Qubes does not honour rd.luks boot parameters #1912
Labels
C: installer
C: other
P: minor
Priority: minor. The lowest priority, below "default."
T: bug
Type: bug report. A problem or defect resulting in unintended behavior in something that exists.
Milestone
Qubes OS version (e.g.,
R3.1
): R3.1Affected TemplateVMs (e.g.,
fedora-23
, if applicable): n/aExpected behavior:
The kernel boot parameters "rd.luks.uuid=" and "rd.lvm.lv=" are honoured: at boot I expect to be asked the password to unlock the Qubes LUKS crypto volume indicated by those parameters.
Actual behavior:
The kernel boot parameters are ignored (probably by the ram disk?). At boot I am asked the password to unlock another, pre-existing LUKS volume.
If I manage to drop into the initramfs debug shell I can manually unlock Qubes' crypto volume and mount it where indicated by the root parameter as defined in /proc/cmdline. This allows Qubes to continue booting but it leaves Qubes hanging and no login screen appears.
Steps to reproduce the behavior:
Create a Volume Group on a disk.
Add Physical Volumes to make up enough space.
Create a Logical Volume "foo" taking up some of the space, not all of it.
Encrypt the logical volume "foo" using luks (cryptsetup...).
Then install Qubes as a new logical volume "bar".
Reboot.
You are asked to unlock logical volume "foo" instead of "bar".
General notes:
Qubes is installed in a pre-existing Volume Group as Logical Volume named "00" alongside another Logical Volume name "lv1". Qubes installs correctly in LV "00" however at boot it cannot find the root as I am asked to unlock volume "lv1" instead. More details here:
http://superuser.com/questions/1066187/select-the-correct-lvm-volume-group-as-the-root-device
Related issues:
Relevant labels:
The text was updated successfully, but these errors were encountered: