LOGGING NOW + PATH=/sbin:/bin + TABFILE=/etc/crypttab + CRYPTDISKS_ENABLE=Yes + [ -x /sbin/cryptsetup ] + [ -f /etc/crypttab ] + . /lib/lsb/init-functions + FANCYTTY= + [ -e /etc/lsb-base-logging.sh ] + . /etc/lsb-base-logging.sh + [ -r /etc/default/cryptdisks ] + . /etc/default/cryptdisks + CRYPTDISKS_ENABLE=Yes + CRYPTDISKS_MOUNT= + CRYPTDISKS_CHECK=blkid + CRYPTDISKS_PRECHECK= + MOUNT= + LOUD= + local dst src key opts result + modprobe -qb dm-mod + modprobe -qb dm-crypt + dmsetup mknodes + log_action_begin_msg Starting init crypto disks + log_daemon_msg Starting init crypto disks... + [ -z Starting init crypto disks... ] + log_use_usplash + [ n = y ] + type usplash_write + log_use_fancy_output + TPUT=/usr/bin/tput + EXPR=/usr/bin/expr + [ -t 1 ] + FANCYTTY=0 + false + echo * Starting init crypto disks... * Starting init crypto disks... + COL= + mount_fs + local point + MOUNTED= + egrep -v ^[[:space:]]*(#|$) /etc/crypttab + read dst src key opts + handle_crypttab_line_start sda2_crypt UUID=851db151-043d-46fd-9632-626d6f57bb86 none luks + dst=sda2_crypt + src=UUID=851db151-043d-46fd-9632-626d6f57bb86 + key=none + opts=luks + [ -z sda2_crypt ] + [ -z UUID=851db151-043d-46fd-9632-626d6f57bb86 ] + [ -z none ] + [ -z luks ] + [ 851db151-043d-46fd-9632-626d6f57bb86 != UUID=851db151-043d-46fd-9632-626d6f57bb86 ] + src=/dev/disk/by-uuid/851db151-043d-46fd-9632-626d6f57bb86 + parse_opts luks + local opts opt IFS PARAM VALUE + echo -n luks + sed s/ *#.*// + opts=luks + PARAMS= + CHECK= + CHECKARGS= + PRECHECK= + TRIES=3 + TMPFS= + MAKESWAP= + USELUKS= + KEYSCRIPT= + IGNORE= + CRYPTTAB_OPTIONS= + IFS=, + echo luks + sed s/=.*// + PARAM=luks + echo luks + sed /=/!d;s/^.*=// + VALUE= + USELUKS=yes + CRYPTTAB_OPTIONS= luks + [ -z ] + VALUE=yes + eval export CRYPTTAB_OPTION_luks="yes" + export CRYPTTAB_OPTION_luks=yes + export CRYPTTAB_OPTIONS + return 0 + [ = yes ] + check_key + local GMODE OMODE OWNER GROUP + [ -n ] + [ -z none ] + [ none = none ] + key= + return 0 + lo_setup + [ ! -f /dev/disk/by-uuid/851db151-043d-46fd-9632-626d6f57bb86 ] + return 0 + export CRYPTTAB_NAME=sda2_crypt + export CRYPTTAB_SOURCE=/dev/disk/by-uuid/851db151-043d-46fd-9632-626d6f57bb86 + export CRYPTTAB_KEY= + [ ! -r /dev/disk/by-uuid/851db151-043d-46fd-9632-626d6f57bb86 ] + [ -b /dev/mapper/sda2_crypt_unformatted ] + [ -b /dev/mapper/sda2_crypt ] + log_action_msg sda2_crypt (starting).. + log_use_usplash + [ n = y ] + type usplash_write + echo * sda2_crypt (starting).. * sda2_crypt (starting).. + result=ok + [ yes = yes ] + do_luks + local tried keyscriptarg + tried=0 + keyscriptarg= + cryptsetup isLuks /dev/disk/by-uuid/851db151-043d-46fd-9632-626d6f57bb86 + [ -n ] + [ -z ] + keyscriptarg=Unlocking the disk /dev/disk/by-uuid/851db151-043d-46fd-9632-626d6f57bb86 (sda2_crypt)\nEnter passphrase: + key=- + [ -x /bin/plymouth ] + plymouth --ping + KEYSCRIPT=plymouth ask-for-password --prompt + echo -e Unlocking the disk /dev/disk/by-uuid/851db151-043d-46fd-9632-626d6f57bb86 (sda2_crypt)\nEnter passphrase: + keyscriptarg=-e Unlocking the disk /dev/disk/by-uuid/851db151-043d-46fd-9632-626d6f57bb86 (sda2_crypt) Enter passphrase: + PARAMS= --key-file=- + [ 0 -lt 3 ] + [ -n plymouth ask-for-password --prompt ] + plymouth ask-for-password --prompt -e Unlocking the disk /dev/disk/by-uuid/851db151-043d-46fd-9632-626d6f57bb86 (sda2_crypt) Enter passphrase: + cryptsetup --key-file=- luksOpen /dev/disk/by-uuid/851db151-043d-46fd-9632-626d6f57bb86 sda2_crypt_unformatted error: unexpectedly disconnected from boot status daemon + tried=1 + [ 1 -ge 3 ] + [ 1 -lt 3 ] + [ -n plymouth ask-for-password --prompt ] + plymouth ask-for-password --prompt -e Unlocking the disk /dev/disk/by-uuid/851db151-043d-46fd-9632-626d6f57bb86 (sda2_crypt) Enter passphrase: + cryptsetup --key-file=- luksOpen /dev/disk/by-uuid/851db151-043d-46fd-9632-626d6f57bb86 sda2_crypt_unformatted + tried=2 + [ 2 -ge 3 ] + [ 2 -lt 3 ] + [ -n plymouth ask-for-password --prompt ] + plymouth ask-for-password --prompt -e Unlocking the disk /dev/disk/by-uuid/851db151-043d-46fd-9632-626d6f57bb86 (sda2_crypt) Enter passphrase: + cryptsetup --key-file=- luksOpen /dev/disk/by-uuid/851db151-043d-46fd-9632-626d6f57bb86 sda2_crypt_unformatted + tried=3 + [ 3 -ge 3 ] + return 1 + result=fail + [ fail != ok ] + rm_lo_setup + [ ! -f /dev/disk/by-uuid/851db151-043d-46fd-9632-626d6f57bb86 ] + return 0 + device_msg sda2_crypt failed + local dst msg + dst=sda2_crypt + msg=failed + [ != no ] + log_action_cont_msg sda2_crypt (failed) + log_daemon_msg sda2_crypt (failed)... + [ -z sda2_crypt (failed)... ] + log_use_usplash + [ n = y ] + type usplash_write + log_use_fancy_output + TPUT=/usr/bin/tput + EXPR=/usr/bin/expr + [ -t 1 ] + FANCYTTY=0 + false + echo * sda2_crypt (failed)... * sda2_crypt (failed)... + COL= + return 1 + true + read dst src key opts + umount_fs + local point + log_action_end_msg 0 + log_end_msg 0 + [ -z 0 ] + log_use_usplash + [ n = y ] + type usplash_write + [ ] + [ 0 -eq 0 ] + echo ...done. ...done. + return 0