You are not logged in.
lsmod when inside of the non-working initramfs
Offline
Any ideas?
Offline
Maybe it helps to get back to basics , for clarity :
Remove your custom scripts from the mkinitcpio hooks
regenerate and boot to multi-user.target .
login to console as root.
Execute the commands necessary to unlock your encrypted drive manually.
Please post the exact commands and their outputs.
Also post a full journal for this boot .
Last edited by Lone_Wolf (2025-04-19 10:50:46)
Disliking systemd intensely, but not satisfied with alternatives so focusing on taming systemd.
clean chroot building not flexible enough ?
Try clean chroot manager by graysky
Offline
I don't see dm crypt module in your lsmod screenshot
binaries, libraries, configs and other dependent files, udev rules, kernel modules, and finally having things loaded running and correct commands... that's about it
perhaps add the original encrypt lvm2 hooks anyway, just to take care of essential dependencies, if that helps you can still figure out what was missing specifically
Offline
I don't see dm crypt module in your lsmod screenshot
binaries, libraries, configs and other dependent files, udev rules, kernel modules, and finally having things loaded running and correct commands... that's about it
perhaps add the original encrypt lvm2 hooks anyway, just to take care of essential dependencies, if that helps you can still figure out what was missing specifically
https://drive.google.com/file/d/1uBtBiQ … sp=sharing
The dm_crypt module cant be loaded, can anyone explain this or offer a fix?
This is honestly probably why the cryptsetup is not working...
Offline
modinfo dm_crypt | grep -A1 depends
Offline
modinfo dm_crypt | grep -A1 depends
https://drive.google.com/file/d/1h2IuO1 … sp=sharing
Just a stupid loop around...
Offline
https://patchwork.kernel.org/project/ke … /#23668935
hmac/cbc/sha256 ?
Offline
https://patchwork.kernel.org/project/ke … /#23668935
hmac/cbc/sha256 ?
I looked at the link but I am unsure about what you are asking...
I can try and implement the patch you linked if its just a script file somewhere in the OS.
The algorithm that the cryptsetup is trying to use to unlock the disk, I will refer you back to the luksDump of the disk:
https://0x0.st/8_Fy.txt
Please let me know if I should try and apply the patch but I assume that is the information you are asking for...
Last edited by onthegrid007 (2025-04-21 19:23:11)
Offline
This link is to say "would be really nice if it was saying what it fails to use"
You'd have to patch the kernel.
Check whether hmac (should be builtin) cbc and sha256 are available - the module doesn't load, you're not even trying to decipher anything here, so the used cipher isn't relevant.
Offline
Hmac is built in, yes. cbc can not be found as a module. sha256 is loaded and required no dependencies.
Offline
cbc can not be found as a module
Well, add that?
Offline