Re: fwupd broke my wifi on new laptop

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, Dec 20, 2022 at 10:18 AM Neal Becker <ndbecker2@xxxxxxxxx> wrote:
>
> Brand new lenovo x1 carbon.
>
> Today the "discover" sw update app suggest fw updates.  I went ahead with them.  Now wifi isn't working properly.  At boot, I get a hang on
> Job NetworkManager-wait-online.service/start running

Sorry to hear that. I usually find the opposite is true... Newer
machines need the UEFI updates to get wifi working correctly.

> Then it will finish boot after some time, but only 2.4G wifi works.  It won't connect to my 5GHz wifi, although it is detected.
>
> I tried an older kernel but got same results.
>
> I just received this laptop yesterday, I suppose I could try to return it.  But is there maybe someway to revert the firmware updates?  Or any other ideas?
>

I believe you can use fwupdmgr to remove the firmware update. I think
you want `fwupdmgr downgrade [DEVICE]`. I believe you can show the
devices with `fwupdmgr get-devices`. But for the downgrade, you may
get a numbered list, and only need to specify a number.

fwupdmgr is not well documented. The man pages suck, and there's not
much info out there on the web. The best questions/answers seem to
happen in the fwupdmgr bug reporter in GitHub. The next best set of
docs is from the --help option.

$ fwupdmgr --help
Usage:
  fwupdmgr [OPTION…]

  activate [DEVICE-ID|GUID]         Activate devices
  block-firmware [CHECKSUM]         Blocks a specific firmware from
being installed
  clear-results DEVICE-ID|GUID      Clears the results from the last update
  device-test [FILENAME1] [FILENAME2]
                                    Test a device using a JSON manifest
  disable-remote REMOTE-ID          Disables a given remote
  downgrade [DEVICE-ID|GUID]        Downgrades the firmware on a device
  download LOCATION                 Download a file
  enable-remote REMOTE-ID           Enables a given remote
  get-approved-firmware             Gets the list of approved firmware
  get-blocked-firmware              Gets the list of blocked firmware
  get-details FILE                  Gets details about a firmware file
  get-devices                       Get all devices that support
firmware updates
  get-history                       Show history of firmware updates
  get-plugins                       Get all enabled plugins registered
with the system
  get-releases [DEVICE-ID|GUID]     Gets the releases for a device
  get-remotes                       Gets the configured remotes
  get-results DEVICE-ID|GUID        Gets the results from the last update
  get-topology                      Alias to get-devices
  get-updates [DEVICE-ID|GUID]      Gets the list of updates for
connected hardware
  get-upgrades [DEVICE-ID|GUID]     Alias to get-updates
  install FILE [DEVICE-ID|GUID]     Install a firmware file on this hardware
  modify-config KEY,VALUE           Modifies a daemon configuration value
  modify-remote REMOTE-ID KEY VALUE
                                    Modifies a given remote
  refresh [FILE FILE_SIG REMOTE-ID]
                                    Refresh metadata from remote server
  reinstall [DEVICE-ID|GUID]        Reinstall current firmware on the device
  report-history                    Share firmware history with the developers
  security                          Gets the host security attributes
  set-approved-firmware FILENAME|CHECKSUM1[,CHECKSUM2][,CHECKSUM3]
                                    Sets the list of approved firmware
  switch-branch [DEVICE-ID|GUID] [BRANCH]
                                    Switch the firmware branch on the device
  sync-bkc                          Sync firmware versions to the host
best known configuration
  unblock-firmware [CHECKSUM]       Unblocks a specific firmware from
being installed
  unlock DEVICE-ID|GUID             Unlocks the device for firmware access
  update [DEVICE-ID|GUID]           Updates all specified devices to
latest firmware version, or all devices if unspecified
  upgrade [DEVICE-ID|GUID]          Alias to update
  verify [DEVICE-ID|GUID]           Checks cryptographic hash matches firmware
  verify-update [DEVICE-ID|GUID]    Update the stored cryptographic
hash with current ROM contents

Help Options:
  -h, --help                Show help options

Application Options:
  -v, --verbose             Show extra debugging information
  --version                 Show client and daemon versions
  --offline                 Schedule installation for next reboot when possible
  --allow-reinstall         Allow reinstalling existing firmware versions
  --allow-older             Allow downgrading firmware versions
  --allow-branch-switch     Allow switching firmware branch
  --force                   Force the action by relaxing some runtime checks
  -y, --assume-yes          Answer yes to all questions
  --sign                    Sign the uploaded data with the client certificate
  --no-unreported-check     Do not check for unreported history
  --no-metadata-check       Do not check for old metadata
  --no-remote-check         Do not check if download remotes should be enabled
  --no-reboot-check         Do not check or prompt for reboot after update
  --no-safety-check         Do not perform device safety checks
  --no-device-prompt        Do not prompt for devices
  --no-history              Do not write to the history database
  --show-all                Show all results
  --disable-ssl-strict      Ignore SSL strict checks when downloading files
  --ipfs                    Only use IPFS when downloading files
  --filter                  Filter with a set of device flags using a
~ prefix to exclude, e.g. 'internal,~needs-reboot'
  --json                    Output in JSON format

This tool allows an administrator to query and control the fwupd
daemon, allowing them to perform actions such as installing or
downgrading firmware.
_______________________________________________
users mailing list -- users@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to users-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/users@xxxxxxxxxxxxxxxxxxxxxxx
Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue



[Index of Archives]     [Older Fedora Users]     [Fedora Announce]     [Fedora Package Announce]     [EPEL Announce]     [EPEL Devel]     [Fedora Magazine]     [Fedora Summer Coding]     [Fedora Laptop]     [Fedora Cloud]     [Fedora Advisory Board]     [Fedora Education]     [Fedora Security]     [Fedora Scitech]     [Fedora Robotics]     [Fedora Infrastructure]     [Fedora Websites]     [Anaconda Devel]     [Fedora Devel Java]     [Fedora Desktop]     [Fedora Fonts]     [Fedora Marketing]     [Fedora Management Tools]     [Fedora Mentors]     [Fedora Package Review]     [Fedora R Devel]     [Fedora PHP Devel]     [Kickstart]     [Fedora Music]     [Fedora Packaging]     [Fedora SELinux]     [Fedora Legal]     [Fedora Kernel]     [Fedora OCaml]     [Coolkey]     [Virtualization Tools]     [ET Management Tools]     [Yum Users]     [Yosemite News]     [Gnome Users]     [KDE Users]     [Fedora Art]     [Fedora Docs]     [Fedora Sparc]     [Libvirt Users]     [Fedora ARM]

  Powered by Linux