Well I performed 2 downgrades. On the 2nd one it totally hung, saying 100% done and will reboot. It won't. Even holding the power button does nothing.
On Tue, Dec 20, 2022 at 10:27 AM Jeffrey Walton <noloader@xxxxxxxxx> wrote:
On Tue, Dec 20, 2022 at 10:18 AM Neal Becker <ndbecker2@xxxxxxxxx> wrote:
>
> Brand new lenovo x1 carbon.
>
> Today the "discover" sw update app suggest fw updates. I went ahead with them. Now wifi isn't working properly. At boot, I get a hang on
> Job NetworkManager-wait-online.service/start running
Sorry to hear that. I usually find the opposite is true... Newer
machines need the UEFI updates to get wifi working correctly.
> Then it will finish boot after some time, but only 2.4G wifi works. It won't connect to my 5GHz wifi, although it is detected.
>
> I tried an older kernel but got same results.
>
> I just received this laptop yesterday, I suppose I could try to return it. But is there maybe someway to revert the firmware updates? Or any other ideas?
>
I believe you can use fwupdmgr to remove the firmware update. I think
you want `fwupdmgr downgrade [DEVICE]`. I believe you can show the
devices with `fwupdmgr get-devices`. But for the downgrade, you may
get a numbered list, and only need to specify a number.
fwupdmgr is not well documented. The man pages suck, and there's not
much info out there on the web. The best questions/answers seem to
happen in the fwupdmgr bug reporter in GitHub. The next best set of
docs is from the --help option.
$ fwupdmgr --help
Usage:
fwupdmgr [OPTION…]
activate [DEVICE-ID|GUID] Activate devices
block-firmware [CHECKSUM] Blocks a specific firmware from
being installed
clear-results DEVICE-ID|GUID Clears the results from the last update
device-test [FILENAME1] [FILENAME2]
Test a device using a JSON manifest
disable-remote REMOTE-ID Disables a given remote
downgrade [DEVICE-ID|GUID] Downgrades the firmware on a device
download LOCATION Download a file
enable-remote REMOTE-ID Enables a given remote
get-approved-firmware Gets the list of approved firmware
get-blocked-firmware Gets the list of blocked firmware
get-details FILE Gets details about a firmware file
get-devices Get all devices that support
firmware updates
get-history Show history of firmware updates
get-plugins Get all enabled plugins registered
with the system
get-releases [DEVICE-ID|GUID] Gets the releases for a device
get-remotes Gets the configured remotes
get-results DEVICE-ID|GUID Gets the results from the last update
get-topology Alias to get-devices
get-updates [DEVICE-ID|GUID] Gets the list of updates for
connected hardware
get-upgrades [DEVICE-ID|GUID] Alias to get-updates
install FILE [DEVICE-ID|GUID] Install a firmware file on this hardware
modify-config KEY,VALUE Modifies a daemon configuration value
modify-remote REMOTE-ID KEY VALUE
Modifies a given remote
refresh [FILE FILE_SIG REMOTE-ID]
Refresh metadata from remote server
reinstall [DEVICE-ID|GUID] Reinstall current firmware on the device
report-history Share firmware history with the developers
security Gets the host security attributes
set-approved-firmware FILENAME|CHECKSUM1[,CHECKSUM2][,CHECKSUM3]
Sets the list of approved firmware
switch-branch [DEVICE-ID|GUID] [BRANCH]
Switch the firmware branch on the device
sync-bkc Sync firmware versions to the host
best known configuration
unblock-firmware [CHECKSUM] Unblocks a specific firmware from
being installed
unlock DEVICE-ID|GUID Unlocks the device for firmware access
update [DEVICE-ID|GUID] Updates all specified devices to
latest firmware version, or all devices if unspecified
upgrade [DEVICE-ID|GUID] Alias to update
verify [DEVICE-ID|GUID] Checks cryptographic hash matches firmware
verify-update [DEVICE-ID|GUID] Update the stored cryptographic
hash with current ROM contents
Help Options:
-h, --help Show help options
Application Options:
-v, --verbose Show extra debugging information
--version Show client and daemon versions
--offline Schedule installation for next reboot when possible
--allow-reinstall Allow reinstalling existing firmware versions
--allow-older Allow downgrading firmware versions
--allow-branch-switch Allow switching firmware branch
--force Force the action by relaxing some runtime checks
-y, --assume-yes Answer yes to all questions
--sign Sign the uploaded data with the client certificate
--no-unreported-check Do not check for unreported history
--no-metadata-check Do not check for old metadata
--no-remote-check Do not check if download remotes should be enabled
--no-reboot-check Do not check or prompt for reboot after update
--no-safety-check Do not perform device safety checks
--no-device-prompt Do not prompt for devices
--no-history Do not write to the history database
--show-all Show all results
--disable-ssl-strict Ignore SSL strict checks when downloading files
--ipfs Only use IPFS when downloading files
--filter Filter with a set of device flags using a
~ prefix to exclude, e.g. 'internal,~needs-reboot'
--json Output in JSON format
This tool allows an administrator to query and control the fwupd
daemon, allowing them to perform actions such as installing or
downgrading firmware.
_______________________________________________
users mailing list -- users@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to users-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/users@xxxxxxxxxxxxxxxxxxxxxxx
Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
Those who don't understand recursion are doomed to repeat it
_______________________________________________ users mailing list -- users@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe send an email to users-leave@xxxxxxxxxxxxxxxxxxxxxxx Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/users@xxxxxxxxxxxxxxxxxxxxxxx Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue