Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp3660955pxb; Mon, 24 Jan 2022 14:43:37 -0800 (PST) X-Google-Smtp-Source: ABdhPJyQevggKTCaRWGiVT5JgaSg0hNGM2MO+huuZgG4TbDkgfSJsICVSMaL/2tcLnSgupIFc7sg X-Received: by 2002:a63:f508:: with SMTP id w8mr13312128pgh.152.1643064216804; Mon, 24 Jan 2022 14:43:36 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1643064216; cv=none; d=google.com; s=arc-20160816; b=iyWlRKIc4p1HVveOy3nUIZFl7p/yiu1NueZrtklkFE96OUSQf/ntKB+BBD/5AqqirK rG2soF+C4+Y9UV39BwOyhOmr2KTN68UmKsszkuIMNIWklQGbCkXc5YfNrUNAd+rOyz9Z BkeHujAqm+hSfdwWh4fhg8wq6AsroDWmIGDvDi3FlUBdug0EjVTNXwVzGggpx2P5iDlp gFcK789GPB2yg2AWhziLyFhej6rcedScVnBrd08UQkByahQRTwlT7zYIRMx7UJPBL+96 I/DX84KeVzZez66+8I9JkGfXegGBiwn9EzRoPGgvmW3NwqQXDqYvyhNXSU37pPgysy9P xYsA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=MRXRPRW10F3pN+29N7mGcn8+9eAvWyY4NjSHUcTdHcM=; b=aZrVkJ9LCtaR1uVzE/SiDDMmLRm2UDGebgY58hXmGD2DOgimZCP775aZ9Kt3N0Fq3L Sh8D7bstdtPZR3p8UJ5MfhEnpcTcj90Mt7s9hil1TgOxGydIoIh/IXe1f0pQj3fGNejk c9SzytP9MP51l+RvbKpikjJanq8D/IJG7vO/x0BjkvI/JlTFP3N87Tg/yrr7JP9HpPsH MNfEodBMu+eaGkJntoZS+yIgRrYR48EVJcVgB6Aft0XGOBika/L+LDYRF/kJy1QZa1+u SqERLfRKHdcBVXBunYU16g+49UewFgL8zJ1b++PF5snQzJGq08fWKttBpXH9VhfdXXqj pTZg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=QtN0Cyto; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id ng12si601477pjb.32.2022.01.24.14.43.24; Mon, 24 Jan 2022 14:43:36 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=QtN0Cyto; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1836821AbiAXWkz (ORCPT + 99 others); Mon, 24 Jan 2022 17:40:55 -0500 Received: from dfw.source.kernel.org ([139.178.84.217]:60198 "EHLO dfw.source.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1457683AbiAXVmI (ORCPT ); Mon, 24 Jan 2022 16:42:08 -0500 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 006B76150E; Mon, 24 Jan 2022 21:42:07 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 0F74DC340E4; Mon, 24 Jan 2022 21:42:05 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1643060526; bh=JR+CIPlwPm4CxYIFpJ+ZR7WBCsiaKJG3Bzl/6RlkOPU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=QtN0Cyto/FFNsImIHEEq8ymMMOeGg89PSrS8htN3KXvTPFrgcIwfEu5rY7HRjVlf9 xZJkhu35Yn2pasCcFwBov6BGLFwNlJ2ySod70YU9NyKLZl3fVxJSVCIldZJooqZ92K 6ss03ueZOMvfL4iBsItUdu5UIveDIbxL1XlCEr9Y= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Eric Dumazet , David Ahern , Jakub Kicinski Subject: [PATCH 5.16 0945/1039] ipv4: avoid quadratic behavior in netns dismantle Date: Mon, 24 Jan 2022 19:45:34 +0100 Message-Id: <20220124184157.064140950@linuxfoundation.org> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20220124184125.121143506@linuxfoundation.org> References: <20220124184125.121143506@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Eric Dumazet commit d07418afea8f1d9896aaf9dc5ae47ac4f45b220c upstream. net/ipv4/fib_semantics.c uses an hash table of 256 slots, keyed by device ifindexes: fib_info_devhash[DEVINDEX_HASHSIZE] Problem is that with network namespaces, devices tend to use the same ifindex. lo device for instance has a fixed ifindex of one, for all network namespaces. This means that hosts with thousands of netns spend a lot of time looking at some hash buckets with thousands of elements, notably at netns dismantle. Simply add a per netns perturbation (net_hash_mix()) to spread elements more uniformely. Also change fib_devindex_hashfn() to use more entropy. Fixes: aa79e66eee5d ("net: Make ifindex generation per-net namespace") Signed-off-by: Eric Dumazet Reviewed-by: David Ahern Signed-off-by: Jakub Kicinski Signed-off-by: Greg Kroah-Hartman --- net/ipv4/fib_semantics.c | 36 +++++++++++++++++------------------- 1 file changed, 17 insertions(+), 19 deletions(-) --- a/net/ipv4/fib_semantics.c +++ b/net/ipv4/fib_semantics.c @@ -29,6 +29,7 @@ #include #include #include +#include #include #include @@ -319,11 +320,15 @@ static inline int nh_comp(struct fib_inf static inline unsigned int fib_devindex_hashfn(unsigned int val) { - unsigned int mask = DEVINDEX_HASHSIZE - 1; + return hash_32(val, DEVINDEX_HASHBITS); +} + +static struct hlist_head * +fib_info_devhash_bucket(const struct net_device *dev) +{ + u32 val = net_hash_mix(dev_net(dev)) ^ dev->ifindex; - return (val ^ - (val >> DEVINDEX_HASHBITS) ^ - (val >> (DEVINDEX_HASHBITS * 2))) & mask; + return &fib_info_devhash[fib_devindex_hashfn(val)]; } static unsigned int fib_info_hashfn_1(int init_val, u8 protocol, u8 scope, @@ -433,12 +438,11 @@ int ip_fib_check_default(__be32 gw, stru { struct hlist_head *head; struct fib_nh *nh; - unsigned int hash; spin_lock(&fib_info_lock); - hash = fib_devindex_hashfn(dev->ifindex); - head = &fib_info_devhash[hash]; + head = fib_info_devhash_bucket(dev); + hlist_for_each_entry(nh, head, nh_hash) { if (nh->fib_nh_dev == dev && nh->fib_nh_gw4 == gw && @@ -1607,12 +1611,10 @@ link_it: } else { change_nexthops(fi) { struct hlist_head *head; - unsigned int hash; if (!nexthop_nh->fib_nh_dev) continue; - hash = fib_devindex_hashfn(nexthop_nh->fib_nh_dev->ifindex); - head = &fib_info_devhash[hash]; + head = fib_info_devhash_bucket(nexthop_nh->fib_nh_dev); hlist_add_head(&nexthop_nh->nh_hash, head); } endfor_nexthops(fi) } @@ -1964,8 +1966,7 @@ void fib_nhc_update_mtu(struct fib_nh_co void fib_sync_mtu(struct net_device *dev, u32 orig_mtu) { - unsigned int hash = fib_devindex_hashfn(dev->ifindex); - struct hlist_head *head = &fib_info_devhash[hash]; + struct hlist_head *head = fib_info_devhash_bucket(dev); struct fib_nh *nh; hlist_for_each_entry(nh, head, nh_hash) { @@ -1984,12 +1985,11 @@ void fib_sync_mtu(struct net_device *dev */ int fib_sync_down_dev(struct net_device *dev, unsigned long event, bool force) { - int ret = 0; - int scope = RT_SCOPE_NOWHERE; + struct hlist_head *head = fib_info_devhash_bucket(dev); struct fib_info *prev_fi = NULL; - unsigned int hash = fib_devindex_hashfn(dev->ifindex); - struct hlist_head *head = &fib_info_devhash[hash]; + int scope = RT_SCOPE_NOWHERE; struct fib_nh *nh; + int ret = 0; if (force) scope = -1; @@ -2134,7 +2134,6 @@ out: int fib_sync_up(struct net_device *dev, unsigned char nh_flags) { struct fib_info *prev_fi; - unsigned int hash; struct hlist_head *head; struct fib_nh *nh; int ret; @@ -2150,8 +2149,7 @@ int fib_sync_up(struct net_device *dev, } prev_fi = NULL; - hash = fib_devindex_hashfn(dev->ifindex); - head = &fib_info_devhash[hash]; + head = fib_info_devhash_bucket(dev); ret = 0; hlist_for_each_entry(nh, head, nh_hash) {