Received: by 2002:a05:7412:2a91:b0:fc:a2b0:25d7 with SMTP id u17csp657516rdh; Wed, 14 Feb 2024 07:48:44 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCVSv+GUCTbQbc6k6YdVZhkhA3VFkWc+f73ay9OgGQFzakWssMuVNJbu3lYM3/4T8e6pwCzQioyPmFWgfFLDIAEF2khbx5m8oZAFcQXbnQ== X-Google-Smtp-Source: AGHT+IE34hWUERHlyf7wfEQbkPx0nCpKPCZY8DWvnBJNnM0ICcJ9iCHhhZwSt0bT4vm4h2oXTach X-Received: by 2002:a17:906:5956:b0:a3d:1994:d3b2 with SMTP id g22-20020a170906595600b00a3d1994d3b2mr2014177ejr.74.1707925724096; Wed, 14 Feb 2024 07:48:44 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1707925724; cv=pass; d=google.com; s=arc-20160816; b=UZYGme39NBlp+1GX1jdroabKDO8rGrwGMmnRWkCiRJUb+PiYeQjqiYekVJzeRMhCHJ I1dQm/Xh727o/N76A3JNDE8vpbd3DBlm3F593I/XiOamPhya6abJDiAEkVJADqX2f4pB C3G8jAj55PFtH2Uhqqz7a/lAjHCZ9zHHnidoGo7ywaeZRsY5Q08+tX5WfT6O8oRWMdlO imxz6V4xqKhLgvAMJ+Foi/6b79Q2Yoim4lFFQuSPr4MvhoYrfhRl0vxS2oC4mrvxDKvF RyS00JhJlgzrESeMg3kEw1vxM9u0O0b49aW524Rzr/zdy73ous6CK8fG/D69dy3k22M8 CrKw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :subject:cc:to:from:date:dkim-signature; bh=ctlbi1cJbixYEDcmC3dXCz9etMjoe+VUyyZlv0tFUVY=; fh=vNRqNtZ6DHjWrGGeAEHQzVOKKnyBkAuNXtxpiHH0oSQ=; b=eY+Jax1fprQxmOPoyId+4TL6N0aBJPk4492KXPqVo1I9epBQmA9Sx9GvyH/LnUbb0u KhBceZsI7uPwgI+V3SMvMowEZxGhsZpXrJIU3HbOks/TAd4Y+aM/H6GBdwdyKgtd7eEG efIKY3BM2Qt7tGhhu7aituEPYZIoRsn2JQmbMpELFqvZjh/SfCNUhCdUbB7i+qtO05Fe xqLcDMKeaK7e2HaLP5JJFWQIirJ+rTUuKZggFCrcKg4l9iFpGHDigqx7fEkXDtM9Pye1 HTpEnDB856M/VSArmyaNyHROyQJsskYGmedJ4n3ZnymoD6riasmpMkAdMdizFktqlcJH 34jg==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=bVV9pLFY; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-65453-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-65453-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org X-Forwarded-Encrypted: i=2; AJvYcCVKqO85ZWW3o/0d/KY9mvX4LdTFPj4pW1un/zaQGRVN/vRabYucuyWdApZo7uyr7Kt6MINCQvAEtpnbccSe2ax9IrN2r9LgQivqS7Kwbg== Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [2604:1380:4601:e00::3]) by mx.google.com with ESMTPS id hd15-20020a170907968f00b00a3d5565224esi550999ejc.276.2024.02.14.07.48.44 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 14 Feb 2024 07:48:44 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-65453-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) client-ip=2604:1380:4601:e00::3; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=bVV9pLFY; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-65453-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-65453-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id D5B311F27C4D for ; Wed, 14 Feb 2024 15:48:43 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 306DC5D757; Wed, 14 Feb 2024 15:48:35 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="bVV9pLFY" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 586585D75E; Wed, 14 Feb 2024 15:48:33 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1707925714; cv=none; b=KPp8T6jNZ5mqChFgS1VEjFSWya1ujM5H7mXD80nqGA0nFFSj8tRQvqhnVw53CRqygid63rFX6jHojPl5BCC26fKTIhFPyPmlkvkOfD/ckkJ1RfA1tlqjPfiDE5wPKFgWtFQ+POJeTyil68LIIcD/MZd4sb/fknoYzOy4j8NlXxY= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1707925714; c=relaxed/simple; bh=z3XwdfOdEHfS4GV1GgNNK7GZS40lTdoLjyVB6nLYx3Q=; h=Date:From:To:Cc:Subject:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=je70XZ0Oikvnq/qwEfxzf6lcMgKBUZU8RHeTvDLFFE23GHtaR6Ml1cPxdbjIRXshjg2682hw2s36orFxvT4UMlZe5e1OE7AsMmkykG6fj/s9F4Vr+AF353A76VK/8RbbSHxLo2hQ/iJQYk4akoKk2fuHxRn98tIoCvaBjKNW2Mo= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=bVV9pLFY; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id 2D573C433F1; Wed, 14 Feb 2024 15:48:33 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1707925713; bh=z3XwdfOdEHfS4GV1GgNNK7GZS40lTdoLjyVB6nLYx3Q=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=bVV9pLFYnPUAZlhUY5y0ikLVaG0dOL0NIEnh97b0e4CXBb19J5aXXBTou6slwO4Ey G0d6/tqvDjychPuL7COFamHwBmXGbT3Ui3cPcfOlyIx1ecUwb6eHLKtnm6CtJGKD2V D48uxXaynCRnXZiNQK1RYvGmh2mi8pzxnfdVISf/L7BzGuIDelpelCr5tL3jz5pdf7 4NCBsbhoU97MvP5af5odCdH2lWn10msAPDCmMmG6SM/wCezxkmdmfzhXuk36bqDsT8 T0ihWfTFgyF4JLROqd1uy71GgXZbI/LUWNbvx5JQRiVxV5sywghopHJlIzDoUrDgj+ G9i3Mx3TFDwdw== Date: Wed, 14 Feb 2024 07:48:32 -0800 From: Jakub Kicinski To: Christoph Hellwig Cc: Saeed Mahameed , Arnd Bergmann , Greg Kroah-Hartman , Leon Romanovsky , Jason Gunthorpe , Jiri Pirko , Leonid Bloch , Itay Avraham , Saeed Mahameed , David Ahern , Aron Silverton , andrew.gospodarek@broadcom.com, linux-kernel@vger.kernel.org, netdev@vger.kernel.org Subject: Re: [PATCH V4 0/5] mlx5 ConnectX control misc driver Message-ID: <20240214074832.713ca16a@kernel.org> In-Reply-To: References: <20240207072435.14182-1-saeed@kernel.org> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit On Wed, 14 Feb 2024 00:29:16 -0800 Christoph Hellwig wrote: > With my busy kernel contributor head on I have to voice my > dissatisfaction with the subsystem maintainer overreach that's causing > the troubles here. Overreach is unfortunate, I'd love to say "please do merge it as part of RDMA". You probably don't trust my opinion but Jason admitted himself this is primarily for RDMA. RDMA is what it is in terms of openness and all vendors trying to sell their secret magic sauce. The problem is that some RDMA stuff is built really closely on TCP, and given Jason's and co. inability to understand that good fences make good neighbors it will soon start getting into the netdev stack :| Ah, and I presume they may also want it for their DOCA products. So 80% RDMA, 15% DOCA, 5% the rest is my guess. > I think all maintainers can and should voice the > opinions, be those technical or political, but trying to block a useful > feature without lots of precedence because it is vaguely related to the > subsystem is not helpful. Not sure what you mean by "without lots of precedence" but you can ask around netdev. We have nacked such interfaces multiple times. The best proof the rule exists and is well established it is that Saeed has himself asked us a number of times to lift it. What should be expected of us is fairness and not engaging in politics. We have a clear rule against opaque user space to FW interfaces, and I don't see how we could enforce that fairly for pure Ethernet devices if big vendors get to do whatever they want. > Note that this is absolutely not intended to > shut the discussion down - if we can find valid arguments why some of > this functionality should also be reported through a netdev API we > should continue that. Once again, netdev requirements for debug are - you can do whatever you want but other than knobs clearly defined in the code interface must be read only.