[Kernel-packages] [Bug 1596557] Re: Upstream patch "crypto: vmx - IV size failing on skcipher API" for Ubuntu 16.04

2016-09-30 Thread bugproxy
** Tags removed: targetmilestone-inin---
** Tags added: targetmilestone-inin16041

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1596557

Title:
  Upstream patch "crypto: vmx - IV size failing on skcipher API" for
  Ubuntu 16.04

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Xenial:
  Fix Released
Status in linux source package in Yakkety:
  Fix Released

Bug description:
  There is a missing patch for 16.04. Recently, we asked the inclusion of 3 
patches for the next kernel 16.04 release and all them were accepted:
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1592481

  I was checking the xenial-next and it's missing a commit from December last 
year that was merged after 4.4. The commit is 0d3d054b43719:
  
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0d3d054b43719ef33232677ba27ba6097afdafbc

  It's an important commit since without it the CBC and CTR will fail
  the sanity check.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1596557/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1596557] Re: Upstream patch "crypto: vmx - IV size failing on skcipher API" for Ubuntu 16.04

2016-07-14 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.4.0-31.50

---
linux (4.4.0-31.50) xenial; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1602449

  * nouveau: boot hangs at blank screen with unsupported graphics cards
(LP: #1602340)
- SAUCE: drm: check for supported chipset before booting fbdev off the hw

linux (4.4.0-30.49) xenial; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1597897

  * FCP devices are not detected correctly nor deterministically (LP: #1567602)
- scsi_dh_alua: Disable ALUA handling for non-disk devices
- scsi_dh_alua: Use vpd_pg83 information
- scsi_dh_alua: improved logging
- scsi_dh_alua: sanitze sense code handling
- scsi_dh_alua: use standard logging functions
- scsi_dh_alua: return standard SCSI return codes in submit_rtpg
- scsi_dh_alua: fixup description of stpg_endio()
- scsi_dh_alua: use flag for RTPG extended header
- scsi_dh_alua: use unaligned access macros
- scsi_dh_alua: rework alua_check_tpgs() to return the tpgs mode
- scsi_dh_alua: simplify sense code handling
- scsi: Add scsi_vpd_lun_id()
- scsi: Add scsi_vpd_tpg_id()
- scsi_dh_alua: use scsi_vpd_tpg_id()
- scsi_dh_alua: Remove stale variables
- scsi_dh_alua: Pass buffer as function argument
- scsi_dh_alua: separate out alua_stpg()
- scsi_dh_alua: Make stpg synchronous
- scsi_dh_alua: call alua_rtpg() if stpg fails
- scsi_dh_alua: switch to scsi_execute_req_flags()
- scsi_dh_alua: allocate RTPG buffer separately
- scsi_dh_alua: Use separate alua_port_group structure
- scsi_dh_alua: use unique device id
- scsi_dh_alua: simplify alua_initialize()
- revert commit a8e5a2d593cb ("[SCSI] scsi_dh_alua: ALUA handler attach 
should
  succeed while TPG is transitioning")
- scsi_dh_alua: move optimize_stpg evaluation
- scsi_dh_alua: remove 'rel_port' from alua_dh_data structure
- scsi_dh_alua: Use workqueue for RTPG
- scsi_dh_alua: Allow workqueue to run synchronously
- scsi_dh_alua: Add new blacklist flag 'BLIST_SYNC_ALUA'
- scsi_dh_alua: Recheck state on unit attention
- scsi_dh_alua: update all port states
- scsi_dh_alua: Send TEST UNIT READY to poll for transitioning
- scsi_dh_alua: do not fail for unknown VPD identification

linux (4.4.0-29.48) xenial; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1597015

  * Wireless hotkey fails on Dell XPS 15 9550 (LP: #1589886)
- intel-hid: new hid event driver for hotkeys
- intel-hid: fix incorrect entries in intel_hid_keymap
- intel-hid: allocate correct amount of memory for private struct
- intel-hid: add a workaround to ignore an event after waking up from S4.
- [Config] CONFIG_INTEL_HID_EVENT=m

  * cgroupfs mounts can hang (LP: #1588056)
- Revert "UBUNTU: SAUCE: (namespace) mqueue: Super blocks must be owned by 
the
  user ns which owns the ipc ns"
- Revert "UBUNTU: SAUCE: kernfs: Do not match superblock in another user
  namespace when mounting"
- Revert "UBUNTU: SAUCE: cgroup: Use a new super block when mounting in a
  cgroup namespace"
- (namespace) bpf: Use mount_nodev not mount_ns to mount the bpf filesystem
- (namespace) bpf, inode: disallow userns mounts
- (namespace) ipc: Initialize ipc_namespace->user_ns early.
- (namespace) vfs: Pass data, ns, and ns->userns to mount_ns
- SAUCE: (namespace) Sync with upstream s_user_ns patches
- (namespace) kernfs: The cgroup filesystem also benefits from SB_I_NOEXEC
- (namespace) ipc/mqueue: The mqueue filesystem should never contain
  executables

  * KVM system crashes after starting guest (LP: #1596635)
- xhci: Cleanup only when releasing primary hcd

  * Upstream patch "crypto: vmx - IV size failing on skcipher API" for Ubuntu
16.04 (LP: #1596557)
- crypto: vmx - IV size failing on skcipher API

  * [Bug]tpm initialization fails on x86 (LP: #1596469)
- tpm_crb: drop struct resource res from struct crb_priv
- tpm_crb: fix mapping of the buffers

  * Device shutdown notification for CAPI Flash cards (LP: #1592114)
- cxlflash: Fix regression issue with re-ordering patch
- cxlflash: Fix to drain operations from previous reset
- cxlflash: Add device dependent flags
- cxlflash: Shutdown notify support for CXL Flash cards

  * scsi-modules udeb should include pm80xx (LP: #1595628)
- [Config] Add pm80xx scsi driver to d-i

  * Sync up latest relevant upstream bug fixes (LP: #1594871)
- SAUCE: (noup) Update zfs to 0.6.5.6-0ubuntu10

  * Cannot compile module tda10071 (LP: #1592531)
- [media] tda10071: Fix dependency to REGMAP_I2C

  * lsvpd doesn't show correct location code for devices attached to a CAPI card
(LP: #1594847)
- cxl: Make vPHB device node match adapter's

  * enable CRC32 and AES ARM64 by default or as module (LP: #1594455)
- [Config] Enable arm64 AES and CRC32 

[Kernel-packages] [Bug 1596557] Re: Upstream patch "crypto: vmx - IV size failing on skcipher API" for Ubuntu 16.04

2016-07-07 Thread Tim Gardner
Tagging verification-done-xenial based on #3

** Tags removed: verification-needed-xenial
** Tags added: verification-done-xenial

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1596557

Title:
  Upstream patch "crypto: vmx - IV size failing on skcipher API" for
  Ubuntu 16.04

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Xenial:
  Fix Committed
Status in linux source package in Yakkety:
  Fix Released

Bug description:
  There is a missing patch for 16.04. Recently, we asked the inclusion of 3 
patches for the next kernel 16.04 release and all them were accepted:
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1592481

  I was checking the xenial-next and it's missing a commit from December last 
year that was merged after 4.4. The commit is 0d3d054b43719:
  
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0d3d054b43719ef33232677ba27ba6097afdafbc

  It's an important commit since without it the CBC and CTR will fail
  the sanity check.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1596557/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1596557] Re: Upstream patch "crypto: vmx - IV size failing on skcipher API" for Ubuntu 16.04

2016-07-07 Thread Paulo F. Smorigo
I enabled proposed and VMX is working fine using 4.4.0-30.49. Thanks!

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1596557

Title:
  Upstream patch "crypto: vmx - IV size failing on skcipher API" for
  Ubuntu 16.04

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Xenial:
  Fix Committed
Status in linux source package in Yakkety:
  Fix Released

Bug description:
  There is a missing patch for 16.04. Recently, we asked the inclusion of 3 
patches for the next kernel 16.04 release and all them were accepted:
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1592481

  I was checking the xenial-next and it's missing a commit from December last 
year that was merged after 4.4. The commit is 0d3d054b43719:
  
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0d3d054b43719ef33232677ba27ba6097afdafbc

  It's an important commit since without it the CBC and CTR will fail
  the sanity check.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1596557/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1596557] Re: Upstream patch "crypto: vmx - IV size failing on skcipher API" for Ubuntu 16.04

2016-06-29 Thread Kamal Mostafa
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
xenial' to 'verification-done-xenial'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: verification-needed-xenial

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1596557

Title:
  Upstream patch "crypto: vmx - IV size failing on skcipher API" for
  Ubuntu 16.04

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Xenial:
  Fix Committed
Status in linux source package in Yakkety:
  Fix Released

Bug description:
  There is a missing patch for 16.04. Recently, we asked the inclusion of 3 
patches for the next kernel 16.04 release and all them were accepted:
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1592481

  I was checking the xenial-next and it's missing a commit from December last 
year that was merged after 4.4. The commit is 0d3d054b43719:
  
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0d3d054b43719ef33232677ba27ba6097afdafbc

  It's an important commit since without it the CBC and CTR will fail
  the sanity check.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1596557/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1596557] Re: Upstream patch "crypto: vmx - IV size failing on skcipher API" for Ubuntu 16.04

2016-06-28 Thread Kamal Mostafa
** Changed in: linux (Ubuntu Xenial)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1596557

Title:
  Upstream patch "crypto: vmx - IV size failing on skcipher API" for
  Ubuntu 16.04

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Xenial:
  Fix Committed
Status in linux source package in Yakkety:
  Fix Released

Bug description:
  There is a missing patch for 16.04. Recently, we asked the inclusion of 3 
patches for the next kernel 16.04 release and all them were accepted:
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1592481

  I was checking the xenial-next and it's missing a commit from December last 
year that was merged after 4.4. The commit is 0d3d054b43719:
  
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0d3d054b43719ef33232677ba27ba6097afdafbc

  It's an important commit since without it the CBC and CTR will fail
  the sanity check.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1596557/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1596557] Re: Upstream patch "crypto: vmx - IV size failing on skcipher API" for Ubuntu 16.04

2016-06-27 Thread Tim Gardner
https://lists.ubuntu.com/archives/kernel-team/2016-June/078623.html

** Also affects: linux (Ubuntu Yakkety)
   Importance: Undecided
 Assignee: Taco Screen team (taco-screen-team)
   Status: New

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: linux (Ubuntu Xenial)
 Assignee: (unassigned) => Tim Gardner (timg-tpi)

** Changed in: linux (Ubuntu Yakkety)
 Assignee: Taco Screen team (taco-screen-team) => (unassigned)

** Changed in: linux (Ubuntu Yakkety)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1596557

Title:
  Upstream patch "crypto: vmx - IV size failing on skcipher API" for
  Ubuntu 16.04

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Xenial:
  In Progress
Status in linux source package in Yakkety:
  Fix Released

Bug description:
  There is a missing patch for 16.04. Recently, we asked the inclusion of 3 
patches for the next kernel 16.04 release and all them were accepted:
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1592481

  I was checking the xenial-next and it's missing a commit from December last 
year that was merged after 4.4. The commit is 0d3d054b43719:
  
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0d3d054b43719ef33232677ba27ba6097afdafbc

  It's an important commit since without it the CBC and CTR will fail
  the sanity check.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1596557/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp