The link has nothing to do with the topic you're complaining about them doing, which I haven't seen any evidence of. The DDR training thing is a purely positive change.
Conversation
Replying to
I don't see what's positive about it and I'm giving it as an example of an extreme case.
1
Replying to
It's positive in that you don't have to trust/audit that the DDR training blob is not doing anything funky it shouldn't with the state of the main cpu, because it doesn't have access to it.
1
Replying to
That's not how it works. They're not avoiding running the code on the main CPU, they're avoiding having the OS in control of the firmware that's uploaded to the controller. You're misunderstanding what was changed. Issue for them is it didn't have persistent state in hardware.
2
Replying to
As I (re-)read it, they're making the M4 responsible for getting the DDR controller into an initial usable state for the main cpu to boot rather than having uboot on main cpu need to interface with DDR controller and upload proprietary firmware.
1
There is never a choice to do this nonpersistently at real os runtime because DDR needs to be up beforehand. Choice is just between uboot having to handle it or secondary cpu handle it.
1
Replying to
The choice is between being able to update it (as would be the case the normal way) or not being able to update it.
1
I'm talking in general about the approach to all of the firmware, not only this specific case. I linked this as an example of an extreme case where they are willing to go far out of the way to prevent updates. Not particularly interested in continuing a discussion going nowhere.
1
The OS can install updates for the late boot chain. OS cannot install updates for this code on the secondary processor. That's the entire reasoning behind them doing it: preventing this proprietary code from being updated at all costs. It's the approach to ALL of the firmware.
1
In many cases this can be done by flashing fuses in a way that purposely bricks the ability to install updates, and similar approaches. In this case, they had to go further out of the way to break the ability to update it. Goal is simply making the OS / user unable to update it.
1
One of my requirements for device support is that the device is still entirely supported and full security updates are available. In this case, even if the updates are available, the OEM has gone far out of the way to prevent providing them. I happen to find that ridiculous.

