Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp3982329pxb; Tue, 25 Jan 2022 00:37:14 -0800 (PST) X-Google-Smtp-Source: ABdhPJy8L+yeYwoqyaLv9JN4Ff2plPYIhmlcWL69KgKnvRNX+V7L+19YKV6Q0y4q+kCtB97ejojo X-Received: by 2002:a17:907:3f1c:: with SMTP id hq28mr7269646ejc.501.1643099834136; Tue, 25 Jan 2022 00:37:14 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1643099834; cv=none; d=google.com; s=arc-20160816; b=D/4R1W6Y0OzS0gVTgkfPZTgH+d7eF0L0YyiqkRSG6SrSPmVld2vEFC3xDx8bVhvY/i s2KoV5GsYORRsvqDceQfphf4NGEOLx22BvjQ4AN/aN9fcc54aqkJ1JY+pDx+JvE9hYLx DL2pGyrjHZJrIjFF2LgZC+uYaORAyArVOLfVRLMgb9w2dJes6gStEHCnQm11sEiQlV95 fy36ZGSgsuAz/znEg7xSR7zPBUwB0Dk92mdenfmOfHM28iuPvftY9v+BbBgNoeSxw3g4 NPWCHK+tAEelQMaFeHjWvb6d17IVHvBwWt/OzPZMpoWIN6jDL873xfOR1XjPlZGdXQFh Dq7w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=5ply/1xwwXtZ2sfGq7/vSupnP5SGCyXakMtZ1YLF/eI=; b=s0kDFHoI9FxkN50I+gMT7QjPeYMSTr0/kc3Av5OXbm/jETKYqjxviWtHru436GXS6k Sem18lAGAmekqB1d9RpzY5K5wu/FFbBhS3d9o21uXNKEnZpJjwG9djgl46LWcBkwU12S WIwAWg0q4s0Sre+8OwmJD3xwvgeqcfXrCZ5bCz8gXzFBmBmry7M0XvY2TcufzmqwQ4A7 AIANArleHUw8hnGgQTk6isrukiUkRNbNKZ3OOAWU/QJzxZGVPqzQP3yu2V9myYa84xsu ObUQ57nHqbzepJma7IT/T4d0KwEd7ay9KPatRPAUgzgqbKauH/Q9yM3rGLO1bL/IbuRz fQ9w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="ubHqgzY/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id e4si8968860ejl.40.2022.01.25.00.36.32; Tue, 25 Jan 2022 00:37:14 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="ubHqgzY/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1315307AbiAYCxK (ORCPT + 99 others); Mon, 24 Jan 2022 21:53:10 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46940 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1376993AbiAXVGc (ORCPT ); Mon, 24 Jan 2022 16:06:32 -0500 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 286A7C0613EF; Mon, 24 Jan 2022 12:06:48 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id BCB5461324; Mon, 24 Jan 2022 20:06:47 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id ACF53C340E5; Mon, 24 Jan 2022 20:06:46 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1643054807; bh=Jw7EEzHPcXAFK0dwyj8V0E54n37YUsAQ5hLgWn8Vm4U=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ubHqgzY/uDR7vbxbhgZ/XVNSwfZcddaHOtzgtHBtzi5c1tRcQm3cebnJHxbIa/csq LX6ZTp+WjiNgoNWc49qkD8fAJu9+sgcVeIBG4kV3JdDWHJVgJuiVjxTuYP80//buhF hIJUheACiANpj0pH9aHnlWTKOaKpvKT/yHC+DiJM= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Eric Dumazet , David Ahern , Jakub Kicinski Subject: [PATCH 5.10 510/563] ipv4: avoid quadratic behavior in netns dismantle Date: Mon, 24 Jan 2022 19:44:35 +0100 Message-Id: <20220124184042.099678760@linuxfoundation.org> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20220124184024.407936072@linuxfoundation.org> References: <20220124184024.407936072@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Eric Dumazet commit d07418afea8f1d9896aaf9dc5ae47ac4f45b220c upstream. net/ipv4/fib_semantics.c uses an hash table of 256 slots, keyed by device ifindexes: fib_info_devhash[DEVINDEX_HASHSIZE] Problem is that with network namespaces, devices tend to use the same ifindex. lo device for instance has a fixed ifindex of one, for all network namespaces. This means that hosts with thousands of netns spend a lot of time looking at some hash buckets with thousands of elements, notably at netns dismantle. Simply add a per netns perturbation (net_hash_mix()) to spread elements more uniformely. Also change fib_devindex_hashfn() to use more entropy. Fixes: aa79e66eee5d ("net: Make ifindex generation per-net namespace") Signed-off-by: Eric Dumazet Reviewed-by: David Ahern Signed-off-by: Jakub Kicinski Signed-off-by: Greg Kroah-Hartman --- net/ipv4/fib_semantics.c | 36 +++++++++++++++++------------------- 1 file changed, 17 insertions(+), 19 deletions(-) --- a/net/ipv4/fib_semantics.c +++ b/net/ipv4/fib_semantics.c @@ -29,6 +29,7 @@ #include #include #include +#include #include #include @@ -321,11 +322,15 @@ static inline int nh_comp(struct fib_inf static inline unsigned int fib_devindex_hashfn(unsigned int val) { - unsigned int mask = DEVINDEX_HASHSIZE - 1; + return hash_32(val, DEVINDEX_HASHBITS); +} + +static struct hlist_head * +fib_info_devhash_bucket(const struct net_device *dev) +{ + u32 val = net_hash_mix(dev_net(dev)) ^ dev->ifindex; - return (val ^ - (val >> DEVINDEX_HASHBITS) ^ - (val >> (DEVINDEX_HASHBITS * 2))) & mask; + return &fib_info_devhash[fib_devindex_hashfn(val)]; } static unsigned int fib_info_hashfn_1(int init_val, u8 protocol, u8 scope, @@ -435,12 +440,11 @@ int ip_fib_check_default(__be32 gw, stru { struct hlist_head *head; struct fib_nh *nh; - unsigned int hash; spin_lock(&fib_info_lock); - hash = fib_devindex_hashfn(dev->ifindex); - head = &fib_info_devhash[hash]; + head = fib_info_devhash_bucket(dev); + hlist_for_each_entry(nh, head, nh_hash) { if (nh->fib_nh_dev == dev && nh->fib_nh_gw4 == gw && @@ -1608,12 +1612,10 @@ link_it: } else { change_nexthops(fi) { struct hlist_head *head; - unsigned int hash; if (!nexthop_nh->fib_nh_dev) continue; - hash = fib_devindex_hashfn(nexthop_nh->fib_nh_dev->ifindex); - head = &fib_info_devhash[hash]; + head = fib_info_devhash_bucket(nexthop_nh->fib_nh_dev); hlist_add_head(&nexthop_nh->nh_hash, head); } endfor_nexthops(fi) } @@ -1963,8 +1965,7 @@ void fib_nhc_update_mtu(struct fib_nh_co void fib_sync_mtu(struct net_device *dev, u32 orig_mtu) { - unsigned int hash = fib_devindex_hashfn(dev->ifindex); - struct hlist_head *head = &fib_info_devhash[hash]; + struct hlist_head *head = fib_info_devhash_bucket(dev); struct fib_nh *nh; hlist_for_each_entry(nh, head, nh_hash) { @@ -1983,12 +1984,11 @@ void fib_sync_mtu(struct net_device *dev */ int fib_sync_down_dev(struct net_device *dev, unsigned long event, bool force) { - int ret = 0; - int scope = RT_SCOPE_NOWHERE; + struct hlist_head *head = fib_info_devhash_bucket(dev); struct fib_info *prev_fi = NULL; - unsigned int hash = fib_devindex_hashfn(dev->ifindex); - struct hlist_head *head = &fib_info_devhash[hash]; + int scope = RT_SCOPE_NOWHERE; struct fib_nh *nh; + int ret = 0; if (force) scope = -1; @@ -2133,7 +2133,6 @@ out: int fib_sync_up(struct net_device *dev, unsigned char nh_flags) { struct fib_info *prev_fi; - unsigned int hash; struct hlist_head *head; struct fib_nh *nh; int ret; @@ -2149,8 +2148,7 @@ int fib_sync_up(struct net_device *dev, } prev_fi = NULL; - hash = fib_devindex_hashfn(dev->ifindex); - head = &fib_info_devhash[hash]; + head = fib_info_devhash_bucket(dev); ret = 0; hlist_for_each_entry(nh, head, nh_hash) {