Received: by 2002:a05:7412:37c9:b0:e2:908c:2ebd with SMTP id jz9csp2631314rdb; Fri, 22 Sep 2023 04:35:29 -0700 (PDT) X-Google-Smtp-Source: AGHT+IFJ68EhVzO2EC1DTsNetccd9AKBDPxxq6tAZPqhXLpqCPoEryBqzR8Rdo0H+vJxEnNxMbN8 X-Received: by 2002:a17:903:1cc:b0:1c4:3cd5:4298 with SMTP id e12-20020a17090301cc00b001c43cd54298mr8091564plh.18.1695382529544; Fri, 22 Sep 2023 04:35:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1695382529; cv=none; d=google.com; s=arc-20160816; b=JEuzt0whHPec1qTOsY/0tbzFrOxxe3bA/nT/dR4KAUpkq0HUxSilJy2e/OEnThTlSY 24fna/1wM/zSxLFQNC/avm1SoRz9vPYywGbP5vBFmlGIj4wtNfZQnlj7KVeXiBNT2tBQ Sqsy3RgvrDn0+yLMWT/H6ed9/9lhkW5847m9Uy/CnwdZ+Eb2sZUz88u0FPP810qaVB5z 3kRVld85wjx401H80m1my0tBAYYoLsRlH66BGdh645CMjuIodSwwnt/9O+ZPhEnV3oCR NzAalZdiuLi/7MyOobjnET6YWezB9Z4TAasZ7r6gDVxTlp4Og0MIdW/QA4NesTusAGB0 hriw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:reply-to:user-agent :mime-version:date:message-id; bh=HD3Id9786buzlB1cmAxBWtcANKWjwVsPMIV3CoaadMQ=; fh=S023C9+76T/ilNwzu4vPSZeZ8mf0GARQDFsbcYEsVPM=; b=h1/MhBaAJMIcN+FPFFqr9iKVWTgGQBClvRKKosIbMGf7IZONPRBuUWHBLbPTY/6x4m 19Cn+mW10AR8PzCJK2uzjpKq2PyxKG7qZEt5yR7rbBHljDn9p15laidoyXKyfzhPQEvP Ifpr39MLl1XxFe32H2Q5w+/BQ6eAZSO6W0nmLDG6lo4jg8PdIcr3MIVFrOmO03twfq01 9O2Gj6JzSLyfRRJSABUHD//3b4HeNglDdw22gjAN3ExVBEjxM02Wdj49r90Jv3y2iEsS Ga1mglcwAWDGV/brp4kXFpByoiRjhQRLR/FKu3WZGi0bBg2n7cfC8jOD+zvORgKXeefy KuhA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Return-Path: Received: from groat.vger.email (groat.vger.email. [23.128.96.35]) by mx.google.com with ESMTPS id u6-20020a17090341c600b001b9e3a18270si3827520ple.420.2023.09.22.04.35.29 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 22 Sep 2023 04:35:29 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) client-ip=23.128.96.35; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by groat.vger.email (Postfix) with ESMTP id 1B56E83CC93D; Fri, 22 Sep 2023 04:22:44 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at groat.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233637AbjIVLWn (ORCPT + 56 others); Fri, 22 Sep 2023 07:22:43 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56198 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233551AbjIVLWn (ORCPT ); Fri, 22 Sep 2023 07:22:43 -0400 Received: from wp530.webpack.hosteurope.de (wp530.webpack.hosteurope.de [80.237.130.52]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3CCC28F; Fri, 22 Sep 2023 04:22:36 -0700 (PDT) Received: from [2a02:8108:8980:2478:8cde:aa2c:f324:937e]; authenticated by wp530.webpack.hosteurope.de running ExIM with esmtpsa (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) id 1qjeF0-0001kI-Kc; Fri, 22 Sep 2023 13:22:34 +0200 Message-ID: Date: Fri, 22 Sep 2023 13:22:33 +0200 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Reply-To: Linux regressions mailing list Subject: Re: [PATCH 1/3] wifi: mt76: mt7915: remove VHT160 capability on MT7915 Content-Language: en-US, de-DE To: Oleksandr Natalenko , linux-wireless@vger.kernel.org Cc: Felix Fietkau , Sasha Levin , Greg Kroah-Hartman , stable@vger.kernel.org, linux-kernel@vger.kernel.org, Linux kernel regressions list References: <20230726091704.25795-1-nbd@nbd.name> <12289744.O9o76ZdvQC@natalenko.name> From: "Linux regression tracking #adding (Thorsten Leemhuis)" In-Reply-To: <12289744.O9o76ZdvQC@natalenko.name> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-bounce-key: webpack.hosteurope.de;regressions@leemhuis.info;1695381756;a2ff28c2; X-HE-SMSGID: 1qjeF0-0001kI-Kc X-Spam-Status: No, score=-0.8 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on groat.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (groat.vger.email [0.0.0.0]); Fri, 22 Sep 2023 04:22:44 -0700 (PDT) [TLDR: I'm adding this report to the list of tracked Linux kernel regressions; the text you find below is based on a few templates paragraphs you might have encountered already in similar form. See link in footer if these mails annoy you.] On 21.09.23 07:02, Oleksandr Natalenko wrote: > > On středa 26. července 2023 11:17:02 CEST Felix Fietkau wrote: >> The IEEE80211_VHT_CAP_EXT_NSS_BW value already indicates support for half-NSS >> 160 MHz support, so it is wrong to also advertise full 160 MHz support. >> >> Fixes: c2f73eacee3b ("wifi: mt76: mt7915: add back 160MHz channel width support for MT7915") >> Signed-off-by: Felix Fietkau >> --- >> drivers/net/wireless/mediatek/mt76/mt7915/init.c | 1 - >> 1 file changed, 1 deletion(-) >> >> diff --git a/drivers/net/wireless/mediatek/mt76/mt7915/init.c b/drivers/net/wireless/mediatek/mt76/mt7915/init.c >> index ee976657bfc3..78552f10b377 100644 >> --- a/drivers/net/wireless/mediatek/mt76/mt7915/init.c >> +++ b/drivers/net/wireless/mediatek/mt76/mt7915/init.c >> @@ -414,7 +414,6 @@ mt7915_init_wiphy(struct mt7915_phy *phy) >> if (!dev->dbdc_support) >> vht_cap->cap |= >> IEEE80211_VHT_CAP_SHORT_GI_160 | >> - IEEE80211_VHT_CAP_SUPP_CHAN_WIDTH_160MHZ | >> FIELD_PREP(IEEE80211_VHT_CAP_EXT_NSS_BW_MASK, 1); >> } else { >> vht_cap->cap |= >> > > For some reason this got backported into the stable kernel: > > ``` > $ git log --oneline v6.5.2..v6.5.4 -- drivers/net/wireless/mediatek/mt76/mt7915/ > c43017fbebcc3 wifi: mt76: mt7915: fix power-limits while chan_switch > edb1afe042c74 wifi: mt76: mt7915: fix tlv length of mt7915_mcu_get_chan_mib_info > 9ec0dec0baea3 wifi: mt76: mt7915: remove VHT160 capability on MT7915 > 0e61f73e6ebc0 wifi: mt76: mt7915: fix capabilities in non-AP mode > 6bce28ce28390 wifi: mt76: mt7915: fix command timeout in AP stop period > 7af917d4864c6 wifi: mt76: mt7915: rework tx bytes counting when WED is active > feae00c6468ce wifi: mt76: mt7915: rework tx packets counting when WED is active > 70bbcc4ad6544 wifi: mt76: mt7915: fix background radar event being blocked > ``` > > and this broke my mt7915-based AP. > > However, if I remove `[VT160]` capability from the hostapd config, things go back to normal. It does seem that 160 MHz still works even. > > Is this expected? Thanks for the report. To be sure the issue doesn't fall through the cracks unnoticed, I'm adding it to regzbot, the Linux kernel regression tracking bot: #regzbot ^introduced 3ec5ac12ac8a4e..fe0ea395f0a351 #regzbot title wifi: mt76: mt7915: removal of VHT160 capability broke hostap #regzbot ignore-activity This isn't a regression? This issue or a fix for it are already discussed somewhere else? It was fixed already? You want to clarify when the regression started to happen? Or point out I got the title or something else totally wrong? Then just reply and tell me -- ideally while also telling regzbot about it, as explained by the page listed in the footer of this mail. Developers: When fixing the issue, remember to add 'Link:' tags pointing to the report (the parent of this mail). See page linked in footer for details. Ciao, Thorsten (wearing his 'the Linux kernel's regression tracker' hat) -- Everything you wanna know about Linux kernel regression tracking: https://linux-regtracking.leemhuis.info/about/#tldr That page also explains what to do if mails like this annoy you.