Am Fr., 24. Aug. 2018 um 19:09 Uhr schrieb Guilhem Moulin <guil...@debian.org>: > > Hi, > > On Fri, 24 Aug 2018 at 18:49:10 +0200, Matthias Klumpp wrote: > > This issue is really annoying, and I would be glad for any pointers on > > how to investigate the issue further, as I am no expert on cryptsetup. > > See https://wiki.debian.org/CryptsetupDebug to trace > /scripts/local-top/cryptroot, please attach the log file to this bug > afterwards :-)
Thank you! The log file is attached to this message. What I did was: 1) Run the script 2) Get a password prompt 3) Intentionally enter a wrong password 4) Enter the correct password at the second prompt Obviously no Plymouth was shown here. The log looks normal to me. Cheers, Matthias -- I welcome VSRE emails. See http://vsre.info/
+ PREREQ=cryptroot-prepare + . /scripts/functions + [ -f /lib/cryptsetup/functions ] + . /lib/cryptsetup/functions + [ /scripts/local-top/cryptroot != /scripts/local-top/cryptroot ] + [ /scripts/local-top/cryptroot != /scripts/local-top/cryptroot ] + [ local-top/cryptroot != /scripts/local-top/cryptroot ] + TABFILE=/cryptroot/crypttab + export DM_DEFAULT_NAME_MANGLING_MODE=hex + mkdir -p /cryptroot + grep -qE ^(.*\s)?cryptopts= /proc/cmdline + touch -- /cryptroot/crypttab + [ -s /cryptroot/crypttab ] + mkdir -pm0700 /run/cryptsetup + modprobe -q dm_crypt + crypttab_foreach_entry setup_mapping + local callback=setup_mapping IFS + local _CRYPTTAB_NAME _CRYPTTAB_SOURCE _CRYPTTAB_KEY _CRYPTTAB_OPTIONS CRYPTTAB_NAME CRYPTTAB_SOURCE CRYPTTAB_KEY CRYPTTAB_OPTIONS + [ -f /cryptroot/crypttab ] + IFS= read -r _CRYPTTAB_NAME _CRYPTTAB_SOURCE _CRYPTTAB_KEY _CRYPTTAB_OPTIONS + [ luks-90cebda2-1c6b-4ea8-9bac-6c3be8b3ced6 != luks-90cebda2-1c6b-4ea8-9bac-6c3be8b3ced6 ] + [ -z luks-90cebda2-1c6b-4ea8-9bac-6c3be8b3ced6 ] + printf %b luks-90cebda2-1c6b-4ea8-9bac-6c3be8b3ced6 + CRYPTTAB_NAME=luks-90cebda2-1c6b-4ea8-9bac-6c3be8b3ced6 + printf %b UUID=90cebda2-1c6b-4ea8-9bac-6c3be8b3ced6 + CRYPTTAB_SOURCE=UUID=90cebda2-1c6b-4ea8-9bac-6c3be8b3ced6 + printf %b none + CRYPTTAB_KEY=none + printf %b luks + CRYPTTAB_OPTIONS=luks + [ -z UUID=90cebda2-1c6b-4ea8-9bac-6c3be8b3ced6 ] + [ -z none ] + [ -z luks ] + setup_mapping + local dev + dm_blkdevname luks-90cebda2-1c6b-4ea8-9bac-6c3be8b3ced6 + local name=luks-90cebda2-1c6b-4ea8-9bac-6c3be8b3ced6 dev + dmsetup info -c --noheadings -o blkdevname -- luks-90cebda2-1c6b-4ea8-9bac-6c3be8b3ced6 + dev= + return 1 + crypttab_parse_options --export + local quiet=n export=n + [ 1 -gt 0 ] + export=y + shift + [ 0 -gt 0 ] + local IFS=, x OPTION VALUE + unset -v CRYPTTAB_OPTION_cipher CRYPTTAB_OPTION_size CRYPTTAB_OPTION_hash CRYPTTAB_OPTION_offset CRYPTTAB_OPTION_skip CRYPTTAB_OPTION_verify CRYPTTAB_OPTION_readonly CRYPTTAB_OPTION_discard CRYPTTAB_OPTION_plain CRYPTTAB_OPTION_luks CRYPTTAB_OPTION_tcrypt CRYPTTAB_OPTION_veracrypt CRYPTTAB_OPTION_swap CRYPTTAB_OPTION_tmp CRYPTTAB_OPTION_check CRYPTTAB_OPTION_checkargs CRYPTTAB_OPTION_tries CRYPTTAB_OPTION_initramfs CRYPTTAB_OPTION_noearly CRYPTTAB_OPTION_noauto CRYPTTAB_OPTION_loud CRYPTTAB_OPTION_quiet CRYPTTAB_OPTION_keyscript CRYPTTAB_OPTION_keyslot CRYPTTAB_OPTION_header CRYPTTAB_OPTION_tcrypthidden + OPTION=luks + VALUE=luks + [ luks = luks ] + unset -v VALUE + crypttab_validate_option + local o=luks + [ -z x ] + [ y = y ] + export CRYPTTAB_OPTION_luks=yes + IFS= + [ n = n ] + [ -z x ] + [ -z x ] + wait_for_source + wait_for_udev 10 + command -v udevadm + udevadm settle --timeout=10 + crypttab_resolve_source + [ ! -f UUID=90cebda2-1c6b-4ea8-9bac-6c3be8b3ced6 ] + local dev=UUID=90cebda2-1c6b-4ea8-9bac-6c3be8b3ced6 + resolve_device_spec UUID=90cebda2-1c6b-4ea8-9bac-6c3be8b3ced6 + local spec=UUID=90cebda2-1c6b-4ea8-9bac-6c3be8b3ced6 + blkid -l -t UUID=90cebda2-1c6b-4ea8-9bac-6c3be8b3ced6 -o device + spec=/dev/sda2 + [ -b /dev/sda2 ] + printf %s\n /dev/sda2 + dev=/dev/sda2 + CRYPTTAB_SOURCE=/dev/sda2 + return 0 + export CRYPTTAB_NAME + [ -z ] + [ none != none ] + [ none != none ] + local count=0 maxtries=3 fstype vg rv + [ 3 -le 0 ] + [ 0 -lt 3 ] + [ -z ] + [ none != none ] + unlock_mapping + local keyfile=- + [ -n ] + run_keyscript none 0 + local keyscriptarg=none CRYPTTAB_TRIED=0 keyscript + export CRYPTTAB_NAME CRYPTTAB_SOURCE CRYPTTAB_OPTIONS + export CRYPTTAB_TRIED + [ -n ] + [ none = none ] + keyscript=/lib/cryptsetup/askpass + keyscriptarg=Please unlock disk luks-90cebda2-1c6b-4ea8-9bac-6c3be8b3ced6: + exec /lib/cryptsetup/askpass Please unlock disk luks-90cebda2-1c6b-4ea8-9bac-6c3be8b3ced6: + get_crypt_type + local type=plain + [ = yes ] + [ = yes ] + [ yes = yes ] + type=luks + echo luks + local type=luks + [ luks = luks ] + unset -v CRYPTTAB_OPTION_cipher CRYPTTAB_OPTION_size CRYPTTAB_OPTION_hash CRYPTTAB_OPTION_offset CRYPTTAB_OPTION_skip + [ luks = plain ] + [ luks = tcrypt ] + [ luks = tcrypt ] + unset -v CRYPTTAB_OPTION_veracrypt CRYPTTAB_OPTION_tcrypthidden + [ luks != luks ] + /sbin/cryptsetup -T1 --type=luks --key-file=- open -- /dev/sda2 luks-90cebda2-1c6b-4ea8-9bac-6c3be8b3ced6 Please unlock disk luks-90cebda2-1c6b-4ea8-9bac-6c3be8b3ced6: No key available with this passphrase. + rv=2 + count=1 + [ 2 -ne 0 ] + cryptsetup_message ERROR: luks-90cebda2-1c6b-4ea8-9bac-6c3be8b3ced6: cryptsetup failed, bad password or options? + local IFS= + [ local-top/cryptroot != /scripts/local-top/cryptroot ] + [ -x /bin/plymouth ] + plymouth --ping + [ 93 -lt 70 ] + sed 1! s/^/ / + fold -s /scripts/local-top/cryptroot: line 1: fold: not found + echo cryptsetup: ERROR: luks-90cebda2-1c6b-4ea8-9bac-6c3be8b3ced6: cryptsetup failed, bad password or options? + return 0 + sleep 1 + continue + [ 3 -le 0 ] + [ 1 -lt 3 ] + [ -z ] + [ none != none ] + unlock_mapping + local keyfile=- + [ -n ] + run_keyscript none 1 + local keyscriptarg=none CRYPTTAB_TRIED=1 keyscript + export CRYPTTAB_NAME CRYPTTAB_SOURCE CRYPTTAB_OPTIONS + export CRYPTTAB_TRIED + [ -n ] + [ none = none ] + keyscript=/lib/cryptsetup/askpass + keyscriptarg=Please unlock disk luks-90cebda2-1c6b-4ea8-9bac-6c3be8b3ced6: + exec /lib/cryptsetup/askpass Please unlock disk luks-90cebda2-1c6b-4ea8-9bac-6c3be8b3ced6: + get_crypt_type + local type=plain + [ = yes ] + [ = yes ] + [ yes = yes ] + type=luks + echo luks + local type=luks + [ luks = luks ] + unset -v CRYPTTAB_OPTION_cipher CRYPTTAB_OPTION_size CRYPTTAB_OPTION_hash CRYPTTAB_OPTION_offset CRYPTTAB_OPTION_skip + [ luks = plain ] + [ luks = tcrypt ] + [ luks = tcrypt ] + unset -v CRYPTTAB_OPTION_veracrypt CRYPTTAB_OPTION_tcrypthidden + [ luks != luks ] + /sbin/cryptsetup -T1 --type=luks --key-file=- open -- /dev/sda2 luks-90cebda2-1c6b-4ea8-9bac-6c3be8b3ced6 Please unlock disk luks-90cebda2-1c6b-4ea8-9bac-6c3be8b3ced6: + rv=0 + count=2 + [ 0 -ne 0 ] + dm_blkdevname luks-90cebda2-1c6b-4ea8-9bac-6c3be8b3ced6 + local name=luks-90cebda2-1c6b-4ea8-9bac-6c3be8b3ced6 dev + dmsetup info -c --noheadings -o blkdevname -- luks-90cebda2-1c6b-4ea8-9bac-6c3be8b3ced6 + dev=dm-0 + [ -n dm-0 ] + [ -b /dev/dm-0 ] + echo /dev/dm-0 + return 0 + dev=/dev/dm-0 + get_fstype /dev/dm-0 + local FS FSTYPE FSSIZE RET + FS=/dev/dm-0 + FSTYPE=unknown + fstype /dev/dm-0 + eval FSTYPE=ext4 FSSIZE=13502672896 + FSTYPE=ext4 FSSIZE=13502672896 + [ ext4 = unknown ] + RET=0 + [ -z ext4 ] + echo ext4 + return 0 + fstype=ext4 + [ ext4 = unknown ] + [ ext4 = lvm2 ] + cryptsetup_message luks-90cebda2-1c6b-4ea8-9bac-6c3be8b3ced6: set up successfully + local IFS= + [ local-top/cryptroot != /scripts/local-top/cryptroot ] + [ -x /bin/plymouth ] + plymouth --ping + [ 62 -lt 70 ] + echo cryptsetup: luks-90cebda2-1c6b-4ea8-9bac-6c3be8b3ced6: set up successfully cryptsetup: luks-90cebda2-1c6b-4ea8-9bac-6c3be8b3ced6: set up successfully + return 0 + wait_for_udev 10 + command -v udevadm + udevadm settle --timeout=10 + return 0 + IFS= read -r _CRYPTTAB_NAME _CRYPTTAB_SOURCE _CRYPTTAB_KEY _CRYPTTAB_OPTIONS + exit 0