1. 28 6月, 2020 1 次提交
  2. 04 6月, 2020 1 次提交
  3. 27 5月, 2020 1 次提交
    • L
      net/mlx5: Add ability to read and write ECE options · 6b646a7e
      Leon Romanovsky 提交于
      The end result of RDMA-CM ECE handshake is ECE options, which is
      needed to be used while configuring data QPs. Such options can
      come in any QP state, so add in/out fields to set and query
      ECE options.
      
      OUT fields:
      * create_qp() - default ECE options for that type of QP.
      * modify_qp() - enabled ECE options after QP state transition.
      
      IN fields:
      * create_qp() - create QP with this ECE option.
      * modify_qp() - requested options. For unconnected QPs, the FW
      will return an error if ECE is already configured with any options
      that not equal to previously set.
      Reviewed-by: NMark Zhang <markz@mellanox.com>
      Reviewed-by: NMaor Gottlieb <maorg@mellanox.com>
      Signed-off-by: NLeon Romanovsky <leonro@mellanox.com>
      6b646a7e
  4. 19 5月, 2020 1 次提交
  5. 11 5月, 2020 1 次提交
    • G
      net/mlx5: Replace zero-length array with flexible-array · b6ca09cb
      Gustavo A. R. Silva 提交于
      The current codebase makes use of the zero-length array language
      extension to the C90 standard, but the preferred mechanism to declare
      variable-length types such as these ones is a flexible array member[1][2],
      introduced in C99:
      
      struct foo {
              int stuff;
              struct boo array[];
      };
      
      By making use of the mechanism above, we will get a compiler warning
      in case the flexible array does not occur last in the structure, which
      will help us prevent some kind of undefined behavior bugs from being
      inadvertently introduced[3] to the codebase from now on.
      
      Also, notice that, dynamic memory allocations won't be affected by
      this change:
      
      "Flexible array members have incomplete type, and so the sizeof operator
      may not be applied. As a quirk of the original implementation of
      zero-length arrays, sizeof evaluates to zero."[1]
      
      sizeof(flexible-array-member) triggers a warning because flexible array
      members have incomplete type[1]. There are some instances of code in
      which the sizeof operator is being incorrectly/erroneously applied to
      zero-length arrays and the result is zero. Such instances may be hiding
      some bugs. So, this work (flexible-array member conversions) will also
      help to get completely rid of those sorts of issues.
      
      This issue was found with the help of Coccinelle.
      
      [1] https://gcc.gnu.org/onlinedocs/gcc/Zero-Length.html
      [2] https://github.com/KSPP/linux/issues/21
      [3] commit 76497732 ("cxgb3/l2t: Fix undefined behaviour")
      Signed-off-by: NGustavo A. R. Silva <gustavoars@kernel.org>
      Signed-off-by: NSaeed Mahameed <saeedm@mellanox.com>
      b6ca09cb
  6. 03 5月, 2020 1 次提交
  7. 29 4月, 2020 6 次提交
  8. 19 4月, 2020 1 次提交
  9. 28 3月, 2020 1 次提交
  10. 18 3月, 2020 1 次提交
  11. 11 3月, 2020 1 次提交
  12. 08 3月, 2020 4 次提交
  13. 05 3月, 2020 1 次提交
    • Y
      net/mlx5: Expose raw packet pacing APIs · 1326034b
      Yishai Hadas 提交于
      Expose raw packet pacing APIs to be used by DEVX based applications.
      The existing code was refactored to have a single flow with the new raw
      APIs.
      
      The new raw APIs considered the input of 'pp_rate_limit_context', uid,
      'dedicated', upon looking for an existing entry.
      
      This raw mode enables future device specification data in the raw
      context without changing the existing logic and code.
      
      The ability to ask for a dedicated entry gives control for application
      to allocate entries according to its needs.
      
      A dedicated entry may not be used by some other process and it also
      enables the process spreading its resources to some different entries
      for use different hardware resources as part of enforcing the rate.
      
      The counter per entry was changed to be u64 to prevent any option to
      overflow.
      Signed-off-by: NYishai Hadas <yishaih@mellanox.com>
      Acked-by: NSaeed Mahameed <saeedm@mellanox.com>
      Signed-off-by: NLeon Romanovsky <leonro@mellanox.com>
      1326034b
  14. 19 2月, 2020 1 次提交
  15. 07 2月, 2020 1 次提交
  16. 17 1月, 2020 9 次提交
  17. 11 1月, 2020 1 次提交
  18. 23 11月, 2019 1 次提交
  19. 30 10月, 2019 1 次提交
  20. 08 10月, 2019 1 次提交
  21. 24 9月, 2019 1 次提交
  22. 06 9月, 2019 1 次提交
  23. 02 9月, 2019 1 次提交
  24. 28 8月, 2019 1 次提交