[Kernel-packages] [Bug 1853152] Re: [22.04 FEAT] In-kernel crypto: SIMD implementation of chacha20
This bug is already Fix Released and closed and was requested for jammy. So it wasn't requested for focal, hence updating the tags to 'verification-done-focal' to unblock any processes. ** Tags removed: verification-needed-focal ** Tags added: verification-done-focal -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1853152 Title: [22.04 FEAT] In-kernel crypto: SIMD implementation of chacha20 Status in Ubuntu on IBM z Systems: Fix Released Status in linux package in Ubuntu: Fix Released Bug description: Recent kernel releases provide support for the chacha20 cipher and among others use it to compute pseudo random numbers for /dev/urandom. Chacha20 is a type of algorithm that can be accelerated using SIMD instructions. The goal of this item is to use z System SIMD instruction to implement chacha20. Will be made available earliest for kernel >=5.6. Mean, request for integration if backport is possible for 20.04 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/1853152/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1853152] Re: [22.04 FEAT] In-kernel crypto: SIMD implementation of chacha20
This bug is awaiting verification that the linux- oracle-5.15/5.15.0-1006.8~20.04.1 kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed-focal' to 'verification-done-focal'. If the problem still exists, change the tag 'verification-needed-focal' to 'verification-failed-focal'. If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you! ** Tags added: verification-needed-focal -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1853152 Title: [22.04 FEAT] In-kernel crypto: SIMD implementation of chacha20 Status in Ubuntu on IBM z Systems: Fix Released Status in linux package in Ubuntu: Fix Released Bug description: Recent kernel releases provide support for the chacha20 cipher and among others use it to compute pseudo random numbers for /dev/urandom. Chacha20 is a type of algorithm that can be accelerated using SIMD instructions. The goal of this item is to use z System SIMD instruction to implement chacha20. Will be made available earliest for kernel >=5.6. Mean, request for integration if backport is possible for 20.04 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/1853152/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1853152] Re: [22.04 FEAT] In-kernel crypto: SIMD implementation of chacha20
** Changed in: ubuntu-z-systems Status: In Progress => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1853152 Title: [22.04 FEAT] In-kernel crypto: SIMD implementation of chacha20 Status in Ubuntu on IBM z Systems: Fix Released Status in linux package in Ubuntu: Fix Released Bug description: Recent kernel releases provide support for the chacha20 cipher and among others use it to compute pseudo random numbers for /dev/urandom. Chacha20 is a type of algorithm that can be accelerated using SIMD instructions. The goal of this item is to use z System SIMD instruction to implement chacha20. Will be made available earliest for kernel >=5.6. Mean, request for integration if backport is possible for 20.04 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/1853152/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1853152] Re: [22.04 FEAT] In-kernel crypto: SIMD implementation of chacha20
This bug was fixed in the package linux - 5.15.0-23.23 --- linux (5.15.0-23.23) jammy; urgency=medium * jammy/linux: 5.15.0-23.23 -proposed tracker (LP: #1964573) * Packaging resync (LP: #1786013) - [Packaging] resync dkms-build{,--nvidia-N} from LRMv5 - debian/dkms-versions -- update from kernel-versions (main/master) * [22.04 FEAT] KVM: Enable GISA support for Secure Execution guests (LP: #1959977) - KVM: s390: pv: make use of ultravisor AIV support * intel_iommu breaks Intel IPU6 camera: isys port open ready failed -16 (LP: #1958004) - SAUCE: iommu: intel-ipu: use IOMMU passthrough mode for Intel IPUs * CVE-2022-23960 - ARM: report Spectre v2 status through sysfs - ARM: early traps initialisation - ARM: use LOADADDR() to get load address of sections - ARM: Spectre-BHB workaround - ARM: include unprivileged BPF status in Spectre V2 reporting - arm64: Add Neoverse-N2, Cortex-A710 CPU part definition - arm64: Add HWCAP for self-synchronising virtual counter - arm64: Add Cortex-X2 CPU part definition - arm64: add ID_AA64ISAR2_EL1 sys register - arm64: cpufeature: add HWCAP for FEAT_AFP - arm64: cpufeature: add HWCAP for FEAT_RPRES - arm64: entry.S: Add ventry overflow sanity checks - arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit - KVM: arm64: Allow indirect vectors to be used without SPECTRE_V3A - arm64: entry: Make the trampoline cleanup optional - arm64: entry: Free up another register on kpti's tramp_exit path - arm64: entry: Move the trampoline data page before the text page - arm64: entry: Allow tramp_alias to access symbols after the 4K boundary - arm64: entry: Don't assume tramp_vectors is the start of the vectors - arm64: entry: Move trampoline macros out of ifdef'd section - arm64: entry: Make the kpti trampoline's kpti sequence optional - arm64: entry: Allow the trampoline text to occupy multiple pages - arm64: entry: Add non-kpti __bp_harden_el1_vectors for mitigations - arm64: entry: Add vectors that have the bhb mitigation sequences - arm64: entry: Add macro for reading symbol addresses from the trampoline - arm64: Add percpu vectors for EL1 - arm64: proton-pack: Report Spectre-BHB vulnerabilities as part of Spectre-v2 - arm64: Mitigate spectre style branch history side channels - KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered and migrated - arm64: Use the clearbhb instruction in mitigations - arm64: proton-pack: Include unprivileged eBPF status in Spectre v2 mitigation reporting - ARM: fix build error when BPF_SYSCALL is disabled * CVE-2021-26401 - x86/speculation: Use generic retpoline by default on AMD - x86/speculation: Update link to AMD speculation whitepaper - x86/speculation: Warn about Spectre v2 LFENCE mitigation - x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + SMT * CVE-2022-0001 - x86,bugs: Unconditionally allow spectre_v2=retpoline,amd - x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE - x86/speculation: Add eIBRS + Retpoline options - Documentation/hw-vuln: Update spectre doc - x86/speculation: Include unprivileged eBPF status in Spectre v2 mitigation reporting * Jammy update: v5.15.27 upstream stable release (LP: #1964361) - mac80211_hwsim: report NOACK frames in tx_status - mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work - i2c: bcm2835: Avoid clock stretching timeouts - ASoC: rt5668: do not block workqueue if card is unbound - ASoC: rt5682: do not block workqueue if card is unbound - regulator: core: fix false positive in regulator_late_cleanup() - Input: clear BTN_RIGHT/MIDDLE on buttonpads - btrfs: get rid of warning on transaction commit when using flushoncommit - KVM: arm64: vgic: Read HW interrupt pending state from the HW - block: loop:use kstatfs.f_bsize of backing file to set discard granularity - tipc: fix a bit overflow in tipc_crypto_key_rcv() - cifs: do not use uninitialized data in the owner/group sid - cifs: fix double free race when mount fails in cifs_get_root() - cifs: modefromsids must add an ACE for authenticated users - selftests/seccomp: Fix seccomp failure by adding missing headers - drm/amd/pm: correct UMD pstate clocks for Dimgrey Cavefish and Beige Goby - dmaengine: shdma: Fix runtime PM imbalance on error - i2c: cadence: allow COMPILE_TEST - i2c: imx: allow COMPILE_TEST - i2c: qup: allow COMPILE_TEST - net: usb: cdc_mbim: avoid altsetting toggling for Telit FN990 - block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern - usb: gadget: don't release an existing dev->buf - usb: gadget: clear related members when goto fail - exfat: reuse exfat_inode_info variable instead of calling EXFAT_I() - exfat: fix i_blocks for files truncated over
[Kernel-packages] [Bug 1853152] Re: [22.04 FEAT] In-kernel crypto: SIMD implementation of chacha20
Patch request submitted: https://lists.ubuntu.com/archives/kernel-team/2022-February/thread.html#128313 Updating status to 'In Progress'. Assigning kernel entry to 'Canonical Kernel Team'. ** Changed in: ubuntu-z-systems Status: New => In Progress ** Changed in: linux (Ubuntu) Status: New => In Progress ** Changed in: linux (Ubuntu) Assignee: Skipper Bug Screeners (skipper-screen-team) => Canonical Kernel Team (canonical-kernel-team) ** Information type changed from Private to Public -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1853152 Title: [22.04 FEAT] In-kernel crypto: SIMD implementation of chacha20 Status in Ubuntu on IBM z Systems: In Progress Status in linux package in Ubuntu: In Progress Bug description: Recent kernel releases provide support for the chacha20 cipher and among others use it to compute pseudo random numbers for /dev/urandom. Chacha20 is a type of algorithm that can be accelerated using SIMD instructions. The goal of this item is to use z System SIMD instruction to implement chacha20. Will be made available earliest for kernel >=5.6. Mean, request for integration if backport is possible for 20.04 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/1853152/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp