Source: debian-installer Version: 20230607+deb12u6 Severity: normal Tags: d-i X-Debbugs-Cc: martelli...@gmail.com
Dear Maintainer, In a VirtualBox virtual machine I've converted a LVM volume with the following options: ~# lvconvert --raidintegrity y --raidintegritymode bitmap ... When I boot in rescue-mode that machine using the "debian-12.5.0-amd64-DVD-1.iso" iso, I follow all configuration steps until D-I asks me which device I want to mount as root filesystem (for running a shell into), then it happens that the volume is shown but if selected an error message it appears on the screen (red) that it says: --- No such device The device you entered for your root file system (/dev/vg0/lv1) does not exist. Please try again --- Then I choose to run a shell without mount a root filesystem and I try to manually activate the LVM's volume, but it fails with this error message: ~# vgchange -a y vg0 modprobe: FATAL: Module dm-integrity not found in directory /lib/modules/6.1.0-18-amd64 /sbin/modprobe failed: 1 Can't process LV vg0/lv1_rimage_0: integrity target support missing from kernel? 0 logical volume(s) in volume group "vg0" now active The kernel version of D-I is: ~# uname -a Linux bw12 6.1.0-18-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.76-1 (2024-02-01) x86_64 GNU/Linux I suggest to add "dm-integrity" module to kernel image enabling the configuration entry CONFIG_DM_INTEGRITY=m and possibly add the "dm-integrity" module's name to /etc/initramfs-tools/modules file in order to automatically activate at boot time the LVM volumes with the integrity feature enabled. Possible workaround: use a live iso (debian-live-12.5.0-amd64-kde.iso) and manually activate the LVM volume with the command: ~# vgchange -a y volume_group_name Cheers -- System Information: Debian Release: 12.6 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable'), (100, 'bookworm-fasttrack'), (100, 'bookworm-backports-staging') Architecture: amd64 (x86_64) Kernel: Linux 6.1.90 (SMP w/8 CPU threads; PREEMPT) Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE Locale: LANG=it_IT.UTF-8, LC_CTYPE=it_IT.UTF-8 (charmap=UTF-8), LANGUAGE not set Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system)