[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20150211.142936.951620487173949333.davem@davemloft.net>
Date: Wed, 11 Feb 2015 14:29:36 -0800 (PST)
From: David Miller <davem@...emloft.net>
To: imrep.amz@...il.com
Cc: bridge@...ts.linux-foundation.org, stephen@...workplumber.org,
netdev@...r.kernel.org, linux-kernel@...r.kernel.org,
imrep@...zon.de, aliguori@...zon.com
Subject: Re: [PATCH] bridge: make it possible for packets to traverse the
bridge withour hitting netfilter
From: Imre Palik <imrep.amz@...il.com>
Date: Tue, 10 Feb 2015 10:32:24 +0100
> From: "Palik, Imre" <imrep@...zon.de>
>
> The netfilter code is made with flexibility instead of performance in mind.
> So when all we want is to pass packets between different interfaces, the
> performance penalty of hitting netfilter code can be considerable, even when
> all the firewalling is disabled for the bridge.
>
> This change makes it possible to disable netfilter both on a per bridge basis,
> or for the whole bridging subsystem. In the case interesting to us, this can
> lead to more than 10% speedup compared to the case when only bridge-iptables
> are disabled.
>
> Cc: Anthony Liguori <aliguori@...zon.com>
> Signed-off-by: Imre Palik <imrep@...zon.de>
Sorry, no.
If I apply this, someone is going to try to submit a patch for every
damn protocol layer to add a stupid hack like this.
Makw NF_HOOK() faster instead.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists