[PATCH 1/2] schemas: Add firmware node schema

Simon Glass sjg at chromium.org
Fri Jul 14 19:57:08 CEST 2023


Hi Rob,

On Fri, 14 Jul 2023 at 10:58, Rob Herring <robh at kernel.org> wrote:
>
> On Tue, Jul 11, 2023 at 3:18 PM Simon Glass <sjg at chromium.org> wrote:
> >
> > Add a motivation and purpose for this new proposed node.
> >
> > Signed-off-by: Simon Glass <sjg at chromium.org>
> > ---
> >
> >  dtschema/schemas/firmware.yaml | 83 ++++++++++++++++++++++++++++++++++
> >  1 file changed, 83 insertions(+)
> >  create mode 100644 dtschema/schemas/firmware.yaml
> >
> > diff --git a/dtschema/schemas/firmware.yaml b/dtschema/schemas/firmware.yaml
> > new file mode 100644
> > index 0000000..4439a70
> > --- /dev/null
> > +++ b/dtschema/schemas/firmware.yaml
> > @@ -0,0 +1,83 @@
> > +# SPDX-License-Identifier: GPL-2.0-only OR BSD-2-clause
> > +# Copyright 2023 Google LLC
> > +#
> > +
> > +%YAML 1.2
> > +---
> > +$id: http://devicetree.org/schemas/firmware.yaml#
> > +$schema: http://devicetree.org/meta-schemas/core.yaml#
> > +
> > +title: /firmware Node
> > +
> > +maintainers:
> > +  - Simon Glass <sjg at chromium.org>
> > +
> > +description: |
> > +  The '/firmware' node does not represent a real device, but serves as a place
> > +  for recording information about the main firmware used on the device, such as
> > +  a map of its contents. This is used by the Operating System (OS), user space
> > +  programs and possibly other firmware components. Data in the '/firmware' node
> > +  does not itself represent the hardware.
> > +
> > +  Properties in this node should be common to (and used by) at least two
> > +  firmware projects, such as U-Boot and TF-A. Project-specific subnodes can be
> > +  used for properties which are specific to a single project.
> > +
> > +  Purpose of '/firmware' node
> > +  ---------------------------
> > +
> > +  Firmware has traditionally been fairly opaque to the OS, with the OS taking
> > +  no interest in its contents, version, layout or how it might be updated. This
> > +  is less than ideal, since firmware is an important part of the system and
> > +  visibility into its operation is every bit as important as visbility into the
> > +  OS and user-space programs within the system.
> > +
> > +  The traditional approach has been to let firmware deal with firmware, and the
> > +  OS deal with everything else. Updating firmware has been handled by firmware.
> > +  For example, the UEFI spec defines a way for the OS to post a 'capsule' which
> > +  is discovered next time the system boots, permitting firmware updates. But
> > +  firmware updates in firmware are highly problematic. They require a reboot
> > +  and a sometimes-lengthy wait with a strange-looking interface unfamiliar
> > +  to most users. It seems better to make the update as transparent as possible
> > +  to the user. As an example of that, ChromeOS has full knowledge of the
> > +  firmware version and layout, updates it in the background from user space and
> > +  instantly selects the new firmware when the user reboots or logs out.
>
> Perhaps if OS based firmware updates are useful, then UEFI should gain
> that capability rather than inventing some way to do it with DT. Seems
> like a worthy goal, just needs wider review IMO.

Perhaps it should, although it would involve changing the spec, etc.
In any case it would be a very strange world if we mandated UEFI
everywhere.

Yes I am looking for wider review, partly since the work to document
all the firmware-image complexity is happening mostly in U-Boot at
present.

>
> > +  A common objection to considering the system holistically is that some parts
> > +  of the system are inaccessible to the OS, such as a secure enclave. However
> > +  this does not preclude providing visibility into what is present in that
> > +  enclave. Firmware-version information is still useful. Firmware updates are
> > +  still needed and can still be initiated from user space.
> > +
> > +  Another objection is that firmware should provide an interface to the OS,
> > +  while keeping its structure private. This thinking is largely driven by
> > +  extrapolating from how firmware has been handled in the 'BIOS' days.
>
> It's also the case that the OS may not have direct access to the h/w needed.

I tried to cover that in the paragraph you quote immediately
above...what is missing?

>
> > +  It should be considered a degenerate case rather than the norm. As complexity
> > +  increases, it creates an artificial boundary between two pieces of the whole.
> > +  Mechanisms then need to be invented to cross this unnecessary chasm. An
> > +  example of this is Intel's Dynamic Platform and Thermal Framework (DPTF),
> > +  which consists of user-space, OS and firmware components all working towards
> > +  a shared goal. We need a standard description of these cross-system pieces.
> > +
> > +  In order to 'teach the OS about firmware', we need a place to put this
> > +  information. That is the purpose of this node.
> > +
> > +  In an Open Source world the entire model of firmware needs to adjust to be
> > +  more open, more visible and managed just like any other part of the system.
> > +  The major goal is to standardise how firmware is presented to the OS and user
> > +  space, so that common utilities can be used to manage the entire system,
> > +  including the firmware. For example, fwupd can look in this node for
> > +  information on how to update the firmware, similar to how VBE works. [1]
> > +  It is likely that other purposes will come to light over time.
>
> It's good we're documenting /firmware, but your use seems different to
> what's already in place. Generally, /firmware has been for providers
> which are implemented by firmware and are not on any bus. SCMI for
> example. PSCI is another example, but it predated using /firmware so
> it's typically just put at the top level (and also PSCI should have
> been made discoverable like any SMCCC interface).

The intent here is that the node is not on any bus.

I'm happy to create a new node if that is better.

>
> > +
> > +  [1] https://github.com/fwupd/fwupd/tree/main/plugins/vbe
> > +
> > +properties:
> > +  $nodename:
> > +    const: firmware
> > +
> > +  "#address-cells": true
> > +  "#size-cells": true
>
> What address space is this? It's not memory mapped because you don't
> have 'ranges'.

Probably this should be 'false' ? I suppose there may be an address
space, for example in memory-mapped SPI flash, but that is not very
common. The firmware could be stored in eMMC or UFS, which are not
memory-mapped.

Regards,
Simon


More information about the U-Boot mailing list