[Pkg-cryptsetup-devel] Bug#403426: kernel corrupts LUKS partition
header on arm
Clemens Fruhwirth
clemens at endorphin.org
Sat Dec 30 10:50:11 UTC 2006
At Fri, 29 Dec 2006 21:24:34 +0100,
Martin Michlmayr <tbm at cyrius.com> wrote:
>
> * Clemens Fruhwirth <clemens at endorphin.org> [2006-12-29 11:52]:
> > Please try the version from subversion
> > http://luks.endorphin.org/svn/cryptsetup
>
> With 1.0.4 plus the attached 2 patches from SVN I no longer get any
> corruption but I also cannot access my encrypted data.
That's good :)
> Is there anything else I should try?
> foobar:~# cryptsetup luksOpen /dev/sda5 x
> Enter LUKS passphrase:
> device-mapper: table: 254:0: crypt: Device lookup failed
> device-mapper: ioctl: error adding target to table
> device-mapper: ioctl: device doesn't appear to be in the dev hash table.
> Failed to setup dm-crypt key mapping.
> Check kernel for support for the aes-cbc-essiv:sha256 cipher spec and verify that /dev/sda5 contains at least 133 sectors.
> Failed to read from key storage
Are you sure we don't see any device mapper problems here? You might
just go over to a box where LUKS works (when the LUKS partition does
not contain anything security relevant to you), and do
dmsetup table mappingname > dm-table-file
open it up, and find the 7th entry that says something like x:y
(major:minor device number of your underlaying device). Replace this
by your correct device path on the arm box, copy that file over to arm
and set it up as
dmsetup create mappingname dm-table-file
If that does not work, we are seeing a dm-crypt layer problem here.
> Enter LUKS passphrase:
I just commited a patch that prevents password retrying with I/O
errors.
--
Fruhwirth Clemens - http://clemens.endorphin.org
for robots: sp4mtrap at endorphin.org
More information about the pkg-cryptsetup-devel
mailing list