Received: by 2002:a05:6a10:2726:0:0:0:0 with SMTP id ib38csp5526529pxb; Mon, 28 Mar 2022 13:44:49 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyldLuOHHGyy67hvoxbyZTbAdHh+942fc98djK5TCC0S8KSnnkBFclO8Pvnyy7KK4l285hY X-Received: by 2002:a05:622a:254:b0:2e1:ca15:3cbe with SMTP id c20-20020a05622a025400b002e1ca153cbemr23364176qtx.650.1648500288873; Mon, 28 Mar 2022 13:44:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1648500288; cv=none; d=google.com; s=arc-20160816; b=dObMFEYNjNmNbOOuA7aYhwJvos9JumtjNhQqpTV43xuG3KHTnRQnBdbC660ZDB35gA dG2BplZbYUX27UPUhoytNDhrVIG9SINefrwSGoYRP/v2RMpF52wHx9iAWeWF2aSiWp+2 IuueS7PuBi0H7eF5LZIU5YMpjtf3wpqYffET1EgI1BMcWVIq94u7NzlJGMsTZGM32TkX rHkofn1tFeAD1sz3TYaZ8pa4bkQNLKb8wNsHZRSuoGgsP8NIs43SSy7TVb/tejghLKd+ +6B9lq2Ekj3ObUZ6YoEz1vgsS06xqp4p9UxKUqtCeaYjizkMuDxZ70h8ZaoRfLvS9+CB vDug== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject:from :content-language:user-agent:mime-version:date:message-id; bh=yJu8Igt4GmHhtIPl9qK1Y7i59KHCerh8SR15i2MmfeY=; b=jPJg6TcT2V7bQUjx7bo8UGqDoTC5s/8+OmleYkJYp8bBdyyfovM6LfI6dbg7NaVUSf oNUpr1opKDjICQnpQBzzcs/ibENEKsk4Jl2KWXAAc37lKsrZI8or/6KGx/JAY5tp0iVw fkvZXPta+Nzus0EM1Z+e0q3V4kdZF1elPBE7e6fx28H25UaBFD8DWvWwyi1GQVisnqfw 1rM6O78xDoxv1BAK+kqv2BvbgfRWL+ChrWnFh8ofA/PRMTSX5/SbjoO5AzgyYc8bbeh4 HYRLRJHTgS4RRoomr3NkJE9nDOH2H9U2r5EYWFvJjb2Rloig3pWGKS1yH3z/jeL/1D13 joLw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id j7-20020a05620a288700b0067e4be2396csi8626644qkp.433.2022.03.28.13.44.25; Mon, 28 Mar 2022 13:44:48 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S243241AbiC1NfN (ORCPT + 68 others); Mon, 28 Mar 2022 09:35:13 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42612 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235088AbiC1NfM (ORCPT ); Mon, 28 Mar 2022 09:35:12 -0400 Received: from wp530.webpack.hosteurope.de (wp530.webpack.hosteurope.de [IPv6:2a01:488:42:1000:50ed:8234::]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6005DB1A; Mon, 28 Mar 2022 06:33:31 -0700 (PDT) Received: from ip4d144895.dynamic.kabel-deutschland.de ([77.20.72.149] helo=[192.168.66.200]); authenticated by wp530.webpack.hosteurope.de running ExIM with esmtpsa (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) id 1nYpUu-0005IN-90; Mon, 28 Mar 2022 15:33:28 +0200 Message-ID: Date: Mon, 28 Mar 2022 15:33:25 +0200 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.5.0 Content-Language: en-US From: Thorsten Leemhuis Subject: Bug 215715 - PCI device (iwlwifi) is not working due to PCI power state change issues To: "Rafael J. Wysocki" Cc: "regressions@lists.linux.dev" , Linux Kernel Mailing List , Linux PM , Luca Coelho , "linux-wireless@vger.kernel.org" Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-bounce-key: webpack.hosteurope.de;regressions@leemhuis.info;1648474411;4bf31efa; X-HE-SMSGID: 1nYpUu-0005IN-90 X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org Hi, this is your Linux kernel regression tracker. Rafael, I noticed a regression report in bugzilla.kernel.org that afaics nobody acted upon since it was reported about a week ago, that's why I decided to forward it to the lists, maintainers, and the author of the culprit. To quote from https://bugzilla.kernel.org/show_bug.cgi?id=215715 : > Stefan Gottwald 2022-03-21 13:31:43 UTC > > Created attachment 300589 [details] > dmesg output from error case > > We got a Elo AIO i2 device which most current BIOS where WiFi was working with Kernel 5.12.x but stopped working since Kernel 5.13.19 and newer (5.17.0-rc5). > > The kernel error message is: > > [ 3.419766] iwlwifi 0000:01:00.0: can't change power state from D3cold to D0 (config space inaccessible) > [ 3.419781] iwlwifi 0000:01:00.0: can't change power state from D3cold to D0 (config space inaccessible) > [ 3.419975] iwlwifi 0000:01:00.0: HW_REV=0xFFFFFFFF, PCI issues? > [ 3.420911] iwlwifi: probe of 0000:01:00.0 failed with error -5 > > The issue can be solved by adding the iwlwifi driver to the initramfs so it is loaded much earlier and seems to work. > > To narrow down the issue I did an git bisect between v5.13.18 and v5.13.19 mainline kernel version which got me to following commit which if reverted fix the issue on this device. > > Reverting commit d0660d8ab123ea471064f0828f290bec9593e16b : PCI: Use pci_update_current_state() in pci_enable_device_flags() FWIW, that afaics is d0660d8ab123 ("PCI: Use pci_update_current_state() in pci_enable_device_flags()") in mainline. > resolve the issue also in the newer kernels. Seems like the function platform_pci_get_power_state is always returning PCI_D3cold on this device also if this is not true. Could somebody take a look into this? Or was this discussed somewhere else already? Or even fixed? Anyway, to get this tracked: #regzbot introduced: d0660d8ab123ea471064f0828f290bec9593e16b #regzbot from: Stefan Gottwald #regzbot title: pci/iwlwifi: wifi is not working due to PCI power state change issues #regzbot link: https://bugzilla.kernel.org/show_bug.cgi?id=215715 Ciao, Thorsten (wearing his 'the Linux kernel's regression tracker' hat) P.S.: As the Linux kernel's regression tracker I'm getting a lot of reports on my table. I can only look briefly into most of them and lack knowledge about most of the areas they concern. I thus unfortunately will sometimes get things wrong or miss something important. I hope that's not the case here; if you think it is, don't hesitate to tell me in a public reply, it's in everyone's interest to set the public record straight. -- Additional information about regzbot: If you want to know more about regzbot, check out its web-interface, the getting start guide, and the references documentation: https://linux-regtracking.leemhuis.info/regzbot/ https://gitlab.com/knurd42/regzbot/-/blob/main/docs/getting_started.md https://gitlab.com/knurd42/regzbot/-/blob/main/docs/reference.md The last two documents will explain how you can interact with regzbot yourself if your want to. Hint for reporters: when reporting a regression it's in your interest to CC the regression list and tell regzbot about the issue, as that ensures the regression makes it onto the radar of the Linux kernel's regression tracker -- that's in your interest, as it ensures your report won't fall through the cracks unnoticed. Hint for developers: you normally don't need to care about regzbot once it's involved. Fix the issue as you normally would, just remember to include 'Link:' tag in the patch descriptions pointing to all reports about the issue. This has been expected from developers even before regzbot showed up for reasons explained in 'Documentation/process/submitting-patches.rst' and 'Documentation/process/5.Posting.rst'.