Attempting to mount /dev/md0 (the unencrypted /boot ) from within dropbear/busybox results in a kernel hardlock. ILO dump attached.
** Attachment added: "Hard lock caused by attempting to mount /dev/md0" https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1487662/+attachment/4450659/+files/ilo_wily_cciss_bug.PNG -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1487662 Title: cciss driver crashes kernel during boot Status in linux package in Ubuntu: Incomplete Bug description: On a HP Proliant was running trusty with vivid kernel from backports originally. Worked fine with userspace upgrade to wily. When I rebooted with the wily linux-generic kernel however I got a stack dump: SW Raid1 on two CCISS based RAID0 disks, and dm_crypt. Kernel boots to prompt for cyrptoroot passphrase. After entering it and mounting entering the dm mapper init sequence the kernel crashes. I have a dropbear instance installed running from initramfs (for remote unlocking of root) and this is still runs. dmesg attached from server. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1487662/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp