From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mx0b-0031df01.pphosted.com (mx0b-0031df01.pphosted.com [205.220.180.131]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 6A668363C7A for ; Fri, 15 May 2026 06:39:35 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=205.220.180.131 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1778827176; cv=none; b=PR4KQJCDBMhs73ip+IkyIMwbYaoGC+ApG/bopmDkf845ONlDEKw6+doL5MUE9ShvzBPwgF4KKFdtuBCy4XCaK2fBN57Ua2SqhiJ92n/FElvfMU1XXICp/uDJwddQ6O49Unl4Vdek+zb0nKr3Zks1XmqtEU6xouZPJRtqskj+tQw= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1778827176; c=relaxed/simple; bh=UoKL1iVfccKojdCih8dTQdQ6c2I1ZzQDM2RG7usJpoQ=; h=Message-ID:Date:MIME-Version:Subject:To:Cc:References:From: In-Reply-To:Content-Type; b=rQyosdoJLElg7kaU4vfIgXmi7a/rOZoRuiGxyLY58b/dyaaJUifM/m0/bvWsemLlZkdTx0vYERg+JGJWhKAEHktE9IkDh/oiHNWmdH+DAupAL6uv4gX8Sxl5lliv57KYtrSkS/Dnw8cqrxxV9w+VIYg1cZq7SI2hrPLGmcUXi18= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=oss.qualcomm.com; spf=pass smtp.mailfrom=oss.qualcomm.com; dkim=pass (2048-bit key) header.d=qualcomm.com header.i=@qualcomm.com header.b=fY5KILLG; dkim=pass (2048-bit key) header.d=oss.qualcomm.com header.i=@oss.qualcomm.com header.b=V2XkxaRQ; arc=none smtp.client-ip=205.220.180.131 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=oss.qualcomm.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=oss.qualcomm.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=qualcomm.com header.i=@qualcomm.com header.b="fY5KILLG"; dkim=pass (2048-bit key) header.d=oss.qualcomm.com header.i=@oss.qualcomm.com header.b="V2XkxaRQ" Received: from pps.filterd (m0279872.ppops.net [127.0.0.1]) by mx0a-0031df01.pphosted.com (8.18.1.11/8.18.1.11) with ESMTP id 64F5YSC23795431 for ; Fri, 15 May 2026 06:39:34 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=qualcomm.com; h= cc:content-transfer-encoding:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to; s=qcppdkim1; bh= JOLE131bcicG5PKOMByp2XiRYzJK1mHFyKZYnU5OtAY=; b=fY5KILLGfYghV3uj 0i2tmUarTPnr3T73M2VXyN4diQy1+JbyorwKkbd/zeTM7ATeA0QOQqFfLxGHiLiu Dqp1dc97RSV4D+Y5OICmgGlUWWxPA4uCJaAcvuHN3myRv7emKQ8okJaXWDaV7aYx 0ARpUeNZetORBVN1UKFm1ZFkyAt1wH9YHF6uA0UEWICJ7Ra9ZoewOtUG+u4au+WJ KW4mYff3/zv2fjXM9XJhLp0qkRbnAd0E1cCRlGwyxUotDXzX/rOox+qmx65zbf0j W8gjw0WFWYlZPSUliHXd3SOwkLWRUauKv857/RGqNaaEUed/y5cSzgueVoUTnRau RXg5RQ== Received: from mail-pl1-f197.google.com (mail-pl1-f197.google.com [209.85.214.197]) by mx0a-0031df01.pphosted.com (PPS) with ESMTPS id 4e5m1ssxag-1 (version=TLSv1.3 cipher=TLS_AES_128_GCM_SHA256 bits=128 verify=NOT) for ; Fri, 15 May 2026 06:39:34 +0000 (GMT) Received: by mail-pl1-f197.google.com with SMTP id d9443c01a7336-2bd00a65673so5443195ad.1 for ; Thu, 14 May 2026 23:39:34 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oss.qualcomm.com; s=google; t=1778827173; x=1779431973; darn=vger.kernel.org; h=content-transfer-encoding:in-reply-to:content-language:from :references:cc:to:subject:user-agent:mime-version:date:message-id :from:to:cc:subject:date:message-id:reply-to; bh=JOLE131bcicG5PKOMByp2XiRYzJK1mHFyKZYnU5OtAY=; b=V2XkxaRQk1qa/ue4ogwOkNZUm4JK/h/0gmplwOG0sVFKNVdoUWy1q262z7EKwrtUft Cj3rQBfkWeXrK024/MFN3Txm17qNU3s3NOjOsx707BHNoQ4duPyYBTHkgg3ZhlgW+WlX yvsSP+DnSIsam2YxWmqIB7T8uE3iKOghRXTHiIo+pvXbWAte3BZVMX4rrF+U8pOYQgBX S5eFgbdYXnt5Rcz1BvFx1Rz0Jkiqw7D2C+URiN37Wn11SdNQn28/2S1JSPQ7xDQKGttb h1jfrZc70SWt3lky5+C1mCfvkO2UoVboodIq1L0FBTAVrkvHJQcvCOD29uGVwFVdFz8d mphQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1778827173; x=1779431973; h=content-transfer-encoding:in-reply-to:content-language:from :references:cc:to:subject:user-agent:mime-version:date:message-id :x-gm-gg:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=JOLE131bcicG5PKOMByp2XiRYzJK1mHFyKZYnU5OtAY=; b=E3zcDsGIYgonveoE5C+0KxnfdS4kkVFWgb8qr/6a8/4YOGxViLRBAmUG42yXzzHGJM lHX67nPd3NBBIxh7jeGNYOJvR4avfCQaF4dlNhmRpcO1cMC0Fo2dK2X6Sf7BDboRUyOw /ezlIsUNl5XKcvrhveeci/1hFNrj2FAP1HNNoeosBBDJkYPq/JgVb312hcsSYYw8i5NB 2FSrrQccWM2z3OSRI4K6q7VhC25jDnI3fUoqp8Q+2ZF9yr4igsD12ovfMWLBSrzRlUBY kMv9ljVZ5DOjI6YizJ6G8l79Vck5Kn3fQoDr4lRQBPLjFHbu8ki6gjhe5hr1BXJC5PyS TmWA== X-Forwarded-Encrypted: i=1; AFNElJ9Ys/co3NhrblJCpNIqZ6h2m1Yb0x52SznRbX8ln2+OJXaiROwmReo81OXHZIBL87etAu4TNjgRz4IZmO3iLA==@vger.kernel.org X-Gm-Message-State: AOJu0Yze0Hn44j8YnXL6mqvrxbXWVwJHb6klR53UKh8PtfBLvy6AdS3x Yvl4Z0KLIeWyXAbRWONy4BADj/qOsPM6JNyg++PXd10bEra7ZjuwvrZ72ddMpOIW30gmTZy1Rg+ TBvAASOOF5lMuHKPJ07pN4CF3Egt3gliiyqjBTKR2xnrshPA3E6Nn2umhEbGzMq5zfs/OpPkz4Q TYV1Q4 X-Gm-Gg: Acq92OHjbZvLdTarO/pvcjQKGdx6iQ10cxoenn4Xwi85uatZwMIZlf5XwHc9zc/egpm Ml8Es8LJPw0RvP6i/o6fBHiBZktTmnBmif8D12n/RU9w3Knog7L6yeG5GAXbeu9sSipFhbmaoBv 2/g3MP6UIm/OmMvQCYGtm0bcw0rrv4aIUZeUlBT/B2kro9Q03e68oZ6Y2AlIlyJLorDnaYkTy56 wae6bQH0h5XvfaRkPjuSRwcUhl9P4VKNb1xxnbXrFTACNeeDNUbZ1cO6Km39czRNwgwLj29V4Ih 57sR2RHDp4lq2Q8Na7AuhE6tH2w3EoJM/lUrpTy49ijN/t3Y9YIgER4ZWa1NDxkROBDGu4ePZsl MpD+2VLfWXYB6GHT2fnjPR31c218bIhtdZP5TZ3pBUgLNkY3Is67tYn+DSPyJkc3WzS7EsPBvnS Ls58QeLDS6dsVxTVURiQ== X-Received: by 2002:a17:903:1aef:b0:2b4:64cf:e8f8 with SMTP id d9443c01a7336-2bd526ce672mr66930525ad.2.1778827173106; Thu, 14 May 2026 23:39:33 -0700 (PDT) X-Received: by 2002:a17:903:1aef:b0:2b4:64cf:e8f8 with SMTP id d9443c01a7336-2bd526ce672mr66930195ad.2.1778827172576; Thu, 14 May 2026 23:39:32 -0700 (PDT) Received: from [10.133.33.33] (tpe-colo-wan-fw-bordernet.qualcomm.com. [103.229.16.4]) by smtp.gmail.com with ESMTPSA id d9443c01a7336-2bd5bd60275sm44600585ad.7.2026.05.14.23.39.30 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Thu, 14 May 2026 23:39:32 -0700 (PDT) Message-ID: <5bb180ea-d970-4cf0-8d01-620cbdb7be9e@oss.qualcomm.com> Date: Fri, 15 May 2026 14:39:28 +0800 Precedence: bulk X-Mailing-List: linux-wireless@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH] wifi: ath11k: fix warning when unbinding To: Rameshkumar Sundaram , Jose Ignacio Tornos Martinez Cc: ath11k@lists.infradead.org, jjohnson@kernel.org, linux-kernel@vger.kernel.org, linux-wireless@vger.kernel.org, stable@vger.kernel.org References: <20260507070808.367442-1-jtornosm@redhat.com> <20260514061841.9517-1-jtornosm@redhat.com> <95bff017-3554-425f-ad8e-767f9cbe1277@oss.qualcomm.com> From: Baochen Qiang Content-Language: en-US In-Reply-To: Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Proofpoint-Spam-Details-Enc: AW1haW4tMjYwNTE1MDA2NCBTYWx0ZWRfX6WkN2kO0SIAD vl6MgK1um8CFud/F/QNQPNDSCn8vRBmTscvy2vqAvCUdiYJsMqnlBr8ZyTv/nHd1Fdiz6pKXfSd tBBnjKHrNkaGTovptF2rauskYE69nM7WrHF+4ltnmLBGoQb8b7PY3NvxOBgMdMAmjkfcO+M6Nf2 crPB1ojsNd84OYSbMV1zv0Q7KAfB/TSr5QoqT6wUD8mkmzlGwf9O8C7CTxPvXD8NcXnD78edoid 0245zyUq2236daS8hK6PmPouhdS8h+PSJTMR9DzEsrkxZBm9Ti77kSFynYuRcFuWfVXHYXj6yEd tBtYF53aNubRpCDEXYE3PgsmskDvTQnjSiEWiGaARy0B+amAA99ClVaNDAhyA6k6NV359L73qnp Jq9d0P5s1jF863WDS82b9tQNoXBJTnoaiF1EhdWdjxsrBnvh7KGtDuoQ4pf+IK/xFv3xXwUTE2n 5iQ7EG8XMJZFbdsOgGQ== X-Authority-Analysis: v=2.4 cv=cZXiaHDM c=1 sm=1 tr=0 ts=6a06bfa6 cx=c_pps a=cmESyDAEBpBGqyK7t0alAg==:117 a=nuhDOHQX5FNHPW3J6Bj6AA==:17 a=IkcTkHD0fZMA:10 a=NGcC8JguVDcA:10 a=s4-Qcg_JpJYA:10 a=VkNPw1HP01LnGYTKEx00:22 a=u7WPNUs3qKkmUXheDGA7:22 a=yx91gb_oNiZeI1HMLzn7:22 a=XMJksOS74nNapH2Mx7QA:9 a=3ZKOabzyN94A:10 a=QEXdDO2ut3YA:10 a=1OuFwYUASf3TG4hYMiVC:22 X-Proofpoint-GUID: dXpqhmvAn-4OT_w51xqhTDbr-veuZ8lV X-Proofpoint-ORIG-GUID: dXpqhmvAn-4OT_w51xqhTDbr-veuZ8lV X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1143,Hydra:6.1.51,FMLib:17.12.100.49 definitions=2026-05-15_01,2026-05-13_01,2025-10-01_01 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 lowpriorityscore=0 spamscore=0 phishscore=0 suspectscore=0 adultscore=0 bulkscore=0 impostorscore=0 malwarescore=0 clxscore=1015 priorityscore=1501 classifier=typeunknown authscore=0 authtc= authcc= route=outbound adjust=0 reason=mlx scancount=1 engine=8.22.0-2605130000 definitions=main-2605150064 On 5/15/2026 10:27 AM, Rameshkumar Sundaram wrote: > On 5/14/2026 1:45 PM, Baochen Qiang wrote: >> >> >> On 5/14/2026 2:55 PM, Rameshkumar Sundaram wrote: >>> On 5/14/2026 11:48 AM, Jose Ignacio Tornos Martinez wrote: >>>> Hello Rameshkumar, >>>> >>>>> I agree that setting tx_status to NULL makes ath11k_dp_free() more >>>>> defensive, and it matches the ath12k fix. >>>> Ok, I agree too. >>>> >>>>> However, i am still wondering how the second ath11k_dp_free() is reached >>>>> if ATH11K_FLAG_QMI_FAIL is set. >>>>> >>>>> In ath11k_pci_remove(), when ATH11K_FLAG_QMI_FAIL is set, we take the >>>>> qmi_fail path and skip ath11k_core_deinit(). So the normal remove path: >>>>> >>>>>       ath11k_pci_remove() >>>>>         ath11k_core_deinit() >>>>>           ath11k_core_soc_destroy() >>>>>             ath11k_dp_free() >>>>> >>>>> should not run. >>>>> >>>>> So if the double free is still reproducible with QMI_FAIL set (with the >>>>> change i proposed), either the flag is not actually set in this failure >>>>> case, or there is another path calling ath11k_dp_free() ? >>>> Let me try to clarify the issue more. >>>> There are two error actions: >>>> - First the previous error. I reproduce the situation as I commented: running >>>> in a VM the default upstream kernel (with this card using PCI passthrough), >>>> since this is always failing. Let me show the logs in this situation: >>>> [   15.906564] ath11k_pci 0000:07:00.0: BAR 0 [mem 0xfdc00000-0xfddfffff 64bit]: assigned >>>> [   15.926520] ath11k_pci 0000:07:00.0: MSI vectors: 32 >>>> [   15.928572] ath11k_pci 0000:07:00.0: wcn6855 hw2.0 >>>> [   16.984192] ath11k_pci 0000:07:00.0: chip_id 0x2 chip_family 0xb board_id 0xff soc_id >>>> 0x400c0200 >>>> [   16.984351] ath11k_pci 0000:07:00.0: fw_version 0x11088c35 fw_build_timestamp >>>> 2024-04-17 08:34 fw_build_id WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3.6510.41 >>>> [   18.186971] ath11k_pci 0000:07:00.0: failed to receive control response completion, >>>> polling.. >>>> [   19.211036] ath11k_pci 0000:07:00.0: Service connect timeout >>>> [   19.211815] ath11k_pci 0000:07:00.0: failed to connect to HTT: -110 >>>> [   19.214181] ath11k_pci 0000:07:00.0: failed to start core: -110 >>>> [   19.531989] ath11k_pci 0000:07:00.0: firmware crashed: MHI_CB_EE_RDDM >>>> [   19.532930] ath11k_pci 0000:07:00.0: ignore reset dev flags 0xc000 >>>> [   29.259157] ath11k_pci 0000:07:00.0: failed to wait wlan mode request (mode 4): -110 >>>> [   29.259229] ath11k_pci 0000:07:00.0: qmi failed to send wlan mode off: -110 >>>> - Second after this, I commanded the unbinded (ath11_pci) and I get the >>>> warning. Let extend here the stack trace: >>>> [   24.238198]  ? free_large_kmalloc+0x57/0x90 >>>> [   24.238199]  ? report_bug+0x16b/0x180 >>>> [   24.238210]  ? handle_bug+0x3c/0x70 >>>> [   24.238218]  ? exc_invalid_op+0x14/0x70 >>>> [   24.238218]  ? asm_exc_invalid_op+0x16/0x20 >>>> [   24.238224]  ? free_large_kmalloc+0x57/0x90 >>>> [   24.238227]  ath11k_dp_free+0x99/0xb0 [ath11k] >>>> [   24.238275]  ath11k_core_deinit+0x12b/0x1a0 [ath11k] >>>> [   24.238287]  ath11k_pci_remove+0x7b/0x120 [ath11k_pci] >>>> [   24.238294]  pci_device_remove+0x3e/0xb0 >>>> [   24.238304]  device_release_driver_internal+0x193/0x200 >>>> [   24.238315]  unbind_store+0x9d/0xb0 >>>> [   24.238320]  kernfs_fop_write_iter+0x13a/0x1d0 >>>> [   24.238330]  vfs_write+0x32e/0x470 >>>> [   24.238335]  ksys_write+0x5f/0xe0 >>>> [   24.238336]  do_syscall_64+0x5f/0xe0 >>>> Very easy to reproduce. >>>> >>> >>> >>> Thanks much for the logs, that makes sense. The timestamps explain why my earlier >>> reasoning did not match the trace: unbind reaches ath11k_pci_remove() before >>> ATH11K_FLAG_QMI_FAIL is set by the QMI event worker as it is held up on wlan mode off qmi >> >> how could QMI worker set this flag? the first failure happens in >> ath12k_core_qmi_firmware_ready() and upon this failure the QMI worker just break out >> without setting any flag, no? >> > > > you mean ath1*1*k_core_qmi_firmware_ready() ?. Yes in ToT it breaks out without setting > any flags, so I proposed to set that on failure case ATH11K_QMI_EVENT_FW_READY: (similar > to case ATH11K_QMI_EVENT_FW_INIT_DONE:) in this mail thread. Hmm, I mixed it with ath12k. You are right, for ATH11K_QMI_EVENT_FW_INIT_DONE, the ATH11K_FLAG_QMI_FAIL is set upon failure. > > > -- > Ramesh