Public bug reported:

[Impact]
To address bug 1905336, we reverted an upstream commit. Upstream have now 
pulled in a commit to properly fix the underlying issue. Once we merge that 
fix, we should be able to reapply the reverted commit.

[Test Case]
If the kernel boots and we can still load the sha{1,2}_ce modules, we should be 
good.

[Fix]
After this is applied:
  https://www.spinics.net/lists/stable/msg431217.html
We should reapply the commit we reverted here:
  
https://kernel.ubuntu.com/git/ubuntu/ubuntu-xenial.git/commit/?id=4baa2fdd354700e2304e10cdbc64402621c3fa29


[Where Problems May Occur]
Although we shipped the reverted patch for many releases - the whole time we 
did so, the impacted modules were not loadable. Once we reapply it, xenial 
users will be running that code for the first time. If there are issues with 
the code, users of the sha{1,2}_ce modules may now hit them. Issues could 
include kernel oopses, corruption, etc.

** Affects: linux (Ubuntu)
     Importance: Undecided
         Status: Invalid

** Affects: linux (Ubuntu Xenial)
     Importance: Undecided
     Assignee: dann frazier (dannf)
         Status: In Progress

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
       Status: New

** Changed in: linux (Ubuntu Xenial)
     Assignee: (unassigned) => dann frazier (dannf)

** Changed in: linux (Ubuntu Xenial)
       Status: New => In Progress

** Changed in: linux (Ubuntu)
       Status: New => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1907489

Title:
  restore reverted commit "crypto: arm64/sha - avoid non-standard inline
  asm tricks"

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1907489/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to