From patchwork Thu Nov 5 20:21:22 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Saeed Mahameed X-Patchwork-Id: 322249 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-16.9 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, INCLUDES_PULL_REQUEST, MAILING_LIST_MULTI, MENTIONS_GIT_HOSTING, SPF_HELO_NONE, SPF_PASS, USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id D8CEFC388F7 for ; Thu, 5 Nov 2020 20:22:14 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 7102E21D46 for ; Thu, 5 Nov 2020 20:22:14 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=nvidia.com header.i=@nvidia.com header.b="ES4nJPbX" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732506AbgKEUWN (ORCPT ); Thu, 5 Nov 2020 15:22:13 -0500 Received: from hqnvemgate26.nvidia.com ([216.228.121.65]:19748 "EHLO hqnvemgate26.nvidia.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732224AbgKEUWK (ORCPT ); Thu, 5 Nov 2020 15:22:10 -0500 Received: from hqmail.nvidia.com (Not Verified[216.228.121.13]) by hqnvemgate26.nvidia.com (using TLS: TLSv1.2, AES256-SHA) id ; Thu, 05 Nov 2020 12:22:14 -0800 Received: from sx1.mtl.com (10.124.1.5) by HQMAIL107.nvidia.com (172.20.187.13) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Thu, 5 Nov 2020 20:22:09 +0000 From: Saeed Mahameed To: Jakub Kicinski CC: , "David S. Miller" , "Saeed Mahameed" Subject: [pull request][net v2 0/7] mlx5 fixes 2020-11-03 Date: Thu, 5 Nov 2020 12:21:22 -0800 Message-ID: <20201105202129.23644-1-saeedm@nvidia.com> X-Mailer: git-send-email 2.26.2 MIME-Version: 1.0 X-Originating-IP: [10.124.1.5] X-ClientProxiedBy: HQMAIL111.nvidia.com (172.20.187.18) To HQMAIL107.nvidia.com (172.20.187.13) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nvidia.com; s=n1; t=1604607734; bh=QIji9H9yWzUF9uXLYf0sab7Ewo5Sng8nZRE6HroZq2Y=; h=From:To:CC:Subject:Date:Message-ID:X-Mailer:MIME-Version: Content-Transfer-Encoding:Content-Type:X-Originating-IP: X-ClientProxiedBy; b=ES4nJPbXtfuLBnrubLDmn4+jK/jMbQgJBK9dnDyKHZUDx4GJdqruJgqzjqTbG2Be1 tyieBSu5smGPsZxErIsK/e4yykwHPeauj1ePXMJ+CC5aX2Z2yax0q9otbpOA/yxGIB 4TtB4Wj7nLVok4tSy7Y5Y3rt/b0PbXPjbyogX2MERvMKGnalasA5p1tMz1VaKwQn4e qYlNIlX7mCRf1Hp0lwrPhkginrkfuqLuPY26sZ8Wv3WceUhDSP7jCD5+YKP0QlCcFf zSteg3VZbLdHB0ihK9fNhl8wwS60mudCpYNjNX0fq9o8XNXbr8P2jndrLfmhy6OHec X0PSyCBTB4M3A== Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org Hi Jakub, This series introduces some fixes to mlx5 driver. v1->v2: - Fix fixes line tag in patch #1 - Toss ktls refcount leak fix, Maxim will look further into the root cause. - Toss eswitch chain 0 prio patch, until we determine if it is needed for -rc and net. Please pull and let me know if there is any problem. For -stable v5.1 ('net/mlx5: Fix deletion of duplicate rules') For -stable v5.4 ('net/mlx5e: Fix modify header actions memory leak') For -stable v5.8 ('net/mlx5e: Protect encap route dev from concurrent release') For -stable v5.9 ('net/mlx5e: Fix VXLAN synchronization after function reload') ('net/mlx5e: Use spin_lock_bh for async_icosq_lock') ('net/mlx5e: Fix incorrect access of RCU-protected xdp_prog') ('net/mlx5: E-switch, Avoid extack error log for disabled vport') Thanks, Saeed. --- The following changes since commit 9621618130bf7e83635367c13b9a6ee53935bb37: sfp: Fix error handing in sfp_probe() (2020-11-02 17:19:59 -0800) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/saeed/linux.git tags/mlx5-fixes-2020-11-03 for you to fetch changes up to 1a50cf9a67ff2241c2949d30bc11c8dd4280eef8: net/mlx5e: Fix incorrect access of RCU-protected xdp_prog (2020-11-05 12:17:06 -0800) ---------------------------------------------------------------- mlx5-fixes-2020-11-03 ---------------------------------------------------------------- Aya Levin (1): net/mlx5e: Fix VXLAN synchronization after function reload Maor Dickman (1): net/mlx5e: Fix modify header actions memory leak Maor Gottlieb (1): net/mlx5: Fix deletion of duplicate rules Maxim Mikityanskiy (2): net/mlx5e: Use spin_lock_bh for async_icosq_lock net/mlx5e: Fix incorrect access of RCU-protected xdp_prog Parav Pandit (1): net/mlx5: E-switch, Avoid extack error log for disabled vport Vlad Buslov (1): net/mlx5e: Protect encap route dev from concurrent release .../net/ethernet/mellanox/mlx5/core/en/rep/tc.c | 6 +- .../net/ethernet/mellanox/mlx5/core/en/tc_tun.c | 72 ++++++++++++++-------- .../net/ethernet/mellanox/mlx5/core/en/xsk/setup.c | 4 +- .../net/ethernet/mellanox/mlx5/core/en/xsk/tx.c | 4 +- .../ethernet/mellanox/mlx5/core/en_accel/ktls_rx.c | 14 ++--- drivers/net/ethernet/mellanox/mlx5/core/en_main.c | 1 + drivers/net/ethernet/mellanox/mlx5/core/en_rep.h | 2 +- drivers/net/ethernet/mellanox/mlx5/core/en_rx.c | 2 +- drivers/net/ethernet/mellanox/mlx5/core/en_tc.c | 2 + drivers/net/ethernet/mellanox/mlx5/core/eswitch.c | 2 - drivers/net/ethernet/mellanox/mlx5/core/fs_core.c | 7 ++- .../net/ethernet/mellanox/mlx5/core/lib/vxlan.c | 23 +++++-- .../net/ethernet/mellanox/mlx5/core/lib/vxlan.h | 2 + 13 files changed, 90 insertions(+), 51 deletions(-)