Excerpts from cwillu's message of 2011-05-03 21:50:53 -0400:
> On Tue, May 3, 2011 at 7:32 PM, Geoff Ritter <geoff.rit...@gmail.com> wrote:
> > Not sure where to report bugs or even find a coherent list of them.  Sorry
> > if this is already well known.
> >
> > When attempting to use an unlocked encrypted device as either a seed device
> > or the writeable device, a kernel bug will be displayed at
> > fs/btrfs/volumes.c:2402 after attempting to add the writeable device to the
> > mounted read-only seed.
> >
> > STR:
> > 1.  cryptsetup luksFormat /dev/sdx1
> > 2.  cryptsetup luksOpen /dev/sdx1 luksSeed
> > 3.  mkfs.btrfs /dev/mapper/luksSeed
> > 4.  mount and add files if you want, then unmount
> > 5.  btrfstune -S 1 /dev/mapper/luksSeed
> > 6.  mount /dev/mapper/luksSeed /mnt/luksSeed
> > 7.  btrfs device add /dev/sdx2 /mnt/luksSeed
> > 8.  Observe kernel BUG.
> >
> > I would hope to expect to see an error message if this is never intended to
> > be possible.  But normal btrfs file systems appear to function normally
> > under both encrypted and lvm partitions.
> >
> > This attached kernel message was from two LVM logical volumes on a luks
> > encrypted partition.  However, I also tested this with two regular
> > partitions between endrypted-seed/unencrypted-rw,
> >  endrypted-rw/unencrypted-seed, and both encrypted.

Ok, looks like I busted the seed support when I fixed up some of the
chunk allocations.  I'll reproduce this and work out a fix.

-chris
--
To unsubscribe from this list: send the line "unsubscribe linux-btrfs" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to