Received: by 2002:a05:6358:a55:b0:ec:fcf4:3ecf with SMTP id 21csp562447rwb; Wed, 18 Jan 2023 22:56:46 -0800 (PST) X-Google-Smtp-Source: AMrXdXssX8pZPysHqmgiY5Uo40Y8vuGjlraUqT4vRvgmfdQFRj+CmgzSWFA/F8ak6P38CR3QwnxH X-Received: by 2002:aa7:9805:0:b0:58d:f609:76a7 with SMTP id e5-20020aa79805000000b0058df60976a7mr3496388pfl.32.1674111406533; Wed, 18 Jan 2023 22:56:46 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1674111406; cv=none; d=google.com; s=arc-20160816; b=pbACtQ7SzDg1e023oASdmuj7W/JijLqv68pt6JNabudiJIEB9YCrjk6rGlw8yhNfLc bunrSDLsFjea2Yi/2PspoHedP0s4SBAY5Tp3v3GSmLL5CCpR+3MXUMIYAyxZ4OzFDQlD KHbAV4MzdwvYP0j1cOpDZXooajvRL0mVdkdJEm7J6B4YDUoUzvKSEa1WGAFzy7mDV8aF oBnL7IGET3OHyDwn0Ck84wydg/xC4c1jD9CIrVY42MRIYFo68OlEL27ax3dCGsfsbx83 zcw6qTpDaOx/PfXIeuGkxgCzhBO7DU6YD99a0sT46WoVWFV9C6AklnUWeMbDDYEzS3H6 wYmQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:authenticated-by; bh=oFfPNymYnFNQUL2KNETZ4UZXS2zouLvvaWXV47ZeOEM=; b=p6qO7zb54To5bH2+Bb5Lbbhu3iZymw0M8aDjOnWVjWGZo3IH05N3LN6tdWuJN/oAkC wwNLW/Ubd/wMqCZahteMtcaq6KUwVfsKiwnMqTPS1XNhgusnSIhvRleuzUAM/mnI318h iLv6KeG2IJA6+3teKXeKH2ma/aDj9dcVi+qE6iZALrC4DJQ3Tjlq3NEUyEhGcARJfu8G DZ16AUA5W52NEutvIWDCImXRDoNmNd3wfybEf/v3C8mXbIM1sTuS5QllIL9gaYz6Q5kO sQajiUWuZ65VBfot/qJcH414/kmrD6TEOjf2DeKBohOj/55hPSFaw9I2jCjuqMX9oTfL 7qwg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id k3-20020aa78203000000b0058d9266a507si13529514pfi.376.2023.01.18.22.56.39; Wed, 18 Jan 2023 22:56:46 -0800 (PST) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229787AbjASGgA (ORCPT + 63 others); Thu, 19 Jan 2023 01:36:00 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54974 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229583AbjASGf5 (ORCPT ); Thu, 19 Jan 2023 01:35:57 -0500 Received: from rtits2.realtek.com.tw (rtits2.realtek.com [211.75.126.72]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 2A26E1715C for ; Wed, 18 Jan 2023 22:35:55 -0800 (PST) Authenticated-By: X-SpamFilter-By: ArmorX SpamTrap 5.77 with qID 30J6ZlNlA012543, This message is accepted by code: ctloc85258 Received: from mail.realtek.com (rtexh36506.realtek.com.tw[172.21.6.27]) by rtits2.realtek.com.tw (8.15.2/2.81/5.90) with ESMTPS id 30J6ZlNlA012543 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=FAIL); Thu, 19 Jan 2023 14:35:47 +0800 Received: from RTEXMBS04.realtek.com.tw (172.21.6.97) by RTEXH36506.realtek.com.tw (172.21.6.27) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.9; Thu, 19 Jan 2023 14:35:48 +0800 Received: from localhost (172.21.69.188) by RTEXMBS04.realtek.com.tw (172.21.6.97) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.7; Thu, 19 Jan 2023 14:35:48 +0800 From: Ping-Ke Shih To: CC: , Subject: [PATCH 0/2] wifi: rtw89: fix inaccessible IO issues Date: Thu, 19 Jan 2023 14:35:27 +0800 Message-ID: <20230119063529.61563-1-pkshih@realtek.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Transfer-Encoding: 7BIT Content-Type: text/plain; charset=US-ASCII X-Originating-IP: [172.21.69.188] X-ClientProxiedBy: RTEXMBS02.realtek.com.tw (172.21.6.95) To RTEXMBS04.realtek.com.tw (172.21.6.97) X-KSE-ServerInfo: RTEXMBS04.realtek.com.tw, 9 X-KSE-AntiSpam-Interceptor-Info: trusted connection X-KSE-Antiphishing-Info: Clean X-KSE-Antiphishing-ScanningType: Deterministic X-KSE-Antiphishing-Method: None X-KSE-Antiphishing-Bases: 01/19/2023 06:15:00 X-KSE-AttachmentFiltering-Interceptor-Info: no applicable attachment filtering rules found X-KSE-Antivirus-Interceptor-Info: scan successful X-KSE-Antivirus-Info: =?big5?B?Q2xlYW4sIGJhc2VzOiAyMDIzLzEvMTkgpFekyCAwMzozNzowMA==?= X-KSE-BulkMessagesFiltering-Scan-Result: protection disabled X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_NONE, SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org During debug, we found some inaccessible IO can cause that firmware detect hardware abnormal, and then trigger recovery mechanism. This make registers changed, and can't dump correct registers to reflect abnormal symptom for analysis. Zong-Zhe Yang (2): wifi: rtw89: debug: avoid invalid access on RTW89_DBG_SEL_MAC_30 wifi: rtw89: deal with RXI300 error drivers/net/wireless/realtek/rtw89/debug.c | 7 +++++++ drivers/net/wireless/realtek/rtw89/mac.c | 5 ++++- drivers/net/wireless/realtek/rtw89/mac.h | 2 ++ 3 files changed, 13 insertions(+), 1 deletion(-) -- 2.25.1