fastforward/routing: a 3 million packet-per-second system?

Adrian Chadd adrian at freebsd.org
Mon Jul 28 17:30:50 UTC 2014


On 28 July 2014 07:51, John Jasen <jjasen at gmail.com> wrote:
> in_input crept up into the top 5, versus fastforward.
>
>
> Would PMC counters help?

Not at the moment. This is a lock contention thing, not a pmc thing. I
bet if you ran pmc the mutex/rwlock things would be up high. :)

>
>  cat debug.lock.pref.stats.out-20140728-1 | sort -nk 4 | tail -5
>        5         4         413         115         160      2      0  0
> 63 /usr/src/sys/kern/kern_condvar.c:145 (sleep mutex:Giant)
>        1         1      148858        4095      650072      0      0  0
> 11184 /usr/src/sys/kern/subr_turnstile.c:552 (spin mutex:turnstile chain)
>        8        14    13747639      561636    72520256      0      0  0
> 689603 /usr/src/sys/net/route.c:439 (sleep mutex:rtentry)
>        3        20     3907071     2322975    72520256      0      0  0
> 2529589 /usr/src/sys/netinet/ip_input.c:1315 (sleep mutex:rtentry)
>        3        17     3665247     3715117    72520256      0      0  0
> 8425384 /usr/src/sys/netinet/in_rmx.c:114 (sleep mutex:rtentry)

Try disabling net.inet.ip.redirect (sysctl net.inet.ip.redirect=0).
That'll eliminate that in_rmx.c check.

Oh look! The ip_output() path doesn't know about flowtable either.

I'm kind of surprised that the 2-tuple flowtable (ie, only ipv4 and
only ipv6 addresses, not TCP/UDP ports) isn't used in the ip
forwarding case. All ip_rtaddr() is doing is doing a route lookup and
taking a reference to the ifa. It's using that for things like
network/netmask on that interface.

Anyway - yeah, it looks like you've hit lock contention on that
particular setup. You'll likely get a little more throughout out by
disabling redirects for now. The real solution is to make the whole
rtentry locking less stupid and bottleneck-y as well as extending the
flowtable support to include the ip_forward() path.



-a


More information about the freebsd-net mailing list