Revive SplitHostCacheByNetworkAnonymizationKey [chromium/src : main]

0 views
Skip to first unread message

Kenichi Ishibashi (Gerrit)

unread,
Mar 30, 2026, 3:01:18 AM (7 days ago) Mar 30
to Chromium LUCI CQ, chromium...@chromium.org, bnc+...@chromium.org, net-r...@chromium.org
Attention needed from mmenke

Kenichi Ishibashi added 1 comment

Patchset-level comments
File-level comment, Patchset 5 (Latest):
Kenichi Ishibashi . resolved

mmenke@: PTAL, we want to run a holdback experiment to disable host cache network isolation, just for perf investigation. We don't plan to disable DNS network isolation at this point.

Open in Gerrit

Related details

Attention is currently required from:
  • mmenke
Submit Requirements:
  • requirement satisfiedCode-Coverage
  • requirement satisfiedCode-Owners
  • requirement is not satisfiedCode-Review
  • requirement is not satisfiedReview-Enforcement
Inspect html for hidden footers to help with email filtering. To unsubscribe visit settings. DiffyGerrit
Gerrit-MessageType: comment
Gerrit-Project: chromium/src
Gerrit-Branch: main
Gerrit-Change-Id: Icb032cbb7166742d61d68b02e63df2ade9f17bd3
Gerrit-Change-Number: 7707622
Gerrit-PatchSet: 5
Gerrit-Owner: Kenichi Ishibashi <ba...@chromium.org>
Gerrit-Reviewer: Kenichi Ishibashi <ba...@chromium.org>
Gerrit-Reviewer: mmenke <mme...@chromium.org>
Gerrit-Attention: mmenke <mme...@chromium.org>
Gerrit-Comment-Date: Mon, 30 Mar 2026 07:01:08 +0000
Gerrit-HasComments: Yes
Gerrit-Has-Labels: No
satisfied_requirement
unsatisfied_requirement
open
diffy

Kouhei Ueno (Gerrit)

unread,
Mar 30, 2026, 8:07:27 AM (6 days ago) Mar 30
to Kenichi Ishibashi, Chromium LUCI CQ, chromium...@chromium.org, bnc+...@chromium.org, net-r...@chromium.org
Attention needed from Kenichi Ishibashi and mmenke

Kouhei Ueno voted Code-Review+1

Code-Review+1
Open in Gerrit

Related details

Attention is currently required from:
  • Kenichi Ishibashi
  • mmenke
Submit Requirements:
    • requirement satisfiedCode-Coverage
    • requirement satisfiedCode-Owners
    • requirement satisfiedCode-Review
    • requirement satisfiedReview-Enforcement
    Inspect html for hidden footers to help with email filtering. To unsubscribe visit settings. DiffyGerrit
    Gerrit-MessageType: comment
    Gerrit-Project: chromium/src
    Gerrit-Branch: main
    Gerrit-Change-Id: Icb032cbb7166742d61d68b02e63df2ade9f17bd3
    Gerrit-Change-Number: 7707622
    Gerrit-PatchSet: 5
    Gerrit-Owner: Kenichi Ishibashi <ba...@chromium.org>
    Gerrit-Reviewer: Kenichi Ishibashi <ba...@chromium.org>
    Gerrit-Reviewer: Kouhei Ueno <kou...@chromium.org>
    Gerrit-Reviewer: mmenke <mme...@chromium.org>
    Gerrit-Attention: mmenke <mme...@chromium.org>
    Gerrit-Attention: Kenichi Ishibashi <ba...@chromium.org>
    Gerrit-Comment-Date: Mon, 30 Mar 2026 12:06:50 +0000
    Gerrit-HasComments: No
    Gerrit-Has-Labels: Yes
    satisfied_requirement
    open
    diffy

    mmenke (Gerrit)

    unread,
    Mar 30, 2026, 11:03:41 AM (6 days ago) Mar 30
    to Kenichi Ishibashi, Kouhei Ueno, Chromium LUCI CQ, chromium...@chromium.org, bnc+...@chromium.org, net-r...@chromium.org
    Attention needed from Kenichi Ishibashi

    mmenke added 1 comment

    Patchset-level comments
    mmenke . resolved

    Looks like you already have the +1 you need, so I'm going to defer to Kouhei.

    Also, rare is it for me to refuse to have anything to due with a feature due to disagreement with the direction a CL is taking us (in fact, I'm not sure I've ever done that before), but in this case, I'm going to do that. I feel that no thought has gone into the privacy or security issues here, given the fact that no doc has covered them. It's not so much that I'm completely confident that this is a bad idea, but rather that I don't feel anyone on the critical path here has given any thought to whether it is.

    I feel that the sole focus here has been trying to eek out a bit of performance, while throwing everything else aside. Maybe there's been more thought invested here than I'm aware of, but I'm skeptical of that, given the multiple docs on this without any security and privacy sections discussing the risks.

    This feeling is doubtless aggravated a bit by the lack of activity from anyone else on all the Google-generated AI bug reports we're seeing.

    Anyhow, I'm not going to try and block this effort, but at this point, I don't want to have anything to do with proceeding here.

    Looks like you have the signoff you need, anyways.

    Open in Gerrit

    Related details

    Attention is currently required from:
    • Kenichi Ishibashi
    Submit Requirements:
    • requirement satisfiedCode-Coverage
    • requirement satisfiedCode-Owners
    • requirement satisfiedCode-Review
    • requirement satisfiedReview-Enforcement
    Inspect html for hidden footers to help with email filtering. To unsubscribe visit settings. DiffyGerrit
    Gerrit-MessageType: comment
    Gerrit-Project: chromium/src
    Gerrit-Branch: main
    Gerrit-Change-Id: Icb032cbb7166742d61d68b02e63df2ade9f17bd3
    Gerrit-Change-Number: 7707622
    Gerrit-PatchSet: 5
    Gerrit-Owner: Kenichi Ishibashi <ba...@chromium.org>
    Gerrit-Reviewer: Kenichi Ishibashi <ba...@chromium.org>
    Gerrit-Reviewer: Kouhei Ueno <kou...@chromium.org>
    Gerrit-Reviewer: mmenke <mme...@chromium.org>
    Gerrit-Attention: Kenichi Ishibashi <ba...@chromium.org>
    Gerrit-Comment-Date: Mon, 30 Mar 2026 15:03:17 +0000
    Gerrit-HasComments: Yes
    Gerrit-Has-Labels: No
    satisfied_requirement
    open
    diffy

    Kenichi Ishibashi (Gerrit)

    unread,
    Mar 30, 2026, 9:49:31 PM (6 days ago) Mar 30
    to Kentaro Hara, Javier Garcia Visiedo, Kouhei Ueno, Chromium LUCI CQ, chromium...@chromium.org, bnc+...@chromium.org, net-r...@chromium.org
    Attention needed from Kentaro Hara and Kouhei Ueno

    Kenichi Ishibashi added 2 comments

    Patchset-level comments
    mmenke . resolved

    Looks like you already have the +1 you need, so I'm going to defer to Kouhei.

    Also, rare is it for me to refuse to have anything to due with a feature due to disagreement with the direction a CL is taking us (in fact, I'm not sure I've ever done that before), but in this case, I'm going to do that. I feel that no thought has gone into the privacy or security issues here, given the fact that no doc has covered them. It's not so much that I'm completely confident that this is a bad idea, but rather that I don't feel anyone on the critical path here has given any thought to whether it is.

    I feel that the sole focus here has been trying to eek out a bit of performance, while throwing everything else aside. Maybe there's been more thought invested here than I'm aware of, but I'm skeptical of that, given the multiple docs on this without any security and privacy sections discussing the risks.

    This feeling is doubtless aggravated a bit by the lack of activity from anyone else on all the Google-generated AI bug reports we're seeing.

    Anyhow, I'm not going to try and block this effort, but at this point, I don't want to have anything to do with proceeding here.

    Looks like you have the signoff you need, anyways.

    Kenichi Ishibashi

    I'm sorry I wasn't considerate enough in may ways. Let me loop in haraken@ and kouhei@ for these aspects.

    I would also like to discuss the lack of response to AI bug reports within the team. Cc-ing visiedo@.

    Regarding this CL, I plan to submit this CL so that we can have a way to start an experiment. We'll carefully consider whether we run it.

    Kenichi Ishibashi . resolved

    mmenke@: Thank you for your feedback.

    +haraken@ and +visiedo@ for discussion.

    Open in Gerrit

    Related details

    Attention is currently required from:
    • Kentaro Hara
    • Kouhei Ueno
    Submit Requirements:
    • requirement satisfiedCode-Coverage
    • requirement satisfiedCode-Owners
    • requirement satisfiedCode-Review
    • requirement satisfiedReview-Enforcement
    Inspect html for hidden footers to help with email filtering. To unsubscribe visit settings. DiffyGerrit
    Gerrit-MessageType: comment
    Gerrit-Project: chromium/src
    Gerrit-Branch: main
    Gerrit-Change-Id: Icb032cbb7166742d61d68b02e63df2ade9f17bd3
    Gerrit-Change-Number: 7707622
    Gerrit-PatchSet: 5
    Gerrit-Owner: Kenichi Ishibashi <ba...@chromium.org>
    Gerrit-Reviewer: Kenichi Ishibashi <ba...@chromium.org>
    Gerrit-Reviewer: Kouhei Ueno <kou...@chromium.org>
    Gerrit-CC: Javier Garcia Visiedo <vis...@google.com>
    Gerrit-CC: Kentaro Hara <har...@chromium.org>
    Gerrit-CC: mmenke <mme...@chromium.org>
    Gerrit-Attention: Kouhei Ueno <kou...@chromium.org>
    Gerrit-Attention: Kentaro Hara <har...@chromium.org>
    Gerrit-Comment-Date: Tue, 31 Mar 2026 01:48:52 +0000
    Gerrit-HasComments: Yes
    Gerrit-Has-Labels: No
    Comment-In-Reply-To: mmenke <mme...@chromium.org>
    satisfied_requirement
    open
    diffy

    Kentaro Hara (Gerrit)

    unread,
    Mar 31, 2026, 1:27:36 AM (6 days ago) Mar 31
    to Kenichi Ishibashi, Javier Garcia Visiedo, Kouhei Ueno, Chromium LUCI CQ, chromium...@chromium.org, bnc+...@chromium.org, net-r...@chromium.org
    Attention needed from Kenichi Ishibashi, Kouhei Ueno and mmenke

    Kentaro Hara added 1 comment

    Patchset-level comments
    mmenke . resolved

    Looks like you already have the +1 you need, so I'm going to defer to Kouhei.

    Also, rare is it for me to refuse to have anything to due with a feature due to disagreement with the direction a CL is taking us (in fact, I'm not sure I've ever done that before), but in this case, I'm going to do that. I feel that no thought has gone into the privacy or security issues here, given the fact that no doc has covered them. It's not so much that I'm completely confident that this is a bad idea, but rather that I don't feel anyone on the critical path here has given any thought to whether it is.

    I feel that the sole focus here has been trying to eek out a bit of performance, while throwing everything else aside. Maybe there's been more thought invested here than I'm aware of, but I'm skeptical of that, given the multiple docs on this without any security and privacy sections discussing the risks.

    This feeling is doubtless aggravated a bit by the lack of activity from anyone else on all the Google-generated AI bug reports we're seeing.

    Anyhow, I'm not going to try and block this effort, but at this point, I don't want to have anything to do with proceeding here.

    Looks like you have the signoff you need, anyways.

    Kenichi Ishibashi

    I'm sorry I wasn't considerate enough in may ways. Let me loop in haraken@ and kouhei@ for these aspects.

    I would also like to discuss the lack of response to AI bug reports within the team. Cc-ing visiedo@.

    Regarding this CL, I plan to submit this CL so that we can have a way to start an experiment. We'll carefully consider whether we run it.

    Kentaro Hara

    Regarding privacy / security impact, I think we've fully analyzed it when we launched the partitioning a few years ago and decided to go with 2.5 key partitioning (Example doc: https://docs.google.com/document/d/1T1SFOlRmLyMq8nYvDG7t2r9-SzpkE0Lz3bK3l-XtI0U/edit?resourcekey=0-yihfJ_Z20DTlmXTn9jVmaA&tab=t.0).

    The reason I want to run this experiment is to collect new information about performance because the assumptions about performance have changed in the past years (e.g., SearchLatency and Android memory were not evaluated when we launched the partitioning). My plan is to collect the performance numbers on the new metrics, and if the impact is substantial, kick off a discussion of the performance vs. security tradeoff.

    Google-generated AI bug reports

    I'm working on it with the top priority. Improving the precision of the bug reports, creating a guideline for individual feature teams etc.

    Open in Gerrit

    Related details

    Attention is currently required from:
    • Kenichi Ishibashi
    • Kouhei Ueno
    • mmenke
    Submit Requirements:
    • requirement satisfiedCode-Coverage
    • requirement satisfiedCode-Owners
    • requirement satisfiedCode-Review
    • requirement satisfiedReview-Enforcement
    Inspect html for hidden footers to help with email filtering. To unsubscribe visit settings. DiffyGerrit
    Gerrit-MessageType: comment
    Gerrit-Project: chromium/src
    Gerrit-Branch: main
    Gerrit-Change-Id: Icb032cbb7166742d61d68b02e63df2ade9f17bd3
    Gerrit-Change-Number: 7707622
    Gerrit-PatchSet: 5
    Gerrit-Owner: Kenichi Ishibashi <ba...@chromium.org>
    Gerrit-Reviewer: Kenichi Ishibashi <ba...@chromium.org>
    Gerrit-Reviewer: Kouhei Ueno <kou...@chromium.org>
    Gerrit-CC: Javier Garcia Visiedo <vis...@google.com>
    Gerrit-CC: Kentaro Hara <har...@chromium.org>
    Gerrit-CC: mmenke <mme...@chromium.org>
    Gerrit-Attention: mmenke <mme...@chromium.org>
    Gerrit-Attention: Kenichi Ishibashi <ba...@chromium.org>
    Gerrit-Attention: Kouhei Ueno <kou...@chromium.org>
    Gerrit-Comment-Date: Tue, 31 Mar 2026 05:27:02 +0000
    Gerrit-HasComments: Yes
    Gerrit-Has-Labels: No
    Comment-In-Reply-To: mmenke <mme...@chromium.org>
    Comment-In-Reply-To: Kenichi Ishibashi <ba...@chromium.org>
    satisfied_requirement
    open
    diffy

    mmenke (Gerrit)

    unread,
    Mar 31, 2026, 10:11:27 AM (5 days ago) Mar 31
    to Kenichi Ishibashi, Kentaro Hara, Javier Garcia Visiedo, Kouhei Ueno, Chromium LUCI CQ, chromium...@chromium.org, bnc+...@chromium.org, net-r...@chromium.org
    Attention needed from Kenichi Ishibashi, Kentaro Hara and Kouhei Ueno

    mmenke added 1 comment

    Patchset-level comments
    mmenke . resolved

    Looks like you already have the +1 you need, so I'm going to defer to Kouhei.

    Also, rare is it for me to refuse to have anything to due with a feature due to disagreement with the direction a CL is taking us (in fact, I'm not sure I've ever done that before), but in this case, I'm going to do that. I feel that no thought has gone into the privacy or security issues here, given the fact that no doc has covered them. It's not so much that I'm completely confident that this is a bad idea, but rather that I don't feel anyone on the critical path here has given any thought to whether it is.

    I feel that the sole focus here has been trying to eek out a bit of performance, while throwing everything else aside. Maybe there's been more thought invested here than I'm aware of, but I'm skeptical of that, given the multiple docs on this without any security and privacy sections discussing the risks.

    This feeling is doubtless aggravated a bit by the lack of activity from anyone else on all the Google-generated AI bug reports we're seeing.

    Anyhow, I'm not going to try and block this effort, but at this point, I don't want to have anything to do with proceeding here.

    Looks like you have the signoff you need, anyways.

    Kenichi Ishibashi

    I'm sorry I wasn't considerate enough in may ways. Let me loop in haraken@ and kouhei@ for these aspects.

    I would also like to discuss the lack of response to AI bug reports within the team. Cc-ing visiedo@.

    Regarding this CL, I plan to submit this CL so that we can have a way to start an experiment. We'll carefully consider whether we run it.

    Kentaro Hara

    Regarding privacy / security impact, I think we've fully analyzed it when we launched the partitioning a few years ago and decided to go with 2.5 key partitioning (Example doc: https://docs.google.com/document/d/1T1SFOlRmLyMq8nYvDG7t2r9-SzpkE0Lz3bK3l-XtI0U/edit?resourcekey=0-yihfJ_Z20DTlmXTn9jVmaA&tab=t.0).

    The reason I want to run this experiment is to collect new information about performance because the assumptions about performance have changed in the past years (e.g., SearchLatency and Android memory were not evaluated when we launched the partitioning). My plan is to collect the performance numbers on the new metrics, and if the impact is substantial, kick off a discussion of the performance vs. security tradeoff.

    Google-generated AI bug reports

    I'm working on it with the top priority. Improving the precision of the bug reports, creating a guideline for individual feature teams etc.

    mmenke

    Well, we also have perf numbers from before we deployed partitioning. They're both outdated, and don't reflect the difference of just removing partitioning at this layer. Same issues apply to that doc.

    Open in Gerrit

    Related details

    Attention is currently required from:
    • Kenichi Ishibashi
    • Kentaro Hara
    • Kouhei Ueno
    Submit Requirements:
    • requirement satisfiedCode-Coverage
    • requirement satisfiedCode-Owners
    • requirement satisfiedCode-Review
    • requirement satisfiedReview-Enforcement
    Inspect html for hidden footers to help with email filtering. To unsubscribe visit settings. DiffyGerrit
    Gerrit-MessageType: comment
    Gerrit-Project: chromium/src
    Gerrit-Branch: main
    Gerrit-Change-Id: Icb032cbb7166742d61d68b02e63df2ade9f17bd3
    Gerrit-Change-Number: 7707622
    Gerrit-PatchSet: 5
    Gerrit-Owner: Kenichi Ishibashi <ba...@chromium.org>
    Gerrit-Reviewer: Kenichi Ishibashi <ba...@chromium.org>
    Gerrit-Reviewer: Kouhei Ueno <kou...@chromium.org>
    Gerrit-CC: Javier Garcia Visiedo <vis...@google.com>
    Gerrit-CC: Kentaro Hara <har...@chromium.org>
    Gerrit-CC: mmenke <mme...@chromium.org>
    Gerrit-Attention: Kenichi Ishibashi <ba...@chromium.org>
    Gerrit-Attention: Kouhei Ueno <kou...@chromium.org>
    Gerrit-Attention: Kentaro Hara <har...@chromium.org>
    Gerrit-Comment-Date: Tue, 31 Mar 2026 14:11:20 +0000
    Gerrit-HasComments: Yes
    Gerrit-Has-Labels: No
    Comment-In-Reply-To: mmenke <mme...@chromium.org>
    Comment-In-Reply-To: Kenichi Ishibashi <ba...@chromium.org>
    Comment-In-Reply-To: Kentaro Hara <har...@chromium.org>
    satisfied_requirement
    open
    diffy

    Kenichi Ishibashi (Gerrit)

    unread,
    Apr 3, 2026, 6:34:47 PM (2 days ago) Apr 3
    to Kentaro Hara, Javier Garcia Visiedo, Kouhei Ueno, Chromium LUCI CQ, chromium...@chromium.org, bnc+...@chromium.org, net-r...@chromium.org
    Attention needed from Kentaro Hara and Kouhei Ueno

    Kenichi Ishibashi voted and added 1 comment

    Votes added by Kenichi Ishibashi

    Commit-Queue+2

    1 comment

    Patchset-level comments
    Kenichi Ishibashi . resolved

    Let me submit this for now.

    Open in Gerrit

    Related details

    Attention is currently required from:
    • Kentaro Hara
    • Kouhei Ueno
    Submit Requirements:
    • requirement satisfiedCode-Coverage
    • requirement satisfiedCode-Owners
    • requirement satisfiedCode-Review
    • requirement satisfiedReview-Enforcement
    Inspect html for hidden footers to help with email filtering. To unsubscribe visit settings. DiffyGerrit
    Gerrit-MessageType: comment
    Gerrit-Project: chromium/src
    Gerrit-Branch: main
    Gerrit-Change-Id: Icb032cbb7166742d61d68b02e63df2ade9f17bd3
    Gerrit-Change-Number: 7707622
    Gerrit-PatchSet: 5
    Gerrit-Owner: Kenichi Ishibashi <ba...@chromium.org>
    Gerrit-Reviewer: Kenichi Ishibashi <ba...@chromium.org>
    Gerrit-Reviewer: Kouhei Ueno <kou...@chromium.org>
    Gerrit-CC: Javier Garcia Visiedo <vis...@google.com>
    Gerrit-CC: Kentaro Hara <har...@chromium.org>
    Gerrit-CC: mmenke <mme...@chromium.org>
    Gerrit-Attention: Kouhei Ueno <kou...@chromium.org>
    Gerrit-Attention: Kentaro Hara <har...@chromium.org>
    Gerrit-Comment-Date: Fri, 03 Apr 2026 22:34:04 +0000
    Gerrit-HasComments: Yes
    Gerrit-Has-Labels: Yes
    satisfied_requirement
    open
    diffy

    Chromium LUCI CQ (Gerrit)

    unread,
    Apr 3, 2026, 7:39:59 PM (2 days ago) Apr 3
    to Kenichi Ishibashi, Kentaro Hara, Javier Garcia Visiedo, Kouhei Ueno, chromium...@chromium.org, bnc+...@chromium.org, net-r...@chromium.org

    Chromium LUCI CQ submitted the change

    Change information

    Commit message:
    Revive SplitHostCacheByNetworkAnonymizationKey

    This CL revives the SplitHostCacheByNetworkIsolationKey feature flag as
    SplitHostCacheByNetworkAnonymizationKey, which was previously removed in
    https://crrev.com/c/5527451.

    Currently, DNS partitioning is tightly coupled with the broader
    PartitionConnectionsByNetworkIsolationKey feature. Re-introducing this
    flag allows us to run an experiment to selectively disable DNS-related
    Network State Partitioning (e.g., HostCache partitioning and DoH
    connection isolation) while keeping the rest of the network state
    properly partitioned.

    The feature is ENABLED_BY_DEFAULT by design. Since DNS isolation
    requires `IsPartitioningEnabled()` to be true, keeping this flag enabled
    by default ensures that we preserve the current state where DNS caching
    is split by default when `kPartitionConnections...` is active without
    breaking hundreds of existing tests and Finch configs. It only needs to
    be explicitly disabled in targeted experiments.

    The flag is evaluated alongside the overarching partitioning feature
    inside HostResolverManager, and test coverage is updated to verify its
    behavior across different configurations.
    Bug: 485672648
    Change-Id: Icb032cbb7166742d61d68b02e63df2ade9f17bd3
    Commit-Queue: Kenichi Ishibashi <ba...@chromium.org>
    Reviewed-by: Kouhei Ueno <kou...@chromium.org>
    Cr-Commit-Position: refs/heads/main@{#1610025}
    Files:
    • M net/base/features.cc
    • M net/base/features.h
    • M net/dns/host_resolver_manager_request_impl.cc
    • M net/dns/host_resolver_manager_service_endpoint_request_impl.cc
    • M net/dns/host_resolver_manager_unittest.cc
    Change size: M
    Delta: 5 files changed, 92 insertions(+), 14 deletions(-)
    Branch: refs/heads/main
    Submit Requirements:
    • requirement satisfiedCode-Review: +1 by Kouhei Ueno
    Open in Gerrit
    Inspect html for hidden footers to help with email filtering. To unsubscribe visit settings. DiffyGerrit
    Gerrit-MessageType: merged
    Gerrit-Project: chromium/src
    Gerrit-Branch: main
    Gerrit-Change-Id: Icb032cbb7166742d61d68b02e63df2ade9f17bd3
    Gerrit-Change-Number: 7707622
    Gerrit-PatchSet: 6
    Gerrit-Owner: Kenichi Ishibashi <ba...@chromium.org>
    Gerrit-Reviewer: Chromium LUCI CQ <chromiu...@luci-project-accounts.iam.gserviceaccount.com>
    Gerrit-Reviewer: Kenichi Ishibashi <ba...@chromium.org>
    Gerrit-Reviewer: Kouhei Ueno <kou...@chromium.org>
    open
    diffy
    satisfied_requirement
    Reply all
    Reply to author
    Forward
    0 new messages