From: "dust.li" <firstname.lastname@example.org>
To: Karsten Graul <email@example.com>,
Tony Lu <firstname.lastname@example.org>,
Stefan Raspl <email@example.com>
Cc: "D. Wythe" <firstname.lastname@example.org>,
email@example.com, firstname.lastname@example.org, email@example.com,
Subject: Re: [PATCH net-next v2] net/smc: Reduce overflow of smc clcsock listen queue
Date: Wed, 16 Feb 2022 19:46:18 +0800 [thread overview]
Message-ID: <20220216114618.GA39286@linux.alibaba.com> (raw)
On Thu, Jan 13, 2022 at 09:07:51AM +0100, Karsten Graul wrote:
>>> One comment to sysctl: our current approach is to add new switches to the existing
>>> netlink interface which can be used with the smc-tools package (or own implementations of course).
>>> Is this prereq problematic in your environment?
>>> We tried to avoid more sysctls and the netlink interface keeps use more flexible.
>> I agree with you about using netlink is more flexible. There are
>> something different in our environment to use netlink to control the
>> behaves of smc.
>> Compared with netlink, sysctl is:
>> - easy to use on clusters. Applications who want to use smc, don't need
>> to deploy additional tools or developing another netlink logic,
>> especially for thousands of machines or containers. With smc forward,
>> we should make sure the package or logic is compatible with current
>> kernel, but sysctl's API compatible is easy to discover.
>> - config template and default maintain. We are using /etc/sysctl.conf to
>> make sure the systeml configures update to date, such as pre-tuned smc
>> config parameters. So that we can change this default values on boot,
>> and generate lots of machines base on this machine template. Userspace
>> netlink tools doesn't suit for it, for example ip related config, we
>> need additional NetworkManager or netctl to do this.
>> - TCP-like sysctl entries. TCP provides lots of sysctl to configure
>> itself, somethings it is hard to use and understand. However, it is
>> accepted by most of users and system. Maybe we could use sysctl for
>> the item that frequently and easy to change, netlink for the complex
>> We are gold to contribute to smc-tools. Use netlink and sysctl both
>> time, I think, is a more suitable choice.
>Lets decide that when you have a specific control that you want to implement.
>I want to have a very good to introduce another interface into the SMC module,
>making the code more complex and all of that. The decision for the netlink interface
>was also done because we have the impression that this is the NEW way to go, and
>since we had no interface before we started with the most modern way to implement it.
>TCP et al have a history with sysfs, so thats why it is still there.
>But I might be wrong on that...
Sorry to bother on this topic again...
When implementing SMC autocork, I'd like to add a switch to enable or
disable SMC autocork just like what TCP does. But I encounter some
problem which I think might be relevant to this topic.
My requirements for the switch is like this:
1. Can be set dynamically by an userspace tool
2. Need to be namespacified so different containers can have their own
3. Should be able to be configured to some default values using a
configuration file so every time a container started, those values can
be set properly.
I notice we have a patch recently("net/smc: Add global configure for
handshake limitation by netlink") which did something similar. And I
tried the same way but found it might not be very elegant:
1. I need to copy most of the code(enable/disable/dump) for autocork
which is quite redundant. Maybe we should add some common wrappers ?
2. I need to add a new enumeration, and what if years later, we found
this function is no longer need ? Deleting this may cause ABI
3. Finally, How can we implement requirement #3 ? It is really needed
in the K8S container environment.
Any suggestions or comments are really welcomed.
next prev parent reply other threads:[~2022-02-16 11:46 UTC|newest]
Thread overview: 18+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-01-04 13:12 [PATCH net-next v2] net/smc: Reduce overflow of smc clcsock listen queue D. Wythe
2022-01-04 13:45 ` Karsten Graul
2022-01-04 16:17 ` D. Wythe
2022-01-05 4:40 ` D. Wythe
2022-01-05 8:28 ` Tony Lu
2022-01-05 8:57 ` dust.li
2022-01-05 13:17 ` Karsten Graul
2022-01-05 15:06 ` D. Wythe
2022-01-05 19:13 ` Karsten Graul
2022-01-06 7:05 ` Tony Lu
2022-01-13 8:07 ` Karsten Graul
2022-01-13 18:50 ` Jakub Kicinski
2022-01-20 13:39 ` Tony Lu
2022-01-20 16:00 ` Stefan Raspl
2022-01-21 2:47 ` Tony Lu
2022-02-16 11:46 ` dust.li [this message]
2022-01-06 3:51 ` D. Wythe
2022-01-06 9:54 ` Karsten Graul
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.