Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp3400066rwb; Tue, 8 Nov 2022 04:15:14 -0800 (PST) X-Google-Smtp-Source: AMsMyM7uPW0TFtcz9Ln0FcVvoA3fIVB1ihCC8SHrlqkGhPAxZDEO6XbAAIGzPo+QLngdsLjuPMRI X-Received: by 2002:a17:903:2490:b0:17f:bf7e:c521 with SMTP id p16-20020a170903249000b0017fbf7ec521mr55848774plw.161.1667909713991; Tue, 08 Nov 2022 04:15:13 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1667909713; cv=none; d=google.com; s=arc-20160816; b=gRszjILKKqE9AxA7nB6Mh2OWsJ0GpMbbecwLE3dK46K5RH2qTKH/qLhJp7+Gb/0sl+ mjQTcIKMorm9A5CX/+Z0ZJct40/6v661PM07RVAQcJ2QhQh/F/Opi79GTbAK1YUn0JyU Dg+rTuPyjawTZapvWrFs9mNZRNyin+rZvpxwuLb2N0/gTAMb5QRePz7hFMwhERhQcaFN MUK2HDhbuke1jCYr9r4EI9TPUAvKrXlxS14Algg6nv5QOuDgiw1WJ95z4dfTi9pGLdMp Q9t/19Byd0XBC60S/G8+1JtPsOWQZ2oce4kGKDVVATmtCBiCxcNmjf1sA9L8NWZhGQmY qzuA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=0N8xF34uZZ3oQaq7z3zSL7RQw2wjq3nrrQc7VpDG5JI=; b=UwNC4HjuRV23aNS7vW7CUJvMDZTI9Im25l3t6qNXPsD7pcvXEMMUpaPJGmwNN3fDC0 jiggUYjTiZ/NX7ZaG9fCMXImmee0SDksC7dooY8/IQICDMmrnhVbMmZuxJoAnsTJkKR8 TveG1hXJ4n2bMRfkpQqi+/9q92HRgZdebD2WG0ZqxTZPERIi4GbufcLTjNQjvh2fyvK+ 5AdtGWPyAqNoi0GWixu/NsdeBKIPQPRdbinzT3J7RQxpmdrpXd2ac9mnZdhAMgNkrQnx NIReTb6MKK3bHUUkadCEIIgeRc3LBCgu/ZBw4yXnjmWW/ZvAUG1yoPVK+RQhyCy/dbuT 8ktA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@quicinc.com header.s=qcppdkim1 header.b="UT7bBe/I"; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=quicinc.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id h13-20020a17090ac38d00b00212deed484esi12291640pjt.132.2022.11.08.04.14.56; Tue, 08 Nov 2022 04:15:13 -0800 (PST) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@quicinc.com header.s=qcppdkim1 header.b="UT7bBe/I"; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=quicinc.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233722AbiKHMFU (ORCPT + 67 others); Tue, 8 Nov 2022 07:05:20 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57490 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233576AbiKHMFT (ORCPT ); Tue, 8 Nov 2022 07:05:19 -0500 Received: from mx0a-0031df01.pphosted.com (mx0a-0031df01.pphosted.com [205.220.168.131]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id DC62E42985; Tue, 8 Nov 2022 04:05:17 -0800 (PST) Received: from pps.filterd (m0279866.ppops.net [127.0.0.1]) by mx0a-0031df01.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 2A8BGpie021311; Tue, 8 Nov 2022 12:04:51 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=quicinc.com; h=message-id : date : mime-version : subject : to : cc : references : from : in-reply-to : content-type : content-transfer-encoding; s=qcppdkim1; bh=0N8xF34uZZ3oQaq7z3zSL7RQw2wjq3nrrQc7VpDG5JI=; b=UT7bBe/IW79P3EM7Sjgpdx1K5RoBw1tHZwo+gy2gxnd+cYi2VQ5HCVqHvI0LFx1BOgWb lmOGFflaUaTsD7EMj1zDu/dvcSMbe955Z4Ebfx8v0lOR3ia7KTISUxmZeDwg/88n0DBb WbpLMWJmDUXhUjRXQMWipF12Y6wCot+2PxH6p/pk/zr11kv3Dlt0IarHMqSWORzUP8u4 e0D9fT77PdnYKdZfi2/J8Wet1f5UmCyHLfdlKVo0M0cua6HPAZVYyoaz6vbLFIjfNenT irvuH2JwJ3QfjE5g9am70E+4ffbdVw8d4IW5jcUgwFLa2jigLPtWNoFXNiFOsagjZfg4 ow== Received: from nalasppmta01.qualcomm.com (Global_NAT1.qualcomm.com [129.46.96.20]) by mx0a-0031df01.pphosted.com (PPS) with ESMTPS id 3kq7g4j8by-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 08 Nov 2022 12:04:51 +0000 Received: from nalasex01a.na.qualcomm.com (nalasex01a.na.qualcomm.com [10.47.209.196]) by NALASPPMTA01.qualcomm.com (8.17.1.5/8.17.1.5) with ESMTPS id 2A8C4oRd031418 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 8 Nov 2022 12:04:50 GMT Received: from [10.216.12.65] (10.80.80.8) by nalasex01a.na.qualcomm.com (10.47.209.196) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.29; Tue, 8 Nov 2022 04:04:47 -0800 Message-ID: Date: Tue, 8 Nov 2022 17:34:43 +0530 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101 Thunderbird/102.4.1 Subject: Re: [PATCH v2] wifi: ath10k: Add WLAN firmware image version info into smem Content-Language: en-US To: Kalle Valo CC: , , , , , kernel test robot References: <20221104082828.14386-1-quic_youghand@quicinc.com> <166790340662.9633.4549756749859911615.kvalo@kernel.org> From: "Youghandhar Chintala (Temp)" In-Reply-To: <166790340662.9633.4549756749859911615.kvalo@kernel.org> Content-Type: text/plain; charset="UTF-8"; format=flowed Content-Transfer-Encoding: 7bit X-Originating-IP: [10.80.80.8] X-ClientProxiedBy: nasanex01a.na.qualcomm.com (10.52.223.231) To nalasex01a.na.qualcomm.com (10.47.209.196) X-QCInternal: smtphost X-Proofpoint-Virus-Version: vendor=nai engine=6200 definitions=5800 signatures=585085 X-Proofpoint-ORIG-GUID: Vujk1Lx8zud34sldkyPGbqSZ09gIs06z X-Proofpoint-GUID: Vujk1Lx8zud34sldkyPGbqSZ09gIs06z X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.219,Aquarius:18.0.895,Hydra:6.0.545,FMLib:17.11.122.1 definitions=2022-11-07_11,2022-11-08_01,2022-06-22_01 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 phishscore=0 adultscore=0 suspectscore=0 priorityscore=1501 mlxscore=0 mlxlogscore=999 bulkscore=0 spamscore=0 impostorscore=0 lowpriorityscore=0 malwarescore=0 clxscore=1015 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2210170000 definitions=main-2211080069 X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org On 11/8/2022 4:00 PM, Kalle Valo wrote: > Youghandhar Chintala wrote: > >> In a SoC based solution, it would be useful to know the versions of the >> various binary firmware blobs the system is running on. On a QCOM based >> SoC, this info can be obtained from socinfo debugfs infrastructure. For >> this to work, respective subsystem drivers have to export the firmware >> version information to an SMEM based version information table. >> >> Having firmware version information at one place will help quickly >> figure out the firmware versions of various subsystems on the device >> instead of going through builds/logs in an event of a system crash. >> >> Fill WLAN firmware version information in SMEM version table to be >> printed as part of socinfo debugfs infrastructure on a Qualcomm based >> SoC. >> >> This change is applicable only for WCN399X targets. >> >> Reported-by: kernel test robot >> >> Tested-on: WCN3990 hw1.0 SNOC WLAN.HL.3.2.2.c10-00754-QCAHLSWMTPL-1 >> >> Signed-off-by: Youghandhar Chintala >> Signed-off-by: Kalle Valo > This doesn't compile unless QCOM_SMEM is enabled in Kconfig. So should we add > "select QCOM_SMEM" in Kconfig for ATH10K_SNOC? Yes Kalle. Thank you. Regards, Youghandhar