Public bug reported:
[Impact]
To address bug 1905336, we reverted an upstream commit. Upstream have now
pulled in a commit to properly fix the underlying issue. Once we merge that
fix, we should be able to reapply the reverted commit.
[Test Case]
If the kernel boots and we can still load the sha{1,2}_ce modules, we should be
good.
[Fix]
After this is applied:
https://www.spinics.net/lists/stable/msg431217.html
We should reapply the commit we reverted here:
https://kernel.ubuntu.com/git/ubuntu/ubuntu-xenial.git/commit/?id=4baa2fdd354700e2304e10cdbc64402621c3fa29
[Where Problems May Occur]
Although we shipped the reverted patch for many releases - the whole time we
did so, the impacted modules were not loadable. Once we reapply it, xenial
users will be running that code for the first time. If there are issues with
the code, users of the sha{1,2}_ce modules may now hit them. Issues could
include kernel oopses, corruption, etc.
** Affects: linux (Ubuntu)
Importance: Undecided
Status: Invalid
** Affects: linux (Ubuntu Xenial)
Importance: Undecided
Assignee: dann frazier (dannf)
Status: In Progress
** Also affects: linux (Ubuntu Xenial)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Xenial)
Assignee: (unassigned) => dann frazier (dannf)
** Changed in: linux (Ubuntu Xenial)
Status: New => In Progress
** Changed in: linux (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1907489
Title:
restore reverted commit "crypto: arm64/sha - avoid non-standard inline
asm tricks"
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1907489/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs