Hi Kalle On 6 October 2011 11:48, Kalle Valo <kvalo@xxxxxxxxxxxxxxxx> wrote: > On 10/05/2011 05:14 PM, Sangwook Lee wrote: >> Fix OTP execution address for AR6003 HW2.0 >> >> ath6kl: writing otp to 0x543180 (3689 B) >> ath6kl: bmi LZ stream start: addr: 0x543180) >> ath6kl: bmi send LZ data: len: 3688) >> ath6kl: bmi send LZ data: len: 4) >> ath6kl: bmi LZ stream start: addr: 0x0) >> ath6kl: bmi read memory: device: addr: 0x54061c, len: 4 >> ath6kl: app_start_override_addr 0x0 >> ath6kl: executing OTP at 0x0 >> ath6kl: bmi execute: addr: 0x0, param: 0) >> ath6kl: bmi_recv_buf FIFO empty >> ath6kl: Unable to read from the device: -22 > > Ah, now I understand. So this patch broke it: > > commit 639d0b8996aa5913402b846932d57a51a23a40c9 > Author: Kalle Valo <kvalo@xxxxxxxxxxxxxxxx> > Date: Mon Sep 12 12:48:09 2011 +0300 > > ath6kl: read firmware start address from hardware > > It's actually possible to read the firmware start address from hardware, > that way there's no need to hardcode the address in hardware. > > > So the firmware start address detections doesn't actually work with hw > 2.0, too bad. > > Actually I would like to fix this a bit differently, can you please try > the attached patch? Compile tested only. If it works, please send me a > Tested-by tag. Yes I will do it. > > BTW, do you still need to enable debug logs to get hw2.0 working properly? Yes, I still have to use debug but want to fix it now, so please let me debug as based on your last advice and then report to you. > > Kalle > Sangwook -- To unsubscribe from this list: send the line "unsubscribe linux-wireless" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html