Received: by 2002:a05:7412:1492:b0:e2:908c:2ebd with SMTP id s18csp713426rdh; Tue, 22 Aug 2023 08:35:13 -0700 (PDT) X-Google-Smtp-Source: AGHT+IExH9Zy1s/CbyDos/fOrOeCFqeYOIIQNXaYHe0pjb5y/JlILsbbgHOT+QjnJCprqejT0afi X-Received: by 2002:a17:906:7691:b0:9a1:c39a:8bfd with SMTP id o17-20020a170906769100b009a1c39a8bfdmr1051878ejm.57.1692718513198; Tue, 22 Aug 2023 08:35:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1692718513; cv=none; d=google.com; s=arc-20160816; b=E7YSkCsoIykQuFsG6Uqt1tQdul1f/nyaU2gv79cWMRqmU45cM1arSom/sYxWQ3Kjt+ SSh7IXGboOoB5I5PS4P7GRzAOassvEpcJ334Ep5ANHDCAR2MzM0XWsHUmFhHuzGPlhcM h5TuNLZfL+vGzvQkfeJDPeQmPBQbA5RIRNsjZp9EXmRjV2IipAunU6VioG2nZ+wipolW 1M7JAnGlMec4laP1x3Mx7OQiHIBgeep2UtCBvVpJyz0mK2vCS+/5DrzcY7smgsYRR/n/ HW2IGjG0P3+PQg/eKjIxSb/J4n9ADhYkux5Q3U1bIN5pm1yy/AoSvQ0yUeSaH9P8ddXT mH9A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=QvHM06R1AtHX40XjgfpSbHEFG7esT15T4+ZQD4+8mRU=; fh=SHBF8E+4rdijcLSAbX8yprmAyj/R0+qm8ffZSfUBbG8=; b=v/gzc2Je5x74deMt6Smlp842KnGG5ak/44l2n8x5G4cDvl0FRIfxYHsI2aCLRov/0g R5vylrdicfIgHbULgCs3VAYt2NhXkkA3HHIePz2HjfplBXIZaOqCk1KhvXkUoGmRlKxj +BsBsp/rQHr1oC4yVkwdolHaIPnoxslOpQw/tyXQNj8ozOYcmDHabb6julybeCCf5ac3 0fT/4H/g8/zB3u5TB7HEHP59hFZQbUVl05goVlD5t/wFJU978GAWrh5rwuuM2mJhthxs czqLyycF6O2DUEYddSawcVae/Nw/z7DuhwMQI33kNLwLSnNYepGeiA82wOid3gcVP0qJ zA1g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=h58jkPrU; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id bw24-20020a170906c1d800b0099c49a11e78si7131458ejb.975.2023.08.22.08.34.59; Tue, 22 Aug 2023 08:35:13 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=h58jkPrU; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234915AbjHVNox (ORCPT + 55 others); Tue, 22 Aug 2023 09:44:53 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60664 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233232AbjHVNow (ORCPT ); Tue, 22 Aug 2023 09:44:52 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1163B19A; Tue, 22 Aug 2023 06:44:51 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 9545B656FA; Tue, 22 Aug 2023 13:44:50 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id C5439C433C7; Tue, 22 Aug 2023 13:44:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1692711889; bh=0cUpYuMSDrgHXWCsxLU6JaxRi+nUtLLQl0WkRsCUSD8=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=h58jkPrUVrFT5bYstrdcltlWZbIgg2BEJHzRk5VjfuWh2Ng/s0nztCnEUaNamBMwf lkEXeAT4CB6TPXc2rAt0wtFb4WVAdF9b2A6t2/Wq2pfdflP1LOgAsNGGi0Bj4jf5Zr 3NIgbbbwCX5muM0uQqVp7svns0oyfuFItWU1DAb7tdZHKUJbiP20KQ3Fp8AP41jPMw gY1vA9sGu4PcQafZIfNrm2Flvat/WdfcXTMeYu3w0FrknZAfsFIeiGcvHuUp+zTY1T NEh98VVz4bCKTIhkWK21qXziaCUmA5l4E8GU+mrLvdPR/yHr2g2NW4rmrRaQAw2PAd A+ikNfn/uGKIA== Received: from johan by theta with local (Exim 4.96) (envelope-from ) id 1qYRgb-000127-1r; Tue, 22 Aug 2023 15:44:45 +0200 Date: Tue, 22 Aug 2023 15:44:45 +0200 From: Johan Hovold To: Kalle Valo Cc: Jeff Johnson , Bjorn Andersson , Manivannan Sadhasivam , Konrad Dybcio , Manikanta Pubbisetty , ath11k@lists.infradead.org, linux-wireless@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH] Revert "Revert "wifi: ath11k: Enable threaded NAPI"" Message-ID: References: <20230809073432.4193-1-johan+linaro@kernel.org> <87o7izi6br.fsf@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <87o7izi6br.fsf@kernel.org> X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, RCVD_IN_DNSWL_BLOCKED,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org On Tue, Aug 22, 2023 at 03:56:24PM +0300, Kalle Valo wrote: > Johan Hovold writes: > > On Wed, Aug 09, 2023 at 09:34:32AM +0200, Johan Hovold wrote: > > > >> Disabling threaded NAPI caused a severe regression in 6.5-rc5 by making > >> the X13s completely unusable (e.g. no keyboard input, I've seen an RCU > >> splat once). > > Any chance we can get the offending commit reverted before 6.5 is > > released? > > The problem here is that would break QCN9074 again so there is no good > solution. I suspect we have a fundamental issue in ath11k which we just > haven't discovered yet. I would prefer to get to the bottom of this > before reverting anything. Sure, ideally we can find and fix the underlying issues these next few days, but since this regression was introduced in rc5 in an attempt to address the QCN9074 issue which has been there since 6.1 I think we need to revert otherwise. > > I'll take a closer look at this meanwhile. > > Thanks, much appreciated. Did you try enabling all kernel debug > features, maybe they would give some hints? Yes, I have a bunch of those enabled. Lockdep does not complain, but the hard lockup detector triggers and it looks like CPU0 (which handles most interrupts on this machine currently) has got stuck while processing an interrupt. RCU also detects the stall on CPU0 and provides a task dump for ksoftirqd with the following call trace: __switch_to run_ksoftirqd smpboot_thread_fn kthread ret_from_fork I just tried the out-of-tree pseudo NMI series [0] to get a stack trace, but CPU0 does not respond to those either when I hit this. Note that it takes a bit of RX to trigger this, but I hit it as soon as I try to download something substantial (e.g. after a couple of MB). Johan [0] https://lore.kernel.org/lkml/20230419225604.21204-1-dianders@chromium.org/