Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp2874246pxu; Sat, 19 Dec 2020 05:01:07 -0800 (PST) X-Google-Smtp-Source: ABdhPJzzTrSSAIRSdwHRr5db1Wwgyrgr+52C9Y9NtH4pvSxKXjHrDh5kOUmJL3nE9lf2NEZiz4Ia X-Received: by 2002:a17:907:2071:: with SMTP id qp17mr8392769ejb.110.1608382867532; Sat, 19 Dec 2020 05:01:07 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1608382867; cv=none; d=google.com; s=arc-20160816; b=Yv59Ok0sRbiDX6Pj36FaHovmx0TcL08ruP9VfU4TrYUAAcTvklBkq3QnP7V8N5dk5Y cBkWir6fEuC6tf95zWRfaIOQYBbWX8frNIgokbb+DODwq7ttR+7sRT6ywEtRQinrfDyv 1jLKDk64o0OLBQVQnwfYPRkoTV9uK3viRswfB9DtR2kffyUFzv7DKGbLcG1kM1XHzePz D6UjxXpsiGASUIS3YeYn4zg4AaArJEfJISY0u4iTafVEtYFfb9knkoC2K+cEFu8dnVpc jfNzDvxLl0McqrJD6QIwBB+miovkX3QqLgZGAC+NU2PU+1+cOFPRJImwK/ua0C7CunIN VAEw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from; bh=sXNFSiqH+b6YJVPgmhcqV3vx3X4Tmr5amE5FFYkJ8ro=; b=b7r+wV0XBvyILVlLKuYfuSlmxtUzLoQbURAwFa/TMnLhIf108jEdp5+jzf9U4/1rNX bzBbU5NxdxJv9gOhgDGMubfnv7Y87fRZfymrhCU6up7OAt/dFXaVdnQL8/2IZ00wl2Gb wZWhc5amwUlpL9Fl3U9rAB1xDJCt9KwktfMBKjlD9jCPudohH2fEVRqN0bD61MDmbDiY /h5N0JtDahbKfx8hSt2IcS/XhoCmio8MnNHo+ieX5BRO8V8xslTCYnmZlm9bSZ4DakLo srmbnPMj/VazkR7Y3VbmGf/kRIzB0kQ5KF3sDWqLj33d4taRSOFzeHLOvLz6rLQkWi/G IfBQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f21si7758681edr.152.2020.12.19.05.00.44; Sat, 19 Dec 2020 05:01:07 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728111AbgLSM7Y (ORCPT + 99 others); Sat, 19 Dec 2020 07:59:24 -0500 Received: from mail.kernel.org ([198.145.29.99]:45528 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727881AbgLSM6x (ORCPT ); Sat, 19 Dec 2020 07:58:53 -0500 From: Greg Kroah-Hartman Authentication-Results: mail.kernel.org; dkim=permerror (bad message/signature format) To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Ingemar Johansson , Neal Cardwell , Yuchung Cheng , Soheil Hassas Yeganeh , Eric Dumazet , Jakub Kicinski Subject: [PATCH 5.9 23/49] tcp: fix cwnd-limited bug for TSO deferral where we send nothing Date: Sat, 19 Dec 2020 13:58:27 +0100 Message-Id: <20201219125345.818656912@linuxfoundation.org> X-Mailer: git-send-email 2.29.2 In-Reply-To: <20201219125344.671832095@linuxfoundation.org> References: <20201219125344.671832095@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Neal Cardwell [ Upstream commit 299bcb55ecd1412f6df606e9dc0912d55610029e ] When cwnd is not a multiple of the TSO skb size of N*MSS, we can get into persistent scenarios where we have the following sequence: (1) ACK for full-sized skb of N*MSS arrives -> tcp_write_xmit() transmit full-sized skb with N*MSS -> move pacing release time forward -> exit tcp_write_xmit() because pacing time is in the future (2) TSQ callback or TCP internal pacing timer fires -> try to transmit next skb, but TSO deferral finds remainder of available cwnd is not big enough to trigger an immediate send now, so we defer sending until the next ACK. (3) repeat... So we can get into a case where we never mark ourselves as cwnd-limited for many seconds at a time, even with bulk/infinite-backlog senders, because: o In case (1) above, every time in tcp_write_xmit() we have enough cwnd to send a full-sized skb, we are not fully using the cwnd (because cwnd is not a multiple of the TSO skb size). So every time we send data, we are not cwnd limited, and so in the cwnd-limited tracking code in tcp_cwnd_validate() we mark ourselves as not cwnd-limited. o In case (2) above, every time in tcp_write_xmit() that we try to transmit the "remainder" of the cwnd but defer, we set the local variable is_cwnd_limited to true, but we do not send any packets, so sent_pkts is zero, so we don't call the cwnd-limited logic to update tp->is_cwnd_limited. Fixes: ca8a22634381 ("tcp: make cwnd-limited checks measurement-based, and gentler") Reported-by: Ingemar Johansson Signed-off-by: Neal Cardwell Signed-off-by: Yuchung Cheng Acked-by: Soheil Hassas Yeganeh Signed-off-by: Eric Dumazet Link: https://lore.kernel.org/r/20201209035759.1225145-1-ncardwell.kernel@gmail.com Signed-off-by: Jakub Kicinski Signed-off-by: Greg Kroah-Hartman --- net/ipv4/tcp_output.c | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) --- a/net/ipv4/tcp_output.c +++ b/net/ipv4/tcp_output.c @@ -1723,7 +1723,8 @@ static void tcp_cwnd_validate(struct soc * window, and remember whether we were cwnd-limited then. */ if (!before(tp->snd_una, tp->max_packets_seq) || - tp->packets_out > tp->max_packets_out) { + tp->packets_out > tp->max_packets_out || + is_cwnd_limited) { tp->max_packets_out = tp->packets_out; tp->max_packets_seq = tp->snd_nxt; tp->is_cwnd_limited = is_cwnd_limited; @@ -2545,6 +2546,10 @@ repair: else tcp_chrono_stop(sk, TCP_CHRONO_RWND_LIMITED); + is_cwnd_limited |= (tcp_packets_in_flight(tp) >= tp->snd_cwnd); + if (likely(sent_pkts || is_cwnd_limited)) + tcp_cwnd_validate(sk, is_cwnd_limited); + if (likely(sent_pkts)) { if (tcp_in_cwnd_reduction(sk)) tp->prr_out += sent_pkts; @@ -2552,8 +2557,6 @@ repair: /* Send one loss probe per tail loss episode. */ if (push_one != 2) tcp_schedule_loss_probe(sk, false); - is_cwnd_limited |= (tcp_packets_in_flight(tp) >= tp->snd_cwnd); - tcp_cwnd_validate(sk, is_cwnd_limited); return false; } return !tp->packets_out && !tcp_write_queue_empty(sk);