Received: by 2002:ab2:1689:0:b0:1f7:5705:b850 with SMTP id d9csp515938lqa; Sat, 27 Apr 2024 11:24:16 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCX7j9f+AOsaFaplQcK3VyeBADz84K6tUmaOA8y+VKl19pcQGJwIAY9WrZZSZUZLss5EeoRzGAWT2w0nDR6ICTnVKzAU/FwOypwHO5vRQQ== X-Google-Smtp-Source: AGHT+IHWEAuygAXVn4SPDB1PyDe+u06AYaegMB6Sg5GAIoj3xR2xtwmE01hFFj07JTW7BCNfjHpu X-Received: by 2002:a05:622a:4e:b0:43a:b542:d729 with SMTP id y14-20020a05622a004e00b0043ab542d729mr1533798qtw.67.1714242256257; Sat, 27 Apr 2024 11:24:16 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1714242256; cv=pass; d=google.com; s=arc-20160816; b=wwkPGg316sp8NfRZzmeqziKgPEDVjS7e695Z91dyWMClgwPHEo6Bk7aBFe9AqAwuq1 xfcWbX+zmrRhcgFfav0OAfGMDUBxswa/3LdaPWPU9xXwmDtcqv2ro9u6uGrSumXAsqxC bfzyLFdXEikfUn6ikZDi3KI3Vwb/GB5hMnwP7xakt8ObAoYovnMFyrBGmysYRJcFm6Ab xwFE3cM7/PNCD7YrpCKePLUE/9izA3j9GoMC8XheZVgVKNQwp0O8Y0tjMGGy0OgLlNQF dhM1iNgzJ9vBFdP3FRkF9sNAZkPpDB6sjlLCXwdOCMCA0JBzB3A/cixbUrREoJDdEXdY hRDw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :date:subject:cc:to:from:dkim-signature; bh=EiDSLzK9gXwhfSNcp1NWye4cBzOfrfj8Lh8+5oifCZ0=; fh=2UbUgTfeWurEVRdEHvoH7tS6zQOJWd6bxNx0UHIIt2A=; b=Tv224gYneCt4j/J0F3lKTcUAHYjZi96IRx1YhD5vYZU5nuaZNZ182KKuuTntYabdlB jaYDJHlGdY0qzEXKw7YPUujE9NHiL375JoWGSkXYhVYfGSiCDtPV4XkfyU2gTX7HKUxb WjnMFxyQwV2tm8oaBdsVInlP22frPoNTQYXY0RqxAjna13F3clqzMd8/kUZseXzaueNS SZC8M39oJlY5QDY94janu6vnZv3fHn6S9BNnxV2UyvQrwr7+eTcu5ucQkrLqVmwoSHrk DisiY1g/alxs6CNk4VkmzwqulKgOHjs+8SD/WER8p0YDqNnwT1P3dlwyX49O7Ww4A8oK ShKQ==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=fail header.i=@nbd.name header.s=20160729 header.b=RucSRB9m; arc=pass (i=1 dkim=pass dkdomain=nbd.name dmarc=pass fromdomain=nbd.name); spf=pass (google.com: domain of linux-kernel+bounces-161123-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-161123-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=nbd.name Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [147.75.199.223]) by mx.google.com with ESMTPS id v21-20020a05622a189500b0043a11863ebbsi10397140qtc.262.2024.04.27.11.24.16 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 27 Apr 2024 11:24:16 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-161123-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) client-ip=147.75.199.223; Authentication-Results: mx.google.com; dkim=fail header.i=@nbd.name header.s=20160729 header.b=RucSRB9m; arc=pass (i=1 dkim=pass dkdomain=nbd.name dmarc=pass fromdomain=nbd.name); spf=pass (google.com: domain of linux-kernel+bounces-161123-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-161123-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=nbd.name Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 9E3D81C20F48 for ; Sat, 27 Apr 2024 18:24:15 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id B43BA14D71C; Sat, 27 Apr 2024 18:23:19 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=fail reason="signature verification failed" (1024-bit key) header.d=nbd.name header.i=@nbd.name header.b="RucSRB9m" Received: from nbd.name (nbd.name [46.4.11.11]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 605471442F1; Sat, 27 Apr 2024 18:23:17 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=46.4.11.11 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1714242198; cv=none; b=XKs4VirGdWcesvyUuH/EcZCz2Kp1V0z5Bcl/7ZInbId8Ix1E5J1WtdHVWMAcPGOCCrvO/So3SRKzuIqTVJ3fdKJNLyM2gJreRjxI25nUYCS2mzCXrpDdKWagU9Efurck3AnyWzT2wda1jzciMgjcfAkrfSENsDybC1XxRDaBknI= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1714242198; c=relaxed/simple; bh=eZ9nP4wXbTt/Mr3RgylZxupjrwkK+9vyyPOYTmkfjjE=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=VSgsXEsIpQKviiWHEDZ4X8Wx/cL66KucRTVDXq1Y3HUhqfnAo4ehfzVOOFRTMIH7qz0bdknM7FCQ6LrMAUAz3gSIctOJ4UtAY8Az7CcWvt6J+529EIiAmXLHtL5R3nim885Us+9pbfhJGkL/iUl4IrJ3YGhEG85gmc9QaJFdxyA= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=nbd.name; spf=none smtp.mailfrom=nbd.name; dkim=pass (1024-bit key) header.d=nbd.name header.i=@nbd.name header.b=RucSRB9m; arc=none smtp.client-ip=46.4.11.11 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=nbd.name Authentication-Results: smtp.subspace.kernel.org; spf=none smtp.mailfrom=nbd.name DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=nbd.name; s=20160729; h=Content-Transfer-Encoding:MIME-Version:References:In-Reply-To: Message-ID:Date:Subject:Cc:To:From:Sender:Reply-To:Content-Type:Content-ID: Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc :Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:List-Subscribe: List-Post:List-Owner:List-Archive; bh=EiDSLzK9gXwhfSNcp1NWye4cBzOfrfj8Lh8+5oifCZ0=; b=RucSRB9mzYsRmDR0ADjMuFeoTF hcj1pIDmF8qSSj4YBpCcuIHRye8l4ahMbV3GB7P52w+Xhd0et1g3PzbjR+o8m8GL8Ki6pAJyGyxYl OMdxcItUzRIsoPi2Fav5hEfe1WrqyBSKqBWn9ySPVBoX+2CkA1aHwWdN1bR/PmNujHRM=; Received: from p54ae9c93.dip0.t-ipconnect.de ([84.174.156.147] helo=localhost.localdomain) by ds12 with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (Exim 4.96) (envelope-from ) id 1s0mha-008hH3-31; Sat, 27 Apr 2024 20:23:11 +0200 From: Felix Fietkau To: netdev@vger.kernel.org, Eric Dumazet , "David S. Miller" , David Ahern , Jakub Kicinski , Paolo Abeni Cc: willemdebruijn.kernel@gmail.com, linux-kernel@vger.kernel.org Subject: [PATCH v4 net-next v4 6/6] net: add heuristic for enabling TCP fraglist GRO Date: Sat, 27 Apr 2024 20:23:02 +0200 Message-ID: <20240427182305.24461-7-nbd@nbd.name> X-Mailer: git-send-email 2.44.0 In-Reply-To: <20240427182305.24461-1-nbd@nbd.name> References: <20240427182305.24461-1-nbd@nbd.name> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit When forwarding TCP after GRO, software segmentation is very expensive, especially when the checksum needs to be recalculated. One case where that's currently unavoidable is when routing packets over PPPoE. Performance improves significantly when using fraglist GRO implemented in the same way as for UDP. When NETIF_F_GRO_FRAGLIST is enabled, perform a lookup for an established socket in the same netns as the receiving device. While this may not cover all relevant use cases in multi-netns configurations, it should be good enough for most configurations that need this. Here's a measurement of running 2 TCP streams through a MediaTek MT7622 device (2-core Cortex-A53), which runs NAT with flow offload enabled from one ethernet port to PPPoE on another ethernet port + cake qdisc set to 1Gbps. rx-gro-list off: 630 Mbit/s, CPU 35% idle rx-gro-list on: 770 Mbit/s, CPU 40% idle Signe-off-by: Felix Fietkau --- net/ipv4/tcp_offload.c | 32 ++++++++++++++++++++++++++++++++ net/ipv6/tcpv6_offload.c | 35 +++++++++++++++++++++++++++++++++++ 2 files changed, 67 insertions(+) diff --git a/net/ipv4/tcp_offload.c b/net/ipv4/tcp_offload.c index 87ae9808e260..3e9b8c6f9c8c 100644 --- a/net/ipv4/tcp_offload.c +++ b/net/ipv4/tcp_offload.c @@ -407,6 +407,36 @@ void tcp_gro_complete(struct sk_buff *skb) } EXPORT_SYMBOL(tcp_gro_complete); +static void tcp4_check_fraglist_gro(struct list_head *head, struct sk_buff *skb, + struct tcphdr *th) +{ + const struct iphdr *iph; + struct sk_buff *p; + struct sock *sk; + struct net *net; + int iif, sdif; + + if (!(skb->dev->features & NETIF_F_GRO_FRAGLIST)) + return; + + p = tcp_gro_lookup(head, th); + if (p) { + NAPI_GRO_CB(skb)->is_flist = NAPI_GRO_CB(p)->is_flist; + return; + } + + inet_get_iif_sdif(skb, &iif, &sdif); + iph = skb_gro_network_header(skb); + net = dev_net(skb->dev); + sk = __inet_lookup_established(net, net->ipv4.tcp_death_row.hashinfo, + iph->saddr, th->source, + iph->daddr, ntohs(th->dest), + iif, sdif); + NAPI_GRO_CB(skb)->is_flist = !sk; + if (sk) + sock_put(sk); +} + INDIRECT_CALLABLE_SCOPE struct sk_buff *tcp4_gro_receive(struct list_head *head, struct sk_buff *skb) { @@ -422,6 +452,8 @@ struct sk_buff *tcp4_gro_receive(struct list_head *head, struct sk_buff *skb) if (!th) goto flush; + tcp4_check_fraglist_gro(head, skb, th); + return tcp_gro_receive(head, skb, th); flush: diff --git a/net/ipv6/tcpv6_offload.c b/net/ipv6/tcpv6_offload.c index e73a4f74fd96..ba7b0b3cb9f2 100644 --- a/net/ipv6/tcpv6_offload.c +++ b/net/ipv6/tcpv6_offload.c @@ -7,12 +7,45 @@ */ #include #include +#include #include #include #include #include #include "ip6_offload.h" +static void tcp6_check_fraglist_gro(struct list_head *head, struct sk_buff *skb, + struct tcphdr *th) +{ +#if IS_ENABLED(CONFIG_IPV6) + const struct ipv6hdr *hdr; + struct sk_buff *p; + struct sock *sk; + struct net *net; + int iif, sdif; + + if (!(skb->dev->features & NETIF_F_GRO_FRAGLIST)) + return; + + p = tcp_gro_lookup(head, th); + if (p) { + NAPI_GRO_CB(skb)->is_flist = NAPI_GRO_CB(p)->is_flist; + return; + } + + inet6_get_iif_sdif(skb, &iif, &sdif); + hdr = skb_gro_network_header(skb); + net = dev_net(skb->dev); + sk = __inet6_lookup_established(net, net->ipv4.tcp_death_row.hashinfo, + &hdr->saddr, th->source, + &hdr->daddr, ntohs(th->dest), + iif, sdif); + NAPI_GRO_CB(skb)->is_flist = !sk; + if (sk) + sock_put(sk); +#endif /* IS_ENABLED(CONFIG_IPV6) */ +} + INDIRECT_CALLABLE_SCOPE struct sk_buff *tcp6_gro_receive(struct list_head *head, struct sk_buff *skb) { @@ -28,6 +61,8 @@ struct sk_buff *tcp6_gro_receive(struct list_head *head, struct sk_buff *skb) if (!th) goto flush; + tcp6_check_fraglist_gro(head, skb, th); + return tcp_gro_receive(head, skb, th); flush: -- 2.44.0