Activity log for bug #1775391

Date Who What changed Old value New value Message
2018-06-06 12:19:56 bugproxy bug added bug
2018-06-06 12:19:58 bugproxy tags architecture-s39064 bugnameltc-168538 severity-high targetmilestone-inin1804
2018-06-06 12:19:59 bugproxy attachment added upstream patch https://bugs.launchpad.net/bugs/1775391/+attachment/5149333/+files/s390-archrandom-rework.patch
2018-06-06 12:20:01 bugproxy ubuntu: assignee Skipper Bug Screeners (skipper-screen-team)
2018-06-06 12:20:04 bugproxy affects ubuntu linux (Ubuntu)
2018-06-06 17:15:07 Frank Heimes bug task added ubuntu-z-systems
2018-06-06 17:15:12 Frank Heimes ubuntu-z-systems: status New Triaged
2018-06-06 17:15:23 Frank Heimes ubuntu-z-systems: importance Undecided High
2018-06-06 17:15:37 Frank Heimes ubuntu-z-systems: assignee Canonical Kernel Team (canonical-kernel-team)
2018-06-06 19:42:00 Joseph Salisbury linux (Ubuntu): status New In Progress
2018-06-06 19:42:04 Joseph Salisbury linux (Ubuntu): importance Undecided High
2018-06-06 19:42:07 Joseph Salisbury linux (Ubuntu): assignee Skipper Bug Screeners (skipper-screen-team) Joseph Salisbury (jsalisbury)
2018-06-06 19:57:27 Frank Heimes ubuntu-z-systems: status Triaged In Progress
2018-06-07 00:17:26 Guido bug added subscriber Guido
2018-06-13 16:00:17 Joseph Salisbury nominated for series Ubuntu Bionic
2018-06-13 16:00:17 Joseph Salisbury bug task added linux (Ubuntu Bionic)
2018-06-13 16:00:22 Joseph Salisbury linux (Ubuntu Bionic): status New In Progress
2018-06-13 16:00:25 Joseph Salisbury linux (Ubuntu Bionic): importance Undecided High
2018-06-13 16:00:28 Joseph Salisbury linux (Ubuntu Bionic): assignee Joseph Salisbury (jsalisbury)
2018-06-13 16:04:35 Joseph Salisbury description Description: kernel: Fix arch random implementation Symptom: arch_get_random_seed_long() invocations may slow down the interrupt handling on heavy interrupt producing loads. Problem: The existing random device driver calls arch_get_random_seed_long() in interrupt context. The current implementation of this function uses the PRNO(TRNG) instruction to provide good entropy. This instruction is relatively slow and expensive and may slow down the capacity of interrupts which can be handled per cpu. Solution: This fix reworks the arch_get_random_seed implementation. It introduces a buffer concept to decouple the delivery of random data via arch_get_random_seed*() from the generation of new random bytes and so does not limit the interrupt handling per cpu any more. Reproduction: Systems with heavy irq load show performance decrease. Component: kernel Upstream commit(s): kernel 4.18 966f53e750aedc5f59f9ccae6bbfb8f671c7c842 == SRU Justification == IBM reports that arch_get_random_seed_long() invocations may slow down the interrupt handling on heavy interrupt producing loads. The existing random device driver calls arch_get_random_seed_long() in interrupt context. The current implementation of this function uses the PRNO(TRNG) instruction to provide good entropy. This instruction is relatively slow and expensive and may slow down the capacity of interrupts which can be handled per cpu. This fix reworks the arch_get_random_seed implementation. It introduces a buffer concept to decouple the delivery of random data via arch_get_random_seed*() from the generation of new random bytes and so does not limit the interrupt handling per cpu any more. == Fix == 966f53e750ae ("s390/archrandom: Rework arch random implementation.") == Regression Potential == Low. This fix is limited to s390. == Test Case == Verified upfront by IBM during upstream integration Description: kernel: Fix arch random implementation Symptom: arch_get_random_seed_long() invocations may slow down the               interrupt handling on heavy interrupt producing loads. Problem: The existing random device driver calls               arch_get_random_seed_long() in interrupt context. The               current implementation of this function uses the               PRNO(TRNG) instruction to provide good entropy. This               instruction is relatively slow and expensive and may               slow down the capacity of interrupts which can be handled               per cpu. Solution: This fix reworks the arch_get_random_seed implementation.               It introduces a buffer concept to decouple the delivery               of random data via arch_get_random_seed*() from the               generation of new random bytes and so does not limit               the interrupt handling per cpu any more. Reproduction: Systems with heavy irq load show performance decrease. Component: kernel Upstream commit(s): kernel 4.18 966f53e750aedc5f59f9ccae6bbfb8f671c7c842
2018-06-19 18:17:59 Khaled El Mously linux (Ubuntu Bionic): status In Progress Fix Committed
2018-06-20 05:41:39 Frank Heimes linux (Ubuntu): status In Progress Fix Committed
2018-06-20 05:41:47 Frank Heimes ubuntu-z-systems: status In Progress Fix Committed
2018-08-03 11:28:39 Launchpad Janitor linux (Ubuntu): status Fix Committed Fix Released
2018-08-07 14:02:03 Brad Figg tags architecture-s39064 bugnameltc-168538 severity-high targetmilestone-inin1804 architecture-s39064 bugnameltc-168538 severity-high targetmilestone-inin1804 verification-needed-bionic
2018-08-09 09:17:14 Eberhard Pasch bug added subscriber Eberhard Pasch
2018-08-09 15:36:51 Frank Heimes tags architecture-s39064 bugnameltc-168538 severity-high targetmilestone-inin1804 verification-needed-bionic architecture-s39064 bugnameltc-168538 severity-high targetmilestone-inin1804 verification-done-bionic
2018-08-15 20:44:18 Eric Desrochers bug added subscriber Eric Desrochers
2018-08-23 13:23:09 Launchpad Janitor linux (Ubuntu Bionic): status Fix Committed Fix Released
2018-08-23 13:23:09 Launchpad Janitor cve linked 2018-10323
2018-08-23 13:23:09 Launchpad Janitor cve linked 2018-10840
2018-08-23 13:23:09 Launchpad Janitor cve linked 2018-10881
2018-08-23 13:23:09 Launchpad Janitor cve linked 2018-1108
2018-08-23 13:23:09 Launchpad Janitor cve linked 2018-11412
2018-08-23 13:23:09 Launchpad Janitor cve linked 2018-11506
2018-08-23 13:23:09 Launchpad Janitor cve linked 2018-12232
2018-08-23 13:23:09 Launchpad Janitor cve linked 2018-12233
2018-08-23 13:23:09 Launchpad Janitor cve linked 2018-12904
2018-08-23 13:23:09 Launchpad Janitor cve linked 2018-13094
2018-08-23 13:23:09 Launchpad Janitor cve linked 2018-13405
2018-08-23 13:23:09 Launchpad Janitor cve linked 2018-13406
2018-08-27 07:05:59 Frank Heimes ubuntu-z-systems: status Fix Committed Fix Released
2019-07-24 21:05:16 Brad Figg tags architecture-s39064 bugnameltc-168538 severity-high targetmilestone-inin1804 verification-done-bionic architecture-s39064 bugnameltc-168538 cscc severity-high targetmilestone-inin1804 verification-done-bionic