diff options
author | Harald Freudenberger <freude@linux.vnet.ibm.com> | 2017-10-27 16:53:49 +0300 |
---|---|---|
committer | Heiko Carstens <heiko.carstens@de.ibm.com> | 2017-11-08 11:47:51 +0300 |
commit | f44fa88745eda1530083b361e300e1ca4e15a6c5 (patch) | |
tree | e71acb270f3b118f2a3d70b5e8d69f4c2395fd6c /arch/s390/include/asm/sections.h | |
parent | 48070c73058be6de9c0d754d441ed7092dfc8f12 (diff) | |
download | linux-f44fa88745eda1530083b361e300e1ca4e15a6c5.tar.xz |
s390/archrandom: Reconsider s390 arch random implementation
The reworked version of the random device driver now calls
the arch_get_random_* functions on a very high frequency.
It does about 100.000 calls to arch_get_random_long for
providing 10 MB via /dev/urandom. Each invocation was
fetching entropy from the hardware random generator which
has a rate limit of about 4 MB/s. As the trng invocation
waits until enough entropy is gathered, the random device
driver is slowed down dramatically.
The s390 true random generator is not designed for such
a high rate. The TRNG is more designed to be used together
with the arch_get_random_seed_* functions. This is similar
to the way how powerpc has implemented their arch random
functionality.
This patch removes the invocations of the s390 TRNG for
arch_get_random_long() and arch_get_random_int() but leaving
the invocations for arch_get_random_seed_long() and
arch_get_random_seed_int(). So the s390 arch random
implementation now contributes high quality entropy to
the kernel random device for reseeding.
Signed-off-by: Harald Freudenberger <freude@linux.vnet.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Diffstat (limited to 'arch/s390/include/asm/sections.h')
0 files changed, 0 insertions, 0 deletions