From: Eric Dumazet <dada1@cosmosbay.com>
To: Matthias Saou
<thias@spam.spam.spam.spam.spam.spam.spam.egg.and.spam.freshrpms.net>
Cc: Willy Tarreau <w@1wt.eu>,
linux-kernel@vger.kernel.org,
Linux Netdev List <netdev@vger.kernel.org>
Subject: Re: Wrong network usage reported by /proc
Date: Tue, 05 May 2009 10:51:57 +0200 [thread overview]
Message-ID: <49FFFE2D.9080509@cosmosbay.com> (raw)
In-Reply-To: <20090505100939.1e0932c4@python3.es.egwn.lan>
Matthias Saou a écrit :
> Willy Tarreau wrote :
>
>> On Tue, May 05, 2009 at 07:22:16AM +0200, Eric Dumazet wrote:
>>> Willy Tarreau a écrit :
>>>> On Mon, May 04, 2009 at 09:11:51PM +0200, Matthias Saou wrote:
>>>>> Eric Dumazet wrote :
>>>>>
>>>>>> Matthias Saou a écrit :
>>>>>>> Hi,
>>>>>>>
>>>>>>> I'm posting here as a last resort. I've got lots of heavily used RHEL5
>>>>>>> servers (2.6.18 based) that are reporting all sorts of impossible
>>>>>>> network usage values through /proc, leading to unrealistic snmp/cacti
>>>>>>> graphs where the outgoing bandwidth used it higher than the physical
>>>>>>> interface's maximum speed.
>>>>>>>
>>>>>>> For some details and a test script which compares values from /proc
>>>>>>> with values from tcpdump :
>>>>>>> https://bugzilla.redhat.com/show_bug.cgi?id=489541
>>>>>>>
>>>>>>> The values collected using tcpdump always seem realistic and match the
>>>>>>> values seen on the remote network equipments. So my obvious conclusion
>>>>>>> (but possibly wrong given my limited knowledge) is that something is
>>>>>>> wrong in the kernel, since it's the one exposing the /proc interface.
>>>>>>>
>>>>>>> I've reproduced what seems to be the same problem on recent kernels,
>>>>>>> including the 2.6.27.21-170.2.56.fc10.x86_64 I'm running right now. The
>>>>>>> simple python script available here allows to see it quite easily :
>>>>>>> https://www.redhat.com/archives/rhelv5-list/2009-February/msg00166.html
>>>>>>>
>>>>>>> * I run the script on my Workstation, I have an FTP server enabled
>>>>>>> * I download a DVD ISO from a remote workstation : The values match
>>>>>>> * I start ping floods from remote workstations : The values reported
>>>>>>> by /proc are much higher than the ones reported by tcpdump. I used
>>>>>>> "ping -s 500 -f myworkstation" from two remote workstations
>>>>>>>
>>>>>>> If there's anything flawed in my debugging, I'd love to have someone
>>>>>>> point it out to me. TIA to anyone willing to have a look.
>>>>>>>
>>>>>>> Matthias
>>>>>>>
>>>>>> I could not reproduce this here... what kind of NIC are you using on
>>>>>> affected systems ? Some ethernet drivers report stats from card itself,
>>>>>> and I remember seeing some strange stats on some hardware, but I cannot
>>>>>> remember which one it was (we were reading NULL values instead of
>>>>>> real ones, once in a while, maybe it was a firmware issue...)
>>>>> My workstation has a Broadcom BCM5752 (tg3 module). The servers which
>>>>> are most affected have Intel 82571EB (e1000e). But the issue is that
>>>>> with /proc, the values are a lot _higher_ than with tcpdump, and the
>>>>> tcpdump values seem to be the correct ones.
>>>> the e1000 chip reports stats every 2 seconds. So you have to collect
>>>> stats every 2 seconds otherwise you get "camel-looking" stats.
>>>>
>>> I looked at e1000e driver, and apparently tx_packets & tx_bytes are computed
>>> by the TX completion routine, not by the chip.
>> Ah I thought that was the chip which returned those stats every 2 seconds,
>> otherwise I don't see the reason to delay their reporting. Wait, I'm speaking
>> about e1000, never tried e1000e. Maybe there have been changes there. Anyway,
>> Matthias talked about RHEL5's 2.6.18 in which I don't think there was e1000e.
>>
>> Anyway we did not get any concrete data for now, so it's hard to tell (I
>> haven't copy-pasted the links above in my browser yet).
>
> If you need any more data, please just ask. What makes me wonder most,
> though, is that tcpdump and iptraf report what seem to be correct
> bandwidth values (they seem to use the same low level access for their
> counters) whereas snmp and ifconfig (which seem to use /proc for
> theirs) report unrealistically high values.
>
> The tcpdump vs. /proc would be the first thing to look at, since it
> might give hints as to where the problem might lie, no?
>
> From there, I could collect any data one might find relevant to
> diagnose further.
>
> I'm attaching the simple python script I've used for testing.
>
> Matthias
>
>
Your python script is buggy, since space after ':' is optional
# cat /proc/net/dev | cut -c1-80
Inter-| Receive | Transmit
face |bytes packets errs drop fifo frame compressed multicast|bytes packe
lo: 16056 36 0 0 0 0 0 0 16056
eth0:624245505 7370445 0 0 0 0 0 108 586782291 737
eth1:2512329067 11360819 0 0 0 0 0 0 2521050992
bond0:3378296009 15279963 0 0 0 0 0 0 3390533080
bond1: 0 0 0 0 0 0 0 0 0
eth2:865966942 3919144 0 0 0 0 0 0 869482088 391
eth3: 0 0 0 0 0 0 0 0 0
vlan.103: 1277511 18134 0 0 0 0 0 0 3439082 1
vlan.825:3095633732 15533200 0 0 0 0 0 0 332349968
So your read_proc() is wrong, since is uses line.split
def read_proc(interface):
f = open('/proc/net/dev')
for line in f:
values = line.split()
i = values[0].split(':')[0]
if interface == i:
bytes = int(values[8])
# received bytes
# bytes = int(values[0].split(':')[1])
f.close()
return bytes
f.close()
BTW, your tcpdump might report lower values too, since it doesnt account for all headers, nor
non IP frames, or forwarded frames (source IP is then not your host IP)
next prev parent reply other threads:[~2009-05-05 8:52 UTC|newest]
Thread overview: 8+ messages / expand[flat|nested] mbox.gz Atom feed top
[not found] <20090504171408.3e13822c@python3.es.egwn.lan>
2009-05-04 17:53 ` Wrong network usage reported by /proc Eric Dumazet
2009-05-04 19:11 ` Matthias Saou
2009-05-05 5:04 ` Willy Tarreau
2009-05-05 5:22 ` Eric Dumazet
2009-05-05 5:50 ` Willy Tarreau
2009-05-05 8:09 ` Matthias Saou
2009-05-05 8:51 ` Eric Dumazet [this message]
2009-05-07 17:58 ` Matthias Saou
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=49FFFE2D.9080509@cosmosbay.com \
--to=dada1@cosmosbay.com \
--cc=linux-kernel@vger.kernel.org \
--cc=netdev@vger.kernel.org \
--cc=thias@spam.spam.spam.spam.spam.spam.spam.egg.and.spam.freshrpms.net \
--cc=w@1wt.eu \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).