Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp2835239ybe; Sun, 15 Sep 2019 01:44:38 -0700 (PDT) X-Google-Smtp-Source: APXvYqzv6D7fBsZ89cV4Y1DP6ndCVhLERdZ5eE9l6EUY5EWlD8KtqHGovYs3YHpiP3ecnE7aWo77 X-Received: by 2002:a17:906:57ca:: with SMTP id u10mr7263476ejr.75.1568537078305; Sun, 15 Sep 2019 01:44:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1568537078; cv=none; d=google.com; s=arc-20160816; b=m+aShgykNGhz+Ao4i+/VOCAQFoGM+bpuVvVVTU5kolg1rGcX0Xjf3I9Quta4g7gfrP rYO14OO+CFoYQkAMT005mSOOWetcLlK/U9BC/CVEkZ2p+RSOq9MDleAUG/3DB6upUfk4 vRzTk9Dy8klQOdaeAXc9ks6I4X0/IhFRDL0Lj3RsBSO1T4/fsiH6hcGnMAtFVKjyahK5 nJwc5mTwh5bBs3bxsUGRjG3tQJIFRbj6VL+PLbhVoUMm9VOcuczjX+WIzKMm7qfbw2GI YEl15dE+W0ergkEeKxnj2NUZaZkfH1UCg1xcym/qTxoNUi/AucEm8gjjWd/N41Z7admK vRXg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=BMkAWLyRivEb/9NYxGbWjuJ2ihsl3aA8+A/0KuVS9n4=; b=ifOozxXAg+e+/hDlmDmKAgQplcYGzdh04s94uMmmx88EYGbDsNei09rJmNkJ8/ubQP 7hn4NV+B59sgLr+TQ6g1ODusSrUiC1rqX990xaXrP+myLj5LZ+vyiuyXebH0zOmYO0mH K/8boD0Gp1SP+dyLhVeEXUob9EAuuCv4NeXtOI8UDRtx2m6XWcMRAwit7Svy6vs7d8ju 4MeKfKI1ZPjt7OIcCl7FpmoneUgeDRkY6ykc4BvQOFGJy0brCPkJKp+B9ukw767+f+iA EkhgRZ4iqDHg+VmvzI2Uz2i+SwvzNSKnecSscJmWmQtTcA5MSXtZZZNbbC7W9zIULMoG Bf6A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f22si1795654ejc.373.2019.09.15.01.44.05; Sun, 15 Sep 2019 01:44:38 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725892AbfIOIeU (ORCPT + 99 others); Sun, 15 Sep 2019 04:34:20 -0400 Received: from gardel.0pointer.net ([85.214.157.71]:38350 "EHLO gardel.0pointer.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725865AbfIOIeT (ORCPT ); Sun, 15 Sep 2019 04:34:19 -0400 Received: from gardel-login.0pointer.net (gardel.0pointer.net [IPv6:2a01:238:43ed:c300:10c3:bcf3:3266:da74]) by gardel.0pointer.net (Postfix) with ESMTP id 00E66E81176; Sun, 15 Sep 2019 10:34:16 +0200 (CEST) Received: by gardel-login.0pointer.net (Postfix, from userid 1000) id 90BA6160ADC; Sun, 15 Sep 2019 10:34:16 +0200 (CEST) Date: Sun, 15 Sep 2019 10:34:16 +0200 From: Lennart Poettering To: Willy Tarreau Cc: Linus Torvalds , "Alexander E. Patrakov" , "Ahmed S. Darwish" , "Theodore Y. Ts'o" , Andreas Dilger , Jan Kara , Ray Strode , William Jon McCann , zhangjs , linux-ext4@vger.kernel.org, lkml Subject: Re: Linux 5.3-rc8 Message-ID: <20190915083416.GA29771@gardel-login> References: <20190912082530.GA27365@mit.edu> <20190914150206.GA2270@darwi-home-pc> <214fed0e-6659-def9-b5f8-a9d7a8cb72af@gmail.com> <20190915065655.GB29681@gardel-login> <20190915070103.GC20811@1wt.eu> <20190915070541.GC29681@gardel-login> <20190915070722.GD20811@1wt.eu> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190915070722.GD20811@1wt.eu> Sender: linux-ext4-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org On So, 15.09.19 09:07, Willy Tarreau (w@1wt.eu) wrote: > > That code can finish 5h after boot, it's entirely fine with this > > specific usecase. > > > > Again: we don't delay "the boot" for this. We just delay "writing a > > new seed to disk" for this. And if that is 5h later, then that's > > totally fine, because in the meantime it's just one bg process more that > > hangs around waiting to do what it needs to do. > > Didn't you say it could also happen when using encrypted swap ? If so > I suspect this could happen very early during boot, before any services > may be started ? Depends on the deps, and what options are used in /etc/crypttab. If people hard rely on swap to be enabled for boot to proceed and also use one-time passwords from /dev/urandom they better provide some form of hw rng, too. Otherwise the boot will block, yes. Basically, just add "nofail" to a line in /etc/crypttab, and the entry will be activated at boot, but we won't delay boot for it. It's going to be activated as soon as the deps are fulfilled (and thus the pool initialized), but that may well be 5h after boot, and that's totally OK as long as nothing else hard depends on it. Lennart -- Lennart Poettering, Berlin