revert the revert of ext4: make __ext4_get_inode_loc plug
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
linux (Ubuntu) |
Fix Released
|
High
|
Colin Ian King | ||
Eoan |
Fix Released
|
High
|
Colin Ian King |
Bug Description
== SRU Justification Eoan ==
Now that 5.4 contains a fix to the bootup regression due to the lack of entropy at bootable we should apply this fix and also revert the revert of commit "Revert "ext4: make __ext4_
== Fix ==
So, to clarify, apply the two upstream 5.4-rc commits:
commit 50ee7529ec4500c
Author: Linus Torvalds <email address hidden>
Date: Sat Sep 28 16:53:52 2019 -0700
random: try to actively add entropy rather than passively wait for it
commit 02f03c4206c1b2a
Author: Linus Torvalds <email address hidden>
Date: Sun Sep 29 17:59:23 2019 -0700
Revert "Revert "ext4: make __ext4_
I've benchmarked the Eoan kernel with these two patches and found theo
following speed improvements on an i7-3770 CPU @ 3.40GHz with 8GB and a
WDC WD10EZEX-21WN4A HDD (7200RPM, 64MB cache).
git grep of the kernel: 0.14%
building fwts: 0.40%
build stress-ng 0.45%
tar up kernel source: 7.6%
boot time of eoan cloud image: 10.5%
So I think the speed improvements justify the SRU.
== Regression potential ==
minor change to ext4, which has been regression tested, so risk here is small. The entropy change will alter the random number generation, but I believe this does not change the cryptographical security of the random numbers being generated, so think this change is not security risk.
originally the ext4 change caused boot time user space regressions because of the entropy change of this fix, but the random fix addresses this, so I believe this risk is now zero.
CVE References
Changed in linux (Ubuntu): | |
status: | New → In Progress |
importance: | Undecided → High |
assignee: | nobody → Colin Ian King (colin-king) |
description: | updated |
description: | updated |
description: | updated |
Changed in linux (Ubuntu): | |
status: | In Progress → Fix Committed |
status: | Fix Committed → Fix Released |
This bug is awaiting verification that the kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification- needed- eoan' to 'verification- done-eoan' . If the problem still exists, change the tag 'verification- needed- eoan' to 'verification- failed- eoan'.
If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.
See https:/ /wiki.ubuntu. com/Testing/ EnableProposed for documentation how to enable and use -proposed. Thank you!