Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[StarBook Mk VI - Intel - AMI] Firmware update error #78

Closed
winterknife opened this issue Feb 19, 2023 · 2 comments
Closed

[StarBook Mk VI - Intel - AMI] Firmware update error #78

winterknife opened this issue Feb 19, 2023 · 2 comments
Labels
bug Something isn't working

Comments

@winterknife
Copy link

A few days ago, I switched branch from Coreboot to AMI Aptio V BIOS and apparently the transition was successful, but now fwupd keeps offering to update the System firmware even though I'm already on the latest version(1.2.0) and what's more is that when I try to proceed with the update, it throws a "BIOS locked" error upon reboot.

Things that I have already tried:

  1. Ensuring that UEFI Secure Boot is disabled
  2. Ensuring that "boot order lock" is not set
  3. Moving Linux-Firmware-Updater entry to the top of the boot order

Here are some command outputs to provide more insights into the issue:

[cci-dev06@starbook Desktop]$ fwupdmgr --version | grep fwupd
compile   org.freedesktop.fwupd         1.8.10
runtime   org.freedesktop.fwupd-efi     1.4
runtime   org.freedesktop.fwupd         1.8.10
[cci-dev06@starbook Desktop]$ sudo dmidecode --type bios
# dmidecode 3.4
Getting SMBIOS data from sysfs.
SMBIOS 3.5.0 present.

Handle 0x0000, DMI type 0, 26 bytes
BIOS Information
	Vendor: American Megatrends International, LLC.
	Version: 1.2.0
	Release Date: 01/11/2023
	Address: 0xF0000
	Runtime Size: 64 kB
	ROM Size: 16 MB
	Characteristics:
		PCI is supported
		BIOS is upgradeable
		BIOS shadowing is allowed
		Boot from CD is supported
		Selectable boot is supported
		BIOS ROM is socketed
		EDD is supported
		Japanese floppy for NEC 9800 1.2 MB is supported (int 13h)
		Japanese floppy for Toshiba 1.2 MB is supported (int 13h)
		5.25"/360 kB floppy services are supported (int 13h)
		5.25"/1.2 MB floppy services are supported (int 13h)
		3.5"/720 kB floppy services are supported (int 13h)
		3.5"/2.88 MB floppy services are supported (int 13h)
		Print screen service is supported (int 5h)
		Serial services are supported (int 14h)
		Printer services are supported (int 17h)
		CGA/mono video services are supported (int 10h)
		USB legacy is supported
		BIOS boot specification is supported
		Targeted content distribution is supported
		UEFI is supported
	BIOS Revision: 5.26
	Firmware Revision: 1.1

Handle 0x0064, DMI type 13, 22 bytes
BIOS Language Information
	Language Description Format: Long
	Installable Languages: 1
		en|US|iso8859-1
	Currently Installed Language: en|US|iso8859-1
[cci-dev06@starbook Desktop]$ fwupdmgr get-devices
Star Labs StarBook

├─12th Gen Intel Core™ i7-1260P:
│     Device ID:          4bde70ba4e39b28f9eab1628f9dd6e6244c03027
│     Current version:    0x00000421
│     Vendor:             Intel
│     GUIDs:              b9a2dd81-159e-5537-a7db-e7101d164d3f ← cpu
│                         30249f37-d140-5d3e-9319-186b1bd5cac3 ← CPUID\PRO_0&FAM_06
│                         ab855c04-4ff6-54af-8a8a-d8193daa0cd8 ← CPUID\PRO_0&FAM_06&MOD_9A
│                         3ebbde86-d03e-549a-a8fd-02ebf9aa537a ← CPUID\PRO_0&FAM_06&MOD_9A&STP_3
│     Device Flags:       • Internal device

├─Alder Lake-P Integrated Graphics Controller:
│     Device ID:          5792b48846ce271fab11c4a545f7a3df0d36e00a
│     Current version:    0c
│     Vendor:             Intel Corporation (PCI:0x8086)
│     GUIDs:              eaad9970-8e4d-56da-88ab-41a8c1e2811f ← PCI\VEN_8086&DEV_46A6
│                         ed0b9458-c2f1-54c5-9063-dea8f75b4039 ← PCI\VEN_8086&DEV_46A6&REV_0C
│                         4ac43945-192b-586a-9724-721f7bc2968b ← PCI\VEN_8086&DEV_46A6&SUBSYS_1E508012
│                         3fe6da0e-3794-56c5-b68d-5902d8a4c584 ← PCI\VEN_8086&DEV_46A6&SUBSYS_1E508012&REV_0C
│                         c4625510-a985-517c-8800-0ecfc6f68c8f ← PCI\VEN_8086&DEV_46A6&REV_00
│                         b3fd800f-f31e-529d-a6ef-e88ca92fba63 ← PCI\VEN_8086&DEV_46A6&SUBSYS_1E508012&REV_00
│     Device Flags:       • Internal device
│                         • Cryptographic hash verification is available

├─Star Drive PCIe SSD:
│     Device ID:          03281da317dccd2b18de2bd1cc70a782df40ed7e
│     Summary:            NVM Express solid state drive
│     Current version:    EIFM31.4
│     Vendor:             Phison Electronics Corporation (NVME:0x1987)
│     Serial Number:      9128072C07F600348622
│     GUIDs:              59639c7d-1b5d-5b7f-82da-9fd6b369a461 ← NVME\VEN_1987&DEV_5018
│                         fcc92585-8e8e-52a3-90cc-6c022b7f3843 ← NVME\VEN_1987&DEV_5018&REV_01
│                         b1fcba59-6797-58bd-af77-5ccb9be2493c ← NVME\VEN_1987&DEV_5018&SUBSYS_19875018
│                         c9465066-32bb-50c5-8338-6a750cae2a44 ← NVME\VEN_1987&DEV_5018&SUBSYS_19875018&REV_01
│                         12d61493-5ac4-57f7-a2c5-96878d115455 ← Star Drive PCIe SSD
│     Device Flags:       • Internal device
│                         • Updatable
│                         • System requires external power source
│                         • Needs shutdown after installation
│                         • Device is usable for the duration of the update

├─StarBook (bios):
│ │   Device ID:          dbee8bd3b1ae0316ad143336155651eedb495a0e
│ │   Current version:    1.2
│ │   Vendor:             Star Labs (DMI:American Megatrends International, LLC.)
│ │   Update Error:       BIOS locked
│ │   GUIDs:              230c8b18-8d9b-53ec-838b-6cfc0383493a ← main-system-firmware
│ │                       7227cf32-bb0f-5894-8d66-c91a43c10eae ← FLASHROM\VENDOR_Star Labs&PRODUCT_StarBook&REGION_BIOS
│ │                       57184d37-4abe-517a-9039-5f6043f7c5a2 ← FLASHROM\GUID_5c917039-d938-5c9a-b22a-9c392b1534f3
│ │                       0288077e-521e-5d33-9ccf-a0a1c57f3ea6 ← Star Labs&B6&StarBook&B6-I&Star Labs&StarBook
│ │                       0f0e4a34-e579-53b4-b08d-7c2a775a6f46 ← Star Labs&B6&StarBook&B6-I
│ │                       3bc666d0-9a50-5c28-85ac-ca773b2d4652 ← Star Labs&B6&StarBook
│ │                       64640287-8a2e-5ad9-b7b2-ec7378f4297e ← Star Labs&B6-I&Star Labs&StarBook
│ │                       a4bf0412-e45e-55f4-b13c-eeb4ceb7fd06 ← Star Labs&B6&Star Labs&StarBook
│ │                       1292e166-a66f-5e11-b2bb-53265a8f53d9 ← Star Labs&B6&StarBook&B6-I&American Megatrends International, LLC.
│ │   Device Flags:       • Internal device
│ │                       • System requires external power source
│ │                       • Supported on remote server
│ │                       • Needs shutdown after installation
│ │                       • Cryptographic hash verification is available
│ │                       • Updatable
│ │                       • Device supports switching to a different branch of firmware
│ │ 
│ └─UEFI dbx:
│       Device ID:        362301da643102b9f38477387e2193e57abaa590
│       Summary:          UEFI revocation database
│       Current version:  217
│       Minimum Version:  217
│       Vendor:           UEFI:Linux Foundation
│       Install Duration: 1 second
│       GUIDs:            c6682ade-b5ec-57c4-b687-676351208742 ← UEFI\CRT_A1117F516A32CEFCBA3F2D1ACE10A87972FD6BBE8FE0D0B996E09E65D802A503
│                         f8ba2887-9411-5c36-9cee-88995bb39731 ← UEFI\CRT_A1117F516A32CEFCBA3F2D1ACE10A87972FD6BBE8FE0D0B996E09E65D802A503&ARCH_X64
│       Device Flags:     • Internal device
│                         • Updatable
│                         • Supported on remote server
│                         • Needs a reboot after installation
│                         • Device is usable for the duration of the update
│                         • Only version upgrades are allowed
│                         • Signed Payload

├─System Firmware:
│     Device ID:          a45df35ac0e948ee180fe216a5f703f32dda163f
│     Summary:            UEFI ESRT device
│     Current version:    1.1.0
│     Minimum Version:    1.1.0
│     Vendor:             Star Labs (DMI:American Megatrends International, LLC.)
│     Update State:       Success
│     GUIDs:              02e64049-abcc-44a5-af9a-fafc390dd844
│                         230c8b18-8d9b-53ec-838b-6cfc0383493a ← main-system-firmware
│     Device Flags:       • Internal device
│                         • Updatable
│                         • System requires external power source
│                         • Supported on remote server
│                         • Needs a reboot after installation
│                         • Cryptographic hash verification is available
│                         • Device is usable for the duration of the update

├─TPM:
│     Device ID:          c6a80ac3a22083423992a3cb15018989f37834d6
│     Current version:    7.85.17.51968
│     Vendor:             Infineon (TPM:IFX)
│     GUIDs:              ff71992e-52f7-5eea-94ef-883e56e034c6 ← system-tpm
│                         5eebb112-75ad-5536-b173-a11eb3399402 ← TPM\VEN_IFX&DEV_0000
│                         ddf995da-1b32-5a8a-bc1b-8d5af4b38b51 ← TPM\VEN_IFX&MOD_SLB9670
│                         6d81ab63-db2e-50ac-934f-6be9accf5e02 ← TPM\VEN_IFX&DEV_0000&VER_2.0
│                         301555de-680d-5ddc-b995-7553fc9138f1 ← TPM\VEN_IFX&MOD_SLB9670&VER_2.0
│     Device Flags:       • Internal device

├─UEFI Device Firmware:
│     Device ID:          349bb341230b1a86e5effe7dfe4337e1590227bd
│     Summary:            UEFI ESRT device
│     Current version:    0
│     Vendor:             DMI:American Megatrends International, LLC.
│     Update State:       Success
│     GUID:               227c017a-280a-4cfd-a078-e21f3e61e485
│     Device Flags:       • Internal device
│                         • Updatable
│                         • System requires external power source
│                         • Needs a reboot after installation
│                         • Device is usable for the duration of the update

└─UEFI Device Firmware:
      Device ID:          2292ae5236790b47884e37cf162dcf23bfcd1c60
      Summary:            UEFI ESRT device
      Current version:    1
      Vendor:             DMI:American Megatrends International, LLC.
      Update State:       Success
      GUID:               0eab05c1-766a-4805-a039-3081de0210c7
      Device Flags:       • Internal device
                          • Updatable
                          • System requires external power source
                          • Needs a reboot after installation
                          • Device is usable for the duration of the update
[cci-dev06@starbook Desktop]$ fwupdmgr get-history
Star Labs StarBook

├─StarBook (bios):
│ │   Device ID:          dbee8bd3b1ae0316ad143336155651eedb495a0e
│ │   Previous version:   8.25
│ │   Update State:       Failed
│ │   Update Error:       failed to run update on reboot
│ │   Last modified:      2023-02-17 11:01
│ │   GUID:               230c8b18-8d9b-53ec-838b-6cfc0383493a
│ │   Device Flags:       • Internal device
│ │                       • Updatable
│ │                       • System requires external power source
│ │                       • Supported on remote server
│ │                       • Reported to remote server
│ │                       • Needs shutdown after installation
│ │                       • Cryptographic hash verification is available
│ │ 
│ └─  New version:      1.2.0
│       Remote ID:        lvfs
│       Licence:          Unknown
│       Description:      
│       The vendor did not supply any release notes.

├─UEFI dbx:
│ │   Device ID:          362301da643102b9f38477387e2193e57abaa590
│ │   Previous version:   211
│ │   Update State:       Success
│ │   Last modified:      2023-02-17 11:27
│ │   GUID:               c6682ade-b5ec-57c4-b687-676351208742
│ │   Device Flags:       • Internal device
│ │                       • Updatable
│ │                       • Supported on remote server
│ │                       • Needs a reboot after installation
│ │                       • Reported to remote server
│ │                       • Device is usable for the duration of the update
│ │ 
│ └─Secure Boot dbx:
│       New version:      217
│       Remote ID:        lvfs
│       Release ID:       15179
│       Summary:          UEFI Secure Boot Forbidden Signature Database
│       Variant:          x64
│       Licence:          Proprietary
│       Size:             13.8 kB
│       Created:          2020-07-29
│       Urgency:          High
│       Vendor:           Linux Foundation
│       Duration:         1 second
│       Description:      
│       This updates the dbx to the latest release from Microsoft which adds insecure versions of grub and shim to the list of forbidden signatures due to multiple discovered security updates.

│       Before installing the update, fwupd will check for any affected executables in the ESP and will refuse to update if it finds any boot binaries signed with any of the forbidden signatures.If the installation fails, you will need to update shim and grub packages before the update can be deployed.

│       Once you have installed this dbx update, any DVD or USB installer images signed with the old signatures may not work correctly.You may have to temporarily turn off secure boot when using recovery or installation media, if new images have not been made available by your distribution.
│       Issues:           309662
│                         CVE-2022-34303
│                         CVE-2022-34302
│                         CVE-2022-34301

└─System Firmware:
  │   Device ID:          a45df35ac0e948ee180fe216a5f703f32dda163f
  │   Previous version:   1.1.0
  │   Update State:       Failed
  │   Update Error:       failed to run update on reboot
  │   Last modified:      2023-02-18 19:05
  │   GUID:               02e64049-abcc-44a5-af9a-fafc390dd844
  │   Device Flags:       • Internal device
  │                       • Updatable
  │                       • System requires external power source
  │                       • Supported on remote server
  │                       • Needs a reboot after installation
  │                       • Reported to remote server
  │                       • Cryptographic hash verification is available
  │                       • Device is usable for the duration of the update

  └─StarBook MkVI-Intel ami:
        New version:      1.2.0
        Remote ID:        lvfs
        Release ID:       17911
        Summary:          ami firmware for StarBook MkVI-Intel
        Licence:          Proprietary
        Size:             16.8 MB
        Created:          2023-01-13
        Urgency:          Medium
        Vendor:           Star Labs
        Release Flags:    • Is upgrade
        Description:      
        This stable release includes the following features:
        
        • Updated default configuration
        • Enabled mirror flag to update EC along with BIOS
[cci-dev06@starbook Desktop]$ fwupdmgr get-updates
Devices with no available firmware updates: 
 • Star Drive PCIe SSD
 • UEFI Device Firmware
 • UEFI Device Firmware
Devices with the latest available firmware version:
 • StarBook (bios)
 • UEFI dbx
Star Labs StarBook

└─System Firmware:
  │   Device ID:          a45df35ac0e948ee180fe216a5f703f32dda163f
  │   Summary:            UEFI ESRT device
  │   Current version:    1.1.0
  │   Minimum Version:    1.1.0
  │   Vendor:             Star Labs (DMI:American Megatrends International, LLC.)
  │   Update State:       Success
  │   GUIDs:              02e64049-abcc-44a5-af9a-fafc390dd844
  │                       230c8b18-8d9b-53ec-838b-6cfc0383493a ← main-system-firmware
  │   Device Flags:       • Internal device
  │                       • Updatable
  │                       • System requires external power source
  │                       • Supported on remote server
  │                       • Needs a reboot after installation
  │                       • Cryptographic hash verification is available
  │                       • Device is usable for the duration of the update

  └─StarBook MkVI-Intel ami:
        New version:      1.2.0
        Remote ID:        lvfs
        Release ID:       17911
        Summary:          ami firmware for StarBook MkVI-Intel
        Licence:          Proprietary
        Size:             16.8 MB
        Created:          2023-01-13
        Urgency:          Medium
        Vendor:           Star Labs
        Release Flags:    • Is upgrade
        Description:      
        This stable release includes the following features:
        
        • Updated default configuration
        • Enabled mirror flag to update EC along with BIOS
@Sean-StarLabs Sean-StarLabs added the bug Something isn't working label Feb 21, 2023
@winterknife
Copy link
Author

Here is an error report generated from a failed update attempt:

Target:                  https://fwupd.org/lvfs/firmware/report
Payload:                 {
                           "ReportVersion" : 2,
                           "MachineId" : "13ef742aebbc213ad55e1065cde6394fdfb1e8170e0c4f350166f9436937aec7",
                           "Metadata" : {
                             "DistroId" : "ubuntu",
                             "DistroVersion" : "22.04"
                           },
                           "Reports" : [
                             {
                               "Checksum" : "a779a2533e0632ce7190106866da83d44d63b29b",
                               "ReleaseId" : null,
                               "Protocol" : "org.uefi.capsule",
                               "UpdateState" : 3,
                               "UpdateError" : "failed to run update on reboot",
                               "Guid" : [
                                 "02e64049-abcc-44a5-af9a-fafc390dd844"
                               ],
                               "Plugin" : "uefi_capsule",
                               "VersionOld" : "1.1.0",
                               "VersionNew" : "1.2.0",
                               "Flags" : 574619947,
                               "Created" : 1677783343,
                               "Modified" : 1677783447,
                               "Metadata" : {
                                 "LastAttemptVersion" : "0x1010000",
                                 "HostEnclosureKind" : "9",
                                 "TpmFamily" : "2.0",
                                 "RuntimeVersion(org.kernel)" : "5.19.0-35-generic",
                                 "SystemIntegrityNew" : "UEFI:Boot0003=4d3ee0baa484576d412ad9258fdc909e91924a4900da8e1f6a03eb574361ed5d\nUEFI:PK=033950aff7d7722022803dbd1fa90bff5e0cf61d4660ab6293369dc916f949a5\nUEFI:Boot0006=fdff09a931ed879fd863c3ff737920106c8844b575304b9c9bd4a7636b92c5b9\nUEFI:BootOrder=3a6ecf411e0c62c035e3102e390e87c7bf685aea87fcb4f1c82bfd552e23e059\nUEFI:SignatureSupport=f8b3f359e3073393d6acc06daff98b5600fc096fe2b75994cb1136c501245fb5\nUEFI:KEKDefault=8599624905e4fa11b379471f80f870369cc046d1ed45fefe540072a6784934bf\nUEFI:Boot0001=647b7721d0ccb7f5dacbb0c2a611ffa2d147e93a649c8fca5c0b33640967b7d2\nUEFI:SetupMode=6e340b9cffb37a989ca544e6bb780a2c78901d3fb33738768511a30617afa01d\nUEFI:OsIndicationsSupported=7c9fa136d4413fa6173637e883b6998d32e1d675f88cddff9dcbcf331820f4b8\nUEFI:db=5dbc0253a9bb2a84e03522cfc37a3b5be3b1088ecfcd753d08f1425cdef2b5c1\nUEFI:SecureBoot=6e340b9cffb37a989ca544e6bb780a2c78901d3fb33738768511a30617afa01d\nUEFI:VendorKeys=4bf5122f344554c53bde2ebb8cd2b7e3d1600ad631c385a5d7cce23c7785459a\nUEFI:Boot0004=396b18aad4fd46827a59ee1ef8944c9a92d0a2889dc553e6a739504732677d35\nUEFI:BootCurrent=99be5efb88ca2013bd8e4eb035fd42d5245468fe9afa70d8ba9c1c419a48c4e8\nUEFI:KEK=8599624905e4fa11b379471f80f870369cc046d1ed45fefe540072a6784934bf\nUEFI:dbx=1da86b89493c35e72a8a1bf64d67f88224e3030dcdb2dcadfd9780e27a28881d\nUEFI:Boot0002=4e4e368106f59ca1f86e986a5dd025baf493a2d783e13a26d88f2e7766926362\nUEFI:Boot0005=50353cfffc3700d131398887941667db2c188a79425875dd77375a12ea023abb\nACPI:TPM2=a921ce3b853defab0b85990952a9b0e6e232cb53cb87a75a2fcf871255d9a4cc\nUEFI:PKDefault=033950aff7d7722022803dbd1fa90bff5e0cf61d4660ab6293369dc916f949a5",
                                 "DistroVersion" : "22.04",
                                 "RuntimeVersion(org.freedesktop.fwupd)" : "1.8.10",
                                 "HostSku" : "B6-I",
                                 "UEFIUXCapsule" : "Enabled",
                                 "CpuArchitecture" : "x86_64",
                                 "SecureBoot" : "Disabled",
                                 "HostFamily" : "B6",
                                 "HostBiosVersion" : "1.2.0",
                                 "HostVendor" : "Star Labs",
                                 "RuntimeVersion(org.freedesktop.gusb)" : "0.3.10",
                                 "CompileVersion(org.freedesktop.gusb)" : "0.3.10",
                                 "KernelName" : "Linux",
                                 "DistroPrettyName" : "Ubuntu 22.04.2 LTS",
                                 "RuntimeVersion(com.dell.libsmbios)" : "2.4",
                                 "MissingCapsuleHeader" : "False",
                                 "DistroName" : "Ubuntu",
                                 "SystemIntegrityOld" : "UEFI:Boot0003=4d3ee0baa484576d412ad9258fdc909e91924a4900da8e1f6a03eb574361ed5d\nUEFI:PK=033950aff7d7722022803dbd1fa90bff5e0cf61d4660ab6293369dc916f949a5\nUEFI:Boot0006=fdff09a931ed879fd863c3ff737920106c8844b575304b9c9bd4a7636b92c5b9\nUEFI:BootOrder=a8db6e879b7a6854f319c0bd7ef4e0be174251d941fa48b3e87bdfdf592c25d0\nUEFI:SignatureSupport=f8b3f359e3073393d6acc06daff98b5600fc096fe2b75994cb1136c501245fb5\nUEFI:KEKDefault=8599624905e4fa11b379471f80f870369cc046d1ed45fefe540072a6784934bf\nUEFI:Boot0001=647b7721d0ccb7f5dacbb0c2a611ffa2d147e93a649c8fca5c0b33640967b7d2\nUEFI:SetupMode=6e340b9cffb37a989ca544e6bb780a2c78901d3fb33738768511a30617afa01d\nUEFI:OsIndicationsSupported=7c9fa136d4413fa6173637e883b6998d32e1d675f88cddff9dcbcf331820f4b8\nUEFI:db=5dbc0253a9bb2a84e03522cfc37a3b5be3b1088ecfcd753d08f1425cdef2b5c1\nUEFI:SecureBoot=6e340b9cffb37a989ca544e6bb780a2c78901d3fb33738768511a30617afa01d\nUEFI:VendorKeys=4bf5122f344554c53bde2ebb8cd2b7e3d1600ad631c385a5d7cce23c7785459a\nUEFI:Boot0004=396b18aad4fd46827a59ee1ef8944c9a92d0a2889dc553e6a739504732677d35\nUEFI:BootCurrent=99be5efb88ca2013bd8e4eb035fd42d5245468fe9afa70d8ba9c1c419a48c4e8\nUEFI:KEK=8599624905e4fa11b379471f80f870369cc046d1ed45fefe540072a6784934bf\nUEFI:dbx=1da86b89493c35e72a8a1bf64d67f88224e3030dcdb2dcadfd9780e27a28881d\nUEFI:Boot0002=4e4e368106f59ca1f86e986a5dd025baf493a2d783e13a26d88f2e7766926362\nUEFI:Boot0005=50353cfffc3700d131398887941667db2c188a79425875dd77375a12ea023abb\nACPI:TPM2=ba55aeaec013e149c641a9ac55b9a20db15c747824017430c93af2f373f39717\nUEFI:PKDefault=033950aff7d7722022803dbd1fa90bff5e0cf61d4660ab6293369dc916f949a5",
                                 "FwupdSupported" : "True",
                                 "KernelVersion" : "5.19.0-35-generic",
                                 "TpmEventLog" : "0x00000008 d681837b3b8f5fd685bfad042ca78e6884e10e1c8f272dbccd2fd10be738a7fa [BSsQp8fZZUGBQCrd6Ur2PA==]\n0x8000000a 868f7a706af110efe32bae078cf8d7077326f2432a5680715262cb2002989d4f [HU1lYXN1cmVkIFVFRkkgRmlybXdhcmUgVm9sdW1lAADT/wAAAAAAAAsAAAAAAA==]\n0x8000000a 33b89b17c9863e50a569970979bc19f9b247ef54af2a51feecf3abafe43f534a [KUZ2KEI3QTNDQUFBLTRFMTAtNDRBNS04QzJDLUQyRjM4RDVCODA4MykAAACB/wAAAAAAADwAAAAAAA==]\n0x8000000a dacc6586eb515a2bed17896dce3db3519f021a2ee2abbaffebda7a5f1dbc25dd [B0ZWX01BSU4AAAf/AAAAAAAAegAAAAAA]\n0x00000004 df3f619804a92fdb4057192dc43dd748ea778adc52bc498ce80524c014b81119 [AAAAAA==]\nPCR0: ba490b16eab4afc9aa165d86a08521bec0f8c903b0f2a88245cf2e3906d77474",
                                 "RuntimeVersion(org.freedesktop.fwupd-efi)" : "1.0",
                                 "PHAT" : "<firmware gtype=\"FuAcpiPhat\">\n  <id>A M I </id>\n  <version_raw>0x5</version_raw>\n  <data size=\"0x5b1\">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</data>\n  <oem_id>ALASKA</oem_id>\n  <firmware gtype=\"FuAcpiPhatVersionRecord\">\n    <version_raw>0x1</version_raw>\n    <data size=\"0x3a8\">AACoAwEAAAAhAAAA/XwJJ+VGOU645DPkOaE+r3MAaAEMAAAASU5UQz6mwWQtut5BllUvcP5hjwAgACYACAAAAElOVEPty5khPk3vRYXR4brVo3Cp//////8AAABJTlRDYXM/qPr+1kKLMpXymJv21P//////AAAASU5UQxanTNjTfktMsdUrjCdKGfEBAP///wAAAElOVEO/lbDp4t7JSod4nkH7hsQ2AAAARgIAAABJTlRDZ92F4wOPckirRzyhFL4eUgAAAAAEAAAASU5UQ52v2Dg9D0hOo2v6/WhhSKAgACYACAAAAElOVEPmbiVzkKkTS4q6duIsPpk8BgAEAAAAAABJTlRDElsr+iQx3kOE5sQRTogfQyAAJgAIAAAASU5UQ+djpEdtGXdFtTY7moW3OEv//////wAAAElOVEMh4Dw9Zc71oqL1AIsruwyiAgAAAAAAAABJTlRDPP+jhGXOjUSBxBpiqKnDbgIAAAAAAAAASU5UQz4VUPonZhRHkiC4xx2rQpr//////wAAAElOVEONUWkBgAR2VqnBWokDxJkrAAAMACIAAABJTlRDz9+UAHvZolGPhewkgr1ilhEgAAAAAAAASU5UQ/3WrdFWsIZUrZZRY9G5zNwAAAAAAAAAAElOVEMwqpCPWbnbV5jtrtoUu09///////8AAABJTlRDuXh3hyLPakeXoSdTDZr+QiAAJgAIAAAASU5UQ/P+ctoreDhMhUAskCF8FnMeAAQAAAAAAElOVEOsPWTsuatfRoOmqFfh0DuiAAAJEgEAAABJTlRDYMRYaLoVq062fABT/83tVCAAJgAIAAAASU5UQ12iK6b8/8ZKqQ4kV6wOR37//////wAAAElOVEProxnFKm3QR6rTXrAGtjEh//////8AAABJTlRDfSXs4dRDW0GVA57ASsVhWP//////AAAASU5UQx8SI+MM5thDjg9p2dfas6D//////wAAAElOVEPv3gyrJwsrTLa3m3NAQ+Pe//////8AAABJTlRD6sQRuyhpbE+zSHLAz8nQTf//////AAAASU5UQ+PIgTMsuaxLtsZDkJEek00AAAIFAQAAAElOVEO0zX1CMxwrT7c2+Nq+nprNAAAABwAAAABJTlRDhrywzM0bb0eqvuGRWSRL/XMAaAAMAAAASU5UQ9Y/jJiykqBBtcN4pc1HEvcAAAAAAAAAAElOVEOJVSgDNx5yS6X5cNGtrl00AAAAAQEAAABJTlRD</data>\n    <firmware gtype=\"FuAcpiPhatVersionElement\">\n      <version_raw>0x1680073</version_raw>\n      <data size=\"0x1c\">/XwJJ+VGOU645DPkOaE+r3MAaAEMAAAASU5UQw==</data>\n      <guid>27097cfd-46e5-4e39-b8e4-33e439a13eaf</guid>\n      <producer_id>INTC</producer_id>\n    </firmware>\n    <firmware gtype=\"FuAcpiPhatVersionElement\">\n      <version_raw>0x260020</version_raw>\n      <data size=\"0x1c\">PqbBZC263kGWVS9w/mGPACAAJgAIAAAASU5UQw==</data>\n      <guid>64c1a63e-ba2d-41de-9655-2f70fe618f00</guid>\n      <producer_id>INTC</producer_id>\n    </firmware>\n    <firmware gtype=\"FuAcpiPhatVersionElement\">\n      <version_raw>0xffffffff</version_raw>\n      <data size=\"0x1c\">7cuZIT5N70WF0eG61aNwqf//////AAAASU5UQw==</data>\n      <guid>2199cbed-4d3e-45ef-85d1-e1bad5a370a9</guid>\n      <producer_id>INTC</producer_id>\n    </firmware>\n    <firmware gtype=\"FuAcpiPhatVersionElement\">\n      <version_raw>0xffffffff</version_raw>\n      <data size=\"0x1c\">YXM/qPr+1kKLMpXymJv21P//////AAAASU5UQw==</data>\n      <guid>a83f7361-fefa-42d6-8b32-95f2989bf6d4</guid>\n      <producer_id>INTC</producer_id>\n    </firmware>\n    <firmware gtype=\"FuAcpiPhatVersionElement\">\n      <version_raw>0xffff0001</version_raw>\n      <data size=\"0x1c\">FqdM2NN+S0yx1SuMJ0oZ8QEA////AAAASU5UQw==</data>\n      <guid>d84ca716-7ed3-4c4b-b1d5-2b8c274a19f1</guid>\n      <producer_id>INTC</producer_id>\n    </firmware>\n    <firmware gtype=\"FuAcpiPhatVersionElement\">\n      <version_raw>0x46000000</version_raw>\n      <data size=\"0x1c\">v5Ww6eLeyUqHeJ5B+4bENgAAAEYCAAAASU5UQw==</data>\n      <guid>e9b095bf-dee2-4ac9-8778-9e41fb86c436</guid>\n      <producer_id>INTC</producer_id>\n    </firmware>\n    <firmware gtype=\"FuAcpiPhatVersionElement\">\n      <version_raw>0x0</version_raw>\n      <data size=\"0x1c\">Z92F4wOPckirRzyhFL4eUgAAAAAEAAAASU5UQw==</data>\n      <guid>e385dd67-8f03-4872-ab47-3ca114be1e52</guid>\n      <producer_id>INTC</producer_id>\n    </firmware>\n    <firmware gtype=\"FuAcpiPhatVersionElement\">\n      <version_raw>0x260020</version_raw>\n      <data size=\"0x1c\">na/YOD0PSE6ja/r9aGFIoCAAJgAIAAAASU5UQw==</data>\n      <guid>38d8af9d-0f3d-4e48-a36b-fafd686148a0</guid>\n      <producer_id>INTC</producer_id>\n    </firmware>\n    <firmware gtype=\"FuAcpiPhatVersionElement\">\n      <version_raw>0x40006</version_raw>\n      <data size=\"0x1c\">5m4lc5CpE0uKunbiLD6ZPAYABAAAAAAASU5UQw==</data>\n      <guid>73256ee6-a990-4b13-8aba-76e22c3e993c</guid>\n      <producer_id>INTC</producer_id>\n    </firmware>\n    <firmware gtype=\"FuAcpiPhatVersionElement\">\n      <version_raw>0x260020</version_raw>\n      <data size=\"0x1c\">Elsr+iQx3kOE5sQRTogfQyAAJgAIAAAASU5UQw==</data>\n      <guid>fa2b5b12-3124-43de-84e6-c4114e881f43</guid>\n      <producer_id>INTC</producer_id>\n    </firmware>\n    <firmware gtype=\"FuAcpiPhatVersionElement\">\n      <version_raw>0xffffffff</version_raw>\n      <data size=\"0x1c\">52OkR20Zd0W1Njuahbc4S///////AAAASU5UQw==</data>\n      <guid>47a463e7-196d-4577-b536-3b9a85b7384b</guid>\n      <producer_id>INTC</producer_id>\n    </firmware>\n    <firmware gtype=\"FuAcpiPhatVersionElement\">\n      <version_raw>0x2</version_raw>\n      <data size=\"0x1c\">IeA8PWXO9aKi9QCLK7sMogIAAAAAAAAASU5UQw==</data>\n      <guid>3d3ce021-ce65-a2f5-a2f5-008b2bbb0ca2</guid>\n      <producer_id>INTC</producer_id>\n    </firmware>\n    <firmware gtype=\"FuAcpiPhatVersionElement\">\n      <version_raw>0x2</version_raw>\n      <data size=\"0x1c\">PP+jhGXOjUSBxBpiqKnDbgIAAAAAAAAASU5UQw==</data>\n      <guid>84a3ff3c-ce65-448d-81c4-1a62a8a9c36e</guid>\n      <producer_id>INTC</producer_id>\n    </firmware>\n    <firmware gtype=\"FuAcpiPhatVersionElement\">\n      <version_raw>0xffffffff</version_raw>\n      <data size=\"0x1c\">PhVQ+idmFEeSILjHHatCmv//////AAAASU5UQw==</data>\n      <guid>fa50153e-6627-4714-9220-b8c71dab429a</guid>\n      <producer_id>INTC</producer_id>\n    </firmware>\n    <firmware gtype=\"FuAcpiPhatVersionElement\">\n      <version_raw>0xc0000</version_raw>\n      <data size=\"0x1c\">jVFpAYAEdlapwVqJA8SZKwAADAAiAAAASU5UQw==</data>\n      <guid>0169518d-0480-5676-a9c1-5a8903c4992b</guid>\n      <producer_id>INTC</producer_id>\n    </firmware>\n    <firmware gtype=\"FuAcpiPhatVersionElement\">\n      <version_raw>0x2011</version_raw>\n      <data size=\"0x1c\">z9+UAHvZolGPhewkgr1ilhEgAAAAAAAASU5UQw==</data>\n      <guid>0094dfcf-d97b-51a2-8f85-ec2482bd6296</guid>\n      <producer_id>INTC</producer_id>\n    </firmware>\n    <firmware gtype=\"FuAcpiPhatVersionElement\">\n      <data size=\"0x1c\">/dat0VawhlStllFj0bnM3AAAAAAAAAAASU5UQw==</data>\n      <guid>d1add6fd-b056-5486-ad96-5163d1b9ccdc</guid>\n      <producer_id>INTC</producer_id>\n    </firmware>\n    <firmware gtype=\"FuAcpiPhatVersionElement\">\n      <version_raw>0xffffffff</version_raw>\n      <data size=\"0x1c\">MKqQj1m521eY7a7aFLtPf///////AAAASU5UQw==</data>\n      <guid>8f90aa30-b959-57db-98ed-aeda14bb4f7f</guid>\n      <producer_id>INTC</producer_id>\n    </firmware>\n    <firmware gtype=\"FuAcpiPhatVersionElement\">\n      <version_raw>0x260020</version_raw>\n      <data size=\"0x1c\">uXh3hyLPakeXoSdTDZr+QiAAJgAIAAAASU5UQw==</data>\n      <guid>877778b9-cf22-476a-97a1-27530d9afe42</guid>\n      <producer_id>INTC</producer_id>\n    </firmware>\n    <firmware gtype=\"FuAcpiPhatVersionElement\">\n      <version_raw>0x4001e</version_raw>\n      <data size=\"0x1c\">8/5y2it4OEyFQCyQIXwWcx4ABAAAAAAASU5UQw==</data>\n      <guid>da72fef3-782b-4c38-8540-2c90217c1673</guid>\n      <producer_id>INTC</producer_id>\n    </firmware>\n    <firmware gtype=\"FuAcpiPhatVersionElement\">\n      <version_raw>0x12090000</version_raw>\n      <data size=\"0x1c\">rD1k7LmrX0aDpqhX4dA7ogAACRIBAAAASU5UQw==</data>\n      <guid>ec643dac-abb9-465f-83a6-a857e1d03ba2</guid>\n      <producer_id>INTC</producer_id>\n    </firmware>\n    <firmware gtype=\"FuAcpiPhatVersionElement\">\n      <version_raw>0x260020</version_raw>\n      <data size=\"0x1c\">YMRYaLoVq062fABT/83tVCAAJgAIAAAASU5UQw==</data>\n      <guid>6858c460-15ba-4eab-b67c-0053ffcded54</guid>\n      <producer_id>INTC</producer_id>\n    </firmware>\n    <firmware gtype=\"FuAcpiPhatVersionElement\">\n      <version_raw>0xffffffff</version_raw>\n      <data size=\"0x1c\">XaIrpvz/xkqpDiRXrA5Hfv//////AAAASU5UQw==</data>\n      <guid>a62ba25d-fffc-4ac6-a90e-2457ac0e477e</guid>\n      <producer_id>INTC</producer_id>\n    </firmware>\n    <firmware gtype=\"FuAcpiPhatVersionElement\">\n      <version_raw>0xffffffff</version_raw>\n      <data size=\"0x1c\">66MZxSpt0Eeq016wBrYxIf//////AAAASU5UQw==</data>\n      <guid>c519a3eb-6d2a-47d0-aad3-5eb006b63121</guid>\n      <producer_id>INTC</producer_id>\n    </firmware>\n    <firmware gtype=\"FuAcpiPhatVersionElement\">\n      <version_raw>0xffffffff</version_raw>\n      <data size=\"0x1c\">fSXs4dRDW0GVA57ASsVhWP//////AAAASU5UQw==</data>\n      <guid>e1ec257d-43d4-415b-9503-9ec04ac56158</guid>\n      <producer_id>INTC</producer_id>\n    </firmware>\n    <firmware gtype=\"FuAcpiPhatVersionElement\">\n      <version_raw>0xffffffff</version_raw>\n      <data size=\"0x1c\">HxIj4wzm2EOOD2nZ19qzoP//////AAAASU5UQw==</data>\n      <guid>e323121f-e60c-43d8-8e0f-69d9d7dab3a0</guid>\n      <producer_id>INTC</producer_id>\n    </firmware>\n    <firmware gtype=\"FuAcpiPhatVersionElement\">\n      <version_raw>0xffffffff</version_raw>\n      <data size=\"0x1c\">794MqycLK0y2t5tzQEPj3v//////AAAASU5UQw==</data>\n      <guid>ab0cdeef-0b27-4c2b-b6b7-9b734043e3de</guid>\n      <producer_id>INTC</producer_id>\n    </firmware>\n    <firmware gtype=\"FuAcpiPhatVersionElement\">\n      <version_raw>0xffffffff</version_raw>\n      <data size=\"0x1c\">6sQRuyhpbE+zSHLAz8nQTf//////AAAASU5UQw==</data>\n      <guid>bb11c4ea-6928-4f6c-b348-72c0cfc9d04d</guid>\n      <producer_id>INTC</producer_id>\n    </firmware>\n    <firmware gtype=\"FuAcpiPhatVersionElement\">\n      <version_raw>0x5020000</version_raw>\n      <data size=\"0x1c\">48iBMyy5rEu2xkOQkR6TTQAAAgUBAAAASU5UQw==</data>\n      <guid>3381c8e3-b92c-4bac-b6c6-4390911e934d</guid>\n      <producer_id>INTC</producer_id>\n    </firmware>\n    <firmware gtype=\"FuAcpiPhatVersionElement\">\n      <version_raw>0x7000000</version_raw>\n      <data size=\"0x1c\">tM19QjMcK0+3Nvjavp6azQAAAAcAAAAASU5UQw==</data>\n      <guid>427dcdb4-1c33-4f2b-b736-f8dabe9e9acd</guid>\n      <producer_id>INTC</producer_id>\n    </firmware>\n    <firmware gtype=\"FuAcpiPhatVersionElement\">\n      <version_raw>0x680073</version_raw>\n      <data size=\"0x1c\">hrywzM0bb0eqvuGRWSRL/XMAaAAMAAAASU5UQw==</data>\n      <guid>ccb0bc86-1bcd-476f-aabe-e19159244bfd</guid>\n      <producer_id>INTC</producer_id>\n    </firmware>\n    <firmware gtype=\"FuAcpiPhatVersionElement\">\n      <data size=\"0x1c\">1j+MmLKSoEG1w3ilzUcS9wAAAAAAAAAASU5UQw==</data>\n      <guid>988c3fd6-92b2-41a0-b5c3-78a5cd4712f7</guid>\n      <producer_id>INTC</producer_id>\n    </firmware>\n    <firmware gtype=\"FuAcpiPhatVersionElement\">\n      <version_raw>0x1000000</version_raw>\n      <data size=\"0x1c\">iVUoAzceckul+XDRra5dNAAAAAEBAAAASU5UQw==</data>\n      <guid>03285589-1e37-4b72-a5f9-70d1adae5d34</guid>\n      <producer_id>INTC</producer_id>\n    </firmware>\n  </firmware>\n  <firmware gtype=\"FuAcpiPhatHealthRecord\">\n    <version_raw>0x1</version_raw>\n    <data size=\"0xc7\">AQDHAAEAAAEvHKSTn6DC56wf8kiPA+7DdAAAAFYAZQBuAEgAdwAoADkAMwBBADQAMQBDADIARgAtAEEAMAA5AEYALQBFADcAQwAyAC0AQQBDADEARgAtAEYAMgA0ADgAOABGADAAMwBFAEUAQwAzACkAAAAB6gGbAgMAAAAwX4nsAQAAAAcAAAAAAAAAAAAAAAAAAAAAAMEFqw5qdgVIoDkwgd4CEMcAAAAAAAAAAAAAAAAAAAAASUDmAsyrpUSvmvr8OQ3YRA==</data>\n    <guid>93a41c2f-a09f-e7c2-ac1f-f2488f03eec3</guid>\n    <device_path>VenHw(93A41C2F-A09F-E7C2-AC1F-F2488F03EEC3)</device_path>\n    <am_healthy>0x1</am_healthy>\n  </firmware>\n  <firmware gtype=\"FuAcpiPhatHealthRecord\">\n    <version_raw>0x1</version_raw>\n    <data size=\"0x7d\">AQB9AAEAAAAJ/w2jv1YiRqnnOZsKeefHdAAAAFYAZQBuAEgAdwAoAEEAMwAwAEQARgBGADAAOQAtADUANgBCAEYALQA0ADYAMgAyAC0AQQA5AEUANwAtADMAOQA5AEIAMABBADcAOQBFADcAQwA3ACkAAAABAAQAAwIAAQA=</data>\n    <guid>a30dff09-56bf-4622-a9e7-399b0a79e7c7</guid>\n    <device_path>VenHw(A30DFF09-56BF-4622-A9E7-399B0A79E7C7)</device_path>\n  </firmware>\n  <firmware gtype=\"FuAcpiPhatHealthRecord\">\n    <version_raw>0x1</version_raw>\n    <data size=\"0xa1\">AQChAAEAAAEImLJG8AagTJ+SXElngpJ4dAAAAFYAZQBuAEgAdwAoADQANgBCADIAOQA4ADAAOAAtADAANgBGADAALQA0AEMAQQAwAC0AOQBGADkAMgAtADUAQwA0ADkANgA3ADgAMgA5ADIANwA4ACkAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=</data>\n    <guid>46b29808-06f0-4ca0-9f92-5c4967829278</guid>\n    <device_path>VenHw(46B29808-06F0-4CA0-9F92-5C4967829278)</device_path>\n    <am_healthy>0x1</am_healthy>\n  </firmware>\n</firmware>\n",
                                 "EspPath" : "/boot/efi",
                                 "HostProduct" : "StarBook",
                                 "BootTime" : "1677783313",
                                 "HostFirmwareMajorRelease" : "01",
                                 "CpuModel" : "Intel 12th Gen Intel Core™ i7-1260P",
                                 "HostBaseboardManufacturer" : "Star Labs",
                                 "HostBiosMajorRelease" : "05",
                                 "HostBiosVendor" : "American Megatrends International, LLC.",
                                 "CapsuleApplyMethod" : "nvram",
                                 "LinuxLockdown" : "none",
                                 "CompileVersion(com.hughsie.libjcat)" : "0.1.9",
                                 "Pcr0_SHA256" : "ba490b16eab4afc9aa165d86a08521bec0f8c903b0f2a88245cf2e3906d77474",
                                 "HostBaseboardProduct" : "StarBook",
                                 "EfivarNvramUsed" : "77059",
                                 "DistroId" : "ubuntu",
                                 "HostFirmwareMinorRelease" : "01",
                                 "CompileVersion(org.freedesktop.fwupd)" : "1.8.10",
                                 "LastAttemptStatus" : "0x0",
                                 "HostBiosMinorRelease" : "1a"
                               }
                             }
                           ]
                         }

@Sean-StarLabs
Copy link
Contributor

I know what the issue is, will work a fix into the next release that includes other fixed

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working
Projects
None yet
Development

No branches or pull requests

2 participants