From patchwork Fri Jan 27 15:59:46 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Xin Long X-Patchwork-Id: 13118887 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id CCF63C38142 for ; Fri, 27 Jan 2023 16:00:08 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234127AbjA0QAH (ORCPT ); Fri, 27 Jan 2023 11:00:07 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54040 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234114AbjA0QAA (ORCPT ); Fri, 27 Jan 2023 11:00:00 -0500 Received: from mail-qt1-x82a.google.com (mail-qt1-x82a.google.com [IPv6:2607:f8b0:4864:20::82a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 9D81383064 for ; Fri, 27 Jan 2023 07:59:59 -0800 (PST) Received: by mail-qt1-x82a.google.com with SMTP id v19so4329208qtq.13 for ; Fri, 27 Jan 2023 07:59:59 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date:message-id:reply-to; bh=CgBObbkqBmGMljS7Sx8OxmSsQ8aT2QZdaq1nmEVYvnA=; b=ohkPMoBehR1uugEfsH5onbcB9KTbRVvK9k6rZgEpDTIk3w1vOOgSMxqtDoZrWmXBxB MUe2lEsHnGtM8IoX61G8r/Lsb+T7t2uLVNMMUT4S+eOjRN4EIGMNoZBGTRM7bKV3wDjH 6xxtqTt/uc9kKSMSA8PxhG7nd1IMxRpDLSAiWb+hlWndpBx+2b9vulRY/9kgkQlLF97U YcBguMC5LQ0GlyBBxwsfD8iupNHNCNFu8gr9pS/zOM6Qin9Q4TCAUGKwvluamX3I3jCq QWyTELAe/nQbR/I018OrJtxJolL3/pv17amjjEn7rHgsdkLsNA4Pou6vlcHsbgQ1I13f WZ4g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=CgBObbkqBmGMljS7Sx8OxmSsQ8aT2QZdaq1nmEVYvnA=; b=m+IIDIV2NImvnMhrzOqUwfJLYeklTfooqec6qiEcE0/J/bLTHrzQHOyxvDgfCkVzoo YpwPls4/s/T1ZzYqompY04dBZEK9Fj1mSrbDx1bXbugXTNL0wwEing66Gdl+mPpNxl58 oyh6bB17LuVLrI4oTkC9pTBtJyBdwV2d5UZSxor3ULHO0FGhGuxrLyN9IS3k5uQrBY0n TnTEXmEbMAMm8nBA+JU5iDOo26LSwZ7CZHbObPumCAgRxXyIFIfLLGOOK0cH5u/Uc0Fp 6a0/+aUobRkVHuu0bnccXz8MfyJsTvbdMvBIkV3mau3mn83bny1ZPUyAqw+N+WL+wBob t79g== X-Gm-Message-State: AFqh2kpF7TO00J3QeELkxD9cpRk7iM8a6HNeCgKvawOvtyNM1igVmssG h+Fn5HnFDnV1O49dKCi0bst18Kua2hBgrA== X-Google-Smtp-Source: AMrXdXttx+3HDnnojeSNp6H9F56jWBb5Hi9M0OLqY0XCJ3pnKR1eE6Ss+AZpPnicH29SS9XsxLioxQ== X-Received: by 2002:a05:622a:590e:b0:3ab:8975:ad89 with SMTP id ga14-20020a05622a590e00b003ab8975ad89mr59428250qtb.60.1674835198567; Fri, 27 Jan 2023 07:59:58 -0800 (PST) Received: from wsfd-netdev15.ntdv.lab.eng.bos.redhat.com (nat-pool-bos-t.redhat.com. [66.187.233.206]) by smtp.gmail.com with ESMTPSA id z3-20020a05622a124300b003b62bc6cd1csm2860659qtx.82.2023.01.27.07.59.57 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 27 Jan 2023 07:59:58 -0800 (PST) From: Xin Long To: network dev Cc: davem@davemloft.net, kuba@kernel.org, Eric Dumazet , Paolo Abeni , David Ahern , Hideaki YOSHIFUJI , Pravin B Shelar , Jamal Hadi Salim , Cong Wang , Jiri Pirko , Pablo Neira Ayuso , Florian Westphal , Marcelo Ricardo Leitner , Ilya Maximets , Aaron Conole , Roopa Prabhu , Nikolay Aleksandrov , Mahesh Bandewar , Paul Moore , Guillaume Nault Subject: [PATCHv3 net-next 00/10] net: support ipv4 big tcp Date: Fri, 27 Jan 2023 10:59:46 -0500 Message-Id: X-Mailer: git-send-email 2.31.1 MIME-Version: 1.0 Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org X-Patchwork-Delegate: kuba@kernel.org This is similar to the BIG TCP patchset added by Eric for IPv6: https://lwn.net/Articles/895398/ Different from IPv6, IPv4 tot_len is 16-bit long only, and IPv4 header doesn't have exthdrs(options) for the BIG TCP packets' length. To make it simple, as David and Paolo suggested, we set IPv4 tot_len to 0 to indicate this might be a BIG TCP packet and use skb->len as the real IPv4 total length. This will work safely, as all BIG TCP packets are GSO/GRO packets and processed on the same host as they were created; There is no padding in GSO/GRO packets, and skb->len - network_offset is exactly the IPv4 packet total length; Also, before implementing the feature, all those places that may get iph tot_len from BIG TCP packets are taken care with some new APIs: Patch 1 adds some APIs for iph tot_len setting and getting, which are used in all these places where IPv4 BIG TCP packets may reach in Patch 2-7, Patch 8 adds a GSO_TCP tp_status for af_packet users, and Patch 9 add new netlink attributes to make IPv4 BIG TCP independent from IPv6 BIG TCP on configuration, and Patch 10 implements this feature. Note that the similar change as in Patch 2-6 are also needed for IPv6 BIG TCP packets, and will be addressed in another patchset. The similar performance test is done for IPv4 BIG TCP with 25Gbit NIC and 1.5K MTU: No BIG TCP: for i in {1..10}; do netperf -t TCP_RR -H 192.168.100.1 -- -r80000,80000 -O MIN_LATENCY,P90_LATENCY,P99_LATENCY,THROUGHPUT|tail -1; done 168 322 337 3776.49 143 236 277 4654.67 128 258 288 4772.83 171 229 278 4645.77 175 228 243 4678.93 149 239 279 4599.86 164 234 268 4606.94 155 276 289 4235.82 180 255 268 4418.95 168 241 249 4417.82 Enable BIG TCP: ip link set dev ens1f0np0 gro_ipv4_max_size 128000 gso_ipv4_max_size 128000 for i in {1..10}; do netperf -t TCP_RR -H 192.168.100.1 -- -r80000,80000 -O MIN_LATENCY,P90_LATENCY,P99_LATENCY,THROUGHPUT|tail -1; done 161 241 252 4821.73 174 205 217 5098.28 167 208 220 5001.43 164 228 249 4883.98 150 233 249 4914.90 180 233 244 4819.66 154 208 219 5004.92 157 209 247 4999.78 160 218 246 4842.31 174 206 217 5080.99 Thanks for the feedback from Eric and David Ahern. v1->v2: - remove the fixes and the selftest for IPv6 BIG TCP, will do it in another patchset. - add GSO_TCP for tp_status in packet sockets to tell the af_packet users that this is a TCP GSO packet in Patch 8. - also check skb_is_gso() when checking if it's a GSO TCP packet in Patch 1. v2->v3: - add gso/gro_ipv4_max_size per device and netlink attributes for them in Patch 9, so that we can selectively enable BIG TCP for IPv6, and not for IPv4, as Eric required. - remove the selftest, as it requires userspace iproute2 change after making IPv4 BIG TCP independent from IPv6 BIG TCP on configuration. Xin Long (10): net: add a couple of helpers for iph tot_len bridge: use skb_ip_totlen in br netfilter openvswitch: use skb_ip_totlen in conntrack net: sched: use skb_ip_totlen and iph_totlen netfilter: use skb_ip_totlen and iph_totlen cipso_ipv4: use iph_set_totlen in skbuff_setattr ipvlan: use skb_ip_totlen in ipvlan_get_L3_hdr packet: add TP_STATUS_GSO_TCP for tp_status net: add gso_ipv4_max_size and gro_ipv4_max_size per device net: add support for ipv4 big tcp drivers/net/ipvlan/ipvlan_core.c | 2 +- include/linux/ip.h | 21 ++++++++++++++ include/linux/netdevice.h | 6 ++++ include/net/netfilter/nf_tables_ipv4.h | 4 +-- include/net/route.h | 3 -- include/uapi/linux/if_link.h | 3 ++ include/uapi/linux/if_packet.h | 1 + net/bridge/br_netfilter_hooks.c | 2 +- net/bridge/netfilter/nf_conntrack_bridge.c | 4 +-- net/core/dev.c | 4 +++ net/core/dev.h | 18 ++++++++++++ net/core/gro.c | 12 ++++---- net/core/rtnetlink.c | 33 ++++++++++++++++++++++ net/core/sock.c | 8 ++++-- net/ipv4/af_inet.c | 7 +++-- net/ipv4/cipso_ipv4.c | 2 +- net/ipv4/ip_input.c | 2 +- net/ipv4/ip_output.c | 2 +- net/netfilter/ipvs/ip_vs_xmit.c | 2 +- net/netfilter/nf_log_syslog.c | 2 +- net/netfilter/xt_length.c | 2 +- net/openvswitch/conntrack.c | 2 +- net/packet/af_packet.c | 4 +++ net/sched/act_ct.c | 2 +- net/sched/sch_cake.c | 2 +- 25 files changed, 122 insertions(+), 28 deletions(-)