I just solved this for my system. Hopefully people encountering this
have an existing bootable kernel from before the upgrade. If so, use
that to boot into the system then run:
sudo apt install cryptsetup cryptsetup-initramfs
sudo update-initramfs -c -k [kernel version needing fixing]
eg
sudo up
I just solved this for my system. Hopefully people encountering this
have an existing bootable kernel from before the upgrade. If so, use
that to boot into the system then run:
sudo apt install cryptsetup cryptsetup-initramfs
sudo update-initramfs -c -k [kernel version needing fixing]
eg
sudo up
This appears to no longer be a problem in Ubuntu 14.04 or at least I
have not been able to replicate it in the same way. This is still a
problem for 12.04 however.
** Changed in: linux (Ubuntu)
Status: Expired => Fix Released
--
You received this bug notification because you are a member
Christopher,
You did not address my previous question as to why that patch would
resolve this issue.
Am I correct in assuming that you are requesting that I reproduce these
conditions in the unreleased 14.04? It should be noted, if not reflected
in the bug status, that this is still a confirmed b
Christopher,
Can you explain how the commit you linked to resolves this issue? The
commit seems to place process permissions checks on /proc/pid/stat and
/proc/pid/wchan. I do not see how this affects the available entropy
unless entropy is being depleted by unauthorized processes accessing
those
** Changed in: linux (Ubuntu)
Status: Invalid => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/575669
Title:
Rapid depletion of entropy pool
Status in “linux” package
6 matches
Mail list logo