sock_map: Kill sock_map_link_no_progs()

Now we can fold sock_map_link_no_progs() into sock_map_link()
and get rid of sock_map_link_no_progs().

Signed-off-by: Cong Wang <cong.wang@bytedance.com>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Link: https://lore.kernel.org/bpf/20210331023237.41094-9-xiyou.wangcong@gmail.com
This commit is contained in:
Cong Wang 2021-03-30 19:32:29 -07:00 коммит произвёл Alexei Starovoitov
Родитель 2004fdbd8a
Коммит b017055255
1 изменённых файлов: 15 добавлений и 40 удалений

Просмотреть файл

@ -225,13 +225,24 @@ out:
return psock; return psock;
} }
static bool sock_map_redirect_allowed(const struct sock *sk);
static int sock_map_link(struct bpf_map *map, struct sock *sk) static int sock_map_link(struct bpf_map *map, struct sock *sk)
{ {
struct bpf_prog *msg_parser, *stream_parser, *stream_verdict;
struct sk_psock_progs *progs = sock_map_progs(map); struct sk_psock_progs *progs = sock_map_progs(map);
struct bpf_prog *stream_verdict = NULL;
struct bpf_prog *stream_parser = NULL;
struct bpf_prog *msg_parser = NULL;
struct sk_psock *psock; struct sk_psock *psock;
int ret; int ret;
/* Only sockets we can redirect into/from in BPF need to hold
* refs to parser/verdict progs and have their sk_data_ready
* and sk_write_space callbacks overridden.
*/
if (!sock_map_redirect_allowed(sk))
goto no_progs;
stream_verdict = READ_ONCE(progs->stream_verdict); stream_verdict = READ_ONCE(progs->stream_verdict);
if (stream_verdict) { if (stream_verdict) {
stream_verdict = bpf_prog_inc_not_zero(stream_verdict); stream_verdict = bpf_prog_inc_not_zero(stream_verdict);
@ -257,6 +268,7 @@ static int sock_map_link(struct bpf_map *map, struct sock *sk)
} }
} }
no_progs:
psock = sock_map_psock_get_checked(sk); psock = sock_map_psock_get_checked(sk);
if (IS_ERR(psock)) { if (IS_ERR(psock)) {
ret = PTR_ERR(psock); ret = PTR_ERR(psock);
@ -316,27 +328,6 @@ out_put_stream_verdict:
return ret; return ret;
} }
static int sock_map_link_no_progs(struct bpf_map *map, struct sock *sk)
{
struct sk_psock *psock;
int ret;
psock = sock_map_psock_get_checked(sk);
if (IS_ERR(psock))
return PTR_ERR(psock);
if (!psock) {
psock = sk_psock_init(sk, map->numa_node);
if (IS_ERR(psock))
return PTR_ERR(psock);
}
ret = sock_map_init_proto(sk, psock);
if (ret < 0)
sk_psock_put(sk, psock);
return ret;
}
static void sock_map_free(struct bpf_map *map) static void sock_map_free(struct bpf_map *map)
{ {
struct bpf_stab *stab = container_of(map, struct bpf_stab, map); struct bpf_stab *stab = container_of(map, struct bpf_stab, map);
@ -467,8 +458,6 @@ static int sock_map_get_next_key(struct bpf_map *map, void *key, void *next)
return 0; return 0;
} }
static bool sock_map_redirect_allowed(const struct sock *sk);
static int sock_map_update_common(struct bpf_map *map, u32 idx, static int sock_map_update_common(struct bpf_map *map, u32 idx,
struct sock *sk, u64 flags) struct sock *sk, u64 flags)
{ {
@ -488,14 +477,7 @@ static int sock_map_update_common(struct bpf_map *map, u32 idx,
if (!link) if (!link)
return -ENOMEM; return -ENOMEM;
/* Only sockets we can redirect into/from in BPF need to hold ret = sock_map_link(map, sk);
* refs to parser/verdict progs and have their sk_data_ready
* and sk_write_space callbacks overridden.
*/
if (sock_map_redirect_allowed(sk))
ret = sock_map_link(map, sk);
else
ret = sock_map_link_no_progs(map, sk);
if (ret < 0) if (ret < 0)
goto out_free; goto out_free;
@ -1000,14 +982,7 @@ static int sock_hash_update_common(struct bpf_map *map, void *key,
if (!link) if (!link)
return -ENOMEM; return -ENOMEM;
/* Only sockets we can redirect into/from in BPF need to hold ret = sock_map_link(map, sk);
* refs to parser/verdict progs and have their sk_data_ready
* and sk_write_space callbacks overridden.
*/
if (sock_map_redirect_allowed(sk))
ret = sock_map_link(map, sk);
else
ret = sock_map_link_no_progs(map, sk);
if (ret < 0) if (ret < 0)
goto out_free; goto out_free;