Received: by 2002:a25:e7d8:0:0:0:0:0 with SMTP id e207csp3244951ybh; Mon, 16 Mar 2020 19:04:48 -0700 (PDT) X-Google-Smtp-Source: ADFU+vtheij1gZypq8tmutN85Sww3JxFEWLY0jFHRhmFB/vHsf4kgNQwQ0YTQJwaUvWn+Q9PKiVM X-Received: by 2002:aca:4fcc:: with SMTP id d195mr1938063oib.99.1584410688351; Mon, 16 Mar 2020 19:04:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1584410688; cv=none; d=google.com; s=arc-20160816; b=VXAjJokzxMyH/JvLXIOI1J71N5oJfv8bXDvLFv/fzMwAoMLzgvs0Qgd8Cr0Ti//xqH GU5HbmsFsuB3hJZddJ5i/3xCBxTBy4rYS+fKy/LZXahvUcgphl2IB4SmWFIrlE5KTNxs 5JJ8z+XkXbyFCN04AzPH7+exObHNS1PgjaT3f45Hz/LtuZ9+LXT2m03kBw4/IK5Dkdeu EaSSESXnjRkCTD7Sx1PXvlHpJq1piqBXnVejC/t0RYeiaP78mHIvgjeteg+Mi2wimL5c iOlC6iPfZymsVSjunRePtANlefuNdrcTNtuaWoh9PB/6iLeumjnIybSP7vdhAdmFjFLV nAww== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:from:subject:cc:to:message-id:date; bh=ucrDltkUXuN8TF30JHBJkkYHbxl+eLhEloT4EFeW7Go=; b=ILb94rf++SQxiGg8OyTNd4krUhi8QOoGAMs9FPWjwQ2F8Vij//keTbdSekkiwJcdNv M+uMLlx9uczxFqmpcPALWmazhYdHTYdMPCHd0NkeZ7Vt8FRG4NDxT6pXxk4kF//Iqcfv zIGBzXahlIpbxEZCQkzLILBlkdvS3eyILSchoFm0LR1VeDh+UL+HN7+G/NxtXlZzAFMZ OW1LZbmMqFc8YtlynfF6qyyDXnQbqgFgH/ev7mEYpZKm/1J5HET3vQQhJUxZMlMWzkUQ 9oVA7Gu1JmaStRdcX82AJs2gUDtQyZcGAbA6s+n9R/mF1825PlvKg2TofLc7fNmk73Q0 7VKQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n20si1013660otf.63.2020.03.16.19.04.36; Mon, 16 Mar 2020 19:04:48 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1733210AbgCQB1K (ORCPT + 99 others); Mon, 16 Mar 2020 21:27:10 -0400 Received: from shards.monkeyblade.net ([23.128.96.9]:50596 "EHLO shards.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1733017AbgCQB1K (ORCPT ); Mon, 16 Mar 2020 21:27:10 -0400 Received: from localhost (unknown [IPv6:2601:601:9f00:477::3d5]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (Client did not present a certificate) (Authenticated sender: davem-davemloft) by shards.monkeyblade.net (Postfix) with ESMTPSA id A7B60157A5E89; Mon, 16 Mar 2020 18:27:09 -0700 (PDT) Date: Mon, 16 Mar 2020 18:27:08 -0700 (PDT) Message-Id: <20200316.182708.2275968776439275159.davem@davemloft.net> To: yangpc@wangsu.com Cc: edumazet@google.com, ncardwell@google.com, netdev@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH RESEND net-next v2 0/5] tcp: fix stretch ACK bugs in congestion control modules From: David Miller In-Reply-To: <1584340511-9870-1-git-send-email-yangpc@wangsu.com> References: <1584340511-9870-1-git-send-email-yangpc@wangsu.com> X-Mailer: Mew version 6.8 on Emacs 26.1 Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.5.12 (shards.monkeyblade.net [149.20.54.216]); Mon, 16 Mar 2020 18:27:09 -0700 (PDT) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Pengcheng Yang Date: Mon, 16 Mar 2020 14:35:06 +0800 > "stretch ACKs" (caused by LRO, GRO, delayed ACKs or middleboxes) > can cause serious performance shortfalls in common congestion > control algorithms. Neal Cardwell submitted a series of patches > starting with commit e73ebb0881ea ("tcp: stretch ACK fixes prep") > to handle stretch ACKs and fixed stretch ACK bugs in Reno and > CUBIC congestion control algorithms. > > This patch series continues to fix bic, scalable, veno and yeah > congestion control algorithms to handle stretch ACKs. > > Changes in v2: > - Provide [PATCH 0/N] to describe the modifications of this patch series Series applied, thanks.