From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S267433AbUHPFAk (ORCPT ); Mon, 16 Aug 2004 01:00:40 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S267435AbUHPFAk (ORCPT ); Mon, 16 Aug 2004 01:00:40 -0400 Received: from mustang.oldcity.dca.net ([216.158.38.3]:14264 "HELO mustang.oldcity.dca.net") by vger.kernel.org with SMTP id S267433AbUHPFAi (ORCPT ); Mon, 16 Aug 2004 01:00:38 -0400 Subject: Re: [patch] voluntary-preempt-2.6.8.1-P0 From: Lee Revell To: Ingo Molnar Cc: Florian Schmidt , linux-kernel , Felipe Alfaro Solana In-Reply-To: <20040816042653.GA14738@elte.hu> References: <1092382825.3450.19.camel@mindpipe> <20040813104817.GI8135@elte.hu> <1092432929.3450.78.camel@mindpipe> <20040814072009.GA6535@elte.hu> <20040815115649.GA26259@elte.hu> <20040816022554.16c3c84a@mango.fruits.de> <1092622121.867.109.camel@krustophenia.net> <20040816024314.GA8960@elte.hu> <20040816030818.GA10685@elte.hu> <1092629953.810.23.camel@krustophenia.net> <20040816042653.GA14738@elte.hu> Content-Type: text/plain Message-Id: <1092632488.801.6.camel@krustophenia.net> Mime-Version: 1.0 X-Mailer: Ximian Evolution 1.4.6 Date: Mon, 16 Aug 2004 01:01:28 -0400 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 2004-08-16 at 00:26, Ingo Molnar wrote: > * Lee Revell wrote: > > > > > just to check this theory, could you make __check_and_rekey() an empty > > > > function? This should still produce a working random driver, albeit at > > > > much reduced entropy. If these latencies have a relationship to the > > > > mlockall() issue then this change should have an effect. > > > > > > hm, could you disable the random driver in the .config rather? It seems > > > that adding to the entropy pool (from hardirq context) alone is quite > > > expensive too. > > > > > > > Can this be disabled in the .config? I can't find an option for it. > > oh well, indeed it cannot be disabled. Then i'd suggest to return early > from extract_entropy(), without doing anything. That is the function > that seems to introduce the worst overhead. > OK, I tried the quick hack of just returning 0 before taking the spinlock in extract_entropy, but this broke /dev/random which prevented me from logging in. I guess we will have to properly fake it here. Alas, it looks like the software RNG is not disabled when CONFIG_HW_RANDOM is set. I would call this a bug - imagine incurring the overhead of software 3D acceleration even with hardware 3D acceleration enabled. Lee