On 2022-12-13 09:18, Andrew Gallatin wrote:

I was trying to improve the performance of in_pcblookup(), as it is a very hot path for us (Netflix). One thing I noticed was the prison_flag() check in in_pcblookup_hash_locked() can cause a cache miss just by deref'ing the cred pointer, and it can also cause multiple misses in tables with collisions by causing us to walk the entire chain even after finding a perfect match.

I'm curious why this check is needed. Can you explain it to me? It originated in this commit:

commit 413628a7e3d23a897cd959638d325395e4c9691b
Author: Bjoern A. Zeeb <b...@freebsd.org>
Date:   Sat Nov 29 14:32:14 2008 +0000

MFp4:
Bring in updated jail support from bz_jail branch.

This enhances the current jail implementation to permit multiple
addresses per jail. In addtion to IPv4, IPv6 is supported as well.

My thinking is that a jail will either use the host IP, and share its port space, or it will have its own IP entirely (but I know nothing about jails). In either case, a perfect 4-tuple match should be enough to uniquely identify the connection.

Even if this somehow is not the case and we have multiple connections somehow sharing the same 4-tuple, how does checking the prison flag help us? It would prefer the jailed connection over the non jailed, but that would shadow a host connection. And if we had 2 jails sharing the same 4-tuple, the first jail would win.

I can't see how this check is doing anything useful, so I'd very much like to remove this check if possible. Untested patch attached.

For a complete 4-tuple, it should indeed be the case that a match would only ever identify a single prison. The later part of the function that examines wildcards definitely needs the check. I don't get the XXX comment about both being bound with SO_REUSEPORT, because I would only expect that to apply to listening, not to full connections. But I also expect Bjoern to know more than I do here...

- Jamie

Reply via email to