OK,

I have debugged this down and got big steps further in identifying the
problem.


An important step for debugging was to learn how to debug systemd. 

    http://freedesktop.org/wiki/Software/systemd/Debugging/

was quite helpful, that

   systemctl enable debug-shell.service

helps a lot. After that, one can get a root shell when the systemd boot
process is hanging.


I have identified *two*  problems, both in 
/lib/systemd/systemd-cryptsetup



First problem:

The system boot procedure hangs because the process

    /lib/systemd/systemd-cryptsetup attach sda2_crypt /dev/disk/by-id
/ata-SanDisk_SDSSDHII480G_**********-part2 none  luks,swap,discard

hangs. It waits for password input, but for some reason it's prompt and
input don't make it their way to the boot console or boot splash prompt.
There's a problem with the procedure for requesting a password.

Killing that process from the debug console makes the boot process
continue immediately (of course without working swap).


Once knowing that this is the process causing trouble, debugging get's much 
easier, since it is not required anymore to try this within a boot process. You 
can use a running machine with any test partition for easy debugging. 

BTW: systemd does not use /etc/crypttab directly, but converts the
contents of /etc/crypttab to dynamically created units first, which can
be found under /run/systemd. It shows


ExecStart=/lib/systemd/systemd-cryptsetup attach 'sda2_crypt' 
'/dev/disk/by-id/ata-SanDisk_SDSSDHII480G_**********-part2' 'none' 
'luks,swap,discard'
ExecStop=/lib/systemd/systemd-cryptsetup detach 'sda2_crypt'
ExecStartPost=/sbin/mkswap '/dev/mapper/sda2_crypt'


So one knows what happens right here. 


You can easily call the given command from anywhere as root with any partition, 
without the need to edit /etc/crypttab, because it's all command line 
parameters here. Makes testing pretty easy now. 



Second problem: 


That damned systemd-cryptsetup ignores luks (or is unable to cope with modern 
luks settings). 

That's what the dmsetup looks like for my root partition setup in the
initramfs:

0 903712768 crypt aes-xts-plain64
00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
0 8:3 4096 1 allow_discards


This looks good, because it's the same crypt-parameters (aes-xts) as I used 
when creating the luks partition, and it uses an offset of 4096, allowing the 
luks header to remain untouched. 


But after running that systemd-cryptsetup for the sda2 partition (even
after freshly partitioning it with cryptsetup), dmtable shows that:


0 32616448 crypt aes-cbc-essiv:sha256 
0000000000000000000000000000000000000000000000000000000000000000 0 8:2 0 1 
allow_discards


which contains *two* wrong settings:

- it's the wrong cipher

- it's an offset of 0, which overwrites the luks header. That's why I am
seeing garbage again and again.




So it turns out that systemd-cryptsetup is tripple-buggy:

- Password dialog not working in boot process, neither in splash or non-
splash mode (that's why boot process hangs)

- wrong cipher

- no offset, thus overwriting the luks header.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1506139

Title:
  15.10beta crashes encrypted swap partition

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1506139/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to