[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#965935: marked as done (configure_networking() should wait for specified interface)



Your message dated Sat, 13 Mar 2021 18:49:40 +0000
with message-id <E1lL9KW-000HhQ-86@fasolo.debian.org>
and subject line Bug#965935: fixed in initramfs-tools 0.140
has caused the Debian Bug report #965935,
regarding configure_networking() should wait for specified interface
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
965935: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965935
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: initramfs-tools-core
Version: 0.137
Severity: normal
Tags: patch

configure_networking() will do a `udevadm settle` before trying to configure
an interface. However it is possible for a NIC to appear after the event
queue has settled. This is pretty reproducible with a USB NIC I have.
There doesn't appear to be a good way to wait for all devices that
were connected at boot time to become available - `udevadm settle` is
just the closest thing we have.

However, in the case that the user has told us which interface they expect
to be used in the initramfs, we can just wait for it specifically. As a
bonus, this should shave off some time on systems where the NIC is available
before the udev event queue has emptied. I've a patch to do this, which
I'll submit as an MR in salsa.

Note: This should help out with the following issue in clevis, which
provides a mechanism for unlocking a LUKS root device from the initramfs
by communicating with a tang server:
  https://github.com/latchset/clevis/issues/145

-- System Information:
Debian Release: bullseye/sid
  APT prefers unstable-debug
  APT policy: (500, 'unstable-debug'), (500, 'unstable'), (1, 'experimental-debug'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.7.0-1-amd64 (SMP w/4 CPU threads)
Kernel taint flags: TAINT_FIRMWARE_WORKAROUND
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages initramfs-tools-core depends on:
ii  coreutils    8.32-3
ii  cpio         2.13+dfsg-3
ii  e2fsprogs    1.45.6-1
ii  klibc-utils  2.0.7-1
ii  kmod         27+20200310-2
ii  logsave      1.45.6-1
ii  udev         245.6-3

Versions of packages initramfs-tools-core recommends:
ii  busybox  1:1.30.1-5
ii  pigz     2.4-1+b1

Versions of packages initramfs-tools-core suggests:
ii  bash-completion  1:2.10-1

-- Configuration Files:
/etc/initramfs-tools/initramfs.conf changed [not included]

-- no debconf information

--- End Message ---
--- Begin Message ---
Source: initramfs-tools
Source-Version: 0.140
Done: Bastian Blank <waldi@debian.org>

We believe that the bug you reported is fixed in the latest version of
initramfs-tools, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 965935@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Bastian Blank <waldi@debian.org> (supplier of updated initramfs-tools package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat, 13 Mar 2021 19:13:18 +0100
Source: initramfs-tools
Architecture: source
Version: 0.140
Distribution: unstable
Urgency: medium
Maintainer: Debian kernel team <debian-kernel@lists.debian.org>
Changed-By: Bastian Blank <waldi@debian.org>
Closes: 965935
Changes:
 initramfs-tools (0.140) unstable; urgency=medium
 .
   [ Norbert Lange ]
   * mkinitramfs: use temporary file for uncompressed cpio
 .
   [ Michael Prokop ]
   * mkinitramfs: report actually requested compress util if it's not present
 .
   [ Ben Hutchings ]
   * init: Mount /dev without the noexec option
 .
   [ dann frazier ]
   * configure_networking(): Wait for specified network device (Closes: #965935)
 .
   [ Bastian Blank ]
   * Include all PCI controller modules
   * Include all reset controller modules
Checksums-Sha1:
 ca9b2b7c1bcd523e6b0d01610a8ffc1f9469d3c9 1599 initramfs-tools_0.140.dsc
 503b9ba5619bbb5fc1fefc54148b438517306a2f 95044 initramfs-tools_0.140.tar.xz
 98067441d1545346eb097dbc0e8065c3bee85dfd 5816 initramfs-tools_0.140_source.buildinfo
Checksums-Sha256:
 5537ff004f5e7fc9be4790a3248664806fa1ae4e5fe05ea47df821be8953aef4 1599 initramfs-tools_0.140.dsc
 17ec1b0e5e1c6f8254f2184be780e50c8274f71cdf482e5c46d50f955370685f 95044 initramfs-tools_0.140.tar.xz
 82eb6659251b86789c099f0c8f935eeac45c3158ad9a019583071baaf7e012cc 5816 initramfs-tools_0.140_source.buildinfo
Files:
 02ccd954ee0094babe87b535f98f2149 1599 utils optional initramfs-tools_0.140.dsc
 fd1364cfa57fa3580a70c6acf53b64ae 95044 utils optional initramfs-tools_0.140.tar.xz
 162c5689195e92895b38ef34766eb053 5816 utils optional initramfs-tools_0.140_source.buildinfo

-----BEGIN PGP SIGNATURE-----

iQEzBAEBCgAdFiEER3HMN63jdS1rqjxLbZOIhYpp/lEFAmBNAiAACgkQbZOIhYpp
/lFf9AgAkzB4sVAsdAwPFul7jOh+Ocw4eZfHE4K10cAdz2p0tNq5bMipbwCBwLjh
ZvxYmFAcEDQBBCZkdQyWZPrVoiwM73IgU8MTP28MYfO/I2T4/N4cLO1KdUVpbg23
fridBQVl9xmVonmskgbjtQfvP4g0GJvEBcskexwpuTFEuIhFwJ3G2IXFYSkLkO3X
2zUv8jtZ4GpQ674kgK3+aco+IqsfCtD+BSvnpSkttuZdU/GjFsY1puFFceWbx8JU
zozPKEvPEH8mvtk3KenZbCO4jalF3xbhmmU00yHsHXeUlSKotpPyM5DsSaOy9S2D
5slscGKgtoTlxkqaPkcvlsj8JrKivA==
=/SaL
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: