From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752494AbcBJXCR (ORCPT ); Wed, 10 Feb 2016 18:02:17 -0500 Received: from mga02.intel.com ([134.134.136.20]:13388 "EHLO mga02.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752421AbcBJXCO (ORCPT ); Wed, 10 Feb 2016 18:02:14 -0500 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.22,427,1449561600"; d="scan'208";a="743935258" From: Andi Kleen To: tytso@mit.edu Cc: linux-kernel@vger.kernel.org Subject: Scalable random patchkit revisited Date: Wed, 10 Feb 2016 15:01:34 -0800 Message-Id: <1455145297-30897-1-git-send-email-andi@firstfloor.org> X-Mailer: git-send-email 2.4.3 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Ted, So far noone has come with a better solution, and the /dev/*random scaling problem on large systems is still there and affecting workloads. So I would like to resubmit the /dev/*random patchkit I posted some time ago. Back then it was successfully reviewed, but then some alternative proposals came up that nobody was interested in working on. If new proposals are implemented they could be done on top of my patchkit (even removing the extra pools if they are not needed anymore). I forward ported the patches to the current master (4.5-rc*) and retested it and it works just fine. Please consider applying. Thanks, -Andi