Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

No testing BIOS update available for Framework 13 #7060

Closed
Lee245 opened this issue Apr 9, 2024 · 34 comments · Fixed by hughsie/libxmlb#170 or #7063
Closed

No testing BIOS update available for Framework 13 #7060

Lee245 opened this issue Apr 9, 2024 · 34 comments · Fixed by hughsie/libxmlb#170 or #7063
Labels

Comments

@Lee245
Copy link

Lee245 commented Apr 9, 2024

Describe the bug
On my Framework 13 AMD running Fedora 39 with BIOS 3.03, the 3.05 beta BIOS is not available. lvfs-testing is enabled. The laptop is plugged into AC.

Output of sudo fwupdtool update -vv:
fwupdtool.log

Steps to Reproduce

  1. fwupdmgr enable-remote lvfs-testing
  2. fwupdmgr refresh --force
  3. fwupdmgr get-updates
  4. fwupdmgr update

Expected behavior
3.05 beta BIOS showing up as an update.

fwupd version information

compile   com.hughsie.libxmlb           0.3.17
compile   com.hughsie.libjcat           0.2.1
compile   org.freedesktop.fwupd         1.9.16
runtime   org.freedesktop.fwupd-efi     1.4
compile   org.freedesktop.gusb          0.4.8
runtime   com.hughsie.libjcat           0.2.1
runtime   org.freedesktop.gusb          0.4.8
runtime   org.freedesktop.fwupd         1.9.16
runtime   org.kernel                    6.8.4-200.fc39.x86_64```

Please note how you installed it (`apt`, `dnf`, `pacman`, source, etc):

I believe it was installed OOTB in Fedora 39. Otherwise, via dnf.

<summary>**fwupd device information**</summary>

Please provide the output of the fwupd devices recognized in your system.

fwupdmgr get-devices --show-all-devices
Framework Laptop 13 (AMD Ryzen 7040Series)

├─AMD Ryzen 5 7640U w/ Radeon 760M Graphics:
│ │ Device ID: 4bde70ba4e39b28f9eab1628f9dd6e6244c03027
│ │ Current version: 0x0a704103
│ │ Vendor: Advanced Micro Devices, Inc.
│ │ GUIDs: 2a1df9de-fe02-59c8-8af1-32c8bb011f94 ← CPUID\PRO_0&FAM_19&MOD_74
│ │ 5a4bca32-6547-584f-bb36-920d9adede25 ← CPUID\PRO_0&FAM_19&MOD_74&STP_1
│ │ Device Flags: • Internal device
│ │
│ ├─Graphics Processing Unit (GPU):
│ │ │ Device ID: 83eba1fa14bdefee1f6b4bcf06069b298e1c338f
│ │ │ Summary: AMD AMD_PHOENIX_GENERIC
│ │ │ Current version: 022.012.000.024.000001
│ │ │ Vendor: Advanced Micro Devices, Inc. [AMD/ATI] (PCI:0x1002)
│ │ │ GUID: 6c23af4f-d6cd-5ffc-a502-0b85e472e7cb ← AMD\113-PHXGENERIC-001
│ │ │ Device Flags: • Internal device
│ │ │
│ │ └─NE135FBM-N41:
│ │ Device ID: aec1a869eb0df71b7cea6b3ac71d39b830faf164
│ │ GUID: ace3bb34-1bbb-5a5f-9694-73c4cede9692 ← DRM\VEN_BOE&DEV_0BCA
│ │ Device Flags: • Internal device
│ │
│ ├─Secure Processor:
│ │ Device ID: c54ab0237d7a8db8c717b68e0be78e4374a2a079
│ │ Current version: 00.2d.00.74
│ │ Bootloader Version:00.2d.00.74
│ │ Vendor: Advanced Micro Devices, Inc. (PCI:0x1022)
│ │ GUIDs: 9eb6a793-7f97-5fb5-b49c-139d2ce3ee46 ← PCI\VEN_1022&DEV_15C7
│ │ 2e4eb727-a7c8-5eba-80cd-553b8d796d80 ← PCI\VEN_1022&DEV_15C7&SUBSYS_F1110006
│ │ Device Flags: • Internal device
│ │
│ ├─System Management Unit (SMU):
│ │ Device ID: db0330716216c629bb2c07256e5d018f499eb6ce
│ │ Summary: Microcontroller used within CPU/APU program 0
│ │ Current version: 76.70.0
│ │ Vendor: Advanced Micro Devices, Inc.
│ │ GUID: 3ac3159e-6eef-5f6b-bc8d-67686b238747 ← /sys/devices/platform/AMDI0009:00
│ │ Device Flags: • Internal device
│ │
│ └─TPM:
│ Device ID: c6a80ac3a22083423992a3cb15018989f37834d6
│ Summary: TPM 2.0 Device
│ Current version: 6.3.1.610
│ Vendor: Microsoft (TPM:MSFT)
│ GUIDs: 2a65d4b6-60a0-5e8c-acfa-d86cc3cbe4c3 ← TPM\VEN_MSFT&DEV_0001
│ 31a7bb1b-f5e1-53ff-b0e5-8692a21caed6 ← TPM\VEN_MSFT&MOD_Pluton.TPM.A
│ 5bea8d58-c840-513e-a5ad-0184cbaa9821 ← TPM\VEN_MSFT&DEV_0001&VER_2.0
│ e02519c6-9139-5de8-89d4-9dca2f5c3b66 ← TPM\VEN_MSFT&MOD_Pluton.TPM.A&VER_2.0
│ Device Flags: • Internal device
│ • System requires external power source
│ • Needs a reboot after installation
│ • Device can recover flash failures
│ • Full disk encryption secrets may be invalidated when updating
│ • Signed Payload

├─Fingerprint Sensor:
│ Device ID: 23ec719b6aabc2d2dac5176c232f0da7a21881b0
│ Summary: Match-On-Chip fingerprint sensor
│ Current version: 01000334
│ Vendor: Goodix (USB:0x27C6)
│ Install Duration: 10 seconds
│ Serial Number: UID097F42EB_XXXX_MOC_B0
│ GUID: 1e8c8470-a49c-571a-82fd-19c9fa32b8c3 ← USB\VID_27C6&PID_609C
│ Device Flags: • Updatable
│ • Device stages updates
│ • Device can recover flash failures
│ • Signed Payload

├─GPIO controller:
│ Device ID: f685512aa07369c9e77742acef941d779d31e766
│ GUID: 37b440a9-2473-5087-a39b-db84f32a8ed8 ← GPIO\ID_AMDI0030:00

├─System Firmware:
│ │ Device ID: 1e4fa9cea0b89e613370cf9657ffa0b6d3f37fec
│ │ Summary: UEFI System Resource Table device (Updated via caspule-on-disk)
│ │ Current version: 771
│ │ Minimum Version: 1
│ │ Vendor: Framework (DMI:INSYDE Corp.)
│ │ Update State: Success
│ │ GUID: b5f7dcc1-568c-50f8-a4dd-e39d1f93fda1
│ │ Device Flags: • Internal device
│ │ • Updatable
│ │ • System requires external power source
│ │ • Needs a reboot after installation
│ │ • Cryptographic hash verification is available
│ │ • Device is usable for the duration of the update
│ │ Device Requests: • Message
│ │
│ └─UEFI dbx:
│ Device ID: 362301da643102b9f38477387e2193e57abaa590
│ Summary: UEFI revocation database
│ Current version: 371
│ Minimum Version: 371
│ Vendor: UEFI:Linux Foundation
│ Install Duration: 1 second
│ GUIDs: f8ba2887-9411-5c36-9cee-88995bb39731 ← UEFI\CRT_A1117F516A32CEFCBA3F2D1ACE10A87972FD6BBE8FE0D0B996E09E65D802A503&ARCH_X64
│ 115f7cac-f705-5d34-9a47-37177c3e8514 ← UEFI\CRT_B38FAD316F525F27B27A21B486456C3E4279748BF16893827BF16FE659C0F75E&ARCH_X64
│ Device Flags: • Internal device
│ • Updatable
│ • Needs a reboot after installation
│ • Device is usable for the duration of the update
│ • Only version upgrades are allowed
│ • Signed Payload

├─UEFI Platform Key:
│ Device ID: 6924110cde4fa051bfdc600a60620dc7aa9d3c6a
│ Summary: frame.work-LaptopAMDPK
│ GUID: c701846d-5461-5c19-a7ae-2d89b2f44c14 ← UEFI\CRT_D610D8205624E644D9435383826B2DBF7298859C

└─WD BLACK SN770 1TB:
Device ID: 03281da317dccd2b18de2bd1cc70a782df40ed7e
Summary: NVM Express solid state drive
Current version: 731100WD
Vendor: Sandisk Corp (NVME:0x15B7)
Serial Number: 2334H2403142
GUIDs: 1524d43d-ed91-5130-8cb6-8b8478508bae ← NVME\VEN_15B7&DEV_5017
87cfda90-ce08-52c3-9bb5-0e0718b7e57e ← NVME\VEN_15B7&DEV_5017&SUBSYS_15B75017
914bfa00-b683-532c-8c3c-71a59e7ae800 ← WD_BLACK SN770 1TB
Device Flags: • Internal device
• Updatable
• System requires external power source
• Needs a reboot after installation
• Device is usable for the duration of the update


</details>

**System UEFI configuration**
Please provide the output of the following commands:

efibootmgr -v
BootCurrent: 0005
Timeout: 0 seconds
BootOrder: 0005,0001,2001,2002,2003
Boot0001* Fedora HD(1,GPT,6975d142-18c0-4bf5-9dfa-dba4622a2aab,0x800,0x12c000)/\EFI\fedora\shim.efiRC
dp: 04 01 2a 00 01 00 00 00 00 08 00 00 00 00 00 00 00 c0 12 00 00 00 00 00 42 d1 75 69 c0 18 f5 4b 9d fa db a4 62 2a 2a ab 02 02 / 04 04 2e 00 5c 00 45 00 46 00 49 00 5c 00 66 00 65 00 64 00 6f 00 72 00 61 00 5c 00 73 00 68 00 69 00 6d 00 2e 00 65 00 66 00 69 00 00 00 / 7f ff 04 00
data: 52 43
Boot0002* EFI PXE 0 for IPv4 (0C-37-96-6A-73-67) PciRoot(0x0)/Pci(0x8,0x3)/Pci(0x0,0x4)/USB(1,0)/MAC(0c37966a7367,0)/IPv4(0.0.0.0,0,DHCP,0.0.0.0,0.0.0.0,0.0.0.0)RC
dp: 02 01 0c 00 d0 41 03 0a 00 00 00 00 / 01 01 06 00 03 08 / 01 01 06 00 04 00 / 03 05 06 00 01 00 / 03 0b 25 00 0c 37 96 6a 73 67 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 / 03 0c 1b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 / 7f ff 04 00
data: 52 43
Boot0003* Windows Boot Manager HD(2,GPT,26bedf9f-4b32-435d-98fb-4e9e25ce2800,0xa00800,0x82000)/\EFI\Microsoft\Boot\bootmgfw.efi57494e444f5753000100000088000000780000004200430044004f0042004a004500430054003d007b00390064006500610038003600320063002d0035006300640064002d0034006500370030002d0061006300630031002d006600330032006200330034003400640034003700390035007d00000048000100000010000000040000007fff0400
dp: 04 01 2a 00 02 00 00 00 00 08 a0 00 00 00 00 00 00 20 08 00 00 00 00 00 9f df be 26 32 4b 5d 43 98 fb 4e 9e 25 ce 28 00 02 02 / 04 04 46 00 5c 00 45 00 46 00 49 00 5c 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 5c 00 42 00 6f 00 6f 00 74 00 5c 00 62 00 6f 00 6f 00 74 00 6d 00 67 00 66 00 77 00 2e 00 65 00 66 00 69 00 00 00 / 7f ff 04 00
data: 57 49 4e 44 4f 57 53 00 01 00 00 00 88 00 00 00 78 00 00 00 42 00 43 00 44 00 4f 00 42 00 4a 00 45 00 43 00 54 00 3d 00 7b 00 39 00 64 00 65 00 61 00 38 00 36 00 32 00 63 00 2d 00 35 00 63 00 64 00 64 00 2d 00 34 00 65 00 37 00 30 00 2d 00 61 00 63 00 63 00 31 00 2d 00 66 00 33 00 32 00 62 00 33 00 34 00 34 00 64 00 34 00 37 00 39 00 35 00 7d 00 00 00 48 00 01 00 00 00 10 00 00 00 04 00 00 00 7f ff 04 00
Boot0004* Windows Boot Manager HD(2,GPT,26bedf9f-4b32-435d-98fb-4e9e25ce2800,0xa00800,0x82000)/\EFI\Microsoft\Boot\bootmgfw.efi57494e444f5753000100000088000000780000004200430044004f0042004a004500430054003d007b00390064006500610038003600320063002d0035006300640064002d0034006500370030002d0061006300630031002d006600330032006200330034003400640034003700390035007d00000048000100000010000000040000007fff0400
dp: 04 01 2a 00 02 00 00 00 00 08 a0 00 00 00 00 00 00 20 08 00 00 00 00 00 9f df be 26 32 4b 5d 43 98 fb 4e 9e 25 ce 28 00 02 02 / 04 04 46 00 5c 00 45 00 46 00 49 00 5c 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 5c 00 42 00 6f 00 6f 00 74 00 5c 00 62 00 6f 00 6f 00 74 00 6d 00 67 00 66 00 77 00 2e 00 65 00 66 00 69 00 00 00 / 7f ff 04 00
data: 57 49 4e 44 4f 57 53 00 01 00 00 00 88 00 00 00 78 00 00 00 42 00 43 00 44 00 4f 00 42 00 4a 00 45 00 43 00 54 00 3d 00 7b 00 39 00 64 00 65 00 61 00 38 00 36 00 32 00 63 00 2d 00 35 00 63 00 64 00 64 00 2d 00 34 00 65 00 37 00 30 00 2d 00 61 00 63 00 63 00 31 00 2d 00 66 00 33 00 32 00 62 00 33 00 34 00 34 00 64 00 34 00 37 00 39 00 35 00 7d 00 00 00 48 00 01 00 00 00 10 00 00 00 04 00 00 00 7f ff 04 00
Boot0005* Fedora HD(1,GPT,6975d142-18c0-4bf5-9dfa-dba4622a2aab,0x800,0x12c000)/\EFI\fedora\shimx64.efi
dp: 04 01 2a 00 01 00 00 00 00 08 00 00 00 00 00 00 00 c0 12 00 00 00 00 00 42 d1 75 69 c0 18 f5 4b 9d fa db a4 62 2a 2a ab 02 02 / 04 04 34 00 5c 00 45 00 46 00 49 00 5c 00 66 00 65 00 64 00 6f 00 72 00 61 00 5c 00 73 00 68 00 69 00 6d 00 78 00 36 00 34 00 2e 00 65 00 66 00 69 00 00 00 / 7f ff 04 00
Boot2001* EFI USB Device RC
dp: 7f ff 04 00
data: 52 43
Boot2002* EFI DVD/CDROM RC
dp: 7f ff 04 00
data: 52 43
Boot2003* EFI Network RC
dp: 7f ff 04 00
data: 52 43


```shell
efivar -l | grep fw

Above command returns empty.

sudo tree /boot
/boot
├── config-6.7.10-200.fc39.x86_64
├── config-6.7.11-200.fc39.x86_64
├── config-6.8.4-200.fc39.x86_64
├── efi
│   ├── EFI
│   │   ├── BOOT
│   │   │   ├── BOOTIA32.EFI
│   │   │   ├── BOOTX64.EFI
│   │   │   ├── fbia32.efi
│   │   │   └── fbx64.efi
│   │   └── fedora
│   │       ├── BOOTIA32.CSV
│   │       ├── BOOTX64.CSV
│   │       ├── gcdia32.efi
│   │       ├── gcdx64.efi
│   │       ├── grub.cfg
│   │       ├── grubia32.efi
│   │       ├── grubx64.efi
│   │       ├── mmia32.efi
│   │       ├── mmx64.efi
│   │       ├── shim.efi
│   │       ├── shimia32.efi
│   │       └── shimx64.efi
│   ├── mach_kernel
│   └── System
│       └── Library
│           └── CoreServices
│               └── SystemVersion.plist
├── grub2
│   ├── fonts
│   │   └── unicode.pf2
│   ├── grub.cfg
│   └── grubenv
├── initramfs-0-rescue-f430515d1e424da0aa37ee30fe09544e.img
├── initramfs-6.7.10-200.fc39.x86_64.img
├── initramfs-6.7.11-200.fc39.x86_64.img
├── initramfs-6.8.4-200.fc39.x86_64.img
├── loader
│   └── entries
│       ├── f430515d1e424da0aa37ee30fe09544e-0-rescue.conf
│       ├── f430515d1e424da0aa37ee30fe09544e-6.7.10-200.fc39.x86_64.conf
│       ├── f430515d1e424da0aa37ee30fe09544e-6.7.11-200.fc39.x86_64.conf
│       └── f430515d1e424da0aa37ee30fe09544e-6.8.4-200.fc39.x86_64.conf
├── lost+found
├── symvers-6.7.10-200.fc39.x86_64.xz -> /lib/modules/6.7.10-200.fc39.x86_64/symvers.xz
├── symvers-6.7.11-200.fc39.x86_64.xz -> /lib/modules/6.7.11-200.fc39.x86_64/symvers.xz
├── symvers-6.8.4-200.fc39.x86_64.xz -> /lib/modules/6.8.4-200.fc39.x86_64/symvers.xz
├── System.map-6.7.10-200.fc39.x86_64
├── System.map-6.7.11-200.fc39.x86_64
├── System.map-6.8.4-200.fc39.x86_64
├── vmlinuz-0-rescue-f430515d1e424da0aa37ee30fe09544e
├── vmlinuz-6.7.10-200.fc39.x86_64
├── vmlinuz-6.7.11-200.fc39.x86_64
└── vmlinuz-6.8.4-200.fc39.x86_64

Additional questions

  • Operating system and version: Fedora 39
  • Have you tried rebooting? Yes, multiple times
  • Is this a regression? No
  • Are you using an NVMe disk? Yes
  • Is secure boot enabled? Yes
  • Is this a Lenovo system with 'Boot Order Lock' turned on in the BIOS?
@Lee245 Lee245 added the bug label Apr 9, 2024
@superm1
Copy link
Member

superm1 commented Apr 9, 2024

You're missing all the "interesting" output from fwupdtool get-updates -vv. It's on stderr, can you redirect that and capture it too?

@Lee245
Copy link
Author

Lee245 commented Apr 9, 2024

You're missing all the "interesting" output from fwupdtool get-updates -vv. It's on stderr, can you redirect that and capture it too?

Woops, should be there now.

@superm1
Copy link
Member

superm1 commented Apr 9, 2024

OK, one more thing. Can you please run sudo fwupdtool refresh -vv and share?

@superm1
Copy link
Member

superm1 commented Apr 9, 2024

And can you please attach /var/lib/fwupd/metadata/lvfs-testing/metadata.xml.zst and /var/lib/fwupd/metadata/lvfs-testing/metadata.xml.zst.jcat after as well?

@Lee245
Copy link
Author

Lee245 commented Apr 9, 2024

refresh.log
metadata.zip

Here you go, my good sir.

@superm1
Copy link
Member

superm1 commented Apr 9, 2024

Hmm, looks like no components in the silo to me. This seems pretty bad @hughsie.
We should have seen

	g_info("%u components now in silo", components->len);

@superm1
Copy link
Member

superm1 commented Apr 9, 2024

Seems to be tied specifically to zstd..

@Lee245
Copy link
Author

Lee245 commented Apr 9, 2024

Seems to be tied specifically to zstd..

Someone on the Framework forums had a similar issue and reportedly got it working again by clean up the var folder and disabling and enabling all remotes. I may try that, but I'm also willing to further assist with tracking down this possible bug, if there's anything I can do.

@hughsie
Copy link
Member

hughsie commented Apr 9, 2024

Seems to be something funky about decoding the file:

ninja && G_MESSAGES_DEBUG=all ./src/xb-tool compile test.xmlb metadata.xml.zst -v -p
ignoring invalid file /home/hughsie/Downloads/metadata.xml.zst:ctime=1712688114.854182: Mismatched XML

The last chunk of decoded data seems to be org.uefi.capsule</value></custom><releases><release id=" which is obviously not correct.

@superm1
Copy link
Member

superm1 commented Apr 9, 2024

It's specifically with libxmlb's decompression. Running unzstd metadata.xml.zst and then G_MESSAGES_DEBUG=all xb-tool compile test.xmlb metadata.xml -v -p seems to work

@hughsie
Copy link
Member

hughsie commented Apr 9, 2024

I've got an idea; one sec.

@superm1
Copy link
Member

superm1 commented Apr 9, 2024

Regression from hughsie/libxmlb@20eeebd perhaps?

hughsie added a commit to hughsie/libxmlb that referenced this issue Apr 9, 2024
This partially reverts 20eeebd, but instead
moves the success check to after we update bytes_read and bytes_written.

Fixes fwupd/fwupd#7060
@hughsie
Copy link
Member

hughsie commented Apr 9, 2024

I think so; hughsie/libxmlb#170 is probably the right fix and seems to work with everything I have to throw at it.

@hughsie
Copy link
Member

hughsie commented Apr 9, 2024

If that works I can do a new libxmlb tarball on Thursday.

@superm1
Copy link
Member

superm1 commented Apr 9, 2024

Yeah that works for me.

superm1 added a commit that referenced this issue Apr 9, 2024
hughsie added a commit to hughsie/libxmlb that referenced this issue Apr 9, 2024
This partially reverts 20eeebd, but instead
moves the success check to after we update bytes_read and bytes_written.

Fixes fwupd/fwupd#7060
superm1 added a commit that referenced this issue Apr 9, 2024
superm1 added a commit that referenced this issue Apr 9, 2024
Fixes #7060

(cherry picked from commit 3abb56c)
@joakim-tjernlund
Copy link

hmm, updated to libxmlb-0.3.18 and my fwupdmgr still shows:
Successfully downloaded new metadata: 0 local devices supported

@joakim-tjernlund
Copy link

fwupdmgr get-devices
LENOVO 21HES2J20G
│
├─13th Gen Intel Core™ i7-1370P:
│     Device ID:          4bde70ba4e39b28f9eab1628f9dd6e6244c03027
│     Current version:    0x0000411c
│     Vendor:             Intel
│     GUIDs:              c3f97ae6-7da2-54cc-ad26-3225f9517203 ← CPUID\PRO_0&FAM_06&MOD_BA
│                         557a4f44-6981-5889-8676-684b9727b697 ← CPUID\PRO_0&FAM_06&MOD_BA&STP_2
│     Device Flags:       • Internal device
│   
├─Fingerprint Sensor:
│     Device ID:          1f914e619b232dc4da68ec3389b98b20163003a2
│     Summary:            Match-On-Chip fingerprint sensor
│     Current version:    01000352
│     Vendor:             Goodix (USB:0x27C6)
│     Install Duration:   10 seconds
│     Serial Number:      UID0D72C39E_XXXX_MOC_B0
│     GUID:               14450e82-8667-54c3-98e1-098d8c6dc3b8 ← USB\VID_27C6&PID_6594
│     Device Flags:       • Updatable
│                         • Device can recover flash failures
│                         • Signed Payload
│   
├─Integrated RGB Camera:
│     Device ID:          23ec719b6aabc2d2dac5176c232f0da7a21881b0
│     Current version:    68.8
│     Vendor:             SunplusIT Inc (USB:0x5986)
│     Serial Number:      01.00.00
│     GUID:               d9b95caa-1706-5d2d-8ea4-e19fdfb246a7 ← USB\VID_5986&PID_2142
│     Device Flags:       • Updatable
│   
├─MZVL2512HDJD-00BLL:
│     Device ID:          03281da317dccd2b18de2bd1cc70a782df40ed7e
│     Summary:            NVM Express solid state drive
│     Current version:    6L2QGXD7
│     Vendor:             Samsung (NVME:0x144D)
│     Serial Number:      S760NE0W812423
│     GUIDs:              bec63ed7-a95f-54fe-b8cc-8e9fee64ba5a ← NVME\VEN_144D&DEV_A80A
│                         310f81b5-6fce-501e-acfb-487d10501e78 ← NVME\VEN_144D&DEV_A80A&SUBSYS_144DA801
│                         8aa4f523-f64a-57b5-9e3e-623df117ed3f ← SAMSUNG MZVL2512HDJD-00BLL
│     Device Flags:       • Internal device
│                         • Updatable
│                         • System requires external power source
│                         • Needs a reboot after installation
│                         • Device is usable for the duration of the update
│                         • Signed Payload
│   
├─Raptor Lake-P [Iris Xe Graphics]:
│     Device ID:          5792b48846ce271fab11c4a545f7a3df0d36e00a
│     Current version:    04
│     Vendor:             Intel Corporation (PCI:0x8086)
│     GUIDs:              0e8b1f1a-8c2b-53b6-89d7-d1a05dbc039d ← PCI\VEN_8086&DEV_A7A0
│                         b4d3d7b2-aba5-529e-ae7c-a5f1d765ca04 ← PCI\VEN_8086&DEV_A7A0&SUBSYS_17AA230E
│     Device Flags:       • Internal device
│                         • Cryptographic hash verification is available
│   
├─System Firmware:
│ │   Device ID:          398af2f706c8d17f9c58b4837c8322dfcd3c7c32
│ │   Summary:            UEFI System Resource Table device (updated via NVRAM)
│ │   Current version:    65580
│ │   Vendor:             LENOVO (DMI:LENOVO)
│ │   Update State:       Success
│ │   GUID:               a1e2c5f2-a296-4603-9a8b-61737d4e3ea6
│ │   Device Flags:       • Internal device
│ │                       • Updatable
│ │                       • System requires external power source
│ │                       • Needs a reboot after installation
│ │                       • Device is usable for the duration of the update
│ │   Device Requests:    • Message
│ │ 
│ └─UEFI dbx:
│       Device ID:        362301da643102b9f38477387e2193e57abaa590
│       Summary:          UEFI revocation database
│       Current version:  450
│       Minimum Version:  450
│       Vendor:           UEFI:Linux Foundation
│       Install Duration: 1 second
│       GUIDs:            5971a208-da00-5fce-b5f5-1234342f9cf7 ← UEFI\CRT_A9087D1044AD18F7A94916D284CBC01827CF23CD8F60B79072C9CAA1FEF4D649&ARCH_X64
│                         f8ba2887-9411-5c36-9cee-88995bb39731 ← UEFI\CRT_A1117F516A32CEFCBA3F2D1ACE10A87972FD6BBE8FE0D0B996E09E65D802A503&ARCH_X64
│       Device Flags:     • Internal device
│                         • Updatable
│                         • Needs a reboot after installation
│                         • Device is usable for the duration of the update
│                         • Only version upgrades are allowed
│                         • Signed Payload
│     
├─ThinkPad Universal USB-C Dock:
│ │   Device ID:          b7730620e76c0895d57180796b424791c3b973fe
│ │   Summary:            Dock Management Controller Device
│ │   Current version:    3.0.8.5
│ │   Vendor:             Lenovo (USB:0x17EF)
│ │   Install Duration:   1 minute
│ │   Serial Number:      1SSD21B41469ZVR08KVN
│ │   GUID:               959b1e72-280e-5453-a5eb-d9d5c7674211 ← USB\VID_17EF&PID_30A9
│ │   Device Flags:       • Updatable
│ │                       • System requires external power source
│ │                       • Device stages updates
│ │                       • Device can recover flash failures
│ │                       • Signed Payload
│ │   Device Requests:    • Message
│ │ 
│ └─DMC:
│       Device ID:        62423e2d3c64fa153a80c062e66865b90fda7362
│       Current version:  3.3.0.1746
│       Vendor:           Lenovo (USB:0x17EF)
│       GUID:             2f9f0d4e-3713-5086-af85-b8f815549986 ← USB\VID_17EF&PID_30A9&CID_00
│     
├─UEFI Device Firmware:
│     Device ID:          81568164782039dbd4a74856cacb9800f408d44e
│     Summary:            UEFI System Resource Table device (updated via NVRAM)
│     Current version:    70159
│     Vendor:             DMI:LENOVO
│     Update State:       Success
│     GUID:               4e88068b-41b2-4e05-893c-db0b43f7d348
│     Device Flags:       • Internal device
│                         • Updatable
│                         • System requires external power source
│                         • Needs a reboot after installation
│                         • Device is usable for the duration of the update
│     Device Requests:    • Message
│   
├─UEFI Device Firmware:
│     Device ID:          7dccda75b1f76a97e675b08e7e0f8ab9924ad9ce
│     Summary:            UEFI System Resource Table device (updated via NVRAM)
│     Current version:    1
│     Minimum Version:    1
│     Vendor:             DMI:LENOVO
│     Update State:       Success
│     GUID:               69585d92-b50a-4ad7-b265-2eb1ae066574
│     Device Flags:       • Internal device
│                         • Updatable
│                         • System requires external power source
│                         • Needs a reboot after installation
│                         • Device is usable for the duration of the update
│     Device Requests:    • Message
│   
├─UEFI Device Firmware:
│     Device ID:          999906f18a07761ee638cf923b4b105cb233eb36
│     Summary:            UEFI System Resource Table device (updated via NVRAM)
│     Current version:    18548864
│     Minimum Version:    1
│     Vendor:             DMI:LENOVO
│     Update State:       Success
│     GUID:               a75b4667-fb93-4996-8908-c73a0f158ad2
│     Device Flags:       • Internal device
│                         • Updatable
│                         • System requires external power source
│                         • Needs a reboot after installation
│                         • Device is usable for the duration of the update
│     Device Requests:    • Message
│   
├─UEFI Device Firmware:
│     Device ID:          c01a36700fd737f733f9e71ac4584eea70e585b9
│     Summary:            UEFI System Resource Table device (updated via NVRAM)
│     Current version:    65547
│     Minimum Version:    65547
│     Vendor:             DMI:LENOVO
│     Update State:       Success
│     GUID:               761a1bfd-4e9c-4d72-b3d4-f007bdd055eb
│     Device Flags:       • Internal device
│                         • Updatable
│                         • System requires external power source
│                         • Needs a reboot after installation
│                         • Device is usable for the duration of the update
│     Device Requests:    • Message
│   
├─UEFI Device Firmware:
│     Device ID:          a738bdd605180fe350a1875a01f338e22c2bfe86
│     Summary:            UEFI System Resource Table device (updated via NVRAM)
│     Current version:    16777222
│     Minimum Version:    1
│     Vendor:             DMI:LENOVO
│     Update State:       Success
│     GUID:               e7b20c29-9064-450a-b683-129613db9f4d
│     Device Flags:       • Internal device
│                         • Updatable
│                         • System requires external power source
│                         • Needs a reboot after installation
│                         • Device is usable for the duration of the update
│     Device Requests:    • Message
│   
├─UEFI Device Firmware:
│     Device ID:          e22d433baf95ee3e9ee15370436292594d7a5859
│     Summary:            UEFI System Resource Table device (updated via NVRAM)
│     Current version:    0
│     Minimum Version:    1
│     Vendor:             DMI:LENOVO
│     Update State:       Success
│     GUID:               b6a5e96c-e3ad-4574-80f4-2208be4cd095
│     Device Flags:       • Internal device
│                         • Updatable
│                         • System requires external power source
│                         • Needs a reboot after installation
│                         • Device is usable for the duration of the update
│     Device Requests:    • Message
│   
├─UEFI Device Firmware:
│     Device ID:          fb90ad8104a1d661b81656e7ac19d76eb2841da6
│     Summary:            UEFI System Resource Table device (updated via NVRAM)
│     Current version:    1
│     Minimum Version:    1
│     Vendor:             DMI:LENOVO
│     Update State:       Success
│     GUID:               e08a58ee-becc-456c-bedf-a08d3743a921
│     Device Flags:       • Internal device
│                         • Updatable
│                         • System requires external power source
│                         • Needs a reboot after installation
│                         • Device is usable for the duration of the update
│     Device Requests:    • Message
│   
├─UEFI Device Firmware:
│     Device ID:          2e04862af34ef5ee3f391e879c62c3aaab208f9a
│     Summary:            UEFI System Resource Table device (updated via NVRAM)
│     Current version:    66305
│     Minimum Version:    66305
│     Vendor:             DMI:LENOVO
│     Update State:       Success
│     GUID:               f7e8e6d2-81d1-49ac-b693-0d510a2fb851
│     Device Flags:       • Internal device
│                         • Updatable
│                         • System requires external power source
│                         • Needs a reboot after installation
│                         • Device is usable for the duration of the update
│     Device Requests:    • Message
│   
├─UEFI Device Firmware:
│     Device ID:          f905a7bd8805851b14be474d006372f37cc9342d
│     Summary:            UEFI System Resource Table device (updated via NVRAM)
│     Current version:    1
│     Vendor:             DMI:LENOVO
│     Update State:       Success
│     GUID:               76ca0ad8-4a14-4389-b7e5-fd88791762ad
│     Device Flags:       • Internal device
│                         • Updatable
│                         • System requires external power source
│                         • Needs a reboot after installation
│                         • Device is usable for the duration of the update
│     Device Requests:    • Message
│   
├─UEFI Device Firmware:
│     Device ID:          7e6427fb78fdb31553c3589b14cf9a40bd2e1f2e
│     Summary:            UEFI System Resource Table device (updated via NVRAM)
│     Current version:    1
│     Vendor:             DMI:LENOVO
│     Update State:       Success
│     GUID:               626d93db-2c42-48c3-915a-71f968a81b04
│     Device Flags:       • Internal device
│                         • Updatable
│                         • System requires external power source
│                         • Needs a reboot after installation
│                         • Device is usable for the duration of the update
│     Device Requests:    • Message
│   
├─UEFI Device Firmware:
│     Device ID:          d86f3b26726f0d5a019114da9d998c9f6e74f3f2
│     Summary:            UEFI System Resource Table device (updated via NVRAM)
│     Current version:    26632
│     Vendor:             DMI:LENOVO
│     Update State:       Success
│     GUID:               7c8c8f35-5986-2142-1f05-5d421411746b
│     Device Flags:       • Internal device
│                         • Updatable
│                         • System requires external power source
│                         • Needs a reboot after installation
│                         • Device is usable for the duration of the update
│     Device Requests:    • Message
│   
├─UEFI Device Firmware:
│     Device ID:          910c45d544230612bfd6b62e5590556cd0b9f7d2
│     Summary:            UEFI System Resource Table device (updated via NVRAM)
│     Current version:    196608
│     Minimum Version:    57374
│     Vendor:             DMI:LENOVO
│     Update State:       Success
│     GUID:               4505c107-9907-43ec-90fc-2285777c4efd
│     Device Flags:       • Internal device
│                         • Updatable
│                         • System requires external power source
│                         • Needs a reboot after installation
│                         • Device is usable for the duration of the update
│     Device Requests:    • Message
│   
├─UEFI Device Firmware:
│     Device ID:          071b9eeefca13dbd269fcc44271321a1ab7b5dbe
│     Summary:            UEFI System Resource Table device (updated via NVRAM)
│     Current version:    196608
│     Minimum Version:    57374
│     Vendor:             DMI:LENOVO
│     Update State:       Success
│     GUID:               54cb734c-975c-4a74-9556-57ae6d9a2229
│     Device Flags:       • Internal device
│                         • Updatable
│                         • System requires external power source
│                         • Needs a reboot after installation
│                         • Device is usable for the duration of the update
│     Device Requests:    • Message
│   
├─UEFI Device Firmware:
│     Device ID:          403cf5e7bd3a227ed00a9d00875cdcf81a56eb08
│     Summary:            UEFI System Resource Table device (updated via NVRAM)
│     Current version:    1
│     Vendor:             DMI:LENOVO
│     Update State:       Success
│     GUID:               41e18891-fb01-4da3-a483-5b05ccbb5767
│     Device Flags:       • Internal device
│                         • Updatable
│                         • System requires external power source
│                         • Needs a reboot after installation
│                         • Device is usable for the duration of the update
│     Device Requests:    • Message
│   
├─UEFI Device Firmware:
│     Device ID:          32de03ef370e5da5582976b375b3946e03236bb2
│     Summary:            UEFI System Resource Table device (updated via NVRAM)
│     Current version:    18548864
│     Vendor:             DMI:LENOVO
│     Update State:       Success
│     GUID:               4e78ce68-5389-4a95-bf10-e3568c30caf8
│     Device Flags:       • Internal device
│                         • Updatable
│                         • System requires external power source
│                         • Needs a reboot after installation
│                         • Device is usable for the duration of the update
│     Device Requests:    • Message
│   
├─UEFI Device Firmware:
│     Device ID:          bede098fde861317d555511f082f412aa2285b09
│     Summary:            UEFI System Resource Table device (updated via NVRAM)
│     Current version:    3344935
│     Vendor:             DMI:LENOVO
│     Update State:       Success
│     GUID:               023a338b-246f-47e0-b4e5-304203184ec1
│     Device Flags:       • Internal device
│                         • Updatable
│                         • System requires external power source
│                         • Needs a reboot after installation
│                         • Device is usable for the duration of the update
│     Device Requests:    • Message

@superm1
Copy link
Member

superm1 commented Apr 11, 2024

Have you restarted the service since upgrading and refreshed metadata since then?

@superm1
Copy link
Member

superm1 commented Apr 11, 2024

And also what version of libxmlb was the daemon compiled against? Perhaps can we see a build log?

@joakim-tjernlund
Copy link

Yes to both Qs above. Rebuilt fwupd against new libxlmb too(on Gentoo)

@superm1
Copy link
Member

superm1 commented Apr 11, 2024

Okay, please open another issue and attach daemon logs with -vv added to the exec command.

From the client run the refresh cycle and let's see what it shows.

Please also attach build logs for fwupd.

@joakim-tjernlund
Copy link

 fwupdmgr refresh -vv --force 
(fwupdmgr:6082): GLib-DEBUG: 19:15:26.147: setenv()/putenv() are not thread-safe and should not be used after threads are created
(pkttyagent:6084): GLib-GIO-DEBUG: 19:15:26.149: Using cross-namespace EXTERNAL authentication (this will deadlock if server is GDBus < 2.73.3)
(fwupdmgr:6082): GLib-GIO-DEBUG: 19:15:26.153: Using cross-namespace EXTERNAL authentication (this will deadlock if server is GDBus < 2.73.3)
(fwupdmgr:6082): GLib-GIO-DEBUG: 19:15:26.154: _g_io_module_get_default: Found default implementation dconf (DConfSettingsBackend) for ‘gsettings-backend’
(fwupdmgr:6082): dconf-DEBUG: 19:15:26.154: watch_fast: "/system/proxy/" (establishing: 0, active: 0)
(fwupdmgr:6082): dconf-DEBUG: 19:15:26.154: watch_fast: "/system/proxy/http/" (establishing: 0, active: 0)
(fwupdmgr:6082): dconf-DEBUG: 19:15:26.154: watch_fast: "/system/proxy/https/" (establishing: 0, active: 0)
(fwupdmgr:6082): dconf-DEBUG: 19:15:26.154: watch_fast: "/system/proxy/ftp/" (establishing: 0, active: 0)
(fwupdmgr:6082): dconf-DEBUG: 19:15:26.154: watch_fast: "/system/proxy/socks/" (establishing: 0, active: 0)
(fwupdmgr:6082): dconf-DEBUG: 19:15:26.154: unwatch_fast: "/system/proxy/" (active: 0, establishing: 1)
(fwupdmgr:6082): dconf-DEBUG: 19:15:26.154: unwatch_fast: "/system/proxy/http/" (active: 0, establishing: 1)
(fwupdmgr:6082): dconf-DEBUG: 19:15:26.154: unwatch_fast: "/system/proxy/https/" (active: 0, establishing: 1)
(fwupdmgr:6082): dconf-DEBUG: 19:15:26.154: unwatch_fast: "/system/proxy/ftp/" (active: 0, establishing: 1)
(fwupdmgr:6082): dconf-DEBUG: 19:15:26.154: unwatch_fast: "/system/proxy/socks/" (active: 0, establishing: 1)
(fwupdmgr:6082): GLib-GIO-DEBUG: 19:15:26.154: Using cross-namespace EXTERNAL authentication (this will deadlock if server is GDBus < 2.73.3)
(fwupdmgr:6082): GLib-GIO-DEBUG: 19:15:26.154: Using cross-namespace EXTERNAL authentication (this will deadlock if server is GDBus < 2.73.3)
(fwupdmgr:6082): dconf-DEBUG: 19:15:26.154: watch_established: "/system/proxy/" (establishing: 0)
(fwupdmgr:6082): dconf-DEBUG: 19:15:26.154: watch_established: "/system/proxy/http/" (establishing: 0)
(fwupdmgr:6082): dconf-DEBUG: 19:15:26.154: watch_established: "/system/proxy/https/" (establishing: 0)
(fwupdmgr:6082): dconf-DEBUG: 19:15:26.155: watch_established: "/system/proxy/ftp/" (establishing: 0)
(fwupdmgr:6082): dconf-DEBUG: 19:15:26.155: watch_established: "/system/proxy/socks/" (establishing: 0)
(fwupdmgr:6082): GLib-GIO-DEBUG: 19:15:26.155: _g_io_module_get_default: Found default implementation gvfs (GDaemonVfs) for ‘gio-vfs’
(fwupdmgr:6082): pxbackend-DEBUG: 19:15:26.155: px_config_sysconfig_set_config_file: Could not read file /etc/sysconfig/proxy
(fwupdmgr:6082): pxbackend-DEBUG: 19:15:26.155: Active config plugins:
(fwupdmgr:6082): pxbackend-DEBUG: 19:15:26.155:  - config-env
(fwupdmgr:6082): pxbackend-DEBUG: 19:15:26.155:  - config-sysconfig
(fwupdmgr:6082): GLib-GIO-DEBUG: 19:15:26.155: Failed to initialize portal (GNetworkMonitorPortal) for gio-network-monitor: Not using portals
(fwupdmgr:6082): GLib-GIO-DEBUG: 19:15:26.156: _g_io_module_get_default: Found default implementation networkmanager (GNetworkMonitorNM) for ‘gio-network-monitor’
(fwupdmgr:6082): pxbackend-DEBUG: 19:15:26.156: px_manager_on_network_changed: Network connection changed, clearing pac data
(fwupdmgr:6082): pxbackend-DEBUG: 19:15:26.156: px_manager_constructed: Up and running
(fwupdmgr:6082): GLib-GIO-DEBUG: 19:15:26.156: _g_io_module_get_default: Found default implementation libproxy (GLibproxyResolver) for ‘gio-proxy-resolver’
(fwupdmgr:6082): Fwupd-DEBUG: 19:15:26.157: Emitting ::status-changed() [idle]
Updating lvfs-testing
Fwupd-INFO: 19:15:26.159: downloading https://cdn.fwupd.org/downloads/firmware-testing.xml.zst.jcat
(fwupdmgr:6082): pxbackend-DEBUG: 19:15:26.159: px_manager_get_proxies_sync: url=https://cdn.fwupd.org/downloads/firmware-testing.xml.zst.jcat online=1
(fwupdmgr:6082): pxbackend-DEBUG: 19:15:26.159: px_manager_get_proxies_sync: Proxy[0] = direct://
(fwupdmgr:6082): Fwupd-DEBUG: 19:15:26.159: Emitting ::status-changed() [downloading]
Downloading…             [      \                                ]Fwupd-INFO: 19:15:26.398: download progress: 100%
(fwupdmgr:6082): Fwupd-DEBUG: 19:15:26.398: Emitting ::status-changed() [idle]
Fwupd-INFO: 19:15:26.398: status-code was 200
Fwupd-INFO: 19:15:26.399: changing metadata URI from https://cdn.fwupd.org/downloads/firmware-testing.xml.zst to https://cdn.fwupd.org/downloads/firmware-05534-testing.xml.zst
Fwupd-INFO: 19:15:26.399: metadata signature of lvfs-testing is unchanged, skipping

Updating lvfs
Fwupd-INFO: 19:15:26.399: downloading https://cdn.fwupd.org/downloads/firmware.xml.zst.jcat
(fwupdmgr:6082): pxbackend-DEBUG: 19:15:26.399: px_manager_get_proxies_sync: url=https://cdn.fwupd.org/downloads/firmware.xml.zst.jcat online=1
(fwupdmgr:6082): pxbackend-DEBUG: 19:15:26.399: px_manager_get_proxies_sync: Proxy[0] = direct://
(fwupdmgr:6082): Fwupd-DEBUG: 19:15:26.399: Emitting ::status-changed() [downloading]
Downloading…             [***************************************]Fwupd-INFO: 19:15:26.636: download progress: 0%
Fwupd-INFO: 19:15:26.636: download progress: 100%
Downloading…             [***************************************](fwupdmgr:6082): Fwupd-DEBUG: 19:15:26.636: Emitting ::status-changed() [idle]
Fwupd-INFO: 19:15:26.636: status-code was 200
Fwupd-INFO: 19:15:26.636: changing metadata URI from https://cdn.fwupd.org/downloads/firmware.xml.zst to https://cdn.fwupd.org/downloads/firmware-07166-stable.xml.zst
Fwupd-INFO: 19:15:26.636: metadata signature of lvfs is unchanged, skipping

@joakim-tjernlund
Copy link

oh, new issue. OK will do

@superm1
Copy link
Member

superm1 commented Apr 11, 2024

oh, new issue. OK will do

Yes please

fwupdmgr refresh -vv --force

Not the client; the daemon. like modify fwupd.service. and then reload systemd units.

@joakim-tjernlund
Copy link

#7078

@aenertia
Copy link

Affects FC40 as well (0.3.18 has not been pushed to testing).

`aenertia@emiemi:~$ dnf info libxmlb
Last metadata expiration check: 0:00:29 ago on Tue 16 Apr 2024 15:00:13.
Installed Packages
Name : libxmlb
Version : 0.3.17
Release : 1.fc40
Architecture : x86_64
Size : 288 k
Source : libxmlb-0.3.17-1.fc40.src.rpm
Repository : @System
From repo : updates-testing
Summary : Library for querying compressed XML metadata
URL : https://github.com/hughsie/libxmlb
License : LGPL-2.1-or-later
Description : XML is slow to parse and strings inside the document cannot be memory mapped as
: they do not have a trailing NUL char. The libxmlb library takes XML source, and
: converts it to a structured binary representation with a deduplicated string
: table -- where the strings have the NULs included.
:
: This allows an application to mmap the binary XML file, do an XPath query and
: return some strings without actually parsing the entire document. This is all
: done using (almost) zero allocations and no actual copying of the binary data.

@superm1
Copy link
Member

superm1 commented Apr 16, 2024

Affects FC40 as well (0.3.18 has not been pushed to testing).

`aenertia@emiemi:~$ dnf info libxmlb
Last metadata expiration check: 0:00:29 ago on Tue 16 Apr 2024 15:00:13.
Installed Packages
Name : libxmlb
Version : 0.3.17
Release : 1.fc40
Architecture : x86_64
Size : 288 k
Source : libxmlb-0.3.17-1.fc40.src.rpm
Repository : @System
From repo : updates-testing
Summary : Library for querying compressed XML metadata
URL : https://github.com/hughsie/libxmlb
License : LGPL-2.1-or-later
Description : XML is slow to parse and strings inside the document cannot be memory mapped as
: they do not have a trailing NUL char. The libxmlb library takes XML source, and
: converts it to a structured binary representation with a deduplicated string
: table -- where the strings have the NULs included.
:
: This allows an application to mmap the binary XML file, do an XPath query and
: return some strings without actually parsing the entire document. This is all
: done using (almost) zero allocations and no actual copying of the binary data.

From an upstream perspective it's finished. I suggest advocating for that change in the matching RH bugzilla.

@hughsie
Copy link
Member

hughsie commented Apr 16, 2024

0.3.18 has not been pushed to testing

It's been in testing for a while: https://bodhi.fedoraproject.org/updates/FEDORA-2024-a960990153

@tristan957
Copy link

tristan957 commented Apr 16, 2024

This still doesn't seem to work for me. I installed the RPM from the link above, and fwupdmgr still doesn't seem to recognize the update. I have lvfs-testing enabled. I made sure to restart after installing the libxmlb update.

$ dnf info libxmlb
Last metadata expiration check: 0:04:04 ago on Tue 16 Apr 2024 03:46:45 PM CDT.
Installed Packages
Name         : libxmlb
Version      : 0.3.18
Release      : 1.fc40
Architecture : x86_64
Size         : 288 k
Source       : libxmlb-0.3.18-1.fc40.src.rpm
Repository   : @System
From repo    : @commandline
Summary      : Library for querying compressed XML metadata
URL          : https://github.com/hughsie/libxmlb
License      : LGPL-2.1-or-later
Description  : XML is slow to parse and strings inside the document cannot be memory mapped as
             : they do not have a trailing NUL char. The libxmlb library takes XML source, and
             : converts it to a structured binary representation with a deduplicated string
             : table -- where the strings have the NULs included.
             :
             : This allows an application to mmap the binary XML file, do an XPath query and
             : return some strings without actually parsing the entire document. This is all
             : done using (almost) zero allocations and no actual copying of the binary data.

$ fwupdmgr get-remotes
Framework Laptop 13 (AMD Ryzen 7040Series)
│
├─Vendor (Automatic):
│     Remote ID:          vendor-directory
│     Type:               directory
│     Keyring:            none
│     Enabled:            true
│     Priority:           1000
│     Filename:           /usr/share/fwupd/remotes.d/vendor/firmware
│     Filename Source:    /etc/fwupd/remotes.d/vendor-directory.conf
│
├─Linux Vendor Firmware Service (testing):
│     Remote ID:          lvfs-testing
│     Type:               download
│     Keyring:            jcat
│     Enabled:            true
│     P2P Metadata:       true
│     P2P Firmware:       false
│     Checksum:           83158fbc14be98508f3008c2ac8c4ba5d7894583113251e1eed640202fae3338
│     Age:                20 minutes
│     Refresh Interval:   24 hours
│     Priority:           1
│     Filename:           /var/lib/fwupd/metadata/lvfs-testing/metadata.xml.zst
│     Filename Signature: /var/lib/fwupd/metadata/lvfs-testing/metadata.xml.zst.jcat
│     Filename Source:    /etc/fwupd/remotes.d/lvfs-testing.conf
│     Metadata URI:       https://cdn.fwupd.org/downloads/firmware-testing.xml.zst
│     Metadata Signature: https://cdn.fwupd.org/downloads/firmware-testing.xml.zst.jcat
│     Report URI:         https://fwupd.org/lvfs/firmware/report
│     Automatic Reporting:false
│
└─Linux Vendor Firmware Service:
      Remote ID:          lvfs
      Type:               download
      Keyring:            jcat
      Enabled:            true
      P2P Metadata:       true
      P2P Firmware:       false
      Checksum:           cef856c86af364b4f2f5a13a6be7a0272e94cfc43f7c3fa0faf63d5cbfcf381e
      Age:                13 minutes
      Refresh Interval:   24 hours
      Filename:           /var/lib/fwupd/metadata/lvfs/metadata.xml.zst
      Filename Signature: /var/lib/fwupd/metadata/lvfs/metadata.xml.zst.jcat
      Filename Source:    /etc/fwupd/remotes.d/lvfs.conf
      Metadata URI:       https://cdn.fwupd.org/downloads/firmware.xml.zst
      Metadata Signature: https://cdn.fwupd.org/downloads/firmware.xml.zst.jcat
      Report URI:         https://fwupd.org/lvfs/firmware/report
      Automatic Reporting:false

$ fwupdmgr --force refresh
Updating lvfs-testing
Downloading…             [      \                                ]
Updating lvfs
Downloading…             [***************************************]
Successfully downloaded new metadata: 0 local devices supported

$ fwupdmgr get-updates
Devices with no available firmware updates:
 • System Firmware
 • WD BLACK SN850X 1000GB
 • Fingerprint Sensor
 • UEFI dbx
No updatable device

@superm1
Copy link
Member

superm1 commented Apr 16, 2024

Try manually deleting the cache in /var/cache/fwupd. The automatic invalidation we talked about won't work until the next libxmlb version.

@tristan957
Copy link

I deleted it, but still not seeing any changes with respect to the behavior. I have an empty /var/cache/fwupd after sudo rm -rf /var/cache/fwupd/*

@superm1
Copy link
Member

superm1 commented Apr 16, 2024

And then restart the service sudo systemctl restart fwupd.service followed by refreshing again fwupdmgr refresh

@tristan957
Copy link

That was it. Should've followed the linked issue a little better. Thanks for your support once again 😄. fwupd/lvfs are truly life changing pieces of software.

@aenertia
Copy link

aenertia commented Apr 16, 2024 via email

chenhn123 pushed a commit to chenhn123/fwupd that referenced this issue May 21, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
6 participants