Your message dated Thu, 15 Oct 2009 19:01:42 +0000 with message-id <[email protected]> and subject line Bug#549870: fixed in cryptsetup 2:1.1.0~rc2-1 has caused the Debian Bug report #549870, regarding cryptsetup: Command failed: /dev/vg0/services_data_backup_snapshot is not a LUKS partition to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [email protected] immediately.) -- 549870: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=549870 Debian Bug Tracking System Contact [email protected] with problems
--- Begin Message ---Package: cryptsetup Version: 2:1.0.7-2 Severity: normal cryptsetup luksOpen will no longer open my snapshot devices. I see : root; lvcreate --size 256M --snapshot --name services_data_backup_snapshot /dev/vg0/services_data Logical volume "services_data_backup_snapshot" created : root; cryptsetup luksOpen /dev/vg0/services_data_backup_snapshot services_data_backup_unlocked --non-exclusive --readonly --key-file=/tmp/xxx Command failed: /dev/vg0/services_data_backup_snapshot is not a LUKS partition : root; lvremove --force /dev/vg0/services_data_backup_snapshot Logical volume "services_data_backup_snapshot" successfully removed : root; cryptsetup luksOpen /dev/vg0/services_data FOO --key-file=/tmp/xxx --non-exclusive --readonly key slot 1 unlocked. Command successful. : root; cryptsetup remove FOO I make the snapshot and luksOpen it in my backup script which I haven't changed for a while. What I did do was an apt-get upgrade. I have two similar partitions that I backup in the same way and get the same error. One of these partitions may be a copy of the other. If I can luksOpen the partition why can I not luksOpen the snapshot? cryptsetup 2:1.0.6-7 doesnt work either : root; apt-get -t stable --reinstall install cryptsetup/stable dpkg: warning: downgrading cryptsetup from 2:1.0.7-2 to 2:1.0.6-7. Setting up cryptsetup (2:1.0.6-7) ... : root; lvcreate --size 256M --snapshot --name services_data_backup_snapshot /dev/vg0/services_data Logical volume "services_data_backup_snapshot" created : root; cryptsetup luksOpen /dev/vg0/services_data_backup_snapshot services_data_backup_unlocked --key-file=/tmp/xxx Command failed: Can not access device : root; ls -lL /dev/vg0/services_data_backup_snapshot brw-rw---- 1 root disk 254, 54 2009-10-05 23:40 /dev/vg0/services_data_backup_snapshot wierd Stuart -- Package-specific info: -- /proc/cmdline root=/dev/mapper/vg0-root32 ro -- /etc/crypttab archive /dev/mapper/vg0-archive none luks,noauto swap /dev/sda3 /dev/random swap,cipher=aes-cbc-essiv:sha256,size=128,hash=sha256,noearly -- /etc/fstab # /etc/fstab: static file system information. # # <file system> <mount point> <type> <options> <dump> <pass> LABEL=root32 / ext3 defaults 0 1 LABEL=boot32 /boot ext3 nodev,nosuid 0 2 UUID=d905e4c9-5920-499b-811d-3bef799a191c /disks/boot64 ext3 ro,nodev,nosuid 0 2 /dev/mapper/vg0-root64 /disks/root64 ext3 ro,nosuid,nodev 0 2 /dev/mapper/swap none swap sw,pri=20 /dev/mapper/var32 /var auto nodev,nosuid 0 2 # proc /proc proc defaults tmpfs /tmp tmpfs defaults tmpfs /var/tmp tmpfs size=96m # /dev/fd0 /floppy vfat user,noauto /home/stuart/tmp/image.iso /disks/image iso9660 loop,ro,user,noauto /tmp/image.iso /disks/tmpimage iso9660 loop,ro,user,noauto /dev/dvd-backups /dvd-backups iso9660 auto,nosuid,nodev /dev/mapper/vg0-email_root1 /disks/email_root1 ext3 noauto,nosuid,nodev,ro /dev/mapper/vg0-email_root_snapshot1 /disks/email_root_snapshot1 ext3 noauto,nosuid,nodev,ro /dev/mapper/email_ROOT1 /disks/email_ROOT1 ext3 noauto,nosuid,nodev,ro /dev/mapper/email_ROOT_snapshot1 /disks/email_ROOT_snapshot1 ext3 noauto,nosuid,nodev,ro /dev/mapper/vg0-asterisk_root1 /disks/asterisk_root1 ext3 noauto,nosuid,nodev,ro /dev/mapper/vg0-asterisk_root_snapshot1 /disks/asterisk_root_snapshot1 ext3 noauto,nosuid,nodev,ro /dev/mapper/asterisk_ROOT1 /disks/asterisk_ROOT1 ext3 noauto,nosuid,nodev,ro /dev/mapper/asterisk_ROOT_snapshot1 /disks/asterisk_ROOT_snapshot1 ext3 noauto,nosuid,nodev,ro /dev/mapper/services_ROOT1 /disks/services_ROOT1 ext3 noauto,nosuid,nodev,ro /dev/mapper/services_ROOT_snapshot1 /disks/services_ROOT_snapshot1 ext3 noauto,nosuid,nodev,ro /dev/mapper/vg0-cleartext /disks/cleartext auto nodev,nosuid -- lsmod Module Size Used by sco 8832 2 bnep 10860 2 rfcomm 30368 4 l2cap 18120 16 bnep,rfcomm tun 11208 6 binfmt_misc 7120 1 kvm_intel 39744 9 kvm 138608 1 kvm_intel acpi_cpufreq 7640 0 cpufreq_conservative 6256 0 cpufreq_userspace 2768 0 cpufreq_stats 3520 0 cpufreq_powersave 1292 0 bridge 39968 0 stp 2112 1 bridge ip6t_LOG 4604 1 nf_conntrack_ipv6 11616 2 ipt_REJECT 2496 1 xt_limit 2020 10 nf_conntrack_ipv4 11928 3 nf_defrag_ipv4 1664 1 nf_conntrack_ipv4 xt_state 1768 5 nf_conntrack 57924 3 nf_conntrack_ipv6,nf_conntrack_ipv4,xt_state xt_comment 1280 2 ts_bm 1964 1 xt_string 1748 1 xt_length 1476 4 xt_tcpudp 2508 23 xt_physdev 1980 13 ipt_LOG 4540 3 ip6table_filter 3084 1 ip6_tables 11316 2 ip6t_LOG,ip6table_filter iptable_filter 2956 1 ip_tables 10188 1 iptable_filter x_tables 14108 12 ip6t_LOG,ipt_REJECT,xt_limit,xt_state,xt_comment,xt_string,xt_length,xt_tcpudp,xt_physdev,ipt_LOG,ip6_tables,ip_tables ext4 197196 1 jbd2 50156 1 ext4 crc16 1760 1 ext4 isofs 27592 1 fuse 47752 1 nls_utf8 1488 0 nls_cp437 5320 0 vfat 8628 0 fat 41452 1 vfat nls_base 6416 5 isofs,nls_utf8,nls_cp437,vfat,fat ext2 54120 0 usb_storage 48472 0 usbhid 31568 0 hid 34528 1 usbhid snd_usb_audio 72088 0 snd_usb_lib 13528 1 snd_usb_audio sha256_generic 11216 0 aes_i586 8092 34 aes_generic 27436 1 aes_i586 cbc 3012 17 dm_crypt 11092 17 dm_snapshot 21604 15 dm_mirror 12580 0 dm_region_hash 10668 1 dm_mirror dm_log 8464 2 dm_mirror,dm_region_hash coretemp 5176 0 it87 17712 0 hwmon_vid 2480 1 it87 snd_hda_codec_realtek 178472 1 snd_hda_intel 22192 0 snd_hda_codec 63580 2 snd_hda_codec_realtek,snd_hda_intel snd_hwdep 6120 2 snd_usb_audio,snd_hda_codec snd_mixer_oss 12368 0 snd_pcm 62420 3 snd_usb_audio,snd_hda_intel,snd_hda_codec snd_seq_midi 5688 0 snd_rawmidi 18596 2 snd_usb_lib,snd_seq_midi snd_seq_midi_event 6212 1 snd_seq_midi snd_seq 42436 2 snd_seq_midi,snd_seq_midi_event snd_timer 17436 2 snd_pcm,snd_seq snd_seq_device 6136 3 snd_seq_midi,snd_rawmidi,snd_seq pcspkr 2104 0 btusb 10276 2 snd 49060 11 snd_usb_audio,snd_hda_codec_realtek,snd_hda_intel,snd_hda_codec,snd_hwdep,snd_mixer_oss,snd_pcm,snd_rawmidi,snd_seq,snd_timer,snd_seq_device i2c_i801 8564 0 serio_raw 4560 0 i2c_core 20844 1 i2c_i801 bluetooth 47060 9 sco,bnep,rfcomm,l2cap,btusb evdev 8028 17 processor 34504 1 acpi_cpufreq soundcore 6184 1 snd button 5060 0 parport_pc 22420 0 parport 31144 1 parport_pc snd_page_alloc 8180 2 snd_hda_intel,snd_pcm ext3 107172 11 jbd 41036 1 ext3 mbcache 6924 3 ext4,ext2,ext3 dm_mod 49992 138 dm_crypt,dm_snapshot,dm_mirror,dm_log sg 20296 0 ide_cd_mod 24484 1 sd_mod 28748 7 crc_t10dif 1632 1 sd_mod sr_mod 13264 1 cdrom 30316 2 ide_cd_mod,sr_mod ata_generic 4340 0 ide_pci_generic 3632 0 pdc202xx_new 4920 1 ide_core 88100 3 ide_cd_mod,ide_pci_generic,pdc202xx_new uhci_hcd 19132 0 pata_jmicron 2812 2 r8169 27692 0 ahci 30068 4 libata 150904 3 ata_generic,pata_jmicron,ahci scsi_mod 131800 5 usb_storage,sg,sd_mod,sr_mod,libata mii 4664 1 r8169 ehci_hcd 29680 0 usbcore 126004 9 usb_storage,usbhid,snd_usb_audio,snd_usb_lib,btusb,uhci_hcd,ehci_hcd intel_agp 22900 0 agpgart 30836 1 intel_agp thermal 12580 0 fan 4044 0 thermal_sys 13140 3 processor,thermal,fan -- System Information: Debian Release: squeeze/sid APT prefers unstable APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable'), (1, 'experimental') Architecture: i386 (i686) Kernel: Linux 2.6.30-1-686 (SMP w/2 CPU cores) Locale: LANG=en_AU.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages cryptsetup depends on: ii dmsetup 2:1.02.38-1 The Linux Kernel Device Mapper use ii libc6 2.9-27 GNU C Library: Shared libraries ii libdevmapper1.02.1 2:1.02.38-1 The Linux Kernel Device Mapper use ii libpopt0 1.14-4 lib for parsing cmdline parameters ii libuuid1 2.16.1-3 Universally Unique ID library cryptsetup recommends no packages. Versions of packages cryptsetup suggests: ii dosfstools 3.0.5-1 utilities for making and checking ii initramfs-tools [linux-initra 0.93.4 tools for generating an initramfs ii udev 146-3 /dev/ and hotplug management daemo -- debconf-show failed
--- End Message ---
--- Begin Message ---Source: cryptsetup Source-Version: 2:1.1.0~rc2-1 We believe that the bug you reported is fixed in the latest version of cryptsetup, which is due to be installed in the Debian FTP archive: cryptsetup-udeb_1.1.0~rc2-1_amd64.udeb to pool/main/c/cryptsetup/cryptsetup-udeb_1.1.0~rc2-1_amd64.udeb cryptsetup_1.1.0~rc2-1.diff.gz to pool/main/c/cryptsetup/cryptsetup_1.1.0~rc2-1.diff.gz cryptsetup_1.1.0~rc2-1.dsc to pool/main/c/cryptsetup/cryptsetup_1.1.0~rc2-1.dsc cryptsetup_1.1.0~rc2-1_amd64.deb to pool/main/c/cryptsetup/cryptsetup_1.1.0~rc2-1_amd64.deb cryptsetup_1.1.0~rc2.orig.tar.gz to pool/main/c/cryptsetup/cryptsetup_1.1.0~rc2.orig.tar.gz libcryptsetup-dev_1.1.0~rc2-1_amd64.deb to pool/main/c/cryptsetup/libcryptsetup-dev_1.1.0~rc2-1_amd64.deb libcryptsetup1_1.1.0~rc2-1_amd64.deb to pool/main/c/cryptsetup/libcryptsetup1_1.1.0~rc2-1_amd64.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [email protected], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Jonas Meurer <[email protected]> (supplier of updated cryptsetup package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [email protected]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.8 Date: Thu, 15 Oct 2009 19:26:14 +0200 Source: cryptsetup Binary: cryptsetup cryptsetup-udeb libcryptsetup1 libcryptsetup-dev Architecture: source amd64 Version: 2:1.1.0~rc2-1 Distribution: unstable Urgency: low Maintainer: Debian Cryptsetup Team <[email protected]> Changed-By: Jonas Meurer <[email protected]> Description: cryptsetup - configures encrypted block devices cryptsetup-udeb - configures encrypted block devices (udeb) libcryptsetup-dev - libcryptsetup development files libcryptsetup1 - libcryptsetup shared library Closes: 387159 475838 480157 532579 533643 536415 537385 541248 541805 544487 544773 547597 548356 548988 549870 Changes: cryptsetup (2:1.1.0~rc2-1) unstable; urgency=low . * new upstream release candidate (1.1.0-rc2), highlights include: - new libcryptsetup API (documented in libcryptsetup.h) - luksHeaderBackup and luksHeaderRestore commands (closes: #533643) - use libgcrypt, enables all gcrypt hash algorithms for LUKS through -h luksFormat option (closes: #387159, #537385) - new --master-key-file option for luksFormat and luksAddKey - use dm-uuid for all crypt devices, contains device type and name now (closes: #548988, #549870) - command successful messages moved to verbose level (closes: #541805) - several code changes to improve speed of luksOpen (closes: #536415) - luksSuspend and luksResume commands * remove unneeded patches 03_read_rework and 04_no_stderr_success, update 02_manpage for new upstream release candidate. * update patch to comply with DEP-3 (http://dep.debian.net/deps/dep3/) * fix initramfs/cryptroot-hook to support setups where /dev/mapper/ contains symlinks to devices at /dev/dm-*. the lvm2/device-mapper packages had defaults changed to this temporary. it has been fixed in a subsequent upload of lvm2 in the meantime, but still it's not a bad idea to be prepared for such setups in the future. that way cryproot now supports /dev/dm-* devices as well. (closes: #532579, #544487, #544773) * fix initscript dependencies both for cryptdisks and cryptdisks-early. thanks to Petter Reinholdtsen for bugreport and patch. (closes: #548356) * finally change default behaviour of initscripts/cryptroot-hook to include all available crypto modules into the initramfs. this change should fix any problems with cryto modules missing from the initramfs. announce the change in NEWS.Debian. (closes: #547597) * add error messages to lvm detecting code in initramfs/cryptroot-script in order to make debugging easier. (closes: #541248) * implement detection of devices which are required by decrypt_derived keyscript in initscripts/cryptroot-hook. that way setups where encrypted swap has the key derived from non-root partitions should support suspend/ resume as well. (closes: #475838) * remove outdated documentation from the source package: CryptoRoot.HowTo, CheckSystem.Doc * mention in README.initramfs that busybox is required for cryptroot to work * stop creating /etc/keys in postinst maintainer script. * update build system to include library files again: (closes: #480157) - split into three packages: cryptsetup, libcryptsetup1, libcryptsetup-dev - rename preinst to cryptsetup.preinst, copy code to create /etc/crypttab skeleton into cryptsetup-udeb.preinst. - build with --enable-shared and --enable-static for libcryptsetup.a - create debian/libcryptsetup1.symbols with help of dpkg-gensymbols * add debian/cryptsetup.lintian-override for two false positives * raise build-depends on debhelper and debian/compat for that reason * update README.remote to work with latest dropbear package. thanks to [email protected]. * make all crypttab fields available to keyscripts as environment variables. thanks to ludwig nussel from suse for idea and implmentation. document this in crypttab(5) manpage. impelement the same environment variables in initramfs cryptroot script. * fix formatting errors in crypttab(5) manpage. Checksums-Sha1: f03c40ca6979ac50352d83f8f87b4a10f0566599 1551 cryptsetup_1.1.0~rc2-1.dsc eeed2f2fd1557b72997211108dc9ccb0aedc66a1 511212 cryptsetup_1.1.0~rc2.orig.tar.gz 835bea9710d55bb09c1aee454ccbad07b168bb13 67590 cryptsetup_1.1.0~rc2-1.diff.gz 873a77d4e747b202506e84bb7eb74ff970e02bd8 365122 cryptsetup_1.1.0~rc2-1_amd64.deb 25cb2f778d6dee38adf8777bbe9b04c1d2f30bc5 289534 cryptsetup-udeb_1.1.0~rc2-1_amd64.udeb f00378cb8adf5422f256ee621b3593071e15306a 69338 libcryptsetup1_1.1.0~rc2-1_amd64.deb e45cddaf4454e9869d8ca480e2e9408191df9f8b 79256 libcryptsetup-dev_1.1.0~rc2-1_amd64.deb Checksums-Sha256: be6a2bd497a4c4b5158fe159664236330532388361bdbf7b4728f18e5c1e78af 1551 cryptsetup_1.1.0~rc2-1.dsc b3adc7f48eb1867752a4da7f7682cde8ca5bc8b098f47b7ed6475f4abe67da8a 511212 cryptsetup_1.1.0~rc2.orig.tar.gz f7219582a123f2372ecf8c61ff67b004821b4587321926bb6ebc657833b7f36b 67590 cryptsetup_1.1.0~rc2-1.diff.gz 2a958451404f247526a1fd5f23643b8c1dba5a17ee2502da91431dbbc7f241a8 365122 cryptsetup_1.1.0~rc2-1_amd64.deb 7acf83d69d3d4e8ab4a55eaba70d1ea5c9dfbb27ca8e8862f45319ae80ccde6e 289534 cryptsetup-udeb_1.1.0~rc2-1_amd64.udeb 7fd47d59904184c4991cfaa584e68a86c917039f94d458a864c50024e75f0fce 69338 libcryptsetup1_1.1.0~rc2-1_amd64.deb 1b2c9fc1b74b4012110d249ad50111ae08297ebdf100c928d6232bcbe6ccf1ec 79256 libcryptsetup-dev_1.1.0~rc2-1_amd64.deb Files: 35e0605fa09f3a887a68c4cf613d5bd9 1551 admin optional cryptsetup_1.1.0~rc2-1.dsc 4a5e5c8b04f8ec54ebb75b4b8ea3dff6 511212 admin optional cryptsetup_1.1.0~rc2.orig.tar.gz c3405f8743465deb0314559bd0a2efaa 67590 admin optional cryptsetup_1.1.0~rc2-1.diff.gz 4b818ae254470477e6b3bada3a178443 365122 admin optional cryptsetup_1.1.0~rc2-1_amd64.deb 236c8fb841d1ef9e6490807b1577a7ab 289534 debian-installer optional cryptsetup-udeb_1.1.0~rc2-1_amd64.udeb 2cf2d093b58399e3c039e3edb3252899 69338 libs optional libcryptsetup1_1.1.0~rc2-1_amd64.deb 77053048c938ce9a68bb9f1054656190 79256 libdevel optional libcryptsetup-dev_1.1.0~rc2-1_amd64.deb Package-Type: udeb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iEYEARECAAYFAkrXW+UACgkQd6lUs+JfIQKh5gCdFa7c6GqY5bELpuomVEyNP0Da Pa0An3ROTpNYuOVy/hklzAgNLNMlucfs =g9Dw -----END PGP SIGNATURE-----
--- End Message ---

