Bug#875362: linux-image-4.12.0-1-amd64: 5GHz wifi randomly drops on ath10k QCA6174

2017-10-18 Thread Thibaut Girka
This appears exactly when wpa_supplicant issues this message:
oct. 18 23:52:25 vicious wpa_supplicant[868]: wlp58s0: WPA: Key negotiation 
completed with 16:cc:20:56:eb:95 [PTK=CCMP GTK=TKIP]
oct. 18 23:52:25 vicious wpa_supplicant[868]: wlp58s0: CTRL-EVENT-CONNECTED - 
Connection to 16:cc:20:56:eb:95 completed [id=0 id_str=]
oct. 18 23:52:31 vicious wpa_supplicant[868]: wlp58s0: WPA: Group rekeying 
completed with 16:cc:20:56:eb:95 [GTK=TKIP]
oct. 18 23:53:01 vicious wpa_supplicant[868]: wlp58s0: WPA: Group rekeying 
completed with 16:cc:20:56:eb:95 [GTK=TKIP]

As seen above, I have lowered my AP's wpa_group_rekey to 30s in order to
confirm the issue, and it indeed reliably occurs after the second rekeying.

This looks like a known issue with the firmware:
http://lists.infradead.org/pipermail/ath10k/2017-August/010069.html

Updating to latest firmware-6.bin[1] and board-2.bin[2] seems to fix the issue.

[1]: 
https://github.com/kvalo/ath10k-firmware/blob/master/QCA6174/hw3.0/4.4.1/firmware-6.bin_WLAN.RM.4.4.1-00065-QCARMSWP-1
[2]: 
https://github.com/kvalo/ath10k-firmware/blob/master/QCA6174/hw3.0/board-2.bin



Bug#875362: linux-image-4.12.0-1-amd64: 5GHz wifi randomly drops on ath10k QCA6174

2017-09-10 Thread Thibaut Girka
Package: src:linux
Version: 4.12.6-1
Severity: normal

Since I upgraded to linux 4.12.0-1-amd64, my wifi at home (5.18GHz, WPA2-PSK)
frequently and silently fails. Manually re-connecting works. This issue does
not appear on linux 4.11.0-1, nor does it occur at my workplace, where I am
connected to a 2.4GHz access-point (WPA2 TTLS).



-- Package-specific info:
** Version:
Linux version 4.12.0-1-amd64 (debian-ker...@lists.debian.org) (gcc version 
6.4.0 20170805 (Debian 6.4.0-3) ) #1 SMP Debian 4.12.6-1 (2017-08-12)

** Command line:
BOOT_IMAGE=/vmlinuz-4.12.0-1-amd64 root=/dev/mapper/vicious--vg-root ro quiet

** Not tainted

** Kernel log:
Unable to read kernel log; any relevant messages should be attached

** Model information
sys_vendor: Dell Inc.
product_name: XPS 13 9360
product_version: 
chassis_vendor: Dell Inc.
chassis_version: 
bios_vendor: Dell Inc.
bios_version: 2.2.1
board_vendor: Dell Inc.
board_name: 05JK94
board_version: A00

** Loaded modules:
fuse
ctr
ccm
rfcomm
arc4
cmac
bnep
hid_multitouch
snd_hda_codec_hdmi
binfmt_misc
nls_ascii
nls_cp437
snd_hda_codec_realtek
vfat
dell_laptop
i2c_designware_platform
dell_wmi
dell_smbios
fat
snd_hda_codec_generic
i2c_designware_core
dcdbas
intel_rapl
x86_pkg_temp_thermal
intel_powerclamp
efi_pstore
coretemp
kvm_intel
snd_soc_skl
kvm
snd_soc_skl_ipc
ath10k_pci
irqbypass
ath10k_core
snd_soc_sst_ipc
snd_soc_sst_dsp
intel_cstate
intel_uncore
snd_hda_ext_core
snd_soc_sst_match
ath
intel_rapl_perf
evdev
mac80211
joydev
uvcvideo
snd_soc_core
videobuf2_vmalloc
snd_compress
videobuf2_memops
pcspkr
serio_raw
efivars
snd_hda_intel
i915
videobuf2_v4l2
snd_hda_codec
iTCO_wdt
iTCO_vendor_support
cfg80211
snd_hda_core
snd_hwdep
snd_pcm
snd_timer
rtsx_pci_ms
snd
soundcore
videobuf2_core
memstick
videodev
media
idma64
drm_kms_helper
drm
mei_me
btusb
btrtl
processor_thermal_device
i2c_algo_bit
mei
shpchp
intel_pch_thermal
intel_soc_dts_iosf
intel_lpss_pci
ucsi
wmi
battery
hci_uart
btbcm
btqca
btintel
soc_button_array
intel_vbtn
bluetooth
ecdh_generic
rfkill
video
intel_lpss_acpi
intel_lpss
intel_hid
int3403_thermal
sparse_keymap
int3400_thermal
int340x_thermal_zone
acpi_thermal_rel
acpi_als
acpi_pad
kfifo_buf
ac
button
industrialio
parport_pc
ppdev
lp
parport
efivarfs
ip_tables
x_tables
autofs4
ext4
crc16
jbd2
fscrypto
ecb
mbcache
btrfs
crc32c_generic
xor
raid6_pq
algif_skcipher
af_alg
dm_crypt
dm_mod
crct10dif_pclmul
crc32_pclmul
crc32c_intel
ghash_clmulni_intel
pcbc
rtsx_pci_sdmmc
mmc_core
aesni_intel
aes_x86_64
crypto_simd
glue_helper
cryptd
psmouse
i2c_i801
nvme
xhci_pci
nvme_core
rtsx_pci
xhci_hcd
mfd_core
usbcore
usb_common
thermal
i2c_hid
hid

** Network interface configuration:

source /etc/network/interfaces.d/*

auto lo
iface lo inet loopback

** Network status:
*** IP interfaces and addresses:
1: lo:  mtu 65536 qdisc noqueue state UNKNOWN group 
default qlen 1000
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
   valid_lft forever preferred_lft forever
inet6 ::1/128 scope host 
   valid_lft forever preferred_lft forever
2: wlp58s0:  mtu 1500 qdisc mq state UP group 
default qlen 1000
link/ether 9c:b6:d0:d5:97:fb brd ff:ff:ff:ff:ff:ff
inet 192.168.0.121/24 brd 192.168.0.255 scope global dynamic wlp58s0
   valid_lft 42814sec preferred_lft 42814sec
inet6 fdad:3df7:b2f3::600/128 scope global 
   valid_lft forever preferred_lft forever
inet6 fdad:3df7:b2f3:0:921f:8ac8:1720:b6bf/64 scope global noprefixroute 
   valid_lft forever preferred_lft forever
inet6 fdc9:3611:9af8:0:6c49:6680:2f8b:f60a/64 scope global noprefixroute 
dynamic 
   valid_lft 7072sec preferred_lft 1672sec
inet6 fe80::7386:2396:a415:5402/64 scope link 
   valid_lft forever preferred_lft forever

*** Device statistics:
Inter-|   Receive|  Transmit
 face |bytespackets errs drop fifo frame compressed multicast|bytes
packets errs drop fifo colls carrier compressed
lo:  122036 988000 0  0 0   122036 
988000 0   0  0
wlp58s0: 79301192   58720000 0  0 0  2546397   
18364000 0   0  0

*** Protocol statistics:
Ip:
Forwarding: 2
18818 total packets received
7 with invalid addresses
0 forwarded
0 incoming packets discarded
18787 incoming packets delivered
17123 requests sent out
40 outgoing packets dropped
14 dropped because of missing route
Icmp:
473 ICMP messages received
0 input ICMP message failed
ICMP input histogram:
destination unreachable: 86
echo replies: 387
478 ICMP messages sent
0 ICMP messages failed
ICMP output histogram:
destination unreachable: 86
echo requests: 392
IcmpMsg:
InType0: 387
InType3: 86
OutType3: 86
OutType8: 392
Tcp: