[pkg-cryptsetup-devel] Boot Debian Buster with encrypted root on degraded raid1 (md-raid)
Magnus Sandberg
mem at datakon.se
Fri Jul 26 10:52:39 BST 2019
Hi Guilhem,
Thanks for your reply. I sent my original post (more or less) to
submit at bugs.debian.org according to the web page recommendations for
pseudo-headers. This will be a new experience for me :-)
Regards,
// Mem
----- On 25th of July 2019 Guilhem Moulin wrote; -----
Subject: Re: [pkg-cryptsetup-devel] Boot Debian Buster with encrypted root on
degraded raid1 (md-raid)
From: Guilhem Moulin <guilhem at debian.org>
Date: Thu, 25 Jul 2019 18:43:52 -0300 (23:43 CEST)
To: Magnus Sandberg <mem at datakon.se>
Cc: Debian Cryptsetup Team <pkg-cryptsetup-devel at alioth-lists.debian.net>
Hi,
On Sat, 29 Jun 2019 at 17:44:23 +0200, Magnus Sandberg wrote:
> Everything works as expected until I disconnect one of the disks to verify
> that the system works even in degraded mode. Without the patch below […]
Thanks for your contribution! But unfortunately the messages sent to
this list are likely to be overlooked if there is no bug report to it.
Could you please file a bug against the ‘cryptsetup-initramfs’ package?
(cf. https://bugs.debian.org ). Otherwise I'll do it myself.
> + if [ -x /scripts/local-block/mdadm ] ; then
> + /scripts/local-block/mdadm
> + fi
I'm unsure about this, mdadm's local-block script may delete the count
file, and local_device_setup() has a more complex logic around calling
the script. Perhaps we should use that to work array degraded modes.
Anyway for the sake of transparency, the discussion belongs to a bug
report :-P
Cheers,
--
Guilhem.
More information about the pkg-cryptsetup-devel
mailing list