- 17 Feb, 2022 1 commit
-
-
Simon Deziel authored
Signed-off-by:Simon Deziel <simon@sdeziel.info>
-
- 15 Feb, 2022 3 commits
-
-
Mario Limonciello authored
-
Mario Limonciello authored
-
Mario Limonciello authored
-
- 14 Feb, 2022 1 commit
-
-
Mario Limonciello authored
-
- 10 Feb, 2022 4 commits
-
-
Mario Limonciello authored
-
Mario Limonciello authored
* New upstream version (1.7.5) * Drop efivar compatibility patch, upstream
-
Mario Limonciello authored
Release fwupd 1.7.5
-
Steve McIntyre authored
built with us. Symbols suggest things should work, but maybe not. :-( Closes: #1003664
-
- 07 Feb, 2022 8 commits
-
-
Richard Hughes authored
-
Richard Hughes authored
This probably means it is unlikely to get any new security updates.
-
Richard Hughes authored
-
Richard Hughes authored
I think this accidentally got inverted during the retimer split.
-
Richard Hughes authored
-
Richard Hughes authored
-
Richard Hughes authored
-
Richard Hughes authored
Fixes https://github.com/fwupd/fwupd/issues/4253
-
- 04 Feb, 2022 6 commits
-
-
Kranthi Kuntala authored
-this is indeed needed to reflect the updated version after system reboot Signed-off-by:Kranthi Kuntala <kranthi.kuntala@intel.corp-partner.google.com> Change-Id: Id4751d531528590cc93c08db0d0939a547f4d59f
-
Richard Hughes authored
I broke this when optimizing fu_context_lookup_quirk_by_id() to only take a GUID. Mea culpa. Fixes https://github.com/fwupd/fwupd/issues/4250
-
This method does not indicate whether the kernel has enabled encryption. That information is only visible from the kernel log at this time. Continue to read the MSRs though, because if/when we get a method for the kernel to export it we may use these as a basis of "support" but not a indication of it being enabled. encrypted: ```FuPluginMsr SME/SEV check MSR: eax 01000f, ebx 016f FuPluginMsr PCI_MSR_AMD64_SYSCFG: 0f40000, sme_is_enabled=1 FuPluginMsr PCI_MSR_AMD64_SEV: 00, sev_is_enabled=0 ``` not_encrypted: ``` FuPluginMsr SME/SEV check MSR: eax 01000f, ebx 016f FuPluginMsr PCI_MSR_AMD64_SYSCFG: 0f40000, sme_is_enabled=1 FuPluginMsr PCI_MSR_AMD64_SEV: 00, sev_is_enabled=0 ```
-
Richard Hughes authored
-
Richard Hughes authored
We've not needed this for several years, and no firmware on the LVFS actually uses this.
-
-
- 03 Feb, 2022 5 commits
-
-
Richard Hughes authored
To use this, do: 'fwupdmgr --version --json'
-
Richard Hughes authored
-
-
-
Fixes: #4244
-
- 01 Feb, 2022 7 commits
-
-
-
Richard Hughes authored
This fixes creating users when the BMC is otherwise busy.
-
Richard Hughes authored
-
Richard Hughes authored
It would appear that in reality a delay is required for them to sync state.
-
Richard Hughes authored
-
Richard Hughes authored
The docs say `(nullable)` and it's the only function that seems to hard require an error, for no good reason I can see.
-
Michał Kopeć authored
Add a quirk for NovaCustom NV4x devices. These laptops are running coreboot and are updatable using flashrom. The HwId GUID matches to both previous Insyde firmware and the current Dasharo firmware. The Dasharo GUID matches to the devices running Dasharo firmware. This way the device can be switched from Insyde to Dasharo using `fwupdmgr switch-branch`. Homepage: https://configurelaptop.eu/nv40-series/ Signed-off-by:
Michał Kopeć <michal.kopec@3mdeb.com>
-
- 31 Jan, 2022 5 commits
-
-
Richard Hughes authored
This has several false positives in Fedora 36 and also slows down the build considerably.
-
Richard Hughes authored
-
Richard Hughes authored
-
Richard Hughes authored
This adds support for optionally using a UNIX domain socket where a D-Bus daemon may not be running. To use this, launch the daemon and clients with something like `FWUPD_DBUS_SOCKET=/var/run/fwupd.sock fwupdmgr get-devices`
-
Richard Hughes authored
See https://github.com/fwupd/fwupd/issues/3644 for details. Fixes https://github.com/fwupd/firmware-dell/issues/105
-