From patchwork Sun Jul 18 19:36:24 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Michael Chan X-Patchwork-Id: 479784 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-14.1 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, INCLUDES_PATCH, MAILING_LIST_MULTI, MIME_HEADER_CTYPE_ONLY, MIME_NO_TEXT, SPF_HELO_NONE, SPF_PASS, T_TVD_MIME_NO_HEADERS, USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 1FE8BC636CA for ; Sun, 18 Jul 2021 19:36:51 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id E60E9611AB for ; Sun, 18 Jul 2021 19:36:50 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230225AbhGRTjs (ORCPT ); Sun, 18 Jul 2021 15:39:48 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33178 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229585AbhGRTjr (ORCPT ); Sun, 18 Jul 2021 15:39:47 -0400 Received: from mail-pg1-x52d.google.com (mail-pg1-x52d.google.com [IPv6:2607:f8b0:4864:20::52d]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B72BEC061762 for ; Sun, 18 Jul 2021 12:36:48 -0700 (PDT) Received: by mail-pg1-x52d.google.com with SMTP id 62so16684157pgf.1 for ; Sun, 18 Jul 2021 12:36:48 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=broadcom.com; s=google; h=from:to:cc:subject:date:message-id; bh=zvFqJiheYZM0wYQAJxsIO1/nIQ8GNvR84HlGFD9wv+Q=; b=A46L0NkkhLAi92T6waAKOgx5ltmu/SY7P46G0hQBK+C5tlQDP5kdWorhwjjtvSf/yL DKHH8BnV6hl0cOt0WkzspIM0lmReNuMkR4NHCLOL3B2CfhmMC+v3paj6Fu4XACJn0yw0 Hy67urt4a3sRLi1qRFoHXs4Vch4Ze1iSI5KQY= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id; bh=zvFqJiheYZM0wYQAJxsIO1/nIQ8GNvR84HlGFD9wv+Q=; b=bbucfiPVb+MIAcYwvYCwH4AgKpzaIrDPONvPnB3paH1t0Fe8ankDsumcKQjkCks4N2 M4szxM74lpqwXCafd/YhvzdYQJoDyM1P4uDh3ouTFaGul2AUUUWTgEkJ1Ft9B1HF1s9j LM7QUCGvT1bc7Y3q92JLjKcoEf4amnwPmATzTZIJkB9upGx8+lvXaxjhRqSxj5mTrn01 n/nczfF4kj/mWxnA8bzM/tYUUZu9p/NOBfg8xn+9ioQomISWkrkwoprrS1xT/IkV0MF8 m3BQXil21eytU4TpTEs0qMRbnVHV9KlMhnydFwSDGs3MoWzT/EDAbEPCj/Q4A/z+ylGG y4LQ== X-Gm-Message-State: AOAM5304IreprIyCPyyvdgAv7kMf3LOz/reRxwrf1emWb4yKNIj0e9l1 BHNvY6w4iMiaCSHa4EAYgkJuOw== X-Google-Smtp-Source: ABdhPJxH034z8Lwuv/JpFcNWXB5okj70V9UciDzEpTX0vW7oqQMUmxtsIJOhqsrXMZnrvTGyn/EhoQ== X-Received: by 2002:a62:5285:0:b029:2e9:e0d5:67dc with SMTP id g127-20020a6252850000b02902e9e0d567dcmr22286951pfb.79.1626637007876; Sun, 18 Jul 2021 12:36:47 -0700 (PDT) Received: from localhost.swdvt.lab.broadcom.net ([192.19.223.252]) by smtp.gmail.com with ESMTPSA id 22sm16743648pfo.80.2021.07.18.12.36.46 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Sun, 18 Jul 2021 12:36:47 -0700 (PDT) From: Michael Chan To: davem@davemloft.net Cc: netdev@vger.kernel.org, kuba@kernel.org, gospo@broadcom.com Subject: [PATCH net 0/9] bnxt_en: Bug fixes Date: Sun, 18 Jul 2021 15:36:24 -0400 Message-Id: <1626636993-31926-1-git-send-email-michael.chan@broadcom.com> X-Mailer: git-send-email 1.8.3.1 Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org Most of the fixes in this series have to do with error recovery. They include error path handling when the error recovery has to abort, and the rediscovery of capabilities (PTP and RoCE) after firmware reset that may result in capability changes. Two other fixes are to reject invalid ETS settings and to validate VLAN protocol in the RX path. Edwin Peer (1): bnxt_en: reject ETS settings that will starve a TC Kalesh AP (1): bnxt_en: don't disable an already disabled PCI device Michael Chan (5): bnxt_en: Refresh RoCE capabilities in bnxt_ulp_probe() bnxt_en: Add missing check for BNXT_STATE_ABORT_ERR in bnxt_fw_rset_task() bnxt_en: Validate vlan protocol ID on RX packets bnxt_en: Move bnxt_ptp_init() to bnxt_open() bnxt_en: Fix PTP capability discovery Somnath Kotur (2): bnxt_en: fix error path of FW reset bnxt_en: Check abort error state in bnxt_half_open_nic() drivers/net/ethernet/broadcom/bnxt/bnxt.c | 85 ++++++++++++++----- drivers/net/ethernet/broadcom/bnxt/bnxt_dcb.c | 10 ++- drivers/net/ethernet/broadcom/bnxt/bnxt_ptp.c | 24 ++---- drivers/net/ethernet/broadcom/bnxt/bnxt_ptp.h | 1 - drivers/net/ethernet/broadcom/bnxt/bnxt_ulp.c | 9 +- 5 files changed, 83 insertions(+), 46 deletions(-)