BPF - Inquiry on Handling Backpressure with sockhash and bpf_msg_redirect_hash

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Maintainers,
 
I have a question regarding the use of sockhash for localhost socket redirection, specifically when using bpf_msg_redirect_hash with the BPF_F_INGRESS flag in the sk_msg program.
 
Since this redirection path bypasses the TCP stack, we’ve observed that backpressure is not applied. Our servers are designed to pause reading from the socket under high load conditions. However, with this redirection mechanism, the client-side socket remains writable, and sendmsg eventually fails with an ENOMEM error.
 
To address this, we experimented with using probes to determine the unread msgs on ingress and once it exceeds a configured threshold, we fall back to routing packets through the TCP stack within the sk_msg program, allowing TCP to apply backpressure.
 
We’re reaching out to seek any insights or alternative approaches that might help us handle this scenario more effectively. Looking forward to your thoughts.
 
Thanks,
Vedhachala Shanmugam,
Nutanix, INC.





[Index of Archives]     [Linux Samsung SoC]     [Linux Rockchip SoC]     [Linux Actions SoC]     [Linux for Synopsys ARC Processors]     [Linux NFS]     [Linux NILFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]


  Powered by Linux