Received: by 2002:a05:6a10:1a4d:0:0:0:0 with SMTP id nk13csp897008pxb; Tue, 1 Feb 2022 12:41:45 -0800 (PST) X-Google-Smtp-Source: ABdhPJyDkgBehDYD0tOkTX5IwhpD8swIA09/y2bcnHD5kcpIIA9h6TofggS53kvifIvcFbsGBwuo X-Received: by 2002:a62:7b51:: with SMTP id w78mr26710505pfc.8.1643748105765; Tue, 01 Feb 2022 12:41:45 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1643748105; cv=none; d=google.com; s=arc-20160816; b=L0CGxsieoLdeZgZivFpzVGanJmPNFTYvbFXQU6gGjEczsbd/9r/IYf6EgeQ2U/QZBF uLVlf9+dglzHzENGR8bg75uGpVuo/BhE8iGkmLgbJRiiagOtb/cRQhGDGhAqXwKuDJaq UA89HMZlN9ifs43Pe1k4edKViGsDOy8cdyXKHQL0OirQGhdnhmLRuTtFV4m+b/YY8tL2 fsbtVybbN151m5ohBJUgAUvCmHZ49VnJOVYMhkcm3MVUgD7993iYrYeDw6rbRqr3kvVW j2+8oNsOdUfHJ5h6DIpxFGC3lhPf9MzwwvyJCXtqKYJoiih2mzyNNg10BatB/+0as/Zr fdJA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:date:message-id:user-agent:cc:to:references :in-reply-to:from:subject:content-transfer-encoding:mime-version :dkim-signature; bh=KUT+F72moQ0VwcGy03AepQi3QvmOE09yggtTwdffZ0M=; b=S6MIFT3gXbvMMo56DNZR/oevP1+c5O45hvUFpEV+OUSV4+0wFMQBFiMIRPsq5vFme+ /AL7BrDsez1PgxNGu80MyPuDwZrsxcO4yYK5B2OxWSWZ5QzOdrib9jSSXKSP+cRIGRoh ZcqyLiA9H28F1wD6p1FVNcrfEeSuBlpwBP/3O2R3M4weeFp2/cFgFX9kBa/pVGZCFgWL 75G7V12KhkZlks0NJpQrH+ZhB4GnHPzJCi727MfUfKpQ1og499/PLBDjmuerzespD4W4 PmfzsR3x5b0XL800ErojF/YOQFvxW5X47EkM2GiKrirunRZW8pGYjPdGOIePO5bNXqbD zHsg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="RWCM/N+z"; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d4si19653891plg.603.2022.02.01.12.41.36; Tue, 01 Feb 2022 12:41:45 -0800 (PST) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="RWCM/N+z"; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1349078AbiAaN7S (ORCPT + 70 others); Mon, 31 Jan 2022 08:59:18 -0500 Received: from ams.source.kernel.org ([145.40.68.75]:44520 "EHLO ams.source.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1348918AbiAaN7S (ORCPT ); Mon, 31 Jan 2022 08:59:18 -0500 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 1F336B82ADB for ; Mon, 31 Jan 2022 13:59:17 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 01647C340E8; Mon, 31 Jan 2022 13:59:14 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1643637556; bh=kjst7BiRgr7hcjgnucz5mfypSORvuD8Jjv/m20W+2hg=; h=Subject:From:In-Reply-To:References:To:Cc:Date:From; b=RWCM/N+z9aFcbK7r5piU+kZTPEeMoxoerpT9xi56PbM0HAST6wcS2WTdNgN9NLNGx gbbV51PyooUKBV2SezIjoOTGpX/X3t5I+2S48uNPF7vJ5IQLsxSvqZv+HjXd5cJ7Ni f7IjdIV0ISqHFeTmbfVsFNwgf3bUqHeHLQNRsM64spX1tAalAmHhv2FWiXU3XfmKlw TR0BUICBMi6/u7qIhzSPZk0wMWSfs4vdm0BA1ZUVKiwi16eTdgZ9WrZRW8GpOaQWdE nh5Wg54wW7jbKGkhJrvH/zF/4ki5k1s/nVAwyVMaw6UpcCpoi9N7HAjXY6aVO6LPtb lL7CH1fN9DZkQ== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Subject: Re: [PATCH] ath11k: fix kernel panic during unload/load ath11k modules From: Kalle Valo In-Reply-To: <1642583973-21599-1-git-send-email-quic_vnaralas@quicinc.com> References: <1642583973-21599-1-git-send-email-quic_vnaralas@quicinc.com> To: Venkateswara Naralasetty Cc: , , Venkateswara Naralasetty User-Agent: pwcli/0.1.0-git (https://github.com/kvalo/pwcli/) Python/3.7.3 Message-ID: <164363755329.22527.8615778037312611873.kvalo@kernel.org> Date: Mon, 31 Jan 2022 13:59:14 +0000 (UTC) Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org Venkateswara Naralasetty wrote: > Call netif_napi_del() from ath11k_ahb_free_ext_irq() to fix > the following kernel panic when unload/load ath11k modules > for few iterations. > > [ 971.201365] Unable to handle kernel paging request at virtual address 6d97a208 > [ 971.204227] pgd = 594c2919 > [ 971.211478] [6d97a208] *pgd=00000000 > [ 971.214120] Internal error: Oops: 5 [#1] PREEMPT SMP ARM > [ 971.412024] CPU: 2 PID: 4435 Comm: insmod Not tainted 5.4.89 #0 > [ 971.434256] Hardware name: Generic DT based system > [ 971.440165] PC is at napi_by_id+0x10/0x40 > [ 971.445019] LR is at netif_napi_add+0x160/0x1dc > > [ 971.743127] (napi_by_id) from [<807d89a0>] (netif_napi_add+0x160/0x1dc) > [ 971.751295] (netif_napi_add) from [<7f1209ac>] (ath11k_ahb_config_irq+0xf8/0x414 [ath11k_ahb]) > [ 971.759164] (ath11k_ahb_config_irq [ath11k_ahb]) from [<7f12135c>] (ath11k_ahb_probe+0x40c/0x51c [ath11k_ahb]) > [ 971.768567] (ath11k_ahb_probe [ath11k_ahb]) from [<80666864>] (platform_drv_probe+0x48/0x94) > [ 971.779670] (platform_drv_probe) from [<80664718>] (really_probe+0x1c8/0x450) > [ 971.789389] (really_probe) from [<80664cc4>] (driver_probe_device+0x15c/0x1b8) > [ 971.797547] (driver_probe_device) from [<80664f60>] (device_driver_attach+0x44/0x60) > [ 971.805795] (device_driver_attach) from [<806650a0>] (__driver_attach+0x124/0x140) > [ 971.814822] (__driver_attach) from [<80662adc>] (bus_for_each_dev+0x58/0xa4) > [ 971.823328] (bus_for_each_dev) from [<80663a2c>] (bus_add_driver+0xf0/0x1e8) > [ 971.831662] (bus_add_driver) from [<806658a4>] (driver_register+0xa8/0xf0) > [ 971.839822] (driver_register) from [<8030269c>] (do_one_initcall+0x78/0x1ac) > [ 971.847638] (do_one_initcall) from [<80392524>] (do_init_module+0x54/0x200) > [ 971.855968] (do_init_module) from [<803945b0>] (load_module+0x1e30/0x1ffc) > [ 971.864126] (load_module) from [<803948b0>] (sys_init_module+0x134/0x17c) > [ 971.871852] (sys_init_module) from [<80301000>] (ret_fast_syscall+0x0/0x50) > > Tested-on: IPQ8074 hw2.0 AHB WLAN.HK.2.6.0.1-00760-QCAHKSWPL_SILICONZ-1 > > Signed-off-by: Venkateswara Naralasetty > Signed-off-by: Kalle Valo Patch applied to ath-next branch of ath.git, thanks. 22b59cb965f7 ath11k: fix kernel panic during unload/load ath11k modules -- https://patchwork.kernel.org/project/linux-wireless/patch/1642583973-21599-1-git-send-email-quic_vnaralas@quicinc.com/ https://wireless.wiki.kernel.org/en/developers/documentation/submittingpatches