From patchwork Wed Dec 16 19:24:31 2009 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Lucian Adrian Grijincu X-Patchwork-Id: 41284 X-Patchwork-Delegate: davem@davemloft.net Return-Path: X-Original-To: patchwork-incoming@ozlabs.org Delivered-To: patchwork-incoming@ozlabs.org Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by ozlabs.org (Postfix) with ESMTP id 25C5CB6F05 for ; Thu, 17 Dec 2009 06:24:59 +1100 (EST) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S935558AbZLPTYh (ORCPT ); Wed, 16 Dec 2009 14:24:37 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S935570AbZLPTYg (ORCPT ); Wed, 16 Dec 2009 14:24:36 -0500 Received: from ixro-out-rtc.ixiacom.com ([92.87.192.98]:26202 "EHLO ixro-ex1.ixiacom.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S935558AbZLPTYd (ORCPT ); Wed, 16 Dec 2009 14:24:33 -0500 Received: from [10.205.9.89] ([10.205.9.89]) by ixro-ex1.ixiacom.com with Microsoft SMTPSVC(6.0.3790.3959); Wed, 16 Dec 2009 21:24:31 +0200 Message-ID: <4B2933EF.9060606@ixiacom.com> Date: Wed, 16 Dec 2009 21:24:31 +0200 From: Lucian Adrian Grijincu User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.1.6pre) Gecko/20091125 Shredder/3.0.1pre MIME-Version: 1.0 To: netdev@vger.kernel.org CC: Octavian Purdila Subject: [RFC 1/2] udp: add non-linear uniform port allocation scheme option /proc/sys/net/ipv4/udp_port_randomization X-OriginalArrivalTime: 16 Dec 2009 19:24:31.0809 (UTC) FILETIME=[64A9F310:01CA7E85] Sender: netdev-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org When we allocate ports with a (really) high frequency, randomization does more harm as some values tend to repeat with a higher frequency than they would if allocated uniformly, while others are selected more rarely. This patch does not allocate ports linearly as older kernels used to do, but it allocates the port with an uniform frequency. For example: assuming UDP_HTABLE_SIZE=8, hint=3, low=0, high=32 This leads to: > first=3, last=3+8=11, rand=(1 | 1) * UDP_HTABLE_SIZE=8 The port selection code is similar to: > for first in [3..11): > snum = first > do if (!good(snum)) snum+=8 while(snum!=first) Will give the following sequence for snum (skipping `modulo 32` for brevity) 3, 3+8, 3+8+8, 3+8+8+8, 4, 4+8, 4+8+8, 4+8+8+8, ... 9, 9+8, 9+8+8, 9+8+8+8, 10, 10+8, 10+8+8, 10+8+8+8, This will generate all numbers in the [low..high) interval with the same frequency. This leads to better performance when most ports are already allocated. Randomization is still enabled by default for normal setups that will most likely not encounter such situations. Signed-off-by: Lucian Adrian Grijincu --- include/net/udp.h | 1 + net/ipv4/sysctl_net_ipv4.c | 7 +++++++ net/ipv4/udp.c | 18 +++++++++++++++--- 3 files changed, 23 insertions(+), 3 deletions(-) diff --git a/include/net/udp.h b/include/net/udp.h index 5348d80..925535e 100644 --- a/include/net/udp.h +++ b/include/net/udp.h @@ -111,6 +111,7 @@ extern atomic_t udp_memory_allocated; extern int sysctl_udp_mem[3]; extern int sysctl_udp_rmem_min; extern int sysctl_udp_wmem_min; +extern int sysctl_udp_port_randomization; struct sk_buff; diff --git a/net/ipv4/sysctl_net_ipv4.c b/net/ipv4/sysctl_net_ipv4.c index 7e3712c..ef811c3 100644 --- a/net/ipv4/sysctl_net_ipv4.c +++ b/net/ipv4/sysctl_net_ipv4.c @@ -599,6 +599,13 @@ static struct ctl_table ipv4_table[] = { .proc_handler = proc_dointvec_minmax, .extra1 = &zero }, + { + .procname = "udp_port_randomization", + .data = &sysctl_udp_port_randomization, + .maxlen = sizeof(sysctl_udp_port_randomization), + .mode = 0644, + .proc_handler = proc_dointvec_minmax, + }, { } }; diff --git a/net/ipv4/udp.c b/net/ipv4/udp.c index 1f95348..f437d9d 100644 --- a/net/ipv4/udp.c +++ b/net/ipv4/udp.c @@ -182,6 +182,9 @@ static int udp_lib_lport_inuse2(struct net *net, __u16 num, return res; } +int sysctl_udp_port_randomization = 1; +EXPORT_SYMBOL(sysctl_udp_port_randomization); + /** * udp_lib_get_port - UDP/-Lite port lookup for IPv4 and IPv6 * @@ -202,6 +205,7 @@ int udp_lib_get_port(struct sock *sk, unsigned short snum, struct net *net = sock_net(sk); if (!snum) { + static int hint; int low, high, remaining; unsigned rand; unsigned short first, last; @@ -210,8 +214,13 @@ int udp_lib_get_port(struct sock *sk, unsigned short snum, inet_get_local_port_range(&low, &high); remaining = (high - low) + 1; - rand = net_random(); - first = (((u64)rand * remaining) >> 32) + low; + if (likely(sysctl_udp_port_randomization)) { + rand = net_random(); + first = (((u64)rand * remaining) >> 32) + low; + } else { + rand = 1; + first = hint; + } /* * force rand to be an odd multiple of UDP_HTABLE_SIZE */ @@ -233,8 +242,11 @@ int udp_lib_get_port(struct sock *sk, unsigned short snum, */ do { if (low <= snum && snum <= high && - !test_bit(snum >> udptable->log, bitmap)) + !test_bit(snum >> udptable->log, bitmap)) { + if (unlikely(!sysctl_udp_port_randomization)) + hint = snum; goto found; + } snum += rand; } while (snum != first); spin_unlock_bh(&hslot->lock);