Received: by 2002:a05:6a10:c7c6:0:0:0:0 with SMTP id h6csp1644170pxy; Mon, 2 Aug 2021 06:59:07 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwx6r/5yCD3rSRR4CRRKbT+ScByLQfHRu28XknEihc8rd5RvSyyx71HoUs/47IAqCZWVKlf X-Received: by 2002:a92:cb0f:: with SMTP id s15mr134729ilo.11.1627912747785; Mon, 02 Aug 2021 06:59:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627912747; cv=none; d=google.com; s=arc-20160816; b=rubxbJmiCsxkY7RV+MLTpijbDGXqMXRu5zrPE+oOg69epx8Z+8vZisgMZV8rus8Wu1 iUQxoOtKru/dsVB5SZBwuX8R5Kv+KIN8FdXHjsvUGxf9T/keCRyOhJy6uXv9uvKgFjhj V/fqPPLAj8FdVw+ojJENtUvj4YjTh9yOhGuaWT8MunIMwqHrlzliNpxJXbNuUcDhZ9V0 njYnQpaDVbY1Yh7neczastwol1g4P+OxLKEUn/XEgh9nSJH+5IkS+CWzP6znERAOYQJS eAPw7TBzODvzu1J5m5jVzOI49+r4dEeoSliMBmiP8zhqxiTGRkseLlkH72yV5mQtR/k8 NOLA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=7MoZ+ZJEec5hwiMG2yz8fDT2RBlBA9M00YX4bzjnelg=; b=hpKEDHhhHnI+SAoickxA/9kq43mauzSGBl9kBOwkwxm2oGgczZ9Z53rZC3fR5Vfe7d JLp6Q15Io+DQ6Wxz23A5HfhM/mS6kcol/ZCbYlvldJe/CER6GMbYEyN2oQQiSF+H9UjD mkMpLulaUkxrQuqIpSoggvo7ffaJMaOfTP5uBLW7z7IBB7B7947WuW3tpJKFSnJPyTCB lt3k+wo0Rpp8r7qDdNf/ltHowHP5wrWLj9dJ36e3YuMXcKYILLxriz0huDOHw6ndnaEo LnyOkdXhn7rSDve/33UYtv9/EDT8uba1Ki5Sg3RwWsDYSTweKbICBlLiPYxyilNPXAL6 ENlQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=EobDOim4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g2si14246339jat.88.2021.08.02.06.58.56; Mon, 02 Aug 2021 06:59:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=EobDOim4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235332AbhHBN6X (ORCPT + 99 others); Mon, 2 Aug 2021 09:58:23 -0400 Received: from mail.kernel.org ([198.145.29.99]:33610 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235026AbhHBNv5 (ORCPT ); Mon, 2 Aug 2021 09:51:57 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 5332360527; Mon, 2 Aug 2021 13:51:24 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1627912284; bh=K5Au/aiJki7kbLFc6k4GHQ6xbdSjiZhk+mqrsz7qhGc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=EobDOim4OvBO7KQiK7De0eQK6pKiCKpMciPHc7NxFw603cEO/OA7lx1wMOjsaXMog OEBOVN6kPoQ+lUVvbBMeGB7732a+5LhuFhMtM6vWzwPvwVsPD7Iyi/zr8wSbf7ubk/ ADKwKQEDeH7piNj3RlY0xuaQeiwI14S7jYz/tMow= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Maor Gottlieb , Mark Bloch , Saeed Mahameed , Sasha Levin Subject: [PATCH 5.4 30/40] net/mlx5: Fix flow table chaining Date: Mon, 2 Aug 2021 15:45:10 +0200 Message-Id: <20210802134336.351067525@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210802134335.408294521@linuxfoundation.org> References: <20210802134335.408294521@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Maor Gottlieb [ Upstream commit 8b54874ef1617185048029a3083d510569e93751 ] Fix a bug when flow table is created in priority that already has other flow tables as shown in the below diagram. If the new flow table (FT-B) has the lowest level in the priority, we need to connect the flow tables from the previous priority (p0) to this new table. In addition when this flow table is destroyed (FT-B), we need to connect the flow tables from the previous priority (p0) to the next level flow table (FT-C) in the same priority of the destroyed table (if exists). --------- |root_ns| --------- | -------------------------------- | | | ---------- ---------- --------- |p(prio)-x| | p-y | | p-n | ---------- ---------- --------- | | ---------------- ------------------ |ns(e.g bypass)| |ns(e.g. kernel) | ---------------- ------------------ | | | ------- ------ ---- | p0 | | p1 | |p2| ------- ------ ---- | | \ -------- ------- ------ | FT-A | |FT-B | |FT-C| -------- ------- ------ Fixes: f90edfd279f3 ("net/mlx5_core: Connect flow tables") Signed-off-by: Maor Gottlieb Reviewed-by: Mark Bloch Signed-off-by: Saeed Mahameed Signed-off-by: Sasha Levin --- drivers/net/ethernet/mellanox/mlx5/core/fs_core.c | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) diff --git a/drivers/net/ethernet/mellanox/mlx5/core/fs_core.c b/drivers/net/ethernet/mellanox/mlx5/core/fs_core.c index 11e12761b0a6..739bf5dc5a25 100644 --- a/drivers/net/ethernet/mellanox/mlx5/core/fs_core.c +++ b/drivers/net/ethernet/mellanox/mlx5/core/fs_core.c @@ -968,17 +968,19 @@ static int connect_fwd_rules(struct mlx5_core_dev *dev, static int connect_flow_table(struct mlx5_core_dev *dev, struct mlx5_flow_table *ft, struct fs_prio *prio) { - struct mlx5_flow_table *next_ft; + struct mlx5_flow_table *next_ft, *first_ft; int err = 0; /* Connect_prev_fts and update_root_ft_create are mutually exclusive */ - if (list_empty(&prio->node.children)) { + first_ft = list_first_entry_or_null(&prio->node.children, + struct mlx5_flow_table, node.list); + if (!first_ft || first_ft->level > ft->level) { err = connect_prev_fts(dev, ft, prio); if (err) return err; - next_ft = find_next_chained_ft(prio); + next_ft = first_ft ? first_ft : find_next_chained_ft(prio); err = connect_fwd_rules(dev, ft, next_ft); if (err) return err; @@ -2026,7 +2028,7 @@ static int disconnect_flow_table(struct mlx5_flow_table *ft) node.list) == ft)) return 0; - next_ft = find_next_chained_ft(prio); + next_ft = find_next_ft(ft); err = connect_fwd_rules(dev, next_ft, ft); if (err) return err; -- 2.30.2