From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail.toke.dk (mail.toke.dk [45.145.95.4]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by lists.bufferbloat.net (Postfix) with ESMTPS id BC0CA3B29E; Fri, 26 Feb 2021 06:47:26 -0500 (EST) From: Toke =?utf-8?Q?H=C3=B8iland-J=C3=B8rgensen?= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=toke.dk; s=20161023; t=1614340045; bh=Qo86fr7vgqHMhscvCVu8bkHABaN568NlWRnDndQA8q8=; h=From:To:Cc:Subject:In-Reply-To:References:Date:From; b=UCmxhvYjOU+N6LOEW2ICQhipzsnNfZY+V5axBS7s7QaW0c2gfDnFnj6A2kJaGkn3Z VXvoi3SVev+DwjqKEcyr3rh6lsMSBPESfW4sfmbLWrUCysvRXkzHIN+fC6aCeKpdwl HboYkwHFBKMgYOxuDqYkEhP0Ak//XaUAslSiAr/hn8j1efTUhXRHT18MbJtdxGTya5 CrT2tLgoa2SHaxiL7NR6MP/IHW9fR4/piNvwz83reNR2Gn64xBLV3v1eKE4arzXc2i SNJYN+/D9qNF8hwdqI7M4PTEl1RzR3BA1guy8BoA9qRW3Zqyek+W2sKrx7x1GGLG2j Y29ac14v4M3mA== To: Nils Andreas Svee , Dave Taht Cc: Toke =?utf-8?Q?H=C3=B8iland-J=C3=B8rgensen?= via Cake , Make-Wifi-fast , cerowrt-devel , bloat , Simon Sundberg Subject: Re: [Bloat] [Cake] Fwd: [Galene] Dave on bufferbloat and jitter at 8pm CET Tuesday 23 In-Reply-To: <86692246-90d3-4b5b-bcb3-5a67a29d67f7@lochnair.net> References: <874ki24ref.wl-jch@irif.fr> <1e41ddf7-cd08-4fec-b31a-3021f8111dc6@www.fastmail.com> <87im6h4u2p.fsf@toke.dk> <369A70AB-3ADF-4211-8A09-E9FB77CEE59D@toke.dk> <90a13934-4ec7-4872-bbf8-c6c0f6304ce3@www.fastmail.com> <87wnuw1luc.fsf@toke.dk> <86692246-90d3-4b5b-bcb3-5a67a29d67f7@lochnair.net> Date: Fri, 26 Feb 2021 12:47:25 +0100 X-Clacks-Overhead: GNU Terry Pratchett Message-ID: <87mtvryrsi.fsf@toke.dk> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-List-Received-Date: Fri, 26 Feb 2021 11:47:26 -0000 Nils Andreas Svee writes: > On 2/25/21 11:30 AM, Toke H=C3=B8iland-J=C3=B8rgensen wrote: > >> Ah, wireguard doesn't have XDP support, so that's likely not going to >> work; and if you run it on the physical interface, even if you didn't >> get driver errors, the tool would just see the encrypted packets which >> is not terribly helpful (it parses TCP timestamps to match >> incoming/outgoing packets and compute the RTT). > > I figured that might be the case. Yes I would've disabled the VPN if I=20 > didn't get driver errors. > I changed the network interface to use an emulated Intel E1000 tonight,=20 > and if I bypass the VPN it works as it should. Right, awesome! >> I guess we should be more flexible about which hooks we support, so it >> can also be used on devices with no XDP support. Adding in Simon, who is >> writing the code; I think he is focused on getting a couple of other >> features done first, but this could go on the TODO list :) > > It's not like I'm in a hurry, and I'd probably need some time to figure=20 > out how to tweak the CAKE parameters correctly with this anyway ;) > > Speaking of, isn't one of the challenges with solutions like these that=20 > it's hard to tell when conditions have improved and allow for more=20 > throughput? At least that's what I remember being the issue when I=20 > tested CAKE's autorate-ingress back in the day. Yeah, there would have to be some kind of probing to discover when the bandwidth goes up (maybe something like what BBR does?). Working out the details of this is still in the future, this is all just loose plans that I'll try to get back to once we have the measurement tool working reasonably well. Input and experiments welcome, of course! -Toke