Received: by 2002:ab2:6857:0:b0:1ef:ffd0:ce49 with SMTP id l23csp736871lqp; Thu, 21 Mar 2024 14:05:09 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCW01TADHQpm16iCiK4vo7EgcC2jH8T5PYqIT4pybAMteaMiq8iTHuZSaK0S0nRp2QWpZa0k3StS4Kva+CMlAuzRIlHHPRouMgSkKETtAQ== X-Google-Smtp-Source: AGHT+IFU0CMoLaNtB0nWsXJ/MZA9fDT1xAQDpxrYBRsYF9CAAVWo0tbc3qrg5sRFhUAj1ARea5Fi X-Received: by 2002:a05:6830:1db6:b0:6e6:8fa1:7a33 with SMTP id z22-20020a0568301db600b006e68fa17a33mr464201oti.6.1711055109196; Thu, 21 Mar 2024 14:05:09 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1711055109; cv=pass; d=google.com; s=arc-20160816; b=zrb4Z1FoRtXd9jxXj0XEFqskSOfWQ3luKeK4/GZnlOgzMskMRLpF1Hpd0cRo3Y1Gqx Kt8Q23ktatsDEcTrleGG4BFzI0Vsy8Vao7/GvWzVtIOSXe/8jiVrVrfgz8DvbCSYqRo3 DED6qNWNWMkbOq246mDxryqNo2UKv3yw5KIECGW1n4oVxqpQbwgFf6Bq/7HUaWJFsgkl bIp/MEAEWFBfUF0/5eRrzXF4QJ62Wgw6Kx/Jg9kNq8gpHc4Id+VQ5DrH+phu/3/EFPjB cq5joU9znwToYw/cabxS3nxlZSNNpRXtjeWYBpf0F1QMk56hWwz9EtRB3ZjqGEdfssfD 4FPQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:in-reply-to:from:references:cc:to :content-language:subject:user-agent:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:date:message-id:dkim-signature; bh=T3Ea4GIpIUqyKvoDn2psci6XloEJ1E517SgOQPy2B20=; fh=m3BbMyle5FmKhSwXF4lxNSoqPsdpKggMMiklpXSUA3M=; b=Tm5+1xsI69O0lNGdTMfUkiL6PuWZozLR3ytadbHNekDwuFCdpDkgvHPZlKrL0+dXhf XtMG4pvssJU6wh1xWw0sn6eW5w2jE8FLckSmi86htdTS4pyJiOJOw6DGC9SGpW9OJwnL WhcayWpLVV232GfcTW46O9c4Yi+3GBCQOylZALfSTpLi8Q0Bd1ZpI3MEbY9SWRVySvaW c9jrCuusPxv5+DS8P2yV49ZfEE/TH8CUeNWDC3DDexu1DCOIjUGYHWTCXzJgH38B89rT jUTdeBbd9772V0689H/y7J5NFFCe19VChdl0A93gvNrqDFEpfnNW7B7lUtxtTo7+1tJP GSIw==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@quicinc.com header.s=qcppdkim1 header.b=dOXhttMR; arc=pass (i=1 spf=pass spfdomain=quicinc.com dkim=pass dkdomain=quicinc.com dmarc=pass fromdomain=quicinc.com); spf=pass (google.com: domain of linux-wireless+bounces-5121-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-wireless+bounces-5121-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=quicinc.com Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [2604:1380:45d1:ec00::1]) by mx.google.com with ESMTPS id 4-20020ad45ba4000000b00690e0d9450esi616532qvq.161.2024.03.21.14.05.09 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 21 Mar 2024 14:05:09 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-wireless+bounces-5121-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) client-ip=2604:1380:45d1:ec00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@quicinc.com header.s=qcppdkim1 header.b=dOXhttMR; arc=pass (i=1 spf=pass spfdomain=quicinc.com dkim=pass dkdomain=quicinc.com dmarc=pass fromdomain=quicinc.com); spf=pass (google.com: domain of linux-wireless+bounces-5121-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-wireless+bounces-5121-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=quicinc.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id C06321C20A97 for ; Thu, 21 Mar 2024 21:05:08 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 76B4712B171; Thu, 21 Mar 2024 21:05:05 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=quicinc.com header.i=@quicinc.com header.b="dOXhttMR" X-Original-To: linux-wireless@vger.kernel.org Received: from mx0a-0031df01.pphosted.com (mx0a-0031df01.pphosted.com [205.220.168.131]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 89F8079C8 for ; Thu, 21 Mar 2024 21:05:03 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=205.220.168.131 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1711055105; cv=none; b=RGtECS8quKrM9cextakMgu90sjeyUX17LIlE7fo58ZNv05znLDM1s/VxK/WkOS37N0UTd/iAZ3thdKqr1nQ4Tb7Ttp41XrI9tT3iosZAyB/29f02hsB8Nwd6ikl2OtLBe4ge9dOt5ffO5/DOeR3VYucau8ljFj1/5kU+EsaZEao= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1711055105; c=relaxed/simple; bh=Jm5ZxceVDnYJKfFGUCHatNBFxSn1grw28IXiWCCsnKw=; h=Message-ID:Date:MIME-Version:Subject:To:CC:References:From: In-Reply-To:Content-Type; b=fN5f2IwomLCZ8E0kFnoO43F3lMhjAtMH/Jzz74hH/gj90XM4LyIWHgsfgsfJl0e5SfJoKt+tEpkRhbzlT0RdkMqk+wUn4BI3tQTjFM7tKbAJ/U6EH8wgyQOpHBhsHtVmHIKYSUbfqIDH/PMLM7906vDFsGvIvMWqBgMTDgtz08g= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=quicinc.com; spf=pass smtp.mailfrom=quicinc.com; dkim=pass (2048-bit key) header.d=quicinc.com header.i=@quicinc.com header.b=dOXhttMR; arc=none smtp.client-ip=205.220.168.131 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=quicinc.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=quicinc.com Received: from pps.filterd (m0279862.ppops.net [127.0.0.1]) by mx0a-0031df01.pphosted.com (8.17.1.24/8.17.1.24) with ESMTP id 42LIhtJs032760; Thu, 21 Mar 2024 21:04:57 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=quicinc.com; h= message-id:date:mime-version:subject:to:cc:references:from :in-reply-to:content-type:content-transfer-encoding; s= qcppdkim1; bh=T3Ea4GIpIUqyKvoDn2psci6XloEJ1E517SgOQPy2B20=; b=dO XhttMRZsGM/P4UssdiJn/tm7yKPIVCAweiKb/fiCtcNPxZ90B7Kx83okELKmkPZ4 No3kzYKK0evLE4QMntRVzMY5+WxNLcVIBEk99Z7UWHJAwK0nlIwv83X5xzfr1zJP yXTV/n3zggkdAzvL8rK004F9HvkJjx5ydFTzxZPaak1xo2+efaiGvGgQkUcj8EHi 4qpdrtFTCFGX67RYYwvq6nzTYQhE8bddXmRGMYN5KiZ8iooJPVO5U9Wy28LmbR6t sf1c8vZMmDQrxDlmjLG91rrDY2onDZMQ4D7/NMgwtW8zJjHxUYvtBNctLclp7AUc eNBixQOsNbcPzoeIEiag== Received: from nalasppmta02.qualcomm.com (Global_NAT1.qualcomm.com [129.46.96.20]) by mx0a-0031df01.pphosted.com (PPS) with ESMTPS id 3x0f1nj3mq-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 21 Mar 2024 21:04:56 +0000 (GMT) Received: from nalasex01a.na.qualcomm.com (nalasex01a.na.qualcomm.com [10.47.209.196]) by NALASPPMTA02.qualcomm.com (8.17.1.5/8.17.1.5) with ESMTPS id 42LL4uDl019066 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 21 Mar 2024 21:04:56 GMT Received: from [10.110.74.135] (10.80.80.8) by nalasex01a.na.qualcomm.com (10.47.209.196) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.40; Thu, 21 Mar 2024 14:04:55 -0700 Message-ID: <29d302e7-dbc5-4d39-b890-067a24a84782@quicinc.com> Date: Thu, 21 Mar 2024 14:04:54 -0700 Precedence: bulk X-Mailing-List: linux-wireless@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH v5 07/12] wifi: ath12k: Cache vdev configs before vdev create Content-Language: en-US To: Rameshkumar Sundaram , CC: , Sriram R References: <20240320190943.3850106-1-quic_ramess@quicinc.com> <20240320190943.3850106-8-quic_ramess@quicinc.com> From: Jeff Johnson In-Reply-To: <20240320190943.3850106-8-quic_ramess@quicinc.com> Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit X-ClientProxiedBy: nasanex01a.na.qualcomm.com (10.52.223.231) To nalasex01a.na.qualcomm.com (10.47.209.196) X-QCInternal: smtphost X-Proofpoint-Virus-Version: vendor=nai engine=6200 definitions=5800 signatures=585085 X-Proofpoint-GUID: X8wLyqhEcaqmEWyp0PftqDOIrI2jIjx2 X-Proofpoint-ORIG-GUID: X8wLyqhEcaqmEWyp0PftqDOIrI2jIjx2 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.272,Aquarius:18.0.1011,Hydra:6.0.619,FMLib:17.11.176.26 definitions=2024-03-21_12,2024-03-21_02,2023-05-22_02 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 impostorscore=0 mlxscore=0 bulkscore=0 mlxlogscore=996 adultscore=0 malwarescore=0 spamscore=0 suspectscore=0 clxscore=1015 lowpriorityscore=0 phishscore=0 priorityscore=1501 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.19.0-2403140001 definitions=main-2403210158 On 3/20/2024 12:09 PM, Rameshkumar Sundaram wrote: > From: Sriram R > > Since the vdev create for a corresponding vif is deferred > until a channel is assigned, cache the information which > are received through mac80211 ops between add_interface() > and assign_vif_chanctx() and set them once the vdev is > created on one of the ath12k radios as the channel gets > assigned via assign_vif_chanctx(). > > Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.0.1-00029-QCAHKSWPL_SILICONZ-1 > Tested-on: WCN7850 hw2.0 PCI WLAN.HMT.1.0.c5-00481-QCAHMTSWPL_V1.0_V2.0_SILICONZ-3 > > Signed-off-by: Sriram R in any of these patches where you are performing significant rework please feel free to add a Co-developed-by: tag for yourself > Signed-off-by: Rameshkumar Sundaram > --- > drivers/net/wireless/ath/ath12k/core.h | 19 ++++ > drivers/net/wireless/ath/ath12k/mac.c | 149 ++++++++++++++++++++----- > 2 files changed, 140 insertions(+), 28 deletions(-) > > diff --git a/drivers/net/wireless/ath/ath12k/core.h b/drivers/net/wireless/ath/ath12k/core.h > index 507f08ab3ad5..fa0606c460c6 100644 > --- a/drivers/net/wireless/ath/ath12k/core.h > +++ b/drivers/net/wireless/ath/ath12k/core.h > @@ -214,6 +214,24 @@ enum ath12k_monitor_flags { > ATH12K_FLAG_MONITOR_ENABLED, > }; > > +struct ath12k_tx_conf { > + bool changed; > + u16 ac; > + struct ieee80211_tx_queue_params tx_queue_params; > +}; > + > +struct ath12k_key_conf { > + bool changed; > + enum set_key_cmd cmd; > + struct ieee80211_key_conf *key; > +}; > + > +struct ath12k_vif_cache { > + struct ath12k_tx_conf *tx_conf; > + struct ath12k_key_conf *key_conf; > + u32 bss_conf_changed; > +}; > + > struct ath12k_vif { > u32 vdev_id; > enum wmi_vdev_type vdev_type; > @@ -268,6 +286,7 @@ struct ath12k_vif { > u8 vdev_stats_id; > u32 punct_bitmap; > bool ps; > + struct ath12k_vif_cache cache; in my v4 comment I had suggested that this cache be a pointer. instead you chose to add pointers to the subordinate records within the cache. why take that approach? > }; > > struct ath12k_vif_iter { > diff --git a/drivers/net/wireless/ath/ath12k/mac.c b/drivers/net/wireless/ath/ath12k/mac.c > index 50c8c6ddc167..0274eac33b1f 100644 > --- a/drivers/net/wireless/ath/ath12k/mac.c > +++ b/drivers/net/wireless/ath/ath12k/mac.c > @@ -3021,12 +3021,14 @@ static void ath12k_mac_op_bss_info_changed(struct ieee80211_hw *hw, > > ar = ath12k_get_ar_by_vif(hw, vif); > > - /* TODO if the vdev is not created on a certain radio, > + /* if the vdev is not created on a certain radio, > * cache the info to be updated later on vdev creation > */ > > - if (!ar) > + if (!ar) { > + arvif->cache.bss_conf_changed |= changed; > return; > + } > > mutex_lock(&ar->conf_mutex); > > @@ -3517,12 +3519,11 @@ static int ath12k_clear_peer_keys(struct ath12k_vif *arvif, > return first_errno; > } > > -static int ath12k_mac_op_set_key(struct ieee80211_hw *hw, enum set_key_cmd cmd, > - struct ieee80211_vif *vif, struct ieee80211_sta *sta, > - struct ieee80211_key_conf *key) > +static int ath12k_mac_set_key(struct ath12k *ar, enum set_key_cmd cmd, > + struct ieee80211_vif *vif, struct ieee80211_sta *sta, > + struct ieee80211_key_conf *key) > { > - struct ath12k *ar; > - struct ath12k_base *ab; > + struct ath12k_base *ab = ar->ab; > struct ath12k_vif *arvif = ath12k_vif_to_arvif(vif); > struct ath12k_peer *peer; > struct ath12k_sta *arsta; > @@ -3530,28 +3531,11 @@ static int ath12k_mac_op_set_key(struct ieee80211_hw *hw, enum set_key_cmd cmd, > int ret = 0; > u32 flags = 0; > > - /* BIP needs to be done in software */ > - if (key->cipher == WLAN_CIPHER_SUITE_AES_CMAC || > - key->cipher == WLAN_CIPHER_SUITE_BIP_GMAC_128 || > - key->cipher == WLAN_CIPHER_SUITE_BIP_GMAC_256 || > - key->cipher == WLAN_CIPHER_SUITE_BIP_CMAC_256) > - return 1; > - > - ar = ath12k_get_ar_by_vif(hw, vif); > - if (!ar) { > - WARN_ON_ONCE(1); > - return -EINVAL; > - } > - ab = ar->ab; > + lockdep_assert_held(&ar->conf_mutex); > > - if (test_bit(ATH12K_FLAG_HW_CRYPTO_DISABLED, &ar->ab->dev_flags)) > + if (test_bit(ATH12K_FLAG_HW_CRYPTO_DISABLED, &ab->dev_flags)) > return 1; > > - if (key->keyidx > WMI_MAX_KEY_INDEX) > - return -ENOSPC; > - > - mutex_lock(&ar->conf_mutex); > - > if (sta) > peer_addr = sta->addr; > else if (arvif->vdev_type == WMI_VDEV_TYPE_STA) > @@ -3643,6 +3627,51 @@ static int ath12k_mac_op_set_key(struct ieee80211_hw *hw, enum set_key_cmd cmd, > spin_unlock_bh(&ab->base_lock); > > exit: > + return ret; > +} > + > +static int ath12k_mac_op_set_key(struct ieee80211_hw *hw, enum set_key_cmd cmd, > + struct ieee80211_vif *vif, struct ieee80211_sta *sta, > + struct ieee80211_key_conf *key) > +{ > + struct ath12k_vif *arvif = ath12k_vif_to_arvif(vif); > + struct ath12k_key_conf *key_conf; > + struct ath12k *ar; > + int ret; > + > + /* BIP needs to be done in software */ > + if (key->cipher == WLAN_CIPHER_SUITE_AES_CMAC || > + key->cipher == WLAN_CIPHER_SUITE_BIP_GMAC_128 || > + key->cipher == WLAN_CIPHER_SUITE_BIP_GMAC_256 || > + key->cipher == WLAN_CIPHER_SUITE_BIP_CMAC_256) > + return 1; > + > + if (key->keyidx > WMI_MAX_KEY_INDEX) > + return -ENOSPC; > + > + ar = ath12k_get_ar_by_vif(hw, vif); > + if (!ar) { > + /* ar is expected to be valid when sta ptr is available */ > + if (sta) { > + WARN_ON_ONCE(1); > + return -EINVAL; > + } > + > + key_conf = arvif->cache.key_conf; > + if (!key_conf) { > + key_conf = kzalloc(sizeof(*key_conf), GFP_KERNEL); > + if (!key_conf) > + return -ENOSPC; > + arvif->cache.key_conf = key_conf; > + } > + key_conf->cmd = cmd; > + key_conf->key = key; > + key_conf->changed = true; if you are allocating the individual structs do you need this flag? isn't the presence of the cache._conf pointer itself sufficient? > + return 0; > + } > + > + mutex_lock(&ar->conf_mutex); > + ret = ath12k_mac_set_key(ar, cmd, vif, sta, key); > mutex_unlock(&ar->conf_mutex); > return ret; > } > @@ -4473,11 +4502,22 @@ static int ath12k_mac_op_conf_tx(struct ieee80211_hw *hw, > { > struct ath12k *ar; > struct ath12k_vif *arvif = ath12k_vif_to_arvif(vif); > + struct ath12k_tx_conf *tx_conf; > int ret; > > ar = ath12k_get_ar_by_vif(hw, vif); > if (!ar) { > - /* TODO cache the info and apply after vdev is created */ > + /* cache the info and apply after vdev is created */ > + tx_conf = arvif->cache.tx_conf; > + if (!tx_conf) { > + tx_conf = kzalloc(sizeof(*tx_conf), GFP_KERNEL); > + if (!tx_conf) > + return -ENOSPC; > + arvif->cache.tx_conf = tx_conf; > + } > + tx_conf->changed = true; > + tx_conf->ac = ac; > + tx_conf->tx_queue_params = *params; > return -EINVAL; > } > > @@ -6121,6 +6161,57 @@ static int ath12k_mac_vdev_create(struct ath12k *ar, struct ieee80211_vif *vif) > return ret; > } > > +static void ath12k_mac_vif_cache_free(struct ath12k *ar, struct ath12k_vif *arvif) > +{ > + struct ath12k_key_conf *key_conf = arvif->cache.key_conf; > + struct ath12k_tx_conf *tx_conf = arvif->cache.tx_conf; > + > + lockdep_assert_held(&ar->conf_mutex); > + > + kfree(tx_conf); > + arvif->cache.tx_conf = NULL; > + kfree(key_conf); > + arvif->cache.key_conf = NULL; > + arvif->cache.bss_conf_changed = 0; > +} > + > +static void ath12k_mac_vif_cache_flush(struct ath12k *ar, struct ieee80211_vif *vif) > +{ > + struct ath12k_vif *arvif = ath12k_vif_to_arvif(vif); > + struct ath12k_key_conf *key_conf = arvif->cache.key_conf; > + struct ath12k_tx_conf *tx_conf = arvif->cache.tx_conf; > + struct ath12k_base *ab = ar->ab; > + > + int ret; > + > + lockdep_assert_held(&ar->conf_mutex); > + > + if (tx_conf && tx_conf->changed) { as mentioned above if you are allocating the per-op cach structs individually then you should not need the changed flag, this can just become: if (txconf) { > + ret = ath12k_mac_conf_tx(arvif, 0, tx_conf->ac, > + &tx_conf->tx_queue_params); > + if (ret) > + ath12k_warn(ab, > + "unable to apply tx config parameters to vdev %d\n", > + ret); > + } > + > + if (arvif->cache.bss_conf_changed) { > + ath12k_mac_bss_info_changed(ar, arvif, &vif->bss_conf, > + arvif->cache.bss_conf_changed); > + } > + > + if (key_conf && key_conf->changed) { if (key_conf) { > + ret = ath12k_mac_set_key(ar, key_conf->cmd, vif, NULL, > + key_conf->key); > + if (ret) { > + WARN_ON_ONCE(1); why have this when you're using ath12k_warn()? > + ath12k_warn(ab, "unable to apply set key param to vdev %d ret %d\n", > + arvif->vdev_id, ret); > + } > + } > + ath12k_mac_vif_cache_free(ar, arvif); > +} > + > static struct ath12k *ath12k_mac_assign_vif_to_vdev(struct ieee80211_hw *hw, > struct ieee80211_vif *vif, > struct ieee80211_chanctx_conf *ctx) > @@ -6201,10 +6292,11 @@ static struct ath12k *ath12k_mac_assign_vif_to_vdev(struct ieee80211_hw *hw, > goto unlock; > } > > - /* TODO If the vdev is created during channel assign and not during > + /* If the vdev is created during channel assign and not during > * add_interface(), Apply any parameters for the vdev which were received > * after add_interface, corresponding to this vif. > */ > + ath12k_mac_vif_cache_flush(ar, vif); > unlock: > mutex_unlock(&ar->conf_mutex); > out: > @@ -6316,6 +6408,7 @@ static int ath12k_mac_vdev_delete(struct ath12k *ar, struct ieee80211_vif *vif) > spin_unlock_bh(&ar->data_lock); > > ath12k_peer_cleanup(ar, arvif->vdev_id); > + ath12k_mac_vif_cache_free(ar, arvif); > > idr_for_each(&ar->txmgmt_idr, > ath12k_mac_vif_txmgmt_idr_remove, vif);