CVE-2025-39746
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
11/09/2025
Last modified:
15/09/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
wifi: ath10k: shutdown driver when hardware is unreliable<br />
<br />
In rare cases, ath10k may lose connection with the PCIe bus due to<br />
some unknown reasons, which could further lead to system crashes during<br />
resuming due to watchdog timeout:<br />
<br />
ath10k_pci 0000:01:00.0: wmi command 20486 timeout, restarting hardware<br />
ath10k_pci 0000:01:00.0: already restarting<br />
ath10k_pci 0000:01:00.0: failed to stop WMI vdev 0: -11<br />
ath10k_pci 0000:01:00.0: failed to stop vdev 0: -11<br />
ieee80211 phy0: PM: **** DPM device timeout ****<br />
Call Trace:<br />
panic+0x125/0x315<br />
dpm_watchdog_set+0x54/0x54<br />
dpm_watchdog_handler+0x57/0x57<br />
call_timer_fn+0x31/0x13c<br />
<br />
At this point, all WMI commands will timeout and attempt to restart<br />
device. So set a threshold for consecutive restart failures. If the<br />
threshold is exceeded, consider the hardware is unreliable and all<br />
ath10k operations should be skipped to avoid system crash.<br />
<br />
fail_cont_count and pending_recovery are atomic variables, and<br />
do not involve complex conditional logic. Therefore, even if recovery<br />
check and reconfig complete are executed concurrently, the recovery<br />
mechanism will not be broken.<br />
<br />
Tested-on: QCA6174 hw3.2 PCI WLAN.RM.4.4.1-00288-QCARMSWPZ-1



