You are not logged in.
lsmod when inside of the non-working initramfs
Offline
Any ideas?
Offline
Maybe it helps to get back to basics , for clarity :
Remove your custom scripts from the mkinitcpio hooks
regenerate and boot to multi-user.target .
login to console as root.
Execute the commands necessary to unlock your encrypted drive manually.
Please post the exact commands and their outputs.
Also post a full journal for this boot .
Last edited by Lone_Wolf (2025-04-19 10:50:46)
Disliking systemd intensely, but not satisfied with alternatives so focusing on taming systemd.
clean chroot building not flexible enough ?
Try clean chroot manager by graysky
Offline
I don't see dm crypt module in your lsmod screenshot
binaries, libraries, configs and other dependent files, udev rules, kernel modules, and finally having things loaded running and correct commands... that's about it
perhaps add the original encrypt lvm2 hooks anyway, just to take care of essential dependencies, if that helps you can still figure out what was missing specifically
Offline
I don't see dm crypt module in your lsmod screenshot
binaries, libraries, configs and other dependent files, udev rules, kernel modules, and finally having things loaded running and correct commands... that's about it
perhaps add the original encrypt lvm2 hooks anyway, just to take care of essential dependencies, if that helps you can still figure out what was missing specifically
https://drive.google.com/file/d/1uBtBiQ … sp=sharing
The dm_crypt module cant be loaded, can anyone explain this or offer a fix?
This is honestly probably why the cryptsetup is not working...
Offline
modinfo dm_crypt | grep -A1 depends
Offline
modinfo dm_crypt | grep -A1 depends
https://drive.google.com/file/d/1h2IuO1 … sp=sharing
Just a stupid loop around...
Offline
https://patchwork.kernel.org/project/ke … /#23668935
hmac/cbc/sha256 ?
Offline
https://patchwork.kernel.org/project/ke … /#23668935
hmac/cbc/sha256 ?
I looked at the link but I am unsure about what you are asking...
I can try and implement the patch you linked if its just a script file somewhere in the OS.
The algorithm that the cryptsetup is trying to use to unlock the disk, I will refer you back to the luksDump of the disk:
https://0x0.st/8_Fy.txt
Please let me know if I should try and apply the patch but I assume that is the information you are asking for...
Last edited by onthegrid007 (2025-04-21 19:23:11)
Offline
This link is to say "would be really nice if it was saying what it fails to use"
You'd have to patch the kernel.
Check whether hmac (should be builtin) cbc and sha256 are available - the module doesn't load, you're not even trying to decipher anything here, so the used cipher isn't relevant.
Offline
Hmac is built in, yes. cbc can not be found as a module. sha256 is loaded and required no dependencies.
Offline
cbc can not be found as a module
Well, add that?
Offline
I added cbc and now when I try and unlock the disk it just freezes in place with a blinking cursor and does nothing until its forced to power down and restart... No error message, nothing.
Offline
Ran the cryptsetup --debug open /dev/sda5 crypt
This is where it hangs...
Offline
Offline
This does not apply to me. I left it over night and it still has not unlocked, it is hung not still trying...
If you saw in the debug pic i posted, the last line is udev cookie semid 0 waiting for zero. I am a programmer and to me that means its a hung semaphore that's waiting till 0 is updated in its conditional variable...
I am also not using a key file, just a plain key slot on the luks2 disk...
I am also past grub, this is not a crypt boot disk this is a crypt main volume. Grub has nothing to do with it...
Offline
Offline
udev is definitely included...
I included lvm2 hook and it seemed to allow me to unlock the disk but it drops immediately into an emergency shell and I cant do very much, no internet connection, nothing...
Offline
Offline
measured uki "fails" but see https://bbs.archlinux.org/viewtopic.php?id=305295
Lose plymouth; why does this end in the emergency target at all? (Explicit? See the 2nd link below)
For the output, skip "-x", it's spam and wasting lines.
Can you get this into the multi-user.target or, since the disks unlock, can you "journalctl -b > /some/persistent/memory/location/journal.txt" so you can upload it from there?
Offline