Comment 12 for bug 1854948

Revision history for this message
Frank Heimes (fheimes) wrote :

Finally I sent over the requests to the kernel teams mailing list:
https://lists.ubuntu.com/archives/kernel-team/2020-February/thread.html#107514
and changed the status to 'In Progress'.

Since the following patches are already in Ubuntu focal's kernel 5.4:
- f9cac4fd8878 s390/pkey: fix memory leak within _copy_apqns_from_user() --> already in since Ubuntu-5.4-5.4.0-13.16
- 6733775a92ea s390/zcrypt: handle new reply code FILTERED_BY_HYPERVISOR --> already in since Ubuntu-5.4-5.4.0-10.13
- 94dd3bada53e s390/zcrypt: Fix CCA cipher key gen with clear key value function --> already in since Ubuntu-5.4-5.4.0-13.16
- 0c874cd04292 s390/zcrypt: move ap device reset from bus to driver code --> already in since Ubuntu-5.4-5.4.0-14.17

I was obviously not able to follow the suggested order for cherry picking / applying all the pacthes.
After some attempts I followed this order that worked for me (using the alternatives aka backports):

a) 8b57e7c852fc "s390/pkey: use memdup_user() to simplify code"
b) 888edbc48857 "s390/pkey: Add support for key blob with clear key value"
c) 674f368a952c "crypto: remove CRYPTO_TFM_RES_BAD_KEY_LEN [doesn't allow me to cherry-pick cleanly]"
   alternative: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1854948/+attachment/5326172/+files/s390-crypto-Rework-on-paes-implementation.patch
d) 7f820d053948 "s390/crypto: enable clear key values for paes ciphers"
   alternative: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1854948/+attachment/5326173/+files/s390-crypto-enable-clear-key-values-for-paes-ciphers.patch