From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id 94B86158094 for ; Tue, 30 Aug 2022 07:52:30 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id C0FBAE08F3; Tue, 30 Aug 2022 07:52:24 +0000 (UTC) Received: from mail-gw.thundermail.uk (mail-gw.thundermail.uk [149.255.60.71]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 6F89FE088F for ; Tue, 30 Aug 2022 07:52:23 +0000 (UTC) Received: from mailgw01.thundermail.uk (mail-gw.thundermail.uk [149.255.60.66]) by mail-gw.thundermail.uk (Postfix) with ESMTPS id C81F16000095 for ; Tue, 30 Aug 2022 08:52:22 +0100 (BST) X-ASG-Debug-ID: 1661845939-055413115438390d0001-LfjuLa Received: from cloud220.unlimitedwebhosting.co.uk (cloud220.unlimitedwebhosting.co.uk [149.255.60.183]) by mailgw01.thundermail.uk with ESMTP id LIklr3xkjlU8sOTn (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO) for ; Tue, 30 Aug 2022 08:52:19 +0100 (BST) X-Barracuda-Envelope-From: confabulate@kintzios.com X-Barracuda-Effective-Source-IP: cloud220.unlimitedwebhosting.co.uk[149.255.60.183] X-Barracuda-Apparent-Source-IP: 149.255.60.183 Received: from lenovo.localdomain (230.3.169.217.in-addr.arpa [217.169.3.230]) by cloud220.unlimitedwebhosting.co.uk (Postfix) with ESMTPSA id 03DD1C74F3F for ; Tue, 30 Aug 2022 08:52:18 +0100 (BST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kintzios.com; s=default; t=1661845939; bh=cW1WK4ooxBiZO1ydSmCh01Yi2fPJN0EfbpcebJJpm1s=; h=From:To:Subject; b=Q8DtuzZnBZeOR4FPeZkCigZVPvJ/hH7xxB3l8NW7uxaOqrd0SyKAd+4OEKCDlOhSO 4MUyo8LkGlOTQviVJAkLTZyPP5yrkbmu8vSryVQ53EIZbc5rMqHWLZQnGMVZBlyWz/ OlcBq4cL7gGk2cIS2BXeliLe3evn2lgSiTg88Zv8= From: Michael To: gentoo-user@lists.gentoo.org Subject: Re: [gentoo-user] Lenovo T400 wifi scan and connect questions Date: Tue, 30 Aug 2022 08:52:03 +0100 X-ASG-Orig-Subj: Re: [gentoo-user] Lenovo T400 wifi scan and connect questions Message-ID: <3452462.iIbC2pHGDl@lenovo.localdomain> In-Reply-To: References: Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-user@lists.gentoo.org Reply-to: gentoo-user@lists.gentoo.org X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply MIME-Version: 1.0 Content-Type: multipart/signed; boundary="nextPart8987600.CDJkKcVGEf"; micalg="pgp-sha256"; protocol="application/pgp-signature" X-PPP-Message-ID: <20220830075219.2052483.81684@cloud220.unlimitedwebhosting.co.uk> X-PPP-Vhost: kintzios.com X-Barracuda-Connect: cloud220.unlimitedwebhosting.co.uk[149.255.60.183] X-Barracuda-Start-Time: 1661845939 X-Barracuda-Encrypted: ECDHE-RSA-AES128-GCM-SHA256 X-Barracuda-URL: https://149.255.60.66:443/cgi-mod/mark.cgi X-ASG-Orig-Subj: Re: [gentoo-user] Lenovo T400 wifi scan and connect questions X-Virus-Scanned: by bsmtpd at thundermail.uk X-Barracuda-Scan-Msg-Size: 3123 X-Barracuda-BRTS-Status: 1 X-Barracuda-Spam-Score: 0.00 X-Barracuda-Spam-Status: No, SCORE=0.00 using global scores of TAG_LEVEL=1000.0 QUARANTINE_LEVEL=1000.0 KILL_LEVEL=1.9 tests= X-Barracuda-Spam-Report: Code version 3.2, rules version 3.2.3.100432 Rule breakdown below pts rule name description ---- ---------------------- -------------------------------------------------- X-Archives-Salt: 932db479-5e7d-403f-8530-2c8e506b4441 X-Archives-Hash: 872830dbad5d6771fe74aa4e104b46fb --nextPart8987600.CDJkKcVGEf Content-Transfer-Encoding: 7Bit Content-Type: text/plain; charset="UTF-8"; protected-headers="v1" From: Michael To: gentoo-user@lists.gentoo.org Reply-To: confabulate@kintzios.com Subject: Re: [gentoo-user] Lenovo T400 wifi scan and connect questions Date: Tue, 30 Aug 2022 08:52:03 +0100 Message-ID: <3452462.iIbC2pHGDl@lenovo.localdomain> In-Reply-To: References: MIME-Version: 1.0 On Monday, 29 August 2022 22:23:00 BST Walter Dnes wrote: > 1) the output of "dmesg | grep iwlwifi" is... > > [ 0.640780] iwlwifi 0000:03:00.0: can't disable ASPM; OS doesn't have > ASPM control [ 0.641112] Loading firmware: iwlwifi-5000-5.ucode > [ 0.641332] iwlwifi 0000:03:00.0: loaded firmware version 8.83.5.1 build > 33692 5000-5.ucode op_mode iwldvm [ 0.641360] iwlwifi 0000:03:00.0: > CONFIG_IWLWIFI_DEBUG disabled [ 0.641364] iwlwifi 0000:03:00.0: > CONFIG_IWLWIFI_DEBUGFS disabled [ 0.641367] iwlwifi 0000:03:00.0: > CONFIG_IWLWIFI_DEVICE_TRACING disabled [ 0.641370] iwlwifi 0000:03:00.0: > Detected Intel(R) WiFi Link 5100 AGN, REV=0x54 [ 17.311014] iwlwifi > 0000:03:00.0: Radio type=0x1-0x2-0x0 > [ 17.424989] iwlwifi 0000:03:00.0: Radio type=0x1-0x2-0x0 > > Nice to see that it detects the 5100 AGN just like lspci. As the old > saying goes, "use it or lose it"; I used to be able to run wifi on this > machine manually (command line) in the past, but now I've completely > forgotten how. I've emerged "iw" and "wpa_supplicant". "iw dev" shows > > phy#0 > Interface wlan0 > ifindex 3 > wdev 0x1 > addr 00:26:c6:4a:b4:92 > type managed > txpower 15.00 dBm > > Questions... > 1) what do I do to scan and get a list of available networks? If you have emerged wpa_supplicant with USE="qt5" you will have a GUI to launch its client and click on Scan to find and select a desired AP. If not, you can run wpa_cli in a terminal. Something like 'wpa_cli scan' and 'wpa_cli scan_results' should show you what's available. If you run just 'wpa_cli' it will launch an interactive shell from which you can run: > scan > scan_results 'wpa_cli --help' for more subcommands and options. > 2) how do I connect to one of the listed networks (assuming either > it's public, or I have the password) ? With wpa_supplicant's GUI, or with wpa_cli, but the latter is more tedious. Run wpa_cli to get an interactive shell. Then, > scan > scan_results > add_network 0 (if there is no other network yet configured) > set_network 0 ssid "My_blah_AP" <== From the results > set_network 0 psk "My_secret_passphrase" > enable_network 0 0K If you managed to authenticate and get an IP address you may want to save your settings - assuming you have enabled 'update_config=1' in your wpa_supplicant.conf: > save config OK For permanent associations you can add BSSID and authentication credentials into /etc/wpa_supplicant/wpa_supplicant.conf. Have a look at '/usr/share/doc/ wpa_supplicant-*/wpa_supplicant.conf.bz2' for examples. > 3) minor detail... The Google hits I've found all show both DVM and > MVM support enabled. Given that dmesg output shows "op_mode iwldvm", > can I safely get rid of MVM support ? I don't know what works with your wireless adaptor, but I tend to experiment initially by building such options as modules and see what is loaded or not and any warnings in dmesg. --nextPart8987600.CDJkKcVGEf Content-Type: application/pgp-signature; name="signature.asc" Content-Description: This is a digitally signed message part. Content-Transfer-Encoding: 7Bit -----BEGIN PGP SIGNATURE----- iQIzBAABCAAdFiEEXqhvaVh2ERicA8Ceseqq9sKVZxkFAmMNwaMACgkQseqq9sKV ZxkZkQ//cfoCzjv7LnZ6OGyrQeUSO3szO/D1Kr29WBL9rVIhPW1PmjjFbpNLur4s DQwYJOAfNl2exaEyKDZiWz9kRUhTn8cjgnhwMWcBPPwl3ieE4DXCxpfEvRCvlEjY Yvf1Zbawo1m62Sglg9N/UvbttevYo7AO8X9MS+Qzk+h8xpOV2MTL8pSeqV66BoqM k5CkcBtO3Mp3vx1ZI6CezgdIC3uEP6iuhWm2ptFfRye26zz/XOu2O9DIJsQdgzno UA3Vd1Mt85EU8kQSGh0iH3OOv6eezlKW66Up9wBQaFX8cB4mZxvVQeucJABM+g8d xfoBtx2b7YvK4rak04I9eHjhuWRlJ0QuFR8oteL9jIwo7ysG30o9uWUoNGgecW0z +qKgkmdjgo4X1uUWY9tBKDuqkSNjHhS6HTeNrAX4FUdOtlC1lHVpPSNxgYGB0NHF EJamVmQEHA8qP1BDjYtNHCDz1GzEvLodW8rih5xy+q9tscqSVLT9qyOK/mzgiVWC ds3y23YjV6XfviKaIgHiwP6D+k6uHUnwuepeOkCC51Ha29jBYvOOhzJsO+rjwDSA yHNTxaTgsCd+XPxtgdU0+X4NtI3krP3NliUnmvKgtzFqzMLEK7+NEhQDRQGLfTwb uyQZ3Ld9qK/0Pc/7x7DdgGAn869fO2dX96BcvQ8/U7vnw/vRgXw= =k9MP -----END PGP SIGNATURE----- --nextPart8987600.CDJkKcVGEf--