Verification: ubuntu@anuchin:~$ cat /proc/version Linux version 4.4.0-202-generic (buildd@bos02-arm64-077) (gcc version 5.4.0 20160609 (Ubuntu/Linaro 5.4.0-6ubuntu1~16.04.12) ) #234-Ubuntu SMP Thu Jan 28 02:06:34 UTC 2021 ubuntu@anuchin:~$ lsmod | grep sha sha2_ce 16384 0 sha1_ce 16384 0
** Tags removed: verification-needed-xenial ** Tags added: verification-done-xenial -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1907489 Title: restore reverted commit "crypto: arm64/sha - avoid non-standard inline asm tricks" Status in linux package in Ubuntu: Invalid Status in linux source package in Xenial: Fix Committed Bug description: [Impact] To address bug 1905336, we reverted an upstream commit. Upstream have now pulled in a commit to properly fix the underlying issue. Once we merge that fix, we should be able to reapply the reverted commit. [Test Case] If the kernel boots and we can still load the sha{1,2}_ce modules, we should be good. [Fix] After this is applied: https://www.spinics.net/lists/stable/msg431217.html We should reapply the commit we reverted here: https://kernel.ubuntu.com/git/ubuntu/ubuntu-xenial.git/commit/?id=4baa2fdd354700e2304e10cdbc64402621c3fa29 [Where Problems May Occur] Although we shipped the reverted patch for many releases - the whole time we did so, the impacted modules were not loadable. Once we reapply it, xenial users will be running that code for the first time. If there are issues with the code, users of the sha{1,2}_ce modules may now hit them. Issues could include kernel oopses, corruption, etc. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1907489/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : [email protected] Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp

