[Kernel-packages] [Bug 1852406] Re: Double-escape in initramfs DECRYPT_CMD

2019-12-02 Thread Launchpad Bug Tracker
This bug was fixed in the package zfs-linux - 0.8.1-1ubuntu14.2 --- zfs-linux (0.8.1-1ubuntu14.2) eoan; urgency=medium * 4601-zfs-encryptionroot-quote.patch - remove quotation marks to fix zfs load-key errors in plymouth when using an encrypted pool (LP: #1852406) --

[Kernel-packages] [Bug 1852406] Re: Double-escape in initramfs DECRYPT_CMD

2019-11-25 Thread Colin Ian King
Thanks Witold! Much appreciated. ** Tags added: verification-done verification-done-eoan -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to zfs-linux in Ubuntu. https://bugs.launchpad.net/bugs/1852406 Title: Double-escape in initramfs

[Kernel-packages] [Bug 1852406] Re: Double-escape in initramfs DECRYPT_CMD

2019-11-25 Thread Witold Krecicki
@colin-king I got it (0.8.1-1ubuntu14.2) from eoan-proposed, and yes - this version fixes the issue. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to zfs-linux in Ubuntu. https://bugs.launchpad.net/bugs/1852406 Title: Double-escape in

[Kernel-packages] [Bug 1852406] Re: Double-escape in initramfs DECRYPT_CMD

2019-11-25 Thread Colin Ian King
I was hoping you could test the version in -proposed. Without it being verified as fixed then the fix won't be released for Eoan. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to zfs-linux in Ubuntu. https://bugs.launchpad.net/bugs/1852406

[Kernel-packages] [Bug 1852406] Re: Double-escape in initramfs DECRYPT_CMD

2019-11-25 Thread Witold Krecicki
@colin-king I just checked and, with the plymouth fix also applied, the issue is fixed in 0.8.1-1ubuntu14.2 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to zfs-linux in Ubuntu. https://bugs.launchpad.net/bugs/1852406 Title:

[Kernel-packages] [Bug 1852406] Re: Double-escape in initramfs DECRYPT_CMD

2019-11-25 Thread Colin Ian King
@Witold, is it possible for you to sanity check this, if it's not verified it won't be fixed. thanks Colin -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to zfs-linux in Ubuntu. https://bugs.launchpad.net/bugs/1852406 Title:

[Kernel-packages] [Bug 1852406] Re: Double-escape in initramfs DECRYPT_CMD

2019-11-22 Thread Timo Aaltonen
Hello Witold, or anyone else affected, Accepted zfs-linux into eoan-proposed. The package will build now and be available at https://launchpad.net/ubuntu/+source/zfs- linux/0.8.1-1ubuntu14.2 in a few hours, and then in the -proposed repository. Please help us by testing this new package. See

[Kernel-packages] [Bug 1852406] Re: Double-escape in initramfs DECRYPT_CMD

2019-11-14 Thread Witold Krecicki
btw, there's another bug in plymouth package that breaks root on encrypted zfs in some cases, the patch is there but it's waiting for review: https://bugs.launchpad.net/ubuntu/+source/plymouth/+bug/1810154 -- You received this bug notification because you are a member of Kernel Packages, which

[Kernel-packages] [Bug 1852406] Re: Double-escape in initramfs DECRYPT_CMD

2019-11-13 Thread Richard Laager
The fix here seems fine, given that you're going for minimal impact in an SRU. I agree that the character restrictions are such that the pool names shouldn't actually need to be escaped. That's not to say that I would remove the _proper_ quoting of variables that currently exists upstream, as it's

[Kernel-packages] [Bug 1852406] Re: Double-escape in initramfs DECRYPT_CMD

2019-11-13 Thread Colin Ian King
Yes, minimal impact and reducing regression risk is key in SRUs. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to zfs-linux in Ubuntu. https://bugs.launchpad.net/bugs/1852406 Title: Double-escape in initramfs DECRYPT_CMD Status in

[Kernel-packages] [Bug 1852406] Re: Double-escape in initramfs DECRYPT_CMD

2019-11-13 Thread fields_g
I believe you ran into something reported and fixed upstream. https://github.com/zfsonlinux/zfs/pull/9202 (Merged to master Aug 27 and included in 0.8.2) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to zfs-linux in Ubuntu.

[Kernel-packages] [Bug 1852406] Re: Double-escape in initramfs DECRYPT_CMD

2019-11-13 Thread Colin Ian King
** Description changed: + == SRU Justification, Eoan == + initramfs/scripts/zfs.in incorrectly quotes ${ENCRYPTIONROOT} on line 414: DECRYPT_CMD="${ZFS} load-key '${ENCRYPTIONROOT}'" This is OK when the line is executed by shell, such as in line 430 or 436, but when plymouth is

[Kernel-packages] [Bug 1852406] Re: Double-escape in initramfs DECRYPT_CMD

2019-11-13 Thread Colin Ian King
Fix required only in zfs-linux-0.8.1 in Eoan. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to zfs-linux in Ubuntu. https://bugs.launchpad.net/bugs/1852406 Title: Double-escape in initramfs DECRYPT_CMD Status in zfs-linux package in

[Kernel-packages] [Bug 1852406] Re: Double-escape in initramfs DECRYPT_CMD

2019-11-13 Thread Colin Ian King
Fixed in zfs-0.8.2 in focal. ** Also affects: zfs-linux (Ubuntu Focal) Importance: Medium Assignee: Colin Ian King (colin-king) Status: Triaged ** Changed in: zfs-linux (Ubuntu Focal) Status: Triaged => Fix Released ** Also affects: zfs-linux (Ubuntu Eoan) Importance:

[Kernel-packages] [Bug 1852406] Re: Double-escape in initramfs DECRYPT_CMD

2019-11-13 Thread Colin Ian King
Thanks for the patch. Any specific version of zfs-linux this relates to? ** Changed in: zfs-linux (Ubuntu) Importance: Undecided => Medium ** Changed in: zfs-linux (Ubuntu) Assignee: (unassigned) => Colin Ian King (colin-king) ** Changed in: zfs-linux (Ubuntu) Status: New =>