locks and kernel randomness...

John-Mark Gurney jmg at funkthat.com
Wed Feb 25 00:23:04 UTC 2015


K. Macy wrote this message on Tue, Feb 24, 2015 at 15:33 -0800:
> > If someone does find a performance issue w/ my patch, I WILL work with
> > them on a solution, but I will not work w/ people who make unfounded
> > claims about the impact of this work...
> >
> 
> <shrug> ... The concerns may be exaggerated, but they aren't
> unfounded. Not quite the same thing, but no one wants to spend the

Till someone shows me code in the kernel tree where this is even close
to a performance problem, it is unfounded...  I've asked, and no one
has 

> cycles doing a SHA256 because it's "The Right Thing"(tm) when their
> use case only requires a fletcher2.

Depends upon what you're doing.. I haven't proposed changing ZFS's
default to sha256, so stop w/ the false equivalences...

> If it doesn't already exist, it might also be worth looking in to a
> more scalable CSPRNG implementation not requiring locking in the
> common case. For example, each core is seeded separately periodically
> so that has a private pool that is protected by a critical section.
> The private pool would be regularly refreshed by cpu-local callout.
> Thus, a lock would only be acquired if the local entropy were
> depleted.

I'm not discussing this until you read and reply to my original email,
since it's clear that my original email's contents has been ignored in
this thread...

-- 
  John-Mark Gurney				Voice: +1 415 225 5579

     "All that I will do, has been done, All that I have, has not."


More information about the freebsd-arch mailing list