From patchwork Tue Jul 28 21:47:57 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jakub Kicinski X-Patchwork-Id: 1338026 Return-Path: X-Original-To: patchwork-incoming-netdev@ozlabs.org Delivered-To: patchwork-incoming-netdev@ozlabs.org Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org (client-ip=23.128.96.18; helo=vger.kernel.org; envelope-from=netdev-owner@vger.kernel.org; receiver=) Authentication-Results: ozlabs.org; dmarc=pass (p=none dis=none) header.from=kernel.org Authentication-Results: ozlabs.org; dkim=pass (1024-bit key; unprotected) header.d=kernel.org header.i=@kernel.org header.a=rsa-sha256 header.s=default header.b=joQnsQey; dkim-atps=neutral Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by ozlabs.org (Postfix) with ESMTP id 4BGVfC0tKdz9sRN for ; Wed, 29 Jul 2020 07:48:03 +1000 (AEST) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729524AbgG1VsC (ORCPT ); Tue, 28 Jul 2020 17:48:02 -0400 Received: from mail.kernel.org ([198.145.29.99]:58452 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729169AbgG1VsB (ORCPT ); Tue, 28 Jul 2020 17:48:01 -0400 Received: from kicinski-fedora-PC1C0HJN.thefacebook.com (unknown [163.114.132.5]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 380452074F; Tue, 28 Jul 2020 21:48:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1595972881; bh=N2taIB4RYhNK+Mg8784PPSZFsRTY4ed2NmmNxEa8QJ0=; h=From:To:Cc:Subject:Date:From; b=joQnsQeyZ/Ma5QYnQUgLhXQRbPqozMn7R3C0BozITS05lSefVkXEMsgp+gcuAzgc7 nSvi5Ce5mhXapEXmT4+QL7SipfT0+SDMdMHfAQfHQ3nAOoVjO7221hV2/C+wkjetfN +RJWTiY0c3ZgRl4c4VNjjmIJu9bL5f1IkpMfTizw= From: Jakub Kicinski To: saeedm@mellanox.com Cc: netdev@vger.kernel.org, davem@davemloft.net, mkubecek@suse.cz, Jakub Kicinski Subject: [PATCH net-next v3 0/2] udp_tunnel: convert mlx5 to the new udp_tunnel infrastructure Date: Tue, 28 Jul 2020 14:47:57 -0700 Message-Id: <20200728214759.325418-1-kuba@kernel.org> X-Mailer: git-send-email 2.26.2 MIME-Version: 1.0 Sender: netdev-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org This set converts mlx5 to the new infrastructure. We need a small amount of special handling as mlx5 expects IANA VXLAN port to always be programmed into the device. ethtool will show such ports in a separate, type-less, fake table, at the end: Tunnel information for eth0: UDP port table 0: Size: 7 Types: vxlan No entries UDP port table 1: Size: 1 Types: none (static entries) Entries (1): port 4789, vxlan Saeed - this should apply on top of net-next, independently of the Intel patches, would you mind taking this in for testing and review? I'll post the netdevsim & test once Intel patches re-emerge. v3: - add missing include. v2: - don't disable the offload on reprs in patch #2. Jakub Kicinski (2): udp_tunnel: add the ability to hard-code IANA VXLAN mlx5: convert to new udp_tunnel infrastructure Documentation/networking/ethtool-netlink.rst | 3 + drivers/net/ethernet/mellanox/mlx5/core/en.h | 2 - .../net/ethernet/mellanox/mlx5/core/en_main.c | 88 ++----------------- .../net/ethernet/mellanox/mlx5/core/en_rep.c | 7 +- .../ethernet/mellanox/mlx5/core/lib/vxlan.c | 87 +++++++++--------- .../ethernet/mellanox/mlx5/core/lib/vxlan.h | 6 +- include/net/udp_tunnel.h | 5 ++ net/ethtool/tunnels.c | 69 +++++++++++++-- net/ipv4/udp_tunnel_nic.c | 7 ++ 9 files changed, 131 insertions(+), 143 deletions(-)