http://bugzilla.opensuse.org/show_bug.cgi?id=1166005
Bug ID: 1166005
Summary: 20s to unlock fully encrypted partition
Classification: openSUSE
Product: openSUSE Tumbleweed
Version: Current
Hardware: Other
OS: Other
Status: NEW
Severity: Normal
Priority: P5 - None
Component: Bootloader
Assignee: jsrain(a)suse.com
Reporter: axel.braun(a)gmx.de
QA Contact: jsrain(a)suse.com
Found By: ---
Blocker: ---
I have a new TW installation with a 940GB encrypted root partition (including
/boot, excluding /boot/efi).
When starting the machine, grub asks in text mode for the passphrase.
After entering the passphrase, it takes about 20s until the graphical boot
screen appears.
X1E:/home/test # lsblk
NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT
nvme0n1 259:0 0 953,9G 0 disk
├─nvme0n1p1 259:1 0 500M 0 part /boot/efi
├─nvme0n1p2 259:2 0 937G 0 part
│ └─cr_root 254:0 0 937G 0 crypt /
└─nvme0n1p3 259:3 0 16,4G 0 part [SWAP]
linux:/home/test # cryptsetup luksDump /dev/nvme0n1p2
LUKS header information for /dev/nvme0n1p2
Version: 1
Cipher name: aes
Cipher mode: xts-plain64
Hash spec: sha256
Payload offset: 4096
MK bits: 512
MK digest: c3 b3 b9 a1 4b cd 08 8d 93 47 59 be f1 b8 f3 24 5f ae 81 75
MK salt: 8b 87 eb c4 bd 43 4e af 57 ef eb 9f 3c 38 a9 8a
f4 c5 63 2f 1b f6 98 1a 49 62 36 e0 9e 12 8a db
MK iterations: 153840
UUID: 720864c9-f8ed-405e-9a17-ccfa1d2f347b
Key Slot 0: ENABLED
Iterations: 1229280
Salt: 5f 9b 38 6b 29 b4 2e b0 80 35 c5 bd 88 9f 77 61
29 6c 34 00 54 3c af a5 5a d4 f6 15 7e e4 8d c4
Key material offset: 8
AF stripes: 4000
Key Slot 1: DISABLED
Key Slot 2: DISABLED
Key Slot 3: DISABLED
Key Slot 4: DISABLED
Key Slot 5: DISABLED
Key Slot 6: DISABLED
Key Slot 7: DISABLED
It is an i7-9750H machine, so CPU power should not be an issue...
--
You are receiving this mail because:
You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1184069
Bug ID: 1184069
Summary: GRUB on a crypted partition takes > 10 seconds to
unlock the filesystem
Classification: openSUSE
Product: openSUSE Distribution
Version: Leap 15.2
Hardware: Other
OS: Other
Status: NEW
Severity: Normal
Priority: P5 - None
Component: Bootloader
Assignee: screening-team-bugs(a)suse.de
Reporter: p.heinlein(a)heinlein-support.de
QA Contact: qa-bugs(a)suse.de
Found By: ---
Blocker: ---
I installed 15.2 plain vanilla on a Thinkpad X1.Extreme Gen.3 with a ~2 TB NVME
and I set a crypto disc password during installation (in YaST).
Grub needs > 10 seconds to unlock the key, so booting is very slow.
It's very similar to
https://unix.stackexchange.com/questions/369414/grub-takes-too-long-to-unlo…https://bbs.archlinux.org/viewtopic.php?id=228865
so I also think, that the crypto or number of iterations is way to expensive
here and needs too much time. Maybe the SUSE team should/could look for a
similar safe, but faster method (SHA256?) here?
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1190738
Bug ID: 1190738
Summary: kernel-default-base does not contain kernel changelog
Classification: openSUSE
Product: openSUSE Tumbleweed
Version: Current
Hardware: Other
OS: Other
Status: NEW
Severity: Normal
Priority: P5 - None
Component: Kernel
Assignee: kernel-bugs(a)opensuse.org
Reporter: fvogt(a)suse.com
QA Contact: qa-bugs(a)suse.de
CC: jeos-internal(a)suse.de
Found By: ---
Blocker: ---
kernel-default-base is built from a separate set of .spec and .changes files,
making use of the kernel-subpackage facilities.
This however means that the changelog of the original kernel packages
(kernel-default, -vanilla, etc.) does not end up in the changelog of
kernel-default-base. This is especially visible in updates, which only change
the binary content and the version number in an unobvious way. There is no
mention of any relevant fixed bugs (bsc#, CVE-).
It would be very useful to include the kernel changelog in the
kernel-default-base package. I don't think it can (or should) be interleaved
with the subpackage .changes file, but it could be included as file.
The target systems usually have excludedocs enabled though, so marking the file
as %doc means it won't get installed. That makes it more complex and
annoying...
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1176026
Bug ID: 1176026
Summary: bond interface should not invent mac address by
default
Classification: openSUSE
Product: openSUSE Tumbleweed
Version: Current
Hardware: Other
OS: Other
Status: NEW
Severity: Normal
Priority: P5 - None
Component: Kernel
Assignee: kernel-bugs(a)opensuse.org
Reporter: ro(a)suse.com
QA Contact: qa-bugs(a)suse.de
Found By: ---
Blocker: ---
since 5.8.4 (unsure about last digit):
when setting up a bond if kernel chooses a random mac
removing and readding the slave gets back to the used behaviour:
obs-arm-1:~ # modprobe bonding
3: enP2p1s0v1: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc mq state DOWN
group default qlen 1000
link/ether 1c:1b:0d:60:ee:8b brd ff:ff:ff:ff:ff:ff
7: bond0: <BROADCAST,MULTICAST,MASTER> mtu 1500 qdisc noop state DOWN group
default qlen 1000
link/ether 9e:29:55:da:aa:0e brd ff:ff:ff:ff:ff:ff
obs-arm-1:~ # echo +enP2p1s0v1 > /sys/class/net/bond0/bonding/slaves
7: bond0: <BROADCAST,MULTICAST,MASTER> mtu 1500 qdisc noop state DOWN group
default qlen 1000
link/ether 9e:29:55:da:aa:0e brd ff:ff:ff:ff:ff:ff
obs-arm-1:~ # echo -enP2p1s0v1 > /sys/class/net/bond0/bonding/slaves
obs-arm-1:~ # echo +enP2p1s0v1 > /sys/class/net/bond0/bonding/slaves
7: bond0: <BROADCAST,MULTICAST,MASTER> mtu 1500 qdisc noop state DOWN group
default qlen 1000
link/ether 1c:1b:0d:60:ee:8b brd ff:ff:ff:ff:ff:ff
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1190411
Bug ID: 1190411
Summary: USB devices missing after kexec reboot with XHCI
enabled
Classification: openSUSE
Product: openSUSE Tumbleweed
Version: Current
Hardware: Other
OS: Other
Status: NEW
Severity: Normal
Priority: P5 - None
Component: Kernel
Assignee: kernel-bugs(a)opensuse.org
Reporter: roger.whittaker(a)suse.com
QA Contact: qa-bugs(a)suse.de
Found By: ---
Blocker: ---
Created attachment 852446
--> https://bugzilla.suse.com/attachment.cgi?id=852446&action=edit
hwinfo, dmesg, usb-devices and lsusb with and without XHCI enabled in BIOS,
normal boot and kexec boot
Hardware is an Intel NUC (D54250WYK).
With XHCI enabled in the UEFI BIOS, USB devices are not available
after a kexec reboot. Hence the boot failed in the initrd when I had
USB attached disks referenced in /etc/fstab. When I commented these
out, the boot succeeded but the keyboard and mouse did not work after
a kexec reboot.
With XHCI disabled in the BIOS, kexec works as expected.
On this hardware using Tumbleweed at some time in the past (but I'm
afraid I don't know when) kexec worked with XHCI enabled.
Linux jabberwock 5.14.0-1-default #1 SMP Mon Aug 30 07:01:36 UTC 2021 (dc06e24)
x86_64 x86_64 x86_64 GNU/Linux
NAME="openSUSE Tumbleweed"
# VERSION="20210908"
ID="opensuse-tumbleweed"
ID_LIKE="opensuse suse"
VERSION_ID="20210908"
PRETTY_NAME="openSUSE Tumbleweed"
ANSI_COLOR="0;32"
CPE_NAME="cpe:/o:opensuse:tumbleweed:20210908"
BUG_REPORT_URL="https://bugs.opensuse.org"
HOME_URL="https://www.opensuse.org/"
DOCUMENTATION_URL="https://en.opensuse.org/Portal:Tumbleweed"
LOGO="distributor-logo"
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1182554
Bug ID: 1182554
Summary: cannot start greetd.service .... missing PAM module
Classification: openSUSE
Product: openSUSE Tumbleweed
Version: Current
Hardware: x86-64
OS: openSUSE Tumbleweed
Status: NEW
Severity: Enhancement
Priority: P5 - None
Component: Other
Assignee: screening-team-bugs(a)suse.de
Reporter: mcepl(a)suse.com
QA Contact: qa-bugs(a)suse.de
CC: denis.kondratenko(a)suse.com, mcepl(a)suse.com,
opensuse(a)trummer.xyz, stdden(a)opensuse.org
Found By: ---
Blocker: ---
Created attachment 846366
--> https://bugzilla.suse.com/attachment.cgi?id=846366&action=edit
journalctl -xb output
When trying to replace gdm with greetd following the steps on
https://en.opensuse.org/Portal:OpenSUSEway, greetd fails to start and journal
shows:
�no 22 09:38:10 stitny greetd[2347]: error: PAM 'greetd' service missing
When looking around, there is the file /usr/etc/pam.d/greetd with this content:
~@stitny$ cat /usr/etc/pam.d/greetd
#%PAM-1.0
auth requisite pam_nologin.so
auth include common-auth
account include common-account
password include common-password
session required pam_loginuid.so
session optional pam_keyinit.so force revoke
session include common-session
~@stitny$
but I have still /etc/pam.d/ as well and there is no greetd file. Which one is
used?
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1191924
Bug ID: 1191924
Summary: kernel-source.git/README outdated
Classification: openSUSE
Product: openSUSE Tumbleweed
Version: Current
Hardware: x86-64
OS: Linux
Status: NEW
Severity: Normal
Priority: P5 - None
Component: Kernel
Assignee: kernel-bugs(a)opensuse.org
Reporter: ohering(a)suse.com
QA Contact: qa-bugs(a)suse.de
Found By: ---
Blocker: ---
There is a section "Before You Commit -- Things To Check" in
kernel-source.git/README, it will likely not work out of the box.
According to rpm/kernel-binary.spec.in, at least three more packages beside the
obvious gcc/make/patch need to be installed:
BuildRequires: libopenssl-devel
BuildRequires: libelf-devel
BuildRequires: dwarves >= 1.21
Furthermore rapidquilt is not mentioned. It is not strictly required, but one
can hardly live without it.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1188589
Bug ID: 1188589
Summary: libbpf: failed to find valid kernel BTF
Classification: openSUSE
Product: openSUSE Tumbleweed
Version: Current
Hardware: Other
OS: Other
Status: NEW
Severity: Normal
Priority: P5 - None
Component: Kernel
Assignee: kernel-bugs(a)opensuse.org
Reporter: mrostecki(a)suse.com
QA Contact: qa-bugs(a)suse.de
Found By: ---
Blocker: ---
Since the update to the TW snapshot with the kernel 5.13.2-1, I see the
following errors when trying to load BPF CO-RE skeletons with libbpf:
libbpf: failed to find valid kernel BTF
libbpf: Error loading vmlinux BTF: -3
The full example - I'm trying to load BPF programs which I have in this
project: https://github.com/rancher-sandbox/lockc
and the full output is:
��� sudo ./out/lockcd
libbpf: elf: skipping unrecognized data section(9) .rodata.str1.1
libbpf: failed to find valid kernel BTF
libbpf: Error loading vmlinux BTF: -3
libbpf: failed to load object 'lockc_bpf'
libbpf: failed to load BPF skeleton 'lockc_bpf': -3
Error: libbpf error
Caused by:
System error, errno: 3
Most likely, the solution for them would be setting the following kernel
parameters to "y":
CONFIG_DEBUG_INFO_REDUCED
CONFIG_DEBUG_INFO_SPLIT
But I'm not entirely sure yet. trying to test that...
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1190261
Bug ID: 1190261
Summary: Kernel scriptlets: XXX: Only call mokutil if UEFI and
shim are used
Classification: openSUSE
Product: openSUSE Tumbleweed
Version: Current
Hardware: Other
OS: Other
Status: NEW
Severity: Normal
Priority: P5 - None
Component: Kernel
Assignee: kernel-bugs(a)opensuse.org
Reporter: martin.wilck(a)suse.com
QA Contact: qa-bugs(a)suse.de
Found By: ---
Blocker: ---
Spin-off from bug 1189841.
From https://github.com/openSUSE/suse-module-tools/pull/33:
@mwilck:
so why not test this? e.g. like this:
if [ "$(mokutil --sb-state 2>/dev/null)" = "SecureBoot enabled" ]; then
...
fi
@hramrach:
???
The part that github displays as context for this comment does not look
relevant
@hramrach hramrach 21 hours ago Member
Right, if you refer to
XXX: Only call mokutil if UEFI and shim are used
then I have no opinion on that.
Should be probably handled in a separate bug and the implications of any
possible check discussed to death.
@hramrach hramrach 21 hours ago Member
Actually, there is the problem that on arm64 you suddenly get from no shim to
shim on SP update without any warning so this is really hairy to get right.
Really deserves a separate bug.
--
You are receiving this mail because:
You are on the CC list for the bug.