|
Bugzilla – Full Text Bug Listing |
| Summary: | no wifi with driver bcma | ||
|---|---|---|---|
| Product: | [openSUSE] openSUSE Distribution | Reporter: | Forgotten User smSg-kvMAX <forgotten_smSg-kvMAX> |
| Component: | Kernel | Assignee: | Daniel Molkentin <daniel> |
| Status: | RESOLVED FIXED | QA Contact: | E-mail List <qa-bugs> |
| Severity: | Major | ||
| Priority: | P2 - High | CC: | chrubis, forgotten_1E_3TqTk4v, forgotten_smSg-kvMAX, freek, hkottmann, tiwai |
| Version: | Leap 42.3 | ||
| Target Milestone: | --- | ||
| Hardware: | 64bit | ||
| OS: | openSUSE 42.3 | ||
| Whiteboard: | |||
| Found By: | --- | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
| Attachments: |
hwinfo
full dmesg zypper log messages anterior lsinitrd dracut output 50-omit-b43-ssb-ssb_hcd.conf |
||
|
Description
Forgotten User smSg-kvMAX
2017-05-03 07:34:47 UTC
(In reply to gerard raffard from comment #0) > After an update Which update? Which version last confirmed to be working? If you boot the previous kernel, does it still work? > b43 bcma0:1: Direct firmware load for b43/ucode30_mimo.fw failed with error -2 > b43 bcma0:1: Direct firmware load for b43/ucode30_mimo.fw failed with error -2 > b43 bcma0:1: Direct firmware load for b43-open/ucode30_mimo.fw failed with error -2 > b43 bcma0:1: Direct firmware load for b43-open/ucode30_mimo.fw failed with error -2 > b43-phy0 ERROR: Firmware file "b43/ucode30_mimo.fw" not found > b43-phy0 ERROR: Firmware file "b43-open/ucode30_mimo.fw" not found Do you have these? > b43-phy0 ERROR: You must go to > http://wireless.kernel.org/en/users/Drivers/b43#devicefirmware and download > the correct firmware for this driver version. Please carefully read all > instructions on this website. Did you do that? here ls /lib/firmware/b43 :ll /lib/firmware/b43* /lib/firmware/b43: total 1052 -rw-r--r-- 1 root root 178 24 déc. 2014 a0g0bsinitvals5.fw -rw-r--r-- 1 root root 178 24 déc. 2014 a0g0bsinitvals9.fw -rw-r--r-- 1 root root 1836 24 déc. 2014 a0g0initvals5.fw -rw-r--r-- 1 root root 1992 24 déc. 2014 a0g0initvals9.fw -rw-r--r-- 1 root root 178 24 déc. 2014 a0g1bsinitvals13.fw -rw-r--r-- 1 root root 178 24 déc. 2014 a0g1bsinitvals5.fw -rw-r--r-- 1 root root 178 24 déc. 2014 a0g1bsinitvals9.fw -rw-r--r-- 1 root root 2126 24 déc. 2014 a0g1initvals13.fw -rw-r--r-- 1 root root 1836 24 déc. 2014 a0g1initvals5.fw -rw-r--r-- 1 root root 1992 24 déc. 2014 a0g1initvals9.fw -rw-r--r-- 1 root root 178 24 déc. 2014 b0g0bsinitvals13.fw -rw-r--r-- 1 root root 178 24 déc. 2014 b0g0bsinitvals5.fw -rw-r--r-- 1 root root 178 24 déc. 2014 b0g0bsinitvals9.fw -rw-r--r-- 1 root root 2126 24 déc. 2014 b0g0initvals13.fw -rw-r--r-- 1 root root 1836 24 déc. 2014 b0g0initvals5.fw -rw-r--r-- 1 root root 1992 24 déc. 2014 b0g0initvals9.fw -rw-r--r-- 1 root root 178 24 déc. 2014 ht0bsinitvals26.fw -rw-r--r-- 1 root root 178 24 déc. 2014 ht0bsinitvals29.fw -rw-r--r-- 1 root root 2678 24 déc. 2014 ht0initvals26.fw -rw-r--r-- 1 root root 2720 24 déc. 2014 ht0initvals29.fw -rw-r--r-- 1 root root 178 24 déc. 2014 lcn0bsinitvals24.fw -rw-r--r-- 1 root root 178 24 déc. 2014 lcn0bsinitvals25.fw -rw-r--r-- 1 root root 178 24 déc. 2014 lcn0bsinitvals26.fw -rw-r--r-- 1 root root 2976 24 déc. 2014 lcn0initvals24.fw -rw-r--r-- 1 root root 2958 24 déc. 2014 lcn0initvals25.fw -rw-r--r-- 1 root root 2678 24 déc. 2014 lcn0initvals26.fw -rw-r--r-- 1 root root 178 24 déc. 2014 lcn1bsinitvals24.fw -rw-r--r-- 1 root root 178 24 déc. 2014 lcn1bsinitvals25.fw -rw-r--r-- 1 root root 178 24 déc. 2014 lcn1bsinitvals26.fw -rw-r--r-- 1 root root 2976 24 déc. 2014 lcn1initvals24.fw -rw-r--r-- 1 root root 2958 24 déc. 2014 lcn1initvals25.fw -rw-r--r-- 1 root root 2678 24 déc. 2014 lcn1initvals26.fw -rw-r--r-- 1 root root 178 24 déc. 2014 lcn2bsinitvals24.fw -rw-r--r-- 1 root root 178 24 déc. 2014 lcn2bsinitvals25.fw -rw-r--r-- 1 root root 178 24 déc. 2014 lcn2bsinitvals26.fw -rw-r--r-- 1 root root 2976 24 déc. 2014 lcn2initvals24.fw -rw-r--r-- 1 root root 2958 24 déc. 2014 lcn2initvals25.fw -rw-r--r-- 1 root root 2678 24 déc. 2014 lcn2initvals26.fw -rw-r--r-- 1 root root 8 24 déc. 2014 lcn400bsinitvals33.fw -rw-r--r-- 1 root root 8 24 déc. 2014 lcn400initvals33.fw -rw-r--r-- 1 root root 178 24 déc. 2014 lp0bsinitvals13.fw -rw-r--r-- 1 root root 8 24 déc. 2014 lp0bsinitvals14.fw -rw-r--r-- 1 root root 178 24 déc. 2014 lp0bsinitvals15.fw -rw-r--r-- 1 root root 178 24 déc. 2014 lp0bsinitvals16.fw -rw-r--r-- 1 root root 3664 24 déc. 2014 lp0initvals13.fw -rw-r--r-- 1 root root 8 24 déc. 2014 lp0initvals14.fw -rw-r--r-- 1 root root 2598 24 déc. 2014 lp0initvals15.fw -rw-r--r-- 1 root root 2738 24 déc. 2014 lp0initvals16.fw -rw-r--r-- 1 root root 8 24 déc. 2014 lp1bsinitvals20.fw -rw-r--r-- 1 root root 8 24 déc. 2014 lp1bsinitvals22.fw -rw-r--r-- 1 root root 8 24 déc. 2014 lp1initvals20.fw -rw-r--r-- 1 root root 8 24 déc. 2014 lp1initvals22.fw -rw-r--r-- 1 root root 8 24 déc. 2014 lp2bsinitvals19.fw -rw-r--r-- 1 root root 8 24 déc. 2014 lp2initvals19.fw -rw-r--r-- 1 root root 178 24 déc. 2014 n0absinitvals11.fw -rw-r--r-- 1 root root 178 24 déc. 2014 n0bsinitvals11.fw -rw-r--r-- 1 root root 178 24 déc. 2014 n0bsinitvals16.fw -rw-r--r-- 1 root root 178 24 déc. 2014 n0bsinitvals17.fw -rw-r--r-- 1 root root 8 24 déc. 2014 n0bsinitvals22.fw -rw-r--r-- 1 root root 178 24 déc. 2014 n0bsinitvals24.fw -rw-r--r-- 1 root root 178 24 déc. 2014 n0bsinitvals25.fw -rw-r--r-- 1 root root 2152 24 déc. 2014 n0initvals11.fw -rw-r--r-- 1 root root 2738 24 déc. 2014 n0initvals16.fw -rw-r--r-- 1 root root 2408 24 déc. 2014 n0initvals17.fw -rw-r--r-- 1 root root 8 24 déc. 2014 n0initvals22.fw -rw-r--r-- 1 root root 2976 24 déc. 2014 n0initvals24.fw -rw-r--r-- 1 root root 2958 24 déc. 2014 n0initvals25.fw -rw-r--r-- 1 root root 178 24 déc. 2014 n16bsinitvals30.fw -rw-r--r-- 1 root root 2634 24 déc. 2014 n16initvals30.fw -rw-r--r-- 1 root root 8 24 déc. 2014 n18bsinitvals32.fw -rw-r--r-- 1 root root 8 24 déc. 2014 n18initvals32.fw -rw-r--r-- 1 root root 8 24 déc. 2014 n1bsinitvals20.fw -rw-r--r-- 1 root root 8 24 déc. 2014 n1initvals20.fw -rw-r--r-- 1 root root 8 24 déc. 2014 n2bsinitvals19.fw -rw-r--r-- 1 root root 8 24 déc. 2014 n2initvals19.fw -rw-r--r-- 1 root root 1320 24 déc. 2014 pcm5.fw -rw-r--r-- 1 root root 178 24 déc. 2014 sslpn0bsinitvals16.fw -rw-r--r-- 1 root root 2738 24 déc. 2014 sslpn0initvals16.fw -rw-r--r-- 1 root root 8 24 déc. 2014 sslpn1bsinitvals20.fw -rw-r--r-- 1 root root 8 24 déc. 2014 sslpn1bsinitvals27.fw -rw-r--r-- 1 root root 8 24 déc. 2014 sslpn1initvals20.fw -rw-r--r-- 1 root root 8 24 déc. 2014 sslpn1initvals27.fw -rw-r--r-- 1 root root 8 24 déc. 2014 sslpn2bsinitvals19.fw -rw-r--r-- 1 root root 8 24 déc. 2014 sslpn2initvals19.fw -rw-r--r-- 1 root root 178 24 déc. 2014 sslpn3bsinitvals21.fw -rw-r--r-- 1 root root 2552 24 déc. 2014 sslpn3initvals21.fw -rw-r--r-- 1 root root 8 24 déc. 2014 sslpn4bsinitvals22.fw -rw-r--r-- 1 root root 8 24 déc. 2014 sslpn4initvals22.fw -rw-r--r-- 1 root root 31176 24 déc. 2014 ucode11.fw -rw-r--r-- 1 root root 28216 24 déc. 2014 ucode13.fw -rw-r--r-- 1 root root 12 24 déc. 2014 ucode14.fw -rw-r--r-- 1 root root 35512 24 déc. 2014 ucode15.fw -rw-r--r-- 1 root root 33712 24 déc. 2014 ucode16_lp.fw -rw-r--r-- 1 root root 39296 24 déc. 2014 ucode16_mimo.fw -rw-r--r-- 1 root root 34448 24 déc. 2014 ucode16_sslpn.fw -rw-r--r-- 1 root root 28589 24 déc. 2014 ucode16_sslpn_nobt.fw -rw-r--r-- 1 root root 36216 24 déc. 2014 ucode17_mimo.fw -rw-r--r-- 1 root root 9 24 déc. 2014 ucode19_sslpn.fw -rw-r--r-- 1 root root 9 24 déc. 2014 ucode19_sslpn_nobt.fw -rw-r--r-- 1 root root 9 24 déc. 2014 ucode20_sslpn.fw -rw-r--r-- 1 root root 9 24 déc. 2014 ucode20_sslpn_nobt.fw -rw-r--r-- 1 root root 34735 24 déc. 2014 ucode21_sslpn.fw -rw-r--r-- 1 root root 28988 24 déc. 2014 ucode21_sslpn_nobt.fw -rw-r--r-- 1 root root 12 24 déc. 2014 ucode22_mimo.fw -rw-r--r-- 1 root root 9 24 déc. 2014 ucode22_sslpn.fw -rw-r--r-- 1 root root 35267 24 déc. 2014 ucode24_lcn.fw -rw-r--r-- 1 root root 39760 24 déc. 2014 ucode24_mimo.fw -rw-r--r-- 1 root root 34847 24 déc. 2014 ucode25_lcn.fw -rw-r--r-- 1 root root 39128 24 déc. 2014 ucode25_mimo.fw -rw-r--r-- 1 root root 39728 24 déc. 2014 ucode26_mimo.fw -rw-r--r-- 1 root root 9 24 déc. 2014 ucode27_sslpn.fw -rw-r--r-- 1 root root 39760 24 déc. 2014 ucode29_mimo.fw -rw-r--r-- 1 root root 39632 24 déc. 2014 ucode30_mimo.fw -rw-r--r-- 1 root root 12 24 déc. 2014 ucode32_mimo.fw -rw-r--r-- 1 root root 9 24 déc. 2014 ucode33_lcn40.fw -rw-r--r-- 1 root root 21328 24 déc. 2014 ucode5.fw -rw-r--r-- 1 root root 23256 24 déc. 2014 ucode9.fw /lib/firmware/b43legacy: total 132 -rw-r--r-- 1 root root 18 24 déc. 2014 a0g0bsinitvals2.fw -rw-r--r-- 1 root root 158 24 déc. 2014 a0g0bsinitvals5.fw -rw-r--r-- 1 root root 2520 24 déc. 2014 a0g0initvals2.fw -rw-r--r-- 1 root root 1818 24 déc. 2014 a0g0initvals5.fw -rw-r--r-- 1 root root 158 24 déc. 2014 a0g1bsinitvals5.fw -rw-r--r-- 1 root root 1818 24 déc. 2014 a0g1initvals5.fw -rw-r--r-- 1 root root 18 24 déc. 2014 b0g0bsinitvals2.fw -rw-r--r-- 1 root root 158 24 déc. 2014 b0g0bsinitvals5.fw -rw-r--r-- 1 root root 2520 24 déc. 2014 b0g0initvals2.fw -rw-r--r-- 1 root root 1818 24 déc. 2014 b0g0initvals5.fw -rw-r--r-- 1 root root 1320 24 déc. 2014 pcm4.fw -rw-r--r-- 1 root root 1320 24 déc. 2014 pcm5.fw -rw-r--r-- 1 root root 21680 24 déc. 2014 ucode11.fw -rw-r--r-- 1 root root 16360 24 déc. 2014 ucode2.fw -rw-r--r-- 1 root root 20096 24 déc. 2014 ucode4.fw -rw-r--r-- 1 root root 22280 24 déc. 2014 ucode5.fw hi Andreas Stieger Which update? the normal software updates. Which version last confirmed to be working? all version before If you boot the previous kernel, does it still work? no best regards (In reply to gerard raffard from comment #3) > hi Andreas Stieger > > Which update? the normal software updates. Well, it's still not clear which you're talking about. You've set the version in this report that it's openSUSE Leap 42.3, not in 42.2. Is it correct? If yes, what update did you apply at all...? > Which version last confirmed to be working? all version before Before what? This is the most important part. Please check zypper log and which packages have been updated. > If you boot the previous kernel, does it still work? no It implies that it's no kernel problem. Looking at the log, you're loading b43 module, not brcmfmac. Is this expected and it used to be so? We're willing to help, but your information is way too vague and difficult to analyze. Also, please give the full output of dmesg. Created attachment 723605 [details]
full dmesg
here full dmesg
Created attachment 723606 [details]
zypper log
log of zypper
After the update (zipper.log) I lost the configuration of the wifi module. The module load is "automatic" for me. You must have an old kernel message that has worked in the past in journal. Could you give the output, too? For example, the kernel messages of the 5 times before the current session is found by running as root like: journalctl -k -b-5 Created attachment 723658 [details]
messages anterior
hi Takashi Iwai ,
in the message you can found dmesg
Thanks. The old log shows that it's loading b43, so this should be fine. The difference I can see is that it was loaded much later with the old kernel. Could you check whether b43 module (b43.ko) is found in your initrd? Run lsinitrd. If it's included in initrd, it may explain the firmware load error. By some reason, b43 is now included in initrd without the firmware files. You can try to unload b43 once, and load again: modprobe -r b43 modprobe b43 Thanks. Could you check whether b43 module (b43.ko) is found in your initrd? Run lsinitrd. ----you can list lsinitrdgr------- You can try to unload b43 once, and load again: modprobe -r b43 modprobe b43 ---- after , modprobe -r b43 & modprobe b43 , I can use wifi ------ The problem is solved, but how to modify the initialization sequence to include the modification? thanks (In reply to gerard raffard from comment #12) > Thanks. > > Could you check whether b43 module (b43.ko) is found in your initrd? Run > lsinitrd. > > ----you can list lsinitrdgr------- What do you mean? Run lsinitrd as root, and you'll see the contents of initrd. Do you see b43.ko there? This is the question. Created attachment 723683 [details]
lsinitrd
here lsinitrdgr
in the precedent post the attachment was not present.
you can find b43
thanks
So that's it; b43 module is included in initrd unnecessarily, while the required firmware isn't included. The latter problem is because b43 driver doesn't declare such files via MODULE_FIRMWARE(). I can cook a fix patch. However, the fundamental problem is rather the former. I don't know why b43 sneaked in. It must be either the wrong setup or usage, or a bug in dracut. Daniel, could you help checking this? Gerard, please post the output of "rpm -qi dracut". And are you on 42.2 or 42.3? This question still has not been answered. Do you remember when you last updated so we can determine what the previous version was? Looking through the recent changes, I see no obvious reason for the behavioral change. That said, I agree with Takashi that the b43 driver should describe its FW dependency, as requiring the wireless driver in initrd can be legit in some cases. Daniel , I come back in end of afternoom. I upgrade 42.2 to 42.3 by a change in repos version. the last update was made in 42.3 version. result of rpm -qi dracut Name : dracut Version : 044 Release : 19.4 Architecture: x86_64 Install Date: Tue May 2 16:43:57 2017 Group : System/Base Size : 1140694 License : GPL-2.0+ and LGPL-2.1+ Signature : RSA/SHA256, Tue Apr 25 03:38:47 2017, Key ID b88b2fd43dbdc284 Source RPM : dracut-044-19.4.src.rpm Build Date : Tue Apr 25 03:38:38 2017 Build Host : lamb66 Relocations : (not relocatable) Packager : http://bugs.opensuse.org Vendor : openSUSE URL : https://dracut.wiki.kernel.org/ Summary : Initramfs generator using udev Description : Dracut contains tools to create a bootable initramfs for Linux kernels >= 2.6. Dracut contains various modules which are driven by the event-based udev and systemd. Having root on MD, DM, LVM2, LUKS is supported as well as NFS, iSCSI, NBD, FCoE. Distribution: openSUSE Leap 42.3 Just to be sure: You successfully upgraded to 42.3, and that was successful and the wifi worked. Then you received an update of dracut, and the wifi started to fail? Just to be sure: You successfully upgraded to 42.3, and that was successful and the wifi worked. Then you received an update of dracut, and the wifi started to fail? yes, after good up date to 42.3, all worked. at the last update not only for dracut the wifi started to fail. Ok, some requests to get this debugged further: I have one suspect patch that I removed in the this package: http://download.opensuse.org/repositories/home:/dmolkentin:/dracut:/1037344/openSUSE_Leap_42.2/x86_64/dracut-044-65.1.x86_64.rpm If that doesn't help, please paste the output of "zypper se -t package -s dracut ". hi, no change for me. here result of """""""""""""""""""""""""""""" zypper se -t package -s dracut Loading repository data... Reading installed packages... S | Name | Type | Version | Arch | Repository --+-----------------+---------+------------+--------+------------------------------- i | dracut | package | 044-65.1 | x86_64 | (System Packages) v | dracut | package | 044-20.2 | x86_64 | Dépôt principal (OSS) v | dracut | package | 044-16.3.1 | x86_64 | Dépôt principal de mise à jour v | dracut | package | 044-14.1 | x86_64 | Dépôt principal de mise à jour v | dracut | package | 044-12.1 | x86_64 | openSUSE:Leap:42.2 v | dracut | package | 044-12.1 | x86_64 | openSUSE:Leap:42.2 | dracut-fips | package | 044-20.2 | x86_64 | Dépôt principal (OSS) | dracut-fips | package | 044-16.3.1 | x86_64 | Dépôt principal de mise à jour | dracut-fips | package | 044-14.1 | x86_64 | Dépôt principal de mise à jour | dracut-fips | package | 044-12.1 | x86_64 | openSUSE:Leap:42.2 | dracut-fips | package | 044-12.1 | x86_64 | openSUSE:Leap:42.2 i | dracut-tools | package | 044-20.2 | x86_64 | Dépôt principal (OSS) v | dracut-tools | package | 044-16.3.1 | x86_64 | Dépôt principal de mise à jour v | dracut-tools | package | 044-14.1 | x86_64 | Dépôt principal de mise à jour v | dracut-tools | package | 044-12.1 | x86_64 | openSUSE:Leap:42.2 v | dracut-tools | package | 044-12.1 | x86_64 | openSUSE:Leap:42.2 i | plymouth-dracut | package | 0.9.2-4.2 | x86_64 | Dépôt principal (OSS) v | plymouth-dracut | package | 0.9.2-4.1 | x86_64 | Dépôt principal de mise à jour v | plymouth-dracut | package | 0.9.2-2.2 | x86_64 | openSUSE:Leap:42.2 v | plymouth-dracut | package | 0.9.2-2.2 | x86_64 | openSUSE:Leap:42.2 """"""""""""""""""""""""""""" Takishi, I'm out of ideas. How do we progress here? Can we get any dracut log showing why it takes b43.ko into initrd? Maybe just run dracut with more -v options? My wild guess is some static setup like modules.d... Created attachment 729991 [details]
dracut output
the result of lsinitrd | less >> dracut.txt
*** Bug 1049120 has been marked as a duplicate of this bug. *** Looking into the /var/log/YaST2/mkinitrd.log it has several lines of: W: Possible missing firmware "b43/.." for kernel module "b43.ko" So wasn't dracut just including the firmware files into the initrd beforehand? Anyway output of dracut with --debug is uploaded at https://transfer.sh/NpOo3/dracut.txt (26MB is too big to be attached to bugzilla). And looking at latest Tumbleweed (just updated now) dracut seems to include some of the firmware files (ucode*.fw) but is still missing b43/n0initvals16.fw and b43-open/ucode16_mimo.fw. Sigh, these files are not listed in b43 driver statically via MODULE_FIRMWARE(), thus dracut has no clue about that. This can be addressed in the kernel side. HOWEVER: as mentioned in comment 15, the action by dracut is already strange; b43 module shouldn't be included in initrd at all from the beginning. It must be either the change in dracut or the change of its setup that triggers the problem. Ok, let's try with brute force: Please execute sudo dracut --debug --force 1>/tmp/dracut-debug.log 2>&1 and attach /tmp/dracut-debug.log. This should tell us why b43 gets included. Uploaded at https://transfer.sh/KcSbX/dracut-log.txt *** Bug 1050172 has been marked as a duplicate of this bug. *** Cyril Hrubis: please provide the output of rpm -qi dracut, along with the opensuse version you are using? Happens both on openSUSE Leap 42.3 as well as Tumbleweed. rmp -qi dracut on Leap 42.3: rpm -qi dracut Name : dracut Version : 044 Release : 21.7 Architecture: x86_64 Install Date: Mon 17 Jul 2017 04:15:46 PM CEST Group : System/Base Size : 1140817 License : GPL-2.0+ and LGPL-2.1+ Signature : RSA/SHA256, Fri 07 Jul 2017 08:15:49 PM CEST, Key ID b88b2fd43dbdc284 Source RPM : dracut-044-21.7.src.rpm Build Date : Fri 07 Jul 2017 08:15:31 PM CEST Build Host : cloud125 Relocations : (not relocatable) Packager : http://bugs.opensuse.org Vendor : openSUSE URL : https://dracut.wiki.kernel.org/ Summary : Initramfs generator using udev Description : Dracut contains tools to create a bootable initramfs for Linux kernels >= 2.6. Dracut contains various modules which are driven by the event-based udev and systemd. Having root on MD, DM, LVM2, LUKS is supported as well as NFS, iSCSI, NBD, FCoE. Distribution: openSUSE Leap 42.3 And I've just updated dracut to: ... Release : 23.2 ... But the lsinitrd still shows that b43 is included. Found what's going on: https://github.com/openSUSE/dracut/commit/8a679916e597a2c589334c5aeaef8996b18debab causes the problem. b43 depends on mmc_core, so they get pulled in ever since. I'll have to come up with a better generic approach, or a blacklist. I reproduced it, and here is the output from some debugging that I added at the relevant places: kernel/drivers/net/wireless/b43/b43.ko because of kernel/drivers/mmc/core/mmc_core.ko in kernel/drivers/bcma/bcma.ko kernel/net/mac80211/mac80211.ko kernel/net/wireless/cfg80211.ko kernel/drivers/ssb/ssb.ko kernel/drivers/mmc/core/mmc_core.ko kernel/net/rfkill/rfkill.ko kernel/drivers/pcmcia/pcmcia.ko kernel/drivers/pcmcia/pcmcia_core.ko Takashi: What's your opinion? (In reply to Daniel Molkentin from comment #36) > Takashi: What's your opinion? IMO, the unconditional inclusion of the reverse dependency on all block modules isn't good. As you can see in the debug outputs, lots of modules hit by that. It's mostly because WiFi works over SDIO, thus it depends on MMC. Which modules are expected to be added by this action? My gut feeling tells that a white-list approach would be safer when the candidates are limited. See above bug report: hisi_sas_v{1,2}_hw -> hisi_sas_main. I don't quite know which other modules might be affected in the future, but two frontends to the same backend module doesn't sound too odd.
That said: I agree.
Please give the packages from the development tree https://software.opensuse.org//download.html?project=home%3Admolkentin%3Adracut%3Adevel%3Agit&package=dracut a try. It reverts the new behavior and special cases only certain drivers. openSUSE-SU-2017:2110-1: An update that solves 5 vulnerabilities and has 61 fixes is now available. Category: security (important) Bug References: 1006180,1011913,1012829,1013887,1022476,1028173,1028286,1029693,1030552,1031515,1031717,1033587,1034075,1034762,1036303,1036632,1037344,1038078,1038616,1039915,1040307,1040351,1041958,1042286,1042314,1042422,1042778,1043652,1044112,1044636,1045154,1045563,1045922,1046682,1046985,1047048,1047096,1047118,1047121,1047152,1047277,1047343,1047354,1047651,1047653,1047670,1048155,1048221,1048317,1048891,1048914,1049483,1049486,1049603,1049645,1049882,1050061,1050188,1051022,1051059,1051239,1051478,1051479,1051663,964063,974215 CVE References: CVE-2017-10810,CVE-2017-11473,CVE-2017-7533,CVE-2017-7541,CVE-2017-7542 Sources used: openSUSE Leap 42.2 (src): kernel-debug-4.4.79-18.23.1, kernel-default-4.4.79-18.23.1, kernel-docs-4.4.79-18.23.2, kernel-obs-build-4.4.79-18.23.1, kernel-obs-qa-4.4.79-18.23.1, kernel-source-4.4.79-18.23.1, kernel-syms-4.4.79-18.23.1, kernel-vanilla-4.4.79-18.23.1 (In reply to Daniel Molkentin from comment #39) > Please give the packages from the development tree > > https://software.opensuse.org//download. > html?project=home%3Admolkentin%3Adracut%3Adevel%3Agit&package=dracut > > a try. It reverts the new behavior and special cases > only certain drivers. I've installed the package and I can confirm that the wifi driver is not included in the initrd any more and that the wifi works after reboot. I installed the patch "https://software.opensuse.org//download.html?project=home%3Admolkentin%3Adracut%3Adevel%3Agit&package=dracut" After restarting the WiFi connection is active. Created attachment 737614 [details]
50-omit-b43-ssb-ssb_hcd.conf
Put this file in /etc/dracut.conf.d/
(In reply to Daniel Molkentin from comment #39) > Please give the packages from the development tree > > https://software.opensuse.org//download. > html?project=home%3Admolkentin%3Adracut%3Adevel%3Agit&package=dracut > > a try. It reverts the new behavior and special cases > only certain drivers. It isn't necessary and not such a good idea to install this package. It will be overwritten with an update of dracut. A better way is to add the file 50-omit-b43-ssb-ssb_hcd.conf in /etc/dracut.d.conf directory. After doing this you need to run mkinitrd and reboot the system. After this you can revert back to the last standard dracut package. When dracut is released without the new behavior and special cases for certain drivers, you can delete the file 50-omit-b43-ssb-ssb_hcd.conf. Comment on attachment 737614 [details] 50-omit-b43-ssb-ssb_hcd.conf >omit_drivers+="b43 ssb ssb-hcd" I have verified the fix as good as possible without being affected and submitted it. Once it has undergone QA review, it will show up in your updates. Still, additional verification is welcome. SUSE-SU-2017:2286-1: An update that solves 8 vulnerabilities and has 150 fixes is now available. Category: security (important) Bug References: 1005778,1006180,1011913,1012829,1013887,1015337,1015342,1016119,1019151,1019695,1020645,1022476,1022600,1022604,1023175,1024346,1024373,1025461,1026570,1028173,1028286,1029693,1030552,1031515,1031717,1031784,1033587,1034075,1034113,1034762,1036215,1036632,1037344,1037404,1037838,1037994,1038078,1038616,1038792,1039153,1039348,1039915,1040307,1040347,1040351,1041958,1042257,1042286,1042314,1042422,1042778,1043261,1043347,1043520,1043598,1043652,1043805,1043912,1044112,1044443,1044623,1044636,1045154,1045293,1045330,1045404,1045563,1045596,1045709,1045715,1045866,1045922,1045937,1046105,1046170,1046434,1046651,1046655,1046682,1046821,1046985,1047027,1047048,1047096,1047118,1047121,1047152,1047174,1047277,1047343,1047354,1047418,1047506,1047595,1047651,1047653,1047670,1047802,1048146,1048155,1048221,1048317,1048348,1048356,1048421,1048451,1048501,1048891,1048912,1048914,1048916,1048919,1049231,1049289,1049298,1049361,1049483,1049486,1049603,1049619,1049645,1049706,1049882,1050061,1050188,1050211,1050320,1050322,1050677,1051022,1051048,1051059,1051239,1051399,1051471,1051478,1051479,1051556,1051663,1051689,1051979,1052049,1052223,1052311,1052325,1052365,1052442,1052533,1052709,1052773,1052794,1052899,1052925,1053043,1053117,964063,974215,998664 CVE References: CVE-2017-1000111,CVE-2017-1000112,CVE-2017-10810,CVE-2017-11473,CVE-2017-7533,CVE-2017-7541,CVE-2017-7542,CVE-2017-8831 Sources used: SUSE Linux Enterprise Workstation Extension 12-SP3 (src): kernel-default-4.4.82-6.3.1 SUSE Linux Enterprise Software Development Kit 12-SP3 (src): kernel-docs-4.4.82-6.3.5, kernel-obs-build-4.4.82-6.3.3 SUSE Linux Enterprise Server 12-SP3 (src): kernel-default-4.4.82-6.3.1, kernel-source-4.4.82-6.3.1, kernel-syms-4.4.82-6.3.1 SUSE Linux Enterprise Live Patching 12-SP3 (src): kgraft-patch-SLE12-SP3_Update_1-1-2.1 SUSE Linux Enterprise High Availability 12-SP3 (src): kernel-default-4.4.82-6.3.1 SUSE Linux Enterprise Desktop 12-SP3 (src): kernel-default-4.4.82-6.3.1, kernel-source-4.4.82-6.3.1, kernel-syms-4.4.82-6.3.1 SUSE-RU-2017:2445-1: An update that has 9 recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1021846,1037344,1048606,1048698,1048748,1049113,1054538,1054809,1055492 CVE References: Sources used: SUSE Linux Enterprise Server 12-SP3 (src): dracut-044.1-114.10.1 SUSE Linux Enterprise Desktop 12-SP3 (src): dracut-044.1-114.10.1 openSUSE-RU-2017:2477-1: An update that has 9 recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1021846,1037344,1048606,1048698,1048748,1049113,1054538,1054809,1055492 CVE References: Sources used: openSUSE Leap 42.3 (src): dracut-044.1-26.1 *** Bug 1052060 has been marked as a duplicate of this bug. *** SUSE-SU-2017:2869-1: An update that solves 16 vulnerabilities and has 120 fixes is now available. Category: security (important) Bug References: 1006180,1011913,1012382,1012829,1013887,1019151,1020645,1020657,1021424,1022476,1022743,1022967,1023175,1024405,1028173,1028286,1029693,1030552,1030850,1031515,1031717,1031784,1033587,1034048,1034075,1034762,1036303,1036632,1037344,1037404,1037994,1038078,1038583,1038616,1038792,1039915,1040307,1040351,1041958,1042286,1042314,1042422,1042778,1043652,1044112,1044636,1045154,1045563,1045922,1046682,1046821,1046985,1047027,1047048,1047096,1047118,1047121,1047152,1047277,1047343,1047354,1047487,1047651,1047653,1047670,1048155,1048221,1048317,1048891,1048893,1048914,1048934,1049226,1049483,1049486,1049580,1049603,1049645,1049882,1050061,1050188,1051022,1051059,1051239,1051399,1051478,1051479,1051556,1051663,1051790,1052049,1052223,1052533,1052580,1052593,1052709,1052773,1052794,1052888,1053117,1053802,1053915,1053919,1054084,1055013,1055096,1055359,1055493,1055755,1055896,1056261,1056588,1056827,1056982,1057015,1058038,1058116,1058410,1058507,1059051,1059465,1060197,1061017,1061046,1061064,1061067,1061172,1061831,1061872,1063667,1064206,1064388,964063,971975,974215,981309 CVE References: CVE-2017-1000252,CVE-2017-10810,CVE-2017-11472,CVE-2017-11473,CVE-2017-12134,CVE-2017-12153,CVE-2017-12154,CVE-2017-13080,CVE-2017-14051,CVE-2017-14106,CVE-2017-14489,CVE-2017-15649,CVE-2017-7518,CVE-2017-7541,CVE-2017-7542,CVE-2017-8831 Sources used: SUSE Linux Enterprise Workstation Extension 12-SP2 (src): kernel-default-4.4.90-92.45.1 SUSE Linux Enterprise Software Development Kit 12-SP2 (src): kernel-docs-4.4.90-92.45.3, kernel-obs-build-4.4.90-92.45.1 SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (src): kernel-default-4.4.90-92.45.1, kernel-source-4.4.90-92.45.1, kernel-syms-4.4.90-92.45.1 SUSE Linux Enterprise Server 12-SP2 (src): kernel-default-4.4.90-92.45.1, kernel-source-4.4.90-92.45.1, kernel-syms-4.4.90-92.45.1 SUSE Linux Enterprise Live Patching 12 (src): kgraft-patch-SLE12-SP2_Update_14-1-2.4 SUSE Linux Enterprise High Availability 12-SP2 (src): kernel-default-4.4.90-92.45.1 SUSE Linux Enterprise Desktop 12-SP2 (src): kernel-default-4.4.90-92.45.1, kernel-source-4.4.90-92.45.1, kernel-syms-4.4.90-92.45.1 SUSE Container as a Service Platform ALL (src): kernel-default-4.4.90-92.45.1 OpenStack Cloud Magnum Orchestration 7 (src): kernel-default-4.4.90-92.45.1 SUSE-SU-2017:2956-1: An update that solves 17 vulnerabilities and has 113 fixes is now available. Category: security (important) Bug References: 1005917,1006180,1011913,1012382,1012829,1013887,1018419,1019151,1020645,1020657,1020685,1021424,1022476,1022743,1023175,1024405,1028173,1028286,1028819,1029693,1030552,1030850,1031515,1031717,1031784,1033587,1034048,1034075,1034762,1036303,1036632,1037344,1037404,1037994,1038078,1038583,1038616,1038792,1038846,1038847,1039354,1039915,1040307,1040351,1041958,1042286,1042314,1042422,1042778,1043652,1044112,1044636,1045154,1045563,1045922,1046682,1046821,1046985,1047027,1047048,1047096,1047118,1047121,1047152,1047277,1047343,1047354,1047487,1047651,1047653,1047670,1048155,1048221,1048317,1048891,1048893,1048914,1048934,1049226,1049483,1049486,1049580,1049603,1049645,1049882,1050061,1050188,1051022,1051059,1051239,1051399,1051478,1051479,1051556,1051663,1051790,1052049,1052223,1052311,1052365,1052533,1052580,1052709,1052773,1052794,1052888,1053117,1053802,1053915,1054084,1055013,1055096,1055359,1056261,1056588,1056827,1056982,1057015,1057389,1058038,1058116,1058507,963619,964063,964944,971975,974215,981309,988784,993890 CVE References: CVE-2017-1000111,CVE-2017-1000112,CVE-2017-1000251,CVE-2017-1000252,CVE-2017-1000365,CVE-2017-10810,CVE-2017-11472,CVE-2017-11473,CVE-2017-12134,CVE-2017-12154,CVE-2017-14051,CVE-2017-14106,CVE-2017-7518,CVE-2017-7533,CVE-2017-7541,CVE-2017-7542,CVE-2017-8831 Sources used: SUSE Linux Enterprise Real Time Extension 12-SP2 (src): kernel-rt-4.4.88-18.1, kernel-rt_debug-4.4.88-18.1, kernel-source-rt-4.4.88-18.1, kernel-syms-rt-4.4.88-18.1 |