Bug 240282 - unable to mount luks partitions on (external) media
Summary: unable to mount luks partitions on (external) media
Status: RESOLVED FIXED
Alias: None
Product: solid
Classification: Frameworks and Libraries
Component: libsolid-hal (show other bugs)
Version: unspecified
Platform: Debian testing Linux
: NOR normal
Target Milestone: ---
Assignee: Alex Fiestas
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2010-05-31 23:13 UTC by Stefan Schwarzer
Modified: 2011-08-22 09:48 UTC (History)
7 users (show)

See Also:
Latest Commit:
Version Fixed In:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Stefan Schwarzer 2010-05-31 23:13:18 UTC
Version:           unspecified (using KDE 4.4.3) 
OS:                Linux

with 4.4.3 or a little earlier dolphin stopped to mount luks partitions. 
Say, I have an encrypted partition on an external usb drive; after connect, dolphin displays a symbol for the partition and a text like '137 GiB encrypted container', I left-click and enter the password at the prompt; no error message appears, dolphin does _not_ display the contained partition, but the partition shows up as block device in /dev/mapper/luks_crypto_<identifier> (brw-rw---- root, disk). It is possible to mount the partition as root by hand. 

Putting myself in the disk group, newgrp disk, starting dolphin and repeating fails likewise. 

Reproducible: Always

Steps to Reproduce:
see bug description, no special setup

Actual Results:  
The encrypted partition (the mapped block device) does not appear in the list of the mounted filesystems (df), a mapped block device is visible in /dev/mapper, no symbol corresponding to the mapped device appears in dolphins list.

Expected Results:  
Either the encrypted partition (the mapped block device) should appear in the list of the mounted filesystems (df) or dolphin should display a new partition symbol corresponding to an unencryted partition (corresponding to the mapped device) which gets mounted when I click on it

Im using mostly debian testing

# uname -a
Linux pcofm11-l 2.6.32-3-686 #1 SMP Thu Feb 25 06:14:20 UTC 2010 i686 GNU/Linux

# apt-cache show dolphin
Package: dolphin
Priority: optional
Section: utils
Installed-Size: 2236
Maintainer: Debian Qt/KDE Maintainers <debian-qt-kde@lists.debian.org>
Architecture: i386
Source: kdebase
Version: 4:4.4.3-1
Replaces: kdebase-bin (<< 4:4.1.80), kdebase-data (<< 4:4.1.80)
Depends: kdebase-runtime, libc6 (>= 2.1.3), libgcc1 (>= 1:4.1.1), libkdecore5 (>= 4:4.4.0), libkdeui5 (>= 4:4.4.0), libkfile4 (>= 4:4.4.0), libkio5 (>= 4:4.4.0), libknewstuff3-4 (>= 4:4.4.0), libkonq5 (>= 4:4.4.1), libkparts4 (>= 4:4.4), libkutils4 (>= 4:4.4), libnepomuk4 (>= 4:4.4), libnepomukquery4a (>= 4:4.4.0), libphonon4 (>= 4:4.3.0), libqt4-dbus (>= 4:4.5.3), libqtcore4 (>= 4:4.6.1), libqtgui4 (>= 4:4.5.3), libsoprano4 (>= 2.1.1), libstdc++6 (>= 4.1.1), phonon
Comment 1 Thomas PIERSON 2010-07-21 02:10:32 UTC
Hi,

I have the same issue on a updated Debian squeeze distribution.
I have a usb key with an encrypted partition.
I can open/mount it with Gnome or Palimpsest without any problems.

On KDE4.4.4 when I try to open the usb key with dolphin an error occured after I type the pass:
"org.freedesktop.Hal.Device.Volume.Crypto.SetupError: /dev/sde is already setup?"

After that, if I check it in palimpsest, the encrypted partition seem to be unlocked. 
So, I think dolphin make a wrong detection of the encrypted volume and try to unlock a partition witch is already unlocked.

I reproduced this issue with several external encrypted volumes and several computers with KDE4.4.4.

# apt-cache show dolphin
Package: dolphin
Priority: optional
Section: utils
Installed-Size: 2384
Maintainer: Debian Qt/KDE Maintainers <debian-qt-kde@lists.debian.org>
Architecture: amd64
Source: kdebase
Version: 4:4.4.4-1
Replaces: kdebase-bin (<< 4:4.1.80), kdebase-data (<< 4:4.1.80)
Depends: kdebase-runtime, libc6 (>= 2.2.5), libkdecore5 (>= 4:4.4.0), libkdeui5 (>= 4:4.4.0), libkfile4 (>= 4:4.4.0), libkio5 (>= 4:4.4.0), libknewstuff3-4 (>= 4:4.4.0), libkonq5 (>= 4:4.4.1), libkparts4 (>= 4:4.4), libkutils4 (>= 4:4.4), libnepomuk4 (>= 4:4.4), libnepomukquery4a (>= 4:4.4.0), libphonon4 (>= 4:4.3.0), libqt4-dbus (>= 4:4.5.3), libqtcore4 (>= 4:4.6.1), libqtgui4 (>= 4:4.5.3), libsoprano4 (>= 2.1.1), libstdc++6 (>= 4.1.1), phonon

# uname -a
Linux thomasp-debian 2.6.32-5-amd64 #1 SMP Tue Jun 1 04:34:03 UTC 2010 x86_64 GNU/Linux

Regards,
Thomas PIERSON
Comment 2 Ronny Standtke 2010-08-18 22:17:40 UTC
Unfortunately, I have to join the choir here...

My external backup hard drive is luks-encrypted. When I plug it in KDE shows the drive and lets me click on the unlock symbol. After typing in my passphrase, KDE shows the unlocked volume. So far so good.

Trying to open the unlocked volume fails with the message "Could not mount the following device <size and name of my drive>".

Going to a terminal and calling
sudo mount /dev/mapper/luks_crypto_... /mnt/backup
works but I would prefer to word with the desktop environment instead of the command line.
Comment 3 C. Dominik Bódi 2010-09-08 19:29:53 UTC
I can confirm the same bug, my system behaves the same way as written by the reporter.
I am using debian unstable, that has kde 4.4.5 at the moment.

Regards,
Dominik
Comment 4 Vincent Tassy 2010-09-12 09:05:45 UTC
Same problem here with KDE 4.4.5 on Fedora 13 64 bits
It's a pain
Comment 5 Vincent Tassy 2010-09-12 09:08:11 UTC
*** This bug has been confirmed by popular vote. ***
Comment 6 Tobias Leupold 2010-10-11 22:48:08 UTC
Same here with Gentoo and KDE SC 4.4.5.

Seems like KDE (HAL?) wants to mount /dev/dm-* instead of the created mapped device /dev/mapper/luks_crypto_*. At least, dolphin says "org.freedesktop.Hal.Device.Volume.UnknownFailure: mount: special device /dev/dm-0 does not exist" here.
Comment 7 Patrick Winnertz 2010-10-19 17:46:30 UTC
Hey,

I can confirm the error also on kde 4.5.2 (unofficial packages from qt-kde.debian.net) running on debian unstable (amd64):
The mapper device is created correctly in /dev/mapper, but afterwards I've to mount the partition by hand as root. 


Greetings
Patrick
Comment 8 Malte Eggers 2010-11-16 21:32:23 UTC
I have the same problem. First I had two partitions and luksFormatted one of them - entering the passphrase made the Encrypted device being shown as mounted and made the contents appear in the device notifier. Then I decided I only needed the one encrypted partition so I luksFormatted the whole HDD (rather than a partition filling the whole HDD) and now I'm stuck with the same issue. Can anyone affirm that? If not, I'll try luksFormatting a partition filling the whole HDD and see if that solved the problem. Anyway, even if the bug can be avoided, it should be fixed.
Comment 9 PC LX 2010-11-30 12:49:03 UTC
I can confirm the same problem on Mandriva 2010.1 (KDE 4.4.3). I have just updated from Mandriva 2010.0 (KDE 4.3.5) and it was working there.

When I connect external storage encrypted with LUKS, both dolphin and the device monitor in the system trayshows the encrypted device. Clicking on the lock icon in the device monitor or on dolphin's item in the locals list, shows the password prompt. When I type the password, the LUKS partition is unlocked, and the a /dev/mapper/  luks_crypto_UUID is created, but no reference to this new device appears either in dolphin or the device monitor. I can mount the device manually.

This issue occurs with all LUKS encrypted storage I have, and on two systems I just upgraded from Mandriva 2010.0 to Mandriva 2010.1.


Here is some output from "udevadm monitor" and "lshal --monitor"

$ udevadm monitor
monitor will print the received events for:
UDEV - the event which udev sends out after rule processing
KERNEL - the kernel uevent

KERNEL[1291117162.476034] add      /devices/pci0000:00/0000:00:1d.7/usb2/2-1 (usb)
KERNEL[1291117162.476286] add      /devices/pci0000:00/0000:00:1d.7/usb2/2-1/2-1:1.0 (usb)
KERNEL[1291117162.476417] add      /devices/pci0000:00/0000:00:1d.7/usb2/2-1/2-1:1.0/host8 (scsi)
KERNEL[1291117162.476433] add      /devices/pci0000:00/0000:00:1d.7/usb2/2-1/2-1:1.0/host8/scsi_host/host8 (scsi_host)
UDEV  [1291117162.690919] add      /devices/pci0000:00/0000:00:1d.7/usb2/2-1 (usb)
UDEV  [1291117163.281293] add      /devices/pci0000:00/0000:00:1d.7/usb2/2-1/2-1:1.0 (usb)
UDEV  [1291117163.281473] add      /devices/pci0000:00/0000:00:1d.7/usb2/2-1/2-1:1.0/host8 (scsi)
UDEV  [1291117163.281727] add      /devices/pci0000:00/0000:00:1d.7/usb2/2-1/2-1:1.0/host8/scsi_host/host8 (scsi_host)
KERNEL[1291117167.511747] add      /devices/pci0000:00/0000:00:1d.7/usb2/2-1/2-1:1.0/host8/target8:0:0 (scsi)
KERNEL[1291117167.511774] add      /devices/pci0000:00/0000:00:1d.7/usb2/2-1/2-1:1.0/host8/target8:0:0/8:0:0:0 (scsi)
KERNEL[1291117167.511789] add      /devices/pci0000:00/0000:00:1d.7/usb2/2-1/2-1:1.0/host8/target8:0:0/8:0:0:0/scsi_disk/8:0:0:0 (scsi_disk)
UDEV  [1291117167.511803] add      /devices/pci0000:00/0000:00:1d.7/usb2/2-1/2-1:1.0/host8/target8:0:0 (scsi)
KERNEL[1291117167.511817] add      /devices/pci0000:00/0000:00:1d.7/usb2/2-1/2-1:1.0/host8/target8:0:0/8:0:0:0/scsi_device/8:0:0:0 (scsi_device)
KERNEL[1291117167.511834] add      /devices/pci0000:00/0000:00:1d.7/usb2/2-1/2-1:1.0/host8/target8:0:0/8:0:0:0/scsi_generic/sg7 (scsi_generic)
KERNEL[1291117167.511851] add      /devices/pci0000:00/0000:00:1d.7/usb2/2-1/2-1:1.0/host8/target8:0:0/8:0:0:0/bsg/8:0:0:0 (bsg)
UDEV  [1291117167.512026] add      /devices/pci0000:00/0000:00:1d.7/usb2/2-1/2-1:1.0/host8/target8:0:0/8:0:0:0 (scsi)
UDEV  [1291117167.512411] add      /devices/pci0000:00/0000:00:1d.7/usb2/2-1/2-1:1.0/host8/target8:0:0/8:0:0:0/scsi_device/8:0:0:0 (scsi_device)
UDEV  [1291117167.513482] add      /devices/pci0000:00/0000:00:1d.7/usb2/2-1/2-1:1.0/host8/target8:0:0/8:0:0:0/scsi_disk/8:0:0:0 (scsi_disk)
UDEV  [1291117167.516273] add      /devices/pci0000:00/0000:00:1d.7/usb2/2-1/2-1:1.0/host8/target8:0:0/8:0:0:0/bsg/8:0:0:0 (bsg)
UDEV  [1291117167.516300] add      /devices/pci0000:00/0000:00:1d.7/usb2/2-1/2-1:1.0/host8/target8:0:0/8:0:0:0/scsi_generic/sg7 (scsi_generic)
KERNEL[1291117167.541548] add      /devices/pci0000:00/0000:00:1d.7/usb2/2-1/2-1:1.0/host8/target8:0:0/8:0:0:0/block/sdg (block)
KERNEL[1291117167.541577] add      /devices/pci0000:00/0000:00:1d.7/usb2/2-1/2-1:1.0/host8/target8:0:0/8:0:0:0/block/sdg/sdg1 (block)
KERNEL[1291117167.541591] add      /devices/virtual/bdi/8:96 (bdi)
UDEV  [1291117167.542138] add      /devices/virtual/bdi/8:96 (bdi)
UDEV  [1291117167.830472] add      /devices/pci0000:00/0000:00:1d.7/usb2/2-1/2-1:1.0/host8/target8:0:0/8:0:0:0/block/sdg (block)
UDEV  [1291117167.883609] add      /devices/pci0000:00/0000:00:1d.7/usb2/2-1/2-1:1.0/host8/target8:0:0/8:0:0:0/block/sdg/sdg1 (block)
KERNEL[1291117189.199266] add      /devices/virtual/block/dm-6 (block)
KERNEL[1291117189.199389] add      /devices/virtual/bdi/252:6 (bdi)
UDEV  [1291117189.199603] add      /devices/virtual/bdi/252:6 (bdi)
KERNEL[1291117189.200387] change   /devices/virtual/block/dm-6 (block)
UDEV  [1291117189.200702] add      /devices/virtual/block/dm-6 (block)
UDEV  [1291117189.201137] change   /devices/virtual/block/dm-6 (block)
KERNEL[1291117190.234636] change   /devices/virtual/block/dm-6 (block)
UDEV  [1291117190.234657] remove   /devices/virtual/bdi/252:6 (bdi)
KERNEL[1291117190.234671] remove   /devices/virtual/block/dm-6 (block)
KERNEL[1291117190.234681] remove   /devices/virtual/bdi/252:6 (bdi)
KERNEL[1291117190.234692] remove   /devices/virtual/block/dm-6 (block)
KERNEL[1291117190.234704] add      /devices/virtual/block/dm-6 (block)
KERNEL[1291117190.234714] add      /devices/virtual/bdi/252:6 (bdi)
KERNEL[1291117190.234725] change   /devices/pci0000:00/0000:00:1d.7/usb2/2-1/2-1:1.0/host8/target8:0:0/8:0:0:0/block/sdg/sdg1 (block)
KERNEL[1291117190.234738] change   /devices/virtual/block/dm-6 (block)
UDEV  [1291117190.235472] add      /devices/virtual/bdi/252:6 (bdi)
UDEV  [1291117190.287486] change   /devices/pci0000:00/0000:00:1d.7/usb2/2-1/2-1:1.0/host8/target8:0:0/8:0:0:0/block/sdg/sdg1 (block)
UDEV  [1291117190.442898] change   /devices/virtual/block/dm-6 (block)
UDEV  [1291117190.442945] remove   /devices/virtual/block/dm-6 (block)
UDEV  [1291117190.442964] remove   /devices/virtual/block/dm-6 (block)
UDEV  [1291117190.445018] add      /devices/virtual/block/dm-6 (block)
UDEV  [1291117190.610759] change   /devices/virtual/block/dm-6 (block)



$ lshal --monitor

Start monitoring devicelist:
-------------------------------------------------
11:39:22.743: usb_device_67b_2507_0 added
11:39:23.291: usb_device_67b_2507_0_if0 added
11:39:23.291: usb_device_67b_2507_0_if0_scsi_host added
11:39:27.513: usb_device_67b_2507_0_if0_scsi_host_0 added
11:39:27.513: usb_device_67b_2507_0_if0_scsi_host_0_scsi_device_lun0 added
11:39:27.519: usb_device_67b_2507_0_if0_scsi_host_0_scsi_device_lun0_scsi_generic added
11:39:27.894: storage_serial_ST312002_2A_0_0_0 added
11:39:27.906: volume_uuid_9dd1b24b_7138_4a02_bd05_67e0d5496445 added
11:39:49.234: volume_part_1_size_256000 added
11:39:50.252: volume_uuid_9dd1b24b_7138_4a02_bd05_67e0d5496445 property info.callouts.remove = {'hal-luks-remove'} (new)
11:39:50.443: volume_part_1_size_256000 removed
11:39:50.446: volume_part_1_size_120029410304 added
Comment 10 C. Dominik Bódi 2011-06-24 17:21:16 UTC
I've tried this with kde 4.6.3 on unstable. This seems to work again, now that hal has been removed.