[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <c64ce498-7c06-3726-47d5-0a74471f027b@gmail.com>
Date: Mon, 11 Sep 2023 07:42:48 +0700
From: Bagas Sanjaya <bagasdotme@...il.com>
To: Gregory Greenman <gregory.greenman@...el.com>,
Johannes Berg <johannes.berg@...el.com>,
Ronan Pigott <ronan@....ie>
Cc: Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
Linux Regressions <regressions@...ts.linux.dev>,
Linux Wireless <linux-wireless@...r.kernel.org>
Subject: Fwd: iwlwifi: AX210 Timeout waiting for hardware access (CSR_GP_CNTRL
0xffffffff)
Hi,
I notice a regression report on Bugzilla [1]. Quoting from it:
> In linux 6.5.2, loading firmware version 83 on AX210 device appears to fail (repeatedly) with a timeout. Reverting to linux 6.4.12 successfully loads firmware 78.
>
> My nic:
> $ lspci -kd::280
> 08:00.0 Network controller: Intel Corporation Wi-Fi 6 AX210/AX211/AX411 160MHz (rev 1a)
> Subsystem: Rivet Networks Wi-Fi 6 AX210/AX211/AX411 160MHz
> Kernel driver in use: iwlwifi
> Kernel modules: iwlwifi
>
> The failing kernel:
> $ pacman -Qp /var/cache/pacman/pkg/linux-6.5.2.arch1-1-x86_64.pkg.tar.zst
> linux 6.5.2.arch1-1
>
> The error:
> $ journalctl -b -1 _KERNEL_DEVICE=+pci:${$(lspci -Dd::280)[(w)1]} + _TRANSPORT=kernel > dmesg65.log
>
> [..attached..]
>
> The interesting bit:
> Sep 09 20:30:28 kernel: iwlwifi 0000:08:00.0: WRT: Invalid buffer destination
> Sep 09 20:30:29 kernel: ------------[ cut here ]------------
> Sep 09 20:30:29 kernel: Timeout waiting for hardware access (CSR_GP_CNTRL 0xffffffff)
> Sep 09 20:30:29 kernel: WARNING: CPU: 13 PID: 679 at drivers/net/wireless/intel/iwlwifi/pcie/trans.c:2190 __iwl_trans_pcie_gr>
> Sep 09 20:30:29 kernel: Modules linked in: iwlmvm(+) snd_sof_pci_intel_tgl snd_sof_intel_hda_common soundwire_intel snd_sof_i>
> Sep 09 20:30:29 kernel: snd_hwdep intel_rapl_msr dell_smm_hwmon processor_thermal_rfim i2c_i801 realtek btmtk alienware_wmi >
> Sep 09 20:30:29 kernel: CPU: 13 PID: 679 Comm: modprobe Not tainted 6.5.2-arch1-1 #1 d2912f929551bc8e9b95af790b8285a77c25fa29
> Sep 09 20:30:29 kernel: Hardware name: Dell Inc. XPS 8950/0R6PCT, BIOS 1.2.1 03/25/2022
> [...]
> Sep 09 20:30:29 kernel: Call Trace:
> Sep 09 20:30:29 kernel: <TASK>
> Sep 09 20:30:29 kernel: ? __iwl_trans_pcie_grab_nic_access+0x14a/0x150 [iwlwifi 25a8da985d322177fdc2dbc451d4271c449a7a6f]
> Sep 09 20:30:29 kernel: ? __warn+0x81/0x130
> Sep 09 20:30:29 kernel: ? __iwl_trans_pcie_grab_nic_access+0x14a/0x150 [iwlwifi 25a8da985d322177fdc2dbc451d4271c449a7a6f]
> Sep 09 20:30:29 kernel: ? report_bug+0x171/0x1a0
> Sep 09 20:30:29 kernel: ? prb_read_valid+0x1b/0x30
> Sep 09 20:30:29 kernel: ? handle_bug+0x3c/0x80
> Sep 09 20:30:29 kernel: ? exc_invalid_op+0x17/0x70
> Sep 09 20:30:29 kernel: ? asm_exc_invalid_op+0x1a/0x20
> Sep 09 20:30:29 kernel: ? __iwl_trans_pcie_grab_nic_access+0x14a/0x150 [iwlwifi 25a8da985d322177fdc2dbc451d4271c449a7a6f]
> Sep 09 20:30:29 kernel: iwl_trans_pcie_grab_nic_access+0x1a/0x40 [iwlwifi 25a8da985d322177fdc2dbc451d4271c449a7a6f]
> Sep 09 20:30:29 kernel: iwl_read_prph+0x1d/0x60 [iwlwifi 25a8da985d322177fdc2dbc451d4271c449a7a6f]
> Sep 09 20:30:29 kernel: iwl_mvm_load_ucode_wait_alive+0x2d9/0x620 [iwlmvm 7d9113127caff2df016f1a19aad637aa20200412]
> [...]
> Sep 09 20:30:29 kernel: ---[ end trace 0000000000000000 ]---
> Sep 09 20:30:29 kernel: iwlwifi 0000:08:00.0: iwlwifi transaction failed, dumping registers
> [...]
>
> See attachment for full log.
>
> Boot after revert to 6.4.12 with working firmware:
> $ journalctl --no-hostname -b _KERNEL_DEVICE=+pci:${$(lspci -Dd::280)[(w)1]} + _TRANSPORT=kernel > dmesg64.log
>
> [..attached..]
>
> The interesting bit:
> Sep 09 20:48:23 kernel: iwlwifi 0000:08:00.0: loaded firmware version 78.3bfdc55f.0 ty-a0-gf-a0-78.ucode op_mode iwlmvm
>
>
> $ pacman -Ql linux-firmware | grep ty.a0.gf.a0
> linux-firmware /usr/lib/firmware/iwlwifi-ty-a0-gf-a0-59.ucode.zst
> linux-firmware /usr/lib/firmware/iwlwifi-ty-a0-gf-a0-66.ucode.zst
> linux-firmware /usr/lib/firmware/iwlwifi-ty-a0-gf-a0-72.ucode.zst
> linux-firmware /usr/lib/firmware/iwlwifi-ty-a0-gf-a0-73.ucode.zst
> linux-firmware /usr/lib/firmware/iwlwifi-ty-a0-gf-a0-74.ucode.zst
> linux-firmware /usr/lib/firmware/iwlwifi-ty-a0-gf-a0-77.ucode.zst
> linux-firmware /usr/lib/firmware/iwlwifi-ty-a0-gf-a0-78.ucode.zst
> linux-firmware /usr/lib/firmware/iwlwifi-ty-a0-gf-a0-79.ucode.zst
> linux-firmware /usr/lib/firmware/iwlwifi-ty-a0-gf-a0-81.ucode.zst
> linux-firmware /usr/lib/firmware/iwlwifi-ty-a0-gf-a0-83.ucode.zst
> linux-firmware /usr/lib/firmware/iwlwifi-ty-a0-gf-a0.pnvm.zst
>
See Bugzilla for the full thread and attached journal logs.
On BZ, I have asked the reporter (Cc'ed) to test the mainline.
Anyway, I'm adding this regression to regzbot:
#regzbot introduced: 399762de769c4e https://bugzilla.kernel.org/show_bug.cgi?id=217894
#regzbot title: CSR_GP_CNTRL hardware access timeout due to firmware API bump
Thanks.
[1]: https://bugzilla.kernel.org/show_bug.cgi?id=217894
--
An old man doll... just what I always wanted! - Clara
Powered by blists - more mailing lists