Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp3698438pxv; Mon, 26 Jul 2021 09:39:48 -0700 (PDT) X-Google-Smtp-Source: ABdhPJycJ+AOotOAk3fqBx7Sy0khilvsj1VkaeAePIcNoRUATT4Xv8AKvU6h540Kopb8TnBvEkpf X-Received: by 2002:aa7:d514:: with SMTP id y20mr22791424edq.371.1627317510474; Mon, 26 Jul 2021 09:38:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627317510; cv=none; d=google.com; s=arc-20160816; b=e65s0y/6oCbYiYXSiU2tUaT6LfAkqJug7W0cWQe0Hll18PTQftLW26edlpBn9QnibT lZvpYsLrcwLgsHlwZ/n+6/7nU/Dx1j73B98Y2H3uFSliFC8dV3oPK75uDXnOjUyKZYva UTBUavANdK53mBegWwkXa5jUD8nDLwJ3GeW+XLy3pKVs5iM5GH3T6kmT5P4DfpC22g1F WjylSQb+joE8gKPh4b/O3HUv8L2vCThDXpiP6y+w5z+jSCMjRMiMfZsWc44emoXpLZ58 1v05Bed3Htj6mkmEEK7CkznL/y7wq8aNiN99+VpHowWQGIjA/a/vXBU7vMulkJcrsoyU UkYQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=1re3TAa842QOQCOif+XJ036jTqfGwwm2ZYu/uC9CiVE=; b=xa4SB/CHtgIJMVvUIPS4zMCuY6N8uPNriqD0qwK7GTccqly6lXQmwPWERui0J7WZHY Cb+yzEQm62ZWlQPPMTl+BplPcj0sviqGwmG45OcxUPyRJsffQZ5eX5fp30BaLj3ufl2u Olqqsu7LvCXMB1KNRRG9cwNmkzjBUFJHbSmLNG3z9SXjNmTUjorEaHYtw842x/ub8Q/1 jCAfnHHBrMLbTQL7woEMeSJbB63v0ByJp38EEERL5WoDNGR2i3gK11LmEtDpoRcrS8uB a/9t32j+XTY4MbA+JoIGKxJnPEBMu2qZjPngbc5kHzlN/wolK54Cb29V9XNGnqETLx1+ 1iMQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=xGUOBTmw; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id e10si484141edz.364.2021.07.26.09.38.07; Mon, 26 Jul 2021 09:38:30 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=xGUOBTmw; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239708AbhGZPyP (ORCPT + 99 others); Mon, 26 Jul 2021 11:54:15 -0400 Received: from mail.kernel.org ([198.145.29.99]:49678 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233965AbhGZPc6 (ORCPT ); Mon, 26 Jul 2021 11:32:58 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 3339A60F6F; Mon, 26 Jul 2021 16:13:26 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1627316006; bh=v5v+jA4duPhkghHHQHMCrHTgWjQ1dqMl1WJe76HfQ2E=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=xGUOBTmwmrNwtZuw45GeBifQdqy04fxNvr2FjSu11mwjVWbyC43beBC+JOZJMpbnB aGUltJz8ugFjoKJsBsby90C1liT0YzGLyeL7JI1LG0OI4sS6OoRfVMt/oRc50C3qnZ TUXCox+gPlklZnbpaG0lbR+2SYhH8pCdNHxRXSaY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Michael Chan , "David S. Miller" , Sasha Levin Subject: [PATCH 5.13 106/223] bnxt_en: Add missing check for BNXT_STATE_ABORT_ERR in bnxt_fw_rset_task() Date: Mon, 26 Jul 2021 17:38:18 +0200 Message-Id: <20210726153849.745612812@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210726153846.245305071@linuxfoundation.org> References: <20210726153846.245305071@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Michael Chan [ Upstream commit 6cd657cb3ee6f4de57e635b126ffbe0e51d00f1a ] In the BNXT_FW_RESET_STATE_POLL_VF state in bnxt_fw_reset_task() after all VFs have unregistered, we need to check for BNXT_STATE_ABORT_ERR after we acquire the rtnl_lock. If the flag is set, we need to abort. Fixes: 230d1f0de754 ("bnxt_en: Handle firmware reset.") Signed-off-by: Michael Chan Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- drivers/net/ethernet/broadcom/bnxt/bnxt.c | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/drivers/net/ethernet/broadcom/bnxt/bnxt.c b/drivers/net/ethernet/broadcom/bnxt/bnxt.c index d57fb1613cfc..07efab5bad95 100644 --- a/drivers/net/ethernet/broadcom/bnxt/bnxt.c +++ b/drivers/net/ethernet/broadcom/bnxt/bnxt.c @@ -11882,6 +11882,10 @@ static void bnxt_fw_reset_task(struct work_struct *work) } bp->fw_reset_timestamp = jiffies; rtnl_lock(); + if (test_bit(BNXT_STATE_ABORT_ERR, &bp->state)) { + rtnl_unlock(); + goto fw_reset_abort; + } bnxt_fw_reset_close(bp); if (bp->fw_cap & BNXT_FW_CAP_ERR_RECOVER_RELOAD) { bp->fw_reset_state = BNXT_FW_RESET_STATE_POLL_FW_DOWN; -- 2.30.2