[pkg-cryptsetup-devel] Bug#996177: cryptsetup: please report fatal errors without having to use -v

Guilhem Moulin guilhem at debian.org
Tue Oct 12 01:25:31 BST 2021


Control: found -1 2:2.1.0-5+deb10u2

On Tue, 12 Oct 2021 at 00:33:32 +0200, Guilhem Moulin wrote:
> On Mon, 11 Oct 2021 at 22:09:07 +0200, Marc Lehmann wrote:
>> Specifically, the machine didn't have enough ram, probably because the
>> default algorithm (argon) requires more ram than the machine had.
> 
> Could you please share the memory cost of the PBKDF, and also the output
> of `free` just before running cryptsetup?  That would help us trying to
> reproduce this and forward the issue upstream.  I tried to reproduce
> this but only managed to trigger the OOM killer.
> 
> Also did you run luksFormat on that same machine (and didn't remove
> memory sticks afterwards)?

I was actually able to reproduce this with buster's 2.1.0, but doing the
same thing after upgrading to bullseye or sid yields

    (initramfs) cryptsetup luksOpen /dev/vda5 test_crypt
    Enter passphrase for /dev/vda5: 
    [    5.236310] device-mapper: uevent: version 1.0.3
    [    5.240230] device-mapper: ioctl: 4.43.0-ioctl (2020-10-01) initialised: dm-devel at redhat.com
    Not enough available memory to open a keyslot.

which sounds alright.  Did you run reportbug(1) from the affected system
or from an older one?

Looking at the upstream git log, I found 206b70c837f29c8b34cb0d80ae496870550ec50c
which fixes https://gitlab.com/cryptsetup/cryptsetup/-/issues/488 which looks
really familiar :-)

-- 
Guilhem.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <http://alioth-lists.debian.net/pipermail/pkg-cryptsetup-devel/attachments/20211012/39e40a4d/attachment.sig>


More information about the pkg-cryptsetup-devel mailing list