Received: by 2002:a25:c205:0:0:0:0:0 with SMTP id s5csp294550ybf; Wed, 26 Feb 2020 13:17:35 -0800 (PST) X-Google-Smtp-Source: APXvYqwJJ4BG+9TMv8IXdKc/uxSpqCRdfmM4zvMOlcyVt3a7EKIdZCBv6kvE+kmUuXDqQ7Tgpnou X-Received: by 2002:aca:534f:: with SMTP id h76mr808889oib.23.1582751854902; Wed, 26 Feb 2020 13:17:34 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582751854; cv=none; d=google.com; s=arc-20160816; b=TpACKZbZdm3n56x6+j0v4y8It9vXvno/U1/nSpz4PGhOLYhyZwsdCbGSYLUHuee5eY RciZkPYlOc7RPcPKx6uQ0cHDj4mzKaMM9psLSjsmu0sbBTF3ZPlDu/nkSkOLXwj3ZX3Y m0JvYG2fJYv/99sgT95Yvk+7CaS57NDlZbo9CVoNVLZy2bsEEjEfhtYcRRlhKuWULUM8 6TrphSdVPqOxCn5bszlhmF2xsTKgol5nYADIKoktYtlrHcxJytXQDscrsFg5rWu4SqZp rU2criUGxDFwYjBg9HhIutO16qDtAe8kaLyWC18wdZ5Gtfns5JVw5SHMaI46nQagseUQ R6og== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=OsPN+EUhFjvfM3Fz8Pxleu7AuuoJA3diSFFXprWVSmI=; b=G60rAXGSljlwtmhQrJpuz+JXRrkgsQNEHb3H1g/H0NnTRaiPTbmvFcUCJvW9jGOXMk bXPdyZOtsoHxeKfQuZOs6P1qoqwjtFRnzFLVaqMpMZEkAAyPdZ3OhmZHqLCfgc4YFNxH cDbY1HnbtfWf6gub4HZZN58KTJYeTNiUVPYBI6CZJrACzxPFYxIE7RYKpzjP0nllF7Kv IgRzYHRX+IcJ2ctPy/e8Ji9wgLGEjRn+YMUDvP/zDPtZxnMyK+EblnPP2YaDScPb0hPr LQHMqzjmZYi1J8/2MZ37Qzs8PtLEl8z/N1RSTpEJRueAYoBWEm3+qIJUwHiEILFnc9Od nGRQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gateworks-com.20150623.gappssmtp.com header.s=20150623 header.b=mkyAJJ4c; spf=pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j20si241374oii.80.2020.02.26.13.17.08; Wed, 26 Feb 2020 13:17:34 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gateworks-com.20150623.gappssmtp.com header.s=20150623 header.b=mkyAJJ4c; spf=pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727489AbgBZVQZ (ORCPT + 99 others); Wed, 26 Feb 2020 16:16:25 -0500 Received: from mail-wm1-f67.google.com ([209.85.128.67]:40299 "EHLO mail-wm1-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727446AbgBZVQZ (ORCPT ); Wed, 26 Feb 2020 16:16:25 -0500 Received: by mail-wm1-f67.google.com with SMTP id t14so883388wmi.5 for ; Wed, 26 Feb 2020 13:16:22 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gateworks-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=OsPN+EUhFjvfM3Fz8Pxleu7AuuoJA3diSFFXprWVSmI=; b=mkyAJJ4cO3Miu4+Ded7gX3tFJpnQojj4f7HiloUot3p58j4Xb0Tp5TMB2Ox6vEtTtA y6e8ao1TM2hXB241sHyi05KVJ84K/SOjBEMjB+N48DPF5wfjl35BISxJo566bUNsm+Df jv5tPzNbfU2gH2gdLw5P5AaL5O9ANh1oD5i3I9ObPytb8wj+vVpQlExPJHZtuUOPYDwL D4VULg0WZIVoi1Fwwp4WUwSFnXTh01kzlj+D+lgH+6bzXDfg3bVHXmz3Dbj74hUV/KJD 3lttkWp5x/KEUHZyCCXW1vRmMVgF8btLZAq7i3IIVzOFUnWiHoVF8XLmepVLEMHkIMla fY1w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=OsPN+EUhFjvfM3Fz8Pxleu7AuuoJA3diSFFXprWVSmI=; b=bFiTSwHjkJptIL6QsSySbOVvnk9y0ENNk3y4cgVg6Kj4i0C2V7a2BCeNUgM630hxMy Vpz5u2Mvo4sLFpD2HT9l7WmjTDrATArOFqHCDMthG7HgDyfYO589k7DwykrQeDVdQiVf 6p6VBSGuDBFbGzQByY6utENZ0ois//Y8qcYmBYbRZfQewaHWcojeeercn4QQXr6NZSBo BzBc1hAvkKmY72jWhiuT3EfOpEFcNFi8TwQcfH/+hWNgm31dqiiUuQm3JN3MXa8KxWU+ 1k9IHgjodwVIu/vN+RH0SIdpS9kWIWUrVh7m02UlFqiH0vnzYaDWEYfqWtCDUCiwbE72 p34w== X-Gm-Message-State: APjAAAVSTYLH7Mk2VQOwxqEm8dHmkvBGtshYMOj464WKfrcpuqqBpfmf YG/lr6PinHXiQvLMaov89VTpgQ0nArBAaH2EnPzO X-Received: by 2002:a05:600c:145:: with SMTP id w5mr747868wmm.157.1582751781943; Wed, 26 Feb 2020 13:16:21 -0800 (PST) MIME-Version: 1.0 References: In-Reply-To: From: Cale Collins Date: Wed, 26 Feb 2020 13:15:45 -0800 Message-ID: Subject: Re: ath10k_pci rawmode = 1 requires support from firmware To: Justin Capella , Rick Winscot , Kalle Valo Cc: linux-wireless , ath10k Content-Type: text/plain; charset="UTF-8" Sender: linux-wireless-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org Hello Justin and Kalle, Justin thank you very much for the reply, sorry it took me so long to get back to you but I wanted to do more testing based on your recommendations before I wrote. I tried numerous versions of the firmware-6.bin file from the linux-firmware git, and the repo you linked. I have been hitting the same issue with nearly every version of firmware I try. I included the output from WLAN.RM.4.4.1-00140-QCARMSWPZ-1, but the exact same applies to WLAN.RMH.4.4.1-00042. Under normal circumstances I would try to bisect this, but I can't because I don't have a "good" (working) version of the firmware. I'm doing this on behalf of one of our clients Rick Winscot, I added him to this thread so he can offer his insight. Here's the output from my testing with WLAN.RM.4.4.1-00140-QCARMSWPZ-1: root@bionic-newport:~# ls /sys/class/net/ can0 eth0 eth1 lo root@bionic-newport:~# dmesg |grep ath10k [ 0.000000] Kernel command line: cma=64M coherent_pool=16M net.ifnames=0 ath10k_core.rawmode=1 root=/dev/mmcblk0p2 rw rootwait console=ttyAMA0,115200n8 earlycon=pl011,0x87e028000000 [ 12.356854] ath10k_pci 0001:58:00.0: pci irq msi oper_irq_mode 2 irq_mode 0 reset_mode 0 [ 12.762070] ath10k_pci 0001:58:00.0: Direct firmware load for ath10k/pre-cal-pci-0001:58:00.0.bin failed with error -2 [ 12.762132] ath10k_pci 0001:58:00.0: Direct firmware load for ath10k/cal-pci-0001:58:00.0.bin failed with error -2 [ 12.779272] ath10k_pci 0001:58:00.0: qca6174 hw3.2 target 0x05030000 chip_id 0x00340aff sub 168c:3363 [ 12.779280] ath10k_pci 0001:58:00.0: kconfig debug 0 debugfs 1 tracing 0 dfs 0 testmode 0 [ 12.780635] ath10k_pci 0001:58:00.0: firmware ver WLAN.RM.4.4.1-00140-QCARMSWPZ-1 api 6 features wowlan,ignore-otp,mfp crc32 29eb8ca1 [ 12.858884] ath10k_pci 0001:58:00.0: board_file api 2 bmi_id N/A crc32 4ac0889b [ 12.858894] ath10k_pci 0001:58:00.0: rawmode = 1 requires support from firmware [ 12.866282] ath10k_pci 0001:58:00.0: fatal problem with firmware features: -22 [ 12.873670] ath10k_pci 0001:58:00.0: could not probe fw (-22) root@bionic-newport:~# ls /sys/class/net/ can0 eth0 eth1 lo wlan0 root@bionic-newport:~# dmesg |grep ath10k [ 11.981606] ath10k_pci 0001:58:00.0: pci irq msi oper_irq_mode 2 irq_mode 0 reset_mode 0 [ 12.310158] ath10k_pci 0001:58:00.0: Direct firmware load for ath10k/pre-cal-pci-0001:58:00.0.bin failed with error -2 [ 12.310206] ath10k_pci 0001:58:00.0: Direct firmware load for ath10k/cal-pci-0001:58:00.0.bin failed with error -2 [ 12.349306] ath10k_pci 0001:58:00.0: qca6174 hw3.2 target 0x05030000 chip_id 0x00340aff sub 168c:3363 [ 12.349314] ath10k_pci 0001:58:00.0: kconfig debug 0 debugfs 1 tracing 0 dfs 0 testmode 0 [ 12.350682] ath10k_pci 0001:58:00.0: firmware ver WLAN.RM.4.4.1-00140-QCARMSWPZ-1 api 6 features wowlan,ignore-otp,mfp crc32 29eb8ca1 [ 12.432281] ath10k_pci 0001:58:00.0: board_file api 2 bmi_id N/A crc32 4ac0889b [ 12.978328] ath10k_pci 0001:58:00.0: Unknown eventid: 3 [ 12.994313] ath10k_pci 0001:58:00.0: Unknown eventid: 118809 [ 12.997236] ath10k_pci 0001:58:00.0: Unknown eventid: 90118 [ 12.997886] ath10k_pci 0001:58:00.0: htt-ver 3.60 wmi-op 4 htt-op 3 cal otp max-sta 32 raw 0 hwcrypto 1 root@bionic-newport:~# iw phy phy0 interface add mesh0 type mp root@bionic-newport:~# iw mesh0 info Interface mesh0 ifindex 6 wdev 0x2 addr 94:92:d2:00:04:04 type mesh point wiphy 0 txpower 0.00 dBm root@bionic-newport:~# iw dev mesh0 set freq 5745 80 5775 root@bionic-newport:~# ifconfig mesh0 192.168.1.10 SIOCSIFFLAGS: Invalid argument root@bionic-newport:~# dmesg |grep ath10k [ 11.981606] ath10k_pci 0001:58:00.0: pci irq msi oper_irq_mode 2 irq_mode 0 reset_mode 0 [ 12.310158] ath10k_pci 0001:58:00.0: Direct firmware load for ath10k/pre-cal-pci-0001:58:00.0.bin failed with error -2 [ 12.310206] ath10k_pci 0001:58:00.0: Direct firmware load for ath10k/cal-pci-0001:58:00.0.bin failed with error -2 [ 12.349306] ath10k_pci 0001:58:00.0: qca6174 hw3.2 target 0x05030000 chip_id 0x00340aff sub 168c:3363 [ 12.349314] ath10k_pci 0001:58:00.0: kconfig debug 0 debugfs 1 tracing 0 dfs 0 testmode 0 [ 12.350682] ath10k_pci 0001:58:00.0: firmware ver WLAN.RM.4.4.1-00140-QCARMSWPZ-1 api 6 features wowlan,ignore-otp,mfp crc32 29eb8ca1 [ 12.432281] ath10k_pci 0001:58:00.0: board_file api 2 bmi_id N/A crc32 4ac0889b [ 12.978328] ath10k_pci 0001:58:00.0: Unknown eventid: 3 [ 12.994313] ath10k_pci 0001:58:00.0: Unknown eventid: 118809 [ 12.997236] ath10k_pci 0001:58:00.0: Unknown eventid: 90118 [ 12.997886] ath10k_pci 0001:58:00.0: htt-ver 3.60 wmi-op 4 htt-op 3 cal otp max-sta 32 raw 0 hwcrypto 1 [ 256.819171] ath10k_pci 0001:58:00.0: Unknown eventid: 3 [ 256.834413] ath10k_pci 0001:58:00.0: Unknown eventid: 118809 [ 256.837352] ath10k_pci 0001:58:00.0: Unknown eventid: 90118 [ 256.884876] ath10k_pci 0001:58:00.0: must load driver with rawmode=1 to add mesh interfaces Mahalo, Cale Collins