[Bug 1949412] Re: Upgrade fwupd for Atomic Docking Support

Yuan-Chen Cheng 1949412 at bugs.launchpad.net
Fri Mar 4 02:34:15 UTC 2022


dirk test install local cab for wd22tb4 and atomic docking with fwupd
from the proposed channel, and it test passed.

I also run the fwupd-tests old/new version and both passed.

Given all above, mark verification-done-focal.

** Tags removed: verification-needed-focal
** Tags added: verification-done-focal

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to fwupd-signed in Ubuntu.
https://bugs.launchpad.net/bugs/1949412

Title:
  Upgrade fwupd for Atomic Docking Support

Status in OEM Priority Project:
  In Progress
Status in fwupd package in Ubuntu:
  Fix Released
Status in fwupd-efi package in Ubuntu:
  Fix Released
Status in fwupd-signed package in Ubuntu:
  Fix Released
Status in fwupd source package in Focal:
  Fix Committed
Status in fwupd-efi source package in Focal:
  Fix Committed
Status in fwupd-signed source package in Focal:
  Fix Committed
Status in fwupd source package in Hirsute:
  Won't Fix
Status in fwupd-efi source package in Hirsute:
  Won't Fix
Status in fwupd-signed source package in Hirsute:
  Won't Fix
Status in fwupd source package in Impish:
  Fix Committed
Status in fwupd-efi source package in Impish:
  Fix Committed
Status in fwupd-signed source package in Impish:
  Fix Committed
Status in fwupd source package in Jammy:
  Fix Released
Status in fwupd-efi source package in Jammy:
  Fix Released
Status in fwupd-signed source package in Jammy:
  Fix Released

Bug description:
  This is to support Dell's new Atomic Docking and WD22TB4 in focal.

  As fwupd 1.7.x efi split is done, let use 1.7.5 for this.

  In this SRU, it include source package: fwupd-efi, fwupd, fwupd-signed and
  libjcat (LP: #1961864)

  [Impact]

   * Several components that are used in OEM projects need
     to use the fwupd to support firmware update.

   * This will follow the SRU exception in
     https://wiki.ubuntu.com/firmware-updates

  [Test Plan]

   * follow the steps in the SRU exception page.
     Need to make sure it still works well even if secure
     boot is on.

   * Given fwupd 1.7.4 is so new, I think we should extended
     the date in proposed channel like 14 days.

   * Plan to loop existing OEM project and also request for
     more regression tests.

  [Where problems could occur]

   * BIOS upgrade failed and brick the machine:
     We test the fwupd in PPA and this does not happen. Given past
     experience, this only happens as we use unstable/not-tested
     bios from vendors.

   * component fw upgrade and the component no longer working:
     Per OEM team experience, this only happens as we use
     unstable/not-tested fw from vendors, or there are special
     steps and we didn't follow up carefully enough.

   * component fw upgraded and kernel driver/firmware in the ubuntu
     the archive does not support it:
     This is possible but has rarely happened before. And this is so
     hard to know in advance if IHV didn't do their job well.
     This only happened in case that the failed fw is not supported
     in the previous fwupd, but it supported in the new fwupd, and
     the new fw happened not been supported by existing
     kernel driver/linux-firmware deb.
     We will notify OEM projects to be aware of it, so it won't
     break things.

   * Other possible failures: those are well-covered in the SRU
     exception test plan.
     - fwupd does not work as Secure boot is on.
     - dbus interface in-compatibility.

  [Other Info]

   * Two bugs will also be fixed with this SRU: lp:1954965, lp:1953573.

To manage notifications about this bug go to:
https://bugs.launchpad.net/oem-priority/+bug/1949412/+subscriptions




More information about the foundations-bugs mailing list