<feed xmlns='http://www.w3.org/2005/Atom'>
<title>kernel/linux.git/drivers/net/ethernet, branch v4.14.85</title>
<subtitle>Linux kernel stable tree (mirror)</subtitle>
<id>https://git.radix-linux.su/kernel/linux.git/atom?h=v4.14.85</id>
<link rel='self' href='https://git.radix-linux.su/kernel/linux.git/atom?h=v4.14.85'/>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/'/>
<updated>2018-12-01T08:42:58+00:00</updated>
<entry>
<title>net/mlx4_core: Fix wrong calculation of free counters</title>
<updated>2018-12-01T08:42:58+00:00</updated>
<author>
<name>Eran Ben Elisha</name>
<email>eranbe@mellanox.com</email>
</author>
<published>2017-12-13T16:12:10+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=9d9cd2bcfc5298109bd90c52f239011337147812'/>
<id>urn:sha1:9d9cd2bcfc5298109bd90c52f239011337147812</id>
<content type='text'>
commit 0bb9fc4f5429ac970181c073aa32e521e20f7b73 upstream.

The field res_free indicates the total number of counters which are
available for allocation (reserved and unreserved). Fixed a bug where
the reserved counters were subtracted from res_free before any
allocation was performed.

Before this fix, free counters which were not reserved could not be
allocated.

Fixes: 9de92c60beaa ("net/mlx4_core: Adjust counter grant policy in the resource tracker")
Signed-off-by: Eran Ben Elisha &lt;eranbe@mellanox.com&gt;
Reviewed-by: Jack Morgenstein &lt;jackm@dev.mellanox.co.il&gt;
Signed-off-by: Tariq Toukan &lt;tariqt@mellanox.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Sudip Mukherjee &lt;sudipm.mukherjee@gmail.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</content>
</entry>
<entry>
<title>net: bcmgenet: fix OF child-node lookup</title>
<updated>2018-12-01T08:42:55+00:00</updated>
<author>
<name>Johan Hovold</name>
<email>johan@kernel.org</email>
</author>
<published>2018-08-27T08:21:50+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=6f95f0734968025278b6d8b4d0c589b7afeb9c96'/>
<id>urn:sha1:6f95f0734968025278b6d8b4d0c589b7afeb9c96</id>
<content type='text'>
[ Upstream commit d397dbe606120a1ea1b11b0020c3f7a3852da5ac ]

Use the new of_get_compatible_child() helper to lookup the mdio child
node instead of using of_find_compatible_node(), which searches the
entire tree from a given start node and thus can return an unrelated
(i.e. non-child) node.

This also addresses a potential use-after-free (e.g. after probe
deferral) as the tree-wide helper drops a reference to its first
argument (i.e. the node of the device being probed).

Fixes: aa09677cba42 ("net: bcmgenet: add MDIO routines")
Cc: stable &lt;stable@vger.kernel.org&gt;     # 3.15
Cc: David S. Miller &lt;davem@davemloft.net&gt;
Reviewed-by: Florian Fainelli &lt;f.fainelli@gmail.com&gt;
Signed-off-by: Johan Hovold &lt;johan@kernel.org&gt;
Signed-off-by: Rob Herring &lt;robh@kernel.org&gt;
Signed-off-by: Sasha Levin &lt;sashal@kernel.org&gt;
</content>
</entry>
<entry>
<title>net: stmmac: Fix RX packet size &gt; 8191</title>
<updated>2018-11-27T15:10:49+00:00</updated>
<author>
<name>Thor Thayer</name>
<email>thor.thayer@linux.intel.com</email>
</author>
<published>2018-11-08T17:42:14+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=47ff76ee9c9c938531ec97b7b4a74804a10f04fc'/>
<id>urn:sha1:47ff76ee9c9c938531ec97b7b4a74804a10f04fc</id>
<content type='text'>
[ Upstream commit 8137b6ef0ce469154e5cf19f8e7fe04d9a72ac5e ]

Ping problems with packets &gt; 8191 as shown:

PING 192.168.1.99 (192.168.1.99) 8150(8178) bytes of data.
8158 bytes from 192.168.1.99: icmp_seq=1 ttl=64 time=0.669 ms
wrong data byte 8144 should be 0xd0 but was 0x0
16    10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f
      20 21 22 23 24 25 26 27 28 29 2a 2b 2c 2d 2e 2f
%&lt; ---------------snip--------------------------------------
8112  b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf
      c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf
8144  0 0 0 0 d0 d1
      ^^^^^^^
Notice the 4 bytes of 0 before the expected byte of d0.

Databook notes that the RX buffer must be a multiple of 4/8/16
bytes [1].

Update the DMA Buffer size define to 8188 instead of 8192. Remove
the -1 from the RX buffer size allocations and use the new
DMA Buffer size directly.

[1] Synopsys DesignWare Cores Ethernet MAC Universal v3.70a
    [section 8.4.2 - Table 8-24]

Tested on SoCFPGA Stratix10 with ping sweep from 100 to 8300 byte packets.

Fixes: 286a83721720 ("stmmac: add CHAINED descriptor mode support (V4)")
Suggested-by: Jose Abreu &lt;jose.abreu@synopsys.com&gt;
Signed-off-by: Thor Thayer &lt;thor.thayer@linux.intel.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Sasha Levin &lt;sashal@kernel.org&gt;
</content>
</entry>
<entry>
<title>qed: Fix potential memory corruption</title>
<updated>2018-11-27T15:10:49+00:00</updated>
<author>
<name>Sagiv Ozeri</name>
<email>sagiv.ozeri@cavium.com</email>
</author>
<published>2018-11-08T14:46:11+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=fe2c4df2692de3c724ac8720d4479cbe16d89814'/>
<id>urn:sha1:fe2c4df2692de3c724ac8720d4479cbe16d89814</id>
<content type='text'>
[ Upstream commit fa5c448d98f0df660bfcad3dd5facc027ef84cd3 ]

A stuck ramrod should be deleted from the completion_pending list,
otherwise it will be added again in the future and corrupt the list.

Return error value to inform that ramrod is stuck and should be deleted.

Signed-off-by: Sagiv Ozeri &lt;sagiv.ozeri@cavium.com&gt;
Signed-off-by: Denis Bolotin &lt;denis.bolotin@cavium.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Sasha Levin &lt;sashal@kernel.org&gt;
</content>
</entry>
<entry>
<title>qed: Fix blocking/unlimited SPQ entries leak</title>
<updated>2018-11-27T15:10:49+00:00</updated>
<author>
<name>Denis Bolotin</name>
<email>denis.bolotin@cavium.com</email>
</author>
<published>2018-11-08T14:46:09+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=082810cb7f21c52dbe4c15f247e87ad22b88bbb8'/>
<id>urn:sha1:082810cb7f21c52dbe4c15f247e87ad22b88bbb8</id>
<content type='text'>
[ Upstream commit 2632f22ebd08da249c2017962a199a0cfb2324bf ]

When there are no SPQ entries left in the free_pool, new entries are
allocated and are added to the unlimited list. When an entry in the pool
is available, the content is copied from the original entry, and the new
entry is sent to the device. qed_spq_post() is not aware of that, so the
additional entry is stored in the original entry as p_post_ent, which can
later be returned to the pool.

Signed-off-by: Denis Bolotin &lt;denis.bolotin@cavium.com&gt;
Signed-off-by: Michal Kalderon &lt;michal.kalderon@cavium.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Sasha Levin &lt;sashal@kernel.org&gt;
</content>
</entry>
<entry>
<title>qed: Fix memory/entry leak in qed_init_sp_request()</title>
<updated>2018-11-27T15:10:49+00:00</updated>
<author>
<name>Denis Bolotin</name>
<email>denis.bolotin@cavium.com</email>
</author>
<published>2018-11-08T14:46:08+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=484ef227384f88c0b52e9dd43529eccf7c4025da'/>
<id>urn:sha1:484ef227384f88c0b52e9dd43529eccf7c4025da</id>
<content type='text'>
[ Upstream commit 39477551df940ddb1339203817de04f5caaacf7a ]

Free the allocated SPQ entry or return the acquired SPQ entry to the free
list in error flows.

Signed-off-by: Denis Bolotin &lt;denis.bolotin@cavium.com&gt;
Signed-off-by: Michal Kalderon &lt;michal.kalderon@cavium.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Sasha Levin &lt;sashal@kernel.org&gt;
</content>
</entry>
<entry>
<title>i40e: restore NETIF_F_GSO_IPXIP[46] to netdev features</title>
<updated>2018-11-27T15:10:49+00:00</updated>
<author>
<name>Jacob Keller</name>
<email>jacob.e.keller@intel.com</email>
</author>
<published>2018-10-29T17:52:42+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=eddf9365687f829beeca47a3d0cfcdf6252e46a1'/>
<id>urn:sha1:eddf9365687f829beeca47a3d0cfcdf6252e46a1</id>
<content type='text'>
[ Upstream commit ba766b8b99c30ad3c55ed8cf224d1185ecff1476 ]

Since commit bacd75cfac8a ("i40e/i40evf: Add capability exchange for
outer checksum", 2017-04-06) the i40e driver has not reported support
for IP-in-IP offloads. This likely occurred due to a bad rebase, as the
commit extracts hw_enc_features into its own variable. As part of this
change, it dropped the NETIF_F_FSO_IPXIP flags from the
netdev-&gt;hw_enc_features. This was unfortunately not caught during code
review.

Fix this by adding back the missing feature flags.

For reference, NETIF_F_GSO_IPXIP4 was added in commit 7e13318daa4a
("net: define gso types for IPx over IPv4 and IPv6", 2016-05-20),
replacing NETIF_F_GSO_IPIP and NETIF_F_GSO_SIT.

NETIF_F_GSO_IPXIP6 was added in commit bf2d1df39502 ("intel: Add support
for IPv6 IP-in-IP offload", 2016-05-20).

Signed-off-by: Jacob Keller &lt;jacob.e.keller@intel.com&gt;
Tested-by: Andrew Bowers &lt;andrewx.bowers@intel.com&gt;
Signed-off-by: Jeff Kirsher &lt;jeffrey.t.kirsher@intel.com&gt;
Signed-off-by: Sasha Levin &lt;sashal@kernel.org&gt;
</content>
</entry>
<entry>
<title>ixgbe: fix MAC anti-spoofing filter after VFLR</title>
<updated>2018-11-27T15:10:46+00:00</updated>
<author>
<name>Radoslaw Tyl</name>
<email>radoslawx.tyl@intel.com</email>
</author>
<published>2018-10-22T06:44:31+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=f54c21ee5dcede4164e8924a525d801f2fe855fd'/>
<id>urn:sha1:f54c21ee5dcede4164e8924a525d801f2fe855fd</id>
<content type='text'>
[ Upstream commit 6702185c1ffec3421181b5e24491e3fac920cb61 ]

This change resolves a driver bug where the driver is logging a
message that says "Spoofed packets detected". This can occur on the PF
(host) when a VF has VLAN+MACVLAN enabled and is re-started with a
different MAC address.

MAC and VLAN anti-spoofing filters are to be enabled together.

Signed-off-by: Radoslaw Tyl &lt;radoslawx.tyl@intel.com&gt;
Tested-by: Andrew Bowers &lt;andrewx.bowers@intel.com&gt;
Acked-by: Piotr Skajewski &lt;piotrx.skajewski@intel.com&gt;
Signed-off-by: Jeff Kirsher &lt;jeffrey.t.kirsher@intel.com&gt;
Signed-off-by: Sasha Levin &lt;sashal@kernel.org&gt;
</content>
</entry>
<entry>
<title>mlxsw: spectrum: Fix IP2ME CPU policer configuration</title>
<updated>2018-11-23T07:19:26+00:00</updated>
<author>
<name>Shalom Toledo</name>
<email>shalomt@mellanox.com</email>
</author>
<published>2018-11-02T19:49:15+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=1ada2e1b289f719ea2e6b0dc5331f6c40b0341a7'/>
<id>urn:sha1:1ada2e1b289f719ea2e6b0dc5331f6c40b0341a7</id>
<content type='text'>
[ Upstream commit 96801552f846460fe9ac10f1b189602992f004e1 ]

The CPU policer used to police packets being trapped via a local route
(IP2ME) was incorrectly configured to police based on bytes per second
instead of packets per second.

Change the policer to police based on packets per second and avoid
packet loss under certain circumstances.

Fixes: 9148e7cf73ce ("mlxsw: spectrum: Add policers for trap groups")
Signed-off-by: Shalom Toledo &lt;shalomt@mellanox.com&gt;
Signed-off-by: Ido Schimmel &lt;idosch@mellanox.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;
</content>
</entry>
<entry>
<title>net: qualcomm: rmnet: Fix incorrect assignment of real_dev</title>
<updated>2018-11-23T07:19:26+00:00</updated>
<author>
<name>Subash Abhinov Kasiviswanathan</name>
<email>subashab@codeaurora.org</email>
</author>
<published>2018-11-10T01:56:27+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=0ecbb0cff18453398b13de638fec1b82ad53e14a'/>
<id>urn:sha1:0ecbb0cff18453398b13de638fec1b82ad53e14a</id>
<content type='text'>
[ Upstream commit d02854dc1999ed3e7fd79ec700c64ac23ac0c458 ]

A null dereference was observed when a sysctl was being set
from userspace and rmnet was stuck trying to complete some actions
in the NETDEV_REGISTER callback. This is because the real_dev is set
only after the device registration handler completes.

sysctl call stack -

&lt;6&gt; Unable to handle kernel NULL pointer dereference at
    virtual address 00000108
&lt;2&gt; pc : rmnet_vnd_get_iflink+0x1c/0x28
&lt;2&gt; lr : dev_get_iflink+0x2c/0x40
&lt;2&gt;  rmnet_vnd_get_iflink+0x1c/0x28
&lt;2&gt;  inet6_fill_ifinfo+0x15c/0x234
&lt;2&gt;  inet6_ifinfo_notify+0x68/0xd4
&lt;2&gt;  ndisc_ifinfo_sysctl_change+0x1b8/0x234
&lt;2&gt;  proc_sys_call_handler+0xac/0x100
&lt;2&gt;  proc_sys_write+0x3c/0x4c
&lt;2&gt;  __vfs_write+0x54/0x14c
&lt;2&gt;  vfs_write+0xcc/0x188
&lt;2&gt;  SyS_write+0x60/0xc0
&lt;2&gt;  el0_svc_naked+0x34/0x38

device register call stack -

&lt;2&gt;  notifier_call_chain+0x84/0xbc
&lt;2&gt;  raw_notifier_call_chain+0x38/0x48
&lt;2&gt;  call_netdevice_notifiers_info+0x40/0x70
&lt;2&gt;  call_netdevice_notifiers+0x38/0x60
&lt;2&gt;  register_netdevice+0x29c/0x3d8
&lt;2&gt;  rmnet_vnd_newlink+0x68/0xe8
&lt;2&gt;  rmnet_newlink+0xa0/0x160
&lt;2&gt;  rtnl_newlink+0x57c/0x6c8
&lt;2&gt;  rtnetlink_rcv_msg+0x1dc/0x328
&lt;2&gt;  netlink_rcv_skb+0xac/0x118
&lt;2&gt;  rtnetlink_rcv+0x24/0x30
&lt;2&gt;  netlink_unicast+0x158/0x1f0
&lt;2&gt;  netlink_sendmsg+0x32c/0x338
&lt;2&gt;  sock_sendmsg+0x44/0x60
&lt;2&gt;  SyS_sendto+0x150/0x1ac
&lt;2&gt;  el0_svc_naked+0x34/0x38

Fixes: b752eff5be24 ("net: qualcomm: rmnet: Implement ndo_get_iflink")
Signed-off-by: Sean Tranchetti &lt;stranche@codeaurora.org&gt;
Signed-off-by: Subash Abhinov Kasiviswanathan &lt;subashab@codeaurora.org&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;
</content>
</entry>
</feed>
