From bbe2765835385e4a5903fdf562605e3d4c866302 Mon Sep 17 00:00:00 2001 From: Taylor R Campbell Date: Tue, 17 May 2022 11:05:11 +0000 Subject: [PATCH 01/13] opencrypto: Nix CRYPTO_F_USER. This is no longer needed. It was introduced in 2008 by darran@ in crypto.c 1.30, cryptodev.c 1.45 in an attempt to avoid double-free between the issuing thread and asynchronous callback. But the `fix' didn't work. In 2017, knakahara@ fixed it properly in cryptodev.c 1.87 by distinguishing `the crypto operation has completed' (CRYPTO_F_DONE) from `the callback is done touching the crp object' (CRYPTO_F_DQRETQ, now renamed to CRYPTODEV_F_RET). No functional change intended. --- sys/opencrypto/crypto.c | 13 ------------- sys/opencrypto/cryptodev.c | 8 +------- sys/opencrypto/cryptodev.h | 2 +- 3 files changed, 2 insertions(+), 21 deletions(-) diff --git a/sys/opencrypto/crypto.c b/sys/opencrypto/crypto.c index 89fb24259367..411d66a882c6 100644 --- a/sys/opencrypto/crypto.c +++ b/sys/opencrypto/crypto.c @@ -1749,19 +1749,6 @@ crypto_done(struct cryptop *crp) #endif crp->crp_callback(crp); } else { -#if 0 - if (crp->crp_flags & CRYPTO_F_USER) { - /* - * TODO: - * If crp->crp_flags & CRYPTO_F_USER and the used - * encryption driver does all the processing in - * the same context, we can skip enqueueing crp_ret_q - * and softint_schedule(crypto_ret_si). - */ - DPRINTF("lid[%u]: crp %p CRYPTO_F_USER\n", - CRYPTO_SESID2LID(crp->crp_sid), crp); - } else -#endif { int wasempty; struct crypto_crp_ret_qs *qs; diff --git a/sys/opencrypto/cryptodev.c b/sys/opencrypto/cryptodev.c index 09fc726cd625..fff7e0149826 100644 --- a/sys/opencrypto/cryptodev.c +++ b/sys/opencrypto/cryptodev.c @@ -604,13 +604,7 @@ cryptodev_op(struct csession *cse, struct crypt_op *cop, struct lwp *l) crp->crp_ilen = cop->len; - /* - * The request is flagged as CRYPTO_F_USER as long as it is running - * in the user IOCTL thread. However, whether the request completes - * immediately or belatedly is depends on the used encryption driver. - */ - crp->crp_flags = CRYPTO_F_IOV | (cop->flags & COP_F_BATCH) | CRYPTO_F_USER | - flags; + crp->crp_flags = CRYPTO_F_IOV | (cop->flags & COP_F_BATCH) | flags; crp->crp_buf = (void *)&cse->uio; crp->crp_callback = cryptodev_cb; crp->crp_sid = cse->sid; diff --git a/sys/opencrypto/cryptodev.h b/sys/opencrypto/cryptodev.h index f2cc2187fc30..e8d5b96a8aae 100644 --- a/sys/opencrypto/cryptodev.h +++ b/sys/opencrypto/cryptodev.h @@ -473,7 +473,7 @@ struct cryptop { #define CRYPTO_F_DONE 0x0020 /* Operation completed */ #define CRYPTO_F_CBIFSYNC 0x0040 /* Do CBIMM if op is synchronous */ #define CRYPTO_F_ONRETQ 0x0080 /* Request is on return queue */ -#define CRYPTO_F_USER 0x0100 /* Request is in user context */ +#define CRYPTO_F_UNUSED0 0x0100 /* was CRYPTO_F_USER */ #define CRYPTO_F_MORE 0x0200 /* more data to follow */ int crp_devflags; /* other than cryptodev.c must not use. */ From 18f8dfefdf858654852ea08035b6611ef4bd1d40 Mon Sep 17 00:00:00 2001 From: Taylor R Campbell Date: Tue, 17 May 2022 11:10:47 +0000 Subject: [PATCH 02/13] opencrypto: Simplify syntax in crypto_done. No functional change intended. --- sys/opencrypto/crypto.c | 38 ++++++++++++++++++-------------------- 1 file changed, 18 insertions(+), 20 deletions(-) diff --git a/sys/opencrypto/crypto.c b/sys/opencrypto/crypto.c index 411d66a882c6..c12780c22c4d 100644 --- a/sys/opencrypto/crypto.c +++ b/sys/opencrypto/crypto.c @@ -1749,27 +1749,25 @@ crypto_done(struct cryptop *crp) #endif crp->crp_callback(crp); } else { - { - int wasempty; - struct crypto_crp_ret_qs *qs; - struct crypto_crp_ret_q *crp_ret_q; - - qs = crypto_get_crp_ret_qs(crp->reqcpu); - crp_ret_q = &qs->crp_ret_q; - wasempty = TAILQ_EMPTY(crp_ret_q); - DPRINTF("lid[%u]: queueing %p\n", - CRYPTO_SESID2LID(crp->crp_sid), crp); - crp->crp_flags |= CRYPTO_F_ONRETQ; - TAILQ_INSERT_TAIL(crp_ret_q, crp, crp_next); - qs->crp_ret_q_len++; - if (wasempty && !qs->crp_ret_q_exit_flag) { - DPRINTF("lid[%u]: waking cryptoret," - "crp %p hit empty queue\n.", - CRYPTO_SESID2LID(crp->crp_sid), crp); - softint_schedule_cpu(crypto_ret_si, crp->reqcpu); - } - crypto_put_crp_ret_qs(crp->reqcpu); + int wasempty; + struct crypto_crp_ret_qs *qs; + struct crypto_crp_ret_q *crp_ret_q; + + qs = crypto_get_crp_ret_qs(crp->reqcpu); + crp_ret_q = &qs->crp_ret_q; + wasempty = TAILQ_EMPTY(crp_ret_q); + DPRINTF("lid[%u]: queueing %p\n", + CRYPTO_SESID2LID(crp->crp_sid), crp); + crp->crp_flags |= CRYPTO_F_ONRETQ; + TAILQ_INSERT_TAIL(crp_ret_q, crp, crp_next); + qs->crp_ret_q_len++; + if (wasempty && !qs->crp_ret_q_exit_flag) { + DPRINTF("lid[%u]: waking cryptoret," + " crp %p hit empty queue\n.", + CRYPTO_SESID2LID(crp->crp_sid), crp); + softint_schedule_cpu(crypto_ret_si, crp->reqcpu); } + crypto_put_crp_ret_qs(crp->reqcpu); } } From e31d7ad193d5f7f00b37135147598d6819817309 Mon Sep 17 00:00:00 2001 From: Taylor R Campbell Date: Tue, 17 May 2022 11:23:25 +0000 Subject: [PATCH 03/13] ubsec(4): Nix dead code. No functional change intended. --- sys/dev/pci/ubsec.c | 16 ++-------------- 1 file changed, 2 insertions(+), 14 deletions(-) diff --git a/sys/dev/pci/ubsec.c b/sys/dev/pci/ubsec.c index 16ee8a7e93ad..4373aa883f9f 100644 --- a/sys/dev/pci/ubsec.c +++ b/sys/dev/pci/ubsec.c @@ -1148,7 +1148,7 @@ ubsec_process(void *arg, struct cryptop *crp, int hint) { struct ubsec_q *q = NULL; int err = 0, i, j, nicealign; - struct ubsec_softc *sc; + struct ubsec_softc *sc = arg; struct cryptodesc *crd1, *crd2, *maccrd, *enccrd; int encoffset = 0, macoffset = 0, cpskip, cpoffset; int sskip, dskip, stheend, dtheend; @@ -1158,13 +1158,6 @@ ubsec_process(void *arg, struct cryptop *crp, int hint) u_int16_t flags = 0; int ivlen = 0, keylen = 0; - sc = arg; - KASSERT(sc != NULL /*, ("ubsec_process: null softc")*/); - - if (crp == NULL || crp->crp_callback == NULL || sc == NULL) { - ubsecstats.hst_invalid++; - return (EINVAL); - } if (UBSEC_SESSION(crp->crp_sid) >= sc->sc_nsessions) { ubsecstats.hst_badsession++; return (EINVAL); @@ -2402,14 +2395,9 @@ ubsec_kfree(struct ubsec_softc *sc, struct ubsec_q2 *q) static int ubsec_kprocess(void *arg, struct cryptkop *krp, int hint) { - struct ubsec_softc *sc; + struct ubsec_softc *sc = arg; int r; - if (krp == NULL || krp->krp_callback == NULL) - return (EINVAL); - sc = arg; - KASSERT(sc != NULL /*, ("ubsec_kprocess: null softc")*/); - while (!SIMPLEQ_EMPTY(&sc->sc_q2free)) { struct ubsec_q2 *q; From 8af46dcbe20927f86afd65924277855b2b8d27a9 Mon Sep 17 00:00:00 2001 From: Taylor R Campbell Date: Tue, 17 May 2022 11:28:14 +0000 Subject: [PATCH 04/13] opencrypto: For CRYPTO_F_CBIMM, call back immediately only on success. The failure case may lead to re-entry into crypto_dispatch, which is not safe from all contexts that call crypto_done. --- sys/opencrypto/crypto.c | 14 +++++++++----- 1 file changed, 9 insertions(+), 5 deletions(-) diff --git a/sys/opencrypto/crypto.c b/sys/opencrypto/crypto.c index c12780c22c4d..6fd7459a664d 100644 --- a/sys/opencrypto/crypto.c +++ b/sys/opencrypto/crypto.c @@ -1728,12 +1728,16 @@ crypto_done(struct cryptop *crp) * back to mark operations completed. Thus we need * to mask both while manipulating the return queue. */ - if (crp->crp_flags & CRYPTO_F_CBIMM) { + if ((crp->crp_flags & CRYPTO_F_CBIMM) != 0 && + crp->crp_etype == 0) { /* - * Do the callback directly. This is ok when the - * callback routine does very little (e.g. the - * /dev/crypto callback method just does a wakeup). - */ + * Do the callback directly. This is ok when the + * callback routine does very little (e.g. the + * /dev/crypto callback method just does a wakeup). + * However, in the failure case the callback might do + * more like resubmit the request on EAGAIN, so only + * take this fast path in the success case. + */ #ifdef CRYPTO_TIMING if (crypto_timing) { /* From 069dc750389a2a984fd23753db656c8f5ea1d0a7 Mon Sep 17 00:00:00 2001 From: Taylor R Campbell Date: Tue, 17 May 2022 11:29:19 +0000 Subject: [PATCH 05/13] opencrypto: Assert !cpu_intr_p() on dispatch and invoke. These should only ever have been potentially called from hard interrupt context by CRYPTO_F_CBIMM callbacks (CBIMM = call back immediately) that resubmitted the request synchronously on EAGAIN. That no longer happens -- the callback is not invoked synchronously on any errors any more, even if CRYPTO_F_CBIMM is set -- so there is no more need to allow this case of call from hard interrupt context. --- sys/opencrypto/crypto.c | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/sys/opencrypto/crypto.c b/sys/opencrypto/crypto.c index 6fd7459a664d..450a3db8c5cd 100644 --- a/sys/opencrypto/crypto.c +++ b/sys/opencrypto/crypto.c @@ -1264,6 +1264,7 @@ crypto_dispatch(struct cryptop *crp) struct crypto_crp_q *crp_q; KASSERT(crp != NULL); + KASSERT(!cpu_intr_p()); DPRINTF("crp %p, alg %d\n", crp, crp->crp_desc->crd_alg); @@ -1373,6 +1374,7 @@ crypto_kdispatch(struct cryptkop *krp) struct crypto_crp_kq *crp_kq; KASSERT(krp != NULL); + KASSERT(!cpu_intr_p()); cryptostats.cs_kops++; @@ -1439,6 +1441,7 @@ crypto_kinvoke(struct cryptkop *krp, int hint) int error; KASSERT(krp != NULL); + KASSERT(!cpu_intr_p()); /* Sanity checks. */ if (krp->krp_callback == NULL) { @@ -1524,6 +1527,7 @@ crypto_invoke(struct cryptop *crp, int hint) struct cryptocap *cap; KASSERT(crp != NULL); + KASSERT(!cpu_intr_p()); #ifdef CRYPTO_TIMING if (crypto_timing) From f9386f3ddc2bf84694b21094f84cc784f1a23764 Mon Sep 17 00:00:00 2001 From: Taylor R Campbell Date: Tue, 17 May 2022 11:37:42 +0000 Subject: [PATCH 06/13] crypto(4): Use IPL_NONE, not IPL_NET, for /dev/crypto pools. These are used (pool_get/put) only from thread context, never from interrupt or even soft interrupt context. --- sys/opencrypto/cryptodev.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/sys/opencrypto/cryptodev.c b/sys/opencrypto/cryptodev.c index fff7e0149826..1819f780635c 100644 --- a/sys/opencrypto/cryptodev.c +++ b/sys/opencrypto/cryptodev.c @@ -2112,9 +2112,9 @@ cryptoattach(int num) mutex_init(&cryptodev_mtx, MUTEX_DEFAULT, IPL_NONE); pool_init(&fcrpl, sizeof(struct fcrypt), 0, 0, 0, "fcrpl", - NULL, IPL_NET); /* XXX IPL_NET ("splcrypto") */ + NULL, IPL_NONE); pool_init(&csepl, sizeof(struct csession), 0, 0, 0, "csepl", - NULL, IPL_NET); /* XXX IPL_NET ("splcrypto") */ + NULL, IPL_NONE); /* * Preallocate space for 64 users, with 5 sessions each. From 6ab7362c4c475fa1b97a6c5b16b411bc5a354f43 Mon Sep 17 00:00:00 2001 From: Taylor R Campbell Date: Tue, 17 May 2022 11:39:32 +0000 Subject: [PATCH 07/13] crypto(4): Nix wrong comment about locking around csefree. --- sys/opencrypto/cryptodev.c | 1 - 1 file changed, 1 deletion(-) diff --git a/sys/opencrypto/cryptodev.c b/sys/opencrypto/cryptodev.c index 1819f780635c..5651b38847cb 100644 --- a/sys/opencrypto/cryptodev.c +++ b/sys/opencrypto/cryptodev.c @@ -1050,7 +1050,6 @@ csecreate(struct fcrypt *fcr, u_int64_t sid, void *key, u_int64_t keylen, } } -/* csefree: call with cryptodev_mtx held. */ static int csefree(struct csession *cse) { From 027255bf0e0bba3f434663cfd869243f6da2062c Mon Sep 17 00:00:00 2001 From: Taylor R Campbell Date: Tue, 17 May 2022 11:42:13 +0000 Subject: [PATCH 08/13] crypto(4): Nix long-dead code and comments. --- sys/opencrypto/cryptodev.c | 21 +-------------------- 1 file changed, 1 insertion(+), 20 deletions(-) diff --git a/sys/opencrypto/cryptodev.c b/sys/opencrypto/cryptodev.c index 5651b38847cb..7a687c7d6472 100644 --- a/sys/opencrypto/cryptodev.c +++ b/sys/opencrypto/cryptodev.c @@ -646,34 +646,15 @@ cryptodev_op(struct csession *cse, struct crypt_op *cop, struct lwp *l) cv_init(&crp->crp_cv, "crydev"); - /* - * XXX there was a comment here which said that we went to - * XXX splcrypto() but needed to only if CRYPTO_F_CBIMM, - * XXX disabled on NetBSD since 1.6O due to a race condition. - * XXX But crypto_dispatch went to splcrypto() itself! (And - * XXX now takes the cryptodev_mtx mutex itself). We do, however, - * XXX need to hold the mutex across the call to cv_wait(). - * XXX (should we arrange for crypto_dispatch to return to - * XXX us with it held? it seems quite ugly to do so.) - */ -#ifdef notyet -eagain: -#endif error = crypto_dispatch(crp); mutex_enter(&cryptodev_mtx); - /* + /* * Don't touch crp before returned by any error or received * cv_signal(&crp->crp_cv). It is required to restructure locks. */ switch (error) { -#ifdef notyet /* don't loop forever -- but EAGAIN not possible here yet */ - case EAGAIN: - mutex_exit(&cryptodev_mtx); - goto eagain; - break; -#endif case 0: break; default: From 9e658ecb20f95ed6d800a60154607c40fe167045 Mon Sep 17 00:00:00 2001 From: Taylor R Campbell Date: Tue, 17 May 2022 11:43:10 +0000 Subject: [PATCH 09/13] crypto(4): Narrow scope of cryptodev_mtx to cover wait. No functional change intended -- this only removes an unnecessary lock/unlock cycle in the error case. --- sys/opencrypto/cryptodev.c | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/sys/opencrypto/cryptodev.c b/sys/opencrypto/cryptodev.c index 7a687c7d6472..fa6ca3b5799e 100644 --- a/sys/opencrypto/cryptodev.c +++ b/sys/opencrypto/cryptodev.c @@ -647,7 +647,6 @@ cryptodev_op(struct csession *cse, struct crypt_op *cop, struct lwp *l) cv_init(&crp->crp_cv, "crydev"); error = crypto_dispatch(crp); - mutex_enter(&cryptodev_mtx); /* * Don't touch crp before returned by any error or received @@ -659,11 +658,11 @@ cryptodev_op(struct csession *cse, struct crypt_op *cop, struct lwp *l) break; default: DPRINTF("not waiting, error.\n"); - mutex_exit(&cryptodev_mtx); cv_destroy(&crp->crp_cv); goto bail; } + mutex_enter(&cryptodev_mtx); while (!(crp->crp_devflags & CRYPTODEV_F_RET)) { DPRINTF("cse->sid[%d]: sleeping on cv %p for crp %p\n", (uint32_t)cse->sid, &crp->crp_cv, crp); From 2e8bf410f9eaee65a688c983de536f6fb4912180 Mon Sep 17 00:00:00 2001 From: Taylor R Campbell Date: Tue, 17 May 2022 11:44:39 +0000 Subject: [PATCH 10/13] crypto(4): Simplify error test in cryptodev_op. No functional change intended. --- sys/opencrypto/cryptodev.c | 14 ++------------ 1 file changed, 2 insertions(+), 12 deletions(-) diff --git a/sys/opencrypto/cryptodev.c b/sys/opencrypto/cryptodev.c index fa6ca3b5799e..e81711f5403d 100644 --- a/sys/opencrypto/cryptodev.c +++ b/sys/opencrypto/cryptodev.c @@ -641,22 +641,12 @@ cryptodev_op(struct csession *cse, struct crypt_op *cop, struct lwp *l) error = EINVAL; goto bail; } - crp->crp_mac=cse->tmp_mac; + crp->crp_mac = cse->tmp_mac; } cv_init(&crp->crp_cv, "crydev"); - error = crypto_dispatch(crp); - - /* - * Don't touch crp before returned by any error or received - * cv_signal(&crp->crp_cv). It is required to restructure locks. - */ - - switch (error) { - case 0: - break; - default: + if (error) { DPRINTF("not waiting, error.\n"); cv_destroy(&crp->crp_cv); goto bail; From ae5d8774a5bc71e55d6787f4fce039bc96fd48c9 Mon Sep 17 00:00:00 2001 From: Taylor R Campbell Date: Tue, 17 May 2022 12:55:47 +0000 Subject: [PATCH 11/13] cprng(9): cprng_fast is no longer used from interrupt context. Rip out logic to defer reseeding to softint. --- sys/crypto/cprng_fast/cprng_fast.c | 38 ++++++++++-------------------- 1 file changed, 12 insertions(+), 26 deletions(-) diff --git a/sys/crypto/cprng_fast/cprng_fast.c b/sys/crypto/cprng_fast/cprng_fast.c index 8f8d3839fe01..342fff85b033 100644 --- a/sys/crypto/cprng_fast/cprng_fast.c +++ b/sys/crypto/cprng_fast/cprng_fast.c @@ -39,7 +39,6 @@ __KERNEL_RCSID(0, "$NetBSD: cprng_fast.c,v 1.16 2020/07/28 20:15:07 riastradh Ex #include #include #include -#include #include #include @@ -58,8 +57,7 @@ struct cprng_fast { }; static void cprng_fast_init_cpu(void *, void *, struct cpu_info *); -static void cprng_fast_schedule_reseed(struct cprng_fast *); -static void cprng_fast_intr(void *); +static void cprng_fast_reseed(struct cprng_fast *); static void cprng_fast_seed(struct cprng_fast *, const void *); static void cprng_fast_buf(struct cprng_fast *, void *, unsigned); @@ -68,7 +66,6 @@ static void cprng_fast_buf_short(void *, size_t); static void cprng_fast_buf_long(void *, size_t); static percpu_t *cprng_fast_percpu __read_mostly; -static void *cprng_fast_softint __read_mostly; void cprng_fast_init(void) @@ -76,20 +73,14 @@ cprng_fast_init(void) cprng_fast_percpu = percpu_create(sizeof(struct cprng_fast), cprng_fast_init_cpu, NULL, NULL); - cprng_fast_softint = softint_establish(SOFTINT_SERIAL|SOFTINT_MPSAFE, - &cprng_fast_intr, NULL); } static void cprng_fast_init_cpu(void *p, void *arg __unused, struct cpu_info *ci) { struct cprng_fast *const cprng = p; - uint8_t seed[CPRNG_FAST_SEED_BYTES]; - cprng->epoch = entropy_epoch(); - cprng_strong(kern_cprng, seed, sizeof seed, 0); - cprng_fast_seed(cprng, seed); - (void)explicit_memset(seed, 0, sizeof seed); + cprng->epoch = 0; cprng->reseed_evcnt = kmem_alloc(sizeof(*cprng->reseed_evcnt), KM_SLEEP); @@ -103,11 +94,16 @@ cprng_fast_get(struct cprng_fast **cprngp) struct cprng_fast *cprng; int s; + KASSERT(!cpu_intr_p()); + *cprngp = cprng = percpu_getref(cprng_fast_percpu); - s = splvm(); + s = splsoftserial(); - if (__predict_false(cprng->epoch != entropy_epoch())) - cprng_fast_schedule_reseed(cprng); + if (__predict_false(cprng->epoch != entropy_epoch())) { + splx(s); + cprng_fast_reseed(cprng); + s = splsoftserial(); + } return s; } @@ -123,29 +119,19 @@ cprng_fast_put(struct cprng_fast *cprng, int s) } static void -cprng_fast_schedule_reseed(struct cprng_fast *cprng __unused) -{ - - softint_schedule(cprng_fast_softint); -} - -static void -cprng_fast_intr(void *cookie __unused) +cprng_fast_reseed(struct cprng_fast *cprng) { unsigned epoch = entropy_epoch(); - struct cprng_fast *cprng; uint8_t seed[CPRNG_FAST_SEED_BYTES]; int s; cprng_strong(kern_cprng, seed, sizeof(seed), 0); - cprng = percpu_getref(cprng_fast_percpu); - s = splvm(); + s = splsoftserial(); cprng_fast_seed(cprng, seed); cprng->epoch = epoch; cprng->reseed_evcnt->ev_count++; splx(s); - percpu_putref(cprng_fast_percpu); explicit_memset(seed, 0, sizeof(seed)); } From 8ffba7d99f98fdeaed6ca2e8242e64f137c15311 Mon Sep 17 00:00:00 2001 From: Taylor R Campbell Date: Tue, 17 May 2022 12:59:57 +0000 Subject: [PATCH 12/13] netinet/tcp: Defer tcp_slowtimo until we start using tcp. This way we don't trigger entropy warnings early. --- sys/netinet/tcp_seq.h | 3 ++- sys/netinet/tcp_subr.c | 3 --- sys/netinet/tcp_timer.c | 38 +++++++++++++++++++++++++++++++++++--- sys/netinet/tcp_var.h | 3 ++- 4 files changed, 39 insertions(+), 8 deletions(-) diff --git a/sys/netinet/tcp_seq.h b/sys/netinet/tcp_seq.h index 98cc2d6709a3..34cb5d806f98 100644 --- a/sys/netinet/tcp_seq.h +++ b/sys/netinet/tcp_seq.h @@ -64,7 +64,8 @@ #define TCP_ISSINCR 0x01000000 /* increment per time and per conn */ #ifdef _KERNEL -extern tcp_seq tcp_iss_seq; /* tcp initial seq # */ +#define tcp_iss_seq _tcp_iss_seq() +extern tcp_seq _tcp_iss_seq(void); /* tcp initial seq # */ #endif #endif /* !_NETINET_TCP_SEQ_H_ */ diff --git a/sys/netinet/tcp_subr.c b/sys/netinet/tcp_subr.c index 86398de8f954..f8932c81f860 100644 --- a/sys/netinet/tcp_subr.c +++ b/sys/netinet/tcp_subr.c @@ -154,7 +154,6 @@ __KERNEL_RCSID(0, "$NetBSD: tcp_subr.c,v 1.289 2021/07/31 20:29:37 andvar Exp $" struct inpcbtable tcbtable; /* head of queue of active tcpcb's */ -u_int32_t tcp_now; /* slow ticks, for RFC 1323 timestamps */ percpu_t *tcpstat_percpu; @@ -2130,8 +2129,6 @@ tcp_rmx_rtt(struct tcpcb *tp) #endif } -tcp_seq tcp_iss_seq = 0; /* tcp initial seq # */ - /* * Get a new sequence value given a tcp control block */ diff --git a/sys/netinet/tcp_timer.c b/sys/netinet/tcp_timer.c index 69c574aa066e..be31287589f4 100644 --- a/sys/netinet/tcp_timer.c +++ b/sys/netinet/tcp_timer.c @@ -214,7 +214,7 @@ tcp_slowtimo_init(void) panic("%s: workqueue_create failed (%d)\n", __func__, error); #endif callout_init(&tcp_slowtimo_ch, CALLOUT_MPSAFE); - callout_reset(&tcp_slowtimo_ch, 1, tcp_slowtimo, NULL); + callout_setfunc(&tcp_slowtimo_ch, tcp_slowtimo, NULL); } /* @@ -248,6 +248,37 @@ tcp_delack(void *arg) mutex_exit(softnet_lock); } +static tcp_seq tcp_iss_seq_local = 0; /* tcp initial seq # */ +static u_int32_t tcp_now_local; /* slow ticks, for RFC 1323 timestamps */ + +static void +tcp_slowtimo_start(void) +{ + + KDASSERT(mutex_owned(softnet_lock)); + if (__predict_false(!callout_pending(&tcp_slowtimo_ch))) { + tcp_iss_seq_local = TCP_ISS_RANDOM_MASK & cprng_fast32(); + printf("%s: initial iss is %u\n", __func__, tcp_iss_seq_local); + callout_schedule(&tcp_slowtimo_ch, hz / PR_SLOWHZ); + } +} + +tcp_seq +_tcp_iss_seq(void) +{ + + tcp_slowtimo_start(); + return tcp_iss_seq_local; +} + +uint32_t +_tcp_now(void) +{ + + tcp_slowtimo_start(); + return tcp_now_local; +} + /* * Tcp protocol timeout routine called every 500 ms. * Updates the timers in all active tcb's and @@ -258,8 +289,9 @@ tcp_slowtimo_work(struct work *wk, void *arg) { mutex_enter(softnet_lock); - tcp_iss_seq += TCP_ISSINCR + (TCP_ISS_RANDOM_MASK & cprng_fast32()); - tcp_now++; /* for timestamps */ + tcp_iss_seq_local += TCP_ISSINCR + + (TCP_ISS_RANDOM_MASK & cprng_fast32()); + tcp_now_local++; /* for timestamps */ mutex_exit(softnet_lock); callout_schedule(&tcp_slowtimo_ch, hz / PR_SLOWHZ); diff --git a/sys/netinet/tcp_var.h b/sys/netinet/tcp_var.h index fb0e6402fa41..de84b9e2fb8a 100644 --- a/sys/netinet/tcp_var.h +++ b/sys/netinet/tcp_var.h @@ -788,7 +788,8 @@ struct syn_cache_head { extern struct inpcbtable tcbtable; /* head of queue of active tcpcb's */ extern const struct pr_usrreqs tcp_usrreqs; -extern u_int32_t tcp_now; /* for RFC 1323 timestamps */ +#define tcp_now _tcp_now() +u_int32_t _tcp_now(void); /* for RFC 1323 timestamps */ extern int tcp_do_rfc1323; /* enabled/disabled? */ extern int tcp_do_sack; /* SACK enabled/disabled? */ extern int tcp_do_win_scale; /* RFC1323 window scaling enabled/disabled? */ From cfa7f938d6df17cbf43885efbe73279063ff7d00 Mon Sep 17 00:00:00 2001 From: Taylor R Campbell Date: Tue, 17 May 2022 13:01:54 +0000 Subject: [PATCH 13/13] netinet6/nd6: Defer computing nd->reachable until needed. This avoids triggering early entropy warnings. --- sys/netinet6/nd6.c | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/sys/netinet6/nd6.c b/sys/netinet6/nd6.c index b6241e98e441..8c51c2fe319d 100644 --- a/sys/netinet6/nd6.c +++ b/sys/netinet6/nd6.c @@ -174,7 +174,7 @@ nd6_ifattach(struct ifnet *ifp) nd->chlim = IPV6_DEFHLIM; nd->basereachable = REACHABLE_TIME; - nd->reachable = ND_COMPUTE_RTIME(nd->basereachable); + nd->reachable = 0; nd->retrans = RETRANS_TIMER; nd->flags = ND6_IFF_PERFORMNUD; @@ -403,6 +403,9 @@ nd6_llinfo_reachable(struct ifnet *ifp) { struct nd_kifinfo *ndi = ND_IFINFO(ifp); + if (__predict_false(ndi->reachable == 0)) + ndi->reachable = ND_COMPUTE_RTIME(ndi->basereachable); + return ndi->reachable; }