cryptsetup-reencrypt failed
Same problem as "fixed" #178 (closed)? I can't find the commit related to this, the link is to the old repository.
What steps will reproduce the problem
- cryptsetup luksFormat /dev/sdh1
- cryptsetup luksOpen /dev/sdh1 sdh1_crypt
- mkfs.xfs /dev/mapper/sdh1_crypt
- cryptsetup remove sdh1_crypt
- cryptsetup-reencrypt --debug /dev/sdh1 ### see output below
WARNING: this is experimental code, it can completely break your data.
# cryptsetup 1.7.0-git processing "./cryptsetup-reencrypt --debug /dev/sdh1"
# Initialising reencryption context.
# Initialising UUID.
# Allocating crypt device /dev/sdh1 context.
# Trying to open and read device /dev/sdh1.
# Initialising device-mapper backend library.
# Trying to load LUKS1 crypt type from device /dev/sdh1.
# Crypto backend (gcrypt 1.5.3) initialized.
# Reading LUKS header of size 1024 from device /dev/sdh1
# Key length 32, device size 3907027087 sectors, header size 2050 sectors.
# Releasing crypt device /dev/sdh1 context.
# Releasing device-mapper backend.
# Removing headers.
# Allocating crypt device (null) context.
# Initialising device-mapper backend library.
# Deactivating volume LUKS-bd0afca5-e44a-47ba-bceb-be67fdc9bf1a.org.
# dm version OF [16384] (*1)
# dm versions OF [16384] (*1)
# Detected dm-crypt version 1.13.0, dm-ioctl version 4.27.0.
# Device-mapper backend running with UDEV support enabled.
# dm status LUKS-bd0afca5-e44a-47ba-bceb-be67fdc9bf1a.org OF [16384] (*1)
Device LUKS-bd0afca5-e44a-47ba-bceb-be67fdc9bf1a.org is not active.
# Deactivating volume LUKS-bd0afca5-e44a-47ba-bceb-be67fdc9bf1a.new.
# dm status LUKS-bd0afca5-e44a-47ba-bceb-be67fdc9bf1a.new OF [16384] (*1)
Device LUKS-bd0afca5-e44a-47ba-bceb-be67fdc9bf1a.new is not active.
# Releasing crypt device (null) context.
# Releasing device-mapper backend.
# Created LUKS reencryption log file LUKS-bd0afca5-e44a-47ba-bceb-be67fdc9bf1a.log.
# Log: direction = 0
# Log: mode = 0
# Log: offset = 0
# Log: shift = 0
# Running reencryption.
# Passhrases initialization.
# Allocating crypt device /dev/sdh1 context.
# Trying to open and read device /dev/sdh1.
# Initialising device-mapper backend library.
# Trying to load LUKS1 crypt type from device /dev/sdh1.
# Crypto backend (gcrypt 1.5.3) initialized.
# Reading LUKS header of size 1024 from device /dev/sdh1
# Key length 32, device size 3907027087 sectors, header size 2050 sectors.
# Setting ciphertext data device to /dev/sdh1.
# Trying to open and read device /dev/sdh1.
# Installing SIGINT/SIGTERM handler.
# Unblocking interruption on signal.
# Interactive passphrase entry requested.
Enter passphrase for key slot 0:
# Blocking interruption on signal.
# Checking volume [keyslot 0] using passphrase.
# Trying to open key slot 0 [ACTIVE_LAST].
# Reading key slot 0 area.
# Calculated device size is 250 sectors (RW), offset 8.
# DM-UUID is CRYPT-TEMP-temporary-cryptsetup-3903
# Udev cookie 0xd4dc3a5 (semid 851969) created
# Udev cookie 0xd4dc3a5 (semid 851969) incremented to 1
# Udev cookie 0xd4dc3a5 (semid 851969) incremented to 2
# Udev cookie 0xd4dc3a5 (semid 851969) assigned to CREATE task(0) with flags DISABLE_SUBSYSTEM_RULES DISABLE_DISK_RULES DISABLE_OTHER_RULES (0xe)
# dm create temporary-cryptsetup-3903 CRYPT-TEMP-temporary-cryptsetup-3903 OF [16384] (*1)
# dm reload temporary-cryptsetup-3903 OFRW [16384] (*1)
# dm resume temporary-cryptsetup-3903 OFRW [16384] (*1)
# temporary-cryptsetup-3903: Stacking NODE_ADD (252,2) 0:6 0660 [verify_udev]
# temporary-cryptsetup-3903: Stacking NODE_READ_AHEAD 256 (flags=1)
# Udev cookie 0xd4dc3a5 (semid 851969) decremented to 1
# Udev cookie 0xd4dc3a5 (semid 851969) waiting for zero
# Udev cookie 0xd4dc3a5 (semid 851969) destroyed
# temporary-cryptsetup-3903: Processing NODE_ADD (252,2) 0:6 0660 [verify_udev]
# temporary-cryptsetup-3903: Processing NODE_READ_AHEAD 256 (flags=1)
# temporary-cryptsetup-3903 (252:2): read ahead is 256
# temporary-cryptsetup-3903 (252:2): Setting read ahead to 256
# Udev cookie 0xd4d2c0a (semid 884737) created
# Udev cookie 0xd4d2c0a (semid 884737) incremented to 1
# Udev cookie 0xd4d2c0a (semid 884737) incremented to 2
# Udev cookie 0xd4d2c0a (semid 884737) assigned to REMOVE task(2) with flags (0x0)
# dm remove temporary-cryptsetup-3903 OFT [16384] (*1)
# temporary-cryptsetup-3903: Stacking NODE_DEL [verify_udev]
# Udev cookie 0xd4d2c0a (semid 884737) decremented to 1
# Udev cookie 0xd4d2c0a (semid 884737) waiting for zero
# Udev cookie 0xd4d2c0a (semid 884737) destroyed
# temporary-cryptsetup-3903: Processing NODE_DEL [verify_udev]
Key slot 0 unlocked.
# Releasing crypt device /dev/sdh1 context.
# Releasing device-mapper backend.
# Creating LUKS header backup for device /dev/sdh1.
# Allocating crypt device /dev/sdh1 context.
# Trying to open and read device /dev/sdh1.
# Initialising device-mapper backend library.
# Trying to load LUKS1 crypt type from device /dev/sdh1.
# Crypto backend (gcrypt 1.5.3) initialized.
# Reading LUKS header of size 1024 from device /dev/sdh1
# Key length 32, device size 3907027087 sectors, header size 2050 sectors.
# Crypto backend (gcrypt 1.5.3) initialized.
# Requested header backup of device /dev/sdh1 (LUKS1) to file LUKS-bd0afca5-e44a-47ba-bceb-be67fdc9bf1a.org.
# Reading LUKS header of size 1024 from device /dev/sdh1
# Key length 32, device size 3907027087 sectors, header size 2050 sectors.
# Storing backup of header (1024 bytes) and keyslot area (1045504 bytes).
LUKS header backup of device /dev/sdh1 created.
# Creating empty file LUKS-bd0afca5-e44a-47ba-bceb-be67fdc9bf1a.new of size 1049600.
# Allocating crypt device LUKS-bd0afca5-e44a-47ba-bceb-be67fdc9bf1a.new context.
# Trying to open and read device LUKS-bd0afca5-e44a-47ba-bceb-be67fdc9bf1a.new.
# Iteration time set to 1000 miliseconds.
# Formatting device LUKS-bd0afca5-e44a-47ba-bceb-be67fdc9bf1a.new as type LUKS1.
# Crypto backend (gcrypt 1.5.3) initialized.
# Trying to open and read device /dev/sdh1.
# Generating LUKS header version 1 using hash sha1, aes, xts-plain64, MK 32 bytes
# Crypto backend (gcrypt 1.5.3) initialized.
# KDF pbkdf2, hash sha1: 459901 iterations per second.
# Data offset 4096, UUID bd0afca5-e44a-47ba-bceb-be67fdc9bf1a, digest iterations 56125
# Updating LUKS header of size 1024 on device LUKS-bd0afca5-e44a-47ba-bceb-be67fdc9bf1a.new
# Key length 32, device size 2050 sectors, header size 2050 sectors.
# Reading LUKS header of size 1024 from device LUKS-bd0afca5-e44a-47ba-bceb-be67fdc9bf1a.new
# Key length 32, device size 2050 sectors, header size 2050 sectors.
New LUKS header for device /dev/sdh1 created.
# Adding new keyslot 0 using volume key.
# Calculating data for key slot 0
# Crypto backend (gcrypt 1.5.3) initialized.
# KDF pbkdf2, hash sha1: 462335 iterations per second.
# Key slot 0 use 225749 password iterations.
# Using hash sha1 for AF in key slot 0, 4000 stripes
# Updating key slot 0 [0x1000] area.
# Allocating a free loop device.
# Trying to open and read device /dev/loop0.
# Calculated device size is 256 sectors (RW), offset 8.
# DM-UUID is CRYPT-TEMP-temporary-cryptsetup-3903
# Udev cookie 0xd4d0ff6 (semid 917505) created
# Udev cookie 0xd4d0ff6 (semid 917505) incremented to 1
# Udev cookie 0xd4d0ff6 (semid 917505) incremented to 2
# Udev cookie 0xd4d0ff6 (semid 917505) assigned to CREATE task(0) with flags DISABLE_SUBSYSTEM_RULES DISABLE_DISK_RULES DISABLE_OTHER_RULES (0xe)
# dm create temporary-cryptsetup-3903 CRYPT-TEMP-temporary-cryptsetup-3903 OF [16384] (*1)
# dm reload temporary-cryptsetup-3903 OFW [16384] (*1)
# dm resume temporary-cryptsetup-3903 OFW [16384] (*1)
# temporary-cryptsetup-3903: Stacking NODE_ADD (252,2) 0:6 0660 [verify_udev]
# temporary-cryptsetup-3903: Stacking NODE_READ_AHEAD 256 (flags=1)
# Udev cookie 0xd4d0ff6 (semid 917505) decremented to 1
# Udev cookie 0xd4d0ff6 (semid 917505) waiting for zero
# Udev cookie 0xd4d0ff6 (semid 917505) destroyed
# temporary-cryptsetup-3903: Processing NODE_ADD (252,2) 0:6 0660 [verify_udev]
# temporary-cryptsetup-3903: Processing NODE_READ_AHEAD 256 (flags=1)
# temporary-cryptsetup-3903 (252:2): read ahead is 256
# temporary-cryptsetup-3903 (252:2): Setting read ahead to 256
# Udev cookie 0xd4d76af (semid 950273) created
# Udev cookie 0xd4d76af (semid 950273) incremented to 1
# Udev cookie 0xd4d76af (semid 950273) incremented to 2
# Udev cookie 0xd4d76af (semid 950273) assigned to REMOVE task(2) with flags (0x0)
# dm remove temporary-cryptsetup-3903 OFT [16384] (*1)
# temporary-cryptsetup-3903: Stacking NODE_DEL [verify_udev]
# Udev cookie 0xd4d76af (semid 950273) decremented to 1
# Udev cookie 0xd4d76af (semid 950273) waiting for zero
# Udev cookie 0xd4d76af (semid 950273) destroyed
# temporary-cryptsetup-3903: Processing NODE_DEL [verify_udev]
# Key slot 0 was enabled in LUKS header.
# Updating LUKS header of size 1024 on device LUKS-bd0afca5-e44a-47ba-bceb-be67fdc9bf1a.new
# Key length 32, device size 2050 sectors, header size 2050 sectors.
Error during update of LUKS header on device LUKS-bd0afca5-e44a-47ba-bceb-be67fdc9bf1a.new.
# Releasing crypt device LUKS-bd0afca5-e44a-47ba-bceb-be67fdc9bf1a.new context.
# Closed loop /dev/loop0 (LUKS-bd0afca5-e44a-47ba-bceb-be67fdc9bf1a.new).
# Releasing crypt device /dev/sdh1 context.
# Releasing device-mapper backend.
Creation of LUKS backup headers failed.
# Destroying reencryption context.
# Closing LUKS reencryption log file LUKS-bd0afca5-e44a-47ba-bceb-be67fdc9bf1a.log.
# Removing headers.
# Allocating crypt device (null) context.
# Initialising device-mapper backend library.
# Deactivating volume LUKS-bd0afca5-e44a-47ba-bceb-be67fdc9bf1a.org.
# dm status LUKS-bd0afca5-e44a-47ba-bceb-be67fdc9bf1a.new OF [16384] (*1)
Device LUKS-bd0afca5-e44a-47ba-bceb-be67fdc9bf1a.new is not active.
# Releasing crypt device (null) context.
# Releasing device-mapper backend.