ok

Mini Shell

Direktori : /proc/thread-self/root/proc/self/root/usr/share/locale/zh_CN/LC_MESSAGES/
Upload File :
Current File : //proc/thread-self/root/proc/self/root/usr/share/locale/zh_CN/LC_MESSAGES/fwupd.mo

�����!8-,9-f-x-�-�-�-�-�-�-.*.=.J.Z.v.�.
�. �.�.	�.>�.//HE/Z�/�/�/
�/0Y0p04�0�0�0�0�0�01!1':1b1}1�1�1�1=�1#2-+2Y2(y26�2�2�2"3/3B3%U3{3�3�3#�3J�3D)4Rn49�4?�4D;5@�5-�5G�5A76Hy6�6 �6�677-7E7/X7�7�7�7�7�7	�74�7"8@8*H8s8|8�8�8�8�8'�899+939,<9i9y9�9�9�9�9�9�9�9	�9
�9!
:,:3<:p:3�:�:/�:�:;;!;];r;-�;0�;,�;(<,F<3s<�<�<�<�<�<#=26=.i= �=�=#�=$�=C">7f>'�>?�>??#(? L?m??�?�?�?�?3�?@'@;@C@^@u@.}A	�A
�A!�A
�A�A 
B'+B!SBuBzB"�B�B �B&�BDCIC\CvCA�C�C�C�CD!)DKDdDzD�D�D�D"�D�DE E:EZEcEvE�E\�E�EF%F<FMFbF~F��FE9GG3�G/�G:�G/H05H&fH�H�H
�H'�H-�H2I"EIhI!�I"�I!�I/�IJ%:J
`J#kJ�J�J�J �J�J�J/�J!%K*GKrKp�KL#L(8L-aL/�L�L�L�L M =M^MuM�M�M�M�M�MN)N:NLN
_NjNzN�N�N	�N�N�N
�N�N�N/�N0%OVOcO
yO�O�O!�O�O
�O�OPPP+P 7PXP_PrP@P�P,�P%�P#Q;QVQrQ�Q!�Q�Q!�Q�Q�QR&R4<RqR�R=�R�R*�RS	.S
8SFSIS$dS!�S�S�S�S,�ST'T=T'FTnTvT~T�T$�T�T�T�TU(UGUPUeU!qU	�U�U"�U%�U,�U'V
:VEV#RVvV(�V�V�V�V	�V)W
1W<W*VW�W�W�W�W0�WX+'X1SX0�X@�X@�X8YRYaYuY�Y	�Y!�Y2�Y5�Y3#Z
WZeZzZ�Z�Z�Z
�Z$�Z"�Z*![L[][7}[*�[�[#�[ \ <\]\&}\1�\.�\
]]&2]2Y]	�]�]�]*�]�],�]^" ^C^&`^)�^�^�^)�^_(4_%]_@�_&�_�_	�_�_`(`7`(T`%}`�`�`�`�`�`�`#�`7a)=b[gb5�b@�bK:c#�c�c>�c,d�5d#�d)#e<MeC�e��efdf+�fI�fAgSg-Xg�g?�g�g4�g"h4hEhbhxh1�h�h�h�h!�hi&
i4i&Ei3li	�i	�i�i�i�iE�i#j/j>Hj1�j0�j�j�jk k:kuMk�k�k�k(l/lFlOlWl]lxl�l�l�l�l
�l�l$�l+�l
m
*m{5ml�m
n)n:nTnnn�n:�n�n�n
�no(p;pKp_prp�p�p�p�p�p�p�pq*q@qYq
iqwq�q	�q=�q�q7r:9r	tr~r	�r�r$�r	�r�r	�r�r�rsss$s=sYsrs�s!�s�s6�st'tEt'^t'�t�t�t�t�tu+u>uTujuzu0�u*�u<�u'2v*Zv0�v'�v�v0�v*+w0Vw�w�w�w�w�w�wxx2xExLx_xxx	x/�x+�x	�x'�x	y!y1yAyWymy*zy�y�y�y�y�y�y
zz)z6zIzPzozvz	�z�z�z�z�z�z'{){<{[{n{*�{�{�{!�{!�{|5|!Q|s|	�|�|�|�|�|�|'}-9}g}�}�}�}*�}0�}'0~0X~	�~�~�~"�~�~=D3Y��	�����!ƀ	�����.�J� c�������+��	���+�O>�������CԂ	�"�5�Q�p�������҃߃��%�=�J�i�	��������a��
�(�B�[�n�{���F��D�0�!=�_�<~���0†���/�(4�-]�*��*������5�*Q�!|�$��Èψ�����!�	=�&G�n�!����sʼn9�!F�!h�'��'��ڊ���4�S�r�������Ћ�	�&�C�T�e�
y�����������	��ʌьތ	�-��-,�Z�g�z�������ݍ��	���
*�
5�@�Y�]�
m�4{���7�����-�I�b���������	ҏ܏��*�@�P�?f�����ؐ	�	����!�?�U�k���*����֑�6��1�	8�B�R�+b�������ÒӒ	�����/�8�(I�$r�$����ғ�'���'7�_�$~�����$��
��%	�/�E�X�n�'����ȕ4�0�9M�9����ږ���
�
�  �%A�0g�*��×ӗ����	,�	6�@�_�{���$��*Ҙ���/�K�d�}���'��!ߙ��!*�'L�t�{���'����#̚����&�!E�g�}�������؛��*�	1�;�T�d�t�����ɜМ��	����� ��Q-�-�8��?�&�B�6[�*�����&N�&u�1��6Πp�^v�$աA��<�I�'P�x�8��ʢ/��"�4�J�f�$��	������ţ	���$�<>�	{�	��������A�����/�!N�*p���"��˥���f�	{�)��*��"ڦ��	
���&�D�	K�U�e�	l�v���$��$����K�dL�����ͨ���!:�\�c������ys��5W������0���-�b��{��������Odp����"�)�����'�����O�S/��|3M+P4$L�NRQn<��cIFu��!^�}�M�Y�F<�?W�G��7(�	����=�sb&t��q"�]1�
�L���.m�����o+=�#A��A�G�{�E�r2��^:!����f��kB\9$�k%
JigR��� _z�����
t����j_q�>U�V��������%d���wT\hv��h����gp8�j�	X����.�C����E�6'c`,4���[�ZlPK�����`���~����v��*��7�a�@����o-�����(����)�����S����@�;�V8��
�K����]|����l���Z�*�1�����6�r��05��e�w>	��e����U���:Y�3y2��;�?��m����n�Ji��/,HBI�z#�H�����DD���� ��uT�����[}�9
�x
&x��Q�X�CN�a~�f�%.0f minute remaining%.0f minutes remaining%s Battery Update%s CPU Microcode Update%s Camera Update%s Configuration Update%s Consumer ME Update%s Controller Update%s Corporate ME Update%s Device Update%s Embedded Controller Update%s Keyboard Update%s ME Update%s Mouse Update%s Network Interface Update%s Storage Controller Update%s System Update%s TPM Update%s Thunderbolt Controller Update%s Touchpad Update%s Update%s and all connected devices may not be usable while updating.%s manufacturing mode%s must remain connected for the duration of the update to avoid damage.%s must remain plugged into a power source for the duration of the update to avoid damage.%s override%s v%s%s version%u day%u days%u device has a firmware upgrade available.%u devices have a firmware upgrade available.%u hour%u hours%u local device supported%u local devices supported%u minute%u minutes%u second%u seconds(obsoleted)A single GUIDGUIDAction Required:Activate devicesActivate pending devicesActivate the new firmware on the deviceActivating firmware updateActivating firmware update forAgeAgree and enable the remote?Alias to %sAll devices of the same type will be updated at the same timeAllow downgrading firmware versionsAllow reinstalling existing firmware versionsAllow switching firmware branchAn update requires a reboot to complete.An update requires the system to shutdown to complete.Answer yes to all questionsApply firmware updatesApply update even when not advisedApply update filesApplying update…Approved firmware:Approved firmware:Ask again next time?Attach to firmware modeAuthenticating…Authentication details are requiredAuthentication is required to downgrade the firmware on a removable deviceAuthentication is required to downgrade the firmware on this machineAuthentication is required to modify a configured remote used for firmware updatesAuthentication is required to modify daemon configurationAuthentication is required to set the list of approved firmwareAuthentication is required to sign data using the client certificateAuthentication is required to switch to the new firmware versionAuthentication is required to unlock a deviceAuthentication is required to update the firmware on a removable deviceAuthentication is required to update the firmware on this machineAuthentication is required to update the stored checksums for the deviceAutomatic ReportingAutomatically upload every time?BUILDER-XML FILENAME-DSTBYTESBind new kernel driverBlocked firmware files:Blocking firmware:Blocks a specific firmware from being installedBootloader VersionBranchBuild a firmware fileBuild firmware using a sandboxCancelCancelledCannot apply as dbx update has already been applied.Cannot apply updates on live mediaChangedChecks cryptographic hash matches firmwareChecksumChoose a branch:Choose a device:Choose a firmware type:Choose a release:Choose a volume:Clears the results from the last updateCommand not foundConvert a firmware fileCreatedCriticalCryptographic hash verification is availableCurrent versionDEVICE-ID|GUIDDFU UtilityDebugging OptionsDecompressing…DescriptionDetach to bootloader modeDetailsDevice FlagsDevice IDDevice added:Device can recover flash failuresDevice changed:Device firmware is required to have a version checkDevice is lockedDevice is required to install all provided releasesDevice is unreachableDevice is usable for the duration of the updateDevice removed:Device stages updatesDevice supports switching to a different branch of firmwareDevice update methodDevice update needs activationDevice will backup firmware before installingDevice will not re-appear after update completesDevices that have been updated successfully:Devices that were not updated correctly:Devices with no available firmware updates: Devices with the latest available firmware version:DisabledDisabled fwupdate debuggingDisables a given remoteDisplay versionDo not check for old metadataDo not check for unreported historyDo not check if download remotes should be enabledDo not check or prompt for reboot after updateDo not include log domain prefixDo not include timestamp prefixDo not perform device safety checksDo not write to the history databaseDo you understand the consequences of changing the firmware branch?Do you want to disable this feature for future updates?Do you want to refresh this remote now?Do you want to upload reports automatically for future updates?Done!Downgrade %s from %s to %s?Downgrades the firmware on a deviceDowngrading %s from %s to %s... Downgrading %s…Download a fileDownloading…Dump SMBIOS data from a fileDurationESP specified was not validEnable firmware update support on supported systemsEnable new remote?Enable this remote?EnabledEnabled fwupdate debuggingEnables a given remoteEnabling this functionality is done at your own risk, which means you have to contact your original equipment manufacturer regarding any problems caused by these updates. Only problems with the update process itself should be filed at $OS_RELEASE:BUG_REPORT_URL$.Enabling this remote is done at your own risk.EncryptedEncrypted RAMErase all firmware update historyErasing…Exit after a small delayExit after the engine has loadedExport a firmware file structure to XMLExtract a firmware blob to imagesFILEFILE [DEVICE-ID|GUID]FILE-IN FILE-OUT [SCRIPT] [OUTPUT]FILENAMEFILENAME CERTIFICATE PRIVATE-KEYFILENAME DEVICE-ALT-NAME|DEVICE-ALT-IDFILENAME DEVICE-ALT-NAME|DEVICE-ALT-ID [IMAGE-ALT-NAME|IMAGE-ALT-ID]FILENAME DEVICE-IDFILENAME [DEVICE-ID|GUID]FILENAME [FIRMWARE-TYPE]FILENAME-SRC FILENAME-DST [FIRMWARE-TYPE-SRC] [FIRMWARE-TYPE-DST]FailedFailed to apply updateFailed to connect to daemonFailed to get pending devicesFailed to install firmware updateFailed to load local dbxFailed to load quirksFailed to load system dbxFailed to lockFailed to parse argumentsFailed to parse fileFailed to parse flags for --filterFailed to parse local dbxFailed to rebootFailed to set splash modeFailed to validate ESP contentsFilenameFilename SignatureFilename SourceFilename requiredFilter with a set of device flags using a ~ prefix to exclude, e.g. 'internal,~needs-reboot'Firmware Base URIFirmware Update D-Bus ServiceFirmware Update DaemonFirmware UtilityFirmware attestationFirmware is already blockedFirmware is not already blockedFirmware metadata has not been updated for %u day and may not be up to date.Firmware metadata has not been updated for %u days and may not be up to date.Firmware metadata last refresh: %s ago. Use --force to refresh again.Firmware updatesFirmware updates are not supported on this machine.Firmware updates are supported on this machine.Firmware updates disabled; run 'fwupdmgr unlock' to enableFlagsForce the action by relaxing some runtime checksForce the action ignoring all warningsFoundFull Disk Encryption DetectedGUIDGUIDsGet all device flags supported by fwupdGet all devices that support firmware updatesGet all enabled plugins registered with the systemGets details about a firmware fileGets the configured remotesGets the host security attributesGets the list of approved firmwareGets the list of blocked firmwareGets the list of updates for connected hardwareGets the releases for a deviceGets the results from the last updateHWIDS-FILEHardware is waiting to be repluggedHighHost Security ID:IOMMUIOMMU device protection disabledIOMMU device protection enabledIdle…Ignore SSL strict checks when downloading filesIgnore firmware checksum failuresIgnore firmware hardware mismatch failuresIgnore validation safety checksIgnoring SSL strict checks, to do this automatically in the future export DISABLE_SSL_STRICT in your environmentInstall DurationInstall a firmware blob on a deviceInstall a firmware file on this hardwareInstall old version of signed system firmwareInstall old version of unsigned system firmwareInstall signed device firmwareInstall signed system firmwareInstall to parent device firstInstall unsigned device firmwareInstall unsigned system firmwareInstalling Firmware…Installing firmware update…Installing on %s…Intel BootGuardIntel BootGuard ACM protectedIntel BootGuard OTP fuseIntel BootGuard error policyIntel BootGuard verified bootIntel CET ActiveIntel CET EnabledIntel DCI debuggerIntel SMAPInternal deviceInvalidIs in bootloader modeIssueIssuesKEY,VALUEKeyringLOCATIONLast modifiedLess than one minute remainingLicenseLinux Vendor Firmware Service (stable firmware)Linux Vendor Firmware Service (testing firmware)Linux kernelLinux kernel lockdownLinux swapList entries in dbxList supported firmware updatesList the available firmware typesLists files on the ESPLoading…LockedLowMEI manufacturing modeMEI overrideMEI versionManually enable specific pluginsMediumMetadata SignatureMetadata URIMetadata can be obtained from the Linux Vendor Firmware Service.Minimum VersionMismatched daemon and client, use %s insteadModifies a daemon configuration valueModifies a given remoteModify a configured remoteModify daemon configurationMonitor the daemon for eventsMounts the ESPNeeds a reboot after installationNeeds rebootNeeds shutdown after installationNew versionNo action specified!No downgrades for %sNo firmware IDs foundNo hardware detected with firmware update capabilityNo plugins foundNo releases availableNo remotes are currently enabled so no metadata is available.No remotes availableNo updates available for remaining devicesNo updates were appliedNot foundNot supportedOKOnly show single PCR valueOnly use IPFS when downloading filesOnly version upgrades are allowedOutput in JSON formatOverride the default ESP pathPATHParse and show details about a firmware fileParsing dbx update…Parsing system dbx…PasswordPatch a firmware blob at a known offsetPayloadPendingPercentage completePerform operation?Please enter a number from 0 to %u: Plugin dependencies missingPre-boot DMA protectionPrevious versionPrint the version numberPrint verbose debug statementsPriorityProceed with upload?ProprietaryQuery for firmware update supportREMOTE-IDREMOTE-ID KEY VALUERead a firmware blob from a deviceRead firmware from device into a fileRead firmware from one partition into a fileReading from %s…Reading…Rebooting…Refresh metadata from remote serverReinstall %s to %s?Reinstall current firmware on the deviceReinstall firmware on a deviceReinstalling %s with %s... Release BranchRemote IDReplace data in an existing firmware fileReport URIReported to remote serverRequired efivarfs filesystem was not foundRequired hardware was not foundRequires a bootloaderRequires internet connectionRestart now?Restart the daemon to make the change effective?Restarting device…Return all the hardware IDs for the machineRun `fwupdmgr get-upgrades` for more information.Run `fwupdmgr sync-bkc` to complete this action.Run the plugin composite cleanup routine when using install-blobRun the plugin composite prepare routine when using install-blobRunning kernel is too oldRuntime SuffixSPI BIOS DescriptorSPI BIOS regionSPI lockSPI writeSUBSYSTEM DRIVER [DEVICE-ID|GUID]Save a file that allows generation of hardware IDsSave device state into a JSON file between executionsSchedule installation for next reboot when possibleScheduling…Secure Boot disabledSecure Boot enabledSee %s for more information.Selected deviceSelected volumeSerial NumberSet the debugging flag during updateSets the list of approved firmwareShare firmware history with the developersShow all resultsShow client and daemon versionsShow daemon verbose information for a particular domainShow debugging information for all domainsShow debugging optionsShow devices that are not updatableShow extra debugging informationShow history of firmware updatesShow plugin verbose informationShow the calculated version of the dbxShow the debug log from the last attempted updateShow the information of firmware update statusShutdown now?Sign a firmware with a new keySign data using the client certificateSign the uploaded data with the client certificateSignatureSizeSourceSpecify Vendor/Product ID(s) of DFU deviceSpecify the dbx database fileSpecify the number of bytes per USB transferSuccessSuccessfully activated all devicesSuccessfully disabled remoteSuccessfully downloaded new metadata: Successfully enabled and refreshed remoteSuccessfully enabled remoteSuccessfully installed firmwareSuccessfully modified configuration valueSuccessfully modified remoteSuccessfully refreshed metadata manuallySuccessfully updated device checksumsSuccessfully uploaded %u reportSuccessfully uploaded %u reportsSuccessfully verified device checksumsSummarySupportedSupported on remote serverSuspend-to-idleSuspend-to-ramSwitch branch from %s to %s?Switch the firmware branch on the deviceSystem requires external power sourceTEXTTPM PCR0 reconstructionTPM v2.0TagTagsTaintedTargetTest a device using a JSON manifestThe LVFS is a free service that operates as an independent legal entity and has no connection with $OS_RELEASE:NAME$. Your distributor may not have verified any of the firmware updates for compatibility with your system or connected devices. All firmware is provided only by the original equipment manufacturer.The TPM PCR0 differs from reconstruction.The daemon has loaded 3rd party code and is no longer supported by the upstream developers!The device version did not match: got %s, expected %sThe firmware from %s is not supplied by %s, the hardware vendor.The system clock has not been set correctly and downloading files may fail.There are no blocked firmware filesThere is no approved firmware.This package has not been validated, it may not work properly.This program may only work correctly as rootThis remote contains firmware which is not embargoed, but is still being tested by the hardware vendor. You should ensure you have a way to manually downgrade the firmware if the firmware update fails.This system has HSI runtime issues.This system has a low HSI security level.This tool allows an administrator to apply UEFI dbx updates.This tool allows an administrator to debug UpdateCapsule operation.This tool allows an administrator to query and control the fwupd daemon, allowing them to perform actions such as installing or downgrading firmware.This tool allows an administrator to use the fwupd plugins without being installed on the host system.This tool can only be used by the root userThis tool will read and parse the TPM event log from the system firmware.Transient failureTypeUEFI ESP partition not detected or configuredUEFI Firmware UtilityUEFI capsule updates not available or enabled in firmware setupUEFI dbx UtilityUEFI firmware can not be updated in legacy BIOS modeUEFI platform keyUEFI secure bootUnable to connect to serviceUnbind current driverUnblocking firmware:Unblocks a specific firmware from being installedUnencryptedUnknownUnknown DeviceUnlock the device to allow accessUnlockedUnlocks the device for firmware accessUnmounts the ESPUnset the debugging flag during updateUnsupported daemon version %s, client version is %sUntaintedUpdatableUpdate ErrorUpdate MessageUpdate StateUpdate failure is a known issue, visit this URL for more information:Update now?Update requires a rebootUpdate the stored cryptographic hash with current ROM contentsUpdate the stored device verification informationUpdate the stored metadata with current contentsUpdatingUpdating %s from %s to %s... Updating %s…Upgrade %s from %s to %s?Upload report now?Uploading firmware reports helps hardware vendors to quickly identify failing and successful updates on real devices.UrgencyUse fwupdmgr --help for helpUse fwupdtool --help for helpUse quirk flags when installing firmwareUser has been notifiedUsernameVID:PIDValidValidating ESP contents…VariantVendorVerifying…VersionWARNING:Waiting…Watch for hardware changesWrite firmware from file into deviceWrite firmware from file into one partitionWriting file:Writing…Your distributor may not have verified any of the firmware updates for compatibility with your system or connected devices.Your hardware may be damaged using this firmware, and installing this release may void any warranty with %s.[CHECKSUM][DEVICE-ID|GUID][DEVICE-ID|GUID] [BRANCH][FILE FILE_SIG REMOTE-ID][FILENAME1] [FILENAME2][SMBIOS-FILE|HWIDS-FILE]command-descriptionSign data using the client certificatedefaultfwupd TPM event log utilityfwupd pluginsProject-Id-Version: fwupd
Report-Msgid-Bugs-To: 
Language-Team: Chinese (China) (http://www.transifex.com/freedesktop/fwupd/language/zh_CN/)
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Language: zh_CN
Plural-Forms: nplurals=1; plural=0;
还剩 %.0f 分钟%s 电池更新%s CPU 微码更新%s 摄像头更新%s 配置更新%s 消费者 ME 更新%s 控制器更新%s 企业 ME 更新%s 设备更新%s 嵌入式控制器更新%s 键盘更新%s 管理引擎(ME)更新%s 鼠标更新%s 网络接口更新%s 存储控制器更新%s 系统更新%s TPM 更新%s Thunderbolt 控制器更新%s 触摸板更新%s 更新更新期间 %s 和所有连接的设备可能无法使用。%s 生产模式更新期间必须保持 %s 的连接以避免损坏。更新期间必须保持 %s 接入电源以避免损坏。%s 覆写%s v%s%s 版本%u 天%u 个设备有可升级的固件。%u 小时%u 个本地设备受支持%u 分钟%u 秒(已过时)GUID所需操作:激活设备激活待处理的设备激活设备上的新固件正在激活固件更新正在激活固件更新给已发布时间同意并启用此远程源吗?%s 的别名所有相同类型的设备会在相同一时间更新允许降级固件版本允许重新安装现有的固件版本允许切换固件分支更新需要重启设备才能完成。更新需要系统关机才能完成。一律用“是”回答问题应用固件更新应用更新,即使不建议应用更新文件正在应用更新……批准的固件:下次再次询问?附加到固件模式正在认证…需要身份验证详细信息需要认证:在可移动设备上降级固件需要认证:在此机器上降级固件需要认证:修改用于固件更新的已配置远程源需要认证:修改守护进程配置需要认证:设定批准固件的列表需要认证:使用客户端证书签名数据需要认证:切换到新固件版本需要认证:解锁设备需要认证:在可移动设备上升级固件需要认证:在此机器上升级固件需要认证:为设备更新存储的校验和自动报告每次都自动上传?生成器XML 目标文件名字节绑定新内核驱动受阻的固件文件:阻止的固件:阻止指定的固件被安装引导程序版本分支生成固件文件使用沙箱生成固件取消已取消无法应用 dbx 更新因其更新已应用。无法在  Live 系统介质上应用更新已变更检查加密哈希与固件是否匹配校验和选择分支:选择设备:选择固件类型:选择发行版本:选择卷:清除从最后一次更新获取的结果未找到命令转换固件文件创建日期关键支持加密哈希验证当前版本设备ID|GUID固件更新实用程序调试选项正在解压缩…描述拆离到引导加载器模式详情设备标志设备 ID已添加设备:设备可从刷机失败恢复已更改设备:设备固件需要版本检查设备已锁定设备需要安装所有提供的版本设备不可访问设备在更新期间可使用已移除设备:设备阶段更新设备支持切换到不同的固件分支设备更新方法设备更新需要激活设备将在安装前备份固件更新完后设备不会再显示成功更新的设备:未正确更新的设备:无固件更新可用的设备:固件已是最新的设备:已禁用禁用 fwupdate 调试禁用给定的远程源显示版本不要查找老的元数据不要查找未报告历史不要检查下载远程是否已启用更新后不要检查或提示是否要重启不包含日志域前缀不包含时间戳前缀不要执行设备安全检查不要写入历史数据库你清楚更改固件分支的后果吗?你要在将来的更新中禁用此功能吗?你要现在刷新这个远程库吗?你要将来的更新中自动上传报告吗?完成!降级 %s,从 %s 到 %s?降级设备上的固件正在降级 %s,从 %s 到 %s…正在下载 %s……下载文件正在下载...从文件转储 SMBIOS 数据时长指定的 ESP 无效在所支持的系统上启用固件更新的支持£启用新的远程库要启用此远程源吗?已启用启用 fwupdate 调试启用给定的远程源启用此功能的风险自负,这意味着你必须就这些更新引起的任何问题与原始设备制造商联系。只有更新过程本身的问题可以提交到 $OS_RELEASE:BUG_REPORT_URL$。启用此远程源后果自负。已加密加密内存清楚所有固件更新历史正在擦除…在短暂的延迟后退出在引擎加载后退出导出 XML 结构的固件文件提取固件比特块到映像文件文件 [设备ID|GUID]输入文件 输出文件 [脚本] [输出]文件名文件名称 证书 私钥文件名 设备替代名称|设备替代ID文件名 设备替代名称|设备替代ID [映像替代名称|映像替代ID]文件名 设备ID文件名 [设备ID|GUID]文件名 [固件类型]源文件名 目标文件名 [源固件类型] [目标固件类型]已失败应用更新失败连接到守护进程失败获取待处理的设备失败安装固件更新失败加载本地 dbx 失败载入特定问题失败加载系统 dbx 失败锁定失败未能解析参数解析文件失败无法解析 --filter 的标志解析本地 dbx 失败重启失败设定启动屏幕模式失败验证 ESP 内容失败文件名文件名签名文件来源需要文件名筛选器为一组设备标志,使用 ~ 前缀来排除设备,示例 "internal,~needs-reboot"固件库 URI固件更新 D-Bus 服务固件更新守护程序固件实用程序固件证明固件已被阻止固件已经不受阻固件元数据已有 %u 天未更新,数据可能不是最新的。固件元数据上次刷新:%s前。使用 --force 再次刷新。固件更新此机器不支持固件更新。此机器支持固件更新。固件更新已禁用;运行“fwupdmgr unlock”以启用标志通过放宽一些运行时检查来强制操作强制操作忽略所有警告找到探测到全盘加密GUID获取 fwupd 支持的全部设备标志获得所有支持更新固件的硬件列表获取所有在系统注册的启用插件获取有关某固件文件的详细信息获取已配置的远程源获取主机安全属性获取已批准固件的列表获取受阻固件的列表获取已连接硬件的可用更新列表获取用于设备的发行版本从最后一次更新中获取结果HWIDS文件硬件正等待重新插入高主机安全 IDIOMMUIOMMU 设备保护已禁用IOMMU 设备保护已启用空闲…下载文件时忽略 SSL 严格检查忽略固件校验和错误忽略固件硬件不匹配错误忽略验证安全检查正在忽略 SSL 严格检查,要在之后自动应用这一选项请在你的环境里 export DISABLE_SSL_STRICT安装时长在设备上安装固件比特块在此硬件上安装固件文件安装旧版本的已签名系统固件安装旧版本的未签名系统固件安装已签名的设备固件安装已签名的系统固件首先安装到上级设备安装未签名的设备固件安装未签名的系统固件正在安装固件……正在安装固件更新...正在安装到 %s……Intel BootGuardIntel BootGuard ACM 保护Intel BootGuard OTP 保险丝Intel BootGuard 错误策略Intel BootGuard 验任启动Intel CET 激活Intel CET 支持Intel DCI 调试器Intel SMAP内部设备无效处于引导程序模式问题键,值密钥环位置最后修改还剩不到一分钟许可证Linux 供应商固件服务(稳定固件)Linux 供应商固件服务(测试固件)Linux 内核Linux 内核锁定Linux 交换区列出 dbx 中的条目列出所支持固件的更新列出可用的固件类型列出 ESP 分区中的文件正在加载…已锁定低MEI 生产模式MEI 覆写MEI 版本手动启用指定插件中元数据签名元数据 URI可从 Linux 供应商固件服务获取元数据。最小版本守护进程与客户端不匹配,使用 %s 来代替修改守护进程的配置值修改给定的远程源修改已配置的远程源修改守护进程配置监视守护程序里的事件挂载 ESP 分区安装完后需要重启需要重启安装完后需要关机新版本未指定操作!%s 无可用降级未找到固件 ID没有检测到支持更新固件的硬件未找到插件无可用发布版本当前尚未启用任何远程源,因此无可用元数据。无可用远程源其余设备没有可用更新没有应用任何更新未找到未支持确定只显示单 PCR 值下载文件时只使用 IPFS只允许版本升级以 JSON 格式输出覆盖默认的 ESP 路径路径解析并显示固件文件的详细信息正在解析 dbx 更新……正在解析系统 dbx……密码在已知偏移量处对固件二进制文件打补丁载荷待处理完成百分比执行操作?请输入一个 0 到 %u 之间的数字:插件依赖缺失预启动 DMA 保护上个版本打印版本号打印详细调试语句优先级确定要上传吗?私有查询固件更新的支持远程ID远程ID 键 值从设备读取固件比特块(blob)将来自设备的固件读入文件将来自分区的固件读入文件正在读取 %s……正在读取…正在重启……刷新来自远程服务器的元数据重新安装 %s 到 %s?在设备上重新安装当前的固件重新安装设备上的固件正在重新安装 %s,使用 %s…发行分支远程源 ID用已有的固件文件替换数据报告 URI已报告到远程服务器所需 efivarfs 文件系统未找到所需设备未找到需要引导程序需要互联网连接要现在重启设备吗?重启守护进程以让更改生效?正在重启设备…返回机器的所有硬件 ID运行 "fwupdmgr get-upgrades" 获取更多信息。运行 `fwupdmgr sync-bkc` 以完成此操作。当使用安装比特块时运行插件组合清理例程当使用安装比特块时运行插件组合准备例程运行的内核太老旧运行时后缀SPI BIOS 描述符SPI BIOS 区域SPI 锁SPI 写入子系统 驱动 [设备ID|GUID]保存允许生成硬件 ID 的文件在执行之间保存设备状态到 JSON 文件如有可能,安排安装到下次重启正在计划…安全启动已禁用安全启动已启用查看 %s 获取更多信息。所选设备所选卷序列号更新期间设定调试标志设定批准固件的列表与开发者分享固件历史显示所有结果显示客户端及守护程序版本显示特定域的守护进程详细信息显示所有域的调试信息显示调试选项显示不可更新的设备显示额外调试信息显示固件更新历史显示插件详细回显信息显示 dbx 的计算版本显示上次尝试更新的调试日志显示固件更新状态的信息现在关机?用新密钥签名固件使用客户端证书签名数据以客户端证书签名上传的数据签名大小来源指定 DFU 设备的供应商/产品 ID指定 dbx 数据库文件指定每次 USB 传输的字节数成功激活所有设备成功禁用远程源成功已成功下载新元数据:已成功启用和刷新远程库启用远程源成功安装固件成功修改配置值成功修改远程源成功手动刷新元数据成功更新设备校验和成功上传 %u 篇报告成功验证设备校验和成功概览已支持支持于远程服务器挂起到空闲挂起到内存切换分支,从 %s 到 %s?切换设备的固件分支系统需要外接电源文本TPM PCR0 重建TPM v2.0标签受污染目标使用 JSON 清单测试设备LVFS 是个免费服务,以独立法律实体运作,与 $OS_RELEASE:NAME$ 无关。你的发行商可能未对固件更新与你的系统或连接的设备兼容性做过任何验证。所有固件都由原始设备制造商提供。TPM PCR0 跟重建的不同。守护进程已经加载了第三方代码,并且上游开发者不再支持。设备版本不匹配:得到 %s,期望 %s来源 %s 的固件并非由硬件供应商 %s 提供。系统时钟没有设置正确,文件下载可能会失败。没有受阻的固件文件没有批准的固件。此软件包未经验证,可能无法正常工作。此程序只能以 root 身份正常运行此远程源包含未禁止的固件,但其仍经过硬件供应商测试。你应该确保如果固件更新失败时你能够降级固件。该系统的 HSI 运行时有问题。该系统的 HSI 安全级别较低。此工具允许管理员应用 UEFI dbx 更新。此工具允许管理员调试 UpdateCapsule 操作。此工具允许管理员查询和控制 fwupd 守护进程,让其执行如安装或者降级固件等操作。此工具可以让管理员不用安装 fwupd 插件到主机系统上就可以使用它们。此工具只能由 root 用户使用此工具将读取和解析系统固件中的 TPM 事件日志。暂时失败类型UEFI ESP 分区未检测到或未配置固件 UEFI 实用工具UEFI 胶囊更新在固件设置中不可用或未启用UEFI dbx 实用工具UEFI 固件无法在传统 BIOS 模式下更新UEFI 平台密钥UEFI 安全引导无法连接到服务解除当前驱动的绑定正在解除阻止固件:解除阻止指定的固件被安装未加密未知未知设备解锁设备以允许访问已解锁为固件访问解锁设备卸载 ESP 分区更新期间取消设定调试标志未受支持的守护进程版本 %s,客户端版本为 %s无污染可更新更新错误更新消息更新状态更新失败为已知问题,请访问此 URL 以获取详情:现在更新吗?更新需要重启以当前 ROM 内容更新存储的加密哈希更新存储的设备验证信息使用当前内容更新存储的元数据正在更新正在更新 %s,从 %s 到 %s…正在更新 %s……升级 %s,从 %s 到 %s?要上传报告吗?上传固件报告可帮助硬件供应商尽快确定真实设备上更新的成功及失败案例。紧急性使用 fwupdmgr --help 获取帮助信息使用 fwupdtool --help 获取帮助信息安装固件时使用 quirk 标志已通知用户用户名VID:PID有效正在验证 ESP 内容……变型供应商正在验证…版本警告:等待中...监视硬件更改将来自文件的固件写入设备将来自文件的固件写入分区写入文件:正在写入…您的发行商可能尚未认证任何固件的系统及设备兼容性。你的硬件使用此固件可能会损坏,而且安装此版本固件可能失去 %s 的保修。[校验和][设备ID|GUID][设备ID|GUID] [分支][文件 文件签名 远程ID][文件名1] [文件名2][SMBIOS文件|HWIDS文件]使用客户端证书签名数据默认fwupd TPM 事件日志工具fwupd 插件

Zerion Mini Shell 1.0