-
Notifications
You must be signed in to change notification settings - Fork 103
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Kernel waring on t_stress.test_stress.TestCtrlFrameFloodSettingsFlood.test #2267
Comments
EvgeniiMekhanik
added a commit
that referenced
this issue
Oct 29, 2024
Connection can be dropped by calling `ss_conn_drop_guard_exit` from several places: - from `tcp_done, when socket is already DEAD - from `__sk_close_locked` if all data is already sent - from `ss_linkerror` In all places socket write queue is already empty, except one place, when we call `ss_linkerror` for already shutdowned connection. In this case we should close socket using TCP RST, because we can't send any more data after connection will be dropped, moreover sequence numbers of skbs in socket write queue is not correct (they should be corrected during tls encryption, but appropriate function will never called for already dropped connection). Part of #2267
EvgeniiMekhanik
added a commit
that referenced
this issue
Oct 29, 2024
Connection can be dropped by calling `ss_conn_drop_guard_exit` from several places: - from `tcp_done, when socket is already DEAD - from `__sk_close_locked` if all data is already sent - from `ss_linkerror` In all places socket write queue is already empty, except one place, when we call `ss_linkerror` for already shutdowned connection. In this case we should close socket using TCP RST, because we can't send any more data after connection will be dropped, moreover sequence numbers of skbs in socket write queue is not correct (they should be corrected during tls encryption, but appropriate function will never called for already dropped connection). Part of #2267
EvgeniiMekhanik
added a commit
that referenced
this issue
Oct 30, 2024
Connection can be dropped by calling `ss_conn_drop_guard_exit` from several places: - from `tcp_done, when socket is already DEAD - from `__sk_close_locked` if all data is already sent - from `ss_linkerror` In all places socket write queue is already empty, except one place, when we call `ss_linkerror` for already shutdowned connection. In this case we should close socket using TCP RST, because we can't send any more data after connection will be dropped, moreover sequence numbers of skbs in socket write queue is not correct (they should be corrected during tls encryption, but appropriate function will never called for already dropped connection). Part of #2267
EvgeniiMekhanik
added a commit
that referenced
this issue
Oct 30, 2024
Connection can be dropped by calling `ss_conn_drop_guard_exit` from several places: - from `tcp_done, when socket is already DEAD - from `__sk_close_locked` if all data is already sent - from `ss_linkerror` In all places socket write queue is already empty, except one place, when we call `ss_linkerror` for already shutdowned connection. In this case we should close socket using TCP RST, because we can't send any more data after connection will be dropped, moreover sequence numbers of skbs in socket write queue is not correct (they should be corrected during tls encryption, but appropriate function will never called for already dropped connection). Part of #2267
EvgeniiMekhanik
added a commit
that referenced
this issue
Nov 8, 2024
Connection can be dropped by calling `ss_conn_drop_guard_exit` from several places: - from `tcp_done, when socket is already DEAD - from `__sk_close_locked` if all data is already sent - from `ss_linkerror` In all places socket write queue is already empty, except one place, when we call `ss_linkerror` for already shutdowned connection. In this case we should close socket using TCP RST, because we can't send any more data after connection will be dropped, moreover sequence numbers of skbs in socket write queue is not correct (they should be corrected during tls encryption, but appropriate function will never called for already dropped connection). Part of #2267
EvgeniiMekhanik
added a commit
that referenced
this issue
Nov 11, 2024
Connection can be dropped by calling `ss_conn_drop_guard_exit` from several places: - from `tcp_done, when socket is already DEAD - from `__sk_close_locked` if all data is already sent - from `ss_linkerror` In all places socket write queue is already empty, except one place, when we call `ss_linkerror` for already shutdowned connection. In this case we should close socket using TCP RST, because we can't send any more data after connection will be dropped, moreover sequence numbers of skbs in socket write queue is not correct (they should be corrected during tls encryption, but appropriate function will never called for already dropped connection). Part of #2267
EvgeniiMekhanik
added a commit
that referenced
this issue
Nov 13, 2024
Connection can be dropped by calling `ss_conn_drop_guard_exit` from several places: - from `tcp_done, when socket is already DEAD - from `__sk_close_locked` if all data is already sent - from `ss_linkerror` In all places socket write queue is already empty, except one place, when we call `ss_linkerror` for already shutdowned connection. In this case we should close socket using TCP RST, because we can't send any more data after connection will be dropped, moreover sequence numbers of skbs in socket write queue is not correct (they should be corrected during tls encryption, but appropriate function will never called for already dropped connection). Part of #2267
EvgeniiMekhanik
added a commit
that referenced
this issue
Nov 13, 2024
Connection can be dropped by calling `ss_conn_drop_guard_exit` from several places: - from `tcp_done, when socket is already DEAD - from `__sk_close_locked` if all data is already sent - from `ss_linkerror` In all places socket write queue is already empty, except one place, when we call `ss_linkerror` for already shutdowned connection. In this case we should close socket using TCP RST, because we can't send any more data after connection will be dropped, moreover sequence numbers of skbs in socket write queue is not correct (they should be corrected during tls encryption, but appropriate function will never called for already dropped connection). Part of #2267
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Describe the issue
Kernel warning occurs on t_stress.test_stress.TestCtrlFrameFloodSettingsFlood.test on remote CI
Also all TestCtrlFrameFlood tests doesn't pass on remote CI
Expected Behavior
Tests passed
To Reproduce
run t_stress.test_stress.TestCtrlFrameFloodSettingsFlood.test on remote CI
Version or commit hash
Tempesta FW 717cbd0 (current master also)
tempesta-test 9a4a485344767239f82bb9fb7b2e10b2d1e96648 (current master also)
Stacktrace or debug log
The text was updated successfully, but these errors were encountered: