Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1422713AbVLONIF (ORCPT ); Thu, 15 Dec 2005 08:08:05 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1422716AbVLONIE (ORCPT ); Thu, 15 Dec 2005 08:08:04 -0500 Received: from pentafluge.infradead.org ([213.146.154.40]:61131 "EHLO pentafluge.infradead.org") by vger.kernel.org with ESMTP id S1422713AbVLONIC (ORCPT ); Thu, 15 Dec 2005 08:08:02 -0500 Subject: Re: [RFC][PATCH 0/3] TCP/IP Critical socket communication mechanism From: Arjan van de Ven To: hadi@cyberus.ca Cc: James Courtier-Dutton , Mitchell Blank Jr , Jesper Juhl , Sridhar Samudrala , linux-kernel@vger.kernel.org, netdev@vger.kernel.org In-Reply-To: <1134651635.5912.108.camel@localhost.localdomain> References: <9a8748490512141216x7e25ca2cucb675f11f0c9d913@mail.gmail.com> <43A08546.8040708@superbug.co.uk> <20051215015456.GC23393@gaz.sfgoth.com> <43A155AE.4050105@superbug.co.uk> <1134647248.16486.37.camel@laptopd505.fenrus.org> <1134651635.5912.108.camel@localhost.localdomain> Content-Type: text/plain Date: Thu, 15 Dec 2005 14:07:50 +0100 Message-Id: <1134652070.16486.44.camel@laptopd505.fenrus.org> Mime-Version: 1.0 X-Mailer: Evolution 2.2.3 (2.2.3-2.fc4) Content-Transfer-Encoding: 7bit X-Spam-Score: -2.8 (--) X-Spam-Report: SpamAssassin version 3.0.4 on pentafluge.infradead.org summary: Content analysis details: (-2.8 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- -2.8 ALL_TRUSTED Did not pass through any untrusted hosts X-SRS-Rewrite: SMTP reverse-path rewritten from by pentafluge.infradead.org See http://www.infradead.org/rpr.html Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1517 Lines: 32 On Thu, 2005-12-15 at 08:00 -0500, jamal wrote: > On Thu, 2005-15-12 at 12:47 +0100, Arjan van de Ven wrote: > > > > > > You are using the wrong hammer to crack your nut. > > > You should instead approach your problem of why the ARP entry gets lost. > > > For example, you could give as critical priority to your TCP session, > > > but that still won't cure your ARP problem. > > > I would suggest that the best way to cure your arp problem, is to > > > increase the time between arp cache refreshes. > > > > or turn it around entirely: all traffic is considered important > > unless... and have a bunch of non-critical sockets (like http requests) > > be marked non-critical. > > The big hole punched by DaveM is that of dependencies: a http tcp > connection is tied to ICMP or the IPSEC example given; so you need a lot > more intelligence than just what your app is knowledgeable about at its > level. yeah well sort of. You're right of course, but that also doesn't mean you can't give hints from the other side. Like "data for this socked is NOT critical important". It gets tricky if you only do it for OOM stuff; because then that one ACK packet could cause a LOT of memory to be freed, and as such can be important for the system even if the socket isn't. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/