Message ID | 1447826363-16818-10-git-send-email-michal.kazior@tieto.com (mailing list archive) |
---|---|
State | Accepted |
Headers | show |
6.064984] ath10k_pci 0000:01:00.0: enabling device (0140 -> 0142) [ 6.065432] ath10k_pci 0000:01:00.0: pci irq legacy interrupts 0 irq_mode 0 reset_mode 0 [ 8.448583] ath10k_pci 0000:01:00.0: unable to read from the device [ 8.448614] ath10k_pci 0000:01:00.0: could not execute otp for board id check: -110 [ 8.453657] ath10k_pci 0000:01:00.0: failed to get board id from otp for qca99x0: -110 [ 8.461352] ath10k_pci 0000:01:00.0: could not probe fw (-110) it seems that the there is some sort of problem with the otp. unfortunatly ath10k gives also no usefull information about the reason. this is a embedded ap148 based device (ipq8064) with QCA998X chipsets on it Sebastian
On 11/19/2015 07:10 AM, Sebastian Gottschall wrote: > 6.064984] ath10k_pci 0000:01:00.0: enabling device (0140 -> 0142) > [ 6.065432] ath10k_pci 0000:01:00.0: pci irq legacy interrupts 0 irq_mode 0 reset_mode 0 > [ 8.448583] ath10k_pci 0000:01:00.0: unable to read from the device > [ 8.448614] ath10k_pci 0000:01:00.0: could not execute otp for board id check: -110 > [ 8.453657] ath10k_pci 0000:01:00.0: failed to get board id from otp for qca99x0: -110 > [ 8.461352] ath10k_pci 0000:01:00.0: could not probe fw (-110) > > > it seems that the there is some sort of problem with the otp. unfortunatly ath10k gives also no usefull information about the reason. > this is a embedded ap148 based device (ipq8064) with QCA998X chipsets on it What kernel, what firmware, what board.bin are you using? Thanks, Ben
Am 19.11.2015 um 16:33 schrieb Ben Greear: > On 11/19/2015 07:10 AM, Sebastian Gottschall wrote: >> 6.064984] ath10k_pci 0000:01:00.0: enabling device (0140 -> 0142) >> [ 6.065432] ath10k_pci 0000:01:00.0: pci irq legacy interrupts 0 >> irq_mode 0 reset_mode 0 >> [ 8.448583] ath10k_pci 0000:01:00.0: unable to read from the device >> [ 8.448614] ath10k_pci 0000:01:00.0: could not execute otp for >> board id check: -110 >> [ 8.453657] ath10k_pci 0000:01:00.0: failed to get board id from >> otp for qca99x0: -110 >> [ 8.461352] ath10k_pci 0000:01:00.0: could not probe fw (-110) >> >> >> it seems that the there is some sort of problem with the otp. >> unfortunatly ath10k gives also no usefull information about the reason. >> this is a embedded ap148 based device (ipq8064) with QCA998X chipsets >> on it > > What kernel, what firmware, what board.bin are you using? plain ath10k with kernel 3.18.23. standard firmware-5 from ath10k github, same for board. > > Thanks, > Ben > >
Am 19.11.2015 um 16:33 schrieb Ben Greear: > On 11/19/2015 07:10 AM, Sebastian Gottschall wrote: >> 6.064984] ath10k_pci 0000:01:00.0: enabling device (0140 -> 0142) >> [ 6.065432] ath10k_pci 0000:01:00.0: pci irq legacy interrupts 0 >> irq_mode 0 reset_mode 0 >> [ 8.448583] ath10k_pci 0000:01:00.0: unable to read from the device >> [ 8.448614] ath10k_pci 0000:01:00.0: could not execute otp for >> board id check: -110 >> [ 8.453657] ath10k_pci 0000:01:00.0: failed to get board id from >> otp for qca99x0: -110 >> [ 8.461352] ath10k_pci 0000:01:00.0: could not probe fw (-110) >> >> >> it seems that the there is some sort of problem with the otp. >> unfortunatly ath10k gives also no usefull information about the reason. >> this is a embedded ap148 based device (ipq8064) with QCA998X chipsets >> on it > > What kernel, what firmware, what board.bin are you using? ath10k is the latest used in openwrt. so 23.10. if i remember correct > > Thanks, > Ben > >
On 11/19/2015 07:35 AM, Sebastian Gottschall wrote: > Am 19.11.2015 um 16:33 schrieb Ben Greear: >> On 11/19/2015 07:10 AM, Sebastian Gottschall wrote: >>> 6.064984] ath10k_pci 0000:01:00.0: enabling device (0140 -> 0142) >>> [ 6.065432] ath10k_pci 0000:01:00.0: pci irq legacy interrupts 0 irq_mode 0 reset_mode 0 >>> [ 8.448583] ath10k_pci 0000:01:00.0: unable to read from the device >>> [ 8.448614] ath10k_pci 0000:01:00.0: could not execute otp for board id check: -110 >>> [ 8.453657] ath10k_pci 0000:01:00.0: failed to get board id from otp for qca99x0: -110 >>> [ 8.461352] ath10k_pci 0000:01:00.0: could not probe fw (-110) >>> >>> >>> it seems that the there is some sort of problem with the otp. unfortunatly ath10k gives also no usefull information about the reason. >>> this is a embedded ap148 based device (ipq8064) with QCA998X chipsets on it >> >> What kernel, what firmware, what board.bin are you using? > plain ath10k with kernel 3.18.23. standard firmware-5 from ath10k github, same for board. The kernel tree below at least booted up the 4x4 NIC for me with stock upstream firmware. http://dmz2.candelatech.com/git/gitweb.cgi?p=linux.ath/.git;a=summary git clone git://dmz2.candelatech.com/linux.ath It has most of my patch-set applied...but not sure any of those patches are really needed for basic functionality. Thanks, Ben
Am 19.11.2015 um 17:13 schrieb Ben Greear: > > git clone git://dmz2.candelatech.com/linux.ath same effect with yours 6.201141] ath10k_pci 0000:01:00.0: enabling device (0140 -> 0142) [ 6.201593] ath10k_pci 0000:01:00.0: pci irq legacy interrupts 0 irq_mode 0 reset_mode 0 [ 8.578573] ath10k_pci 0000:01:00.0: unable to read from the device [ 8.578605] ath10k_pci 0000:01:00.0: could not execute otp for board id check: -110 [ 8.583648] ath10k_pci 0000:01:00.0: failed to get board id from otp for qca99x0: -110 [ 8.591338] ath10k_pci 0000:01:00.0: could not probe fw (-110) [ 8.600062] ath10k_pci 0001:01:00.0: enabling device (0140 -> 0142) [ 8.605600] ath10k_pci 0001:01:00.0: pci irq legacy interrupts 0 irq_mode 0 reset_mode 0 [ 10.798574] ath10k_pci 0001:01:00.0: unable to read from the device [ 10.798598] ath10k_pci 0001:01:00.0: could not execute otp for board id check: -110 [ 10.803644] ath10k_pci 0001:01:00.0: failed to get board id from otp for qca99x0: -110 [ 10.811346] ath10k_pci 0001:01:00.0: could not probe fw (-110)
diff --git a/drivers/net/wireless/ath/ath10k/core.h b/drivers/net/wireless/ath/ath10k/core.h index 75dee79ec206..ec19260bf5d1 100644 --- a/drivers/net/wireless/ath/ath10k/core.h +++ b/drivers/net/wireless/ath/ath10k/core.h @@ -93,12 +93,8 @@ struct ath10k_skb_cb { dma_addr_t paddr; u8 flags; u8 eid; + u16 msdu_id; struct ieee80211_vif *vif; - - struct { - struct ath10k_htt_txbuf *txbuf; - u32 txbuf_paddr; - } __packed htt; } __packed; struct ath10k_skb_rxcb { diff --git a/drivers/net/wireless/ath/ath10k/htt_tx.c b/drivers/net/wireless/ath/ath10k/htt_tx.c index 23e047b0aca3..5274f5bb0b45 100644 --- a/drivers/net/wireless/ath/ath10k/htt_tx.c +++ b/drivers/net/wireless/ath/ath10k/htt_tx.c @@ -539,8 +539,6 @@ int ath10k_htt_mgmt_tx(struct ath10k_htt *htt, struct sk_buff *msdu) memcpy(cmd->mgmt_tx.hdr, msdu->data, min_t(int, msdu->len, HTT_MGMT_FRM_HDR_DOWNLOAD_LEN)); - skb_cb->htt.txbuf = NULL; - res = ath10k_htc_send(&htt->ar->htc, htt->eid, txdesc); if (res) goto err_unmap_msdu; @@ -570,6 +568,7 @@ int ath10k_htt_tx(struct ath10k_htt *htt, enum ath10k_hw_txrx_mode txmode, struct ieee80211_tx_info *info = IEEE80211_SKB_CB(msdu); struct ath10k_skb_cb *skb_cb = ATH10K_SKB_CB(msdu); struct ath10k_hif_sg_item sg_items[2]; + struct ath10k_htt_txbuf *txbuf; struct htt_data_tx_desc_frag *frags; bool is_eth = (txmode == ATH10K_HW_TXRX_ETHERNET); u8 vdev_id = ath10k_htt_tx_get_vdev_id(ar, msdu); @@ -580,6 +579,7 @@ int ath10k_htt_tx(struct ath10k_htt *htt, enum ath10k_hw_txrx_mode txmode, u16 msdu_id, flags1 = 0; u16 freq = 0; u32 frags_paddr = 0; + u32 txbuf_paddr; struct htt_msdu_ext_desc *ext_desc = NULL; bool limit_mgmt_desc = false; bool is_probe_resp = false; @@ -607,9 +607,9 @@ int ath10k_htt_tx(struct ath10k_htt *htt, enum ath10k_hw_txrx_mode txmode, prefetch_len = min(htt->prefetch_len, msdu->len); prefetch_len = roundup(prefetch_len, 4); - skb_cb->htt.txbuf = &htt->txbuf.vaddr[msdu_id]; - skb_cb->htt.txbuf_paddr = htt->txbuf.paddr + - (sizeof(struct ath10k_htt_txbuf) * msdu_id); + txbuf = &htt->txbuf.vaddr[msdu_id]; + txbuf_paddr = htt->txbuf.paddr + + (sizeof(struct ath10k_htt_txbuf) * msdu_id); if ((ieee80211_is_action(hdr->frame_control) || ieee80211_is_deauth(hdr->frame_control) || @@ -653,14 +653,14 @@ int ath10k_htt_tx(struct ath10k_htt *htt, enum ath10k_hw_txrx_mode txmode, frags_paddr = htt->frag_desc.paddr + (sizeof(struct htt_msdu_ext_desc) * msdu_id); } else { - frags = skb_cb->htt.txbuf->frags; + frags = txbuf->frags; frags[0].dword_addr.paddr = __cpu_to_le32(skb_cb->paddr); frags[0].dword_addr.len = __cpu_to_le32(msdu->len); frags[1].dword_addr.paddr = 0; frags[1].dword_addr.len = 0; - frags_paddr = skb_cb->htt.txbuf_paddr; + frags_paddr = txbuf_paddr; } flags0 |= SM(txmode, HTT_DATA_TX_DESC_FLAGS0_PKT_TYPE); break; @@ -689,12 +689,11 @@ int ath10k_htt_tx(struct ath10k_htt *htt, enum ath10k_hw_txrx_mode txmode, * avoid extra memory allocations, compress data structures and thus * improve performance. */ - skb_cb->htt.txbuf->htc_hdr.eid = htt->eid; - skb_cb->htt.txbuf->htc_hdr.len = __cpu_to_le16( - sizeof(skb_cb->htt.txbuf->cmd_hdr) + - sizeof(skb_cb->htt.txbuf->cmd_tx) + - prefetch_len); - skb_cb->htt.txbuf->htc_hdr.flags = 0; + txbuf->htc_hdr.eid = htt->eid; + txbuf->htc_hdr.len = __cpu_to_le16(sizeof(txbuf->cmd_hdr) + + sizeof(txbuf->cmd_tx) + + prefetch_len); + txbuf->htc_hdr.flags = 0; if (skb_cb->flags & ATH10K_SKB_F_NO_HWCRYPT) flags0 |= HTT_DATA_TX_DESC_FLAGS0_NO_ENCRYPT; @@ -715,19 +714,19 @@ int ath10k_htt_tx(struct ath10k_htt *htt, enum ath10k_hw_txrx_mode txmode, */ flags1 |= HTT_DATA_TX_DESC_FLAGS1_POSTPONED; - skb_cb->htt.txbuf->cmd_hdr.msg_type = HTT_H2T_MSG_TYPE_TX_FRM; - skb_cb->htt.txbuf->cmd_tx.flags0 = flags0; - skb_cb->htt.txbuf->cmd_tx.flags1 = __cpu_to_le16(flags1); - skb_cb->htt.txbuf->cmd_tx.len = __cpu_to_le16(msdu->len); - skb_cb->htt.txbuf->cmd_tx.id = __cpu_to_le16(msdu_id); - skb_cb->htt.txbuf->cmd_tx.frags_paddr = __cpu_to_le32(frags_paddr); + txbuf->cmd_hdr.msg_type = HTT_H2T_MSG_TYPE_TX_FRM; + txbuf->cmd_tx.flags0 = flags0; + txbuf->cmd_tx.flags1 = __cpu_to_le16(flags1); + txbuf->cmd_tx.len = __cpu_to_le16(msdu->len); + txbuf->cmd_tx.id = __cpu_to_le16(msdu_id); + txbuf->cmd_tx.frags_paddr = __cpu_to_le32(frags_paddr); if (ath10k_mac_tx_frm_has_freq(ar)) { - skb_cb->htt.txbuf->cmd_tx.offchan_tx.peerid = + txbuf->cmd_tx.offchan_tx.peerid = __cpu_to_le16(HTT_INVALID_PEERID); - skb_cb->htt.txbuf->cmd_tx.offchan_tx.freq = + txbuf->cmd_tx.offchan_tx.freq = __cpu_to_le16(freq); } else { - skb_cb->htt.txbuf->cmd_tx.peerid = + txbuf->cmd_tx.peerid = __cpu_to_le32(HTT_INVALID_PEERID); } @@ -743,12 +742,12 @@ int ath10k_htt_tx(struct ath10k_htt *htt, enum ath10k_hw_txrx_mode txmode, sg_items[0].transfer_id = 0; sg_items[0].transfer_context = NULL; - sg_items[0].vaddr = &skb_cb->htt.txbuf->htc_hdr; - sg_items[0].paddr = skb_cb->htt.txbuf_paddr + - sizeof(skb_cb->htt.txbuf->frags); - sg_items[0].len = sizeof(skb_cb->htt.txbuf->htc_hdr) + - sizeof(skb_cb->htt.txbuf->cmd_hdr) + - sizeof(skb_cb->htt.txbuf->cmd_tx); + sg_items[0].vaddr = &txbuf->htc_hdr; + sg_items[0].paddr = txbuf_paddr + + sizeof(txbuf->frags); + sg_items[0].len = sizeof(txbuf->htc_hdr) + + sizeof(txbuf->cmd_hdr) + + sizeof(txbuf->cmd_tx); sg_items[1].transfer_id = 0; sg_items[1].transfer_context = NULL;
Txbuf is no longer a DMA pool and can be easily tracked with a mere msdu_id. This saves 10 bytes on 64bit systems and 6 bytes on 32bit systems of precious sk_buff control buffer. Signed-off-by: Michal Kazior <michal.kazior@tieto.com> --- drivers/net/wireless/ath/ath10k/core.h | 6 +--- drivers/net/wireless/ath/ath10k/htt_tx.c | 55 ++++++++++++++++---------------- 2 files changed, 28 insertions(+), 33 deletions(-)