* [PATCH v2] net/tcp: Account for connection teardown handshake
@ 2019-09-20 9:49 Sebastian Smolorz
2019-09-20 13:54 ` Jan Kiszka
0 siblings, 1 reply; 2+ messages in thread
From: Sebastian Smolorz @ 2019-09-20 9:49 UTC (permalink / raw)
To: jan.kiszka; +Cc: xenomai
When closing a TCP connection a handshake procedure is executed between the
peers. The close routine of the rttcp driver did not participate in
detecting the end of this handshake but rather waited one second inside
a close call unconditionally. Especially when peers are directly connected
this is a waste of time which can hurt a lot in some situations.
This patch replaces the msleep(1000) call with waiting for a completion.
The maximum waiting time now can be configured via a module parameter.
The completion is done when the termination handshake has finished.
Signed-off-by: Sebastian Smolorz <sebastian.smolorz@gmx.de>
---
kernel/drivers/net/stack/ipv4/tcp/tcp.c | 38 ++++++++++++++++++++++---
1 file changed, 34 insertions(+), 4 deletions(-)
diff --git a/kernel/drivers/net/stack/ipv4/tcp/tcp.c b/kernel/drivers/net/stack/ipv4/tcp/tcp.c
index 54bafa80f..b8263e5d2 100644
--- a/kernel/drivers/net/stack/ipv4/tcp/tcp.c
+++ b/kernel/drivers/net/stack/ipv4/tcp/tcp.c
@@ -25,6 +25,7 @@
#include <linux/err.h>
#include <linux/module.h>
#include <linux/delay.h>
+#include <linux/completion.h>
#include <net/tcp_states.h>
#include <net/tcp.h>
@@ -41,6 +42,11 @@
#include <ipv4/af_inet.h>
#include "timerwheel.h"
+static unsigned int close_timeout = 1000;
+module_param(close_timeout, uint, 0664);
+MODULE_PARM_DESC(close_timeout,
+ "max time (ms) to wait during close for FIN-ACK handshake to complete, default 1000");
+
#ifdef CONFIG_XENO_DRIVERS_NET_RTIPV4_TCP_ERROR_INJECTION
static unsigned int error_rate;
@@ -147,6 +153,9 @@ struct tcp_socket {
struct rtskb_queue retransmit_queue;
struct timerwheel_timer timer;
+ struct completion fin_handshake;
+ rtdm_nrtsig_t close_sig;
+
#ifdef CONFIG_XENO_DRIVERS_NET_RTIPV4_TCP_ERROR_INJECTION
unsigned int packet_counter;
unsigned int error_rate;
@@ -1042,6 +1051,7 @@ static void rt_tcp_rcv(struct rtskb *skb)
rt_tcp_send(ts, TCP_FLAG_ACK);
/* data receiving is not possible anymore */
rtdm_sem_destroy(&ts->sock.pending_sem);
+ rtdm_nrtsig_pend(&ts->close_sig);
goto feed;
} else if (ts->tcp_state == TCP_FIN_WAIT1) {
/* Send ACK */
@@ -1105,6 +1115,7 @@ static void rt_tcp_rcv(struct rtskb *skb)
ts->tcp_state = TCP_CLOSE;
rtdm_lock_put_irqrestore(&ts->socket_lock, context);
/* socket destruction will be done on close() */
+ rtdm_nrtsig_pend(&ts->close_sig);
goto drop;
} else if (ts->tcp_state == TCP_FIN_WAIT1) {
ts->tcp_state = TCP_FIN_WAIT2;
@@ -1119,6 +1130,7 @@ static void rt_tcp_rcv(struct rtskb *skb)
ts->tcp_state = TCP_TIME_WAIT;
rtdm_lock_put_irqrestore(&ts->socket_lock, context);
/* socket destruction will be done on close() */
+ rtdm_nrtsig_pend(&ts->close_sig);
goto feed;
}
}
@@ -1190,6 +1202,11 @@ static int rt_tcp_window_send(struct tcp_socket *ts, u32 data_len, u8 *data_ptr)
return ret;
}
+static void rt_tcp_close_signal_handler(rtdm_nrtsig_t *nrtsig, void *arg)
+{
+ complete_all((struct completion *)arg);
+}
+
static int rt_tcp_socket_create(struct tcp_socket *ts)
{
rtdm_lockctx_t context;
@@ -1226,6 +1243,10 @@ static int rt_tcp_socket_create(struct tcp_socket *ts)
timerwheel_init_timer(&ts->timer, rt_tcp_retransmit_handler, ts);
rtskb_queue_init(&ts->retransmit_queue);
+ init_completion(&ts->fin_handshake);
+ rtdm_nrtsig_init(&ts->close_sig, rt_tcp_close_signal_handler,
+ &ts->fin_handshake);
+
#ifdef CONFIG_XENO_DRIVERS_NET_RTIPV4_TCP_ERROR_INJECTION
ts->packet_counter = counter_start;
ts->error_rate = error_rate;
@@ -1237,6 +1258,7 @@ static int rt_tcp_socket_create(struct tcp_socket *ts)
/* enforce maximum number of TCP sockets */
if (free_ports == 0) {
rtdm_lock_put_irqrestore(&tcp_socket_base_lock, context);
+ rtdm_nrtsig_destroy(&ts->close_sig);
return -EAGAIN;
}
free_ports--;
@@ -1338,6 +1360,8 @@ static void rt_tcp_socket_destruct(struct tcp_socket *ts)
rtdm_event_destroy(&ts->conn_evt);
+ rtdm_nrtsig_destroy(&ts->close_sig);
+
/* cleanup already collected fragments */
rt_ip_frag_invalidate_socket(sock);
@@ -1379,8 +1403,11 @@ static void rt_tcp_close(struct rtdm_fd *fd)
sizeof(send_cmd), NULL, NULL);
/* result is ignored */
- /* Give the peer some time to reply to our FIN. */
- msleep(1000);
+ /* Give the peer some time to reply to our FIN.
+ Since it is not relevant what exactly causes the wait
+ function to return its result is ignored. */
+ wait_for_completion_interruptible_timeout(&ts->fin_handshake,
+ msecs_to_jiffies(close_timeout));
} else if (ts->tcp_state == TCP_CLOSE_WAIT) {
/* Send FIN in CLOSE_WAIT */
send_cmd.ts = ts;
@@ -1393,8 +1420,11 @@ static void rt_tcp_close(struct rtdm_fd *fd)
sizeof(send_cmd), NULL, NULL);
/* result is ignored */
- /* Give the peer some time to reply to our FIN. */
- msleep(1000);
+ /* Give the peer some time to reply to our FIN.
+ Since it is not relevant what exactly causes the wait
+ function to return its result is ignored. */
+ wait_for_completion_interruptible_timeout(&ts->fin_handshake,
+ msecs_to_jiffies(close_timeout));
} else {
/*
rt_tcp_socket_validate() has not been called at all,
--
2.20.1
^ permalink raw reply related [flat|nested] 2+ messages in thread
* Re: [PATCH v2] net/tcp: Account for connection teardown handshake
2019-09-20 9:49 [PATCH v2] net/tcp: Account for connection teardown handshake Sebastian Smolorz
@ 2019-09-20 13:54 ` Jan Kiszka
0 siblings, 0 replies; 2+ messages in thread
From: Jan Kiszka @ 2019-09-20 13:54 UTC (permalink / raw)
To: Sebastian Smolorz; +Cc: xenomai
On 20.09.19 11:49, Sebastian Smolorz wrote:
> When closing a TCP connection a handshake procedure is executed between the
> peers. The close routine of the rttcp driver did not participate in
> detecting the end of this handshake but rather waited one second inside
> a close call unconditionally. Especially when peers are directly connected
> this is a waste of time which can hurt a lot in some situations.
>
> This patch replaces the msleep(1000) call with waiting for a completion.
> The maximum waiting time now can be configured via a module parameter.
> The completion is done when the termination handshake has finished.
>
> Signed-off-by: Sebastian Smolorz <sebastian.smolorz@gmx.de>
> ---
> kernel/drivers/net/stack/ipv4/tcp/tcp.c | 38 ++++++++++++++++++++++---
> 1 file changed, 34 insertions(+), 4 deletions(-)
>
> diff --git a/kernel/drivers/net/stack/ipv4/tcp/tcp.c b/kernel/drivers/net/stack/ipv4/tcp/tcp.c
> index 54bafa80f..b8263e5d2 100644
> --- a/kernel/drivers/net/stack/ipv4/tcp/tcp.c
> +++ b/kernel/drivers/net/stack/ipv4/tcp/tcp.c
> @@ -25,6 +25,7 @@
> #include <linux/err.h>
> #include <linux/module.h>
> #include <linux/delay.h>
> +#include <linux/completion.h>
> #include <net/tcp_states.h>
> #include <net/tcp.h>
>
> @@ -41,6 +42,11 @@
> #include <ipv4/af_inet.h>
> #include "timerwheel.h"
>
> +static unsigned int close_timeout = 1000;
> +module_param(close_timeout, uint, 0664);
> +MODULE_PARM_DESC(close_timeout,
> + "max time (ms) to wait during close for FIN-ACK handshake to complete, default 1000");
> +
> #ifdef CONFIG_XENO_DRIVERS_NET_RTIPV4_TCP_ERROR_INJECTION
>
> static unsigned int error_rate;
> @@ -147,6 +153,9 @@ struct tcp_socket {
> struct rtskb_queue retransmit_queue;
> struct timerwheel_timer timer;
>
> + struct completion fin_handshake;
> + rtdm_nrtsig_t close_sig;
> +
> #ifdef CONFIG_XENO_DRIVERS_NET_RTIPV4_TCP_ERROR_INJECTION
> unsigned int packet_counter;
> unsigned int error_rate;
> @@ -1042,6 +1051,7 @@ static void rt_tcp_rcv(struct rtskb *skb)
> rt_tcp_send(ts, TCP_FLAG_ACK);
> /* data receiving is not possible anymore */
> rtdm_sem_destroy(&ts->sock.pending_sem);
> + rtdm_nrtsig_pend(&ts->close_sig);
> goto feed;
> } else if (ts->tcp_state == TCP_FIN_WAIT1) {
> /* Send ACK */
> @@ -1105,6 +1115,7 @@ static void rt_tcp_rcv(struct rtskb *skb)
> ts->tcp_state = TCP_CLOSE;
> rtdm_lock_put_irqrestore(&ts->socket_lock, context);
> /* socket destruction will be done on close() */
> + rtdm_nrtsig_pend(&ts->close_sig);
> goto drop;
> } else if (ts->tcp_state == TCP_FIN_WAIT1) {
> ts->tcp_state = TCP_FIN_WAIT2;
> @@ -1119,6 +1130,7 @@ static void rt_tcp_rcv(struct rtskb *skb)
> ts->tcp_state = TCP_TIME_WAIT;
> rtdm_lock_put_irqrestore(&ts->socket_lock, context);
> /* socket destruction will be done on close() */
> + rtdm_nrtsig_pend(&ts->close_sig);
> goto feed;
> }
> }
> @@ -1190,6 +1202,11 @@ static int rt_tcp_window_send(struct tcp_socket *ts, u32 data_len, u8 *data_ptr)
> return ret;
> }
>
> +static void rt_tcp_close_signal_handler(rtdm_nrtsig_t *nrtsig, void *arg)
> +{
> + complete_all((struct completion *)arg);
> +}
> +
> static int rt_tcp_socket_create(struct tcp_socket *ts)
> {
> rtdm_lockctx_t context;
> @@ -1226,6 +1243,10 @@ static int rt_tcp_socket_create(struct tcp_socket *ts)
> timerwheel_init_timer(&ts->timer, rt_tcp_retransmit_handler, ts);
> rtskb_queue_init(&ts->retransmit_queue);
>
> + init_completion(&ts->fin_handshake);
> + rtdm_nrtsig_init(&ts->close_sig, rt_tcp_close_signal_handler,
> + &ts->fin_handshake);
> +
> #ifdef CONFIG_XENO_DRIVERS_NET_RTIPV4_TCP_ERROR_INJECTION
> ts->packet_counter = counter_start;
> ts->error_rate = error_rate;
> @@ -1237,6 +1258,7 @@ static int rt_tcp_socket_create(struct tcp_socket *ts)
> /* enforce maximum number of TCP sockets */
> if (free_ports == 0) {
> rtdm_lock_put_irqrestore(&tcp_socket_base_lock, context);
> + rtdm_nrtsig_destroy(&ts->close_sig);
> return -EAGAIN;
> }
> free_ports--;
> @@ -1338,6 +1360,8 @@ static void rt_tcp_socket_destruct(struct tcp_socket *ts)
>
> rtdm_event_destroy(&ts->conn_evt);
>
> + rtdm_nrtsig_destroy(&ts->close_sig);
> +
> /* cleanup already collected fragments */
> rt_ip_frag_invalidate_socket(sock);
>
> @@ -1379,8 +1403,11 @@ static void rt_tcp_close(struct rtdm_fd *fd)
> sizeof(send_cmd), NULL, NULL);
> /* result is ignored */
>
> - /* Give the peer some time to reply to our FIN. */
> - msleep(1000);
> + /* Give the peer some time to reply to our FIN.
> + Since it is not relevant what exactly causes the wait
> + function to return its result is ignored. */
> + wait_for_completion_interruptible_timeout(&ts->fin_handshake,
> + msecs_to_jiffies(close_timeout));
> } else if (ts->tcp_state == TCP_CLOSE_WAIT) {
> /* Send FIN in CLOSE_WAIT */
> send_cmd.ts = ts;
> @@ -1393,8 +1420,11 @@ static void rt_tcp_close(struct rtdm_fd *fd)
> sizeof(send_cmd), NULL, NULL);
> /* result is ignored */
>
> - /* Give the peer some time to reply to our FIN. */
> - msleep(1000);
> + /* Give the peer some time to reply to our FIN.
> + Since it is not relevant what exactly causes the wait
> + function to return its result is ignored. */
> + wait_for_completion_interruptible_timeout(&ts->fin_handshake,
> + msecs_to_jiffies(close_timeout));
> } else {
> /*
> rt_tcp_socket_validate() has not been called at all,
> --
> 2.20.1
>
Thanks, applied.
Jan
--
Siemens AG, Corporate Technology, CT RDA IOT SES-DE
Corporate Competence Center Embedded Linux
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2019-09-20 13:54 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-09-20 9:49 [PATCH v2] net/tcp: Account for connection teardown handshake Sebastian Smolorz
2019-09-20 13:54 ` Jan Kiszka
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.