lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <b2e12d85-4a45-e6a9-ac3f-aa932c5cf79b@iogearbox.net> Date: Tue, 7 Nov 2023 00:44:31 +0100 From: Daniel Borkmann <daniel@...earbox.net> To: Jakub Kicinski <kuba@...nel.org> Cc: martin.lau@...nel.org, netdev@...r.kernel.org, bpf@...r.kernel.org, Nikolay Aleksandrov <razor@...ckwall.org> Subject: Re: [PATCH bpf 4/6] bpf, netkit: Add indirect call wrapper for fetching peer dev On 11/6/23 10:32 PM, Jakub Kicinski wrote: > On Fri, 3 Nov 2023 23:27:46 +0100 Daniel Borkmann wrote: >> ndo_get_peer_dev is used in tcx BPF fast path, therefore make use of >> indirect call wrapper and therefore optimize the bpf_redirect_peer() >> internal handling a bit. Add a small skb_get_peer_dev() wrapper which >> utilizes the INDIRECT_CALL_1() macro instead of open coding. > > Why don't we kill the ndo and put the pointer in struct net_device? I can take a stab at this some time after LPC and probably makes sense also after Coco's cacheline optimizations landed. Thanks, Daniel
Powered by blists - more mailing lists