1. 23 5月, 2018 1 次提交
  2. 17 5月, 2018 6 次提交
  3. 11 5月, 2018 2 次提交
  4. 08 5月, 2018 4 次提交
  5. 04 5月, 2018 1 次提交
  6. 30 4月, 2018 1 次提交
  7. 25 4月, 2018 1 次提交
  8. 24 4月, 2018 2 次提交
  9. 20 4月, 2018 2 次提交
  10. 30 3月, 2018 5 次提交
  11. 27 3月, 2018 1 次提交
  12. 24 3月, 2018 1 次提交
  13. 17 3月, 2018 2 次提交
  14. 13 3月, 2018 1 次提交
  15. 08 3月, 2018 1 次提交
    • M
      qed: Free RoCE ILT Memory on rmmod qedr · 9de506a5
      Michal Kalderon 提交于
      Rdma requires ILT Memory to be allocated for it's QPs.
      Each ILT entry points to a page used by several Rdma QPs.
      To avoid allocating all the memory in advance, the rdma
      implementation dynamically allocates memory as more QPs are
      added, however it does not dynamically free the memory.
      The memory should have been freed on rmmod qedr, but isn't.
      This patch adds the memory freeing on rmmod qedr (currently
      it will be freed with qed is removed).
      
      An outcome of this bug, is that if qedr is unloaded and loaded
      without unloaded qed, there will be no more RoCE traffic.
      
      The reason these are related, is that the logic of detecting the
      first QP ever opened is by asking whether ILT memory for RoCE has
      been allocated.
      
      In addition, this patch modifies freeing of the Task context to
      always use the PROTOCOLID_ROCE and not the protocol passed,
      this is because task context for iWARP and ROCE both use the
      ROCE protocol id, as opposed to the connection context.
      
      Fixes: dbb799c3 ("qed: Initialize hardware for new protocols")
      Signed-off-by: NMichal Kalderon <Michal.Kalderon@cavium.com>
      Signed-off-by: NAriel Elior <Ariel.Elior@cavium.com>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      9de506a5
  16. 01 3月, 2018 1 次提交
  17. 03 2月, 2018 1 次提交
    • A
      net: qed: use correct strncpy() size · 11f71108
      Arnd Bergmann 提交于
      passing the strlen() of the source string as the destination
      length is pointless, and gcc-8 now warns about it:
      
      drivers/net/ethernet/qlogic/qed/qed_debug.c: In function 'qed_grc_dump':
      include/linux/string.h:253: error: 'strncpy' specified bound depends on the length of the source argument [-Werror=stringop-overflow=]
      
      This changes qed_grc_dump_big_ram() to instead uses the length of
      the destination buffer, and use strscpy() to guarantee nul-termination.
      Signed-off-by: NArnd Bergmann <arnd@arndb.de>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      11f71108
  18. 26 1月, 2018 1 次提交
  19. 25 1月, 2018 2 次提交
  20. 17 1月, 2018 1 次提交
  21. 03 1月, 2018 3 次提交