[pkg-cryptsetup-devel] Bug#619010: FW: Re: Bug#619010: (no subject)

Volker Schlecht vschlecht at gmx.net
Wed Apr 13 22:20:43 UTC 2011


Hi Jonas,

your assumptions about my setup are spot-on.
As you correctly guessed, a regenerated initramfs breaks in the same manner. 
Diffing the two initrds yielded a significant difference in cryptroot - the working version refers to /dev/sda2
instead of the uuid (I guess my old initrds were generated with /etc/crypttab.old ... d'oh!)

What's interesting is that on a booted system I get 
 
# blkid /dev/sda2 
/dev/sda2: UUID="013dabec-dd64-4fe0-8842-cd2f92f3348e" SEC_TYPE="ext2" TYPE="ext3" 

Whereas in the rescue console /dev/sda2 has a different UUID. There's "more robust" for ya...

I guess I'll manually switch /etc/crypttab back then. Might still be interesting, how come the UUID is different between two boots...

regards,
Volker

> ----- Ursprüngliche Nachricht -----
> Von: jonas
> Gesendet: 13.04.11 23:24 Uhr
> An: Volker Schlecht, 619010 at bugs.debian.org
> Betreff: Re: FW: Re: [pkg-cryptsetup-devel] Bug#619010: (no subject)
> 
> On Tue, 12 Apr 2011 21:54:58 +0200, "Volker Schlecht"
> <vschlecht at gmx.net> wrote:
> > Hi,
> > 
> > booting 2.6.38, I get:
> > 
> > Reading all physical volumes. This may take a while.
> > No volume groups found.
> > No volume groups found.
> > 
> > Plus the evms warning. Then the boot hangs until it drops me into the
> > initrd rescue console.
> 
> hey volker,
> 
> unfortunately i'm rather busy at the moment.
> 
> > Playing around with lvm at the initrd rescue prompt kinda narrows it down to a problem with LVM for me: both vgscan and pvscan yielded 
> > no results at all...
> 
> from your fstab and crypttab, i assume that your encrypted devices are
> physical devices (sda2 and sda3), not lvm devices. sda2 holds your
> encrypted rootfs, and sda3 contains a encrypted lvm volume (cryptVG),
> which itself contains /home, /usr and /var, right?
> in that case, no lvm volume can be found at all, as the device that
> contains the lvm volume isn't unlocked yet.
> 
> please do the following steps in order to further debug the issue:
> 
> - at the initramfs emergency console, check uuid and availability of
> your root device:
>  'blkid /dev/sda2' and 'ls
> /dev/disk/by-uuid/013dabec-dd64-4fe0-8842-cd2f92f3348e'
> 
> - if the root device is available and the uuid is correct, try to
> unlock the rootfs manually:
>  'cryptsetup luksOpen
> /dev/disk/by-uuid/013dabec-dd64-4fe0-8842-cd2f92f3348e cryptRoot'
> 
> in order to track down the source of problem, please also regenerate
> the initramfs for your 2.6.37 kernel and see whether that one still
> boots. first, backup your working 2.6.37 initramfs: 'cp
> /boot/initrd.img-2.6.37-2-686-bigmem
> /boot/initrd.img-2.6.37-2-686-bigmem.works', afterwards regenerate with
> 'update-initramfs -u -k 2.6.37-2-686-bigmem', then reboot the 2.6.37
> kernel.
> 
> if the 2.6.37 kernel still reboots without issues, the problem for sure
> is connected to the 2.6.38 kernel. if it doesn't boot anymore, you can
> change the bootloader to use the .works backup initramfs manually. in
> that case the problem is not related to the kernel, but rather to the
> initramfs.
> 
> greetings,
>  jonas






More information about the pkg-cryptsetup-devel mailing list