From: "Javier Juan Martínez Cabezón" <tazok.id0@gmail.com>
To: dm-crypt@saout.de
Subject: Re: [dm-crypt] Can't mount my LUKS crypted disk after kernel update / reboot
Date: Sun, 16 Dec 2012 10:24:33 +0100 [thread overview]
Message-ID: <50CD9351.1060800@gmail.com> (raw)
In-Reply-To: <002801cdd971$867e5310$937af930$@nexus-informatik.ch>
I think I answer too fast before, sorry.
Did strings answer something known in the device?
Are you sure that this is true? aes-xts-essiv:sha256
Which cipher did you use with cryptsetup 1.1?
On 13/12/12 21:36, Philipp Durrer - Nexus Informatik wrote:
> Hi
>
>
>
> I've got a very serious issue, I can't mount my LUKS crypted
> software raid disk after a regular kernel update (Ubuntu 11.10,
> Kernel 3.0.0-12-generic to 3.0.0-17-generic) and a following
> reboot.
>
>
>
> After the reboot the raid disks start properly and are active:
>
>
>
>> cat /proc/mdstat
>
>> Personalities : [raid0] [raid1] [linear] [multipath] [raid6]
>> [raid5]
> [raid4] [raid10]
>
>> md0 : active raid1 sda2[0] sdb2[1]
>
>> 488269 blocks super 1.2 [2/2] [UU]
>
>>
>
>> md2 : active raid1 sda4[0] sdb4[1]
>
>> 3905214 blocks super 1.2 [2/2] [UU]
>
>>
>
>> md126 : active raid0 sda5[0] sdb5[1]
>
>> 5832190976 blocks super 1.2 512k chunks
>
>>
>
>> md1 : active raid1 sda3[0] sdb3[1]
>
>> 9764529 blocks super 1.2 [2/2] [UU]
>
>>
>
>> md127 : active raid0 sdd1[1] sdc1[0]
>
>> 5860530176 blocks super 1.2 512k chunks
>
>>
>
>> unused devices: <none>
>
>
>
> The LUKS header looks fine aswell:
>
>> cryptsetup luksDump /dev/md126
>
>> LUKS header information for /dev/md126
>
>>
>
>> Version: 1
>
>> Cipher name: aes
>
>> Cipher mode: xts-essiv:sha256
>
>> Hash spec: sha1
>
>> Payload offset: 4096
>
>> MK bits: 512
>
>> MK digest: f0 59 ac a8 13 3c e1 XX YY ZZ ce 0f ba cd 63 0a
>> 4a d0 25 b2
>
>> MK salt: e8 3f fc 25 3a 0e a3 XX XX YY ZZ 45 1c 12 31 f6
>
>> cb ea 03 d2 51 66 f9 4c 51 c4 29 4d 97 4f 17 0f
>
>> MK iterations: 33375
>
>> UUID: 1686eb8f-be62-462b-9326-319a7cc8e087
>
>>
>
>> Key Slot 0: ENABLED
>
>> Iterations: 133653
>
>> Salt: c1 d9 a0 ff 6e 7a XX XX YY ZZ a7 67 dc
>> 8f
> 10 93
>
>> 4e a2 9c 9e d8 39 4f 91 37 3d e3 8f df 24
> dc 60
>
>> Key material offset: 8
>
>> AF stripes: 4000
>
>> Key Slot 1: DISABLED
>
>> Key Slot 2: DISABLED
>
>> Key Slot 3: DISABLED
>
>> Key Slot 4: DISABLED
>
>> Key Slot 5: DISABLED
>
>> Key Slot 6: DISABLED
>
>> Key Slot 7: DISABLED
>
>
>
> I can aswell open the Disk successful without compaints:
>
>> cryptsetup -d /keystore/tempstuff1 luksOpen /dev/md126 stuff
>
>> cryptsetup status stuff
>
>> /dev/mapper/stuff is active.
>
>> type: LUKS1
>
>> cipher: aes-xts-essiv:sha256
>
>> keysize: 512 bits
>
>> device: /dev/md126
>
>> offset: 4096 sectors
>
>> size: 11664377856 sectors
>
>> mode: read/write
>
>
>
> But when I try to mount the device mapper disk I get compaints:
>
>> mount /dev/mapper/stuff /home/crypt/
>
>> mount: you must specify the filesystem type
>
>
>
>> mount -t ext4 /dev/mapper/stuff /home/crypt/
>
>> mount: wrong fs type, bad option, bad superblock on
>> /dev/mapper/stuff,
>
>> missing codepage or helper program, or other error
>
>> In some cases useful info is found in syslog - try
>
>> dmesg | tail or so
>
>
>
>> dmesg | tail
>
>> [12124.435471] EXT4-fs (dm-5): VFS: Can't find ext4 filesystem
>
>
>
> Filesystem check doesn't work either :(
>
>
>
>> fsck.ext4 /dev/mapper/stuff
>
>> e2fsck 1.41.14 (22-Dec-2010)
>
>> fsck.ext4: Superblock invalid, trying backup blocks...
>
>> fsck.ext4: Bad magic number in super-block while trying to open
> /dev/mapper/stuff
>
>> .
>
>
>
> I can't see any updated dependencies of cryptsetup that are related
> to this issue, I had the default cryptsetup version 1.1.3 on the
> box and now tried with 1.5.1 with no success :(
>
> Any ideas ? I would greatly appreciate any inputs helping me, that
> I don't lose about 12 TB of precious data. -.-
>
>
>
> Thank you.
>
> Regards
>
>
>
>
>
> _______________________________________________ dm-crypt mailing
> list dm-crypt@saout.de
> http://www.saout.de/mailman/listinfo/dm-crypt
next prev parent reply other threads:[~2012-12-16 9:23 UTC|newest]
Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top
2012-12-13 20:36 [dm-crypt] Can't mount my LUKS crypted disk after kernel update / reboot Philipp Durrer - Nexus Informatik
2012-12-16 9:16 ` Javier Juan Martínez Cabezón
2012-12-16 9:24 ` Javier Juan Martínez Cabezón [this message]
2012-12-16 10:49 ` Milan Broz
2012-12-16 18:11 ` Philipp Durrer
2012-12-16 18:34 ` Milan Broz
2012-12-16 21:27 ` Arno Wagner
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=50CD9351.1060800@gmail.com \
--to=tazok.id0@gmail.com \
--cc=dm-crypt@saout.de \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox