← Back to team overview

yahoo-eng-team team mailing list archive

[Bug 2117170] Re: vmcoreinfo should not be automatically added to encrypted guests

 

** Also affects: nova/2025.2
   Importance: Medium
       Status: Triaged

** Also affects: nova/2024.1
   Importance: Undecided
       Status: New

** Also affects: nova/2024.2
   Importance: Undecided
       Status: New

** Also affects: nova/2025.1
   Importance: Undecided
       Status: New

** Changed in: nova/2025.1
   Importance: Undecided => Medium

** Changed in: nova/2024.1
   Importance: Undecided => Medium

** Changed in: nova/2024.2
   Importance: Undecided => Medium

** Changed in: nova/2025.1
       Status: New => Triaged

** Changed in: nova/2024.2
       Status: New => Triaged

** Changed in: nova/2024.1
       Status: New => Triaged

** Tags added: libvirt sev

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/2117170

Title:
  vmcoreinfo should not be automatically added to encrypted guests

Status in OpenStack Compute (nova):
  Triaged
Status in OpenStack Compute (nova) 2024.1 series:
  Triaged
Status in OpenStack Compute (nova) 2024.2 series:
  Triaged
Status in OpenStack Compute (nova) 2025.1 series:
  Triaged
Status in OpenStack Compute (nova) 2025.2 series:
  Triaged

Bug description:
  Nova automatically adds `-device vmcoreinfo`, to support processing
  kernel dump with KASLR enabled. When this feature is enabled in
  conjunction with deploying an encrypted guest on AMD-Sev, the guest os
  fails to fully boot e.g.:

  sh-5.1$ openstack console log show 86158e5e-22df-4453-969b-d0879c1d1dc2
  [2J[01;01H[=3h[2J[01;01H[2J[01;01H[=3h[2J[01;01H[2J[01;01H[=3h[2J[01;01HBdsDxe: loading Boot0001 "UEFI Misc Device" from PciRoot(0x0)/Pci(0x2,0x2)/Pci(0x0,0x0)
  BdsDxe: starting Boot0001 "UEFI Misc Device" from PciRoot(0x0)/Pci(0x2,0x2)/Pci(0x0,0x0)
  Booting `Red Hat Enterprise Linux (5.14.0-277.el9.x86_64) 9.2 (Plow)'
  [ 0.000000] Linux version 5.14.0-277.el9.x86_64 (mockbuild@xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx) (gcc (GCC) 11.3.1 20221121 (Red Hat 11.3.1-4), GNU ld version 2.35.2-37.el9) #1 SMP PREEMPT_DYNAMIC Fri Feb 17 09:45:09 EST 2023
  [ 0.000000] The list of certified hardware and cloud instances for Red Hat Enterprise Linux 9 can be viewed at the Red Hat Ecosystem Catalog, https://catalog.redhat.com.
  [ 0.000000] Command line: BOOT_IMAGE=(hd0,gpt3)/vmlinuz-5.14.0-277.el9.x86_64 root=UUID=6089295f-e6a6-4d0c-8096-5996a463fd35 console=tty0 console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-4G:192M,4G-64G:256M,64G-:512M
  [ 0.000000] x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers'
  [ 0.000000] x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers'
  [ 0.000000] x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers'
  [ 0.000000] x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256
  [ 0.000000] x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format.
  ....REMOVED FOR BREVITY....
  [    2.948593] input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input3
  [   28.266697] watchdog: BUG: soft lockup - CPU#0 stuck for 26s! [swapper/0:1]
  [   28.266697] Modules linked in:
  [   28.266697] CPU: 0 PID: 1 Comm: swapper/0 Not tainted 5.14.0-277.el9.x86_64 #1
  [   28.266697] Hardware name: Red Hat OpenStack Compute/RHEL, BIOS edk2-20231122-6.el9 11/22/2023
  [   28.266697] RIP: 0010:fw_cfg_write_vmcoreinfo+0x154/0x210
  [   28.266697] Code: 1a 02 48 89 d8 48 c1 e8 20 48 89 c7 e8 f5 8c d0 ff 0f ae f8 48 8b 05 0b f4 1a 02 89 df 48 8d 70 04 e8 e0 8c d0 ff eb 02 f3 90 <8b> 45 00 0f c8 0f ae e8 83 e0 fe 75 f1 8b 45 00 0f c8 83 e0 01 83
  [   28.266697] RSP: 0018:ffffa8178001fc10 EFLAGS: 00000206
  [   28.266697] RAX: 0000000051946f84 RBX: 0000000002107590 RCX: 0000000000000001
  [   28.266697] RDX: 0000000000010518 RSI: 0000000000010518 RDI: 0000000090751002
  [   28.266697] RBP: ffff9aa002107590 R08: 0000000000000010 R09: ffffffffb34eff80
  [   28.282722] R10: ffff9aa002b14948 R11: 0000000000000000 R12: ffff9aa082107540
  [   28.282722] R13: ffff9aa030b94000 R14: ffff9aa0311d2128 R15: 0000000000000000
  [   28.282722] FS:  0000000000000000(0000) GS:ffff9aa03ca00000(0000) knlGS:0000000000000000
  [   28.282722] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  [   28.282722] CR2: 0000000000000000 CR3: 000080001b410000 CR4: 0000000000350ef0
  [   28.282722] Call Trace:
  [   28.282722]  <TASK>
  [   28.282722]  fw_cfg_register_file+0x196/0x1c0
  [   28.282722]  fw_cfg_register_dir_entries+0xa4/0xf0
  [   28.282722]  fw_cfg_sysfs_probe+0x112/0x180
  [   28.293721]  platform_probe+0x3f/0xa0
  [   28.293721]  really_probe+0xe1/0x3a0
  [   28.293721]  ? pm_runtime_barrier+0x50/0x90
  [   28.293721]  __driver_probe_device+0x105/0x180
  [   28.293721]  driver_probe_device+0x1e/0x90
  [   28.293721]  __driver_attach+0x9d/0x1f0
  [   28.293721]  ? __device_attach_driver+0x110/0x110
  [   28.293721]  ? __device_attach_driver+0x110/0x110
  [   28.293721]  bus_for_each_dev+0x78/0xc0
  [   28.293721]  bus_add_driver+0x15c/0x210
  [   28.293721]  driver_register+0x8f/0xf0
  [   28.293721]  ? firmware_map_add_early+0x56/0x56
  [   28.293721]  fw_cfg_sysfs_init+0x3b/0x64
  [   28.293721]  ? firmware_map_add_early+0x56/0x56
  [   28.293721]  do_one_initcall+0x44/0x200
  [   28.293721]  do_initcalls+0xc6/0xdf
  [   28.293721]  kernel_init_freeable+0x153/0x1a2
  [   28.293721]  ? rest_init+0xd0/0xd0
  [   28.293721]  kernel_init+0x16/0x130
  [   28.293721]  ret_from_fork+0x22/0x30
  [   28.293721]  </TASK>
  [   56.266735] watchdog: BUG: soft lockup - CPU#0 stuck for 52s! [swapper/0:1]
  [   56.266735] Modules linked in:
  [   56.266735] CPU: 0 PID: 1 Comm: swapper/0 Tainted: G             L   --------  ---  5.14.0-277.el9.x86_64 #1
  [   56.269723] Hardware name: Red Hat OpenStack Compute/RHEL, BIOS edk2-20231122-6.el9 11/22/2023
  [   56.269723] RIP: 0010:fw_cfg_write_vmcoreinfo+0x154/0x210
  [   56.269723] Code: 1a 02 48 89 d8 48 c1 e8 20 48 89 c7 e8 f5 8c d0 ff 0f ae f8 48 8b 05 0b f4 1a 02 89 df 48 8d 70 04 e8 e0 8c d0 ff eb 02 f3 90 <8b> 45 00 0f c8 0f ae e8 83 e0 fe 75 f1 8b 45 00 0f c8 83 e0 01 83
  [   56.269723] RSP: 0018:ffffa8178001fc10 EFLAGS: 00000206
  [   56.269723] RAX: 0000000051946f84 RBX: 0000000002107590 RCX: 0000000000000001
  [   56.269723] RDX: 0000000000010518 RSI: 0000000000010518 RDI: 0000000090751002
  [   56.269723] RBP: ffff9aa002107590 R08: 0000000000000010 R09: ffffffffb34eff80
  [   56.282723] R10: ffff9aa002b14948 R11: 0000000000000000 R12: ffff9aa082107540
  [   56.282723] R13: ffff9aa030b94000 R14: ffff9aa0311d2128 R15: 0000000000000000
  [   56.285724] FS:  0000000000000000(0000) GS:ffff9aa03ca00000(0000) knlGS:0000000000000000
  [   56.285724] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  [   56.285724] CR2: 0000000000000000 CR3: 000080001b410000 CR4: 0000000000350ef0
  [   56.285724] Call Trace:
  [   56.285724]  <TASK>
  [   56.285724]  fw_cfg_register_file+0x196/0x1c0
  [   56.285724]  fw_cfg_register_dir_entries+0xa4/0xf0
  [   56.285724]  fw_cfg_sysfs_probe+0x112/0x180
  [   56.285724]  platform_probe+0x3f/0xa0
  [   56.285724]  really_probe+0xe1/0x3a0
  [   56.285724]  ? pm_runtime_barrier+0x50/0x90
  [   56.285724]  __driver_probe_device+0x105/0x180
  [   56.285724]  driver_probe_device+0x1e/0x90
  [   56.285724]  __driver_attach+0x9d/0x1f0
  [   56.285724]  ? __device_attach_driver+0x110/0x110
  [   56.285724]  ? __device_attach_driver+0x110/0x110
  [   56.285724]  bus_for_each_dev+0x78/0xc0
  [   56.285724]  bus_add_driver+0x15c/0x210
  [   56.285724]  driver_register+0x8f/0xf0
  [   56.285724]  ? firmware_map_add_early+0x56/0x56
  [   56.285724]  fw_cfg_sysfs_init+0x3b/0x64
  [   56.285724]  ? firmware_map_add_early+0x56/0x56
  [   56.285724]  do_one_initcall+0x44/0x200
  [   56.285724]  do_initcalls+0xc6/0xdf
  [   56.285724]  kernel_init_freeable+0x153/0x1a2
  [   56.285724]  ? rest_init+0xd0/0xd0
  [   56.285724]  kernel_init+0x16/0x130
  [   56.285724]  ret_from_fork+0x22/0x30
  [   56.285724]  </TASK>
  ...

  
  Steps to reproduce
  ==================
  1. Deploy an environment that supports AMD Sev.
  2. Create a flavor with hw:mem_encryption": 'true' and image with "hw_firmware_type": "uefi", "hw_machine_type": "q35". 
  3. Boot a guest with the flavor/image combination and inspect the console logs.

  Expected result
  ===============
  Guest fully boots

  Actual result
  ===============
  Guest fails to fully boot

  Environment
  ===========
  1. This was found in downstream RHOSO 18

  2. Libvirt + KVM with AMD EPYC 7402

  2. LVM

  3. OVN

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/2117170/+subscriptions



References