From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-3.0 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_PASS,URIBL_BLOCKED,USER_AGENT_NEOMUTT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 1E552C004C9 for ; Sun, 5 May 2019 14:36:50 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id F009D2082F for ; Sun, 5 May 2019 14:36:49 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727949AbfEEOgq (ORCPT ); Sun, 5 May 2019 10:36:46 -0400 Received: from 0.ictbs.com ([203.137.112.168]:52174 "EHLO 0.ictbs.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726905AbfEEOgp (ORCPT ); Sun, 5 May 2019 10:36:45 -0400 Received: by hq.local (Postfix, from userid 1000) id 9ACDB6641B; Sun, 5 May 2019 16:36:38 +0200 (CEST) Date: Sun, 5 May 2019 16:36:38 +0200 From: Victor Bravo <1905@spmblk.com> To: Arend Van Spriel Cc: Franky Lin , Hante Meuleman , Chi-Hsien Lin , Wright Feng , Kalle Valo , "David S. Miller" , linux-wireless@vger.kernel.org, brcm80211-dev-list.pdl@broadcom.com, brcm80211-dev-list@cypress.com, linux-kernel@vger.kernel.org, Hans de Goede Subject: Re: PROBLEM: brcmfmac's DMI-based fw file names break built-in fw loader Message-ID: <20190505143638.2fxtnc4wxfdkegpj@localhost> References: <20190504162633.ldrz2nqfocg55grb@localhost> <20190504194440.4zcxjrtj2aft3ka4@localhost> <16a87149068.2764.9b12b7fc0a3841636cfb5e919b41b954@broadcom.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <16a87149068.2764.9b12b7fc0a3841636cfb5e919b41b954@broadcom.com> User-Agent: NeoMutt/20170113 (1.7.2) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, May 05, 2019 at 10:20:33AM +0200, Arend Van Spriel wrote: > On May 4, 2019 9:44:51 PM Victor Bravo <1905@spmblk.com> wrote: > > > On Sat, May 04, 2019 at 09:11:09PM +0200, Arend Van Spriel wrote: > > > + Hans, Luis > > > > > > On 5/4/2019 6:26 PM, Victor Bravo wrote: > > > > The brcmfmac driver seems to have partially fixed problems which > > > > prevented it to be used in shared system/kernel images for multiple > > > > hardware by trying to load it's .txt as > > > > ...txt first and then > > > > falling back to .txt. Real-life example: > > > > > > > > brcmfmac mmc1:0001:1: Direct firmware load for > > > brcm/brcmfmac43340-sdio.ASUSTeK COMPUTER INC.-T100HAN.txt failed > > > with > > > > error -2 > > > > brcmfmac: brcmf_fw_alloc_request: using brcm/brcmfmac43340-sdio for chip > > > > BCM43340/2 > > > > > > > > Unfortunately this doesn't really help on systems which use static > > > > kernel with firmware blobs (and also text configuration files in case of > > > > brcmfmac) built-in using CONFIG_EXTRA_FIRMWARE, as CONFIG_EXTRA_FIRMWARE > > > > doesn't support spaces in file names - kernel build fails with > > > > > > > > CONFIG_EXTRA_FIRMWARE="brcm/brcmfmac43340-sdio.bin > > > brcm/brcmfmac43340-sdio.ASUSTeK COMPUTER INC.-T100HAN.txt" > > > > > > > > for obvious reasons. So the only way here is to stay with good old > > > > brcmfmac43340-sdio.txt and support at most one brcmfmac-equipped machine > > > > per kernel image. > > > > > > > > Please consider filtering the DMI strings and replacing spaces and > > > > possibly other invalid characters with underscores, and/or adding module > > > > parameter to allow passing the string from command line (using > > > > brcmfmac.tag=t100 or brcmfmac.board=t100 to make the module load > > > > brcmfmac43340-sdio.t100.txt seems nicer to me, and isn't prone to > > > > breaking when DMI strings change on BIOS update). > > > > > > The intent of the DMI approach was to avoid end-users from passing module > > > parameters for this. As to fixing DMI string usage patches are welcome. > > > > Well I think I could also provide a patch to fix, this can be easily > > done by adding a string of allowed characters and then replacing > > unknown ones with underscores. > > > > > > My brief grep-based research also suggest that strings retrieved > > > > by dmi_get_system_info() are passed to firmware loader without any > > > > checks for special character, /../ etc. I'm not sure whether this is > > > > considered to be proper & safe use, but if it's not, it may also have > > > > some security implications, as it allows attacker with access to DMI > > > > strings (using root rights/other OS/BIOS/physical access) to mess > > > > with kernel space or secure boot. > > > > > > Hmm. Attackers with that kind of access can do bad is a gazillion ways. > > > > Agreed. It will be definitely easier to make filenames contain only safe > > characters than to discuss those ways. > > > > > > I would also really appreciate not allowing future brcm (and other) > > > > drivers to leave staging area before they fully support =y. > > > > > > Define fully support. At the time we moved into the wireless tree (almost a > > > decade ago) we did support =y. As such you could consider the DMI approach a > > > regression, but I find that a bit harsh to say. Hans made a honest attempt > > > and it is something that can be fixed. It can be you providing just that ;-) > > > > Well... I agree that the idea wasn't really complete ;). > > > > As for the patches, I also realized that the txt config file actually > > comes from EFI/BIOS, so it's quite possible that it may differ between > > BIOS versions. So I'm thinking of 3 patches here: > > > > 1) Character filtering as described above. > > > > 2) Adding bios_version next to board_type, and changing load order to > > > > ....txt > > ...txt > > .txt > > > > 3) Adding command-line parameters to override these on problems. > > > > 1) breaks backward compatibility, but the DMI code seems to be quite > > new so hopefully many people don't rely on it yet. > > > > 2) & 3) are backward compatible. > > Actually, the configuration file, or nvram file as we tend to call it, does > not come from EFI/BIOS. There are a few platforms that have the nvram file > stored in EFI and it's name is well-defined. It does assume there is only > one brcmfmac device in the system. Good to know. Sounds like working nvram file should never need update and changes related to BIOS version are not needed. I've meanwhile prepared patch for character filtering, will post in new thread w/ better subject. Regards, v.