[OPTIM] frontend: tell the compiler that errors are unlikely to occur
Doing this brings better, more linear object code with less jumps in
the normal path.
diff --git a/src/frontend.c b/src/frontend.c
index baae0f3..08569ff 100644
--- a/src/frontend.c
+++ b/src/frontend.c
@@ -65,7 +65,7 @@
struct task *t;
struct tcp_rule *rule;
- if ((s = pool_alloc2(pool2_session)) == NULL) { /* disable this proxy for a while */
+ if (unlikely((s = pool_alloc2(pool2_session)) == NULL)) {
Alert("out of memory in event_accept().\n");
goto out_close;
}
@@ -80,9 +80,9 @@
/* if this session comes from a known monitoring system, we want to ignore
* it as soon as possible, which means closing it immediately for TCP.
*/
- if (p->mon_mask.s_addr &&
- addr->ss_family == AF_INET &&
- (((struct sockaddr_in *)addr)->sin_addr.s_addr & p->mon_mask.s_addr) == p->mon_net.s_addr) {
+ if (unlikely(p->mon_mask.s_addr &&
+ addr->ss_family == AF_INET &&
+ (((struct sockaddr_in *)addr)->sin_addr.s_addr & p->mon_mask.s_addr) == p->mon_net.s_addr)) {
if (p->mode == PR_MODE_TCP) {
pool_free2(pool2_session, s);
return 0;
@@ -90,7 +90,7 @@
s->flags |= SN_MONITOR;
}
- if ((t = task_new()) == NULL) { /* disable this proxy for a while */
+ if (unlikely((t = task_new()) == NULL)) { /* disable this proxy for a while */
Alert("out of memory in event_accept().\n");
goto out_free_session;
}
@@ -124,7 +124,7 @@
s->si[0].iohandler = NULL;
s->si[0].fd = cfd;
s->si[0].flags = SI_FL_NONE | SI_FL_CAP_SPLTCP; /* TCP splicing capable */
- if (s->fe->options2 & PR_O2_INDEPSTR)
+ if (likely(s->fe->options2 & PR_O2_INDEPSTR))
s->si[0].flags |= SI_FL_INDEP_STR;
s->si[0].exp = TICK_ETERNITY;
@@ -186,7 +186,7 @@
s->si[1].exp = TICK_ETERNITY;
s->si[1].fd = -1; /* just to help with debugging */
s->si[1].flags = SI_FL_NONE;
- if (s->be->options2 & PR_O2_INDEPSTR)
+ if (likely(s->be->options2 & PR_O2_INDEPSTR))
s->si[1].flags |= SI_FL_INDEP_STR;
s->srv = s->prev_srv = s->srv_conn = NULL;
@@ -239,9 +239,9 @@
txn->hdr_idx.size = txn->hdr_idx.used = 0;
/* Adjust some socket options */
- if ((fcntl(cfd, F_SETFL, O_NONBLOCK) == -1) ||
- (setsockopt(cfd, IPPROTO_TCP, TCP_NODELAY,
- (char *) &one, sizeof(one)) == -1)) {
+ if (unlikely(fcntl(cfd, F_SETFL, O_NONBLOCK) == -1 ||
+ setsockopt(cfd, IPPROTO_TCP, TCP_NODELAY,
+ (char *) &one, sizeof(one)) == -1)) {
Alert("accept(): cannot set the socket in non blocking mode. Giving up\n");
goto out_free_task;
}
@@ -260,12 +260,12 @@
if (p->mode == PR_MODE_HTTP) {
/* the captures are only used in HTTP frontends */
- if (p->nb_req_cap > 0 &&
- (txn->req.cap = pool_alloc2(p->req_cap_pool)) == NULL)
+ if (unlikely(p->nb_req_cap > 0 &&
+ (txn->req.cap = pool_alloc2(p->req_cap_pool)) == NULL))
goto out_fail_reqcap; /* no memory */
- if (p->nb_rsp_cap > 0 &&
- (txn->rsp.cap = pool_alloc2(p->rsp_cap_pool)) == NULL)
+ if (unlikely(p->nb_rsp_cap > 0 &&
+ (txn->rsp.cap = pool_alloc2(p->rsp_cap_pool)) == NULL))
goto out_fail_rspcap; /* no memory */
}
@@ -276,7 +276,7 @@
*/
txn->hdr_idx.size = MAX_HTTP_HDR;
- if ((txn->hdr_idx.v = pool_alloc2(p->hdr_idx_pool)) == NULL)
+ if (unlikely((txn->hdr_idx.v = pool_alloc2(p->hdr_idx_pool)) == NULL))
goto out_fail_idx; /* no memory */
/* and now initialize the HTTP transaction state */
@@ -285,7 +285,7 @@
if ((p->mode == PR_MODE_TCP || p->mode == PR_MODE_HTTP)
&& (p->logfac1 >= 0 || p->logfac2 >= 0)) {
- if (p->to_log) {
+ if (likely(p->to_log)) {
/* we have the client ip */
if (s->logs.logwait & LW_CLIP)
if (!(s->logs.logwait &= ~LW_CLIP))
@@ -325,7 +325,7 @@
}
}
- if ((global.mode & MODE_DEBUG) && (!(global.mode & MODE_QUIET) || (global.mode & MODE_VERBOSE))) {
+ if (unlikely((global.mode & MODE_DEBUG) && (!(global.mode & MODE_QUIET) || (global.mode & MODE_VERBOSE)))) {
int len;
if (!(s->flags & SN_FRT_ADDR_SET))
@@ -355,7 +355,7 @@
write(1, trash, len);
}
- if ((s->req = pool_alloc2(pool2_buffer)) == NULL)
+ if (unlikely((s->req = pool_alloc2(pool2_buffer)) == NULL))
goto out_fail_req; /* no memory */
s->req->size = global.tune.bufsize;
@@ -382,7 +382,7 @@
s->req->wto = s->be->timeout.server;
s->req->cto = s->be->timeout.connect;
- if ((s->rep = pool_alloc2(pool2_buffer)) == NULL)
+ if (unlikely((s->rep = pool_alloc2(pool2_buffer)) == NULL))
goto out_fail_rep; /* no memory */
s->rep->size = global.tune.bufsize;
@@ -418,8 +418,8 @@
fdinfo[cfd].peeraddr = (struct sockaddr *)&s->cli_addr;
fdinfo[cfd].peerlen = sizeof(s->cli_addr);
- if ((p->mode == PR_MODE_HTTP && (s->flags & SN_MONITOR)) ||
- (p->mode == PR_MODE_HEALTH && (p->options & PR_O_HTTP_CHK))) {
+ if (unlikely((p->mode == PR_MODE_HTTP && (s->flags & SN_MONITOR)) ||
+ (p->mode == PR_MODE_HEALTH && (p->options & PR_O_HTTP_CHK)))) {
/* Either we got a request from a monitoring system on an HTTP instance,
* or we're in health check mode with the 'httpchk' option enabled. In
* both cases, we return a fake "HTTP/1.0 200 OK" response and we exit.
@@ -430,7 +430,7 @@
s->req->analysers = 0;
t->expire = s->rep->wex;
}
- else if (p->mode == PR_MODE_HEALTH) { /* health check mode, no client reading */
+ else if (unlikely(p->mode == PR_MODE_HEALTH)) { /* health check mode, no client reading */
struct chunk msg;
chunk_initstr(&msg, "OK\n");
stream_int_retnclose(&s->si[0], &msg); /* forge an "OK" response */