lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <437908170904282019h6a10ef9dg594002e22842b366@mail.gmail.com>
Date:	Tue, 28 Apr 2009 22:19:28 -0500
From:	Michael Brown <mebrown@...haels-house.net>
To:	Kay Sievers <kay.sievers@...y.org>
Cc:	Doug Warzecha <Douglas_Warzecha@...l.com>,
	Jean Delvare <khali@...ux-fr.org>,
	Greg Kroah-Hartman <gregkh@...e.de>,
	linux-kernel@...r.kernel.org,
	Mauro Carvalho Chehab <mchehab@...radead.org>,
	Matt Domsch <Matt_Domsch@...l.com>
Subject: Re: Class device namespaces

On Tue, Apr 28, 2009 at 8:42 PM, Kay Sievers <kay.sievers@...y.org> wrote:
> On Tue, Apr 28, 2009 at 23:58, Doug Warzecha <Douglas_Warzecha@...l.com> wrote:
>> On Tue, Apr 28, 2009 at 07:46:57PM +0200, Kay Sievers wrote:
>>> On Tue, Apr 28, 2009 at 19:39, Doug Warzecha <Douglas_Warzecha@...l.com> wrote:
>>>
>>> > /sys/class/firmware/dell_rbu/loading
>>> > /sys/class/firmware/dell_rbu/data
>>>
>>> These pathes only ever exist for a fraction of a second, during a
>>> kernel initiated firmware request. This request is usually only
>>> handled by the udev firmware loader script, and not interesting for
>>> anything else. Are you replacing the udev firmware script here? Are
>>> you sure you do something else here?
>>
>> A Dell library writes data to those paths when a Dell BIOS Update Package is run and requests the BIOS image to be loaded into memory.
>
> How do you do this? These paths exist for a short time only. How do
> you get udev out of your way handling the firmware request for you?
> How do you plug into the event processing with a custom tool?

Overall, the interface is pretty pathetic because it doesnt fit our
use case *at all*, but way back in the day that is what we had to do
to get it reviewed and approved for merge upstream. At least it is
better than the earlier versions where we had to do a separate
request_firmware() for every 4k packet (and spin waiting for files to
disappear/reappear)

All this code is in libsmbios(*) if you want to see the ugly details,
but the short version is this:

1) we poke the image_type file and packet_size files with appropriate
data, which causes the driver to do a request firmware
2) spin until request_firmware creates the files we need
2) loop over our file packet_size bytes at a time writing data into
the data file
3) set loading to 0 when done

*) src/python/libsmbios_c/rbu_update.py

The code basically "packetizes" the bios update into page-sized chunks
with a header so BIOS can find them and reassemble them for the final
update.

For older systems (monolithic mode), the kernel code has to allocate
physically contiguous region to hold the entire firmware image.
--
Michael
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ