From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 077191304B7; Mon, 15 Apr 2024 12:50:47 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1713185447; cv=none; b=MlgYRWqH7H/IpVDlnwIsuA994QjDrbK6XjqUCI9MuF+pZxB/OH+gzwqXJ4QaRE4y/5g5HbB3U8bEvuY8a7zceE4xzvqCVU7dV7jmyqgvRZgNW0ttBSRfPWlpVdSQYL4Jq98slvqCELkqAPuMPJo+5JYZh1oeYrj+hV5TNeRCcXU= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1713185447; c=relaxed/simple; bh=8KM0wpoQqLyJLapZeUzQHiTEelaCcoA0TiW8astNKgo=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=u4rUj78+HYk0M92NBVqRbGr7CvuaRNrVyGpWPxetRBp7UMDJ55jCwMFelxBKOy8pRDCIH0ohMZBcY1eG4pEL21RDpD7qdYB8xoMe7MZrUtzBwsz0ue1wZ4EnQT/OK0vTtNoNXeXR0w2FQMF1ezWxtA8Sna5VJi5vpp5YRxa1wH4= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=FYY9IDLh; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="FYY9IDLh" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 51FA0C2BD10; Mon, 15 Apr 2024 12:50:45 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1713185446; bh=8KM0wpoQqLyJLapZeUzQHiTEelaCcoA0TiW8astNKgo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=FYY9IDLhntkjmf6wivwXzf5uCz3/OCRB9b9dDrU3EkWWRVTTa7l8tW8W7KNeX85I9 8D1BMhSyfx/wf2ta1ti1pc8JoDlpQRArZfYMZOeWcm4PcqLagb9w13SO0jfTadm2nE q3nWxZnRIb80mwh82pexFAjRGqQcO4YF/4LM5pcVjHCYAUA0EWayufp5bXTnGsu2ox K95AlfrVmPUITdOo9AW963FddoC2tdrzR9N9b9BMojXJjnGmvk8QJyH3VARuXpMKO5 NRLrlBi2w8ZybWTuOkhs8YpzTMOG2pf/RBnkRqg3XAFR/MVRuWMwdED+XAryOD/SEG JjoSRYkLe5buQ== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Phil Elwell , Maarten Vanraes , "David S . Miller" , Sasha Levin , opendmb@gmail.com, florian.fainelli@broadcom.com, edumazet@google.com, kuba@kernel.org, pabeni@redhat.com, netdev@vger.kernel.org Subject: [PATCH AUTOSEL 5.15 2/4] net: bcmgenet: Reset RBUF on first open Date: Mon, 15 Apr 2024 06:04:44 -0400 Message-ID: <20240415100449.3127574-2-sashal@kernel.org> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20240415100449.3127574-1-sashal@kernel.org> References: <20240415100449.3127574-1-sashal@kernel.org> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore X-stable-base: Linux 5.15.155 Content-Transfer-Encoding: 8bit From: Phil Elwell [ Upstream commit 0a6380cb4c6b5c1d6dad226ba3130f9090f0ccea ] If the RBUF logic is not reset when the kernel starts then there may be some data left over from any network boot loader. If the 64-byte packet headers are enabled then this can be fatal. Extend bcmgenet_dma_disable to do perform the reset, but not when called from bcmgenet_resume in order to preserve a wake packet. N.B. This different handling of resume is just based on a hunch - why else wouldn't one reset the RBUF as well as the TBUF? If this isn't the case then it's easy to change the patch to make the RBUF reset unconditional. See: https://github.com/raspberrypi/linux/issues/3850 See: https://github.com/raspberrypi/firmware/issues/1882 Signed-off-by: Phil Elwell Signed-off-by: Maarten Vanraes Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- drivers/net/ethernet/broadcom/genet/bcmgenet.c | 16 ++++++++++++---- 1 file changed, 12 insertions(+), 4 deletions(-) diff --git a/drivers/net/ethernet/broadcom/genet/bcmgenet.c b/drivers/net/ethernet/broadcom/genet/bcmgenet.c index a2b736a9d20cc..9db391e5b4f4f 100644 --- a/drivers/net/ethernet/broadcom/genet/bcmgenet.c +++ b/drivers/net/ethernet/broadcom/genet/bcmgenet.c @@ -3256,7 +3256,7 @@ static void bcmgenet_get_hw_addr(struct bcmgenet_priv *priv, } /* Returns a reusable dma control register value */ -static u32 bcmgenet_dma_disable(struct bcmgenet_priv *priv) +static u32 bcmgenet_dma_disable(struct bcmgenet_priv *priv, bool flush_rx) { unsigned int i; u32 reg; @@ -3281,6 +3281,14 @@ static u32 bcmgenet_dma_disable(struct bcmgenet_priv *priv) udelay(10); bcmgenet_umac_writel(priv, 0, UMAC_TX_FLUSH); + if (flush_rx) { + reg = bcmgenet_rbuf_ctrl_get(priv); + bcmgenet_rbuf_ctrl_set(priv, reg | BIT(0)); + udelay(10); + bcmgenet_rbuf_ctrl_set(priv, reg); + udelay(10); + } + return dma_ctrl; } @@ -3344,8 +3352,8 @@ static int bcmgenet_open(struct net_device *dev) bcmgenet_set_hw_addr(priv, dev->dev_addr); - /* Disable RX/TX DMA and flush TX queues */ - dma_ctrl = bcmgenet_dma_disable(priv); + /* Disable RX/TX DMA and flush TX and RX queues */ + dma_ctrl = bcmgenet_dma_disable(priv, true); /* Reinitialize TDMA and RDMA and SW housekeeping */ ret = bcmgenet_init_dma(priv); @@ -4201,7 +4209,7 @@ static int bcmgenet_resume(struct device *d) bcmgenet_hfb_create_rxnfc_filter(priv, rule); /* Disable RX/TX DMA and flush TX queues */ - dma_ctrl = bcmgenet_dma_disable(priv); + dma_ctrl = bcmgenet_dma_disable(priv, false); /* Reinitialize TDMA and RDMA and SW housekeeping */ ret = bcmgenet_init_dma(priv); -- 2.43.0