1. 13 12月, 2015 5 次提交
    • D
      e1000: fix data race between tx_ring->next_to_clean · 9eab46b7
      Dmitriy Vyukov 提交于
      e1000_clean_tx_irq cleans buffers and sets tx_ring->next_to_clean,
      then e1000_xmit_frame reuses the cleaned buffers. But there are no
      memory barriers when buffers gets recycled, so the recycled buffers
      can be corrupted.
      
      Use smp_store_release to update tx_ring->next_to_clean and
      smp_load_acquire to read tx_ring->next_to_clean to properly
      hand off buffers from e1000_clean_tx_irq to e1000_xmit_frame.
      
      The data race was found with KernelThreadSanitizer (KTSAN).
      Signed-off-by: NDmitry Vyukov <dvyukov@google.com>
      Tested-by: NAaron Brown <aaron.f.brown@intel.com>
      Signed-off-by: NJeff Kirsher <jeffrey.t.kirsher@intel.com>
      9eab46b7
    • T
      igb: add 88E1543 initialization code · 18f7ce54
      Todd Fujinaka 提交于
      Initialize the 88E1543 PHY.
      Signed-off-by: NTodd Fujinaka <todd.fujinaka@intel.com>
      Tested-by: NAaron Brown <aaron.f.brown@intel.com>
      Signed-off-by: NJeff Kirsher <jeffrey.t.kirsher@intel.com>
      18f7ce54
    • J
      e1000: make eeprom read/write scheduler friendly · e09b8906
      Joern Engel 提交于
      Code was responsible for ~150ms scheduler latencies.
      Signed-off-by: NJoern Engel <joern@logfs.org>
      Signed-off-by: NSpencer Baugh <sbaugh@catern.com>
      Tested-by: NAaron Brown <aaron.f.brown@intel.com>
      Signed-off-by: NJeff Kirsher <jeffrey.t.kirsher@intel.com>
      e09b8906
    • D
      Merge branch '10GbE' of git://git.kernel.org/pub/scm/linux/kernel/git/jkirsher/next-queue · 1d72135d
      David S. Miller 提交于
      Jeff Kirsher says:
      
      ====================
      10GbE Intel Wired LAN Driver Updates 2015-12-12
      
      This series contains updates to ixgbe only.
      
      Alex Duyck provides almost off of the changes in this series.  First, add a
      check to make sure mac_table was actually allocated and is not NULL to
      ensure we do not get a NULL pointer dereference further down the line.
      Fixed SR-IOV VLAN pool configuration since the code for checking the PF bit
      in ixgbe_set_vf_vlan_msg() was using the wrong offset.  Cleanup/simplify
      the logic for setting the VFTA register by removing the number of
      conditional checks needed.  Fixed a number of issues within the VLVF and
      VLFB configuration by simplifying the code.  Added support for bypassing
      the VLVF entry creation when the PF is adding a new VLAN.  Reduced the
      complexity of the search function used for finding a VLVF entry associated
      with a given VLAN ID.  Added support for VLAN promiscuous with SR-IOV
      enabled by setting all the bits in the VFTA and all of the VLVF bits
      associated with teh pool belonging to the PF, in addition to cleaning up
      those same bits in the event of promiscuous mode being disabled.  Fixed
      and issue where we ran the risk of leaking an address into pool 0 which
      really belongs to VF 0 when SR-IOV is enabled.
      
      Emil fixes an issue with some X550 devices which can connect at 2.5Gbps,
      but only with certain link partners during fail-over, so to avoid
      confusion, we do not report it as supported.
      ====================
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      1d72135d
    • D
      bpf, inode: allow for rename and link ops · bb35a6ef
      Daniel Borkmann 提交于
      Add support for renaming and hard links to the fs. Most of this can be
      implemented by using simple library operations under the same constraints
      that we don't use a reserved name like elsewhere. Linking can be useful
      to share/manage things like maps across subsystem users. It works within
      the file system boundary, but is not allowed for directories.
      
      Symbolic links are explicitly not implemented here, as it can be better
      done already by doing bind mounts inside bpf fs to set up shared directories
      f.e. useful when using volumes in docker containers that map a private
      working directory into /sys/fs/bpf/ which contains itself a bind mounted
      path from the host's /sys/fs/bpf/ mount that is shared among multiple
      containers. For single maps instead of whole directory, hard links can
      be easily used to do the same.
      Signed-off-by: NDaniel Borkmann <daniel@iogearbox.net>
      Acked-by: NAlexei Starovoitov <ast@kernel.org>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      bb35a6ef
  2. 12 12月, 2015 35 次提交