Received: by 2002:a05:7412:bbc7:b0:fc:a2b0:25d7 with SMTP id kh7csp2474240rdb; Mon, 5 Feb 2024 07:40:28 -0800 (PST) X-Google-Smtp-Source: AGHT+IG4jhox6dFePtjVW6zWjNxhBnw2gZuF5f1BhtXZv4YlsubtAO4Z10PYmbNj0xhTwPdT4Y8h X-Received: by 2002:a17:907:7e84:b0:a37:6399:c79e with SMTP id qb4-20020a1709077e8400b00a376399c79emr7379709ejc.55.1707147627858; Mon, 05 Feb 2024 07:40:27 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1707147627; cv=pass; d=google.com; s=arc-20160816; b=B1zVpv0K/GDlE1w1fj6yKmu344SSZiawRoy+xiqXdslyplker/v+Krqv0lZI7lFETv m3fH9ntWVilhU/ke0h95REIOld8jiS48TtSKONOontimzK0wjN0wdMGL8UP78m9se8n0 Obyw2QDGrkOZTwkscWPAMck4UdHGb2svLgAt3imZQHxeaImvDgTEpMUAW7xEp0zYpzm+ 1HtxV1+yEVPw/HYFEk4UqjTon8mXDNXeU2GbDHb+r3k4DX1JeYJ1QXX+pTgWoC+WIVoH CirPY3tD4kuJR3dmJKhhixV27gSGRjFe/oId3redDapeeAdEUD0jkLZpRWYeoOBO5qIs Vz+g== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=mime-version:list-unsubscribe:list-subscribe:list-id:precedence :user-agent:message-id:in-reply-to:date:references:subject:cc:to :from:dkim-signature; bh=18sF2NaPOmST/xA3qkHWD7EDBCyxQ5NAMjVc/2sf0mA=; fh=FldtTYb1HAPy1TLW6rejqhMWTqosVA2XKzS1l26KSro=; b=B6qIqHM4LZcIQkK7H0CrYvpRWGWwuim8CfRhT0nxcALIfEzZMODcJfIMJv4y/Y0KPH hleLF7TelxZUFSzNye0WQYrIFy1MacFkglKcJRgCdP1mSmXVOXrHv4/tfD0E4rUqguB3 Ut0Wp++oE0ZirVAWGQbjm+oERxib7Le46QyBAXs/8yHPq6isFaNK4j7sohDhtk1ivQN8 soXbwu2BnJ3+ZlFfQigsEaL58RhSzqG7b+w4hzykM5DHD36Ijism7p9uSKmmIYn1HkRl fiQSppoiyOlCUrRJ7NKjMuDowBGqXbAmM8dtWoGEU1ARz6kEsurF7Pe43rBmcXWVBxKy bgRw==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=VFb+m7LH; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-wireless+bounces-3128-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-wireless+bounces-3128-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org X-Forwarded-Encrypted: i=1; AJvYcCW5wui8fcFaIXgqIbYpYNEdCXBLZJtR3fWDKNQhzgv7cnVGRhZ4xs+5FzlAnCCkwkfJVhJ7McPQwsXDu5nxsXVEy4iY/0z+3wG+kVaQ+Q== Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [147.75.80.249]) by mx.google.com with ESMTPS id ck16-20020a170906c45000b00a376329d92csi2538954ejb.408.2024.02.05.07.40.27 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 05 Feb 2024 07:40:27 -0800 (PST) Received-SPF: pass (google.com: domain of linux-wireless+bounces-3128-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) client-ip=147.75.80.249; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=VFb+m7LH; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-wireless+bounces-3128-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-wireless+bounces-3128-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 985A91F220B0 for ; Mon, 5 Feb 2024 15:40:27 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id C57302D050; Mon, 5 Feb 2024 15:40:22 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="VFb+m7LH" X-Original-To: linux-wireless@vger.kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 9F2FB2D03B for ; Mon, 5 Feb 2024 15:40:22 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1707147622; cv=none; b=jZwzq65XFPqaRXT7gfncI1JnRhU0Sp3qFFvcAx+O/vh29nyymHrxS1oifxEoBF3XslRJBdgqwC9sfJNn7yqZP5azKhMJNcrmZpreraiN/vWZa3iNWC3lHtrhfdq6K5m099laLGJ5w+IHKsAqRftdpRGoHVKPmtt8iRmuTmRm9yE= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1707147622; c=relaxed/simple; bh=BEeUYYQ4BQ/jMZcN0OFMP755Rsd6a6un6jNbBmf2Rtc=; h=From:To:Cc:Subject:References:Date:In-Reply-To:Message-ID: MIME-Version:Content-Type; b=DPiUr5+LrG/KRW6see+qe8fegzUeFoyGA6s7rXBOp9Lwv7yt7kzAT3uOMbucWkHmEUjHLm8zKrrjRxS2E05VKUdyWiKwSNijZflLfG2nVJ8NNG7nSulyfaUeOIP+0h6gfWqRmHS7tXzlRukJ0cBwd3bBEI/+ZMsWlqK4AXuoHjI= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=VFb+m7LH; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id 4F385C433F1; Mon, 5 Feb 2024 15:40:21 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1707147622; bh=BEeUYYQ4BQ/jMZcN0OFMP755Rsd6a6un6jNbBmf2Rtc=; h=From:To:Cc:Subject:References:Date:In-Reply-To:From; b=VFb+m7LH8O3Umu2yjyR+jHMY5lvJ1771rksX9abcPoPZJylg5soUR8oxZJz5Sninv oeyzI7AKTrId3iFjbkPWhZ75IcSumIbacf0YlnQex0orqkgXxerLRPDGkplqBxgkjM fQbrb3Wu3DKZqkv6MN+gFGEvDLcx55PgsDIozG9fZzTqIzbjJPUqkbroOClauk/1JO UOtTVnvrFfWLblZgbxV8O1RrCGzrVgd96/d+odOy6kXP/qL+cb+h6ZbtERIryNzNmU /0CQn0209td9uY0ZabtNDoGi8CtU3ZfK17W/FmB32aN/NFRR7w6jXRjTxnwSAbDVLs rtnD4mu3vmcdw== From: Kalle Valo To: Kang Yang Cc: , Subject: Re: [PATCH v6 00/11] wifi: ath12k: P2P support for WCN7850 References: <20240130040303.370590-1-quic_kangyang@quicinc.com> Date: Mon, 05 Feb 2024 17:40:19 +0200 In-Reply-To: <20240130040303.370590-1-quic_kangyang@quicinc.com> (Kang Yang's message of "Tue, 30 Jan 2024 12:02:52 +0800") Message-ID: <87o7cusyvw.fsf@kernel.org> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/28.2 (gnu/linux) Precedence: bulk X-Mailing-List: linux-wireless@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain Kang Yang writes: > Add P2P support for WCN7850. > > Kang Yang (11): > wifi: ath12k: fix broken structure wmi_vdev_create_cmd > wifi: ath12k: fix incorrect logic of calculating vdev_stats_id > wifi: ath12k: change interface combination for P2P mode > wifi: ath12k: add P2P IE in beacon template > wifi: ath12k: implement handling of P2P NoA event > wifi: ath12k: implement remain on channel for P2P mode > wifi: ath12k: change WLAN_SCAN_PARAMS_MAX_IE_LEN from 256 to 512 > wifi: ath12k: allow specific mgmt frame tx while vdev is not up > wifi: ath12k: move peer delete after vdev stop of station for WCN7850 > wifi: ath12k: designating channel frequency for ROC scan > wifi: ath12k: advertise P2P dev support for WCN7850 I did some quick tests by running various p2p commands with wpa_cli and noticed the warning below. We might have some issues with our RCU usage, please check. But no need to resend because of this, followup patch fixing this is fine. [ 1108.916980] ============================= [ 1108.917068] WARNING: suspicious RCU usage [ 1108.917151] 6.8.0-rc2-wt-ath+ #1273 Not tainted [ 1108.917235] ----------------------------- [ 1108.917318] drivers/net/wireless/ath/ath12k/mac.c:583 suspicious rcu_dereference_check() usage! [ 1108.917400] #012[ 1108.917400] other info that might help us debug this:#012[ 1108.917400] [ 1108.917484] #012[ 1108.917484] rcu_scheduler_active = 2, debug_locks = 1 [ 1108.917566] no locks held by swapper/3/0. [ 1108.917649] #012[ 1108.917649] stack backtrace: [ 1108.917729] CPU: 3 PID: 0 Comm: swapper/3 Not tainted 6.8.0-rc2-wt-ath+ #1273 [ 1108.917810] Hardware name: Intel(R) Client Systems NUC8i7HVK/NUC8i7HVB, BIOS HNKBLi70.86A.0067.2021.0528.1339 05/28/2021 [ 1108.917892] Call Trace: [ 1108.917968] [ 1108.918046] dump_stack_lvl+0x82/0xc0 [ 1108.918132] dump_stack+0x10/0x20 [ 1108.918206] lockdep_rcu_suspicious+0x210/0x3a0 [ 1108.918285] ath12k_mac_get_ar_by_vdev_id+0x18e/0x210 [ath12k] [ 1108.918403] ath12k_wmi_op_rx+0x2bb/0x1a30 [ath12k] [ 1108.918511] ? ath12k_chan_info_event+0x970/0x970 [ath12k] [ 1108.918624] ? __lock_acquire+0xd45/0x1de0 [ 1108.918706] ? __kasan_check_read+0x11/0x20 [ 1108.918789] ? debug_smp_processor_id+0x17/0x20 [ 1108.918863] ? __lock_release.isra.0+0x49d/0xae0 [ 1108.918934] ? debug_smp_processor_id+0x17/0x20 [ 1108.919007] ? reacquire_held_locks+0x4d0/0x4d0 [ 1108.919080] ? ath12k_ce_recv_process_cb+0x4b3/0x960 [ath12k] [ 1108.919195] ath12k_htc_rx_completion_handler+0x361/0x650 [ath12k] [ 1108.919302] ? ath12k_ce_recv_process_cb+0x4b3/0x960 [ath12k] [ 1108.919409] ? trace_hardirqs_on+0x49/0x50 [ 1108.919485] ath12k_ce_recv_process_cb+0x5c6/0x960 [ath12k] [ 1108.919591] ? ath12k_ce_rx_post_pipe+0x990/0x990 [ath12k] [ 1108.919658] ? __wake_up_bit+0x120/0x120 [ 1108.919705] ? handle_irq_event+0x10e/0x1c0 [ 1108.919752] ath12k_ce_per_engine_service+0xda/0x110 [ath12k] [ 1108.919817] ath12k_pci_ce_tasklet+0x65/0x120 [ath12k] [ 1108.919879] ? trace_tasklet_entry+0xe4/0x110 [ 1108.919945] tasklet_action_common.isra.0+0x24c/0x3d0 [ 1108.920007] tasklet_action+0x4f/0x70 [ 1108.920068] __do_softirq+0x1c2/0x868 [ 1108.920116] irq_exit_rcu+0xab/0x110 [ 1108.920159] common_interrupt+0xad/0xd0 [ 1108.920201] [ 1108.920309] [ 1108.920355] asm_common_interrupt+0x27/0x40 [ 1108.920399] RIP: 0010:cpuidle_enter_state+0xdc/0x580 [ 1108.920448] Code: ff ff ff ff 49 89 c7 e8 e2 fa 55 ff 31 ff e8 cb 29 54 fd 80 7d d0 00 0f 85 4a 02 00 00 e8 0c f9 55 ff 84 c0 0f 84 32 02 00 00 <45> 85 f6 0f 88 95 01 00 00 49 63 d6 48 83 fa 0a 0f 83 dd 02 00 00 [ 1108.920496] RSP: 0018:ffffc900001afd20 EFLAGS: 00000202 [ 1108.920545] RAX: 000000000065289d RBX: ffff888116413400 RCX: 1ffffffff47726c1 [ 1108.920593] RDX: 0000000000000000 RSI: ffffffffa2278020 RDI: ffffffffa24176e0 [ 1108.920639] RBP: ffffc900001afd70 R08: 0000000000000001 R09: fffffbfff4772c1a [ 1108.920686] R10: ffffffffa3b960d7 R11: 0000000000000000 R12: ffffffffa34c1740 [ 1108.920733] R13: 0000000000000002 R14: 0000000000000002 R15: 000001023093b5a2 [ 1108.920793] cpuidle_enter+0x4a/0xa0 [ 1108.920840] call_cpuidle+0x42/0xb0 [ 1108.920882] ? tick_nohz_idle_retain_tick+0x70/0xa0 [ 1108.920946] cpuidle_idle_call+0x1c9/0x290 [ 1108.921002] ? arch_cpu_idle_exit+0x30/0x30 [ 1108.921045] ? debug_smp_processor_id+0x17/0x20 [ 1108.921092] do_idle+0xfb/0x160 [ 1108.921137] cpu_startup_entry+0x54/0x60 [ 1108.921182] start_secondary+0x201/0x290 [ 1108.921227] ? set_cpu_sibling_map+0x1f20/0x1f20 [ 1108.921273] secondary_startup_64_no_verify+0x15e/0x16b [ 1108.921324] -- https://patchwork.kernel.org/project/linux-wireless/list/ https://wireless.wiki.kernel.org/en/developers/documentation/submittingpatches