Received: by 2002:ac0:946b:0:0:0:0:0 with SMTP id j40csp2649563imj; Mon, 11 Feb 2019 06:27:54 -0800 (PST) X-Google-Smtp-Source: AHgI3IailzLoZyaOWkSi7xz9KOOgSE62lfeuxQZhVWkcoQs5ajX1cbBMPfipCBptwuaheH4pqelb X-Received: by 2002:a65:6242:: with SMTP id q2mr33988992pgv.245.1549895274289; Mon, 11 Feb 2019 06:27:54 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1549895274; cv=none; d=google.com; s=arc-20160816; b=BWho5SvxqKiMlOpTD0dv5l4jxF8p8HKzIUFjsM6J7lnPyQ2O82yJTCPsiexzc9bvUp /2Pqcr50x2NaXcgv4agqVRzrMYCzlDvaMQcz/DUD1yO8zTKUmD/SEqMJQZzvHjzLYlvl JYxMe+QZ+0YTnAwv3CQysbo3E2thIXGvD2HG2PshsdhQUkdrb0xIUcCguRzgPj1LOHS0 MSIp4k/7Ixmrf4V08LZ2eS8ek/Vk5shS72Qr/6I9yWmblm5DUokfleAoLH2Ww12Cg70F O7li8K9rodhRZBr1g9bLceFKLW7wXjp3Snx4uL5bNwOlj7iJ8lpWi4Lyyvd2hDsjlkuE q79Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=cEgLS6uv7vWn0gGDhc3dJIxHkfr6i6Ps7kjQtWdYbDM=; b=b78Y6gOqIz+MBPhMpgZt5LiLacPzWaTd9zeWr5sHHf0yyXpoUg3swWAs70Tx0lvp2f SUrwLqPxHkoYmf24NuTk+88Bfqk6O+rz7qlXIAL0tFJ9elMIxv69QWp/fLilVOFWIeiD cldPOtTYnmORUg0PF5dffVQKHYMShKO5pt+Xka9+YcYhMW1xPLaZ+E2a7UEkfi9ULhrO qYPNLJ/VCLOKMLjORII7j1bwkhUnlhoe/QPKabTvMfr3QJi7KNlqa+OeDHwo5mb3mBXZ vNpVIyf9cl8+zbP5xGeJmGTqCUDc89rMjM8ABX7b0EirakAeAuTlF/Z72b4DIu9aPxu0 rxNQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=qBo2KF6e; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k16si4411806pls.124.2019.02.11.06.27.38; Mon, 11 Feb 2019 06:27:54 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=qBo2KF6e; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728814AbfBKOWj (ORCPT + 99 others); Mon, 11 Feb 2019 09:22:39 -0500 Received: from mail.kernel.org ([198.145.29.99]:55590 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728788AbfBKOWh (ORCPT ); Mon, 11 Feb 2019 09:22:37 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 284E920838; Mon, 11 Feb 2019 14:22:36 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1549894956; bh=nwe5s4NRFI2SssgFOqe+xo4uBmd8N0lfiYXW80rFqxs=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=qBo2KF6eYEZNpNXM44MnxihAd6loNm6u7tqQCCz1ubUpa/B+AYaAX6IlQm8liwamd JVn6NgKKJeUuGPKeoejpHeM1pU1WTODoWqCXY4Qf9vdI+IxOqBsEXVoRVVZWbiSyXE VeUbjsZxj5OMQZV/yTgaDXuZpHjiE5kvo28tqnFY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Mitch Williams , Andrew Bowers , Jeff Kirsher , Sasha Levin Subject: [PATCH 4.20 042/352] i40e: suppress bogus error message Date: Mon, 11 Feb 2019 15:14:29 +0100 Message-Id: <20190211141848.983190844@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190211141846.543045703@linuxfoundation.org> References: <20190211141846.543045703@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.20-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit 7cd8eb0861981ad212ce4242a1870c4b5831ceff ] The i40e driver complains about unprivileged VFs trying to configure promiscuous mode each time a VF reset occurs. This isn't the fault of the poor VF driver - the PF driver itself is making the request. To fix this, skip the privilege check if the request is to disable all promiscuous activity. This gets rid of the bogus message, but doesn't affect privilege checks, since we really only care if the unprivileged VF is trying to enable promiscuous mode. Signed-off-by: Mitch Williams Tested-by: Andrew Bowers Signed-off-by: Jeff Kirsher Signed-off-by: Sasha Levin --- drivers/net/ethernet/intel/i40e/i40e_virtchnl_pf.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/drivers/net/ethernet/intel/i40e/i40e_virtchnl_pf.c b/drivers/net/ethernet/intel/i40e/i40e_virtchnl_pf.c index ac5698ed0b11..c41e8ada23d1 100644 --- a/drivers/net/ethernet/intel/i40e/i40e_virtchnl_pf.c +++ b/drivers/net/ethernet/intel/i40e/i40e_virtchnl_pf.c @@ -1112,7 +1112,8 @@ static i40e_status i40e_config_vf_promiscuous_mode(struct i40e_vf *vf, if (!i40e_vc_isvalid_vsi_id(vf, vsi_id) || !vsi) return I40E_ERR_PARAM; - if (!test_bit(I40E_VIRTCHNL_VF_CAP_PRIVILEGE, &vf->vf_caps)) { + if (!test_bit(I40E_VIRTCHNL_VF_CAP_PRIVILEGE, &vf->vf_caps) && + (allmulti || alluni)) { dev_err(&pf->pdev->dev, "Unprivileged VF %d is attempting to configure promiscuous mode\n", vf->vf_id); -- 2.19.1