Bug 1342905 - Enters dracut emergency shell after installation with autopart encrypted.
Summary: Enters dracut emergency shell after installation with autopart encrypted.
Keywords:
Status: CLOSED NOTABUG
Alias: None
Product: Red Hat Enterprise Linux 7
Classification: Red Hat
Component: anaconda
Version: 7.2
Hardware: Unspecified
OS: Unspecified
medium
medium
Target Milestone: pre-dev-freeze
: 7.3
Assignee: Anaconda Maintenance Team
QA Contact: Release Test Team
URL:
Whiteboard:
Depends On:
Blocks: ovirt-node-ng-platform
TreeView+ depends on / blocked
 
Reported: 2016-06-06 05:24 UTC by Wei Wang
Modified: 2023-07-10 13:57 UTC (History)
12 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2016-06-13 14:02:14 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)
kickstart file (1.00 KB, text/plain)
2016-06-06 05:24 UTC, Wei Wang
no flags Details
resosreport (100.99 KB, text/plain)
2016-06-06 05:26 UTC, Wei Wang
no flags Details
Log files system requested i include with this report (56.09 KB, application/zip)
2023-07-10 13:41 UTC, Michael
z: review?
Details

Description Wei Wang 2016-06-06 05:24:26 UTC
Created attachment 1165041 [details]
kickstart file

Description of problem:
Enters dracut emergency shell after installation with autopart encrypted.

Version-Release number of selected component (if applicable):
rhev-hypervisor7-ng-4.0-20160527.0.x86_64
imgbased-0.7.0-0.1.el7ev.noarch


How reproducible:
100%

Steps to Reproduce:
1. Install NGN on a machine with kickstart file in attachment.
    key parameters:
    autopart --type=thinp --encrypted --passphrase=$1$wHbL1u1G$gqz7IPh.ctaUHFMpQnyKl/

2. During rebooting , input the passphrase
3. Check system after rebooting process

Actual results:
Enters dracut emergency shell after rebooting.

Expected results:
System reboot successfully, and login screen prompt.


Additional info:

Comment 1 Wei Wang 2016-06-06 05:26:39 UTC
Created attachment 1165042 [details]
resosreport

Comment 2 Fabian Deutsch 2016-06-06 09:14:27 UTC
Does this also happen with RHEL7?

Comment 3 Wei Wang 2016-06-08 08:34:13 UTC
Hi Fabian,
I will give the feedback later since I need to debug some problems and future research.

Comment 4 Wei Wang 2016-06-13 08:58:10 UTC
Test Version
RHEL-7.2-20151015.0-Server-x86_64-dvd1.iso

Test Steps:
1. Get squashfs image from RHEL DVD iso
2. Get passphrase via command #openssl passwd -1
3. Install NGN on a machine with kickstart file
    key parameters:
    autopart --type=thinp --encrypted --passphrase=$1$wHbL1u1G$gqz7IPh.ctaUHFMpQnyKl/

4. Check the process of installation


Result:
Install fail, since "Could not open X display"

More info:
Using rhev-hypervisor7-ng-4.0-20160608.0.x86_64 for retesting, and part /boot individually which is not encrypted, also install fail, the "Could not open X display" prompted.

Comment 5 David Shea 2016-06-13 14:02:14 UTC
LUKS does not the same crypt algorithm as the system password, and a pre-encrypted passphrase cannot be set in kickstart. The passphrase set for this install is literally "$1$wHbL1u1G$gqz7IPh.ctaUHFMpQnyKl/".

Comment 6 Michael 2023-07-10 13:39:59 UTC
Hi, i am experiencing a similar issue. 
Description of problem:
Was attempting to install CentOS v7.9 from the Bootable ISO onto my local machine to act as a branch webserver. During the EFI installation a warning displayed and the OS entered into Emergency Shell and instructed me to save some files from the install and lodge a bug report regarding the issue. I was then unable to finish the installation. 

Additionally I know that the machine likely needs to have its drivers updated, but I was intending on doing that once the OS was installed as its tricky without an OS to install the correct drivers (for me in any case), I was planning to install this OS, update the drivers then re-install the OS once the new drivers were in place.


Version-Release number of selected component (if applicable):
This was running on a Dell Optiplex 9020, i was installing from a DVD disk that I burnt from a web ISO of CentOS version 7.9 (it was the complete version)


How reproducible:
Havent attempted to reproduce this particular issue, however I can tell you that all my machines are fighting me every step of the way to making them more secure and it has been a nightmare even getting this far. It appears that someone somewhere is intent on making my life as difficult as humanly possible to setup a network. 



Steps to Reproduce:
1. Burn a DVD of the ISO directly over the ftp connection
2. Booted from the cd, auto install failed, loaded directly from grub by chainloading from the included key
3. Boot commenced and then stopped and entered an emergency shell and instructed the following two files be provided

Actual results:
System not bootable

Expected results:
Installed version of CentOS running in a safe and secure manner, free from any 3rd party or proprietary code, configured in a secure manner and suitable for production use for a small ecommerce comapny.


Additional info:

Comment 7 Michael 2023-07-10 13:41:29 UTC
Created attachment 1974975 [details]
Log files system requested i include with this report

Description of problem:
Was attempting to install CentOS v7.9 from the Bootable ISO onto my local machine to act as a branch webserver. During the EFI installation a warning displayed and the OS entered into Emergency Shell and instructed me to save some files from the install and lodge a bug report regarding the issue. I was then unable to finish the installation. 

Additionally I know that the machine likely needs to have its drivers updated, but I was intending on doing that once the OS was installed as its tricky without an OS to install the correct drivers (for me in any case), I was planning to install this OS, update the drivers then re-install the OS once the new drivers were in place.


Version-Release number of selected component (if applicable):
This was running on a Dell Optiplex 9020, i was installing from a DVD disk that I burnt from a web ISO of CentOS version 7.9 (it was the complete version)


How reproducible:
Havent attempted to reproduce this particular issue, however I can tell you that all my machines are fighting me every step of the way to making them more secure and it has been a nightmare even getting this far. It appears that someone somewhere is intent on making my life as difficult as humanly possible to setup a network. 



Steps to Reproduce:
1. Burn a DVD of the ISO directly over the ftp connection
2. Booted from the cd, auto install failed, loaded directly from grub by chainloading from the included key
3. Boot commenced and then stopped and entered an emergency shell and instructed the following two files be provided

Actual results:
System not bootable

Expected results:
Installed version of CentOS running in a safe and secure manner, free from any 3rd party or proprietary code, configured in a secure manner and suitable for production use for a small ecommerce comapny.


Additional info:

Comment 8 Jan Stodola 2023-07-10 13:57:28 UTC
From journal.log:

Jul 10 12:06:44 localhost dracut-initqueue[736]: mount: /dev/sr0 is write-protected, mounting read-only
Jul 10 12:06:44 localhost kernel: ISO 9660 Extensions: Microsoft Joliet Level 3
Jul 10 12:06:44 localhost kernel: ISO 9660 Extensions: RRIP_1991A
Jul 10 12:06:44 localhost kernel: attempt to access beyond end of device
Jul 10 12:06:44 localhost kernel: sr0: rw=0, want=19922100, limit=3145728
Jul 10 12:06:44 localhost kernel: attempt to access beyond end of device
Jul 10 12:06:44 localhost kernel: sr0: rw=0, want=19922100, limit=3145728
Jul 10 12:06:44 localhost kernel: loop: module loaded
Jul 10 12:06:44 localhost kernel: attempt to access beyond end of device
Jul 10 12:06:44 localhost kernel: sr0: rw=0, want=19922100, limit=3145728
Jul 10 12:06:44 localhost kernel: attempt to access beyond end of device
Jul 10 12:06:44 localhost kernel: sr0: rw=0, want=19922100, limit=3145728
Jul 10 12:06:44 localhost kernel: attempt to access beyond end of device
Jul 10 12:06:44 localhost kernel: sr0: rw=0, want=19922100, limit=3145728
Jul 10 12:06:44 localhost kernel: Buffer I/O error on dev loop0, logical block 127328, async page read
Jul 10 12:06:44 localhost kernel: attempt to access beyond end of device
Jul 10 12:06:44 localhost kernel: sr0: rw=0, want=19922100, limit=3145728
Jul 10 12:06:44 localhost kernel: attempt to access beyond end of device
Jul 10 12:06:44 localhost kernel: sr0: rw=0, want=19922100, limit=3145728
Jul 10 12:06:44 localhost kernel: attempt to access beyond end of device
Jul 10 12:06:44 localhost kernel: sr0: rw=0, want=19922100, limit=3145728
Jul 10 12:06:44 localhost kernel: Buffer I/O error on dev dm-0, logical block 127328, async page read
Jul 10 12:06:44 localhost kernel: attempt to access beyond end of device
Jul 10 12:06:44 localhost kernel: sr0: rw=0, want=19922100, limit=3145728
Jul 10 12:06:44 localhost kernel: attempt to access beyond end of device
Jul 10 12:06:44 localhost kernel: sr0: rw=0, want=19922100, limit=3145728
Jul 10 12:06:44 localhost kernel: Buffer I/O error on dev dm-1, logical block 127328, async page read

It could be an incorrectly downloaded/burnt ISO.


Note You need to log in before you can comment on or make changes to this bug.