From nobody Tue Nov 26 11:44:10 2024 Received: from out30-101.freemail.mail.aliyun.com (out30-101.freemail.mail.aliyun.com [115.124.30.101]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 5B133EADC; Fri, 18 Oct 2024 11:45:45 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=115.124.30.101 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1729251949; cv=none; b=q+O4ZvTdlRhqMzHrdERRIRfUwNNftZY+7Jl4QhcWVWNMmlkiE00J4zYLkxgWxQe3b3MkzNlCmHWDr4PZyr9tOCCqqu5b5sjd41gxAEMQJRdrqUYc/95d1yhXF9wI6TCZuanwcRwPCeAbT+V8rNVqPX5R2yst99IhoZ2lWyCETrY= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1729251949; c=relaxed/simple; bh=1BNiMp5hft6BVcllpSQba4wculgblsP3M79IqEAZdPE=; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References: MIME-Version; b=il+zqf3gJ71c47b+1wMs1WHhW9yOataNgkVkVmW5su4tFDDAsjA/bKWnnWnljlFtmgkCI4XDgNC2kxcJmNghP77bB/YBZDw2agOO6LT7bTfG0pQ5frqo2tM2Y3uW2dkEaf0g/dllKN1P/1nIx4G7nfNkkUfFLUW2yE2/dbjK9oQ= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.alibaba.com; spf=pass smtp.mailfrom=linux.alibaba.com; dkim=pass (1024-bit key) header.d=linux.alibaba.com header.i=@linux.alibaba.com header.b=ugKK8wRr; arc=none smtp.client-ip=115.124.30.101 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.alibaba.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=linux.alibaba.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linux.alibaba.com header.i=@linux.alibaba.com header.b="ugKK8wRr" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.alibaba.com; s=default; t=1729251938; h=From:To:Subject:Date:Message-Id:MIME-Version; bh=/44VCodUUm6O/Z7vpmu5lS38/1Ge/PgfRcDjU8R+TQA=; b=ugKK8wRr7zIMxDyRX2/OukeBKfLrwnlL+RZ9JNrkfFirXhF2TUvr8Vip6cNmHing81VSP3jyPXawCPx9hQSeGUIpkR+VCOwZFqlJXHV/Kk0m5AjDAElXWG2A2oR9HvYNFofNvoSfwmyROMwrrjPGTQlrCLuO/F6h8g3eZYMc0bM= Received: from localhost(mailfrom:lulie@linux.alibaba.com fp:SMTPD_---0WHO1lIp_1729251937 cluster:ay36) by smtp.aliyun-inc.com; Fri, 18 Oct 2024 19:45:37 +0800 From: Philo Lu To: netdev@vger.kernel.org Cc: willemdebruijn.kernel@gmail.com, davem@davemloft.net, edumazet@google.com, kuba@kernel.org, pabeni@redhat.com, dsahern@kernel.org, antony.antony@secunet.com, steffen.klassert@secunet.com, linux-kernel@vger.kernel.org, dust.li@linux.alibaba.com, jakub@cloudflare.com, fred.cc@alibaba-inc.com, yubing.qiuyubing@alibaba-inc.com Subject: [PATCH v5 net-next 1/3] net/udp: Add a new struct for hash2 slot Date: Fri, 18 Oct 2024 19:45:33 +0800 Message-Id: <20241018114535.35712-2-lulie@linux.alibaba.com> X-Mailer: git-send-email 2.32.0.3.g01195cf9f In-Reply-To: <20241018114535.35712-1-lulie@linux.alibaba.com> References: <20241018114535.35712-1-lulie@linux.alibaba.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Preparing for udp 4-tuple hash (uhash4 for short). To implement uhash4 without cache line missing when lookup, hslot2 is used to record the number of hashed sockets in hslot4. Thus adding a new struct udp_hslot_main with field hash4_cnt, which is used by hash2. The new struct is used to avoid doubling the size of udp_hslot. Before uhash4 lookup, firstly checking hash4_cnt to see if there are hashed sks in hslot4. Because hslot2 is always used in lookup, there is no cache line miss. Related helpers are updated, and use the helpers as possible. uhash4 is implemented in following patches. Signed-off-by: Philo Lu --- include/net/udp.h | 23 +++++++++++++++++++---- net/ipv4/udp.c | 44 +++++++++++++++++++++++--------------------- net/ipv6/udp.c | 15 ++++++--------- 3 files changed, 48 insertions(+), 34 deletions(-) diff --git a/include/net/udp.h b/include/net/udp.h index 61222545ab1c..cd2158618329 100644 --- a/include/net/udp.h +++ b/include/net/udp.h @@ -50,7 +50,7 @@ struct udp_skb_cb { #define UDP_SKB_CB(__skb) ((struct udp_skb_cb *)((__skb)->cb)) =20 /** - * struct udp_hslot - UDP hash slot + * struct udp_hslot - UDP hash slot used by udp_table.hash * * @head: head of list of sockets * @count: number of sockets in 'head' list @@ -60,7 +60,21 @@ struct udp_hslot { struct hlist_head head; int count; spinlock_t lock; -} __attribute__((aligned(2 * sizeof(long)))); +} __aligned(2 * sizeof(long)); + +/** + * struct udp_hslot_main - UDP hash slot used by udp_table.hash2 + * + * @hslot: basic hash slot + * @hash4_cnt: number of sockets in hslot4 of the same (local port, local = address) + */ +struct udp_hslot_main { + struct udp_hslot hslot; /* must be the first member */ +#if !IS_ENABLED(CONFIG_BASE_SMALL) + u32 hash4_cnt; +#endif +} __aligned(2 * sizeof(long)); +#define UDP_HSLOT_MAIN(__hslot) ((struct udp_hslot_main *)(__hslot)) =20 /** * struct udp_table - UDP table @@ -72,7 +86,7 @@ struct udp_hslot { */ struct udp_table { struct udp_hslot *hash; - struct udp_hslot *hash2; + struct udp_hslot_main *hash2; unsigned int mask; unsigned int log; }; @@ -84,6 +98,7 @@ static inline struct udp_hslot *udp_hashslot(struct udp_t= able *table, { return &table->hash[udp_hashfn(net, num, table->mask)]; } + /* * For secondary hash, net_hash_mix() is performed before calling * udp_hashslot2(), this explains difference with udp_hashslot() @@ -91,7 +106,7 @@ static inline struct udp_hslot *udp_hashslot(struct udp_= table *table, static inline struct udp_hslot *udp_hashslot2(struct udp_table *table, unsigned int hash) { - return &table->hash2[hash & table->mask]; + return &table->hash2[hash & table->mask].hslot; } =20 extern struct proto udp_prot; diff --git a/net/ipv4/udp.c b/net/ipv4/udp.c index 4b74a25d0b6e..2b7e72c4ed6d 100644 --- a/net/ipv4/udp.c +++ b/net/ipv4/udp.c @@ -486,13 +486,12 @@ struct sock *__udp4_lib_lookup(const struct net *net,= __be32 saddr, int sdif, struct udp_table *udptable, struct sk_buff *skb) { unsigned short hnum =3D ntohs(dport); - unsigned int hash2, slot2; struct udp_hslot *hslot2; struct sock *result, *sk; + unsigned int hash2; =20 hash2 =3D ipv4_portaddr_hash(net, daddr, hnum); - slot2 =3D hash2 & udptable->mask; - hslot2 =3D &udptable->hash2[slot2]; + hslot2 =3D udp_hashslot2(udptable, hash2); =20 /* Lookup connected or non-wildcard socket */ result =3D udp4_lib_lookup2(net, saddr, sport, @@ -519,8 +518,7 @@ struct sock *__udp4_lib_lookup(const struct net *net, _= _be32 saddr, =20 /* Lookup wildcard sockets */ hash2 =3D ipv4_portaddr_hash(net, htonl(INADDR_ANY), hnum); - slot2 =3D hash2 & udptable->mask; - hslot2 =3D &udptable->hash2[slot2]; + hslot2 =3D udp_hashslot2(udptable, hash2); =20 result =3D udp4_lib_lookup2(net, saddr, sport, htonl(INADDR_ANY), hnum, dif, sdif, @@ -2266,7 +2264,7 @@ static int __udp4_lib_mcast_deliver(struct net *net, = struct sk_buff *skb, udptable->mask; hash2 =3D ipv4_portaddr_hash(net, daddr, hnum) & udptable->mask; start_lookup: - hslot =3D &udptable->hash2[hash2]; + hslot =3D &udptable->hash2[hash2].hslot; offset =3D offsetof(typeof(*sk), __sk_common.skc_portaddr_node); } =20 @@ -2537,14 +2535,13 @@ static struct sock *__udp4_lib_demux_lookup(struct = net *net, struct udp_table *udptable =3D net->ipv4.udp_table; INET_ADDR_COOKIE(acookie, rmt_addr, loc_addr); unsigned short hnum =3D ntohs(loc_port); - unsigned int hash2, slot2; struct udp_hslot *hslot2; + unsigned int hash2; __portpair ports; struct sock *sk; =20 hash2 =3D ipv4_portaddr_hash(net, loc_addr, hnum); - slot2 =3D hash2 & udptable->mask; - hslot2 =3D &udptable->hash2[slot2]; + hslot2 =3D udp_hashslot2(udptable, hash2); ports =3D INET_COMBINED_PORTS(rmt_port, hnum); =20 udp_portaddr_for_each_entry_rcu(sk, &hslot2->head) { @@ -3185,7 +3182,7 @@ static struct sock *bpf_iter_udp_batch(struct seq_fil= e *seq) batch_sks =3D 0; =20 for (; state->bucket <=3D udptable->mask; state->bucket++) { - struct udp_hslot *hslot2 =3D &udptable->hash2[state->bucket]; + struct udp_hslot *hslot2 =3D &udptable->hash2[state->bucket].hslot; =20 if (hlist_empty(&hslot2->head)) continue; @@ -3426,10 +3423,11 @@ __setup("uhash_entries=3D", set_uhash_entries); =20 void __init udp_table_init(struct udp_table *table, const char *name) { - unsigned int i; + unsigned int i, slot_size; =20 + slot_size =3D sizeof(struct udp_hslot) + sizeof(struct udp_hslot_main); table->hash =3D alloc_large_system_hash(name, - 2 * sizeof(struct udp_hslot), + slot_size, uhash_entries, 21, /* one slot per 2 MB */ 0, @@ -3438,16 +3436,17 @@ void __init udp_table_init(struct udp_table *table,= const char *name) UDP_HTABLE_SIZE_MIN, UDP_HTABLE_SIZE_MAX); =20 - table->hash2 =3D table->hash + (table->mask + 1); + table->hash2 =3D (void *)(table->hash + (table->mask + 1)); for (i =3D 0; i <=3D table->mask; i++) { INIT_HLIST_HEAD(&table->hash[i].head); table->hash[i].count =3D 0; spin_lock_init(&table->hash[i].lock); } for (i =3D 0; i <=3D table->mask; i++) { - INIT_HLIST_HEAD(&table->hash2[i].head); - table->hash2[i].count =3D 0; - spin_lock_init(&table->hash2[i].lock); + INIT_HLIST_HEAD(&table->hash2[i].hslot.head); + table->hash2[i].hslot.count =3D 0; + spin_lock_init(&table->hash2[i].hslot.lock); + table->hash2[i].hash4_cnt =3D 0; } } =20 @@ -3474,18 +3473,20 @@ static void __net_init udp_sysctl_init(struct net *= net) static struct udp_table __net_init *udp_pernet_table_alloc(unsigned int ha= sh_entries) { struct udp_table *udptable; + unsigned int slot_size; int i; =20 udptable =3D kmalloc(sizeof(*udptable), GFP_KERNEL); if (!udptable) goto out; =20 - udptable->hash =3D vmalloc_huge(hash_entries * 2 * sizeof(struct udp_hslo= t), + slot_size =3D sizeof(struct udp_hslot) + sizeof(struct udp_hslot_main); + udptable->hash =3D vmalloc_huge(hash_entries * slot_size, GFP_KERNEL_ACCOUNT); if (!udptable->hash) goto free_table; =20 - udptable->hash2 =3D udptable->hash + hash_entries; + udptable->hash2 =3D (void *)(udptable->hash + hash_entries); udptable->mask =3D hash_entries - 1; udptable->log =3D ilog2(hash_entries); =20 @@ -3494,9 +3495,10 @@ static struct udp_table __net_init *udp_pernet_table= _alloc(unsigned int hash_ent udptable->hash[i].count =3D 0; spin_lock_init(&udptable->hash[i].lock); =20 - INIT_HLIST_HEAD(&udptable->hash2[i].head); - udptable->hash2[i].count =3D 0; - spin_lock_init(&udptable->hash2[i].lock); + INIT_HLIST_HEAD(&udptable->hash2[i].hslot.head); + udptable->hash2[i].hslot.count =3D 0; + spin_lock_init(&udptable->hash2[i].hslot.lock); + udptable->hash2[i].hash4_cnt =3D 0; } =20 return udptable; diff --git a/net/ipv6/udp.c b/net/ipv6/udp.c index 52dfbb2ff1a8..bbf3352213c4 100644 --- a/net/ipv6/udp.c +++ b/net/ipv6/udp.c @@ -224,13 +224,12 @@ struct sock *__udp6_lib_lookup(const struct net *net, struct sk_buff *skb) { unsigned short hnum =3D ntohs(dport); - unsigned int hash2, slot2; struct udp_hslot *hslot2; struct sock *result, *sk; + unsigned int hash2; =20 hash2 =3D ipv6_portaddr_hash(net, daddr, hnum); - slot2 =3D hash2 & udptable->mask; - hslot2 =3D &udptable->hash2[slot2]; + hslot2 =3D udp_hashslot2(udptable, hash2); =20 /* Lookup connected or non-wildcard sockets */ result =3D udp6_lib_lookup2(net, saddr, sport, @@ -257,8 +256,7 @@ struct sock *__udp6_lib_lookup(const struct net *net, =20 /* Lookup wildcard sockets */ hash2 =3D ipv6_portaddr_hash(net, &in6addr_any, hnum); - slot2 =3D hash2 & udptable->mask; - hslot2 =3D &udptable->hash2[slot2]; + hslot2 =3D udp_hashslot2(udptable, hash2); =20 result =3D udp6_lib_lookup2(net, saddr, sport, &in6addr_any, hnum, dif, sdif, @@ -859,7 +857,7 @@ static int __udp6_lib_mcast_deliver(struct net *net, st= ruct sk_buff *skb, udptable->mask; hash2 =3D ipv6_portaddr_hash(net, daddr, hnum) & udptable->mask; start_lookup: - hslot =3D &udptable->hash2[hash2]; + hslot =3D &udptable->hash2[hash2].hslot; offset =3D offsetof(typeof(*sk), __sk_common.skc_portaddr_node); } =20 @@ -1065,14 +1063,13 @@ static struct sock *__udp6_lib_demux_lookup(struct = net *net, { struct udp_table *udptable =3D net->ipv4.udp_table; unsigned short hnum =3D ntohs(loc_port); - unsigned int hash2, slot2; struct udp_hslot *hslot2; + unsigned int hash2; __portpair ports; struct sock *sk; =20 hash2 =3D ipv6_portaddr_hash(net, loc_addr, hnum); - slot2 =3D hash2 & udptable->mask; - hslot2 =3D &udptable->hash2[slot2]; + hslot2 =3D udp_hashslot2(udptable, hash2); ports =3D INET_COMBINED_PORTS(rmt_port, hnum); =20 udp_portaddr_for_each_entry_rcu(sk, &hslot2->head) { --=20 2.32.0.3.g01195cf9f From nobody Tue Nov 26 11:44:10 2024 Received: from out30-112.freemail.mail.aliyun.com (out30-112.freemail.mail.aliyun.com [115.124.30.112]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id D5511A32; Fri, 18 Oct 2024 11:45:41 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=115.124.30.112 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1729251944; cv=none; b=h8VTqrybr/lpUFaR0vcOOG8VrvHNMw5bvBkxqbFYRUK9H3+hH2JDbQRkfLgAdQ7v6VFkTlqhA3yg637jMfcA5vY/ydmuqy2qqFWbHIXsieQLlfBHyFKjvivQkosk50wfOFqzbZCjjDjYwxKHFntVUGe/re1/ADnzcuaIg5528b4= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1729251944; c=relaxed/simple; bh=qCdh2zMzL0Z76yj5dgirxEQYgFCsAW+1uSNgGtDgcmI=; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References: MIME-Version; b=eAZ0P4uV/xDBlTyFtlNKI3RPGoZxf3D30dyVqceyazFYWXUkw5YFPs1fp7+4EZKVDyCzi5ELdiw2FZ82uuoWSCjf6ZC6q5AyZt96JAZnkvbJu8e8RriAXr1RYg4yGdBhEElOKMbbMsJbjv5eX7e+YXr2dhPAWnIA4AHpAsXlFvU= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.alibaba.com; spf=pass smtp.mailfrom=linux.alibaba.com; dkim=pass (1024-bit key) header.d=linux.alibaba.com header.i=@linux.alibaba.com header.b=NOnFYxvv; arc=none smtp.client-ip=115.124.30.112 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.alibaba.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=linux.alibaba.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linux.alibaba.com header.i=@linux.alibaba.com header.b="NOnFYxvv" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.alibaba.com; s=default; t=1729251939; h=From:To:Subject:Date:Message-Id:MIME-Version; bh=ROzlH0PRT6Cxlwg6kW8QAqgg8DazNGwb0OtTEOwqX5s=; b=NOnFYxvvgVWNgfRd+GWDNNqwwQCGrC9Nd8zB1E/s4qo2fPk3f+dNufZ2R66SsBMqrqczQxfrc1phaae/yV0fJ2BaXadEPE6swtR+wv0Sj/dZm5ZVieXTorcib7Xnqh1KNjmIWvDVaMnZ02KIHe3fzUhFzshn+/UG/ua7ry/JzaI= Received: from localhost(mailfrom:lulie@linux.alibaba.com fp:SMTPD_---0WHO.8lc_1729251938 cluster:ay36) by smtp.aliyun-inc.com; Fri, 18 Oct 2024 19:45:38 +0800 From: Philo Lu To: netdev@vger.kernel.org Cc: willemdebruijn.kernel@gmail.com, davem@davemloft.net, edumazet@google.com, kuba@kernel.org, pabeni@redhat.com, dsahern@kernel.org, antony.antony@secunet.com, steffen.klassert@secunet.com, linux-kernel@vger.kernel.org, dust.li@linux.alibaba.com, jakub@cloudflare.com, fred.cc@alibaba-inc.com, yubing.qiuyubing@alibaba-inc.com Subject: [PATCH v5 net-next 2/3] net/udp: Add 4-tuple hash list basis Date: Fri, 18 Oct 2024 19:45:34 +0800 Message-Id: <20241018114535.35712-3-lulie@linux.alibaba.com> X-Mailer: git-send-email 2.32.0.3.g01195cf9f In-Reply-To: <20241018114535.35712-1-lulie@linux.alibaba.com> References: <20241018114535.35712-1-lulie@linux.alibaba.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Add a new hash list, hash4, in udp table. It will be used to implement 4-tuple hash for connected udp sockets. This patch adds the hlist to table, and implements helpers and the initialization. 4-tuple hash is implemented in the following patch. Signed-off-by: Philo Lu Signed-off-by: Cambda Zhu Signed-off-by: Fred Chen Signed-off-by: Yubing Qiu --- include/linux/udp.h | 11 ++++++ include/net/udp.h | 87 ++++++++++++++++++++++++++++++++++++++++++++- net/ipv4/udp.c | 10 +++--- 3 files changed, 103 insertions(+), 5 deletions(-) diff --git a/include/linux/udp.h b/include/linux/udp.h index 3eb3f2b9a2a0..09abd3700d81 100644 --- a/include/linux/udp.h +++ b/include/linux/udp.h @@ -56,6 +56,12 @@ struct udp_sock { int pending; /* Any pending frames ? */ __u8 encap_type; /* Is this an Encapsulation socket? */ =20 +#if !IS_ENABLED(CONFIG_BASE_SMALL) + /* For UDP 4-tuple hash */ + __u16 udp_lrpa_hash; + struct hlist_node udp_lrpa_node; +#endif + /* * Following member retains the information to create a UDP header * when the socket is uncorked. @@ -206,6 +212,11 @@ static inline void udp_allow_gso(struct sock *sk) #define udp_portaddr_for_each_entry_rcu(__sk, list) \ hlist_for_each_entry_rcu(__sk, list, __sk_common.skc_portaddr_node) =20 +#if !IS_ENABLED(CONFIG_BASE_SMALL) +#define udp_lrpa_for_each_entry_rcu(__up, list) \ + hlist_for_each_entry_rcu(__up, list, udp_lrpa_node) +#endif + #define IS_UDPLITE(__sk) (__sk->sk_protocol =3D=3D IPPROTO_UDPLITE) =20 #endif /* _LINUX_UDP_H */ diff --git a/include/net/udp.h b/include/net/udp.h index cd2158618329..8aefdc404362 100644 --- a/include/net/udp.h +++ b/include/net/udp.h @@ -50,7 +50,7 @@ struct udp_skb_cb { #define UDP_SKB_CB(__skb) ((struct udp_skb_cb *)((__skb)->cb)) =20 /** - * struct udp_hslot - UDP hash slot used by udp_table.hash + * struct udp_hslot - UDP hash slot used by udp_table.hash/hash4 * * @head: head of list of sockets * @count: number of sockets in 'head' list @@ -81,12 +81,17 @@ struct udp_hslot_main { * * @hash: hash table, sockets are hashed on (local port) * @hash2: hash table, sockets are hashed on (local port, local address) + * @hash4: hash table, connected sockets are hashed on + * (local port, local address, remote port, remote address) * @mask: number of slots in hash tables, minus 1 * @log: log2(number of slots in hash table) */ struct udp_table { struct udp_hslot *hash; struct udp_hslot_main *hash2; +#if !IS_ENABLED(CONFIG_BASE_SMALL) + struct udp_hslot *hash4; +#endif unsigned int mask; unsigned int log; }; @@ -109,6 +114,86 @@ static inline struct udp_hslot *udp_hashslot2(struct u= dp_table *table, return &table->hash2[hash & table->mask].hslot; } =20 +#if IS_ENABLED(CONFIG_BASE_SMALL) +static inline struct udp_hslot *udp_hashslot4(struct udp_table *table, + unsigned int hash) +{ + BUILD_BUG(); + return NULL; +} + +static inline bool udp_hashed4(const struct sock *sk) +{ + return false; +} + +static inline unsigned int udp_hash4_slot_size(void) +{ + return 0; +} + +static inline void udp_table_hash4_init(struct udp_table *table) +{ +} + +static inline bool udp_has_hash4(const struct udp_hslot *hslot2) +{ + return false; +} + +static inline void udp_hash4_inc(struct udp_hslot *hslot2) +{ +} + +static inline void udp_hash4_dec(struct udp_hslot *hslot2) +{ +} +#else /* !CONFIG_BASE_SMALL */ +static inline struct udp_hslot *udp_hashslot4(struct udp_table *table, + unsigned int hash) +{ + return &table->hash4[hash & table->mask]; +} + +static inline bool udp_hashed4(const struct sock *sk) +{ + return !hlist_unhashed(&udp_sk(sk)->udp_lrpa_node); +} + +static inline unsigned int udp_hash4_slot_size(void) +{ + return sizeof(struct udp_hslot); +} + +/* Must be called with table->hash2 initialized */ +static inline void udp_table_hash4_init(struct udp_table *table) +{ + table->hash4 =3D (void *)(table->hash2 + (table->mask + 1)); + for (int i =3D 0; i <=3D table->mask; i++) { + table->hash2[i].hash4_cnt =3D 0; + + INIT_HLIST_HEAD(&table->hash4[i].head); + table->hash4[i].count =3D 0; + spin_lock_init(&table->hash4[i].lock); + } +} + +static inline bool udp_has_hash4(const struct udp_hslot *hslot2) +{ + return UDP_HSLOT_MAIN(hslot2)->hash4_cnt; +} + +static inline void udp_hash4_inc(struct udp_hslot *hslot2) +{ + UDP_HSLOT_MAIN(hslot2)->hash4_cnt++; +} + +static inline void udp_hash4_dec(struct udp_hslot *hslot2) +{ + UDP_HSLOT_MAIN(hslot2)->hash4_cnt--; +} +#endif /* CONFIG_BASE_SMALL */ + extern struct proto udp_prot; =20 extern atomic_long_t udp_memory_allocated; diff --git a/net/ipv4/udp.c b/net/ipv4/udp.c index 2b7e72c4ed6d..74bfab0f44f8 100644 --- a/net/ipv4/udp.c +++ b/net/ipv4/udp.c @@ -3425,7 +3425,8 @@ void __init udp_table_init(struct udp_table *table, c= onst char *name) { unsigned int i, slot_size; =20 - slot_size =3D sizeof(struct udp_hslot) + sizeof(struct udp_hslot_main); + slot_size =3D sizeof(struct udp_hslot) + sizeof(struct udp_hslot_main) + + udp_hash4_slot_size(); table->hash =3D alloc_large_system_hash(name, slot_size, uhash_entries, @@ -3446,8 +3447,8 @@ void __init udp_table_init(struct udp_table *table, c= onst char *name) INIT_HLIST_HEAD(&table->hash2[i].hslot.head); table->hash2[i].hslot.count =3D 0; spin_lock_init(&table->hash2[i].hslot.lock); - table->hash2[i].hash4_cnt =3D 0; } + udp_table_hash4_init(table); } =20 u32 udp_flow_hashrnd(void) @@ -3480,7 +3481,8 @@ static struct udp_table __net_init *udp_pernet_table_= alloc(unsigned int hash_ent if (!udptable) goto out; =20 - slot_size =3D sizeof(struct udp_hslot) + sizeof(struct udp_hslot_main); + slot_size =3D sizeof(struct udp_hslot) + sizeof(struct udp_hslot_main) + + udp_hash4_slot_size(); udptable->hash =3D vmalloc_huge(hash_entries * slot_size, GFP_KERNEL_ACCOUNT); if (!udptable->hash) @@ -3498,8 +3500,8 @@ static struct udp_table __net_init *udp_pernet_table_= alloc(unsigned int hash_ent INIT_HLIST_HEAD(&udptable->hash2[i].hslot.head); udptable->hash2[i].hslot.count =3D 0; spin_lock_init(&udptable->hash2[i].hslot.lock); - udptable->hash2[i].hash4_cnt =3D 0; } + udp_table_hash4_init(udptable); =20 return udptable; =20 --=20 2.32.0.3.g01195cf9f From nobody Tue Nov 26 11:44:10 2024 Received: from out30-130.freemail.mail.aliyun.com (out30-130.freemail.mail.aliyun.com [115.124.30.130]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 001AA1CFA9; Fri, 18 Oct 2024 11:45:48 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=115.124.30.130 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1729251951; cv=none; b=izTra0MQI7dR/iB54W/CW+kVsRVur1MkYsuyGPy8JCF7EGSStHUcOE3zuPraa6Aj3IYkJxZuFvsQWqd02Tc0Xi65Rco4/6/JlNEiRtPOX0i3y79vbvlwD7DJ5zAoJPojGffz1reHQxFaJeE2fS+1mW3MgkO/smea5tWaBZVdZRE= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1729251951; c=relaxed/simple; bh=9zd1hVbiyenwlwwXyxQmAHqid14DiZU6FuVVXBzXpCA=; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References: MIME-Version; b=O4JYoHNGdkDnACKim/RGZcot0QNLbJtZOCeWSA9YMBpo0xjqz2aEgK5/ZfXcKELpw21BrINzrPksby/w7Aib89rMDawnK1DqPyX8BToSB8Gc4nfLOt8JsiqupgGf3Dr1AcGH5FZsE1kBVjbyNJZja9MTbt7dHcsDf9Jtjo00AAM= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.alibaba.com; spf=pass smtp.mailfrom=linux.alibaba.com; dkim=pass (1024-bit key) header.d=linux.alibaba.com header.i=@linux.alibaba.com header.b=WOe/coG2; arc=none smtp.client-ip=115.124.30.130 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.alibaba.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=linux.alibaba.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linux.alibaba.com header.i=@linux.alibaba.com header.b="WOe/coG2" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.alibaba.com; s=default; t=1729251940; h=From:To:Subject:Date:Message-Id:MIME-Version; bh=vSCTgZz+X94Bfo6AJQSikIc0RtIQyocb/oaSqZYZbk8=; b=WOe/coG2gOjam07AlSiTfIIqKhYXjETWXNMSlgWulzreB49b9IM4/1wESQcQ+nEGo31IOyJCngs+0WrtA5R8SuWp4lMMSVYD6Fls2+kXgRZaeH1PDxRkAn67bTRi5pL6yPBOt33XKZIFSqtDtnQ4/M3NAE/iVcSUXc0hddcVoWM= Received: from localhost(mailfrom:lulie@linux.alibaba.com fp:SMTPD_---0WHO-mcl_1729251939 cluster:ay36) by smtp.aliyun-inc.com; Fri, 18 Oct 2024 19:45:40 +0800 From: Philo Lu To: netdev@vger.kernel.org Cc: willemdebruijn.kernel@gmail.com, davem@davemloft.net, edumazet@google.com, kuba@kernel.org, pabeni@redhat.com, dsahern@kernel.org, antony.antony@secunet.com, steffen.klassert@secunet.com, linux-kernel@vger.kernel.org, dust.li@linux.alibaba.com, jakub@cloudflare.com, fred.cc@alibaba-inc.com, yubing.qiuyubing@alibaba-inc.com Subject: [PATCH v5 net-next 3/3] ipv4/udp: Add 4-tuple hash for connected socket Date: Fri, 18 Oct 2024 19:45:35 +0800 Message-Id: <20241018114535.35712-4-lulie@linux.alibaba.com> X-Mailer: git-send-email 2.32.0.3.g01195cf9f In-Reply-To: <20241018114535.35712-1-lulie@linux.alibaba.com> References: <20241018114535.35712-1-lulie@linux.alibaba.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Currently, the udp_table has two hash table, the port hash and portaddr hash. Usually for UDP servers, all sockets have the same local port and addr, so they are all on the same hash slot within a reuseport group. In some applications, UDP servers use connect() to manage clients. In particular, when firstly receiving from an unseen 4 tuple, a new socket is created and connect()ed to the remote addr:port, and then the fd is used exclusively by the client. Once there are connected sks in a reuseport group, udp has to score all sks in the same hash2 slot to find the best match. This could be inefficient with a large number of connections, resulting in high softirq overhead. To solve the problem, this patch implement 4-tuple hash for connected udp sockets. During connect(), hash4 slot is updated, as well as a corresponding counter, hash4_cnt, in hslot2. In __udp4_lib_lookup(), hslot4 will be searched firstly if the counter is non-zero. Otherwise, hslot2 is used like before. Note that only connected sockets enter this hash4 path, while un-connected ones are not affected. Signed-off-by: Philo Lu Signed-off-by: Cambda Zhu Signed-off-by: Fred Chen Signed-off-by: Yubing Qiu --- include/net/udp.h | 3 +- net/ipv4/udp.c | 171 +++++++++++++++++++++++++++++++++++++++++++++- net/ipv6/udp.c | 2 +- 3 files changed, 171 insertions(+), 5 deletions(-) diff --git a/include/net/udp.h b/include/net/udp.h index 8aefdc404362..97c5ae83723c 100644 --- a/include/net/udp.h +++ b/include/net/udp.h @@ -293,7 +293,7 @@ static inline int udp_lib_hash(struct sock *sk) } =20 void udp_lib_unhash(struct sock *sk); -void udp_lib_rehash(struct sock *sk, u16 new_hash); +void udp_lib_rehash(struct sock *sk, u16 new_hash, u16 new_hash4); =20 static inline void udp_lib_close(struct sock *sk, long timeout) { @@ -386,6 +386,7 @@ int udp_rcv(struct sk_buff *skb); int udp_ioctl(struct sock *sk, int cmd, int *karg); int udp_init_sock(struct sock *sk); int udp_pre_connect(struct sock *sk, struct sockaddr *uaddr, int addr_len); +int udp_connect(struct sock *sk, struct sockaddr *uaddr, int addr_len); int __udp_disconnect(struct sock *sk, int flags); int udp_disconnect(struct sock *sk, int flags); __poll_t udp_poll(struct file *file, struct socket *sock, poll_table *wait= ); diff --git a/net/ipv4/udp.c b/net/ipv4/udp.c index 74bfab0f44f8..5d944cec7a27 100644 --- a/net/ipv4/udp.c +++ b/net/ipv4/udp.c @@ -478,6 +478,134 @@ static struct sock *udp4_lib_lookup2(const struct net= *net, return result; } =20 +#if IS_ENABLED(CONFIG_BASE_SMALL) +static struct sock *udp4_lib_lookup4(const struct net *net, + __be32 saddr, __be16 sport, + __be32 daddr, unsigned int hnum, + int dif, int sdif, + struct udp_table *udptable) +{ + return NULL; +} + +static void udp4_rehash4(struct udp_table *udptable, struct sock *sk, u16 = newhash4) +{ +} + +static void udp4_unhash4(struct udp_table *udptable, struct sock *sk) +{ +} + +static void udp4_hash4(struct sock *sk) +{ +} +#else /* !CONFIG_BASE_SMALL */ +static struct sock *udp4_lib_lookup4(const struct net *net, + __be32 saddr, __be16 sport, + __be32 daddr, unsigned int hnum, + int dif, int sdif, + struct udp_table *udptable) +{ + unsigned int hash4 =3D udp_ehashfn(net, daddr, hnum, saddr, sport); + const __portpair ports =3D INET_COMBINED_PORTS(sport, hnum); + struct udp_hslot *hslot4 =3D udp_hashslot4(udptable, hash4); + struct udp_sock *up; + struct sock *sk; + + INET_ADDR_COOKIE(acookie, saddr, daddr); + udp_lrpa_for_each_entry_rcu(up, &hslot4->head) { + sk =3D (struct sock *)up; + if (inet_match(net, sk, acookie, ports, dif, sdif)) + return sk; + } + return NULL; +} + +/* In hash4, rehash can also happen in connect(), where hash4_cnt keeps un= changed. */ +static void udp4_rehash4(struct udp_table *udptable, struct sock *sk, u16 = newhash4) +{ + struct udp_hslot *hslot4, *nhslot4; + + hslot4 =3D udp_hashslot4(udptable, udp_sk(sk)->udp_lrpa_hash); + nhslot4 =3D udp_hashslot4(udptable, newhash4); + udp_sk(sk)->udp_lrpa_hash =3D newhash4; + + if (hslot4 !=3D nhslot4) { + spin_lock_bh(&hslot4->lock); + hlist_del_init_rcu(&udp_sk(sk)->udp_lrpa_node); + hslot4->count--; + spin_unlock_bh(&hslot4->lock); + + synchronize_rcu(); + + spin_lock_bh(&nhslot4->lock); + hlist_add_head_rcu(&udp_sk(sk)->udp_lrpa_node, &nhslot4->head); + nhslot4->count++; + spin_unlock_bh(&nhslot4->lock); + } +} + +static void udp4_unhash4(struct udp_table *udptable, struct sock *sk) +{ + struct udp_hslot *hslot2, *hslot4; + + if (udp_hashed4(sk)) { + hslot2 =3D udp_hashslot2(udptable, udp_sk(sk)->udp_portaddr_hash); + hslot4 =3D udp_hashslot4(udptable, udp_sk(sk)->udp_lrpa_hash); + + spin_lock(&hslot4->lock); + hlist_del_init_rcu(&udp_sk(sk)->udp_lrpa_node); + hslot4->count--; + spin_unlock(&hslot4->lock); + + spin_lock(&hslot2->lock); + udp_hash4_dec(hslot2); + spin_unlock(&hslot2->lock); + } +} + +/* call with sock lock */ +static void udp4_hash4(struct sock *sk) +{ + struct udp_hslot *hslot, *hslot2, *hslot4; + struct net *net =3D sock_net(sk); + struct udp_table *udptable; + unsigned int hash; + + if (sk_unhashed(sk) || inet_sk(sk)->inet_rcv_saddr =3D=3D htonl(INADDR_AN= Y)) + return; + + hash =3D udp_ehashfn(net, inet_sk(sk)->inet_rcv_saddr, inet_sk(sk)->inet_= num, + inet_sk(sk)->inet_daddr, inet_sk(sk)->inet_dport); + + udptable =3D net->ipv4.udp_table; + if (udp_hashed4(sk)) { + udp4_rehash4(udptable, sk, hash); + return; + } + + hslot =3D udp_hashslot(udptable, net, udp_sk(sk)->udp_port_hash); + hslot2 =3D udp_hashslot2(udptable, udp_sk(sk)->udp_portaddr_hash); + hslot4 =3D udp_hashslot4(udptable, hash); + udp_sk(sk)->udp_lrpa_hash =3D hash; + + spin_lock_bh(&hslot->lock); + if (rcu_access_pointer(sk->sk_reuseport_cb)) + reuseport_detach_sock(sk); + + spin_lock(&hslot4->lock); + hlist_add_head_rcu(&udp_sk(sk)->udp_lrpa_node, &hslot4->head); + hslot4->count++; + spin_unlock(&hslot4->lock); + + spin_lock(&hslot2->lock); + udp_hash4_inc(hslot2); + spin_unlock(&hslot2->lock); + + spin_unlock_bh(&hslot->lock); +} +#endif /* CONFIG_BASE_SMALL */ + /* UDP is nearly always wildcards out the wazoo, it makes no sense to try * harder than this. -DaveM */ @@ -493,6 +621,12 @@ struct sock *__udp4_lib_lookup(const struct net *net, = __be32 saddr, hash2 =3D ipv4_portaddr_hash(net, daddr, hnum); hslot2 =3D udp_hashslot2(udptable, hash2); =20 + if (udp_has_hash4(hslot2)) { + result =3D udp4_lib_lookup4(net, saddr, sport, daddr, hnum, dif, sdif, u= dptable); + if (result) /* udp4_lib_lookup4 return sk or NULL */ + return result; + } + /* Lookup connected or non-wildcard socket */ result =3D udp4_lib_lookup2(net, saddr, sport, daddr, hnum, dif, sdif, @@ -1931,6 +2065,19 @@ int udp_pre_connect(struct sock *sk, struct sockaddr= *uaddr, int addr_len) } EXPORT_SYMBOL(udp_pre_connect); =20 +int udp_connect(struct sock *sk, struct sockaddr *uaddr, int addr_len) +{ + int res; + + lock_sock(sk); + res =3D __ip4_datagram_connect(sk, uaddr, addr_len); + if (!res) + udp4_hash4(sk); + release_sock(sk); + return res; +} +EXPORT_SYMBOL(udp_connect); + int __udp_disconnect(struct sock *sk, int flags) { struct inet_sock *inet =3D inet_sk(sk); @@ -1990,6 +2137,8 @@ void udp_lib_unhash(struct sock *sk) hlist_del_init_rcu(&udp_sk(sk)->udp_portaddr_node); hslot2->count--; spin_unlock(&hslot2->lock); + + udp4_unhash4(udptable, sk); } spin_unlock_bh(&hslot->lock); } @@ -1999,7 +2148,7 @@ EXPORT_SYMBOL(udp_lib_unhash); /* * inet_rcv_saddr was changed, we must rehash secondary hash */ -void udp_lib_rehash(struct sock *sk, u16 newhash) +void udp_lib_rehash(struct sock *sk, u16 newhash, u16 newhash4) { if (sk_hashed(sk)) { struct udp_table *udptable =3D udp_get_table_prot(sk); @@ -2031,6 +2180,19 @@ void udp_lib_rehash(struct sock *sk, u16 newhash) spin_unlock(&nhslot2->lock); } =20 + if (udp_hashed4(sk)) { + udp4_rehash4(udptable, sk, newhash4); + + if (hslot2 !=3D nhslot2) { + spin_lock(&hslot2->lock); + udp_hash4_dec(hslot2); + spin_unlock(&hslot2->lock); + + spin_lock(&nhslot2->lock); + udp_hash4_inc(nhslot2); + spin_unlock(&nhslot2->lock); + } + } spin_unlock_bh(&hslot->lock); } } @@ -2042,7 +2204,10 @@ void udp_v4_rehash(struct sock *sk) u16 new_hash =3D ipv4_portaddr_hash(sock_net(sk), inet_sk(sk)->inet_rcv_saddr, inet_sk(sk)->inet_num); - udp_lib_rehash(sk, new_hash); + u16 new_hash4 =3D udp_ehashfn(sock_net(sk), + inet_sk(sk)->inet_rcv_saddr, inet_sk(sk)->inet_num, + inet_sk(sk)->inet_daddr, inet_sk(sk)->inet_dport); + udp_lib_rehash(sk, new_hash, new_hash4); } =20 static int __udp_queue_rcv_skb(struct sock *sk, struct sk_buff *skb) @@ -2935,7 +3100,7 @@ struct proto udp_prot =3D { .owner =3D THIS_MODULE, .close =3D udp_lib_close, .pre_connect =3D udp_pre_connect, - .connect =3D ip4_datagram_connect, + .connect =3D udp_connect, .disconnect =3D udp_disconnect, .ioctl =3D udp_ioctl, .init =3D udp_init_sock, diff --git a/net/ipv6/udp.c b/net/ipv6/udp.c index bbf3352213c4..4d3dfcb48a39 100644 --- a/net/ipv6/udp.c +++ b/net/ipv6/udp.c @@ -111,7 +111,7 @@ void udp_v6_rehash(struct sock *sk) &sk->sk_v6_rcv_saddr, inet_sk(sk)->inet_num); =20 - udp_lib_rehash(sk, new_hash); + udp_lib_rehash(sk, new_hash, 0); /* 4-tuple hash not implemented */ } =20 static int compute_score(struct sock *sk, const struct net *net, --=20 2.32.0.3.g01195cf9f