[ https://issues.apache.org/jira/browse/FLINK-18695?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17185011#comment-17185011 ]
Chesnay Schepler commented on FLINK-18695: ------------------------------------------ It would be good to do another test with option 1) and 3). I'd throw out 2) because we don't want to start balancing the netty memory usage between heap/direct arenas. Option 1) should behave exactly like the current code; so if this works without side-effects it would consider it the safest option. Option 3) should just be a better version of 1) _right now_. It shouldn't really increase GC pressure; we create a new ByteBuf in any case (as does the current code), and we know the JDK SSL engine already does a memory copy anyway if it is given direct memory. But [~zjwang] made a good point in that we don't know what else might be allocating heap buffers in the future, and this seems difficult to guard against > Allow NettyBufferPool to allocate heap buffers > ---------------------------------------------- > > Key: FLINK-18695 > URL: https://issues.apache.org/jira/browse/FLINK-18695 > Project: Flink > Issue Type: Improvement > Components: Runtime / Network > Reporter: Chesnay Schepler > Assignee: Yun Gao > Priority: Major > Fix For: 1.12.0 > > > in 4.1.43 netty made a change to their SslHandler to always use heap buffers > for JDK SSLEngine implementations, to avoid an additional memory copy. > However, our {{NettyBufferPool}} forbids heap buffer allocations. > We will either have to allow heap buffer allocations, or create a custom > SslHandler implementation that does not use heap buffers (although this seems > ill-adviced?). > /cc [~sewen] [~uce] [~NicoK] [~zjwang] [~pnowojski] -- This message was sent by Atlassian Jira (v8.3.4#803005)