While waiting for a solution, the following workaround seems to work for Stretch at least:
Step 1.) Copy /usr/share/initramfs-tools/scripts/local-top/cryptroot to /etc/initramfs-tools/scripts/local-top/cryptroot. # cp /usr/share/initramfs-tools/scripts/local-top/cryptroot \ /etc/initramfs-tools/scripts/local-top/ Step 2.) Modify the copied version as follows: --- /usr/share/initramfs-tools/scripts/local-top/cryptroot 2017-05-09 14:50:59.000000000 +0300 +++ /etc/initramfs-tools/scripts/local-top/cryptroot 2018-07-04 13:29:15.787061513 +0300 @@ -172,8 +172,9 @@ fi # Detect and activate available volume groups - /sbin/lvm vgscan - /sbin/lvm vgchange -a y --sysinit + # Workaround: disable use of lvmetad since it's not running yet + /sbin/lvm vgscan --config 'global{use_lvmetad=0}' + /sbin/lvm vgchange -a y --sysinit --config 'global{use_lvmetad=0}' return $? } In other words, add a --config 'global{use_lvmetad=0}' option to any LVM commands that are executed before mounting the root filesystem and starting lvmetad. The modified version in /etc/initramfs-tools will override the corresponding standard file in /usr/share/initramfs-tools. Step 3.) Rebuild your initramfs. # update-initramfs -u -k $(uname -r) -- matti.kurk...@fi.fujitsu.com Tel: 045 7880 5596 Mobile: 046 878 5596 Fujitsu Finland Oy FJ EMEIA DTS HI&NTS ST, EMEIA