2018-06-06 12:19:56 |
bugproxy |
bug |
|
|
added bug |
2018-06-06 12:19:58 |
bugproxy |
tags |
|
architecture-s39064 bugnameltc-168538 severity-high targetmilestone-inin1804 |
|
2018-06-06 12:19:59 |
bugproxy |
attachment added |
|
upstream patch https://bugs.launchpad.net/bugs/1775391/+attachment/5149333/+files/s390-archrandom-rework.patch |
|
2018-06-06 12:20:01 |
bugproxy |
ubuntu: assignee |
|
Skipper Bug Screeners (skipper-screen-team) |
|
2018-06-06 12:20:04 |
bugproxy |
affects |
ubuntu |
linux (Ubuntu) |
|
2018-06-06 17:15:07 |
Frank Heimes |
bug task added |
|
ubuntu-z-systems |
|
2018-06-06 17:15:12 |
Frank Heimes |
ubuntu-z-systems: status |
New |
Triaged |
|
2018-06-06 17:15:23 |
Frank Heimes |
ubuntu-z-systems: importance |
Undecided |
High |
|
2018-06-06 17:15:37 |
Frank Heimes |
ubuntu-z-systems: assignee |
|
Canonical Kernel Team (canonical-kernel-team) |
|
2018-06-06 19:42:00 |
Joseph Salisbury |
linux (Ubuntu): status |
New |
In Progress |
|
2018-06-06 19:42:04 |
Joseph Salisbury |
linux (Ubuntu): importance |
Undecided |
High |
|
2018-06-06 19:42:07 |
Joseph Salisbury |
linux (Ubuntu): assignee |
Skipper Bug Screeners (skipper-screen-team) |
Joseph Salisbury (jsalisbury) |
|
2018-06-06 19:57:27 |
Frank Heimes |
ubuntu-z-systems: status |
Triaged |
In Progress |
|
2018-06-07 00:17:26 |
Guido |
bug |
|
|
added subscriber Guido |
2018-06-13 16:00:17 |
Joseph Salisbury |
nominated for series |
|
Ubuntu Bionic |
|
2018-06-13 16:00:17 |
Joseph Salisbury |
bug task added |
|
linux (Ubuntu Bionic) |
|
2018-06-13 16:00:22 |
Joseph Salisbury |
linux (Ubuntu Bionic): status |
New |
In Progress |
|
2018-06-13 16:00:25 |
Joseph Salisbury |
linux (Ubuntu Bionic): importance |
Undecided |
High |
|
2018-06-13 16:00:28 |
Joseph Salisbury |
linux (Ubuntu Bionic): assignee |
|
Joseph Salisbury (jsalisbury) |
|
2018-06-13 16:04:35 |
Joseph Salisbury |
description |
Description: kernel: Fix arch random implementation
Symptom: arch_get_random_seed_long() invocations may slow down the
interrupt handling on heavy interrupt producing loads.
Problem: The existing random device driver calls
arch_get_random_seed_long() in interrupt context. The
current implementation of this function uses the
PRNO(TRNG) instruction to provide good entropy. This
instruction is relatively slow and expensive and may
slow down the capacity of interrupts which can be handled
per cpu.
Solution: This fix reworks the arch_get_random_seed implementation.
It introduces a buffer concept to decouple the delivery
of random data via arch_get_random_seed*() from the
generation of new random bytes and so does not limit
the interrupt handling per cpu any more.
Reproduction: Systems with heavy irq load show performance decrease.
Component: kernel
Upstream commit(s): kernel 4.18
966f53e750aedc5f59f9ccae6bbfb8f671c7c842 |
== SRU Justification ==
IBM reports that arch_get_random_seed_long() invocations may slow down the
interrupt handling on heavy interrupt producing loads.
The existing random device driver calls arch_get_random_seed_long() in
interrupt context. The current implementation of this function uses the
PRNO(TRNG) instruction to provide good entropy. This instruction is
relatively slow and expensive and may slow down the capacity of interrupts which can be handled per cpu.
This fix reworks the arch_get_random_seed implementation. It introduces a
buffer concept to decouple the delivery of random data via
arch_get_random_seed*() from the generation of new random bytes and so
does not limit the interrupt handling per cpu any more.
== Fix ==
966f53e750ae ("s390/archrandom: Rework arch random implementation.")
== Regression Potential ==
Low. This fix is limited to s390.
== Test Case ==
Verified upfront by IBM during upstream integration
Description: kernel: Fix arch random implementation
Symptom: arch_get_random_seed_long() invocations may slow down the
interrupt handling on heavy interrupt producing loads.
Problem: The existing random device driver calls
arch_get_random_seed_long() in interrupt context. The
current implementation of this function uses the
PRNO(TRNG) instruction to provide good entropy. This
instruction is relatively slow and expensive and may
slow down the capacity of interrupts which can be handled
per cpu.
Solution: This fix reworks the arch_get_random_seed implementation.
It introduces a buffer concept to decouple the delivery
of random data via arch_get_random_seed*() from the
generation of new random bytes and so does not limit
the interrupt handling per cpu any more.
Reproduction: Systems with heavy irq load show performance decrease.
Component: kernel
Upstream commit(s): kernel 4.18
966f53e750aedc5f59f9ccae6bbfb8f671c7c842 |
|
2018-06-19 18:17:59 |
Khaled El Mously |
linux (Ubuntu Bionic): status |
In Progress |
Fix Committed |
|
2018-06-20 05:41:39 |
Frank Heimes |
linux (Ubuntu): status |
In Progress |
Fix Committed |
|
2018-06-20 05:41:47 |
Frank Heimes |
ubuntu-z-systems: status |
In Progress |
Fix Committed |
|
2018-08-03 11:28:39 |
Launchpad Janitor |
linux (Ubuntu): status |
Fix Committed |
Fix Released |
|
2018-08-07 14:02:03 |
Brad Figg |
tags |
architecture-s39064 bugnameltc-168538 severity-high targetmilestone-inin1804 |
architecture-s39064 bugnameltc-168538 severity-high targetmilestone-inin1804 verification-needed-bionic |
|
2018-08-09 09:17:14 |
Eberhard Pasch |
bug |
|
|
added subscriber Eberhard Pasch |
2018-08-09 15:36:51 |
Frank Heimes |
tags |
architecture-s39064 bugnameltc-168538 severity-high targetmilestone-inin1804 verification-needed-bionic |
architecture-s39064 bugnameltc-168538 severity-high targetmilestone-inin1804 verification-done-bionic |
|
2018-08-15 20:44:18 |
Eric Desrochers |
bug |
|
|
added subscriber Eric Desrochers |
2018-08-23 13:23:09 |
Launchpad Janitor |
linux (Ubuntu Bionic): status |
Fix Committed |
Fix Released |
|
2018-08-23 13:23:09 |
Launchpad Janitor |
cve linked |
|
2018-10323 |
|
2018-08-23 13:23:09 |
Launchpad Janitor |
cve linked |
|
2018-10840 |
|
2018-08-23 13:23:09 |
Launchpad Janitor |
cve linked |
|
2018-10881 |
|
2018-08-23 13:23:09 |
Launchpad Janitor |
cve linked |
|
2018-1108 |
|
2018-08-23 13:23:09 |
Launchpad Janitor |
cve linked |
|
2018-11412 |
|
2018-08-23 13:23:09 |
Launchpad Janitor |
cve linked |
|
2018-11506 |
|
2018-08-23 13:23:09 |
Launchpad Janitor |
cve linked |
|
2018-12232 |
|
2018-08-23 13:23:09 |
Launchpad Janitor |
cve linked |
|
2018-12233 |
|
2018-08-23 13:23:09 |
Launchpad Janitor |
cve linked |
|
2018-12904 |
|
2018-08-23 13:23:09 |
Launchpad Janitor |
cve linked |
|
2018-13094 |
|
2018-08-23 13:23:09 |
Launchpad Janitor |
cve linked |
|
2018-13405 |
|
2018-08-23 13:23:09 |
Launchpad Janitor |
cve linked |
|
2018-13406 |
|
2018-08-27 07:05:59 |
Frank Heimes |
ubuntu-z-systems: status |
Fix Committed |
Fix Released |
|
2019-07-24 21:05:16 |
Brad Figg |
tags |
architecture-s39064 bugnameltc-168538 severity-high targetmilestone-inin1804 verification-done-bionic |
architecture-s39064 bugnameltc-168538 cscc severity-high targetmilestone-inin1804 verification-done-bionic |
|