lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20150223160619.GF24297@breakpoint.cc> Date: Mon, 23 Feb 2015 17:06:19 +0100 From: Florian Westphal <fw@...len.de> To: Imre Palik <imrep.amz@...il.com> Cc: bridge@...ts.linux-foundation.org, Stephen Hemminger <stephen@...workplumber.org>, "David S. Miller" <davem@...emloft.net>, netdev@...r.kernel.org, linux-kernel@...r.kernel.org, fw@...len.de, "Palik, Imre" <imrep@...zon.de>, Anthony Liguori <aliguori@...zon.com> Subject: Re: [RFC PATCH v2] bridge: make it possible for packets to traverse the bridge without hitting netfilter Imre Palik <imrep.amz@...il.com> wrote: > The netfilter code is made with flexibility instead of performance in mind. > So when all we want is to pass packets between different interfaces, the > performance penalty of hitting netfilter code can be considerable, even when > all the firewalling is disabled for the bridge. > > This change makes it possible to disable netfilter on a per bridge basis. > In the case interesting to us, this can lead to more than 15% speedup > compared to the case when only bridge-iptables is disabled. I wonder what the speed difference is between no-rules (i.e., we hit jump label in NF_HOOK), one single (ebtables) accept-all rule, and this patch, for the call_nf==false case. I guess your 15% speedup figure is coming from ebtables' O(n) rule evaluation overhead? If yes, how many rules are we talking about? Iff thats true, then the 'better' (I know, it won't help you) solution would be to use nftables bridgeport-based verdict maps... If thats still too much overhead, then we clearly need to do *something*... Thanks, Florian -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists