|
Bugzilla – Full Text Bug Listing |
| Summary: | Mount of crypto file system on internal drive fails ... | ||
|---|---|---|---|
| Product: | [openSUSE] openSUSE 11.3 | Reporter: | Klaus Fischer <Klaus.Fischer> |
| Component: | Basesystem | Assignee: | Thomas Fehr <fehr> |
| Status: | RESOLVED FIXED | QA Contact: | E-mail List <qa-bugs> |
| Severity: | Normal | ||
| Priority: | P5 - None | CC: | aschnell, Klaus.Fischer |
| Version: | Final | ||
| Target Milestone: | --- | ||
| Hardware: | x86 | ||
| OS: | openSUSE 11.3 | ||
| Whiteboard: | |||
| Found By: | --- | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
| Attachments: | Requested files: YaST2 logs, fstab, crypttab | ||
|
Description
Klaus Fischer
2010-07-26 10:01:12 UTC
Please attach file from /var/log/YaST, so that I can see exactly what was going on.
If you changed /etc/fstab and/or /etc/cryptotab after install/update please attach also
current versions of /etc/fstab and /etc/cryptotab.
In 11.3 the fstab entries for encrypted partitions needs to contain "nofail" instead of "noauto".
As far as I can see we missed to update that in /etc/fstab automatically. Try changing "noauto"
to "nofail" in fstab line of the encrypted mount point and see if this make boot.crypto mount
your partition successfully. during system start.
You can manually test if your encrypted partition is still valid by the command
cryptsetup luksOpen /dev/sda7 cr_sda7
it will ask you for the crypt password and sets up a device mapper device named
/dev/mapper/cr_sda7. This device allows unencrypted access to the data on /dev/sda7.
Created attachment 378716 [details]
Requested files: YaST2 logs, fstab, crypttab
Hi,
first of all thanks for taking care of this.
In the attachedment I send you the logs of YaST2, fstab and crypttab.
Please note the fstab is the one that was produced by the installation procedure. The nofail option was added by the installation procedure because I did not know that it would exist or would be helpful. However, as I wrote mount fails. I of course also tried to mount with deleting noauto but this did not change anything. I am also aware of that the second none in the cr_sda7 line was specified with "noauto" by the intallation procedure. So this I did change manually. However, if I leave noauto (I of course also tried with the nofail option as just explained, no change) I am not asked for a password.
The command that you told me is not really of help because when I use it then the system just tells me that cr_sda7 already exists.
An explanation for all the trouble that came to my mind is that I remember that I told the installation procedure to reread mount points from /etc/fstab of the already installed system. As far as I remember the installation started to complain about sda7 after this although it seem to work ok before.
Please send me message in case you need any additional information.
Thank you very much for your help.
Cheers,
Klaus
Sorry, forgot check the check box before committing ... :-( Unfortunately I have to tell you that yast2-storage destroyed the content of your encrypted
volume. This is of course a bug. I am will try to reproduce this here and will create a fix.
Fortunately you write that you have a backup of your data, so at least there is no data loss.
You can fix your system the following way (you must be root to be able to do this):
- execute /sbin/cryptsetup status cr_sda7, this should show something like:
/dev/mapper/cr_sda7 is active:
cipher: aes-cbc-essiv:sha256
keysize: 128 bits
device: /dev/sda7
offset: 1032 sectors
size: 57222435 sectors
mode: read/write
- create an ext3 filesystem on the encrypted volume
mkfs.ext3 /dev/mapper/cr_sda7
- mount it where it belongs
mount /dev/mapper/cr_sda7 /crypto/Linux
If anything goes wrong here just email me at fehr@suse.de.
Afterwards you can restore your data from your backup to /crypto/Linux.
The setup should also be fine after next reboot.
Just as a warning for everyone using "Import fstab" feature. If /etc/fstab contains encrypted partitions there is a popup that asks for encryption password. Be very sure to enter the correct encryption password here, entering a wrong password destroys content of encrypted partition due to a bug in yast2-storage. To be completely on the save side refrain from using "Import fstab" feature if you have encrypted volumes in /etc/fstab. Problem is fixed in SVN Head and openSuSE-11.3 branch. NOTE: Of course the problem is still present on 11.3 installation media, so everyone using "Import fstab" feature in 11.3 having encrypted partitions still needs to be very careful. forgot to close |