From: Saeed Mahameed <saeed@kernel.org>
To: "David S. Miller" <davem@davemloft.net>,
Jakub Kicinski <kuba@kernel.org>, Paolo Abeni <pabeni@redhat.com>,
Eric Dumazet <edumazet@google.com>
Cc: Saeed Mahameed <saeedm@nvidia.com>,
netdev@vger.kernel.org, Tariq Toukan <tariqt@nvidia.com>
Subject: [pull request][net 00/15] mlx5 fixes 2022-11-24
Date: Thu, 24 Nov 2022 00:10:25 -0800 [thread overview]
Message-ID: <20221124081040.171790-1-saeed@kernel.org> (raw)
From: Saeed Mahameed <saeedm@nvidia.com>
This series provides bug fixes to mlx5 driver.
Focusing on error handling and proper memory management in mlx5, in
general and in the newly added macsec module.
I still have few fixes left in my queue and I hope those will be the
last ones for mlx5 for this cycle.
Please pull and let me know if there is any problem.
Happy thanksgiving.
Thanks,
Saeed.
The following changes since commit cd07eadd5147ffdae11b6fd28b77a3872f2a2484:
octeontx2-pf: Add check for devm_kcalloc (2022-11-24 08:34:45 +0100)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/saeed/linux.git tags/mlx5-fixes-2022-11-24
for you to fetch changes up to 9034b29251818ab7b4b38bf6ca860cee45d2726a:
net/mlx5e: MACsec, block offload requests with encrypt off (2022-11-24 00:03:23 -0800)
----------------------------------------------------------------
mlx5-fixes-2022-11-24
----------------------------------------------------------------
Chris Mi (2):
net/mlx5: E-switch, Destroy legacy fdb table when needed
net/mlx5: E-switch, Fix duplicate lag creation
Dan Carpenter (1):
net/mlx5e: Fix a couple error codes
Emeel Hakim (3):
net/mlx5e: MACsec, fix add Rx security association (SA) rule memory leak
net/mlx5e: MACsec, remove replay window size limitation in offload path
net/mlx5e: MACsec, block offload requests with encrypt off
Raed Salem (5):
net/mlx5e: MACsec, fix RX data path 16 RX security channel limit
net/mlx5e: MACsec, fix memory leak when MACsec device is deleted
net/mlx5e: MACsec, fix update Rx secure channel active field
net/mlx5e: MACsec, fix mlx5e_macsec_update_rxsa bail condition and functionality
net/mlx5e: MACsec, fix Tx SA active field update
Roi Dayan (1):
net/mlx5e: Fix use-after-free when reverting termination table
YueHaibing (3):
net/mlx5: DR, Fix uninitialized var warning
net/mlx5: Fix uninitialized variable bug in outlen_write()
net/mlx5e: Use kvfree() in mlx5e_accel_fs_tcp_create()
drivers/net/ethernet/mellanox/mlx5/core/cmd.c | 4 +-
.../ethernet/mellanox/mlx5/core/en_accel/fs_tcp.c | 4 +-
.../ethernet/mellanox/mlx5/core/en_accel/macsec.c | 138 +++++++++------------
.../ethernet/mellanox/mlx5/core/en_accel/macsec.h | 6 +-
.../mellanox/mlx5/core/en_accel/macsec_fs.c | 17 ++-
drivers/net/ethernet/mellanox/mlx5/core/eswitch.c | 3 +
drivers/net/ethernet/mellanox/mlx5/core/eswitch.h | 8 ++
.../ethernet/mellanox/mlx5/core/eswitch_offloads.c | 7 ++
.../mellanox/mlx5/core/eswitch_offloads_termtbl.c | 2 +
drivers/net/ethernet/mellanox/mlx5/core/lag/lag.c | 5 +-
.../mellanox/mlx5/core/steering/dr_table.c | 5 +-
include/linux/mlx5/mlx5_ifc.h | 7 --
12 files changed, 105 insertions(+), 101 deletions(-)
next reply other threads:[~2022-11-24 8:10 UTC|newest]
Thread overview: 33+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-11-24 8:10 Saeed Mahameed [this message]
2022-11-24 8:10 ` [net 01/15] net/mlx5: DR, Fix uninitialized var warning Saeed Mahameed
2022-11-24 8:10 ` [net 02/15] net/mlx5: E-switch, Destroy legacy fdb table when needed Saeed Mahameed
2022-11-24 8:10 ` [net 03/15] net/mlx5: E-switch, Fix duplicate lag creation Saeed Mahameed
2022-11-28 23:23 ` Jacob Keller
2022-11-29 5:51 ` Saeed Mahameed
2022-11-24 8:10 ` [net 04/15] net/mlx5: Fix uninitialized variable bug in outlen_write() Saeed Mahameed
2022-11-24 8:10 ` [net 05/15] net/mlx5e: Fix use-after-free when reverting termination table Saeed Mahameed
2022-11-28 23:26 ` Jacob Keller
2022-11-24 8:10 ` [net 06/15] net/mlx5e: Fix a couple error codes Saeed Mahameed
2022-11-28 23:26 ` Jacob Keller
2022-11-24 8:10 ` [net 07/15] net/mlx5e: Use kvfree() in mlx5e_accel_fs_tcp_create() Saeed Mahameed
2022-11-24 8:32 ` Tariq Toukan
2022-11-28 19:55 ` Saeed Mahameed
2022-11-28 23:34 ` Jacob Keller
2022-11-24 8:10 ` [net 08/15] net/mlx5e: MACsec, fix RX data path 16 RX security channel limit Saeed Mahameed
2022-11-24 8:10 ` [net 09/15] net/mlx5e: MACsec, fix memory leak when MACsec device is deleted Saeed Mahameed
2022-11-28 23:36 ` Jacob Keller
2022-11-24 8:10 ` [net 10/15] net/mlx5e: MACsec, fix update Rx secure channel active field Saeed Mahameed
2022-11-28 23:37 ` Jacob Keller
2022-11-24 8:10 ` [net 11/15] net/mlx5e: MACsec, fix mlx5e_macsec_update_rxsa bail condition and functionality Saeed Mahameed
2022-11-24 8:10 ` [net 12/15] net/mlx5e: MACsec, fix add Rx security association (SA) rule memory leak Saeed Mahameed
2022-11-28 23:37 ` Jacob Keller
2022-11-24 8:10 ` [net 13/15] net/mlx5e: MACsec, remove replay window size limitation in offload path Saeed Mahameed
2022-11-28 23:42 ` Jacob Keller
2022-11-29 3:35 ` Jakub Kicinski
2022-11-29 5:44 ` Saeed Mahameed
2022-11-29 8:12 ` Saeed Mahameed
2022-11-29 18:29 ` Jacob Keller
2022-11-24 8:10 ` [net 14/15] net/mlx5e: MACsec, fix Tx SA active field update Saeed Mahameed
2022-11-28 23:43 ` Jacob Keller
2022-11-24 8:10 ` [net 15/15] net/mlx5e: MACsec, block offload requests with encrypt off Saeed Mahameed
2022-11-28 23:43 ` Jacob Keller
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20221124081040.171790-1-saeed@kernel.org \
--to=saeed@kernel.org \
--cc=davem@davemloft.net \
--cc=edumazet@google.com \
--cc=kuba@kernel.org \
--cc=netdev@vger.kernel.org \
--cc=pabeni@redhat.com \
--cc=saeedm@nvidia.com \
--cc=tariqt@nvidia.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).