-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

On 2017-04-19 12:26, Marek Marczykowski-Górecki wrote:
> On Wed, Apr 19, 2017 at 09:21:10PM +0200, Marek Marczykowski-Górecki wrote:
>> On Wed, Apr 19, 2017 at 02:07:37PM +0000, Wim Vervoorn wrote:
>>> Hello Marek,
>>>
>>> I also tried booting using the xen.cfg file.
>>>
>>> As far as I can see the cfg file is OK but the qubes os still fails.
>>>
>>> The there is no request for the password and so the volumes are not 
>>> unlocked.
>>>
>>> I added both the xen.cfg I am using and the log file.
>>>
>>> FYI /dev/sda1 is the ESP, /dev/sda2 is /boot and /dev/sda3 is the LVM 
>>> partition
>>>
>>> When I am using the rescue mode the password is asked and all seems to be 
>>> fine.
> 
>> Looks like your system use different LV names and also have LUKS applied
>> to individual LVM volumes, not the whole LVM volume group.
> 
>>     [    2.548486] dom0 dracut-initqueue[362]: inactive '/dev/qubes_dom0/00' 
>> [20.00 GiB] inherit
>>     [    2.548886] dom0 dracut-initqueue[362]: inactive '/dev/qubes_dom0/01' 
>> [10.00 GiB] inherit
>>     [    2.556716] dom0 dracut-initqueue[362]: File descriptor 98 
>> (socket:[9738]) leaked on lvm
>>     invocation. Parent PID 489: /bin/sh
>>     [    2.557017] dom0 dracut-initqueue[362]: File descriptor 99 
>> (socket:[9739]) leaked on lvm
>>     invocation. Parent PID 489: /bin/sh
>>     [    2.564504] dom0 dracut-initqueue[362]: Failed to find logical volume 
>> "qubes_dom0/root"
>>     [    2.572468] dom0 dracut-initqueue[362]: File descriptor 98 
>> (socket:[9738]) leaked on lvm
>>     invocation. Parent PID 489: /bin/sh
>>     [    2.572874] dom0 dracut-initqueue[362]: File descriptor 99 
>> (socket:[9739]) leaked on lvm
>>     invocation. Parent PID 489: /bin/sh
>>     [    2.580150] dom0 dracut-initqueue[362]: Failed to find logical volume 
>> "qubes_dom0/swap"
> 
>> Try using qubes_dom0/00 instead of qubes_dom0/root and qubes_dom0/01
>> instead of qubes_dom0/swap. Or the other way around. And also adjust
>> root= accordingly (may require using UUID=... notation, but I cannot
>> tell based on the above info, before decrypting it).
> 
> Based on installation log (the other email), I actually can tell you
> what to put in root= option: 
> /dev/mapper/luks-298b7206-1b82-46c0-8c1a-2b27a02f2384
> 
> Anyway, this layout (LUKS over LVM, instead of LVM over LUKS) isn't the
> best idea. I suggest you reinstall and make sure to have the other one
> (which should be the default...).
> 

For reference, we have the installer defaults (LVM inside LUKS)
documented here:

https://www.qubes-os.org/doc/custom-install/#installer-defaults-r32

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-----BEGIN PGP SIGNATURE-----
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=Rcdc
-----END PGP SIGNATURE-----

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b2945268-ef23-23bf-37b0-679d0c6841d5%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.

Reply via email to