Your message dated Sat, 13 Sep 2025 13:36:50 +0100 with message-id <CAMU1PDjebvQLG+Q2Q42vxJJzZHEmpagHih5tjS7DaB=0yy8...@mail.gmail.com> and subject line Close: gparted: fails resize on encrypted volumes has caused the Debian Bug report #946962, regarding gparted: fails resize on encrypted volumes to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [email protected] immediately.) -- 946962: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946962 Debian Bug Tracking System Contact [email protected] with problems
--- Begin Message ---Package: gparted Version: 0.32.0-2 Severity: normal Dear Maintainer, gparted fails at resizing encrypted volumes when the volume was opened without --disable-keyring, as cryptsetup resize then requires the passphrase but gparted does not provide it. background: current cryptsetup versions use the kernel keyring to store encryption keys, which means resizes cannot be done without entering the passphrase again, as the key cannot be recovered (at leats by normal means) from the kernel anymore. unfortunately, gparted opens encrypted volumes without --disable-keyring, and then fails at the resize step as no password is provided. as a workaround, one can manually luksOpen the encrypted volume with --disable-keyring before running gparted. Either gparted should open encrypted volumes in a way that is comaptible with itself, or, better yet, it should support giving a passphrase to cryptsetup resize - it should properly cache the passphrase entered when opening the encrypted volume. -- System Information: Debian Release: 10.2 APT prefers stable APT policy: (990, 'stable'), (500, 'unstable-debug'), (500, 'testing-debug'), (500, 'stable-updates'), (500, 'stable-debug'), (500, 'oldstable-updates'), (500, 'oldstable-debug'), (500, 'unstable'), (500, 'testing'), (500, 'oldstable'), (1, 'experimental-debug'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386, x32 Kernel: Linux 5.2.21-050221-generic (SMP w/8 CPU cores) Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE Locale: LANG=en_DK.UTF-8, LC_CTYPE=en_DK.UTF-8 (charmap=UTF-8), LANGUAGE=en_DK.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages gparted depends on: ii libatkmm-1.6-1v5 2.28.0-2 ii libc6 2.28-10 ii libgcc1 1:9.2.1-15 ii libglib2.0-0 2.58.3-2+deb10u2 ii libglibmm-2.4-1v5 2.58.0-2 ii libgtk2.0-0 2.24.32-3 ii libgtkmm-2.4-1v5 1:2.24.5-4 ii libpangomm-1.4-1v5 2.42.0-2 ii libparted-fs-resize0 3.2-25 ii libparted2 3.2-25 ii libsigc++-2.0-0v5 2.10.1-2 ii libstdc++6 8.3.0-6 ii libuuid1 2.33.1-0.1 gparted recommends no packages. Versions of packages gparted suggests: pn dmraid <none> ii dmsetup 2:1.02.155-3 ii dosfstools 4.1-2 ii e2fsprogs 1.45.4-1 ii gpart 1:0.3-6 pn jfsutils <none> ii kpartx 0.7.9-3 ii mtools 4.0.23-1 ii ntfs-3g 1:2017.3.23AR.3-3 ii reiser4progs 1.2.0-2 ii reiserfsprogs 1:3.6.27-3 ii udftools 2.1-1 ii xfsprogs 4.20.0-1 ii yelp 3.31.90-1 -- no debconf information
--- End Message ---
--- Begin Message ---Package: gparted Version: 1.3.1-1 This was fixed upstream in GParted 1.3.0 [1] by merge request [2]. [1] 3 May 2021: GParted 1.3.0 https://gparted.org/news.php?item=238 [2] GParted merge request !80 - Support resizing open LUKS2 encryption mappings by supplying the needed passphrase https://gitlab.gnome.org/GNOME/gparted/-/merge_requests/80 According to the package changelog, gparted (1.3.1-1) is the first packaged version after upstream GParted 1.3.0 release. Closing this bug. Thanks, Mike Fleetwood (GParted Developer)
--- End Message ---

