Received: by 2002:a05:6a10:6d10:0:0:0:0 with SMTP id gq16csp937473pxb; Fri, 22 Apr 2022 14:49:30 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzJlx4Iq1wWP7CjjEB7qt2//s/kRF7xymyiqf/dyFgZSfBqT66TJxv82nbVtK8e1nN8cy6p X-Received: by 2002:a17:90b:1bc5:b0:1d2:699a:54e3 with SMTP id oa5-20020a17090b1bc500b001d2699a54e3mr18412342pjb.136.1650664169979; Fri, 22 Apr 2022 14:49:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1650664169; cv=none; d=google.com; s=arc-20160816; b=Uu+nv9soEjwioCnIiU4pt3mRQa10WLIxeLtTqn2FD5lpBBA/CaxdW+TCv0eSsSa2EM oSTqMtcNCL+zfJ8Q5wb3rmaqfuVBZNoVVTiCPZuR4M0jUkvt9owKcg1POmOn+sjbQ8UE hPshjF74ModGvuADYjGOuWUW5dZiSbHpr/BgZP7GdNUmLOjC+Kl+yjzVl0sb6FPyOgLv h0zqY+MWKw/RxQAKY0CZVlqWQpCck+rJsi2PIyCWsTjiW1LCY5Z0VRk+5ioDodMgJTMH 8rHBYAjyg1MJriw7yRzVUC86IwusIB7eXb1JMFJn9Fi0wsMMBpp44jS5PMt+Py4L2DW/ 9Glg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent:message-id:in-reply-to :date:references:subject:cc:to:from:dkim-signature; bh=1FX1HDLRgM/hVzA8+iIryP2+BXVoJdu3mpD5mDjjyNs=; b=fB2/MckMwzDJdE3JCIH8ic02r0gzSDt/l1+4NnBBY0KG+6Txp2bW0cRHzTnY9qlzJD wjUr3h/qjI6P4CJWZnoEZW5wKlUs/ms6ALS8jX21eeifJGCTzfkDJj3BdF0kRApPwUA8 TpO5jUVsxj2z/t2h2/wbTv06WVRuetEviqMSMwwelehQrHfVzeDLwkTOBXWr5Mo6iZG9 dlGTMA39+h/N0wRV9tk8UcmjZ459JIxuYri/QlktKSZZBcHeL/nTgkzNe8K2O1f8AbM7 YQkn/k5N7a4rGzovR9Jc05TgNYmxAeeeUhaIRoPAiRgwlxYx/+nW7PCxpSjDervEvq9D Bi7A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=cvcZsUm8; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id t5-20020a17090a510500b001d6d8ba05a5si5521115pjh.125.2022.04.22.14.49.29 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 22 Apr 2022 14:49:29 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=cvcZsUm8; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id CB1EB33D561; Fri, 22 Apr 2022 12:56:49 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1380380AbiDTQLr (ORCPT + 67 others); Wed, 20 Apr 2022 12:11:47 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48952 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240259AbiDTQLq (ORCPT ); Wed, 20 Apr 2022 12:11:46 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E3849326F5 for ; Wed, 20 Apr 2022 09:08:59 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 9379AB81F91 for ; Wed, 20 Apr 2022 16:08:58 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 7181CC385A1; Wed, 20 Apr 2022 16:08:56 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1650470937; bh=CxHiVml8e9Zc1jlwhEl3vaf6HMvRlYOE8fgYfvNaO7w=; h=From:To:Cc:Subject:References:Date:In-Reply-To:From; b=cvcZsUm8S6xtUbKuHoVCSZaaKYngfUDSFGNtrU5N6/phV8cmM02zfllcC+kdvbKyh TxKqJoIwc8ROypPM7tEsq53jMBNwET2YRZcR6S19nDSrXuX2qutg716PldDNdSCdo2 WquB13OIYpgGt+M8K1wK+INL8+vpPio1PjviM6Uxmn1u/aoLwXveVe4oc6CpvQoB2w /D9SMqocukbRIdeTDOcTec2UD6DBangy8WVL/N26E5n5lzTQFF9cshOW4Xswq5Wokv iL2AX2DvuqwXKck7Rh1QRP7smIi0Eqb3vgqNbfT0L5C7mk+LXvL1UPTwFggzXuW1Od 7Xiq61o7+a8Ig== From: Kalle Valo To: Cc: , Subject: Re: [PATCH] ath11k: disable spectral scan during spectral deinit References: <1649396345-349-1-git-send-email-quic_haric@quicinc.com> <87fsmooz83.fsf@kernel.org> Date: Wed, 20 Apr 2022 19:08:51 +0300 In-Reply-To: <87fsmooz83.fsf@kernel.org> (Kalle Valo's message of "Fri, 08 Apr 2022 09:39:40 +0300") Message-ID: <87levzohyk.fsf@kernel.org> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/26.1 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain X-Spam-Status: No, score=-2.9 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, RDNS_NONE,SPF_HELO_NONE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org Kalle Valo writes: > writes: > >> From: Hari Chandrakanthan >> >> When ath11k modules are removed using rmmod with spectral scan enabled, >> crash is observed. Different crash trace is observed for each crash. >> >> Send spectral scan disable WMI command to firmware before cleaning >> the spectral dbring in the spectral_deinit API to avoid this crash. >> >> call trace from one of the crash observed: >> [ 1252.880802] Unable to handle kernel NULL pointer dereference at >> virtual address 00000008 >> [ 1252.882722] pgd = 0f42e886 >> [ 1252.890955] [00000008] *pgd=00000000 >> [ 1252.893478] Internal error: Oops: 5 [#1] PREEMPT SMP ARM >> [ 1253.093035] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.4.89 #0 >> [ 1253.115261] Hardware name: Generic DT based system >> [ 1253.121149] PC is at ath11k_spectral_process_data+0x434/0x574 [ath11k] >> [ 1253.125940] LR is at 0x88e31017 >> [ 1253.132448] pc : [<7f9387b8>] lr : [<88e31017>] psr: a0000193 >> [ 1253.135488] sp : 80d01bc8 ip : 00000001 fp : 970e0000 >> [ 1253.141737] r10: 88e31000 r9 : 970ec000 r8 : 00000080 >> [ 1253.146946] r7 : 94734040 r6 : a0000113 r5 : 00000057 r4 : 00000000 >> [ 1253.152159] r3 : e18cb694 r2 : 00000217 r1 : 1df1f000 r0 : 00000001 >> [ 1253.158755] Flags: NzCv IRQs off FIQs on Mode SVC_32 ISA ARM Segment user >> [ 1253.165266] Control: 10c0383d Table: 5e71006a DAC: 00000055 >> [ 1253.172472] Process swapper/0 (pid: 0, stack limit = 0x60870141) >> [ 1253.458055] [<7f9387b8>] (ath11k_spectral_process_data [ath11k]) >> from [<7f917fdc>] (ath11k_dbring_buffer_release_event+0x214/0x2e4 >> [ath11k]) >> [ 1253.466139] [<7f917fdc>] (ath11k_dbring_buffer_release_event >> [ath11k]) from [<7f8ea3c4>] (ath11k_wmi_tlv_op_rx+0x1840/0x29cc >> [ath11k]) >> [ 1253.478807] [<7f8ea3c4>] (ath11k_wmi_tlv_op_rx [ath11k]) from >> [<7f8fe868>] (ath11k_htc_rx_completion_handler+0x180/0x4e0 [ath11k]) >> [ 1253.490699] [<7f8fe868>] (ath11k_htc_rx_completion_handler >> [ath11k]) from [<7f91308c>] >> (ath11k_ce_per_engine_service+0x2c4/0x3b4 [ath11k]) >> [ 1253.502386] [<7f91308c>] (ath11k_ce_per_engine_service [ath11k]) >> from [<7f9a4198>] (ath11k_pci_ce_tasklet+0x28/0x80 [ath11k_pci]) >> [ 1253.514811] [<7f9a4198>] (ath11k_pci_ce_tasklet [ath11k_pci]) >> from [<8032227c>] (tasklet_action_common.constprop.2+0x64/0xe8) >> [ 1253.526476] [<8032227c>] (tasklet_action_common.constprop.2) from >> [<803021e8>] (__do_softirq+0x130/0x2d0) >> [ 1253.537756] [<803021e8>] (__do_softirq) from [<80322610>] (irq_exit+0xcc/0xe8) >> [ 1253.547304] [<80322610>] (irq_exit) from [<8036a4a4>] >> (__handle_domain_irq+0x60/0xb4) >> [ 1253.554428] [<8036a4a4>] (__handle_domain_irq) from [<805eb348>] >> (gic_handle_irq+0x4c/0x90) >> [ 1253.562321] [<805eb348>] (gic_handle_irq) from [<80301a78>] (__irq_svc+0x58/0x8c) >> >> Tested on : WLAN.HK.2.6.0.1-00851-QCAHKSWPL_SILICONZ-1 > > Tested-on tag is not in correct format, but I can fix that. Actuall I cannot as I don't know on what hardware you tested this. So what hardware did you use? -- https://patchwork.kernel.org/project/linux-wireless/list/ https://wireless.wiki.kernel.org/en/developers/documentation/submittingpatches