From mboxrd@z Thu Jan 1 00:00:00 1970 From: Or Gerlitz Subject: Trust model for raw QPs Date: Wed, 15 Aug 2012 16:28:38 +0300 Message-ID: <502BA406.2060409@mellanox.com> Mime-Version: 1.0 Content-Type: text/plain; charset="ISO-8859-1"; format=flowed Content-Transfer-Encoding: 7bit Return-path: Sender: linux-rdma-owner-u79uwXL29TY76Z2rM5mHXA@public.gmane.org To: Roland Dreier , Steve Wise Cc: linux-rdma-u79uwXL29TY76Z2rM5mHXA@public.gmane.org, Christoph Lameter , Tzahi Oved List-Id: linux-rdma@vger.kernel.org Currently, for an app to open a raw QP from user space, we (verbs) require admin permission, for which we (Mellanox) got customer feedback saying this is problematic on some of the environments. Suppose we allow to user to provide source mac+vlan when creating the QP or when modifying its state, and the HW can enforce that -- in that case I think its OK to remove that restriction e.g ala what is allowed today with user space UD QPs when the fabric is IB. Or. -- To unsubscribe from this list: send the line "unsubscribe linux-rdma" in the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org More majordomo info at http://vger.kernel.org/majordomo-info.html