diff options
author | David Gibson <david@gibson.dropbear.id.au> | 2024-01-16 11:50:38 +1100 |
---|---|---|
committer | Stefano Brivio <sbrivio@redhat.com> | 2024-01-22 23:35:25 +0100 |
commit | 02e092b4feb8abf9f9beb77a9155ad75b0e4e3d5 (patch) | |
tree | b9f2358b8cf8b72b5c8d306b9618f4898d5107fb /passt.c | |
parent | 70121ca1ec8480805569a77e71a00d4add4b29af (diff) | |
download | passt-02e092b4feb8abf9f9beb77a9155ad75b0e4e3d5.tar passt-02e092b4feb8abf9f9beb77a9155ad75b0e4e3d5.tar.gz passt-02e092b4feb8abf9f9beb77a9155ad75b0e4e3d5.tar.bz2 passt-02e092b4feb8abf9f9beb77a9155ad75b0e4e3d5.tar.lz passt-02e092b4feb8abf9f9beb77a9155ad75b0e4e3d5.tar.xz passt-02e092b4feb8abf9f9beb77a9155ad75b0e4e3d5.tar.zst passt-02e092b4feb8abf9f9beb77a9155ad75b0e4e3d5.zip |
tcp, tcp_splice: Avoid double layered dispatch for connected TCP sockets
Currently connected TCP sockets have the same epoll type, whether they're
for a "tap" connection or a spliced connection. This means that
tcp_sock_handler() has to do a secondary check on the type of the
connection to call the right function. We can avoid this by adding a new
epoll type and dispatching directly to the right thing.
Signed-off-by: David Gibson <david@gibson.dropbear.id.au>
Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
Diffstat (limited to 'passt.c')
-rw-r--r-- | passt.c | 8 |
1 files changed, 6 insertions, 2 deletions
@@ -50,6 +50,7 @@ #include "pasta.h" #include "arch.h" #include "log.h" +#include "tcp_splice.h" #define EPOLL_EVENTS 8 @@ -61,6 +62,7 @@ char pkt_buf[PKT_BUF_BYTES] __attribute__ ((aligned(PAGE_SIZE))); char *epoll_type_str[] = { [EPOLL_TYPE_TCP] = "connected TCP socket", + [EPOLL_TYPE_TCP_SPLICE] = "connected spliced TCP socket", [EPOLL_TYPE_TCP_LISTEN] = "listening TCP socket", [EPOLL_TYPE_TCP_TIMER] = "TCP timer", [EPOLL_TYPE_UDP] = "UDP socket", @@ -373,8 +375,10 @@ loop: pasta_netns_quit_handler(&c, quit_fd); break; case EPOLL_TYPE_TCP: - if (!c.no_tcp) - tcp_sock_handler(&c, ref, eventmask); + tcp_sock_handler(&c, ref, eventmask); + break; + case EPOLL_TYPE_TCP_SPLICE: + tcp_splice_sock_handler(&c, ref, eventmask); break; case EPOLL_TYPE_TCP_LISTEN: tcp_listen_handler(&c, ref, &now); |