[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20160617.202641.1821023739498595024.davem@davemloft.net>
Date: Fri, 17 Jun 2016 20:26:41 -0700 (PDT)
From: David Miller <davem@...emloft.net>
To: aduyck@...antis.com
Cc: netdev@...r.kernel.org, intel-wired-lan@...ts.osuosl.org,
hannes@...hat.com, jesse@...nel.org, eugenia@...lanox.com,
jbenc@...hat.com, alexander.duyck@...il.com, saeedm@...lanox.com,
ariel.elior@...gic.com, tom@...bertland.com,
michael.chan@...adcom.com, Dept-GELinuxNICDev@...gic.com
Subject: Re: [net-next PATCH v3 00/17] Future-proof tunnel offload handlers
From: Alexander Duyck <aduyck@...antis.com>
Date: Thu, 16 Jun 2016 12:20:35 -0700
> s patch is meant to address two things. First we are currently using
> the ndo_add/del_vxlan_port calls with VXLAN-GPE tunnels and we cannot
> really support that as it is likely to cause more harm than good since
> VXLAN-GPE can support tunnels without a MAC address on the inner header.
>
> As such we need to add a new offload to advertise this, but in doing so it
> would mean introducing 3 new functions for the driver to request the ports,
> and then for the tunnel to push the changes to add and delete the ports to
> the device. However instead of taking that approach I think it would be
> much better if we just made one common function for fetching the ports, and
> provided a generic means to push the tunnels to the device. So in order to
> make this work this patch set does several things.
...
Series applied, thanks Alexander.
Tom, I've heard your arguments, but I think your fears are unfounded.
Look at what Alexander's patches are actually doing.
First, he's fixing a bug. Hardware that supports VXLAN offloading
doesn't support VXLAN-GPE, yet we were sending such things to the
VXLAN offload paths.
Second, he's eliminating a metric ton of Kconfig garbage, as drivers
had to have all kinds of contrived dependencies to support UDP tunnel
offloads.
Third, he's consolidating several driver NDO methods into just two.
And finally, he added a big comment explaining that new tunnel types
should not be added to the tunnel type list, and those that exist
should only be used for RX.
Therefore, this isn't openning the door for new random offloads, quite
the contrary. Instead, if it making clearer what the existing
facilitites support, and putting an explicit cap on them.
Thanks.
Powered by blists - more mailing lists