net/tcp: use deferred jump label for TCP acked data hook
authorJakub Kicinski <jakub.kicinski@netronome.com>
Wed, 8 May 2019 23:46:14 +0000 (16:46 -0700)
committerDavid S. Miller <davem@davemloft.net>
Thu, 9 May 2019 18:13:57 +0000 (11:13 -0700)
User space can flip the clean_acked_data_enabled static branch
on and off with TLS offload when CONFIG_TLS_DEVICE is enabled.
jump_label.h suggests we use the delayed version in this case.

Deferred branches now also don't take the branch mutex on
decrement, so we avoid potential locking issues.

Signed-off-by: Jakub Kicinski <jakub.kicinski@netronome.com>
Reviewed-by: Simon Horman <simon.horman@netronome.com>
Reviewed-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
include/net/tcp.h
net/ipv4/tcp_input.c
net/tls/tls_device.c

index 7cf1181630a3a1fb36501a25bff8efb67c1184e5..985aa5db570cab1d876e7042dffe0f52f90978b0 100644 (file)
@@ -2198,7 +2198,7 @@ extern struct static_key_false tcp_have_smc;
 void clean_acked_data_enable(struct inet_connection_sock *icsk,
                             void (*cad)(struct sock *sk, u32 ack_seq));
 void clean_acked_data_disable(struct inet_connection_sock *icsk);
-
+void clean_acked_data_flush(void);
 #endif
 
 #endif /* _TCP_H */
index 077d9abdfcf503b39c6d7e15fdec18ce408c4119..20f6fac5882efc462263ec3e7a939e9bef94fcf6 100644 (file)
@@ -77,7 +77,7 @@
 #include <asm/unaligned.h>
 #include <linux/errqueue.h>
 #include <trace/events/tcp.h>
-#include <linux/static_key.h>
+#include <linux/jump_label_ratelimit.h>
 #include <net/busy_poll.h>
 
 int sysctl_tcp_max_orphans __read_mostly = NR_FILE;
@@ -113,22 +113,28 @@ int sysctl_tcp_max_orphans __read_mostly = NR_FILE;
 #define REXMIT_NEW     2 /* FRTO-style transmit of unsent/new packets */
 
 #if IS_ENABLED(CONFIG_TLS_DEVICE)
-static DEFINE_STATIC_KEY_FALSE(clean_acked_data_enabled);
+static DEFINE_STATIC_KEY_DEFERRED_FALSE(clean_acked_data_enabled, HZ);
 
 void clean_acked_data_enable(struct inet_connection_sock *icsk,
                             void (*cad)(struct sock *sk, u32 ack_seq))
 {
        icsk->icsk_clean_acked = cad;
-       static_branch_inc(&clean_acked_data_enabled);
+       static_branch_inc(&clean_acked_data_enabled.key);
 }
 EXPORT_SYMBOL_GPL(clean_acked_data_enable);
 
 void clean_acked_data_disable(struct inet_connection_sock *icsk)
 {
-       static_branch_dec(&clean_acked_data_enabled);
+       static_branch_slow_dec_deferred(&clean_acked_data_enabled);
        icsk->icsk_clean_acked = NULL;
 }
 EXPORT_SYMBOL_GPL(clean_acked_data_disable);
+
+void clean_acked_data_flush(void)
+{
+       static_key_deferred_flush(&clean_acked_data_enabled);
+}
+EXPORT_SYMBOL_GPL(clean_acked_data_flush);
 #endif
 
 static void tcp_gro_dev_warn(struct sock *sk, const struct sk_buff *skb,
@@ -3598,7 +3604,7 @@ static int tcp_ack(struct sock *sk, const struct sk_buff *skb, int flag)
                icsk->icsk_retransmits = 0;
 
 #if IS_ENABLED(CONFIG_TLS_DEVICE)
-               if (static_branch_unlikely(&clean_acked_data_enabled))
+               if (static_branch_unlikely(&clean_acked_data_enabled.key))
                        if (icsk->icsk_clean_acked)
                                icsk->icsk_clean_acked(sk, ack);
 #endif
index e225c81e6b357ea40028723bc890f3277672cfa8..ad1580ac097ae8851011330dc70ced1855fb921b 100644 (file)
@@ -1036,4 +1036,5 @@ void __exit tls_device_cleanup(void)
 {
        unregister_netdevice_notifier(&tls_dev_notifier);
        flush_work(&tls_device_gc_work);
+       clean_acked_data_flush();
 }