Encryption deadlock

An encryption deadlock occurs when all key servers that are within an account cannot become operational because some part of the data in each key server is stored on an encrypting device that is dependent on one of these key servers to access the data.

The key server provides an operating environment for the key server application to run in, to access its keystore on persistent storage, and to interface with client storage devices that require key server services. The keystore data is accessed by the key server application by using your specified password. The keystore data is encrypted independently of where it is stored. However, any online data that is required to initiate the key server cannot be stored on storage that has a dependency on the key server to enable access. If this constraint is not met, the key server cannot perform an initial program load (IPL) and therefore cannot become operational. This data includes the boot image for the operating system that runs on the key server and any data that is required by that operating system and its associated software stack to run the key server application, to allow it to access its keystore and to allow the key server to communicate with its storage device clients. Similarly, any backups of the key server environment and data must not be stored on storage that has a dependency on a key server to restore or access the backup data.

While an encryption deadlock exists, you cannot access any encrypted data that is managed by the key servers. If all backups of the keystore are also stored on encrypting storage that is dependent on a key server, and you do not have the recovery keys that would unlock the storage devices, the encryption deadlock can become a permanent encryption deadlock such that all encrypted data that is managed by the key servers is permanently lost.
Note: To avoid encryption deadlock situations, ensure that you follow the guidelines that are outlined in Encryption deadlock prevention.
With encryption-capable disks, the probability of an encryption deadlock increases significantly because of the following factors:

To reduce the risk of encountering an encryption deadlock, you must be directly involved in managing the encryption environment.