lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <670adf14-ac4c-3d91-f57f-b230dfd68c71@cs.auckland.ac.nz>
Date:   Mon, 10 Apr 2017 18:35:03 +1200
From:   Ulrich Speidel <ulrich@...auckland.ac.nz>
To:     Eric Dumazet <eric.dumazet@...il.com>,
        Tom Herbert <tom@...bertland.com>
Cc:     Linux Kernel Network Developers <netdev@...r.kernel.org>
Subject: Re: Issue with load across multiple connections

Dear Eric,

My apologies for taking so long to get back to you - I had to wait for 
some experiments to finish until I could grab hold of two machines that 
weren't busy and had a more or less direct connection.

On the server (a Super Micro):

root@...verQ:/home/lei/Desktop/servers-20160311# cat 
/proc/sys/net/ipv4/tcp_rmem
4096    87380   6291456
root@...verQ:/home/lei/Desktop/servers-20160311# cat 
/proc/sys/net/ipv4/tcp_wmem
4096    16384   4194304
root@...verQ:/home/lei/Desktop/servers-20160311# cat 
/proc/sys/net/ipv4/tcp_mem
47337   63117   94674

On the client (a Raspberry Pi):

root@...ver-controller:/home/lei/20160226/servers-20160226# cat 
/proc/sys/net/ipv4/tcp_rmem
4096    87380   6291456
root@...ver-controller:/home/lei/20160226/servers-20160226# cat 
/proc/sys/net/ipv4/tcp_wmem
4096    16384   4194304
root@...ver-controller:/home/lei/20160226/servers-20160226# cat 
/proc/sys/net/ipv4/tcp_mem
22206   29611   44412

nstat output:

On server:

root@...verQ:/home/lei/Desktop/servers-20160311# nstat
#kernel
IpInReceives                    223487             0.0
IpInDelivers                    223487             0.0
IpOutRequests                   242888             0.0
TcpPassiveOpens                 2625               0.0
TcpEstabResets                  1                  0.0
TcpInSegs                       217980             0.0
TcpOutSegs                      227965             0.0
TcpRetransSegs                  14888              0.0
TcpOutRsts                      635                0.0
UdpInDatagrams                  809                0.0
UdpOutDatagrams                 32                 0.0
Ip6InReceives                   21                 0.0
Ip6InDelivers                   17                 0.0
Ip6OutRequests                  4                  0.0
Ip6InMcastPkts                  17                 0.0
Ip6OutMcastPkts                 8                  0.0
Ip6InOctets                     1480               0.0
Ip6OutOctets                    288                0.0
Ip6InMcastOctets                1192               0.0
Ip6OutMcastOctets               576                0.0
Ip6InNoECTPkts                  21                 0.0
Icmp6InMsgs                     13                 0.0
Icmp6OutMsgs                    4                  0.0
Icmp6InGroupMembQueries         4                  0.0
Icmp6InGroupMembResponses       4                  0.0
Icmp6InNeighborAdvertisements   5                  0.0
Icmp6OutGroupMembResponses      4                  0.0
Icmp6InType130                  4                  0.0
Icmp6InType131                  4                  0.0
Icmp6InType136                  5                  0.0
Icmp6OutType131                 4                  0.0
TcpExtSyncookiesSent            182                0.0
TcpExtSyncookiesRecv            182                0.0
TcpExtSyncookiesFailed          622                0.0
TcpExtTW                        337                0.0
TcpExtPAWSEstab                 34317              0.0
TcpExtDelayedACKs               3                  0.0
TcpExtDelayedACKLost            7                  0.0
TcpExtListenOverflows           8                  0.0
TcpExtListenDrops               190                0.0
TcpExtTCPHPHits                 2                  0.0
TcpExtTCPPureAcks               95602              0.0
TcpExtTCPHPAcks                 14                 0.0
TcpExtTCPSackRecovery           2784               0.0
TcpExtTCPSACKReorder            1                  0.0
TcpExtTCPFullUndo               1901               0.0
TcpExtTCPPartialUndo            883                0.0
TcpExtTCPFastRetrans            1292               0.0
TcpExtTCPForwardRetrans         13592              0.0
TcpExtTCPTimeouts               4                  0.0
TcpExtTCPLossProbes             18                 0.0
TcpExtTCPDSACKOldSent           7                  0.0
TcpExtTCPDSACKRecv              97                 0.0
TcpExtTCPDSACKIgnoredNoUndo     97                 0.0
TcpExtTCPSackShiftFallback      207045             0.0
TcpExtTCPReqQFullDoCookies      182                0.0
IpExtInMcastPkts                817                0.0
IpExtOutMcastPkts               2                  0.0
IpExtInBcastPkts                4690               0.0
IpExtInOctets                   15946943           0.0
IpExtOutOctets                  295423944          0.0
IpExtInMcastOctets              200946             0.0
IpExtOutMcastOctets             64                 0.0
IpExtInBcastOctets              629914             0.0
IpExtInNoECTPkts                223487             0.0

On client:

root@...ver-controller:/home/lei/20160226/servers-20160226# nstat
#kernel
IpInReceives                    249082             0.0
IpInDelivers                    249030             0.0
IpOutRequests                   218185             0.0
TcpActiveOpens                  2641               0.0
TcpInSegs                       242884             0.0
TcpOutSegs                      217992             0.0
TcpRetransSegs                  16                 0.0
TcpInErrs                       4                  0.0
TcpOutRsts                      13538              0.0
UdpInDatagrams                  8128               0.0
UdpOutDatagrams                 177                0.0
UdpIgnoredMulti                 1648               0.0
Ip6InReceives                   49                 0.0
Ip6InDelivers                   16                 0.0
Ip6OutRequests                  5                  0.0
Ip6InMcastPkts                  44                 0.0
Ip6OutMcastPkts                 5                  0.0
Ip6InOctets                     3584               0.0
Ip6OutOctets                    360                0.0
Ip6InMcastOctets                3136               0.0
Ip6OutMcastOctets               360                0.0
Ip6InNoECTPkts                  49                 0.0
Icmp6InMsgs                     12                 0.0
Icmp6OutMsgs                    5                  0.0
Icmp6InGroupMembQueries         4                  0.0
Icmp6InGroupMembResponses       3                  0.0
Icmp6InNeighborAdvertisements   5                  0.0
Icmp6OutGroupMembResponses      5                  0.0
Icmp6InType130                  4                  0.0
Icmp6InType131                  3                  0.0
Icmp6InType136                  5                  0.0
Icmp6OutType131                 5                  0.0
TcpExtPAWSEstab                 4092               0.0
TcpExtDelayedACKLost            13560              0.0
TcpExtTCPHPHits                 4593               0.0
TcpExtTCPPureAcks               29010              0.0
TcpExtTCPHPAcks                 10                 0.0
TcpExtTCPLossProbes             16                 0.0
TcpExtTCPDSACKOldSent           13560              0.0
TcpExtTCPAbortOnData            24                 0.0
TcpExtTCPRcvCoalesce            94257              0.0
TcpExtTCPOFOQueue               129737             0.0
TcpExtTCPChallengeACK           4                  0.0
TcpExtTCPSYNChallenge           4                  0.0
TcpExtTCPAutoCorking            1                  0.0
TcpExtTCPOrigDataSent           2682               0.0
TcpExtTCPACKSkippedPAWS         55                 0.0
TcpExtTCPACKSkippedSeq          111                0.0
IpExtInMcastPkts                888                0.0
IpExtInBcastPkts                5253               0.0
IpExtOutBcastPkts               67                 0.0
IpExtOutOctets                  15093500           0.0
IpExtInMcastOctets              214347             0.0
IpExtOutBcastOctets             11456              0.0
IpExtInNoECTPkts                249082             0.0

The experiment here generated flows of 100 kB each on 40 channels, each 
channel connecting sequentially as many times as possible for 180 
seconds. This run was a bit unusual in that it only had four "hung" 
channels: 5, 17, 36 and 40. The rest managed 72-74 connections each. The 
run before in the same configuration had 17 channels hang.

Any clues?

Best regards,

Ulrich



On 1/04/2017 11:46 a.m., Eric Dumazet wrote:

> TCP stack has no fairness guarantee, both at sender side and receive
> side.
>
> This smells like some memory tuning to me. Some flows, depending on
> their start time, can grab big receive/send windows, and others might
> hit global memory pressure and fallback to ridiculous windows.
>
> Please provide, on server and client :
>
> cat /proc/sys/net/ipv4/tcp_rmem
> cat /proc/sys/net/ipv4/tcp_wmem
> cat /proc/sys/net/ipv4/tcp_mem
>
> and maybe nstat output
>
> nstats -n >/dev/null ; < run experiment > ; nstat
>
>
> But I guess this is really a receiver problem, with too small amount of
> memory.
>
>
>> ---------- Forwarded message ----------
>> From: Ulrich Speidel <ulrich@...auckland.ac.nz>
>> Date: Fri, Mar 31, 2017 at 2:11 AM
>> Subject: Linux kernel query
>> To: tom@...ntonium.net
>> Cc: Brian Carpenter <brian@...auckland.ac.nz>, Nevil Brownlee
>> <n.brownlee@...kland.ac.nz>, lars@...inwurf.com, Lei Qian
>> <lqia012@...il.com>
>>
>>
>> Dear Tom,
>>
>> I'm a colleague of Brian Carpenter at the University of Auckland. He
>> has suggested that I contact you about this as I'm not sure that what
>> we have discovered is a bug - it may even be an intended feature but
>> I've failed to find it documented anywhere. From all we can tell, the
>> problem seems related to how socket file descriptor numbers & SKBs are
>> handled in POSIX-compliant kernels. I'm not a kernel hack so apologise
>> in advance if terminology isn't always spot-on.
>>
>> This is how we triggered the effect: We have a setup in which we have
>> multiple physical network clients connect to multiple servers at
>> random. On the client side, we create N "channels" (indexed, say 0 to
>> N-1) on each physical client. Each channel executes the following
>> task:
>>
>> 1) create a fresh TCP socket
>> 2) connect to a randomly chosen server from our pool
>> 3) receive a quantity of data that the server sends (this may be
>> somewhere between 0 bytes and hundreds of MB). In our case, we use the
>> application merely as a network traffic generator, so the receive
>> process consists of recording the number of bytes made available by
>> the socket and freeing the buffer without ever actually reading it.
>> 4) wait for server disconnect
>> 5) free socket (i.e., we're not explicitly re-using the previous
>> connection's socket)
>> 6) jump back to 1)
>>
>> We keep track of the throughput on each channel.
>>
>> Note that the effect is the same regardless of whether we implement
>> each channel in a process of its own, in a threaded application, or
>> whether we use non-blocking sockets and check on them in a loop.
>>
>> What we would normally expect is that the each channel would receive
>> about the same goodput over time, regardless of the value of N. Note
>> that each channel uses a succession of fresh sockets.
>>
>> What actually happens is this: For up to approximately N=20 channels
>> on a single physical client (we've tried Raspbian and Debian, as well
>> as Ubuntu), each channel sees on average substantial and comparable
>> levels of throughput, adding up to values approaching network
>> interface capacity. Once we push N beyond 20, the throughput on any
>> further channels drops to zero very quickly. For N=30, we typically
>> see at least half a dozen channels with no throughput at all beyond
>> the connection handshake. Throughput on the first 20 or so channels
>> remains pretty much unchanged. The sockets on the channels with low or
>> no throughput all manage to connect, but remain in connected state but
>> receive no data.
>>
>> Throughput on the first ~20 channels is sustainable for long periods
>> of time - so we're not dealing with an intermittent bug that causes
>> our sockets to stall: The affected sockets / channels never receive
>> anything (and the sockets around the 20-or-so mark very little). So it
>> seems that subsequent sockets on a channel inherit the ability of
>> their predecessor to receive data at quantity.
>>
>> We also see the issue on a single physical Raspberry client having the
>> sole use of 14 Super Micros on GbE interfaces to download from. So we
>> know we're definitely not overloading the server side (note that we
>> are able to saturate the network to the Pi). Here is some sample data
>> from the Pi (my apologies for the rough format):
>>
>> Channel index/MB transferred/Number of connections completed+attempted
>> 0 2.37 144
>> 1 29.32 92
>> 2 2.71 132
>> 3 10.88 705
>> 4 11.90 513
>> 5 16.045990 571
>> 6 9.631539 598
>> 7 15.420138 362
>> 8 9.854378 106
>> 9 8.975264 315
>> 10 8.020266 526
>> 11 6.369107 582
>> 12 8.877760 277
>> 13 8.148640 406
>> 14 13.536793 301
>> 15 9.804712 55
>> 16 7.643378 292
>> 17 7.970028 393
>> 18 0.000120 1
>> 19 9.359919 415
>> 20 0.000120 1
>> 21 0.000120 1
>> 22 12.937519 314
>> 23 0.000920 2
>> 24 14.561784 362
>> 25 0.000240 2
>> 26 11.005030 535
>> 27 0.000120 1
>> 28 0.000120 1
>> 29 0.000120 1
>>
>> The total data rate in this example was 94.1 Mbps on the 100 Mbps
>> connection of the Pi. Experiment duration was 20 seconds on this
>> occasion, but the effect is stable - we have observed it for many
>> minutes. Once "stuck", a channel remains stuck.
>>
>> The fact that the incoming data rate accrues almost exclusively to the
>> ~20 busy channels suggests that the sockets on the other channel are
>> either advertising a window of 0 bytes or are not generating ACKs for
>> incoming data, or both.
>>
>> We have considered the possibility of FIN packets getting dropped
>> somewhere along the way - not only is this unlikely since they are
>> small, but the effect also happens if we connect a server directly by
>> cable to a client machine with no network equipment inbetween. Also,
>> if lost FINs were to blame, we would see some of the steadfast 20
>> channels stall over time as well, given the network load - and we
>> don't.
>>
>> We then looked at the numerical value of the socket file descriptors
>> in use by each channel and noticed that there was a strong correlation
>> between the average fd value and the goodput, or for that matter
>> between channel index and average fd value.
>>
>> When we artificially throttle the data rate that each server is able
>> to serve a single client connection on, we get data on vastly more of
>> the channels (in fact, that's the workaround we currently use, we're
>> getting up to around 40 workable channels that way).
>>
>> We note that the POSIX specs on file descriptor allocation demand
>> "lowest available first" and that this usually extends to socket fds
>> although POSIX doesn't prescribe this. From what I have been able to
>> glean from the Linux kernel source I have looked at, sockets are
>> entered into a linked list. I presume they are then serviced by the
>> kernel in list order, which seems reasonable. However, I suspect (but
>> haven't been able to locate the relevant piece of kernel code) that
>> the kernel services the list starting at the head up to a point where
>> it runs out of time allocated for this task. When it returns to the
>> task, it then also seems to return to the head of the list again.
>>
>> So it seems that the sockets with lower-numbered fds get serviced with
>> priority, thus get their downloads completed first, which releases the
>> fd to the table, and therefore makes it highly likely that the same
>> channel will be assigned the same low fd when it creates the next
>> socket. Higher-valued fds don't get service, don't complete their
>> downloads, and in consequence their channels never get to return the
>> fds and renew their sockets.
>>
>> During my sabbatical last year, I investigated this scenario together
>> with Aaron Gulliver from the University of Victoria, Canada, and we
>> were able to simulate the effect based on this assumption. The graph
>> from our draft paper below shows our (simplified) model in action - my
>> apologies for the first draft nature of it, I've been waiting for half
>> a year for a free day to complete it. It shows the number of times
>> each socket fd (=socket series) was re-used (=connections completed
>> using this fd value) during the simulation, as well as the bytes
>> received. Ignore the "days" labels - these are a measure of how much
>> "downtime" an fd number gets before it's re-used, read "days = time
>> slices". Note the exponential y axis and the cliff around the 20 mark,
>> i.e., pretty much what we see in practice.
>>
>>
>>
>> We have also tried to find a theoretical approach but now think that
>> it is combinatorially intractable except in very simple cases.
>>
>> I have also copied Lars Nielsen from Steinwurf ApS in Aalborg, who has
>> come across what is probably the same issue in a web crawler
>> application he was developing. He also observed the magical value of
>> about 20 and our "fix" worked for him, too. He has had an indication
>> that the effect is anecdotally known in browser developer circles.
>>
>> We are well aware that our applications (maintaining and continuously
>> renewing a large number of sockets that receive data at
>> all-you-can-eat rates) are somewhat unusual, so I am not sure whether
>> the effect is even known.
>>
>> So, my questions:
>>
>> 1) Does the kernel indeed stop processing part-way down the list and
>> then return to the head again rather than continue processing where it
>> left off?
>> 2) If so, is this a bug, or is it intended? I could imagine that the
>> effect would help protect existing service connections (e.g., SSH
>> logins) in the case of subsequent DDoS attacks, but I'm not sure
>> whether that's by coincidence or design.
>>
>> Any insights would be welcome!
>>
>> Best regards,
>>
>> Ulrich
>>
>> --
>> ****************************************************************
>> Dr. Ulrich Speidel
>>
>> Department of Computer Science
>>
>> Room 303S.594 (City Campus)
>> Ph: (+64-9)-373-7599 ext. 85282
>>
>> The University of Auckland
>> ulrich@...auckland.ac.nz
>> http://www.cs.auckland.ac.nz/~ulrich/
>> ****************************************************************
>

-- 
****************************************************************
Dr. Ulrich Speidel

Department of Computer Science

Room 303S.594 (City Campus)
Ph: (+64-9)-373-7599 ext. 85282

The University of Auckland
ulrich@...auckland.ac.nz
http://www.cs.auckland.ac.nz/~ulrich/
****************************************************************



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ