From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 2727A18AE5 for ; Tue, 22 Aug 2023 15:28:34 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 33BFDC433C7; Tue, 22 Aug 2023 15:28:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1692718114; bh=uij0V2vp0HZMswMEiF44MNNzcqJVPcStsg9AOCzR+VY=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=M699uUWnfwYoY9cKwUDH3mojAKM0hUZS+cxxy83Y1YTfqxGinVZ6Nm/Pe2BBHKexK 2k85ixH+h9+aIh7m/EOMhh/Ff+w0lBILflqpeCctBoKKXvgaC4k6XUi7NIzH3AsVPZ jYejNB9sHIXm5dw0EDMsp+YCWu+XZhcfTSPgs+IxTJfVp5OdhNhS71SMlqUVXeofds nOpLjsRIJ8p5CVoCt8w9IZ+SMmE0jIZK+lKkigW0KNlIrgkmQJTmSNrg74Yh4Qnyb1 90MU9wEOYXZ/X2O4A6zJb0h3OIpv/V+hlWuvrxv4PCR8Nh+uiFOrgvQXfXN1kdrMlm hMrbNOPc7PPOA== Date: Tue, 22 Aug 2023 08:28:33 -0700 From: Jakub Kicinski To: Jiri Pirko Cc: netdev@vger.kernel.org, pabeni@redhat.com, davem@davemloft.net, edumazet@google.com, moshe@nvidia.com, saeedm@nvidia.com, shayd@nvidia.com, leon@kernel.org Subject: Re: [patch net-next 0/4] net/mlx5: expose peer SF devlink instance Message-ID: <20230822082833.1cb68ef7@kernel.org> In-Reply-To: References: <20230815145155.1946926-1-jiri@resnulli.us> <20230817193420.108e9c26@kernel.org> <20230818142007.206eeb13@kernel.org> <20230821131937.7ed01b55@kernel.org> Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit On Tue, 22 Aug 2023 08:36:06 +0200 Jiri Pirko wrote: > >I'm thinking about containers. Since the SF configuration is currently > >completely vendor ad-hoc I'm trying to establish who's supposed to be > >in control of the devlink instance of an SF - orchestrator or the > >workload. We should pick one and force everyone to fall in line. > > I think that both are valid. In the VF case, the workload (VM) owns the > devlink instance and netdev. In the SF case: > 1) It could be the same. You can reload SF into netns, then > the container has them both. That would provide the container > more means (e.g. configuration of rdma,netdev,vdev etc). > 2) Or, your can only put netdev into netns. Okay, can you document that? > Both usecases are valid. But back to my question regarding to this > patchsets. Do you see the need to expose netns for nested port function > devlink instance? Even now, I still don't. It's not a huge deal but what's the problem with adding the netns id? It's probably 50 LoC, trivial stuff.