From patchwork Thu Jun 2 17:03:46 2016 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Rajkumar Manoharan X-Patchwork-Id: 9150995 X-Patchwork-Delegate: kvalo@adurom.com Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id 2EABF6074E for ; Thu, 2 Jun 2016 17:04:02 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 1C552282ED for ; Thu, 2 Jun 2016 17:04:02 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 1152C28310; Thu, 2 Jun 2016 17:04:02 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-6.8 required=2.0 tests=BAYES_00,DKIM_SIGNED, RCVD_IN_DNSWL_HI,T_DKIM_INVALID autolearn=ham version=3.3.1 Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id ACAB5282ED for ; Thu, 2 Jun 2016 17:04:00 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1161476AbcFBRD7 (ORCPT ); Thu, 2 Jun 2016 13:03:59 -0400 Received: from wolverine01.qualcomm.com ([199.106.114.254]:35469 "EHLO wolverine01.qualcomm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1161413AbcFBRD6 convert rfc822-to-8bit (ORCPT ); Thu, 2 Jun 2016 13:03:58 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=qti.qualcomm.com; i=@qti.qualcomm.com; q=dns/txt; s=qcdkim; t=1464887038; x=1496423038; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=j5Oy0e7DF5gLArcAXfc9V4hJZe1rmyDIvcZ/Csfrifc=; b=RjgRfFtyTdaL8n2mAR0Ma0s/RicBaJEMidjURR0OYpG6ALrmeXMjWEzv ARpBZNTprYZ8EC61RJ2RRD4Wvny29C7lY/PuSnbxhYmoBzAcC24xo5SXS wz/bknrsDAKLUeDVFwH6s/bIQMPd49sAO7V18quSlyWz9RKNX3DcJUipy c=; X-IronPort-AV: E=Sophos;i="5.26,407,1459839600"; d="scan'208";a="197690755" Received: from ironmsg02-r-new.qualcomm.com (HELO ironmsg02-R.qualcomm.com) ([10.53.140.106]) by wolverine01.qualcomm.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 02 Jun 2016 10:03:53 -0700 X-IronPort-AV: E=McAfee;i="5700,7163,8183"; a="742718964" Received: from nasanexm02d.na.qualcomm.com ([10.85.0.44]) by ironmsg02-R.qualcomm.com with ESMTP/TLS/RC4-SHA; 02 Jun 2016 10:03:52 -0700 Received: from eusanexr01e.eu.qualcomm.com (10.85.0.100) by NASANEXM02D.na.qualcomm.com (10.85.0.44) with Microsoft SMTP Server (TLS) id 15.0.1178.4; Thu, 2 Jun 2016 10:03:52 -0700 Received: from aphydexm01b.ap.qualcomm.com (10.252.127.11) by eusanexr01e.eu.qualcomm.com (10.85.0.100) with Microsoft SMTP Server (TLS) id 15.0.1178.4; Thu, 2 Jun 2016 10:03:49 -0700 Received: from aphydexm01b.ap.qualcomm.com ([10.252.127.11]) by aphydexm01b.ap.qualcomm.com ([10.252.127.11]) with mapi id 15.00.1178.000; Thu, 2 Jun 2016 22:33:46 +0530 From: "Manoharan, Rajkumar" To: Ben Greear , "Valo, Kalle" , "ath10k@lists.infradead.org" , Rajkumar Manoharan CC: "linux-wireless@vger.kernel.org" , "mike@fireburn.co.uk" Subject: Re: Bug 119151 - [regression] ath10k no longer authenitcates and freezes system Thread-Topic: Bug 119151 - [regression] ath10k no longer authenitcates and freezes system Thread-Index: AQHRvNX9Tv+kgWt0IkS2YUzn04xnSZ/V7w2AgAByqsE= Date: Thu, 2 Jun 2016 17:03:46 +0000 Message-ID: <1464887026467.72937@qti.qualcomm.com> References: <8760trzoiw.fsf@kamboji.qca.qualcomm.com> <871t4fzn1x.fsf@kamboji.qca.qualcomm.com>, <57504F05.3040200@candelatech.com> In-Reply-To: <57504F05.3040200@candelatech.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-exchange-messagesentrepresentingtype: 1 x-ms-exchange-transport-fromentityheader: Hosted x-originating-ip: [199.106.107.6] MIME-Version: 1.0 Sender: linux-wireless-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP On Thursday, June 2, 2016 8:51 PM, Ben Greear wrote: > On 06/02/2016 07:24 AM, Valo, Kalle wrote: >> Kalle Valo writes: >> >>> there's a regression in ath10k: >>> >>> https://bugzilla.kernel.org/show_bug.cgi?id=119151 >>> >>> Reporter bisected it to this: >>> >>> 5c86d97bcc1d42ce7f75685a61be4dad34ee8183 is the first bad commit >>> commit 5c86d97bcc1d42ce7f75685a61be4dad34ee8183 >>> Author: Rajkumar Manoharan >>> Date: Tue Mar 22 17:22:19 2016 +0530 >>> >>> ath10k: combine txrx and replenish task >>> >>> Since tx completion and rx indication processing are moved out >>> of txrx tasklet and rx ring lock contention also removed from txrx >>> for rx_ind messages, it would be efficient to combine both replenish >>> and txrx tasks. Refill threshold is adjusted for both AP135 and AP148 >>> (low and high end systems). With this adjustment in AP135, TCP DL is >>> improved from 603 Mbps to 620 Mbps and UDP DL is improved from 758 Mbps >>> to 803 Mbps. Also no watchdog are observed on UDP BiDi. >>> >>> Signed-off-by: Rajkumar Manoharan >>> Signed-off-by: Kalle Valo >> >> Adding Mike, the bug reporter. > Mike, Sorry for the regression. Since the patch combines both txrx and replenish tasklet, it is validated in low end embedded devices like AP135 (single core 720 MHz MIPS processor). It seems yours is octa core processor. So CPU is not bottleneck here. Need your help to fix this issue asap. Can you please try reducing rx refill threshold as below. > > I found a lot of problems with this code as well, and the 5 patches > starting from the URL below fixed the issues for me. > Ben, Can you please explain the sort of issues you have observed with this change? -Rajkumar-- To unsubscribe from this list: send the line "unsubscribe linux-wireless" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html diff --git a/drivers/net/wireless/ath/ath10k/htt.h b/drivers/net/wireless/ath/ath10k/htt.h index 2aa407160859..d35d3d48ae6c 100644 --- a/drivers/net/wireless/ath/ath10k/htt.h +++ b/drivers/net/wireless/ath/ath10k/htt.h @@ -1734,7 +1734,7 @@ struct htt_rx_desc { /* Refill a bunch of RX buffers for each refill round so that FW/HW can handle * aggregated traffic more nicely. */ -#define ATH10K_HTT_MAX_NUM_REFILL 100 +#define ATH10K_HTT_MAX_NUM_REFILL 16 From your log attachment from bug report, I found few timed out messages. May 30 21:09:26 axion kernel: wlan0: deauthenticating from a0:63:91:a7:3c:9f by local choice (Reason: 3=DEAUTH_LEAVING) May 30 21:09:32 axion kernel: ath10k_pci 0000:3c:00.0: failed to flush transmit queue (skip 0 ar-state 1): 0 May 30 21:09:35 axion kernel: ath10k_pci 0000:3c:00.0: failed to delete peer a0:63:91:a7:3c:9f for vdev 0: -110 May 30 21:09:35 axion kernel: ath10k_pci 0000:3c:00.0: found sta peer a0:63:91:a7:3c:9f entry on vdev 0 after it was supposed Try disabling pci power save for qca6174 as below. diff --git a/drivers/net/wireless/ath/ath10k/pci.c b/drivers/net/wireless/ath/ath10k/pci.c index 852f2c18cd11..5e3ba37a8c6a 100644 --- a/drivers/net/wireless/ath/ath10k/pci.c +++ b/drivers/net/wireless/ath/ath10k/pci.c @@ -2979,7 +2979,7 @@ static int ath10k_pci_probe(struct pci_dev *pdev, case QCA6164_2_1_DEVICE_ID: case QCA6174_2_1_DEVICE_ID: hw_rev = ATH10K_HW_QCA6174; - pci_ps = true; + pci_ps = false; pci_soft_reset = ath10k_pci_warm_reset; pci_hard_reset = ath10k_pci_qca6174_chip_reset;