All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH nf-next v2 0/7] netfilter: get rid of per-object conntrack timers
@ 2016-08-24 11:55 Florian Westphal
  2016-08-24 11:55 ` [PATCH v2 nf-next 1/7] netfilter: don't rely on DYING bit to detect when destroy event was sent Florian Westphal
                   ` (6 more replies)
  0 siblings, 7 replies; 16+ messages in thread
From: Florian Westphal @ 2016-08-24 11:55 UTC (permalink / raw)
  To: netfilter-devel

During NFWS 2016 it was mentioned that per-conntrack timers have
two drawbacks:
 - the 5-day default established timeout is very large and brings
   extra constraints for the timer subsystem.
 - most distros enable timer stats so timer struct eats 80 bytes
   in each conntrack object.

This series replaces the per-object struct timer with a u32 jiffie
stamp and one global delayed work queue for conntrack eviction.
Size of nf_conn struct is reduced to 256 bytes on x86_64.

Eviction is performed from the packet path when doing table lookup, for
cases where we have idle periods the work queue is used.

No changes since v1, except addition of a comment in #3 and
a one-line change (replace cond_reschd w. cond_resched_rcu_qs).

Patch #7 was not part of v1.

Tested with following script, conntrackd running in 'relible
event mode' and httpterm running on other host:

-----------------------------------------------------------
random_resize() {
        while true; do
                RND=$RANDOM%256000
                RND=$((RND+8192))
                sysctl net.netfilter.nf_conntrack_buckets=$RND
                sleep $((RANDOM % 120))
        done
}

random_flush() {
        while true; do
                sleep $((RANDOM % 120))
                conntrack -F
        done
}

random_startstop() {
        while true; do
                sleep $((RANDOM % 120))
                pkill -STOP conntrackd
                sleep $((RANDOM % 10))
                pkill -CONT conntrackd
        done
}

http-client -u 1000 -t 3 -F 192.168.10.50 -G 192.168.10.17:8001 &
http-client -u 1000 -t 3 -F 192.168.10.51 -G 192.168.10.17:8001 &
http-client -u 1000 -t 3 -F 192.168.10.52 -G 192.168.10.17:8001 &

random_resize &
random_flush &
random_startstop &

wait
-----------------------------------------------------------

 include/net/netfilter/nf_conntrack.h        |   36 +++--
 include/net/netfilter/nf_conntrack_ecache.h |   17 +-
 net/netfilter/nf_conntrack_core.c           |  194 +++++++++++++++++++++-------
 net/netfilter/nf_conntrack_ecache.c         |   22 ++-
 net/netfilter/nf_conntrack_netlink.c        |   39 ++++-
 net/netfilter/nf_conntrack_pptp.c           |    3 
 net/netfilter/nf_nat_core.c                 |    6 
 7 files changed, 223 insertions(+), 94 deletions(-)

^ permalink raw reply	[flat|nested] 16+ messages in thread

end of thread, other threads:[~2016-08-25  5:20 UTC | newest]

Thread overview: 16+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2016-08-24 11:55 [PATCH nf-next v2 0/7] netfilter: get rid of per-object conntrack timers Florian Westphal
2016-08-24 11:55 ` [PATCH v2 nf-next 1/7] netfilter: don't rely on DYING bit to detect when destroy event was sent Florian Westphal
2016-08-24 17:05   ` Eric Dumazet
2016-08-24 11:55 ` [PATCH v2 nf-next 2/7] netfilter: conntrack: get rid of conntrack timer Florian Westphal
2016-08-24 17:11   ` Eric Dumazet
2016-08-24 11:55 ` [PATCH v2 nf-next 3/7] netfilter: evict stale entries on netlink dumps Florian Westphal
2016-08-24 17:33   ` Eric Dumazet
2016-08-24 11:55 ` [PATCH v2 nf-next 4/7] netfilter: conntrack: add gc worker to remove timed-out entries Florian Westphal
2016-08-24 17:40   ` Eric Dumazet
2016-08-24 20:11     ` Florian Westphal
2016-08-24 20:30       ` Eric Dumazet
2016-08-24 23:50         ` Florian Westphal
2016-08-24 11:55 ` [PATCH v2 nf-next 5/7] netfilter: conntrack: resched gc again if eviction rate is high Florian Westphal
2016-08-24 11:55 ` [PATCH v2 nf-next 6/7] netfilter: remove __nf_ct_kill_acct helper Florian Westphal
2016-08-24 11:55 ` [PATCH nf-next 7/7] netfilter: restart search if moved to other chain Florian Westphal
2016-08-24 13:20   ` Eric Dumazet

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.