You have been subscribed to a public bug:

Description:  kernel: Fix arch random implementation
Symptom:      arch_get_random_seed_long() invocations may slow down the
              interrupt handling on heavy interrupt producing loads.
Problem:      The existing random device driver calls
              arch_get_random_seed_long() in interrupt context. The
              current implementation of this function uses the
              PRNO(TRNG) instruction to provide good entropy. This
              instruction is relatively slow and expensive and may
              slow down the capacity of interrupts which can be handled
              per cpu.
Solution:     This fix reworks the arch_get_random_seed implementation.
              It introduces a buffer concept to decouple the delivery
              of random data via arch_get_random_seed*() from the
              generation of new random bytes and so does not limit
              the interrupt handling per cpu any more.
Reproduction: Systems with heavy irq load show performance decrease.
Component:    kernel

Upstream commit(s): kernel 4.18
966f53e750aedc5f59f9ccae6bbfb8f671c7c842

** Affects: linux (Ubuntu)
     Importance: Undecided
     Assignee: Skipper Bug Screeners (skipper-screen-team)
         Status: New


** Tags: architecture-s39064 bugnameltc-168538 severity-high 
targetmilestone-inin1804
-- 
kernel: Fix arch random implementation
https://bugs.launchpad.net/bugs/1775391
You received this bug notification because you are a member of Kernel Packages, 
which is subscribed to linux in Ubuntu.

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to