[Bug 1063249] New: Encrypted LVM password no longer requested after systemd update --> boot fails completely
http://bugzilla.suse.com/show_bug.cgi?id=1063249 Bug ID: 1063249 Summary: Encrypted LVM password no longer requested after systemd update --> boot fails completely Classification: openSUSE Product: openSUSE Distribution Version: Leap 42.3 Hardware: x86-64 OS: openSUSE 42.3 Status: NEW Severity: Critical Priority: P5 - None Component: Basesystem Assignee: bnc-team-screening@forge.provo.novell.com Reporter: sndirsch@suse.com QA Contact: qa-bugs@suse.de Found By: --- Blocker: --- After updating systemd, the system no longer asks for the LVM encryption password during boot. Instead it runs in a timeout and an emergency shell. :-( I made sure, that neither a kernel update nor a dracut update is responsible for this. Both updates regenerate the initrds and I rebooted afterwards successfully. Still working systemd was: (latest changelog entry) * Fr Jun 23 2017 fbui@suse.com - Import commit 6c14b00040edfe5b60aadb6a195955990e8a423f e2026f234 core:execute: fix fork() fail handling in exec_spawn() (bsc#1040258) The broken systemd update, which also regenerated initrds is: (added changelog entries since the last known working systemd version, see above) * Do Aug 31 2017 fbui@suse.com - Import commit 533ab326a0d1826c14a87a765087b926e944c867 289949a42 device: make sure to remove all device units sharing the same sysfs path (#6679) 3b81de623 coredumpctl: fix handling of files written to fd ef76ac9da udev/path_id: introduce support for NVMe devices (#4169) (bsc#1045987) 341e240ce core: use an AF_UNIX/SOCK_DGRAM socket for cgroup agent notification (v228) (bsc#1045384 bsc#1047379) * Mi Aug 30 2017 fbui@suse.com - Add 0001-Revert-core-device-Use-JobRunningTimeoutSec-for-devi.patch (bsc#1048605) It's a temporary but urgent fix for a regression discovered in bug 1048605. The fix is still under discussion with upstream but we need to make progress here and limit the number of affected users. Consequently this fix reintroduces bsc#1004995 (the bug report has been re-opened) but this one is far less critical and a workaround was provided. The final solution will fix both bugs. * Mi Aug 30 2017 fbui@suse.com - Import commit 9a04d42dd9e2f9035f79952b2d173a7b3af7fb2f 7a4935268 compat-rules: drop the boggus 'import everything' rule (bsc#1046268) * Mi Jul 26 2017 fbui@suse.com - Import commit 506ef1c91d97cfa4c1e321f57dbf71c7fc42d422 8ea065d44 compat-rules: don't rely on ID_SERIAL when generating 'by-id' symlinks for NVMe devices (bsc#1048679) ecc54d349 timesyncd: don't use compiled-in list if FallbackNTP has been configured explicitly 1142bd715 fstab-generator: fix new NULL dereference. (#6296) a2c8f9032 basic/strv: add STRPTR_IN_SET 3a80fbf4a fstab-generator: handle NFS "bg" mounts correctly. (#6103) (bnc#874665 fate#323464) 3a09ebb0b Revert "fstab-generator: add support for the nfs mount option bg" 946e3c60c fstab-generator: add x-systemd.mount-timeout (#4603) * Di Jul 11 2017 fbui@suse.com - Make sure dracut (if installed) will embed the new compat rule The new compat rules (as well as the compat generation number) must be embedded in the initramfs so make sure that the installed dracut supports it. * Mi Jul 05 2017 fbui@suse.com - Add minimal support for boot.d/* scripts in systemd-sysv-convert (boo#1046750) * Mo Jul 03 2017 fbui@suse.com - Import commit 642a5846a465085dc0af184e38a79e1be25080bd Here is a special import: the udev rules kept for generating some old/deprecated persistent symlinks have been moved into a separate rule file rules/61-persistent-storage-compat.rules. This has been done mainly to prevent generating them for new installations. 642a5846a rules: move the rules dealing with SCSI truncated serials for ATA device to the compat persistent storage file 2c4fe971f Revert "udev add path_compat_id to provide backwards compatibility with SLE11" 63da94fcc Revert "udev: rules persistent device names for NVMe devices" d420489d8 Revert "udev: re-enable creation of by-id scsi links for ATA devices" eae935ef8 Revert "udev: add old fashion phy SAS disk enumeration" e010132ed automount: don't lstat(2) upon umount request (#6086) (bsc#1040968) d6dbfd264 udev: re-add back SAS addr by-path symlinks (bsc#1040153) 0861598de udev: move compat rules in a dedicated rule file 59e43084b udev: add old fashion phy SAS disk enumeration 40e6c18e5 udev: re-enable creation of by-id scsi links for ATA devices 7026e63a0 udev: rules persistent device names for NVMe devices 70441d4fb udev add path_compat_id to provide backwards compatibility with SLE11 * Mo Jul 03 2017 fbui@suse.com - Import commit 3c369f1c4a4931c3bd807413859fb1967d269e12 3bf83e8bf resolved: simplify alloc size calculation (bsc#1045290 CVE-2017-9445) bd7b84227 build-sys: add check for gperf lookup function signature (#5055) I will attach a screenshot, journalctl log and rdsosreport.txt -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c1
--- Comment #1 from Stefan Dirsch
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c2
--- Comment #2 from Stefan Dirsch
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c3
--- Comment #3 from Stefan Dirsch
http://bugzilla.suse.com/show_bug.cgi?id=1063249
Stefan Dirsch
http://bugzilla.suse.com/show_bug.cgi?id=1063249
Stefan Dirsch
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c8
Franck Bui
After updating systemd, the system no longer asks for the LVM encryption password during boot. Instead it runs in a timeout and an emergency shell. :-(
I made sure, that neither a kernel update nor a dracut update is responsible for this. Both updates regenerate the initrds and I rebooted afterwards successfully.
Hm the update of systemd came with the following change: * Di Jul 11 2017 fbui@suse.com - Make sure dracut (if installed) will embed the new compat rule The new compat rules (as well as the compat generation number) must be embedded in the initramfs so make sure that the installed dracut supports it. This is implemented with the following conflict directive in the spec file: Conflicts: dracut < 044.1 So you're supposed to update dracut to its latest version as well, which is dracut-044.1-26.1.x86_64 but according to your logs your version is only at 044-26.1 ... How is this possible ? -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c9
--- Comment #9 from Stefan Dirsch
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c10
--- Comment #10 from Stefan Dirsch
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c11
--- Comment #11 from Stefan Dirsch
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c12
--- Comment #12 from Stefan Dirsch
Created attachment 745344 [details] rdsosreport.txt
Again this looks like 044-26.1 instead of 044.1-26.1, but I double checked after the online update that dracut is on 0.44.1 level with latest changelog entry ------------------------------------------------------------------- Tue Aug 29 13:46:38 UTC 2017 - daniel.molkentin@suse.com - Don't detect crc32.ko as built-in (bsc#1054538) * adds 0537-dracut-init.sh-ignore-crc32.ko-in-builtin-test.patch - Enable systemd-based core dumps for initrd (bsc#1054809) * adds 0538-Enable-core-dumps-with-systemd-from-initrd.patch Also I even manually ran mkinitrd afterwards. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c13
--- Comment #13 from Franck Bui
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c14
--- Comment #14 from Stefan Dirsch
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c15
--- Comment #15 from Franck Bui
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c16
Stefan Dirsch
sorry for asking again but could you show the same debug logs but with a working systemd ?
Sure, can do this on monday. Be aware, that this means reinstalling the system. So always takes some time. Actually, this is the bugreport (+ the data loss you have, when you've observed this bug the first time). ;-) -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c17
--- Comment #17 from Franck Bui
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c18
--- Comment #18 from Stefan Dirsch
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c19
--- Comment #19 from Stefan Dirsch
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c20
Stefan Dirsch
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c21
--- Comment #21 from Franck Bui
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c22
--- Comment #22 from Stefan Dirsch
Thanks.
Just to make sure the installation was done from the Leap 42.3 ISO, right ?
Yes, yes, yes. ISO written on a USB-stick.
IOW udev-228-25.6.1.x86_64 was the version used during the installation until you updated and broke your system.
In the reinstalled system I see udev-228-27.2.x86_64 (without any Online updates)
So basically during the installation, /dev/disk/by-id/cr_-LENSE20512GMSP34MEAT2TA_1142267006586-part2 was used for initializing /etc/crypttab.
No, there is no /dev/disk/by-id/cr_-LENSE20512GMSP34MEAT2TA_1142267006586-part2, it is /dev/disk/by-id/-LENSE20512GMSP34MEAT2TA_1142267006586-part2 (without cr_).
If so, I currently don't see how this could have happened and I would be interested in seeing the output of "udevadm test /block/nvme0n1p2". Also "udevadm info -e" might help.
Before I do this wrong. Should I do this after breaking system, i.e. in the emergency shell or in the working system? Currently I have a working system (before online update).
I'm afraid you need to reinstall your system, sorry.
This is no problem, if this can be of any help. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c23
--- Comment #23 from Stefan Dirsch
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c24
--- Comment #24 from Franck Bui
Before I do this wrong. Should I do this after breaking system, i.e. in the emergency shell or in the working system? Currently I have a working system (before online update).
in the working system please ! -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c25
--- Comment #25 from Franck Bui
Ah. And there is no /block/nvme0n1p2. Should I use /sys/block/nvme0n1/nvme0n1p2/ instead? This matches best I believe.
yep sorry for the typo. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c26
--- Comment #26 from Stefan Dirsch
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c27
--- Comment #27 from Stefan Dirsch
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c28
--- Comment #28 from Franck Bui
KERNEL=="nvme*", ENV{DEVTYPE}=="disk", ENV{ID_SERIAL}!="?*", IMPORT{program}="scsi_id --export --whitelisted -d $tempnode", ENV{ID_BUS}="nvme" KERNEL=="sd*|sr*|cciss*|nvme*", ENV{DEVTYPE}=="disk", ENV{ID_SERIAL}=="?*", SYMLINK+="disk/by-id/$env{ID_BUS}-$env{ID_SERIAL}" KERNEL=="sd*|cciss*|nvme*", ENV{DEVTYPE}=="partition", ENV{ID_SERIAL}=="?*", SYMLINK+="disk/by-id/$env{ID_BUS}-$env{ID_SERIAL}-part%n"
ID_BUS is empty although it should be set to "nvme" by the first rule. I don't see how this can happen... Could you show the output of "/usr/lib/udev/scsi_id --export --whitelisted -d /dev/nvme0n1" ? -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c29
--- Comment #29 from Stefan Dirsch
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c30
Franck Bui
KERNEL=="nvme*[0-9]n*[0-9]", ENV{DEVTYPE}=="disk", ATTRS{model}=="?*", ENV{ID_SERIAL_SHORT}=="?*", ENV{ID_SERIAL}="$attr{model}_$env{ID_SERIAL_SHORT}", ...
so 'ID_SERIAL' is set and therefore rule line 46 is skipped.
KERNEL=="nvme*", ENV{DEVTYPE}=="disk", ENV{ID_SERIAL}!="?*", IMPORT{program}="scsi_id --export --whitelisted -d $tempnode", ENV{ID_BUS}="nvme"
and that explains why brand new systems still continue to use such broken by-id symlinks (where the "nvme-" prefix is missing. Ludwig, couldn't we make the latest version of systemd/udev part of the ISO instead of shipping a broken version ? Don't the ISOs regularly updated ? Thanks. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c31
--- Comment #31 from Franck Bui
cr_-LENSE20512GMSP34MEAT2TA_1142267006586-part2 /dev/disk/by-id/-LENSE20512GMSP34MEAT2TA_1142267006586-part2 none none
becomes
cr_nvme-LENSE20512GMSP34MEAT2TA_1142267006586-part2 /dev/disk/by-id/nvme-LENSE20512GMSP34MEAT2TA_1142267006586-part2 none none
This way you will use the symlinks shipped by upstream and should be "safe" during the next updates. The symlink should work even if you don't update, and of course will hopefully work after updating. Thanks. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c32
--- Comment #32 from Stefan Dirsch
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c33
--- Comment #33 from Stefan Dirsch
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c34
--- Comment #34 from Franck Bui
Wow! Indeed this change fixes the issue for me! Thanks a lot!
Thanks a lot for helping me debugging this.
About updating the ISO. Sure it would be appreciated. Unfortunately we've given out promotion DVDs, which we obviously cannot update. Also ISOs are meanwhile on media, which we do not control.
Indeed but at least we could limit the number of impacted users.
Since this issue means complete data loss for the customer (I was happy that I've updated my system that early), I would like to know if you can think of any workaround, which the customer can apply in the emergency shell (or by other means). Then we could describe this below "Known issues for Leap 42.3".
Maybe from the emergency shell: /etc/crypptab may be fixed to use the correct symlink, then "systemctl daemon-reload" and then exit from the shell. Could you try that ?
And now I'm wondering, whether we see this issue also on sle12-sp3. I haven't tested this yet.
It depends on the version of udev shipped by the ISO... do you know where I could find such information ? -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c35
--- Comment #35 from Franck Bui
Can't we update systemd in a way, that we don't break customer's system that horribly including complete data loss?
We will certainly do that... however this means that we still continue to generate and use broken symlinks by default on systems having NVMe devices which we will need to support forever. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1063249
Stefan Dirsch
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c36
--- Comment #36 from Stefan Dirsch
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c37
--- Comment #37 from Stefan Dirsch
I could successfully change /etc/crypttab from emergency. Unfortunately this alone didn't help. Most likely one also needs to run dracut/mkinitrd to recreate initrd.
Tried that by using cryptsetup, lvm, mount, etc. but failed in the end. I'm afraid that's something, we cannot describe below "Known issues". We should really provide another systemd update, which fixes this issue. Seriously. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c38
--- Comment #38 from Stefan Dirsch
(In reply to Stefan Dirsch from comment #33)
Can't we update systemd in a way, that we don't break customer's system that horribly including complete data loss?
We will certainly do that... however this means that we still continue to generate and use broken symlinks by default on systems having NVMe devices which we will need to support forever.
Please let me know, once you have a fix available. I want to give it a try before I reinstall the machine for real, so things can be well tested. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c39
--- Comment #39 from Franck Bui
Tried that by using cryptsetup, lvm, mount, etc. but failed in the end. I'm afraid that's something, we cannot describe below "Known issues". We should really provide another systemd update, which fixes this issue. Seriously.
hmm this sounds like you tried to update /etc/cryptsetup located in your rootfs. If so I was suggesting to update the one in the initramfs which should be directly accessible at /etc/crypttab from the emergency shell. The recipe is quite simple: - edit /etc/crypttab and and the "nvme" prefix if it's missing. you can figure out it's missing if the by-id path starts with '-' - systemctl daemon-reload - exit from the emergency shell If that works you still need to update /etc/crypttab in your rootfs and run "mkinitrd". -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c40
--- Comment #40 from Franck Bui
Please let me know, once you have a fix available. I want to give it a try before I reinstall the machine for real, so things can be well tested.
Here we go: https://build.opensuse.org/package/show/home:fbui:systemd:next:openSUSE-Leap... -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c41
--- Comment #41 from Stefan Dirsch
hmm this sounds like you tried to update /etc/cryptsetup located in your rootfs.
That's correct.
If so I was suggesting to update the one in the initramfs which should be directly accessible at /etc/crypttab from the emergency shell.
The recipe is quite simple:
- edit /etc/crypttab and and the "nvme" prefix if it's missing. you can figure out it's missing if the by-id path starts with '-'
- systemctl daemon-reload
- exit from the emergency shell
Did this. Then I see two lines dracut-initqueue Warning: Not all disks have been found. dracut-initqueue Warning: You might want to regenerate the initramfs Nothing more happens then. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c42
--- Comment #42 from Stefan Dirsch
(In reply to Stefan Dirsch from comment #38)
Please let me know, once you have a fix available. I want to give it a try before I reinstall the machine for real, so things can be well tested.
Here we go:
https://build.opensuse.org/package/show/home:fbui:systemd:next:openSUSE- Leap42.3/systemd
Hooray! I can confirm, that this update fixes the issue. :-) I believe we want to see this update available ASAP. ;-) -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c43
--- Comment #43 from Franck Bui
dracut-initqueue Warning: Not all disks have been found. dracut-initqueue Warning: You might want to regenerate the initramfs
Nothing more happens then.
Hmm you probably need to start a couple services by hand before exiting the shell then... Maybe "systemctl restart cryptsetup.target" ? -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c44
--- Comment #44 from Franck Bui
Hooray! I can confirm, that this update fixes the issue. :-) I believe we want to see this update available ASAP. ;-)
Thanks the testing. I'll do my best to submit a new update, but unfortunately the last submission was declined because we're waiting for another fix to be submitted correctly... -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c45
--- Comment #45 from Franck Bui
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c46
--- Comment #46 from Stefan Dirsch
(In reply to Stefan Dirsch from comment #41)
dracut-initqueue Warning: Not all disks have been found. dracut-initqueue Warning: You might want to regenerate the initramfs
Nothing more happens then.
Hmm you probably need to start a couple services by hand before exiting the shell then...
Maybe "systemctl restart cryptsetup.target" ?
Ok. This opens the device successfully after I provided the password. Other than that the result is the same. System doesn't start. Same two messages as above. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c47
Ludwig Nussel
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c48
--- Comment #48 from Franck Bui
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c50
--- Comment #50 from Stefan Dirsch
*** Bug 1060226 has been marked as a duplicate of this bug. ***
OMG! This issue is known since 2017-09-25 and the culprit found just a few days
later by Jonathan Cottrill
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c51
--- Comment #51 from Ludwig Nussel
[...] Ludwig, I'm not sure what another entry in our release notes would help here.
There is no reference in release notes atm. People hit by the problem will find information about it in internet search engines if we put something in the release notes.
One of the systemd update was the culprit here. What we need here is another systemd Online update. ASAP.
Agreed. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c53
--- Comment #53 from Franck Bui
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c54
--- Comment #54 from Franck Bui
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c56
Franck Bui
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c59
--- Comment #59 from Franck Bui
Unfortunately, it's fairly involved, so only worth it for systems you really care about. :-)
Thanks a lot for writing this. There might be an easier way to boot a broken system though, I think the following steps should work: 1. Boot the broken system and append the following options to the kernel command line: rdinit=/bin/sh systemd.default_timeout_start_sec=10 2. A very early shell should be started instead of systemd. Now we should be able to fix /etc/crypttab contained in initd: sed -Ei 's,(cr_|by-id/)-,\1nvme-,g' /etc/crypttab 3. And finally boot systemd: exec /sbin/init During the boot process, there will be some errors related to /etc/crypttab from the rootfs containing references to the broken symlinks (the step 2. only fixed crypptab from initrd). Those errors shouldn't be fatal though but the system would wait until a timeout expires (1'30). That the reason why in step 1. we added "systemd.default_timeout_start_sec=10" option. Once the system booted, /etc/crypptab (from the rootfs) still needs to be fixed. The following steps should do that: 1. sed -Ei 's,(cr_|by-id/)-,\1nvme-,g' /etc/crypttab 2. mkinitrd -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c60
--- Comment #60 from Franck Bui
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c61
--- Comment #61 from Nicolas Rochard
http://bugzilla.suse.com/show_bug.cgi?id=1063249
Swamp Workflow Management
http://bugzilla.suse.com/show_bug.cgi?id=1063249
Marcus Meissner
http://bugzilla.suse.com/show_bug.cgi?id=1063249
Marcus Meissner
http://bugzilla.suse.com/show_bug.cgi?id=1063249
Franck Bui
http://bugzilla.suse.com/show_bug.cgi?id=1063249
Swamp Workflow Management
http://bugzilla.suse.com/show_bug.cgi?id=1063249
Swamp Workflow Management
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c67
--- Comment #67 from Swamp Workflow Management
http://bugzilla.suse.com/show_bug.cgi?id=1063249
Swamp Workflow Management
http://bugzilla.suse.com/show_bug.cgi?id=1063249
Swamp Workflow Management
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c68
--- Comment #68 from Swamp Workflow Management
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c69
Franck Bui
http://bugzilla.suse.com/show_bug.cgi?id=1063249
Swamp Workflow Management
http://bugzilla.suse.com/show_bug.cgi?id=1063249
http://bugzilla.suse.com/show_bug.cgi?id=1063249#c70
--- Comment #70 from Swamp Workflow Management
participants (1)
-
bugzilla_noreply@novell.com