<div dir="ltr"><div><div><div>Hi,<br><br></div>Looks like this patch works for me.<br><br></div>// wbr<br></div>// Oleksii<br></div><div class="gmail_extra"><br><div class="gmail_quote">2015-02-27 10:25 GMT+02:00 Martin Pitt <span dir="ltr"><<a href="mailto:martin.pitt@ubuntu.com" target="_blank">martin.pitt@ubuntu.com</a>></span>:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Hey Oleksii,<br>
<br>
Oleksii Shevchuk [2015-02-14 10:11 +0200]:<br>
<div><div class="h5">> This patch 06e97888883e2cc12eb6514e80c7f0014295f59b breaks pam_mount for me.<br>
> Without reverting it, systemd umounts encrypted drive, mounted with<br>
> dm-crypt/mount.crypt/pam_mount immediately.<br>
><br>
> I double checked, that backing device is exported to systemd:<br>
> sys-devices-virtual-block-dm\x2d10.device loaded active plugged<br>
> /sys/devices/virtual/block/dm-10<br>
<br>
</div></div>Can you please try the patch here:<br>
<br>
  <a href="http://lists.freedesktop.org/archives/systemd-devel/2015-February/028812.html" target="_blank">http://lists.freedesktop.org/archives/systemd-devel/2015-February/028812.html</a><br>
<br>
if it doesn't help, can you please describe how to reproduce this, and<br>
put a debug-enabled journal output from that boot, please?<br>
<br>
Thanks,<br>
<br>
Martin<br>
<span class="HOEnZb"><font color="#888888">--<br>
Martin Pitt                        | <a href="http://www.piware.de" target="_blank">http://www.piware.de</a><br>
Ubuntu Developer (<a href="http://www.ubuntu.com" target="_blank">www.ubuntu.com</a>)  | Debian Developer  (<a href="http://www.debian.org" target="_blank">www.debian.org</a>)<br>
</font></span></blockquote></div><br></div>