Received: by 2002:ac0:950c:0:0:0:0:0 with SMTP id f12csp2288526imc; Tue, 12 Mar 2019 10:39:06 -0700 (PDT) X-Google-Smtp-Source: APXvYqypmT6zsm9tctINvJySuptchya3IbRFVwAou8EBOfNBlb53IDR9ZOhGV+Gs2BoDpRIG2qc1 X-Received: by 2002:a63:4142:: with SMTP id o63mr11221366pga.81.1552412346378; Tue, 12 Mar 2019 10:39:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1552412346; cv=none; d=google.com; s=arc-20160816; b=HdiFC44ugPlxVkQhvmIlf96QoMO8jTfJmoMj3E0odNHMHE2PznBR7A8pqmLMsqdOsp PFtQYt31MGpzZWJ8e1GrZEydHlbFRZHi0FNk1ScAsRocvPlb1shesBZSbg1/5BzUxpvW 5/Ig2wc+dCYuIfn4v5NV/d69xkB4JAKZUL4TWrXo4sxFy+Bacyeuc1A+T9iWUzIhgqSq kQVJlGciKvJiH9L3wuPREzj/9YJFAE5o1tpAe61eE9W0JdpYeewnKdwJv/LWabtuJk8f agJeyv3HlSV7VaQHV44QPE6ib95btFHHlFakB9yvS8Pf9scv8qw3+ekCHn7Qm5hXqVPq IZlA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=wsCVQnsqhKl0pwHNUC5wJfrFZaJeg3meMRo/hVHI6jU=; b=Nda7X+rQWZ0OjPxzzDjAGENhGZDS7MuzsdFDReX8UPoOhfH2fTd2sYsUBAcCqXBgr2 lSIlQ0/wZRt4hAB1vqrtWluIFA6QHj7Szwiq0jxagaSfxnkLTe5ovym5VLBusA8JkXmO 8tgbXdJdxgYHO7PoQ13Nm7oO74Hlp9lxg1j5XwAKXSNl2CyUj4Jj7kdE8KPw8/TPA8U5 atKTnwgjcESv7dNp2TTEv0QCFCRXry+tz4JUM0xp0Q8HKLTtcDBMttrdEUsJc2lGfhaI IakFxD7EPPMKfPUvODzge7ohb5RniAgjzoeK3lZ0WJw9hBZHlxj/UwzW/oKqlX52pmAz jgTw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=V3xLtxVJ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n14si7661074pgv.520.2019.03.12.10.38.50; Tue, 12 Mar 2019 10:39:06 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=V3xLtxVJ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729482AbfCLRhy (ORCPT + 99 others); Tue, 12 Mar 2019 13:37:54 -0400 Received: from mail.kernel.org ([198.145.29.99]:59586 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729323AbfCLRQu (ORCPT ); Tue, 12 Mar 2019 13:16:50 -0400 Received: from localhost (unknown [104.133.8.98]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id BFC122186A; Tue, 12 Mar 2019 17:16:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1552411009; bh=K5M615LjojqEM3Yc7x2dx8MJgoDx0a0ELlFOxcvKjas=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=V3xLtxVJlcb6MRQv4nN2uzFa5Gb8LEUpctunfeIC01N6C3X+j9RA3774CBbuNKfVL J3QwVxmA6v3KIuvKf01obx4JlYE2iMMDk5/GRzscAk3dhQAGO+qN8nuchfc+vF17kO oFu06Mu5FunVqQ957vyUD5KrYE7Y14Xw3KVpMvhM= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jose Abreu , Joao Pinto , "David S. Miller" , Giuseppe Cavallaro , Alexandre Torgue , Sasha Levin Subject: [PATCH 4.14 097/135] net: stmmac: Send TSO packets always from Queue 0 Date: Tue, 12 Mar 2019 10:09:04 -0700 Message-Id: <20190312170350.133400731@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190312170341.127810985@linuxfoundation.org> References: <20190312170341.127810985@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit c5acdbee22a1b200dde07effd26fd1f649e9ab8a ] The number of TSO enabled channels in HW can be different than the number of total channels. There is no way to determined, at runtime, the number of TSO capable channels and its safe to assume that if TSO is enabled then at least channel 0 will be TSO capable. Lets always send TSO packets from Queue 0. Signed-off-by: Jose Abreu Cc: Joao Pinto Cc: David S. Miller Cc: Giuseppe Cavallaro Cc: Alexandre Torgue Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- drivers/net/ethernet/stmicro/stmmac/stmmac_main.c | 11 ++++++++++- 1 file changed, 10 insertions(+), 1 deletion(-) diff --git a/drivers/net/ethernet/stmicro/stmmac/stmmac_main.c b/drivers/net/ethernet/stmicro/stmmac/stmmac_main.c index 0e66a5082140..b1454c63e675 100644 --- a/drivers/net/ethernet/stmicro/stmmac/stmmac_main.c +++ b/drivers/net/ethernet/stmicro/stmmac/stmmac_main.c @@ -3019,8 +3019,17 @@ static netdev_tx_t stmmac_xmit(struct sk_buff *skb, struct net_device *dev) /* Manage oversized TCP frames for GMAC4 device */ if (skb_is_gso(skb) && priv->tso) { - if (skb_shinfo(skb)->gso_type & (SKB_GSO_TCPV4 | SKB_GSO_TCPV6)) + if (skb_shinfo(skb)->gso_type & (SKB_GSO_TCPV4 | SKB_GSO_TCPV6)) { + /* + * There is no way to determine the number of TSO + * capable Queues. Let's use always the Queue 0 + * because if TSO is supported then at least this + * one will be capable. + */ + skb_set_queue_mapping(skb, 0); + return stmmac_tso_xmit(skb, dev); + } } if (unlikely(stmmac_tx_avail(priv, queue) < nfrags + 1)) { -- 2.19.1