Re: Command failed with code -1 (wrong or missing parameters)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 19/10/2019 09.10, Milan Broz wrote:
>
> there should be more info, apparently some message is missing.
>
> Please could you run it with the --debug switch and paste the output?
> It also reports all needed versions for us.

Hi Milan,

I ran the same command, this time with --debug. Please see the output
below. There were no messages in syslog. Also, not sure if it is
relevant, but the disk I am trying to luksFormat is paravirtualized disk
in kvm guest (VIRTIO_BLK)

thanks,


cryptsetup -v --debug luksFormat /dev/vda3
# cryptsetup 2.1.0 processing "cryptsetup -v --debug luksFormat /dev/vda3"
# Running command luksFormat.
# Locking memory.
# Installing SIGINT/SIGTERM handler.
# Unblocking interruption on signal.
# Allocating context for crypt device /dev/vda3.
# Trying to open and read device /dev/vda3 with direct-io.
# Initialising device-mapper backend library.
WARNING: Device /dev/vda3 already contains a 'ext4' superblock signature.

WARNING!
========
This will overwrite data on /dev/vda3 irrevocably.

Are you sure? (Type uppercase yes): YES
# Interactive passphrase entry requested.
Enter passphrase for /dev/vda3:
Verify passphrase:
# Crypto backend (OpenSSL 1.1.1d  10 Sep 2019) initialized in cryptsetup
library version 2.1.0.
# Detected kernel Linux 4.14.146-grsec x86_64.
# Only 1 active CPUs detected, PBKDF threads decreased from 4 to 1.
# Not enough physical memory detected, PBKDF max memory decreased from
1048576kB to 1020714kB.
# PBKDF argon2i, hash sha256, time_ms 2000 (iterations 0), max_memory_kb
1020714, parallel_threads 1.
Existing 'ext4' superblock signature on device /dev/vda3 will be wiped.
# Formatting device /dev/vda3 as type LUKS2.
# Topology: IO (512/0), offset = 0; Required alignment is 1048576 bytes.
# Checking if cipher aes-xts-plain64 is usable.
# Userspace crypto wrapper cannot use aes-xts-plain64 (-95).
# Using dmcrypt to access keyslot area.
# Calculated device size is 1 sectors (RW), offset 0.
# dm version   [ opencount flush ]   [16384] (*1)
# dm versions   [ opencount flush ]   [16384] (*1)
# Detected dm-ioctl version 4.37.0.
# Detected dm-crypt version 1.18.1.
# Udev is not running. Not using udev synchronisation code.
# Device-mapper backend running with UDEV support disabled.
# DM-UUID is CRYPT-TEMP-temporary-cryptsetup-3956
# dm create temporary-cryptsetup-3956
CRYPT-TEMP-temporary-cryptsetup-3956 [ opencount flush ]   [16384] (*1)
# dm reload temporary-cryptsetup-3956  [ opencount flush readonly
securedata ]   [16384] (*1)
# dm resume temporary-cryptsetup-3956  [ opencount flush readonly
securedata ]   [16384] (*1)
# temporary-cryptsetup-3956: Stacking NODE_ADD (253,1) 0:6 0660
# temporary-cryptsetup-3956: Stacking NODE_READ_AHEAD 256 (flags=1)
# temporary-cryptsetup-3956: Processing NODE_ADD (253,1) 0:6 0660
# Created /dev/mapper/temporary-cryptsetup-3956
# temporary-cryptsetup-3956: Processing NODE_READ_AHEAD 256 (flags=1)
# temporary-cryptsetup-3956 (253:1): read ahead is 256
# temporary-cryptsetup-3956: retaining kernel read ahead of 256
(requested 256)
# dm versions   [ opencount flush ]   [16384] (*1)
# dm remove temporary-cryptsetup-3956  [ opencount flush retryremove ]
 [16384] (*1)
# temporary-cryptsetup-3956: Stacking NODE_DEL
# temporary-cryptsetup-3956: Processing NODE_DEL
# Removed /dev/mapper/temporary-cryptsetup-3956
# Formatting LUKS2 with JSON metadata area 12288 bytes and keyslots area
16744448 bytes.
# Creating new digest 0 (pbkdf2).
# Setting PBKDF2 type key digest 0.
# Running pbkdf2(sha256) benchmark.
# PBKDF benchmark: memory cost = 0, iterations = 606814, threads = 0
(took 54 ms)
# PBKDF benchmark: memory cost = 0, iterations = 513001, threads = 0
(took 1022 ms)
# Benchmark returns pbkdf2(sha256) 513001 iterations, 0 memory, 0
threads (for 512-bits key).
# Segment 0 assigned to digest 0.
# Wiping LUKS areas (0x000000 - 0x1000000) with zeroes.
# Wiping keyslots area (0x008000 - 0x1000000) with random data.
# Device size 42949672960, offset 16777216.
# Opening lock resource file /run/cryptsetup/L_254:3
# Acquiring write lock for device /dev/vda3.
# Verifying write lock handle for device /dev/vda3.
# Device /dev/vda3 WRITE lock taken.
# Trying to write LUKS2 header (16384 bytes) at offset 0.
# Opening locked device /dev/vda3
# Veryfing locked device handle (bdev)
#
Checksum:ab0a8d42012d27fadf97a1626a682151114f6cce48cbba810c191ec52b28e099 (in-memory)
# Trying to write LUKS2 header (16384 bytes) at offset 16384.
# Opening locked device /dev/vda3
# Veryfing locked device handle (bdev)
#
Checksum:658ce2489dd88497d8036c17d35672bcd4f2c16851340b42e8f714c9b575bd57 (in-memory)
# Device /dev/vda3 WRITE lock released.
# Adding new keyslot -1 using volume key.
# Adding new keyslot -1 with volume key assigned to a crypt segment.
# Selected keyslot 0.
# Verifying key digest 0.
# Keyslot 0 assigned to digest 0.
# Trying to allocate LUKS2 keyslot 0.
# Found area 32768 -> 290816
# Running argon2i() benchmark.
# PBKDF benchmark: memory cost = 32, iterations = 4, threads = 1 (took 0 ms)
# PBKDF benchmark: memory cost = 512, iterations = 4, threads = 1 (took
2 ms)
# PBKDF benchmark: memory cost = 8192, iterations = 4, threads = 1 (took
48 ms)
# PBKDF benchmark: memory cost = 42666, iterations = 4, threads = 1
(took 287 ms)
# PBKDF benchmark: memory cost = 297324, iterations = 4, threads = 1
(took 2155 ms)
# Benchmark returns argon2i() 4 iterations, 297324 memory, 1 threads
(for 512-bits key).
# Calculating attributes for LUKS2 keyslot 0.
# Updating keyslot area [0x8000].
# Userspace crypto wrapper cannot use aes-xts-plain64 (-95).
# Reloading LUKS2 header (repair disabled).
# Opening lock resource file /run/cryptsetup/L_254:3
# Acquiring read lock for device /dev/vda3.
# Verifying read lock handle for device /dev/vda3.
# Device /dev/vda3 READ lock taken.
# Trying to read primary LUKS2 header at offset 0x0.
# Opening locked device /dev/vda3
# Veryfing locked device handle (bdev)
# LUKS2 header version 2 of size 16384 bytes, checksum sha256.
#
Checksum:ab0a8d42012d27fadf97a1626a682151114f6cce48cbba810c191ec52b28e099 (on-disk)
#
Checksum:ab0a8d42012d27fadf97a1626a682151114f6cce48cbba810c191ec52b28e099 (in-memory)
# Trying to read secondary LUKS2 header at offset 0x4000.
# Opening locked device /dev/vda3
# Veryfing locked device handle (bdev)
# LUKS2 header version 2 of size 16384 bytes, checksum sha256.
#
Checksum:658ce2489dd88497d8036c17d35672bcd4f2c16851340b42e8f714c9b575bd57 (on-disk)
#
Checksum:658ce2489dd88497d8036c17d35672bcd4f2c16851340b42e8f714c9b575bd57 (in-memory)
# Device size 42949672960, offset 16777216.
# Device /dev/vda3 READ lock released.
Existing 'crypto_LUKS' superblock signature on device /dev/vda3 will be
wiped.
Existing 'crypto_LUKS' superblock signature on device /dev/vda3 will be
wiped.
# Releasing crypt device /dev/vda3 context.
# Releasing device-mapper backend.
# Unlocking memory.
Command failed with code -1 (wrong or missing parameters).
_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
https://www.saout.de/mailman/listinfo/dm-crypt



[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux