• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/drivers/net/wimax/i2400m/

Lines Matching refs:ack

59  * reboot barker (4 le32 words with the same value). We ack it by
61 * reboot ack barker (4 le32 words with value I2400M_ACK_BARKER) and
438 * Verify the ack data received
443 * @opcode: opcode which generated this ack. For error messages.
444 * @ack: pointer to ack data we received
452 struct i2400m_bootrom_header *ack,
458 d_fnstart(8, dev, "(i2400m %p opcode %d ack %p size %zu)\n",
459 i2400m, opcode, ack, ack_size);
460 if (ack_size < sizeof(*ack)) {
464 opcode, ack_size, sizeof(*ack));
467 result = i2400m_is_boot_barker(i2400m, ack, ack_size);
474 && memcmp(ack, i2400m_ACK_BARKER, sizeof(*ack)) == 0) {
476 d_printf(3, dev, "boot-mode cmd %d: HW reboot ack barker\n",
483 ack->data_size = le32_to_cpu(ack->data_size);
484 ack->target_addr = le32_to_cpu(ack->target_addr);
485 ack->block_checksum = le32_to_cpu(ack->block_checksum);
488 opcode, i2400m_brh_get_opcode(ack),
489 i2400m_brh_get_response(ack),
490 i2400m_brh_get_use_checksum(ack),
491 i2400m_brh_get_response_required(ack),
492 i2400m_brh_get_direct_access(ack));
494 if (i2400m_brh_get_signature(ack) != 0xcbbc) {
496 "0x%04x\n", opcode, i2400m_brh_get_signature(ack));
499 if (opcode != -1 && opcode != i2400m_brh_get_opcode(ack)) {
502 opcode, i2400m_brh_get_opcode(ack), opcode);
505 if (i2400m_brh_get_response(ack) != 0) { /* failed? */
507 opcode, i2400m_brh_get_response(ack));
510 if (ack_size < ack->data_size + sizeof(*ack)) {
514 (size_t) le32_to_cpu(ack->data_size) + sizeof(*ack));
529 d_fnend(8, dev, "(i2400m %p opcode %d ack %p size %zu) = %d\n",
530 i2400m, opcode, ack, ack_size, (int) result);
553 * If NULL, no command is sent (we just wait for an ack).
558 * @ack: buffer where to place the acknowledgement. If it is a regular
564 * @ack_size: size of @ack, 16 aligned; you need to provide at least
565 * sizeof(*ack) bytes and then enough to contain the return data
583 struct i2400m_bootrom_header *ack, size_t ack_size,
590 d_fnstart(6, dev, "(i2400m %p cmd %p size %zu ack %p size %zu)\n",
591 i2400m, cmd, cmd_size, ack, ack_size);
592 BUG_ON(ack_size < sizeof(*ack));
609 result = i2400m->bus_bm_wait_for_ack(i2400m, ack, ack_size);
611 dev_err(dev, "boot-mode cmd %d: error waiting for an ack: %d\n",
616 /* verify the ack and read more if necessary [result is the
617 * final amount of bytes we get in the ack] */
618 result = __i2400m_bm_ack_verify(i2400m, opcode, ack, ack_size, flags);
628 d_fnend(6, dev, "(i2400m %p cmd %p size %zu ack %p size %zu) = %d\n",
629 i2400m, cmd, cmd_size, ack, ack_size, (int) result);
655 struct i2400m_bootrom_header ack;
670 &ack, sizeof(ack), 0);
709 struct i2400m_bootrom_header ack;
745 &ack, sizeof(ack), I2400M_BM_CMD_RAW);
793 struct i2400m_bootrom_header *cmd, ack;
830 &ack, sizeof(ack), I2400M_BM_CMD_RAW);
860 * b. (1) echo/ack the reboot sending the reboot barker back and (2)
861 * getting an ack barker in return
872 * echo/ack reboot barker being sent back, it doesn't understand
886 struct i2400m_bootrom_header ack;
892 BUILD_BUG_ON(sizeof(ack) != sizeof(i2400m_ACK_BARKER));
907 result = i2400m_bm_cmd(i2400m, NULL, 0, &ack, sizeof(ack),
920 d_printf(4, dev, "device reboot: got ack barker - whatever\n");
925 * already and expecting an ack; if we don't know what
931 "trying (set) %08x echo/ack\n",
939 &ack, sizeof(ack),
942 dev_warn(dev, "device boot: got ack barker "
943 "after sending echo/ack barker "
960 d_dump(1, dev, &ack, result);
963 /* At this point we ack back with 4 REBOOT barkers and expect
965 * hence the cast. _bm_cmd() will catch the reboot ack
968 d_printf(4, dev, "device reboot ack: sending ack [%d # left]\n", count);
971 &ack, sizeof(ack), I2400M_BM_CMD_RAW);
974 d_printf(4, dev, "reboot ack: got reboot barker - retrying\n");
979 d_printf(4, dev, "reboot ack: got ack barker - good\n");
983 d_printf(4, dev, "reboot ack timedout: retrying\n");
986 dev_err(dev, "reboot ack timedout too long: "
995 dev_err(dev, "device reboot ack: error %d while waiting for "
996 "reboot ack barker - rebooting\n", result);
999 d_printf(2, dev, "device reboot ack: got ack barker - boot done\n");
1008 dev_err(dev, "Timed out waiting for reboot ack\n");
1030 struct i2400m_bootrom_header ack;
1040 &ack_buf.ack, sizeof(ack_buf), 0);
1119 struct i2400m_bootrom_header ack;
1129 &ack, sizeof(ack), 0);