Debian Bug report logs - #995270
fwupdmgr: WARNING: Firmware can not be updated in legacy BIOS mode

version graph

Package: fwupd; Maintainer for fwupd is Debian EFI <[email protected]>; Source for fwupd is src:fwupd (PTS, buildd, popcon).

Reported by: Thorsten Glaser <[email protected]>

Date: Tue, 28 Sep 2021 20:27:02 UTC

Severity: normal

Found in version fwupd/1.5.7-4

Reply or subscribe to this bug.

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to [email protected], [email protected], Debian EFI <[email protected]>:
Bug#995270; Package fwupd. (Tue, 28 Sep 2021 20:27:04 GMT) (full text, mbox, link).


Acknowledgement sent to Thorsten Glaser <[email protected]>:
New Bug report received and forwarded. Copy sent to [email protected], Debian EFI <[email protected]>. (Tue, 28 Sep 2021 20:27:04 GMT) (full text, mbox, link).


Message #5 received at [email protected] (full text, mbox, reply):

From: Thorsten Glaser <[email protected]>
To: Debian Bug Tracking System <[email protected]>
Subject: fwupdmgr: WARNING: Firmware can not be updated in legacy BIOS mode
Date: Tue, 28 Sep 2021 22:23:00 +0200
Package: fwupd
Version: 1.5.7-4
Severity: normal
X-Debbugs-Cc: [email protected]

tglase@tglase-nb:~ $ sudo fwupdmgr get-devices
WARNING: Firmware can not be updated in legacy BIOS mode
  See https://github.com/fwupd/fwupd/wiki/PluginFlag:legacy-bios for more information.
[…]

I’ve followed the instructions on the listed page and added uefi
to the list of disabled plugins, but the message still is shown.

This laptop doesn’t have EFI.


-- System Information:
Debian Release: 11.0
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable-debug'), (500, 'oldstable-updates'), (500, 'oldoldstable'), (500, 'stable'), (500, 'oldstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.10.0-8-amd64 (SMP w/2 CPU threads)
Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /bin/lksh
Init: sysvinit (via /sbin/init)

Versions of packages fwupd depends on:
ii  libc6                      2.31-13
ii  libcurl3-gnutls            7.74.0-1.3+b1
ii  libefiboot1                37-6
ii  libelf1                    0.183-3
ii  libelogind0 [libsystemd0]  246.9.1-1+debian1
ii  libflashrom1               1.2-5
ii  libfwupd2                  1.5.7-4
ii  libfwupdplugin1            1.5.7-4
ii  libglib2.0-0               2.66.8-1
ii  libgnutls30                3.7.1-5
ii  libgudev-1.0-0             234-1
ii  libgusb2                   0.3.5-1
ii  libjcat1                   0.1.3-2
ii  libjson-glib-1.0-0         1.6.2-1
ii  libpolkit-gobject-1-0      0.105-31
ii  libsmbios-c2               2.4.3-1
ii  libsqlite3-0               3.34.1-3
ii  libtss2-esys-3.0.2-0       3.0.3-2
ii  libxmlb1                   0.1.15-2
ii  shared-mime-info           2.0-1

Versions of packages fwupd recommends:
pn  bolt           <none>
ii  dbus           1.12.20-2
pn  fwupd-signed   <none>
ii  python3        3.9.2-3
pn  secureboot-db  <none>
ii  udisks2        2.9.2-2

Versions of packages fwupd suggests:
pn  gir1.2-fwupd-2.0  <none>

-- Configuration Files:
/etc/fwupd/daemon.conf changed:
[fwupd]
DisabledDevices=
DisabledPlugins=test;test_ble;invalid;uefi
ArchiveSizeMax=0
IdleTimeout=7200
VerboseDomains=
UpdateMotd=true
EnumerateAllDevices=false
ApprovedFirmware=
BlockedFirmware=
UriSchemes=


-- no debconf information

Information forwarded to [email protected], [email protected], Debian EFI <[email protected]>:
Bug#995270; Package fwupd. (Thu, 07 Oct 2021 22:21:03 GMT) (full text, mbox, link).


Acknowledgement sent to Default User <[email protected]>:
Extra info received and forwarded to list. Copy sent to [email protected], Debian EFI <[email protected]>. (Thu, 07 Oct 2021 22:21:03 GMT) (full text, mbox, link).


Message #10 received at [email protected] (full text, mbox, reply):

From: Default User <[email protected]>
To: Debian Bug Tracking System <[email protected]>
Subject: Re: fwupdmgr: WARNING: Firmware can not be updated in legacy BIOS mode
Date: Thu, 07 Oct 2021 18:18:09 -0400
Package: fwupd
Version: 1.5.7-4
Followup-For: Bug #995270
X-Debbugs-Cc: [email protected]

Dear Maintainer,

This is just a "me too", to validate the experience of the original submitter.
I too encountered this same bug, when the Gnome Software program notified me of
a firmware update for my Logitech Unifying receiver, which I use for my
Logitech k360 wireless usb keyboard and my Logitech m325 wireless usb mouse.

Gnome Software first gave this message:

"Device Firmware

Unifying Receiver Device Update
RQR12.03_B0025 -> RQR12.10_B0032

Device cannot be..ed during update."

But it was unable to perform the update, leaving the mouse and keyboard non-
functional until reboot. It gave this error message:

"Unable to update "Unifying Receiver Device Update": failed to get device after
detatch replug: device 92831be453a0f345462e7050e26a5675d4xxxxxx did not come
back"

Now, Gnome Software taunts me with a persistent notification of this firmware
update, which I cannot do, and I cannot make the notification go away, except
by completely uninstalling the Gnome Software program.

Output from fwupdmgr get-devices includes this:

"WARNING: Firmware can not be updated in legacy BIOS mode
  See https://github.com/fwupd/fwupd/wiki/PluginFlag:legacy-bios for more
information.
Unifying Receiver:
      Device ID:          cd0ca444337ce69f27ebb3fff2dc35c338xxxxxx
      Summary:            A miniaturised USB wireless receiver
      Current version:    RQR12.03_B0025
      Bootloader Version: BOT01.02_B0015
      Vendor:             HIDRAW:0x046D|USB:0x046D
      Install Duration:   30 seconds
      GUIDs:              9d131a0c-a606-580f-8eda-80587250b8d6
                          fcf55bf5-767b-51ce-9c17-f6f538c4ee9f
                          279ed287-3607-549e-bacc-f873bb9838c4
      Device Flags:       • Updatable
                          • Supported on remote server"

Output of fwdupmgr get-updates includes:

"WARNING: Firmware can not be updated in legacy BIOS mode
  See https://github.com/fwupd/fwupd/wiki/PluginFlag:legacy-bios for more
information.
Devices with no available firmware updates:
 • KINGSTON SV300S3xxxxxx
Inspiron 3542
│
└─Unifying Receiver:
  │   Device ID:          cd0ca444337ce69f27ebb3fff2dc35c338xxxxxx
  │   Summary:            A miniaturised USB wireless receiver
  │   Current version:    RQR12.03_B0025
  │   Bootloader Version: BOT01.02_B0015
  │   Vendor:             HIDRAW:0x046D|USB:0x046D
  │   Install Duration:   30 seconds
  │   GUIDs:              9d131a0c-a606-580f-8eda-80587250b8d6
  │                       fcf55bf5-767b-51ce-9c17-f6f538c4ee9f
  │                       279ed287-3607-549e-bacc-f873bb9838c4
  │   Device Flags:       • Updatable
  │                       • Supported on remote server
  │
  ├─Unifying Receiver:
  │     New version:      RQR12.10_B0032
  │     Remote ID:        lvfs
  │     Summary:          Firmware for the Logitech Unifying Receiver
(RQR12.xx)
  │     License:          Proprietary
  │     Size:             56.8 kB
  │     Created:          2019-07-18
  │     Urgency:          High
  │     Vendor:           Logitech
  │     Duration:         30 seconds
  │     Flags:            is-upgrade
  │     Description:
  │     This release addresses an encrypted keystroke injection vulnerability
sent by pointing devices. The vulnerability is complex to replicate and would
require a hacker to be physically close to a target.
  │
  │     A few of Logitech's devices used to send select buttons in an
unencrypted way, and in an effort to protect against this vulnerability,
Logitech removed the feature. Affected hardware is:
  │
  │     • Wireless Mouse M335
  │     • Zone Touch Mouse T400
  │     • Wireless Mouse M545
  │     • Wireless Mouse M560
  │     • Touch Mouse M600
  │     • Touch Mouse T620
  │     • Wireless Rechargeable Touchpad T650
  │
  │     Although Logitech does not recommend it, these features may be re-
activated by keeping/downgrading the receiver to an older firmware."

I tried to do the same fixes as the original submitter, with the same
(non)results. I am using a Cinnamon Desktop Environment boot up using a a BIOS,
not UEFI setup.

So it appears that unless fwupd is re-written to add support for non-UEFI
setups, I may be stuck with this problem until some time in the future when I
try to do a fresh install using a UEFI setup, and hoping that works on my older
computer.

-- System Information:
Debian Release: 11.0
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500,
'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 5.10.0-8-amd64 (SMP w/4 CPU threads)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not
set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages fwupd depends on:
ii  libc6                  2.31-13
ii  libcurl3-gnutls        7.74.0-1.3+b1
ii  libefiboot1            37-6
ii  libelf1                0.183-1
ii  libflashrom1           1.2-5
ii  libfwupd2              1.5.7-4
ii  libfwupdplugin1        1.5.7-4
ii  libglib2.0-0           2.66.8-1
ii  libgnutls30            3.7.1-5
ii  libgudev-1.0-0         234-1
ii  libgusb2               0.3.5-1
ii  libjcat1               0.1.3-2
ii  libjson-glib-1.0-0     1.6.2-1
ii  libpolkit-gobject-1-0  0.105-31
ii  libsmbios-c2           2.4.3-1
ii  libsqlite3-0           3.34.1-3
ii  libsystemd0            247.3-6
ii  libtss2-esys-3.0.2-0   3.0.3-2
ii  libxmlb1               0.1.15-2
ii  shared-mime-info       2.0-1

Versions of packages fwupd recommends:
ii  bolt                               0.9.1-1
ii  dbus                               1.12.20-2
ii  fwupd-amd64-signed [fwupd-signed]  1.5.7+4
ii  python3                            3.9.2-3
pn  secureboot-db                      <none>
ii  udisks2                            2.9.2-2

Versions of packages fwupd suggests:
pn  gir1.2-fwupd-2.0  <none>

Send a report that this bug log contains spam.


Debian bug tracking system administrator <[email protected]>. Last modified: Tue May 13 15:43:11 2025; Machine Name: bembo

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU General Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.