From 97e0f1baecbfc5a13ab1626ce1b333f4b26129a9 Mon Sep 17 00:00:00 2001 From: Francis Rowe Date: Sat, 2 Jan 2016 16:16:07 +0000 Subject: grub.cfg: md/X,Y is invalid notation for RAID volumes in GRUB --- resources/grub/config/menuentries/common.cfg | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) (limited to 'resources/grub/config') diff --git a/resources/grub/config/menuentries/common.cfg b/resources/grub/config/menuentries/common.cfg index 39fc1c27..439105ef 100644 --- a/resources/grub/config/menuentries/common.cfg +++ b/resources/grub/config/menuentries/common.cfg @@ -12,7 +12,7 @@ menuentry 'Load Operating System (incl. fully encrypted disks) [o]' --hotkey='o # b) Always try LVM before RAID (LVM on (raw) RAID) # c) Try MBR/GPT partitions at last, one might still conviniently uses a single partition - for d in (lvm/*) md/0 (md/0,*) ahci0 ahci1 (ahci0,*) (ahci1,*); do + for d in (lvm/*) md/0 ahci0 ahci1 (ahci0,*) (ahci1,*); do # prompt user for passphrase if LUKS header is found cryptomount ${d} done @@ -23,7 +23,7 @@ menuentry 'Load Operating System (incl. fully encrypted disks) [o]' --hotkey='o # 2. Look for user config. If the above routine successfully decrypted a LUKS container, its content # will be searched before everything else for obvious reasons. Regardless of this, the devices' # hirachy stays the same. - for d in crypto0 (crypt0,*) (lvm/*) md/0 (md0/,*) ahci0 ahci1 (ahci0,*) (ahci1,*); do + for d in crypto0 (crypt0,*) (lvm/*) md/0 ahci0 ahci1 (ahci0,*) (ahci1,*); do set root=${d} # a) Check possible file locations... for p in boot/grub/libreboot_ grub/libreboot_ boot/grub/ grub/ boot/grub2 grub2/; do -- cgit v1.2.3-70-g09d2