Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S936636AbcJVJgj (ORCPT ); Sat, 22 Oct 2016 05:36:39 -0400 Received: from einhorn.in-berlin.de ([192.109.42.8]:57905 "EHLO einhorn.in-berlin.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S935727AbcJVJgh (ORCPT ); Sat, 22 Oct 2016 05:36:37 -0400 X-Envelope-From: stefanr@s5r6.in-berlin.de Date: Sat, 22 Oct 2016 11:36:07 +0200 From: Stefan Richter To: Jarod Wilson Cc: Sabrina Dubroca , linux-kernel@vger.kernel.org, netdev@vger.kernel.org, Faisal Latif , linux-rdma@vger.kernel.org, Cliff Whickman , Robin Holt , Jes Sorensen , Marek Lindner , Simon Wunderlich , Antonio Quartulli Subject: Re: [PATCH net-next 6/6] net: use core MTU range checking in misc drivers Message-ID: <20161022113607.55832988@kant> In-Reply-To: <20161020031641.GJ18569@redhat.com> References: <20161019023333.15760-1-jarod@redhat.com> <20161019023333.15760-7-jarod@redhat.com> <20161019160546.GC11224@bistromath.localdomain> <20161020003846.64f85f7e@kant> <20161020031641.GJ18569@redhat.com> X-Mailer: Claws Mail 3.13.2 (GTK+ 2.24.31; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2076 Lines: 57 On Oct 19 Jarod Wilson wrote: > On Thu, Oct 20, 2016 at 12:38:46AM +0200, Stefan Richter wrote: > > On Oct 19 Sabrina Dubroca wrote: > > > 2016-10-18, 22:33:33 -0400, Jarod Wilson wrote: > > > [...] > > > > diff --git a/drivers/firewire/net.c b/drivers/firewire/net.c > > > > index 309311b..b5f125c 100644 > > > > --- a/drivers/firewire/net.c > > > > +++ b/drivers/firewire/net.c > > > > @@ -1349,15 +1349,6 @@ static netdev_tx_t fwnet_tx(struct sk_buff *skb, struct net_device *net) > > > > return NETDEV_TX_OK; > > > > } > > > > > > > > -static int fwnet_change_mtu(struct net_device *net, int new_mtu) > > > > -{ > > > > - if (new_mtu < 68) > > > > - return -EINVAL; > > > > - > > > > - net->mtu = new_mtu; > > > > - return 0; > > > > -} > > > > - > > > > > > This doesn't do any upper bound checking. > > > > I need to check more closely, but I think the RFC 2734 encapsulation spec > > and our implementation do not impose a particular upper limit. Though I > > guess it's bad to let userland set arbitrarily large values here. > > In which case, that would suggest using IP_MAX_MTU (65535) here. Probably. I (or somebody) need to check the spec and the code once more. [...] > > > > @@ -1481,6 +1471,8 @@ static int fwnet_probe(struct fw_unit *unit, > > > > max_mtu = (1 << (card->max_receive + 1)) > > > > - sizeof(struct rfc2734_header) - IEEE1394_GASP_HDR_SIZE; > > > > net->mtu = min(1500U, max_mtu); > > > > + net->min_mtu = ETH_MIN_MTU; > > > > + net->max_mtu = net->mtu; > > > > > > But that will now prevent increasing the MTU above the initial value? > > > > Indeed, therefore NAK. > > However, there's an explicit calculation for 'max_mtu' right there that I > glazed right over. It would seem perhaps *that* should be used for > net->max_mtu here, no? No. This 'max_mtu' here is not the absolute maximum. It is only an initial MTU which has the property that link fragmentation is not going to happen (if all other peers will at least as capable as this node). -- Stefan Richter -======----- =-=- =-==- http://arcgraph.de/sr/