Received: by 2002:a05:6359:c8b:b0:c7:702f:21d4 with SMTP id go11csp425692rwb; Thu, 22 Sep 2022 01:19:26 -0700 (PDT) X-Google-Smtp-Source: AMsMyM7GOCSWlES+TDzq5G8lnFZfvNimzz49Oi+DuZsYbrEjdw0xdgMFP4ODg8ndVO0hdW7dElbs X-Received: by 2002:a17:90b:4acd:b0:202:e381:e650 with SMTP id mh13-20020a17090b4acd00b00202e381e650mr2530718pjb.204.1663834766045; Thu, 22 Sep 2022 01:19:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1663834766; cv=none; d=google.com; s=arc-20160816; b=Yhpo9Uucz3eGUSHWSVw85qM1UNFC+Xk1Mxz6cvNZNHbZenupRwvVyLgLjajed4B3Wy z8jbewEQg/Hd3G012lZ9qI0PZe7yXmUeqr1AhaKhMlEc9C6Q2+HXN7H/KVtm35q6mvVo 3czAHeXACaIHn0Y7wTL4GAV4oxA6XmirRJnd1AJqU+7g3E/xLkkfahhWicB6pxZ+g5y4 +1NGzmLr/w/5Oop71psotvJgL+jTMb8nYLHxws0Cw29o/c2e9E5seH2YwrxqFmSq8uO3 nGw3VWmGCbiTCR0W8cSq8WH7HfGA9hGHmka6jntsgwyObjmVVDYoDrf1nVRxVMMtBbgo oE4Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:date:message-id:user-agent:cc:to:references :in-reply-to:from:subject:content-transfer-encoding:mime-version :dkim-signature; bh=OKQqlBCEDsbuiFAR8wI6xhj8r3XdvIMi0YKjzuI4Qpw=; b=Fx3ev0Bu6W2TszB4Mhlww6yT95HONOnclfwGz5ptBK6ZlFS5YUxu57C5m+toQkhhmF zFkK5BfeQBPHcdypShSxDLm/brI03qEcihHQJ7vR56iPAvDiY7tIuwupqyYAfxPvEoer RBLd6TCxJfvKg6TiwzmyqRJP4EfRqD660/bsB5OESp1ThiTqYiijZlb8jhvyvsjThtpM 87TsXogej9luzli1HaQvk3cUKvDcJ2TgxtMUqlDmdz2MrBjE3YLx0Gbf15sImqtu8PRd 2t4XLHsQ/tn+mKaP9OzZMXeovp8ZFMcB+rAERt42WPAUp9Pu3dlvZ5aauOpdqlsV2LHL iuNg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=vMfNQZiW; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id q18-20020a632a12000000b0042b8d806ec7si4719361pgq.694.2022.09.22.01.19.14; Thu, 22 Sep 2022 01:19:26 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=vMfNQZiW; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229886AbiIVIOZ (ORCPT + 63 others); Thu, 22 Sep 2022 04:14:25 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54632 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229489AbiIVIOV (ORCPT ); Thu, 22 Sep 2022 04:14:21 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id DAD77CD1FD for ; Thu, 22 Sep 2022 01:14:18 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 6E5F1B834F6 for ; Thu, 22 Sep 2022 08:14:17 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 0925CC433C1; Thu, 22 Sep 2022 08:14:14 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1663834456; bh=MOlPCXwskFQ/i1ybWs2kBQNxkSgAaolnyrvqwJkqiPc=; h=Subject:From:In-Reply-To:References:To:Cc:Date:From; b=vMfNQZiW3ju9qqzEjJwLl1pXNkLE2+RFj7PtzTqMI6dCP1PHYm5ZO/VvhS1+sHRgD 4ZLnVDEVHIkL517pqzH41s34teA4zfr4dQmind97msIUx8K97MsY0tXpmpipxvaNfs +b7zhFM3w5rL6kya+X7PdsafjmE30YjcffgCjWjNrzG27g+lvv1A01YCo2Xe3VMH8V V7sdLOmJIMYfbie1Qp03U9PWdeU8xX8X6UYGYkCHCOTHfdNWnAsQLOnC6Qyw7QhFXd HtUNW1izNBBajwq67swfgb3kKHfIPQ4EoxDUDNa6x9BijcFxuWHY0PPFcGi5DDpysl 6IRy18SC26Pbw== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Subject: Re: [PATCH] wifi: ath11k: reduce the timeout value back for hw scan from 10 seconds to 1 second From: Kalle Valo In-Reply-To: <20220919024121.24820-1-quic_wgong@quicinc.com> References: <20220919024121.24820-1-quic_wgong@quicinc.com> To: Wen Gong Cc: , , User-Agent: pwcli/0.1.1-git (https://github.com/kvalo/pwcli/) Python/3.7.3 Message-ID: <166383445202.9473.8707216192194973891.kvalo@kernel.org> Date: Thu, 22 Sep 2022 08:14:14 +0000 (UTC) X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org Wen Gong wrote: > For 11d scan, commit 9dcf6808b253 ("ath11k: add 11d scan offload support") > increased the timeout from one second to max 10 seconds when 11d scan > offload enabled and 6 GHz enabled, it is reasonable for the commit, it > is because the first 11d scan request is sent to firmware before the > first hw scan request after wlan load, then the hw scan started event > will reported from firmware after the 11d scan finished, it needs about > 6 seconds when 6 GHz enabled, so increased it from one second to 10 > seconds in the commit to avoid timed out for hw scan started. Then > another commit 1f682dc9fb37 ("ath11k: reduce the wait time of 11d scan > and hw scan while add interface") change the sequence of the first 11d > scan and hw scan, then ath11k will receive the hw scan started event > from firmware immediately for the first hw scan, thus ath11k does not > need set the timeout value to max 10 seconds again, and this is to set > the timeout value back from 10 seconds to 1 second. > > Tested-on: WCN6855 hw2.0 PCI WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3 > > Signed-off-by: Wen Gong With this patch I started seeing new errors: [ 1194.815104] ath11k_pci 0000:06:00.0: failed to start hw scan: -110 [ 1196.864157] ath11k_pci 0000:06:00.0: failed to start hw scan: -110 [ 1198.911926] ath11k_pci 0000:06:00.0: failed to start hw scan: -110 This seems to happen after my suspend tests, but didn't have time to investigate further. -- https://patchwork.kernel.org/project/linux-wireless/patch/20220919024121.24820-1-quic_wgong@quicinc.com/ https://wireless.wiki.kernel.org/en/developers/documentation/submittingpatches