[Kernel-packages] [Bug 1762353] Re: [Ubuntu 18.04] cryptsetup: 'device-mapper: reload ioctl on failed' when setting up a second end-to-end encrypted disk

2019-07-24 Thread Brad Figg
** Tags added: cscc

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1762353

Title:
  [Ubuntu 18.04] cryptsetup: 'device-mapper: reload ioctl on  failed'
  when setting up a second end-to-end encrypted disk

Status in Ubuntu on IBM z Systems:
  Fix Released
Status in linux package in Ubuntu:
  Fix Released

Bug description:
  Problem Description:
  Environment: z14 VM Guest system with one CEX6C CCA coprocessor
  in toleration mode (i.e. CEX6 HW presented as CEX5)
  OS: Ubuntu 18.04 Prerelease
  Setting up a second dm-crypt device using protected CCA paes-xts keys fails.
  The problem is reproducible.

  Details
  ===
  Setting up two or more plain end-to-end encrypted disks using 'cryptsetup'
  fails when using a cipher based on the protected key mechanism.
  The setup needs the paes and pkey modules loaded, the former providing the
  paes-xts-plain64 cipher (cat /proc/crpyto |grep paes).

  A second attempt to establish an end-to-end encrypted disk fails
  with : "device-mapper: reload ioctl on failed: No such file or directory."

  The problem is independent of the second encrypted disk being based on
  a second DASD or second partition on one DASD.

  ---uname output---
  Linux s3514004 4.13.0-25-generic #29-Ubuntu SMP Mon Jan 8 21:15:56 UTC 2018 
s390x s390x s390x GNU/Linux

  ---Steps to Reproduce---
  1.) The following cryptsetup statement works, and is the first one I issued.
  cryptsetup plainOpen --key-file securekey.bin --key-size 1024 --cipher 
paes-xts-plain64 /dev/disk/by-path/ccw-0.0.-part1 enc-pv1
  2.) After this successful statement, I issued the following:
  cryptsetup plainOpen --key-file securekey.bin --key-size 1024 --cipher 
paes-xts-plain64 /dev/disk/by-path/ccw-0.0.-part2 enc-pv2
  device-mapper: reload ioctl on failed: No such file or directory.

  See attached patch (comment #1) as fix.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1762353/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1762353] Re: [Ubuntu 18.04] cryptsetup: 'device-mapper: reload ioctl on failed' when setting up a second end-to-end encrypted disk

2019-02-14 Thread Frank Heimes
Ticket is already Fix Released - correcting the tags again ...

** Tags removed: verification-needed-bionic
** Tags added: verification-done-bionic

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1762353

Title:
  [Ubuntu 18.04] cryptsetup: 'device-mapper: reload ioctl on  failed'
  when setting up a second end-to-end encrypted disk

Status in Ubuntu on IBM z Systems:
  Fix Released
Status in linux package in Ubuntu:
  Fix Released

Bug description:
  Problem Description:
  Environment: z14 VM Guest system with one CEX6C CCA coprocessor
  in toleration mode (i.e. CEX6 HW presented as CEX5)
  OS: Ubuntu 18.04 Prerelease
  Setting up a second dm-crypt device using protected CCA paes-xts keys fails.
  The problem is reproducible.

  Details
  ===
  Setting up two or more plain end-to-end encrypted disks using 'cryptsetup'
  fails when using a cipher based on the protected key mechanism.
  The setup needs the paes and pkey modules loaded, the former providing the
  paes-xts-plain64 cipher (cat /proc/crpyto |grep paes).

  A second attempt to establish an end-to-end encrypted disk fails
  with : "device-mapper: reload ioctl on failed: No such file or directory."

  The problem is independent of the second encrypted disk being based on
  a second DASD or second partition on one DASD.

  ---uname output---
  Linux s3514004 4.13.0-25-generic #29-Ubuntu SMP Mon Jan 8 21:15:56 UTC 2018 
s390x s390x s390x GNU/Linux

  ---Steps to Reproduce---
  1.) The following cryptsetup statement works, and is the first one I issued.
  cryptsetup plainOpen --key-file securekey.bin --key-size 1024 --cipher 
paes-xts-plain64 /dev/disk/by-path/ccw-0.0.-part1 enc-pv1
  2.) After this successful statement, I issued the following:
  cryptsetup plainOpen --key-file securekey.bin --key-size 1024 --cipher 
paes-xts-plain64 /dev/disk/by-path/ccw-0.0.-part2 enc-pv2
  device-mapper: reload ioctl on failed: No such file or directory.

  See attached patch (comment #1) as fix.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1762353/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1762353] Re: [Ubuntu 18.04] cryptsetup: 'device-mapper: reload ioctl on failed' when setting up a second end-to-end encrypted disk

2019-02-14 Thread Brad Figg
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
bionic' to 'verification-done-bionic'. If the problem still exists,
change the tag 'verification-needed-bionic' to 'verification-failed-
bionic'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: verification-needed-bionic

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1762353

Title:
  [Ubuntu 18.04] cryptsetup: 'device-mapper: reload ioctl on  failed'
  when setting up a second end-to-end encrypted disk

Status in Ubuntu on IBM z Systems:
  Fix Released
Status in linux package in Ubuntu:
  Fix Released

Bug description:
  Problem Description:
  Environment: z14 VM Guest system with one CEX6C CCA coprocessor
  in toleration mode (i.e. CEX6 HW presented as CEX5)
  OS: Ubuntu 18.04 Prerelease
  Setting up a second dm-crypt device using protected CCA paes-xts keys fails.
  The problem is reproducible.

  Details
  ===
  Setting up two or more plain end-to-end encrypted disks using 'cryptsetup'
  fails when using a cipher based on the protected key mechanism.
  The setup needs the paes and pkey modules loaded, the former providing the
  paes-xts-plain64 cipher (cat /proc/crpyto |grep paes).

  A second attempt to establish an end-to-end encrypted disk fails
  with : "device-mapper: reload ioctl on failed: No such file or directory."

  The problem is independent of the second encrypted disk being based on
  a second DASD or second partition on one DASD.

  ---uname output---
  Linux s3514004 4.13.0-25-generic #29-Ubuntu SMP Mon Jan 8 21:15:56 UTC 2018 
s390x s390x s390x GNU/Linux

  ---Steps to Reproduce---
  1.) The following cryptsetup statement works, and is the first one I issued.
  cryptsetup plainOpen --key-file securekey.bin --key-size 1024 --cipher 
paes-xts-plain64 /dev/disk/by-path/ccw-0.0.-part1 enc-pv1
  2.) After this successful statement, I issued the following:
  cryptsetup plainOpen --key-file securekey.bin --key-size 1024 --cipher 
paes-xts-plain64 /dev/disk/by-path/ccw-0.0.-part2 enc-pv2
  device-mapper: reload ioctl on failed: No such file or directory.

  See attached patch (comment #1) as fix.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1762353/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1762353] Re: [Ubuntu 18.04] cryptsetup: 'device-mapper: reload ioctl on failed' when setting up a second end-to-end encrypted disk

2019-01-16 Thread bugproxy
** Tags removed: architecture-s39031.64
** Tags added: architecture-s39064

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1762353

Title:
  [Ubuntu 18.04] cryptsetup: 'device-mapper: reload ioctl on  failed'
  when setting up a second end-to-end encrypted disk

Status in Ubuntu on IBM z Systems:
  Fix Released
Status in linux package in Ubuntu:
  Fix Released

Bug description:
  Problem Description:
  Environment: z14 VM Guest system with one CEX6C CCA coprocessor
  in toleration mode (i.e. CEX6 HW presented as CEX5)
  OS: Ubuntu 18.04 Prerelease
  Setting up a second dm-crypt device using protected CCA paes-xts keys fails.
  The problem is reproducible.

  Details
  ===
  Setting up two or more plain end-to-end encrypted disks using 'cryptsetup'
  fails when using a cipher based on the protected key mechanism.
  The setup needs the paes and pkey modules loaded, the former providing the
  paes-xts-plain64 cipher (cat /proc/crpyto |grep paes).

  A second attempt to establish an end-to-end encrypted disk fails
  with : "device-mapper: reload ioctl on failed: No such file or directory."

  The problem is independent of the second encrypted disk being based on
  a second DASD or second partition on one DASD.

  ---uname output---
  Linux s3514004 4.13.0-25-generic #29-Ubuntu SMP Mon Jan 8 21:15:56 UTC 2018 
s390x s390x s390x GNU/Linux

  ---Steps to Reproduce---
  1.) The following cryptsetup statement works, and is the first one I issued.
  cryptsetup plainOpen --key-file securekey.bin --key-size 1024 --cipher 
paes-xts-plain64 /dev/disk/by-path/ccw-0.0.-part1 enc-pv1
  2.) After this successful statement, I issued the following:
  cryptsetup plainOpen --key-file securekey.bin --key-size 1024 --cipher 
paes-xts-plain64 /dev/disk/by-path/ccw-0.0.-part2 enc-pv2
  device-mapper: reload ioctl on failed: No such file or directory.

  See attached patch (comment #1) as fix.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1762353/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1762353] Re: [Ubuntu 18.04] cryptsetup: 'device-mapper: reload ioctl on failed' when setting up a second end-to-end encrypted disk

2018-04-23 Thread Frank Heimes
** Changed in: ubuntu-z-systems
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1762353

Title:
  [Ubuntu 18.04] cryptsetup: 'device-mapper: reload ioctl on  failed'
  when setting up a second end-to-end encrypted disk

Status in Ubuntu on IBM z Systems:
  Fix Released
Status in linux package in Ubuntu:
  Fix Released

Bug description:
  Problem Description:
  Environment: z14 VM Guest system with one CEX6C CCA coprocessor
  in toleration mode (i.e. CEX6 HW presented as CEX5)
  OS: Ubuntu 18.04 Prerelease
  Setting up a second dm-crypt device using protected CCA paes-xts keys fails.
  The problem is reproducible.

  Details
  ===
  Setting up two or more plain end-to-end encrypted disks using 'cryptsetup'
  fails when using a cipher based on the protected key mechanism.
  The setup needs the paes and pkey modules loaded, the former providing the
  paes-xts-plain64 cipher (cat /proc/crpyto |grep paes).

  A second attempt to establish an end-to-end encrypted disk fails
  with : "device-mapper: reload ioctl on failed: No such file or directory."

  The problem is independent of the second encrypted disk being based on
  a second DASD or second partition on one DASD.

  ---uname output---
  Linux s3514004 4.13.0-25-generic #29-Ubuntu SMP Mon Jan 8 21:15:56 UTC 2018 
s390x s390x s390x GNU/Linux

  ---Steps to Reproduce---
  1.) The following cryptsetup statement works, and is the first one I issued.
  cryptsetup plainOpen --key-file securekey.bin --key-size 1024 --cipher 
paes-xts-plain64 /dev/disk/by-path/ccw-0.0.-part1 enc-pv1
  2.) After this successful statement, I issued the following:
  cryptsetup plainOpen --key-file securekey.bin --key-size 1024 --cipher 
paes-xts-plain64 /dev/disk/by-path/ccw-0.0.-part2 enc-pv2
  device-mapper: reload ioctl on failed: No such file or directory.

  See attached patch (comment #1) as fix.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1762353/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1762353] Re: [Ubuntu 18.04] cryptsetup: 'device-mapper: reload ioctl on failed' when setting up a second end-to-end encrypted disk

2018-04-23 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.15.0-19.20

---
linux (4.15.0-19.20) bionic; urgency=medium

  * linux: 4.15.0-19.20 -proposed tracker (LP: #1766021)

  * Kernel 4.15.0-15 breaks Dell PowerEdge 12th Gen servers (LP: #1765232)
- Revert "blk-mq: simplify queue mapping & schedule with each possisble CPU"
- Revert "genirq/affinity: assign vectors to all possible CPUs"

linux (4.15.0-18.19) bionic; urgency=medium

  * linux: 4.15.0-18.19 -proposed tracker (LP: #1765490)

  * [regression] Ubuntu 18.04:[4.15.0-17-generic #18] KVM Guest Kernel:
meltdown: rfi/fallback displacement flush not enabled bydefault (kvm)
(LP: #1765429)
- powerpc/pseries: Fix clearing of security feature flags

  * signing: only install a signed kernel (LP: #1764794)
- [Packaging] update to Debian like control scripts
- [Packaging] switch to triggers for postinst.d postrm.d handling
- [Packaging] signing -- switch to raw-signing tarballs
- [Packaging] signing -- switch to linux-image as signed when available
- [Config] signing -- enable Opal signing for ppc64el
- [Packaging] printenv -- add signing options

  * [18.04 FEAT] Sign POWER host/NV kernels (LP: #1696154)
- [Packaging] signing -- add support for signing Opal kernel binaries

  * Please cherrypick s390 unwind fix (LP: #1765083)
- s390/compat: fix setup_frame32

  * Ubuntu 18.04 installer does not detect any IPR based HDD/RAID array [S822L]
[ipr] (LP: #1751813)
- d-i: move ipr to storage-core-modules on ppc64el

  * drivers/gpu/drm/bridge/adv7511/adv7511.ko missing (LP: #1764816)
- SAUCE: (no-up) rename the adv7511 drm driver to adv7511_drm

  * Miscellaneous Ubuntu changes
- [Packaging] Add linux-oem to rebuild test blacklist.

linux (4.15.0-17.18) bionic; urgency=medium

  * linux: 4.15.0-17.18 -proposed tracker (LP: #1764498)

  * Eventual OOM with profile reloads (LP: #1750594)
- SAUCE: apparmor: fix memory leak when duplicate profile load

linux (4.15.0-16.17) bionic; urgency=medium

  * linux: 4.15.0-16.17 -proposed tracker (LP: #1763785)

  * [18.04] [bug] CFL-S(CNP)/CNL GPIO testing failed (LP: #1757346)
- [Config]: Set CONFIG_PINCTRL_CANNONLAKE=y

  * [Ubuntu 18.04] USB Type-C test failed on GLK (LP: #1758797)
- SAUCE: usb: typec: ucsi: Increase command completion timeout value

  * Fix trying to "push" an already active pool VP (LP: #1763386)
- SAUCE: powerpc/xive: Fix trying to "push" an already active pool VP

  * hisi_sas: Revert and replace SAUCE patches w/ upstream (LP: #1762824)
- Revert "UBUNTU: SAUCE: scsi: hisi_sas: export device table of v3 hw to
  userspace"
- Revert "UBUNTU: SAUCE: scsi: hisi_sas: config for hip08 ES"
- scsi: hisi_sas: modify some register config for hip08
- scsi: hisi_sas: add v3 hw MODULE_DEVICE_TABLE()

  * Realtek card reader - RTS5243 [VEN_10EC_5260] (LP: #1737673)
- misc: rtsx: Move Realtek Card Reader Driver to misc
- updateconfigs for Realtek Card Reader Driver
- misc: rtsx: Add support for RTS5260
- misc: rtsx: Fix symbol clashes

  * Mellanox [mlx5] [bionic] UBSAN: Undefined behaviour in
./include/linux/net_dim.h (LP: #1763269)
- net/mlx5e: Fix int overflow

  * apparmor bug fixes for bionic (LP: #1763427)
- apparmor: fix logging of the existence test for signals
- apparmor: make signal label match work when matching stacked labels
- apparmor: audit unknown signal numbers
- apparmor: fix memory leak on buffer on error exit path
- apparmor: fix mediation of prlimit

  * dangling symlinks to loaded apparmor policy (LP: #1755563) // apparmor bug
fixes for bionic (LP: #1763427)
- apparmor: fix dangling symlinks to policy rawdata after replacement

  * [OPAL] Assert fail:
core/mem_region.c:447:lock_held_by_me(>free_list_lock)
(LP: #1762913)
- powerpc/watchdog: remove arch_trigger_cpumask_backtrace

  * [LTC Test] Ubuntu 18.04: tm_trap_test failed on P8 compat mode guest
(LP: #1762928)
- powerpc/tm: Fix endianness flip on trap

  * Add support for RT5660 codec based sound cards on Baytrail (LP: #1657674)
- SAUCE: (no-up) ASoC: Intel: Support machine driver for RT5660 on Baytrail
- SAUCE: (no-up) ASoC: rt5660: Add ACPI support
- SAUCE: (no-up): ASoC: Intel: bytcr-rt5660: Add MCLK, quirks
- [Config] CONFIG_SND_SOC_INTEL_BYTCR_RT5660_MACH=m, CONFIG_SND_SOC_RT5660=m

  * /dev/ipmi enumeration flaky on Cavium Sabre nodes (LP: #1762812)
- i2c: xlp9xx: return ENXIO on slave address NACK
- i2c: xlp9xx: Handle transactions with I2C_M_RECV_LEN properly
- i2c: xlp9xx: Check for Bus state before every transfer
- i2c: xlp9xx: Handle NACK on DATA properly

  * [18.04 FEAT] Add kvm_stat from kernel tree (LP: #1734130)
- tools/kvm_stat: simplify the sortkey function
- tools/kvm_stat: use a namedtuple for storing the values
- tools/kvm_stat: use a more pythonic way to iterate over dictionaries
- tools/kvm_stat: 

[Kernel-packages] [Bug 1762353] Re: [Ubuntu 18.04] cryptsetup: 'device-mapper: reload ioctl on failed' when setting up a second end-to-end encrypted disk

2018-04-10 Thread Frank Heimes
** Changed in: ubuntu-z-systems
   Status: Triaged => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1762353

Title:
  [Ubuntu 18.04] cryptsetup: 'device-mapper: reload ioctl on  failed'
  when setting up a second end-to-end encrypted disk

Status in Ubuntu on IBM z Systems:
  Fix Committed
Status in linux package in Ubuntu:
  Fix Committed

Bug description:
  Problem Description:
  Environment: z14 VM Guest system with one CEX6C CCA coprocessor
  in toleration mode (i.e. CEX6 HW presented as CEX5)
  OS: Ubuntu 18.04 Prerelease
  Setting up a second dm-crypt device using protected CCA paes-xts keys fails.
  The problem is reproducible.

  Details
  ===
  Setting up two or more plain end-to-end encrypted disks using 'cryptsetup'
  fails when using a cipher based on the protected key mechanism.
  The setup needs the paes and pkey modules loaded, the former providing the
  paes-xts-plain64 cipher (cat /proc/crpyto |grep paes).

  A second attempt to establish an end-to-end encrypted disk fails
  with : "device-mapper: reload ioctl on failed: No such file or directory."

  The problem is independent of the second encrypted disk being based on
  a second DASD or second partition on one DASD.

  ---uname output---
  Linux s3514004 4.13.0-25-generic #29-Ubuntu SMP Mon Jan 8 21:15:56 UTC 2018 
s390x s390x s390x GNU/Linux

  ---Steps to Reproduce---
  1.) The following cryptsetup statement works, and is the first one I issued.
  cryptsetup plainOpen --key-file securekey.bin --key-size 1024 --cipher 
paes-xts-plain64 /dev/disk/by-path/ccw-0.0.-part1 enc-pv1
  2.) After this successful statement, I issued the following:
  cryptsetup plainOpen --key-file securekey.bin --key-size 1024 --cipher 
paes-xts-plain64 /dev/disk/by-path/ccw-0.0.-part2 enc-pv2
  device-mapper: reload ioctl on failed: No such file or directory.

  See attached patch (comment #1) as fix.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1762353/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1762353] Re: [Ubuntu 18.04] cryptsetup: 'device-mapper: reload ioctl on failed' when setting up a second end-to-end encrypted disk

2018-04-10 Thread Seth Forshee
** Changed in: linux (Ubuntu)
   Status: Triaged => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1762353

Title:
  [Ubuntu 18.04] cryptsetup: 'device-mapper: reload ioctl on  failed'
  when setting up a second end-to-end encrypted disk

Status in Ubuntu on IBM z Systems:
  Fix Committed
Status in linux package in Ubuntu:
  Fix Committed

Bug description:
  Problem Description:
  Environment: z14 VM Guest system with one CEX6C CCA coprocessor
  in toleration mode (i.e. CEX6 HW presented as CEX5)
  OS: Ubuntu 18.04 Prerelease
  Setting up a second dm-crypt device using protected CCA paes-xts keys fails.
  The problem is reproducible.

  Details
  ===
  Setting up two or more plain end-to-end encrypted disks using 'cryptsetup'
  fails when using a cipher based on the protected key mechanism.
  The setup needs the paes and pkey modules loaded, the former providing the
  paes-xts-plain64 cipher (cat /proc/crpyto |grep paes).

  A second attempt to establish an end-to-end encrypted disk fails
  with : "device-mapper: reload ioctl on failed: No such file or directory."

  The problem is independent of the second encrypted disk being based on
  a second DASD or second partition on one DASD.

  ---uname output---
  Linux s3514004 4.13.0-25-generic #29-Ubuntu SMP Mon Jan 8 21:15:56 UTC 2018 
s390x s390x s390x GNU/Linux

  ---Steps to Reproduce---
  1.) The following cryptsetup statement works, and is the first one I issued.
  cryptsetup plainOpen --key-file securekey.bin --key-size 1024 --cipher 
paes-xts-plain64 /dev/disk/by-path/ccw-0.0.-part1 enc-pv1
  2.) After this successful statement, I issued the following:
  cryptsetup plainOpen --key-file securekey.bin --key-size 1024 --cipher 
paes-xts-plain64 /dev/disk/by-path/ccw-0.0.-part2 enc-pv2
  device-mapper: reload ioctl on failed: No such file or directory.

  See attached patch (comment #1) as fix.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1762353/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1762353] Re: [Ubuntu 18.04] cryptsetup: 'device-mapper: reload ioctl on failed' when setting up a second end-to-end encrypted disk

2018-04-10 Thread Frank Heimes
** Tags added: kernel-da-key

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1762353

Title:
  [Ubuntu 18.04] cryptsetup: 'device-mapper: reload ioctl on  failed'
  when setting up a second end-to-end encrypted disk

Status in Ubuntu on IBM z Systems:
  Triaged
Status in linux package in Ubuntu:
  Triaged

Bug description:
  Problem Description:
  Environment: z14 VM Guest system with one CEX6C CCA coprocessor
  in toleration mode (i.e. CEX6 HW presented as CEX5)
  OS: Ubuntu 18.04 Prerelease
  Setting up a second dm-crypt device using protected CCA paes-xts keys fails.
  The problem is reproducible.

  Details
  ===
  Setting up two or more plain end-to-end encrypted disks using 'cryptsetup'
  fails when using a cipher based on the protected key mechanism.
  The setup needs the paes and pkey modules loaded, the former providing the
  paes-xts-plain64 cipher (cat /proc/crpyto |grep paes).

  A second attempt to establish an end-to-end encrypted disk fails
  with : "device-mapper: reload ioctl on failed: No such file or directory."

  The problem is independent of the second encrypted disk being based on
  a second DASD or second partition on one DASD.

  ---uname output---
  Linux s3514004 4.13.0-25-generic #29-Ubuntu SMP Mon Jan 8 21:15:56 UTC 2018 
s390x s390x s390x GNU/Linux

  ---Steps to Reproduce---
  1.) The following cryptsetup statement works, and is the first one I issued.
  cryptsetup plainOpen --key-file securekey.bin --key-size 1024 --cipher 
paes-xts-plain64 /dev/disk/by-path/ccw-0.0.-part1 enc-pv1
  2.) After this successful statement, I issued the following:
  cryptsetup plainOpen --key-file securekey.bin --key-size 1024 --cipher 
paes-xts-plain64 /dev/disk/by-path/ccw-0.0.-part2 enc-pv2
  device-mapper: reload ioctl on failed: No such file or directory.

  See attached patch (comment #1) as fix.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1762353/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1762353] Re: [Ubuntu 18.04] cryptsetup: 'device-mapper: reload ioctl on failed' when setting up a second end-to-end encrypted disk

2018-04-09 Thread Joseph Salisbury
Bionic request submitted:
https://lists.ubuntu.com/archives/kernel-team/2018-April/091481.html

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1762353

Title:
  [Ubuntu 18.04] cryptsetup: 'device-mapper: reload ioctl on  failed'
  when setting up a second end-to-end encrypted disk

Status in Ubuntu on IBM z Systems:
  Triaged
Status in linux package in Ubuntu:
  Triaged

Bug description:
  Problem Description:
  Environment: z14 VM Guest system with one CEX6C CCA coprocessor
  in toleration mode (i.e. CEX6 HW presented as CEX5)
  OS: Ubuntu 18.04 Prerelease
  Setting up a second dm-crypt device using protected CCA paes-xts keys fails.
  The problem is reproducible.

  Details
  ===
  Setting up two or more plain end-to-end encrypted disks using 'cryptsetup'
  fails when using a cipher based on the protected key mechanism.
  The setup needs the paes and pkey modules loaded, the former providing the
  paes-xts-plain64 cipher (cat /proc/crpyto |grep paes).

  A second attempt to establish an end-to-end encrypted disk fails
  with : "device-mapper: reload ioctl on failed: No such file or directory."

  The problem is independent of the second encrypted disk being based on
  a second DASD or second partition on one DASD.

  ---uname output---
  Linux s3514004 4.13.0-25-generic #29-Ubuntu SMP Mon Jan 8 21:15:56 UTC 2018 
s390x s390x s390x GNU/Linux

  ---Steps to Reproduce---
  1.) The following cryptsetup statement works, and is the first one I issued.
  cryptsetup plainOpen --key-file securekey.bin --key-size 1024 --cipher 
paes-xts-plain64 /dev/disk/by-path/ccw-0.0.-part1 enc-pv1
  2.) After this successful statement, I issued the following:
  cryptsetup plainOpen --key-file securekey.bin --key-size 1024 --cipher 
paes-xts-plain64 /dev/disk/by-path/ccw-0.0.-part2 enc-pv2
  device-mapper: reload ioctl on failed: No such file or directory.

  See attached patch (comment #1) as fix.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1762353/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1762353] Re: [Ubuntu 18.04] cryptsetup: 'device-mapper: reload ioctl on failed' when setting up a second end-to-end encrypted disk

2018-04-09 Thread Joseph Salisbury
** Changed in: linux (Ubuntu)
   Importance: Undecided => High

** Changed in: linux (Ubuntu)
   Status: New => Triaged

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1762353

Title:
  [Ubuntu 18.04] cryptsetup: 'device-mapper: reload ioctl on  failed'
  when setting up a second end-to-end encrypted disk

Status in Ubuntu on IBM z Systems:
  Triaged
Status in linux package in Ubuntu:
  Triaged

Bug description:
  Problem Description:
  Environment: z14 VM Guest system with one CEX6C CCA coprocessor
  in toleration mode (i.e. CEX6 HW presented as CEX5)
  OS: Ubuntu 18.04 Prerelease
  Setting up a second dm-crypt device using protected CCA paes-xts keys fails.
  The problem is reproducible.

  Details
  ===
  Setting up two or more plain end-to-end encrypted disks using 'cryptsetup'
  fails when using a cipher based on the protected key mechanism.
  The setup needs the paes and pkey modules loaded, the former providing the
  paes-xts-plain64 cipher (cat /proc/crpyto |grep paes).

  A second attempt to establish an end-to-end encrypted disk fails
  with : "device-mapper: reload ioctl on failed: No such file or directory."

  The problem is independent of the second encrypted disk being based on
  a second DASD or second partition on one DASD.

  ---uname output---
  Linux s3514004 4.13.0-25-generic #29-Ubuntu SMP Mon Jan 8 21:15:56 UTC 2018 
s390x s390x s390x GNU/Linux

  ---Steps to Reproduce---
  1.) The following cryptsetup statement works, and is the first one I issued.
  cryptsetup plainOpen --key-file securekey.bin --key-size 1024 --cipher 
paes-xts-plain64 /dev/disk/by-path/ccw-0.0.-part1 enc-pv1
  2.) After this successful statement, I issued the following:
  cryptsetup plainOpen --key-file securekey.bin --key-size 1024 --cipher 
paes-xts-plain64 /dev/disk/by-path/ccw-0.0.-part2 enc-pv2
  device-mapper: reload ioctl on failed: No such file or directory.

  See attached patch (comment #1) as fix.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1762353/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1762353] Re: [Ubuntu 18.04] cryptsetup: 'device-mapper: reload ioctl on failed' when setting up a second end-to-end encrypted disk

2018-04-09 Thread Heinz-Werner Seeck
** Summary changed:

- cryptsetup: 'device-mapper: reload ioctl on  failed' when setting up a second 
end-to-end encrypted disk
+ [Ubuntu 18.04] cryptsetup: 'device-mapper: reload ioctl on  failed' when 
setting up a second end-to-end encrypted disk

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1762353

Title:
  [Ubuntu 18.04] cryptsetup: 'device-mapper: reload ioctl on  failed'
  when setting up a second end-to-end encrypted disk

Status in Ubuntu on IBM z Systems:
  Triaged
Status in linux package in Ubuntu:
  New

Bug description:
  Problem Description:
  Environment: z14 VM Guest system with one CEX6C CCA coprocessor
  in toleration mode (i.e. CEX6 HW presented as CEX5)
  OS: Ubuntu 18.04 Prerelease
  Setting up a second dm-crypt device using protected CCA paes-xts keys fails.
  The problem is reproducible.

  Details
  ===
  Setting up two or more plain end-to-end encrypted disks using 'cryptsetup'
  fails when using a cipher based on the protected key mechanism.
  The setup needs the paes and pkey modules loaded, the former providing the
  paes-xts-plain64 cipher (cat /proc/crpyto |grep paes).

  A second attempt to establish an end-to-end encrypted disk fails
  with : "device-mapper: reload ioctl on failed: No such file or directory."

  The problem is independent of the second encrypted disk being based on
  a second DASD or second partition on one DASD.

  ---uname output---
  Linux s3514004 4.13.0-25-generic #29-Ubuntu SMP Mon Jan 8 21:15:56 UTC 2018 
s390x s390x s390x GNU/Linux

  ---Steps to Reproduce---
  1.) The following cryptsetup statement works, and is the first one I issued.
  cryptsetup plainOpen --key-file securekey.bin --key-size 1024 --cipher 
paes-xts-plain64 /dev/disk/by-path/ccw-0.0.-part1 enc-pv1
  2.) After this successful statement, I issued the following:
  cryptsetup plainOpen --key-file securekey.bin --key-size 1024 --cipher 
paes-xts-plain64 /dev/disk/by-path/ccw-0.0.-part2 enc-pv2
  device-mapper: reload ioctl on failed: No such file or directory.

  See attached patch (comment #1) as fix.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1762353/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp