[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1001805: marked as done (linux-image-5.10.0-9-amd64: Permanent blinking of wireless led)



Your message dated Thu, 20 Feb 2025 14:02:36 +0100 (CET)
with message-id <20250220130236.E0E83BE2EE7@eldamar.lan>
and subject line Closing this bug (BTS maintenance for src:linux bugs)
has caused the Debian Bug report #998173,
regarding linux-image-5.10.0-9-amd64: Permanent blinking of wireless led
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
998173: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=998173
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: linux-image-5.10.0-9-amd64
Version: 5.10.70-1
Severity: normal

Dear Maintainer,


with the latest kernel version (change from *-8-amd64 to *-9-amd64 and higher), I discovered an annoying issue.
This issue shows, that the wireless led is permanently blinking, but it should only blink, when real traffic is 
received. 

Examination showed, that the permanent blinking is caused by the router (it is a Fritz!Box), which is permanently
sending brodcast traffic. However, the indication of broadcast traffic with the led was suppressed in kernels with version -8-amd64 and lower, and only "real" traffic was indicated by the led.

Behaving this way, the led indication is very useful, as normal traffic will let the led blink during traffic I know I had initiated (like calling a website). Permanently blinking showed, something fishy is going on and I should examine it: Is a download/update running? Is there a large mail coming? Does someone have access to my system? Is there a bruteforce attack ongoing? 

So, this function is really important for me, and I would like to have it back. At the moment I am staying with kernel *-8-amd64. Please note, I saw this on kali linux, too.

I believe, this issue is in the atheros module (I am using an AR542x Wireless card), and the module is ath5.ko.

If this is really an issue in this module, please take a look at the ath9.ko module, maybe the same issue appears there, too.

It would be very nice, if you could take a look at this. Please feel free, to ask for more information. 

Network dumps or whatever can be delivered, if needed.

Thank you very much for reading this and any help.

Best regards

Hans
 
 
-- System Information:
Debian Release: 11.1
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.10.0-8-amd64 (SMP w/2 CPU threads)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_CRAP, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE=de
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages linux-image-5.10.0-9-amd64 depends on:
ii  initramfs-tools [linux-initramfs-tool]  0.140
ii  kmod                                    28-1
ii  linux-base                              4.6

Versions of packages linux-image-5.10.0-9-amd64 recommends:
ii  apparmor             2.13.6-10
ii  firmware-linux-free  20200122-1

Versions of packages linux-image-5.10.0-9-amd64 suggests:
pn  debian-kernel-handbook  <none>
ii  extlinux                3:6.04~git20190206.bf6db5b4+dfsg1-3+b1
ii  grub-pc                 2.04-20
pn  linux-doc-5.10          <none>

--- End Message ---
--- Begin Message ---
Hi

This bug was filed for a very old kernel or the bug is old itself
without resolution.

If you can reproduce it with

- the current version in unstable/testing
- the latest kernel from backports

please reopen the bug, see https://www.debian.org/Bugs/server-control
for details.

Regards,
Salvatore

--- End Message ---

Reply to: