Activity log for bug #1879980

Date Who What changed Old value New value Message
2020-05-21 15:33:14 Guilherme G. Piccoli bug added bug
2020-05-21 15:34:14 Guilherme G. Piccoli bug task added mdadm (Ubuntu)
2020-05-21 15:34:21 Guilherme G. Piccoli mdadm (Ubuntu): status New Confirmed
2020-05-21 15:34:23 Guilherme G. Piccoli mdadm (Ubuntu): importance Undecided Medium
2020-05-21 15:34:25 Guilherme G. Piccoli mdadm (Ubuntu): assignee Guilherme G. Piccoli (gpiccoli)
2020-05-21 15:34:45 Guilherme G. Piccoli bug task added initramfs-tools (Ubuntu)
2020-05-21 15:34:51 Guilherme G. Piccoli initramfs-tools (Ubuntu): status New Confirmed
2020-05-21 15:34:53 Guilherme G. Piccoli initramfs-tools (Ubuntu): importance Undecided Medium
2020-05-21 15:34:55 Guilherme G. Piccoli initramfs-tools (Ubuntu): assignee Guilherme G. Piccoli (gpiccoli)
2020-05-22 22:20:19 Guilherme G. Piccoli attachment added cryptroot patch https://bugs.launchpad.net/ubuntu/+source/initramfs-tools/+bug/1879980/+attachment/5375734/+files/0001-d-initramfs-cryptroot-script-Allow-some-retries-on-l.patch
2020-05-22 22:21:23 Guilherme G. Piccoli attachment added initramfs-tools patch https://bugs.launchpad.net/ubuntu/+source/initramfs-tools/+bug/1879980/+attachment/5375735/+files/0001-scripts-local-Allow-local-block-looping-as-Debian.patch
2020-05-22 22:22:10 Guilherme G. Piccoli attachment added mdadm patch https://bugs.launchpad.net/ubuntu/+source/initramfs-tools/+bug/1879980/+attachment/5375736/+files/0001-script.local-block-Improve-last-resort-mechanism.patch
2020-05-22 22:35:55 Guilherme G. Piccoli bug added subscriber Steve Langasek
2020-05-22 22:36:05 Guilherme G. Piccoli bug added subscriber Dimitri John Ledkov
2020-05-22 22:36:20 Guilherme G. Piccoli bug added subscriber Dan Streetman
2020-06-02 14:42:53 Guilherme G. Piccoli description Description will be saved for further SRU template, the details of the issue will be exposed in comments [Impact] * Considering a setup of a encrypted rootfs on top of md RAID1 device, Ubuntu is currently unable to decrypt the rootfs if the array gets degraded, like for example if one of the array members gets removed. * The problem has 2 main aspects: first, cryptsetup initramfs script attempts to decrypt the array only in the local-top boot stage, and in case it fails, it gives-up and show user a shell (boot is aborted). * Second, mdadm initramfs script that assembles degraded arrays executes later on boot, in the local-block stage. So, in a stacked setup of encrypted root on top of RAID, if the RAID is degraded, cryptsetup fails early in the boot, preventing mdadm to assemble the degraded array. [Proposed solution] * The solution hereby proposed has 3 components: first, cryptsetup script is modified to allow a gentle failure on local-top stage, then it retries for a while in a later stage (local-block). This gives time to other initramfs scripts to run, like mdadm in local-block stage. * Second, mdadm script was adjusted - currently, it retries for a while to assemble the arrays in a non-degraded mode, by waiting for udev to discover the missing devices. After some time, it gives-up and assembles all arrays as degraded. The adjust we made was only to reduce this number of attempts and fallback a bit faster to degraded array assembly. * Third, there's a difference in Ubuntu initramfs-tools compared to Debian's : in Ubuntu, we rely on wait-for-root, a binary meant to speed-up the boot process. Problem is that currently this approach prevents local-block scripts to run more than once (thus retrying mechanisms will fail). Our proposed solution changes initramfs-tools to allow some looping in local-block stage (as Debian), but still relying on wait-for-root. Also, we increased a bit the default rootdelay from 30 seconds to 60 seconds. [Test case] * Install Ubuntu in a Virtual Machine with 2 disks. Use the installer to create a RAID1 volume and an encrypted root on top of it. * Boot the VM, and use "sgdisk"/"wipefs" to erase the partition table from one of the RAID members. Reboot and it will fail to mount rootfs and continue boot process. [Regression potential] * There are potential for regressions, since this is a change in 3 boot components. The patches were designed in a way to keep the regular case working, it changes the failure case which is not currently working anyway. * A potential issue in the initramfs-tools change is a bad script in local-block, lacking a good "halt" mechanism, to induce a boot loop condition. This problem would be exposed by the hereby proposed modification.
2020-07-14 15:05:20 Guilherme G. Piccoli cryptsetup (Ubuntu): status Confirmed In Progress
2020-07-14 15:10:10 Guilherme G. Piccoli bug watch added https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=933059
2020-07-14 15:10:10 Guilherme G. Piccoli bug task added cryptsetup (Debian)
2020-07-15 02:45:29 Bug Watch Updater cryptsetup (Debian): status Unknown New
2020-08-04 14:13:46 Guilherme G. Piccoli mdadm (Ubuntu): status Confirmed Opinion
2020-08-04 14:13:49 Guilherme G. Piccoli initramfs-tools (Ubuntu): status Confirmed In Progress
2020-08-04 14:14:11 Guilherme G. Piccoli nominated for series Ubuntu Groovy
2020-08-04 14:14:11 Guilherme G. Piccoli bug task added mdadm (Ubuntu Groovy)
2020-08-04 14:14:11 Guilherme G. Piccoli bug task added cryptsetup (Ubuntu Groovy)
2020-08-04 14:14:11 Guilherme G. Piccoli bug task added initramfs-tools (Ubuntu Groovy)
2020-08-04 14:14:11 Guilherme G. Piccoli nominated for series Ubuntu Xenial
2020-08-04 14:14:11 Guilherme G. Piccoli bug task added mdadm (Ubuntu Xenial)
2020-08-04 14:14:11 Guilherme G. Piccoli bug task added cryptsetup (Ubuntu Xenial)
2020-08-04 14:14:11 Guilherme G. Piccoli bug task added initramfs-tools (Ubuntu Xenial)
2020-08-04 14:14:11 Guilherme G. Piccoli nominated for series Ubuntu Focal
2020-08-04 14:14:11 Guilherme G. Piccoli bug task added mdadm (Ubuntu Focal)
2020-08-04 14:14:11 Guilherme G. Piccoli bug task added cryptsetup (Ubuntu Focal)
2020-08-04 14:14:11 Guilherme G. Piccoli bug task added initramfs-tools (Ubuntu Focal)
2020-08-04 14:14:11 Guilherme G. Piccoli nominated for series Ubuntu Bionic
2020-08-04 14:14:11 Guilherme G. Piccoli bug task added mdadm (Ubuntu Bionic)
2020-08-04 14:14:11 Guilherme G. Piccoli bug task added cryptsetup (Ubuntu Bionic)
2020-08-04 14:14:11 Guilherme G. Piccoli bug task added initramfs-tools (Ubuntu Bionic)
2020-08-04 14:14:29 Guilherme G. Piccoli mdadm (Ubuntu Xenial): status New Opinion
2020-08-04 14:14:46 Guilherme G. Piccoli mdadm (Ubuntu Bionic): status New Opinion
2020-08-04 14:15:03 Guilherme G. Piccoli cryptsetup (Ubuntu Xenial): status New Opinion
2020-08-04 14:15:19 Guilherme G. Piccoli cryptsetup (Ubuntu Bionic): status New In Progress
2020-08-04 14:15:19 Guilherme G. Piccoli cryptsetup (Ubuntu Bionic): assignee Guilherme G. Piccoli (gpiccoli)
2020-08-04 14:15:33 Guilherme G. Piccoli cryptsetup (Ubuntu Xenial): importance Undecided Medium
2020-08-04 14:15:33 Guilherme G. Piccoli cryptsetup (Ubuntu Xenial): assignee Guilherme G. Piccoli (gpiccoli)
2020-08-04 14:15:44 Guilherme G. Piccoli cryptsetup (Ubuntu Bionic): importance Undecided Medium
2020-08-04 14:15:53 Guilherme G. Piccoli cryptsetup (Ubuntu Xenial): status Opinion Won't Fix
2020-08-04 14:16:11 Guilherme G. Piccoli cryptsetup (Ubuntu Focal): importance Undecided Medium
2020-08-04 14:16:11 Guilherme G. Piccoli cryptsetup (Ubuntu Focal): status New In Progress
2020-08-04 14:16:11 Guilherme G. Piccoli cryptsetup (Ubuntu Focal): assignee Guilherme G. Piccoli (gpiccoli)
2020-08-04 14:16:56 Guilherme G. Piccoli initramfs-tools (Ubuntu Xenial): importance Undecided Medium
2020-08-04 14:16:56 Guilherme G. Piccoli initramfs-tools (Ubuntu Xenial): status New Won't Fix
2020-08-04 14:16:56 Guilherme G. Piccoli initramfs-tools (Ubuntu Xenial): assignee Guilherme G. Piccoli (gpiccoli)
2020-08-04 14:17:11 Guilherme G. Piccoli initramfs-tools (Ubuntu Bionic): importance Undecided Medium
2020-08-04 14:17:11 Guilherme G. Piccoli initramfs-tools (Ubuntu Bionic): status New In Progress
2020-08-04 14:17:11 Guilherme G. Piccoli initramfs-tools (Ubuntu Bionic): assignee Guilherme G. Piccoli (gpiccoli)
2020-08-04 14:17:23 Guilherme G. Piccoli initramfs-tools (Ubuntu Focal): importance Undecided Medium
2020-08-04 14:17:23 Guilherme G. Piccoli initramfs-tools (Ubuntu Focal): status New In Progress
2020-08-04 14:17:23 Guilherme G. Piccoli initramfs-tools (Ubuntu Focal): assignee Guilherme G. Piccoli (gpiccoli)
2020-08-04 14:17:38 Guilherme G. Piccoli mdadm (Ubuntu Xenial): importance Undecided Medium
2020-08-04 14:17:38 Guilherme G. Piccoli mdadm (Ubuntu Xenial): status Opinion Won't Fix
2020-08-04 14:17:38 Guilherme G. Piccoli mdadm (Ubuntu Xenial): assignee Guilherme G. Piccoli (gpiccoli)
2020-08-04 14:18:03 Guilherme G. Piccoli mdadm (Ubuntu Bionic): importance Undecided Medium
2020-08-04 14:18:03 Guilherme G. Piccoli mdadm (Ubuntu Bionic): assignee Guilherme G. Piccoli (gpiccoli)
2020-08-04 14:18:19 Guilherme G. Piccoli mdadm (Ubuntu Focal): importance Undecided Medium
2020-08-04 14:18:19 Guilherme G. Piccoli mdadm (Ubuntu Focal): status New Opinion
2020-08-04 14:18:19 Guilherme G. Piccoli mdadm (Ubuntu Focal): assignee Guilherme G. Piccoli (gpiccoli)
2020-08-04 14:31:22 Guilherme G. Piccoli description [Impact] * Considering a setup of a encrypted rootfs on top of md RAID1 device, Ubuntu is currently unable to decrypt the rootfs if the array gets degraded, like for example if one of the array members gets removed. * The problem has 2 main aspects: first, cryptsetup initramfs script attempts to decrypt the array only in the local-top boot stage, and in case it fails, it gives-up and show user a shell (boot is aborted). * Second, mdadm initramfs script that assembles degraded arrays executes later on boot, in the local-block stage. So, in a stacked setup of encrypted root on top of RAID, if the RAID is degraded, cryptsetup fails early in the boot, preventing mdadm to assemble the degraded array. [Proposed solution] * The solution hereby proposed has 3 components: first, cryptsetup script is modified to allow a gentle failure on local-top stage, then it retries for a while in a later stage (local-block). This gives time to other initramfs scripts to run, like mdadm in local-block stage. * Second, mdadm script was adjusted - currently, it retries for a while to assemble the arrays in a non-degraded mode, by waiting for udev to discover the missing devices. After some time, it gives-up and assembles all arrays as degraded. The adjust we made was only to reduce this number of attempts and fallback a bit faster to degraded array assembly. * Third, there's a difference in Ubuntu initramfs-tools compared to Debian's : in Ubuntu, we rely on wait-for-root, a binary meant to speed-up the boot process. Problem is that currently this approach prevents local-block scripts to run more than once (thus retrying mechanisms will fail). Our proposed solution changes initramfs-tools to allow some looping in local-block stage (as Debian), but still relying on wait-for-root. Also, we increased a bit the default rootdelay from 30 seconds to 60 seconds. [Test case] * Install Ubuntu in a Virtual Machine with 2 disks. Use the installer to create a RAID1 volume and an encrypted root on top of it. * Boot the VM, and use "sgdisk"/"wipefs" to erase the partition table from one of the RAID members. Reboot and it will fail to mount rootfs and continue boot process. [Regression potential] * There are potential for regressions, since this is a change in 3 boot components. The patches were designed in a way to keep the regular case working, it changes the failure case which is not currently working anyway. * A potential issue in the initramfs-tools change is a bad script in local-block, lacking a good "halt" mechanism, to induce a boot loop condition. This problem would be exposed by the hereby proposed modification. [Impact] * Considering a setup of a encrypted rootfs on top of md RAID1 device, Ubuntu is currently unable to decrypt the rootfs if the array gets degraded, like for example if one of the array's members gets removed. * The problem has 2 main aspects: first, cryptsetup initramfs script attempts to decrypt the array only in the local-top boot stage, and in case it fails, it gives-up and show user a shell (boot is aborted). * Second, mdadm initramfs script that assembles degraded arrays executes later on boot, in the local-block stage. So, in a stacked setup of encrypted root on top of RAID, if the RAID is degraded, cryptsetup fails early in the boot, preventing mdadm to assemble the degraded array. * The hereby proposed solution has 2 components: first, cryptsetup script is modified to allow a gentle failure on local-top stage, then it retries for a while (according to a heuristic based on ROOTDELAY with minimum of 30 executions) in a later stage (local-block). This gives time to other initramfs scripts to run, like mdadm in local-block stage. And this is meant to work this way according to initramfs-tools documentation (although Ubuntu changed it a bit with wait-for-root, hence we stopped looping on local-block, see next bullet). * Second, initramfs-tools was adjusted - currently, it runs for a while the mdadm local-block script, in order to assemble the arrays in a non-degraded mode. We extended this approach to also execute cryptsetup, in a way that after mdadm ends its execution, we execute at least once more time cryptsetup. In an ideal world we should loop on local-block as Debian's initramfs (in a way to remove hardcoded mdadm/cryptsetup mentions from initramfs-tools code), but this would be really a big change, non-SRUable probably. I plan to work that for future Ubuntu releases. [Test case] * Install Ubuntu in a Virtual Machine with 2 disks. Use the installer to create a RAID1 volume and an encrypted root on top of it. * Boot the VM, and use "sgdisk"/"wipefs" to erase the partition table from one of the RAID members. Reboot and it will fail to mount rootfs and continue boot process. * If using the initramfs-toos/cryptsetup patches hereby proposed, the rootfs can be mounted normally. [Regression potential] * There are potential for regressions, since this is a change in 2 boot components. The patches were designed in a way to keep the regular case working, it changes the failure case which is not currently working anyway. * A modification in the behavior of cryptsetup was introduced: right now, if we fail the password 3 times (the default maximum attempts), the script doesn't "panic" and drop to a shell immediately; instead it runs once more (or twice, if mdadm is installed) before failing. This is a minor change given the benefit of the being able to mount rootfs in a degraded RAID1 scenario. * Other potential regressions could show-up as boot problems, but the change in initramfs-tools specifically is not invasive, it just may delay boot time a bit, given we now run cryptsetup multiple times on local-block, with 1 sec delays between executions.
2020-08-04 14:40:28 Guilherme G. Piccoli attachment added groovy_cryptsetup_lp1879980.debdiff https://bugs.launchpad.net/ubuntu/focal/+source/mdadm/+bug/1879980/+attachment/5398696/+files/groovy_cryptsetup_lp1879980.debdiff
2020-08-04 14:40:47 Guilherme G. Piccoli attachment added groovy_initramfs_lp1879980.debdiff https://bugs.launchpad.net/ubuntu/focal/+source/mdadm/+bug/1879980/+attachment/5398697/+files/groovy_initramfs_lp1879980.debdiff
2020-08-04 14:41:15 Guilherme G. Piccoli attachment added focal_cryptsetup_lp1879980.debdiff https://bugs.launchpad.net/ubuntu/focal/+source/mdadm/+bug/1879980/+attachment/5398698/+files/focal_cryptsetup_lp1879980.debdiff
2020-08-04 14:41:29 Guilherme G. Piccoli attachment added focal_initramfs_lp1879980.debdiff https://bugs.launchpad.net/ubuntu/focal/+source/mdadm/+bug/1879980/+attachment/5398699/+files/focal_initramfs_lp1879980.debdiff
2020-08-04 14:41:54 Guilherme G. Piccoli attachment added bionic_cryptsetup_lp1879980.debdiff https://bugs.launchpad.net/ubuntu/focal/+source/mdadm/+bug/1879980/+attachment/5398700/+files/bionic_cryptsetup_lp1879980.debdiff
2020-08-04 14:42:09 Guilherme G. Piccoli attachment added bionic_initramfs_lp1879980.debdiff https://bugs.launchpad.net/ubuntu/focal/+source/mdadm/+bug/1879980/+attachment/5398701/+files/bionic_initramfs_lp1879980.debdiff
2020-08-05 18:21:42 Guilherme G. Piccoli bug added subscriber STS Sponsors
2020-08-12 18:39:27 Guilherme G. Piccoli attachment added bionic_initramfs_lp1879980_V2.debdiff https://bugs.launchpad.net/ubuntu/focal/+source/mdadm/+bug/1879980/+attachment/5401090/+files/bionic_initramfs_lp1879980_V2.debdiff
2020-08-27 15:14:52 Jose Delarosa bug added subscriber Jose Delarosa
2020-08-31 18:41:02 Guilherme G. Piccoli attachment added groovy_initramfs_lp1879980_V2.debdiff https://bugs.launchpad.net/ubuntu/focal/+source/mdadm/+bug/1879980/+attachment/5406229/+files/groovy_initramfs_lp1879980_V2.debdiff
2020-08-31 18:41:28 Guilherme G. Piccoli attachment added focal_initramfs_lp1879980_V2.debdiff https://bugs.launchpad.net/ubuntu/focal/+source/mdadm/+bug/1879980/+attachment/5406230/+files/focal_initramfs_lp1879980_V2.debdiff
2020-09-01 17:58:14 Launchpad Janitor initramfs-tools (Ubuntu Groovy): status In Progress Fix Released
2020-09-04 12:13:31 Timo Aaltonen initramfs-tools (Ubuntu Focal): status In Progress Fix Committed
2020-09-04 12:13:37 Timo Aaltonen bug added subscriber Ubuntu Stable Release Updates Team
2020-09-04 12:13:39 Timo Aaltonen bug added subscriber SRU Verification
2020-09-04 12:13:45 Timo Aaltonen tags sts sts verification-needed verification-needed-focal
2020-09-08 19:52:42 Guilherme G. Piccoli tags sts verification-needed verification-needed-focal sts verification-done verification-done-focal
2020-09-15 15:47:10 Launchpad Janitor initramfs-tools (Ubuntu Focal): status Fix Committed Fix Released
2020-09-15 15:47:21 Brian Murray removed subscriber Ubuntu Stable Release Updates Team
2020-09-16 21:50:26 Guilherme G. Piccoli attachment added groovy_cryptsetup_lp1879980_V2.debdiff https://bugs.launchpad.net/ubuntu/focal/+source/mdadm/+bug/1879980/+attachment/5411484/+files/groovy_cryptsetup_lp1879980_V2.debdiff
2020-09-16 22:01:22 Guilherme G. Piccoli attachment added focal_cryptsetup_lp1879980_V2.debdiff https://bugs.launchpad.net/ubuntu/focal/+source/mdadm/+bug/1879980/+attachment/5411485/+files/focal_cryptsetup_lp1879980_V2.debdiff
2020-09-16 22:03:25 Guilherme G. Piccoli attachment added bionic_cryptsetup_lp1879980.debdiff https://bugs.launchpad.net/ubuntu/focal/+source/mdadm/+bug/1879980/+attachment/5411486/+files/bionic_cryptsetup_lp1879980.debdiff
2020-09-21 17:30:03 Mauricio Faria de Oliveira bug added subscriber Mauricio Faria de Oliveira
2020-09-22 15:36:41 Mauricio Faria de Oliveira attachment added groovy_cryptsetup_lp1879980_V3.debdiff https://bugs.launchpad.net/ubuntu/+source/cryptsetup/+bug/1879980/+attachment/5413208/+files/groovy_cryptsetup_lp1879980_V3.debdiff
2020-09-22 16:28:34 Ubuntu Foundations Team Bug Bot tags sts verification-done verification-done-focal patch sts verification-done verification-done-focal
2020-09-22 16:41:51 Mauricio Faria de Oliveira tags patch sts verification-done verification-done-focal patch sts sts-sponsor-mfo verification-done verification-done-focal
2020-09-23 16:46:45 Launchpad Janitor cryptsetup (Ubuntu Groovy): status In Progress Fix Released
2020-09-23 19:58:02 Mauricio Faria de Oliveira attachment added focal_cryptsetup_lp1879980_V3.debdiff https://bugs.launchpad.net/ubuntu/+source/cryptsetup/+bug/1879980/+attachment/5413626/+files/focal_cryptsetup_lp1879980_V3.debdiff
2020-09-23 19:58:18 Mauricio Faria de Oliveira attachment added bionic_cryptsetup_lp1879980_V3.debdiff https://bugs.launchpad.net/ubuntu/+source/cryptsetup/+bug/1879980/+attachment/5413627/+files/bionic_cryptsetup_lp1879980_V3.debdiff
2020-09-23 21:03:58 Mauricio Faria de Oliveira attachment added bionic_initramfs-tools_lp1879980_V3.debdiff https://bugs.launchpad.net/ubuntu/+source/cryptsetup/+bug/1879980/+attachment/5413638/+files/bionic_initramfs-tools_lp1879980_V3.debdiff
2020-09-24 13:55:47 Łukasz Zemczak initramfs-tools (Ubuntu Bionic): status In Progress Fix Committed
2020-09-24 13:55:50 Łukasz Zemczak bug added subscriber Ubuntu Stable Release Updates Team
2020-09-24 13:55:55 Łukasz Zemczak tags patch sts sts-sponsor-mfo verification-done verification-done-focal patch sts sts-sponsor-mfo verification-done-focal verification-needed verification-needed-bionic
2020-09-25 17:19:39 Mauricio Faria de Oliveira tags patch sts sts-sponsor-mfo verification-done-focal verification-needed verification-needed-bionic patch sts sts-sponsor-mfo verification-done verification-done-bionic verification-done-focal
2020-09-25 17:21:23 Mauricio Faria de Oliveira attachment added lp1879980 verification-bionic.log https://bugs.launchpad.net/ubuntu/+source/cryptsetup/+bug/1879980/+attachment/5414278/+files/lp1879980%20verification-bionic.log
2020-09-30 16:10:37 Mauricio Faria de Oliveira bug added subscriber Ubuntu Security Team
2020-10-06 08:02:45 Launchpad Janitor initramfs-tools (Ubuntu Bionic): status Fix Committed Fix Released
2020-10-08 16:38:52 Łukasz Zemczak cryptsetup (Ubuntu Focal): status In Progress Fix Committed
2020-10-08 16:39:02 Łukasz Zemczak tags patch sts sts-sponsor-mfo verification-done verification-done-bionic verification-done-focal patch sts sts-sponsor-mfo verification-done-bionic verification-needed verification-needed-focal
2020-10-08 23:41:59 Łukasz Zemczak cryptsetup (Ubuntu Bionic): status In Progress Fix Committed
2020-10-08 23:42:07 Łukasz Zemczak tags patch sts sts-sponsor-mfo verification-done-bionic verification-needed verification-needed-focal patch sts sts-sponsor-mfo verification-needed verification-needed-bionic verification-needed-focal
2020-10-09 20:11:37 Guilherme G. Piccoli tags patch sts sts-sponsor-mfo verification-needed verification-needed-bionic verification-needed-focal patch sts sts-sponsor-mfo verification-done verification-done-bionic verification-done-focal
2020-10-21 05:24:36 Launchpad Janitor cryptsetup (Ubuntu Focal): status Fix Committed Fix Released
2020-10-21 05:26:02 Launchpad Janitor cryptsetup (Ubuntu Bionic): status Fix Committed Fix Released
2020-11-02 11:08:52 John Gilmore bug added subscriber John Gilmore
2020-11-09 22:13:10 Launchpad Janitor merge proposal linked https://code.launchpad.net/~mwhudson/ubuntu/+source/cryptsetup/+git/cryptsetup/+merge/393521
2020-12-10 17:22:34 Eric Desrochers removed subscriber STS Sponsors
2020-12-31 15:03:00 Mauricio Faria de Oliveira tags patch sts sts-sponsor-mfo verification-done verification-done-bionic verification-done-focal patch sts verification-done verification-done-bionic verification-done-focal
2021-03-16 00:06:07 Bug Watch Updater cryptsetup (Debian): status New Fix Released