Go to:
Gentoo Home
Documentation
Forums
Lists
Bugs
Planet
Store
Wiki
Get Gentoo!
Gentoo's Bugzilla – Attachment 540138 Details for
Bug 661584
Errors with newer install media and cryptsetup
Home
|
New
–
[Ex]
|
Browse
|
Search
|
Privacy Policy
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
cryptsetup output from working env
cryptsetup-working.txt (text/plain), 6.90 KB, created by
Ben Kohler
on 2018-07-19 17:27:19 UTC
(
hide
)
Description:
cryptsetup output from working env
Filename:
MIME Type:
Creator:
Ben Kohler
Created:
2018-07-19 17:27:19 UTC
Size:
6.90 KB
patch
obsolete
># cryptsetup 2.0.3 processing "cryptsetup luksFormat /dev/loop0 --debug" ># Running command luksFormat. ># Locking memory. ># Installing SIGINT/SIGTERM handler. ># Unblocking interruption on signal. > >WARNING! >======== >This will overwrite data on /dev/loop0 irrevocably. > >Are you sure? (Type uppercase yes): # Allocating context for crypt device /dev/loop0. ># Trying to open and read device /dev/loop0 with direct-io. ># Initialising device-mapper backend library. ># Interactive passphrase entry requested. ># PBKDF pbkdf2, hash sha256, time_ms 2000 (iterations 0), max_memory_kb 0, parallel_threads 0. ># Formatting device /dev/loop0 as type LUKS1. ># Crypto backend (gcrypt 1.8.3) initialized in cryptsetup library version 2.0.3. ># Detected kernel Linux 4.17.6-gentoo x86_64. ># Topology: IO (512/0), offset = 0; Required alignment is 1048576 bytes. ># Checking if cipher aes-xts-plain64 is usable. ># Userspace crypto wrapper cannot use aes-xts-plain64 (-95). ># Using dmcrypt to access keyslot area. ># Calculated device size is 1 sectors (RW), offset 0. ># dm version [ opencount flush ] [16384] (*1) ># dm versions [ opencount flush ] [16384] (*1) ># Detected dm-ioctl version 4.39.0. ># Detected dm-crypt version 1.18.1. ># Device-mapper backend running with UDEV support enabled. ># DM-UUID is CRYPT-TEMP-temporary-cryptsetup-9437 ># Udev cookie 0xd4dc2e2 (semid 393218) created ># Udev cookie 0xd4dc2e2 (semid 393218) incremented to 1 ># Udev cookie 0xd4dc2e2 (semid 393218) incremented to 2 ># Udev cookie 0xd4dc2e2 (semid 393218) assigned to CREATE task(0) with flags DISABLE_SUBSYSTEM_RULES DISABLE_DISK_RULES DISABLE_OTHER_RULES DISABLE_LIBRARY_FALLBACK (0x2e) ># dm create temporary-cryptsetup-9437 CRYPT-TEMP-temporary-cryptsetup-9437 [ opencount flush ] [16384] (*1) ># dm reload temporary-cryptsetup-9437 [ opencount flush readonly securedata ] [16384] (*1) ># dm resume temporary-cryptsetup-9437 [ opencount flush readonly securedata ] [16384] (*1) ># temporary-cryptsetup-9437: Stacking NODE_ADD (254,0) 0:0 0600 [trust_udev] ># temporary-cryptsetup-9437: Stacking NODE_READ_AHEAD 256 (flags=1) ># Udev cookie 0xd4dc2e2 (semid 393218) decremented to 1 ># Udev cookie 0xd4dc2e2 (semid 393218) waiting for zero ># Udev cookie 0xd4dc2e2 (semid 393218) destroyed ># temporary-cryptsetup-9437: Skipping NODE_ADD (254,0) 0:0 0600 [trust_udev] ># temporary-cryptsetup-9437: Processing NODE_READ_AHEAD 256 (flags=1) ># temporary-cryptsetup-9437 (254:0): read ahead is 256 ># temporary-cryptsetup-9437: retaining kernel read ahead of 256 (requested 256) ># dm versions [ opencount flush ] [16384] (*1) ># dm versions [ opencount flush ] [16384] (*1) ># Udev cookie 0xd4d0605 (semid 425986) created ># Udev cookie 0xd4d0605 (semid 425986) incremented to 1 ># Udev cookie 0xd4d0605 (semid 425986) incremented to 2 ># Udev cookie 0xd4d0605 (semid 425986) assigned to REMOVE task(2) with flags DISABLE_LIBRARY_FALLBACK (0x20) ># dm remove temporary-cryptsetup-9437 [ opencount flush retryremove ] [16384] (*1) ># Udev cookie 0xd4d0605 (semid 425986) decremented to 0 ># Udev cookie 0xd4d0605 (semid 425986) waiting for zero ># Udev cookie 0xd4d0605 (semid 425986) destroyed ># Generating LUKS header version 1 using hash sha256, aes, xts-plain64, MK 32 bytes ># Running pbkdf2(sha256) benchmark. ># PBKDF benchmark: memory cost = 0, iterations = 1310720, threads = 0 (took 25 ms) ># PBKDF benchmark: memory cost = 0, iterations = 1555750, threads = 0 (took 337 ms) ># PBKDF benchmark: memory cost = 0, iterations = 1546572, threads = 0 (took 678 ms) ># Benchmark returns pbkdf2(sha256) 1546572 iterations, 0 memory, 0 threads (for 256-bits key). ># Data offset 4096, UUID 18bccff5-186b-44a1-869b-18d710f29409, digest iterations 193321 ># Updating LUKS header of size 1024 on device /dev/loop0 ># Key length 32, device size 204800 sectors, header size 2050 sectors. ># Reading LUKS header of size 1024 from device /dev/loop0 ># Key length 32, device size 204800 sectors, header size 2050 sectors. ># Adding new keyslot -1 using volume key. ># Selected keyslot 0. ># Calculating data for key slot 0 ># Running pbkdf2(sha256) benchmark. ># PBKDF benchmark: memory cost = 0, iterations = 1560380, threads = 0 (took 21 ms) ># PBKDF benchmark: memory cost = 0, iterations = 1497965, threads = 0 (took 350 ms) ># PBKDF benchmark: memory cost = 0, iterations = 1500108, threads = 0 (took 699 ms) ># Benchmark returns pbkdf2(sha256) 1500108 iterations, 0 memory, 0 threads (for 256-bits key). ># Key slot 0 use 3000216 password iterations. ># Using hash sha256 for AF in key slot 0, 4000 stripes ># Updating key slot 0 [0x1000] area. ># Userspace crypto wrapper cannot use aes-xts-plain64 (-95). ># Using dmcrypt to access keyslot area. ># Calculated device size is 250 sectors (RW), offset 8. ># DM-UUID is CRYPT-TEMP-temporary-cryptsetup-9437 ># Udev cookie 0xd4d2059 (semid 458754) created ># Udev cookie 0xd4d2059 (semid 458754) incremented to 1 ># Udev cookie 0xd4d2059 (semid 458754) incremented to 2 ># Udev cookie 0xd4d2059 (semid 458754) assigned to CREATE task(0) with flags DISABLE_SUBSYSTEM_RULES DISABLE_DISK_RULES DISABLE_OTHER_RULES DISABLE_LIBRARY_FALLBACK (0x2e) ># dm create temporary-cryptsetup-9437 CRYPT-TEMP-temporary-cryptsetup-9437 [ opencount flush ] [16384] (*1) ># dm reload temporary-cryptsetup-9437 [ opencount flush securedata ] [16384] (*1) ># dm resume temporary-cryptsetup-9437 [ opencount flush securedata ] [16384] (*1) ># temporary-cryptsetup-9437: Stacking NODE_ADD (254,0) 0:0 0600 [trust_udev] ># temporary-cryptsetup-9437: Stacking NODE_READ_AHEAD 256 (flags=1) ># Udev cookie 0xd4d2059 (semid 458754) decremented to 1 ># Udev cookie 0xd4d2059 (semid 458754) waiting for zero ># Udev cookie 0xd4d2059 (semid 458754) destroyed ># temporary-cryptsetup-9437: Skipping NODE_ADD (254,0) 0:0 0600 [trust_udev] ># temporary-cryptsetup-9437: Processing NODE_READ_AHEAD 256 (flags=1) ># temporary-cryptsetup-9437 (254:0): read ahead is 256 ># temporary-cryptsetup-9437: retaining kernel read ahead of 256 (requested 256) ># dm versions [ opencount flush ] [16384] (*1) ># dm versions [ opencount flush ] [16384] (*1) ># Udev cookie 0xd4dd349 (semid 491522) created ># Udev cookie 0xd4dd349 (semid 491522) incremented to 1 ># Udev cookie 0xd4dd349 (semid 491522) incremented to 2 ># Udev cookie 0xd4dd349 (semid 491522) assigned to REMOVE task(2) with flags DISABLE_LIBRARY_FALLBACK (0x20) ># dm remove temporary-cryptsetup-9437 [ opencount flush retryremove ] [16384] (*1) ># Udev cookie 0xd4dd349 (semid 491522) decremented to 0 ># Udev cookie 0xd4dd349 (semid 491522) waiting for zero ># Udev cookie 0xd4dd349 (semid 491522) destroyed ># Key slot 0 was enabled in LUKS header. ># Updating LUKS header of size 1024 on device /dev/loop0 ># Key length 32, device size 204800 sectors, header size 2050 sectors. ># Reading LUKS header of size 1024 from device /dev/loop0 ># Key length 32, device size 204800 sectors, header size 2050 sectors. ># Releasing crypt device /dev/loop0 context. ># Releasing device-mapper backend. ># Unlocking memory. >Command successful.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 661584
:
540136
| 540138