aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMateusz Guzik <mjg@FreeBSD.org>2021-06-24 11:19:09 +0000
committerMateusz Guzik <mjg@FreeBSD.org>2021-06-28 08:14:26 +0000
commite0893890eb6080e92f7e7fd9da319536bb5fe64e (patch)
treef9030cebcc473cee98ed4907254ae73f93ffcd6b
parent91064841d72b285a146a3f1c32cb447251e062ea (diff)
downloadsrc-e0893890eb6080e92f7e7fd9da319536bb5fe64e.tar.gz
src-e0893890eb6080e92f7e7fd9da319536bb5fe64e.zip
ipsec: globalize lft zone and zero out buffers at allocation time
Creation of a zone is expensive and there is no need to have one for every vnet. Moreover, this wastes memory as these separate zones cannot use the same per-cpu caches. Finally, this is a step towards replacing the custom zone with pcpu-16. Two counter_u64_zero calls induce back-to-back IPIs to zero everything out. Instead, pass the M_ZERO flag to let uma just iterate all buffers. The counter(9) API abstraction is already violated by not using counter_u64_alloc. Reviewed by: ae Sponsored by: Rubicon Communications, LLC ("Netgate") Differential Revision: https://reviews.freebsd.org/D30916
-rw-r--r--sys/netipsec/key.c23
1 files changed, 11 insertions, 12 deletions
diff --git a/sys/netipsec/key.c b/sys/netipsec/key.c
index 86dc9ea41024..4ca65979d5b2 100644
--- a/sys/netipsec/key.c
+++ b/sys/netipsec/key.c
@@ -534,8 +534,7 @@ MALLOC_DEFINE(M_IPSEC_SAQ, "ipsec-saq", "ipsec sa acquire");
MALLOC_DEFINE(M_IPSEC_SAR, "ipsec-reg", "ipsec sa acquire");
MALLOC_DEFINE(M_IPSEC_SPDCACHE, "ipsec-spdcache", "ipsec SPD cache");
-VNET_DEFINE_STATIC(uma_zone_t, key_lft_zone);
-#define V_key_lft_zone VNET(key_lft_zone)
+static uma_zone_t __read_mostly ipsec_key_lft_zone;
/*
* set parameters into secpolicyindex buffer.
@@ -2939,13 +2938,11 @@ key_newsav(const struct sadb_msghdr *mhp, struct secasindex *saidx,
goto done;
}
mtx_init(sav->lock, "ipsec association", NULL, MTX_DEF);
- sav->lft_c = uma_zalloc_pcpu(V_key_lft_zone, M_NOWAIT);
+ sav->lft_c = uma_zalloc_pcpu(ipsec_key_lft_zone, M_NOWAIT | M_ZERO);
if (sav->lft_c == NULL) {
*errp = ENOBUFS;
goto done;
}
- counter_u64_zero(sav->lft_c_allocations);
- counter_u64_zero(sav->lft_c_bytes);
sav->spi = spi;
sav->seq = mhp->msg->sadb_msg_seq;
@@ -3031,7 +3028,7 @@ done:
free(sav->lock, M_IPSEC_MISC);
}
if (sav->lft_c != NULL)
- uma_zfree_pcpu(V_key_lft_zone, sav->lft_c);
+ uma_zfree_pcpu(ipsec_key_lft_zone, sav->lft_c);
free(sav, M_IPSEC_SA), sav = NULL;
}
if (sah != NULL)
@@ -3109,7 +3106,7 @@ key_delsav(struct secasvar *sav)
if ((sav->flags & SADB_X_EXT_F_CLONED) == 0) {
mtx_destroy(sav->lock);
free(sav->lock, M_IPSEC_MISC);
- uma_zfree_pcpu(V_key_lft_zone, sav->lft_c);
+ uma_zfree_pcpu(ipsec_key_lft_zone, sav->lft_c);
}
free(sav, M_IPSEC_SA);
}
@@ -8269,10 +8266,6 @@ key_init(void)
TAILQ_INIT(&V_sptree_ifnet[i]);
}
- V_key_lft_zone = uma_zcreate("IPsec SA lft_c",
- sizeof(uint64_t) * 2, NULL, NULL, NULL, NULL,
- UMA_ALIGN_PTR, UMA_ZONE_PCPU);
-
TAILQ_INIT(&V_sahtree);
V_sphashtbl = hashinit(SPHASH_NHASH, M_IPSEC_SP, &V_sphash_mask);
V_savhashtbl = hashinit(SAVHASH_NHASH, M_IPSEC_SA, &V_savhash_mask);
@@ -8294,6 +8287,10 @@ key_init(void)
if (!IS_DEFAULT_VNET(curvnet))
return;
+ ipsec_key_lft_zone = uma_zcreate("IPsec SA lft_c",
+ sizeof(uint64_t) * 2, NULL, NULL, NULL, NULL,
+ UMA_ALIGN_PTR, UMA_ZONE_PCPU);
+
SPTREE_LOCK_INIT();
REGTREE_LOCK_INIT();
SAHTREE_LOCK_INIT();
@@ -8409,10 +8406,12 @@ key_destroy(void)
SPACQ_UNLOCK();
hashdestroy(V_acqaddrhashtbl, M_IPSEC_SAQ, V_acqaddrhash_mask);
hashdestroy(V_acqseqhashtbl, M_IPSEC_SAQ, V_acqseqhash_mask);
- uma_zdestroy(V_key_lft_zone);
if (!IS_DEFAULT_VNET(curvnet))
return;
+
+ uma_zdestroy(ipsec_key_lft_zone);
+
#ifndef IPSEC_DEBUG2
callout_drain(&key_timer);
#endif