Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upAEM: Unrecognized encrypted lvm at installation #2512
Comments
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marlox-ouda
Dec 11, 2016
new findings : i get a more complete command line with the following command:
# dracut --print-cmdline
rd.luks.uuid=luks-UUID rd.lvm.lv=qubes_dom0/root
rd.lvm.lv=qubes_dom0/swap
resume=/dev/mapper/qubes_dom0-swap root=/dev/mapper/qubes_dom0-root rootfstype=ext4 rootflags=rw,relatime,data=ordered
marlox-ouda
commented
Dec 11, 2016
|
new findings : i get a more complete command line with the following command:
|
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marlox-ouda
Dec 11, 2016
I solve it with :
# export _CMDLINE=$(dracut --print-cmdline)
# anti-evil-maid-install /dev/sda1
Expected result
anti-evil-mail-install: Labeling filesystem aem
anti-evil-mail-install: Syncing to /boot
Solution (v2)
Replace
https://github.com/QubesOS/qubes-antievilmaid/blob/master/anti-evil-maid/sbin/anti-evil-maid-lib
line 23 in getluksuuids: _CMDLINE=${_CMDLINE-$(cat /proc/cmdline)}
with
_CMDLINE=${_CMDLINE-$(dracut --print-cmdline)}
marlox-ouda
commented
Dec 11, 2016
|
I solve it with :
Expected result
Solution (v2)Replace |
andrewdavidwong
added
C: other
bug
labels
Dec 11, 2016
andrewdavidwong
added this to the Release 3.2 updates milestone
Dec 11, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Dec 14, 2016
Member
Replace
https://github.com/QubesOS/qubes-antievilmaid/blob/master/anti-evil-maid/sbin/anti-evil-maid-lib
line 23 in getluksuuids: _CMDLINE=${_CMDLINE-$(cat /proc/cmdline)}
with
_CMDLINE=${_CMDLINE-$(dracut --print-cmdline)}
I wonder how it works inside initramfs? _CMDLINE is set there already? Have you tested it?
I wonder how it works inside initramfs? _CMDLINE is set there already? Have you tested it? |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marlox-ouda
Apr 24, 2017
You have right : dracut is not available in initramfs and AES fails to boot with such setup.
I have tested a new trick that works but it is not very clean :
_CMDLINE=${CMDLINE-$(dracut --print-cmd 2>/dev/null || cat /proc/cmdline)}
marlox-ouda
commented
Apr 24, 2017
|
You have right : dracut is not available in initramfs and AES fails to boot with such setup. I have tested a new trick that works but it is not very clean : |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
rustybird
Apr 24, 2017
@marlox-ouda: What is the value of GRUB_CMDLINE_LINUX in your /etc/default/grub? #2553 made me think that maybe this file is corrupted or incomplete.
rustybird
commented
Apr 24, 2017
|
@marlox-ouda: What is the value of |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marlox-ouda
May 2, 2017
The value of GRUB_CMD_LINUX in /etc/default/grub is "$GRUB_CMDLINE_LINUX rd.qubes.hlde_all_usb splash"
marlox-ouda
commented
May 2, 2017
|
The value of |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
rustybird
May 2, 2017
@marlox-ouda: Sorry, I should have mentioned that there are usually two GRUB_CMDLINE_LINUX lines. What's the value of the first one?
rustybird
commented
May 2, 2017
|
@marlox-ouda: Sorry, I should have mentioned that there are usually two |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marlox-ouda
May 4, 2017
@rustybird Don't be sorry. I think you point the right issue. I have only one line in /etc/default/grub :
GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX rd.qubes.hlde_all_usb splash"
I do not remember to have change this file. What kind of information should I have ?
marlox-ouda
commented
May 4, 2017
•
|
@rustybird Don't be sorry. I think you point the right issue. I have only one line in I do not remember to have change this file. What kind of information should I have ? |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
rustybird
May 4, 2017
@marlox-ouda: That depends on your installation layout. If you've let the installer create all your partitions automatically, the first line should look like this:
GRUB_CMDLINE_LINUX="rd.luks.uuid=luks-UUID rd.lvm.lv=qubes_dom0/root rd.lvm.lv=qubes_dom0/swap i915.preliminary_hw_support=1 rd.driver.pre=scsi_dh_rdac rhgb quiet"
You could insert the line manually (with UUID replaced by the output of cryptsetup luksUUID /dev/sda2) and rerun grub2-mkconfig -o /boot/grub2/grub.cfg.
But it's interesting that it's missing. Do you have a coreboot system? If so, see issue #2553.
rustybird
commented
May 4, 2017
|
@marlox-ouda: That depends on your installation layout. If you've let the installer create all your partitions automatically, the first line should look like this:
You could insert the line manually (with But it's interesting that it's missing. Do you have a coreboot system? If so, see issue #2553. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marlox-ouda
May 5, 2017
Thank you for your help. I will add this.
I have just use the installer and do not use coreboot. The only specific thing I have done is updating from R3.1.
On this previous version I was not able to run AEM because, the TPM version was not supported.
Do you want more information ?
marlox-ouda
commented
May 5, 2017
|
Thank you for your help. I will add this. I have just use the installer and do not use coreboot. The only specific thing I have done is updating from R3.1. Do you want more information ? |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
rustybird
May 5, 2017
Thanks, nothing comes to mind. I have no idea what could have clobbered /etc/default/grub, unfortunately.
rustybird
commented
May 5, 2017
|
Thanks, nothing comes to mind. I have no idea what could have clobbered |
marlox-ouda commentedDec 11, 2016
Qubes OS version (e.g.,
R3.2):Qubes OS version R3.2 (upgraded from R3.1)
Affected TemplateVMs (e.g.,
fedora-23, if applicable):Not applicable
From https://github.com/QubesOS/qubes-antievilmaid/tree/master/anti-evil-maid
On step 4.b) (setup AEM, create aem device)
(AEM with password and without USB stick)
Expected behavior:
Actual behavior:
Steps to reproduce the behavior:
General notes:
origin +1:
https://github.com/QubesOS/qubes-antievilmaid/blob/master/anti-evil-maid/sbin/anti-evil-maid-install
line 76:
if [ -z "$(getluksuuids)" ]; thengetluksuuids function does not return.
origin +2:
https://github.com/QubesOS/qubes-antievilmaid/blob/master/anti-evil-maid/sbin/anti-evil-maid-lib
line 23 in getluksuuids:
_CMDLINE=${_CMDLINE-$(cat /proc/cmdline)}luksuuids is based on boot command line.
origin +3:
my command line does not explicit encrypted volume.
origin+4:
i have encrypted volume and none issue during boot.
may be a solution based on following can solve it in getluksuuids :
Related issues: