lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 28 Apr 2010 15:32:47 +0200 From: Arnd Bergmann <arnd@...db.de> To: Scott Feldman <scofeldm@...co.com> Cc: davem@...emloft.net, netdev@...r.kernel.org, chrisw@...hat.com Subject: Re: [net-next-2.6 PATCH 2/2] add ndo_set_port_profile op support for enic dynamic vnics On Wednesday 28 April 2010, Scott Feldman wrote: > +static int enic_set_port_profile(struct net_device *netdev, > + struct ifla_port_profile *ipp) > +{ > + struct enic *enic = netdev_priv(netdev); > + struct vic_provinfo *vp; > + u8 oui[3] = VIC_PROVINFO_CISCO_OUI; > + u8 *mac = ipp->mac; > + int err; > + > + memset(&enic->port_profile, 0, sizeof(enic->port_profile)); > + > + if (!enic_is_dynamic(enic)) > + return -EOPNOTSUPP; Not sure I understand how this fits together. You said in an earlier mail: > > Anything that ties port profiles to VFs seems fundamentally flawed AFAICT, > > at least when we want to extend this to adapters that don't do it in firmware. > > Ya, I tend I agree. Let's just make port-profile a setting of any netdev, > an eth, macvtap, eth.x, bond, etc. That's probably what I should have done > in the first place. Something like: I thought you had meant that we can do the association of attached interfaces through any interface, rather than tying it to the slave interface. While I'm not sure I read your code correctly, it seems like you now only talk to the slave interface, not to the master at all! At least the check above should be 'if (enic_is_dynamic(enic)) return -EOPNOTSUPP', not the other way round. Moreover, if the netdev is the master here, you only allow a single slave, which is not enough for larger setups (n > 1), though that could be a limitation of your first version. Passing just the slave device however would not work in the general case, as I tried to point out in the mail you replied to. If the slave interface is owned by a guest using PCI passthrough, or it sits below a stack of nested interfaces (vlan, bridge, tap, vhost, ...), it's impossible to know what interface is responsible for setting up the slave. Note that you cannot perform the association through the slave interface itself because the remote switch would discard any traffic originating from an unassociated interface. > +static int enic_get_port_profile(struct net_device *netdev, > + struct ifla_port_profile *ipp) > +{ > + struct enic *enic = netdev_priv(netdev); > + int done, err, error; > + > + enic->port_profile.status = IFLA_PORT_PROFILE_STATUS_UNKNOWN; > + > + spin_lock(&enic->devcmd_lock); > + err = vnic_dev_init_done(enic->vdev, &done, &error); > + spin_unlock(&enic->devcmd_lock); > + > + if (err || error) > + enic->port_profile.status = IFLA_PORT_PROFILE_STATUS_ERROR; > + > + if (!done) > + enic->port_profile.status = IFLA_PORT_PROFILE_STATUS_INPROGRESS; > + > + if (!error) > + enic->port_profile.status = IFLA_PORT_PROFILE_STATUS_SUCCESS; > + > + memcpy(ipp, &enic->port_profile, sizeof(enic->port_profile)); > + > + return 0; > +} > + Similarly, this interface only passes back a single port profile association, where it should have a way to return all of the slave ports. Arnd -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists