diff mbox

[2/2] opensm/osm_pkey_mgr.c: In pkey_mgr_update_peer_port, better last block handling

Message ID 4D9B59D1.9010209@dev.mellanox.co.il (mailing list archive)
State Accepted
Headers show

Commit Message

Hal Rosenstock April 5, 2011, 6:05 p.m. UTC
PKey table capacities are not required to be multiples of the PKey table block
size (32 entries of 16 pkeys).

Current code could enable partition enforcement on the peer switch port
even if the last partition table block were truncated. In this case, it's
better to disable partition enforcement on those ports.

Signed-off-by: Hal Rosenstock <hal@mellanox.com>
---
--
To unsubscribe from this list: send the line "unsubscribe linux-rdma" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Comments

Alex Netes April 7, 2011, 4:46 p.m. UTC | #1
Hi Hal,

On 14:05 Tue 05 Apr     , Hal Rosenstock wrote:
> 
> PKey table capacities are not required to be multiples of the PKey table block
> size (32 entries of 16 pkeys).
> 
> Current code could enable partition enforcement on the peer switch port
> even if the last partition table block were truncated. In this case, it's
> better to disable partition enforcement on those ports.
> 

What is the motivation for this patch?
In case where there are more pkeys than sw->switch_info.enforce_cap I guess
enforcement won't be applied on pkeys > sw->switch_info.enforce_cap. This is a
user configuration issue. Why issue a warning message to a log isn't enough?

--Alex
--
To unsubscribe from this list: send the line "unsubscribe linux-rdma" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Hal Rosenstock April 7, 2011, 6:31 p.m. UTC | #2
Hi Alex,

On 4/7/2011 12:46 PM, Alex Netes wrote:
> Hi Hal,
> 
> On 14:05 Tue 05 Apr     , Hal Rosenstock wrote:
>>
>> PKey table capacities are not required to be multiples of the PKey table block
>> size (32 entries of 16 pkeys).

                        ^^^^^^^
                        16 bit pkeys

>>
>> Current code could enable partition enforcement on the peer switch port
>> even if the last partition table block were truncated. In this case, it's
>> better to disable partition enforcement on those ports.
>>
> 
> What is the motivation for this patch?

The policy question is what to do when that occurs.

> In case where there are more pkeys than sw->switch_info.enforce_cap I guess
> enforcement won't be applied on pkeys > sw->switch_info.enforce_cap.

The SM shouldn't set any such entries in the PKey table per 14.2.5.7
P_KEYTABLE p. 842 line 37:

The AttributeModifier is divided in two halves:
• The least significant 16 bits are a pointer to a block of 32 P_Key
entries to which this Attribute applies.  Valid values are 0 - 2047, and
are further limited by the size of the P_Key table for that node
(specified by the PartitionCap for CAs, routers, and switch management
ports or PartitionEnforcementCap for external ports on switches).

so a conforming SMA should reject such a set.

> This is a user configuration issue. 

Yes.

> Why issue a warning message to a log isn't enough?

That's the minimum that should be done. The question then becomes
whether it's better to enforce for some subset of the partitions or
disable enforrcement. I was trying to avoid another config option for this.

-- Hal

> --Alex

--
To unsubscribe from this list: send the line "unsubscribe linux-rdma" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Alex Netes April 10, 2011, 7:51 a.m. UTC | #3
On 14:31 Thu 07 Apr     , Hal Rosenstock wrote:
> Hi Alex,
> 
> On 4/7/2011 12:46 PM, Alex Netes wrote:
> > Hi Hal,
> > 
> > On 14:05 Tue 05 Apr     , Hal Rosenstock wrote:
> >>
> >> PKey table capacities are not required to be multiples of the PKey table block
> >> size (32 entries of 16 pkeys).
> 
>                         ^^^^^^^
>                         16 bit pkeys
> 
> >>
> >> Current code could enable partition enforcement on the peer switch port
> >> even if the last partition table block were truncated. In this case, it's
> >> better to disable partition enforcement on those ports.
> >>
> > 
> > What is the motivation for this patch?
> 
> The policy question is what to do when that occurs.
> 
> > In case where there are more pkeys than sw->switch_info.enforce_cap I guess
> > enforcement won't be applied on pkeys > sw->switch_info.enforce_cap.
> 
> The SM shouldn't set any such entries in the PKey table per 14.2.5.7
> P_KEYTABLE p. 842 line 37:
> 
> The AttributeModifier is divided in two halves:
> • The least significant 16 bits are a pointer to a block of 32 P_Key
> entries to which this Attribute applies.  Valid values are 0 - 2047, and
> are further limited by the size of the P_Key table for that node
> (specified by the PartitionCap for CAs, routers, and switch management
> ports or PartitionEnforcementCap for external ports on switches).
> 
> so a conforming SMA should reject such a set.
> 
> > This is a user configuration issue. 
> 
> Yes.
> 
> > Why issue a warning message to a log isn't enough?
> 
> That's the minimum that should be done. The question then becomes
> whether it's better to enforce for some subset of the partitions or
> disable enforrcement. I was trying to avoid another config option for this.
> 

Makes sense.

Applied, thanks.
--
To unsubscribe from this list: send the line "unsubscribe linux-rdma" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
diff mbox

Patch

diff --git a/opensm/osm_pkey_mgr.c b/opensm/osm_pkey_mgr.c
index 92f8f2b..f6bc9d1 100644
--- a/opensm/osm_pkey_mgr.c
+++ b/opensm/osm_pkey_mgr.c
@@ -375,6 +375,29 @@  static int pkey_mgr_update_port(osm_log_t * p_log, osm_sm_t * sm,
 	return ret;
 }
 
+static uint16_t last_used_pkey_index(const osm_port_t * const p_port,
+				     const osm_pkey_tbl_t * p_pkey_tbl)
+{
+	ib_pkey_table_t *last_block;
+	uint16_t index, last_index = 0;
+
+	last_block = osm_pkey_tbl_new_block_get(p_pkey_tbl,
+						p_pkey_tbl->used_blocks - 1);
+
+	if (p_pkey_tbl->used_blocks == p_pkey_tbl->max_blocks)
+		last_index = cl_ntoh16(p_port->p_node->node_info.partition_cap) % IB_NUM_PKEY_ELEMENTS_IN_BLOCK;
+	if (last_index == 0)
+		last_index = IB_NUM_PKEY_ELEMENTS_IN_BLOCK;
+	index = last_index;
+	do {
+		index--;
+		if (!ib_pkey_is_invalid(last_block->pkey_entry[index]))
+			break;
+	} while (index != 0);
+
+	return index;
+}
+
 static int pkey_mgr_update_peer_port(osm_log_t * p_log, osm_sm_t * sm,
 				     const osm_subn_t * p_subn,
 				     const osm_port_t * const p_port,
@@ -387,6 +410,7 @@  static int pkey_mgr_update_peer_port(osm_log_t * p_log, osm_sm_t * sm,
 	osm_pkey_tbl_t *p_peer_pkey_tbl;
 	uint16_t block_index;
 	uint16_t peer_max_blocks;
+	uint16_t last_index;
 	ib_api_status_t status = IB_SUCCESS;
 	ib_pkey_table_t empty_block;
 	int ret = 0;
@@ -414,6 +437,22 @@  static int pkey_mgr_update_peer_port(osm_log_t * p_log, osm_sm_t * sm,
 			p_node->print_desc);
 		enforce = FALSE;
 		ret = -1;
+	} else if (peer_max_blocks == p_pkey_tbl->used_blocks) {
+		/* Is last used pkey index beyond switch peer port capacity ? */
+		last_index = (peer_max_blocks - 1) * IB_NUM_PKEY_ELEMENTS_IN_BLOCK +
+			     last_used_pkey_index(p_port, p_pkey_tbl);
+		if (cl_ntoh16(p_node->sw->switch_info.enforce_cap) <= last_index) {
+			OSM_LOG(p_log, OSM_LOG_ERROR, "ERR 0507: "
+				"Not enough pkey entries (%u <= %u) on switch 0x%016"
+				PRIx64 " port %u (%s). Clearing Enforcement bit\n",
+				cl_ntoh16(p_node->sw->switch_info.enforce_cap),
+				last_index,
+				cl_ntoh64(osm_node_get_node_guid(p_node)),
+				osm_physp_get_port_num(peer),
+				p_node->print_desc);
+			enforce = FALSE;
+			ret = -1;
+		}
 	}
 
 	if (pkey_mgr_enforce_partition(p_log, sm, peer, enforce))