Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S968442AbWLEQcV (ORCPT ); Tue, 5 Dec 2006 11:32:21 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S968440AbWLEQcV (ORCPT ); Tue, 5 Dec 2006 11:32:21 -0500 Received: from relay.2ka.mipt.ru ([194.85.82.65]:57203 "EHLO 2ka.mipt.ru" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S968435AbWLEQcU (ORCPT ); Tue, 5 Dec 2006 11:32:20 -0500 Date: Tue, 5 Dec 2006 19:31:33 +0300 From: Evgeniy Polyakov To: Steve Wise Cc: Roland Dreier , netdev@vger.kernel.org, openib-general@openib.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v2 04/13] Connection Manager Message-ID: <20061205163008.GA30211@2ka.mipt.ru> References: <20061202224917.27014.15424.stgit@dell3.ogc.int> <20061202224958.27014.65970.stgit@dell3.ogc.int> <20061204110825.GA26251@2ka.mipt.ru> <20061205050725.GA26033@2ka.mipt.ru> <1165330925.16087.13.camel@stevo-desktop> <20061205151905.GA18275@2ka.mipt.ru> <1165333198.16087.53.camel@stevo-desktop> <20061205155932.GA32380@2ka.mipt.ru> <1165335162.16087.79.camel@stevo-desktop> Mime-Version: 1.0 Content-Type: text/plain; charset=koi8-r Content-Disposition: inline In-Reply-To: <1165335162.16087.79.camel@stevo-desktop> User-Agent: Mutt/1.5.9i X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-1.7.5 (2ka.mipt.ru [0.0.0.0]); Tue, 05 Dec 2006 19:32:01 +0300 (MSK) Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1451 Lines: 28 On Tue, Dec 05, 2006 at 10:12:42AM -0600, Steve Wise (swise@opengridcomputing.com) wrote: > Ah. Data from an offloaded connection cannot leak into the main stack > nor vice-verse. We can take an active RDMA connection establishment as > an example if you want: Once the message is sent to the HW to "setup a > TCP connection from addr/port a.b to addr/port c.d", then packets on > that connection (that 4-tuple) will always be delivered to the RDMA > driver, not the native stack. If the the packet received after the > connection is setup is -not- an MPA reply (in this example), then the > connection is aborted. Once the connection is aborted. So no leaking > can happen. And if there were a dataflow between addr/port a.b to addr/port c.d already, it will either terminated? Considering the following sequence: handlers->t3c_handlers->sched()->work_queue->work_handlers()->for example CPL_PASS_ACCEPT_REQ->pass_accept_req() - it just parses incoming skb and sets port/addr/route and other fields to be used as a base for rdma connection. What if it just a usual network packet from kernelspace or userspace with the same payload as should be sent by remote rdma system? -- Evgeniy Polyakov - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/