diff options
author | Jason A. Donenfeld <Jason@zx2c4.com> | 2022-09-22 18:46:04 +0200 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2022-10-26 13:19:19 +0200 |
commit | 5d3afaa495dfe5018dab5c86fa241583d6fc4f58 (patch) | |
tree | c0cf0f76d380f8e80b3384088347d43e53afb144 | |
parent | 34e9ae783d63d758a1e8cd365cd3a04ec188d96a (diff) | |
download | linux-stable-5d3afaa495dfe5018dab5c86fa241583d6fc4f58.tar.gz linux-stable-5d3afaa495dfe5018dab5c86fa241583d6fc4f58.tar.bz2 linux-stable-5d3afaa495dfe5018dab5c86fa241583d6fc4f58.zip |
random: avoid reading two cache lines on irq randomness
commit 9ee0507e896b45af6d65408c77815800bce30008 upstream.
In order to avoid reading and dirtying two cache lines on every IRQ,
move the work_struct to the bottom of the fast_pool struct. add_
interrupt_randomness() always touches .pool and .count, which are
currently split, because .mix pushes everything down. Instead, move .mix
to the bottom, so that .pool and .count are always in the first cache
line, since .mix is only accessed when the pool is full.
Fixes: 58340f8e952b ("random: defer fast pool mixing to worker")
Reviewed-by: Sebastian Andrzej Siewior <bigeasy@linutronix.de>
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
-rw-r--r-- | drivers/char/random.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/drivers/char/random.c b/drivers/char/random.c index e5b331006f17..3cde4f7cccec 100644 --- a/drivers/char/random.c +++ b/drivers/char/random.c @@ -890,10 +890,10 @@ void __init add_bootloader_randomness(const void *buf, size_t len) } struct fast_pool { - struct work_struct mix; unsigned long pool[4]; unsigned long last; unsigned int count; + struct work_struct mix; }; static DEFINE_PER_CPU(struct fast_pool, irq_randomness) = { |