Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 09 Nov 2018 16:47:31 +0000
From:      bugzilla-noreply@freebsd.org
To:        net@FreeBSD.org
Subject:   [Bug 143622] [pfil] [patch] unlock pfil lock while calling firewall hooks
Message-ID:  <bug-143622-7501-hzkNsvxHwz@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-143622-7501@https.bugs.freebsd.org/bugzilla/>
References:  <bug-143622-7501@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D143622

--- Comment #6 from Andrey V. Elsukov <ae@FreeBSD.org> ---
(In reply to Kristof Provost from comment #5)
> (In reply to Max Laier from comment #2)
> While rmlocks are relatively lightweight there is still a non-zero overhe=
ad.
> For the purposes of a test the lock can simply be removed, and without it=
 I
> see ~2% more packets per second in pf than with it.
> I've been thinking about replacing it with a CK_LIST and epoch based
> cleanup, but I stopped working on it when I spotted that ipfw relies on t=
he
> lock. It should be possible to move that into ipfw, but I'm not sure the =
2%
> is worth that work.

You can try to revert/rework this change and move IPFW_PF_RLOCK() back to t=
he
ipfw, and then you will be able to change pfil interface locking.

https://svnweb.freebsd.org/base/head/sys/netpfil/ipfw/ip_fw_private.h?r1=3D=
314716&r2=3D316461

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-143622-7501-hzkNsvxHwz>