[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4AD43A4F.1090800@gmail.com>
Date: Tue, 13 Oct 2009 10:29:03 +0200
From: Eric Dumazet <eric.dumazet@...il.com>
To: Willy Tarreau <w@....eu>
CC: Eric Dumazet <eric.dumazet@...il.com>, netdev@...r.kernel.org
Subject: Re: TCP_DEFER_ACCEPT is missing counter update
Willy Tarreau a écrit :
> On Tue, Oct 13, 2009 at 09:23:59AM +0200, Eric Dumazet wrote:
>> Willy Tarreau a écrit :
>>> Hello,
>>>
>>> I was trying to use TCP_DEFER_ACCEPT and noticed that if the
>>> client does not talk, the connection is never accepted and
>>> remains in SYN_RECV state until the retransmits expire, where
>>> it finally is deleted. This is bad when some firewall such as
>>> netfilter sits between the client and the server because the
>>> firewall sees the connection in ESTABLISHED state while the
>>> server will finally silently drop it without sending an RST.
>>>
>>> This behaviour contradicts the man page which says it should
>>> wait only for some time :
>>>
>>> TCP_DEFER_ACCEPT (since Linux 2.4)
>>> Allows a listener to be awakened only when data arrives
>>> on the socket. Takes an integer value (seconds), this
>>> can bound the maximum number of attempts TCP will
>>> make to complete the connection. This option should not
>>> be used in code intended to be portable.
>>>
>>> Also, looking at ipv4/tcp.c, a retransmit counter is correctly
>>> computed :
>>>
>>> case TCP_DEFER_ACCEPT:
>>> icsk->icsk_accept_queue.rskq_defer_accept = 0;
>>> if (val > 0) {
>>> /* Translate value in seconds to number of
>>> * retransmits */
>>> while (icsk->icsk_accept_queue.rskq_defer_accept < 32 &&
>>> val > ((TCP_TIMEOUT_INIT / HZ) <<
>>> icsk->icsk_accept_queue.rskq_defer_accept))
>>> icsk->icsk_accept_queue.rskq_defer_accept++;
>>> icsk->icsk_accept_queue.rskq_defer_accept++;
>>> }
>>> break;
>>>
>>> ==> rskq_defer_accept is used as a counter of retransmits.
>>>
>>> But in tcp_minisocks.c, this counter is only checked. And in
>>> fact, I have found no location which updates it. So I think
>>> that what was intended was to decrease it in tcp_minisocks
>>> whenever it is checked, which the trivial patch below does :
>>>
>>> diff --git a/net/ipv4/tcp_minisocks.c b/net/ipv4/tcp_minisocks.c
>>> index f8d67cc..1b443b0 100644
>>> --- a/net/ipv4/tcp_minisocks.c
>>> +++ b/net/ipv4/tcp_minisocks.c
>>> @@ -645,6 +645,7 @@ struct sock *tcp_check_req(struct sock *sk, struct sk_buff *skb,
>>> if (inet_csk(sk)->icsk_accept_queue.rskq_defer_accept &&
>>> TCP_SKB_CB(skb)->end_seq == tcp_rsk(req)->rcv_isn + 1) {
>>> + inet_csk(sk)->icsk_accept_queue.rskq_defer_accept--;
>>> inet_rsk(req)->acked = 1;
>>> return NULL;
>>> }
>>>
>>
>> I dont understand why you want to decrement rskq_defer_accept here.
>
> Because the "timeout" as set by setsockopt() is converted into number
> of retransmits.
>
>> We receive a pure ACK (wihout DATA).
>> We should receive exactly one such ACK.
>
> No, we will receive other ones because the socket remains in SYN_RECV
> and since the local system ignores this ACK, it will send a SYN-ACK
> again, triggering a new ACK from the client.
>
> Although the concept looks strange at first, I think its implementation
> is in fact very smart because it manages to defer acceptation with an
> approximate timeout without using another timer.
>
> The most common requirement should only be to wait for an HTTP request
> to come in, and setting the timeout to anything non-zero is enough to
> just drop the first empty ACK and immediately accept on the data
> segment, so this method fits this purpose perfectly.
>
Indeed, thanks for this detailed explanation, I missed the SYN-ACK timer
and retransmits.
I played some years ago with TCP_DEFER_ACCEPT and got some unexpected results
on transmitted packets (server was consuming more bandwidth), and I know understand
it was very broken until today !
Thanks again Willy
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists