Keyslot 0 Area Length is 18 Exabytes
Issue description
When attempting to modify or delete keyslot 0, I receive the following error.
Cannot wipe device /dev/sdb3.
When running luksRemoveKey or luksKillSlot on keyslot 0, along with the above error, both result in "Command successful.". However, keyslot 0 is not removed and remains unchanged.
When attempting to convert from LUKS2 to LUKS1, I receive the following error.
Cannot convert to LUKS1 format - keyslot 0 is not LUKS1 compatible.
I later discovered that the keyslot 0 area length is 18 exabytes as shown when running luksDump.
Steps for reproducing the issue
May not be reproducible.
Additional info
Arch Linux installed on a Samsung flash drive following these instructions. LUKS encryption set up after installation following these instructions. Encryption was performed from a Debian 11 system running an older version of cryptsetup. Later converted from LUKS2 to LUKS1, then back to LUKS2 while troubleshooting an unrelated issue.
Debug log
cryptsetup luksDump /dev/sdb3
LUKS header information
Version: 2
Epoch: 7
Metadata area: 16384 [bytes]
Keyslots area: 8355840 [bytes]
UUID: f4b4e102-43ef-4329-a86f-218d5b066b5d
Label: (no label)
Subsystem: (no subsystem)
Flags: (no flags)
Data segments:
0: crypt
offset: 8388608 [bytes]
length: (whole device)
cipher: aes-xts-plain64
sector: 512 [bytes]
Keyslots:
0: luks2
Key: 512 bits
Priority: normal
Cipher: aes-xts-plain64
Cipher key: 512 bits
PBKDF: pbkdf2
Hash: sha256
Iterations: 1952654
Salt: 6b 56 a5 b8 80 16 f8 db 51 21 a3 49 6a 64 65 5f
d5 eb 0f b1 73 d6 40 96 3a 48 7b 7b 47 00 7d ae
AF stripes: 4000
AF hash: sha256
Area offset:290816 [bytes]
Area length:18446744073709293568 [bytes]
Digest ID: 0
1: luks2
Key: 512 bits
Priority: normal
Cipher: aes-xts-plain64
Cipher key: 512 bits
PBKDF: argon2id
Time cost: 5
Memory: 1048576
Threads: 4
Salt: f0 04 8c f3 ea cf 6a 41 07 96 52 af eb 16 05 de
21 2b 6e c1 14 7d 6a a7 01 e9 9f 82 bc 04 b0 0b
AF stripes: 4000
AF hash: sha256
Area offset:32768 [bytes]
Area length:258048 [bytes]
Digest ID: 0
Tokens:
Digests:
0: pbkdf2
Hash: sha256
Iterations: 90145
Salt: 31 4b d6 2a 88 79 29 85 28 64 1d 38 fa 1b dc ce
83 20 30 e1 83 18 24 40 7b bf c6 5a a1 45 2a 51
Digest: 33 cf c5 80 8e 29 01 ce 5d 3f d3 d2 88 30 e2 2d
cc 32 e7 51
cryptsetup luksRemoveKey /dev/sdb3 --verbose --debug
# cryptsetup 2.4.3 processing "cryptsetup luksRemoveKey /dev/sdb3 --verbose --debug"
# Running command luksRemoveKey.
# Locking memory.
# Installing SIGINT/SIGTERM handler.
# Unblocking interruption on signal.
# Allocating context for crypt device /dev/sdb3.
# Trying to open and read device /dev/sdb3 with direct-io.
# Initialising device-mapper backend library.
# Trying to load any crypt type from device /dev/sdb3.
# Crypto backend (OpenSSL 1.1.1n 15 Mar 2022) initialized in cryptsetup library version 2.4.3.
# Detected kernel Linux 5.17.5-arch1-1 x86_64.
# Loading LUKS2 header (repair disabled).
# Acquiring read lock for device /dev/sdb3.
# Opening lock resource file /run/cryptsetup/L_8:19
# Verifying lock handle for /dev/sdb3.
# Device /dev/sdb3 READ lock taken.
# Trying to read primary LUKS2 header at offset 0x0.
# Opening locked device /dev/sdb3
# Verifying locked device handle (bdev)
# LUKS2 header version 2 of size 16384 bytes, checksum sha256.
# Checksum:b8fe396d6cb03a6b458a56ae835ed8e9e68d87b8522f1928ccfb93d17e6275b6 (on-disk)
# Checksum:b8fe396d6cb03a6b458a56ae835ed8e9e68d87b8522f1928ccfb93d17e6275b6 (in-memory)
# Trying to read secondary LUKS2 header at offset 0x4000.
# Reusing open ro fd on device /dev/sdb3
# LUKS2 header version 2 of size 16384 bytes, checksum sha256.
# Checksum:2149650b954388169dd5f6e5dabbee21487871cc737d0923937aa71a73c352e1 (on-disk)
# Checksum:2149650b954388169dd5f6e5dabbee21487871cc737d0923937aa71a73c352e1 (in-memory)
# Device size 256105764352, offset 8388608.
# Device /dev/sdb3 READ lock released.
# PBKDF argon2id, time_ms 2000 (iterations 0), max_memory_kb 1048576, parallel_threads 4.
# Interactive passphrase entry requested.
# Checking volume passphrase [keyslot -1] using passphrase.
# Keyslot 0 priority 1 != 2 (required), skipped.
# Keyslot 1 priority 1 != 2 (required), skipped.
# Trying to open LUKS2 keyslot 0.
# Running keyslot key derivation.
# Reading keyslot area [0x47000].
# Acquiring read lock for device /dev/sdb3.
# Opening lock resource file /run/cryptsetup/L_8:19
# Verifying lock handle for /dev/sdb3.
# Device /dev/sdb3 READ lock taken.
# Reusing open ro fd on device /dev/sdb3
# Device /dev/sdb3 READ lock released.
# Verifying key from keyslot 0, digest 0.
# dm version [ opencount flush ] [16384] (*1)
# dm versions [ opencount flush ] [16384] (*1)
# Detected dm-ioctl version 4.45.0.
# Device-mapper backend running with UDEV support enabled.
Key slot 0 unlocked.
Keyslot 0 is selected for deletion.
# Destroying keyslot 0.
# Acquiring write lock for device /dev/sdb3.
# Opening lock resource file /run/cryptsetup/L_8:19
# Verifying lock handle for /dev/sdb3.
# Device /dev/sdb3 WRITE lock taken.
# Checking context sequence id matches value stored on disk.
# Reusing open ro fd on device /dev/sdb3
# Opening locked device /dev/sdb3
# Verifying locked device handle (bdev)
Cannot wipe device /dev/sdb3.
# Device /dev/sdb3 WRITE lock released.
Key slot 0 removed.
# Releasing crypt device /dev/sdb3 context.
# Releasing device-mapper backend.
# Closing read only fd for /dev/sdb3.
# Closing read write fd for /dev/sdb3.
# Unlocking memory.
Command successful.
cryptsetup luksChangeKey /dev/sdb3 --key-slot 0 --verbose --debug
# cryptsetup 2.4.3 processing "cryptsetup luksChangeKey /dev/sdb3 --key-slot 0 --verbose --debug"
# Running command luksChangeKey.
# Locking memory.
# Installing SIGINT/SIGTERM handler.
# Unblocking interruption on signal.
# Allocating context for crypt device /dev/sdb3.
# Trying to open and read device /dev/sdb3 with direct-io.
# Initialising device-mapper backend library.
# Trying to load any crypt type from device /dev/sdb3.
# Crypto backend (OpenSSL 1.1.1n 15 Mar 2022) initialized in cryptsetup library version 2.4.3.
# Detected kernel Linux 5.17.5-arch1-1 x86_64.
# Loading LUKS2 header (repair disabled).
# Acquiring read lock for device /dev/sdb3.
# Opening lock resource file /run/cryptsetup/L_8:19
# Verifying lock handle for /dev/sdb3.
# Device /dev/sdb3 READ lock taken.
# Trying to read primary LUKS2 header at offset 0x0.
# Opening locked device /dev/sdb3
# Verifying locked device handle (bdev)
# LUKS2 header version 2 of size 16384 bytes, checksum sha256.
# Checksum:b8fe396d6cb03a6b458a56ae835ed8e9e68d87b8522f1928ccfb93d17e6275b6 (on-disk)
# Checksum:b8fe396d6cb03a6b458a56ae835ed8e9e68d87b8522f1928ccfb93d17e6275b6 (in-memory)
# Trying to read secondary LUKS2 header at offset 0x4000.
# Reusing open ro fd on device /dev/sdb3
# LUKS2 header version 2 of size 16384 bytes, checksum sha256.
# Checksum:2149650b954388169dd5f6e5dabbee21487871cc737d0923937aa71a73c352e1 (on-disk)
# Checksum:2149650b954388169dd5f6e5dabbee21487871cc737d0923937aa71a73c352e1 (in-memory)
# Device size 256105764352, offset 8388608.
# Device /dev/sdb3 READ lock released.
# PBKDF argon2id, time_ms 2000 (iterations 0), max_memory_kb 1048576, parallel_threads 4.
# PBKDF argon2id, time_ms 2000 (iterations 0), max_memory_kb 1048576, parallel_threads 4.
# Interactive passphrase entry requested.
# Checking volume passphrase [keyslot 0] using passphrase.
# Trying to open LUKS2 keyslot 0.
# Running keyslot key derivation.
# Reading keyslot area [0x47000].
# Acquiring read lock for device /dev/sdb3.
# Opening lock resource file /run/cryptsetup/L_8:19
# Verifying lock handle for /dev/sdb3.
# Device /dev/sdb3 READ lock taken.
# Reusing open ro fd on device /dev/sdb3
# Device /dev/sdb3 READ lock released.
# Verifying key from keyslot 0, digest 0.
# dm version [ opencount flush ] [16384] (*1)
# dm versions [ opencount flush ] [16384] (*1)
# Detected dm-ioctl version 4.45.0.
# Device-mapper backend running with UDEV support enabled.
Key slot 0 unlocked.
# Interactive passphrase entry requested.
# Changing passphrase from old keyslot 0 to new 0.
# Trying to open LUKS2 keyslot 0.
# Running keyslot key derivation.
# Reading keyslot area [0x47000].
# Acquiring read lock for device /dev/sdb3.
# Opening lock resource file /run/cryptsetup/L_8:19
# Verifying lock handle for /dev/sdb3.
# Device /dev/sdb3 READ lock taken.
# Reusing open ro fd on device /dev/sdb3
# Device /dev/sdb3 READ lock released.
# Verifying key from keyslot 0, digest 0.
# Key change, old slot 0, new slot 0.
# Key slot 0 is going to be overwritten.
# Wiping keyslot 0 area only.
# Acquiring write lock for device /dev/sdb3.
# Opening lock resource file /run/cryptsetup/L_8:19
# Verifying lock handle for /dev/sdb3.
# Device /dev/sdb3 WRITE lock taken.
# Checking context sequence id matches value stored on disk.
# Reusing open ro fd on device /dev/sdb3
# Opening locked device /dev/sdb3
# Verifying locked device handle (bdev)
Cannot wipe device /dev/sdb3.
# Device /dev/sdb3 WRITE lock released.
# Reloading LUKS2 header (repair disabled).
# Acquiring read lock for device /dev/sdb3.
# Opening lock resource file /run/cryptsetup/L_8:19
# Verifying lock handle for /dev/sdb3.
# Device /dev/sdb3 READ lock taken.
# Trying to read primary LUKS2 header at offset 0x0.
# Reusing open ro fd on device /dev/sdb3
# LUKS2 header version 2 of size 16384 bytes, checksum sha256.
# Checksum:b8fe396d6cb03a6b458a56ae835ed8e9e68d87b8522f1928ccfb93d17e6275b6 (on-disk)
# Checksum:b8fe396d6cb03a6b458a56ae835ed8e9e68d87b8522f1928ccfb93d17e6275b6 (in-memory)
# Trying to read secondary LUKS2 header at offset 0x4000.
# Reusing open ro fd on device /dev/sdb3
# LUKS2 header version 2 of size 16384 bytes, checksum sha256.
# Checksum:2149650b954388169dd5f6e5dabbee21487871cc737d0923937aa71a73c352e1 (on-disk)
# Checksum:2149650b954388169dd5f6e5dabbee21487871cc737d0923937aa71a73c352e1 (in-memory)
# Device size 256105764352, offset 8388608.
# Device /dev/sdb3 READ lock released.
# Releasing crypt device /dev/sdb3 context.
# Releasing device-mapper backend.
# Closing read only fd for /dev/sdb3.
# Closing read write fd for /dev/sdb3.
# Unlocking memory.
Command failed with code -1 (wrong or missing parameters).
cryptsetup luksConvertKey /dev/sdb3 --key-slot 0 --pbkdf argon2id --verbose --debug
# cryptsetup 2.4.3 processing "cryptsetup luksConvertKey /dev/sdb3 --key-slot 0 --pbkdf argon2id --verbose --debug"
# Running command luksConvertKey.
# Locking memory.
# Installing SIGINT/SIGTERM handler.
# Unblocking interruption on signal.
# Allocating context for crypt device /dev/sdb3.
# Trying to open and read device /dev/sdb3 with direct-io.
# Initialising device-mapper backend library.
# Trying to load LUKS2 crypt type from device /dev/sdb3.
# Crypto backend (OpenSSL 1.1.1n 15 Mar 2022) initialized in cryptsetup library version 2.4.3.
# Detected kernel Linux 5.17.5-arch1-1 x86_64.
# Loading LUKS2 header (repair disabled).
# Acquiring read lock for device /dev/sdb3.
# Opening lock resource file /run/cryptsetup/L_8:19
# Verifying lock handle for /dev/sdb3.
# Device /dev/sdb3 READ lock taken.
# Trying to read primary LUKS2 header at offset 0x0.
# Opening locked device /dev/sdb3
# Verifying locked device handle (bdev)
# LUKS2 header version 2 of size 16384 bytes, checksum sha256.
# Checksum:b8fe396d6cb03a6b458a56ae835ed8e9e68d87b8522f1928ccfb93d17e6275b6 (on-disk)
# Checksum:b8fe396d6cb03a6b458a56ae835ed8e9e68d87b8522f1928ccfb93d17e6275b6 (in-memory)
# Trying to read secondary LUKS2 header at offset 0x4000.
# Reusing open ro fd on device /dev/sdb3
# LUKS2 header version 2 of size 16384 bytes, checksum sha256.
# Checksum:2149650b954388169dd5f6e5dabbee21487871cc737d0923937aa71a73c352e1 (on-disk)
# Checksum:2149650b954388169dd5f6e5dabbee21487871cc737d0923937aa71a73c352e1 (in-memory)
# Device size 256105764352, offset 8388608.
# Device /dev/sdb3 READ lock released.
# PBKDF argon2id, time_ms 2000 (iterations 0), max_memory_kb 1048576, parallel_threads 4.
# PBKDF argon2id, time_ms 2000 (iterations 0), max_memory_kb 1048576, parallel_threads 4.
# Interactive passphrase entry requested.
# Changing passphrase from old keyslot 0 to new 0.
# Trying to open LUKS2 keyslot 0.
# Running keyslot key derivation.
# Reading keyslot area [0x47000].
# Acquiring read lock for device /dev/sdb3.
# Opening lock resource file /run/cryptsetup/L_8:19
# Verifying lock handle for /dev/sdb3.
# Device /dev/sdb3 READ lock taken.
# Reusing open ro fd on device /dev/sdb3
# Device /dev/sdb3 READ lock released.
# Verifying key from keyslot 0, digest 0.
# Key change, old slot 0, new slot 0.
# Key slot 0 is going to be overwritten.
# Wiping keyslot 0 area only.
# Acquiring write lock for device /dev/sdb3.
# Opening lock resource file /run/cryptsetup/L_8:19
# Verifying lock handle for /dev/sdb3.
# Device /dev/sdb3 WRITE lock taken.
# Checking context sequence id matches value stored on disk.
# Reusing open ro fd on device /dev/sdb3
# Opening locked device /dev/sdb3
# Verifying locked device handle (bdev)
Cannot wipe device /dev/sdb3.
# Device /dev/sdb3 WRITE lock released.
# Reloading LUKS2 header (repair disabled).
# Acquiring read lock for device /dev/sdb3.
# Opening lock resource file /run/cryptsetup/L_8:19
# Verifying lock handle for /dev/sdb3.
# Device /dev/sdb3 READ lock taken.
# Trying to read primary LUKS2 header at offset 0x0.
# Reusing open ro fd on device /dev/sdb3
# LUKS2 header version 2 of size 16384 bytes, checksum sha256.
# Checksum:b8fe396d6cb03a6b458a56ae835ed8e9e68d87b8522f1928ccfb93d17e6275b6 (on-disk)
# Checksum:b8fe396d6cb03a6b458a56ae835ed8e9e68d87b8522f1928ccfb93d17e6275b6 (in-memory)
# Trying to read secondary LUKS2 header at offset 0x4000.
# Reusing open ro fd on device /dev/sdb3
# LUKS2 header version 2 of size 16384 bytes, checksum sha256.
# Checksum:2149650b954388169dd5f6e5dabbee21487871cc737d0923937aa71a73c352e1 (on-disk)
# Checksum:2149650b954388169dd5f6e5dabbee21487871cc737d0923937aa71a73c352e1 (in-memory)
# Device size 256105764352, offset 8388608.
# Device /dev/sdb3 READ lock released.
# Releasing crypt device /dev/sdb3 context.
# Releasing device-mapper backend.
# Closing read only fd for /dev/sdb3.
# Closing read write fd for /dev/sdb3.
# Unlocking memory.
Command failed with code -1 (wrong or missing parameters).
cryptsetup luksKillSlot /dev/sdb3 0 --verbose --debug
# cryptsetup 2.4.3 processing "cryptsetup luksKillSlot /dev/sdb3 0 --verbose --debug"
# Running command luksKillSlot.
# Locking memory.
# Installing SIGINT/SIGTERM handler.
# Unblocking interruption on signal.
# Allocating context for crypt device /dev/sdb3.
# Trying to open and read device /dev/sdb3 with direct-io.
# Initialising device-mapper backend library.
# Trying to load any crypt type from device /dev/sdb3.
# Crypto backend (OpenSSL 1.1.1n 15 Mar 2022) initialized in cryptsetup library version 2.4.3.
# Detected kernel Linux 5.17.5-arch1-1 x86_64.
# Loading LUKS2 header (repair disabled).
# Acquiring read lock for device /dev/sdb3.
# Opening lock resource file /run/cryptsetup/L_8:19
# Verifying lock handle for /dev/sdb3.
# Device /dev/sdb3 READ lock taken.
# Trying to read primary LUKS2 header at offset 0x0.
# Opening locked device /dev/sdb3
# Verifying locked device handle (bdev)
# LUKS2 header version 2 of size 16384 bytes, checksum sha256.
# Checksum:b8fe396d6cb03a6b458a56ae835ed8e9e68d87b8522f1928ccfb93d17e6275b6 (on-disk)
# Checksum:b8fe396d6cb03a6b458a56ae835ed8e9e68d87b8522f1928ccfb93d17e6275b6 (in-memory)
# Trying to read secondary LUKS2 header at offset 0x4000.
# Reusing open ro fd on device /dev/sdb3
# LUKS2 header version 2 of size 16384 bytes, checksum sha256.
# Checksum:2149650b954388169dd5f6e5dabbee21487871cc737d0923937aa71a73c352e1 (on-disk)
# Checksum:2149650b954388169dd5f6e5dabbee21487871cc737d0923937aa71a73c352e1 (in-memory)
# Device size 256105764352, offset 8388608.
# Device /dev/sdb3 READ lock released.
# PBKDF argon2id, time_ms 2000 (iterations 0), max_memory_kb 1048576, parallel_threads 4.
Keyslot 0 is selected for deletion.
# Interactive passphrase entry requested.
# Checking volume passphrase [keyslot 1] using passphrase.
# Trying to open LUKS2 keyslot 1.
# Running keyslot key derivation.
# Reading keyslot area [0x8000].
# Acquiring read lock for device /dev/sdb3.
# Opening lock resource file /run/cryptsetup/L_8:19
# Verifying lock handle for /dev/sdb3.
# Device /dev/sdb3 READ lock taken.
# Reusing open ro fd on device /dev/sdb3
# Device /dev/sdb3 READ lock released.
# Verifying key from keyslot 1, digest 0.
# dm version [ opencount flush ] [16384] (*1)
# dm versions [ opencount flush ] [16384] (*1)
# Detected dm-ioctl version 4.45.0.
# Device-mapper backend running with UDEV support enabled.
Key slot 1 unlocked.
# Destroying keyslot 0.
# Acquiring write lock for device /dev/sdb3.
# Opening lock resource file /run/cryptsetup/L_8:19
# Verifying lock handle for /dev/sdb3.
# Device /dev/sdb3 WRITE lock taken.
# Checking context sequence id matches value stored on disk.
# Reusing open ro fd on device /dev/sdb3
# Opening locked device /dev/sdb3
# Verifying locked device handle (bdev)
Cannot wipe device /dev/sdb3.
# Device /dev/sdb3 WRITE lock released.
Key slot 0 removed.
# Releasing crypt device /dev/sdb3 context.
# Releasing device-mapper backend.
# Closing read only fd for /dev/sdb3.
# Closing read write fd for /dev/sdb3.
# Unlocking memory.
Command successful.
cryptsetup convert /dev/sdb3 --type luks1 --verbose --debug
# cryptsetup 2.4.3 processing "cryptsetup convert /dev/sdb3 --type luks1 --verbose --debug"
# Running command convert.
# Locking memory.
# Installing SIGINT/SIGTERM handler.
# Unblocking interruption on signal.
# Allocating context for crypt device /dev/sdb3.
# Trying to open and read device /dev/sdb3 with direct-io.
# Initialising device-mapper backend library.
# Trying to load any crypt type from device /dev/sdb3.
# Crypto backend (OpenSSL 1.1.1n 15 Mar 2022) initialized in cryptsetup library version 2.4.3.
# Detected kernel Linux 5.17.5-arch1-1 x86_64.
# Loading LUKS2 header (repair disabled).
# Acquiring read lock for device /dev/sdb3.
# Opening lock resource file /run/cryptsetup/L_8:19
# Verifying lock handle for /dev/sdb3.
# Device /dev/sdb3 READ lock taken.
# Trying to read primary LUKS2 header at offset 0x0.
# Opening locked device /dev/sdb3
# Verifying locked device handle (bdev)
# LUKS2 header version 2 of size 16384 bytes, checksum sha256.
# Checksum:ac776d4d83d38442bc63a2ee6fe17dfc093cbb006f3996baa73d176cb79f68f1 (on-disk)
# Checksum:ac776d4d83d38442bc63a2ee6fe17dfc093cbb006f3996baa73d176cb79f68f1 (in-memory)
# Trying to read secondary LUKS2 header at offset 0x4000.
# Reusing open ro fd on device /dev/sdb3
# LUKS2 header version 2 of size 16384 bytes, checksum sha256.
# Checksum:e1449f2ba345dc61551978b83652770f403d5ad775c42418075893911fee18be (on-disk)
# Checksum:e1449f2ba345dc61551978b83652770f403d5ad775c42418075893911fee18be (in-memory)
# Device size 256105764352, offset 8388608.
# Device /dev/sdb3 READ lock released.
# PBKDF argon2id, time_ms 2000 (iterations 0), max_memory_kb 1048576, parallel_threads 4.
WARNING!
========
This operation will convert /dev/sdb3 to LUKS1 format.
Are you sure? (Type 'yes' in capital letters):
# Converting LUKS device to type LUKS1
# Area length in LUKS2 keyslot (0) is not compatible with LUKS1
Cannot convert to LUKS1 format - keyslot 0 is not LUKS1 compatible.
# Reloading LUKS2 header (repair disabled).
# Acquiring read lock for device /dev/sdb3.
# Opening lock resource file /run/cryptsetup/L_8:19
# Verifying lock handle for /dev/sdb3.
# Device /dev/sdb3 READ lock taken.
# Trying to read primary LUKS2 header at offset 0x0.
# Reusing open ro fd on device /dev/sdb3
# LUKS2 header version 2 of size 16384 bytes, checksum sha256.
# Checksum:ac776d4d83d38442bc63a2ee6fe17dfc093cbb006f3996baa73d176cb79f68f1 (on-disk)
# Checksum:ac776d4d83d38442bc63a2ee6fe17dfc093cbb006f3996baa73d176cb79f68f1 (in-memory)
# Trying to read secondary LUKS2 header at offset 0x4000.
# Reusing open ro fd on device /dev/sdb3
# LUKS2 header version 2 of size 16384 bytes, checksum sha256.
# Checksum:e1449f2ba345dc61551978b83652770f403d5ad775c42418075893911fee18be (on-disk)
# Checksum:e1449f2ba345dc61551978b83652770f403d5ad775c42418075893911fee18be (in-memory)
# Device size 256105764352, offset 8388608.
# Device /dev/sdb3 READ lock released.
# Releasing crypt device /dev/sdb3 context.
# Releasing device-mapper backend.
# Closing read only fd for /dev/sdb3.
# Unlocking memory.
Command failed with code -1 (wrong or missing parameters).