lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CADVnQymCso04zj8N0DYP9EkhTwXqtbsCu1xLxAUC60rSd09Rkw@mail.gmail.com>
Date: Mon, 16 Jun 2025 17:07:42 -0400
From: Neal Cardwell <ncardwell@...gle.com>
To: Eric Wheeler <netdev@...ts.ewheeler.net>
Cc: netdev@...r.kernel.org, Eric Dumazet <edumazet@...gle.com>, 
	Geumhwan Yu <geumhwan.yu@...sung.com>, Jakub Kicinski <kuba@...nel.org>, 
	Sasha Levin <sashal@...nel.org>, Yuchung Cheng <ycheng@...gle.com>, stable@...nel.org
Subject: Re: [BISECT] regression: tcp: fix to allow timestamp undo if no
 retransmits were sent

On Mon, Jun 16, 2025 at 4:14 PM Eric Wheeler <netdev@...ts.ewheeler.net> wrote:
>
> On Sun, 15 Jun 2025, Eric Wheeler wrote:
> > On Tue, 10 Jun 2025, Neal Cardwell wrote:
> > > On Mon, Jun 9, 2025 at 1:45 PM Neal Cardwell <ncardwell@...gle.com> wrote:
> > > >
> > > > On Sat, Jun 7, 2025 at 7:26 PM Neal Cardwell <ncardwell@...gle.com> wrote:
> > > > >
> > > > > On Sat, Jun 7, 2025 at 6:54 PM Neal Cardwell <ncardwell@...gle.com> wrote:
> > > > > >
> > > > > > On Sat, Jun 7, 2025 at 3:13 PM Neal Cardwell <ncardwell@...gle.com> wrote:
> > > > > > >
> > > > > > > On Fri, Jun 6, 2025 at 6:34 PM Eric Wheeler <netdev@...ts.ewheeler.net> wrote:
> > > > > > > >
> > > > > > > > On Fri, 6 Jun 2025, Neal Cardwell wrote:
> > > > > > > > > On Thu, Jun 5, 2025 at 9:33 PM Eric Wheeler <netdev@...ts.ewheeler.net> wrote:
> > > > > > > > > >
> > > > > > > > > > Hello Neal,
> > > > > > > > > >
> > > > > > > > > > After upgrading to Linux v6.6.85 on an older Supermicro SYS-2026T-6RFT+
> > > > > > > > > > with an Intel 82599ES 10GbE NIC (ixgbe) linked to a Netgear GS728TXS at
> > > > > > > > > > 10GbE via one SFP+ DAC (no bonding), we found TCP performance with
> > > > > > > > > > existing devices on 1Gbit ports was <60Mbit; however, TCP with devices
> > > > > > > > > > across the switch on 10Gbit ports runs at full 10GbE.
> > > > > > > > > >
> > > > > > > > > > Interestingly, the problem only presents itself when transmitting
> > > > > > > > > > from Linux; receive traffic (to Linux) performs just fine:
> > > > > > > > > >         ~60Mbit: Linux v6.6.85 =TX=> 10GbE -> switch -> 1GbE  -> device
> > > > > > > > > >          ~1Gbit: device        =TX=>  1GbE -> switch -> 10GbE -> Linux v6.6.85
> > > > > > > > > >
> > > > > > > > > > Through bisection, we found this first-bad commit:
> > > > > > > > > >
> > > > > > > > > >         tcp: fix to allow timestamp undo if no retransmits were sent
> > > > > > > > > >                 upstream:       e37ab7373696e650d3b6262a5b882aadad69bb9e
> > > > > > > > > >                 stable 6.6.y:   e676ca60ad2a6fdeb718b5e7a337a8fb1591d45f
> > >
> >
> > > The attached patch should apply (with "git am") for any recent kernel
> > > that has the "tcp: fix to allow timestamp undo if no retransmits were
> > > sent" patch it is fixing. So you should be able to test it on top of
> > > the 6.6 stable or 6.15 stable kernels you used earlier. Whichever is
> > > easier.
>
> Definitely better, but performance is ~15% slower vs reverting, and the
> retransmit counts are still higher than the other.  In the two sections
> below you can see the difference between after the fix and after the
> revert.
>
> Here is the output:
>
> ## After fixing with your patch:
>         https://www.linuxglobal.com/out/for-neal/after-fix.tar.gz
>
>         WHEN=after-fix
>         (while true; do date +%s.%N; ss -tenmoi; sleep 0.050; done) > /tmp/$WHEN-ss.txt &
>         nstat -n; (while true; do date +%s.%N; nstat; sleep 0.050; done)  > /tmp/$WHEN-nstat.txt &
>         tcpdump -i br0 -w /tmp/$WHEN-tcpdump.${eth}.pcap -n -s 116 -c 1000000 host 192.168.1.203 &
>         iperf3 -c 192.168.1.203
>         kill %1 %2 %3
>
>         [1] 2300
>         nstat: history is aged out, resetting
>         [2] 2304
>         [3] 2305
>         Connecting to host 192.168.1.203, port 5201
>         [  5] local 192.168.1.52 port 47730 connected to 192.168.1.203 port 5201
>         dropped privs to tcpdump
>         tcpdump: listening on br0, link-type EN10MB (Ethernet), snapshot length 116 bytes
>         [ ID] Interval           Transfer     Bitrate         Retr  Cwnd
>         [  5]   0.00-1.00   sec   115 MBytes   963 Mbits/sec   21    334 KBytes
>         [  5]   1.00-2.00   sec   113 MBytes   949 Mbits/sec    3    325 KBytes
>         [  5]   2.00-3.00   sec  41.8 MBytes   350 Mbits/sec  216   5.70 KBytes
>         [  5]   3.00-4.00   sec   113 MBytes   952 Mbits/sec   77    234 KBytes
>         [  5]   4.00-5.00   sec   110 MBytes   927 Mbits/sec    5    281 KBytes
>         [  5]   5.00-6.00   sec  69.5 MBytes   583 Mbits/sec  129    336 KBytes
>         [  5]   6.00-7.00   sec  66.8 MBytes   561 Mbits/sec  234    302 KBytes
>         [  5]   7.00-8.00   sec   113 MBytes   949 Mbits/sec    8    312 KBytes
>         [  5]   8.00-9.00   sec  89.9 MBytes   754 Mbits/sec   72    247 KBytes
>         [  5]   9.00-10.00  sec   113 MBytes   949 Mbits/sec    6    235 KBytes
>         - - - - - - - - - - - - - - - - - - - - - - - - -
>         [ ID] Interval           Transfer     Bitrate         Retr
>         [  5]   0.00-10.00  sec   946 MBytes   794 Mbits/sec  771               sender <<<
>         [  5]   0.00-10.04  sec   944 MBytes   789 Mbits/sec                  receiver <<<
>
>         iperf Done.
>         145337 packets captured
>         146674 packets received by filter
>         0 packets dropped by kernel
>         [1]   Terminated              ( while true; do
>             date +%s.%N; ss -tenmoi; sleep 0.050;
>         done ) > /tmp/$WHEN-ss.txt
>         [root@hv2 ~]#
>         [2]-  Terminated              ( while true; do
>             date +%s.%N; nstat; sleep 0.050;
>         done ) > /tmp/$WHEN-nstat.txt
>         [3]+  Done                    tcpdump -i br0 -w /tmp/$WHEN-tcpdump.${eth}.pcap -n -s 116 -c 1000000 host 192.168.1.203
>
> ## After Revert
>         WHEN=after-revert-6.6.93
>         (while true; do date +%s.%N; ss -tenmoi; sleep 0.050; done) > /tmp/$WHEN-ss.txt &
>         nstat -n; (while true; do date +%s.%N; nstat; sleep 0.050; done)  > /tmp/$WHEN-nstat.txt &
>         tcpdump -i br0 -w /tmp/$WHEN-tcpdump.${eth}.pcap -n -s 116 -c 1000000 host 192.168.1.203 &
>         iperf3 -c 192.168.1.203
>         kill %1 %2 %3
>         [1] 2088
>         nstat: history is aged out, resetting
>         [2] 2092
>         [3] 2093
>         Connecting to host 192.168.1.203, port 5201
>         dropped privs to tcpdump
>         tcpdump: listening on br0, link-type EN10MB (Ethernet), snapshot length 116 bytes
>         [  5] local 192.168.1.52 port 47256 connected to 192.168.1.203 port 5201
>         [ ID] Interval           Transfer     Bitrate         Retr  Cwnd
>         [  5]   0.00-1.00   sec   115 MBytes   962 Mbits/sec   13    324 KBytes
>         [  5]   1.00-2.00   sec   114 MBytes   953 Mbits/sec    3    325 KBytes
>         [  5]   2.00-3.00   sec   113 MBytes   947 Mbits/sec    4    321 KBytes
>         [  5]   3.00-4.00   sec   113 MBytes   950 Mbits/sec    3    321 KBytes
>         [  5]   4.00-5.00   sec   113 MBytes   946 Mbits/sec    5    322 KBytes
>         [  5]   5.00-6.00   sec   113 MBytes   950 Mbits/sec    8    321 KBytes
>         [  5]   6.00-7.00   sec   113 MBytes   948 Mbits/sec    5    312 KBytes
>         [  5]   7.00-8.00   sec   113 MBytes   952 Mbits/sec    3    301 KBytes
>         [  5]   8.00-9.00   sec   113 MBytes   945 Mbits/sec    7    301 KBytes
>         [  5]   9.00-10.00  sec   114 MBytes   953 Mbits/sec    4    302 KBytes
>         - - - - - - - - - - - - - - - - - - - - - - - - -
>         [ ID] Interval           Transfer     Bitrate         Retr
>         [  5]   0.00-10.00  sec  1.11 GBytes   950 Mbits/sec   55             sender
>         [  5]   0.00-10.04  sec  1.10 GBytes   945 Mbits/sec                  receiver
>
>         iperf Done.
>         [root@hv2 ~]# 189249 packets captured
>         189450 packets received by filter
>         0 packets dropped by kernel

Thanks for the test data!

Looking at the traces, there are no undo events, and no spurious loss
recovery events that I can see. So I don't see how the fix patch,
which changes undo behavior, would be relevant to the performance in
the test. It looks to me like the "after-fix" test just got unlucky
with packet losses, and because the receiver does not have SACK
support, any bad luck can easily turn into very poor performance, with
200ms timeouts during fast recovery.

Would you have cycles to run the "after-fix" and "after-revert-6.6.93"
cases multiple times, so we can get a sense of what is signal and what
is noise? Perhaps 20 or 50 trials for each approach?

Thanks!
neal

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ