[Bah, I'm really bad at email today. Trying again.] On Apr 15, 2015 6:15 AM, "Greg Kroah-Hartman" <gregkh@xxxxxxxxxxxxxxxxxxx> wrote: > > On Tue, Apr 14, 2015 at 11:56:26AM -0400, Andy Lutomirski wrote: > > On Tue, Apr 14, 2015 at 10:08 AM, Greg Kroah-Hartman > > <gregkh@xxxxxxxxxxxxxxxxxxx> wrote: > > > On Tue, Apr 14, 2015 at 05:44:55PM +0800, Kweh, Hock Leong wrote: > > >> From: "Kweh, Hock Leong" <hock.leong.kweh@xxxxxxxxx> > > >> > > >> Introduce this new API for loading firmware from a specific location > > >> instead of /lib/firmware/ by providing a full path to the firmware > > >> file. > > > > > > Ick, why would we want this? > > > > > > > Because this mechanism should still work even if /lib is unwriteable > > (e.g it's on squashfs or a read-only NFS root). > > Why would a filesystem need to be writable to read a firmware blob from? Because someone would need to temporarily put the image there. In practice, these blobs will come from vendors, signed, online using ESRT magic. Imagine a CoreOS system. When a UEFI update needed on 1% of a deployment's metal is published, no one is going to want to push out a new core CoreOS image. Instead they'll want to run the update on that 1% of nodes and be done with it. To be fair, and for those that didn't follow all the various discussions, it's unclear that this mechanism will ever be useful in the x86 server space. There's some reason to believe that MS will only issue UpdateCapsule before ExitBootServices and that firmware vendors will therefore disallow UpdateCapsule after ExitBootServices. The fwupd crowd is (I think) planning on bypassing this entirely and using the boot loader to update firmware. Regardless, those things aren't going to live in /lib, but they'll have to write *something* to a FAT filesystem because they have no choice. More sensible firmwares will support the runtime stuff, and atomic systems (RHEL Atomic, OSTree, CoreOS, whatever Docker's working on, whatever Sandstorm is working on (?), etc.) should probably be as well supported in the kernel as we can manage. > > > In this regard, UEFI capsules are very much unlike firmware_class > > firmware. firmware_class firmwise is kind of like device drivers; it > > generally comes from the same vendor as your kernel image and > > /lib/modules, and it can be updated by the same mechanism. UEFI > > capsules, on the other hand, are one-time things that should be loaded > > at the explicit request of the admin. > > Just like BIOS updates, which use the firmware interface. What BIOS updates? There's flashrom, which quite sensibly reads its input in user space. The other example I found is dell_rbu, which does a complicated packetized update thing and explicitly says in the docs: "This method makes sure that all the packets get to the driver in a single operation." The mechanism seems quite awkward to me. > > > There is no reason whatsoever > > that they should exist on persistent storage, and, in fact, there's a > > very good reason that they should not. On little embedded devices, > > which will apparently be the initial users of this code, keeping the > > capsules around is a waste of valuable space. > > > > This is why I think that the right approach would be to avoid using > > firmware_class entirely for this. IMO a simple_char device would be > > the way to go (hint hint...) but other simple approaches are certainly > > possible. > > A char device would be present all the time, like a sysfs file to write > the firmware to, so I don't see the difference here. For a char device, > you would just do the normal open/write/close, just like for the > firmware interface, what is the difference? You wouldn't use open/write/close; you'd do it atomically with a single ioctl. That gives userspace an error code. It would also be possible to require a single write(2) call, but that seems to defeat most of the purpose of using open/write/close (namely the ability to script it with cat). --Andy -- To unsubscribe from this list: send the line "unsubscribe linux-efi" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html