Bug 2056439
| Summary: | While online reencrypt is started, test-passphrase exits with exit code 1 | |||
|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 9 | Reporter: | Patrick Uiterwijk <puiterwijk> | |
| Component: | cryptsetup | Assignee: | Ondrej Kozina <okozina> | |
| Status: | CLOSED ERRATA | QA Contact: | guazhang <guazhang> | |
| Severity: | unspecified | Docs Contact: | ||
| Priority: | unspecified | |||
| Version: | 9.0 | CC: | agk, guazhang, jbrassow, okozina, perobins, prajnoha | |
| Target Milestone: | beta | Keywords: | Regression | |
| Target Release: | 9.0 | Flags: | pm-rhel:
mirror+
|
|
| Hardware: | Unspecified | |||
| OS: | Unspecified | |||
| Whiteboard: | ||||
| Fixed In Version: | cryptsetup-2.4.3-4.el9 | Doc Type: | If docs needed, set a value | |
| Doc Text: | Story Points: | --- | ||
| Clone Of: | ||||
| : | 2058009 (view as bug list) | Environment: | ||
| Last Closed: | 2022-05-17 15:48:06 UTC | Type: | Bug | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
| Embargoed: | ||||
| Bug Depends On: | ||||
| Bug Blocks: | 2058009 | |||
| Deadline: | 2022-02-28 | |||
|
Description
Patrick Uiterwijk
2022-02-21 08:49:08 UTC
Hi, Reproduce the bug with cryptsetup-2.4.3-1.el9.x86_64. [root@dell-r430-22 ~]# truncate -s 1G testdisk [root@dell-r430-22 ~]# cryptsetup luksFormat ./testdisk --force-password WARNING! ======== This will overwrite data on ./testdisk irrevocably. Are you sure? (Type 'yes' in capital letters): YES Enter passphrase for ./testdisk: Verify passphrase: [root@dell-r430-22 ~]# cryptsetup open --test-passphrase ./testdisk Enter passphrase for ./testdisk: [root@dell-r430-22 ~]# $? -bash: 0: command not found [root@dell-r430-22 ~]# cryptsetup reencrypt ./testdisk --init-only Enter passphrase for key slot 0: [root@dell-r430-22 ~]# $? -bash: 0: command not found [root@dell-r430-22 ~]# cryptsetup open --test-passphrase ./testdisk Enter passphrase for ./testdisk: [root@dell-r430-22 ~]# $? -bash: 1: command not found [root@dell-r430-22 ~]# Test pass with the fixed package. cryptsetup-2.4.3-3.el9.x86_64 [root@dell-r430-22 home]# cryptsetup luksFormat ./testdisk --force-password WARNING: Device ./testdisk already contains a 'crypto_LUKS' superblock signature. WARNING! ======== This will overwrite data on ./testdisk irrevocably. Are you sure? (Type 'yes' in capital letters): YES Enter passphrase for ./testdisk: Verify passphrase: [root@dell-r430-22 home]# cryptsetup open --test-passphrase ./testdisk Enter passphrase for ./testdisk: [root@dell-r430-22 home]# cryptsetup reencrypt ./testdisk --init-only Enter passphrase for key slot 0: [root@dell-r430-22 home]# $? -bash: 0: command not found [root@dell-r430-22 home]# cryptsetup open --test-passphrase ./testdisk Enter passphrase for ./testdisk: [root@dell-r430-22 home]# $? -bash: 0: command not found [root@dell-r430-22 home]# [root@dell-r430-22 home]# cryptsetup luksFormat ./testdisk --force-password WARNING: Device ./testdisk already contains a 'crypto_LUKS' superblock signature. WARNING! ======== This will overwrite data on ./testdisk irrevocably. Are you sure? (Type 'yes' in capital letters): YES Enter passphrase for ./testdisk: Verify passphrase: [root@dell-r430-22 home]# $? -bash: 0: command not found [root@dell-r430-22 home]# cryptsetup open --test-passphrase ./testdisk Enter passphrase for ./testdisk: [root@dell-r430-22 home]# $? -bash: 0: command not found [root@dell-r430-22 home]# cryptsetup reencrypt ./testdisk --init-only Enter passphrase for key slot 0: [root@dell-r430-22 home]# $? -bash: 0: command not found [root@dell-r430-22 home]# cryptsetup open --test-passphrase ./testdisk Enter passphrase for ./testdisk: [root@dell-r430-22 home]# $? -bash: 0: command not found [root@dell-r430-22 home]# rpm -qa |grep cryptsetup cryptsetup-libs-2.4.3-4.el9.x86_64 cryptsetup-2.4.3-4.el9.x86_64 cryptsetup-devel-2.4.3-4.el9.x86_64 [root@dell-r430-22 home]# Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (new packages: cryptsetup), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2022:3913 |