Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp3333613pxb; Mon, 9 Nov 2020 08:30:41 -0800 (PST) X-Google-Smtp-Source: ABdhPJx1txZF8R4bhJB8jX+/VF2xSdoXvtQUG5jCC+/qyz8CTnHAKBwTKhxJxj5M5bK2jpmdB9oV X-Received: by 2002:a17:906:660b:: with SMTP id b11mr16229976ejp.190.1604939441125; Mon, 09 Nov 2020 08:30:41 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1604939441; cv=none; d=google.com; s=arc-20160816; b=UTPRA6AKy//xHmr0PBVncqwT0e15c8NL4LkCeYlM/7dmUR/leyJLlR5RVdzNopEtSM 6guTsYWfLzezZoxilqtDKFs6Nd7LVvNdIH+VGObDOaUU2Ekk15Z/UnW0WqQOiAORsnKl Y+yTVV2PpY1QSWaOiNSYW/f0Upzuj4pT2C80sC0WP2Qjv8HkOewrQ+otR2OplV9YnADu o2Nu4GAQk0izhuHzxi3k4npUCHR4ex2fIrKVTjb6mmC4Vtdwa4aw8jyRjiSkxF4tc4MQ 0MnzmtpeGxJcX+jmcXAJuAmjT8pcLe2tnYqchc080kksnyA/8onouhXoACSqam1gdjr4 7ReA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to :mime-version:user-agent:date:message-id:from:references:cc:to :subject; bh=lv5pxfui5sLpHmcFe0lPviGhp5aiEoh0btC/bj4qsGg=; b=JL4Y+IzEIYIrw6oRtGZ1H8Ksas82Y7Qp9PjqtbdNVgJKU3fLwl+USYZo7/S8W+bt3W O32qhgP9CH22JmAeN7gzou4mTYkboY5rCTdD9R/lBOp3JCMqikdqyBpZ9CRIF0tjmWoh dOyGhq9D5XTqaL4uWVfSaDA2qAFfWTUJWHmATELdEitscBguqIGWIxevz+I+St21ZEQm o9pKbrU7yXurtOqqzKclF3aveKnIflu882+fOoePfq/kBOPhptd+11eLp/pLo5OZ+01U IAXT6RXPvs0SlmyJAjufAgh1pBRzaFIUAviISZjJEgYm6/jm6vaGmT5L7Z+VPFPJnYs7 fSnQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v10si7473687ede.131.2020.11.09.08.30.15; Mon, 09 Nov 2020 08:30:41 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730127AbgKIQ0q (ORCPT + 99 others); Mon, 9 Nov 2020 11:26:46 -0500 Received: from out30-57.freemail.mail.aliyun.com ([115.124.30.57]:45871 "EHLO out30-57.freemail.mail.aliyun.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729791AbgKIQ0p (ORCPT ); Mon, 9 Nov 2020 11:26:45 -0500 X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R101e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=e01e04400;MF=wenan.mao@linux.alibaba.com;NM=1;PH=DS;RN=8;SR=0;TI=SMTPD_---0UEmInaP_1604939200; Received: from B-44NBMD6M-0121.local(mailfrom:wenan.mao@linux.alibaba.com fp:SMTPD_---0UEmInaP_1604939200) by smtp.aliyun-inc.com(127.0.0.1); Tue, 10 Nov 2020 00:26:40 +0800 Subject: Re: [PATCH net v2] net: Update window_clamp if SOCK_RCVBUF is set To: Eric Dumazet Cc: David Miller , Alexey Kuznetsov , Hideaki YOSHIFUJI , Jakub Kicinski , netdev , LKML , kernel-janitors@vger.kernel.org References: <1604913614-19432-1-git-send-email-wenan.mao@linux.alibaba.com> <1604914417-24578-1-git-send-email-wenan.mao@linux.alibaba.com> <3b92167c-201c-e85d-822d-06f0c9ac508c@linux.alibaba.com> From: Mao Wenan Message-ID: <302ad089-9e82-1856-0652-b92251c14e37@linux.alibaba.com> Date: Tue, 10 Nov 2020 00:26:40 +0800 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:78.0) Gecko/20100101 Thunderbird/78.3.2 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 在 2020/11/9 下午10:01, Eric Dumazet 写道: > On Mon, Nov 9, 2020 at 12:41 PM Eric Dumazet wrote: >> >> Packetdrill test would be : >> >> // Force syncookies >> `sysctl -q net.ipv4.tcp_syncookies=2` >> >> 0 socket(..., SOCK_STREAM, IPPROTO_TCP) = 3 >> +0 setsockopt(3, SOL_SOCKET, SO_REUSEADDR, [1], 4) = 0 >> +0 setsockopt(3, SOL_SOCKET, SO_RCVBUF, [2048], 4) = 0 >> +0 bind(3, ..., ...) = 0 >> +0 listen(3, 1) = 0 >> >> +0 < S 0:0(0) win 32792 >> +0 > S. 0:0(0) ack 1 >> +.1 < . 1:1(0) ack 1 win 1024 >> +0 accept(3, ..., ...) = 4 >> +0 %{ assert tcpi_snd_wscale == 0, tcpi_snd_wscale }% >> > > Also, please add to your next submission an appropriate Fixes: tag : > > Fixes: e88c64f0a425 ("tcp: allow effective reduction of TCP's > rcv-buffer via setsockopt") OK, thanks, I can reproduce wscale=0 with your packetdrill, and I will send v3 with the fixes tag. > >> On Mon, Nov 9, 2020 at 12:02 PM Eric Dumazet wrote: >>> >>> On Mon, Nov 9, 2020 at 11:12 AM Mao Wenan wrote: >>>> >>>> >>>> >>>> 在 2020/11/9 下午5:56, Eric Dumazet 写道: >>>>> On Mon, Nov 9, 2020 at 10:33 AM Mao Wenan wrote: >>>>>> >>>>>> When net.ipv4.tcp_syncookies=1 and syn flood is happened, >>>>>> cookie_v4_check or cookie_v6_check tries to redo what >>>>>> tcp_v4_send_synack or tcp_v6_send_synack did, >>>>>> rsk_window_clamp will be changed if SOCK_RCVBUF is set, >>>>>> which will make rcv_wscale is different, the client >>>>>> still operates with initial window scale and can overshot >>>>>> granted window, the client use the initial scale but local >>>>>> server use new scale to advertise window value, and session >>>>>> work abnormally. >>>>> >>>>> What is not working exactly ? >>>>> >>>>> Sending a 'big wscale' should not really matter, unless perhaps there >>>>> is a buggy stack at the remote end ? >>>> 1)in tcp_v4_send_synack, if SO_RCVBUF is set and >>>> tcp_full_space(sk)=65535, pass req->rsk_window_clamp=65535 to >>>> tcp_select_initial_window, rcv_wscale will be zero, and send to client, >>>> the client consider wscale is 0; >>>> 2)when ack is back from client, if there is no this patch, >>>> req->rsk_window_clamp is 0, and pass to tcp_select_initial_window, >>>> wscale will be 7, this new rcv_wscale is no way to advertise to client. >>>> 3)if server send rcv_wind to client with window=63, it consider the real >>>> window is 63*2^7=8064, but client consider the server window is only >>>> 63*2^0=63, it can't send big packet to server, and the send-q of client >>>> is full. >>>> >>> >>> I see, please change your patches so that tcp_full_space() is used _once_ >>> >>> listener sk_rcvbuf can change under us. >>> >>> I really have no idea how window can be set to 63, so please send us >>> the packetdrill test once you have it.