You have been subscribed to a public bug:

Kdump log

---Problem Description---
The expectation for Secure Execution is that users encrypt their root device as 
part of the setup process. However, Kdumping on an Ubuntu 20.04 guest with an 
encrypted root partition drops user to initramfs console. When attempted on a 
non-secure, but encrypted guest, results came out to be the same.

---uname output---
Linux T257KVX 5.4.0-21-generic #25-Ubuntu SMP Sat Mar 28 13:10:00 UTC 2020 
s390x s390x s390x GNU/Linux
 
Machine Type = Type: 8562 Model: A00, LT2 
 
---Debugger---
A debugger is not configured
 
---Steps to Reproduce---
 1. Create a guest with an encrypted root partition. Encryption was done using 
the process available within the install.

virt-install --name ali-kdump-enc --vcpu 2 --memory 4096 --disk
size=8,path=/guestimages/ali-kdump-enc.qcow2,driver.iommu=on --network
network=default,model=virtio,driver.iommu=on --controller type=virtio-
serial,driver.iommu=on --controller type=scsi,driver.iommu=on
--memballoon none --boot hd --cdrom http://cdimage.ubuntu.com/ubuntu-
server/daily-live/current/focal-live-server-s390x.iso

2. Install linux-crashdump  
apt install linux-crashdump

3. Proceed through to converting the guest into a secure one, taking extra 
steps to make the crashkernel large enough to accommodate the swiotlb (I used 
1G)
sudo genprotimg -r /boot/initrd.img -p parmfile -i /boot/vmlinuz --no-verify -o 
/boot/secure-linux -V -k T257.crt

4. zipl and reboot into the now secured guest
5. Verify that kdump is ready
  - kdump-config show
  - kdump-config status
  - cat /sys/kernel/kexec_crash_size

6. Trigger a dump
   sudo sysctl -w kernel.sysrq=1
   echo c > /proc/sysrq-trigger

However, when this happens, I get the results presented in the kdump-
sec-enc.log file.

I suspected it was due to the root partition being encrypted and
expecting a password on startup (as this happened on an encrypted, non-
secure guest, but not on their non-encrypted counterparts), so I
attempted to setup a keyfile on a new guest that I created before the
installation of linux-crashdump, and conversion into a secure guest
using the following set of steps.

1. Create the key file in the unencrypted /boot partition
# dd if=/dev/urandom of=/boot/keyfile bs=1024 count=4
2. Set permissions
# chmod 0400 /boot/keyfile
3. Add the new file as unlock key to the encrypted volume
# cryptsetup -v luksAddKey /dev/vda2 /boot/keyfile
Enter any passphrase:
Enter your old/existing passphrase here. Expected output:
Key slot 0 unlocked.
Command successful.
4. Update /etc/crypttab with the line:
vda2_crypt UUID=684af433-487f-4c81-b310-81338a49588d /boot/keyfile luks
5. Update /etc/cryptsetup-initramfs/conf-hook to allow enable your keyfile at 
boot, e.g.:
KEYFILE_PATTERN=/boot/keyfile
6. Update initramfs with the following: update-initramfs -u

This will bypass the request for a password on boot, however, I  still
ran into the same errors presented in the log file (kdump-sec-enc.log).

-Post a private note with access information to the machine that the bug
is occuring on.


Guest Log

Guest's qemu log file

The kernel version for the guest that this was executed on is as follows:
xxxxx-kdump-sec-enc:~$ uname -r
5.4.0-26-generic

The host is slightly behind, but the bug takes place in context of the
guest's starting and stopping

Canonical, please advice on how to enable dumping onto an encrypted
volume to maintain confidentiality.

** Affects: linux (Ubuntu)
     Importance: Undecided
     Assignee: Skipper Bug Screeners (skipper-screen-team)
         Status: New


** Tags: architecture-s39064 bugnameltc-185637 severity-medium 
targetmilestone-inin2004
-- 
Kdumping on an Ubuntu 20.04 guest with an encrypted root partition drops user 
to initramfs console
https://bugs.launchpad.net/bugs/1875826
You received this bug notification because you are a member of Kernel Packages, 
which is subscribed to linux in Ubuntu.

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to