Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S965461AbbD0Wfl (ORCPT ); Mon, 27 Apr 2015 18:35:41 -0400 Received: from bedivere.hansenpartnership.com ([66.63.167.143]:58957 "EHLO bedivere.hansenpartnership.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S965143AbbD0Wfi (ORCPT ); Mon, 27 Apr 2015 18:35:38 -0400 Message-ID: <1430174136.2314.49.camel@HansenPartnership.com> Subject: Re: [PATCH v4 2/2] efi: an sysfs interface for user to update efi firmware From: James Bottomley To: Andy Lutomirski Cc: "Kweh, Hock Leong" , Peter Jones , Greg Kroah-Hartman , Matt Fleming , Ming Lei , "Ong, Boon Leong" , LKML , "linux-efi@vger.kernel.org" , Sam Protsenko , Roy Franz , Borislav Petkov , Al Viro , Linux FS Devel Date: Mon, 27 Apr 2015 15:35:36 -0700 In-Reply-To: References: <20150415131906.GC21491@kroah.com> <20150417134924.GB19794@kroah.com> <20150417143640.GB3671@codeblueprint.co.uk> <20150420144323.GA7261@kroah.com> <20150421075620.GA11000@kroah.com> <1429665679.2207.44.camel@HansenPartnership.com> <20150422132734.GB12062@redhat.com> <1429715913.2195.22.camel@HansenPartnership.com> <1429798187.2170.3.camel@HansenPartnership.com> <1429888575.2182.20.camel@HansenPartnership.com> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.12.11 Mime-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 4041 Lines: 89 On Mon, 2015-04-27 at 14:59 -0700, Andy Lutomirski wrote: > On Fri, Apr 24, 2015 at 8:16 AM, James Bottomley > wrote: > > On Fri, 2015-04-24 at 02:14 +0000, Kweh, Hock Leong wrote: > >> > -----Original Message----- > >> > From: James Bottomley [mailto:James.Bottomley@HansenPartnership.com] > >> > Sent: Thursday, April 23, 2015 10:10 PM > >> > > >> > On Thu, 2015-04-23 at 08:30 +0000, Kweh, Hock Leong wrote: > >> > > > -----Original Message----- > >> > > > From: James Bottomley > >> > [mailto:James.Bottomley@HansenPartnership.com] > >> > > > Sent: Wednesday, April 22, 2015 11:19 PM > >> > > > > >> > > > > >> > > > Yes, I think we've all agreed we can do it ... it's now a question of whether > >> > we > >> > > > can stomach the ick factor of actually initiating a transaction in close ... I'm > >> > still > >> > > > feeling queasy. > >> > > > >> > > The file "close" here can I understand that the file system will call the > >> > "release" > >> > > function at the file_operations struct? > >> > > http://lxr.free-electrons.com/source/include/linux/fs.h#L1538 > >> > > > >> > > So, James you are meaning that we could initiating the update transaction > >> > > inside the f_ops->release() and return the error code if update failed in this > >> > > function? > >> > > >> > Well, that's what I was thinking. However the return value of ->release > >> > doesn't get propagated in sys_close (or indeed anywhere ... no idea why > >> > it returns an int) thanks to the task work additions, so we'd actually > >> > have to use the operation whose value is propagated in sys_close() which > >> > turns out to be flush. > >> > > >> > James > >> > > >> > >> Okay, I think I got you. Just to double check for in case: you are meaning > >> to implement it at f_ops->flush() instead of f_ops->release(). > > > > Well, what I'm saying is that the only way to propagate an error to > > close is by returning one from the flush file_operation. > > > > Let's cc fsdevel to see if they have any brighter ideas. > > > > The problem is we need to update firmware (several megabytes of it) via > > standard system tools. We're thinking cat to a device. The problem is > > that we need an error code back once the update goes through (which it > > can't until we've fed all the firmware data into the system). To use > > standard unix tools, we have to trigger off the standard system calls > > cat uses and since write() will happen in chunks, the only way to commit > > the transaction is in close(). > > > > We initially through of initiating the transaction in f_ops->release and > > returning the error code there, but that doesn't work because its value > > isn't actually propagated, so we're now thinking of initiating the > > transaction in f_ops->flush instead (this is a device, not a file, so it > > won't get any other flushers). Are there any other ways for us to > > propagate error on close? > > > > I think we may end up wanting to support both UpdateCapsule and > QueryCapsuleCapabilities, in which case this gets awkward. Maybe we > really should do a misc device + ioctl. To be honest, I hate ioctls ... especially the "have to use special tools" part. Would we ever want to support QueryCapsuleUpdate()? The return codes on error are the same as UpdateCapsule() but the query call does nothing on success (and the update call updates, obviously), so it seems a bit pointless if someone's gone to the trouble of getting a capsule ... they obviously want to apply it rather than know if it could be applied. Assuming we do, we could just use the same error on close mechanism, but use sysfs binary attributes ... or probably something new like a binary transaction attribute that does all the transaction on close magic for us. James -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/