Your message dated Thu, 15 Oct 2009 19:01:41 +0000
with message-id <[email protected]>
and subject line Bug#544773: fixed in cryptsetup 2:1.1.0~rc2-1
has caused the Debian Bug report #544773,
regarding Update to cryptsetup 2:1.0.7-2 breaks booting
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
544773: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=544773
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: cryptsetup
Version: 2:1.0.7-2
Severity: critical
Justification: breaks the whole system
I upgraded my laptop this morning. The following packages were upgraded:
p...@vedrfolnir:~$ grep 2009-09-02\ 10 /var/log/dpkg.log|grep upgrade
2009-09-02 10:00:13 upgrade ant-optional 1.7.1-3 1.7.1-4
2009-09-02 10:00:13 upgrade ant 1.7.1-3 1.7.1-4
2009-09-02 10:00:14 upgrade cryptsetup 2:1.0.7-1 2:1.0.7-2
2009-09-02 10:00:14 upgrade debhelper 7.3.16 7.4.0
2009-09-02 10:00:14 upgrade freeglut3 2.4.0-7 2.4.0-8
2009-09-02 10:00:15 upgrade iso-codes 3.10.2-1 3.10.3-1
2009-09-02 10:00:16 upgrade kipi-plugins 0.5.0-1 0.6.0-1
2009-09-02 10:00:53 upgrade libportaudio2 19+svn20071022-3 19+svn20071022-3+b1
2009-09-02 10:00:53 upgrade network-manager-kde 1:0.7~~svn941706-1
1:0.7~~svn941706-2
After upgrading a few packages (listed below) I discovered my laptop was unable
to boot. The laptop
uses a Luks partition with LVM (this was using a standard guided partitioning
option back when I was
installing Debian). The boot fails at around the same time I would normally be
prompted for the
passphrase to unlock the Luks partition.
One (or more) of the upgraded packages triggered a rebuild of the initrd.
Suspecting that this
might be the cause of the problem, I tried adjusting the boot process. Using
grub's built-in
editor, I changed the initrd from the usual value to the backup copy (which has
the filename with
".bak" appended). When booting from the backup copy of the initrd the computer
booted without any
problem.
I then took the two initrd images, unpacked them and compared their contents.
There was a number of
differences, but the most noticable change was that the file:
conf/conf.d/cryptroot
that was present in the backup initrd was missing in the new initrd. This file
contained
cryptographic options for establishing the LVM ontop of the Luks partition.
I've copied the
contents here:
target=sdb2_crypt,source=/dev/sda2,key=none,rootdev,lvm=vedrfolnir-root
target=sdb2_crypt,source=/dev/sda2,key=none,lvm=vedrfolnir-swap_1
Suspecting that the absence of this file was causing the problem, I copied the
missing
conf/conf.d/cryptroot file into the new initrd's contents and repacked the
initrd file. Booting off
this modified version of new initrd was successful.
Therefore, I conclude that the laptop was unable to boot due to the missing
conf/conf.d/cryptroot
file in the initrd.
My suspicion is that the upgrade to cryptsetup triggered a rebuild of initrd
that, most likely due
to a bug in cryptsetup, resulted in an initrd that bereft of the
conf/conf.d/cryptroot file.
-- Package-specific info:
-- /proc/cmdline
root=/dev/mapper/vedrfolnir-root ro
-- /etc/crypttab
sdb2_crypt /dev/sda2 none luks
-- /etc/fstab
# /etc/fstab: static file system information.
#
# <file system> <mount point> <type> <options> <dump> <pass>
proc /proc proc defaults 0 0
/dev/mapper/vedrfolnir-root / ext3 errors=remount-ro 0 1
/dev/sda1 /boot ext2 defaults 0 2
/dev/mapper/vedrfolnir-home /home ext3 defaults 0 2
/dev/mapper/vedrfolnir-tmp /tmp ext3 defaults 0 2
/dev/mapper/vedrfolnir-usr /usr ext3 defaults 0 2
/dev/mapper/vedrfolnir-var /var ext3 defaults 0 2
/dev/mapper/vedrfolnir-swap_1 none swap sw 0 0
-- lsmod
Module Size Used by
i915 166840 1
drm 172672 2 i915
i2c_algo_bit 5988 1 i915
ppdev 7784 0
lp 10612 0
parport 38224 2 ppdev,lp
bridge 48240 0
stp 2868 1 bridge
bnep 13792 2
sco 10996 2
rfcomm 36016 4
l2cap 21152 16 bnep,rfcomm
acpi_cpufreq 8912 0
cpufreq_conservative 7928 0
cpufreq_userspace 3652 0
cpufreq_powersave 1792 0
cpufreq_stats 4660 0
fuse 54768 1
btusb 12756 2
bluetooth 55124 9 bnep,sco,rfcomm,l2cap,btusb
nfsd 269328 9
exportfs 4656 1 nfsd
nfs 258400 0
lockd 68212 2 nfsd,nfs
fscache 41704 1 nfs
nfs_acl 3264 2 nfsd,nfs
auth_rpcgss 40912 2 nfsd,nfs
sunrpc 196936 10 nfsd,nfs,lockd,nfs_acl,auth_rpcgss
ext2 62816 1
firewire_sbp2 15424 0
loop 15980 0
snd_hda_codec_intelhdmi 13232 1
snd_hda_codec_idt 62480 1
snd_hda_intel 26680 3
snd_hda_codec 75248 3
snd_hda_codec_intelhdmi,snd_hda_codec_idt,snd_hda_intel
snd_hwdep 8152 1 snd_hda_codec
snd_pcm_oss 37200 0
snd_mixer_oss 15072 1 snd_pcm_oss
snd_pcm 78504 3 snd_hda_intel,snd_hda_codec,snd_pcm_oss
arc4 2048 2
ecb 3072 2
snd_seq_midi 6976 0
snd_rawmidi 23008 1 snd_seq_midi
dell_laptop 4056 0
dcdbas 8560 1 dell_laptop
iwlagn 83476 0
snd_seq_midi_event 7712 1 snd_seq_midi
evdev 10448 25
serio_raw 5844 0
psmouse 42172 0
snd_seq 51376 2 snd_seq_midi,snd_seq_midi_event
iwlcore 106768 1 iwlagn
snd_timer 21824 2 snd_pcm,snd_seq
snd_seq_device 7476 3 snd_seq_midi,snd_rawmidi,snd_seq
rfkill 12116 5 dell_laptop,iwlcore
mac80211 161280 2 iwlagn,iwlcore
snd 63912 18
snd_hda_codec_intelhdmi,snd_hda_codec_idt,snd_hda_intel,snd_hda_codec,snd_hwdep,snd_pcm_oss,snd_mixer_oss,snd_pcm,snd_rawmidi,snd_seq,snd_timer,snd_seq_device
cfg80211 65432 3 iwlagn,iwlcore,mac80211
i2c_i801 10464 0
soundcore 7984 1 snd
snd_page_alloc 9984 2 snd_hda_intel,snd_pcm
i2c_core 25456 4 i915,drm,i2c_algo_bit,i2c_i801
wmi 7488 0
battery 7840 0
button 6512 0
ac 3872 0
processor 40160 3 acpi_cpufreq
ext3 122848 5
jbd 48152 1 ext3
mbcache 8804 2 ext2,ext3
sha256_generic 9440 0
aes_x86_64 8928 2
aes_generic 27840 1 aes_x86_64
cbc 3776 1
dm_crypt 12984 1
dm_mod 59384 21 dm_crypt
usbhid 37328 0
hid 41376 1 usbhid
sd_mod 33720 3
crc_t10dif 2096 1 sd_mod
uhci_hcd 22192 0
ahci 36480 2
firewire_ohci 22356 0
firewire_core 44980 2 firewire_sbp2,firewire_ohci
crc_itu_t 2720 1 firewire_core
libata 175500 1 ahci
sdhci_pci 8160 0
sdhci 17604 1 sdhci_pci
mmc_core 55472 1 sdhci
led_class 5048 2 iwlcore,sdhci
ricoh_mmc 4272 0
intel_agp 28752 1
scsi_mod 158768 3 firewire_sbp2,sd_mod,libata
ehci_hcd 33804 0
e1000e 111728 0
video 21884 1 i915
output 3472 1 video
thermal 15936 0
fan 5240 0
thermal_sys 16448 4 processor,video,thermal,fan
-- System Information:
Debian Release: squeeze/sid
APT prefers unstable
APT policy: (500, 'unstable'), (500, 'stable')
Architecture: i386 (x86_64)
Kernel: Linux 2.6.30-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
Versions of packages cryptsetup depends on:
ii dmsetup 2:1.02.36-2 The Linux Kernel Device Mapper use
ii libc6 2.9-26 GNU C Library: Shared libraries
ii libdevmapper1.02.1 2:1.02.36-2 The Linux Kernel Device Mapper use
ii libpopt0 1.14-4 lib for parsing cmdline parameters
ii libuuid1 2.16-3 Universally Unique ID library
cryptsetup recommends no packages.
Versions of packages cryptsetup suggests:
ii dosfstools 3.0.5-1 utilities for making and checking
ii initramfs-tools [linux-initra 0.93.4 tools for generating an initramfs
ii udev 0.141-2 /dev/ and hotplug management daemo
-- no debconf information
--- End Message ---
--- Begin Message ---
Source: cryptsetup
Source-Version: 2:1.1.0~rc2-1
We believe that the bug you reported is fixed in the latest version of
cryptsetup, which is due to be installed in the Debian FTP archive:
cryptsetup-udeb_1.1.0~rc2-1_amd64.udeb
to pool/main/c/cryptsetup/cryptsetup-udeb_1.1.0~rc2-1_amd64.udeb
cryptsetup_1.1.0~rc2-1.diff.gz
to pool/main/c/cryptsetup/cryptsetup_1.1.0~rc2-1.diff.gz
cryptsetup_1.1.0~rc2-1.dsc
to pool/main/c/cryptsetup/cryptsetup_1.1.0~rc2-1.dsc
cryptsetup_1.1.0~rc2-1_amd64.deb
to pool/main/c/cryptsetup/cryptsetup_1.1.0~rc2-1_amd64.deb
cryptsetup_1.1.0~rc2.orig.tar.gz
to pool/main/c/cryptsetup/cryptsetup_1.1.0~rc2.orig.tar.gz
libcryptsetup-dev_1.1.0~rc2-1_amd64.deb
to pool/main/c/cryptsetup/libcryptsetup-dev_1.1.0~rc2-1_amd64.deb
libcryptsetup1_1.1.0~rc2-1_amd64.deb
to pool/main/c/cryptsetup/libcryptsetup1_1.1.0~rc2-1_amd64.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Jonas Meurer <[email protected]> (supplier of updated cryptsetup package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.8
Date: Thu, 15 Oct 2009 19:26:14 +0200
Source: cryptsetup
Binary: cryptsetup cryptsetup-udeb libcryptsetup1 libcryptsetup-dev
Architecture: source amd64
Version: 2:1.1.0~rc2-1
Distribution: unstable
Urgency: low
Maintainer: Debian Cryptsetup Team
<[email protected]>
Changed-By: Jonas Meurer <[email protected]>
Description:
cryptsetup - configures encrypted block devices
cryptsetup-udeb - configures encrypted block devices (udeb)
libcryptsetup-dev - libcryptsetup development files
libcryptsetup1 - libcryptsetup shared library
Closes: 387159 475838 480157 532579 533643 536415 537385 541248 541805 544487
544773 547597 548356 548988 549870
Changes:
cryptsetup (2:1.1.0~rc2-1) unstable; urgency=low
.
* new upstream release candidate (1.1.0-rc2), highlights include:
- new libcryptsetup API (documented in libcryptsetup.h)
- luksHeaderBackup and luksHeaderRestore commands (closes: #533643)
- use libgcrypt, enables all gcrypt hash algorithms for LUKS through
-h luksFormat option (closes: #387159, #537385)
- new --master-key-file option for luksFormat and luksAddKey
- use dm-uuid for all crypt devices, contains device type and name now
(closes: #548988, #549870)
- command successful messages moved to verbose level (closes: #541805)
- several code changes to improve speed of luksOpen (closes: #536415)
- luksSuspend and luksResume commands
* remove unneeded patches 03_read_rework and 04_no_stderr_success, update
02_manpage for new upstream release candidate.
* update patch to comply with DEP-3 (http://dep.debian.net/deps/dep3/)
* fix initramfs/cryptroot-hook to support setups where /dev/mapper/ contains
symlinks to devices at /dev/dm-*. the lvm2/device-mapper packages had
defaults changed to this temporary. it has been fixed in a subsequent
upload of lvm2 in the meantime, but still it's not a bad idea to be
prepared for such setups in the future. that way cryproot now supports
/dev/dm-* devices as well. (closes: #532579, #544487, #544773)
* fix initscript dependencies both for cryptdisks and cryptdisks-early.
thanks to Petter Reinholdtsen for bugreport and patch. (closes: #548356)
* finally change default behaviour of initscripts/cryptroot-hook to include
all available crypto modules into the initramfs. this change should fix
any problems with cryto modules missing from the initramfs. announce the
change in NEWS.Debian. (closes: #547597)
* add error messages to lvm detecting code in initramfs/cryptroot-script
in order to make debugging easier. (closes: #541248)
* implement detection of devices which are required by decrypt_derived
keyscript in initscripts/cryptroot-hook. that way setups where encrypted
swap has the key derived from non-root partitions should support suspend/
resume as well. (closes: #475838)
* remove outdated documentation from the source package: CryptoRoot.HowTo,
CheckSystem.Doc
* mention in README.initramfs that busybox is required for cryptroot to work
* stop creating /etc/keys in postinst maintainer script.
* update build system to include library files again: (closes: #480157)
- split into three packages: cryptsetup, libcryptsetup1, libcryptsetup-dev
- rename preinst to cryptsetup.preinst, copy code to create /etc/crypttab
skeleton into cryptsetup-udeb.preinst.
- build with --enable-shared and --enable-static for libcryptsetup.a
- create debian/libcryptsetup1.symbols with help of dpkg-gensymbols
* add debian/cryptsetup.lintian-override for two false positives
* raise build-depends on debhelper and debian/compat for that reason
* update README.remote to work with latest dropbear package. thanks to
[email protected].
* make all crypttab fields available to keyscripts as environment variables.
thanks to ludwig nussel from suse for idea and implmentation. document
this in crypttab(5) manpage. impelement the same environment variables in
initramfs cryptroot script.
* fix formatting errors in crypttab(5) manpage.
Checksums-Sha1:
f03c40ca6979ac50352d83f8f87b4a10f0566599 1551 cryptsetup_1.1.0~rc2-1.dsc
eeed2f2fd1557b72997211108dc9ccb0aedc66a1 511212
cryptsetup_1.1.0~rc2.orig.tar.gz
835bea9710d55bb09c1aee454ccbad07b168bb13 67590 cryptsetup_1.1.0~rc2-1.diff.gz
873a77d4e747b202506e84bb7eb74ff970e02bd8 365122
cryptsetup_1.1.0~rc2-1_amd64.deb
25cb2f778d6dee38adf8777bbe9b04c1d2f30bc5 289534
cryptsetup-udeb_1.1.0~rc2-1_amd64.udeb
f00378cb8adf5422f256ee621b3593071e15306a 69338
libcryptsetup1_1.1.0~rc2-1_amd64.deb
e45cddaf4454e9869d8ca480e2e9408191df9f8b 79256
libcryptsetup-dev_1.1.0~rc2-1_amd64.deb
Checksums-Sha256:
be6a2bd497a4c4b5158fe159664236330532388361bdbf7b4728f18e5c1e78af 1551
cryptsetup_1.1.0~rc2-1.dsc
b3adc7f48eb1867752a4da7f7682cde8ca5bc8b098f47b7ed6475f4abe67da8a 511212
cryptsetup_1.1.0~rc2.orig.tar.gz
f7219582a123f2372ecf8c61ff67b004821b4587321926bb6ebc657833b7f36b 67590
cryptsetup_1.1.0~rc2-1.diff.gz
2a958451404f247526a1fd5f23643b8c1dba5a17ee2502da91431dbbc7f241a8 365122
cryptsetup_1.1.0~rc2-1_amd64.deb
7acf83d69d3d4e8ab4a55eaba70d1ea5c9dfbb27ca8e8862f45319ae80ccde6e 289534
cryptsetup-udeb_1.1.0~rc2-1_amd64.udeb
7fd47d59904184c4991cfaa584e68a86c917039f94d458a864c50024e75f0fce 69338
libcryptsetup1_1.1.0~rc2-1_amd64.deb
1b2c9fc1b74b4012110d249ad50111ae08297ebdf100c928d6232bcbe6ccf1ec 79256
libcryptsetup-dev_1.1.0~rc2-1_amd64.deb
Files:
35e0605fa09f3a887a68c4cf613d5bd9 1551 admin optional cryptsetup_1.1.0~rc2-1.dsc
4a5e5c8b04f8ec54ebb75b4b8ea3dff6 511212 admin optional
cryptsetup_1.1.0~rc2.orig.tar.gz
c3405f8743465deb0314559bd0a2efaa 67590 admin optional
cryptsetup_1.1.0~rc2-1.diff.gz
4b818ae254470477e6b3bada3a178443 365122 admin optional
cryptsetup_1.1.0~rc2-1_amd64.deb
236c8fb841d1ef9e6490807b1577a7ab 289534 debian-installer optional
cryptsetup-udeb_1.1.0~rc2-1_amd64.udeb
2cf2d093b58399e3c039e3edb3252899 69338 libs optional
libcryptsetup1_1.1.0~rc2-1_amd64.deb
77053048c938ce9a68bb9f1054656190 79256 libdevel optional
libcryptsetup-dev_1.1.0~rc2-1_amd64.deb
Package-Type: udeb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAkrXW+UACgkQd6lUs+JfIQKh5gCdFa7c6GqY5bELpuomVEyNP0Da
Pa0An3ROTpNYuOVy/hklzAgNLNMlucfs
=g9Dw
-----END PGP SIGNATURE-----
--- End Message ---