ACK: [SRU][Bionic][PATCH 0/1] s390/archrandom: Rework arch random implementation.
Khaled Elmously
khalid.elmously at canonical.com
Mon Jun 18 18:23:48 UTC 2018
On 2018-06-13 12:04:03 , Joseph Salisbury wrote:
> BugLink: http://bugs.launchpad.net/bugs/1775391
>
> == SRU Justification ==
> IBM reports that arch_get_random_seed_long() invocations may slow down the
> interrupt handling on heavy interrupt producing loads.
>
> The existing random device driver calls arch_get_random_seed_long() in
> interrupt context. The current implementation of this function uses the
> PRNO(TRNG) instruction to provide good entropy. This instruction is
> relatively slow and expensive and may slow down the capacity of interrupts which can be handled per cpu.
>
> This fix reworks the arch_get_random_seed implementation. It introduces a
> buffer concept to decouple the delivery of random data via
> arch_get_random_seed*() from the generation of new random bytes and so
> does not limit the interrupt handling per cpu any more.
>
> == Fix ==
> 966f53e750ae ("s390/archrandom: Rework arch random implementation.")
>
> == Regression Potential ==
> Low. This fix is limited to s390.
>
> == Test Case ==
> Verified upfront by IBM during upstream integration
>
> Harald Freudenberger (1):
> s390/archrandom: Rework arch random implementation.
>
> arch/s390/crypto/arch_random.c | 103 +++++++++++++++++++++++++++++++++++--
> arch/s390/include/asm/archrandom.h | 13 ++---
> 2 files changed, 102 insertions(+), 14 deletions(-)
>
Acked-by: Khalid Elmously <khalid.elmously at canonical.com>
More information about the kernel-team
mailing list