From 97e0f1baecbfc5a13ab1626ce1b333f4b26129a9 Mon Sep 17 00:00:00 2001
From: Francis Rowe <info@gluglug.org.uk>
Date: Sat, 2 Jan 2016 16:16:07 +0000
Subject: grub.cfg: md/X,Y is invalid notation for RAID volumes in GRUB

---
 resources/grub/config/menuentries/common.cfg | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

(limited to 'resources/grub/config/menuentries')

diff --git a/resources/grub/config/menuentries/common.cfg b/resources/grub/config/menuentries/common.cfg
index 39fc1c27..439105ef 100644
--- a/resources/grub/config/menuentries/common.cfg
+++ b/resources/grub/config/menuentries/common.cfg
@@ -12,7 +12,7 @@ menuentry 'Load Operating System (incl. fully encrypted disks)  [o]' --hotkey='o
 	#	b) Always try LVM before RAID (LVM on (raw) RAID)
 	#	c) Try MBR/GPT partitions at last, one might still conviniently uses a single partition
 
-	for d in (lvm/*) md/0 (md/0,*) ahci0 ahci1 (ahci0,*) (ahci1,*); do
+	for d in (lvm/*) md/0 ahci0 ahci1 (ahci0,*) (ahci1,*); do
 		# prompt user for passphrase if LUKS header is found
 		cryptomount ${d}
 	done
@@ -23,7 +23,7 @@ menuentry 'Load Operating System (incl. fully encrypted disks)  [o]' --hotkey='o
 	# 2. Look for user config. If the above routine successfully decrypted a LUKS container, its content
 	#    will be searched before everything else for obvious reasons. Regardless of this, the devices'
 	#    hirachy stays the same.
-	for d in crypto0 (crypt0,*) (lvm/*) md/0 (md0/,*) ahci0 ahci1 (ahci0,*) (ahci1,*); do
+	for d in crypto0 (crypt0,*) (lvm/*) md/0 ahci0 ahci1 (ahci0,*) (ahci1,*); do
 		set root=${d}
 	#	a) Check possible file locations...
 		for p in boot/grub/libreboot_ grub/libreboot_ boot/grub/ grub/ boot/grub2 grub2/; do
-- 
cgit v1.2.3-70-g09d2