The kernel mad interface allows a client to view all sent and received MADs. This has proven to be a useful debugging technique when paired with the external kernel module, madeye. However, madeye was never intended to be submitted upstream.
A couple of alternatives have been proposed for making this functionality available in the upstream kernel, using trace events or exporting the snooping interface to user space. This patch series takes the latter approach. In addition to snooping MADs simply for debugging purposes, applications can be constructed to examine and act on MAD traffic. For example, a daemon could snoop SA queries and CM messages as part of providing a path record caching service. It could cached snooped path records and use CM timeouts as an indication that cached data may be stale. Because such services may become crucial to support large clusters, the desire is to add mad snooping capabilities to the stack directly, rather than using a debug interface. These patches compile, but have not been tested. If this approach is acceptable, I will modify libibumad to work with the proposed changes. I will also create a userspace version of madeye as a new ib-diag. Finally, the IB ACM will eventually be updated to monitor CM response timeouts. Signed-off-by: Sean Hefty <sean.he...@intel.com> -- To unsubscribe from this list: send the line "unsubscribe linux-rdma" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html