[PATCH 1 of 2] QUIC: update stream flow control credit on STREAM_DATA_BLOCKED

Vladimir Homutov vl at nginx.com
Mon Nov 22 08:21:37 UTC 2021


On Wed, Nov 17, 2021 at 11:17:27AM +0300, Roman Arutyunyan wrote:
> On Wed, Nov 17, 2021 at 10:31:01AM +0300, Roman Arutyunyan wrote:
> > # HG changeset patch
> > # User Roman Arutyunyan <arut at nginx.com>
> > # Date 1637133234 -10800
> > #      Wed Nov 17 10:13:54 2021 +0300
> > # Branch quic
> > # Node ID 4e3a7fc0533192f51a01042a1e9dd2b595881420
> > # Parent  4ad8fc79cb33257c928a9098a87324b350576551
> > QUIC: update stream flow control credit on STREAM_DATA_BLOCKED.
> >
> > Previously, after receiving STREAM_DATA_BLOCKED, current flow control limit
> > was sent to client.  Now, if the limit can be updated to the full window size,
> > it is updated and the new value is sent to client, otherwise nothing is sent.
> >
> > The change lets client update flow control credit on demand.  Also, it saves
> > traffic by not sending MAX_STREAM_DATA with the same value twice.
> >
> > diff --git a/src/event/quic/ngx_event_quic_streams.c b/src/event/quic/ngx_event_quic_streams.c
> > --- a/src/event/quic/ngx_event_quic_streams.c
> > +++ b/src/event/quic/ngx_event_quic_streams.c
> > @@ -31,6 +31,7 @@ static size_t ngx_quic_max_stream_flow(n
> >  static void ngx_quic_stream_cleanup_handler(void *data);
> >  static ngx_int_t ngx_quic_control_flow(ngx_connection_t *c, uint64_t last);
> >  static ngx_int_t ngx_quic_update_flow(ngx_connection_t *c, uint64_t last);
> > +static ngx_int_t ngx_quic_update_max_stream_data(ngx_connection_t *c);
> >
> >
> >  ngx_connection_t *
> > @@ -1190,8 +1191,6 @@ ngx_int_t
> >  ngx_quic_handle_stream_data_blocked_frame(ngx_connection_t *c,
> >      ngx_quic_header_t *pkt, ngx_quic_stream_data_blocked_frame_t *f)
> >  {
> > -    uint64_t                limit;
> > -    ngx_quic_frame_t       *frame;
> >      ngx_quic_stream_t      *qs;
> >      ngx_quic_connection_t  *qc;
> >
> > @@ -1217,29 +1216,10 @@ ngx_quic_handle_stream_data_blocked_fram
> >              return NGX_OK;
> >          }
> >
> > -        limit = qs->recv_max_data;
> > -
> > -        if (ngx_quic_init_stream(qs) != NGX_OK) {
> > -            return NGX_ERROR;
> > -        }
> > -
> > -    } else {
> > -        limit = qs->recv_max_data;
> > +        return ngx_quic_init_stream(qs);
> >      }
> >
> > -    frame = ngx_quic_alloc_frame(c);
> > -    if (frame == NULL) {
> > -        return NGX_ERROR;
> > -    }
> > -
> > -    frame->level = pkt->level;
> > -    frame->type = NGX_QUIC_FT_MAX_STREAM_DATA;
> > -    frame->u.max_stream_data.id = f->id;
> > -    frame->u.max_stream_data.limit = limit;
> > -
> > -    ngx_quic_queue_frame(qc, frame);
> > -
> > -    return NGX_OK;
> > +    return ngx_quic_update_max_stream_data(qs->connection);
> >  }
> >
> >
> > @@ -1587,22 +1567,9 @@ ngx_quic_update_flow(ngx_connection_t *c
> >      if (!rev->pending_eof && !rev->error
> >          && qs->recv_max_data <= qs->recv_offset + qs->recv_window / 2)
> >      {
> > -        qs->recv_max_data = qs->recv_offset + qs->recv_window;
> > -
> > -        ngx_log_debug1(NGX_LOG_DEBUG_EVENT, c->log, 0,
> > -                       "quic flow update msd:%uL", qs->recv_max_data);
> > -
> > -        frame = ngx_quic_alloc_frame(pc);
> > -        if (frame == NULL) {
> > +        if (ngx_quic_update_max_stream_data(c) != NGX_OK) {
> >              return NGX_ERROR;
> >          }
> > -
> > -        frame->level = ssl_encryption_application;
> > -        frame->type = NGX_QUIC_FT_MAX_STREAM_DATA;
> > -        frame->u.max_stream_data.id = qs->id;
> > -        frame->u.max_stream_data.limit = qs->recv_max_data;
> > -
> > -        ngx_quic_queue_frame(qc, frame);
> >      }
> >
> >      qc->streams.recv_offset += len;
> > @@ -1632,6 +1599,44 @@ ngx_quic_update_flow(ngx_connection_t *c
> >  }
> >
> >
> > +static ngx_int_t
> > +ngx_quic_update_max_stream_data(ngx_connection_t *c)
> > +{
> > +    uint64_t                recv_max_data;
> > +    ngx_quic_frame_t       *frame;
> > +    ngx_quic_stream_t      *qs;
> > +    ngx_quic_connection_t  *qc;
> > +
> > +    qs = c->quic;
> > +    qc = ngx_quic_get_connection(qs->parent);
> > +
> > +    recv_max_data = qs->recv_offset + qs->recv_window;
> > +
> > +    if (qs->recv_max_data == recv_max_data) {

shouldn't it be >= ? (i.e. we want to avoid sending frame if current
window doesn't extend recv_max_data; could qs->recv_window change ?)

> > +        return NGX_OK;
> > +    }
> > +
> > +    qs->recv_max_data = recv_max_data;
> > +
> > +    ngx_log_debug1(NGX_LOG_DEBUG_EVENT, c->log, 0,
> > +                   "quic flow update msd:%uL", qs->recv_max_data);
> > +
> > +    frame = ngx_quic_alloc_frame(c);
>
> The argument should be "pc":
>
>     frame = ngx_quic_alloc_frame(pc);

also, it need to be declared/initialized, similar to other places

>
> > +    if (frame == NULL) {
> > +        return NGX_ERROR;
> > +    }
> > +
> > +    frame->level = ssl_encryption_application;
> > +    frame->type = NGX_QUIC_FT_MAX_STREAM_DATA;
> > +    frame->u.max_stream_data.id = qs->id;
> > +    frame->u.max_stream_data.limit = qs->recv_max_data;
> > +
> > +    ngx_quic_queue_frame(qc, frame);
> > +
> > +    return NGX_OK;
> > +}
> > +
> > +
> >  ngx_int_t
> >  ngx_quic_handle_read_event(ngx_event_t *rev, ngx_uint_t flags)
> >  {
> > _______________________________________________



More information about the nginx-devel mailing list