lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 6 Aug 2014 23:43:11 -0400
From:	Willem de Bruijn <willemb@...gle.com>
To:	David Miller <davem@...emloft.net>
Cc:	Eric Dumazet <eric.dumazet@...il.com>,
	Network Development <netdev@...r.kernel.org>,
	Richard Cochran <richardcochran@...il.com>
Subject: Re: [PATCH net-next v4 5/6] net-timestamp: TCP timestamping

On Wed, Aug 6, 2014 at 10:03 PM, David Miller <davem@...emloft.net> wrote:
> From: Willem de Bruijn <willemb@...gle.com>
> Date: Wed, 6 Aug 2014 20:59:30 -0400
>
>>>>> but also that we're going to send multiple reports back to error
>>>>> queue.
>>>>
>>>> I see. The optimization patch to queue timestamps without payload will
>>>> mitigate that somewhat. I dropped that from the initial patchset, but
>>>> will fix it up for net-next. It may also be possible to squash
>>>> multiple timestamped packets on the errqueue together when they all
>>>> have the same payload, resulting in a single (possibly no-payload)
>>>> packet with repeating cmsgs IP_RECVERR and SCM_TIMESTAMPING. That
>>>> would give O(1) overhead regardless of number of retransmits.
>>>
>>> We could attach a singly linked list of small sequence number cookies
>>> to the SKB when it gets queued up.
>>
>> To avoid queuing a clone of the skb for each timestamp with
>> sock_queue_err_skb, only queue the first occurrence. Record
>> subsequent (tstype, tstamp) tuples to the queued skb with
>> matching tskey, and at ip_recv_error convert each into a cmsg?
>
> The retransmit queue only contains the original transmit SKB(s).
>
> So the only modification in tcp_clean_rtx_queue() is to walk the
> list of timestamp sequence number cookies.

I think I may have misunderstood the design. When are cookies
added to this list and what exactly do they record? Attach a
cookie to the SKB on each invocation of skb_tstamp_tx, instead
of cloning the SKB every time and queuing each clone onto
the errqueue. Build this list of cookies and flush them at once on
the final ACK timestamp? If so, then cookies record a timestamp
and -type, but all refer to the same skb_shinfo(skb)->tskey.

> Actually I see what might be an existing problem... for example, the
> leading data which is already ACK'd is trimmed from the front of the
> SKB in the TSO code path of tcp_clean_rtx_queue().  And this data is
> tossed before the __skb_tstamp_tx() invocation.
>
> Hmmm...

The break after tcp_tso_acked, when bytes have been trimmed off the
head. Yes, indeed. Maybe I can move the timestamp code before that, at
the top of the loop.. I'll take a closer look to verify.
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists