Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Need to integrate firmware capsule updates #77

Open
ikeydoherty opened this issue Oct 6, 2017 · 14 comments
Open

Need to integrate firmware capsule updates #77

ikeydoherty opened this issue Oct 6, 2017 · 14 comments

Comments

@ikeydoherty
Copy link
Contributor

In Solus we're trying to ensure all aspects of the users system is up to date, to that extent we:

  • Early-load microcode updates for the CPU
  • Ship recent firmware and kernels
  • Provide rolling stack updates for critical software

However we currently DO NOT have firmware updates. clr-boot-manager is the obvious integration
point in the deployment chain, and should be able to manage fwupd or similar to enable the deployment
of FW capsule updates for our UEFI users.

It also makes sense to integrate the points here as CBM is responsible for boot items, and could easily change the "NextBoot" to ensure we reboot to the firmware update screen.

..Discuss? :)

@bryteise
Copy link
Member

bryteise commented Oct 7, 2017

fwupd is definitely something we are interested in getting integrated into cbm. We need to do uefi var management in cbm anyway so next boot like things should definitely be in scope.

Do you see fwupd providing a library interface so that cbm can use it and then fwupd having a cli interface as well?

I imagine most of the discussion will be around how fwupd will operate. Ideally cbm would consume it in fairly straightforward manor as there shouldn't be too many fancy things other than detect if new firmware is available (and cbm then switching the next boot). Does that seem about right?

@busykai
Copy link
Member

busykai commented Oct 8, 2017

@ikeydoherty, do you mean setting EFI BootNext var? is fwupd a boot service? or do you mean starting a linux into fwupd screen? (I need to familiarize myself more with fwupd.)

Just to call your attention to #75 which contains an API for EFI var manipulation (BootXXXX for now), but it would be well extended to work with other boot variables too. I'll be finishing up that PR next week, not much work left there..

@ikeydoherty
Copy link
Contributor Author

@busykai yeah this stuff depends on your efi var stuff I reckon :)

@alecbcs
Copy link

alecbcs commented Jul 9, 2018

Hi everyone, has there been any progress on this issue since October?

@Jacalz
Copy link
Contributor

Jacalz commented Aug 6, 2018

It would be really nice seeing this included 👍

@Vistaus
Copy link

Vistaus commented Aug 6, 2018

I just read that Lenovo has joined the LVFS (https://phoronix.com/scan.php?page=news_item&px=Lenovo-LVFS-Support). Now I can easily update the firmware of my 2018 ThinkPad. But as I use Solus, I need to wait for this to be resolved. So it would be great if you guys could integrate this :)

@Jacalz
Copy link
Contributor

Jacalz commented Dec 7, 2018

Any news on getting this integrated? It would be such a great feature for a lot of people and it would be a safe and smart integration of it compared to many other ones in the Linux universe. Can barely wait until we get this integrated 😇

@alecbcs
Copy link

alecbcs commented May 7, 2019

Any updates on getting this integrated? @bryteise how much work would need to be done on this issue to implement LVFS? Thank you!

@bryteise
Copy link
Member

bryteise commented May 7, 2019

@alecbcs At this point because fwupdate is available I'm mostly in favor of closing this issue as I don't think integrating fwupd with CBM is the way to go.

@alecbcs
Copy link

alecbcs commented May 7, 2019

@bryteise From what I understand fwupdate queues the updates on the /boot partition. However, that means right now the user has to manually mount the /boot partition when they want to update BIOS/firmware. Do you know of anyway we would automate this process? It also looks like fwupd recently integrated the code from fwupdate so fwupdate might not be needed anymore in this process if we can do the same thing with fwupd. Do you know from the systems side what we might have to do to give fwupd access to, in order to mount the boot partition?

@bryteise
Copy link
Member

bryteise commented May 7, 2019

@alecbcs Yes, fwupd is the user space integration that manages the overall update process and contains fwupdate. fwupd doesn't really do well with mounting /boot itself but the systemd service for fwupd could be modified to have it mount the /boot partition as part of it running.

@alecbcs
Copy link

alecbcs commented May 7, 2019

@bryteise Okay interesting! If all that needed, is to mount the /boot partition before running fwupd, maybe we could consider having the package manager mount the /boot partition before calling fwupdmgr update?

@bryteise
Copy link
Member

bryteise commented May 9, 2019

fwupd really wants to run as an active service that is constantly looking for updates but it isn't super friendly still in my opinion so I would be more likely to advise the system administer to do control its running and what it is trying to update.

@dorileo
Copy link
Contributor

dorileo commented Jan 30, 2020

I agree we don't want cbm overlapping with fwupd. I would close this issue.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

7 participants