diff options
author | Kent Overstreet <kent.overstreet@gmail.com> | 2020-11-07 10:59:54 -0500 |
---|---|---|
committer | Kent Overstreet <kent.overstreet@gmail.com> | 2020-12-07 11:50:45 -0500 |
commit | e0690a04530619b339c9ec42c8fff05aecb7c66f (patch) | |
tree | 8935872bb82c70ce42c49bfcc1067d8a66b8a3b0 | |
parent | 641ac20403099dde8dcff2a83b9a42ccf1bdd20d (diff) |
bcachefs: Use get_random_bytes_arch() for hash seed
These random bytes aren't used for keying, just seeds for hash tables,
and the RNG used by get_random_bytes() unfortunately isn't percpu so on
certain workloads we see a fair amount of lock contention.
Signed-off-by: Kent Overstreet <kent.overstreet@gmail.com>
-rw-r--r-- | fs/bcachefs/inode.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/fs/bcachefs/inode.c b/fs/bcachefs/inode.c index bf1c7319669c..e1823c0c3881 100644 --- a/fs/bcachefs/inode.c +++ b/fs/bcachefs/inode.c @@ -418,7 +418,7 @@ void bch2_inode_init_early(struct bch_fs *c, /* ick */ inode_u->bi_flags |= str_hash << INODE_STR_HASH_OFFSET; - get_random_bytes(&inode_u->bi_hash_seed, + get_random_bytes_arch(&inode_u->bi_hash_seed, sizeof(inode_u->bi_hash_seed)); } |