Originally posted by rene
View Post
Yeah, I've heard of them. Years ago a customer paid me to repair a bunch of office PCs in a larger fleet that were bricked by automatic firmware updates and I have hardware flashing tools (i.e. things that connect directly to the SPI flash memory on the device) to do that.
I've seen some SSDs that were automatically updated and then stopped working after a reboot.
Apple laptops also sometimes fail the firmware upgrade for the T2 chip firmware (the security chip thing) so they brick themselves after they reboot until someone connects them to another Apple PC and runs a diagnostic tool to manually update the firmware again.
And if we start talking of OS-firmware like for example network routers/access points it's even worse, NEVER EVER leave updates enabled, always validate the update on some guinea pig devices before updating the whole fleet.
That's why I prefer OS-loadable firmware wherever possible. Mistakes happen. Most of your devices aren't businness grade so don't expect high quality validation teams, it's probably a couple dudes that deal with the firmware for all devices in the same product line.
With OS-loadable firmware it's much much harder to brick the device.
Also hard to believe that it is just capturing the firmware load,
You can't just extract them from the driver blob because the one in the blob is generic and is modified by the driver before loading, similar to the vBIOS thing, you can't just extract the vBIOS on flash, you must extract the one from your own running system because UEFI does modify things to create your system's actual vBIOS.
should not be rocket science to trace that on windows, a VM, or extract form other drivers,
an at least somewhat working open driver and nothing at all for big vendor like RedHat^W IBM and other such heavyweights.
Comment