[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1267151683.16986.1646.camel@debian>
Date: Fri, 26 Feb 2010 10:34:43 +0800
From: Zhu Yi <yi.zhu@...el.com>
To: Eric Dumazet <eric.dumazet@...il.com>
Cc: "netdev@...r.kernel.org" <netdev@...r.kernel.org>,
"Shi, Alex" <alex.shi@...el.com>
Subject: Re: [RFC PATCH] accounting for socket backlog
On Thu, 2010-02-25 at 19:24 +0800, Eric Dumazet wrote:
> > @@ -253,6 +253,7 @@ struct sock {
> > struct {
> > struct sk_buff *head;
> > struct sk_buff *tail;
> > + atomic_t len;
>
> This adds a hole on 32bit arches.
>
> I am pretty sure we dont need an atomic here, since we must own a lock
> before manipulating sk_backlog{head,tail,len}.
Good point. bh_lock_sock is always held for backlog operations.
> UDP/IPV6 should be addressed too in your patch.
Will do, this is only a RFC anyway.
> Other questions raised by your discovery :
> - What about other protocols that also use a backlog ?
I don't think protocols with flow/congestion control capability have
such issue. We have tested TCP is immune. Other current backlog users
are dccp, sctp, tipc, x.25 and llc. We didn't test all of them. But
looks like only llc here is possible but unlikely?
> - __release_sock() could run forever with no preemption, even with a
> limit on backlog.
Yes, but there is no critical impact like memory exhausted for this
case.
Thanks,
-yi
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists