diff options
author | David Gibson <david@gibson.dropbear.id.au> | 2024-01-16 11:50:38 +1100 |
---|---|---|
committer | Stefano Brivio <sbrivio@redhat.com> | 2024-01-22 23:35:25 +0100 |
commit | 02e092b4feb8abf9f9beb77a9155ad75b0e4e3d5 (patch) | |
tree | b9f2358b8cf8b72b5c8d306b9618f4898d5107fb /tcp.c | |
parent | 70121ca1ec8480805569a77e71a00d4add4b29af (diff) | |
download | passt-02e092b4feb8abf9f9beb77a9155ad75b0e4e3d5.tar passt-02e092b4feb8abf9f9beb77a9155ad75b0e4e3d5.tar.gz passt-02e092b4feb8abf9f9beb77a9155ad75b0e4e3d5.tar.bz2 passt-02e092b4feb8abf9f9beb77a9155ad75b0e4e3d5.tar.lz passt-02e092b4feb8abf9f9beb77a9155ad75b0e4e3d5.tar.xz passt-02e092b4feb8abf9f9beb77a9155ad75b0e4e3d5.tar.zst passt-02e092b4feb8abf9f9beb77a9155ad75b0e4e3d5.zip |
tcp, tcp_splice: Avoid double layered dispatch for connected TCP sockets
Currently connected TCP sockets have the same epoll type, whether they're
for a "tap" connection or a spliced connection. This means that
tcp_sock_handler() has to do a secondary check on the type of the
connection to call the right function. We can avoid this by adding a new
epoll type and dispatching directly to the right thing.
Signed-off-by: David Gibson <david@gibson.dropbear.id.au>
Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
Diffstat (limited to 'tcp.c')
-rw-r--r-- | tcp.c | 36 |
1 files changed, 8 insertions, 28 deletions
@@ -2804,14 +2804,18 @@ void tcp_timer_handler(struct ctx *c, union epoll_ref ref) } /** - * tcp_tap_sock_handler() - Handle new data from non-spliced socket + * tcp_sock_handler() - Handle new data from non-spliced socket * @c: Execution context - * @conn: Connection state + * @ref: epoll reference * @events: epoll events bitmap */ -static void tcp_tap_sock_handler(struct ctx *c, struct tcp_tap_conn *conn, - uint32_t events) +void tcp_sock_handler(struct ctx *c, union epoll_ref ref, uint32_t events) { + struct tcp_tap_conn *conn = CONN(ref.flowside.flow); + + ASSERT(conn->f.type == FLOW_TCP); + ASSERT(ref.flowside.side == SOCKSIDE); + if (conn->events == CLOSED) return; @@ -2859,30 +2863,6 @@ static void tcp_tap_sock_handler(struct ctx *c, struct tcp_tap_conn *conn, } /** - * tcp_sock_handler() - Handle new data from socket, or timerfd event - * @c: Execution context - * @ref: epoll reference - * @events: epoll events bitmap - */ -void tcp_sock_handler(struct ctx *c, union epoll_ref ref, uint32_t events) -{ - union flow *flow = FLOW(ref.flowside.flow); - - switch (flow->f.type) { - case FLOW_TCP: - tcp_tap_sock_handler(c, &flow->tcp, events); - break; - case FLOW_TCP_SPLICE: - tcp_splice_sock_handler(c, &flow->tcp_splice, ref.flowside.side, - events); - break; - default: - die("Unexpected %s in tcp_sock_handler_compact()", - FLOW_TYPE(&flow->f)); - } -} - -/** * tcp_sock_init_af() - Initialise listening socket for a given af and port * @c: Execution context * @af: Address family to listen on |