The kernel mad interface allows a client to view all
sent and received MADs.  This has proven to be a useful
debugging technique when paired with the external kernel
module, madeye.  However, madeye was never intended to
be submitted upstream.

A couple of alternatives have been proposed for making
this functionality available in the upstream kernel,
using trace events or exporting the snooping interface
to user space.  This patch series takes the latter approach.

In addition to snooping MADs simply for debugging purposes,
applications can be constructed to examine and act on
MAD traffic.  For example, a daemon could snoop SA queries
and CM messages as part of providing a path record caching
service.  It could cached snooped path records and use CM
timeouts as an indication that cached data may be stale.

Because such services may become crucial to support large
clusters, the desire is to add mad snooping capabilities
to the stack directly, rather than using a debug interface.

These patches compile, but have not been tested.  If this
approach is acceptable, I will modify libibumad to work
with the proposed changes.  I will also create a userspace
version of madeye as a new ib-diag.  Finally, the IB ACM
will eventually be updated to monitor CM response timeouts.

Signed-off-by: Sean Hefty <sean.he...@intel.com>
--
To unsubscribe from this list: send the line "unsubscribe linux-rdma" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to