[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1076099: debian-installer: LVM's activation broken for volumes with the dm-integrity feature



Source: debian-installer
Version: 20230607+deb12u6
Severity: normal
Tags: d-i
X-Debbugs-Cc: martellif67@gmail.com

Dear Maintainer,

In a VirtualBox virtual machine I've converted a LVM volume with the following options:

~# lvconvert --raidintegrity y --raidintegritymode bitmap ...

When I boot in rescue-mode that machine using the "debian-12.5.0-amd64-DVD-1.iso" iso, I follow all configuration steps until D-I asks me which device I want to mount as root filesystem (for running a shell into), then it happens that the volume is shown but if selected an error message it appears on the screen (red) that it says:

---
No such device
The device you entered for your root file system (/dev/vg0/lv1) does not exist. Please try again
---

Then I choose to run a shell without mount a root filesystem and I try to manually activate the LVM's volume, but it fails with this error message:

~# vgchange -a y vg0
modprobe: FATAL: Module dm-integrity not found in directory /lib/modules/6.1.0-18-amd64
  /sbin/modprobe failed: 1
  Can't process LV vg0/lv1_rimage_0: integrity target support missing from kernel?
  0 logical volume(s) in volume group "vg0" now active

The kernel version of D-I is:

~# uname -a
Linux bw12 6.1.0-18-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.76-1 (2024-02-01) x86_64 GNU/Linux

I suggest to add "dm-integrity" module to kernel image enabling the configuration entry CONFIG_DM_INTEGRITY=m and possibly add the "dm-integrity" module's name to /etc/initramfs-tools/modules file in order to automatically activate at boot time the LVM volumes with the integrity feature enabled.

Possible workaround: use a live iso (debian-live-12.5.0-amd64-kde.iso) and manually activate the LVM volume with the command:

~# vgchange -a y volume_group_name

Cheers



-- System Information:
Debian Release: 12.6
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable'), (100, 'bookworm-fasttrack'), (100, 'bookworm-backports-staging')
Architecture: amd64 (x86_64)

Kernel: Linux 6.1.90 (SMP w/8 CPU threads; PREEMPT)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=it_IT.UTF-8, LC_CTYPE=it_IT.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)


Reply to: