View Issue Details

IDProjectCategoryView StatusLast Update
0003664Rocky-Linux-9kernelpublic2023-06-22 10:45
ReporterMatt Heck Assigned To 
PrioritynormalSeverityblockReproducibilityalways
Status newResolutionopen 
Platformx86_64OSRocky LinuxOS Version9.2
Summary0003664: Presence of XFS on secondary SATA SSD in /etc/fstab breaks cryptsetup for primary NVME partition
DescriptionThis took a while to figure out, and I haven't identified the root cause, but it is 100% reproducible on this system.

System contains:
A: (1) WD Black NVME device with boot (unecnrypted), EFI (unencrypted), and LVM2 PV (LUKS encrypted) partitions
B: (1) Samsung 2 TB SSD on SATA, partitioned as XFS (unencrypted)
C: (1) additional rotary HDD on SATA, incidental, no apparent effect on this issue if enabled or disabled
D: (2) optical drives on SATA (Blu-Ray recorders).

The encrypted LVM2 PV, when decrypted, expands to a single volume group containing / and /home logical volumes which are not recursively encrypted (that is, the PV itself is the only cryptsetup operation required).

OBSERVED:
1. Rocky 9.1 boots normally WHETHER OR NOT (B) is enabled in /etc/fstab.
2. Rocky 9.2 boots ONLY if (B) is *DISABLED* in /etc/fstab
3. Under Rocky 9.2, if (B) is *ENABLED* in /etc/fstab, password entry for (A) *FAILS* and booting FAILS.
4. Under Rocky 9.2, if (B) is *DISABLED* in /etc/fstab, password entry for (A) *SUCCEEDS* and the system boots.

SUMMARY:
Presence or absence of a COMPLETELY UNRELATED SATA SSD breaks LUKS password entry (or some other part of decryption that has the same appearance, and causes a re-prompt for the password) on the primary NVME boot drive.
Steps To Reproduce"All devices" below refers to:
A: (1) WD Black NVME device with boot (unecnrypted), EFI (unencrypted), and LVM2 PV (LUKS encrypted) partitions
B: (1) Samsung 2 TB SSD on SATA, partitioned as XFS (unencrypted)
C: (1) additional rotary HDD on SATA, incidental, no apparent effect on this issue if enabled or disabled
D: (2) optical drives on SATA (Blu-Ray recorders).

BASELINE
1. Boot the system into 9.1 with all devices enabled in /etc/fstab.
2. Enter the password to decrypt the LUKS encrypted NVME partition containing the LVM2 PV.
3. Observe successful password entry and successful boot.

FAILURE
1. Boot the system into 9.2 with all devices enabled in /etc/fstab,
2. Enter the password to decrypt the LUKS encrypted NVME partition containing the LVM2 PV.
3. Observe FAILURE to boot-- cryptsetup repeatedly prompts for password until failure.

CLUE
1. Boot the system into 9.2 with all devices EXCEPT THE SATA SSD enabled in /etc/fstab,
2. Enter the password to decrypt the LUKS encrypted NVME partition containing the LVM2 PV.
3. Observe successful password entry and successful boot.
TagsNo tags attached.

Activities

There are no notes attached to this issue.

Issue History

Date Modified Username Field Change
2023-06-22 10:45 Matt Heck New Issue