fwupd / firmware-dell

Missing firmware for Dell hardware
28 stars 4 forks source link

Suspicious update offered for Dell XPS 9320 #160

Closed heftig closed 1 year ago

heftig commented 1 year ago

I'm being offered a suspicious update for the Dell XPS 9320 system firmware which is not available via the support website (still at 1.11.0).

The description suggests it is for yet-to-be-released hardware and should not apply to my laptop, which has a 12th gen (Alder Lake), not a 13th gen (Raptor Lake) processor.

> fwupdmgr get-updates                   
Devices with no available firmware updates: 
 • VEN 04F3:00 04F3:31D1
 • 0000:00:1f.5
 • PC801 NVMe SK hynix 1TB
 • TPM 2.0
 • UEFI Device Firmware
 • UEFI Device Firmware
 • UEFI dbx
 • USB4 Retimer
Dell Inc. XPS 9320
│
└─System Firmware:
  │   Device ID:          a45df35ac0e948ee180fe216a5f703f32dda163f
  │   Summary:            UEFI ESRT device
  │   Current version:    1.11.0
  │   Minimum Version:    1.11.0
  │   Vendor:             Dell (DMI:Dell Inc.)
  │   Update State:       Success
  │   GUIDs:              8b8c05a5-31bc-5fa4-9624-24b13f8f6043
  │                       230c8b18-8d9b-53ec-838b-6cfc0383493a ← main-system-firmware
  │   Device Flags:       • Internal device
  │                       • Updatable
  │                       • System requires external power source
  │                       • Supported on remote server
  │                       • Needs a reboot after installation
  │                       • Cryptographic hash verification is available
  │                       • Device is usable for the duration of the update
  │ 
  └─XPS 9320:
        New version:      2.0.0
        Remote ID:        lvfs
        Release ID:       19486
        Summary:          Firmware for the Dell XPS 9320
        License:          Proprietary
        Size:             23.7 MB
        Created:          2023-02-06
        Urgency:          Critical
        Vendor:           Dell
        Release Flags:    • Is upgrade
        Description:      
        This stable release fixes the following issues:

        • Initial Release for 13th generation Intel processors.

Expected behavior

Offered firmware updates match the ones available via Dell's support website.

fwupd version information

> fwupdmgr --version
compile   org.freedesktop.fwupd         1.8.10
compile   com.hughsie.libjcat           0.1.12
compile   org.freedesktop.gusb          0.4.3
runtime   com.hughsie.libjcat           0.1.12
runtime   com.dell.libsmbios            2.4
runtime   org.freedesktop.gusb          0.4.5
runtime   org.freedesktop.fwupd         1.8.10
runtime   org.kernel                    6.1.12-zen1-1-zen

Installed via Pacman on Arch Linux.

fwupd device information ``` > fwupdmgr get-devices --show-all-devices Dell Inc. XPS 9320 │ ├─VEN 04F3:00 04F3:31D1: │ Device ID: cc9c1b47c3126a46379087db3bf18fa324f317ae │ Summary: Touchpad │ Current version: 0x0005 │ Bootloader Version: 0x0001 │ Vendor: ELAN Microelectronics (HIDRAW:0x04F3) │ GUIDs: fadadb06-b338-5cb3-b768-a15defd32971 ← HIDRAW\VEN_04F3&DEV_31D1 │ 835dde6a-99f7-5396-8fc3-2d81a5a7a46f ← HIDRAW\VEN_04F3&DEV_31D1&REV_00 │ 5e04b78f-9251-5cde-9a8d-8c4165bfe0bd ← HIDRAW\VEN_04F3&DEV_31D1&MOD_00A1 │ 4296cbee-f355-5bf6-b62d-a6a286b69414 ← ELANTP\ICTYPE_10 │ 876410d6-a4ff-5907-9e7e-35a82748ebd2 ← ELANTP\ICTYPE_10&MOD_00A1 │ 541f5907-b97b-5260-b293-a0028a370450 ← ELANTP\ICTYPE_10&MOD_00A1&DRIVER_HID │ Device Flags: • Internal device │ • Updatable │ ├─Unknown Device: │ Device ID: 6b5a06645e27c4e94b6e67d5185c46d11ec9ad67 │ GUID: c96751f4-16e8-59ea-975d-69d3dac88d7d ← GPIO\ID_INTC1055:00 │ ├─0000:00:1f.5: │ Device ID: b04e387fb80d2b91f37a4d0c7b21461c451775e1 │ Summary: Memory Technology Device │ Vendor: DMI:Dell Inc. │ GUIDs: 5f93d7e7-e282-59b9-b663-0146e382f8f6 ← MTD\NAME_0000:00:1f.5 │ b858f197-3e26-5077-a45c-69bb2ddd6a9e ← MTD\VENDOR_Dell-Inc.&NAME_0000:00:1f.5 │ 601a687c-b5fe-5ee8-9cdc-06239cd61e90 ← MTD\VENDOR_Dell-Inc.&PRODUCT_XPS-9320&NAME_0000:00:1f.5 │ Device Flags: • Internal device │ • Updatable │ • Needs a reboot after installation │ • Cryptographic hash verification is available │ ├─12th Gen Intel Core™ i7-1260P: │ Device ID: 4bde70ba4e39b28f9eab1628f9dd6e6244c03027 │ Current version: 0x00000429 │ Vendor: Intel │ GUIDs: b9a2dd81-159e-5537-a7db-e7101d164d3f ← cpu │ 30249f37-d140-5d3e-9319-186b1bd5cac3 ← CPUID\PRO_0&FAM_06 │ ab855c04-4ff6-54af-8a8a-d8193daa0cd8 ← CPUID\PRO_0&FAM_06&MOD_9A │ 3ebbde86-d03e-549a-a8fd-02ebf9aa537a ← CPUID\PRO_0&FAM_06&MOD_9A&STP_3 │ Device Flags: • Internal device │ ├─Alder Lake-P Integrated Graphics Controller: │ Device ID: 5792b48846ce271fab11c4a545f7a3df0d36e00a │ Current version: 0c │ Vendor: Intel Corporation (PCI:0x8086) │ GUIDs: eaad9970-8e4d-56da-88ab-41a8c1e2811f ← PCI\VEN_8086&DEV_46A6 │ ed0b9458-c2f1-54c5-9063-dea8f75b4039 ← PCI\VEN_8086&DEV_46A6&REV_0C │ b0644b40-1cb2-5813-a376-983ce2870cb4 ← PCI\VEN_8086&DEV_46A6&SUBSYS_10280AF3 │ 9a0442d9-20a9-5704-85c5-497052ef7671 ← PCI\VEN_8086&DEV_46A6&SUBSYS_10280AF3&REV_0C │ c4625510-a985-517c-8800-0ecfc6f68c8f ← PCI\VEN_8086&DEV_46A6&REV_00 │ 2cd82a9e-b697-561a-8cf4-8faad1682af5 ← PCI\VEN_8086&DEV_46A6&SUBSYS_10280AF3&REV_00 │ Device Flags: • Internal device │ • Cryptographic hash verification is available │ ├─PC801 NVMe SK hynix 1TB: │ Device ID: 71b677ca0f1bc2c5b804fa1d59e52064ce589293 │ Summary: NVM Express solid state drive │ Current version: 51002141 │ Vendor: SK hynix (NVME:0x1C5C) │ Serial Number: SNB4N484111504C62 │ GUIDs: f8fa0185-7878-521a-b61c-b191955b501f ← STORAGE-DELL-111350 │ 80860c6c-dfb3-11eb-ba80-0242ac130004 │ Device Flags: • Internal device │ • Updatable │ • System requires external power source │ • Needs a reboot after installation │ • Device is usable for the duration of the update │ • Signed Payload │ ├─System Firmware: │ │ Device ID: a45df35ac0e948ee180fe216a5f703f32dda163f │ │ Summary: UEFI ESRT device │ │ Current version: 1.11.0 │ │ Minimum Version: 1.11.0 │ │ Vendor: Dell (DMI:Dell Inc.) │ │ Update State: Success │ │ GUIDs: 8b8c05a5-31bc-5fa4-9624-24b13f8f6043 │ │ 230c8b18-8d9b-53ec-838b-6cfc0383493a ← main-system-firmware │ │ Device Flags: • Internal device │ │ • Updatable │ │ • System requires external power source │ │ • Supported on remote server │ │ • Needs a reboot after installation │ │ • Cryptographic hash verification is available │ │ • Device is usable for the duration of the update │ │ │ ├─BootGuard Configuration: │ │ Device ID: b0d4430dfa6bde9f0c22680df36dbc8c15c80753 │ │ Current version: 01 │ │ Vendor: Intel Corporation (MEI:0x8086) │ │ GUIDs: dd17041c-09ea-4b17-a271-5b989867ec65 │ │ fccad2fe-62ae-5879-b7a9-4ead7bce50f4 ← MEI\VEN_8086&DEV_51E0 │ │ 4837b81a-56c3-501f-8b4c-1e71882379fe ← MEI\VEN_8086&DEV_51E0&REV_01 │ │ 3e44fe7a-3454-56d6-a2e0-11aa60918d7e ← MEI\VEN_8086&DEV_51E0&SUBSYS_10280AF3 │ │ 94351172-1147-54db-af1e-bacfcc5cc0d7 ← MEI\VEN_8086&DEV_51E0&SUBSYS_10280AF3&REV_01 │ │ Device Flags: • Internal device │ │ │ ├─UEFI Platform Key: │ │ Device ID: 6924110cde4fa051bfdc600a60620dc7aa9d3c6a │ │ Summary: Platform Key │ │ GUID: ef992d47-bfb1-5088-8512-e0e78b920516 ← UEFI\CRT_C847A9D0F19D488552B9E8D5445A3CC176DB3C53 │ │ │ └─UEFI dbx: │ Device ID: 362301da643102b9f38477387e2193e57abaa590 │ Summary: UEFI revocation database │ Current version: 211 │ Minimum Version: 211 │ Vendor: UEFI:Linux Foundation │ Install Duration: 1 second │ GUIDs: b72753d6-adb0-5209-9f6e-c7e326fc2d4e ← UEFI\CRT_8F47714808736A963728707ADD1E507EF17690B3CECDF1957E32D0A760EBA3EC │ a2c80b6e-30f3-52d8-b4c9-30f7edb11987 ← UEFI\CRT_8F47714808736A963728707ADD1E507EF17690B3CECDF1957E32D0A760EBA3EC&ARCH_X64 │ Device Flags: • Internal device │ • Updatable │ • Needs a reboot after installation │ • Device is usable for the duration of the update │ • Only version upgrades are allowed │ • Signed Payload │ ├─TPM: │ Device ID: c6a80ac3a22083423992a3cb15018989f37834d6 │ Current version: 1.258.0.0 │ Vendor: ST Microelectronics (TPM:STM) │ GUIDs: ff71992e-52f7-5eea-94ef-883e56e034c6 ← system-tpm │ 84df3581-f896-54d2-bd1a-372602f04c32 ← TPM\VEN_STM&DEV_0001 │ bfaed10a-bbc1-525b-a329-35da2f63e918 ← TPM\VEN_STM&MOD_ │ 70b7b833-7e1a-550a-a291-b94a12d0f319 ← TPM\VEN_STM&DEV_0001&VER_2.0 │ 06f005e9-cb62-5d1a-82d9-13c534c53c48 ← TPM\VEN_STM&MOD_&VER_2.0 │ Device Flags: • Internal device │ ├─TPM 2.0: │ Device ID: a3487e128cf1413519bce8e9a1ab3f5981e61458 │ Summary: UEFI ESRT device │ Current version: 0.1.1.2 │ Vendor: Dell Inc. (PCI:0x1028) │ Update State: Success │ GUIDs: 3a754159-ba3b-50d3-8f32-d323a449f815 ← 0af3-2.0 │ ff71992e-52f7-5eea-94ef-883e56e034c6 ← system-tpm │ 73730635-f6c2-53da-9df2-948bb5ac1022 ← DELL-TPM-2.0-STM- │ Device Flags: • Internal device │ • Updatable │ • System requires external power source │ • Needs a reboot after installation │ ├─UEFI Device Firmware: │ Device ID: 349bb341230b1a86e5effe7dfe4337e1590227bd │ Summary: UEFI ESRT device │ Current version: 1059 │ Minimum Version: 1059 │ Vendor: DMI:Dell Inc. │ Update State: Success │ GUID: e72475a2-b8f0-4217-bbea-3304b187ae54 │ Device Flags: • Internal device │ • Updatable │ • System requires external power source │ • Needs a reboot after installation │ • Device is usable for the duration of the update │ ├─UEFI Device Firmware: │ Device ID: 2292ae5236790b47884e37cf162dcf23bfcd1c60 │ Summary: UEFI ESRT device │ Current version: 1358963009 │ Minimum Version: 1358963009 │ Vendor: DMI:Dell Inc. │ Update State: Success │ GUID: 80860c6c-dfb3-11eb-ba80-0242ac130004 │ Device Flags: • Internal device │ • Updatable │ • System requires external power source │ • Needs a reboot after installation │ • Device is usable for the duration of the update │ ├─USB4 Retimer: │ Device ID: fa7ebe94a3e7265f44a1d3346dffe26f29f1be42 │ Summary: A physical layer protocol-aware, software-transparent extension device that forms two separate electrical link segments │ Current version: 10.00 │ Vendor: Intel (THUNDERBOLT:0x8087) │ GUIDs: e6f2e4ac-f76a-5fc4-b36a-6f9cb548689e ← THUNDERBOLT\VEN_8087&DEV_15EE │ f00257c8-0e09-5a32-bbb3-f49748ae6cc5 ← THUNDERBOLT\VEN_8087&DEV_15EE&REV_00 │ dfeacc0a-7af4-5460-ab40-22ed630568de ← TBT-808715ee-retimer1-0:1.1 │ Device Flags: • Internal device │ • Updatable │ • Device stages updates │ ├─USB4 host controller: │ Device ID: bd45c8598c8ed529762ec4740ed0168dd8516324 │ Summary: Unmatched performance for high-speed I/O │ Vendor: INTEL (THUNDERBOLT:0x8087) │ GUIDs: 5041b15d-6e1c-5681-86b3-bb1d56993357 ← THUNDERBOLT\VEN_8087&DEV_463E │ d651f364-21d8-5cc3-9790-dd019a8958ef ← THUNDERBOLT\VEN_8087&DEV_463E&REV_00 │ e72e778e-94f7-5ed2-b560-1c1262ee217c ← TBT-fixed │ Device Flags: • Internal device │ • System requires external power source │ • Signed Payload │ └─USB4 host controller: Device ID: 98e99efb23380994929ff93cbd82229b9a395611 Summary: Unmatched performance for high-speed I/O Vendor: INTEL (THUNDERBOLT:0x8087) GUIDs: 5041b15d-6e1c-5681-86b3-bb1d56993357 ← THUNDERBOLT\VEN_8087&DEV_463E d651f364-21d8-5cc3-9790-dd019a8958ef ← THUNDERBOLT\VEN_8087&DEV_463E&REV_00 e72e778e-94f7-5ed2-b560-1c1262ee217c ← TBT-fixed Device Flags: • Internal device • System requires external power source • Signed Payload ```
hughsie commented 1 year ago

@CragW can you have a look as a priority please.

CragW commented 1 year ago

The release has just been corrected, @heftig please check at your convenience.

hughsie commented 1 year ago

Thanks @CragW -- much appreciated.

heftig commented 1 year ago

The suspicious update has disappeared and fwupd is back to reporting my firmware as up-to-date. Many thanks.

tcquinn commented 1 year ago

@CragW I think this bad firmware update actually got installed on my system (Ubuntu 22.04 on Dell XPS 9320). On Friday, as part of the normal Ubuntu updates, I was notified that there was a BIOS update. The system updated BIOS automatically, and then I started having all kinds of issues (video glitches, camera not working, etc.). If I go into the boot menu (F12) now, my system reports a BIOS version of 2.0.0 (which shouldn't exist, right?). Any advice?

hughsie commented 1 year ago

@tcquinn can you fwupdmgr downgrade to the previous version? If not, @CragW needs to help I'm afriad.

heftig commented 1 year ago

You can download the current firmware (an .exe file) and copy it to the EFI System Partition, probably /boot/efi/. Then select the file with the BIOS Update utility you can access via F12 at boot.

tcquinn commented 1 year ago

@hughsie @heftig Thanks for the suggestions. There was a whole directory tree of existing stuff under /boot/efi and I didn't want to screw any of that up, so I downloaded the current firmware (1.11.0) to a flash drive and tried to flash from that. I got a message that says "Firmware Update is not permitted. The BIOS flash is not compatible with the current system." (image of screen here if helpful)

heftig commented 1 year ago

Strange that it doesn't seem to be able to parse the file at all, reporting no system or revision for it. Was it damaged? It should have the sha256sum c676ed424eb2f0c57bb82734da2096a79410fa662beaaa37664a5d8e7d257665.

tcquinn commented 1 year ago

@heftig Yes. sha256sum XPS_9320_1_11_0.exe yields c676ed424eb2f0c57bb82734da2096a79410fa662beaaa37664a5d8e7d257665 XPS_9320_1_11_0.exe

tcquinn commented 1 year ago

I suppose it's possible that there's some problem with flashing from a USB flash drive, but it found the flash drive and I was able to navigate to the file and select it.

heftig commented 1 year ago

It's possible to disable BIOS downgrading in the setup. Maybe check that setting.

Putting a file into /boot/efi/ should be harmless as long as the partition has enough space left. The upgrade/downgrade itself will write some recovery files about 38M big.

Actually, try selecting the file /EFI/Dell/bios/recovery/BIOS_PRE.rcv, if it exists. That should be the previous firmware.

tcquinn commented 1 year ago

@heftig Thank you. Flashing from /EFI/Dell/bios/recovery/BIOS_PRE.rcv worked in the sense that it appeared to successfully flash the BIOS and the BIOS version is now listed as 1.11.0 both in the boot manager and in my Linux system. However, the video glitches that started on Friday after the update are persisting. Maybe the "2.0.0" BIOS changed settings somewhere that I need to change back? Maybe some components of the "2.0.0" firmware didn't get downgraded? (I noticed that for some components, like "ME", it simply said that my firmware was "up to date").

CragW commented 1 year ago

I heard that 2.0.0 has the same components as 1.11.0, just the version increasing for a new branch. It is unlikely a fwupd issue here.

tcquinn commented 1 year ago

@CragW Interesting. The problems are at a pretty basic hardware IO level (bands of random pixels across the screen when I move the mouse, camera stopped working) and they started right after this BIOS update installed. It's a strange coincidence. I'll try to dig further into the logs.

tcquinn commented 1 year ago

@CragW In case you have two more seconds, here is the apt log from the moment when I think everything went haywire, in case anything catches your eye. Note the Dell hardware support packages updating.

Start-Date: 2023-02-18  09:35:34
Commandline: aptdaemon role='role-commit-packages' sender=':1.162'
Install: linux-modules-ipu6-5.19.0-32-generic:amd64 (5.19.0-32.33~22.04.1, automatic), linux-modules-ipu6-generic-hwe-22.04:amd64 (5.19.0.32.33~22.04.9, automatic), linux-modules-ivsc-5.19.0-32-generic:amd64 (5.19.0-32.33~22.04.1, automatic), linux-modules-ivsc-generic-hwe-22.04:amd64 (5.19.0.32.33~22.04.9, automatic)
Upgrade: containerd.io:amd64 (1.6.16-1, 1.6.18-1), language-pack-en-base:amd64 (1:22.04+20220721, 1:22.04+20230209), gnome-initial-setup:amd64 (42.0.1-1ubuntu2.2, 42.0.1-1ubuntu2.3), google-chrome-stable:amd64 (110.0.5481.77-1, 110.0.5481.100-1), firmware-sof-signed:amd64 (2.0-1ubuntu4, 2.0-1ubuntu4.1), alsa-ucm-conf:amd64 (1.2.6.3-1ubuntu1.3, 1.2.6.3-1ubuntu1.4), ubuntu-advantage-desktop-daemon:amd64 (1.9~22.04.1, 1.10~22.04.1), language-pack-en:amd64 (1:22.04+20220721, 1:22.04+20230209), language-pack-gnome-en-base:amd64 (1:22.04+20220721, 1:22.04+20230209), base-files:amd64 (12ubuntu4.2, 12ubuntu4.3), oem-somerville-tentacool-meta:amd64 (22.04ubuntu5, 22.04ubuntu6), language-pack-gnome-en:amd64 (1:22.04+20220721, 1:22.04+20230209), ubuntu-advantage-tools:amd64 (27.12~22.04.1, 27.13.5~22.04.1), oem-somerville-factory-tentacool-meta:amd64 (22.04ubuntu5, 22.04ubuntu6)
End-Date: 2023-02-18  09:35:59
MaikHerrmann commented 1 year ago

@tcquinn The same thing happened on my Dell XPS 9320. Firmware got flashed through automatic update. I am using Fedora instead, but the issues are the same. The camera stopped working after the update to 2.0.0 and random horizontal pixel lines appear occasionally. Downgrading to 1.11.0 did not fix my camera issue. Is there a solution for that?

tcquinn commented 1 year ago

@MaikHerrmann At least for me, the video artifacts turned out to be related not to the erroneous firmware update (confusingly), but rather to the (near-simultaneous) push of kernel version 5.19. There is a temporary fix here which might help even though you're on Fedora.

Zwyx commented 1 year ago

Hey all, I have updated my firmware to 2.0.0. **I don't have any issues***, should I downgrade my firmware anyway?

Basically, my question is: will Dell publish new versions 1.x.x in the future? Because if 1.12.0 is published for instance, then I guess my system will ignore it.


* apart from the video artifacts, but that's been proven unrelated.

sunnycrown83 commented 1 year ago

Hey all, I have updated my firmware to 2.0.0. **I don't have any issues***, should I downgrade my firmware anyway?

Basically, my question is: will Dell publish new versions 1.x.x in the future? Because if 1.12.0 is published for instance, then I guess my system will ignore it.

  • apart from the video artifacts, but that's been proven unrelated.

Not necessary, there is no longer 1.x.x version for XPS 9320 in the future, you could stay with 2.0.0 and it's the latest version by now.