Received: by 2002:a05:6512:3d0e:0:0:0:0 with SMTP id d14csp53927lfv; Tue, 12 Apr 2022 17:02:20 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxTn8f8igMempvPu0ULHuTcNGVWjyqIxxElnQL2+XGAnCZ+K3s2C3CrWt4UQpL+6po49EBb X-Received: by 2002:a63:4d14:0:b0:399:42b9:833c with SMTP id a20-20020a634d14000000b0039942b9833cmr33074945pgb.619.1649808139944; Tue, 12 Apr 2022 17:02:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1649808139; cv=none; d=google.com; s=arc-20160816; b=uMismdaphUBCDdc+DMgp0Nf2r8TCCogmf4dklxypXmpoW0l4GGEltmu14rirrnU59c YtF8B6tv6qkmpFT5CID6PnQmZVzpwDkdnTdW2rcM9wtkD4RYwmXpNrMd18UlsyRyg7K4 40iF6DlTAQIwfL/TnIhtyoacjzkg2m/Gue+Hs45ORKMPqCp2tTYIaQqE8zsV38O0QePr /5X4CHR1KKu2TFU8dTZHFp2ayfJNPyknq/gtYjK7WTm/QyJkjpASy2JaoAcGrsBWeE1w v9xlwvbk56UYPvCx7lzaLJHbvGJJH4Y1MicjCge+mm3Dnww6Az4StMzhdKKnhH5GnYU8 TxTg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=g/Fq/UZviQsuSNCmII2HxHW/sO0bgdYkFYmj0++onJ0=; b=WUQGVHMTVerZhML4oX35zrQutYhp1Kn1xTHAg3xh/lrhAGGPfoBT5bdDzQeE/xlcdO Qpw+HqwlmsLtO3HSR/1aF2+2FQBCDalgdcJ+/U+T00Re33ySqKPEgdZ3BPwl1om7Y671 O6vcfiGP8Bu+SWTrePNhF2i9EE6kvwT+7w8AYPwjXvm+iVaxs5vD7AZfmeNRQvSmIJgA PUepQP+rYq38hVzBJr0EeRJDTU29/hQEXFziBQ/OpLEUa/bWx3pPqp5603AG4XZ9n4xk oc00lw9e25vw7u8bG8Ubon2EHBezfrViVjDJf++7K62PIwc0hDn3xoo7OuJ2SkBUUDxg yvRg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=lHHewfDr; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id ng15-20020a17090b1a8f00b001cb1157100esi14214593pjb.137.2022.04.12.17.02.19 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 12 Apr 2022 17:02:19 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=lHHewfDr; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 479B4141D83; Tue, 12 Apr 2022 14:58:32 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1359324AbiDLHm4 (ORCPT + 99 others); Tue, 12 Apr 2022 03:42:56 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45850 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1353929AbiDLHQi (ORCPT ); Tue, 12 Apr 2022 03:16:38 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4A7054163A; Mon, 11 Apr 2022 23:57:46 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 08265B81B4D; Tue, 12 Apr 2022 06:57:45 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 53836C385A6; Tue, 12 Apr 2022 06:57:43 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1649746663; bh=lgUcYITpMGex2wAnB0nYe8kNOAaga6W8bzSe47I+6V8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=lHHewfDrow/lsj1fS/CQKdCROlzebgpkwIPzPEddyBKP7DrNIbtRrQUB6OXWLtam8 kwza93FuP1TzdeERQgiTnMOR000N5q4KhOcxa4pvtjBCzqgWNLsOEw/HiNOC2Y8xaY U1lxIGtzKnA2q5xLPZAOdO8GBRn21iCXnaI0ykhI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Colin Winegarden , Pavan Chebbi , Michael Chan , "David S. Miller" , Sasha Levin Subject: [PATCH 5.16 087/285] bnxt_en: Eliminate unintended link toggle during FW reset Date: Tue, 12 Apr 2022 08:29:04 +0200 Message-Id: <20220412062946.175237743@linuxfoundation.org> X-Mailer: git-send-email 2.35.1 In-Reply-To: <20220412062943.670770901@linuxfoundation.org> References: <20220412062943.670770901@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Michael Chan [ Upstream commit 7c492a2530c1f05441da541307c2534230dfd59b ] If the flow control settings have been changed, a subsequent FW reset may cause the ethernet link to toggle unnecessarily. This link toggle will increase the down time by a few seconds. The problem is caused by bnxt_update_phy_setting() detecting a false mismatch in the flow control settings between the stored software settings and the current FW settings after the FW reset. This mismatch is caused by the AUTONEG bit added to link_info->req_flow_ctrl in an inconsistent way in bnxt_set_pauseparam() in autoneg mode. The AUTONEG bit should not be added to link_info->req_flow_ctrl. Reviewed-by: Colin Winegarden Reviewed-by: Pavan Chebbi Signed-off-by: Michael Chan Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- drivers/net/ethernet/broadcom/bnxt/bnxt_ethtool.c | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/drivers/net/ethernet/broadcom/bnxt/bnxt_ethtool.c b/drivers/net/ethernet/broadcom/bnxt/bnxt_ethtool.c index f147ad5a6531..a47753a4498e 100644 --- a/drivers/net/ethernet/broadcom/bnxt/bnxt_ethtool.c +++ b/drivers/net/ethernet/broadcom/bnxt/bnxt_ethtool.c @@ -2076,9 +2076,7 @@ static int bnxt_set_pauseparam(struct net_device *dev, } link_info->autoneg |= BNXT_AUTONEG_FLOW_CTRL; - if (bp->hwrm_spec_code >= 0x10201) - link_info->req_flow_ctrl = - PORT_PHY_CFG_REQ_AUTO_PAUSE_AUTONEG_PAUSE; + link_info->req_flow_ctrl = 0; } else { /* when transition from auto pause to force pause, * force a link change -- 2.35.1