From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by passt.top (Postfix) with ESMTP id 267115A026F for ; Thu, 5 Oct 2023 08:19:04 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1696486743; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=gxoG7opGLkuHMQ7BaJ0K3cLJ299tgNiWhpPzljhvXr8=; b=JL4XdVoIpqSqNhBdHYPiTy1gVq3wkmdyqFwTS2SCjWWY0h+Tt1QaFOiaaS9AWtERvUnK4x cCJQLZDPIJRz1awpOpXRsURSTgZsT0MoPSwzGuAfYphg3I2rNm4YrOM+AGm9sAcmTf80yj cCzL5kEh3GfLJkSM0+9MKNWsjtz4/EM= Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-592-z-nNgTkNNGOghYILRGs4cg-1; Thu, 05 Oct 2023 02:18:54 -0400 X-MC-Unique: z-nNgTkNNGOghYILRGs4cg-1 Received: from smtp.corp.redhat.com (int-mx08.intmail.prod.int.rdu2.redhat.com [10.11.54.8]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 59DE18039C8; Thu, 5 Oct 2023 06:18:54 +0000 (UTC) Received: from elisabeth (unknown [10.39.208.16]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 5239CC15BB8; Thu, 5 Oct 2023 06:18:53 +0000 (UTC) Date: Thu, 5 Oct 2023 08:18:49 +0200 From: Stefano Brivio To: David Gibson Subject: Re: [PATCH RFT 2/5] tcp: Reset STALLED flag on ACK only, check for pending socket data Message-ID: <20231005081849.7463eccc@elisabeth> In-Reply-To: References: <20230922220610.58767-1-sbrivio@redhat.com> <20230922220610.58767-3-sbrivio@redhat.com> <20230927190533.2fc53bbf@elisabeth> <20230929172015.3b5969bc@elisabeth> Organization: Red Hat MIME-Version: 1.0 X-Scanned-By: MIMEDefang 3.1 on 10.11.54.8 X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Message-ID-Hash: CIN7WHFLNFX5BGUN3OBIZUTG7B553E6L X-Message-ID-Hash: CIN7WHFLNFX5BGUN3OBIZUTG7B553E6L X-MailFrom: sbrivio@redhat.com X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header CC: Matej Hrica , passt-dev@passt.top X-Mailman-Version: 3.3.8 Precedence: list List-Id: Development discussion and patches for passt Archived-At: Archived-At: List-Archive: List-Archive: List-Help: List-Owner: List-Post: List-Subscribe: List-Unsubscribe: On Tue, 3 Oct 2023 14:20:58 +1100 David Gibson wrote: > On Fri, Sep 29, 2023 at 05:20:15PM +0200, Stefano Brivio wrote: > > On Thu, 28 Sep 2023 11:48:38 +1000 > > David Gibson wrote: > > > > > On Wed, Sep 27, 2023 at 07:05:33PM +0200, Stefano Brivio wrote: > > > > On Mon, 25 Sep 2023 13:07:24 +1000 > > > > David Gibson wrote: > > > > > > > > > I think the change itself here is sound, but I have some nits to pick > > > > > with the description and reasoning. > > > > > > > > > > On Sat, Sep 23, 2023 at 12:06:07AM +0200, Stefano Brivio wrote: > > > > > > In tcp_tap_handler(), we shouldn't reset the STALLED flag (indicating > > > > > > that we ran out of tap-side window space, or that all available > > > > > > socket data is already in flight -- better names welcome! > > > > > > > > > > Hmm.. when you put it like that it makes me wonder if those two quite > > > > > different conditions really need the same handling. Hrm.. I guess > > > > > both conditions mean that we can't accept data from the socket, even > > > > > if it's availble. > > > > > > > > Right. I mean, we can also call them differently... or maybe pick a > > > > name that reflects the outcome/handling instead of what happened. > > > > > > Sure, if we could think of one. Except, on second thoughts, I'm not > > > sure my characterization is correct. If the tap side window is full > > > then, indeed, we can't accept data from the socket. However if > > > everything we have is in flight that doesn't mean we couldn't put more > > > data into flight if it arrived. > > > > Right, but that's why we set EPOLLET... > > > > > That consideration, together with the way we use MSG_PEEK possibly > > > means that we fundamentally need to use edge-triggered interrupts - > > > with the additional trickiness that entails - to avoid busy polling. > > > Although even that only works if we get a new edge interrupt when data > > > is added to a buffer that's been PEEKed but not TRUNCed. If that's > > > not true the MSG_PEEK approach might be doomed :(. > > > > without EPOLLONESHOT, which wouldn't have this behaviour. From epoll(7): > > > > Since even with edge-triggered epoll, multiple events can be generated > > upon receipt of multiple chunks of data, the caller has the option to > > specify the EPOLLONESHOT flag [...] > > > > so yes, in general, when the socket has more data, we'll get another > > event. I didn't test this in an isolated case, perhaps we should, but > > from my memory it always worked. > > Ok. That text does seem to suggest it works that way, although it's > not entirely clear that it must always give new events. A glimpse at the code confirms that, but... yes, I think we should test this more specifically, perhaps even shipping that test case under doc/. > > On the other hand, we could actually use EPOLLONESHOT in the other > > case, as an optimisation, when we're waiting for an ACK from the tap > > side. > > Hrm.. I can't actually see a case were EPOLLONESHOT would be useful. > By the time we know the receiver's window has been filled, we're > already processing the last event that we'll be able to until the > window opens again. Setting EPOLLONESHOT would be requesting one more > event. Ah, true -- we should have it "always" set and always re-arm, which is messy and would probably kill any resemblance of high throughput. > > > > > > ) on any > > > > > > event: do that only if the first packet in a batch has the ACK flag > > > > > > set. > > > > > > > > > > "First packet in a batch" may not be accurate here - we're looking at > > > > > whichever packet we were up to before calling data_from_tap(). There > > > > > could have been earlier packets in the receive batch that were already > > > > > processed. > > > > > > > > Well, it depends on what we call "batch" -- here I meant the pool of > > > > packets (that are passed as a batch to tcp_tap_handler()). Yes, "pool" > > > > would be more accurate. > > > > > > Uh.. I don't think that actually helps. Remember pools aren't queues. > > > The point here is that is that the packet we're considering is not the > > > first of the batch/pool/whatever, but the first of what's left. > > > > Right, yes, I actually meant the sub-pool starting from the index (now) > > given by the caller. > > > > > > > This also raises the question of why the first data packet should be > > > > > particularly privileged here. > > > > > > > > No reason other than convenience, and yes, it can be subtly wrong. > > > > > > > > > I'm wondering if what we really want to > > > > > check is whether data_from_tap() advanced the ack pointer at all. > > > > > > > > Right, we probably should do that instead. > > > > > > Ok. > > > > > > > > I'm not clear on when the th->ack check would ever fail in practice: > > > > > aren't the only normal packets in a TCP connection without ACK the > > > > > initial SYN or an RST? We've handled the SYN case earlier, so should > > > > > we just have a blanket case above this that if we get a packet with > > > > > !ACK, we reset the connection? > > > > > > > > One thing that's legitimate (rarely seen, but I've seen it, I don't > > > > remember if the Linux kernel ever does that) is a segment without ACK, > > > > and without data, that just updates the window (for example after a > > > > zero window). > > > > > > > > If the sequence received/processed so far doesn't correspond to the > > > > latest sequence sent, omitting the ACK flag is useful so that the > > > > window update is not taken as duplicate ACK (that would trigger > > > > retransmission). > > > > > > Ah, ok, I wasn't aware of that case. > > > > On a second thought, in that case, we just got a window update, so it's > > very reasonable to actually check again if we can send more. Hence the > > check on th->ack is bogus anyway. > > > > > > > > Make sure we check for pending socket data when we reset it: > > > > > > reverting back to level-triggered epoll events, as tcp_epoll_ctl() > > > > > > does, isn't guaranteed to actually trigger a socket event. > > > > > > > > > > Which sure seems like a kernel bug. Some weird edge conditions for > > > > > edge-triggered seems expected, but this doesn't seem like valid > > > > > level-triggered semantics. > > > > > > > > Hmm, yes, and by doing a quick isolated test actually this seems to work > > > > as intended in the kernel. I should drop this and try again. > > > > > > > > > Hmmm... is toggling EPOLLET even what we want. IIUC, the heart of > > > > > what's going on here is that we can't take more data from the socket > > > > > until something happens on the tap side (either the window expands, or > > > > > it acks some data). In which case should we be toggling EPOLLIN on > > > > > the socket instead? That seems more explicitly to be saying to the > > > > > socket side "we don't currently care if you have data available". > > > > > > > > The reason was to act on EPOLLRDHUP at the same time. But well, we > > > > could just mask EPOLLIN and EPOLLRDHUP, then -- I guess that would make > > > > more sense. > > > > > > So specifically to mask EPOLLRDHUP as well? On the grounds that if > > > we're still chewing on what we got already we don't yet care that > > > we've reached the end, yes? > > > > Right. > > Ok. > > > > So yes, explicitly masking both those > > > makes more sense to me.. except that as above, I suspect we can't have > > > level-triggered + MSG_PEEK + no busy polling all at once. > > > > Hmm, right, that's the other problem if we mask EPOLLIN: we won't get > > events on new data. I think EPOLLET is really what we need here, at > > least for the case where we are not necessarily waiting for an ACK. > > > > For the other case (window full), we can either mask EPOLLIN | > > EPOLLRDHUP or set EPOLLONESHOT (possibly slightly more complicated > > because we need to re-add the file descriptor). > > So, thinking further, what I think we want is to always set EPOLLET on > the TCP sockets. If all received data is in flight we don't need > anything special, at least assuming epoll works like we think it does > above: when we get more data, we get an event and check if we can send > more data into flight. ...I think having EPOLLET always set causes races that are potentially unsolvable, because we can't always read from the socket until we get -EAGAIN. That is, this will work: - recv() all data, we can't write more data to tap - at some point, we can write again to tap - more data comes, we'll wake up and continue but this won't: - partial recv(), we can't write more data to tap - at some point, we can write again to tap - no additional data comes > When the receive window fills we really don't care about new data > until it opens again, so clear EPOLLIN | EPOLLRDHUP. When the window > does open again - i.e. when we get an ack or window update - both > reenable EPOLLIN | EPOLLRDHUP and call sock_handler() to process > anything that's accumulated since we turned EPOLLIN off. Agreed. This should be a mere optimisation on top of the current behaviour, by the way. > Details to figure out: > * Do we need to be careful about order of re-enable EPOLLIN > vs. rechecking the recv() buffer? It should be done before checking I guess, so that we can end up with one spurious event (because we already read the data a future EPOLLIN will tell us about), but never a missing event (because data comes between recv() and epoll_ctl()). > * At what point would we trigger the CLAMP_WINDOW workaround in that > scheme? When we read any data from the socket, with MSG_TRUNC, after the window full condition. > * Is there any impact of EPOLLET on the other events? Not that I'm aware of. EPOLLHUP and EPOLLERR are reported anyway, and we don't want EPOLLRDHUP to differ (in this sense) from EPOLLIN. But again, this is under the assumption that we do *not* always set EPOLLET. -- Stefano