View Issue Details
ID | Project | Category | View Status | Date Submitted | Last Update |
---|---|---|---|---|---|
0003664 | Rocky-Linux-9 | kernel | public | 2023-06-22 10:45 | 2023-06-22 10:45 |
Reporter | Matt Heck | Assigned To | |||
Priority | normal | Severity | block | Reproducibility | always |
Status | new | Resolution | open | ||
Platform | x86_64 | OS | Rocky Linux | OS Version | 9.2 |
Summary | 0003664: Presence of XFS on secondary SATA SSD in /etc/fstab breaks cryptsetup for primary NVME partition | ||||
Description | This took a while to figure out, and I haven't identified the root cause, but it is 100% reproducible on this system. System contains: A: (1) WD Black NVME device with boot (unecnrypted), EFI (unencrypted), and LVM2 PV (LUKS encrypted) partitions B: (1) Samsung 2 TB SSD on SATA, partitioned as XFS (unencrypted) C: (1) additional rotary HDD on SATA, incidental, no apparent effect on this issue if enabled or disabled D: (2) optical drives on SATA (Blu-Ray recorders). The encrypted LVM2 PV, when decrypted, expands to a single volume group containing / and /home logical volumes which are not recursively encrypted (that is, the PV itself is the only cryptsetup operation required). OBSERVED: 1. Rocky 9.1 boots normally WHETHER OR NOT (B) is enabled in /etc/fstab. 2. Rocky 9.2 boots ONLY if (B) is *DISABLED* in /etc/fstab 3. Under Rocky 9.2, if (B) is *ENABLED* in /etc/fstab, password entry for (A) *FAILS* and booting FAILS. 4. Under Rocky 9.2, if (B) is *DISABLED* in /etc/fstab, password entry for (A) *SUCCEEDS* and the system boots. SUMMARY: Presence or absence of a COMPLETELY UNRELATED SATA SSD breaks LUKS password entry (or some other part of decryption that has the same appearance, and causes a re-prompt for the password) on the primary NVME boot drive. | ||||
Steps To Reproduce | "All devices" below refers to: A: (1) WD Black NVME device with boot (unecnrypted), EFI (unencrypted), and LVM2 PV (LUKS encrypted) partitions B: (1) Samsung 2 TB SSD on SATA, partitioned as XFS (unencrypted) C: (1) additional rotary HDD on SATA, incidental, no apparent effect on this issue if enabled or disabled D: (2) optical drives on SATA (Blu-Ray recorders). BASELINE 1. Boot the system into 9.1 with all devices enabled in /etc/fstab. 2. Enter the password to decrypt the LUKS encrypted NVME partition containing the LVM2 PV. 3. Observe successful password entry and successful boot. FAILURE 1. Boot the system into 9.2 with all devices enabled in /etc/fstab, 2. Enter the password to decrypt the LUKS encrypted NVME partition containing the LVM2 PV. 3. Observe FAILURE to boot-- cryptsetup repeatedly prompts for password until failure. CLUE 1. Boot the system into 9.2 with all devices EXCEPT THE SATA SSD enabled in /etc/fstab, 2. Enter the password to decrypt the LUKS encrypted NVME partition containing the LVM2 PV. 3. Observe successful password entry and successful boot. | ||||
Tags | No tags attached. | ||||
Date Modified | Username | Field | Change |
---|---|---|---|
2023-06-22 10:45 | Matt Heck | New Issue |