netfilter: nf_flow_table: cache mtu in struct flow_offload_tuple
Reduces the number of cache lines touched in the offload forwarding
path. This is safe because PMTU limits are bypassed for the forwarding
path (see commit f87c10a8aa
for more details).
Signed-off-by: Felix Fietkau <nbd@nbd.name>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
This commit is contained in:

committed by
Pablo Neira Ayuso

parent
07cb9623ee
commit
4f3780c004
@@ -173,7 +173,7 @@ static int nf_flow_tuple_ipv6(struct sk_buff *skb, const struct net_device *dev,
|
||||
}
|
||||
|
||||
/* Based on ip_exceeds_mtu(). */
|
||||
static bool __nf_flow_exceeds_mtu(const struct sk_buff *skb, unsigned int mtu)
|
||||
static bool nf_flow_exceeds_mtu(const struct sk_buff *skb, unsigned int mtu)
|
||||
{
|
||||
if (skb->len <= mtu)
|
||||
return false;
|
||||
@@ -184,17 +184,6 @@ static bool __nf_flow_exceeds_mtu(const struct sk_buff *skb, unsigned int mtu)
|
||||
return true;
|
||||
}
|
||||
|
||||
static bool nf_flow_exceeds_mtu(struct sk_buff *skb, const struct rt6_info *rt)
|
||||
{
|
||||
u32 mtu;
|
||||
|
||||
mtu = ip6_dst_mtu_forward(&rt->dst);
|
||||
if (__nf_flow_exceeds_mtu(skb, mtu))
|
||||
return true;
|
||||
|
||||
return false;
|
||||
}
|
||||
|
||||
unsigned int
|
||||
nf_flow_offload_ipv6_hook(void *priv, struct sk_buff *skb,
|
||||
const struct nf_hook_state *state)
|
||||
@@ -225,9 +214,9 @@ nf_flow_offload_ipv6_hook(void *priv, struct sk_buff *skb,
|
||||
|
||||
dir = tuplehash->tuple.dir;
|
||||
flow = container_of(tuplehash, struct flow_offload, tuplehash[dir]);
|
||||
|
||||
rt = (struct rt6_info *)flow->tuplehash[dir].tuple.dst_cache;
|
||||
if (unlikely(nf_flow_exceeds_mtu(skb, rt)))
|
||||
|
||||
if (unlikely(nf_flow_exceeds_mtu(skb, flow->tuplehash[dir].tuple.mtu)))
|
||||
return NF_ACCEPT;
|
||||
|
||||
if (skb_try_make_writable(skb, sizeof(*ip6h)))
|
||||
|
Reference in New Issue
Block a user