Received: by 2002:ab2:3c46:0:b0:1f5:f2ab:c469 with SMTP id x6csp90000lqf; Thu, 25 Apr 2024 23:53:06 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCVBCoeJ/DRS63cPfa3yt3Un2dZwbMldwkZCsGyn3oDLgD6hjPgwObAp1c+0IPEASnzcPvggX2qItDMnbRCZsL29YX9ma/YkZfYxkqhT3g== X-Google-Smtp-Source: AGHT+IGesKdkJKtajiRfMKms8Y+K3EiY5BtW/u6tLrTzaGwfstuRWZO9YI7ryfBaNgWttuZnWVNr X-Received: by 2002:a17:906:2c52:b0:a58:bfb9:398 with SMTP id f18-20020a1709062c5200b00a58bfb90398mr1016509ejh.67.1714114386660; Thu, 25 Apr 2024 23:53:06 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1714114386; cv=pass; d=google.com; s=arc-20160816; b=eLZNAR8c+glKUod/HNml0WomwHalRKBUvOe/5ME+O+3fH5KFC5g1aV9Punp/GZmkOU /yqcB0N7pDQ/gHhmsqcKjIgjBoZKu0nqCyKo9D5JFplmynnThC72oKHd9WjrSIuCKQWN 1uPGhBzIYSyxM2uw4gx+Rs7WISd6E0mfxghMUzoCmXjA03jbjbJWd98S5C51oEKEjAAm dGK7isTex3N7q2cQklv/OOxO1/lXIceLtWaiSu4yIRqdFhpzVfLCX7Oi8V5wHX7JKqYU 6ucfSOIY08EMW9OTdVQ0vb66K3LHxcLua8HeZr84PXdAfT7o3gzABhSBB3E8bsoNDtpD m7EQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :date:subject:cc:to:from:dkim-signature; bh=9DeZ9jS+7vxRnrb2c4sFQl5rrUE4Xdcx5KZfOfzctuw=; fh=2UbUgTfeWurEVRdEHvoH7tS6zQOJWd6bxNx0UHIIt2A=; b=GzicAonAOveedRji4NzHbHjVsMy4/rbscNsuWdNAAYC3Dksb/h+CnIQxQ+737+N1fm rDZjEDNE5fFVXQFUWe8QbSh1rOgX/2dcc0P0eiia0aIGrP12b7FtrsVy77ituu5hokT2 izgPbJgqZzHtPlSMrwOC5o/zs2OsBVm2D+VLdomRh548f2tfUt5dm4pzNijulX5o5emW FdMPxhzlsb+iMdNKue1hnPQf3GhUoBUJYr90luZTdEaWFhSABsDC4eURKuL146Z7qMzn KkeXKRJzhhmd2H+u0q/dE/YmE0S42oLEBo+QYw9TjRvbEwKP+869NmvrgC2RWgyzsWIj f4ww==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=fail header.i=@nbd.name header.s=20160729 header.b=s662oJ+o; arc=pass (i=1 dkim=pass dkdomain=nbd.name dmarc=pass fromdomain=nbd.name); spf=pass (google.com: domain of linux-kernel+bounces-159598-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-159598-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=nbd.name Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [147.75.80.249]) by mx.google.com with ESMTPS id vr3-20020a170906bfe300b00a5536691965si10356012ejb.973.2024.04.25.23.53.06 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 25 Apr 2024 23:53:06 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-159598-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) client-ip=147.75.80.249; Authentication-Results: mx.google.com; dkim=fail header.i=@nbd.name header.s=20160729 header.b=s662oJ+o; arc=pass (i=1 dkim=pass dkdomain=nbd.name dmarc=pass fromdomain=nbd.name); spf=pass (google.com: domain of linux-kernel+bounces-159598-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-159598-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=nbd.name Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 63E451F21BBE for ; Fri, 26 Apr 2024 06:53:06 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 0893913A88A; Fri, 26 Apr 2024 06:51:58 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=fail reason="signature verification failed" (1024-bit key) header.d=nbd.name header.i=@nbd.name header.b="s662oJ+o" Received: from nbd.name (nbd.name [46.4.11.11]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id ACF1113AD13; Fri, 26 Apr 2024 06:51:55 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=46.4.11.11 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1714114317; cv=none; b=cLH6waj+7KSyUZbnKAXrnlDGoQvsfb+YGF4qAW9lKOPPs10t4dXZAunOF7FRqGkRyJAtUtA40e3q4o+8aF0AKAsWXYAIDnpv2RSOUyybDoLTzElRFXDs6nnxUaHPmrzPf55D/eAjJOHb5nnaBqkOtrSoJ3B/vCgEbW6P18zF9cg= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1714114317; c=relaxed/simple; bh=u6sxceRCUEfa6tDoPeaxsGfysUqRnA8WVB4Ljbei6H4=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=AW0kIoxxBHWzAcd/1KITD+CGM5L/E2woqTHXTxI7NS43Xj7zNObLJngmSxxeTd5xCP/9HUwcZ3isGvcGpuMLKY3aNRlGY5SQqJqrbYldYGMjVyzvtEZBdf530UduhjbfePh2RIvuvYG7odkDa04XqbG1PQTecMTXgvu/gsIE5fw= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=nbd.name; spf=none smtp.mailfrom=nbd.name; dkim=pass (1024-bit key) header.d=nbd.name header.i=@nbd.name header.b=s662oJ+o; arc=none smtp.client-ip=46.4.11.11 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=nbd.name Authentication-Results: smtp.subspace.kernel.org; spf=none smtp.mailfrom=nbd.name DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=nbd.name; s=20160729; h=Content-Transfer-Encoding:MIME-Version:References:In-Reply-To: Message-ID:Date:Subject:Cc:To:From:Sender:Reply-To:Content-Type:Content-ID: Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc :Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:List-Subscribe: List-Post:List-Owner:List-Archive; bh=9DeZ9jS+7vxRnrb2c4sFQl5rrUE4Xdcx5KZfOfzctuw=; b=s662oJ+obki5MsoDyXPzToe27l wfduu9dsEepCqFRIvFIrvfswibO4+EkxwjnQUwVugx3euqA3fuYf3q9AIf7hoQVgo3rScbL+yZ/30 f8/o2ltC9u0fRrBUl8H1TfTOlUJWyVg8kWOeDtTnz5RQNCyLmLFOm1YR2RFgbw3I1YHM=; Received: from p54ae9c93.dip0.t-ipconnect.de ([84.174.156.147] helo=localhost.localdomain) by ds12 with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (Exim 4.96) (envelope-from ) id 1s0FQz-007ltt-1N; Fri, 26 Apr 2024 08:51:49 +0200 From: Felix Fietkau To: netdev@vger.kernel.org, Eric Dumazet , "David S. Miller" , David Ahern , Jakub Kicinski , Paolo Abeni Cc: willemdebruijn.kernel@gmail.com, linux-kernel@vger.kernel.org Subject: [PATCH v3 net-next v3 6/6] net: add heuristic for enabling TCP fraglist GRO Date: Fri, 26 Apr 2024 08:51:40 +0200 Message-ID: <20240426065143.4667-7-nbd@nbd.name> X-Mailer: git-send-email 2.44.0 In-Reply-To: <20240426065143.4667-1-nbd@nbd.name> References: <20240426065143.4667-1-nbd@nbd.name> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit When forwarding TCP after GRO, software segmentation is very expensive, especially when the checksum needs to be recalculated. One case where that's currently unavoidable is when routing packets over PPPoE. Performance improves significantly when using fraglist GRO implemented in the same way as for UDP. When NETIF_F_GRO_FRAGLIST is enabled, perform a lookup for an established socket in the same netns as the receiving device. While this may not cover all relevant use cases in multi-netns configurations, it should be good enough for most configurations that need this. Here's a measurement of running 2 TCP streams through a MediaTek MT7622 device (2-core Cortex-A53), which runs NAT with flow offload enabled from one ethernet port to PPPoE on another ethernet port + cake qdisc set to 1Gbps. rx-gro-list off: 630 Mbit/s, CPU 35% idle rx-gro-list on: 770 Mbit/s, CPU 40% idle Signe-off-by: Felix Fietkau --- net/ipv4/tcp_offload.c | 30 ++++++++++++++++++++++++++++++ net/ipv6/tcpv6_offload.c | 33 +++++++++++++++++++++++++++++++++ 2 files changed, 63 insertions(+) diff --git a/net/ipv4/tcp_offload.c b/net/ipv4/tcp_offload.c index ee5403760775..2ae83f4394dc 100644 --- a/net/ipv4/tcp_offload.c +++ b/net/ipv4/tcp_offload.c @@ -406,6 +406,34 @@ void tcp_gro_complete(struct sk_buff *skb) } EXPORT_SYMBOL(tcp_gro_complete); +static void tcp4_check_fraglist_gro(struct list_head *head, struct sk_buff *skb, + struct tcphdr *th) +{ + const struct iphdr *iph = skb_gro_network_header(skb); + struct net *net = dev_net(skb->dev); + struct sk_buff *p; + struct sock *sk; + int iif, sdif; + + if (!(skb->dev->features & NETIF_F_GRO_FRAGLIST)) + return; + + p = tcp_gro_lookup(head, th); + if (p) { + NAPI_GRO_CB(skb)->is_flist = NAPI_GRO_CB(p)->is_flist; + return; + } + + inet_get_iif_sdif(skb, &iif, &sdif); + sk = __inet_lookup_established(net, net->ipv4.tcp_death_row.hashinfo, + iph->saddr, th->source, + iph->daddr, ntohs(th->dest), + iif, sdif); + NAPI_GRO_CB(skb)->is_flist = !sk; + if (sk) + sock_put(sk); +} + INDIRECT_CALLABLE_SCOPE struct sk_buff *tcp4_gro_receive(struct list_head *head, struct sk_buff *skb) { @@ -421,6 +449,8 @@ struct sk_buff *tcp4_gro_receive(struct list_head *head, struct sk_buff *skb) if (!th) goto flush; + tcp4_check_fraglist_gro(head, skb, th); + return tcp_gro_receive(head, skb, th); flush: diff --git a/net/ipv6/tcpv6_offload.c b/net/ipv6/tcpv6_offload.c index c01ace2e9ff0..1ab45cca3936 100644 --- a/net/ipv6/tcpv6_offload.c +++ b/net/ipv6/tcpv6_offload.c @@ -7,12 +7,43 @@ */ #include #include +#include #include #include #include #include #include "ip6_offload.h" +static void tcp6_check_fraglist_gro(struct list_head *head, struct sk_buff *skb, + struct tcphdr *th) +{ +#if IS_ENABLED(CONFIG_IPV6) + const struct ipv6hdr *hdr = skb_gro_network_header(skb); + struct net *net = dev_net(skb->dev); + struct sk_buff *p; + struct sock *sk; + int iif, sdif; + + if (!(skb->dev->features & NETIF_F_GRO_FRAGLIST)) + return; + + p = tcp_gro_lookup(head, th); + if (p) { + NAPI_GRO_CB(skb)->is_flist = NAPI_GRO_CB(p)->is_flist; + return; + } + + inet6_get_iif_sdif(skb, &iif, &sdif); + sk = __inet6_lookup_established(net, net->ipv4.tcp_death_row.hashinfo, + &hdr->saddr, th->source, + &hdr->daddr, ntohs(th->dest), + iif, sdif); + NAPI_GRO_CB(skb)->is_flist = !sk; + if (sk) + sock_put(sk); +#endif /* IS_ENABLED(CONFIG_IPV6) */ +} + INDIRECT_CALLABLE_SCOPE struct sk_buff *tcp6_gro_receive(struct list_head *head, struct sk_buff *skb) { @@ -28,6 +59,8 @@ struct sk_buff *tcp6_gro_receive(struct list_head *head, struct sk_buff *skb) if (!th) goto flush; + tcp6_check_fraglist_gro(head, skb, th); + return tcp_gro_receive(head, skb, th); flush: -- 2.44.0