[dm-crypt] How to manipulate an encrypted partition in a switched_root environment.
Javier Juan Martínez Cabezón
tazok.id0 at gmail.com
Tue Jun 5 15:46:25 CEST 2012
> Inside the switched_root system, I do e2fsck or dumpe2fs on /dev/sda2,
> where sda2 is that encrypted partitionand it returns: bad superblock and
> stuff like this.In the ramdisk I had the /dev/mapper/enc device, but in
> switched_root system I don't have it. I only have /dev/mapper/control.
Since sda2 is encrypted e2fsck cant find superblock and fs data. You
must pass e2fsck to the fs unlocked.
Look for which device is mounted as rootfs and do e2fsck to this one.
More information about the dm-crypt