[Bug 1949412] Re: Upgrade fwupd for Atomic Docking Support
Yuan-Chen Cheng
1949412 at bugs.launchpad.net
Tue Mar 1 22:34:25 UTC 2022
for focal, fwupd dbus 1.7.5 interface change compare to existing 1.5.11. It looks fine per
previously test criteria we define in the SRU exception.
$ diff -u fwupd-dbus-1.5.11.log fwupd-dbus-1.7.5.log
--- fwupd-dbus-1.5.11.log 2022-03-02 06:31:45.690734046 +0800
+++ fwupd-dbus-1.7.5.log 2022-03-02 06:32:02.683328536 +0800
@@ -1,4 +1,4 @@
-method return time=1627442048.298940 sender=:1.120 -> destination=:1.122 serial=264 reply_serial=2
+method return time=1646173922.685521 sender=:1.87 -> destination=:1.93 serial=613 reply_serial=2
string "<!DOCTYPE node PUBLIC "-//freedesktop//DTD D-BUS Object Introspection 1.0//EN"
"http://www.freedesktop.org/standards/dbus/1.0/introspect.dtd">
<!-- GDBus 2.64.6 -->
@@ -76,10 +76,20 @@
<arg type="aa{sv}" name="attrs" direction="out">
</arg>
</method>
+ <method name="GetHostSecurityEvents">
+ <arg type="u" name="limit" direction="in">
+ </arg>
+ <arg type="aa{sv}" name="attrs" direction="out">
+ </arg>
+ </method>
<method name="GetReportMetadata">
<arg type="a{ss}" name="attrs" direction="out">
</arg>
</method>
+ <method name="SetHints">
+ <arg type="a{ss}" name="hints" direction="in">
+ </arg>
+ </method>
<method name="Install">
<arg type="s" name="id" direction="in">
</arg>
@@ -176,6 +186,8 @@
<arg type="s" name="sig" direction="out">
</arg>
</method>
+ <method name="Quit">
+ </method>
<signal name="Changed">
</signal>
<signal name="DeviceAdded">
@@ -190,8 +202,14 @@
<arg type="a{sv}" name="device">
</arg>
</signal>
+ <signal name="DeviceRequest">
+ <arg type="a{sv}" name="request">
+ </arg>
+ </signal>
<property type="s" name="DaemonVersion" access="read">
</property>
+ <property type="s" name="HostBkc" access="read">
+ </property>
<property type="s" name="HostProduct" access="read">
</property>
<property type="s" name="HostMachineId" access="read">
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to fwupd-signed in Ubuntu.
https://bugs.launchpad.net/bugs/1949412
Title:
Upgrade fwupd for Atomic Docking Support
Status in OEM Priority Project:
In Progress
Status in fwupd package in Ubuntu:
Fix Released
Status in fwupd-efi package in Ubuntu:
Fix Released
Status in fwupd-signed package in Ubuntu:
Fix Released
Status in fwupd source package in Focal:
Fix Committed
Status in fwupd-efi source package in Focal:
Fix Committed
Status in fwupd-signed source package in Focal:
Fix Committed
Status in fwupd source package in Hirsute:
Won't Fix
Status in fwupd-efi source package in Hirsute:
Won't Fix
Status in fwupd-signed source package in Hirsute:
Won't Fix
Status in fwupd source package in Impish:
Fix Committed
Status in fwupd-efi source package in Impish:
Fix Committed
Status in fwupd-signed source package in Impish:
Fix Committed
Status in fwupd source package in Jammy:
Fix Released
Status in fwupd-efi source package in Jammy:
Fix Released
Status in fwupd-signed source package in Jammy:
Fix Released
Bug description:
This is to support Dell's new Atomic Docking and WD22TB4 in focal.
As fwupd 1.7.x efi split is done, let use 1.7.5 for this.
In this SRU, it include source package: fwupd-efi, fwupd, fwupd-signed and
libjcat (LP: #1961864)
[Impact]
* Several components that are used in OEM projects need
to use the fwupd to support firmware update.
* This will follow the SRU exception in
https://wiki.ubuntu.com/firmware-updates
[Test Plan]
* follow the steps in the SRU exception page.
Need to make sure it still works well even if secure
boot is on.
* Given fwupd 1.7.4 is so new, I think we should extended
the date in proposed channel like 14 days.
* Plan to loop existing OEM project and also request for
more regression tests.
[Where problems could occur]
* BIOS upgrade failed and brick the machine:
We test the fwupd in PPA and this does not happen. Given past
experience, this only happens as we use unstable/not-tested
bios from vendors.
* component fw upgrade and the component no longer working:
Per OEM team experience, this only happens as we use
unstable/not-tested fw from vendors, or there are special
steps and we didn't follow up carefully enough.
* component fw upgraded and kernel driver/firmware in the ubuntu
the archive does not support it:
This is possible but has rarely happened before. And this is so
hard to know in advance if IHV didn't do their job well.
This only happened in case that the failed fw is not supported
in the previous fwupd, but it supported in the new fwupd, and
the new fw happened not been supported by existing
kernel driver/linux-firmware deb.
We will notify OEM projects to be aware of it, so it won't
break things.
* Other possible failures: those are well-covered in the SRU
exception test plan.
- fwupd does not work as Secure boot is on.
- dbus interface in-compatibility.
[Other Info]
* Two bugs will also be fixed with this SRU: lp:1954965, lp:1953573.
To manage notifications about this bug go to:
https://bugs.launchpad.net/oem-priority/+bug/1949412/+subscriptions
More information about the foundations-bugs
mailing list