Bug 1224150 - [Build 20240511] boot_encrypt: grub does not ask for encryption key
Summary: [Build 20240511] boot_encrypt: grub does not ask for encryption key
Status: IN_PROGRESS
Alias: None
Product: openSUSE Tumbleweed
Classification: openSUSE
Component: Bootloader (show other bugs)
Version: Current
Hardware: Other Other
: P5 - None : Major (vote)
Target Milestone: ---
Assignee: Cliff Zhao
QA Contact: E-mail List
URL: https://openqa.opensuse.org/tests/417...
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2024-05-12 07:12 UTC by Dominique Leuenberger
Modified: 2024-05-16 14:14 UTC (History)
1 user (show)

See Also:
Found By: openQA
Services Priority:
Business Priority:
Blocker: Yes
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Dominique Leuenberger 2024-05-12 07:12:50 UTC
## Observation

Grub no longer asks for the decryption key.

The snapshot contained a grub2 change:

+- Fix gcc error with CFLAGS=-Og
+  * grub2-grubenv-in-btrfs-header.patch
+

Which sounds harmless

there were also plymouth changes, but the failure seems too early for plymouth


openQA test in scenario opensuse-Tumbleweed-NET-x86_64-lvm-encrypt-separate-boot@64bit fails in
[boot_encrypt](https://openqa.opensuse.org/tests/4179275/modules/boot_encrypt/steps/2)

## Test suite description
Same as lvm-full-encrypt, but with separate boot not encrypted partition. Maintainer: riafarov

INSTALLONLY=1
UNENCRYPTED_BOOT=1
DESKTOP=gnome
ENCRYPT=1
FULL_LVM_ENCRYPT=1


## Reproducible

Fails since (at least) Build [20240509](https://openqa.opensuse.org/tests/4172240)


## Expected result

Last good: [20240508](https://openqa.opensuse.org/tests/4169788) (or more recent)


## Further details

Always latest result in this scenario: [latest](https://openqa.opensuse.org/tests/latest?arch=x86_64&distri=opensuse&flavor=NET&machine=64bit&test=lvm-encrypt-separate-boot&version=Tumbleweed)
Comment 1 Dominique Leuenberger 2024-05-12 15:09:42 UTC
Tested with grub2 reverted: failure persists
Which makes plymouth the more likely candidate.

Reverted that one now to test
Comment 2 Dominique Leuenberger 2024-05-12 17:50:08 UTC
With reverted Plymouth, we pass over the decryption of the disk - i.e Plymouth as issue confirmed

https://openqa.opensuse.org/tests/latest?arch=x86_64&distri=opensuse&flavor=NET&machine=64bit&test=lvm-encrypt-separate-boot&version=Tumbleweed
(Tests fails, but unrelated to boot decrypt)
Comment 4 Jia Zhaocong 2024-05-13 08:40:50 UTC
The qcow2 is generated at https://openqa.opensuse.org/tests/4182076/asset/hdd/tumbleweed-encrypt-debug.qcow2

BTW, this failure no longer happens in my recent reruns.
Comment 5 Dominique Leuenberger 2024-05-13 10:56:54 UTC
(In reply to Jia Zhaocong from comment #4)
> The qcow2 is generated at
> https://openqa.opensuse.org/tests/4182076/asset/hdd/tumbleweed-encrypt-debug.
> qcow2
> 
> BTW, this failure no longer happens in my recent reruns.

==> With reverted Plymouth, we pass over the decryption of the disk - i.e Plymouth as issue confirmed

https://build.opensuse.org/package/rdiff/openSUSE:Factory/plymouth?linkrev=base&rev=129

The old state has been resubmitted to the devel project as
  https://build.opensuse.org/request/show/1173570
Comment 6 Cliff Zhao 2024-05-16 13:53:42 UTC
Zhaocong also found that:
The password is being asked on serial console, https://openqa.opensuse.org/tests/4179275/logfile?filename=serial0.txt
I confirmed that is correct. Thank you Zhaocong.

When I launch the image offline, the password screen display normally. even I'm watching the serial output, the result is the same.
Comment 7 Cliff Zhao 2024-05-16 13:57:51 UTC
(In reply to Dominique Leuenberger from comment #5)
> (In reply to Jia Zhaocong from comment #4)
> > The qcow2 is generated at
> > https://openqa.opensuse.org/tests/4182076/asset/hdd/tumbleweed-encrypt-debug.
> > qcow2
> > 
> > BTW, this failure no longer happens in my recent reruns.
> 
> ==> With reverted Plymouth, we pass over the decryption of the disk - i.e
> Plymouth as issue confirmed
Hi Dominique:
Do you mean it's always happen, or you just run it once and find fails when decrypt the disk? Thank you!
Comment 8 Cliff Zhao 2024-05-16 14:08:38 UTC
(In reply to Jia Zhaocong from comment #4)
> The qcow2 is generated at
> https://openqa.opensuse.org/tests/4182076/asset/hdd/tumbleweed-encrypt-debug.
> qcow2
> 
> BTW, this failure no longer happens in my recent reruns.

Hi Zhaocong:
Could you show me the exact command to launch the VM the same with the openQA platform? Especially the serial console device. Since I didn't see this problem happen on my qemu VM. as comment6 said.
It is a device initialization time race related bug, I can not decide if it is introduced by this update. But even it happens 1 time, it should be a problem. and it's necessary to reproduce the it offline to collect more infos.
Thank you so much!
Comment 9 Dominique Leuenberger 2024-05-16 14:13:38 UTC
https://openqa.opensuse.org/tests/latest?arch=x86_64&distri=opensuse&flavor=NET&machine=64bit&test=lvm-encrypt-separate-boot&version=Tumbleweed#next_previous

Go back one page until you see snapshot 0511
The test ran 5 times into this error - when it finally passed (with validate_encrypt failing) is when snapshot 0511 was repushed to QA with Plymouth reverted

so: definitively NOT a one-time failure
Comment 10 Dominique Leuenberger 2024-05-16 14:14:39 UTC
As plymouth was revered in Factory: you CANNOT rely on Factory for your tests.