla.suse.com/show_bug.cgi?id=1149066#c4
Franck Bui
participants (1)
-
bugzilla_noreply@novell.com