From mboxrd@z Thu Jan 1 00:00:00 1970 From: Hannes Frederic Sowa Subject: Re: [PATCH] net: net_secret should not depend on TCP Date: Tue, 24 Sep 2013 17:13:33 +0200 Message-ID: <20130924151333.GA1527@order.stressinduktion.org> References: <1379980991.3165.37.camel@edumazet-glaptop> <20130924023038.GA22393@order.stressinduktion.org> <20130924033505.GB22393@order.stressinduktion.org> <1380001118.3165.41.camel@edumazet-glaptop> <20130924054532.GA24446@order.stressinduktion.org> <1380028797.3165.65.camel@edumazet-glaptop> Mime-Version: 1.0 Content-Type: text/plain; charset=utf-8 Cc: Tom Herbert , davem@davemloft.net, netdev@vger.kernel.org, jesse.brandeburg@intel.com To: Eric Dumazet Return-path: Received: from order.stressinduktion.org ([87.106.68.36]:47880 "EHLO order.stressinduktion.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751038Ab3IXPNe (ORCPT ); Tue, 24 Sep 2013 11:13:34 -0400 Content-Disposition: inline In-Reply-To: <1380028797.3165.65.camel@edumazet-glaptop> Sender: netdev-owner@vger.kernel.org List-ID: On Tue, Sep 24, 2013 at 06:19:57AM -0700, Eric Dumazet wrote: > -void net_secret_init(void) > +static u32 net_secret[NET_SECRET_SIZE] ____cacheline_aligned; > + > +static void net_secret_init(void) > { > - get_random_bytes(net_secret, sizeof(net_secret)); > + u32 tmp; > + int i; > + > + if (likely(net_secret[0])) > + return; > + > + for (i = NET_SECRET_SIZE; i > 0;) { > + do { > + get_random_bytes(&tmp, sizeof(tmp)); > + } while (!tmp); I am afraid we can block here on embedded systems in an atomic section? Is this actually an issue? It does get called in a spin_lock_h.