[pkg-cryptsetup-devel] Boot Debian Buster with encrypted root on degraded raid1 (md-raid)

Magnus Sandberg mem at datakon.se
Fri Jul 26 10:52:39 BST 2019


Hi Guilhem,

Thanks for your reply. I sent my original post (more or less) to 
submit at bugs.debian.org according to the web page recommendations for 
pseudo-headers. This will be a new experience for me :-)

Regards,

// Mem



 ----- On 25th of July 2019 Guilhem Moulin wrote; -----

Subject: Re: [pkg-cryptsetup-devel] Boot Debian Buster with encrypted root on 
degraded raid1 (md-raid)
From: Guilhem Moulin <guilhem at debian.org>
Date: Thu, 25 Jul 2019 18:43:52 -0300 (23:43 CEST)
To: Magnus Sandberg <mem at datakon.se>
Cc: Debian Cryptsetup Team <pkg-cryptsetup-devel at alioth-lists.debian.net>

Hi,

On Sat, 29 Jun 2019 at 17:44:23 +0200, Magnus Sandberg wrote:
> Everything works as expected until I disconnect one of the disks to verify 
> that the system works even in degraded mode. Without the patch below […]

Thanks for your contribution!  But unfortunately the messages sent to
this list are likely to be overlooked if there is no bug report to it.
Could you please file a bug against the ‘cryptsetup-initramfs’ package?
(cf. https://bugs.debian.org ).  Otherwise I'll do it myself.

> +	if [ -x /scripts/local-block/mdadm ] ; then
> +	    /scripts/local-block/mdadm
> +	fi

I'm unsure about this, mdadm's local-block script may delete the count
file, and local_device_setup() has a more complex logic around calling
the script.  Perhaps we should use that to work array degraded modes.
Anyway for the sake of transparency, the discussion belongs to a bug
report :-P

Cheers,
-- 
Guilhem.





More information about the pkg-cryptsetup-devel mailing list