Closed heftig closed 1 year ago
@CragW can you have a look as a priority please.
The release has just been corrected, @heftig please check at your convenience.
Thanks @CragW -- much appreciated.
The suspicious update has disappeared and fwupd is back to reporting my firmware as up-to-date. Many thanks.
@CragW I think this bad firmware update actually got installed on my system (Ubuntu 22.04 on Dell XPS 9320). On Friday, as part of the normal Ubuntu updates, I was notified that there was a BIOS update. The system updated BIOS automatically, and then I started having all kinds of issues (video glitches, camera not working, etc.). If I go into the boot menu (F12) now, my system reports a BIOS version of 2.0.0 (which shouldn't exist, right?). Any advice?
@tcquinn can you fwupdmgr downgrade
to the previous version? If not, @CragW needs to help I'm afriad.
You can download the current firmware (an .exe file) and copy it to the EFI System Partition, probably /boot/efi/
. Then select the file with the BIOS Update utility you can access via F12 at boot.
@hughsie @heftig Thanks for the suggestions. There was a whole directory tree of existing stuff under /boot/efi
and I didn't want to screw any of that up, so I downloaded the current firmware (1.11.0) to a flash drive and tried to flash from that. I got a message that says "Firmware Update is not permitted. The BIOS flash is not compatible with the current system." (image of screen here if helpful)
Strange that it doesn't seem to be able to parse the file at all, reporting no system or revision for it. Was it damaged? It should have the sha256sum c676ed424eb2f0c57bb82734da2096a79410fa662beaaa37664a5d8e7d257665
.
@heftig Yes. sha256sum XPS_9320_1_11_0.exe
yields c676ed424eb2f0c57bb82734da2096a79410fa662beaaa37664a5d8e7d257665 XPS_9320_1_11_0.exe
I suppose it's possible that there's some problem with flashing from a USB flash drive, but it found the flash drive and I was able to navigate to the file and select it.
It's possible to disable BIOS downgrading in the setup. Maybe check that setting.
Putting a file into /boot/efi/ should be harmless as long as the partition has enough space left. The upgrade/downgrade itself will write some recovery files about 38M big.
Actually, try selecting the file /EFI/Dell/bios/recovery/BIOS_PRE.rcv
, if it exists. That should be the previous firmware.
@heftig Thank you. Flashing from /EFI/Dell/bios/recovery/BIOS_PRE.rcv
worked in the sense that it appeared to successfully flash the BIOS and the BIOS version is now listed as 1.11.0 both in the boot manager and in my Linux system. However, the video glitches that started on Friday after the update are persisting. Maybe the "2.0.0" BIOS changed settings somewhere that I need to change back? Maybe some components of the "2.0.0" firmware didn't get downgraded? (I noticed that for some components, like "ME", it simply said that my firmware was "up to date").
I heard that 2.0.0 has the same components as 1.11.0, just the version increasing for a new branch. It is unlikely a fwupd issue here.
@CragW Interesting. The problems are at a pretty basic hardware IO level (bands of random pixels across the screen when I move the mouse, camera stopped working) and they started right after this BIOS update installed. It's a strange coincidence. I'll try to dig further into the logs.
@CragW In case you have two more seconds, here is the apt
log from the moment when I think everything went haywire, in case anything catches your eye. Note the Dell hardware support packages updating.
Start-Date: 2023-02-18 09:35:34
Commandline: aptdaemon role='role-commit-packages' sender=':1.162'
Install: linux-modules-ipu6-5.19.0-32-generic:amd64 (5.19.0-32.33~22.04.1, automatic), linux-modules-ipu6-generic-hwe-22.04:amd64 (5.19.0.32.33~22.04.9, automatic), linux-modules-ivsc-5.19.0-32-generic:amd64 (5.19.0-32.33~22.04.1, automatic), linux-modules-ivsc-generic-hwe-22.04:amd64 (5.19.0.32.33~22.04.9, automatic)
Upgrade: containerd.io:amd64 (1.6.16-1, 1.6.18-1), language-pack-en-base:amd64 (1:22.04+20220721, 1:22.04+20230209), gnome-initial-setup:amd64 (42.0.1-1ubuntu2.2, 42.0.1-1ubuntu2.3), google-chrome-stable:amd64 (110.0.5481.77-1, 110.0.5481.100-1), firmware-sof-signed:amd64 (2.0-1ubuntu4, 2.0-1ubuntu4.1), alsa-ucm-conf:amd64 (1.2.6.3-1ubuntu1.3, 1.2.6.3-1ubuntu1.4), ubuntu-advantage-desktop-daemon:amd64 (1.9~22.04.1, 1.10~22.04.1), language-pack-en:amd64 (1:22.04+20220721, 1:22.04+20230209), language-pack-gnome-en-base:amd64 (1:22.04+20220721, 1:22.04+20230209), base-files:amd64 (12ubuntu4.2, 12ubuntu4.3), oem-somerville-tentacool-meta:amd64 (22.04ubuntu5, 22.04ubuntu6), language-pack-gnome-en:amd64 (1:22.04+20220721, 1:22.04+20230209), ubuntu-advantage-tools:amd64 (27.12~22.04.1, 27.13.5~22.04.1), oem-somerville-factory-tentacool-meta:amd64 (22.04ubuntu5, 22.04ubuntu6)
End-Date: 2023-02-18 09:35:59
@tcquinn The same thing happened on my Dell XPS 9320. Firmware got flashed through automatic update. I am using Fedora instead, but the issues are the same. The camera stopped working after the update to 2.0.0 and random horizontal pixel lines appear occasionally. Downgrading to 1.11.0 did not fix my camera issue. Is there a solution for that?
@MaikHerrmann At least for me, the video artifacts turned out to be related not to the erroneous firmware update (confusingly), but rather to the (near-simultaneous) push of kernel version 5.19. There is a temporary fix here which might help even though you're on Fedora.
Hey all, I have updated my firmware to 2.0.0
. **I don't have any issues***, should I downgrade my firmware anyway?
Basically, my question is: will Dell publish new versions 1.x.x
in the future? Because if 1.12.0
is published for instance, then I guess my system will ignore it.
* apart from the video artifacts, but that's been proven unrelated.
Hey all, I have updated my firmware to
2.0.0
. **I don't have any issues***, should I downgrade my firmware anyway?Basically, my question is: will Dell publish new versions
1.x.x
in the future? Because if1.12.0
is published for instance, then I guess my system will ignore it.
- apart from the video artifacts, but that's been proven unrelated.
Not necessary, there is no longer 1.x.x version for XPS 9320 in the future, you could stay with 2.0.0 and it's the latest version by now.
I'm being offered a suspicious update for the Dell XPS 9320 system firmware which is not available via the support website (still at 1.11.0).
The description suggests it is for yet-to-be-released hardware and should not apply to my laptop, which has a 12th gen (Alder Lake), not a 13th gen (Raptor Lake) processor.
Expected behavior
Offered firmware updates match the ones available via Dell's support website.
fwupd version information
Installed via Pacman on Arch Linux.
fwupd device information
``` > fwupdmgr get-devices --show-all-devices Dell Inc. XPS 9320 │ ├─VEN 04F3:00 04F3:31D1: │ Device ID: cc9c1b47c3126a46379087db3bf18fa324f317ae │ Summary: Touchpad │ Current version: 0x0005 │ Bootloader Version: 0x0001 │ Vendor: ELAN Microelectronics (HIDRAW:0x04F3) │ GUIDs: fadadb06-b338-5cb3-b768-a15defd32971 ← HIDRAW\VEN_04F3&DEV_31D1 │ 835dde6a-99f7-5396-8fc3-2d81a5a7a46f ← HIDRAW\VEN_04F3&DEV_31D1&REV_00 │ 5e04b78f-9251-5cde-9a8d-8c4165bfe0bd ← HIDRAW\VEN_04F3&DEV_31D1&MOD_00A1 │ 4296cbee-f355-5bf6-b62d-a6a286b69414 ← ELANTP\ICTYPE_10 │ 876410d6-a4ff-5907-9e7e-35a82748ebd2 ← ELANTP\ICTYPE_10&MOD_00A1 │ 541f5907-b97b-5260-b293-a0028a370450 ← ELANTP\ICTYPE_10&MOD_00A1&DRIVER_HID │ Device Flags: • Internal device │ • Updatable │ ├─Unknown Device: │ Device ID: 6b5a06645e27c4e94b6e67d5185c46d11ec9ad67 │ GUID: c96751f4-16e8-59ea-975d-69d3dac88d7d ← GPIO\ID_INTC1055:00 │ ├─0000:00:1f.5: │ Device ID: b04e387fb80d2b91f37a4d0c7b21461c451775e1 │ Summary: Memory Technology Device │ Vendor: DMI:Dell Inc. │ GUIDs: 5f93d7e7-e282-59b9-b663-0146e382f8f6 ← MTD\NAME_0000:00:1f.5 │ b858f197-3e26-5077-a45c-69bb2ddd6a9e ← MTD\VENDOR_Dell-Inc.&NAME_0000:00:1f.5 │ 601a687c-b5fe-5ee8-9cdc-06239cd61e90 ← MTD\VENDOR_Dell-Inc.&PRODUCT_XPS-9320&NAME_0000:00:1f.5 │ Device Flags: • Internal device │ • Updatable │ • Needs a reboot after installation │ • Cryptographic hash verification is available │ ├─12th Gen Intel Core™ i7-1260P: │ Device ID: 4bde70ba4e39b28f9eab1628f9dd6e6244c03027 │ Current version: 0x00000429 │ Vendor: Intel │ GUIDs: b9a2dd81-159e-5537-a7db-e7101d164d3f ← cpu │ 30249f37-d140-5d3e-9319-186b1bd5cac3 ← CPUID\PRO_0&FAM_06 │ ab855c04-4ff6-54af-8a8a-d8193daa0cd8 ← CPUID\PRO_0&FAM_06&MOD_9A │ 3ebbde86-d03e-549a-a8fd-02ebf9aa537a ← CPUID\PRO_0&FAM_06&MOD_9A&STP_3 │ Device Flags: • Internal device │ ├─Alder Lake-P Integrated Graphics Controller: │ Device ID: 5792b48846ce271fab11c4a545f7a3df0d36e00a │ Current version: 0c │ Vendor: Intel Corporation (PCI:0x8086) │ GUIDs: eaad9970-8e4d-56da-88ab-41a8c1e2811f ← PCI\VEN_8086&DEV_46A6 │ ed0b9458-c2f1-54c5-9063-dea8f75b4039 ← PCI\VEN_8086&DEV_46A6&REV_0C │ b0644b40-1cb2-5813-a376-983ce2870cb4 ← PCI\VEN_8086&DEV_46A6&SUBSYS_10280AF3 │ 9a0442d9-20a9-5704-85c5-497052ef7671 ← PCI\VEN_8086&DEV_46A6&SUBSYS_10280AF3&REV_0C │ c4625510-a985-517c-8800-0ecfc6f68c8f ← PCI\VEN_8086&DEV_46A6&REV_00 │ 2cd82a9e-b697-561a-8cf4-8faad1682af5 ← PCI\VEN_8086&DEV_46A6&SUBSYS_10280AF3&REV_00 │ Device Flags: • Internal device │ • Cryptographic hash verification is available │ ├─PC801 NVMe SK hynix 1TB: │ Device ID: 71b677ca0f1bc2c5b804fa1d59e52064ce589293 │ Summary: NVM Express solid state drive │ Current version: 51002141 │ Vendor: SK hynix (NVME:0x1C5C) │ Serial Number: SNB4N484111504C62 │ GUIDs: f8fa0185-7878-521a-b61c-b191955b501f ← STORAGE-DELL-111350 │ 80860c6c-dfb3-11eb-ba80-0242ac130004 │ Device Flags: • Internal device │ • Updatable │ • System requires external power source │ • Needs a reboot after installation │ • Device is usable for the duration of the update │ • Signed Payload │ ├─System Firmware: │ │ Device ID: a45df35ac0e948ee180fe216a5f703f32dda163f │ │ Summary: UEFI ESRT device │ │ Current version: 1.11.0 │ │ Minimum Version: 1.11.0 │ │ Vendor: Dell (DMI:Dell Inc.) │ │ Update State: Success │ │ GUIDs: 8b8c05a5-31bc-5fa4-9624-24b13f8f6043 │ │ 230c8b18-8d9b-53ec-838b-6cfc0383493a ← main-system-firmware │ │ Device Flags: • Internal device │ │ • Updatable │ │ • System requires external power source │ │ • Supported on remote server │ │ • Needs a reboot after installation │ │ • Cryptographic hash verification is available │ │ • Device is usable for the duration of the update │ │ │ ├─BootGuard Configuration: │ │ Device ID: b0d4430dfa6bde9f0c22680df36dbc8c15c80753 │ │ Current version: 01 │ │ Vendor: Intel Corporation (MEI:0x8086) │ │ GUIDs: dd17041c-09ea-4b17-a271-5b989867ec65 │ │ fccad2fe-62ae-5879-b7a9-4ead7bce50f4 ← MEI\VEN_8086&DEV_51E0 │ │ 4837b81a-56c3-501f-8b4c-1e71882379fe ← MEI\VEN_8086&DEV_51E0&REV_01 │ │ 3e44fe7a-3454-56d6-a2e0-11aa60918d7e ← MEI\VEN_8086&DEV_51E0&SUBSYS_10280AF3 │ │ 94351172-1147-54db-af1e-bacfcc5cc0d7 ← MEI\VEN_8086&DEV_51E0&SUBSYS_10280AF3&REV_01 │ │ Device Flags: • Internal device │ │ │ ├─UEFI Platform Key: │ │ Device ID: 6924110cde4fa051bfdc600a60620dc7aa9d3c6a │ │ Summary: Platform Key │ │ GUID: ef992d47-bfb1-5088-8512-e0e78b920516 ← UEFI\CRT_C847A9D0F19D488552B9E8D5445A3CC176DB3C53 │ │ │ └─UEFI dbx: │ Device ID: 362301da643102b9f38477387e2193e57abaa590 │ Summary: UEFI revocation database │ Current version: 211 │ Minimum Version: 211 │ Vendor: UEFI:Linux Foundation │ Install Duration: 1 second │ GUIDs: b72753d6-adb0-5209-9f6e-c7e326fc2d4e ← UEFI\CRT_8F47714808736A963728707ADD1E507EF17690B3CECDF1957E32D0A760EBA3EC │ a2c80b6e-30f3-52d8-b4c9-30f7edb11987 ← UEFI\CRT_8F47714808736A963728707ADD1E507EF17690B3CECDF1957E32D0A760EBA3EC&ARCH_X64 │ Device Flags: • Internal device │ • Updatable │ • Needs a reboot after installation │ • Device is usable for the duration of the update │ • Only version upgrades are allowed │ • Signed Payload │ ├─TPM: │ Device ID: c6a80ac3a22083423992a3cb15018989f37834d6 │ Current version: 1.258.0.0 │ Vendor: ST Microelectronics (TPM:STM) │ GUIDs: ff71992e-52f7-5eea-94ef-883e56e034c6 ← system-tpm │ 84df3581-f896-54d2-bd1a-372602f04c32 ← TPM\VEN_STM&DEV_0001 │ bfaed10a-bbc1-525b-a329-35da2f63e918 ← TPM\VEN_STM&MOD_ │ 70b7b833-7e1a-550a-a291-b94a12d0f319 ← TPM\VEN_STM&DEV_0001&VER_2.0 │ 06f005e9-cb62-5d1a-82d9-13c534c53c48 ← TPM\VEN_STM&MOD_&VER_2.0 │ Device Flags: • Internal device │ ├─TPM 2.0: │ Device ID: a3487e128cf1413519bce8e9a1ab3f5981e61458 │ Summary: UEFI ESRT device │ Current version: 0.1.1.2 │ Vendor: Dell Inc. (PCI:0x1028) │ Update State: Success │ GUIDs: 3a754159-ba3b-50d3-8f32-d323a449f815 ← 0af3-2.0 │ ff71992e-52f7-5eea-94ef-883e56e034c6 ← system-tpm │ 73730635-f6c2-53da-9df2-948bb5ac1022 ← DELL-TPM-2.0-STM- │ Device Flags: • Internal device │ • Updatable │ • System requires external power source │ • Needs a reboot after installation │ ├─UEFI Device Firmware: │ Device ID: 349bb341230b1a86e5effe7dfe4337e1590227bd │ Summary: UEFI ESRT device │ Current version: 1059 │ Minimum Version: 1059 │ Vendor: DMI:Dell Inc. │ Update State: Success │ GUID: e72475a2-b8f0-4217-bbea-3304b187ae54 │ Device Flags: • Internal device │ • Updatable │ • System requires external power source │ • Needs a reboot after installation │ • Device is usable for the duration of the update │ ├─UEFI Device Firmware: │ Device ID: 2292ae5236790b47884e37cf162dcf23bfcd1c60 │ Summary: UEFI ESRT device │ Current version: 1358963009 │ Minimum Version: 1358963009 │ Vendor: DMI:Dell Inc. │ Update State: Success │ GUID: 80860c6c-dfb3-11eb-ba80-0242ac130004 │ Device Flags: • Internal device │ • Updatable │ • System requires external power source │ • Needs a reboot after installation │ • Device is usable for the duration of the update │ ├─USB4 Retimer: │ Device ID: fa7ebe94a3e7265f44a1d3346dffe26f29f1be42 │ Summary: A physical layer protocol-aware, software-transparent extension device that forms two separate electrical link segments │ Current version: 10.00 │ Vendor: Intel (THUNDERBOLT:0x8087) │ GUIDs: e6f2e4ac-f76a-5fc4-b36a-6f9cb548689e ← THUNDERBOLT\VEN_8087&DEV_15EE │ f00257c8-0e09-5a32-bbb3-f49748ae6cc5 ← THUNDERBOLT\VEN_8087&DEV_15EE&REV_00 │ dfeacc0a-7af4-5460-ab40-22ed630568de ← TBT-808715ee-retimer1-0:1.1 │ Device Flags: • Internal device │ • Updatable │ • Device stages updates │ ├─USB4 host controller: │ Device ID: bd45c8598c8ed529762ec4740ed0168dd8516324 │ Summary: Unmatched performance for high-speed I/O │ Vendor: INTEL (THUNDERBOLT:0x8087) │ GUIDs: 5041b15d-6e1c-5681-86b3-bb1d56993357 ← THUNDERBOLT\VEN_8087&DEV_463E │ d651f364-21d8-5cc3-9790-dd019a8958ef ← THUNDERBOLT\VEN_8087&DEV_463E&REV_00 │ e72e778e-94f7-5ed2-b560-1c1262ee217c ← TBT-fixed │ Device Flags: • Internal device │ • System requires external power source │ • Signed Payload │ └─USB4 host controller: Device ID: 98e99efb23380994929ff93cbd82229b9a395611 Summary: Unmatched performance for high-speed I/O Vendor: INTEL (THUNDERBOLT:0x8087) GUIDs: 5041b15d-6e1c-5681-86b3-bb1d56993357 ← THUNDERBOLT\VEN_8087&DEV_463E d651f364-21d8-5cc3-9790-dd019a8958ef ← THUNDERBOLT\VEN_8087&DEV_463E&REV_00 e72e778e-94f7-5ed2-b560-1c1262ee217c ← TBT-fixed Device Flags: • Internal device • System requires external power source • Signed Payload ```