# cryptsetup 1.6.3 processing "cryptsetup --debug -d /dev/mapper/keyfile luksOpen /dev/sdb4 rpool-crypt1" # Running command open. # Locking memory. # Installing SIGINT/SIGTERM handler. # Unblocking interruption on signal. # Allocating crypt device /dev/sdb4 context. # Trying to open and read device /dev/sdb4. # Initialising device-mapper backend library. # Trying to load LUKS1 crypt type from device /dev/sdb4. # Crypto backend (gcrypt 1.5.3) initialized. # Reading LUKS header of size 1024 from device /dev/sdb4 # Key length 32, device size 780322959 sectors, header size 2050 sectors. # Timeout set to 0 miliseconds. # Password retry count set to 3. # Password verification disabled. # Iteration time set to 1000 miliseconds. # Password retry count set to 1. # Activating volume rpool-crypt1 [keyslot -1] using keyfile /dev/mapper/keyfile. # Detected kernel Linux 3.2.41-2 x86_64. # dm version OF [16384] (*1) # dm versions OF [16384] (*1) # Detected dm-crypt version 1.11.1, dm-ioctl version 4.22.0. # Device-mapper backend running with UDEV support enabled. # dm status rpool-crypt1 OF [16384] (*1) # File descriptor passphrase entry requested. # Trying to open key slot 0 [ACTIVE_LAST]. # Reading key slot 0 area. # Calculated device size is 250 sectors (RW), offset 8. # DM-UUID is CRYPT-TEMP-temporary-cryptsetup-1652 # Udev cookie 0xd4de9bd (semid 524288) created # Udev cookie 0xd4de9bd (semid 524288) incremented to 1 # Udev cookie 0xd4de9bd (semid 524288) incremented to 2 # Udev cookie 0xd4de9bd (semid 524288) assigned to CREATE task(0) with flags DISABLE_SUBSYSTEM_RULES DISABLE_DISK_RULES DISABLE_OTHER_RULES (0xe) # dm create temporary-cryptsetup-1652 CRYPT-TEMP-temporary-cryptsetup-1652 OF [16384] (*1) # dm reload temporary-cryptsetup-1652 OFRW [16384] (*1) # dm resume temporary-cryptsetup-1652 OFRW [16384] (*1) # temporary-cryptsetup-1652: Stacking NODE_ADD (254,2) 0:0 0600 [verify_udev] # temporary-cryptsetup-1652: Stacking NODE_READ_AHEAD 256 (flags=1) # Udev cookie 0xd4de9bd (semid 524288) decremented to 1 # Udev cookie 0xd4de9bd (semid 524288) waiting for zero # Udev cookie 0xd4de9bd (semid 524288) destroyed # temporary-cryptsetup-1652: Processing NODE_ADD (254,2) 0:0 0600 [verify_udev] # temporary-cryptsetup-1652: Processing NODE_READ_AHEAD 256 (flags=1) # temporary-cryptsetup-1652 (254:2): read ahead is 256 # temporary-cryptsetup-1652 (254:2): Setting read ahead to 256 # Udev cookie 0xd4deb6c (semid 557056) created # Udev cookie 0xd4deb6c (semid 557056) incremented to 1 # Udev cookie 0xd4deb6c (semid 557056) incremented to 2 # Udev cookie 0xd4deb6c (semid 557056) assigned to REMOVE task(2) with flags (0x0) # dm remove temporary-cryptsetup-1652 OFT [16384] (*1) # temporary-cryptsetup-1652: Stacking NODE_DEL [verify_udev] # Udev cookie 0xd4deb6c (semid 557056) decremented to 1 # Udev cookie 0xd4deb6c (semid 557056) waiting for zero # Udev cookie 0xd4deb6c (semid 557056) destroyed # temporary-cryptsetup-1652: Processing NODE_DEL [verify_udev] Key slot 0 unlocked. # Calculated device size is 780318863 sectors (RW), offset 4096. # DM-UUID is CRYPT-LUKS1-9257a147b9714920b0ff79e0a14e110e-rpool-crypt1 # Udev cookie 0xd4d4f72 (semid 589824) created # Udev cookie 0xd4d4f72 (semid 589824) incremented to 1 # Udev cookie 0xd4d4f72 (semid 589824) incremented to 2 # Udev cookie 0xd4d4f72 (semid 589824) assigned to CREATE task(0) with flags (0x0) # dm create rpool-crypt1 CRYPT-LUKS1-9257a147b9714920b0ff79e0a14e110e-rpool-crypt1 OF [16384] (*1) # dm reload rpool-crypt1 OFW [16384] (*1) # dm resume rpool-crypt1 OFW [16384] (*1) # rpool-crypt1: Stacking NODE_ADD (254,2) 0:0 0600 [verify_udev] # rpool-crypt1: Stacking NODE_READ_AHEAD 256 (flags=1) # Udev cookie 0xd4d4f72 (semid 589824) decremented to 1 # Udev cookie 0xd4d4f72 (semid 589824) waiting for zero # Udev cookie 0xd4d4f72 (semid 589824) destroyed # rpool-crypt1: Processing NODE_ADD (254,2) 0:0 0600 [verify_udev] # rpool-crypt1: Processing NODE_READ_AHEAD 256 (flags=1) # rpool-crypt1 (254:2): read ahead is 256 # rpool-crypt1 (254:2): Setting read ahead to 256 # Releasing crypt device /dev/sdb4 context. # Releasing device-mapper backend. # Unlocking memory. Command successful.