Bug 2099701
Summary: | Improve boot performance by removing key check | |||
---|---|---|---|---|
Product: | Red Hat Enterprise Linux 9 | Reporter: | Sergio Arroutbi <sarroutb> | |
Component: | clevis | Assignee: | Sergio Arroutbi <sarroutb> | |
Status: | CLOSED ERRATA | QA Contact: | Martin Zelený <mzeleny> | |
Severity: | low | Docs Contact: | Mirek Jahoda <mjahoda> | |
Priority: | low | |||
Version: | 9.1 | CC: | dapospis, lvrabec, mzeleny, scorreia | |
Target Milestone: | rc | Keywords: | Triaged | |
Target Release: | --- | |||
Hardware: | Unspecified | |||
OS: | Unspecified | |||
Whiteboard: | ||||
Fixed In Version: | clevis-18-104.el9 | Doc Type: | Enhancement | |
Doc Text: |
Feature: Rather than a feature, this is the result of a time execution measurement in the different parts involved in boot process when clevis is used
Reason: The reason of this enhancement is essentially to try to decrease time used by clevis commands to unlock a LUKS device
Result: Function clevis_luks_check_valid_key_or_keyfile is spending most of the boot time dedicated to unlock devices.
However, this function is always returning true for an
already encrypted device (normal call execution).
Parameterizing this function to avoid this check allows
decreasing boot time
|
Story Points: | --- | |
Clone Of: | ||||
: | 2099748 (view as bug list) | Environment: | ||
Last Closed: | 2022-11-15 10:39:54 UTC | Type: | Bug | |
Regression: | --- | Mount Type: | --- | |
Documentation: | --- | CRM: | ||
Verified Versions: | Category: | --- | ||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
Cloudforms Team: | --- | Target Upstream Version: | ||
Embargoed: | ||||
Bug Depends On: | ||||
Bug Blocks: | 2099748 |
Description
Sergio Arroutbi
2022-06-21 13:56:49 UTC
@mzeleny : Could you please verify the information of this enhancement and fill pending fields? This enhancement has been created to bring next change from upstream: https://github.com/latchset/clevis/pull/369 Once reviewed, we will also need to clone it to RHEL8 Thanks Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (clevis bug fix and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2022:8232 |