Go to file
Mario Limonciello 20c112a891 Adjust systemd confinement restrictions
commit 99b317d4f7 introduced much
more strict confinement. This actually caused some regressions
though.

commit 3c54edb15e tried to fix
one of the problems, but didn't cover the rest.

The actual changes:
- Drop PrivateUsers=yes
  This is causing crashes when initializing libsmbios
  Presumably it's related to accessing memory.
- Add back in NoNewPrivileges
  This hasn't caused any crashes for libsmbios for me.
- Remove ProtectKernelTunables
  This is needed to access /sys for the dcdbas kernel
  module used by libsmbios.  Calls fail without it
- Add ReadWritePaths=/var/lib/fwupd /boot/efi
  The refresh function was failing the first time due to
  ProtectSystem=full being in effect and /var/lib/fwupd
  being read only
  Flashing UEFI capsules was failing due to being unable
  to write to /boot/efi/EFI/$(EFIDIR)/fw/
2017-02-23 15:13:24 -06:00
.tx trivial: Add some files ready for a first release 2015-03-16 12:51:04 +00:00
contrib trivial: Fix example rpm spec file 2017-01-17 15:45:00 +00:00
data Adjust systemd confinement restrictions 2017-02-23 15:13:24 -06:00
docs Revert "Make it compile with docbook2X" 2017-02-16 10:47:35 +00:00
libdfu trivial: move gelf.h include to HAVE_LIBELF (#87) 2017-02-14 11:09:46 -06:00
libfwupd Add fwupd_result_get_device_version_bootloader() 2016-12-23 11:21:22 +00:00
m4 Do not use the deprecated GNOME_COMPILE_WARNINGS 2016-08-25 11:51:05 +01:00
plugins trivial: correct a small memory leak in SynapticsMST plugin 2017-02-23 13:16:04 -06:00
po Delete duplicate translations (#89) 2017-02-11 16:26:30 +00:00
policy Add VerifyUpdate to update the device checksums server-side 2016-12-15 17:09:37 +00:00
src trivial: Prevent a critical warning when using --timed-exit 2017-02-21 09:36:49 +00:00
AUTHORS Add initial build files and enough code to launch a simple D-Bus daemon 2015-02-26 18:16:40 +00:00
autogen.sh libdfu: Generate gtk-doc documentation 2015-11-14 16:51:53 +00:00
configure.ac Fix compiler warnings 2017-02-13 10:02:25 +00:00
COPYING Add initial project files 2015-02-26 13:07:00 +00:00
git.mk trivial: Update git.mk to latest upstream copy 2016-07-28 09:16:20 +01:00
MAINTAINERS Add initial build files and enough code to launch a simple D-Bus daemon 2015-02-26 18:16:40 +00:00
Makefile.am Move the plugins into plugin-specific directories 2016-12-12 11:52:03 +00:00
NEWS Release fwupd 0.8.0 2017-02-08 12:51:44 +00:00
README.md Convert the providers to plugins to simplify code and for future features 2016-12-12 12:31:23 +00:00
RELEASE trivial: post release version bump 2017-02-08 12:53:50 +00:00

fwupd

This project aims to make updating firmware on Linux automatic, safe and reliable.

Additional information is available at the website: http://www.fwupd.org

Adding a new plugin

An extensible architecture allows for providing new plugin types (for reading and writing different firmware) as well as ways quirk their behavior.

If you have a firmware specification and would like to see support in this project, please file an issue and share the spec. Patches are also welcome.

LVFS

This project is configured by default to download firmware from the [Linux Vendor Firmware Service (LVFS)] (https://secure-lvfs.rhcloud.com/lvfs/).

This service is available to all OEMs and firmware creators who would like to make their firmware available to Linux users.

Basic usage flow (command line)

If you have a device with firmware supported by fwupd, this is how you will check for updates and apply them using fwupd's command line tools.

fwupdmgr get-devices

This will display all devices detected by fwupd.

fwupdmgr refresh

This will download the latest metadata from LVFS.

fwupdmgr get-updates

If updates are available for any devices on the system, they'll be displayed.

fwupdmgr update

This will download and apply all updates for your system.

  • Updates that can be applied live (Online updates) will be done immediately.
  • Updates that require a reboot (Offline updates) will be staged for the next reboot.

Other frontends

Currently [GNOME Software] (https://wiki.gnome.org/Apps/Software) is the only graphical frontend available. When compiled with firmware support, it will check for updates periodically and automatically download firmware in the background.

After the firmware has been downloaded a popup will be displayed in Gnome Software to perform the update.

On Dell IoT gateways, [Wyse Cloud Client Manager (CCM)] (http://www.dell.com/us/business/p/wyse-cloud-client-manager/pd) has been built with fwupd support. The remote administration interface can be used to download and deploy firmware updates.