Bug 653991

Summary: [Broadcom 5.6 bug] bnx2i: add upstream bug fixes to 2.6.2.2
Product: Red Hat Enterprise Linux 5 Reporter: Michael Chan <mchan>
Component: kernelAssignee: Mike Christie <mchristi>
Status: CLOSED ERRATA QA Contact: Network QE <network-qe>
Severity: urgent Docs Contact:
Priority: high    
Version: 5.6CC: aaswath, andriusb, apevec, bdonahue, benlu, coughlan, cward, dyasny, eddie.wai, edwardn, emoryb, enarvaez, gideonn, hjia, jbroman, kzhang, niran, pbunyan, vbian
Target Milestone: rcKeywords: OtherQA
Target Release: 5.6   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: 568606 Environment:
Last Closed: 2011-01-13 22:01:19 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 568606    
Bug Blocks:    
Attachments:
Description Flags
BNX2I patch to fix an endian bug in the TMF cmd send routine
none
BNX2I patch to fix a chip resource issue
none
BNX2I patch to fix a TCP RST handling for 570X
none
BNX2I patch to fix a chip panic issue for 5771X none

Description Michael Chan 2010-11-16 15:21:42 UTC
+++ This bug was initially created as a clone of Bug #568606 +++

We are requesting a number of recent upstream bug fixes to be added to bnx2i (see below).  Some of these patches fix mutex deadlock, kernel panic, and bnx2x firmware panic issues.

BNX2I: Fixed the endian bug in the TMF LUN cmd send
BNX2I: Updated the handling of NETEVENTs to alleviate recovery
BNX2I: Modified the bnx2i stop path to compensate for in progress ops
BNX2I: Added code to handle the binding of an existing connection
BNX2I: Fixed the remote TCP RST handling for the 570X (1g)
BNX2I: Added mutex lock protection to conn_get_param
BNX2I: Removed the dynamic registration of CNIC
BNX2I: Fixed a cid leak issue for 5771X (10g)
BNX2I: Added return code check for chip kwqe submission request
BNX2I: Added feature to silently drop NOPOUT request
BNX2I: Cleaned up various error conditions in ep_connect/disconnect
BNX2I: Allow to abort the connection if connect request times out
BNX2I: Updated copyright and maintainer info
BNX2I: Updated version to 2.6.2.2

Comment 3 RHEL Program Management 2010-11-16 19:50:23 UTC
This request was evaluated by Red Hat Product Management for inclusion in a Red
Hat Enterprise Linux maintenance release.  Product Management has requested
further review of this request by Red Hat Engineering, for potential
inclusion in a Red Hat Enterprise Linux Update release for currently deployed
products.  This request is not yet committed for inclusion in an Update
release.

Comment 4 Eddie Wai 2010-11-23 23:37:33 UTC
The following 4 patches are the more critical patches that we recommend to be included for the next update of RHELS5.6 release:
BNX2I: Fixed the endian bug in the TMF LUN cmd send
BNX2I: Fixed a cid leak issue for 5771X (10g)
BNX2I: Fixed the remote TCP RST handling for the 570X (1g)
BNX2I: Allow to abort the connection if connect request times out

Please consider.  Thanks.

Comment 5 Eddie Wai 2010-11-23 23:39:40 UTC
Created attachment 462484 [details]
BNX2I patch to fix an endian bug in the TMF cmd send routine

Comment 6 Eddie Wai 2010-11-23 23:40:24 UTC
Created attachment 462485 [details]
BNX2I patch to fix a chip resource issue

Comment 7 Eddie Wai 2010-11-23 23:41:02 UTC
Created attachment 462486 [details]
BNX2I patch to fix a TCP RST handling for 570X

Comment 8 Eddie Wai 2010-11-23 23:41:43 UTC
Created attachment 462487 [details]
BNX2I patch to fix a chip panic issue for 5771X

Comment 13 Jarod Wilson 2010-12-02 15:15:58 UTC
in kernel-2.6.18-235.el5
You can download this test kernel (or newer) from http://people.redhat.com/jwilson/el5

Detailed testing feedback is always welcomed.

Comment 15 Hushan Jia 2010-12-23 08:30:49 UTC
@Broadcom,
Could you test this with 5.6 kernel at http://people.redhat.com/jwilson/el5, and post your testing feedback here?

Thanks.

Comment 17 errata-xmlrpc 2011-01-13 22:01:19 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on therefore solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2011-0017.html