[Bug 1934209] Re: Dell dock USB4 module need fwupd 1.5.11
Yuan-Chen Cheng
1934209 at bugs.launchpad.net
Fri Jul 30 09:39:39 UTC 2021
Verification passed on Focal
Secure boot on
shim-signed: 1.40.6+15.4-0ubuntu7 (proposed channel, sbat applied)
fwupd: 1.5.11-0ubuntu1~20.04.2 (propsoed channel, sbat applied)
gnome-software and snap-store firmware upgrade BIOS UI test: passed
machine: Latitude 5300
setup: fake newer firmware as v1.13.2
version: 1.13.1 to 1.13.1
fwupd-tests:
test v1.3.11 test case on fwupd 1.5.11, passed
test v1.5.11 test case: passed
test nvme fw re-install
done, tested on KXG60ZNV1T02 NVMe KIOXIA 1024GB
test dell usb docking fw re-install: passed
done: test on wd19sc, package level.
test dell tbt docking fw re-install: passed
done: test on wd19tb, package level.
fwupdmgr update / install / reinstall sub-command: passed
backword compatiable per check one by one.
dbus interface: passed
1.3.11 to 1.5.11: only add function and property.
> <method name="GetPlugins">
> <arg type="aa{sv}" name="plugins" direction="out">
> </arg>
> </method>
70a75,82
> <method name="GetHostSecurityAttrs">
> <arg type="aa{sv}" name="attrs" direction="out">
> </arg>
> </method>
> <method name="GetReportMetadata">
> <arg type="a{ss}" name="attrs" direction="out">
> </arg>
> </method>
112a125,136
> <method name="GetBlockedFirmware">
> <arg type="as" name="checksums" direction="out">
> </arg>
> </method>
> <method name="SetBlockedFirmware">
> <arg type="as" name="checksums" direction="in">
> </arg>
> </method>
> <method name="SetFeatureFlags">
> <arg type="t" name="feature_flags" direction="in">
> </arg>
> </method>
173a198,199
> </property>
> <property type="s" name="HostSecurityId" access="read">
** Tags removed: verification-needed-focal
** Tags added: verification-done-focal
--
You received this bug notification because you are a member of Ubuntu
Sponsors Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1934209
Title:
Dell dock USB4 module need fwupd 1.5.11
Status in OEM Priority Project:
In Progress
Status in fwupd package in Ubuntu:
Fix Released
Status in fwupd-signed package in Ubuntu:
Fix Released
Status in fwupd source package in Focal:
Fix Committed
Status in fwupd-signed source package in Focal:
Fix Committed
Status in fwupd source package in Hirsute:
Fix Committed
Status in fwupd-signed source package in Hirsute:
Fix Committed
Status in fwupd source package in Impish:
Fix Released
Status in fwupd-signed source package in Impish:
Fix Released
Bug description:
need focal/fwupd 1.5.11 to support this
Ref: https://github.com/fwupd/fwupd/releases/tag/1.5.11
Note: this version shall work well with shim with sbat.
Note: for focal, we also need to upgrade jcat to make it work.
[Impact]
* We need to support Dell USB4 Dock and based on the fwupd design,
need to upgrade the version to support it.
* This new version will also enable certain vendors to upgrade
intel-microcode by fwupd. Some security updates of intel-microcode
does introduce regresssion because it's not tested across enough
CPU family. Vendors can do more tests give they have access to
those machines and have access to those new microcodes with
security patches.
* Will follow the new policy to do this SRU exception.
https://wiki.ubuntu.com/firmware-updates
[Test Plan]
* Full standard verification test listed in
https://wiki.ubuntu.com/firmware-updates
* Install a sbat enable shim, turned on secure boot and make sure
the new fwupd firmware upgrade efi still work fine.
* Will also invite the component vendor to test the new supported
docking when the new fwupd exists in the proposed channel.
They already started to use the one in my ppa on focal given
LTS release is the HWE project target.
[Where problems could occur]
* If it passed the verification procedure in the policy, I believe
it shall already cover most cases.
[Other Info]
* This suppose to fix several bugs. OEM team will test
those along the way.
To manage notifications about this bug go to:
https://bugs.launchpad.net/oem-priority/+bug/1934209/+subscriptions
More information about the Ubuntu-sponsors
mailing list