Your message dated Fri, 14 Nov 2025 22:31:05 +0000 with message-id <E1vK2Jt-00EErg-2K@fasolo.debian.org> and subject line Bug#1120680: fixed in linux 6.18~rc5-1~exp1 has caused the Debian Bug report #1120680, regarding linux-image-6.1.0-41-amd64: After updating to this kernel image linux-image-6.1.0-41-amd64 my Atheros QCA986x/988x did not work. to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 1120680: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120680 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: linux-image-6.1.0-41-amd64: After updating to this kernel image linux-image-6.1.0-41-amd64 my Atheros QCA986x/988x did not work.
- From: Tito Ragusa <tauromenion@gmail.com>
- Date: Fri, 14 Nov 2025 15:31:41 +0100
- Message-id: <176313070097.4911.8536483595401683891.reportbug@devuan-router>
Package: linux-image-6.1.0-41-amd64 Severity: important Dear Maintainer, * What led up to the situation? Installing linux-image-6.1.0-41-amd64 * What exactly did you do (or not do) that was effective (or ineffective)? Installing linux-image-6.1.0-41-amd64 and reeboting broke my wifi * What was the outcome of this action? After updating to this kernel image linux-image-6.1.0-41-amd64 my wifi cards disappeared and my two hostapd instances (2,4GHz and 5GHz) of my router and access point did not start. * What outcome did you expect instead? that the wifi cards and hostapd instances work as with previous kernel linux-image-6.1.0-40-amd64. After checking the latest commits to drivers/net/wireless of kernel.org and cherrypicking and applying to my 6.1.158 kernel source (same version as for linux-image-6.1.0-41-amd64) I was able to build a kernel that worked again. The commit is: >From 2469bb6a6af944755a7d7daf66be90f3b8decbf9 Mon Sep 17 00:00:00 2001 From: Baochen Qiang <baochen.qiang@oss.qualcomm.com> Date: Mon, 27 Oct 2025 09:49:12 +0800 Subject: Revert "wifi: ath10k: avoid unnecessary wait for service ready message" This reverts commit 51a73f1b2e56b0324b4a3bb8cebc4221b5be4c7a. Although this commit benefits QCA6174, it breaks QCA988x and QCA9984 [1][2]. Since it is not likely to root cause/fix this issue in a short time, revert it to get those chips back. Compile tested only. -- System Information: Debian Release: 12.11 merged-usr: no Architecture: amd64 (x86_64) Kernel: Linux 6.1.158-custom (SMP w/4 CPU threads; PREEMPT) Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) (ignored: LC_ALL set to en_US.UTF-8), LANGUAGE=en_US:en Shell: /bin/sh linked to /bin/dash Init: sysvinit (via /sbin/init)>From 2469bb6a6af944755a7d7daf66be90f3b8decbf9 Mon Sep 17 00:00:00 2001 From: Baochen Qiang <baochen.qiang@oss.qualcomm.com> Date: Mon, 27 Oct 2025 09:49:12 +0800 Subject: Revert "wifi: ath10k: avoid unnecessary wait for service ready message" This reverts commit 51a73f1b2e56b0324b4a3bb8cebc4221b5be4c7a. Although this commit benefits QCA6174, it breaks QCA988x and QCA9984 [1][2]. Since it is not likely to root cause/fix this issue in a short time, revert it to get those chips back. Compile tested only. Fixes: 51a73f1b2e56 ("wifi: ath10k: avoid unnecessary wait for service ready message") Link: https://lore.kernel.org/ath10k/6d41bc00602c33ffbf68781f563ff2e6c6915a3e.camel@gmail.com # [1] Closes: https://bugzilla.kernel.org/show_bug.cgi?id=220671 # [2] Signed-off-by: Baochen Qiang <baochen.qiang@oss.qualcomm.com> Reviewed-by: Vasanthakumar Thiagarajan <vasanthakumar.thiagarajan@oss.qualcomm.com> Cc: stable@vger.kernel.org Link: https://patch.msgid.link/20251027-ath10k-revert-polling-first-change-v1-1-89aaf3bcbfa1@oss.qualcomm.com Signed-off-by: Jeff Johnson <jeff.johnson@oss.qualcomm.com> --- drivers/net/wireless/ath/ath10k/wmi.c | 39 ++++++++++++++++++----------------- 1 file changed, 20 insertions(+), 19 deletions(-) (limited to 'drivers/net/wireless') diff --git a/drivers/net/wireless/ath/ath10k/wmi.c b/drivers/net/wireless/ath/ath10k/wmi.c index b3b00d324075bd..b4aad6604d6d9d 100644 --- a/drivers/net/wireless/ath/ath10k/wmi.c +++ b/drivers/net/wireless/ath/ath10k/wmi.c @@ -1764,32 +1764,33 @@ void ath10k_wmi_put_wmi_channel(struct ath10k *ar, struct wmi_channel *ch, int ath10k_wmi_wait_for_service_ready(struct ath10k *ar) { - unsigned long timeout = jiffies + WMI_SERVICE_READY_TIMEOUT_HZ; unsigned long time_left, i; - /* Sometimes the PCI HIF doesn't receive interrupt - * for the service ready message even if the buffer - * was completed. PCIe sniffer shows that it's - * because the corresponding CE ring doesn't fires - * it. Workaround here by polling CE rings. Since - * the message could arrive at any time, continue - * polling until timeout. - */ - do { + time_left = wait_for_completion_timeout(&ar->wmi.service_ready, + WMI_SERVICE_READY_TIMEOUT_HZ); + if (!time_left) { + /* Sometimes the PCI HIF doesn't receive interrupt + * for the service ready message even if the buffer + * was completed. PCIe sniffer shows that it's + * because the corresponding CE ring doesn't fires + * it. Workaround here by polling CE rings once. + */ + ath10k_warn(ar, "failed to receive service ready completion, polling..\n"); + for (i = 0; i < CE_COUNT; i++) ath10k_hif_send_complete_check(ar, i, 1); - /* The 100 ms granularity is a tradeoff considering scheduler - * overhead and response latency - */ time_left = wait_for_completion_timeout(&ar->wmi.service_ready, - msecs_to_jiffies(100)); - if (time_left) - return 0; - } while (time_before(jiffies, timeout)); + WMI_SERVICE_READY_TIMEOUT_HZ); + if (!time_left) { + ath10k_warn(ar, "polling timed out\n"); + return -ETIMEDOUT; + } + + ath10k_warn(ar, "service ready completion received, continuing normally\n"); + } - ath10k_warn(ar, "failed to receive service ready completion\n"); - return -ETIMEDOUT; + return 0; } int ath10k_wmi_wait_for_unified_ready(struct ath10k *ar) -- cgit 1.2.3-korg
--- End Message ---
--- Begin Message ---
- To: 1120680-close@bugs.debian.org
- Subject: Bug#1120680: fixed in linux 6.18~rc5-1~exp1
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Fri, 14 Nov 2025 22:31:05 +0000
- Message-id: <E1vK2Jt-00EErg-2K@fasolo.debian.org>
- Reply-to: Salvatore Bonaccorso <carnil@debian.org>
Source: linux Source-Version: 6.18~rc5-1~exp1 Done: Salvatore Bonaccorso <carnil@debian.org> We believe that the bug you reported is fixed in the latest version of linux, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 1120680@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Salvatore Bonaccorso <carnil@debian.org> (supplier of updated linux package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmaster@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Fri, 14 Nov 2025 23:04:50 +0100 Source: linux Architecture: source Version: 6.18~rc5-1~exp1 Distribution: experimental Urgency: medium Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org> Changed-By: Salvatore Bonaccorso <carnil@debian.org> Closes: 1119810 1120372 1120673 1120680 Changes: linux (6.18~rc5-1~exp1) experimental; urgency=medium . * New upstream release candidate. - Revert "wifi: ath10k: avoid unnecessary wait for service ready message" (Closes: #1120680) - drm/amdgpu: Fix wait after reset sequence in S3 (Closes: #1120372) . [ Uwe Kleine-König ] * [armhf] Enable LEDS_TURRIS_OMNIA as a module for Turris Omnia LED support. . [ Bastian Blank ] * Fix version in filenames of linux-config and linux-source packages. * Enable TCP_AO. . [ Salvatore Bonaccorso ] * [amd64] drivers/hid/intel-thc-hid: Enable INTEL_THC_HID, INTEL_QUICKSPI and INTEL_QUICKI2C as modules (Closes: #1119810) * [arm64] drivers/net/ethernet/renesas: Enable RAVB as module (Closes: #1120673) Checksums-Sha1: f1549cae24f7c204352b06f12938c1597cadfc8d 124308 linux_6.18~rc5-1~exp1.dsc 710b450a0102a93196e066e2e277b37d9faa1d97 157341984 linux_6.18~rc5.orig.tar.xz 046dfed131a8769d4de8e48223d818955f3ed79c 1440460 linux_6.18~rc5-1~exp1.debian.tar.xz 1d72c551005138473334c9d6fb16e7cd0d6c4695 6794 linux_6.18~rc5-1~exp1_source.buildinfo Checksums-Sha256: 69c8b1bc8c14fb8ef9f6cb36817f699c408ec575e5e88487d3318e6da2dbead7 124308 linux_6.18~rc5-1~exp1.dsc aebd5ab073f52d1b8ba7f74cdd8fe123e6bdd086730aa2b03944491dda28839b 157341984 linux_6.18~rc5.orig.tar.xz d15a4066fd5a0ae3e40283663d7be9132f22f2b37c3bf655861e731902922f56 1440460 linux_6.18~rc5-1~exp1.debian.tar.xz 4c7274223e04e79cb80de95799e465f0a8bda47bae8d0d71b44063cd625dadd9 6794 linux_6.18~rc5-1~exp1_source.buildinfo Files: 3d4b93fc70595652bca2b7ae0b4a8b21 124308 kernel optional linux_6.18~rc5-1~exp1.dsc 24684afc044a1a27122ece874a7ee8fd 157341984 kernel optional linux_6.18~rc5.orig.tar.xz aff334bd8a2342b3c92e51e33d1e97d4 1440460 kernel optional linux_6.18~rc5-1~exp1.debian.tar.xz 408fe7004c9db78ddbde17707e609d0a 6794 kernel optional linux_6.18~rc5-1~exp1_source.buildinfo -----BEGIN PGP SIGNATURE----- iQKmBAEBCgCQFiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmkXqAdfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQSHGNhcm5pbEBk ZWJpYW4ub3JnAAoJEAVMuPMTQ89ECEEP/iF9ySXGBCoGW0ZBefq7ywtBXVEPlZtd mdLFj7A/Q87hhodYLX+/BtF8JrLwElv+a9BlFP61ePxb6j78I1J/vcKVDZmasfId t5OaAaKJ+yirX3enZkTdRrDHHj3g/vweuSpCUux8E4sBsolvMCUMEX2KhQ8yPSx8 J365gPbZd7U31UqpEE8OB+oEIRSoh6ifMamSKBonCxm8xXRA78Cnyh251r+5z6QY rit5Pz3GfoSWLKNtzlS8bLs6wcjhG3L+NQ89ifOPsphWjfKehSXihevFAmXr0W6h JXr2Y6euQ52K3GVR3PtqrQSWuiBWtASdeT4rpv7dvGr/86yXKZ4XtIJ+Aet79oWi WYGkPG5DD0fpWnvhND2tPUJWeAIgeJfvJx3unPjSDDqiMyiB/06iT6bTwCMCDzSV JB5ZtTPnGhFlxZnCONGIinYocgJtW8wXApmNZT+cNZdMSNzXeit7uwtb2isnV8DP vfg3m1Mff+hh6IKfStG0zdvB0REvnSus1L3CgD8R+0koK3l2LXvBBqo7ne1Tbmhu Lq6W30YSBZHwN56Petqv/2ZJCn9dcI9fVkjcc5aJy/XKNHIqICjIjXXZtk5Ad7YL 8qGOz4TDjbBjNW3BF8NFJH9Q+GaK5sonBqPHlTFlU7svx5eXqPbKGW34+coOcBV1 Hgj3PPW5WgxC =JGVO -----END PGP SIGNATURE-----Attachment: pgpaOOwsT3muV.pgp
Description: PGP signature
--- End Message ---