Received: by 2002:a05:6512:3d0e:0:0:0:0 with SMTP id d14csp12744lfv; Tue, 12 Apr 2022 15:15:19 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyInDuBNKYZynHM8bDy7CtfwdOEsZSV/RPXLcTXPKeyW5c6GOp5SDU0RSFY085GSsvEU3tp X-Received: by 2002:a17:902:b703:b0:158:2667:7447 with SMTP id d3-20020a170902b70300b0015826677447mr22083937pls.92.1649801719485; Tue, 12 Apr 2022 15:15:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1649801719; cv=none; d=google.com; s=arc-20160816; b=lUG7SuLk29YczBsB6+Y3VeqmAgXUjITHckWmF+vqM4horVvBuCRjthECqpx6UlNKIg XN3ryTBbh4Jnl9Slc3wL5jK8Ul3+Vg3vsOiwgrbUwSVWQu7776AdZJyZGaObNhcF0mpL t6lVUbIwzB1CbfcUxiwSnrKDsWEn6w5Cen25lON2lGvnugN8dzU+1V9wLCbhD8DmCEYW cJLlcD+ajcYnmbVNbieeCeuhoK9CiGAMIkJ8XeVpuWcWBhvAdfGFWb+BZVa4n0s3Py4s qRzsL+keQXDK+cN3D0vxzEMzA6ML8+VLZoIyFldL8HOmkVGQIscRi+ZyQoy9hU3eOM8R 9TbA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=CI/supGVxEWMyhUXNHAcGDlAX2GlLgQ43ophBjewddA=; b=yxmRA64iJrHkAkfSOGFZA++W8RCG2IW/ANGaEsLUQM+4UGTeRqMy2SvhifaMDP0apT fWjODQTdQwizJidCDGoyHdBR8ireVCPP972I8iVBW6ogoSGusMO/t09UPSTryVClJ8XQ ODUR7vSYyfS6R+IbALeBq9FZpXRjoyuXx0hXoTzboAXbU90X5cTkHVQO1TvDiMirFP+O x7y9xwCJoBhmYOPrNB1yWsNKen8cTjgmX+xOQ8CyvnmjtzSnnr7AIyY2vipMs+NcEEmU fCYieq6bJ4T8yKNequAgm2G2yo2CKurkKybJGgt2sw42hdlgBLce9xZgbcPnWnam5v6J UFXQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=hxvQdhOo; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id cp6-20020a056a00348600b0050608866df1si365171pfb.109.2022.04.12.15.15.19 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 12 Apr 2022 15:15:19 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=hxvQdhOo; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id A43B27E0BE; Tue, 12 Apr 2022 13:57:14 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235645AbiDLLwO (ORCPT + 99 others); Tue, 12 Apr 2022 07:52:14 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38382 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1348586AbiDLLrm (ORCPT ); Tue, 12 Apr 2022 07:47:42 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 2847E57486 for ; Tue, 12 Apr 2022 03:28:10 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1649759289; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=CI/supGVxEWMyhUXNHAcGDlAX2GlLgQ43ophBjewddA=; b=hxvQdhOodtmwacjHrl6XFueSx6u0sefoU/GHvGSaBwXoDkJHt0i1ICqFIzEQLxMfwSlCx0 qexjXvHp7Zi/3zVTMXSDGDPh74i4TvF+5yCVZPSP00ZzCiP+8IymdUcM+2MtiH1qZo7Y+h ZxHpYYhjtpEtMIgBYDMS1gYbrqpmhs0= Received: from mimecast-mx02.redhat.com (mx3-rdu2.redhat.com [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-259-7ujAnAPBPiaVaavGGEhO7Q-1; Tue, 12 Apr 2022 06:28:07 -0400 X-MC-Unique: 7ujAnAPBPiaVaavGGEhO7Q-1 Received: from smtp.corp.redhat.com (int-mx07.intmail.prod.int.rdu2.redhat.com [10.11.54.7]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id AD06D3804091; Tue, 12 Apr 2022 10:28:06 +0000 (UTC) Received: from horn.redhat.com (unknown [10.40.193.222]) by smtp.corp.redhat.com (Postfix) with ESMTP id ABA94145BA42; Tue, 12 Apr 2022 10:28:04 +0000 (UTC) From: Petr Oros To: netdev@vger.kernel.org Cc: jesse.brandeburg@intel.com, anthony.l.nguyen@intel.com, davem@davemloft.net, kuba@kernel.org, pabeni@redhat.com, jacob.e.keller@intel.com, intel-wired-lan@lists.osuosl.org, linux-kernel@vger.kernel.org, ivecera@redhat.com Subject: [PATCH] ice: wait for EMP reset after firmware flash Date: Tue, 12 Apr 2022 12:27:53 +0200 Message-Id: <20220412102753.670867-1-poros@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.85 on 10.11.54.7 X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org We need to wait for EMP reset after firmware flash. Code was extracted from OOT driver and without this wait fw_activate let card in inconsistent state recoverable only by second flash/activate Reproducer: [root@host ~]# devlink dev flash pci/0000:ca:00.0 file E810_XXVDA4_FH_O_SEC_FW_1p6p1p9_NVM_3p10_PLDMoMCTP_0.11_8000AD7B.bin Preparing to flash [fw.mgmt] Erasing [fw.mgmt] Erasing done [fw.mgmt] Flashing 100% [fw.mgmt] Flashing done 100% [fw.undi] Erasing [fw.undi] Erasing done [fw.undi] Flashing 100% [fw.undi] Flashing done 100% [fw.netlist] Erasing [fw.netlist] Erasing done [fw.netlist] Flashing 100% [fw.netlist] Flashing done 100% Activate new firmware by devlink reload [root@host ~]# devlink dev reload pci/0000:ca:00.0 action fw_activate reload_actions_performed: fw_activate [root@host ~]# ip link show ens7f0 71: ens7f0: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether b4:96:91:dc:72:e0 brd ff:ff:ff:ff:ff:ff altname enp202s0f0 dmesg after flash: [ 55.120788] ice: Copyright (c) 2018, Intel Corporation. [ 55.274734] ice 0000:ca:00.0: Get PHY capabilities failed status = -5, continuing anyway [ 55.569797] ice 0000:ca:00.0: The DDP package was successfully loaded: ICE OS Default Package version 1.3.28.0 [ 55.603629] ice 0000:ca:00.0: Get PHY capability failed. [ 55.608951] ice 0000:ca:00.0: ice_init_nvm_phy_type failed: -5 [ 55.647348] ice 0000:ca:00.0: PTP init successful [ 55.675536] ice 0000:ca:00.0: DCB is enabled in the hardware, max number of TCs supported on this port are 8 [ 55.685365] ice 0000:ca:00.0: FW LLDP is disabled, DCBx/LLDP in SW mode. [ 55.692179] ice 0000:ca:00.0: Commit DCB Configuration to the hardware [ 55.701382] ice 0000:ca:00.0: 126.024 Gb/s available PCIe bandwidth, limited by 16.0 GT/s PCIe x8 link at 0000:c9:02.0 (capable of 252.048 Gb/s with 16.0 GT/s PCIe x16 link) Reboot don't help, only second flash/activate with OOT or patched driver put card back in consistent state After patch: [root@host ~]# devlink dev flash pci/0000:ca:00.0 file E810_XXVDA4_FH_O_SEC_FW_1p6p1p9_NVM_3p10_PLDMoMCTP_0.11_8000AD7B.bin Preparing to flash [fw.mgmt] Erasing [fw.mgmt] Erasing done [fw.mgmt] Flashing 100% [fw.mgmt] Flashing done 100% [fw.undi] Erasing [fw.undi] Erasing done [fw.undi] Flashing 100% [fw.undi] Flashing done 100% [fw.netlist] Erasing [fw.netlist] Erasing done [fw.netlist] Flashing 100% [fw.netlist] Flashing done 100% Activate new firmware by devlink reload [root@host ~]# devlink dev reload pci/0000:ca:00.0 action fw_activate reload_actions_performed: fw_activate [root@host ~]# ip link show ens7f0 19: ens7f0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000 link/ether b4:96:91:dc:72:e0 brd ff:ff:ff:ff:ff:ff altname enp202s0f0 Fixes: 399e27dbbd9e94 ("ice: support immediate firmware activation via devlink reload") Signed-off-by: Petr Oros --- drivers/net/ethernet/intel/ice/ice_main.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/drivers/net/ethernet/intel/ice/ice_main.c b/drivers/net/ethernet/intel/ice/ice_main.c index d768925785ca79..90ea2203cdc763 100644 --- a/drivers/net/ethernet/intel/ice/ice_main.c +++ b/drivers/net/ethernet/intel/ice/ice_main.c @@ -6931,12 +6931,15 @@ static void ice_rebuild(struct ice_pf *pf, enum ice_reset_req reset_type) dev_dbg(dev, "rebuilding PF after reset_type=%d\n", reset_type); +#define ICE_EMP_RESET_SLEEP 5000 if (reset_type == ICE_RESET_EMPR) { /* If an EMP reset has occurred, any previously pending flash * update will have completed. We no longer know whether or * not the NVM update EMP reset is restricted. */ pf->fw_emp_reset_disabled = false; + + msleep(ICE_EMP_RESET_SLEEP); } err = ice_init_all_ctrlq(hw); -- 2.35.1