2019-01-25 13:22:11 |
TJ |
bug |
|
|
added bug |
2019-01-25 16:06:13 |
TJ |
description |
This is affecting 18.04 and others where cryptsetup v2 is used and has created a LUKS v2 container.
If booting to a shell in initialramfs with "break=premount" and manually executing:
cryptsetup --debug open /dev/sda3 LUKS_VG
...
Userspace crypto wrapper cannot use aes-xts-plain64 (-95)
...
-95 is -EOPNOTSUPP
Critical modules required are missing from the initrd.img when /etc/initramfs-tools/initramfs.conf contains:
MODULES=dep
There is a similar bug in Debian but that is related to Debian not including the 'xts' module when the CPU doesn't support aesni. In Ubuntu 'xts' is built-in to the kernel image.
"cryptsetup-initramfs: Unbootable initrd compiled with MODULES=dep on systems lacking AES-NI"
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901884
However the underlying Debian fix may solve this case too; I've yet to get to a state where I can test that.
In the Ubuntu case it appears the modules required are the algorithm interface modules.
I need to confirm which modules but currently it looks like af_alg, algif_skcipher, algif_hash. |
This is affecting 18.04 and others where cryptsetup v2 is used and has created a LUKS v2 container.
If booting to a shell in initialramfs with "break=premount" and manually executing:
cryptsetup --debug open /dev/sda3 LUKS_VG
...
Userspace crypto wrapper cannot use aes-xts-plain64 (-95)
...
-95 is -EOPNOTSUPP
Critical modules required are missing from the initrd.img when /etc/initramfs-tools/initramfs.conf contains:
MODULES=dep
There is a similar bug in Debian but that is related to Debian not including the 'xts' module when the CPU doesn't support aesni. In Ubuntu 'xts' is built-in to the kernel image.
"cryptsetup-initramfs: Unbootable initrd compiled with MODULES=dep on systems lacking AES-NI"
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901884
However the underlying Debian fix may solve this case too; I've yet to get to a state where I can test that.
In the Ubuntu case it appears the modules required are the algorithm interface modules.
The workaround is adding these modules to /etc/initramfs-tools/modules:
algif_skcipher
algif_hash
algif_aed
algif_rng
Because these belong to the user API I cannot see a way for the cryptsetup hook script to determine if these are needed (presumably it'd need to consider the 'luksDump' output to see what is being used.
The easiest solution might be to always ensure these modules are added by the hook in additional to the auto-detected modules. |
|
2019-01-25 16:06:18 |
TJ |
cryptsetup (Ubuntu): status |
New |
Confirmed |
|
2019-01-25 16:07:12 |
TJ |
description |
This is affecting 18.04 and others where cryptsetup v2 is used and has created a LUKS v2 container.
If booting to a shell in initialramfs with "break=premount" and manually executing:
cryptsetup --debug open /dev/sda3 LUKS_VG
...
Userspace crypto wrapper cannot use aes-xts-plain64 (-95)
...
-95 is -EOPNOTSUPP
Critical modules required are missing from the initrd.img when /etc/initramfs-tools/initramfs.conf contains:
MODULES=dep
There is a similar bug in Debian but that is related to Debian not including the 'xts' module when the CPU doesn't support aesni. In Ubuntu 'xts' is built-in to the kernel image.
"cryptsetup-initramfs: Unbootable initrd compiled with MODULES=dep on systems lacking AES-NI"
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901884
However the underlying Debian fix may solve this case too; I've yet to get to a state where I can test that.
In the Ubuntu case it appears the modules required are the algorithm interface modules.
The workaround is adding these modules to /etc/initramfs-tools/modules:
algif_skcipher
algif_hash
algif_aed
algif_rng
Because these belong to the user API I cannot see a way for the cryptsetup hook script to determine if these are needed (presumably it'd need to consider the 'luksDump' output to see what is being used.
The easiest solution might be to always ensure these modules are added by the hook in additional to the auto-detected modules. |
This is affecting 18.04 and others where cryptsetup v2 is used and has created a LUKS v2 container.
If booting to a shell in initialramfs with "break=premount" and manually executing:
cryptsetup --debug open /dev/sda3 LUKS_VG
...
Userspace crypto wrapper cannot use aes-xts-plain64 (-95)
...
-95 is -EOPNOTSUPP
Critical modules required are missing from the initrd.img when /etc/initramfs-tools/initramfs.conf contains:
MODULES=dep
There is a similar bug in Debian but that is related to Debian not including the 'xts' module when the CPU doesn't support aesni. In Ubuntu 'xts' is built-in to the kernel image.
"cryptsetup-initramfs: Unbootable initrd compiled with MODULES=dep on systems lacking AES-NI"
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901884
However the underlying Debian fix may solve this case too; I've yet to get to a state where I can test that.
In the Ubuntu case it appears the modules required are the algorithm interface modules.
The workaround is adding these modules to /etc/initramfs-tools/modules:
algif_skcipher
algif_hash
algif_aed
algif_rng
Because these belong to the crypto user API I cannot see a way for the cryptsetup hook script to determine if these are needed (presumably it'd need to consider the 'luksDump' output to see what is being used.
The easiest solution might be to always ensure these modules are added by the hook in additional to the auto-detected modules. |
|
2019-01-25 16:07:35 |
TJ |
description |
This is affecting 18.04 and others where cryptsetup v2 is used and has created a LUKS v2 container.
If booting to a shell in initialramfs with "break=premount" and manually executing:
cryptsetup --debug open /dev/sda3 LUKS_VG
...
Userspace crypto wrapper cannot use aes-xts-plain64 (-95)
...
-95 is -EOPNOTSUPP
Critical modules required are missing from the initrd.img when /etc/initramfs-tools/initramfs.conf contains:
MODULES=dep
There is a similar bug in Debian but that is related to Debian not including the 'xts' module when the CPU doesn't support aesni. In Ubuntu 'xts' is built-in to the kernel image.
"cryptsetup-initramfs: Unbootable initrd compiled with MODULES=dep on systems lacking AES-NI"
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901884
However the underlying Debian fix may solve this case too; I've yet to get to a state where I can test that.
In the Ubuntu case it appears the modules required are the algorithm interface modules.
The workaround is adding these modules to /etc/initramfs-tools/modules:
algif_skcipher
algif_hash
algif_aed
algif_rng
Because these belong to the crypto user API I cannot see a way for the cryptsetup hook script to determine if these are needed (presumably it'd need to consider the 'luksDump' output to see what is being used.
The easiest solution might be to always ensure these modules are added by the hook in additional to the auto-detected modules. |
This is affecting 18.04 and others where cryptsetup v2 is used and has created a LUKS v2 container.
If booting to a shell in initialramfs with "break=premount" and manually executing:
cryptsetup --debug open /dev/sda3 LUKS_VG
...
Userspace crypto wrapper cannot use aes-xts-plain64 (-95)
...
-95 is -EOPNOTSUPP
Critical modules required are missing from the initrd.img when /etc/initramfs-tools/initramfs.conf contains:
MODULES=dep
There is a similar bug in Debian but that is related to Debian not including the 'xts' module when the CPU doesn't support aesni. In Ubuntu 'xts' is built-in to the kernel image.
"cryptsetup-initramfs: Unbootable initrd compiled with MODULES=dep on systems lacking AES-NI"
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901884
However the underlying Debian fix may solve this case too; I've yet to get to a state where I can test that.
In the Ubuntu case it appears the modules required are the algorithm interface modules.
The workaround is adding these modules to /etc/initramfs-tools/modules:
algif_skcipher
algif_hash
algif_aed
algif_rng
Because these belong to the crypto user API I cannot see a way for the cryptsetup hook script to determine if these are needed (presumably it'd need to consider the 'luksDump' output to see what is being used.
The easiest solution might be to always ensure these modules are added by the hook in addition to the auto-detected modules. |
|
2019-01-27 17:20:05 |
TJ |
description |
This is affecting 18.04 and others where cryptsetup v2 is used and has created a LUKS v2 container.
If booting to a shell in initialramfs with "break=premount" and manually executing:
cryptsetup --debug open /dev/sda3 LUKS_VG
...
Userspace crypto wrapper cannot use aes-xts-plain64 (-95)
...
-95 is -EOPNOTSUPP
Critical modules required are missing from the initrd.img when /etc/initramfs-tools/initramfs.conf contains:
MODULES=dep
There is a similar bug in Debian but that is related to Debian not including the 'xts' module when the CPU doesn't support aesni. In Ubuntu 'xts' is built-in to the kernel image.
"cryptsetup-initramfs: Unbootable initrd compiled with MODULES=dep on systems lacking AES-NI"
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901884
However the underlying Debian fix may solve this case too; I've yet to get to a state where I can test that.
In the Ubuntu case it appears the modules required are the algorithm interface modules.
The workaround is adding these modules to /etc/initramfs-tools/modules:
algif_skcipher
algif_hash
algif_aed
algif_rng
Because these belong to the crypto user API I cannot see a way for the cryptsetup hook script to determine if these are needed (presumably it'd need to consider the 'luksDump' output to see what is being used.
The easiest solution might be to always ensure these modules are added by the hook in addition to the auto-detected modules. |
This is affecting 18.04 and others where cryptsetup v2 is used and has created a LUKS v2 container.
If booting to a shell in initialramfs with "break=premount" and manually executing:
cryptsetup --debug open /dev/sda3 LUKS_VG
...
Userspace crypto wrapper cannot use aes-xts-plain64 (-95)
...
-95 is -EOPNOTSUPP
Critical modules required are missing from the initrd.img when /etc/initramfs-tools/initramfs.conf contains:
MODULES=dep
There is a similar bug in Debian but that is related to Debian not including the 'xts' module when the CPU doesn't support aesni. In Ubuntu 'xts' is built-in to the kernel image.
"cryptsetup-initramfs: Unbootable initrd compiled with MODULES=dep on systems lacking AES-NI"
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901884
However the underlying Debian fix may solve this case too; I've yet to get to a state where I can test that.
In the Ubuntu case it appears the modules required are the algorithm interface modules.
The workaround is adding these modules to /etc/initramfs-tools/modules:
algif_skcipher
algif_hash
algif_aed
algif_rng
Because these belong to the crypto user API I cannot see a way for the cryptsetup hook script to determine if these are needed (presumably it'd need to consider the 'luksDump' output to see what is being used).
The easiest solution might be to always ensure these modules are added by the hook in addition to the auto-detected modules. |
|