From patchwork Tue Jul 28 21:46:04 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jakub Kicinski X-Patchwork-Id: 1338023 Return-Path: X-Original-To: patchwork-incoming-netdev@ozlabs.org Delivered-To: patchwork-incoming-netdev@ozlabs.org Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org (client-ip=23.128.96.18; helo=vger.kernel.org; envelope-from=netdev-owner@vger.kernel.org; receiver=) Authentication-Results: ozlabs.org; dmarc=pass (p=none dis=none) header.from=kernel.org Authentication-Results: ozlabs.org; dkim=pass (1024-bit key; unprotected) header.d=kernel.org header.i=@kernel.org header.a=rsa-sha256 header.s=default header.b=Kzfs2t0i; dkim-atps=neutral Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by ozlabs.org (Postfix) with ESMTP id 4BGVcD0k1pz9sRN for ; Wed, 29 Jul 2020 07:46:20 +1000 (AEST) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729421AbgG1VqT (ORCPT ); Tue, 28 Jul 2020 17:46:19 -0400 Received: from mail.kernel.org ([198.145.29.99]:57742 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728149AbgG1VqS (ORCPT ); Tue, 28 Jul 2020 17:46:18 -0400 Received: from kicinski-fedora-PC1C0HJN.thefacebook.com (unknown [163.114.132.5]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 2E34C2074F; Tue, 28 Jul 2020 21:46:18 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1595972778; bh=B3qZcoh20NCg2ULPOohV4FcECGJ9q6OpboMN8B5Blnw=; h=From:To:Cc:Subject:Date:From; b=Kzfs2t0iU/OlVdx3vdP6SJMuWHQXVqTRAxOYclBeqUfWfWorP3IBTbBceNMjQosRo alvqRrPaoi0LFGFseY7nEDUl7hWs1D7VAflso7+ZsS4PrbdYRWIrbTQ6hqLHfIMfPp XRs0WXeqdFvgZxEggZCtS26g6vY7KBYhFFKqtGDE= From: Jakub Kicinski To: saeedm@mellanox.com Cc: netdev@vger.kernel.org, davem@davemloft.net, mkubecek@suse.cz, Jakub Kicinski Subject: [PATCH net-next v2 0/2] udp_tunnel: convert mlx5 to the new udp_tunnel infrastructure Date: Tue, 28 Jul 2020 14:46:04 -0700 Message-Id: <20200728214606.303058-1-kuba@kernel.org> X-Mailer: git-send-email 2.26.2 MIME-Version: 1.0 Sender: netdev-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org This set converts mlx5 to the new infrastructure. We need a small amount of special handling as mlx5 expects IANA VXLAN port to always be programmed into the device. ethtool will show such ports in a separate, type-less, fake table, at the end: Tunnel information for eth0: UDP port table 0: Size: 7 Types: vxlan No entries UDP port table 1: Size: 1 Types: none (static entries) Entries (1): port 4789, vxlan Saeed - this should apply on top of net-next, independently of the Intel patches, would you mind taking this in for testing and review? I'll post the netdevsim & test once Intel patches re-emerge. v2: - don't disable the offload on reprs in patch #2. Jakub Kicinski (2): udp_tunnel: add the ability to hard-code IANA VXLAN mlx5: convert to new udp_tunnel infrastructure Documentation/networking/ethtool-netlink.rst | 3 + drivers/net/ethernet/mellanox/mlx5/core/en.h | 2 - .../net/ethernet/mellanox/mlx5/core/en_main.c | 88 ++----------------- .../net/ethernet/mellanox/mlx5/core/en_rep.c | 6 +- .../ethernet/mellanox/mlx5/core/lib/vxlan.c | 87 +++++++++--------- .../ethernet/mellanox/mlx5/core/lib/vxlan.h | 6 +- include/net/udp_tunnel.h | 5 ++ net/ethtool/tunnels.c | 69 +++++++++++++-- net/ipv4/udp_tunnel_nic.c | 7 ++ 9 files changed, 130 insertions(+), 143 deletions(-)