12th Gen Intel Core BIOS 3.08 Release

Why would that matter? The UEFI only sees the EFI System partition and its contents. There are regulated paths within that ESP where the UEFI may look for as of yet unknown executables (that is how USB sticks are recognized as EFI-bootable. By a FAT partition that contains /efi/boot/Bootx64.efi). UEFI can neither mount your Linux partition (at least it should not) nor does it need anything from it. The bootloader is on the EFI partition and has the job of finding all other partitions it needs and read from them whatever it needs to continue booting the OS of your choice.

CapsuleApp.efi is instructed to copy the capsule files to “THE” ESP partition. In the previous 3.08b EFI updater this was hardcoded to fs0, whatever fs0 happened to be on your system and it failed when fs0 was no ESP partition.

The 3.08d updater instructs CapsuleApp to choose automatically. CapsuleApp as an option -F to dump all ESP partitions it found and the one it chooses will be among them. Perhaps it does not recognize any of your partitions as valid for some reason or it recognizes more than one and is confused / makes the wrong choice. Creating an ESP partition on the USB stick itself should not be needed, as any sane system running from the NVMe should already have an ESP partition.
Whether the update works from an ESP behind a USB device, I do not know. It might not since that is not a typical use case. So I would suggest checking what ESP partitions CapsuleApp finds, to investigate further why the automatic choice might fail.

Edit:
Looking at the source-code of CapsuleApp (current master branch, so may be different if the CapsuleApp used was built from older sources) seems to base its automatic choice of ESP off of wherever bootnext points to. I think that should be your default boot option as configured in the BIOS. But if that makes the difference you may want to double check that.
Edit2:
Previous answer was incomplete. It does look at the bootnext option. But that is not typically expected to be set. In that case it iterates over all boot options for the first one that uses an ESP.
Oh, and the files are written to \efi\UpdateCapsule\
/Edit

You are aware that Framework has established a proud history of not meeting the various estimates that they gave for progressing a firmware version to release and yet remaining completely quiet and not even confirming any issue that is a blocker to a release? So calling this a “procedure” is a bit of an overstatement.
The last timeframe they announced for 12th gen was those 2 weeks for the 3.08 updater from January. And there were only crickets for months and then a hastily released version without announcement in this thread of the wrong installer. The 3.06 beta before stretched this uncertainty windows to like a year.
And I also believe I have shown that Framework’s release notes for firmware updates can neither be relied upon for solved issues nor for known issues. They only ever seem to reflect some arbitrary snapshot in time and are never kept up-to-date with what is actually known. So the first part of your post has also been disproven by Framework themselves on this very update…

5 Likes

It shouldn’t. But believe it or not, I’ve encountered situations where other operating systems can’t write their bootloader (or whatever you want to call it) to the esp because they expect an efi directory on the esp (cd efi) and only then add their respective subdirectory (mkdir -p whatever). So, have Windows installed or mount your esp in Linux (your main OS) at /bootefi directory almost certainly exists on the esp, mount it at /boot/efi (and don’t use Windows) → probably no efi directory directly on the esp. I admit that’s an edge case but having had to troubleshoot that situation for several hours some years ago made it stick in my mind.

Could you point me to the source code? It seems I’m too stupid to find it in the framework github repositories.

https://github.com/tianocore/edk2/blob/master/MdeModulePkg/Application/CapsuleApp/CapsuleApp.c

Its not Frameworks code. Its part of the EDK2 where the entire EFI Shell is also from.

I have not researched this fully. But to my knowledge it is convention to have that efi folder on the ESP. But it does not actually matter, because any OS is supposed to manage its own UEFI boot entry that just contains the path to whatever file on the ESP it wants to have booted. So as long as the boot entry matches the path inside the ESP that was actually used its fine.
And the only actually necessary path is efi/boot/bootx64.efi as that is what is autodetected by the UEFI on removable devices such that they do not need to have a boot-entry preconfigured. And such removable storage also does not need an ESP partition, but just any FAT partition with a compatible UEFI executable at that path (which means only one executable per partition and not multiple as possible in an ESP).

UEFI Boot Entries
BootOrder: 0002,0001
Boot0001  UEFI OS       HD(1,GPT,41ee612a-d2ca-4999-bf03-f1e0aeb26936,0x800,0x12c000)/File(\EFI\BOOT\BOOTX64.EFI)..BO
Boot0002* CentOS Linux  HD(1,GPT,41ee612a-d2ca-4999-bf03-f1e0aeb26936,0x800,0x12c000)/File(\EFI\CENTOS\SHIMX64.EFI)
2 Likes

Hey @alex_fixeurs sorry for late reply, was fully occupied by work. Unfortunately it doesn’t work for me either. I have also tried formatting the drive as GPT and create an EFI System partition on the drive with the same result.

I also tried using different ports on left and right as you mentioned to @Gronkdalonka . I used the USB-A adapter. :thinking:

1 Like

Hmmm, why would that matter? The BIOS update is happening from the USB stick and don’t think it really touches the OS system partition where fstab file is saved. :thinking: If it does for some reason, I have ESP mounted on /boot.

EDIT: nwm read through the rest of the comments :slight_smile:

1 Like

Thanks so much for the screenshot. It is helpful.
Looking at your screenshot and the error output, I think you can manually recover this by doing the following, but if you can run the debug steps I listed below first to collect information for us it would be helpful. .

  1. when you get to the terminal, hit esc to drop to the shell.
  2. look at the top of the screen. You have your internal NVME drive as FS1. And your usb drive as FS0. (You can see they mention the device type in the path)
  3. type FS0: to switch to your usb drive.
  4. type: CapsuleApp.efi winux.bin firmwarehdr.cap -OD FS1

This will force installing the capsule on your NVME EFI partition.

Technical Background is as follows:
The firmware update process is as follows:

  1. When the capsule update is installed, it is copied to the ESP partition of the boot drive. The system does a cpu reset, and then applies the update early on in the boot process, so it needs to be saved to the disk so it is not lost during cpu reset. The capsule can be stored on any disk with a fat32 partition, but we have found some drives are not recognized early on in boot, so the best partition is the one on your NVME drive.

The early detection of the boot drive is critical to the previous 3.06 updater we released, as it required rebooting the system several times, and having the usb drive be recognized so the system can run the next steps of the update. However based on customer feedback we found that many people have usb flash drives that take longer to initialize, and will not be recognized. When this happens the bios will clear the boot variable as the drive is not found, and then immediately boot to the OS part way through the update.

We found the EDK2 updater allows us to chain several capsules together to install them all at the same time, which gets around the problem of the usb drive not being recognized.

Based on the error message, it looks like the updater is getting a little confused as it seems you have the EFI variable BootNext defined. But in your case the BootNext variable is pointing to an invalid partition.

The capsuleapp will check if the variable OsIndications is set, this is a special variable which indicates to the bios that an update should be applied. If this is set the updater will check if the variable BootNext is set, and use this to stage our bios update on the same partition as the current pending update. If these are not present/set then the updater will look at all the partitions on your system, and try to select the best one.

I think you might be hitting a case where there was a failed update, or linux installed an update (such as DBX) and then something went wrong and this variable was never cleared.

I would be interested in getting these variables. In Linux, you can look at the variables as a root user in /sys/firmware/efi/efivars
It would be interesting to see your Boot* variables, BootNext, and OsIndications variables. (They will all have a long string -GUID on the end of the variable name). OsIndications is binary, so you can get it by piping to xxd. file

Could you gather the contents of your ESP partition by running as root: ls -R /boot/efi/EFI/

Could you also see if there is a folder in your usb drive you used to update that is /EFI/CapsuleUpdate/

I would suggest trying the following to try to recover if the method above does not work.

  1. boot to your bios setup menu (F2), and then go into the setup menu->save and exit. Load optimal defaults. then reboot and try to install again.
  2. you could try deleting the OsIndications variable by removing the associated file /sys/firmware/efi/efivars/ in linux and then try installing again.
7 Likes

Though I don’t have an intel Framework, I really like all this technical information. This can undoubtedly help other end users with their updates, too. All of this information is good to know.

2 Likes

Is there any work being done so that the firmware update can one day be done through LVFS ?
I have been waiting for it since I want to get my hands on the newer battery because I don’t want to meddle with a potentially messy beta update procedure but if that’s never going to happen, I’d like to know.

1 Like

Btw. Everything, except ME firmware could / is already updated through LVFS.
Framework could make 3.08 available via LVFS. And the only thing missing would be that you need to manually run an executable for the ME firmware update (maybe even the one used on the EFI installer that we already have). They could do that immediately if they wanted.
The Windows updater essentially already does this, it can just automate both of those steps together, while LVFS does not allow this (shipping the update through Windows update like most vendors do might also not be available for the same reasons as for LVFS).

And the ME problem seems solved for 13th gen that can update ME firmware with capsules, so that additional installer is no longer needed. Whether it is sensible to backport those fixes to 12th gen and how it updates itself I do not know. It is most likely possible, but there may be technical reasons to discourage touching this, depending on whether that is part of a recovery solution to recover from interrupted/broken updates.

4 Likes

Thank you for providing this info. I ran into the same problem. I’m now good to go.

Found a meme that summarises this whole thread

7 Likes

I am having what I think is the same issue. I am running Fedora 40 (single boot but formerly dual-booted with Windows 11). My main partition is LUKS encrypted, but that shouldn’t affect boot or efi, right?

I’ve tried the official way, and I have tried your suggestions, so they may influence the result. I deleted OsIndications, but it appears to have regenerated.
It’s worth noting I got the usb-PD updates by running Startup.nsh after I typed FS1:, but the firmware wouldn’t install because Framework_Tool was not found (presumable because it is on FS0, the USB drive). When I ran FS0: and then CapsuleApp.efi winux.bin firmwarehdr.cap -OD FS1, I got some messages indicating that the UpdateCapsule contents were transferred to /boot/efi, and in fact there is a new /boot/efi/EFI/UpdateCapsule folder (yes, EFI is repeated, first lowercase, then capital), and it contains firewarehdr.cap and winux.bin, but after it transferred them, without any visible error, it would just boot my computer into grub. I don’t know how to finish the firmware install.

Anways, answers to your questions:

  1. efivars (I don’t know what piping to xxd. file is)
/sys/firmware/efi/efivars:
AcpiGlobalVariable-c020489e-6db2-4ef2-9aa5-ca06fc11d36a
ArbSvnInfo-643d5856-c4f9-4abe-9c27-331ae36639aa
BoardInfoSetup-1e785e1a-8ec4-49e4-8275-fbbdeded18e7
Boot0000-8be4df61-93ca-11d2-aa0d-00e098032b8c
Boot0001-8be4df61-93ca-11d2-aa0d-00e098032b8c
Boot0002-8be4df61-93ca-11d2-aa0d-00e098032b8c
Boot2001-8be4df61-93ca-11d2-aa0d-00e098032b8c
Boot2002-8be4df61-93ca-11d2-aa0d-00e098032b8c
Boot2003-8be4df61-93ca-11d2-aa0d-00e098032b8c
BootCurrent-8be4df61-93ca-11d2-aa0d-00e098032b8c
BootOptionSupport-8be4df61-93ca-11d2-aa0d-00e098032b8c
BootOrder-8be4df61-93ca-11d2-aa0d-00e098032b8c
BRDS-42780dd5-9a7d-404c-80e4-7f7094360394
BugCheckCode-ba57e015-65b3-4c3c-b274-659192f699e3
BugCheckParameter1-ba57e015-65b3-4c3c-b274-659192f699e3
BugCheckProgress-ba57e015-65b3-4c3c-b274-659192f699e3
certdb-59d1c24f-50f1-401a-b101-f33e0daed443
certdbv-59d1c24f-50f1-401a-b101-f33e0daed443
COMPAL-b697de83-1ab6-42c4-9dee-a806c637818b
ConIn-8be4df61-93ca-11d2-aa0d-00e098032b8c
ConInCandidateDev-59d1c24f-50f1-401a-b101-f33e0daed443
ConInDev-8be4df61-93ca-11d2-aa0d-00e098032b8c
ConOut-8be4df61-93ca-11d2-aa0d-00e098032b8c
ConOutCandidateDev-59d1c24f-50f1-401a-b101-f33e0daed443
ConOutDev-8be4df61-93ca-11d2-aa0d-00e098032b8c
CpuSetup-b08f97ff-e6e8-4193-a997-5e9e9b0adb32
CpuSetupVolatileData-b08f97ff-e6e8-4193-a997-5e9e9b0adb32
CrConfig-7ec07b9f-66e3-43d4-9b52-38fbb46390cc
CrConfigDefault-7ec07b9f-66e3-43d4-9b52-38fbb46390cc
CrDevVar0-7ec07b9f-66e3-43d4-9b52-38fbb46390cc
CrDevVar1-7ec07b9f-66e3-43d4-9b52-38fbb46390cc
CrDevVar2-7ec07b9f-66e3-43d4-9b52-38fbb46390cc
CrPolicy-7ec07b9f-66e3-43d4-9b52-38fbb46390cc
CurrentPolicy-77fa9abd-0359-4d32-bd60-28f4e78f784b
Custom-4570b7f1-ade8-4943-8dc3-406472842384
Custom-5432122d-d034-49d2-a6de-65a829eb4c74
Custom-72c5e28c-7783-43a1-8767-fad73fccafa4
Custom-a04a27f4-df00-4d42-b552-39511302113d
Custom-aaf8e719-48f8-4099-a6f7-645fbd694c3d
Custom-b08f97ff-e6e8-4193-a997-5e9e9b0adb32
Custom-ec87d643-eba4-4bb5-a1e5-3f3e36b20da9
CustomPlatformLang-59d1c24f-50f1-401a-b101-f33e0daed443
CustomSecurity-59d1c24f-50f1-401a-b101-f33e0daed443
db-d719b2cb-3d3a-4596-a3bc-dad00e67656f
dbDefault-8be4df61-93ca-11d2-aa0d-00e098032b8c
dbx-d719b2cb-3d3a-4596-a3bc-dad00e67656f
dbxDefault-8be4df61-93ca-11d2-aa0d-00e098032b8c
ErrOutDev-8be4df61-93ca-11d2-aa0d-00e098032b8c
EWRD-92daaf2f-c02b-455b-b2ec-f5a3594f4aea
FeData-1f2d63e1-febd-4dc7-9cc5-ba2b1cef9c5b
FirstBootAfterFlash-59d1c24f-50f1-401a-b101-f33e0daed443
FullReset-59d1c24f-50f1-401a-b101-f33e0daed443
GPC-42780dd5-9a7d-404c-80e4-7f7094360394
GPC-92daaf2f-c02b-455b-b2ec-f5a3594f4aea
H2OFormDialogConfig-98ae8272-ce5a-46be-9f5d-d9f9cbbb99f2
IhisiParamBuffer-92e59835-5f42-4e0b-9a84-47c7810ea806
InitSetupVariable-ec87d643-eba4-4bb5-a1e5-3f3e36b20da9
IntelVmdOsVariable-61a14fe8-4dab-4a19-b1e3-97fb23d09212
IP6_CONFIG_IFR_NVDATA-02eea107-98db-400e-9830-460a1542d799
KEK-8be4df61-93ca-11d2-aa0d-00e098032b8c
KEKDefault-8be4df61-93ca-11d2-aa0d-00e098032b8c
Kernel_Lsa_Ppl_Config-77fa9abd-0359-4d32-bd60-28f4e78f784b
Lang-8be4df61-93ca-11d2-aa0d-00e098032b8c
LangCodes-8be4df61-93ca-11d2-aa0d-00e098032b8c
MebxCfg-ed6d18b3-16bd-40d8-8950-f0c592f6fa16
MemoryOverwriteRequestControl-e20939be-32d4-41be-a150-897f85d49829
MemoryOverwriteRequestControlLock-bb983ccf-151d-40e1-a07b-4a17be168292
MemoryTypeInformation-4c19049f-4137-4dd3-9c10-8b97a83ffdfa
MeSetup-5432122d-d034-49d2-a6de-65a829eb4c74
MeSetupStorage-5432122d-d034-49d2-a6de-65a829eb4c74
MeSetupStorageCustom-5432122d-d034-49d2-a6de-65a829eb4c74
MokListRT-605dab50-e046-4300-abb6-3dd810dd8b23
MokListTrustedRT-605dab50-e046-4300-abb6-3dd810dd8b23
MokListXRT-605dab50-e046-4300-abb6-3dd810dd8b23
MotherBoardHealth-ea1fcaee-3a77-4bb8-9b98-518e75d29a99
MsdmAddress-fd21bf2b-f5d1-46c5-aee3-c60158339239
MTC-eb704011-1402-11d3-8e77-00a0c969723b
NetworkSetup-a04a27f4-df00-4d42-b552-39511302113d
NhltEndpointsTableConfigurationVariable-a1d89a3a-4a90-429d-4365-1f64c3a29614
OfflineUniqueIDEKPubCRC-eaec226f-c9a3-477a-a826-ddc716cdc0e3
OfflineUniqueIDEKPub-eaec226f-c9a3-477a-a826-ddc716cdc0e3
OsIndications-8be4df61-93ca-11d2-aa0d-00e098032b8c
OsIndicationsSupported-8be4df61-93ca-11d2-aa0d-00e098032b8c
PasswordConfig-f72deef6-13ef-4958-b027-0e45ce7fa45e
PchSetup-4570b7f1-ade8-4943-8dc3-406472842384
PciBusSetup-ec87d643-eba4-4bb5-a1e5-3f3e36b20da9
PhysicalBootOrder-59d1c24f-50f1-401a-b101-f33e0daed443
PK-8be4df61-93ca-11d2-aa0d-00e098032b8c
PKDefault-8be4df61-93ca-11d2-aa0d-00e098032b8c
PlatformLang-8be4df61-93ca-11d2-aa0d-00e098032b8c
PlatformLangCodes-8be4df61-93ca-11d2-aa0d-00e098032b8c
RestoreFactoryDefault-59d1c24f-50f1-401a-b101-f33e0daed443
S3MemoryVariable-973218b9-1697-432a-8b34-4884b5dfb359
SADS-42780dd5-9a7d-404c-80e4-7f7094360394
SADS-92daaf2f-c02b-455b-b2ec-f5a3594f4aea
SaSetup-72c5e28c-7783-43a1-8767-fad73fccafa4
SbatLevelRT-605dab50-e046-4300-abb6-3dd810dd8b23
SecureBoot-8be4df61-93ca-11d2-aa0d-00e098032b8c
SecureBootData-aa1305b9-01f3-4afb-920e-c9b979a852fd
SecureBootEnforce-59d1c24f-50f1-401a-b101-f33e0daed443
SecureFlashInfo-382af2bb-ffff-abcd-aaee-cce099338877
SetPcrBanks-8376bdca-5e03-4735-951a-4a74141e5886
Setup-a04a27f4-df00-4d42-b552-39511302113d
SetupCpuFeatures-ec87d643-eba4-4bb5-a1e5-3f3e36b20da9
Setup-ec87d643-eba4-4bb5-a1e5-3f3e36b20da9
SetupMode-8be4df61-93ca-11d2-aa0d-00e098032b8c
SignatureSupport-8be4df61-93ca-11d2-aa0d-00e098032b8c
SiSetup-aaf8e719-48f8-4099-a6f7-645fbd694c3d
SPLC-92daaf2f-c02b-455b-b2ec-f5a3594f4aea
TbtRetimer1Version-567ce681-487d-42ff-b875-38c963e5bb4c
TbtRetimer2Version-125622a2-2aeb-4930-a5a4-e2b9955b6d9e
TbtSetupVolatileData-ec87d643-eba4-4bb5-a1e5-3f3e36b20da9
Tcg2ConfigInfo-07a66697-d400-4903-b3da-67a61d2b7058
Tcg2PhysicalPresence-aeb9c5c1-94f1-4d02-bfd9-4602db2d3c54
Tcg2PhysicalPresenceFlags-aeb9c5c1-94f1-4d02-bfd9-4602db2d3c54
Timeout-8be4df61-93ca-11d2-aa0d-00e098032b8c
UnlockIDCopy-eaec226f-c9a3-477a-a826-ddc716cdc0e3
VarErrorFlag-04b37fe8-f6ae-480b-bdd5-37d98c5e89aa
VendorKeys-8be4df61-93ca-11d2-aa0d-00e098032b8c
WAND-92daaf2f-c02b-455b-b2ec-f5a3594f4aea
WGDS-92daaf2f-c02b-455b-b2ec-f5a3594f4aea
WIFI_MANAGER_IFR_NVDATA-3441803e-5a88-4941-82f0-858a1085276c
WRDD-92daaf2f-c02b-455b-b2ec-f5a3594f4aea
WRDS-92daaf2f-c02b-455b-b2ec-f5a3594f4aea
  1. Contents of ESP partition:
/boot/efi/EFI/:
Boot  fedora  UpdateCapsule

/boot/efi/EFI/Boot:
BOOTIA32.EFI  bootx64.efi  fbia32.efi  fbx64.efi

/boot/efi/EFI/fedora:
BOOTIA32.CSV  gcdx64.efi       grubia32.efi  mmx64.efi     shimx64.efi
BOOTX64.CSV   grub.cfg         grubx64.efi   shim.efi
gcdia32.efi   grubenv.rpmsave  mmia32.efi    shimia32.efi

/boot/efi/EFI/UpdateCapsule:
firmwarehdr.cap  winux.bin
  1. There is NOT a folder on the usb drive /EFI/CapsuleUpdate/

Something strange happened here. These files should not be coped with these names to this folder.

The CapsuleApp will copy these, and name them to UpdateCapsule000x, so was this a manual attempt? Can you try to remove these two files and try again?

2 Likes

I deleted them (along with the OsIndications efivar) and tried again. Same as before. When the computer rebooted, I was still on 3.04, and the firmwarehdr.cap and winux.bin files were recreated. Linking a video to show what happened. Like before, there were no error messages. Just a near-instantaneous reboot.

Could the issue be some sort of interruption? Is it possible they have been copied over, but not yet renamed when it reboots? For your information, I pressed no other buttons. I would think if it had to stop because of an error or lack of space, it would show a panic message before the reboot, but while it goes by quickly, I don’t think I see an error message.

2 Likes

Please keep this thread on topic. The aim of this thread is for people to report successes/issues with updating to this BIOS release through the various updating methods. This will allow the team to make improvements if necessary and allow others to receive support.

4 Likes

I’m using GDP G1 and it was working fine with 3.06. It doesn’t work with 3.08. There were many NixOS updates before I got to this eGPU after 3.08 update, so I’m not absolutery sure that the BIOS update is the reason.


Updated with 3.08d through UEFI + updated retimers. eGPU still doesn’t work.

framework tools
framework_tool --versions
UEFI BIOS
  Version:        03.08
  Release Date:   12/25/2023
EC Firmware
  Build version:  "hx30_v0.0.1-4ea1c89 2023-12-11 14:15:35 runner@fv-az1124-221"
  RO Version:     "hx30_v0.0.1-4ea1c89"
  RW Version:     "hx30_v0.0.1-4ea1c89"
  Current image:  RO
PD Controllers
  Right (01)
    Main   App:     0.1.44 (Notebook)
    Backup App:     0.1.44 (Notebook)
  Left  (23)
    Main   App:     0.1.44 (Notebook)
    Backup App:     0.1.44 (Notebook)
Retimers
  Left:           0x136 (310)
  Right:          0x136 (310)
CSME
  Enabled:        true
  Version:        0:16.1.30.2269
  Recovery Ver:   0:16.1.30.2269
  Original Ver:   0:16.0.15.1810
dmesg

[ 5.010315] pcieport 0000:00:07.3: pciehp: Slot(6): Link Down
[ 5.010324] pcieport 0000:00:07.3: pciehp: Slot(6): Card not present
[ 5.010335] pcieport 0000:7e:04.0: Unable to change power state from D3hot to D0, device inaccessible
[ 5.010959] pcieport 0000:7e:04.0: Runtime PM usage count underflow!
[ 5.010987] xhci_hcd 0000:82:00.0: remove, state 1
[ 5.010996] usb usb6: USB disconnect, device number 1
[ 5.011000] usb 6-1: USB disconnect, device number 2
[ 5.011654] xhci_hcd 0000:82:00.0: USB bus 6 deregistered
[ 5.011663] xhci_hcd 0000:82:00.0: xHCI host controller not responding, assume dead
[ 5.011730] xhci_hcd 0000:82:00.0: remove, state 1
[ 5.011735] usb usb5: USB disconnect, device number 1
[ 5.011737] usb 5-1: USB disconnect, device number 2
[ 5.012150] xhci_hcd 0000:82:00.0: Host halt failed, -19
[ 5.012153] xhci_hcd 0000:82:00.0: Host not accessible, reset failed.
[ 5.012547] xhci_hcd 0000:82:00.0: USB bus 5 deregistered

. . . Disconnecting device

[ 459.567079] thunderbolt 1-0:3.1: retimer disconnected
[ 459.568183] thunderbolt 1-3: device disconnected

. . . Plugging it back in

[ 576.786862] thunderbolt 1-0:3.1: new retimer found, vendor=0x8087 device=0x15ee
[ 577.428496] thunderbolt 1-3: new device found, vendor=0x8086 device=0x11
[ 577.428504] thunderbolt 1-3: Intel Tapex Creek
[ 583.949613] usb usb2-port4: attempt power cycle
[ 592.405478] usb usb2-port4: unable to enumerate USB device

1 Like

I tried to execute the command manually but no success. The laptop restarts and boot directly into Ubuntu

I send you my efivars via pm

/boot/efi/EFI/:
BOOT
ubuntu
UpdateCapsule

/boot/efi/EFI/BOOT:
BOOTX64.EFI
fbx64.efi
mmx64.efi

/boot/efi/EFI/ubuntu:
BOOTX64.CSV
grub.cfg
grubx64.efi
mmx64.efi
shimx64.efi

/boot/efi/EFI/UpdateCapsule:
firmwarehdr.cap
retimer01.cap
retimer23.cap
winux.bin

no CapsuleUpdate folder:

/media/xxx/Transcend/:
CapsuleApp.efi
CyPDADlt1.efi
efi
firmware.cap
firmwarehdr.cap
Framework_Laptop_12th_Gen_Intel_Core_Retimer_port01_310.cap
Framework_Laptop_12th_Gen_Intel_Core_Retimer_port23_310.cap
Framework_Laptop_13_12th_Gen_Intel_Core_3.08d_EFI.zip
framework_tool.efi
FWupdate.bin
FWupdate.txt
FWUpdLcl.efi
h2offt.efi
pd01.rom
pd23.rom
updateretimers.nsh
winux.bin

/media/xxx/Transcend/efi:
boot

/media/xxx/Transcend/efi/boot:
Bootx64.efi
Startup.nsh

I try 1 and 2 but no but no success. The laptop always restarts and boots directly into Ubuntu

1 Like

Could you try going to the F2 bios setup menu, and go to save and exit, apply optimal defaults, and then try again? This should reset all BIOS settings to default. There may be some strange state held that this could reset and allow your update to work correctly.

1 Like

I did this before I recorded the video and reported my results.

Is secure boot enabled???