1. 10 2月, 2015 1 次提交
  2. 09 2月, 2015 3 次提交
    • H
      cxgb4: Fix trace observed while dumping clip_tbl · acde2c2d
      Hariprasad Shenai 提交于
      Handle clip_tbl debugfs entry, when clip_tbl isn't allocated.
      In commit b5a02f50 ("cxgb4: Update ipv6 address handling api") wrong
      argument was passed for single_open for clip_tbl debugfs entry, which led to
      below trace. Fixing it.
      
      ======
      call Trace:
       [<ffffffffa073c606>] clip_tbl_open+0x16/0x30 [cxgb4]
       [<ffffffff8119e2fa>] do_dentry_open+0x21a/0x370
       [<ffffffff8119e499>] vfs_open+0x49/0x50
       [<ffffffff811b0d0e>] do_last+0x21e/0x800
       [<ffffffff811b1382>] path_openat+0x92/0x470
       [<ffffffff8110569f>] ? rb_reserve_next_event+0xaf/0x380
       [<ffffffff8110569f>] ? rb_reserve_next_event+0xaf/0x380
       [<ffffffff811b189a>] do_filp_open+0x4a/0xa0
       [<ffffffff811bdc5d>] ? __alloc_fd+0xcd/0x140
       [<ffffffff8119fa4a>] do_sys_open+0x11a/0x230
       [<ffffffff8101219f>] ? syscall_trace_enter_phase2+0xaf/0x1b0
       [<ffffffff8119fb9e>] SyS_open+0x1e/0x20
       [<ffffffff815bf6f0>] tracesys_phase2+0xd4/0xd9
      Code: 89 e5 66 66 66 66 90 48 8b 47 e0 48 8b 40 30 48 8b 40 58 c9 c3 66 0f 1f
      84 00 00 00 00 00 55 48 89 e5 66 66 66 66 90 48 8b 47 e0 <48> 8b 40 58 c9 c3 66
      66 66 66 2e 0f 1f 84 00 00 00 00 00 55 48
      RIP  [<ffffffff8120898d>] PDE_DATA+0xd/0x20
       RSP <ffff8800b08c3c48>
      CR2: 0000000000000058
      
      =====
      Signed-off-by: NHariprasad Shenai <hariprasad@chelsio.com>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      acde2c2d
    • S
      Driver: Vmxnet3: Change the hex constant to its decimal equivalent · dd83829e
      Shrikrishna Khare 提交于
      The hex constant chosen for VMXNET3_REV1_MAGIC is offensive,
      replace it with its decimal equivalent.
      Signed-off-by: NShrikrishna Khare <skhare@vmware.com>
      Reviewed-by: NShreyas Bhatewara <sbhatewara@vmware.com>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      dd83829e
    • E
      net: rfs: add hash collision detection · 567e4b79
      Eric Dumazet 提交于
      Receive Flow Steering is a nice solution but suffers from
      hash collisions when a mix of connected and unconnected traffic
      is received on the host, when flow hash table is populated.
      
      Also, clearing flow in inet_release() makes RFS not very good
      for short lived flows, as many packets can follow close().
      (FIN , ACK packets, ...)
      
      This patch extends the information stored into global hash table
      to not only include cpu number, but upper part of the hash value.
      
      I use a 32bit value, and dynamically split it in two parts.
      
      For host with less than 64 possible cpus, this gives 6 bits for the
      cpu number, and 26 (32-6) bits for the upper part of the hash.
      
      Since hash bucket selection use low order bits of the hash, we have
      a full hash match, if /proc/sys/net/core/rps_sock_flow_entries is big
      enough.
      
      If the hash found in flow table does not match, we fallback to RPS (if
      it is enabled for the rxqueue).
      
      This means that a packet for an non connected flow can avoid the
      IPI through a unrelated/victim CPU.
      
      This also means we no longer have to clear the table at socket
      close time, and this helps short lived flows performance.
      Signed-off-by: NEric Dumazet <edumazet@google.com>
      Acked-by: NTom Herbert <therbert@google.com>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      567e4b79
  3. 08 2月, 2015 23 次提交
  4. 06 2月, 2015 13 次提交