diff options
author | David Gibson <david@gibson.dropbear.id.au> | 2022-11-30 15:13:16 +1100 |
---|---|---|
committer | Stefano Brivio <sbrivio@redhat.com> | 2022-12-06 07:42:03 +0100 |
commit | 34764ea4f35867e600b7ab7015588f38a1678532 (patch) | |
tree | 8eab0b63fe78fe18eb53e57ea5075c556d05414f | |
parent | 2dec914209a68d1bc68e9a6b7f8268fb8c71bbf2 (diff) | |
download | passt-34764ea4f35867e600b7ab7015588f38a1678532.tar passt-34764ea4f35867e600b7ab7015588f38a1678532.tar.gz passt-34764ea4f35867e600b7ab7015588f38a1678532.tar.bz2 passt-34764ea4f35867e600b7ab7015588f38a1678532.tar.lz passt-34764ea4f35867e600b7ab7015588f38a1678532.tar.xz passt-34764ea4f35867e600b7ab7015588f38a1678532.tar.zst passt-34764ea4f35867e600b7ab7015588f38a1678532.zip |
udp: Correct splice forwarding when receiving from multiple sources
udp_sock_handler_splice() reads a whole batch of datagrams at once with
recvmmsg(). It then forwards them all via a single socket on the other
side, based on the source port.
However, it's entirely possible that the datagrams in the set have
different source ports, and thus ought to be forwarded via different
sockets on the destination side. In fact this situation arises with the
iperf -P4 throughput tests in our own test suite. AFAICT we only get away
with this because iperf3 is strictly one way and doesn't send reply packets
which would be misdirected because of the incorrect source ports.
Alter udp_sock_handler_splice() to split the packets it receives into
batches with the same source address and send each batch with a separate
sendmmsg().
For now we only look for already contiguous batches, which means that if
there are multiple active flows interleaved this is likely to degenerate
to batches of size 1. For now this is the simplest way to correct the
behaviour and we can try to optimize later.
Signed-off-by: David Gibson <david@gibson.dropbear.id.au>
Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
-rw-r--r-- | udp.c | 19 |
1 files changed, 14 insertions, 5 deletions
@@ -584,8 +584,8 @@ static void udp_splice_sendfrom(const struct ctx *c, unsigned start, unsigned n, static void udp_sock_handler_splice(const struct ctx *c, union epoll_ref ref, uint32_t events, const struct timespec *now) { - in_port_t src, dst = ref.r.p.udp.udp.port; - int v6 = ref.r.p.udp.udp.v6, n; + in_port_t dst = ref.r.p.udp.udp.port; + int v6 = ref.r.p.udp.udp.v6, n, i, m; struct mmsghdr *mmh_recv; if (!(events & EPOLLIN)) @@ -619,9 +619,18 @@ static void udp_sock_handler_splice(const struct ctx *c, union epoll_ref ref, }); } - src = sa_port(v6, mmh_recv[0].msg_hdr.msg_name); - udp_splice_sendfrom(c, 0, n, src, dst, v6, - ref.r.p.udp.udp.ns, ref.r.p.udp.udp.orig, now); + for (i = 0; i < n; i += m) { + in_port_t src = sa_port(v6, mmh_recv[i].msg_hdr.msg_name); + + for (m = 1; i + m < n; m++) { + void *mname = mmh_recv[i + m].msg_hdr.msg_name; + if (sa_port(v6, mname) != src) + break; + } + + udp_splice_sendfrom(c, i, m, src, dst, v6, ref.r.p.udp.udp.ns, + ref.r.p.udp.udp.orig, now); + } } /** |