APPLIED: [Bionic][PATCH 0/1] UBUNTU: SAUCE: s390/crypto: Adjust s390 aes and paes cipher

Seth Forshee seth.forshee at canonical.com
Tue Apr 10 14:37:35 UTC 2018


On Mon, Apr 09, 2018 at 11:41:05AM -0400, Joseph Salisbury wrote:
> BugLink: http://bugs.launchpad.net/bugs/1762353
> 
> 
> == Bionic Justification ==
> Setting up two or more plain end-to-end encrypted disks using 'cryptsetup'
> fails when using a cipher based on the protected key mechanism.
> The setup needs the paes and pkey modules loaded, the former providing the
> paes-xts-plain64 cipher (cat /proc/crpyto |grep paes).
> 
> A second attempt to establish an end-to-end encrypted disk fails
> with : "device-mapper: reload ioctl on failed: No such file or directory."
> 
> The problem is independent of the second encrypted disk being based on a second DASD or second partition on one DASD.
> 
> This patch is not upstream as of yet.
> Tentativ upstream targert is kernel 4.17 (merge window currently open).
> 
> == Fix ==
> UBUNTU: SAUCE: s390/crypto: Adjust s390 aes and paes cipher

Applied to bionic/master-next, thanks!




More information about the kernel-team mailing list