I do a ipvs connection sync test in a 3.10 version kernel which has the
7c13f97ffde6 commit which succeed. I will modify the fixes information of the
patch and replace the skb_queue_empty with skb_queue_empty_lockless.
Thanks.
-----邮件原件-----
发件人: Julian Anastasov [mailto:ja@xxxxxx]
发送时间: Thursday, July 16, 2020 1:36
收件人: Guodeqing (A) <geffrey.guo@xxxxxxxxxx>
抄送: wensong@xxxxxxxxxxxx; horms@xxxxxxxxxxxx; pablo@xxxxxxxxxxxxx;
kadlec@xxxxxxxxxxxxx; fw@xxxxxxxxx; davem@xxxxxxxxxxxxx; kuba@xxxxxxxxxx;
netdev@xxxxxxxxxxxxxxx; lvs-devel@xxxxxxxxxxxxxxx;
netfilter-devel@xxxxxxxxxxxxxxx
主题: Re: [PATCH] ipvs: fix the connection sync failed in some cases
Hello,
On Wed, 15 Jul 2020, guodeqing wrote:
> The sync_thread_backup only checks sk_receive_queue is empty or not,
> there is a situation which cannot sync the connection entries when
> sk_receive_queue is empty and sk_rmem_alloc is larger than sk_rcvbuf,
> the sync packets are dropped in __udp_enqueue_schedule_skb, this is
> because the packets in reader_queue is not read, so the rmem is not
> reclaimed.
Good catch. We missed this change in UDP...
> Here I add the check of whether the reader_queue of the udp sock is
> empty or not to solve this problem.
>
> Fixes: 7c13f97ffde6 ("udp: do fwd memory scheduling on dequeue")
Why this commit and not 2276f58ac589 which adds reader_queue to
udp_poll() ? May be both?
> Reported-by: zhouxudong <zhouxudong8@xxxxxxxxxx>
> Signed-off-by: guodeqing <geffrey.guo@xxxxxxxxxx>
> ---
> net/netfilter/ipvs/ip_vs_sync.c | 12 ++++++++----
> 1 file changed, 8 insertions(+), 4 deletions(-)
>
> diff --git a/net/netfilter/ipvs/ip_vs_sync.c
> b/net/netfilter/ipvs/ip_vs_sync.c index 605e0f6..abe8d63 100644
> --- a/net/netfilter/ipvs/ip_vs_sync.c
> +++ b/net/netfilter/ipvs/ip_vs_sync.c
> @@ -1717,6 +1717,8 @@ static int sync_thread_backup(void *data) {
> struct ip_vs_sync_thread_data *tinfo = data;
> struct netns_ipvs *ipvs = tinfo->ipvs;
> + struct sock *sk = tinfo->sock->sk;
> + struct udp_sock *up = udp_sk(sk);
> int len;
>
> pr_info("sync thread started: state = BACKUP, mcast_ifn = %s, "
> @@ -1724,12 +1726,14 @@ static int sync_thread_backup(void *data)
> ipvs->bcfg.mcast_ifn, ipvs->bcfg.syncid, tinfo->id);
>
> while (!kthread_should_stop()) {
> - wait_event_interruptible(*sk_sleep(tinfo->sock->sk),
> - !skb_queue_empty(&tinfo->sock->sk->sk_receive_queue)
> - || kthread_should_stop());
> + wait_event_interruptible(*sk_sleep(sk),
> +
> !skb_queue_empty(&sk->sk_receive_queue) ||
> + !skb_queue_empty(&up->reader_queue) ||
May be we should use skb_queue_empty_lockless for 5.4+ and
skb_queue_empty() for backports to 4.14 and 4.19...
> + kthread_should_stop());
>
> /* do we have data now? */
> - while (!skb_queue_empty(&(tinfo->sock->sk->sk_receive_queue))) {
> + while (!skb_queue_empty(&sk->sk_receive_queue) ||
> + !skb_queue_empty(&up->reader_queue)) {
Here too
> len = ip_vs_receive(tinfo->sock, tinfo->buf,
> ipvs->bcfg.sync_maxlen);
> if (len <= 0) {
> --
> 2.7.4
Regards
--
Julian Anastasov <ja@xxxxxx>
|