From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 2E59F436AC; Fri, 8 Dec 2023 19:12:40 +0100 (CET) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id ED75643297; Fri, 8 Dec 2023 19:12:39 +0100 (CET) Received: from mail-pl1-f169.google.com (mail-pl1-f169.google.com [209.85.214.169]) by mails.dpdk.org (Postfix) with ESMTP id 5CF3043001 for ; Fri, 8 Dec 2023 19:12:38 +0100 (CET) Received: by mail-pl1-f169.google.com with SMTP id d9443c01a7336-1d0c94397c0so18497685ad.2 for ; Fri, 08 Dec 2023 10:12:38 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1702059157; x=1702663957; darn=dpdk.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=ivJQBqb7t43e5cOhGMxNmSul151T9kBzKnmwBwZBFj4=; b=iWvsKox8u+PsDTghFAS0S0C5UgV67B+23McCcQM5ZvBpbsK6oJPJZzi/OACkG4JOeJ JUzVHY8JFIqMoJfppgdjnKFXABL9mzTDncCk2Pbl/D3hIhZP2am2f/XweGGS4D38FmFc N+0bxM6sCo16C8+IpCVV/rwO67YRFlcmoWQdHkcUJRQ2lKtR29CHnVq2epaAEqmi3Ng9 hgZ59qjnFu4oWlKj/FzvmLMmINMT0t0EYdKApWaTiu2An/o8WM0lDLLqB113UJxiN4i0 Aw1fjcZg33KrWkWaMeL/R0kzxgkJnuASNppSNaUCsNHk8e9OfKj9iPyOin/HSIeU3dNW clNQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1702059157; x=1702663957; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=ivJQBqb7t43e5cOhGMxNmSul151T9kBzKnmwBwZBFj4=; b=kajw4l6CBdQtZ1EYyKKcVcvkW1RcBfQS7jKlKeJpWTzrQ0z7vI4CJbixmGv+DswPnD z2+SLHltKORoDr2dEFKzNFpPiWA53MPQ6BfZllaB74WDb8BZjIPoJVg7SsMibwJ1wt8g uku1eZXw4rupZRpNg8PBkv9bbmOJ6g8Dvi+sPaFYkd/+BbCirZ1hDbKtUzKS2deu5Q+t 0EJpqlvN2BZP3WZ1rorSUzCeUYhvRXbPYRiq9sm77qr8Yw5j04ikVcTtY+rf/BgwlMDh uCFuUyyTkoG+5G6Ogpnu/byzkhAKHYaopLTNVhmrR5jocwntzW0pg6v4QeayC1pKmRCF rwYQ== X-Gm-Message-State: AOJu0YxWgCdyC92E02YyMe4tyODhwSgM6SwXu3v5u209rBTNRncFh2Rc r924pwBxkv2nywEMDjD6NvdbINCw6bc= X-Google-Smtp-Source: AGHT+IHd8eH3BAhAyCRf19VCDDCdVM/Z1oNLo7BFKmBwhFOQZM8z/Me5JGSXpNLJAXcE00lrYlf4sQ== X-Received: by 2002:a17:903:228e:b0:1d0:7761:31f6 with SMTP id b14-20020a170903228e00b001d0776131f6mr606627plh.32.1702059157230; Fri, 08 Dec 2023 10:12:37 -0800 (PST) Received: from IDCREDBOX918.fareast.corp.microsoft.com ([167.220.238.196]) by smtp.gmail.com with ESMTPSA id ff16-20020a056a002f5000b006ce742b6b1fsm1884492pfb.63.2023.12.08.10.12.35 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 08 Dec 2023 10:12:36 -0800 (PST) From: Kumara Parameshwaran To: dev@dpdk.org Cc: hujiayu.hu@foxmail.com, Kumara Parameshwaran , Kumara Parameshwaran Subject: [PATCH v8] gro: fix reordering of packets in GRO layer Date: Fri, 8 Dec 2023 23:42:25 +0530 Message-Id: <20231208181225.23835-1-kumaraparamesh92@gmail.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20221101070557.58808-1-kumaraparmesh92@gmail.com> References: <20221101070557.58808-1-kumaraparmesh92@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org In the current implementation when packets is received with special flag(s) set, only that packet is delivered out of order. There could be already coalesced packets in the GRO table beloging to the same flow but not handled. This fix makes sure that the entire segment is delivered with the special flag(s) set which is how the Linux GRO is also implemented Signed-off-by: Kumara Parameshwaran Co-authored-by: Kumara Parameshwaran --- If the received packet is not a pure ACK packet, we check if there are any previous packets in the flow, if present we indulge the received packet also in the coalescing logic and update the flags of the last recived packet to the entire segment which would avoid re-ordering. Lets say a case where P1(PSH), P2(ACK), P3(ACK) are received in burst mode, P1 contains PSH flag and since it does not contain any prior packets in the flow we copy it to unprocess_packets and P2(ACK) and P3(ACK) are merged together. In the existing case the P2,P3 would be delivered as single segment first and the unprocess_packets will be copied later which will cause reordering. With the patch copy the unprocess packets first and then the packets from the GRO table. Testing done The csum test-pmd was modified to support the following GET request of 10MB from client to server via test-pmd (static arp entries added in client and server). Enable GRO and TSO in test-pmd where the packets recived from the client mac would be sent to server mac and vice versa. In above testing, without the patch the client observerd re-ordering of 25 packets and with the patch there were no packet re-ordering observerd. v2: Fix warnings in commit and comment. Do not consider packet as candidate to merge if it contains SYN/RST flag. v3: Fix warnings. v4: Rebase with master. v5: Adding co-author email v6: Address review comments from the maintainer to restructure the code and handle only special flags PSH,FIN v7: Fix warnings and errors v8: Fix warnings and errors lib/gro/gro_tcp.h | 11 ++++++++ lib/gro/gro_tcp4.c | 67 +++++++++++++++++++++++++++++----------------- 2 files changed, 54 insertions(+), 24 deletions(-) diff --git a/lib/gro/gro_tcp.h b/lib/gro/gro_tcp.h index d926c4b8cc..137a03bc96 100644 --- a/lib/gro/gro_tcp.h +++ b/lib/gro/gro_tcp.h @@ -187,4 +187,15 @@ is_same_common_tcp_key(struct cmn_tcp_key *k1, struct cmn_tcp_key *k2) return (!memcmp(k1, k2, sizeof(struct cmn_tcp_key))); } +static inline void +update_tcp_hdr_flags(struct rte_tcp_hdr *tcp_hdr, struct rte_mbuf *pkt) +{ + struct rte_tcp_hdr *merged_tcp_hdr; + + merged_tcp_hdr = rte_pktmbuf_mtod_offset(pkt, struct rte_tcp_hdr *, pkt->l2_len + + pkt->l3_len); + merged_tcp_hdr->tcp_flags |= tcp_hdr->tcp_flags; + +} + #endif diff --git a/lib/gro/gro_tcp4.c b/lib/gro/gro_tcp4.c index 6645de592b..8af5a8d8a9 100644 --- a/lib/gro/gro_tcp4.c +++ b/lib/gro/gro_tcp4.c @@ -126,6 +126,7 @@ gro_tcp4_reassemble(struct rte_mbuf *pkt, uint32_t item_idx; uint32_t i, max_flow_num, remaining_flow_num; uint8_t find; + uint32_t item_start_idx; /* * Don't process the packet whose TCP header length is greater @@ -139,13 +140,6 @@ gro_tcp4_reassemble(struct rte_mbuf *pkt, tcp_hdr = (struct rte_tcp_hdr *)((char *)ipv4_hdr + pkt->l3_len); hdr_len = pkt->l2_len + pkt->l3_len + pkt->l4_len; - /* - * Don't process the packet which has FIN, SYN, RST, PSH, URG, ECE - * or CWR set. - */ - if (tcp_hdr->tcp_flags != RTE_TCP_ACK_FLAG) - return -1; - /* trim the tail padding bytes */ ip_tlen = rte_be_to_cpu_16(ipv4_hdr->total_length); if (pkt->pkt_len > (uint32_t)(ip_tlen + pkt->l2_len)) @@ -183,6 +177,7 @@ gro_tcp4_reassemble(struct rte_mbuf *pkt, if (tbl->flows[i].start_index != INVALID_ARRAY_INDEX) { if (is_same_tcp4_flow(tbl->flows[i].key, key)) { find = 1; + item_start_idx = tbl->flows[i].start_index; break; } remaining_flow_num--; @@ -190,28 +185,52 @@ gro_tcp4_reassemble(struct rte_mbuf *pkt, } if (find == 0) { - sent_seq = rte_be_to_cpu_32(tcp_hdr->sent_seq); - item_idx = insert_new_tcp_item(pkt, tbl->items, &tbl->item_num, - tbl->max_item_num, start_time, - INVALID_ARRAY_INDEX, sent_seq, ip_id, - is_atomic); - if (item_idx == INVALID_ARRAY_INDEX) + /* + * Add new flow to the table only if contains ACK flag with data. + * Do not add any packets with additional tcp flags to the GRO table + */ + if (tcp_hdr->tcp_flags == RTE_TCP_ACK_FLAG) { + sent_seq = rte_be_to_cpu_32(tcp_hdr->sent_seq); + item_idx = insert_new_tcp_item(pkt, tbl->items, &tbl->item_num, + tbl->max_item_num, start_time, + INVALID_ARRAY_INDEX, sent_seq, ip_id, + is_atomic); + if (item_idx == INVALID_ARRAY_INDEX) + return -1; + if (insert_new_flow(tbl, &key, item_idx) == + INVALID_ARRAY_INDEX) { + /* + * Fail to insert a new flow, so delete the + * stored packet. + */ + delete_tcp_item(tbl->items, item_idx, &tbl->item_num, + INVALID_ARRAY_INDEX); + return -1; + } + return 0; + } else { return -1; - if (insert_new_flow(tbl, &key, item_idx) == - INVALID_ARRAY_INDEX) { - /* - * Fail to insert a new flow, so delete the - * stored packet. - */ - delete_tcp_item(tbl->items, item_idx, &tbl->item_num, INVALID_ARRAY_INDEX); + } + } else { + /* + * Any packet with additional flags like PSH,FIN should be processed + * and flushed immediately. + * Hence marking the start time to 0, so that the packets will be flushed + * immediately in timer mode. + */ + if (tcp_hdr->tcp_flags & (RTE_TCP_ACK_FLAG|RTE_TCP_PSH_FLAG|RTE_TCP_FIN_FLAG)) { + if (tcp_hdr->tcp_flags != RTE_TCP_ACK_FLAG) + tbl->items[item_start_idx].start_time = 0; + return process_tcp_item(pkt, tcp_hdr, tcp_dl, tbl->items, + tbl->flows[i].start_index, + &tbl->item_num, tbl->max_item_num, + ip_id, is_atomic, start_time); + } else { return -1; } - return 0; } - return process_tcp_item(pkt, tcp_hdr, tcp_dl, tbl->items, tbl->flows[i].start_index, - &tbl->item_num, tbl->max_item_num, - ip_id, is_atomic, start_time); + return -1; } /* -- 2.34.1