From patchwork Mon Jan 28 13:56:23 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yishai Hadas X-Patchwork-Id: 10783705 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id B017091E for ; Mon, 28 Jan 2019 13:57:00 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 9EBFC2ADA3 for ; Mon, 28 Jan 2019 13:57:00 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 901962ADAB; Mon, 28 Jan 2019 13:57:00 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-7.9 required=2.0 tests=BAYES_00,MAILING_LIST_MULTI, RCVD_IN_DNSWL_HI,UNPARSEABLE_RELAY autolearn=ham version=3.3.1 Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 3536C2ADAB for ; Mon, 28 Jan 2019 13:57:00 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726744AbfA1N47 (ORCPT ); Mon, 28 Jan 2019 08:56:59 -0500 Received: from mail-il-dmz.mellanox.com ([193.47.165.129]:43500 "EHLO mellanox.co.il" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726647AbfA1N47 (ORCPT ); Mon, 28 Jan 2019 08:56:59 -0500 Received: from Internal Mail-Server by MTLPINE1 (envelope-from yishaih@mellanox.com) with ESMTPS (AES256-SHA encrypted); 28 Jan 2019 15:56:52 +0200 Received: from vnc17.mtl.labs.mlnx (vnc17.mtl.labs.mlnx [10.7.2.17]) by labmailer.mlnx (8.13.8/8.13.8) with ESMTP id x0SDupFH028040; Mon, 28 Jan 2019 15:56:51 +0200 Received: from vnc17.mtl.labs.mlnx (vnc17.mtl.labs.mlnx [127.0.0.1]) by vnc17.mtl.labs.mlnx (8.13.8/8.13.8) with ESMTP id x0SDupfl018418; Mon, 28 Jan 2019 15:56:51 +0200 Received: (from yishaih@localhost) by vnc17.mtl.labs.mlnx (8.13.8/8.13.8/Submit) id x0SDupvU018417; Mon, 28 Jan 2019 15:56:51 +0200 From: Yishai Hadas To: linux-rdma@vger.kernel.org Cc: yishaih@mellanox.com, danitg@mellanox.com, monis@mellanox.com, jgg@mellanox.com, majd@mellanox.com Subject: [PATCH rdma-core 0/4] rdmacm: Add option to set ACK timeout Date: Mon, 28 Jan 2019 15:56:23 +0200 Message-Id: <1548683787-18270-1-git-send-email-yishaih@mellanox.com> X-Mailer: git-send-email 1.8.2.3 Sender: linux-rdma-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-rdma@vger.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP This series from Danit adds a new option to rdma_set_option() that allows applications to override the RDMA-CM's QP ACK timeout value. Both the man page and ucmatose example code were updated to introduce this option. The matching kernel code was already sent into for-next. PR was sent: https://github.com/linux-rdma/rdma-core/pull/461 Danit Goldberg (3): rdmacm: Expand on optname in rdma_set_option man page rdmacm: Add option to set ACK timeout ucmatose: Add option to set ACK timeout Yishai Hadas (1): Update kernel headers kernel-headers/rdma/rdma_netlink.h | 17 ++--------------- kernel-headers/rdma/rdma_user_cm.h | 4 ++++ librdmacm/examples/cmatose.c | 24 ++++++++++++++++++++++-- librdmacm/man/rdma_set_option.3 | 16 ++++++++++++++++ librdmacm/man/ucmatose.1 | 8 ++++++-- librdmacm/rdma_cma.h | 4 ++++ 6 files changed, 54 insertions(+), 19 deletions(-)