[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Bug 1051022 - ideapad_wlan: wifi hardware blocked
Summary: ideapad_wlan: wifi hardware blocked
Status: RESOLVED FIXED
: 1051021 (view as bug list)
Alias: None
Product: openSUSE Tumbleweed
Classification: openSUSE
Component: Network (show other bugs)
Version: Current
Hardware: x86-64 Other
: P5 - None : Normal (vote)
Target Milestone: ---
Assignee: Takashi Iwai
QA Contact: E-mail List
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2017-07-27 16:11 UTC by Matwey Kornilov
Modified: 2019-08-15 13:25 UTC (History)
2 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments
dmesg (56.29 KB, text/plain)
2017-07-27 16:11 UTC, Matwey Kornilov
Details
hwinfo (1.43 MB, text/plain)
2017-07-27 16:11 UTC, Matwey Kornilov
Details

Note You need to log in before you can comment on or make changes to this bug.
Description Matwey Kornilov 2017-07-27 16:11:04 UTC
Hello,

I am running Tumblewheed at Lenovo V510.
kernel is 4.11.8-2-default

I see that wifi is always hardware blocked (there is no any special key at the keyboard to activate/deactivate wifi)

# rfkill  list
0: phy0: Wireless LAN
        Soft blocked: no
        Hard blocked: no
1: ideapad_wlan: Wireless LAN
        Soft blocked: no
        Hard blocked: yes
2: ideapad_bluetooth: Bluetooth
        Soft blocked: yes
        Hard blocked: yes
3: hci0: Bluetooth
        Soft blocked: yes
        Hard blocked: no

NetworkManager refuses performing WiFi network scanning.

# nmcli device wifi rescan
Error: Scanning not allowed while unavailable or activating.

# nmcli device
DEVICE  TYPE      STATE        CONNECTION         
enp2s0  ethernet  connected    Wired connection 1 
wlp3s0  wifi      unavailable  --                 
lo      loopback  unmanaged    --

# nmcli  radio
WIFI-HW  WIFI      WWAN-HW  WWAN    
enabled  disabled  enabled  enabled

# nmcli  radio all on
# nmcli  radio 
WIFI-HW  WIFI      WWAN-HW  WWAN    
enabled  disabled  enabled  enabled


How could I enable wifi?
Comment 1 Matwey Kornilov 2017-07-27 16:11:26 UTC
Created attachment 734189 [details]
dmesg
Comment 2 Matwey Kornilov 2017-07-27 16:11:55 UTC
Created attachment 734190 [details]
hwinfo
Comment 3 Matwey Kornilov 2017-07-27 16:17:53 UTC
# modprobe  -r ideapad_laptop 

helps me as a workaround

# rfkill list
0: phy0: Wireless LAN
        Soft blocked: no
        Hard blocked: no
3: hci0: Bluetooth
        Soft blocked: yes
        Hard blocked: no
# nmcli radio 
WIFI-HW  WIFI     WWAN-HW  WWAN    
enabled  enabled  enabled  enabled 
# nmcli device 
DEVICE  TYPE      STATE        CONNECTION 
wlp3s0  wifi      connected    fJ0cYgA    
enp2s0  ethernet  unavailable  --         
lo      loopback  unmanaged    --
Comment 4 Matwey Kornilov 2017-07-27 18:02:02 UTC
*** Bug 1051021 has been marked as a duplicate of this bug. ***
Comment 5 Matwey Kornilov 2017-07-27 19:14:17 UTC
The same issue is valid for openSUSE 42.3 (4.4.76-1-default)
Comment 6 Takashi Iwai 2017-07-28 07:09:35 UTC
Good to see you already tried to remove that module, which I wanted to suggest, too.

Could you check 4.12 and 4.13-rc kernels in OBS Kernel:stable and Kernel:HEAD whether they still show the same behavior?  If yes, we'd need to report to upstream.
Comment 7 Matwey Kornilov 2017-07-28 09:47:51 UTC
https://github.com/torvalds/linux/commit/0df4b805cbccbe3f8378f49c415adb2fcffdd3dc

I will try 4.13-rc.
Comment 8 Matwey Kornilov 2017-07-28 10:08:32 UTC
I see lots of similar commits. All this models should suffer the same issue as me:

710c059c248a24609051f5a3dd1d8468cdc675b0 platform/x86: ideapad-laptop: Add several models to no_hw_rfkill
0df4b805cbccbe3f8378f49c415adb2fcffdd3dc platform/x86: ideapad-laptop: Add IdeaPad V510-15IKB to no_hw_rfkill
b2f2fe205c3b9b595dc50ee431230a45d03f9c2c platform/x86: ideapad-laptop: Add Y720-15IKBN to no_hw_rfkill
5d9f40b56630a8702b5f7a61a770f9b73aa07464 platform/x86: ideapad-laptop: Add Y520-15IKBN to no_hw_rfkill
3d59dfcd1f2610d26da2cf19646ace6692c521dc platform/x86: ideapad-laptop: constify rfkill_ops structure
ccc7179f4d9467947c94f4302d61cd5143842fcd platform/x86: ideapad-laptop: Add IdeaPad V310-15ISK to no_hw_rfkill
1f3bc53d843f92d6e7e7cf56ee79acec918e6421 platform/x86: ideapad-laptop: Add IdeaPad 310-15IKB to no_hw_rfkill
e297046875f2c5a43684f54f0fd098249b4f293a platform/x86: ideapad-laptop: Add Y700 15-ACZ to no_hw_rfkill DMI list
40c30bbf3377babc4d6bb16b699184236a8bfa27 platform/x86: ideapad-laptop: Add Lenovo Yoga 910-13IKB to no_hw_rfkill dmi list
4db9675d927a71faa66e5ab128d2390d6329750b ideapad-laptop: Add ideapad Y700 (15) to the no_hw_rfkill DMI list
6b31de3e698582fe0b8f7f4bab15831b73204800 ideapad-laptop: Add Lenovo Yoga 700 to no_hw_rfkill dmi list
edde316acb5f07c04abf09a92f59db5d2efd14e2 ideapad-laptop: Add Lenovo ideapad Y700-17ISK to no_hw_rfkill dmi list
Comment 9 Matwey Kornilov 2017-07-28 10:45:37 UTC
kernel-default-4.13.rc2-1.1.gb545b87.x86_64.rpm works fine.

Could we pick this commits to 42.3 kernel?
Comment 10 Takashi Iwai 2017-07-28 11:01:48 UTC
Sure, I'll fix it.  Maybe worth to check other commits you pointed out, too.
Comment 11 Matwey Kornilov 2017-07-28 11:03:11 UTC
I don't have the all hardware that refereed by the commits, only V510.
Comment 12 Takashi Iwai 2017-07-28 12:42:32 UTC
All patches are just adding the quirk entries, so it should be safe to apply as long as applicable.  Now they are merged.  Please check KOTD of tomorrow later.

Thanks for the report and the quick followup!
Comment 13 Swamp Workflow Management 2017-08-09 13:18:46 UTC
openSUSE-SU-2017:2110-1: An update that solves 5 vulnerabilities and has 61 fixes is now available.

Category: security (important)
Bug References: 1006180,1011913,1012829,1013887,1022476,1028173,1028286,1029693,1030552,1031515,1031717,1033587,1034075,1034762,1036303,1036632,1037344,1038078,1038616,1039915,1040307,1040351,1041958,1042286,1042314,1042422,1042778,1043652,1044112,1044636,1045154,1045563,1045922,1046682,1046985,1047048,1047096,1047118,1047121,1047152,1047277,1047343,1047354,1047651,1047653,1047670,1048155,1048221,1048317,1048891,1048914,1049483,1049486,1049603,1049645,1049882,1050061,1050188,1051022,1051059,1051239,1051478,1051479,1051663,964063,974215
CVE References: CVE-2017-10810,CVE-2017-11473,CVE-2017-7533,CVE-2017-7541,CVE-2017-7542
Sources used:
openSUSE Leap 42.2 (src):    kernel-debug-4.4.79-18.23.1, kernel-default-4.4.79-18.23.1, kernel-docs-4.4.79-18.23.2, kernel-obs-build-4.4.79-18.23.1, kernel-obs-qa-4.4.79-18.23.1, kernel-source-4.4.79-18.23.1, kernel-syms-4.4.79-18.23.1, kernel-vanilla-4.4.79-18.23.1
Comment 14 Swamp Workflow Management 2017-08-09 13:30:48 UTC
openSUSE-SU-2017:2112-1: An update that solves four vulnerabilities and has 61 fixes is now available.

Category: security (important)
Bug References: 1005778,1011913,1012829,1013887,1016119,1019695,1022476,1022600,1022604,1028286,1030552,1031717,1033587,1036215,1036632,1037838,1039153,1040347,1042257,1042286,1042422,1043598,1044443,1044623,1045404,1045563,1045922,1046651,1046682,1047121,1048146,1048155,1048348,1048421,1048451,1048501,1048891,1048912,1048914,1048916,1048919,1049231,1049289,1049361,1049483,1049486,1049603,1049619,1049645,1049706,1049882,1050061,1050188,1050320,1050322,1051022,1051048,1051059,1051239,1051471,1051478,1051479,1051663,964063,974215
CVE References: CVE-2017-11473,CVE-2017-7533,CVE-2017-7541,CVE-2017-7542
Sources used:
openSUSE Leap 42.3 (src):    kernel-debug-4.4.79-4.2, kernel-default-4.4.79-4.2, kernel-docs-4.4.79-4.2, kernel-obs-build-4.4.79-4.2, kernel-obs-qa-4.4.79-4.2, kernel-source-4.4.79-4.2, kernel-syms-4.4.79-4.2, kernel-vanilla-4.4.79-4.2
Comment 15 Swamp Workflow Management 2017-08-29 16:33:32 UTC
SUSE-SU-2017:2286-1: An update that solves 8 vulnerabilities and has 150 fixes is now available.

Category: security (important)
Bug References: 1005778,1006180,1011913,1012829,1013887,1015337,1015342,1016119,1019151,1019695,1020645,1022476,1022600,1022604,1023175,1024346,1024373,1025461,1026570,1028173,1028286,1029693,1030552,1031515,1031717,1031784,1033587,1034075,1034113,1034762,1036215,1036632,1037344,1037404,1037838,1037994,1038078,1038616,1038792,1039153,1039348,1039915,1040307,1040347,1040351,1041958,1042257,1042286,1042314,1042422,1042778,1043261,1043347,1043520,1043598,1043652,1043805,1043912,1044112,1044443,1044623,1044636,1045154,1045293,1045330,1045404,1045563,1045596,1045709,1045715,1045866,1045922,1045937,1046105,1046170,1046434,1046651,1046655,1046682,1046821,1046985,1047027,1047048,1047096,1047118,1047121,1047152,1047174,1047277,1047343,1047354,1047418,1047506,1047595,1047651,1047653,1047670,1047802,1048146,1048155,1048221,1048317,1048348,1048356,1048421,1048451,1048501,1048891,1048912,1048914,1048916,1048919,1049231,1049289,1049298,1049361,1049483,1049486,1049603,1049619,1049645,1049706,1049882,1050061,1050188,1050211,1050320,1050322,1050677,1051022,1051048,1051059,1051239,1051399,1051471,1051478,1051479,1051556,1051663,1051689,1051979,1052049,1052223,1052311,1052325,1052365,1052442,1052533,1052709,1052773,1052794,1052899,1052925,1053043,1053117,964063,974215,998664
CVE References: CVE-2017-1000111,CVE-2017-1000112,CVE-2017-10810,CVE-2017-11473,CVE-2017-7533,CVE-2017-7541,CVE-2017-7542,CVE-2017-8831
Sources used:
SUSE Linux Enterprise Workstation Extension 12-SP3 (src):    kernel-default-4.4.82-6.3.1
SUSE Linux Enterprise Software Development Kit 12-SP3 (src):    kernel-docs-4.4.82-6.3.5, kernel-obs-build-4.4.82-6.3.3
SUSE Linux Enterprise Server 12-SP3 (src):    kernel-default-4.4.82-6.3.1, kernel-source-4.4.82-6.3.1, kernel-syms-4.4.82-6.3.1
SUSE Linux Enterprise Live Patching 12-SP3 (src):    kgraft-patch-SLE12-SP3_Update_1-1-2.1
SUSE Linux Enterprise High Availability 12-SP3 (src):    kernel-default-4.4.82-6.3.1
SUSE Linux Enterprise Desktop 12-SP3 (src):    kernel-default-4.4.82-6.3.1, kernel-source-4.4.82-6.3.1, kernel-syms-4.4.82-6.3.1
Comment 16 Swamp Workflow Management 2017-10-27 16:44:45 UTC
SUSE-SU-2017:2869-1: An update that solves 16 vulnerabilities and has 120 fixes is now available.

Category: security (important)
Bug References: 1006180,1011913,1012382,1012829,1013887,1019151,1020645,1020657,1021424,1022476,1022743,1022967,1023175,1024405,1028173,1028286,1029693,1030552,1030850,1031515,1031717,1031784,1033587,1034048,1034075,1034762,1036303,1036632,1037344,1037404,1037994,1038078,1038583,1038616,1038792,1039915,1040307,1040351,1041958,1042286,1042314,1042422,1042778,1043652,1044112,1044636,1045154,1045563,1045922,1046682,1046821,1046985,1047027,1047048,1047096,1047118,1047121,1047152,1047277,1047343,1047354,1047487,1047651,1047653,1047670,1048155,1048221,1048317,1048891,1048893,1048914,1048934,1049226,1049483,1049486,1049580,1049603,1049645,1049882,1050061,1050188,1051022,1051059,1051239,1051399,1051478,1051479,1051556,1051663,1051790,1052049,1052223,1052533,1052580,1052593,1052709,1052773,1052794,1052888,1053117,1053802,1053915,1053919,1054084,1055013,1055096,1055359,1055493,1055755,1055896,1056261,1056588,1056827,1056982,1057015,1058038,1058116,1058410,1058507,1059051,1059465,1060197,1061017,1061046,1061064,1061067,1061172,1061831,1061872,1063667,1064206,1064388,964063,971975,974215,981309
CVE References: CVE-2017-1000252,CVE-2017-10810,CVE-2017-11472,CVE-2017-11473,CVE-2017-12134,CVE-2017-12153,CVE-2017-12154,CVE-2017-13080,CVE-2017-14051,CVE-2017-14106,CVE-2017-14489,CVE-2017-15649,CVE-2017-7518,CVE-2017-7541,CVE-2017-7542,CVE-2017-8831
Sources used:
SUSE Linux Enterprise Workstation Extension 12-SP2 (src):    kernel-default-4.4.90-92.45.1
SUSE Linux Enterprise Software Development Kit 12-SP2 (src):    kernel-docs-4.4.90-92.45.3, kernel-obs-build-4.4.90-92.45.1
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (src):    kernel-default-4.4.90-92.45.1, kernel-source-4.4.90-92.45.1, kernel-syms-4.4.90-92.45.1
SUSE Linux Enterprise Server 12-SP2 (src):    kernel-default-4.4.90-92.45.1, kernel-source-4.4.90-92.45.1, kernel-syms-4.4.90-92.45.1
SUSE Linux Enterprise Live Patching 12 (src):    kgraft-patch-SLE12-SP2_Update_14-1-2.4
SUSE Linux Enterprise High Availability 12-SP2 (src):    kernel-default-4.4.90-92.45.1
SUSE Linux Enterprise Desktop 12-SP2 (src):    kernel-default-4.4.90-92.45.1, kernel-source-4.4.90-92.45.1, kernel-syms-4.4.90-92.45.1
SUSE Container as a Service Platform ALL (src):    kernel-default-4.4.90-92.45.1
OpenStack Cloud Magnum Orchestration 7 (src):    kernel-default-4.4.90-92.45.1
Comment 17 Swamp Workflow Management 2017-11-08 20:22:55 UTC
SUSE-SU-2017:2956-1: An update that solves 17 vulnerabilities and has 113 fixes is now available.

Category: security (important)
Bug References: 1005917,1006180,1011913,1012382,1012829,1013887,1018419,1019151,1020645,1020657,1020685,1021424,1022476,1022743,1023175,1024405,1028173,1028286,1028819,1029693,1030552,1030850,1031515,1031717,1031784,1033587,1034048,1034075,1034762,1036303,1036632,1037344,1037404,1037994,1038078,1038583,1038616,1038792,1038846,1038847,1039354,1039915,1040307,1040351,1041958,1042286,1042314,1042422,1042778,1043652,1044112,1044636,1045154,1045563,1045922,1046682,1046821,1046985,1047027,1047048,1047096,1047118,1047121,1047152,1047277,1047343,1047354,1047487,1047651,1047653,1047670,1048155,1048221,1048317,1048891,1048893,1048914,1048934,1049226,1049483,1049486,1049580,1049603,1049645,1049882,1050061,1050188,1051022,1051059,1051239,1051399,1051478,1051479,1051556,1051663,1051790,1052049,1052223,1052311,1052365,1052533,1052580,1052709,1052773,1052794,1052888,1053117,1053802,1053915,1054084,1055013,1055096,1055359,1056261,1056588,1056827,1056982,1057015,1057389,1058038,1058116,1058507,963619,964063,964944,971975,974215,981309,988784,993890
CVE References: CVE-2017-1000111,CVE-2017-1000112,CVE-2017-1000251,CVE-2017-1000252,CVE-2017-1000365,CVE-2017-10810,CVE-2017-11472,CVE-2017-11473,CVE-2017-12134,CVE-2017-12154,CVE-2017-14051,CVE-2017-14106,CVE-2017-7518,CVE-2017-7533,CVE-2017-7541,CVE-2017-7542,CVE-2017-8831
Sources used:
SUSE Linux Enterprise Real Time Extension 12-SP2 (src):    kernel-rt-4.4.88-18.1, kernel-rt_debug-4.4.88-18.1, kernel-source-rt-4.4.88-18.1, kernel-syms-rt-4.4.88-18.1