restore reverted commit "crypto: arm64/sha - avoid non-standard inline asm tricks"
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
linux (Ubuntu) |
Invalid
|
Undecided
|
Unassigned | ||
Xenial |
Fix Released
|
Medium
|
dann frazier |
Bug Description
[Impact]
To address bug 1905336, we reverted an upstream commit. Upstream have now pulled in a commit to properly fix the underlying issue. Once we merge that fix, we should be able to reapply the reverted commit.
[Test Case]
If the kernel boots and we can still load the sha{1,2}_ce modules, we should be good.
[Fix]
After this is applied:
https:/
We should reapply the commit we reverted here:
https:/
[Where Problems May Occur]
Although we shipped the reverted patch for many releases - the whole time we did so, the impacted modules were not loadable. Once we reapply it, xenial users will be running that code for the first time. If there are issues with the code, users of the sha{1,2}_ce modules may now hit them. Issues could include kernel oopses, corruption, etc.
CVE References
Changed in linux (Ubuntu Xenial): | |
assignee: | nobody → dann frazier (dannf) |
status: | New → In Progress |
Changed in linux (Ubuntu): | |
status: | New → Invalid |
Changed in linux (Ubuntu Xenial): | |
importance: | Undecided → Medium |
Changed in linux (Ubuntu Xenial): | |
status: | In Progress → Fix Committed |
This bug is awaiting verification that the kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification- needed- xenial' to 'verification- done-xenial' . If the problem still exists, change the tag 'verification- needed- xenial' to 'verification- failed- xenial' .
If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.
See https:/ /wiki.ubuntu. com/Testing/ EnableProposed for documentation how to enable and use -proposed. Thank you!