Bug 653991 - [Broadcom 5.6 bug] bnx2i: add upstream bug fixes to 2.6.2.2
Summary: [Broadcom 5.6 bug] bnx2i: add upstream bug fixes to 2.6.2.2
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 5
Classification: Red Hat
Component: kernel
Version: 5.6
Hardware: All
OS: Linux
high
urgent
Target Milestone: rc
: 5.6
Assignee: Mike Christie
QA Contact: Network QE
URL:
Whiteboard:
Depends On: 568606
Blocks:
TreeView+ depends on / blocked
 
Reported: 2010-11-16 15:21 UTC by Michael Chan
Modified: 2011-01-13 22:01 UTC (History)
19 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of: 568606
Environment:
Last Closed: 2011-01-13 22:01:19 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)
BNX2I patch to fix an endian bug in the TMF cmd send routine (1.38 KB, patch)
2010-11-23 23:39 UTC, Eddie Wai
no flags Details | Diff
BNX2I patch to fix a chip resource issue (2.17 KB, patch)
2010-11-23 23:40 UTC, Eddie Wai
no flags Details | Diff
BNX2I patch to fix a TCP RST handling for 570X (2.01 KB, patch)
2010-11-23 23:41 UTC, Eddie Wai
no flags Details | Diff
BNX2I patch to fix a chip panic issue for 5771X (1.36 KB, patch)
2010-11-23 23:41 UTC, Eddie Wai
no flags Details | Diff


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2011:0017 0 normal SHIPPED_LIVE Important: Red Hat Enterprise Linux 5.6 kernel security and bug fix update 2011-01-13 10:37:42 UTC

Description Michael Chan 2010-11-16 15:21:42 UTC
+++ This bug was initially created as a clone of Bug #568606 +++

We are requesting a number of recent upstream bug fixes to be added to bnx2i (see below).  Some of these patches fix mutex deadlock, kernel panic, and bnx2x firmware panic issues.

BNX2I: Fixed the endian bug in the TMF LUN cmd send
BNX2I: Updated the handling of NETEVENTs to alleviate recovery
BNX2I: Modified the bnx2i stop path to compensate for in progress ops
BNX2I: Added code to handle the binding of an existing connection
BNX2I: Fixed the remote TCP RST handling for the 570X (1g)
BNX2I: Added mutex lock protection to conn_get_param
BNX2I: Removed the dynamic registration of CNIC
BNX2I: Fixed a cid leak issue for 5771X (10g)
BNX2I: Added return code check for chip kwqe submission request
BNX2I: Added feature to silently drop NOPOUT request
BNX2I: Cleaned up various error conditions in ep_connect/disconnect
BNX2I: Allow to abort the connection if connect request times out
BNX2I: Updated copyright and maintainer info
BNX2I: Updated version to 2.6.2.2

Comment 3 RHEL Program Management 2010-11-16 19:50:23 UTC
This request was evaluated by Red Hat Product Management for inclusion in a Red
Hat Enterprise Linux maintenance release.  Product Management has requested
further review of this request by Red Hat Engineering, for potential
inclusion in a Red Hat Enterprise Linux Update release for currently deployed
products.  This request is not yet committed for inclusion in an Update
release.

Comment 4 Eddie Wai 2010-11-23 23:37:33 UTC
The following 4 patches are the more critical patches that we recommend to be included for the next update of RHELS5.6 release:
BNX2I: Fixed the endian bug in the TMF LUN cmd send
BNX2I: Fixed a cid leak issue for 5771X (10g)
BNX2I: Fixed the remote TCP RST handling for the 570X (1g)
BNX2I: Allow to abort the connection if connect request times out

Please consider.  Thanks.

Comment 5 Eddie Wai 2010-11-23 23:39:40 UTC
Created attachment 462484 [details]
BNX2I patch to fix an endian bug in the TMF cmd send routine

Comment 6 Eddie Wai 2010-11-23 23:40:24 UTC
Created attachment 462485 [details]
BNX2I patch to fix a chip resource issue

Comment 7 Eddie Wai 2010-11-23 23:41:02 UTC
Created attachment 462486 [details]
BNX2I patch to fix a TCP RST handling for 570X

Comment 8 Eddie Wai 2010-11-23 23:41:43 UTC
Created attachment 462487 [details]
BNX2I patch to fix a chip panic issue for 5771X

Comment 13 Jarod Wilson 2010-12-02 15:15:58 UTC
in kernel-2.6.18-235.el5
You can download this test kernel (or newer) from http://people.redhat.com/jwilson/el5

Detailed testing feedback is always welcomed.

Comment 15 Hushan Jia 2010-12-23 08:30:49 UTC
@Broadcom,
Could you test this with 5.6 kernel at http://people.redhat.com/jwilson/el5, and post your testing feedback here?

Thanks.

Comment 17 errata-xmlrpc 2011-01-13 22:01:19 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on therefore solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2011-0017.html


Note You need to log in before you can comment on or make changes to this bug.