Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp3378859yba; Mon, 29 Apr 2019 00:55:21 -0700 (PDT) X-Google-Smtp-Source: APXvYqxbB30UEN8e06dUqo3+WkqcdyV6nCZhINipsT140mnrNsBQNgWUQ+2bcW9rIlVicuqVzOAJ X-Received: by 2002:a17:902:a513:: with SMTP id s19mr15992494plq.97.1556524520927; Mon, 29 Apr 2019 00:55:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556524520; cv=none; d=google.com; s=arc-20160816; b=CXoxehUgkxJ6ebpypFu0+Pj4g6A0R4RKbu9ZujiEZ52zCV9FvYj2x1JPI2pNIEgsqI zvpWBEByXouXnSIDzr1Rlu1UjjlihVLA2CQLz+MHkqUXtPfbZrW5pQhUUsVwpziSolwX Kuydqa58r8Ycf5WqCMKXCQwVOgUVna9YEyxXTe7Kd7i/bbi89A+t0wI6R2eXLf355qOd TFKpkT598RMwbRAmoloI8P0A30A0XiCzd5M7WMkkyIrjssMtvtNWA35f7WgUd6y8DuyZ hLxLoTtlt+3mZ/WpLDCOC5rsb9hpP4g3FFBZSaGWVpdI15K3GjuvvYxjGmjVb0luizYw KIyw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :dmarc-filter:dkim-signature:dkim-signature; bh=SXz4H+2ElQ6PsEvZYqzQNU8K66CT+KsKXl6u1YnbfWs=; b=lxIwdSK75LJnnyLbnJVWgncIQdUb5AP1058B1U9YX3wvxqbCUAGu4ezXB9ALm2uOee G5kEwZsRnC8BhTMZLk8bn43Lp32ezyGYl5eSkmJtvIRuYQGdbkistwH2pnQtcMIeuxJk 2YKBFBOpQ8gCFCMXxLcjApOGQNj2d3IA+ZQMOLXqx8Blerl24BJF/E+pNmZ2/sjq/NkK urtqTpnrH90OiHBK3f6JGdVB/BE0RFDaSg/Wj5X1qk9hhB5M9BfajPpKFRPuTYxq+Op2 LNYl4a4DIhF/vNScZTrxoOXBbloSMf67wVs/LNVLzoGmRKUVj7ff4vaBbx4jnpYYum14 F3vQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@codeaurora.org header.s=default header.b=PgjLnHTl; dkim=pass header.i=@codeaurora.org header.s=default header.b="Ea60pZ/O"; spf=pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p3si32349442plr.45.2019.04.29.00.55.01; Mon, 29 Apr 2019 00:55:20 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@codeaurora.org header.s=default header.b=PgjLnHTl; dkim=pass header.i=@codeaurora.org header.s=default header.b="Ea60pZ/O"; spf=pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727504AbfD2Hya (ORCPT + 99 others); Mon, 29 Apr 2019 03:54:30 -0400 Received: from smtp.codeaurora.org ([198.145.29.96]:39864 "EHLO smtp.codeaurora.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727498AbfD2Hya (ORCPT ); Mon, 29 Apr 2019 03:54:30 -0400 Received: by smtp.codeaurora.org (Postfix, from userid 1000) id 0C7DE60E40; Mon, 29 Apr 2019 07:54:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=codeaurora.org; s=default; t=1556524469; bh=XktlkB+zNNoISAn1fR9+feOMjtMSyGbdO2GzL8wkjiw=; h=From:To:Cc:Subject:Date:From; b=PgjLnHTlWlA6wIjzGcI7hGmzinjNHEUJoOEqxa5iDy1tgmPZyRfbBfjYa8GO8ZQiI uLyBKKfrKPjdlmd6qthryRv07DqzMD9bFj7Np0gx/+3MH1Pa9zpPwXi+b6aaSGdePq wAK6Z/y/bvmATwE7vkBtZQa5qqkyvq0PSLNV7x/M= X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on pdx-caf-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.7 required=2.0 tests=ALL_TRUSTED,BAYES_00, DKIM_INVALID,DKIM_SIGNED autolearn=no autolearn_force=no version=3.4.0 Received: from localhost.localdomain (unknown [180.166.53.21]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: wgong@smtp.codeaurora.org) by smtp.codeaurora.org (Postfix) with ESMTPSA id 82B47608FC; Mon, 29 Apr 2019 07:54:27 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=codeaurora.org; s=default; t=1556524468; bh=XktlkB+zNNoISAn1fR9+feOMjtMSyGbdO2GzL8wkjiw=; h=From:To:Cc:Subject:Date:From; b=Ea60pZ/OgDafDGch9h9ZekSzewTnxjmm4mDp+kpnGkE8ue0dpjDSQou0H8I55Z78j lq51Rs3i77nOan9gUlVroIhtOK5YU1IQGkHWGkLnPwFsV54EXjHdrQISv6OuQMHcvE D8U4GaKYtDKZr1FQ3SOnzZqqSeSA+LGU9tgulnzI= DMARC-Filter: OpenDMARC Filter v1.3.2 smtp.codeaurora.org 82B47608FC Authentication-Results: pdx-caf-mail.web.codeaurora.org; dmarc=none (p=none dis=none) header.from=codeaurora.org Authentication-Results: pdx-caf-mail.web.codeaurora.org; spf=none smtp.mailfrom=wgong@codeaurora.org From: Wen Gong To: ath10k@lists.infradead.org Cc: linux-wireless@vger.kernel.org Subject: [PATCH v2] ath10k: add support for simulate crash on SDIO chip Date: Mon, 29 Apr 2019 15:54:17 +0800 Message-Id: <1556524457-17469-1-git-send-email-wgong@codeaurora.org> X-Mailer: git-send-email 1.9.1 Sender: linux-wireless-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org The command to simulate firmware crash: echo soft > /sys/kernel/debug/ieee80211/phy0/ath10k/simulate_fw_crash It will send WMI_FORCE_FW_HANG_ASSERT to firmware, then it will trigger CPU interrupt status register for SDIO chip, ath10k driver need to configure it while enable SDIO interrupt, otherwise ath10k driver will not get the assert error info. After this change, it will success for simulate firmware crash. Tested with QCA6174 SDIO with firmware WLAN.RMH.4.4.1-00007-QCARMSWP-1. Signed-off-by: Wen Gong --- v2: add MBOX_CPU_STATUS_ENABLE_ASSERT_MASK for fw assert check drivers/net/wireless/ath/ath10k/hw.h | 1 + drivers/net/wireless/ath/ath10k/sdio.c | 10 ++++++++-- 2 files changed, 9 insertions(+), 2 deletions(-) diff --git a/drivers/net/wireless/ath/ath10k/hw.h b/drivers/net/wireless/ath/ath10k/hw.h index 7131499..60521ed 100644 --- a/drivers/net/wireless/ath/ath10k/hw.h +++ b/drivers/net/wireless/ath/ath10k/hw.h @@ -1095,6 +1095,7 @@ struct ath10k_hw_ops { #define MBOX_CPU_INT_STATUS_ENABLE_ADDRESS 0x00000819 #define MBOX_CPU_INT_STATUS_ENABLE_BIT_LSB 0 #define MBOX_CPU_INT_STATUS_ENABLE_BIT_MASK 0x000000ff +#define MBOX_CPU_STATUS_ENABLE_ASSERT_MASK 0x00000001 #define MBOX_ERROR_STATUS_ENABLE_ADDRESS 0x0000081a #define MBOX_ERROR_STATUS_ENABLE_RX_UNDERFLOW_LSB 1 #define MBOX_ERROR_STATUS_ENABLE_RX_UNDERFLOW_MASK 0x00000002 diff --git a/drivers/net/wireless/ath/ath10k/sdio.c b/drivers/net/wireless/ath/ath10k/sdio.c index fae56c6..1a3a7bf 100644 --- a/drivers/net/wireless/ath/ath10k/sdio.c +++ b/drivers/net/wireless/ath/ath10k/sdio.c @@ -850,6 +850,10 @@ static int ath10k_sdio_mbox_proc_cpu_intr(struct ath10k *ar) out: mutex_unlock(&irq_data->mtx); + if (cpu_int_status & MBOX_CPU_STATUS_ENABLE_ASSERT_MASK) { + ath10k_err(ar, "firmware crashed!\n"); + queue_work(ar->workqueue, &ar->restart_work); + } return ret; } @@ -1495,8 +1499,10 @@ static int ath10k_sdio_hif_enable_intrs(struct ath10k *ar) regs->int_status_en |= FIELD_PREP(MBOX_INT_STATUS_ENABLE_MBOX_DATA_MASK, 1); - /* Set up the CPU Interrupt status Register */ - regs->cpu_int_status_en = 0; + /* Set up the CPU Interrupt Status Register, enable CPU sourced interrupt #0 + * #0 is used for report assertion from target + */ + regs->cpu_int_status_en = FIELD_PREP(MBOX_CPU_STATUS_ENABLE_ASSERT_MASK, 1); /* Set up the Error Interrupt status Register */ regs->err_int_status_en = -- 1.9.1