lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CANn89i+bKi_fyfj5ui1Evq0WTjGRFj5Aj9Yf1f+L31FfVQeF6Q@mail.gmail.com>
Date: Tue, 18 Feb 2025 15:10:34 +0100
From: Eric Dumazet <edumazet@...gle.com>
To: Jakub Kicinski <kuba@...nel.org>
Cc: netdev@...r.kernel.org, davem@...emloft.net, pabeni@...hat.com, 
	andrew+netdev@...n.ch, horms@...nel.org, ncardwell@...gle.com, 
	kuniyu@...zon.com, hli@...flix.com, quic_stranche@...cinc.com, 
	quic_subashab@...cinc.com
Subject: Re: [PATCH net] tcp: adjust rcvq_space after updating scaling ratio

On Tue, Feb 18, 2025 at 12:29 AM Jakub Kicinski <kuba@...nel.org> wrote:
>
> Since commit under Fixes we set the window clamp in accordance
> to newly measured rcvbuf scaling_ratio. If the scaling_ratio
> decreased significantly we may put ourselves in a situation
> where windows become smaller than rcvq_space, preventing
> tcp_rcv_space_adjust() from increasing rcvbuf.
>
> The significant decrease of scaling_ratio is far more likely
> since commit 697a6c8cec03 ("tcp: increase the default TCP scaling ratio"),
> which increased the "default" scaling ratio from ~30% to 50%.
>
> Hitting the bad condition depends a lot on TCP tuning, and
> drivers at play. One of Meta's workloads hits it reliably
> under following conditions:
>  - default rcvbuf of 125k
>  - sender MTU 1500, receiver MTU 5000
>  - driver settles on scaling_ratio of 78 for the config above.
> Initial rcvq_space gets calculated as TCP_INIT_CWND * tp->advmss
> (10 * 5k = 50k). Once we find out the true scaling ratio and
> MSS we clamp the windows to 38k. Triggering the condition also
> depends on the message sequence of this workload. I can't repro
> the problem with simple iperf or TCP_RR-style tests.
>
> Fixes: a2cbb1603943 ("tcp: Update window clamping condition")
> Signed-off-by: Jakub Kicinski <kuba@...nel.org>

Reviewed-by: Eric Dumazet <edumazet@...gle.com>

Thanks !

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ