2020-05-21 15:33:14 |
Guilherme G. Piccoli |
bug |
|
|
added bug |
2020-05-21 15:34:14 |
Guilherme G. Piccoli |
bug task added |
|
mdadm (Ubuntu) |
|
2020-05-21 15:34:21 |
Guilherme G. Piccoli |
mdadm (Ubuntu): status |
New |
Confirmed |
|
2020-05-21 15:34:23 |
Guilherme G. Piccoli |
mdadm (Ubuntu): importance |
Undecided |
Medium |
|
2020-05-21 15:34:25 |
Guilherme G. Piccoli |
mdadm (Ubuntu): assignee |
|
Guilherme G. Piccoli (gpiccoli) |
|
2020-05-21 15:34:45 |
Guilherme G. Piccoli |
bug task added |
|
initramfs-tools (Ubuntu) |
|
2020-05-21 15:34:51 |
Guilherme G. Piccoli |
initramfs-tools (Ubuntu): status |
New |
Confirmed |
|
2020-05-21 15:34:53 |
Guilherme G. Piccoli |
initramfs-tools (Ubuntu): importance |
Undecided |
Medium |
|
2020-05-21 15:34:55 |
Guilherme G. Piccoli |
initramfs-tools (Ubuntu): assignee |
|
Guilherme G. Piccoli (gpiccoli) |
|
2020-05-22 22:20:19 |
Guilherme G. Piccoli |
attachment added |
|
cryptroot patch https://bugs.launchpad.net/ubuntu/+source/initramfs-tools/+bug/1879980/+attachment/5375734/+files/0001-d-initramfs-cryptroot-script-Allow-some-retries-on-l.patch |
|
2020-05-22 22:21:23 |
Guilherme G. Piccoli |
attachment added |
|
initramfs-tools patch https://bugs.launchpad.net/ubuntu/+source/initramfs-tools/+bug/1879980/+attachment/5375735/+files/0001-scripts-local-Allow-local-block-looping-as-Debian.patch |
|
2020-05-22 22:22:10 |
Guilherme G. Piccoli |
attachment added |
|
mdadm patch https://bugs.launchpad.net/ubuntu/+source/initramfs-tools/+bug/1879980/+attachment/5375736/+files/0001-script.local-block-Improve-last-resort-mechanism.patch |
|
2020-05-22 22:35:55 |
Guilherme G. Piccoli |
bug |
|
|
added subscriber Steve Langasek |
2020-05-22 22:36:05 |
Guilherme G. Piccoli |
bug |
|
|
added subscriber Dimitri John Ledkov |
2020-05-22 22:36:20 |
Guilherme G. Piccoli |
bug |
|
|
added subscriber Dan Streetman |
2020-06-02 14:42:53 |
Guilherme G. Piccoli |
description |
Description will be saved for further SRU template, the details of the issue will be exposed in comments |
[Impact]
* Considering a setup of a encrypted rootfs on top of md RAID1 device, Ubuntu is currently unable to decrypt the rootfs if the array gets degraded, like for example if one of the array members gets removed.
* The problem has 2 main aspects: first, cryptsetup initramfs script attempts to decrypt the array only in the local-top boot stage, and in case it fails, it gives-up and show user a shell (boot is aborted).
* Second, mdadm initramfs script that assembles degraded arrays executes later on boot, in the local-block stage. So, in a stacked setup of encrypted root on top of RAID, if the RAID is degraded, cryptsetup fails early in the boot, preventing mdadm to assemble the degraded array.
[Proposed solution]
* The solution hereby proposed has 3 components: first, cryptsetup script is modified to allow a gentle failure on local-top stage, then it retries for a while in a later stage (local-block). This gives time to other initramfs scripts to run, like mdadm in local-block stage.
* Second, mdadm script was adjusted - currently, it retries for a while to assemble the arrays in a non-degraded mode, by waiting for udev to discover the missing devices. After some time, it gives-up and assembles all arrays as degraded. The adjust we made was only to reduce this number of attempts and fallback a bit faster to degraded array assembly.
* Third, there's a difference in Ubuntu initramfs-tools compared to Debian's : in Ubuntu, we rely on wait-for-root, a binary meant to speed-up the boot process. Problem is that currently this approach prevents local-block scripts to run more than once (thus retrying mechanisms will fail). Our proposed solution changes initramfs-tools to allow some looping in local-block stage (as Debian), but still relying on wait-for-root. Also, we increased a bit the default rootdelay from 30 seconds to 60 seconds.
[Test case]
* Install Ubuntu in a Virtual Machine with 2 disks. Use the installer to create a RAID1 volume and an encrypted root on top of it.
* Boot the VM, and use "sgdisk"/"wipefs" to erase the partition table from one of the RAID members. Reboot and it will fail to mount rootfs and continue boot process.
[Regression potential]
* There are potential for regressions, since this is a change in 3 boot components. The patches were designed in a way to keep the regular case working, it changes the failure case which is not currently working anyway.
* A potential issue in the initramfs-tools change is a bad script in local-block, lacking a good "halt" mechanism, to induce a boot loop condition. This problem would be exposed by the hereby proposed modification. |
|
2020-07-14 15:05:20 |
Guilherme G. Piccoli |
cryptsetup (Ubuntu): status |
Confirmed |
In Progress |
|
2020-07-14 15:10:10 |
Guilherme G. Piccoli |
bug watch added |
|
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=933059 |
|
2020-07-14 15:10:10 |
Guilherme G. Piccoli |
bug task added |
|
cryptsetup (Debian) |
|
2020-07-15 02:45:29 |
Bug Watch Updater |
cryptsetup (Debian): status |
Unknown |
New |
|
2020-08-04 14:13:46 |
Guilherme G. Piccoli |
mdadm (Ubuntu): status |
Confirmed |
Opinion |
|
2020-08-04 14:13:49 |
Guilherme G. Piccoli |
initramfs-tools (Ubuntu): status |
Confirmed |
In Progress |
|
2020-08-04 14:14:11 |
Guilherme G. Piccoli |
nominated for series |
|
Ubuntu Groovy |
|
2020-08-04 14:14:11 |
Guilherme G. Piccoli |
bug task added |
|
mdadm (Ubuntu Groovy) |
|
2020-08-04 14:14:11 |
Guilherme G. Piccoli |
bug task added |
|
cryptsetup (Ubuntu Groovy) |
|
2020-08-04 14:14:11 |
Guilherme G. Piccoli |
bug task added |
|
initramfs-tools (Ubuntu Groovy) |
|
2020-08-04 14:14:11 |
Guilherme G. Piccoli |
nominated for series |
|
Ubuntu Xenial |
|
2020-08-04 14:14:11 |
Guilherme G. Piccoli |
bug task added |
|
mdadm (Ubuntu Xenial) |
|
2020-08-04 14:14:11 |
Guilherme G. Piccoli |
bug task added |
|
cryptsetup (Ubuntu Xenial) |
|
2020-08-04 14:14:11 |
Guilherme G. Piccoli |
bug task added |
|
initramfs-tools (Ubuntu Xenial) |
|
2020-08-04 14:14:11 |
Guilherme G. Piccoli |
nominated for series |
|
Ubuntu Focal |
|
2020-08-04 14:14:11 |
Guilherme G. Piccoli |
bug task added |
|
mdadm (Ubuntu Focal) |
|
2020-08-04 14:14:11 |
Guilherme G. Piccoli |
bug task added |
|
cryptsetup (Ubuntu Focal) |
|
2020-08-04 14:14:11 |
Guilherme G. Piccoli |
bug task added |
|
initramfs-tools (Ubuntu Focal) |
|
2020-08-04 14:14:11 |
Guilherme G. Piccoli |
nominated for series |
|
Ubuntu Bionic |
|
2020-08-04 14:14:11 |
Guilherme G. Piccoli |
bug task added |
|
mdadm (Ubuntu Bionic) |
|
2020-08-04 14:14:11 |
Guilherme G. Piccoli |
bug task added |
|
cryptsetup (Ubuntu Bionic) |
|
2020-08-04 14:14:11 |
Guilherme G. Piccoli |
bug task added |
|
initramfs-tools (Ubuntu Bionic) |
|
2020-08-04 14:14:29 |
Guilherme G. Piccoli |
mdadm (Ubuntu Xenial): status |
New |
Opinion |
|
2020-08-04 14:14:46 |
Guilherme G. Piccoli |
mdadm (Ubuntu Bionic): status |
New |
Opinion |
|
2020-08-04 14:15:03 |
Guilherme G. Piccoli |
cryptsetup (Ubuntu Xenial): status |
New |
Opinion |
|
2020-08-04 14:15:19 |
Guilherme G. Piccoli |
cryptsetup (Ubuntu Bionic): status |
New |
In Progress |
|
2020-08-04 14:15:19 |
Guilherme G. Piccoli |
cryptsetup (Ubuntu Bionic): assignee |
|
Guilherme G. Piccoli (gpiccoli) |
|
2020-08-04 14:15:33 |
Guilherme G. Piccoli |
cryptsetup (Ubuntu Xenial): importance |
Undecided |
Medium |
|
2020-08-04 14:15:33 |
Guilherme G. Piccoli |
cryptsetup (Ubuntu Xenial): assignee |
|
Guilherme G. Piccoli (gpiccoli) |
|
2020-08-04 14:15:44 |
Guilherme G. Piccoli |
cryptsetup (Ubuntu Bionic): importance |
Undecided |
Medium |
|
2020-08-04 14:15:53 |
Guilherme G. Piccoli |
cryptsetup (Ubuntu Xenial): status |
Opinion |
Won't Fix |
|
2020-08-04 14:16:11 |
Guilherme G. Piccoli |
cryptsetup (Ubuntu Focal): importance |
Undecided |
Medium |
|
2020-08-04 14:16:11 |
Guilherme G. Piccoli |
cryptsetup (Ubuntu Focal): status |
New |
In Progress |
|
2020-08-04 14:16:11 |
Guilherme G. Piccoli |
cryptsetup (Ubuntu Focal): assignee |
|
Guilherme G. Piccoli (gpiccoli) |
|
2020-08-04 14:16:56 |
Guilherme G. Piccoli |
initramfs-tools (Ubuntu Xenial): importance |
Undecided |
Medium |
|
2020-08-04 14:16:56 |
Guilherme G. Piccoli |
initramfs-tools (Ubuntu Xenial): status |
New |
Won't Fix |
|
2020-08-04 14:16:56 |
Guilherme G. Piccoli |
initramfs-tools (Ubuntu Xenial): assignee |
|
Guilherme G. Piccoli (gpiccoli) |
|
2020-08-04 14:17:11 |
Guilherme G. Piccoli |
initramfs-tools (Ubuntu Bionic): importance |
Undecided |
Medium |
|
2020-08-04 14:17:11 |
Guilherme G. Piccoli |
initramfs-tools (Ubuntu Bionic): status |
New |
In Progress |
|
2020-08-04 14:17:11 |
Guilherme G. Piccoli |
initramfs-tools (Ubuntu Bionic): assignee |
|
Guilherme G. Piccoli (gpiccoli) |
|
2020-08-04 14:17:23 |
Guilherme G. Piccoli |
initramfs-tools (Ubuntu Focal): importance |
Undecided |
Medium |
|
2020-08-04 14:17:23 |
Guilherme G. Piccoli |
initramfs-tools (Ubuntu Focal): status |
New |
In Progress |
|
2020-08-04 14:17:23 |
Guilherme G. Piccoli |
initramfs-tools (Ubuntu Focal): assignee |
|
Guilherme G. Piccoli (gpiccoli) |
|
2020-08-04 14:17:38 |
Guilherme G. Piccoli |
mdadm (Ubuntu Xenial): importance |
Undecided |
Medium |
|
2020-08-04 14:17:38 |
Guilherme G. Piccoli |
mdadm (Ubuntu Xenial): status |
Opinion |
Won't Fix |
|
2020-08-04 14:17:38 |
Guilherme G. Piccoli |
mdadm (Ubuntu Xenial): assignee |
|
Guilherme G. Piccoli (gpiccoli) |
|
2020-08-04 14:18:03 |
Guilherme G. Piccoli |
mdadm (Ubuntu Bionic): importance |
Undecided |
Medium |
|
2020-08-04 14:18:03 |
Guilherme G. Piccoli |
mdadm (Ubuntu Bionic): assignee |
|
Guilherme G. Piccoli (gpiccoli) |
|
2020-08-04 14:18:19 |
Guilherme G. Piccoli |
mdadm (Ubuntu Focal): importance |
Undecided |
Medium |
|
2020-08-04 14:18:19 |
Guilherme G. Piccoli |
mdadm (Ubuntu Focal): status |
New |
Opinion |
|
2020-08-04 14:18:19 |
Guilherme G. Piccoli |
mdadm (Ubuntu Focal): assignee |
|
Guilherme G. Piccoli (gpiccoli) |
|
2020-08-04 14:31:22 |
Guilherme G. Piccoli |
description |
[Impact]
* Considering a setup of a encrypted rootfs on top of md RAID1 device, Ubuntu is currently unable to decrypt the rootfs if the array gets degraded, like for example if one of the array members gets removed.
* The problem has 2 main aspects: first, cryptsetup initramfs script attempts to decrypt the array only in the local-top boot stage, and in case it fails, it gives-up and show user a shell (boot is aborted).
* Second, mdadm initramfs script that assembles degraded arrays executes later on boot, in the local-block stage. So, in a stacked setup of encrypted root on top of RAID, if the RAID is degraded, cryptsetup fails early in the boot, preventing mdadm to assemble the degraded array.
[Proposed solution]
* The solution hereby proposed has 3 components: first, cryptsetup script is modified to allow a gentle failure on local-top stage, then it retries for a while in a later stage (local-block). This gives time to other initramfs scripts to run, like mdadm in local-block stage.
* Second, mdadm script was adjusted - currently, it retries for a while to assemble the arrays in a non-degraded mode, by waiting for udev to discover the missing devices. After some time, it gives-up and assembles all arrays as degraded. The adjust we made was only to reduce this number of attempts and fallback a bit faster to degraded array assembly.
* Third, there's a difference in Ubuntu initramfs-tools compared to Debian's : in Ubuntu, we rely on wait-for-root, a binary meant to speed-up the boot process. Problem is that currently this approach prevents local-block scripts to run more than once (thus retrying mechanisms will fail). Our proposed solution changes initramfs-tools to allow some looping in local-block stage (as Debian), but still relying on wait-for-root. Also, we increased a bit the default rootdelay from 30 seconds to 60 seconds.
[Test case]
* Install Ubuntu in a Virtual Machine with 2 disks. Use the installer to create a RAID1 volume and an encrypted root on top of it.
* Boot the VM, and use "sgdisk"/"wipefs" to erase the partition table from one of the RAID members. Reboot and it will fail to mount rootfs and continue boot process.
[Regression potential]
* There are potential for regressions, since this is a change in 3 boot components. The patches were designed in a way to keep the regular case working, it changes the failure case which is not currently working anyway.
* A potential issue in the initramfs-tools change is a bad script in local-block, lacking a good "halt" mechanism, to induce a boot loop condition. This problem would be exposed by the hereby proposed modification. |
[Impact]
* Considering a setup of a encrypted rootfs on top of md RAID1 device, Ubuntu is currently unable to decrypt the rootfs if the array gets degraded, like for example if one of the array's members gets removed.
* The problem has 2 main aspects: first, cryptsetup initramfs script attempts to decrypt the array only in the local-top boot stage, and in case it fails, it gives-up and show user a shell (boot is aborted).
* Second, mdadm initramfs script that assembles degraded arrays executes later on boot, in the local-block stage. So, in a stacked setup of encrypted root on top of RAID, if the RAID is degraded, cryptsetup fails early in the boot, preventing mdadm to assemble the degraded array.
* The hereby proposed solution has 2 components: first, cryptsetup script is modified to allow a gentle failure on local-top stage, then it retries for a while (according to a heuristic based on ROOTDELAY with minimum of 30 executions) in a later stage (local-block). This gives time to other initramfs scripts to run, like mdadm in local-block stage. And this is meant to work this way according to initramfs-tools documentation (although Ubuntu changed it a bit with wait-for-root, hence we stopped looping on local-block, see next bullet).
* Second, initramfs-tools was adjusted - currently, it runs for a while the mdadm local-block script, in order to assemble the arrays in a non-degraded mode. We extended this approach to also execute cryptsetup, in a way that after mdadm ends its execution, we execute at least once more time cryptsetup. In an ideal world we should loop on local-block as Debian's initramfs (in a way to remove hardcoded mdadm/cryptsetup mentions from initramfs-tools code), but this would be really a big change, non-SRUable probably. I plan to work that for future Ubuntu releases.
[Test case]
* Install Ubuntu in a Virtual Machine with 2 disks. Use the installer to create a RAID1 volume and an encrypted root on top of it.
* Boot the VM, and use "sgdisk"/"wipefs" to erase the partition table from one of the RAID members. Reboot and it will fail to mount rootfs and continue boot process.
* If using the initramfs-toos/cryptsetup patches hereby proposed, the rootfs can be mounted normally.
[Regression potential]
* There are potential for regressions, since this is a change in 2 boot components. The patches were designed in a way to keep the regular case working, it changes the failure case which is not currently working anyway.
* A modification in the behavior of cryptsetup was introduced: right now, if we fail the password 3 times (the default maximum attempts), the script doesn't "panic" and drop to a shell immediately; instead it runs once more (or twice, if mdadm is installed) before failing. This is a minor change given the benefit of the being able to mount rootfs in a degraded RAID1 scenario.
* Other potential regressions could show-up as boot problems, but the change in initramfs-tools specifically is not invasive, it just may delay boot time a bit, given we now run cryptsetup multiple times on local-block, with 1 sec delays between executions. |
|
2020-08-04 14:40:28 |
Guilherme G. Piccoli |
attachment added |
|
groovy_cryptsetup_lp1879980.debdiff https://bugs.launchpad.net/ubuntu/focal/+source/mdadm/+bug/1879980/+attachment/5398696/+files/groovy_cryptsetup_lp1879980.debdiff |
|
2020-08-04 14:40:47 |
Guilherme G. Piccoli |
attachment added |
|
groovy_initramfs_lp1879980.debdiff https://bugs.launchpad.net/ubuntu/focal/+source/mdadm/+bug/1879980/+attachment/5398697/+files/groovy_initramfs_lp1879980.debdiff |
|
2020-08-04 14:41:15 |
Guilherme G. Piccoli |
attachment added |
|
focal_cryptsetup_lp1879980.debdiff https://bugs.launchpad.net/ubuntu/focal/+source/mdadm/+bug/1879980/+attachment/5398698/+files/focal_cryptsetup_lp1879980.debdiff |
|
2020-08-04 14:41:29 |
Guilherme G. Piccoli |
attachment added |
|
focal_initramfs_lp1879980.debdiff https://bugs.launchpad.net/ubuntu/focal/+source/mdadm/+bug/1879980/+attachment/5398699/+files/focal_initramfs_lp1879980.debdiff |
|
2020-08-04 14:41:54 |
Guilherme G. Piccoli |
attachment added |
|
bionic_cryptsetup_lp1879980.debdiff https://bugs.launchpad.net/ubuntu/focal/+source/mdadm/+bug/1879980/+attachment/5398700/+files/bionic_cryptsetup_lp1879980.debdiff |
|
2020-08-04 14:42:09 |
Guilherme G. Piccoli |
attachment added |
|
bionic_initramfs_lp1879980.debdiff https://bugs.launchpad.net/ubuntu/focal/+source/mdadm/+bug/1879980/+attachment/5398701/+files/bionic_initramfs_lp1879980.debdiff |
|
2020-08-05 18:21:42 |
Guilherme G. Piccoli |
bug |
|
|
added subscriber STS Sponsors |
2020-08-12 18:39:27 |
Guilherme G. Piccoli |
attachment added |
|
bionic_initramfs_lp1879980_V2.debdiff https://bugs.launchpad.net/ubuntu/focal/+source/mdadm/+bug/1879980/+attachment/5401090/+files/bionic_initramfs_lp1879980_V2.debdiff |
|
2020-08-27 15:14:52 |
Jose Delarosa |
bug |
|
|
added subscriber Jose Delarosa |
2020-08-31 18:41:02 |
Guilherme G. Piccoli |
attachment added |
|
groovy_initramfs_lp1879980_V2.debdiff https://bugs.launchpad.net/ubuntu/focal/+source/mdadm/+bug/1879980/+attachment/5406229/+files/groovy_initramfs_lp1879980_V2.debdiff |
|
2020-08-31 18:41:28 |
Guilherme G. Piccoli |
attachment added |
|
focal_initramfs_lp1879980_V2.debdiff https://bugs.launchpad.net/ubuntu/focal/+source/mdadm/+bug/1879980/+attachment/5406230/+files/focal_initramfs_lp1879980_V2.debdiff |
|
2020-09-01 17:58:14 |
Launchpad Janitor |
initramfs-tools (Ubuntu Groovy): status |
In Progress |
Fix Released |
|
2020-09-04 12:13:31 |
Timo Aaltonen |
initramfs-tools (Ubuntu Focal): status |
In Progress |
Fix Committed |
|
2020-09-04 12:13:37 |
Timo Aaltonen |
bug |
|
|
added subscriber Ubuntu Stable Release Updates Team |
2020-09-04 12:13:39 |
Timo Aaltonen |
bug |
|
|
added subscriber SRU Verification |
2020-09-04 12:13:45 |
Timo Aaltonen |
tags |
sts |
sts verification-needed verification-needed-focal |
|
2020-09-08 19:52:42 |
Guilherme G. Piccoli |
tags |
sts verification-needed verification-needed-focal |
sts verification-done verification-done-focal |
|
2020-09-15 15:47:10 |
Launchpad Janitor |
initramfs-tools (Ubuntu Focal): status |
Fix Committed |
Fix Released |
|
2020-09-15 15:47:21 |
Brian Murray |
removed subscriber Ubuntu Stable Release Updates Team |
|
|
|
2020-09-16 21:50:26 |
Guilherme G. Piccoli |
attachment added |
|
groovy_cryptsetup_lp1879980_V2.debdiff https://bugs.launchpad.net/ubuntu/focal/+source/mdadm/+bug/1879980/+attachment/5411484/+files/groovy_cryptsetup_lp1879980_V2.debdiff |
|
2020-09-16 22:01:22 |
Guilherme G. Piccoli |
attachment added |
|
focal_cryptsetup_lp1879980_V2.debdiff https://bugs.launchpad.net/ubuntu/focal/+source/mdadm/+bug/1879980/+attachment/5411485/+files/focal_cryptsetup_lp1879980_V2.debdiff |
|
2020-09-16 22:03:25 |
Guilherme G. Piccoli |
attachment added |
|
bionic_cryptsetup_lp1879980.debdiff https://bugs.launchpad.net/ubuntu/focal/+source/mdadm/+bug/1879980/+attachment/5411486/+files/bionic_cryptsetup_lp1879980.debdiff |
|
2020-09-21 17:30:03 |
Mauricio Faria de Oliveira |
bug |
|
|
added subscriber Mauricio Faria de Oliveira |
2020-09-22 15:36:41 |
Mauricio Faria de Oliveira |
attachment added |
|
groovy_cryptsetup_lp1879980_V3.debdiff https://bugs.launchpad.net/ubuntu/+source/cryptsetup/+bug/1879980/+attachment/5413208/+files/groovy_cryptsetup_lp1879980_V3.debdiff |
|
2020-09-22 16:28:34 |
Ubuntu Foundations Team Bug Bot |
tags |
sts verification-done verification-done-focal |
patch sts verification-done verification-done-focal |
|
2020-09-22 16:41:51 |
Mauricio Faria de Oliveira |
tags |
patch sts verification-done verification-done-focal |
patch sts sts-sponsor-mfo verification-done verification-done-focal |
|
2020-09-23 16:46:45 |
Launchpad Janitor |
cryptsetup (Ubuntu Groovy): status |
In Progress |
Fix Released |
|
2020-09-23 19:58:02 |
Mauricio Faria de Oliveira |
attachment added |
|
focal_cryptsetup_lp1879980_V3.debdiff https://bugs.launchpad.net/ubuntu/+source/cryptsetup/+bug/1879980/+attachment/5413626/+files/focal_cryptsetup_lp1879980_V3.debdiff |
|
2020-09-23 19:58:18 |
Mauricio Faria de Oliveira |
attachment added |
|
bionic_cryptsetup_lp1879980_V3.debdiff https://bugs.launchpad.net/ubuntu/+source/cryptsetup/+bug/1879980/+attachment/5413627/+files/bionic_cryptsetup_lp1879980_V3.debdiff |
|
2020-09-23 21:03:58 |
Mauricio Faria de Oliveira |
attachment added |
|
bionic_initramfs-tools_lp1879980_V3.debdiff https://bugs.launchpad.net/ubuntu/+source/cryptsetup/+bug/1879980/+attachment/5413638/+files/bionic_initramfs-tools_lp1879980_V3.debdiff |
|
2020-09-24 13:55:47 |
Łukasz Zemczak |
initramfs-tools (Ubuntu Bionic): status |
In Progress |
Fix Committed |
|
2020-09-24 13:55:50 |
Łukasz Zemczak |
bug |
|
|
added subscriber Ubuntu Stable Release Updates Team |
2020-09-24 13:55:55 |
Łukasz Zemczak |
tags |
patch sts sts-sponsor-mfo verification-done verification-done-focal |
patch sts sts-sponsor-mfo verification-done-focal verification-needed verification-needed-bionic |
|
2020-09-25 17:19:39 |
Mauricio Faria de Oliveira |
tags |
patch sts sts-sponsor-mfo verification-done-focal verification-needed verification-needed-bionic |
patch sts sts-sponsor-mfo verification-done verification-done-bionic verification-done-focal |
|
2020-09-25 17:21:23 |
Mauricio Faria de Oliveira |
attachment added |
|
lp1879980 verification-bionic.log https://bugs.launchpad.net/ubuntu/+source/cryptsetup/+bug/1879980/+attachment/5414278/+files/lp1879980%20verification-bionic.log |
|
2020-09-30 16:10:37 |
Mauricio Faria de Oliveira |
bug |
|
|
added subscriber Ubuntu Security Team |
2020-10-06 08:02:45 |
Launchpad Janitor |
initramfs-tools (Ubuntu Bionic): status |
Fix Committed |
Fix Released |
|
2020-10-08 16:38:52 |
Łukasz Zemczak |
cryptsetup (Ubuntu Focal): status |
In Progress |
Fix Committed |
|
2020-10-08 16:39:02 |
Łukasz Zemczak |
tags |
patch sts sts-sponsor-mfo verification-done verification-done-bionic verification-done-focal |
patch sts sts-sponsor-mfo verification-done-bionic verification-needed verification-needed-focal |
|
2020-10-08 23:41:59 |
Łukasz Zemczak |
cryptsetup (Ubuntu Bionic): status |
In Progress |
Fix Committed |
|
2020-10-08 23:42:07 |
Łukasz Zemczak |
tags |
patch sts sts-sponsor-mfo verification-done-bionic verification-needed verification-needed-focal |
patch sts sts-sponsor-mfo verification-needed verification-needed-bionic verification-needed-focal |
|
2020-10-09 20:11:37 |
Guilherme G. Piccoli |
tags |
patch sts sts-sponsor-mfo verification-needed verification-needed-bionic verification-needed-focal |
patch sts sts-sponsor-mfo verification-done verification-done-bionic verification-done-focal |
|
2020-10-21 05:24:36 |
Launchpad Janitor |
cryptsetup (Ubuntu Focal): status |
Fix Committed |
Fix Released |
|
2020-10-21 05:26:02 |
Launchpad Janitor |
cryptsetup (Ubuntu Bionic): status |
Fix Committed |
Fix Released |
|
2020-11-02 11:08:52 |
John Gilmore |
bug |
|
|
added subscriber John Gilmore |
2020-11-09 22:13:10 |
Launchpad Janitor |
merge proposal linked |
|
https://code.launchpad.net/~mwhudson/ubuntu/+source/cryptsetup/+git/cryptsetup/+merge/393521 |
|
2020-12-10 17:22:34 |
Eric Desrochers |
removed subscriber STS Sponsors |
|
|
|
2020-12-31 15:03:00 |
Mauricio Faria de Oliveira |
tags |
patch sts sts-sponsor-mfo verification-done verification-done-bionic verification-done-focal |
patch sts verification-done verification-done-bionic verification-done-focal |
|
2021-03-16 00:06:07 |
Bug Watch Updater |
cryptsetup (Debian): status |
New |
Fix Released |
|