Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp3075764ybt; Mon, 29 Jun 2020 14:40:49 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzbGNdLipHUYGkaJyrGNu03GdeLSSJRewaHS6bxD6vtERESlXg0sK7xqgpFRO/69efViyo0 X-Received: by 2002:a17:906:4d4c:: with SMTP id b12mr15277143ejv.506.1593466849521; Mon, 29 Jun 2020 14:40:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1593466849; cv=none; d=google.com; s=arc-20160816; b=A0Inio+pdEqa6+VGnZOkmmTwy2s0AIK2m2e21WBxDWYOrMX5/BdqIHMB3QDwezYrHW g+bHkAJRH6aNlKkn/6VcD0d2zXQjeZ+8NqzYwnxbOZc9AFOqY14NMbbBNeSelM23BMzI uYCk2THwHn8ynBB4PoqVskFE7rBdsLAZhhchrE/UpG9YEL8x7e/5+DwtRxYVoZA0Fiok pNeyT2UdDHASfj3iizCNPbLd4e8jkqkX0o8t1Fx1QpddfHUFEyji5O1coCIy9xBjZ3D1 5uqCfcyY/NPWKfgpKS3tRDG4KzqgAYAkNMUSQKWk8ahLDBgAqqKrIwi5DUmQAU2rtldJ CymA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=kmH0Kd0X9+5oRPTWZBYf3CwX1gsc53CzWtRKrY/GO0E=; b=AS4JIjfMYtOU7eY56oNdYh/XthzZIIYVnCr45ruGMYSS5G8vbWhzRTbHPvYinx4sE7 ctTVsToqTKU4Ynuara1CB3hbSUmsbf9D92Q3ShmHs7C5n9UhGE0izIWSshqcstYHsSpM R9S1luShYEq/1lueC1XI8uK5kpoLh49GGQV2cb1FI1MjEPdAyYeDB7koWrcDHvpS6TR1 xb3OcSLlsqi7UK2Pc6OILkEputgIHWO9XEKC6vUwgDevilhUGNX/d8chJcLK6mpdskIB JvJbjvSULFE17VONrp48hEQkK8EmpP4gb5yatpjd0pFOPzJrbrmrZzyaFNpxXtlD60wh jgqw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=CtHRuCCP; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r1si447589edw.10.2020.06.29.14.40.26; Mon, 29 Jun 2020 14:40:49 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=CtHRuCCP; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388403AbgF2VkA (ORCPT + 99 others); Mon, 29 Jun 2020 17:40:00 -0400 Received: from mail.kernel.org ([198.145.29.99]:60646 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728307AbgF2Sk3 (ORCPT ); Mon, 29 Jun 2020 14:40:29 -0400 Received: from sasha-vm.mshome.net (c-73-47-72-35.hsd1.nh.comcast.net [73.47.72.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id CA8E923EF2; Mon, 29 Jun 2020 15:18:25 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1593443906; bh=PPeWyYS4FCFQJSFCRFag4CcXyIoAO/wk/iRh2ObDfuA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=CtHRuCCP3jaIG/tWjp4XvAH9i7bhSO2/CtnEBcXYshvbrK26DiNdva4YOpbU8c98k mSloObqj4X0A8I+M6PA/KH304lnHTs0EdX9vMxslDr/t7xmZiRUtEqww3kzImhKilV XdvlBRfa0n05nLI2FapFEaCXqgXC35fBHFQ1kuuE= From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Thomas Falcon , "David S . Miller" , Greg Kroah-Hartman Subject: [PATCH 5.7 006/265] ibmveth: Fix max MTU limit Date: Mon, 29 Jun 2020 11:13:59 -0400 Message-Id: <20200629151818.2493727-7-sashal@kernel.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200629151818.2493727-1-sashal@kernel.org> References: <20200629151818.2493727-1-sashal@kernel.org> MIME-Version: 1.0 X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.7.7-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-5.7.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 5.7.7-rc1 X-KernelTest-Deadline: 2020-07-01T15:14+00:00 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Thomas Falcon [ Upstream commit 5948378b26d89f8aa5eac37629dbd0616ce8d7a7 ] The max MTU limit defined for ibmveth is not accounting for virtual ethernet buffer overhead, which is twenty-two additional bytes set aside for the ethernet header and eight additional bytes of an opaque handle reserved for use by the hypervisor. Update the max MTU to reflect this overhead. Fixes: d894be57ca92 ("ethernet: use net core MTU range checking in more drivers") Fixes: 110447f8269a ("ethernet: fix min/max MTU typos") Signed-off-by: Thomas Falcon Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- drivers/net/ethernet/ibm/ibmveth.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/net/ethernet/ibm/ibmveth.c b/drivers/net/ethernet/ibm/ibmveth.c index 96d36ae5049e1..c5c732601e35e 100644 --- a/drivers/net/ethernet/ibm/ibmveth.c +++ b/drivers/net/ethernet/ibm/ibmveth.c @@ -1715,7 +1715,7 @@ static int ibmveth_probe(struct vio_dev *dev, const struct vio_device_id *id) } netdev->min_mtu = IBMVETH_MIN_MTU; - netdev->max_mtu = ETH_MAX_MTU; + netdev->max_mtu = ETH_MAX_MTU - IBMVETH_BUFF_OH; memcpy(netdev->dev_addr, mac_addr_p, ETH_ALEN); -- 2.25.1