Received: by 2002:a05:6a10:413:0:0:0:0 with SMTP id 19csp1658411pxp; Thu, 17 Mar 2022 13:49:17 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwllN9zT3QAYDzllRj9SEWqqtDNbWLsVWj7vVL+MB+WU2rS8pWWsyWWhVdlE7gFm3bagtg6 X-Received: by 2002:a63:1649:0:b0:382:2a04:4136 with SMTP id 9-20020a631649000000b003822a044136mr316129pgw.568.1647550157603; Thu, 17 Mar 2022 13:49:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1647550157; cv=none; d=google.com; s=arc-20160816; b=avJdPwO8SGquUhRUx9orFECu+ePjrfEMKwtJJDSI+Xl7OeTZimmWZWs4lmuYYm1Pq+ JeDiIfQIZC0RMj7HM08sb4rOn/TWRqucjlh0/FR+cqW1xwDaOg3tcrlU31ce58K68H+e PBIJ33YiLwmknGKj9ySBwvCL2+liF7w3wp4z/IEPqYX4YvhuOIiJ1H4eUZ8GiCIpRAjg Et9XwV6YApSV/QSj5TDWUMfaj7X5wVXXwic3prFV6I+skwp/PR3HaMM3P5Q4j7bu3S4Y 5HS+e5GqXiOyUxKSFf3xIIUsp18uPfKs4O86Y6fSfFapdMMg6q+M0YhpaIr/2qRn9h4U isEg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language:cc:to :subject:from:user-agent:mime-version:date:message-id:dkim-signature; bh=0kHIYtNRyfc63kuFEWIsqQh0ypHZqcGdcH+UyuiJeAs=; b=gvfOnjqLv2/nwDMOSnmz/cbpKL5w4FDUZuebn+yEAJidDHax5uxUEtQTTBkcZGlIx9 4hGZkUzkK1fG1nE+orLeXj/jhk+XGwQDa+b+qBjBfPbeKiQeii4Elr5bxOYPwWs1KELe phttYNXJNRPSUTsIdsFRQ7m2OHX15T5yc5y11ivHYvZK/FGb56EAJv0QKlk2Gj8G0EFK HhGEGjYHhuKPTV5a4Mbb1f80JujoVE1vmLNNZkN2DR+onThRLRTGyS4NfjJ4Cn6UqEkA WMlxK6XfquxZ6RgICzHFFqEQJMxiSDlcVUNQ9XAGVTeRcCir5goom2f9gQ6+sLBWTxkQ 2Frg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@hartkopp.net header.s=strato-dkim-0002 header.b=oUpuHYu6; spf=softfail (google.com: domain of transitioning linux-wireless-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id y12-20020a056a00190c00b004f7e3181a3dsi6447915pfi.157.2022.03.17.13.49.17 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 17 Mar 2022 13:49:17 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-wireless-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@hartkopp.net header.s=strato-dkim-0002 header.b=oUpuHYu6; spf=softfail (google.com: domain of transitioning linux-wireless-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id B9E6314925C; Thu, 17 Mar 2022 13:13:09 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229472AbiCQUB0 (ORCPT + 70 others); Thu, 17 Mar 2022 16:01:26 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39116 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229498AbiCQUBZ (ORCPT ); Thu, 17 Mar 2022 16:01:25 -0400 X-Greylist: delayed 175 seconds by postgrey-1.37 at lindbergh.monkeyblade.net; Thu, 17 Mar 2022 13:00:05 PDT Received: from mo4-p00-ob.smtp.rzone.de (mo4-p00-ob.smtp.rzone.de [85.215.255.25]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 18D741546A5 for ; Thu, 17 Mar 2022 13:00:04 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; t=1647547023; s=strato-dkim-0002; d=hartkopp.net; h=Cc:To:Subject:From:Date:Message-ID:Cc:Date:From:Subject:Sender; bh=0kHIYtNRyfc63kuFEWIsqQh0ypHZqcGdcH+UyuiJeAs=; b=oUpuHYu6KUyjk7GTCVPrpvPWVhvZku2T5GztWn4cNjALuIr2vJdGv4+rMKhezVV7Ox DlapIvoa2IJ5jMayg3Daw1ridqwB2FyU4veGbrJ9eM2Lp6lYunsvHcdm6led9n53ij4B OA4M8jzmYkejOm1vtbR6lRN5vTNy9eNCjPLvnNjwuP7S8QHZEyRzthejZ9e818rP9/5V 2EOmPAmeIxATcp+l9JFToFToE1x3TPOIVJQQy+TyRLmcWlxzisXpg+bTAtjihskkGkTd aYmcbJV2xeLewWMXEG7oBzg8UpArFKU1lB4N4Y74EwW46QyyEjwhcTwEhZW0UG2h7EPG Eh7Q== Authentication-Results: strato.com; dkim=none X-RZG-AUTH: ":P2MHfkW8eP4Mre39l357AZT/I7AY/7nT2yrDxb8mjG14FZxedJy6qgO1qCHSa1GLptZHusx3hdd0DIgVuBOfXW6v7w==" X-RZG-CLASS-ID: mo00 Received: from [IPV6:2a00:6020:1cfa:f900::b82] by smtp.strato.de (RZmta 47.41.1 AUTH) with ESMTPSA id cc2803y2HJv33fx (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256 bits)) (Client did not present a certificate); Thu, 17 Mar 2022 20:57:03 +0100 (CET) Message-ID: <18e04a04-2aed-13de-b2fc-dbf5df864359@hartkopp.net> Date: Thu, 17 Mar 2022 20:56:57 +0100 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.6.2 From: Oliver Hartkopp Subject: net-next: regression: patch "iwlwifi: acpi: move ppag code from mvm to fw/acpi" (e8e10a37c51c) breaks wifi To: Johannes Berg , Matt Chen Cc: netdev , linux-wireless@vger.kernel.org Content-Language: en-US Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org Hi all, the patch "iwlwifi: acpi: move ppag code from mvm to fw/acpi" (net-next commit e8e10a37c51c) breaks the wifi on my HP Elitebook 840 G5. I detected the problem when working on the latest net-next tree and the wifi was fine until this patch. Please let me know if you need support for testing. Regards, Oliver [ 0.000000] Linux version 5.17.0-rc3-nn-01325-ge8e10a37c51c (xxx) (gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2) #15 SMP PREEMPT Thu Mar 17 20:41:21 CET 2022 (..) [ 12.001911] cfg80211: Loading compiled-in X.509 certificates for regulatory database [ 12.029737] cfg80211: Loaded X.509 cert 'sforshee: 00b28ddf47aef9cea7' [ 12.034170] cfg80211: loaded regulatory.db is malformed or signature is missing/invalid [ 12.086287] Bluetooth: Core ver 2.22 [ 12.087533] NET: Registered PF_BLUETOOTH protocol family [ 12.090401] Bluetooth: HCI device and connection manager initialized [ 12.090452] Bluetooth: HCI socket layer initialized [ 12.090457] Bluetooth: L2CAP socket layer initialized [ 12.090516] Bluetooth: SCO socket layer initialized [ 12.136999] Intel(R) Wireless WiFi driver for Linux [ 12.138353] iwlwifi 0000:01:00.0: enabling device (0000 -> 0002) [ 12.144928] iwlwifi 0000:01:00.0: loaded firmware version 36.ad812ee0.0 8265-36.ucode op_mode iwlmvm [ 12.224682] usbcore: registered new interface driver btusb [ 12.248689] Bluetooth: hci0: Bootloader revision 0.0 build 26 week 38 2015 [ 12.250374] Bluetooth: hci0: Device revision is 16 [ 12.251288] Bluetooth: hci0: Secure boot is enabled [ 12.252377] Bluetooth: hci0: OTP lock is enabled [ 12.253229] Bluetooth: hci0: API lock is enabled [ 12.254090] Bluetooth: hci0: Debug lock is disabled [ 12.255009] Bluetooth: hci0: Minimum firmware build 1 week 10 2014 [ 12.260320] Bluetooth: hci0: Found device firmware: intel/ibt-12-16.sfi [ 12.373476] iwlwifi 0000:01:00.0: Detected Intel(R) Dual Band Wireless AC 8265, REV=0x230 [ 12.442732] iwlwifi 0000:01:00.0: base HW address: 48:89:e7:1b:ee:64, OTP minor version: 0x0 [ 12.545287] intel_rapl_common: Found RAPL domain package [ 12.545326] intel_rapl_common: Found RAPL domain core [ 12.545350] intel_rapl_common: Found RAPL domain uncore [ 12.545375] intel_rapl_common: Found RAPL domain psys [ 12.545785] ieee80211 phy0: Selected rate control algorithm 'iwl-mvm-rs' [ 12.850332] hp_wmi: query 0x4 returned error 0x5 [ 12.852738] hp_wmi: query 0xd returned error 0x5 [ 12.894436] input: HP WMI hotkeys as /devices/virtual/input/input23 [ 12.960086] hp_wmi: query 0x1b returned error 0x5 [ 13.053127] iwlwifi 0000:01:00.0 wlp1s0: renamed from wlan0 [ 13.114622] Bluetooth: BNEP (Ethernet Emulation) ver 1.3 [ 13.114625] Bluetooth: BNEP filters: protocol multicast [ 13.114631] Bluetooth: BNEP socket layer initialized [ 13.811222] Bluetooth: hci0: Waiting for firmware download to complete [ 13.811636] Bluetooth: hci0: Firmware loaded in 1514074 usecs [ 13.812493] Bluetooth: hci0: Waiting for device to boot [ 13.824416] Bluetooth: hci0: Device booted in 12199 usecs [ 13.824418] Bluetooth: hci0: Malformed MSFT vendor event: 0x02 [ 13.824806] Bluetooth: hci0: Found Intel DDC parameters: intel/ibt-12-16.ddc [ 13.827429] Bluetooth: hci0: Applying Intel DDC parameters completed [ 13.828449] Bluetooth: hci0: Firmware revision 0.1 build 50 week 12 2019 [ 13.845837] iwlwifi 0000:01:00.0: mac start retry 0 [ 13.895993] NET: Registered PF_ALG protocol family [ 14.100027] iwlwifi 0000:01:00.0: mac start retry 1 [ 14.349522] iwlwifi 0000:01:00.0: mac start retry 2 [ 14.594141] iwlwifi 0000:01:00.0: mac start retry 0 [ 14.835957] iwlwifi 0000:01:00.0: mac start retry 1 [ 15.075966] iwlwifi 0000:01:00.0: mac start retry 2 [ 15.326159] iwlwifi 0000:01:00.0: mac start retry 0 [ 15.568003] iwlwifi 0000:01:00.0: mac start retry 1 [ 15.570772] Bluetooth: RFCOMM TTY layer initialized [ 15.570784] Bluetooth: RFCOMM socket layer initialized [ 15.570800] Bluetooth: RFCOMM ver 1.11 [ 15.832467] iwlwifi 0000:01:00.0: mac start retry 2 [ 16.109220] iwlwifi 0000:01:00.0: mac start retry 0 [ 16.378910] iwlwifi 0000:01:00.0: mac start retry 1 [ 16.646092] iwlwifi 0000:01:00.0: mac start retry 2 [ 27.288232] iwlwifi 0000:01:00.0: mac start retry 0 [ 27.553616] iwlwifi 0000:01:00.0: mac start retry 1 [ 27.818481] iwlwifi 0000:01:00.0: mac start retry 2 [ 28.088457] iwlwifi 0000:01:00.0: mac start retry 0 [ 28.354671] iwlwifi 0000:01:00.0: mac start retry 1 [ 28.620348] iwlwifi 0000:01:00.0: mac start retry 2 [ 39.290524] iwlwifi 0000:01:00.0: mac start retry 0 [ 39.554416] iwlwifi 0000:01:00.0: mac start retry 1 [ 39.820355] iwlwifi 0000:01:00.0: mac start retry 2 [ 40.085494] iwlwifi 0000:01:00.0: mac start retry 0 [ 40.348142] iwlwifi 0000:01:00.0: mac start retry 1 [ 40.614622] iwlwifi 0000:01:00.0: mac start retry 2 [ 51.296158] iwlwifi 0000:01:00.0: mac start retry 0 [ 51.564189] iwlwifi 0000:01:00.0: mac start retry 1 [ 51.832335] iwlwifi 0000:01:00.0: mac start retry 2 [ 52.100712] iwlwifi 0000:01:00.0: mac start retry 0 [ 52.366818] iwlwifi 0000:01:00.0: mac start retry 1 [ 52.630498] iwlwifi 0000:01:00.0: mac start retry 2 [ 63.300472] iwlwifi 0000:01:00.0: mac start retry 0 [ 63.570028] iwlwifi 0000:01:00.0: mac start retry 1 [ 63.836321] iwlwifi 0000:01:00.0: mac start retry 2 [ 64.107436] iwlwifi 0000:01:00.0: mac start retry 0 [ 64.377235] iwlwifi 0000:01:00.0: mac start retry 1 [ 64.646305] iwlwifi 0000:01:00.0: mac start retry 2 [ 75.298137] iwlwifi 0000:01:00.0: mac start retry 0 [ 75.564421] iwlwifi 0000:01:00.0: mac start retry 1 [ 75.829962] iwlwifi 0000:01:00.0: mac start retry 2 [ 76.102979] iwlwifi 0000:01:00.0: mac start retry 0 [ 76.372426] iwlwifi 0000:01:00.0: mac start retry 1 [ 76.641806] iwlwifi 0000:01:00.0: mac start retry 2