[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [RFC v3 4/6] bridge: enable root block during device registration
On Mon, Mar 3, 2014 at 4:31 PM, Stephen Hemminger <stephen@xxxxxxxxxxxxxxxxxx> wrote: > On Mon, 3 Mar 2014 15:58:50 -0800 > "Luis R. Rodriguez" <mcgrof@xxxxxxxxxxxxxxxx> wrote: > >> On Mon, Mar 3, 2014 at 3:43 PM, Stephen Hemminger >> <stephen@xxxxxxxxxxxxxxxxxx> wrote: >> > Doing this in priv flags bloats what is a limited resource (# of bits). >> >> Agreed. I tried to avoid it but saw no other option for addressing >> this during initialization properly without requirng a userspace >> upgrade. > > Replacing one Xen hack for another doesn't seem like great progress. I'm the last person that wants to see any internal driver hack propagate, the goal was to kill one here. > I would rather see an API change as needed because there are other > things like setting STP parameters which might also want to be part > of initial device add. As it stands right now ndo_add_slave() currently only allows us to pass the net_device, that's it, so we're confined there. One way I can think of to properly extend this interface is to allow extra parameters to be passed. We may even be able to move some old priv_flags for bonding onto this new interface but before I moved down this more invasive approach I wanted to review this other approach. Does extending ndo_add_slave() seems reasonable, or do you have any other preferred alternatives? Even though the high MAC address was a xen hack it is a hack put in place prior to the root block feature being added, so I would like at the very least a bit of consideration on userspace here. Its really the only reason why I've been stubborn on looking for a compromise. In the KVM case that doesn't use the root_block feature yet I would have considered just extending the ndo_add_slave() from the start but because xen-netback *does* have in place a hack removing it requires userspace considerations. Luis _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |