https://bugs.kde.org/show_bug.cgi?id=499069
Bug ID: 499069 Summary: Firmware Security KCM returns search results in a single line. Classification: Applications Product: kinfocenter Version: 6.2.5 Platform: Fedora RPMs URL: https://discuss.kde.org/t/where-does-one-report-issues -with-the-firmware-security-system-settings-page/28619 /5?u=rokejulianlockhart#:~:text=1d-,Report%20under%20k infocenter.,-Solution OS: Linux Status: REPORTED Severity: minor Priority: NOR Component: general Assignee: plasma-b...@kde.org Reporter: 4wy78...@rokejulianlockhart.addy.io CC: sit...@kde.org Target Milestone: --- Created attachment 177631 --> https://bugs.kde.org/attachment.cgi?id=177631&action=edit Demonstration screenshot for `#c0`. SUMMARY ------- The "Firmware Security" KCM, accessible via KInfoCenter, returns search results in a single line, rendering them nigh unreadable. STEPS TO REPRODUCE ------------------ 1. Invoke `kcm_firmware_security` (whether via `kcmshell6` or `kinfocenter`): - ~~~sh #!/usr/bin/env sh kcmshell6 kcm_firmware_security ~~~ - ~~~sh #!/usr/bin/env sh kinfocenter kcm_firmware_security ~~~ Just don't use `systemsettings kcm_firmware_security`. That doesn't work, and I can't be bothered to report a bug for it RN. 2. Search for "a" (or "ab", etcetera - I've solely listed those which I've tested). OBSERVED RESULT --------------- Each result is concatenated into a single line: > ~~~YAML > HSI:2! (v1.9.27) HSI-1 ✔ BIOS firmware updates: Enabled ✔ Fused platform: > Locked ✔ Supported CPU: Valid ✔ TPM empty PCRs: Valid ✔ TPM v2.0: Found ✔ > UEFI bootservice variables: Locked HSI-2 ✔ SPI write protection: Enabled ✔ > IOMMU: Enabled ✔ Platform debugging: Locked ✔ TPM PCR0 reconstruction: Valid > HSI-3 ✔ CET Platform: Supported ✘ SPI replay protection: Not supported ✘ > Pre-boot DMA protection: Disabled ✘ Suspend-to-idle: Disabled ✘ > Suspend-to-ram: Enabled HSI-4 ✔ SMAP: Enabled ✘ Processor rollback > protection: Disabled ✘ Encrypted RAM: Not supported Runtime Suffix -! ✔ fwupd > plug-ins: Untainted ✔ CET OS Support: Supported ✔ Linux swap: Encrypted ✔ > Linux kernel: Untainted ✘ Linux kernel lockdown: Disabled ✘ UEFI secure boot: > Disabled This system has HSI runtime issues. » > https://fwupd.github.io/hsi.html#hsi-runtime-suffix There are devices with > issues: Samsung — SSD 980 PRO 250GB: • > https://www.pugetsystems.com/support/guides/critical-samsung-ssd-firmware-update/ > > ~~~ EXPECTED RESULT --------------- Each result should be returned on a new line. I've manually converted the aforementioned quotation into the undermentioned example, so it may not be 100% correct, but demonstrates the difference: ~~~YAML HSI:2! (v1.9.27) HSI-1 ✔ BIOS firmware updates: Enabled ✔ Fused platform: Locked ✔ Supported CPU: Valid ✔ TPM empty PCRs: Valid ✔ TPM v2.0: Found ✔ UEFI bootservice variables: Locked HSI-2 ✔ SPI write protection: Enabled ✔ IOMMU: Enabled ✔ Platform debugging: Locked ✔ TPM PCR0 reconstruction: Valid HSI-3 ✔ CET Platform: Supported ✘ SPI replay protection: Not supported ✘ Pre-boot DMA protection: Disabled ✘ Suspend-to-idle: Disabled ✘ Suspend-to-ram: Enabled HSI-4 ✔ SMAP: Enabled ✘ Processor rollback protection: Disabled ✘ Encrypted RAM: Not supported Runtime Suffix -! ✔ fwupd plug-ins: Untainted ✔ CET OS Support: Supported ✔ Linux swap: Encrypted ✔ Linux kernel: Untainted ✘ Linux kernel lockdown: Disabled ✘ UEFI secure boot: Disabled This system has HSI runtime issues. » https://fwupd.github.io/hsi.html#hsi-runtime-suffix There are devices with issues: Samsung — SSD 980 PRO 250GB: • https://www.pugetsystems.com/support/guides/critical-samsung-ssd-firmware-update/ ~~~ SOFTWARE/OS VERSIONS -------------------- 1. ~~~sh #!/usr/bin/env sh kinfo ~~~ 2. > ~~~YAML > Operating System: Fedora Linux 41 > KDE Plasma Version: 6.2.5 > KDE Frameworks Version: 6.10.0 > Qt Version: 6.8.1 > Kernel Version: 6.12.9-200.fc41.x86_64 (64-bit) > Graphics Platform: Wayland > Processors: 12 × AMD Ryzen 5 7600X 6-Core Processor > Memory: 30.4 GiB of RAM > Graphics Processor: AMD Radeon RX 5700 > Manufacturer: ASRock > Product Name: X670E Taichi > ~~~ ADDITIONAL INFORMATION ---------------------- I was advised to report this bug in this product by [`discuss.kde.org/t/28619/5`][1]. [1]: https://discuss.kde.org/t/where-does-one-report-issues-with-the-firmware-security-system-settings-page/28619/5?u=rokejulianlockhart -- You are receiving this mail because: You are watching all bug changes.