I learned how to enable kernel debug flags, this is my result in dmesg when I specifically run
`sudo rfkill unblock [target_rfkill_id]`, where the target id is "asus_wlan" on my laptop. ------ [32267.286227] asus_wmi: asus_wmi_evaluate_method3 called (0x53545344) with args: 0x00010011, 0x00000000, 0x00000000 [32267.286245] asus_wmi: Result: 0x00050000 [32267.287502] asus_wmi: asus_wmi_evaluate_method3 called (0x53564544) with args: 0x00010012, 0x00000001, 0x00000000 [32267.287508] asus_wmi: Result: 0xfffffffe [32267.287511] asus_wmi: asus_wmi_evaluate_method3, (0x53564544), arg 0x00010012 failed: -19 Furthermore, the idiom for all rfkill messages (bluetooth, phy0, etc) appears to generate two ACPI-BIOS communication messages: Send some kind of preliminary [0x53545344] call, get back 0x00050000 (presumably OK). This appears to be some kind of status check? I don't know hardware and it appears to be proprietary, I can't find information online about this, but this is how every other function worked. Then, do the *actual* set call, e.g. [0x53564544]. Which fails per the silent misdirection, as noted. I have an Asus Vivobook S14 WUXGA OLED 1TB SSD 32GB RAM, should be one of the first results on google atm. I do not have a WLAN LED on my laptop anywhere. This happens on kernel version 6.13.7 for Arch. Haven't tested on ubuntu or NixOS, but fairly certain this is reproducible. --- Again, there's plenty of comments in the kernel source saying that they needed to do this WLAN setting workaround, so there must be *a* reason for this, but I'm more confident now that this is the bug. Again, don't know hardware, so I don't know the fix, as I don't know the original reason for the hackaround. And it seems like all of this documentation is proprietary? I have no idea how people reverse-engineered this before. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2092283 Title: wifi soft blocked by asus_nb_wmi on asus vivobook s14 oled Q423SA Status in linux package in Ubuntu: Confirmed Bug description: asus_nb_wmi module is soft blocking the wifi and `rfkill unblock all` does not work. This is a duplicate of Bug #2089931 but reproduced with a supported kernel version. In addition to kernel 6.11.0-13, this bug also exist in the 6.12.5. after unloading the the kernel module via ``` sudo modprobe -r asus_nb_wmi ``` the wifi works normally. The laptop model is asus vivo book s14 q423 (https://www.asus.com/us/laptops/for-home/vivobook/asus- vivobook-s-14-q423/). To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2092283/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp