Hi Balaji,
This patch fixes it, thank you.

On Fri, Jun 28, 2019 at 2:17 AM Balaji Pothunoori
<[email protected]> wrote:
>
> Hi,
>
> Can you try with this patch ?
>
> https://patchwork.kernel.org/patch/11021495/
>
> Regards,
> Balaji.
>
> On 2019-06-01 23:37, Vjaceslavs Klimovs wrote:
> > Hi Balaji,
> > Thank you for looking into this.
> >
> > 1) x86_64 AP
> > 2) Compex WLE1216V5-23 or WLE1216V5-20 card with QCA9984
> > 3) any kernel with commit 6ddc3860a5668808bacbfcb1f1bf50d5d7ad1956
> > present
> > 4) kernel has DFS enabled and CONFIG_ATH10K_DFS_CERTIFIED=y,
> > CONFIG_ATH_REG_DYNAMIC_USER_REG_HINTS=y,
> > CONFIG_ATH_REG_DYNAMIC_USER_CERT_TESTING=y  set
> > 5) any firmware from
> > https://github.com/kvalo/ath10k-firmware/tree/master/QCA9984/hw1.0/3.9.0.2,
> > see card initialization dmesg in my first message
> > 6) hostapd with the following config:
> >
> > interface=wlp9s0
> > ctrl_interface=/var/run/hostapd
> > bridge=br0
> > ssid=XXXXXXXX
> > hw_mode=a
> > chanlist=52 100 116 132
> > acs_chan_bias=116:0.1 132:0.1
> > country_code=US
> > ieee80211d=1
> > ieee80211h=1
> > ieee80211n=1
> > ht_capab=[LDPC][HT40+][SHORT-GI-20][SHORT-GI-40][TX-STBC][RX-STBC1][MAX-AMSDU-7935][DSSS_CCK-40]
> > ieee80211ac=1
> > vht_capab=[MAX-MPDU-11454][VHT160-80PLUS80][RXLDPC][SHORT-GI-80][SHORT-GI-160][TX-STBC-2BY1][RX-STBC-1][SU-BEAMFORMER][SU-BEAMFORMEE][BF-ANTENNA-4][SOUNDING-DIMENSION-4][MU-BEAMFORMER][MAX-A-MPDU-LEN-EXP7][RX-ANTENNA-PATTERN][TX-ANTENNA-PATTERN]
> > vht_oper_chwidth=1
> > auth_algs=1
> > wpa=2
> > wpa_key_mgmt=WPA-PSK
> > wpa_passphrase=XXXXXXXX
> > wpa_disable_eapol_key_retries=1
> > rsn_pairwise=CCMP
> > wmm_enabled=1
> > ap_isolate=1
> >
> > 7) any STA (ChromeOS, Android, Windows tried) triggers the crash.
> >
> > On Thu, May 30, 2019 at 6:58 AM Balaji Pothunoori
> > <[email protected]> wrote:
> >>
> >> Hi,
> >>
> >> We are not seeing mentioned issue with following setup.
> >> Setup details are :
> >> AP - X86 with 5.1.0 kernel + QCA9984.
> >> STA - Standard STA.
> >> Observation : Crash is not observed during STA join.
> >>
> >> Could you please share the steps what you have followed ?
> >>
> >> Regards,
> >> Balaji.
> >>
> >> > -----Original Message-----
> >> > From: ath10k <[email protected]> On Behalf Of
> >> > Vjaceslavs Klimovs
> >> > Sent: Tuesday, May 28, 2019 11:53 PM
> >> > To: [email protected]
> >> > Cc: Abhishek Ambure <[email protected]>;
> >> > [email protected]
> >> > Subject: [EXT] Re: ath10k panic with 5.1 kernel and qca9984 on
> >> > association
> >> >
> >> > Abhishek,
> >> > I am happy to test a proposed fix, let me know.
> >> >
> >> > On Tue, May 28, 2019 at 4:22 AM Kalle Valo <[email protected]>
> >> > wrote:
> >> >>
> >> >> + Abhishek
> >> >>
> >> >> Vjaceslavs Klimovs <[email protected]> writes:
> >> >>
> >> >> > With 5.1 and head kernel, machine running as AP with qca9984 locks
> >> >> > up without being able to complete stack trace to console after a
> >> >> > client tries to associate with it. Following are (OCR transcribed)
> >> >> > error
> >> >> > messages:
> >> >> >
> >> >> > [ 177.161539] BUG: unable to handle kernel paging request at
> >> >> > fffffffffffff7bo [ 177.161553] #PF error: (normal kernel read fault)
> >> >> > [ 177.161561] PGD 703812067 P4D 703812067 PUD 20381406 PMD 0 [
> >> >> > 177.161571] Oops: 0000 (#1) SMP PTI [ 177.161577] CPU: 6 PID: 0
> >> >> > Comm: swapper/6 Tainted: G OE 5.1.3-gentoo #1
> >> >> >
> >> >> > [Garbage on screen after that point]
> >> >> >
> >> >> > and
> >> >> >
> >> >> > [67.805490] RBP: ffff9c4c57983d 18 R08: 0000000000000000 R09:
> >> >> > 0000000000000000 [67.805501] R10: 0000000000000002 R11:
> >> >> > 0000000000000000 R12: 0000000000000001 [67.805512] R13:
> >> >> > 0000000000000000 R14: 0000000000060002 R15: 0000000000000000
> >> >> > [67.805523] FS: 000000000000000000000) GS:ffff9c4c57980000 (0000)
> >> >> > knIGS:000000000 [67.805535] CS: 0010 DS: 0000 ES: 0000 CRO:
> >> >> > 0000000080050033
> >> >> > [67.805544] CR2: fffffffffffff7b0 CR3: 00000005f7e0e006 CR4:
> >> >> > 00000000003606e0 [67.805555] DRO: 0000000000000000 DR1: 
> >> >> > 0000000000000000 DR2:
> >> >> > 0000000000000000 [67.805566] DR3: 0000000000000000 DR6:
> >> >> > 00000000fffeoffO DR7: 0000000000000400 [67.805577] Call Trace:
> >> >> > [67.805582] <IRQ>
> >> >> > [67.805592] ath10k_htt_t2h_msg_handler+0xbda/0xf80 [ath10k_core]
> >> >> > [67.805603] ? _raw_spin_unlock_bh+0xie/0x20 [67.805614] ?
> >> >> > ath1ok_ce_per_engine_service+0xf1/0x100 [ath10k_corel [67.805626]
> >> >> > ath10k_pci_htt_rx_cb+0x172/0x260 [ath10k_pci] [67.8056391]
> >> >> > ath10k_ce_per_engine_service+0x9e/0x100 [ath10k_core)
> >> >> >
> >> >> > [Garbage on screen after that point]
> >> >> >
> >> >> > The issue does not reproduce on 5.0.17 but is reliably reproducible
> >> >> > in 5.1+ by just trying to associate to that AP. So I thought I'd run
> >> >> > git bisect. After bisecting,
> >> >> >
> >> >> > 6ddc3860a5668808bacbfcb1f1bf50d5d7ad1956, ath10k: add support for
> >> >> > ack rssi value of data tx packets
> >> >> >
> >> >> > is the first commit that triggers the problem. Reverting that commit
> >> >> > from head or from 5.1.5 reliably makes everything work as expected.
> >> >>
> >> >> Thank you for the bisect, this is really helpful. Full commit log
> >> >> below.
> >> >> Abhishek, please fix this or send a revert for 5.2.
> >> >>
> >> >> commit 6ddc3860a5668808bacbfcb1f1bf50d5d7ad1956
> >> >> Author:     Abhishek Ambure <[email protected]>
> >> >> AuthorDate: Mon Feb 25 11:45:48 2019 +0200
> >> >> Commit:     Kalle Valo <[email protected]>
> >> >> CommitDate: Tue Feb 26 14:58:06 2019 +0200
> >> >>
> >> >>     ath10k: add support for ack rssi value of data tx packets
> >> >>
> >> >>     In WCN3990, WMI_TLV_SERVICE_TX_DATA_MGMT_ACK_RSSI service
> >> >> Indicates that
> >> >>     the firmware has the capability to send the RSSI value of the ACK
> >> >> for all
> >> >>     data and management packets transmitted.
> >> >>
> >> >>     If WMI_RSRC_CFG_FLAG_TX_ACK_RSSI is set in host capability then
> >> >> firmware
> >> >>     sends RSSI value in "data" tx completion event. Host extracts ack
> >> >> rssi
> >> >>     values of data packets from their tx completion event.
> >> >>
> >> >>     Tested HW: WCN3990
> >> >>     Tested FW: WLAN.HL.2.0-01617-QCAHLSWMTPLZ-1
> >> >>
> >> >>     Signed-off-by: Abhishek Ambure <[email protected]>
> >> >>     Signed-off-by: Kalle Valo <[email protected]>
> >> >>
> >> >> --
> >> >> Kalle Valo

_______________________________________________
ath10k mailing list
[email protected]
http://lists.infradead.org/mailman/listinfo/ath10k

Reply via email to