First we must understand that a TCP socket in the "LISTENING" state has two independent queues:
These two terms are sometimes also called "reqsk_queue", "ACK backlog", "listen backlog", or even "TCP backlog", but we will use the above two terms in this article to avoid confusion. SYN Queue The SYN queue stores the connections that received SYN packets (corresponding to the kernel code structure: struct inet_request_sock). Its responsibility is to reply to SYN+ACK packets and retransmit when no ACK packet is received until the timeout. Under Linux, the number of retransmissions is:
The documentation describes tcp_synack_retries as follows:
After sending SYN+ACK, the SYN queue waits for the ACK packet sent from the client (that is, the last packet of the three-way handshake). When the ACK packet is received, the corresponding SYN queue is first found, and then the relevant data in the corresponding SYN queue is checked to see if it matches. If it matches, the kernel removes the data related to the connection from the SYN queue, creates a complete connection (corresponding to the structure of the kernel code: struct inet_sock), and adds this connection to the Accept queue. Accept Queue The Accept queue stores established connections, that is, connections waiting to be taken away by the upper-layer application. When the process calls accept(), the socket is taken out of the queue and passed to the upper-layer application. This is a simple description of how Linux handles SYN packets. By the way, when the socket has TCP_DEFER_ACCEPT and TCP_FASTOPEN enabled, the working method will be slightly different, which will not be introduced in this article. Queue size limit The application sets the maximum size of the SYN queue and the Accept queue by calling the listen(2) system call and passing in the backlog parameter. For example, the following example sets the maximum size of both the SYN queue and the Accept queue to 1024:
Note that in kernels prior to 4.3, the size of the SYN queue is calculated in another way. The maximum size of the SYN queue was previously configured using net.ipv4.tcp_max_syn_backlog, but this is no longer used. Now net.core.somaxconn is used to represent the maximum size of both the SYN queue and the Accept queue. On our servers, we set it to 16k:
What is the appropriate queue size? After knowing the above information, you may ask, what is the appropriate queue size? The answer is: it depends. For most TCP services, this is not too important. For example, before Go version 1.11, there was no method to set the queue size. However, there are some legitimate reasons to increase the queue size:
However, setting the backlog too large can also have adverse effects:
In Linux, if you want to check the current status of the SYN queue, you can use the ss command to query the socket in the SYN-RECV state. For example, the following execution result indicates that there are currently 119 elements in the SYN queue of port 80 and 78 in the SYN queue of port 443.
You can also observe this data through our SystemTap script:
What if the program doesn't call accept() fast enough? What happens if the program doesn't call accept() fast enough?
When this happens, we can only hope that the program's processing performance will return to normal later and the client will resend the packets that were discarded by the server. This behavior of the kernel is acceptable for most services. By the way, this behavior can be modified by adjusting the global parameter net.ipv4.tcp_abort_on_overflow, but it is best not to change this parameter. You can observe the status of the Accept queue overflow by viewing the count of nstat:
But this is a global count. It is not intuitive to observe. For example, sometimes we observe that it is increasing, but all service programs seem to be normal. In this case, we can use the ss command to observe the Accept queue size of a single listening port:
The Recv-Q column shows the number of sockets in the Accept queue, and the Send-Q column shows the maximum size of the queue. In the above example, we found that there were no sockets that were not accepted by the program, but we still found that the ListenDrops count was increasing. This is because our program is only temporarily stuck and does not process new connections, rather than permanently not processing them. After a while, the program returns to normal. In this case, it is difficult to observe this phenomenon using the ss command, so we wrote a SystemTap script that hooks into the kernel and prints out the discarded SYN packets:
Through the above operations, we can observe which SYN packets are affected by ListenDrops. Thus, we can also know which programs are losing connections. |
<<: Learn about the last of the four types of switch messages in one minute: known unicast
>>: Java Server Model - TCP Connection/Flow Optimization
Megalayer launched a Black Friday flash sale, whi...
Maxthon Hosting is a provider of high-quality ove...
Andrew Ginter, vice president of industry securit...
According to foreign media, NASA has a mission ca...
Justhost opened a new German data center this mon...
[[311931]] This article will explain the followin...
What is the definition of a smart city? The answe...
In the architecture of early 2G and 3G base stati...
Enterprise digital transformation has promoted t...
Do you feel that the current 4G network speed is ...
[[422169]] One day, Xiaolin went to an interview ...
iWebFusion is the iWFHosting that I shared before...
On October 15, the "2021 Financial Cybersecu...
1. Introduce the three-way handshake of TCP conne...