Lookin gat the code, your _new_ code just throws samples away _entirely_
just because some random event hasn't happened (the first thing I noticed
was the context switch testing, there may be others there that I just
didn't react to).
In short, you seem to cut those random events to _zero_. And this happens
under what seems to be perfectly realistic loads. That's not trying to fix
things, that's just breaking them.
> The patches will be a nuisance for anyone who's currently using
> /dev/random to generate session keys on busy SSL servers.
No, it appears to be a nuisanse even for people who have real issues, ie
just generating _occasional_ numbers on machines that just don't happen to
run much user space programs.
Linus
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/