** Description changed:

- Binary package hint: util-linux
- 
- When using luks on top of software raid devices, linux_raid_member
- devices can get opened as luks instead of being assembled into md
- devices. It is adviseable not to use luks on raid since some updates
- introduced in karmic and until a fix is released for this.
+ Note:
+ When using luks encryption on top of software raid devices, it can eventually 
break because linux_raid_member devices get opened directly as luks instead of 
being assembled into md devices (Bug #531240), and all this happens silently 
because mdadm monitoring is not set up (Bug #491443). Additionally luks on raid 
root filesystems can not boot if the array is degraded (Bug #488317). It is 
advisable not to rely on luks on raid until a fix is released.
  
  ----
  
- After the member is opened as luks device it is booted instead of the md
- device, while the raid remains "inactive".
+ After the member was opened as luks device it was booted instead of the
+ md device, while the raid remains "inactive". I don't know what
+ triggered this, but it happened repeatedly after a couple of reboots.
+ May happens according to the order of device enumeration on boot (random
+ assembly).
  
- I first noticed /proc/mdstat reported the root raid as inactive
- (although the system seemed to run fine!).
+ By chance I noticed this because /proc/mdstat reported the root raid as
+ inactive (although the system seemed to run fine!).
  
- Looking further it seemed like during boot the system has unlocked and 
mounted the rootfs using (only) one raid_member located on an external usb disk 
directly. ("dmsetup deps" pointed to it for mdX_crypt)
- I guess since the usb raid_member was busy then, the system was not able to 
start the raid, and so it remained inactive.
+ Looking further it seems during boot the system has unlocked and mounted
+ the rootfs using (only) one raid_member located on an external usb disk
+ directly. ("dmsetup deps" pointed to it for mdX_crypt)
  
- Which part of the system is involved in setting up the root and could
- have messed things up here?
+ "sudo blkid" now also reported what actually is an USB
+ "linux_raid_member" as TYPE="crypto_LUKS".
  
- Calling "sudo blkid" reported what actually is an USB
- "linux_raid_member" as TYPE="crypto_LUKS".
+ After booting into a rescue system and reassembling the array everything
+ seemed back to normal (including blkid output) until this bug hit again
+ a couple reboots later.
+ 
+ A better replicable symptom seems to be that the alternate CD's rescue-
+ mode also wants to open the raid members devices.
+ 
+ ---
  
  @util-linux
  I found the following in the util-linux changelog:
    * Always return encrypted block devices as the first detected encryption
       system (ie. LUKS, since that's the only one) rather than probing for
       additional metadata and returning an ambivalent result.  LP: #428435.
  might that cause the precedence of reporing luks over raid_member for the usb 
disk?
  
  @cryptsetup
  Also "cryptsetup isLuks" gives a false positve. "cryptsetup isLuks <raid 
member device with luks on it>" returns $?=0 (success/true) That is the reason 
why the initramfs check implemented in scripts/local-top/cryptroot does not 
prevent this bug from having its bad effects.
- 
- Edit: Happens according to the order of device enumeration on boot
- (random assembly). Another symptom is the alternate CD's rescue-mode
- wants to open internal raid members just as well, so it's not usb
- dependent.

-- 
silently breaking raid: root raid_members opened as luks
https://bugs.launchpad.net/bugs/531240
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to