Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp2539495rwd; Wed, 14 Jun 2023 04:28:43 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ6OCNziVko/PZqw4ts5cAM45rETzDaY8WDtRXSjhuPWFbtoijpXSGDXL1S69E7Rso3Uq3Q2 X-Received: by 2002:a05:6a20:7349:b0:10b:4a5d:87e with SMTP id v9-20020a056a20734900b0010b4a5d087emr1202128pzc.53.1686742121110; Wed, 14 Jun 2023 04:28:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1686742121; cv=none; d=google.com; s=arc-20160816; b=lskASyouEFJoUb1pUdGo773/8hJuTN4HwbbZ8KAtG/GI3ekIkeQuvcEX4qJnlZxNzi SDnEwAWhxG+Wc/Cns5YOsNdTdEe5cQiaDalFR4FQI/2Zqmhzo5m8Zx+ADXt1LCRQsW8Z aW0kZIe+EO+JVgXRorXlu1cyMpNJK14zJ3eJ0lzDzRVYuzmjU8O9/89LBT2xp67T1NTL nm5l6+6R3VpwngfC7DoY4ow4v1mD3/bWKJWVW8XB9G9MkPUlnHmnoHu89Cg7FBHJcIUq rOQCMb7Erdr4TOfVCkwllRDp4kBhToboTBB/wiRQT+rab/SYmXyKZZiKqKq1h+N2tCIh YsWQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=hAMW8FuKzcc6pYzhHJiI58EhBv12Te2omy+U0G4iHzk=; b=0ppL3XuIscObZ11PI30J7eQsFcs+2aqZPS+elWZlvQ6QMFdtRAacIoxU6ocht5Hm8W FSv475cLXewPSwbgaHc91O/HRYwC7mf7DliRZsizayKh2CC4KAt5PgrGdNndqQASI4QV 9xGaKDIXlsdj1uPo03Z17DNB73/Ivrlb2pg5C5NcHc/YU9DGXuXPpm9MBMpE9tCJ1Yyh G7aFENWQxW+8a4H28l3Q7ZfDqLHjan3+nAgU5WW70detCaV1rMN7X/Zlx0SPns1Jl62e fj4C5Rk1BgxYH2t3Bh75tmouOrNA4pQjLulI2Wu9otUmggci3mcwGsbsAQI+AnTljrN9 FdVQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@collabora.com header.s=mail header.b=iUAS0uxP; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=collabora.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id d1-20020aa797a1000000b006666cc2f03dsi560703pfq.283.2023.06.14.04.28.29; Wed, 14 Jun 2023 04:28:41 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@collabora.com header.s=mail header.b=iUAS0uxP; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=collabora.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235014AbjFNLUT (ORCPT + 61 others); Wed, 14 Jun 2023 07:20:19 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39806 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S243818AbjFNLTa (ORCPT ); Wed, 14 Jun 2023 07:19:30 -0400 Received: from madras.collabora.co.uk (madras.collabora.co.uk [IPv6:2a00:1098:0:82:1000:25:2eeb:e5ab]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B9B142959; Wed, 14 Jun 2023 04:18:52 -0700 (PDT) Received: from [IPV6:2001:b07:2ed:14ed:c5f8:7372:f042:90a2] (unknown [IPv6:2001:b07:2ed:14ed:c5f8:7372:f042:90a2]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) (Authenticated sender: kholk11) by madras.collabora.co.uk (Postfix) with ESMTPSA id B290C6606EFD; Wed, 14 Jun 2023 12:18:50 +0100 (BST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=collabora.com; s=mail; t=1686741531; bh=mk2/pYLZgRMBhvKuJCtJgo6lcTKdBXdHOm/hXqC0BjM=; h=Date:Subject:To:Cc:References:From:In-Reply-To:From; b=iUAS0uxPuy2foVhRuBpIM5v7NFPSfDtuBUlldSsGIwybe918agelnbtPIrgEiAH22 xvU8SGWTLtOx3WpQ1VMgdK8PntWdp3RvRD6XRrNLqG3Uoe4bNgwp4jDJ0I3dBK06qV 85KOE3NEAeQJsKNQDgPshrc8PsBmrXeKy3fTlzjJsWRdkPyAVtw9kTaO+Xu9vSfoXQ 9BnGMGdn2T3Y9M5HbGMRVHqmBchCOoxzp0yX8FzuZdUAyzRepzeuxG6g7ZLKP3JA4Y C1ZHCGRBCEsDC1mIi6uZKoUFas9QRCoEPD8fMIYBLmMZ9sfTx1jzoLmmz7WDdTeSW+ qagE+vpSxDP9Q== Message-ID: Date: Wed, 14 Jun 2023 13:18:48 +0200 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.11.2 Subject: Re: [PATCH] wifi: mt76: mt7921e: Perform FLR to recovery the device Content-Language: en-US To: Kai-Heng Feng , nbd@nbd.name, lorenzo@kernel.org, ryder.lee@mediatek.com Cc: Shayne Chen , Sean Wang , Kalle Valo , Matthias Brugger , Deren Wu , Leon Yen , linux-wireless@vger.kernel.org, linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-mediatek@lists.infradead.org References: <20230614063252.1650824-1-kai.heng.feng@canonical.com> From: AngeloGioacchino Del Regno In-Reply-To: <20230614063252.1650824-1-kai.heng.feng@canonical.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-2.2 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org Il 14/06/23 08:32, Kai-Heng Feng ha scritto: > When "Pre-boot WiFi" is enabled in BIOS, the mt7921e device may not > work: > mt7921e 0000:02:00.0: ASIC revision: 79220010 > mt7921e 0000:02:00.0: Message 00000010 (seq 1) timeout > mt7921e 0000:02:00.0: Failed to get patch semaphore > mt7921e 0000:02:00.0: Message 00000010 (seq 2) timeout > mt7921e 0000:02:00.0: Failed to get patch semaphore > mt7921e 0000:02:00.0: Message 00000010 (seq 3) timeout > mt7921e 0000:02:00.0: Failed to get patch semaphore > mt7921e 0000:02:00.0: Message 00000010 (seq 4) timeout > mt7921e 0000:02:00.0: Failed to get patch semaphore > mt7921e 0000:02:00.0: Message 00000010 (seq 5) timeout > mt7921e 0000:02:00.0: Failed to get patch semaphore > mt7921e 0000:02:00.0: Message 00000010 (seq 6) timeout > mt7921e 0000:02:00.0: Failed to get patch semaphore > mt7921e 0000:02:00.0: Message 00000010 (seq 7) timeout > mt7921e 0000:02:00.0: Failed to get patch semaphore > mt7921e 0000:02:00.0: Message 00000010 (seq 8) timeout > mt7921e 0000:02:00.0: Failed to get patch semaphore > mt7921e 0000:02:00.0: Message 00000010 (seq 9) timeout > mt7921e 0000:02:00.0: Failed to get patch semaphore > mt7921e 0000:02:00.0: Message 00000010 (seq 10) timeout > mt7921e 0000:02:00.0: Failed to get patch semaphore > mt7921e 0000:02:00.0: hardware init failed > > After some trials and errors, it shows that PCI function level reset can > recover the device back to a functional state. > > So perform FLR at probe routine to workaround the issue. Is there any way to check if the device was enabled before booting Linux? I'm thinking of something like if (device_is_already_enabled) ret = pci_reset_function_locked(....) Regards, Angelo > > Signed-off-by: Kai-Heng Feng > --- > drivers/net/wireless/mediatek/mt76/mt7921/pci.c | 4 ++++ > 1 file changed, 4 insertions(+) > > diff --git a/drivers/net/wireless/mediatek/mt76/mt7921/pci.c b/drivers/net/wireless/mediatek/mt76/mt7921/pci.c > index ddb1fa4ee01d..9671fbe35a8e 100644 > --- a/drivers/net/wireless/mediatek/mt76/mt7921/pci.c > +++ b/drivers/net/wireless/mediatek/mt76/mt7921/pci.c > @@ -262,6 +262,10 @@ static int mt7921_pci_probe(struct pci_dev *pdev, > int ret; > u16 cmd; > > + ret = pci_reset_function_locked(pdev); > + if (ret) > + pci_info(pdev, "Unable to perform FLR\n"); > + > ret = pcim_enable_device(pdev); > if (ret) > return ret;