Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upanti-evil-maid-unseal fails with exit code 134 #1847
Comments
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Mar 17, 2016
Member
Exit code 134 means it was killed by SIGABRT. The code there is
just about to show you the unsealed secret:
# display secret in current dialog
WHERE="above"
{
message ""
message "$(cat "$UNSEALED_SECRET" 2>/dev/null)"
message ""
} 2>&1 # don't put the secret into the journal
Can you remove that 2>&1 and see what you'd get logged? Or maybe check some other logs (plymouth? other systemd services?)
|
Exit code 134 means it was killed by SIGABRT. The code there is
Can you remove that |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
hdevalence
Mar 18, 2016
Thanks for the tip -- I found the problem, which is here: https://github.com/JoliOS/plymouth/blob/master/src/client/ply-boot-client.c#L489
Plymouth has a size limit on the length of the message, in this case <= 255 bytes.
hdevalence
commented
Mar 18, 2016
|
Thanks for the tip -- I found the problem, which is here: https://github.com/JoliOS/plymouth/blob/master/src/client/ply-boot-client.c#L489 Plymouth has a size limit on the length of the message, in this case <= 255 bytes. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
hdevalence
commented
Mar 18, 2016
|
QubesOS/qubes-antievilmaid#13 adds a note to the README. |
hdevalence commentedMar 17, 2016
Hi,
immediately after installing AEM, the anti-evil-maid-unseal script fails somewhere with exit code 134.
Modifying the 90anti-evil-maid-unseal script to have
set -xand reinstalling gives the following output:The script exits before the section asking to unmount the drive, so it just boots without showing the secret or asking to remove the drive.