Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp3026607ybt; Mon, 29 Jun 2020 13:15:40 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxCzgRxm5YbIzbxq0oB/thvH6199b9VkfmXcJ+PHJwMFVevTwg/+A4iV3+n+Gj79cXriP1I X-Received: by 2002:a17:906:5283:: with SMTP id c3mr14578619ejm.22.1593461740585; Mon, 29 Jun 2020 13:15:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1593461740; cv=none; d=google.com; s=arc-20160816; b=evaBvXBLhLtnWpfN707TtadNLZbg9mRmTaZT3XYN0+0s6gyPw6ElSisDZ6gNaw3pSI 2wCOS7JRyKb1K3STPCpfae+Yzod1Cp5TuShNRanwE9+sEEnIXuctZ1MfO+k0FZEZIOJq yzu8TT5F+lWIqHs3ITZxBS8Ti3MguS9b5ceJA6UYiPqesKYJJvTdKxI9rMQewGQbj56o 9ptwUUGZ1UdSTA5fi54sTescO6I0lDVUJYuBYMr2YQjyLa3/WI+ObFSID6LonexVS+fj EiOk//Qqg1N8fmHtf0IdX1cZJ99/UyFXbjbmZf73t8mh/bEqZ2qZKAQCKgZAnr13TY+/ erdA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=MQfmMp3epHfI1+/HvDN7MfUdW29fig3Zb+3hUFdvoXU=; b=g22dbbkfjQR8XFEKjAtribGTgH/ZSXrMEzp4QDJPoQMQtCZn1X1+cHnZSn8K5q+xqQ NpEBe77P3qhIftiZ7JqP0RbrXohGV+iVzC8axK1fkdDGhAc4vLScA/x21AongfwmlHoZ 2BYnXxh6iOyq/KKXJaWqm0aNjQHf9sijD3WzVw/gcKBHRiJlVQTlq2h8QTKQrsWKJ3YL NRgrarf0rX6ZsQ1ChabL4XfDZbQrJkaeLMq8vgYDbp1RK7twVlvZhQK2nybCsStkHhs/ 0vUmdWknLSBFhQdg2DyfYBePK0OwjlAeNyJ3g+clGXd2YXqWeZvi8QGt/PtK8+pqngYR iNag== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=n93e4sOX; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w13si385665ejj.564.2020.06.29.13.15.17; Mon, 29 Jun 2020 13:15:40 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=n93e4sOX; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731962AbgF2UNo (ORCPT + 99 others); Mon, 29 Jun 2020 16:13:44 -0400 Received: from mail.kernel.org ([198.145.29.99]:40572 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732852AbgF2TaT (ORCPT ); Mon, 29 Jun 2020 15:30:19 -0400 Received: from sasha-vm.mshome.net (c-73-47-72-35.hsd1.nh.comcast.net [73.47.72.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 2375F25204; Mon, 29 Jun 2020 15:35:20 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1593444920; bh=JdgE9rMJ+iZmziEXrJzS6vBXa57ZLQ+E+OmJdSTAQN0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=n93e4sOXGFObuuFWr/WBvrboeAD7Jg4dkqtVQmm8ZZ2Eux5fuIxRpEM9GQ20H8Ttv C/xCdYzMpcqRpNZ9ltXyEYoJXawII8ffMUo2mZcKzZvTwwYhbFI7VC011hGgTSGG/e fTTQD7IA6Ah838CM2ndmvRhXGyO6glmLzorV8gDw= From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Thomas Falcon , "David S . Miller" , Greg Kroah-Hartman Subject: [PATCH 4.19 017/131] ibmveth: Fix max MTU limit Date: Mon, 29 Jun 2020 11:33:08 -0400 Message-Id: <20200629153502.2494656-18-sashal@kernel.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200629153502.2494656-1-sashal@kernel.org> References: <20200629153502.2494656-1-sashal@kernel.org> MIME-Version: 1.0 X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.19.131-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-4.19.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 4.19.131-rc1 X-KernelTest-Deadline: 2020-07-01T15:34+00:00 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Thomas Falcon [ Upstream commit 5948378b26d89f8aa5eac37629dbd0616ce8d7a7 ] The max MTU limit defined for ibmveth is not accounting for virtual ethernet buffer overhead, which is twenty-two additional bytes set aside for the ethernet header and eight additional bytes of an opaque handle reserved for use by the hypervisor. Update the max MTU to reflect this overhead. Fixes: d894be57ca92 ("ethernet: use net core MTU range checking in more drivers") Fixes: 110447f8269a ("ethernet: fix min/max MTU typos") Signed-off-by: Thomas Falcon Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- drivers/net/ethernet/ibm/ibmveth.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/net/ethernet/ibm/ibmveth.c b/drivers/net/ethernet/ibm/ibmveth.c index 40ad1e5032553..e2f6670d6eaf0 100644 --- a/drivers/net/ethernet/ibm/ibmveth.c +++ b/drivers/net/ethernet/ibm/ibmveth.c @@ -1695,7 +1695,7 @@ static int ibmveth_probe(struct vio_dev *dev, const struct vio_device_id *id) } netdev->min_mtu = IBMVETH_MIN_MTU; - netdev->max_mtu = ETH_MAX_MTU; + netdev->max_mtu = ETH_MAX_MTU - IBMVETH_BUFF_OH; memcpy(netdev->dev_addr, mac_addr_p, ETH_ALEN); -- 2.25.1