Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp2388950pxb; Thu, 11 Feb 2021 11:03:23 -0800 (PST) X-Google-Smtp-Source: ABdhPJxl4dOEnb86BrD9AUFRVY01+e3Iz4nn9GzdV+/9kx4cDB74zR8RcQcRKX3tZQHAr+sqXxGU X-Received: by 2002:a50:b2a3:: with SMTP id p32mr3367324edd.358.1613070203057; Thu, 11 Feb 2021 11:03:23 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1613070203; cv=none; d=google.com; s=arc-20160816; b=mU8CGlp0buDjbqmrOsxV2NOWGmO8wrmd2pcp0bVaZCJzA+zwfv7DKYDy2ql6V6Zx50 NoM/Pb6cZPdaQC7Yk71mPAoyzxUlgtXY8j57W7X756g0QY85qyr7OP/mBEmh+RaR5L+5 H/uSSdtzasZjqCYeY5gZnKWvYt6WClOUM/JbaezTvuWRQAViI7KhwyFZIjqPt+dGnG2i Qcw/dL+Kn7qfd7V8EOUS0hS0W993WeOwAlUuvXekHKOXKuyN+e5CM6sq1PyZbsIvR7Qf 1yu4hmq9JgHir3U0vWlDwrPVPDknDmKB3xNgqnoRJk+R/t34fWAR8dvGCvbuga9qLiqC WayA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:reply-to:cc:from:to :dkim-signature:date; bh=CVHuxJMMBdenF3QDdgHyi0nBtTk42lZ72djCJbcI/CM=; b=vCW2lbO8UwD7Gbooui1mhVWyPQKXWGyCYzor7zLJlErlGnDXG6EMl3PXhTatL6TMUp 3CmChxJFIWxyeh9j1dFcGYK11s+9tOPGUTIZhsYnBxYGKfY3bpHmavMsma5T7G8FwNWK kEktpI4E0Cw2dxXp0taqAKD6onOedGMSenRHwv6kTRKoZIwg2TiHAZwnYe6AbsX+fjwP ZgnAji3erK3sFPLgcDwpj3iI0ct19GJSdFLyJzHNfYX/+kRD4hbZCOhoD4bQ15onK2C2 iIQm70R5ZRK6xhxGgIzZUdRa5O+i/A9thiK1S4CYbcVkp5NoypQX13u6O3qPl3RAllmU kHyA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@pm.me header.s=protonmail header.b=LTKQAxig; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=pm.me Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bu19si4548878edb.0.2021.02.11.11.02.58; Thu, 11 Feb 2021 11:03:23 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@pm.me header.s=protonmail header.b=LTKQAxig; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=pm.me Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231809AbhBKTAd (ORCPT + 99 others); Thu, 11 Feb 2021 14:00:33 -0500 Received: from mail-40131.protonmail.ch ([185.70.40.131]:10687 "EHLO mail-40131.protonmail.ch" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229993AbhBKS4M (ORCPT ); Thu, 11 Feb 2021 13:56:12 -0500 Date: Thu, 11 Feb 2021 18:55:24 +0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=pm.me; s=protonmail; t=1613069728; bh=CVHuxJMMBdenF3QDdgHyi0nBtTk42lZ72djCJbcI/CM=; h=Date:To:From:Cc:Reply-To:Subject:In-Reply-To:References:From; b=LTKQAxigixf/ucV1oKJZfecyjF+09ujGoKJrw/vWcM6uQgW7Gy97wJysqN739tc6T +/nMlPR+mMl8FcTjJNbWiWheaiewJHLMtNkBH6xkhNqp0K/aIXBuGFZ3wS3EORCqK+ Bf8xkmyYwiyXpG5dxaDQkPA8mgG5JjCriEPgn8/JWKqfxUYb8+0V7k+hYKnoGmTaVg OAoahaI9BkDiUCaraziN3CktK9O8w+FCheIdAQTKDxVeUKFIplgrFEAMeT4Zfi4Yrf itPq2Yy9WFvjflrzatQOPOFG3tPDgdqmWMqPcEGbK1apPkv0IhR96ziO4vqJGU0MZD E9uULXdi573kg== To: "David S. Miller" , Jakub Kicinski From: Alexander Lobakin Cc: Jonathan Lemon , Eric Dumazet , Dmitry Vyukov , Willem de Bruijn , Alexander Lobakin , Randy Dunlap , Kevin Hao , Pablo Neira Ayuso , Jakub Sitnicki , Marco Elver , Dexuan Cui , Paolo Abeni , Jesper Dangaard Brouer , Alexander Duyck , Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , Taehee Yoo , Cong Wang , =?utf-8?Q?Bj=C3=B6rn_T=C3=B6pel?= , Miaohe Lin , Guillaume Nault , Yonghong Song , zhudi , Michal Kubecek , Marcelo Ricardo Leitner , Dmitry Safonov <0x7f454c46@gmail.com>, Yang Yingliang , Florian Westphal , Edward Cree , linux-kernel@vger.kernel.org, netdev@vger.kernel.org Reply-To: Alexander Lobakin Subject: [PATCH v5 net-next 11/11] skbuff: queue NAPI_MERGED_FREE skbs into NAPI cache instead of freeing Message-ID: <20210211185220.9753-12-alobakin@pm.me> In-Reply-To: <20210211185220.9753-1-alobakin@pm.me> References: <20210211185220.9753-1-alobakin@pm.me> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-1.2 required=10.0 tests=ALL_TRUSTED,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF shortcircuit=no autolearn=disabled version=3.4.4 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on mailout.protonmail.ch Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org napi_frags_finish() and napi_skb_finish() can only be called inside NAPI Rx context, so we can feed NAPI cache with skbuff_heads that got NAPI_MERGED_FREE verdict instead of immediate freeing. Replace __kfree_skb() with __kfree_skb_defer() in napi_skb_finish() and move napi_skb_free_stolen_head() to skbuff.c, so it can drop skbs to NAPI cache. As many drivers call napi_alloc_skb()/napi_get_frags() on their receive path, this becomes especially useful. Signed-off-by: Alexander Lobakin --- include/linux/skbuff.h | 1 + net/core/dev.c | 9 +-------- net/core/skbuff.c | 12 +++++++++--- 3 files changed, 11 insertions(+), 11 deletions(-) diff --git a/include/linux/skbuff.h b/include/linux/skbuff.h index 906122eac82a..6d0a33d1c0db 100644 --- a/include/linux/skbuff.h +++ b/include/linux/skbuff.h @@ -2921,6 +2921,7 @@ static inline struct sk_buff *napi_alloc_skb(struct n= api_struct *napi, } void napi_consume_skb(struct sk_buff *skb, int budget); =20 +void napi_skb_free_stolen_head(struct sk_buff *skb); void __kfree_skb_defer(struct sk_buff *skb); =20 /** diff --git a/net/core/dev.c b/net/core/dev.c index 4154d4683bb9..6d2c7ae90a23 100644 --- a/net/core/dev.c +++ b/net/core/dev.c @@ -6095,13 +6095,6 @@ struct packet_offload *gro_find_complete_by_type(__b= e16 type) } EXPORT_SYMBOL(gro_find_complete_by_type); =20 -static void napi_skb_free_stolen_head(struct sk_buff *skb) -{ -=09skb_dst_drop(skb); -=09skb_ext_put(skb); -=09kmem_cache_free(skbuff_head_cache, skb); -} - static gro_result_t napi_skb_finish(struct napi_struct *napi, =09=09=09=09 struct sk_buff *skb, =09=09=09=09 gro_result_t ret) @@ -6115,7 +6108,7 @@ static gro_result_t napi_skb_finish(struct napi_struc= t *napi, =09=09if (NAPI_GRO_CB(skb)->free =3D=3D NAPI_GRO_FREE_STOLEN_HEAD) =09=09=09napi_skb_free_stolen_head(skb); =09=09else -=09=09=09__kfree_skb(skb); +=09=09=09__kfree_skb_defer(skb); =09=09break; =20 =09case GRO_HELD: diff --git a/net/core/skbuff.c b/net/core/skbuff.c index c8f3ea1d9fbb..85f0768a1144 100644 --- a/net/core/skbuff.c +++ b/net/core/skbuff.c @@ -917,9 +917,6 @@ static void napi_skb_cache_put(struct sk_buff *skb) =09struct napi_alloc_cache *nc =3D this_cpu_ptr(&napi_alloc_cache); =09u32 i; =20 -=09/* drop skb->head and call any destructors for packet */ -=09skb_release_all(skb); - =09kasan_poison_object_data(skbuff_head_cache, skb); =09nc->skb_cache[nc->skb_count++] =3D skb; =20 @@ -936,6 +933,14 @@ static void napi_skb_cache_put(struct sk_buff *skb) =20 void __kfree_skb_defer(struct sk_buff *skb) { +=09skb_release_all(skb); +=09napi_skb_cache_put(skb); +} + +void napi_skb_free_stolen_head(struct sk_buff *skb) +{ +=09skb_dst_drop(skb); +=09skb_ext_put(skb); =09napi_skb_cache_put(skb); } =20 @@ -961,6 +966,7 @@ void napi_consume_skb(struct sk_buff *skb, int budget) =09=09return; =09} =20 +=09skb_release_all(skb); =09napi_skb_cache_put(skb); } EXPORT_SYMBOL(napi_consume_skb); --=20 2.30.1