kernel-packages team mailing list archive
-
kernel-packages team
-
Mailing list archive
-
Message #69234
[Bug 1276739] Re: partman-crypto uses xts by default, yet xts.ko kernel module is not present in 3.2 (original-point-zero stack) crypto-modules-udeb
This bug appears to be a problem with Xubuntu AMD64 12.04.4 Alternate.
I have been prevented using this disk to rescue an encrypted LVM system
because, it says, "reload ioctl failed...failed to setup dm-crypt key
mapping for device... check that kernel supports aes-xts-plain64
cipher".
The system was setup using default Xubuntu installer options for
encrypted LVM (can't remember which version but it was recent and it
worked).
The rescue has become necessary because kernel -29 update failed due to
/root partition becoming full. Kernel update failure consisted of a disk
full error before the kernel extras image could be installed. USB
Keyboard therefore fails when system asks for encryption password.
The problem would be resolved for common users if the system detected
its problem and provided a 'Dummy's' option to resize the partition,
with an intelligent guess proffered as the new size.
Rescue of this situation is like venturing into a foggy swamp. Before
you even get to attempt the resize operation, the Xubuntu rescue disk is
not loaded with the same cipher that it had originally used to setup the
encrypted volume.
The DebianLive AMD64 7.5.0 Rescue CD failed as well. It seems to be
incapable of recognizing a non-US keyboard, which makes entering an
encryption password setup on an English keyboard quite unlikely (unless
its a Mickey Mouse password that uses only standard numbers and
letters). It is very unlikely a common user will detect this fact from
using the live CD. The experience of attempting this operation will
therefore be deeply frustrating and ultimately unsuccessful.
The solution now appears to be to keep downloading rescue disks until
one works.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1276739
Title:
partman-crypto uses xts by default, yet xts.ko kernel module is not
present in 3.2 (original-point-zero stack) crypto-modules-udeb
Status in “debian-installer” package in Ubuntu:
Invalid
Status in “linux” package in Ubuntu:
Invalid
Status in “partman-crypto” package in Ubuntu:
Invalid
Status in “debian-installer” source package in Precise:
Fix Released
Status in “linux” source package in Precise:
Fix Released
Status in “partman-crypto” source package in Precise:
Invalid
Bug description:
[Impact]
* Performing automatic encrypted LVM installation using Kubuntu and
Xubuntu 12.04.4 alternate installer images results in a failure to
configure encrypted volumes. Please either use manual partitioning to
create encrypted volumes with any non-default "IV algorithm" setting
or use 12.04.3 media to complete the installation.
[Error Message]
Configuration of encrypted volumes failed.
An error occurred while configuring encrypted volumes.
The configuration has been aborted.
[Cause of the bug]
* xts.ko kernel module is missing from 3.2 crypto-modules-udeb
[Working (older) media]
* Kubuntu
http://cdimages.ubuntu.com/kubuntu/releases/12.04.3/release/
* Xubuntu
http://cdimages.ubuntu.com/xubuntu/releases/12.04.3/release/
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/debian-installer/+bug/1276739/+subscriptions