[Kernel-packages] [Bug 1877533] Comment bridged from LTC Bugzilla

2022-03-30 Thread bugproxy
--- Comment From boris.m...@de.ibm.com 2022-03-30 09:22 EDT--- With the bug being fixed (in kdump-tools - 1:1.6.10ubuntu1) we can close this item. Changing IBM bugzilla status to: ==> CLOSED -- You received this bug notification because you are a member of Kernel Packages, which is subsc

[Kernel-packages] [Bug 1877533] Comment bridged from LTC Bugzilla

2021-12-06 Thread bugproxy
--- Comment From mihaj...@de.ibm.com 2021-12-06 06:33 EDT--- Thanks for the pointer. I am perfectly fine with option 1. It would still help, if the documentation would call out that for less than 4G together with an encrypted root filesystem (using the LUKS2 defaults) kdump will not work.

[Kernel-packages] [Bug 1877533] Comment bridged from LTC Bugzilla

2021-12-06 Thread bugproxy
--- Comment From mihaj...@de.ibm.com 2021-12-06 04:21 EDT--- Coming back to the default for 2-4G, which will not allow the decryption of the root volume, see comments above. Will this be addressed via a warning message during install/update or at least some documentation? -- You receive

[Kernel-packages] [Bug 1877533] Comment bridged from LTC Bugzilla

2021-05-07 Thread bugproxy
--- Comment From heinz-werner_se...@de.ibm.com 2021-05-07 04:07 EDT--- @Canonical, will this topic be addressed at least with 21.10? Many thx -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to makedumpfile in Ubuntu. https://bugs.laun

[Kernel-packages] [Bug 1877533] Comment bridged from LTC Bugzilla

2020-11-13 Thread bugproxy
--- Comment From mihaj...@de.ibm.com 2020-11-13 04:03 EDT--- This is a setup without crypto cards (Secure Execution guests don't support passthrough yet). I think that we can live with the new kdump default settings, as I wouldn't want to suggest putting half of the memory away for kdump

[Kernel-packages] [Bug 1877533] Comment bridged from LTC Bugzilla

2020-10-29 Thread bugproxy
--- Comment From mihaj...@de.ibm.com 2020-10-29 09:59 EDT--- With 2G, the crashkernel reservation will be 320K, which will not suffice to unlock the LUKS volume when processing kdump. The installation was done using 2G. Changing the VM size to 4+G will reserve 512K, and with this size kdu

[Kernel-packages] [Bug 1877533] Comment bridged from LTC Bugzilla

2020-10-14 Thread bugproxy
--- Comment From mihaj...@de.ibm.com 2020-10-14 07:51 EDT--- Sorry for not responfing earlier. After installing a new system I can see that the update happening: $ cat /proc/cmdline root=/dev/mapper/vgubuntu-root crashkernel=2G-4G:320M,4G-32G:512M,32G-64G:1024M,64G-128G:2048M,128G-:4096M

[Kernel-packages] [Bug 1877533] Comment bridged from LTC Bugzilla

2020-10-01 Thread bugproxy
--- Comment From mihaj...@de.ibm.com 2020-10-01 12:49 EDT--- The zipl.conf content was there right after the installation, before even installing the kdump tools. Hmm ... but I was using the legacy di installer from http://ports.ubuntu.com/dists/focal/main/installer-s390x/current/legacy-

[Kernel-packages] [Bug 1877533] Comment bridged from LTC Bugzilla

2020-10-01 Thread bugproxy
--- Comment From mihaj...@de.ibm.com 2020-10-01 09:43 EDT--- Took me a bit longer than expected, as I ran into some other unrelated issue. Unfortunately I was not successful. What I did on a pristine Ubuntu 20.04.1 install with a luks-encrypted setup was: $ add-apt-repository ppa:cascard

[Kernel-packages] [Bug 1877533] Comment bridged from LTC Bugzilla

2020-09-24 Thread bugproxy
--- Comment From mihaj...@de.ibm.com 2020-09-24 04:57 EDT--- Quick question, is my understanding correct, that if I upgrade the package the crashkernel size should be increased in zipl.conf? -- You received this bug notification because you are a member of Kernel Packages, which is subsc

[Kernel-packages] [Bug 1877533] Comment bridged from LTC Bugzilla

2020-07-06 Thread bugproxy
--- Comment From buend...@de.ibm.com 2020-07-06 13:42 EDT--- Note if you want to use LUKS2 with protected key dm-crypt, we do not recommend to use argon type PBKDF but to rather use PKKDF2, because passphrased do not contribute to the security of the secure key in the key slot. Yet I do n

[Kernel-packages] [Bug 1877533] Comment bridged from LTC Bugzilla

2020-06-22 Thread bugproxy
--- Comment From mihaj...@de.ibm.com 2020-06-22 07:57 EDT--- Using an encrypted root volume will more or less always fail, as the default crashkernel size is too small (and has always been) for decryption of a LUKS volume using Argon2i. I'd assume this is true for all architectures. The c

[Kernel-packages] [Bug 1877533] Comment bridged from LTC Bugzilla

2020-06-22 Thread bugproxy
--- Comment From heinz-werner_se...@de.ibm.com 2020-06-22 06:00 EDT--- @Canonical: Is a final decision made by Dev, how to implement this request? Many thx in advance.. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to makedumpfile