firmware-dell
firmware-dell copied to clipboard
Unable to update BIOS firmware for Dell laptop
Describe the bug
Unable to get my laptop Dell G3 3779 BIOS updated using UEFI capsule update to the latest firmware (which is 1.25.0 LVFS: G3 3X79) with consecutive fwupdmgr refresh --force && fwupdmgr update
.
Steps to Reproduce
fwupdmgr refresh --force && fwupdmgr update
- No message about successful update and no prompt to reboot.
It only shows:
[roman@roman-pc ~]$ fwupdmgr refresh --force
Updating lvfs
Downloading… [ - ]
Successfully downloaded new metadata: 1 local device supported
[roman@roman-pc ~]$ fwupdmgr update
Devices with no available firmware updates:
• Internal SPI Controller
• SC311 SATA 256GB
• ST2000LM007-1R8174
• System Firmware
• TPM
Devices with the latest available firmware version:
• UEFI dbx
Expected behavior messages about successful update and prompt to reboot.
fwupd version information
$ fwupdmgr --version
compile com.hughsie.libxmlb 0.3.19
compile org.freedesktop.Passim 0.1.8
compile com.hughsie.libjcat 0.2.1
compile org.freedesktop.fwupd 1.9.21
runtime org.freedesktop.fwupd-efi 1.6
compile org.freedesktop.gusb 0.4.9
runtime com.hughsie.libxmlb 0.3.19
runtime org.freedesktop.Passim 0.1.8
runtime org.freedesktop.gusb 0.4.9
runtime com.hughsie.libjcat 0.2.1
runtime org.kernel 6.9.5-1-MANJARO
runtime org.freedesktop.fwupd 1.9.21
Please note how you installed it (apt
, dnf
, pacman
, source, etc): - pacman
is a system package manager, but fwupd
was already preinstalled (in the box of Manjaro distro)
fwupd device information
$ fwupdmgr get-devices --show-all-devices
Dell Inc. G3 3779
│
├─Unknown Device:
│ Device ID: 880ca5b52bb1f9f4569cf18dd2aa13e694bba095
│ Serial Number: UHB1351000617
│ GUID: 0aba324a-ee0c-5ca1-87ab-ccc5ac7de0b6 ← DRM\VEN_PHL&DEV_C0C8
│
├─Unknown Device:
│ Device ID: aec1a869eb0df71b7cea6b3ac71d39b830faf164
│ GUID: 904f4dda-4cca-5da2-b249-2d9535e3c80f ← DRM\VEN_LGD&DEV_046E
│ Device Flags: • Internal device
│
├─Unknown Device:
│ Device ID: 4a4907dbb1b96c6a1177dfd1b95eb41c781d1265
│ GUID: 1199a818-4c52-5137-b536-d59e2e2cada9 ← GPIO\ID_INT3450:00
│
├─CoffeeLake-H GT2 [UHD Graphics 630]:
│ Device ID: 5792b48846ce271fab11c4a545f7a3df0d36e00a
│ Vendor: Intel Corporation (PCI:0x8086)
│ GUIDs: db677673-1102-5481-a11e-6f397e123ced ← PCI\VEN_8086&DEV_3E9B
│ 4fbcc576-2418-54cd-af5a-b116669676bc ← PCI\VEN_8086&DEV_3E9B&SUBSYS_10280886
│ Device Flags: • Internal device
│ • Cryptographic hash verification is available
│
├─Core™ i7-8750H CPU @ 2.20GHz:
│ Device ID: 4bde70ba4e39b28f9eab1628f9dd6e6244c03027
│ Current version: 0x000000f6
│ Vendor: Intel
│ GUIDs: 809a0b93-8a12-5338-a571-ad5583acf896 ← CPUID\PRO_0&FAM_06&MOD_9E
│ 72ec2ff3-49ff-5ec2-bdbb-525badd47543 ← CPUID\PRO_0&FAM_06&MOD_9E&STP_A
│ Device Flags: • Internal device
│
├─GP106M [GeForce GTX 1060 Mobile]:
│ Device ID: ce4c74a5188d5b9cdb1e72ed32dad2d313c1c999
│ Current version: a1
│ Vendor: NVIDIA Corporation (PCI:0x10DE, PCI:0x8086)
│ GUIDs: cde22f5a-dc11-5d34-9706-ad0f17ae538e ← PCI\VEN_10DE&DEV_1C20
│ 2a871d3d-eac4-50be-8aac-2e2cdf4935ae ← PCI\VEN_10DE&DEV_1C20&SUBSYS_10280886
│ d29269b6-e458-5f45-975c-9d52bb38e35f ← PCI\VEN_8086&DEV_1901
│ ea92a7f5-3338-57de-8163-bc4084834008 ← PCI\VEN_8086&DEV_1901&SUBSYS_10280886
│ Device Flags: • Internal device
│ • Cryptographic hash verification is available
│
├─Internal SPI Controller:
│ Device ID: b04e387fb80d2b91f37a4d0c7b21461c451775e1
│ Summary: Memory Technology Device
│ Vendor: DMI:Dell Inc.
│ GUIDs: 5f93d7e7-e282-59b9-b663-0146e382f8f6 ← MTD\NAME_0000:00:1f.5
│ b858f197-3e26-5077-a45c-69bb2ddd6a9e ← MTD\VENDOR_Dell-Inc.&NAME_0000:00:1f.5
│ a45551f5-d63e-5cf7-be94-aa2c8554cdab ← MTD\VENDOR_Dell-Inc.&PRODUCT_G3-3779&NAME_0000:00:1f.5
│ Device Flags: • Internal device
│ • Updatable
│ • Needs a reboot after installation
│ • Cryptographic hash verification is available
│
├─SC311 SATA 256GB:
│ Device ID: e421b2fc248391f6fe3e55ddbb3c9043be068bd0
│ Summary: ATA drive
│ Current version: 70000P10
│ Vendor: SK hynix (OUI:ace42e, ATA:0x1C5C)
│ Serial Number: MJ88N473811908P4D
│ GUIDs: cdd8cb3a-3604-5af9-a7db-f502a05214ed ← IDE\SK_hynix_SC311_SATA_256GB_______________70000P10
│ 64d370ac-e8e2-51c6-a419-3d02aacfe39b ← IDE\0SK_hynix_SC311_SATA_256GB_______________
│ db0a94bf-8c1a-587f-ae81-d43aab70f084 ← SK hynix SC311 SATA 256GB
│ Device Flags: • Internal device
│ • Updatable
│ • System requires external power source
│ • Needs a reboot after installation
│ • Device is usable for the duration of the update
│
├─ST2000LM007-1R8174:
│ Device ID: 5dbeb140337f610d54913c0f43d15fdaa0eafb51
│ Summary: ATA drive
│ Current version: SDM2
│ Vendor: Seagate (ATA:0x1BB1, OUI:000c50)
│ Serial Number: ZDZ3MS2X
│ GUIDs: 21c7f4c9-6549-5d01-9a87-9087548be5b1 ← IDE\ST2000LM007-1R8174______________________SDM2
│ a3cbe2af-31fd-5848-a7f9-44a95fa5f44d ← IDE\0ST2000LM007-1R8174______________________
│ 0f5e4f1e-1732-52a1-88d9-118952f0ffb3 ← ST2000LM007-1R8174
│ Device Flags: • Internal device
│ • Updatable
│ • System requires external power source
│ • Needs a reboot after installation
│ • Device is usable for the duration of the update
│
├─System Firmware:
│ │ Device ID: 5c01a81d9a3409541417190a6e66dca40a2c8936
│ │ Summary: UEFI System Resource Table device (updated via NVRAM)
│ │ Current version: 66049
│ │ Minimum Version: 66049
│ │ Vendor: Dell Inc. (DMI:Dell Inc.)
│ │ Update State: Failed
│ │ GUID: f51cadce-f4df-443a-bbda-083b64686028
│ │ Device Flags: • Internal device
│ │ • Updatable
│ │ • System requires external power source
│ │ • Needs a reboot after installation
│ │ • Cryptographic hash verification is available
│ │ • Device is usable for the duration of the update
│ │ Device Requests: • Message
│ │
│ └─UEFI dbx:
│ Device ID: 362301da643102b9f38477387e2193e57abaa590
│ Summary: UEFI revocation database
│ Current version: 371
│ Minimum Version: 371
│ Vendor: UEFI:Linux Foundation
│ Install Duration: 1 second
│ GUIDs: 4a6cd2cb-8741-5257-9d1f-89a275dacca7 ← UEFI\CRT_E28D59CA489BD2AD580F2EA5D62D6A29BB9C02AE5A818434A37DA7FC11DFF9E9&ARCH_X64
│ f8ba2887-9411-5c36-9cee-88995bb39731 ← UEFI\CRT_A1117F516A32CEFCBA3F2D1ACE10A87972FD6BBE8FE0D0B996E09E65D802A503&ARCH_X64
│ Device Flags: • Internal device
│ • Updatable
│ • Supported on remote server
│ • Needs a reboot after installation
│ • Device is usable for the duration of the update
│ • Only version upgrades are allowed
│ • Signed Payload
│
├─TPM:
│ Device ID: c6a80ac3a22083423992a3cb15018989f37834d6
│ Summary: TPM 2.0 Device
│ Current version: 401.1.0.0
│ Vendor: Intel (TPM:INTC)
│ GUIDs: 34801700-3a50-5b05-820c-fe14580e4c2d ← TPM\VEN_INTC&DEV_0000
│ 8e1cbc5d-5a11-5149-bfea-b6065d5296ba ← TPM\VEN_INTC&MOD_Intel
│ 03f304f4-223e-54f4-b2c1-c3cf3b5817c6 ← TPM\VEN_INTC&DEV_0000&VER_2.0
│ 52d7b679-db28-5bf7-bd87-41d77aeec600 ← TPM\VEN_INTC&MOD_Intel&VER_2.0
│ a36d9cdc-c2d2-5c6c-a5b3-d3e31dd1ac51 ← 0886-2.0
│ Device Flags: • Internal device
│ • Updatable
│ • System requires external power source
│ • Needs a reboot after installation
│ • Device can recover flash failures
│ • Full disk encryption secrets may be invalidated when updating
│ • Signed Payload
│
└─UEFI Platform Key:
Device ID: 6924110cde4fa051bfdc600a60620dc7aa9d3c6a
Summary: Dell Inc. Platform Key
Vendor: Dell Inc.
GUID: 5f7cc4ea-9f7a-5c5f-b535-dfbcc73f5ba6 ← UEFI\CRT_2493B118EABD632FD3BA49C333A8329B1982E872
System UEFI configuration
$ efibootmgr -v
BootCurrent: 0002
Timeout: 0 seconds
BootOrder: 0002,0001,0003
Boot0000* Windows Boot Manager HD(4,GPT,a7bf916b-1ae8-4dde-bb54-4186c234e881,0x6d42000,0x800000)/\EFI\Microsoft\Boot\bootmgfw.efi57494e444f5753000100000088000000780000004200430044004f0042004a004500430054003d007b00390064006500610038003600320063002d0035006300640064002d0034006500370030002d0061006300630031002d006600330032006200330034003400640034003700390035007d0000004b000100000010000000040000007fff0400
dp: 04 01 2a 00 04 00 00 00 00 20 d4 06 00 00 00 00 00 00 80 00 00 00 00 00 6b 91 bf a7 e8 1a de 4d bb 54 41 86 c2 34 e8 81 02 02 / 04 04 46 00 5c 00 45 00 46 00 49 00 5c 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 5c 00 42 00 6f 00 6f 00 74 00 5c 00 62 00 6f 00 6f 00 74 00 6d 00 67 00 66 00 77 00 2e 00 65 00 66 00 69 00 00 00 / 7f ff 04 00
data: 57 49 4e 44 4f 57 53 00 01 00 00 00 88 00 00 00 78 00 00 00 42 00 43 00 44 00 4f 00 42 00 4a 00 45 00 43 00 54 00 3d 00 7b 00 39 00 64 00 65 00 61 00 38 00 36 00 32 00 63 00 2d 00 35 00 63 00 64 00 64 00 2d 00 34 00 65 00 37 00 30 00 2d 00 61 00 63 00 63 00 31 00 2d 00 66 00 33 00 32 00 62 00 33 00 34 00 34 00 64 00 34 00 37 00 39 00 35 00 7d 00 00 00 4b 00 01 00 00 00 10 00 00 00 04 00 00 00 7f ff 04 00
Boot0001 ubuntu HD(1,GPT,934f8c22-4974-4d93-9b30-9c40a5abc86e,0x800,0x177000)/\EFI\ubuntu\shimx64.efi
dp: 04 01 2a 00 01 00 00 00 00 08 00 00 00 00 00 00 00 70 17 00 00 00 00 00 22 8c 4f 93 74 49 93 4d 9b 30 9c 40 a5 ab c8 6e 02 02 / 04 04 34 00 5c 00 45 00 46 00 49 00 5c 00 75 00 62 00 75 00 6e 00 74 00 75 00 5c 00 73 00 68 00 69 00 6d 00 78 00 36 00 34 00 2e 00 65 00 66 00 69 00 00 00 / 7f ff 04 00
Boot0002* Manjaro HD(1,GPT,934f8c22-4974-4d93-9b30-9c40a5abc86e,0x1000,0x96000)/\EFI\Manjaro\grubx64.efi
dp: 04 01 2a 00 01 00 00 00 00 10 00 00 00 00 00 00 00 60 09 00 00 00 00 00 22 8c 4f 93 74 49 93 4d 9b 30 9c 40 a5 ab c8 6e 02 02 / 04 04 36 00 5c 00 45 00 46 00 49 00 5c 00 4d 00 61 00 6e 00 6a 00 61 00 72 00 6f 00 5c 00 67 00 72 00 75 00 62 00 78 00 36 00 34 00 2e 00 65 00 66 00 69 00 00 00 / 7f ff 04 00
Boot0003 external PciRoot(0x0)/Pci(0x17,0x0)/Sata(1,65535,0)/HD(1,GPT,934f8c22-4974-4d93-9b30-9c40a5abc86e,0x1000,0x96000)/\EFI\boot\bootx64.efi
dp: 02 01 0c 00 d0 41 03 0a 00 00 00 00 / 01 01 06 00 00 17 / 03 12 0a 00 01 00 ff ff 00 00 / 04 01 2a 00 01 00 00 00 00 10 00 00 00 00 00 00 00 60 09 00 00 00 00 00 22 8c 4f 93 74 49 93 4d 9b 30 9c 40 a5 ab c8 6e 02 02 / 04 04 30 00 5c 00 45 00 46 00 49 00 5c 00 62 00 6f 00 6f 00 74 00 5c 00 62 00 6f 00 6f 00 74 00 78 00 36 00 34 00 2e 00 65 00 66 00 69 00 00 00 / 7f ff 04 00
efivar -l | grep fw
- gives no output
$ tree /boot
/boot
├── efi
│ ├── EFI
│ │ ├── boot
│ │ │ └── bootx64.efi
│ │ ├── Dell
│ │ │ └── logs
│ │ │ ├── diags_current.xml
│ │ │ └── diags_previous.xml
│ │ └── Manjaro
│ │ └── grubx64.efi
│ └── System Volume Information
│ ├── AadRecoveryPasswordDelete
│ └── ClientRecoveryPasswordRotation
├── grub
│ ├── fonts
│ │ └── unicode.pf2
│ ├── grub.cfg
│ ├── grubenv
│ ├── themes
│ │ └── starfield
│ │ ├── blob_w.png
│ │ ├── boot_menu_c.png
│ │ ├── boot_menu_e.png
│ │ ├── boot_menu_ne.png
│ │ ├── boot_menu_n.png
│ │ ├── boot_menu_nw.png
│ │ ├── boot_menu_se.png
│ │ ├── boot_menu_s.png
│ │ ├── boot_menu_sw.png
│ │ ├── boot_menu_w.png
│ │ ├── COPYING.CC-BY-SA-3.0
│ │ ├── dejavu_10.pf2
│ │ ├── dejavu_12.pf2
│ │ ├── dejavu_14.pf2
│ │ ├── dejavu_16.pf2
│ │ ├── dejavu_bold_14.pf2
│ │ ├── README
│ │ ├── slider_c.png
│ │ ├── slider_n.png
│ │ ├── slider_s.png
│ │ ├── starfield.png
│ │ ├── terminal_box_c.png
│ │ ├── terminal_box_e.png
│ │ ├── terminal_box_ne.png
│ │ ├── terminal_box_n.png
│ │ ├── terminal_box_nw.png
│ │ ├── terminal_box_se.png
│ │ ├── terminal_box_s.png
│ │ ├── terminal_box_sw.png
│ │ ├── terminal_box_w.png
│ │ └── theme.txt
│ └── x86_64-efi
│ ├── acpi.mod
│ ├── adler32.mod
│ ├── affs.mod
│ ├── afs.mod
│ ├── ahci.mod
│ ├── all_video.mod
│ ├── aout.mod
│ ├── appleldr.mod
│ ├── archelp.mod
│ ├── ata.mod
│ ├── at_keyboard.mod
│ ├── backtrace.mod
│ ├── bfs.mod
│ ├── bitmap.mod
│ ├── bitmap_scale.mod
│ ├── blocklist.mod
│ ├── boot.mod
│ ├── boottime.mod
│ ├── bsd.mod
│ ├── bswap_test.mod
│ ├── btrfs.mod
│ ├── bufio.mod
│ ├── cacheinfo.mod
│ ├── cat.mod
│ ├── cbfs.mod
│ ├── cbls.mod
│ ├── cbmemc.mod
│ ├── cbtable.mod
│ ├── cbtime.mod
│ ├── chain.mod
│ ├── cmdline_cat_test.mod
│ ├── cmp.mod
│ ├── cmp_test.mod
│ ├── command.lst
│ ├── configfile.mod
│ ├── core.efi
│ ├── cpio_be.mod
│ ├── cpio.mod
│ ├── cpuid.mod
│ ├── crc64.mod
│ ├── cryptodisk.mod
│ ├── crypto.lst
│ ├── crypto.mod
│ ├── cs5536.mod
│ ├── ctz_test.mod
│ ├── datehook.mod
│ ├── date.mod
│ ├── datetime.mod
│ ├── diskfilter.mod
│ ├── disk.mod
│ ├── div.mod
│ ├── div_test.mod
│ ├── dm_nv.mod
│ ├── echo.mod
│ ├── efifwsetup.mod
│ ├── efi_gop.mod
│ ├── efinet.mod
│ ├── efi_uga.mod
│ ├── ehci.mod
│ ├── elf.mod
│ ├── eval.mod
│ ├── exfat.mod
│ ├── exfctest.mod
│ ├── ext2.mod
│ ├── extcmd.mod
│ ├── f2fs.mod
│ ├── fat.mod
│ ├── file.mod
│ ├── fixvideo.mod
│ ├── font.mod
│ ├── fshelp.mod
│ ├── fs.lst
│ ├── functional_test.mod
│ ├── gcry_arcfour.mod
│ ├── gcry_blowfish.mod
│ ├── gcry_camellia.mod
│ ├── gcry_cast5.mod
│ ├── gcry_crc.mod
│ ├── gcry_des.mod
│ ├── gcry_dsa.mod
│ ├── gcry_idea.mod
│ ├── gcry_md4.mod
│ ├── gcry_md5.mod
│ ├── gcry_rfc2268.mod
│ ├── gcry_rijndael.mod
│ ├── gcry_rmd160.mod
│ ├── gcry_rsa.mod
│ ├── gcry_seed.mod
│ ├── gcry_serpent.mod
│ ├── gcry_sha1.mod
│ ├── gcry_sha256.mod
│ ├── gcry_sha512.mod
│ ├── gcry_tiger.mod
│ ├── gcry_twofish.mod
│ ├── gcry_whirlpool.mod
│ ├── geli.mod
│ ├── gettext.mod
│ ├── gfxmenu.mod
│ ├── gfxterm_background.mod
│ ├── gfxterm_menu.mod
│ ├── gfxterm.mod
│ ├── gptsync.mod
│ ├── grub.efi
│ ├── gzio.mod
│ ├── halt.mod
│ ├── hashsum.mod
│ ├── hdparm.mod
│ ├── hello.mod
│ ├── help.mod
│ ├── hexdump.mod
│ ├── hfs.mod
│ ├── hfspluscomp.mod
│ ├── hfsplus.mod
│ ├── http.mod
│ ├── iorw.mod
│ ├── iso9660.mod
│ ├── jfs.mod
│ ├── jpeg.mod
│ ├── keylayouts.mod
│ ├── keystatus.mod
│ ├── ldm.mod
│ ├── legacycfg.mod
│ ├── legacy_password_test.mod
│ ├── linux16.mod
│ ├── linux.mod
│ ├── loadbios.mod
│ ├── loadenv.mod
│ ├── loopback.mod
│ ├── lsacpi.mod
│ ├── lsefimmap.mod
│ ├── lsefi.mod
│ ├── lsefisystab.mod
│ ├── lsmmap.mod
│ ├── ls.mod
│ ├── lspci.mod
│ ├── lssal.mod
│ ├── luks.mod
│ ├── lvm.mod
│ ├── lzopio.mod
│ ├── macbless.mod
│ ├── macho.mod
│ ├── mdraid09_be.mod
│ ├── mdraid09.mod
│ ├── mdraid1x.mod
│ ├── memdisk.mod
│ ├── memrw.mod
│ ├── minicmd.mod
│ ├── minix2_be.mod
│ ├── minix2.mod
│ ├── minix3_be.mod
│ ├── minix3.mod
│ ├── minix_be.mod
│ ├── minix.mod
│ ├── mmap.mod
│ ├── moddep.lst
│ ├── modinfo.sh
│ ├── morse.mod
│ ├── mpi.mod
│ ├── msdospart.mod
│ ├── mul_test.mod
│ ├── multiboot2.mod
│ ├── multiboot.mod
│ ├── nativedisk.mod
│ ├── net.mod
│ ├── newc.mod
│ ├── nilfs2.mod
│ ├── normal.mod
│ ├── ntfscomp.mod
│ ├── ntfs.mod
│ ├── odc.mod
│ ├── offsetio.mod
│ ├── ohci.mod
│ ├── part_acorn.mod
│ ├── part_amiga.mod
│ ├── part_apple.mod
│ ├── part_bsd.mod
│ ├── part_dfly.mod
│ ├── part_dvh.mod
│ ├── part_gpt.mod
│ ├── partmap.lst
│ ├── part_msdos.mod
│ ├── part_plan.mod
│ ├── part_sun.mod
│ ├── part_sunpc.mod
│ ├── parttool.lst
│ ├── parttool.mod
│ ├── password.mod
│ ├── password_pbkdf2.mod
│ ├── pata.mod
│ ├── pbkdf2.mod
│ ├── pbkdf2_test.mod
│ ├── pcidump.mod
│ ├── pgp.mod
│ ├── play.mod
│ ├── png.mod
│ ├── priority_queue.mod
│ ├── probe.mod
│ ├── procfs.mod
│ ├── progress.mod
│ ├── raid5rec.mod
│ ├── raid6rec.mod
│ ├── random.mod
│ ├── read.mod
│ ├── reboot.mod
│ ├── regexp.mod
│ ├── reiserfs.mod
│ ├── relocator.mod
│ ├── romfs.mod
│ ├── scsi.mod
│ ├── search_fs_file.mod
│ ├── search_fs_uuid.mod
│ ├── search_label.mod
│ ├── search.mod
│ ├── serial.mod
│ ├── setjmp.mod
│ ├── setjmp_test.mod
│ ├── setpci.mod
│ ├── sfs.mod
│ ├── shift_test.mod
│ ├── shim_lock.mod
│ ├── signature_test.mod
│ ├── sleep.mod
│ ├── sleep_test.mod
│ ├── spkmodem.mod
│ ├── squash4.mod
│ ├── strtoull_test.mod
│ ├── syslinuxcfg.mod
│ ├── tar.mod
│ ├── terminal.lst
│ ├── terminal.mod
│ ├── terminfo.mod
│ ├── test_blockarg.mod
│ ├── testload.mod
│ ├── test.mod
│ ├── testspeed.mod
│ ├── tftp.mod
│ ├── tga.mod
│ ├── time.mod
│ ├── trig.mod
│ ├── tr.mod
│ ├── true.mod
│ ├── udf.mod
│ ├── ufs1_be.mod
│ ├── ufs1.mod
│ ├── ufs2.mod
│ ├── uhci.mod
│ ├── usb_keyboard.mod
│ ├── usb.mod
│ ├── usbms.mod
│ ├── usbserial_common.mod
│ ├── usbserial_ftdi.mod
│ ├── usbserial_pl2303.mod
│ ├── usbserial_usbdebug.mod
│ ├── usbtest.mod
│ ├── verifiers.mod
│ ├── video_bochs.mod
│ ├── video_cirrus.mod
│ ├── video_colors.mod
│ ├── video_fb.mod
│ ├── videoinfo.mod
│ ├── video.lst
│ ├── video.mod
│ ├── videotest_checksum.mod
│ ├── videotest.mod
│ ├── xfs.mod
│ ├── xnu.mod
│ ├── xnu_uuid.mod
│ ├── xnu_uuid_test.mod
│ ├── xzio.mod
│ ├── zfscrypt.mod
│ ├── zfsinfo.mod
│ └── zfs.mod
├── initramfs-6.6-x86_64-fallback.img
├── initramfs-6.6-x86_64.img
├── initramfs-6.8-x86_64-fallback.img
├── initramfs-6.8-x86_64.img
├── initramfs-6.9-x86_64-fallback.img
├── initramfs-6.9-x86_64.img
├── intel-ucode.img
├── linux66-x86_64.kver
├── linux68-x86_64.kver
├── linux69-x86_64.kver
├── memtest86+
│ └── memtest.bin
├── vmlinuz-6.6-x86_64
├── vmlinuz-6.8-x86_64
└── vmlinuz-6.9-x86_64
16 directories, 324 files
Additional questions
- Operating system and version: Kernel: 6.9.5-1-MANJARO arch: x86_64 bits: 64
- Have you tried rebooting? - yes
- Are you using an NVMe disk? - I don't think so
- Is secure boot enabled? - No
- Is this a Lenovo system with 'Boot Order Lock' turned on in the BIOS? - No