Hi Sergii, Arthur,

On 13.09.24 16:43, Arthur Heymans wrote:
>>
>> No EFI_CAPSULE_LOADER needed, not Linux specific. EFI-aware OS'
>> are also aware of the EFI system partition, FWIW. And with the
>> Boot Loader Specification[3], we already try to make use of it
>> beyond UEFI.
>>
>> Modeling things with files is a good choice by the Linux kernel
>> developers. But the overall design seems to miss that the boot-
>> loaders are file-aware too! We already have a ubiquitous mecha-
>> nism to pass files (usually the kernel) to the firmware.  Often
>> also to validate their authenticity (secure boot).
>
>
> So basically instead of a runtime service, getting a file from a disk at
> boottime to update the flash?
> I think this is indeed dramatically simpler on both the firmware side as
> the OS side.
> I suppose this only works when there is a boot disk, but then again servers
> tend to have a BMC which takes care of firmware updates anyway.
> So this seems like a good trade-off.

I don't know how UEFI models network boot. But assuming that it's
also something like a "mounted" FS, it might work too?

If not doing EFI, one could ofc. define their own way to retrieve
updates.

>
> Not sure about exact considerations which went into the decision other than
>> on-disk capsules already working in EDK2, but use of in-RAM capsules looks
>> like a cleaner design to me:
>>  - no file-system writes by an OS

I don't think this is bad? Considering more than Linux, I think
it's actually better than having to implement things inside the
kernel.

>>  - no file-system writes by firmware to remove a processed capsule (not
>>    sure I want to trust EDK2 drivers doing that)
>>  - the capsule can be verified at the moment it's offered to the
>>    firmware, not in the middle of a boot
>
> - File system writes are way simpler than supporting an UEFI runtime
> service.
> - Does the firmware need to remove the capsule? Can't fwupd do that once it
> detects a successful update? What does the spec say about this?

It says the firmware should remove the file, however then states
that it may silently fail doing so :) I would also prefer to not
let the firmware write to file systems.

Nico

_______________________________________________
coreboot mailing list -- coreboot@coreboot.org
To unsubscribe send an email to coreboot-le...@coreboot.org

Reply via email to