From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by passt.top (Postfix) with ESMTP id 18CF85A026F for ; Wed, 27 Sep 2023 19:05:42 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1695834340; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=sPhWLE4v0rmB1hmxsVq9mJKtvIaTPvWe6dr1L0YiSL8=; b=CuxORnme+S/OMyD/fwCa9oZ/9QhVjPIoe4pT8WhFnZyeEjdkocOl7UYCjalhyNhOozW+/D 84DsOEaYuQpM5L0+iZd7TDGGMtVISfE0CBsSU2Bnd8Ttq7a1nEDkZ4FHXimOm0Nn0bAlFy 3uWO43d+8RAHEjYo7itOW8yqtpFRn58= Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-526-R6R-2Xm9NAWO8DEoKE1zeg-1; Wed, 27 Sep 2023 13:05:37 -0400 X-MC-Unique: R6R-2Xm9NAWO8DEoKE1zeg-1 Received: from smtp.corp.redhat.com (int-mx10.intmail.prod.int.rdu2.redhat.com [10.11.54.10]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id F3940811E7D; Wed, 27 Sep 2023 17:05:36 +0000 (UTC) Received: from elisabeth (unknown [10.39.208.37]) by smtp.corp.redhat.com (Postfix) with ESMTPS id E3D2E49BB9A; Wed, 27 Sep 2023 17:05:35 +0000 (UTC) Date: Wed, 27 Sep 2023 19:05:33 +0200 From: Stefano Brivio To: David Gibson Subject: Re: [PATCH RFT 2/5] tcp: Reset STALLED flag on ACK only, check for pending socket data Message-ID: <20230927190533.2fc53bbf@elisabeth> In-Reply-To: References: <20230922220610.58767-1-sbrivio@redhat.com> <20230922220610.58767-3-sbrivio@redhat.com> Organization: Red Hat MIME-Version: 1.0 X-Scanned-By: MIMEDefang 3.1 on 10.11.54.10 X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Message-ID-Hash: FSZDTKSXW4RXLST4B4MUJK5LZRJ6AHLN X-Message-ID-Hash: FSZDTKSXW4RXLST4B4MUJK5LZRJ6AHLN X-MailFrom: sbrivio@redhat.com X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header CC: Matej Hrica , passt-dev@passt.top X-Mailman-Version: 3.3.8 Precedence: list List-Id: Development discussion and patches for passt Archived-At: Archived-At: List-Archive: List-Archive: List-Help: List-Owner: List-Post: List-Subscribe: List-Unsubscribe: On Mon, 25 Sep 2023 13:07:24 +1000 David Gibson wrote: > I think the change itself here is sound, but I have some nits to pick > with the description and reasoning. > > On Sat, Sep 23, 2023 at 12:06:07AM +0200, Stefano Brivio wrote: > > In tcp_tap_handler(), we shouldn't reset the STALLED flag (indicating > > that we ran out of tap-side window space, or that all available > > socket data is already in flight -- better names welcome! > > Hmm.. when you put it like that it makes me wonder if those two quite > different conditions really need the same handling. Hrm.. I guess > both conditions mean that we can't accept data from the socket, even > if it's availble. Right. I mean, we can also call them differently... or maybe pick a name that reflects the outcome/handling instead of what happened. > > ) on any > > event: do that only if the first packet in a batch has the ACK flag > > set. > > "First packet in a batch" may not be accurate here - we're looking at > whichever packet we were up to before calling data_from_tap(). There > could have been earlier packets in the receive batch that were already > processed. Well, it depends on what we call "batch" -- here I meant the pool of packets (that are passed as a batch to tcp_tap_handler()). Yes, "pool" would be more accurate. > This also raises the question of why the first data packet should be > particularly privileged here. No reason other than convenience, and yes, it can be subtly wrong. > I'm wondering if what we really want to > check is whether data_from_tap() advanced the ack pointer at all. Right, we probably should do that instead. > I'm not clear on when the th->ack check would ever fail in practice: > aren't the only normal packets in a TCP connection without ACK the > initial SYN or an RST? We've handled the SYN case earlier, so should > we just have a blanket case above this that if we get a packet with > !ACK, we reset the connection? One thing that's legitimate (rarely seen, but I've seen it, I don't remember if the Linux kernel ever does that) is a segment without ACK, and without data, that just updates the window (for example after a zero window). If the sequence received/processed so far doesn't correspond to the latest sequence sent, omitting the ACK flag is useful so that the window update is not taken as duplicate ACK (that would trigger retransmission). > > Make sure we check for pending socket data when we reset it: > > reverting back to level-triggered epoll events, as tcp_epoll_ctl() > > does, isn't guaranteed to actually trigger a socket event. > > Which sure seems like a kernel bug. Some weird edge conditions for > edge-triggered seems expected, but this doesn't seem like valid > level-triggered semantics. Hmm, yes, and by doing a quick isolated test actually this seems to work as intended in the kernel. I should drop this and try again. > Hmmm... is toggling EPOLLET even what we want. IIUC, the heart of > what's going on here is that we can't take more data from the socket > until something happens on the tap side (either the window expands, or > it acks some data). In which case should we be toggling EPOLLIN on > the socket instead? That seems more explicitly to be saying to the > socket side "we don't currently care if you have data available". The reason was to act on EPOLLRDHUP at the same time. But well, we could just mask EPOLLIN and EPOLLRDHUP, then -- I guess that would make more sense. For the moment being, we should probably try to see what happens if this patch simply moves conn_flag(c, conn, ~STALLED); to where 3/5 needs it (or directly incorporate that into 3/5). -- Stefano