This bug now makes any kernel upgrade (in this case linux-image-4.0.0-2-amd64) cause the system to be unbootable. The system is unable to contact lvmetad and unable to locate the root partition. There is no luks passphrase prompt.

Please upgrade this bug to CRITICAL. Or should I file a critical bug against all kernels? Or do users get what is coming to them for upgrading to a package with an open grave bug?

Stefan, your systemd.unit=emergency.service vgchange instructions do not work, even with vgchange -ay --config 'global{use_lvmetad=0}' as suggested here:
https://bugzilla.redhat.com/show_bug.cgi?id=813766

cryptsetup is not available so I do not know how this would work anyway.

Workaround is to:
- Boot another kernel+initramfs (e.g. linux-image-4.0.0-1-amd64)
- Disable lvmetad by editing /etc/lvm/lvm.conf to set "use_lvmetad = 0"
- Run update-initramfs -u
- Reboot into linux-image-4.0.0-2-amd64

Once this is done I can boot. I see:

root@ripley:~# pvs
  PV                     VG   Fmt  Attr PSize  PFree
  /dev/mapper/sda2_crypt vg   lvm2 a--  55.62g    0
root@ripley:~# vgs
  VG   #PV #LV #SN Attr   VSize  VFree
  vg     1   2   0 wz--n- 55.62g    0
root@ripley:~# lvs
LV VG Attr LSize Pool Origin Data% Meta% Move Log Cpy%Sync Convert home vg -wi-ao---- 36.99g root vg -wi-ao---- 18.62g

Kind regards,

--
Ben Caradoc-Davies <b...@transient.nz>
Director
Transient Software Limited <http://transient.nz/>
New Zealand


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to