Crypto disk was not opened after Karmic kernel upgrade 2.6.31-16 -> 2.6.31-17

Bug #510745 reported by Jussi Eronen
12
This bug affects 2 people
Affects Status Importance Assigned to Milestone
linux (Ubuntu)
Expired
Undecided
Unassigned

Bug Description

Binary package hint: linux-headers-2.6.31-17

I updated the kernel of my Karmic installation today to 2.6.31-17, which resulted in a failure to decrypt crypted hard drive partitions. Entering the correct passphrase just prompted the error message "Bad passphrase or cryptsetup options?".

The crypto setup is a standard alternate install LUKS whole disk encryption. After booting the system from an installation cd and changing the default entry in /root/grub/grub.cnf back to kernel version 2.6.31-16, cryptsetup was able to decrypt the partitions again.

ProblemType: Bug
Architecture: i386
ArecordDevices:
 **** List of CAPTURE Hardware Devices ****
 card 0: Intel [HDA Intel], device 0: CONEXANT Analog [CONEXANT Analog]
   Subdevices: 1/1
   Subdevice #0: subdevice #0
AudioDevicesInUse:
 USER PID ACCESS COMMAND
 /dev/snd/controlC0: exec 1864 F.... pulseaudio
CRDA: Error: [Errno 2] No such file or directory
Card0.Amixer.info:
 Card hw:0 'Intel'/'HDA Intel at 0xf0920000 irq 17'
   Mixer name : 'Conexant CX20561 (Hermosa)'
   Components : 'HDA:14f15051,17aa211f,00100000'
   Controls : 14
   Simple ctrls : 7
Date: Thu Jan 21 18:28:16 2010
DistroRelease: Ubuntu 9.10
HibernationDevice: RESUME=UUID=ef264913-d621-4157-9258-ef27ef174691
MachineType: LENOVO 2776C1G
Package: linux-headers-2.6.31-17 2.6.31-17.54
PackageArchitecture: all
ProcCmdLine: BOOT_IMAGE=/vmlinuz-2.6.31-16-generic root=/dev/mapper/hostname-root ro quiet splash
ProcEnviron:
 LANG=en_US.UTF-8
 SHELL=/bin/bash
ProcVersionSignature: Ubuntu 2.6.31-16.53-generic
RelatedPackageVersions:
 linux-backports-modules-2.6.31-16-generic N/A
 linux-firmware 1.25
SourcePackage: linux
Uname: Linux 2.6.31-16-generic i686
dmi.bios.date: 08/21/2009
dmi.bios.vendor: LENOVO
dmi.bios.version: 6EET44WW (3.04 )
dmi.board.name: 2776C1G
dmi.board.vendor: LENOVO
dmi.board.version: Not Available
dmi.chassis.asset.tag: No Asset Information
dmi.chassis.type: 10
dmi.chassis.vendor: LENOVO
dmi.chassis.version: Not Available
dmi.modalias: dmi:bvnLENOVO:bvr6EET44WW(3.04):bd08/21/2009:svnLENOVO:pn2776C1G:pvrThinkPadX301:rvnLENOVO:rn2776C1G:rvrNotAvailable:cvnLENOVO:ct10:cvrNotAvailable:
dmi.product.name: 2776C1G
dmi.product.version: ThinkPad X301
dmi.sys.vendor: LENOVO

Revision history for this message
Jussi Eronen (exec-iki) wrote :
Revision history for this message
Jussi Eronen (exec-iki) wrote :

Still the same effect after upgrading to -19. Downgrading to -16 helped again.

Revision history for this message
Jeremy Foshee (jeremyfoshee) wrote :

Hi Jussi,

This bug was reported a while ago and there hasn't been any activity in it recently. We were wondering if this is still an issue? Can you try with the latest development release of Ubuntu? ISO CD images are available from http://cdimage.ubuntu.com/releases/ .

If it remains an issue, could you run the following command from a Terminal (Applications->Accessories->Terminal). It will automatically gather and attach updated debug information to this report.

apport-collect -p linux 510745

Also, if you could test the latest upstream kernel available that would be great. It will allow additional upstream developers to examine the issue. Refer to https://wiki.ubuntu.com/KernelMainlineBuilds . Once you've tested the upstream kernel, please remove the 'needs-upstream-testing' tag. This can be done by clicking on the yellow pencil icon next to the tag located at the bottom of the bug description and deleting the 'needs-upstream-testing' text. Please let us know your results.

Thanks in advance.

    [This is an automated message. Apologies if it has reached you inappropriately; please just reply to this message indicating so.]

tags: added: needs-kernel-logs
tags: added: needs-upstream-testing
tags: added: kj-triage
Changed in linux (Ubuntu):
status: New → Incomplete
Revision history for this message
Jeremy Foshee (jeremyfoshee) wrote :

This bug report was marked as Incomplete and has not had any updated comments for quite some time. As a result this bug is being closed. Please reopen if this is still an issue in the current Ubuntu release http://www.ubuntu.com/getubuntu/download . Also, please be sure to provide any requested information that may have been missing. To reopen the bug, click on the current status under the Status column and change the status back to "New". Thanks.

[This is an automated message. Apologies if it has reached you inappropriately; please just reply to this message indicating so.]

tags: added: kj-expired
Changed in linux (Ubuntu):
status: Incomplete → Expired
Revision history for this message
Jussi Eronen (exec-iki) wrote :

Upgraded the system to 10.04. The bug is still present. I don't think there will be anything useful in the kernel logs as the bug occurs before the root filesystem is decrypted.

Revision history for this message
Jussi Eronen (exec-iki) wrote :

Still present on fully patched Ubuntu 10.04

Changed in linux (Ubuntu):
status: Expired → Incomplete
tags: removed: needs-upstream-testing
tags: removed: kj-expired
Revision history for this message
Jeremy Foshee (jeremyfoshee) wrote :

This bug report was marked as Incomplete and has not had any updated comments for quite some time. As a result this bug is being closed. Please reopen if this is still an issue in the current Ubuntu development release http://cdimage.ubuntu.com/daily-live/current/ . Also, please be sure to provide any requested information that may have been missing. To reopen the bug, click on the current status under the Status column and change the status back to "New". Thanks.

[This is an automated message. Apologies if it has reached you inappropriately; please just reply to this message indicating so.]

tags: added: kj-expired
Changed in linux (Ubuntu):
status: Incomplete → Expired
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.