Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp7749216rwb; Tue, 6 Dec 2022 09:21:20 -0800 (PST) X-Google-Smtp-Source: AA0mqf5gypKmVwe8sMza0X2WAUJzPXWzoWCAu5oD6Uezv8pc0basfupYBdH8cTvRvVOLi/GyXaoS X-Received: by 2002:a17:906:6d8a:b0:7ad:69eb:923b with SMTP id h10-20020a1709066d8a00b007ad69eb923bmr11886043ejt.19.1670347280026; Tue, 06 Dec 2022 09:21:20 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1670347280; cv=none; d=google.com; s=arc-20160816; b=T5RFw9Qkk3mSp+PDFoC6ppPjNMG0k/xI5fM/ULIv1B/EOguLEcI7nLbHJGNYE8E65B PqvQkmxfGbZs6WWHTS0P4VXxN4hB0qiajw9VkJy1jgzilxlZL7GWTMzPtzphjUIl+gMn X9BxvJn1oUt6TPUzaSyoL5kQAxVAw48PgAEa5xACvY7Vh+eRf5spm1/twJpqyV/kJ38S DuJ8vkiqqUAcBtQuZVrF84grzXcuy5Av6Jl9bbLzrU9CmrVkbwvAZHszORy0DFwGFJoe xxkxyPmF0cai4ZAr/HgCAEbjom5U+8cbWyEUhFisZH4Xh2zK2AWbHBrcATpUuGXQ7H0f z8Hw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=Mpgdy3G74uO3nFA21E/WFus/82OZ7wK/myKcnGyslGk=; b=B4I96sRy7CKHCgMQdCa5paSgl9EBnQa+i+OKFHeN++S/T0budLbtKzIMtHtynzRU+8 8fq/ychr3tQUKeyEpEegq9cIOp/LoDR8JobU7M0j1obfvys0714gAR0b5YWwmcVjIBTV PjCjKx3J5iOXdgxee4PyIZMMVgeCKn2KL13P+BMaNOAfv4VF4lQUmyypsjwBi5scHDij qfITI0yiG3lO8+fPvRgy+c7WqHiWzPfnC5SXKYXMN+xhbTub8+2u0OkkLDykmdmfxDpV lh5bFsY4RJsvKsc2uHGR1/2N5gD/Ea67yAcjtXOfpMjkI6xE/cXcE8uUY5uqpd1eIm6W P4YA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id w10-20020a056402268a00b0046ab9b37cf2si2726456edd.116.2022.12.06.09.21.01; Tue, 06 Dec 2022 09:21:20 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235470AbiLFQRr (ORCPT + 78 others); Tue, 6 Dec 2022 11:17:47 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60492 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235656AbiLFQRO (ORCPT ); Tue, 6 Dec 2022 11:17:14 -0500 Received: from us-smtp-delivery-44.mimecast.com (us-smtp-delivery-44.mimecast.com [205.139.111.44]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7B7EE3056B for ; Tue, 6 Dec 2022 08:13:02 -0800 (PST) Received: from mimecast-mx02.redhat.com (mx3-rdu2.redhat.com [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-297-lcRVJWkiNiqOitCyiKt17A-1; Tue, 06 Dec 2022 11:11:37 -0500 X-MC-Unique: lcRVJWkiNiqOitCyiKt17A-1 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.rdu2.redhat.com [10.11.54.3]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 1A48E1C008B0; Tue, 6 Dec 2022 16:11:37 +0000 (UTC) Received: from hog (unknown [10.39.192.162]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 6E3C71121315; Tue, 6 Dec 2022 16:11:34 +0000 (UTC) Date: Tue, 6 Dec 2022 17:10:32 +0100 From: Sabrina Dubroca To: Jiri Pirko Cc: Emeel Hakim , "linux-kernel@vger.kernel.org" , Raed Salem , "davem@davemloft.net" , "edumazet@google.com" , "kuba@kernel.org" , "pabeni@redhat.com" , "netdev@vger.kernel.org" Subject: Re: [PATCH net-next v2] macsec: Add support for IFLA_MACSEC_OFFLOAD in the netlink layer Message-ID: References: <20221206085757.5816-1-ehakim@nvidia.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: X-Scanned-By: MIMEDefang 3.1 on 10.11.54.3 X-Spam-Status: No, score=-2.6 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_LOW, SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 2022-12-06, 14:35:23 +0100, Jiri Pirko wrote: > Tue, Dec 06, 2022 at 01:31:54PM CET, ehakim@nvidia.com wrote: > >> Tue, Dec 06, 2022 at 09:57:57AM CET, ehakim@nvidia.com wrote: > >> >From: Emeel Hakim > >> > > >> >This adds support for configuring Macsec offload through the > >> > >> Tell the codebase what to do. Be imperative in your patch descriptions so it is clear > >> what are the intensions of the patch. > > > >Ack > > > >> > >> > >> >netlink layer by: > >> >- Considering IFLA_MACSEC_OFFLOAD in macsec_fill_info. > >> >- Handling IFLA_MACSEC_OFFLOAD in macsec_changelink. > >> >- Adding IFLA_MACSEC_OFFLOAD to the netlink policy. > >> >- Adjusting macsec_get_size. > >> > >> 4 patches then? > > > >Ack, I will change the commit message to be imperative and will replace the list with a good description. > >I still believe it should be a one patch since splitting this could break a bisect process. > > Well, when you split, you have to make sure you don't break bisection, > always. Please try to figure that out. I think this can be split pretty nicely into 3 patches: - add IFLA_MACSEC_OFFLOAD to macsec_rtnl_policy (probably for net with a Fixes tag on the commit that introduced IFLA_MACSEC_OFFLOAD) - add offload to macsec_fill_info/macsec_get_size - add IFLA_MACSEC_OFFLOAD support to changelink The subject of the last patch should also make it clear that it's only adding IFLA_MACSEC_OFFLOAD to changelink. As it's written, someone could assume there's no support at all via rtnl ops and wonder why this patch isn't doing anything to newlink, and whether/why this IFLA_MACSEC_OFFLOAD already exists. -- Sabrina