[Bug 1127] running nft command creates lag for forwarded packets
bugzilla-daemon at netfilter.org
bugzilla-daemon at netfilter.org
Thu Mar 9 14:01:34 CET 2017
https://bugzilla.netfilter.org/show_bug.cgi?id=1127
--- Comment #7 from Pablo Neira Ayuso <pablo at netfilter.org> ---
(In reply to Karel Rericha from comment #6)
> Patch didnt help Pablo. Listing this small set each second from patched box:
>
> testbox ~ # nft list set filter private
> table ip filter {
> set private {
> type ipv4_addr
> flags interval
> elements = { 10.0.0.0/8, 100.64.0.0/10, 172.16.0.0/12,
> 192.168.0.0/16}
> }
> }
>
> testbox ~ # watch -n 1 nft list set filter private > /dev/null
I guess you don't hit this problem if you just use non-interval sets.
The good solution is to provide a replacement for the interval set
implementation that we have now, which doesn't scale up as you're noticing.
I can workaround this by providing a lockless path to list. Still if you have
dynamic insertions on that interval tree, you would hit problems.
So the definitive solution is to provide a replacement implementation for
interval sets.
--
You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20170309/0d52f8a3/attachment.html>
More information about the netfilter-buglog
mailing list