[PATCH 2/2] c/r: Add AF_INET support (v3)
john.dykstra1 at gmail.com
Fri Jul 24 13:44:07 PDT 2009
On Tue, 2009-07-07 at 12:26 -0700, Dan Smith wrote:
> 2. I don't do anything to redirect or freeze traffic flowing to or from the
> remote system (to prevent a RST from breaking things). I expect that
> userspace will bring down a veth device or freeze traffic to the remote
> system to handle this case.
Theoretically, you can drop any packet that's in flight (ingress or
egress), because IP doesn't guarantee delivery. TCP is able to recover,
and a UDP or raw-socket application should already be designed to. Of
course, retransmissions will have an impact on application performance
in the migration case, so that's got to be considered in the tradeoff.
Main goal should probably be avoiding anything that shoves either end
Thinking out loud, have you considered draining TCP buffers rather than
including them in the checkpoint? You'd stop ingress traffic, and let
the app run until it had read everything in the socket buffer. On the
egress side, you'd cork the app by telling it that buffers were full,
and then wait until the data already at the socket layer had been
transmitted. Both are somewhat unbounded re time, and probably not
worth it, but maybe there's some variant of this idea that has value.
TCP transmit buffers on 10GE links can be pretty big...
BTW, if you see RSTs, that probably means you've created a protocol
violation due to a buggy restore. Just blocking or dropping packets
shouldn't result in an RST unless it's very long.
More information about the Containers