Well I performed 2 downgrades. On the 2nd one it totally hung, saying 100% done and will reboot. It won't. Even holding the power button does nothing.
On Tue, Dec 20, 2022 at 10:27 AM Jeffrey Walton <noloa...@gmail.com> wrote: > On Tue, Dec 20, 2022 at 10:18 AM Neal Becker <ndbeck...@gmail.com> wrote: > > > > Brand new lenovo x1 carbon. > > > > Today the "discover" sw update app suggest fw updates. I went ahead > with them. Now wifi isn't working properly. At boot, I get a hang on > > Job NetworkManager-wait-online.service/start running > > Sorry to hear that. I usually find the opposite is true... Newer > machines need the UEFI updates to get wifi working correctly. > > > Then it will finish boot after some time, but only 2.4G wifi works. It > won't connect to my 5GHz wifi, although it is detected. > > > > I tried an older kernel but got same results. > > > > I just received this laptop yesterday, I suppose I could try to return > it. But is there maybe someway to revert the firmware updates? Or any > other ideas? > > > > I believe you can use fwupdmgr to remove the firmware update. I think > you want `fwupdmgr downgrade [DEVICE]`. I believe you can show the > devices with `fwupdmgr get-devices`. But for the downgrade, you may > get a numbered list, and only need to specify a number. > > fwupdmgr is not well documented. The man pages suck, and there's not > much info out there on the web. The best questions/answers seem to > happen in the fwupdmgr bug reporter in GitHub. The next best set of > docs is from the --help option. > > $ fwupdmgr --help > Usage: > fwupdmgr [OPTION…] > > activate [DEVICE-ID|GUID] Activate devices > block-firmware [CHECKSUM] Blocks a specific firmware from > being installed > clear-results DEVICE-ID|GUID Clears the results from the last update > device-test [FILENAME1] [FILENAME2] > Test a device using a JSON manifest > disable-remote REMOTE-ID Disables a given remote > downgrade [DEVICE-ID|GUID] Downgrades the firmware on a device > download LOCATION Download a file > enable-remote REMOTE-ID Enables a given remote > get-approved-firmware Gets the list of approved firmware > get-blocked-firmware Gets the list of blocked firmware > get-details FILE Gets details about a firmware file > get-devices Get all devices that support > firmware updates > get-history Show history of firmware updates > get-plugins Get all enabled plugins registered > with the system > get-releases [DEVICE-ID|GUID] Gets the releases for a device > get-remotes Gets the configured remotes > get-results DEVICE-ID|GUID Gets the results from the last update > get-topology Alias to get-devices > get-updates [DEVICE-ID|GUID] Gets the list of updates for > connected hardware > get-upgrades [DEVICE-ID|GUID] Alias to get-updates > install FILE [DEVICE-ID|GUID] Install a firmware file on this > hardware > modify-config KEY,VALUE Modifies a daemon configuration value > modify-remote REMOTE-ID KEY VALUE > Modifies a given remote > refresh [FILE FILE_SIG REMOTE-ID] > Refresh metadata from remote server > reinstall [DEVICE-ID|GUID] Reinstall current firmware on the > device > report-history Share firmware history with the > developers > security Gets the host security attributes > set-approved-firmware FILENAME|CHECKSUM1[,CHECKSUM2][,CHECKSUM3] > Sets the list of approved firmware > switch-branch [DEVICE-ID|GUID] [BRANCH] > Switch the firmware branch on the > device > sync-bkc Sync firmware versions to the host > best known configuration > unblock-firmware [CHECKSUM] Unblocks a specific firmware from > being installed > unlock DEVICE-ID|GUID Unlocks the device for firmware access > update [DEVICE-ID|GUID] Updates all specified devices to > latest firmware version, or all devices if unspecified > upgrade [DEVICE-ID|GUID] Alias to update > verify [DEVICE-ID|GUID] Checks cryptographic hash matches > firmware > verify-update [DEVICE-ID|GUID] Update the stored cryptographic > hash with current ROM contents > > Help Options: > -h, --help Show help options > > Application Options: > -v, --verbose Show extra debugging information > --version Show client and daemon versions > --offline Schedule installation for next reboot when > possible > --allow-reinstall Allow reinstalling existing firmware versions > --allow-older Allow downgrading firmware versions > --allow-branch-switch Allow switching firmware branch > --force Force the action by relaxing some runtime > checks > -y, --assume-yes Answer yes to all questions > --sign Sign the uploaded data with the client > certificate > --no-unreported-check Do not check for unreported history > --no-metadata-check Do not check for old metadata > --no-remote-check Do not check if download remotes should be > enabled > --no-reboot-check Do not check or prompt for reboot after update > --no-safety-check Do not perform device safety checks > --no-device-prompt Do not prompt for devices > --no-history Do not write to the history database > --show-all Show all results > --disable-ssl-strict Ignore SSL strict checks when downloading files > --ipfs Only use IPFS when downloading files > --filter Filter with a set of device flags using a > ~ prefix to exclude, e.g. 'internal,~needs-reboot' > --json Output in JSON format > > This tool allows an administrator to query and control the fwupd > daemon, allowing them to perform actions such as installing or > downgrading firmware. > _______________________________________________ > users mailing list -- users@lists.fedoraproject.org > To unsubscribe send an email to users-le...@lists.fedoraproject.org > Fedora Code of Conduct: > https://docs.fedoraproject.org/en-US/project/code-of-conduct/ > List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines > List Archives: > https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org > Do not reply to spam, report it: > https://pagure.io/fedora-infrastructure/new_issue > -- *Those who don't understand recursion are doomed to repeat it*
_______________________________________________ users mailing list -- users@lists.fedoraproject.org To unsubscribe send an email to users-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue