Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp330915pxu; Fri, 11 Dec 2020 03:29:09 -0800 (PST) X-Google-Smtp-Source: ABdhPJxmfbCBp2XOAzv1GEWPRP+mLminDg0L1w+DpPczMpmp3T3BOf/QWjQ2esLUv3qNvdPfa7kc X-Received: by 2002:a17:906:351a:: with SMTP id r26mr10140470eja.204.1607686148918; Fri, 11 Dec 2020 03:29:08 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1607686148; cv=none; d=google.com; s=arc-20160816; b=FOKfniARMs7GDZZJ+WQ2c0Ys43aXkL4SSWcypuxvyE2LVh+CBXzcte5PosQtZn+u6b 0Gs9O7+K2G4jpFm3+lFiyimKezwqaQYtS11cTrj/4Yj6qUAKdjFVX4oxFQobk/6t6B1v s6YGpmQe3ruVLUSWE+LtQF6w2ANiG8ZszO5L2x4fmZvvcCLvVF405a3s/zIuANVSkjg3 //PL6C3b3x7ZNBcPDgjvvJ8pSpszLzDDPL+WE5NkT4GR2mwnRmFaTckZTyKNvdR2WlJt cilgUGtqqJruF/9hIG4rARKnjJ6wLTVFPNKK+guM5p4AQyQzP5/lv97b0UhOuu8Oh7fn 2kLw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:references:mime-version :message-id:in-reply-to:date:sender:dkim-signature; bh=s48B060sFkliWSMPhDax2MNISlTZxiYugrX8TXTcWnw=; b=kuY6Xeij0BHApNhVV/txLaBzYjqo8TOORrOm3aqo1awOlMT72nDp3IcaBp1Q7M8wpJ 4DHrXi5ChtgBurP9I8RfJQ9jMP6ZNpr+oeJNNShP6LU6Su7QNtdkFgZqM/wgVC6GpIh+ J9mnIEe7p6q5EJmd6BnR7/yULDRgXFrf2MNXMdE28PLmILo+dFBlOuOVAQ+bZHbNcT2b mKl99HG20BAqhhoDz3yn0PL7aJ6Zv4IqUW3rBamzZWIPND7bgixBc73f9IdXlhSHKK2T aSSnIeXZxvbuKXz+5XkDnuoqa7OUL7PnQTIMY3oxwZr8a4Ty9abBJp5lSAgLYHpKhr3e kFnA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=Ha6MMP9g; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id zc2si4472842ejb.427.2020.12.11.03.28.45; Fri, 11 Dec 2020 03:29:08 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=Ha6MMP9g; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2395030AbgLKCAm (ORCPT + 99 others); Thu, 10 Dec 2020 21:00:42 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42496 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2391610AbgLKB7u (ORCPT ); Thu, 10 Dec 2020 20:59:50 -0500 Received: from mail-qv1-xf4a.google.com (mail-qv1-xf4a.google.com [IPv6:2607:f8b0:4864:20::f4a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A1AEEC0617B0 for ; Thu, 10 Dec 2020 17:58:36 -0800 (PST) Received: by mail-qv1-xf4a.google.com with SMTP id h1so5197058qvr.7 for ; Thu, 10 Dec 2020 17:58:36 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=sender:date:in-reply-to:message-id:mime-version:references:subject :from:to:cc; bh=s48B060sFkliWSMPhDax2MNISlTZxiYugrX8TXTcWnw=; b=Ha6MMP9gBO2flV3HnS0n1AKPSoiptEWdNEVpBwfPnulYBrqPEvaN1p0hrJD0oRAQK1 ThePFKSyg5x4nBiSyWL4h0uSfspJGTyfR04HID3LPoVoONKw+Tn5gJaYKJZR/JoH+pr5 lRmk0o2D7l28SBLqViDp0uF8gvhLN3vKEJje2RuaaVZM1pxggHBQA0rS3rRl9YxC5Qrc sbXvnof8D0/zXOOvHSetBB9/Ul2quNUie0aDrjC32x+zSrfLtYhCYOv0W46wFhhCSFBL wCUN+lknoKk4amsca5DS2/np2d74phbA/pFKNyr/y6NYfyZtfxZUQSBbZI0/BNEDF6nA QUOw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:in-reply-to:message-id:mime-version :references:subject:from:to:cc; bh=s48B060sFkliWSMPhDax2MNISlTZxiYugrX8TXTcWnw=; b=G4fywhoJ4HdvMG59ySRbM2RPmm1m1tvG+GrpLtGpG4Ttyu4SelWA9rhaksaI9/urv1 scTVggIJsqQAUEQ+db1o8oKgTWAvpiOEJtcC5garyfzmFFBnVYBv5aHZxr0D/ErmOuj0 bdhr/PV64JSFgNqzzwZrLsCmPs9VbBZ0AhRo1SQXOgGw6oM0p8Na1a+yW+NLN7VQh2Im vtcmc1vJE8BjIDWJ+5aqxTIFs1HnQMJzmJzoxxj5ikNN242MBlxEQ4/Yumz/Qa6aVz8v JwLQ1FfjSv+OyLtX3UGxrP4agl1QOipGzlimqHgRdQid95xMnAdmcvuW/LgRtliynIhi 0DKg== X-Gm-Message-State: AOAM530pAa+CKn8z4wviwyyNyIDGHhuVSdpvXivvJihv03QAKBdIUoXf DkDRfjHt1v0LHNAXUELL84WiIuklUG3+ Sender: "brianvv via sendgmr" X-Received: from brianvv.c.googlers.com ([fda3:e722:ac3:10:7f:e700:c0a8:348]) (user=brianvv job=sendgmr) by 2002:a0c:b3d1:: with SMTP id b17mr12561099qvf.41.1607651915781; Thu, 10 Dec 2020 17:58:35 -0800 (PST) Date: Fri, 11 Dec 2020 01:58:23 +0000 In-Reply-To: <20201211015823.1079574-1-brianvv@google.com> Message-Id: <20201211015823.1079574-5-brianvv@google.com> Mime-Version: 1.0 References: <20201211015823.1079574-1-brianvv@google.com> X-Mailer: git-send-email 2.29.2.576.ga3fc446d84-goog Subject: [PATCH net-next 4/4] net: indirect call helpers for ipv4/ipv6 dst_check functions From: Brian Vazquez To: Brian Vazquez , Brian Vazquez , Eric Dumazet , "David S . Miller" Cc: linux-kernel@vger.kernel.org, netdev@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: brianvv This patch avoids the indirect call for the common case: ip6_dst_check and ipv4_dst_check Signed-off-by: brianvv --- include/net/dst.h | 7 ++++++- net/core/sock.c | 12 ++++++++++-- net/ipv4/route.c | 6 ++++-- net/ipv4/tcp_ipv4.c | 5 ++++- net/ipv6/route.c | 6 ++++-- net/ipv6/tcp_ipv6.c | 5 ++++- 6 files changed, 32 insertions(+), 9 deletions(-) diff --git a/include/net/dst.h b/include/net/dst.h index 9f474a79ed7d..26f134ad3a25 100644 --- a/include/net/dst.h +++ b/include/net/dst.h @@ -459,10 +459,15 @@ static inline int dst_input(struct sk_buff *skb) ip6_input, ip_local_deliver, skb); } +INDIRECT_CALLABLE_DECLARE(struct dst_entry *ip6_dst_check(struct dst_entry *, + u32)); +INDIRECT_CALLABLE_DECLARE(struct dst_entry *ipv4_dst_check(struct dst_entry *, + u32)); static inline struct dst_entry *dst_check(struct dst_entry *dst, u32 cookie) { if (dst->obsolete) - dst = dst->ops->check(dst, cookie); + dst = INDIRECT_CALL_INET(dst->ops->check, ip6_dst_check, + ipv4_dst_check, dst, cookie); return dst; } diff --git a/net/core/sock.c b/net/core/sock.c index 4fd7e785f177..753b831a9d70 100644 --- a/net/core/sock.c +++ b/net/core/sock.c @@ -526,11 +526,17 @@ int __sk_receive_skb(struct sock *sk, struct sk_buff *skb, } EXPORT_SYMBOL(__sk_receive_skb); +INDIRECT_CALLABLE_DECLARE(struct dst_entry *ip6_dst_check(struct dst_entry *, + u32)); +INDIRECT_CALLABLE_DECLARE(struct dst_entry *ipv4_dst_check(struct dst_entry *, + u32)); struct dst_entry *__sk_dst_check(struct sock *sk, u32 cookie) { struct dst_entry *dst = __sk_dst_get(sk); - if (dst && dst->obsolete && dst->ops->check(dst, cookie) == NULL) { + if (dst && dst->obsolete && + INDIRECT_CALL_INET(dst->ops->check, ip6_dst_check, ipv4_dst_check, + dst, cookie) == NULL) { sk_tx_queue_clear(sk); sk->sk_dst_pending_confirm = 0; RCU_INIT_POINTER(sk->sk_dst_cache, NULL); @@ -546,7 +552,9 @@ struct dst_entry *sk_dst_check(struct sock *sk, u32 cookie) { struct dst_entry *dst = sk_dst_get(sk); - if (dst && dst->obsolete && dst->ops->check(dst, cookie) == NULL) { + if (dst && dst->obsolete && + INDIRECT_CALL_INET(dst->ops->check, ip6_dst_check, ipv4_dst_check, + dst, cookie) == NULL) { sk_dst_reset(sk); dst_release(dst); return NULL; diff --git a/net/ipv4/route.c b/net/ipv4/route.c index 4fac91f8bd6c..f06dfba3d272 100644 --- a/net/ipv4/route.c +++ b/net/ipv4/route.c @@ -133,7 +133,8 @@ static int ip_rt_gc_timeout __read_mostly = RT_GC_TIMEOUT; * Interface to generic destination cache. */ -static struct dst_entry *ipv4_dst_check(struct dst_entry *dst, u32 cookie); +INDIRECT_CALLABLE_SCOPE +struct dst_entry *ipv4_dst_check(struct dst_entry *dst, u32 cookie); static unsigned int ipv4_default_advmss(const struct dst_entry *dst); INDIRECT_CALLABLE_SCOPE unsigned int ipv4_mtu(const struct dst_entry *dst); @@ -1188,7 +1189,8 @@ void ipv4_sk_redirect(struct sk_buff *skb, struct sock *sk) } EXPORT_SYMBOL_GPL(ipv4_sk_redirect); -static struct dst_entry *ipv4_dst_check(struct dst_entry *dst, u32 cookie) +INDIRECT_CALLABLE_SCOPE struct dst_entry *ipv4_dst_check(struct dst_entry *dst, + u32 cookie) { struct rtable *rt = (struct rtable *) dst; diff --git a/net/ipv4/tcp_ipv4.c b/net/ipv4/tcp_ipv4.c index af2338294598..aba5061024c7 100644 --- a/net/ipv4/tcp_ipv4.c +++ b/net/ipv4/tcp_ipv4.c @@ -1646,6 +1646,8 @@ u16 tcp_v4_get_syncookie(struct sock *sk, struct iphdr *iph, return mss; } +INDIRECT_CALLABLE_DECLARE(struct dst_entry *ipv4_dst_check(struct dst_entry *, + u32)); /* The socket must have it's spinlock held when we get * here, unless it is a TCP_LISTEN socket. * @@ -1665,7 +1667,8 @@ int tcp_v4_do_rcv(struct sock *sk, struct sk_buff *skb) sk_mark_napi_id(sk, skb); if (dst) { if (inet_sk(sk)->rx_dst_ifindex != skb->skb_iif || - !dst->ops->check(dst, 0)) { + !INDIRECT_CALL_1(dst->ops->check, ipv4_dst_check, + dst, 0)) { dst_release(dst); sk->sk_rx_dst = NULL; } diff --git a/net/ipv6/route.c b/net/ipv6/route.c index 22caee290b6c..071b5ff8f88f 100644 --- a/net/ipv6/route.c +++ b/net/ipv6/route.c @@ -81,7 +81,8 @@ enum rt6_nud_state { RT6_NUD_SUCCEED = 1 }; -static struct dst_entry *ip6_dst_check(struct dst_entry *dst, u32 cookie); +INDIRECT_CALLABLE_SCOPE +struct dst_entry *ip6_dst_check(struct dst_entry *dst, u32 cookie); static unsigned int ip6_default_advmss(const struct dst_entry *dst); INDIRECT_CALLABLE_SCOPE unsigned int ip6_mtu(const struct dst_entry *dst); @@ -2612,7 +2613,8 @@ static struct dst_entry *rt6_dst_from_check(struct rt6_info *rt, return NULL; } -static struct dst_entry *ip6_dst_check(struct dst_entry *dst, u32 cookie) +INDIRECT_CALLABLE_SCOPE struct dst_entry *ip6_dst_check(struct dst_entry *dst, + u32 cookie) { struct dst_entry *dst_ret; struct fib6_info *from; diff --git a/net/ipv6/tcp_ipv6.c b/net/ipv6/tcp_ipv6.c index 1a1510513739..9e61e4fda03e 100644 --- a/net/ipv6/tcp_ipv6.c +++ b/net/ipv6/tcp_ipv6.c @@ -1417,6 +1417,8 @@ static struct sock *tcp_v6_syn_recv_sock(const struct sock *sk, struct sk_buff * return NULL; } +INDIRECT_CALLABLE_DECLARE(struct dst_entry *ipv4_dst_check(struct dst_entry *, + u32)); /* The socket must have it's spinlock held when we get * here, unless it is a TCP_LISTEN socket. * @@ -1470,7 +1472,8 @@ static int tcp_v6_do_rcv(struct sock *sk, struct sk_buff *skb) sk_mark_napi_id(sk, skb); if (dst) { if (inet_sk(sk)->rx_dst_ifindex != skb->skb_iif || - dst->ops->check(dst, np->rx_dst_cookie) == NULL) { + INDIRECT_CALL_1(dst->ops->check, ip6_dst_check, + dst, np->rx_dst_cookie) == NULL) { dst_release(dst); sk->sk_rx_dst = NULL; } -- 2.29.2.576.ga3fc446d84-goog