Received: by 2002:a25:86ce:0:0:0:0:0 with SMTP id y14csp107575ybm; Tue, 21 May 2019 23:34:57 -0700 (PDT) X-Google-Smtp-Source: APXvYqziOlBIUXI2ECmaL8XKEK8cPE0K3igQfX3527dIu7mW2sWkrsGy3ARhYbekUaV90gFJ/D5L X-Received: by 2002:a62:6585:: with SMTP id z127mr54023187pfb.179.1558506897845; Tue, 21 May 2019 23:34:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1558506897; cv=none; d=google.com; s=arc-20160816; b=HQxU6kXsWqwK/uQQgV1MD0WLj3S7EVsuszo14p2baNACaqlaqz+rxQD87MhEe+aFMS RExLr5iHu6tPBMEb2wMr/sOgRr7HNYo6wZi1GU2KM18wYVy8T/HhqfUvkphelPUfyQVF AjcM+7IlDD6rPuYiE1VP/nCwOKL6hl5nvPPIjMJPd8go+Rg/UWLH6WApCWJz0qmrQuMW XxkA0byeYb3HXXXM3Ts3Fp9e1EaGGZsQX91jaJk2CYQoduyNNw7K+yk6WlIhkszVwuYe fn+KYHXPIqqltErxi1sfN0o+Q7p1nOo/8nlrB4Lmo7wcP1q70vEOwGw3MBsV2ZGmGEPp Ot2g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :dmarc-filter:dkim-signature:dkim-signature; bh=YNL0BugtAKi8WVQLjNRLaA6yfPENGmC896r9CinGwl4=; b=ZcAC61EYJCTT6JwNsHZvNLS+9eCQDzgTkTcmhiKeOB3PIt1mdhSgCdiGtwW8sF3icV X7p8/IYFwO/0dPRGlxxabBItMGWNboSE8yy8AX3JvyyuZcPJvHdDKjDLMtPYmsSFqInk eX52Gw/1oL3UeD8z6An0KtVY1uGab5xHPPrRNm4S0K5dG1MXmMSV+LXJLd0eyJ30luIE B4+AYTjdKRv5r8N/GUxU8sfd8rv5gwr5JtIoTrj+kYAFMaQnLhwzzd7Lnb03TTRIm6Bg yYv2s87eYrC4BB3hjKVHIeqVP9nj3m28pEz2tD74kUG3CySu0ZdO4gaSiHs0yu1oNBja dN+w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@codeaurora.org header.s=default header.b=J9OmIXFr; dkim=pass header.i=@codeaurora.org header.s=default header.b=J9OmIXFr; spf=pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f11si13667282pgm.86.2019.05.21.23.34.41; Tue, 21 May 2019 23:34:57 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@codeaurora.org header.s=default header.b=J9OmIXFr; dkim=pass header.i=@codeaurora.org header.s=default header.b=J9OmIXFr; spf=pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728511AbfEVGdC (ORCPT + 99 others); Wed, 22 May 2019 02:33:02 -0400 Received: from smtp.codeaurora.org ([198.145.29.96]:33306 "EHLO smtp.codeaurora.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725796AbfEVGdC (ORCPT ); Wed, 22 May 2019 02:33:02 -0400 Received: by smtp.codeaurora.org (Postfix, from userid 1000) id C77EE609EF; Wed, 22 May 2019 06:33:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=codeaurora.org; s=default; t=1558506781; bh=xih2u75Xh2oTi6oW2MYjWqkYO01ltdet1FO94AJV884=; h=From:To:Cc:Subject:Date:From; b=J9OmIXFrJaKDIKVLoXkG3EUmvRrwWBxiqkevnBWfBbZXWHQmBiGFXLeR83O7ezpLJ CstVBAiUQ2aSjbMbNwGS06lZqh/KjwYMOL5YSUhk7PqSL8/JTPmf2mll7BGW0+QGtk kaPoqH3+qbVGAjNNNM3GKeHN/NarY2Z3Cw9Rdjic= X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on pdx-caf-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.7 required=2.0 tests=ALL_TRUSTED,BAYES_00, DKIM_INVALID,DKIM_SIGNED,SPF_NONE autolearn=no autolearn_force=no version=3.4.0 Received: from localhost.localdomain (unknown [180.166.53.21]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: wgong@smtp.codeaurora.org) by smtp.codeaurora.org (Postfix) with ESMTPSA id 81F666076A; Wed, 22 May 2019 06:33:00 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=codeaurora.org; s=default; t=1558506781; bh=xih2u75Xh2oTi6oW2MYjWqkYO01ltdet1FO94AJV884=; h=From:To:Cc:Subject:Date:From; b=J9OmIXFrJaKDIKVLoXkG3EUmvRrwWBxiqkevnBWfBbZXWHQmBiGFXLeR83O7ezpLJ CstVBAiUQ2aSjbMbNwGS06lZqh/KjwYMOL5YSUhk7PqSL8/JTPmf2mll7BGW0+QGtk kaPoqH3+qbVGAjNNNM3GKeHN/NarY2Z3Cw9Rdjic= DMARC-Filter: OpenDMARC Filter v1.3.2 smtp.codeaurora.org 81F666076A Authentication-Results: pdx-caf-mail.web.codeaurora.org; dmarc=none (p=none dis=none) header.from=codeaurora.org Authentication-Results: pdx-caf-mail.web.codeaurora.org; spf=none smtp.mailfrom=wgong@codeaurora.org From: Wen Gong To: ath10k@lists.infradead.org Cc: linux-wireless@vger.kernel.org Subject: [PATCH v3] ath10k: add support for firmware crash recovery on SDIO chip Date: Wed, 22 May 2019 14:32:56 +0800 Message-Id: <1558506776-19702-1-git-send-email-wgong@codeaurora.org> X-Mailer: git-send-email 1.9.1 Sender: linux-wireless-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org The command to simulate firmware crash: echo soft > /sys/kernel/debug/ieee80211/phy0/ath10k/simulate_fw_crash It will send WMI_FORCE_FW_HANG_ASSERT to firmware, then it will trigger CPU interrupt status register for SDIO chip, ath10k driver need to configure it while enable SDIO interrupt, otherwise ath10k driver will not get the assert error info. After this change, it will success for simulate firmware crash. Tested with QCA6174 SDIO with firmware WLAN.RMH.4.4.1-00007-QCARMSWP-1. Signed-off-by: Wen Gong --- v3: change commit log title v2: add MBOX_CPU_STATUS_ENABLE_ASSERT_MASK for fw assert check drivers/net/wireless/ath/ath10k/hw.h | 1 + drivers/net/wireless/ath/ath10k/sdio.c | 10 ++++++++-- 2 files changed, 9 insertions(+), 2 deletions(-) diff --git a/drivers/net/wireless/ath/ath10k/hw.h b/drivers/net/wireless/ath/ath10k/hw.h index 7131499..60521ed 100644 --- a/drivers/net/wireless/ath/ath10k/hw.h +++ b/drivers/net/wireless/ath/ath10k/hw.h @@ -1095,6 +1095,7 @@ struct ath10k_hw_ops { #define MBOX_CPU_INT_STATUS_ENABLE_ADDRESS 0x00000819 #define MBOX_CPU_INT_STATUS_ENABLE_BIT_LSB 0 #define MBOX_CPU_INT_STATUS_ENABLE_BIT_MASK 0x000000ff +#define MBOX_CPU_STATUS_ENABLE_ASSERT_MASK 0x00000001 #define MBOX_ERROR_STATUS_ENABLE_ADDRESS 0x0000081a #define MBOX_ERROR_STATUS_ENABLE_RX_UNDERFLOW_LSB 1 #define MBOX_ERROR_STATUS_ENABLE_RX_UNDERFLOW_MASK 0x00000002 diff --git a/drivers/net/wireless/ath/ath10k/sdio.c b/drivers/net/wireless/ath/ath10k/sdio.c index fae56c6..1a3a7bf 100644 --- a/drivers/net/wireless/ath/ath10k/sdio.c +++ b/drivers/net/wireless/ath/ath10k/sdio.c @@ -850,6 +850,10 @@ static int ath10k_sdio_mbox_proc_cpu_intr(struct ath10k *ar) out: mutex_unlock(&irq_data->mtx); + if (cpu_int_status & MBOX_CPU_STATUS_ENABLE_ASSERT_MASK) { + ath10k_err(ar, "firmware crashed!\n"); + queue_work(ar->workqueue, &ar->restart_work); + } return ret; } @@ -1495,8 +1499,10 @@ static int ath10k_sdio_hif_enable_intrs(struct ath10k *ar) regs->int_status_en |= FIELD_PREP(MBOX_INT_STATUS_ENABLE_MBOX_DATA_MASK, 1); - /* Set up the CPU Interrupt status Register */ - regs->cpu_int_status_en = 0; + /* Set up the CPU Interrupt Status Register, enable CPU sourced interrupt #0 + * #0 is used for report assertion from target + */ + regs->cpu_int_status_en = FIELD_PREP(MBOX_CPU_STATUS_ENABLE_ASSERT_MASK, 1); /* Set up the Error Interrupt status Register */ regs->err_int_status_en = -- 1.9.1