I see CI keeps failing for my patch despite rebase... I have run the tests
that are failing locally with my patch applied (test_map, test_flowprobe,
test_memif) and they do pass there. So indeed must be something related to
the test environment

On Tue, Mar 16, 2021 at 7:02 PM Florin Coras <fcoras.li...@gmail.com> wrote:

> Hi Ivan,
>
>
> On Mar 16, 2021, at 8:51 AM, Ivan Shvedunov <ivan...@gmail.com> wrote:
>
> Thanks for clearing things up :)
>
>
> Thanks for bringing this up ;-)
>
> Concerning our use case: it's about PFCP protocol [1] that's used in the
> 5G / LTE CUPS setting. High throughput is usually not important there as
> that's a control protocol but sometimes it happens to produce rather large
> UDP packets. We use PFCP in our VPP-based project [2], it's implemented on
> top of the VPP session layer there.
>
>
> Got it and cool!
>
> BTW we've been hitting the hard-coded IP reassembly limit (3 fragments)
> with it too, mind if I post a patch that makes it configurable?
>
>
> CC’ed Klement for his opinion on this.
>
> Cheers,
> Florin
>
>
> [1] https://en.wikipedia.org/wiki/PFCP
> [2] https://github.com/travelping/upg-vpp
>
>
> On Tue, Mar 16, 2021 at 6:19 PM Florin Coras <fcoras.li...@gmail.com>
> wrote:
>
>> Hi Ivan,
>>
>>
>> On Mar 16, 2021, at 6:40 AM, Ivan Shvedunov <ivan...@gmail.com> wrote:
>>
>> Hi Florin,
>>
>> (inline)
>>
>> On Mon, Mar 15, 2021 at 10:27 PM Florin Coras <fcoras.li...@gmail.com>
>> wrote:
>>
>>> On Mar 15, 2021, at 9:08 AM, Ivan Shvedunov <ivan...@gmail.com> wrote:
>>>
>>>   Hello,
>>>
>>>   I've noticed a problem in the VPP session layer and posted a patch to
>>> fix it [1].
>>> Namely, UDP datagrams with length > 1908 that require buffer chaining
>>> get corrupted, because there's a bug in session_tx_fifo_chain_tail() that's
>>> responsible for the buffer chaining (it doesn't account for
>>> SESSION_CONN_HDR_LEN). The bug only affects datagram transports and doesn't
>>> break TCP.
>>>
>>>
>>> Looks good. Thanks! More lower.
>>>
>>
>> There seems to be an issue with CI, but I'm not sure if it's related to
>> the patch in any way.
>>
>>
>> Most probably not. Rebased.
>>
>>
>>
>>>
>>>
>>>   There's another problem with the UDP code: "udp mtu". As far as I
>>> understand, the plan there [2] is to use the MTU of the output interface
>>> for each datagram being sent, and "udp { mtu ... }" setting is only used as
>>> a temporary measure. Yet, it seems to me that what is happening when a
>>> datagram exceeds that MTU value is not exactly correct: instead of
>>> undergoing IP fragmentation as one would expect, the datagrams get split
>>> into multiple UDP datagrams. This is not handled correctly by apps that use
>>> UDP, most of the time, and did cause me some hours spent debugging strange
>>> app behavior. Wouldn't failing to send such datagrams be more correct?
>>>
>>>
>>> The thing to be aware of here is that session layer offers as service
>>> the sending of datagrams written by apps to the network. If the datagrams
>>> are larger than the mtu (mss of sorts actually) configured for udp, session
>>> layer chops the datagrams to mtu size. The network layer can then fragment
>>> the resulting udp datagrams in accordance to the output interface’s mtu.
>>>
>>
>>> It’s not recommended to use this feature because original datagram
>>> borders are lost. Moreover, losses will lead to even more problems. The
>>> option is there for historical reasons so we could consider removing it at
>>> one point, once we’re fully convinced it’s not useful.
>>>
>>
>> Problem is, the UDP fragmentation feature is on by default, with default
>> size limit being 1500 [1]. So, if one ever needs to send UDP datagrams
>> bigger than that they will be split, which may be rather surprising if one
>> is unaware of this UDP splitting feature. Maybe it's worth changing the
>> default value to some large number so that the splitting does not happen
>> unexpectedly?
>>
>>
>> The goal there is to avoid exercising the ip fragmentation code for the
>> reasons you discovered lower, i.e., default max of 3 fragments. Splitting
>> udp datagrams will always lead to some sort of problems because of loss so
>> for now the value used is 1.5k just because it’s the common interface mtu.
>> Those interested in using larger datagrams (8-9kB) will hopefully find this
>> or older threads instead of going through the pain you had to go through!
>>
>>
>>
>>>   Another thing I've noticed is that if UDP MTU is high enough sometimes
>>> the datagrams being sent still somehow are split into smaller IP fragments
>>> than necessary. E.g. I have MTU 9000 on my interfaces and UDP MTU also is
>>> 9000, and 8000-byte UDP datagram is sent in one piece, while the IP packets
>>> carrying 11000-byte UDP datagram are split into ~2kb IP fragments. Any
>>> ideas why this could happen?
>>>
>>>
>>> Hm, have you tried running an iperf3 test like the one part of make test
>>> [1] to see if the issue is still reproducible? Also, I’d avoid sending from
>>> the app dgrams larger than udp’s mtu.
>>>
>>
>> In this case the datagrams were smaller than the "udp mtu" value, but
>> larger than the interface's MTU.
>> Looking at ip_frag code [2], it seems like it just can't create fragments
>> bigger than the buffer size (2048 bytes by default), that is, it can't
>> chain buffers for the fragments it creates, unless I'm somehow mistaken.
>> With IP reassembly limit e.g. in VPP itself being just 3 this may be indeed
>> an issue. E.g. one has MTU of 9000 and expects a packet of length 10000 to
>> be split in 2 and not 5 fragments; these 5 fragments will not be
>> reassembled if received by another VPP's session layer further along the
>> line. But perhaps one is expected to increase buffer size when using higher
>> interface MTU values?
>>
>>
>> I’ve never tried that but fair enough. Klement might be able to shed some
>> light here.
>>
>> Out of curiosity, are you trying to send that large datagrams to improve
>> efficiency/throughput? Going above 8kB, in a sustained fashion and without
>> some form of pacing will probably lead to udp/session layer overwhelming
>> the nic, unless you’re using 100Gbps nics.
>>
>> Regards,
>> Florin
>>
>>
>> [1] https://github.com/FDio/vpp/blob/0ac5782/src/vnet/udp/udp.c#L522
>> [2]
>> https://github.com/FDio/vpp/blob/0ac5782e600097b66e6b06e0b9edc79651f3a4bd/src/vnet/ip/ip_frag.c#L107-L109
>>
>> --
>> Ivan Shvedunov <ivan...@gmail.com>
>> ;; My GPG fingerprint is: 2E61 0748 8E12 BB1A 5AB9  F7D0 613E C0F8 0BC5
>> 2807
>>
>>
>>
>
> --
> Ivan Shvedunov <ivan...@gmail.com>
> ;; My GPG fingerprint is: 2E61 0748 8E12 BB1A 5AB9  F7D0 613E C0F8 0BC5
> 2807
>
>
>

-- 
Ivan Shvedunov <ivan...@gmail.com>
;; My GPG fingerprint is: 2E61 0748 8E12 BB1A 5AB9  F7D0 613E C0F8 0BC5 2807
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#18953): https://lists.fd.io/g/vpp-dev/message/18953
Mute This Topic: https://lists.fd.io/mt/81353121/21656
Group Owner: vpp-dev+ow...@lists.fd.io
Unsubscribe: https://lists.fd.io/g/vpp-dev/unsub [arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to