|
Bugzilla – Full Text Bug Listing |
| Summary: | Leap 15.3 cannot handle encrypted swap with random key | ||
|---|---|---|---|
| Product: | [openSUSE] openSUSE Distribution | Reporter: | Neil Rickert <nwr10cst-oslnx> |
| Component: | Kernel | Assignee: | Coly Li <colyli> |
| Status: | RESOLVED DUPLICATE | QA Contact: | E-mail List <qa-bugs> |
| Severity: | Major | ||
| Priority: | P5 - None | CC: | aschnell, hannsj_uhl, heming.zhao, jjletho67-esus, msuchanek, nwr10cst-oslnx, rgoldwyn, tiwai |
| Version: | Leap 15.3 | ||
| Target Milestone: | --- | ||
| Hardware: | x86-64 | ||
| OS: | Other | ||
| Whiteboard: | |||
| Found By: | --- | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
| Attachments: | Screenshot showing error during install | ||
|
Description
Neil Rickert
2021-04-06 20:13:48 UTC
Created attachment 848024 [details]
Screenshot showing error during install
Reassigned to Coly (as well as bug 1183063). hello, could you please try latest leap 15.3 ISO/repo. I think your issue is duplicate with bsc#1184134 Yes, this appears to be fixed with the latest release of Leap 15.3. I took the system that I had previously installed, and I then updated kernel-default kernel-default-extra kernel-default-optional. I then rebooted with this new kernel. And the randomly encrypted swap is now recognized. Thanks. I'll probably delete that virtual machine now that it isn't needed for further testing this. I do have another VM with Leap 15.0 that uses randomly encrypted swap. So sometime later this week I'll either upgrade in place or install 15.3 to replace 15.0. That will be a further test of this. wait for your test result, if your issue is totally resolved, this bug will set duplicated for bsc#1184134 I have completed my testing.
I started with a KVM virtual machine that had Leap 15.0 installed and was using a randomly encrypted swap.
First test: I did an online update to Leap 15.3, using:
zypper --releasever=15.3 dup
Note that "zypp.conf" already allows vendor-change.
This went pretty well. There were a bunch of "NOKEY" errors, but this did not stop the install. I'm pretty sure that there's another bug for those errors.
On reboot, after the update, the swap was working correctly, and
cat /proc/swaps
showed that it was using an encrypted device ("/dev/dm-0").
Second test: I did a clean install to the same VM. I used expert partitioner and import mount points during the install, to get exactly the same partitioning. This worked perfectly. The installer recognized the randomly encrypted swap, and set it up correctly.
Yes, it seems safe to close this bug as fixed. I'll leave that to you, because you want to mark it as a duplicate of a bug that I am unable to access.
Thanks for testing *** This bug has been marked as a duplicate of bug 1184134 *** Hi, I've just performed a test with the latest beta (build 142.1, installed from scratch) and I can confirm the bug has disappeared. |