mbox series

[v2,net-next,0/7] Small tc-taprio improvements

Message ID 20220915105046.2404072-1-vladimir.oltean@nxp.com (mailing list archive)
Headers show
Series Small tc-taprio improvements | expand

Message

Vladimir Oltean Sept. 15, 2022, 10:50 a.m. UTC
This series contains:
- the proper protected variant of rcu_dereference() of admin and oper
  schedules for accesses from the slow path
- a removal of an extra function pointer indirection for
  qdisc->dequeue() and qdisc->peek()
- a removal of WARN_ON_ONCE() checks that can never trigger
- the addition of netlink extack messages to some qdisc->init() failures

These were split from an earlier patch set, hence the v2.

Vladimir Oltean (7):
  net/sched: taprio: taprio_offload_config_changed() is protected by
    rtnl_mutex
  net/sched: taprio: taprio_dump and taprio_change are protected by
    rtnl_mutex
  net/sched: taprio: use rtnl_dereference for oper and admin sched in
    taprio_destroy()
  net/sched: taprio: remove redundant FULL_OFFLOAD_IS_ENABLED check in
    taprio_enqueue
  net/sched: taprio: stop going through private ops for dequeue and peek
  net/sched: taprio: add extack messages in taprio_init
  net/sched: taprio: replace safety precautions with comments

 net/sched/sch_taprio.c | 112 +++++++++++++----------------------------
 1 file changed, 34 insertions(+), 78 deletions(-)

Comments

patchwork-bot+netdevbpf@kernel.org Sept. 20, 2022, 9:10 p.m. UTC | #1
Hello:

This series was applied to netdev/net-next.git (master)
by Jakub Kicinski <kuba@kernel.org>:

On Thu, 15 Sep 2022 13:50:39 +0300 you wrote:
> This series contains:
> - the proper protected variant of rcu_dereference() of admin and oper
>   schedules for accesses from the slow path
> - a removal of an extra function pointer indirection for
>   qdisc->dequeue() and qdisc->peek()
> - a removal of WARN_ON_ONCE() checks that can never trigger
> - the addition of netlink extack messages to some qdisc->init() failures
> 
> [...]

Here is the summary with links:
  - [v2,net-next,1/7] net/sched: taprio: taprio_offload_config_changed() is protected by rtnl_mutex
    https://git.kernel.org/netdev/net-next/c/c8cbe123be6d
  - [v2,net-next,2/7] net/sched: taprio: taprio_dump and taprio_change are protected by rtnl_mutex
    https://git.kernel.org/netdev/net-next/c/18cdd2f0998a
  - [v2,net-next,3/7] net/sched: taprio: use rtnl_dereference for oper and admin sched in taprio_destroy()
    https://git.kernel.org/netdev/net-next/c/9af23657b336
  - [v2,net-next,4/7] net/sched: taprio: remove redundant FULL_OFFLOAD_IS_ENABLED check in taprio_enqueue
    https://git.kernel.org/netdev/net-next/c/fa65edde5e49
  - [v2,net-next,5/7] net/sched: taprio: stop going through private ops for dequeue and peek
    https://git.kernel.org/netdev/net-next/c/25becba6290b
  - [v2,net-next,6/7] net/sched: taprio: add extack messages in taprio_init
    https://git.kernel.org/netdev/net-next/c/026de64d7bc3
  - [v2,net-next,7/7] net/sched: taprio: replace safety precautions with comments
    https://git.kernel.org/netdev/net-next/c/2c08a4f898d0

You are awesome, thank you!