Hi!
I tested the 5.15 branch on a ax9000 and have several problems.
- Network does not respond, somehow I get a loop!?
- SOC wireless does not initialize as before with 5.10-restart.
Here are some logs:
tcpdump on eth0 shows an incoming packet multiple times.
01:38:56.274796 9c:9d:7e:b5:ba:94 > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 42: Request who-has 10.0.0.15 tell 10.0.0.240, length 28
01:38:56.274804 9c:9d:7e:b5:ba:94 > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 42: Request who-has 10.0.0.15 tell 10.0.0.240, length 28
01:38:56.274809 9c:9d:7e:b5:ba:94 > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 42: Request who-has 10.0.0.15 tell 10.0.0.240, length 28
01:38:56.274812 9c:9d:7e:b5:ba:94 > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 42: Request who-has 10.0.0.15 tell 10.0.0.240, length 28
01:38:56.274816 9c:9d:7e:b5:ba:94 > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 42: Request who-has 10.0.0.15 tell 10.0.0.240, length 28
01:38:56.274820 9c:9d:7e:b5:ba:94 > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 42: Request who-has 10.0.0.15 tell 10.0.0.240, length 28
01:38:56.274824 9c:9d:7e:b5:ba:94 > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 42: Request who-has 10.0.0.15 tell 10.0.0.240, length 28
01:38:56.274828 9c:9d:7e:b5:ba:94 > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 42: Request who-has 10.0.0.15 tell 10.0.0.240, length 28
01:38:56.274832 9c:9d:7e:b5:ba:94 > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 42: Request who-has 10.0.0.15 tell 10.0.0.240, length 28
After some time:
[ 181.995776] WARN: src_info_type:0x0. Drop skb:ffffff8004e25700
[ 182.001659] WARN: src_info_type:0xc0. Drop skb:ffffff800742d200
[ 182.007577] WARN: src_info_type:0x30. Drop skb:ffffff8006255400
[ 182.013717] WARN: src_info_type:0x0. Drop skb:ffffff8011c46f00
[ 182.019302] WARN: src_info_type:0x0. Drop skb:ffffff8009a04500
[ 182.025230] WARN: src_info_type:0x80. Drop skb:ffffff8006256f00
[ 182.030999] WARN: src_info_type:0x0. Drop skb:ffffff8006256100
[ 182.036822] WARN: src_info_type:0x0. Drop skb:ffffff801176d300
[ 182.042731] WARN: src_info_type:0x80. Drop skb:ffffff800504f400
[ 182.048599] WARN: src_info_type:0x30. Drop skb:ffffff8012ffcc00
[ 182.054542] WARN: src_info_type:0x0. Drop skb:ffffff8009cd7d00
[ 182.060623] WARN: src_info_type:0xe0. Drop skb:ffffff8012c83000
[ 182.066199] WARN: src_info_type:0x0. Drop skb:ffffff8006255400
[ 182.071982] WARN: src_info_type:0x80. Drop skb:ffffff800742d200
[ 182.077881] WARN: src_info_type:0x0. Drop skb:ffffff8004e25700
[ 182.083690] WARN: src_info_type:0x0. Drop skb:ffffff8009a1e800
[ 182.089630] WARN: src_info_type:0x0. Drop skb:ffffff8009ce3f00
[ 182.095428] WARN: src_info_type:0x80. Drop skb:ffffff8005117700
[ 182.101248] WARN: src_info_type:0xc0. Drop skb:ffffff8005112a00
I could not get ping working. I checked link speeds 1GB and 2.5G.
SOC 5g wifi does not initialize:
[ 11.800334] ath10k 5.15 driver, optimized for CT firmware, probing pci device: 0x50.
[ 11.800742] ath10k_pci 0001:01:00.0: enabling device (0000 -> 0002)
[ 11.807637] ath10k_pci 0001:01:00.0: pci irq msi oper_irq_mode 2 irq_mode 0 reset_mode 0
[ 12.279763] ath10k_pci 0001:01:00.0: qca9887 hw1.0 target 0x4100016d chip_id 0x004000ff sub 0000:0000
[ 12.279812] ath10k_pci 0001:01:00.0: kconfig debug 0 debugfs 1 tracing 0 dfs 1 testmode 0
[ 12.288081] ath10k_pci 0001:01:00.0: firmware ver 10.1-ct-87-__fH-022-ecad3248 api 2 features wmi-10.x,mfp,txstatus-noack,wmi-10.x-CT,ratemask-CT,txrate-CT,get-temp-CT,tx-rc-CT,cust-stats-CT,retry-gt2-CT,txrate2-CT,beacon-cb-CT,wmi-block-ack-CT crc32 c0004f11
[ 12.322187] ath10k_pci 0001:01:00.0: board_file api 2 bmi_id N/A crc32 dfee0d28
[ 13.187658] ath10k_pci 0001:01:00.0: 10.1 wmi init: vdevs: 16 peers: 127 tid: 256
[ 13.194642] ath10k_pci 0001:01:00.0: wmi print 'P 128 V 8 T 410'
[ 13.194684] ath10k_pci 0001:01:00.0: wmi print 'msdu-desc: 1424 sw-crypt: 0 ct-sta: 0'
[ 13.200413] ath10k_pci 0001:01:00.0: wmi print 'alloc rem: 25576 iram: 25068'
[ 13.248264] ath10k_pci 0001:01:00.0: htt-ver 2.2 wmi-op 2 htt-op 2 cal file max-sta 128 raw 0 hwcrypto 1
[ 13.248678] ath10k_pci 0001:01:00.0: NOTE: Firmware DBGLOG output disabled in debug_mask: 0x10000000
[ 13.387614] ath: EEPROM regdomain sanitized
[ 13.387626] ath: EEPROM regdomain: 0x64
[ 13.387632] ath: EEPROM indicates we should expect a direct regpair map
[ 13.387638] ath: Country alpha2 being used: 00
[ 13.387642] ath: Regpair used: 0x64
[ 13.396462] ath11k c000000.wifi: ipq8074 hw2.0
[ 13.396700] remoteproc remoteproc0: powering up cd00000.q6v5_wcss
[ 13.399939] remoteproc remoteproc0: Booting fw image IPQ8074/q6_fw.mdt, size 668
[ 14.676791] remoteproc remoteproc0: remote processor cd00000.q6v5_wcss is now up
[ 14.678268] ath11k c000000.wifi: qmi ignore invalid mem req type 3
[ 14.683800] ath11k c000000.wifi: chip_id 0x0 chip_family 0x0 board_id 0x294 soc_id 0xffffffff
[ 14.689282] ath11k c000000.wifi: fw_version 0x250584a5 fw_build_timestamp 2021-10-11 21:05 fw_build_id QC_IMAGE_VERSION_STRING=WLAN.HK.2.5.0.1-01201-QCAHKSWPL_SILICONZ-1
[ 14.689689] kmodloader: done loading kernel modules from /etc/modules.d/*
[ 17.335767] nss-dp 3a001800.dp5 eth0: nss_dp_edma: Registering netdev eth0(qcom-id:5) with EDMA
hostapd gives me this error in dmesg later:
20.257327] ------------[ cut here ]------------
[ 20.257364] WARNING: CPU: 0 PID: 1601 at ath11k_reg_update_chan_list+0x24c/0x294 [ath11k]
[ 20.261019] Modules linked in: iptable_nat ath11k_ahb ath11k ath10k_pci ath10k_core ath xt_state xt_nat xt_conntrack xt_REDIRECT xt_MASQUERADE xt_CT nf_nat nf_conntrack mac80211 iptable_mangle iptable_filter ipt_REJECT ip_tables cfg80211 xt_time xt_tcpudp xt_multiport xt_mark xg
[ 20.308137] CPU: 0 PID: 1601 Comm: hostapd Not tainted 5.15.10 #0
[ 20.330371] Hardware name: Xiaomi AX9000 (DT)
[ 20.336358] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 20.340703] pc : ath11k_reg_update_chan_list+0x24c/0x294 [ath11k]
[ 20.347473] lr : ath11k_wmi_scan_prob_req_oui+0x28e0/0x3570 [ath11k]
[ 20.353724] sp : ffffffc0151bb9c0
[ 20.360140] x29: ffffffc0151bb9c0 x28: ffffff8003fd9800 x27: 0000000000000000
[ 20.363360] x26: 0000000000001003 x25: 0000000000000000 x24: ffffff80066827e0
[ 20.370477] x23: ffffff80066844a0 x22: ffffff8006680c60 x21: ffffff8006680c38
[ 20.377596] x20: 0000000000000000 x19: ffffff80066827e0 x18: 0000000000000014
[ 20.384714] x17: 0000000000000004 x16: ffffff80066834c0 x15: 000000000000000d
[ 20.391831] x14: ffffff8004e6859c x13: 0000000000000067 x12: ffffff8004e685e8
[ 20.398950] x11: 0000000000000018 x10: 0000000000000066 x9 : 0000000000000007
[ 20.406068] x8 : 0000000000000004 x7 : ffffff80066834e0 x6 : 00000000ffffffff
[ 20.413186] x5 : 000000000000000c x4 : 0000000000000040 x3 : ffffff8006680c60
[ 20.420304] x2 : ffffff80043b4ecc x1 : 0000000000000031 x0 : 0000000000000000
[ 20.427422] Call trace:
[ 20.434531] ath11k_reg_update_chan_list+0x24c/0x294 [ath11k]
[ 20.436795] ath11k_wmi_scan_prob_req_oui+0x28e0/0x3570 [ath11k]
[ 20.442697] drv_start+0x34/0x60 [mac80211]
[ 20.448770] ieee80211_do_open+0x258/0x854 [mac80211]
[ 20.452679] ieee80211_do_open+0x810/0x854 [mac80211]
[ 20.457887] __dev_open+0xf4/0x17c
[ 20.462918] __dev_change_flags+0x13c/0x190
[ 20.466217] dev_change_flags+0x24/0x64
[ 20.470296] devinet_ioctl+0x638/0x6d0
[ 20.474116] inet_ioctl+0x24c/0x260
[ 20.477936] sock_ioctl+0x230/0x4bc
[ 20.481320] __arm64_sys_ioctl+0x5c8/0x1180
[ 20.484795] invoke_syscall.constprop.0+0x5c/0x104
[ 20.488962] do_el0_svc+0x6c/0x15c
[ 20.493820] el0_svc+0x18/0x54
[ 20.497206] el0t_64_sync_handler+0xb0/0xb4
[ 20.500246] el0t_64_sync+0x184/0x188
[ 20.504326] ---[ end trace 229a32490f43ec74 ]---
It may be the the soc wifi caldata has been borked by the javascript root method.
Does somebody has a caldata for test?