Bugzilla – Bug 1051022
ideapad_wlan: wifi hardware blocked
Last modified: 2019-08-15 13:25:06 UTC
Hello, I am running Tumblewheed at Lenovo V510. kernel is 4.11.8-2-default I see that wifi is always hardware blocked (there is no any special key at the keyboard to activate/deactivate wifi) # rfkill list 0: phy0: Wireless LAN Soft blocked: no Hard blocked: no 1: ideapad_wlan: Wireless LAN Soft blocked: no Hard blocked: yes 2: ideapad_bluetooth: Bluetooth Soft blocked: yes Hard blocked: yes 3: hci0: Bluetooth Soft blocked: yes Hard blocked: no NetworkManager refuses performing WiFi network scanning. # nmcli device wifi rescan Error: Scanning not allowed while unavailable or activating. # nmcli device DEVICE TYPE STATE CONNECTION enp2s0 ethernet connected Wired connection 1 wlp3s0 wifi unavailable -- lo loopback unmanaged -- # nmcli radio WIFI-HW WIFI WWAN-HW WWAN enabled disabled enabled enabled # nmcli radio all on # nmcli radio WIFI-HW WIFI WWAN-HW WWAN enabled disabled enabled enabled How could I enable wifi?
Created attachment 734189 [details] dmesg
Created attachment 734190 [details] hwinfo
# modprobe -r ideapad_laptop helps me as a workaround # rfkill list 0: phy0: Wireless LAN Soft blocked: no Hard blocked: no 3: hci0: Bluetooth Soft blocked: yes Hard blocked: no # nmcli radio WIFI-HW WIFI WWAN-HW WWAN enabled enabled enabled enabled # nmcli device DEVICE TYPE STATE CONNECTION wlp3s0 wifi connected fJ0cYgA enp2s0 ethernet unavailable -- lo loopback unmanaged --
*** Bug 1051021 has been marked as a duplicate of this bug. ***
The same issue is valid for openSUSE 42.3 (4.4.76-1-default)
Good to see you already tried to remove that module, which I wanted to suggest, too. Could you check 4.12 and 4.13-rc kernels in OBS Kernel:stable and Kernel:HEAD whether they still show the same behavior? If yes, we'd need to report to upstream.
https://github.com/torvalds/linux/commit/0df4b805cbccbe3f8378f49c415adb2fcffdd3dc I will try 4.13-rc.
I see lots of similar commits. All this models should suffer the same issue as me: 710c059c248a24609051f5a3dd1d8468cdc675b0 platform/x86: ideapad-laptop: Add several models to no_hw_rfkill 0df4b805cbccbe3f8378f49c415adb2fcffdd3dc platform/x86: ideapad-laptop: Add IdeaPad V510-15IKB to no_hw_rfkill b2f2fe205c3b9b595dc50ee431230a45d03f9c2c platform/x86: ideapad-laptop: Add Y720-15IKBN to no_hw_rfkill 5d9f40b56630a8702b5f7a61a770f9b73aa07464 platform/x86: ideapad-laptop: Add Y520-15IKBN to no_hw_rfkill 3d59dfcd1f2610d26da2cf19646ace6692c521dc platform/x86: ideapad-laptop: constify rfkill_ops structure ccc7179f4d9467947c94f4302d61cd5143842fcd platform/x86: ideapad-laptop: Add IdeaPad V310-15ISK to no_hw_rfkill 1f3bc53d843f92d6e7e7cf56ee79acec918e6421 platform/x86: ideapad-laptop: Add IdeaPad 310-15IKB to no_hw_rfkill e297046875f2c5a43684f54f0fd098249b4f293a platform/x86: ideapad-laptop: Add Y700 15-ACZ to no_hw_rfkill DMI list 40c30bbf3377babc4d6bb16b699184236a8bfa27 platform/x86: ideapad-laptop: Add Lenovo Yoga 910-13IKB to no_hw_rfkill dmi list 4db9675d927a71faa66e5ab128d2390d6329750b ideapad-laptop: Add ideapad Y700 (15) to the no_hw_rfkill DMI list 6b31de3e698582fe0b8f7f4bab15831b73204800 ideapad-laptop: Add Lenovo Yoga 700 to no_hw_rfkill dmi list edde316acb5f07c04abf09a92f59db5d2efd14e2 ideapad-laptop: Add Lenovo ideapad Y700-17ISK to no_hw_rfkill dmi list
kernel-default-4.13.rc2-1.1.gb545b87.x86_64.rpm works fine. Could we pick this commits to 42.3 kernel?
Sure, I'll fix it. Maybe worth to check other commits you pointed out, too.
I don't have the all hardware that refereed by the commits, only V510.
All patches are just adding the quirk entries, so it should be safe to apply as long as applicable. Now they are merged. Please check KOTD of tomorrow later. Thanks for the report and the quick followup!
openSUSE-SU-2017:2110-1: An update that solves 5 vulnerabilities and has 61 fixes is now available. Category: security (important) Bug References: 1006180,1011913,1012829,1013887,1022476,1028173,1028286,1029693,1030552,1031515,1031717,1033587,1034075,1034762,1036303,1036632,1037344,1038078,1038616,1039915,1040307,1040351,1041958,1042286,1042314,1042422,1042778,1043652,1044112,1044636,1045154,1045563,1045922,1046682,1046985,1047048,1047096,1047118,1047121,1047152,1047277,1047343,1047354,1047651,1047653,1047670,1048155,1048221,1048317,1048891,1048914,1049483,1049486,1049603,1049645,1049882,1050061,1050188,1051022,1051059,1051239,1051478,1051479,1051663,964063,974215 CVE References: CVE-2017-10810,CVE-2017-11473,CVE-2017-7533,CVE-2017-7541,CVE-2017-7542 Sources used: openSUSE Leap 42.2 (src): kernel-debug-4.4.79-18.23.1, kernel-default-4.4.79-18.23.1, kernel-docs-4.4.79-18.23.2, kernel-obs-build-4.4.79-18.23.1, kernel-obs-qa-4.4.79-18.23.1, kernel-source-4.4.79-18.23.1, kernel-syms-4.4.79-18.23.1, kernel-vanilla-4.4.79-18.23.1
openSUSE-SU-2017:2112-1: An update that solves four vulnerabilities and has 61 fixes is now available. Category: security (important) Bug References: 1005778,1011913,1012829,1013887,1016119,1019695,1022476,1022600,1022604,1028286,1030552,1031717,1033587,1036215,1036632,1037838,1039153,1040347,1042257,1042286,1042422,1043598,1044443,1044623,1045404,1045563,1045922,1046651,1046682,1047121,1048146,1048155,1048348,1048421,1048451,1048501,1048891,1048912,1048914,1048916,1048919,1049231,1049289,1049361,1049483,1049486,1049603,1049619,1049645,1049706,1049882,1050061,1050188,1050320,1050322,1051022,1051048,1051059,1051239,1051471,1051478,1051479,1051663,964063,974215 CVE References: CVE-2017-11473,CVE-2017-7533,CVE-2017-7541,CVE-2017-7542 Sources used: openSUSE Leap 42.3 (src): kernel-debug-4.4.79-4.2, kernel-default-4.4.79-4.2, kernel-docs-4.4.79-4.2, kernel-obs-build-4.4.79-4.2, kernel-obs-qa-4.4.79-4.2, kernel-source-4.4.79-4.2, kernel-syms-4.4.79-4.2, kernel-vanilla-4.4.79-4.2
SUSE-SU-2017:2286-1: An update that solves 8 vulnerabilities and has 150 fixes is now available. Category: security (important) Bug References: 1005778,1006180,1011913,1012829,1013887,1015337,1015342,1016119,1019151,1019695,1020645,1022476,1022600,1022604,1023175,1024346,1024373,1025461,1026570,1028173,1028286,1029693,1030552,1031515,1031717,1031784,1033587,1034075,1034113,1034762,1036215,1036632,1037344,1037404,1037838,1037994,1038078,1038616,1038792,1039153,1039348,1039915,1040307,1040347,1040351,1041958,1042257,1042286,1042314,1042422,1042778,1043261,1043347,1043520,1043598,1043652,1043805,1043912,1044112,1044443,1044623,1044636,1045154,1045293,1045330,1045404,1045563,1045596,1045709,1045715,1045866,1045922,1045937,1046105,1046170,1046434,1046651,1046655,1046682,1046821,1046985,1047027,1047048,1047096,1047118,1047121,1047152,1047174,1047277,1047343,1047354,1047418,1047506,1047595,1047651,1047653,1047670,1047802,1048146,1048155,1048221,1048317,1048348,1048356,1048421,1048451,1048501,1048891,1048912,1048914,1048916,1048919,1049231,1049289,1049298,1049361,1049483,1049486,1049603,1049619,1049645,1049706,1049882,1050061,1050188,1050211,1050320,1050322,1050677,1051022,1051048,1051059,1051239,1051399,1051471,1051478,1051479,1051556,1051663,1051689,1051979,1052049,1052223,1052311,1052325,1052365,1052442,1052533,1052709,1052773,1052794,1052899,1052925,1053043,1053117,964063,974215,998664 CVE References: CVE-2017-1000111,CVE-2017-1000112,CVE-2017-10810,CVE-2017-11473,CVE-2017-7533,CVE-2017-7541,CVE-2017-7542,CVE-2017-8831 Sources used: SUSE Linux Enterprise Workstation Extension 12-SP3 (src): kernel-default-4.4.82-6.3.1 SUSE Linux Enterprise Software Development Kit 12-SP3 (src): kernel-docs-4.4.82-6.3.5, kernel-obs-build-4.4.82-6.3.3 SUSE Linux Enterprise Server 12-SP3 (src): kernel-default-4.4.82-6.3.1, kernel-source-4.4.82-6.3.1, kernel-syms-4.4.82-6.3.1 SUSE Linux Enterprise Live Patching 12-SP3 (src): kgraft-patch-SLE12-SP3_Update_1-1-2.1 SUSE Linux Enterprise High Availability 12-SP3 (src): kernel-default-4.4.82-6.3.1 SUSE Linux Enterprise Desktop 12-SP3 (src): kernel-default-4.4.82-6.3.1, kernel-source-4.4.82-6.3.1, kernel-syms-4.4.82-6.3.1
SUSE-SU-2017:2869-1: An update that solves 16 vulnerabilities and has 120 fixes is now available. Category: security (important) Bug References: 1006180,1011913,1012382,1012829,1013887,1019151,1020645,1020657,1021424,1022476,1022743,1022967,1023175,1024405,1028173,1028286,1029693,1030552,1030850,1031515,1031717,1031784,1033587,1034048,1034075,1034762,1036303,1036632,1037344,1037404,1037994,1038078,1038583,1038616,1038792,1039915,1040307,1040351,1041958,1042286,1042314,1042422,1042778,1043652,1044112,1044636,1045154,1045563,1045922,1046682,1046821,1046985,1047027,1047048,1047096,1047118,1047121,1047152,1047277,1047343,1047354,1047487,1047651,1047653,1047670,1048155,1048221,1048317,1048891,1048893,1048914,1048934,1049226,1049483,1049486,1049580,1049603,1049645,1049882,1050061,1050188,1051022,1051059,1051239,1051399,1051478,1051479,1051556,1051663,1051790,1052049,1052223,1052533,1052580,1052593,1052709,1052773,1052794,1052888,1053117,1053802,1053915,1053919,1054084,1055013,1055096,1055359,1055493,1055755,1055896,1056261,1056588,1056827,1056982,1057015,1058038,1058116,1058410,1058507,1059051,1059465,1060197,1061017,1061046,1061064,1061067,1061172,1061831,1061872,1063667,1064206,1064388,964063,971975,974215,981309 CVE References: CVE-2017-1000252,CVE-2017-10810,CVE-2017-11472,CVE-2017-11473,CVE-2017-12134,CVE-2017-12153,CVE-2017-12154,CVE-2017-13080,CVE-2017-14051,CVE-2017-14106,CVE-2017-14489,CVE-2017-15649,CVE-2017-7518,CVE-2017-7541,CVE-2017-7542,CVE-2017-8831 Sources used: SUSE Linux Enterprise Workstation Extension 12-SP2 (src): kernel-default-4.4.90-92.45.1 SUSE Linux Enterprise Software Development Kit 12-SP2 (src): kernel-docs-4.4.90-92.45.3, kernel-obs-build-4.4.90-92.45.1 SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (src): kernel-default-4.4.90-92.45.1, kernel-source-4.4.90-92.45.1, kernel-syms-4.4.90-92.45.1 SUSE Linux Enterprise Server 12-SP2 (src): kernel-default-4.4.90-92.45.1, kernel-source-4.4.90-92.45.1, kernel-syms-4.4.90-92.45.1 SUSE Linux Enterprise Live Patching 12 (src): kgraft-patch-SLE12-SP2_Update_14-1-2.4 SUSE Linux Enterprise High Availability 12-SP2 (src): kernel-default-4.4.90-92.45.1 SUSE Linux Enterprise Desktop 12-SP2 (src): kernel-default-4.4.90-92.45.1, kernel-source-4.4.90-92.45.1, kernel-syms-4.4.90-92.45.1 SUSE Container as a Service Platform ALL (src): kernel-default-4.4.90-92.45.1 OpenStack Cloud Magnum Orchestration 7 (src): kernel-default-4.4.90-92.45.1
SUSE-SU-2017:2956-1: An update that solves 17 vulnerabilities and has 113 fixes is now available. Category: security (important) Bug References: 1005917,1006180,1011913,1012382,1012829,1013887,1018419,1019151,1020645,1020657,1020685,1021424,1022476,1022743,1023175,1024405,1028173,1028286,1028819,1029693,1030552,1030850,1031515,1031717,1031784,1033587,1034048,1034075,1034762,1036303,1036632,1037344,1037404,1037994,1038078,1038583,1038616,1038792,1038846,1038847,1039354,1039915,1040307,1040351,1041958,1042286,1042314,1042422,1042778,1043652,1044112,1044636,1045154,1045563,1045922,1046682,1046821,1046985,1047027,1047048,1047096,1047118,1047121,1047152,1047277,1047343,1047354,1047487,1047651,1047653,1047670,1048155,1048221,1048317,1048891,1048893,1048914,1048934,1049226,1049483,1049486,1049580,1049603,1049645,1049882,1050061,1050188,1051022,1051059,1051239,1051399,1051478,1051479,1051556,1051663,1051790,1052049,1052223,1052311,1052365,1052533,1052580,1052709,1052773,1052794,1052888,1053117,1053802,1053915,1054084,1055013,1055096,1055359,1056261,1056588,1056827,1056982,1057015,1057389,1058038,1058116,1058507,963619,964063,964944,971975,974215,981309,988784,993890 CVE References: CVE-2017-1000111,CVE-2017-1000112,CVE-2017-1000251,CVE-2017-1000252,CVE-2017-1000365,CVE-2017-10810,CVE-2017-11472,CVE-2017-11473,CVE-2017-12134,CVE-2017-12154,CVE-2017-14051,CVE-2017-14106,CVE-2017-7518,CVE-2017-7533,CVE-2017-7541,CVE-2017-7542,CVE-2017-8831 Sources used: SUSE Linux Enterprise Real Time Extension 12-SP2 (src): kernel-rt-4.4.88-18.1, kernel-rt_debug-4.4.88-18.1, kernel-source-rt-4.4.88-18.1, kernel-syms-rt-4.4.88-18.1