How to increase the kernel TCP/UDP hash table entries parameter

How to increase the kernel TCP/UDP hash table entries parameter

NET: Registered protocol family 2
TCP established hash table entries: 32768 (order: 6, 262144 bytes)
TCP bind hash table entries: 32768 (order: 7, 524288 bytes)
TCP: Hash tables configured (established 32768 bind 32768)
UDP hash table entries: 2048 (order: 4, 65536 bytes)
UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes)

Why are "info" log messages of concern?

Not many applications of OpenWrt to consumer-grade hardware should need to handle more than 32k simultaneous connections.

If you've really got a problem, I'd probably buy different hardware (only half kidding). You should be able to be adjusted through the usual sysctl (s) at run time. Things like net.core.somaxconn, and those related to TCP backlog are perhaps the ones to start with. net.netfilter may also need adjustment.

1 Like

@jeff I have got an Intel Xeon E3-12xx v2 (Ivy Bridge) hardware and 3898904 kB / 3950640 kB (98%) memory
[ 0.095980] smpboot: CPU0: Intel Xeon E3-12xx v2 (Ivy Bridge)
[ 0.100000] Performance Events: unsupported p6 CPU model 58 no PMU driver, software events only.
[ 0.100114] Hierarchical SRCU implementation.
[ 0.104421] smp: Bringing up secondary CPUs ...
[ 0.108760] x86: Booting SMP configuration:

I've got an E3-1265Lv2 in a Lanner box myself so I'm very familiar with the processor and its capabilities. I've got to question the wisdom of running a 4-core, 8-thread CPU with an extended instruction set under OpenWrt, an OS optimized for resource-constrained, consumer-grade, SoC-based, all-in-one wireless routers, in what, if you've got over 32k established TCP connections, is likely an enterprise or commercial environment.

It's also still not clear why the hash-table sizes indicated are inadequate.

That aside, Linux kernel is Linux kernel, and the standard kernel sysctls apply.

@jeff In the business environment, Inexpensive MikroTik products for small businesses,Huawei NetEngine 5000E or Cisco ASR 9000 suitable for large business are good choices. Because openwrt is free software, it is suitable for non-profit contribution projects to build NTP server at home, Is not the business environment, join ntppool serve (https://www.ntppool.org) is often more than 65k established connections.

# Kernel parameters can be modified after boot, 
# boot process network parameters do not know how to modify? GRUB parameters?

# cat /etc/sysctl.conf
net.ipv4.tcp_rmem = 4096 87380 4194304
net.ipv4.tcp_wmem = 4096 87380 4194304
net.ipv4.tcp_mem = 4194304 4194304 4194304
net.ipv4.udp_mem = 2097152 2097152 2097152
net.netfilter.nf_conntrack_max = 264192
net.netfilter.nf_conntrack_buckets = 264192

That makes some sense then, especially as NTP is UDP. Might want to drop the persistence time for conntrack as NTP is effectively a single-packet protocol that should take close to no time to complete.Likely net.netfilter.nf_conntrack_udp_timeout. man udp describes the net.ipv4.udp_* sysctls.

If that can't get the conntrack system to behave properly, and you still need it (after all, if the server is only providing NTP, then static firewall rules around UDP ports 53 and 123 are probably sufficient), https://wiki.khnet.info/index.php/Conntrack_tuning suggests that the hash table size can be modified through net.netfilter.nf_conntrack_buckets

If conntrack is a problem for ntp, would it be possible to just bypass conntrack for ntp traffic?

I imagine it would be a single iptables rule at the top of the input and output chain.

Do not know why pppoe link number 471832 will automatically interrupt?
net_ratelimit: 102 callbacks suppressed ?
37

#  cat /proc/sys/kernel/printk_ratelimit
5
# cat /proc/sys/kernel/printk_ratelimit_burst
10
# cat /proc/sys/net/core/message_cost
5
# cat /proc/sys/net/core/message_burst
10
-----
 ICMPv6: process `sysctl' is using deprecated sysctl (syscall) net.ipv6.neigh.br-lan.base_reachable_time - use net.ipv6.neigh.br-lan.base_reachable_time_ms instead
 nr_pdflush_threads exported in /proc is scheduled for removal
[1442]: Got DHCPv6 request
442]: DHCPV6 RENEW IA_NA from 0001000122c5a049b827eb1488d2 on br-lan: no binding
2136.560855] net_ratelimit: 73 callbacks suppressed
2141.780868] net_ratelimit: 102 callbacks suppressed
2142.661281] nf_conntrack: nf_conntrack: table full, dropping packet
6]: LCP terminated by peer
6]: Connect time 536.0 minutes.
6]: Sent 194330912 bytes, received 1619926275 bytes.
036]: Failed to send RS (Permission denied)
: Network device 'pppoe-wan' link is down
: Network alias 'pppoe-wan' link is down
: Interface 'wan_6' has link connectivity loss
: Interface 'wan' has lost the connection
: Interface 'wan_6' is disabled
606]: Modem hangup
606]: Connection terminated.
6]: Connect time 536.0 minutes.
6]: Sent 194330912 bytes, received 1619926275 bytes.
6]: Sent PADT
6]: Exit.
036]: Failed to send DHCPV6 message to ff02::1:2 (Permission denied)
: Interface 'wan' is now down!

I guess the issue is NAT, you effectively use the 16bit port number to multiplex both internal hostIP (only transiently) and the port number for that host to use, so unless you avoid masquerading you are limited to at most 64k connections (and due to the mentioned timeouts especially for UDP this limit does limit the number of concurrent connections not immediately but sort of averages over the tim-out period as UDP has no way (and not even TCP is guaranteed) to gracefully tear down a connection that conntrack could intercept to clear a connection from its table...)
I have a feeling you know all of this already, and I might maybe have misunderstood the actual problem, so forgive me if this is less than helpful...

@moeller0 thank you, because nf_conntrack: table full after I expanded to 264192 x 10 = 2641920 problem solved, but then the kernel log problems net_ratelimit: 102 callbacks suppressed?

This rate limit is also a mechanism used by Linux to avoid DoS attacks, where every message is logged (causing the storage space to explode). When the kernel logs a message, it USES printk() to check if the log is printed.

This limit can be tuned with /proc/sys/kernel/printk_ratelimit and /proc/sys/kernel/printk_ratelimit_burst. The default configurations are 5 and 10, respectively. That is, the kernel allows 10 messages to be logged every 5 seconds. Exceeds this limit, the kernel will abandon the log, and record ratelimit N: callbacks suppressed.

If want to turn off the ratelimit mechanism, which allows every message to be logged, you can set the message_cost value to 0. However, once you turn off ratelimit, there is a risk that the system will be attacked by the log.

pppoe has lost the connection

find pppoe setting issue

Why is pppoe automatically interrupted when the number of connections reaches 1202124?
09