Commit 8e8118f8 authored by Florian Westphal's avatar Florian Westphal Committed by Pablo Neira Ayuso

netfilter: conntrack: remove packet hotpath stats

These counters sit in hot path and do show up in perf, this is especially
true for 'found' and 'searched' which get incremented for every packet
processed.

Information like

searched=212030105
new=623431
found=333613
delete=623327

does not seem too helpful nowadays:

- on busy systems found and searched will overflow every few hours
(these are 32bit integers), other more busy ones every few days.

- for debugging there are better methods, such as iptables' trace target,
the conntrack log sysctls.  Nowadays we also have perf tool.

This removes packet path stat counters except those that
are expected to be 0 (or close to 0) on a normal system, e.g.
'insert_failed' (race happened) or 'invalid' (proto tracker rejects).

The insert stat is retained for the ctnetlink case.
The found stat is retained for the tuple-is-taken check when NAT has to
determine if it needs to pick a different source address.
Signed-off-by: default avatarFlorian Westphal <fw@strlen.de>
Signed-off-by: default avatarPablo Neira Ayuso <pablo@netfilter.org>
parent 6bd14303
...@@ -4,13 +4,9 @@ ...@@ -4,13 +4,9 @@
#include <uapi/linux/netfilter/nf_conntrack_common.h> #include <uapi/linux/netfilter/nf_conntrack_common.h>
struct ip_conntrack_stat { struct ip_conntrack_stat {
unsigned int searched;
unsigned int found; unsigned int found;
unsigned int new;
unsigned int invalid; unsigned int invalid;
unsigned int ignore; unsigned int ignore;
unsigned int delete;
unsigned int delete_list;
unsigned int insert; unsigned int insert;
unsigned int insert_failed; unsigned int insert_failed;
unsigned int drop; unsigned int drop;
......
...@@ -231,13 +231,13 @@ enum ctattr_secctx { ...@@ -231,13 +231,13 @@ enum ctattr_secctx {
enum ctattr_stats_cpu { enum ctattr_stats_cpu {
CTA_STATS_UNSPEC, CTA_STATS_UNSPEC,
CTA_STATS_SEARCHED, CTA_STATS_SEARCHED, /* no longer used */
CTA_STATS_FOUND, CTA_STATS_FOUND,
CTA_STATS_NEW, CTA_STATS_NEW, /* no longer used */
CTA_STATS_INVALID, CTA_STATS_INVALID,
CTA_STATS_IGNORE, CTA_STATS_IGNORE,
CTA_STATS_DELETE, CTA_STATS_DELETE, /* no longer used */
CTA_STATS_DELETE_LIST, CTA_STATS_DELETE_LIST, /* no longer used */
CTA_STATS_INSERT, CTA_STATS_INSERT,
CTA_STATS_INSERT_FAILED, CTA_STATS_INSERT_FAILED,
CTA_STATS_DROP, CTA_STATS_DROP,
......
...@@ -379,7 +379,6 @@ static void ...@@ -379,7 +379,6 @@ static void
destroy_conntrack(struct nf_conntrack *nfct) destroy_conntrack(struct nf_conntrack *nfct)
{ {
struct nf_conn *ct = (struct nf_conn *)nfct; struct nf_conn *ct = (struct nf_conn *)nfct;
struct net *net = nf_ct_net(ct);
struct nf_conntrack_l4proto *l4proto; struct nf_conntrack_l4proto *l4proto;
pr_debug("destroy_conntrack(%p)\n", ct); pr_debug("destroy_conntrack(%p)\n", ct);
...@@ -406,7 +405,6 @@ destroy_conntrack(struct nf_conntrack *nfct) ...@@ -406,7 +405,6 @@ destroy_conntrack(struct nf_conntrack *nfct)
nf_ct_del_from_dying_or_unconfirmed_list(ct); nf_ct_del_from_dying_or_unconfirmed_list(ct);
NF_CT_STAT_INC(net, delete);
local_bh_enable(); local_bh_enable();
if (ct->master) if (ct->master)
...@@ -438,7 +436,6 @@ static void nf_ct_delete_from_lists(struct nf_conn *ct) ...@@ -438,7 +436,6 @@ static void nf_ct_delete_from_lists(struct nf_conn *ct)
nf_ct_add_to_dying_list(ct); nf_ct_add_to_dying_list(ct);
NF_CT_STAT_INC(net, delete_list);
local_bh_enable(); local_bh_enable();
} }
...@@ -529,12 +526,9 @@ ____nf_conntrack_find(struct net *net, const struct nf_conntrack_zone *zone, ...@@ -529,12 +526,9 @@ ____nf_conntrack_find(struct net *net, const struct nf_conntrack_zone *zone,
if (nf_ct_is_dying(ct)) if (nf_ct_is_dying(ct))
continue; continue;
if (nf_ct_key_equal(h, tuple, zone, net)) { if (nf_ct_key_equal(h, tuple, zone, net))
NF_CT_STAT_INC_ATOMIC(net, found);
return h; return h;
} }
NF_CT_STAT_INC_ATOMIC(net, searched);
}
/* /*
* if the nulls value we got at the end of this lookup is * if the nulls value we got at the end of this lookup is
* not the expected one, we must restart lookup. * not the expected one, we must restart lookup.
...@@ -798,7 +792,6 @@ __nf_conntrack_confirm(struct sk_buff *skb) ...@@ -798,7 +792,6 @@ __nf_conntrack_confirm(struct sk_buff *skb)
*/ */
__nf_conntrack_hash_insert(ct, hash, reply_hash); __nf_conntrack_hash_insert(ct, hash, reply_hash);
nf_conntrack_double_unlock(hash, reply_hash); nf_conntrack_double_unlock(hash, reply_hash);
NF_CT_STAT_INC(net, insert);
local_bh_enable(); local_bh_enable();
help = nfct_help(ct); help = nfct_help(ct);
...@@ -857,7 +850,6 @@ nf_conntrack_tuple_taken(const struct nf_conntrack_tuple *tuple, ...@@ -857,7 +850,6 @@ nf_conntrack_tuple_taken(const struct nf_conntrack_tuple *tuple,
rcu_read_unlock(); rcu_read_unlock();
return 1; return 1;
} }
NF_CT_STAT_INC_ATOMIC(net, searched);
} }
if (get_nulls_value(n) != hash) { if (get_nulls_value(n) != hash) {
...@@ -1177,10 +1169,8 @@ init_conntrack(struct net *net, struct nf_conn *tmpl, ...@@ -1177,10 +1169,8 @@ init_conntrack(struct net *net, struct nf_conn *tmpl,
} }
spin_unlock(&nf_conntrack_expect_lock); spin_unlock(&nf_conntrack_expect_lock);
} }
if (!exp) { if (!exp)
__nf_ct_try_assign_helper(ct, tmpl, GFP_ATOMIC); __nf_ct_try_assign_helper(ct, tmpl, GFP_ATOMIC);
NF_CT_STAT_INC(net, new);
}
/* Now it is inserted into the unconfirmed list, bump refcount */ /* Now it is inserted into the unconfirmed list, bump refcount */
nf_conntrack_get(&ct->ct_general); nf_conntrack_get(&ct->ct_general);
......
...@@ -1984,13 +1984,9 @@ ctnetlink_ct_stat_cpu_fill_info(struct sk_buff *skb, u32 portid, u32 seq, ...@@ -1984,13 +1984,9 @@ ctnetlink_ct_stat_cpu_fill_info(struct sk_buff *skb, u32 portid, u32 seq,
nfmsg->version = NFNETLINK_V0; nfmsg->version = NFNETLINK_V0;
nfmsg->res_id = htons(cpu); nfmsg->res_id = htons(cpu);
if (nla_put_be32(skb, CTA_STATS_SEARCHED, htonl(st->searched)) || if (nla_put_be32(skb, CTA_STATS_FOUND, htonl(st->found)) ||
nla_put_be32(skb, CTA_STATS_FOUND, htonl(st->found)) ||
nla_put_be32(skb, CTA_STATS_NEW, htonl(st->new)) ||
nla_put_be32(skb, CTA_STATS_INVALID, htonl(st->invalid)) || nla_put_be32(skb, CTA_STATS_INVALID, htonl(st->invalid)) ||
nla_put_be32(skb, CTA_STATS_IGNORE, htonl(st->ignore)) || nla_put_be32(skb, CTA_STATS_IGNORE, htonl(st->ignore)) ||
nla_put_be32(skb, CTA_STATS_DELETE, htonl(st->delete)) ||
nla_put_be32(skb, CTA_STATS_DELETE_LIST, htonl(st->delete_list)) ||
nla_put_be32(skb, CTA_STATS_INSERT, htonl(st->insert)) || nla_put_be32(skb, CTA_STATS_INSERT, htonl(st->insert)) ||
nla_put_be32(skb, CTA_STATS_INSERT_FAILED, nla_put_be32(skb, CTA_STATS_INSERT_FAILED,
htonl(st->insert_failed)) || htonl(st->insert_failed)) ||
......
...@@ -352,13 +352,13 @@ static int ct_cpu_seq_show(struct seq_file *seq, void *v) ...@@ -352,13 +352,13 @@ static int ct_cpu_seq_show(struct seq_file *seq, void *v)
seq_printf(seq, "%08x %08x %08x %08x %08x %08x %08x %08x " seq_printf(seq, "%08x %08x %08x %08x %08x %08x %08x %08x "
"%08x %08x %08x %08x %08x %08x %08x %08x %08x\n", "%08x %08x %08x %08x %08x %08x %08x %08x %08x\n",
nr_conntracks, nr_conntracks,
st->searched, 0,
st->found, st->found,
st->new, 0,
st->invalid, st->invalid,
st->ignore, st->ignore,
st->delete, 0,
st->delete_list, 0,
st->insert, st->insert,
st->insert_failed, st->insert_failed,
st->drop, st->drop,
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment