-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 On 2017-04-19 12:26, Marek Marczykowski-Górecki wrote: > On Wed, Apr 19, 2017 at 09:21:10PM +0200, Marek Marczykowski-Górecki wrote: >> On Wed, Apr 19, 2017 at 02:07:37PM +0000, Wim Vervoorn wrote: >>> Hello Marek, >>> >>> I also tried booting using the xen.cfg file. >>> >>> As far as I can see the cfg file is OK but the qubes os still fails. >>> >>> The there is no request for the password and so the volumes are not >>> unlocked. >>> >>> I added both the xen.cfg I am using and the log file. >>> >>> FYI /dev/sda1 is the ESP, /dev/sda2 is /boot and /dev/sda3 is the LVM >>> partition >>> >>> When I am using the rescue mode the password is asked and all seems to be >>> fine. > >> Looks like your system use different LV names and also have LUKS applied >> to individual LVM volumes, not the whole LVM volume group. > >> [ 2.548486] dom0 dracut-initqueue[362]: inactive '/dev/qubes_dom0/00' >> [20.00 GiB] inherit >> [ 2.548886] dom0 dracut-initqueue[362]: inactive '/dev/qubes_dom0/01' >> [10.00 GiB] inherit >> [ 2.556716] dom0 dracut-initqueue[362]: File descriptor 98 >> (socket:[9738]) leaked on lvm >> invocation. Parent PID 489: /bin/sh >> [ 2.557017] dom0 dracut-initqueue[362]: File descriptor 99 >> (socket:[9739]) leaked on lvm >> invocation. Parent PID 489: /bin/sh >> [ 2.564504] dom0 dracut-initqueue[362]: Failed to find logical volume >> "qubes_dom0/root" >> [ 2.572468] dom0 dracut-initqueue[362]: File descriptor 98 >> (socket:[9738]) leaked on lvm >> invocation. Parent PID 489: /bin/sh >> [ 2.572874] dom0 dracut-initqueue[362]: File descriptor 99 >> (socket:[9739]) leaked on lvm >> invocation. Parent PID 489: /bin/sh >> [ 2.580150] dom0 dracut-initqueue[362]: Failed to find logical volume >> "qubes_dom0/swap" > >> Try using qubes_dom0/00 instead of qubes_dom0/root and qubes_dom0/01 >> instead of qubes_dom0/swap. Or the other way around. And also adjust >> root= accordingly (may require using UUID=... notation, but I cannot >> tell based on the above info, before decrypting it). > > Based on installation log (the other email), I actually can tell you > what to put in root= option: > /dev/mapper/luks-298b7206-1b82-46c0-8c1a-2b27a02f2384 > > Anyway, this layout (LUKS over LVM, instead of LVM over LUKS) isn't the > best idea. I suggest you reinstall and make sure to have the other one > (which should be the default...). >
For reference, we have the installer defaults (LVM inside LUKS) documented here: https://www.qubes-os.org/doc/custom-install/#installer-defaults-r32 - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJY976EAAoJENtN07w5UDAwb8YP/0Mh7qbyC81RUwNNkusYqgqb HH1qAdR1XwUIbBZp5gym7Da6FBTGqYLEcRSDAEIpq/RnkWzLIQ2Zmi+//kchWLP1 vJOt90w7QJtQC7hPJAPUC2ienwR6+g6Quva5K3P4fozWGocl3z9uIJ+kzXmHbmar 0m2gjsgB3+wE/vRXte2uIhfoALI4/ILtzcu0hQMlF8xj3HaOyUUXO3Pf66acnlgd gMYvvW3FCzrm5W64DiYmtpiC/EQaL4PJ76dQIH16OSOz0hnwNitT7BzdWxZAAnjS zc7Jsv6PhcjfdYOYUXqFCA3BEuq3V8pvrrnHFqdXvNPAZ90puOhsGLD7LW9RVbGe gTOMVvqk0KE7rb4TEbtuu5UqOUYIpAfOn6W9F16KRSHTVRwB1u+8B3kxbgoj0Uyq kI37K82sbRtNcjtfkHpfimFX+UpQXIUY2NshKmzC918agvcHWtOq9vwZFEmjd8Lq wACV6T3YLaHuw9zvDXc15vcc2ceJa5k+IzqMcQDPYv49iklqIgFA4FkgKxXCIWmy b85Kp/EEtjZKa3eZ4EFcOP7G0j1w10+6irwqFNEwEfI0mcAqXf6+4OdP2CTgzuZY rUWb/3NYuSYmqn5z83fSoz8Ul/90OhblLBcRxRSenaYtoIHaKZ5LNPd0n9WW0pfz sNjzxCv4Lj61eQADA9z7 =Rcdc -----END PGP SIGNATURE----- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/b2945268-ef23-23bf-37b0-679d0c6841d5%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.