Hi ,
When we enable FIPS mode , we see the kdump.conf getting updated and the kdump.service running.
However after we crash the server, the crashdump is not generated in the location configured.
We have the crashkernel=auto parameter in both scenarios - with FIPS enabled and without it.
In non-FIPS mode, everything is working as expected .
In FIPS-enabled mode, the crashdump is not generated in the location configured.
Additional observations:
This is a known issue that sometimes occurs with FIPS mode enabled. Here are some suggestions:
Try specifying a fixed value for crashkernel
Instead of crashkernel=auto, use a specific value like crashkernel=512M or higher. FIPS mode sometimes requires more memory, and the auto parameter may not allocate enough.
See: Red Hat Knowledge Base
Ensure your kdump initramfs is up-to-date
When enabling FIPS, you need to regenerate the kdump initramfs to include FIPS support:
Check the crash dump path and permissions
It’s recommended to use /var/crash or another dedicated directory for crash dumps, not /boot. Make sure the directory is writable and not restricted by SELinux or file system permissions.
Check the logs for errors
Please check /var/log/kdump.log and journalctl -k for any relevant error messages after the crash attempt. This can help identify if there are issues with memory reservation, kdump service startup, or permissions.
If you still experience the issue after these steps, please provide any error messages from the logs for further troubleshooting.
Hi ,
Just to clarify a few points regarding the crashkernel setup:
• We are using a dedicated path for crash dumps: /var/crash.
• When we mention that /boot is mounted on root, we mean that there is no separate /boot partition — it is mounted under the existing root (/) filesystem.
• We have also already tried assigning a fixed value to crashkernel, but it still doesn’t resolve the issue — the reservation doesn’t work in FIPS-enabled mode.
At this point, since all standard troubleshooting steps have been covered and there are no errors in the logs,
it’s possible that this is a kernel or distribution bug related to FIPS and kdump.
I recommend filing a detailed bug report with your exact system configuration, steps you’ve taken, and all relevant logs.
This will help the developers or upstream maintainers investigate the issue further.
Thank you for your patience and detailed troubleshooting.
Could you please provide your full reproduction steps and all related information in a single text file and attach it here?
For complex issues like this, it’s helpful to include:
The exact OS and kernel version (cat /etc/os-release, uname -r)
The value of your crashkernel parameter (is it auto or a specific size? Have you tried both?)
Did you regenerate the kdump initramfs after enabling FIPS? (dracut -f --kver $(uname -r))
The output of systemctl status kdump after booting with FIPS enabled
Any relevant messages from dmesg | grep -i crash and /var/log/kdump.log
SELinux/AppArmor status, and whether /var/crash is writable
Attaching a complete text file will make it much easier for others to review and assist.
If you are using the FIPS packages in a commercial/production environment, then you must have a TuxCare ESU license, in which case you should raise a support ticket here:
Hi ,
This is the exact error , that we are getting:
crypto/fips/fips.c:154: OpenSSL internal error: FATAL FIPS SELFTEST FAILURE
& also , if we try to add fips xfs in initramfs-kdump.img it results to //boot/.vmlinuz-.hmac error not found error
is there any way to resolve this issue by adding parameter fips=1 ?
This is the limit of what I have personally found.
Generating .hmac files
In AlmaLinux 8/9 and RHEL 8/9 series, cases have been confirmed where the vmlinuz HMAC verification file is not generated in FIPS mode (AlmaLinux Bug ID 62, Red Hat Upgrades 3037431)
Red Hat Documentation
+12
Red Hat Customer Portal
+12
Linux Global
+12
.
As a workaround, run the following:
sha512hmac /boot/vmlinuz-$(uname -r) > /boot/.vmlinuz-$(uname -r).hmac
This will clear the FIPS integrity test.
Oracle Docs
+3
AlmaLinux
+3
Red Hat Customer Portal
+3
.
dracut-fips package and initramfs regeneration
In the case of CentOS or RHEL installation, if dracut-fips or dracut-fips-aesni is not installed, .hmac may not be included in the initramfs and FIPS may fail to start (Linux Global)
Unix & Linux Stack Exchange
+6
Linux Global
+6
GitHub
+6
.
Check the following and rebuild:
yum install dracut-fips dracut-fips-aesni # aesni version if AES-NI is installed
dracut -f --kver $(uname -r)
systemctl restart kdump
3. Specify crashkernel= with a fixed value
crashkernel=auto may not be reserved correctly when FIPS is enabled, and is deprecated in RHEL 9 (explicit specification such as crashkernel=1G-4G:192M… is recommended)
Oracle Docs
+2
Red Hat Documentation
+2
Rocky Linux Forum
+2
.
Example:
grubby --update-kernel=ALL --args=“crashkernel=512M”
You can use kdumpctl estimate to determine the required size if necessary
Rocky Linux Forum
+4
Red Hat Documentation
+4
AlmaLinux
+4
.
Check kdump.conf and restart the service
After setting the crash dump destination and collector (core_collector), be sure to restart kdump. If you do not restart, the settings will not be reflected and kdump.conf may become empty.
Rocky Linux Forum
+4
AlmaLinux
+4
Unix & Linux Stack Exchange
+4
.
systemctl restart kdump
5. Test and check the log
Perform a crash test with the following command and check whether the vmcore is saved to /var/crash normally:
echo c > /proc/sysrq-trigger
If it fails, check the following: