summaryrefslogtreecommitdiff
path: root/arch/arm64
diff options
context:
space:
mode:
authorJacob Keller <jacob.e.keller@intel.com>2015-06-24 20:34:48 (GMT)
committerJeff Kirsher <jeffrey.t.kirsher@intel.com>2015-09-16 00:06:14 (GMT)
commit95f4f8da644256d8c0ff5bab2c93ba33d2a42cd8 (patch)
tree18900c1a9ef6f58afcde8854ba8dec4883b010e0 /arch/arm64
parent5c2d642fd0cf0f4f7396dfd3754bc03f6e50e359 (diff)
downloadlinux-95f4f8da644256d8c0ff5bab2c93ba33d2a42cd8.tar.xz
fm10k: re-enable VF after a full reset on detection of a Malicious event
Modify behavior of Malicious Driver Detection events. Presently, the hardware disables the VF queues and re-assigns them to the PF. This causes the VF in question to continuously Tx hang, because it assumes that it can transmit over the queues in question. For transient events, this results in continuous logging of malicious events. New behavior is to reset the LPORT and VF state, so that the VF will have to reset and re-enable itself. This does mean that malicious VFs will possibly be able to continue and attempt malicious events again. However, it is expected that system administrators will step in and manually remove or disable the VF in question. Signed-off-by: Jacob Keller <jacob.e.keller@intel.com> Tested-by: Krishneil Singh <krishneil.k.singh@intel.com> Signed-off-by: Jeff Kirsher <jeffrey.t.kirsher@intel.com>
Diffstat (limited to 'arch/arm64')
0 files changed, 0 insertions, 0 deletions