From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 5907F43866; Mon, 8 Jan 2024 17:05:13 +0100 (CET) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id EC3DB4027E; Mon, 8 Jan 2024 17:05:12 +0100 (CET) Received: from mail-pl1-f178.google.com (mail-pl1-f178.google.com [209.85.214.178]) by mails.dpdk.org (Postfix) with ESMTP id BD72E40263 for ; Mon, 8 Jan 2024 17:05:11 +0100 (CET) Received: by mail-pl1-f178.google.com with SMTP id d9443c01a7336-1d4df66529bso5866545ad.1 for ; Mon, 08 Jan 2024 08:05:11 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1704729911; x=1705334711; darn=dpdk.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=toaOcbzSW7r7hvgy7OtTzLJ68fMl6XoCMvsLTq36tEQ=; b=SpFPPAd1EDjYDDJxKUsCLVyKwNRaUhSGxZLYK3oHA4a0GuHVOMTcsxVkJPjjwuc7Fc HBt4DJuxZt+LarZpkg/cpZyEdc7lheO+EyPw7225pkVxnOVrRYmhW39sKE+AOpeGb/R4 T6qOFoVEzGbaoo0k9eLUHLeNATIKw4DHmy0pw7BrrmnkfExE8Qpp33yn73STdl7fbkdZ dQrn/yH+V0rTLfHApUPMhiXZcSMOzF1AjN7wsCq37FtyJ0Ijo/a2lecTcSxg52YRynam G/iCS/A0k4NvAkrMeps9myQLUS6qcLzoERZsjjBzXbgxeJC/RkdLEElCh9lncEOb8OVf Bsfw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1704729911; x=1705334711; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=toaOcbzSW7r7hvgy7OtTzLJ68fMl6XoCMvsLTq36tEQ=; b=FEg/GbMyNFuTTAzeuArKcRG9BtyGXQx4yfmiBX+hcKKZWtyUac9TltX9RMUz45itwR prc9qtsc6FcOiUK8NCzCB+b+YnMyxFfmQ2F96N4Kx7hHZbY9LXnOf0TVLVyaefItd5mB Az0Cg8AZEnY091CL44JD0AjQgpNxPO1WlFHWoL89+d/1qnJKSCfxUMBwWeRYWi83CO4y 3UwHMvKZ5te4DnD26ZTN242Y4TvmESQH2GWGYvx3noVLYmUHdsFPXwOa0nuwRVtLIVW/ RlrhZPP1BONMvdCpgULGJjPGhUJzh5O+SmRHsCG8jaWyfVdQiO/EyXBJIU1mIV7dUQSo yPEg== X-Gm-Message-State: AOJu0Yzih0sIrF3RdsO+YvIK+mJUEOmreNzAuyM3uBzfSqobIhZaA/Lb dhz2DbgkiDVGO8F2oq8XRpg= X-Google-Smtp-Source: AGHT+IG2F7vI4bjGG6VQr1gaPdounNKa7p7tzyBtrRsMfx3gvYaFEXj52Ie7hwjWC8Askra0U0h/nQ== X-Received: by 2002:a17:902:820b:b0:1d4:cc31:71e with SMTP id x11-20020a170902820b00b001d4cc31071emr1221213pln.67.1704729910579; Mon, 08 Jan 2024 08:05:10 -0800 (PST) Received: from IDCREDBOX918.fareast.corp.microsoft.com ([167.220.238.89]) by smtp.gmail.com with ESMTPSA id v6-20020a170902b7c600b001d083fed5f3sm82528plz.60.2024.01.08.08.05.09 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 08 Jan 2024 08:05:10 -0800 (PST) From: Kumara Parameshwaran To: hujiayu.hu@foxmail.com Cc: dev@dpdk.org, Kumara Parameshwaran Subject: [PATCH v13] gro: fix reordering of packets in GRO layer Date: Mon, 8 Jan 2024 21:34:53 +0530 Message-Id: <20240108160453.723207-1-kumaraparamesh92@gmail.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20231208181738.23931-1-kumaraparamesh92@gmail.com> References: <20231208181738.23931-1-kumaraparamesh92@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org In the current implementation when a packet is received with special TCP flag(s) set, only that packet is delivered out of order. There could be already coalesced packets in the GRO table belonging to the same flow but not delivered. This fix makes sure that the entire segment is delivered with the special flag(s) set which is how the Linux GRO is also implemented Signed-off-by: Kumara Parameshwaran --- If the received packet is not a pure ACK packet, we check if there are any previous packets in the flow, if present we indulge the received packet also in the coalescing logic and update the flags of the last recived packet to the entire segment which would avoid re-ordering. Lets say a case where P1(PSH), P2(ACK), P3(ACK) are received in burst mode, P1 contains PSH flag and since it does not contain any prior packets in the flow we copy it to unprocess_packets and P2(ACK) and P3(ACK) are merged together. In the existing case the P2,P3 would be delivered as single segment first and the unprocess_packets will be copied later which will cause reordering. With the patch copy the unprocess packets first and then the packets from the GRO table. Testing done The csum test-pmd was modified to support the following GET request of 10MB from client to server via test-pmd (static arp entries added in client and server). Enable GRO and TSO in test-pmd where the packets recived from the client mac would be sent to server mac and vice versa. In above testing, without the patch the client observerd re-ordering of 25 packets and with the patch there were no packet re-ordering observerd. v2: Fix warnings in commit and comment. Do not consider packet as candidate to merge if it contains SYN/RST flag. v3: Fix warnings. v4: Rebase with master. v5: Adding co-author email v6: Address review comments from the maintainer to restructure the code and handle only special flags PSH,FIN v7: Fix warnings and errors v8: Fix warnings and errors v9: Fix commit message v10: Update tcp header flags and address review comments v11: Fix warnings v12: Fix nit review comments v13: Fix warnings lib/gro/gro_tcp.h | 9 +++++++++ lib/gro/gro_tcp4.c | 36 +++++++++++++++++++++++++++--------- lib/gro/gro_tcp_internal.h | 2 +- lib/gro/gro_vxlan_tcp4.c | 5 +++-- 4 files changed, 40 insertions(+), 12 deletions(-) diff --git a/lib/gro/gro_tcp.h b/lib/gro/gro_tcp.h index d926c4b8cc..2c68b5f23e 100644 --- a/lib/gro/gro_tcp.h +++ b/lib/gro/gro_tcp.h @@ -19,6 +19,8 @@ #define INVALID_TCP_HDRLEN(len) \ (((len) < sizeof(struct rte_tcp_hdr)) || ((len) > MAX_TCP_HLEN)) +#define VALID_GRO_TCP_FLAGS (RTE_TCP_ACK_FLAG | RTE_TCP_PSH_FLAG | RTE_TCP_FIN_FLAG) + struct cmn_tcp_key { struct rte_ether_addr eth_saddr; struct rte_ether_addr eth_daddr; @@ -81,11 +83,13 @@ merge_two_tcp_packets(struct gro_tcp_item *item, struct rte_mbuf *pkt, int cmp, uint32_t sent_seq, + uint8_t tcp_flags, uint16_t ip_id, uint16_t l2_offset) { struct rte_mbuf *pkt_head, *pkt_tail, *lastseg; uint16_t hdr_len, l2_len; + struct rte_tcp_hdr *tcp_hdr; if (cmp > 0) { pkt_head = item->firstseg; @@ -128,6 +132,11 @@ merge_two_tcp_packets(struct gro_tcp_item *item, /* update MBUF metadata for the merged packet */ pkt_head->nb_segs += pkt_tail->nb_segs; pkt_head->pkt_len += pkt_tail->pkt_len; + if (tcp_flags != RTE_TCP_ACK_FLAG) { + tcp_hdr = rte_pktmbuf_mtod_offset(pkt, struct rte_tcp_hdr *, + l2_offset + pkt_head->l2_len + pkt_head->l3_len); + tcp_hdr->tcp_flags |= tcp_flags; + } return 1; } diff --git a/lib/gro/gro_tcp4.c b/lib/gro/gro_tcp4.c index 6645de592b..c8b8d7990c 100644 --- a/lib/gro/gro_tcp4.c +++ b/lib/gro/gro_tcp4.c @@ -126,6 +126,7 @@ gro_tcp4_reassemble(struct rte_mbuf *pkt, uint32_t item_idx; uint32_t i, max_flow_num, remaining_flow_num; uint8_t find; + uint32_t item_start_idx; /* * Don't process the packet whose TCP header length is greater @@ -139,11 +140,8 @@ gro_tcp4_reassemble(struct rte_mbuf *pkt, tcp_hdr = (struct rte_tcp_hdr *)((char *)ipv4_hdr + pkt->l3_len); hdr_len = pkt->l2_len + pkt->l3_len + pkt->l4_len; - /* - * Don't process the packet which has FIN, SYN, RST, PSH, URG, ECE - * or CWR set. - */ - if (tcp_hdr->tcp_flags != RTE_TCP_ACK_FLAG) + /* Return early if the TCP flags are not handled in GRO layer */ + if (tcp_hdr->tcp_flags & ~VALID_GRO_TCP_FLAGS) return -1; /* trim the tail padding bytes */ @@ -183,13 +181,35 @@ gro_tcp4_reassemble(struct rte_mbuf *pkt, if (tbl->flows[i].start_index != INVALID_ARRAY_INDEX) { if (is_same_tcp4_flow(tbl->flows[i].key, key)) { find = 1; + item_start_idx = tbl->flows[i].start_index; break; } remaining_flow_num--; } } - if (find == 0) { + if (find == 1) { + /* + * Any packet with additional flags like PSH,FIN should be processed + * and flushed immediately. + * Hence marking the start time to 0, so that the packets will be flushed + * immediately in timer mode. + */ + if (tcp_hdr->tcp_flags & (RTE_TCP_ACK_FLAG | RTE_TCP_PSH_FLAG | RTE_TCP_FIN_FLAG)) { + if (tcp_hdr->tcp_flags != RTE_TCP_ACK_FLAG) + tbl->items[item_start_idx].start_time = 0; + return process_tcp_item(pkt, tcp_hdr, tcp_dl, tbl->items, + tbl->flows[i].start_index, &tbl->item_num, + tbl->max_item_num, ip_id, is_atomic, start_time); + } else { + return -1; + } + } + /* + * Add new flow to the table only if contains ACK flag with data. + * Do not add any packets with additional tcp flags to the GRO table + */ + if (tcp_hdr->tcp_flags == RTE_TCP_ACK_FLAG) { sent_seq = rte_be_to_cpu_32(tcp_hdr->sent_seq); item_idx = insert_new_tcp_item(pkt, tbl->items, &tbl->item_num, tbl->max_item_num, start_time, @@ -209,9 +229,7 @@ gro_tcp4_reassemble(struct rte_mbuf *pkt, return 0; } - return process_tcp_item(pkt, tcp_hdr, tcp_dl, tbl->items, tbl->flows[i].start_index, - &tbl->item_num, tbl->max_item_num, - ip_id, is_atomic, start_time); + return -1; } /* diff --git a/lib/gro/gro_tcp_internal.h b/lib/gro/gro_tcp_internal.h index cc84abeaeb..e4855da1ad 100644 --- a/lib/gro/gro_tcp_internal.h +++ b/lib/gro/gro_tcp_internal.h @@ -101,7 +101,7 @@ process_tcp_item(struct rte_mbuf *pkt, is_atomic); if (cmp) { if (merge_two_tcp_packets(&items[cur_idx], - pkt, cmp, sent_seq, ip_id, 0)) + pkt, cmp, sent_seq, tcp_hdr->tcp_flags, ip_id, 0)) return 1; /* * Fail to merge the two packets, as the packet diff --git a/lib/gro/gro_vxlan_tcp4.c b/lib/gro/gro_vxlan_tcp4.c index 6ab7001922..8dd62a949c 100644 --- a/lib/gro/gro_vxlan_tcp4.c +++ b/lib/gro/gro_vxlan_tcp4.c @@ -239,10 +239,11 @@ merge_two_vxlan_tcp4_packets(struct gro_vxlan_tcp4_item *item, struct rte_mbuf *pkt, int cmp, uint32_t sent_seq, + uint8_t tcp_flags, uint16_t outer_ip_id, uint16_t ip_id) { - if (merge_two_tcp_packets(&item->inner_item, pkt, cmp, sent_seq, + if (merge_two_tcp_packets(&item->inner_item, pkt, cmp, sent_seq, tcp_flags, ip_id, pkt->outer_l2_len + pkt->outer_l3_len)) { /* Update the outer IPv4 ID to the large value. */ @@ -413,7 +414,7 @@ gro_vxlan_tcp4_reassemble(struct rte_mbuf *pkt, tcp_dl, outer_is_atomic, is_atomic); if (cmp) { if (merge_two_vxlan_tcp4_packets(&(tbl->items[cur_idx]), - pkt, cmp, sent_seq, + pkt, cmp, sent_seq, tcp_hdr->tcp_flags, outer_ip_id, ip_id)) return 1; /* -- 2.25.1