[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1120680: marked as done (linux-image-6.1.0-41-amd64: After updating to this kernel image linux-image-6.1.0-41-amd64 my Atheros QCA986x/988x did not work.)



Your message dated Fri, 14 Nov 2025 22:31:05 +0000
with message-id <E1vK2Jt-00EErg-2K@fasolo.debian.org>
and subject line Bug#1120680: fixed in linux 6.18~rc5-1~exp1
has caused the Debian Bug report #1120680,
regarding linux-image-6.1.0-41-amd64: After updating to this kernel image linux-image-6.1.0-41-amd64 my Atheros QCA986x/988x did not work.
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
1120680: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120680
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: linux-image-6.1.0-41-amd64
Severity: important

Dear Maintainer,

   * What led up to the situation?
   Installing linux-image-6.1.0-41-amd64

   * What exactly did you do (or not do) that was effective (or
     ineffective)?

   Installing linux-image-6.1.0-41-amd64 and reeboting broke my wifi

   * What was the outcome of this action?

   After updating to this kernel image linux-image-6.1.0-41-amd64 my wifi cards disappeared
   and my two hostapd instances (2,4GHz and 5GHz) of my router and access point did not start.

   * What outcome did you expect instead?
   that the wifi cards and hostapd instances work as with previous kernel linux-image-6.1.0-40-amd64.
   After checking the latest commits to drivers/net/wireless of kernel.org and cherrypicking
   and applying to my 6.1.158 kernel source (same version as for linux-image-6.1.0-41-amd64)
   I was able to build a kernel that worked again. The commit is:

>From 2469bb6a6af944755a7d7daf66be90f3b8decbf9 Mon Sep 17 00:00:00 2001
From: Baochen Qiang <baochen.qiang@oss.qualcomm.com>
Date: Mon, 27 Oct 2025 09:49:12 +0800
Subject: Revert "wifi: ath10k: avoid unnecessary wait for service ready
 message"

This reverts commit 51a73f1b2e56b0324b4a3bb8cebc4221b5be4c7a.

Although this commit benefits QCA6174, it breaks QCA988x and
QCA9984 [1][2]. Since it is not likely to root cause/fix this
issue in a short time, revert it to get those chips back.

Compile tested only.   

   
-- System Information:
Debian Release: 12.11
merged-usr: no
Architecture: amd64 (x86_64)

Kernel: Linux 6.1.158-custom (SMP w/4 CPU threads; PREEMPT)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) (ignored: LC_ALL set to en_US.UTF-8), LANGUAGE=en_US:en
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)
>From 2469bb6a6af944755a7d7daf66be90f3b8decbf9 Mon Sep 17 00:00:00 2001
From: Baochen Qiang <baochen.qiang@oss.qualcomm.com>
Date: Mon, 27 Oct 2025 09:49:12 +0800
Subject: Revert "wifi: ath10k: avoid unnecessary wait for service ready
 message"

This reverts commit 51a73f1b2e56b0324b4a3bb8cebc4221b5be4c7a.

Although this commit benefits QCA6174, it breaks QCA988x and
QCA9984 [1][2]. Since it is not likely to root cause/fix this
issue in a short time, revert it to get those chips back.

Compile tested only.

Fixes: 51a73f1b2e56 ("wifi: ath10k: avoid unnecessary wait for service ready message")
Link: https://lore.kernel.org/ath10k/6d41bc00602c33ffbf68781f563ff2e6c6915a3e.camel@gmail.com # [1]
Closes: https://bugzilla.kernel.org/show_bug.cgi?id=220671 # [2]
Signed-off-by: Baochen Qiang <baochen.qiang@oss.qualcomm.com>
Reviewed-by: Vasanthakumar Thiagarajan <vasanthakumar.thiagarajan@oss.qualcomm.com>
Cc: stable@vger.kernel.org
Link: https://patch.msgid.link/20251027-ath10k-revert-polling-first-change-v1-1-89aaf3bcbfa1@oss.qualcomm.com
Signed-off-by: Jeff Johnson <jeff.johnson@oss.qualcomm.com>
---
 drivers/net/wireless/ath/ath10k/wmi.c | 39 ++++++++++++++++++-----------------
 1 file changed, 20 insertions(+), 19 deletions(-)

(limited to 'drivers/net/wireless')

diff --git a/drivers/net/wireless/ath/ath10k/wmi.c b/drivers/net/wireless/ath/ath10k/wmi.c
index b3b00d324075bd..b4aad6604d6d9d 100644
--- a/drivers/net/wireless/ath/ath10k/wmi.c
+++ b/drivers/net/wireless/ath/ath10k/wmi.c
@@ -1764,32 +1764,33 @@ void ath10k_wmi_put_wmi_channel(struct ath10k *ar, struct wmi_channel *ch,
 
 int ath10k_wmi_wait_for_service_ready(struct ath10k *ar)
 {
-	unsigned long timeout = jiffies + WMI_SERVICE_READY_TIMEOUT_HZ;
 	unsigned long time_left, i;
 
-	/* Sometimes the PCI HIF doesn't receive interrupt
-	 * for the service ready message even if the buffer
-	 * was completed. PCIe sniffer shows that it's
-	 * because the corresponding CE ring doesn't fires
-	 * it. Workaround here by polling CE rings. Since
-	 * the message could arrive at any time, continue
-	 * polling until timeout.
-	 */
-	do {
+	time_left = wait_for_completion_timeout(&ar->wmi.service_ready,
+						WMI_SERVICE_READY_TIMEOUT_HZ);
+	if (!time_left) {
+		/* Sometimes the PCI HIF doesn't receive interrupt
+		 * for the service ready message even if the buffer
+		 * was completed. PCIe sniffer shows that it's
+		 * because the corresponding CE ring doesn't fires
+		 * it. Workaround here by polling CE rings once.
+		 */
+		ath10k_warn(ar, "failed to receive service ready completion, polling..\n");
+
 		for (i = 0; i < CE_COUNT; i++)
 			ath10k_hif_send_complete_check(ar, i, 1);
 
-		/* The 100 ms granularity is a tradeoff considering scheduler
-		 * overhead and response latency
-		 */
 		time_left = wait_for_completion_timeout(&ar->wmi.service_ready,
-							msecs_to_jiffies(100));
-		if (time_left)
-			return 0;
-	} while (time_before(jiffies, timeout));
+							WMI_SERVICE_READY_TIMEOUT_HZ);
+		if (!time_left) {
+			ath10k_warn(ar, "polling timed out\n");
+			return -ETIMEDOUT;
+		}
+
+		ath10k_warn(ar, "service ready completion received, continuing normally\n");
+	}
 
-	ath10k_warn(ar, "failed to receive service ready completion\n");
-	return -ETIMEDOUT;
+	return 0;
 }
 
 int ath10k_wmi_wait_for_unified_ready(struct ath10k *ar)
-- 
cgit 1.2.3-korg


--- End Message ---
--- Begin Message ---
Source: linux
Source-Version: 6.18~rc5-1~exp1
Done: Salvatore Bonaccorso <carnil@debian.org>

We believe that the bug you reported is fixed in the latest version of
linux, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1120680@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso <carnil@debian.org> (supplier of updated linux package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Fri, 14 Nov 2025 23:04:50 +0100
Source: linux
Architecture: source
Version: 6.18~rc5-1~exp1
Distribution: experimental
Urgency: medium
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: Salvatore Bonaccorso <carnil@debian.org>
Closes: 1119810 1120372 1120673 1120680
Changes:
 linux (6.18~rc5-1~exp1) experimental; urgency=medium
 .
   * New upstream release candidate.
     - Revert "wifi: ath10k: avoid unnecessary wait for service ready message"
       (Closes: #1120680)
     - drm/amdgpu: Fix wait after reset sequence in S3 (Closes: #1120372)
 .
   [ Uwe Kleine-König ]
   * [armhf] Enable LEDS_TURRIS_OMNIA as a module for Turris Omnia LED support.
 .
   [ Bastian Blank ]
   * Fix version in filenames of linux-config and linux-source packages.
   * Enable TCP_AO.
 .
   [ Salvatore Bonaccorso ]
   * [amd64] drivers/hid/intel-thc-hid: Enable INTEL_THC_HID, INTEL_QUICKSPI and
     INTEL_QUICKI2C as modules (Closes: #1119810)
   * [arm64] drivers/net/ethernet/renesas: Enable RAVB as module
     (Closes: #1120673)
Checksums-Sha1:
 f1549cae24f7c204352b06f12938c1597cadfc8d 124308 linux_6.18~rc5-1~exp1.dsc
 710b450a0102a93196e066e2e277b37d9faa1d97 157341984 linux_6.18~rc5.orig.tar.xz
 046dfed131a8769d4de8e48223d818955f3ed79c 1440460 linux_6.18~rc5-1~exp1.debian.tar.xz
 1d72c551005138473334c9d6fb16e7cd0d6c4695 6794 linux_6.18~rc5-1~exp1_source.buildinfo
Checksums-Sha256:
 69c8b1bc8c14fb8ef9f6cb36817f699c408ec575e5e88487d3318e6da2dbead7 124308 linux_6.18~rc5-1~exp1.dsc
 aebd5ab073f52d1b8ba7f74cdd8fe123e6bdd086730aa2b03944491dda28839b 157341984 linux_6.18~rc5.orig.tar.xz
 d15a4066fd5a0ae3e40283663d7be9132f22f2b37c3bf655861e731902922f56 1440460 linux_6.18~rc5-1~exp1.debian.tar.xz
 4c7274223e04e79cb80de95799e465f0a8bda47bae8d0d71b44063cd625dadd9 6794 linux_6.18~rc5-1~exp1_source.buildinfo
Files:
 3d4b93fc70595652bca2b7ae0b4a8b21 124308 kernel optional linux_6.18~rc5-1~exp1.dsc
 24684afc044a1a27122ece874a7ee8fd 157341984 kernel optional linux_6.18~rc5.orig.tar.xz
 aff334bd8a2342b3c92e51e33d1e97d4 1440460 kernel optional linux_6.18~rc5-1~exp1.debian.tar.xz
 408fe7004c9db78ddbde17707e609d0a 6794 kernel optional linux_6.18~rc5-1~exp1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=JGVO
-----END PGP SIGNATURE-----

Attachment: pgpaOOwsT3muV.pgp
Description: PGP signature


--- End Message ---

Reply to: