public inbox for netdev@vger.kernel.org
 help / color / mirror / Atom feed
From: John Fastabend <john.fastabend@gmail.com>
To: davem@davemloft.net, ast@kernel.org, daniel@iogearbox.net,
	davejwatson@fb.com
Cc: netdev@vger.kernel.org
Subject: [bpf-next PATCH v2 01/18] sock: make static tls function alloc_sg generic sock helper
Date: Mon, 12 Mar 2018 12:23:09 -0700	[thread overview]
Message-ID: <20180312192308.8039.877.stgit@john-Precision-Tower-5810> (raw)
In-Reply-To: <20180312192034.8039.70022.stgit@john-Precision-Tower-5810>

The TLS ULP module builds scatterlists from a sock using
page_frag_refill(). This is going to be useful for other ULPs
so move it into sock file for more general use.

In the process remove useless goto at end of while loop.

Signed-off-by: John Fastabend <john.fastabend@gmail.com>
Acked-by: David S. Miller <davem@davemloft.net>
---
 include/net/sock.h |    4 +++
 net/core/sock.c    |   56 ++++++++++++++++++++++++++++++++++++++++++
 net/tls/tls_sw.c   |   69 +++++-----------------------------------------------
 3 files changed, 67 insertions(+), 62 deletions(-)

diff --git a/include/net/sock.h b/include/net/sock.h
index b962458..447150c 100644
--- a/include/net/sock.h
+++ b/include/net/sock.h
@@ -2141,6 +2141,10 @@ static inline struct page_frag *sk_page_frag(struct sock *sk)
 
 bool sk_page_frag_refill(struct sock *sk, struct page_frag *pfrag);
 
+int sk_alloc_sg(struct sock *sk, int len, struct scatterlist *sg,
+		int *sg_num_elem, unsigned int *sg_size,
+		int first_coalesce);
+
 /*
  *	Default write policy as shown to user space via poll/select/SIGIO
  */
diff --git a/net/core/sock.c b/net/core/sock.c
index 507d8c6..4bda3e9 100644
--- a/net/core/sock.c
+++ b/net/core/sock.c
@@ -2238,6 +2238,62 @@ bool sk_page_frag_refill(struct sock *sk, struct page_frag *pfrag)
 }
 EXPORT_SYMBOL(sk_page_frag_refill);
 
+int sk_alloc_sg(struct sock *sk, int len, struct scatterlist *sg,
+		int *sg_num_elem, unsigned int *sg_size,
+		int first_coalesce)
+{
+	struct page_frag *pfrag;
+	unsigned int size = *sg_size;
+	int num_elem = *sg_num_elem, use = 0, rc = 0;
+	struct scatterlist *sge;
+	unsigned int orig_offset;
+
+	len -= size;
+	pfrag = sk_page_frag(sk);
+
+	while (len > 0) {
+		if (!sk_page_frag_refill(sk, pfrag)) {
+			rc = -ENOMEM;
+			goto out;
+		}
+
+		use = min_t(int, len, pfrag->size - pfrag->offset);
+
+		if (!sk_wmem_schedule(sk, use)) {
+			rc = -ENOMEM;
+			goto out;
+		}
+
+		sk_mem_charge(sk, use);
+		size += use;
+		orig_offset = pfrag->offset;
+		pfrag->offset += use;
+
+		sge = sg + num_elem - 1;
+		if (num_elem > first_coalesce && sg_page(sg) == pfrag->page &&
+		    sg->offset + sg->length == orig_offset) {
+			sg->length += use;
+		} else {
+			sge++;
+			sg_unmark_end(sge);
+			sg_set_page(sge, pfrag->page, use, orig_offset);
+			get_page(pfrag->page);
+			++num_elem;
+			if (num_elem == MAX_SKB_FRAGS) {
+				rc = -ENOSPC;
+				break;
+			}
+		}
+
+		len -= use;
+	}
+out:
+	*sg_size = size;
+	*sg_num_elem = num_elem;
+	return rc;
+}
+EXPORT_SYMBOL(sk_alloc_sg);
+
 static void __lock_sock(struct sock *sk)
 	__releases(&sk->sk_lock.slock)
 	__acquires(&sk->sk_lock.slock)
diff --git a/net/tls/tls_sw.c b/net/tls/tls_sw.c
index f26376e..0fc8a24 100644
--- a/net/tls/tls_sw.c
+++ b/net/tls/tls_sw.c
@@ -87,71 +87,16 @@ static void trim_both_sgl(struct sock *sk, int target_size)
 		target_size);
 }
 
-static int alloc_sg(struct sock *sk, int len, struct scatterlist *sg,
-		    int *sg_num_elem, unsigned int *sg_size,
-		    int first_coalesce)
-{
-	struct page_frag *pfrag;
-	unsigned int size = *sg_size;
-	int num_elem = *sg_num_elem, use = 0, rc = 0;
-	struct scatterlist *sge;
-	unsigned int orig_offset;
-
-	len -= size;
-	pfrag = sk_page_frag(sk);
-
-	while (len > 0) {
-		if (!sk_page_frag_refill(sk, pfrag)) {
-			rc = -ENOMEM;
-			goto out;
-		}
-
-		use = min_t(int, len, pfrag->size - pfrag->offset);
-
-		if (!sk_wmem_schedule(sk, use)) {
-			rc = -ENOMEM;
-			goto out;
-		}
-
-		sk_mem_charge(sk, use);
-		size += use;
-		orig_offset = pfrag->offset;
-		pfrag->offset += use;
-
-		sge = sg + num_elem - 1;
-		if (num_elem > first_coalesce && sg_page(sg) == pfrag->page &&
-		    sg->offset + sg->length == orig_offset) {
-			sg->length += use;
-		} else {
-			sge++;
-			sg_unmark_end(sge);
-			sg_set_page(sge, pfrag->page, use, orig_offset);
-			get_page(pfrag->page);
-			++num_elem;
-			if (num_elem == MAX_SKB_FRAGS) {
-				rc = -ENOSPC;
-				break;
-			}
-		}
-
-		len -= use;
-	}
-	goto out;
-
-out:
-	*sg_size = size;
-	*sg_num_elem = num_elem;
-	return rc;
-}
-
 static int alloc_encrypted_sg(struct sock *sk, int len)
 {
 	struct tls_context *tls_ctx = tls_get_ctx(sk);
 	struct tls_sw_context *ctx = tls_sw_ctx(tls_ctx);
 	int rc = 0;
 
-	rc = alloc_sg(sk, len, ctx->sg_encrypted_data,
-		      &ctx->sg_encrypted_num_elem, &ctx->sg_encrypted_size, 0);
+	rc = sk_alloc_sg(sk, len,
+			 ctx->sg_encrypted_data,
+			 &ctx->sg_encrypted_num_elem,
+			 &ctx->sg_encrypted_size, 0);
 
 	return rc;
 }
@@ -162,9 +107,9 @@ static int alloc_plaintext_sg(struct sock *sk, int len)
 	struct tls_sw_context *ctx = tls_sw_ctx(tls_ctx);
 	int rc = 0;
 
-	rc = alloc_sg(sk, len, ctx->sg_plaintext_data,
-		      &ctx->sg_plaintext_num_elem, &ctx->sg_plaintext_size,
-		      tls_ctx->pending_open_record_frags);
+	rc = sk_alloc_sg(sk, len, ctx->sg_plaintext_data,
+			 &ctx->sg_plaintext_num_elem, &ctx->sg_plaintext_size,
+			 tls_ctx->pending_open_record_frags);
 
 	return rc;
 }

  reply	other threads:[~2018-03-12 19:23 UTC|newest]

Thread overview: 49+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-03-12 19:23 [bpf-next PATCH v2 00/18] bpf,sockmap: sendmsg/sendfile ULP John Fastabend
2018-03-12 19:23 ` John Fastabend [this message]
2018-03-12 19:23 ` [bpf-next PATCH v2 02/18] sockmap: convert refcnt to an atomic refcnt John Fastabend
2018-03-12 19:23 ` [bpf-next PATCH v2 03/18] net: do_tcp_sendpages flag to avoid SKBTX_SHARED_FRAG John Fastabend
2018-03-15 18:40   ` David Miller
2018-03-12 19:23 ` [bpf-next PATCH v2 04/18] net: generalize sk_alloc_sg to work with scatterlist rings John Fastabend
2018-03-12 19:23 ` [bpf-next PATCH v2 05/18] bpf: create tcp_bpf_ulp allowing BPF to monitor socket TX/RX data John Fastabend
2018-03-15 18:41   ` David Miller
2018-03-15 21:59   ` Alexei Starovoitov
2018-03-15 22:08     ` John Fastabend
2018-03-15 22:17     ` Daniel Borkmann
2018-03-15 22:20       ` Alexei Starovoitov
2018-03-15 22:55         ` Daniel Borkmann
2018-03-15 23:06           ` Alexei Starovoitov
2018-03-16  0:37             ` Daniel Borkmann
2018-03-16 16:47               ` John Fastabend
2018-03-12 19:23 ` [bpf-next PATCH v2 06/18] bpf: sockmap, add bpf_msg_apply_bytes() helper John Fastabend
2018-03-15 18:41   ` David Miller
2018-03-15 20:32   ` Daniel Borkmann
2018-03-15 22:02     ` John Fastabend
2018-03-15 21:45   ` Alexei Starovoitov
2018-03-15 21:59     ` John Fastabend
2018-03-12 19:23 ` [bpf-next PATCH v2 07/18] bpf: sockmap, add msg_cork_bytes() helper John Fastabend
2018-03-15 18:41   ` David Miller
2018-03-12 19:23 ` [bpf-next PATCH v2 08/18] bpf: sk_msg program helper bpf_sk_msg_pull_data John Fastabend
2018-03-15 18:42   ` David Miller
2018-03-15 20:25   ` Daniel Borkmann
2018-03-12 19:23 ` [bpf-next PATCH v2 09/18] bpf: add map tests for BPF_PROG_TYPE_SK_MSG John Fastabend
2018-03-15 18:42   ` David Miller
2018-03-12 19:23 ` [bpf-next PATCH v2 10/18] bpf: add verifier " John Fastabend
2018-03-15 18:42   ` David Miller
2018-03-12 19:24 ` [bpf-next PATCH v2 11/18] bpf: sockmap sample, add option to attach SK_MSG program John Fastabend
2018-03-15 18:42   ` David Miller
2018-03-12 19:24 ` [bpf-next PATCH v2 12/18] bpf: sockmap sample, add sendfile test John Fastabend
2018-03-15 18:42   ` David Miller
2018-03-12 19:24 ` [bpf-next PATCH v2 13/18] bpf: sockmap sample, add data verification option John Fastabend
2018-03-15 18:42   ` David Miller
2018-03-12 19:24 ` [bpf-next PATCH v2 14/18] bpf: sockmap, add sample option to test apply_bytes helper John Fastabend
2018-03-15 18:42   ` David Miller
2018-03-12 19:24 ` [bpf-next PATCH v2 15/18] bpf: sockmap sample support for bpf_msg_cork_bytes() John Fastabend
2018-03-15 18:42   ` David Miller
2018-03-15 20:15   ` Alexei Starovoitov
2018-03-15 22:04     ` John Fastabend
2018-03-12 19:24 ` [bpf-next PATCH v2 16/18] bpf: sockmap add SK_DROP tests John Fastabend
2018-03-15 18:43   ` David Miller
2018-03-12 19:24 ` [bpf-next PATCH v2 17/18] bpf: sockmap sample test for bpf_msg_pull_data John Fastabend
2018-03-15 18:43   ` David Miller
2018-03-12 19:24 ` [bpf-next PATCH v2 18/18] bpf: sockmap test script John Fastabend
2018-03-15 18:43   ` David Miller

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20180312192308.8039.877.stgit@john-Precision-Tower-5810 \
    --to=john.fastabend@gmail.com \
    --cc=ast@kernel.org \
    --cc=daniel@iogearbox.net \
    --cc=davejwatson@fb.com \
    --cc=davem@davemloft.net \
    --cc=netdev@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox