/openbmc/openbmc/poky/meta/recipes-kernel/linux-firmware/ |
H A D | linux-firmware_20241210.bb | 1 SUMMARY = "Firmware files for use with Linux kernel" 3 DESCRIPTION = "Linux firmware is a package distributed alongside the Linux kernel \ 4 that contains firmware binary blobs necessary for partial or full functionality \ 9 Firmware-Abilis \ 10 & Firmware-adsp_sst \ 11 & Firmware-agere \ 12 & Firmware-amdgpu \ 13 & Firmware-amd-ucode \ 14 & Firmware-amlogic_vdec \ 15 & Firmware-amphion_vpu \ [all …]
|
/openbmc/linux/Documentation/ABI/stable/ |
H A D | sysfs-driver-firmware-zynqmp | 1 What: /sys/devices/platform/firmware\:zynqmp-firmware/ggs* 17 # cat /sys/devices/platform/firmware\:zynqmp-firmware/ggs0 18 # echo <value> > /sys/devices/platform/firmware\:zynqmp-firmware/ggs0 22 # cat /sys/devices/platform/firmware\:zynqmp-firmware/ggs0 23 # echo 0x1234ABCD > /sys/devices/platform/firmware\:zynqmp-firmware/ggs0 27 What: /sys/devices/platform/firmware\:zynqmp-firmware/pggs* 46 # cat /sys/devices/platform/firmware\:zynqmp-firmware/pggs0 47 # echo <value> > /sys/devices/platform/firmware\:zynqmp-firmware/pggs0 51 # cat /sys/devices/platform/firmware\:zynqmp-firmware/pggs0 52 # echo 0x1234ABCD > /sys/devices/platform/firmware\:zynqmp-firmware/pggs0 [all …]
|
/openbmc/linux/drivers/base/firmware_loader/ |
H A D | Kconfig | 2 menu "Firmware loader" 5 tristate "Firmware loading facility" if EXPERT 10 This enables the firmware loading facility in the kernel. The kernel 11 will first look for built-in firmware, if it has any. Next, it will 12 look for the requested firmware in a series of filesystem paths: 15 o /lib/firmware/updates/UTS_RELEASE 16 o /lib/firmware/updates 17 o /lib/firmware/UTS_RELEASE 18 o /lib/firmware 22 need firmware. [all …]
|
H A D | main.c | 3 * main.c - Multi purpose firmware loading support 7 * Please see Documentation/driver-api/firmware/ for more information. 26 #include <linux/firmware.h> 44 #include "firmware.h" 48 MODULE_DESCRIPTION("Multi purpose firmware loading support"); 59 * Names of firmware images which have been cached successfully 61 * helper can trace which firmware images have been cached 166 /* Returns 1 for batching firmware requests with the same name */ 307 * ZSTD-compressed firmware support 371 * XZ-compressed firmware support [all …]
|
/openbmc/linux/drivers/gpu/drm/tegra/ |
H A D | falcon.c | 8 #include <linux/firmware.h> 52 * Use second DMA context (i.e. the one for firmware). Strictly in falcon_copy_chunk() 53 * speaking, at this point both DMA contexts point to the firmware in falcon_copy_chunk() 54 * stream ID, but this register's value will be reused by the firmware in falcon_copy_chunk() 67 const struct firmware *firmware) in falcon_copy_firmware_image() argument 69 u32 *virt = falcon->firmware.virt; in falcon_copy_firmware_image() 73 for (i = 0; i < firmware->size / sizeof(u32); i++) in falcon_copy_firmware_image() 74 virt[i] = le32_to_cpu(((__le32 *)firmware->data)[i]); in falcon_copy_firmware_image() 79 struct falcon_fw_bin_header_v1 *bin = (void *)falcon->firmware.virt; in falcon_parse_firmware_image() 84 dev_err(falcon->dev, "incorrect firmware magic\n"); in falcon_parse_firmware_image() [all …]
|
/openbmc/linux/Documentation/driver-api/nvdimm/ |
H A D | firmware-activate.rst | 4 NVDIMM Runtime Firmware Activation 7 Some persistent memory devices run a firmware locally on the device / 9 and health monitoring. The process of updating that firmware typically 13 DSM specification [1], has added support for activating firmware at 17 to advertise and control their local runtime firmware activation 20 The libnvdimm bus object, ndbusX, implements an ndbusX/firmware/activate 21 attribute that shows the state of the firmware activation as one of 'idle', 25 No devices are set / armed to activate firmware 37 activation. In that scenario the potential for firmware activation to 40 The 'ndbusX/firmware/activate' property can be written with a value of [all …]
|
/openbmc/linux/Documentation/driver-api/firmware/ |
H A D | firmware_cache.rst | 2 Firmware cache 5 When Linux resumes from suspend some device drivers require firmware lookups to 7 firmware lookups are not possible, during this short period of time firmware 9 the root filesystem for firmware delays user experience with device 10 functionality. In order to support these requirements the firmware 11 infrastructure implements a firmware cache for device drivers for most API 14 The firmware cache makes using certain firmware API calls safe during a device 16 the firmware by themselves for dealing with firmware loss during system resume. 18 The firmware cache works by requesting for firmware prior to suspend and 19 caching it in memory. Upon resume device drivers using the firmware API will [all …]
|
H A D | fallback-mechanisms.rst | 6 filesystem lookup on the root filesystem or when the firmware simply cannot be 8 configuration options related to supporting the firmware fallback mechanism are: 10 * CONFIG_FW_LOADER_USER_HELPER: enables building the firmware fallback 15 enable the kobject uevent fallback mechanism on all firmware API calls 21 manually load the firmware. Read below for more details. 31 Justifying the firmware fallback mechanism 40 * Races upon resume from suspend. This is resolved by the firmware cache, but 41 the firmware cache is only supported if you use uevents, and its not 44 * Firmware is not accessible through typical means: 47 * The firmware provides very unique device specific data tailored for [all …]
|
H A D | firmware-usage-guidelines.rst | 2 Firmware Guidelines 6 firmware files to keep their hardware working. At the same time updated 7 firmware files must not cause any regressions for users of older kernel 10 Drivers that use firmware from linux-firmware should follow the rules in 11 this guide. (Where there is limited control of the firmware, 15 * Firmware files shall be designed in a way that it allows checking for 16 firmware ABI version changes. It is recommended that firmware files be 18 the firmware files in linux-firmware be named with some device 19 specific name, and just the major version. The firmware version should 20 be stored in the firmware header, or as an exception, as part of the [all …]
|
H A D | built-in-fw.rst | 2 Built-in firmware 5 Firmware can be built-in to the kernel, this means building the firmware 6 into vmlinux directly, to enable avoiding having to look for firmware from 7 the filesystem. Instead, firmware can be looked for inside the kernel 8 directly. You can enable built-in firmware using the kernel configuration 14 There are a few reasons why you might want to consider building your firmware 18 * Firmware is needed for accessing the boot device, and the user doesn't 19 want to stuff the firmware into the boot initramfs. 22 able to make use of built-in firmware: 24 * Legalese - firmware is non-GPL compatible [all …]
|
/openbmc/openbmc/meta-raspberrypi/recipes-kernel/linux-firmware-rpidistro/ |
H A D | linux-firmware-rpidistro_git.bb | 1 SUMMARY = "Linux kernel firmware files from Raspbian distribution" 2 DESCRIPTION = "Updated firmware files for RaspberryPi hardware. \ 4 to linux-firmware for general use." 5 HOMEPAGE = "https://github.com/RPi-Distro/firmware-nonfree" 18 SRC_URI = "git://github.com/RPi-Distro/firmware-nonfree;branch=bookworm;protocol=https \ 19 file://0001-Default-43455-firmware-to-standard-variant.patch \ 31 install -d ${D}${nonarch_base_libdir}/firmware/brcm ${D}${nonarch_base_libdir}/firmware/cypress 33 cp debian/copyright ${D}${nonarch_base_libdir}/firmware/copyright.firmware-nonfree-rpidistro 42 …eserve=mode,links -v debian/config/brcm80211/brcm/${fw}.* ${D}${nonarch_base_libdir}/firmware/brcm/ 45 …eserve=mode,links -v debian/config/brcm80211/cypress/* ${D}${nonarch_base_libdir}/firmware/cypress/ [all …]
|
/openbmc/linux/Documentation/ABI/testing/ |
H A D | sysfs-class-firmware | 1 What: /sys/class/firmware/.../data 5 Description: The data sysfs file is used for firmware-fallback and for 6 firmware uploads. Cat a firmware image to this sysfs file 7 after you echo 1 to the loading sysfs file. When the firmware 9 sequence will signal the completion of the firmware write and 10 signal the lower-level driver that the firmware data is 13 What: /sys/class/firmware/.../cancel 17 Description: Write-only. For firmware uploads, write a "1" to this file to 18 request that the transfer of firmware data to the lower-level 21 progress) or (ENODEV) if there is no firmware update in progress. [all …]
|
H A D | sysfs-firmware-efi-esrt | 1 What: /sys/firmware/efi/esrt/ 5 (ESRT), a catalog of firmware for which can be updated with 10 What: /sys/firmware/efi/esrt/fw_resource_count 15 What: /sys/firmware/efi/esrt/fw_resource_count_max 20 really only useful to the system firmware itself. 22 What: /sys/firmware/efi/esrt/fw_resource_version 25 Description: The version of the ESRT structure provided by the firmware. 27 What: /sys/firmware/efi/esrt/entries/entry<N>/ 32 example: /sys/firmware/efi/esrt/entries/entry0/ 34 What: /sys/firmware/efi/esrt/entries/entry<N>/fw_type [all …]
|
/openbmc/openbmc/meta-raspberrypi/recipes-kernel/bluez-firmware-rpidistro/ |
H A D | bluez-firmware-rpidistro_git.bb | 1 SUMMARY = "Linux kernel Bluetooth firmware files from Raspbian distribution" 2 DESCRIPTION = "Updated Bluetooth firmware files for RaspberryPi hardware. \ 4 to linux-firmware for general use." 5 HOMEPAGE = "https://github.com/RPi-Distro/bluez-firmware" 10 # changed in linux-firmware. 14 # conflicts with linux-firmware. 16 # [^1]: https://github.com/RPi-Distro/bluez-firmware/issues/1 17 LICENSE = "Firmware-cypress-rpidistro" 24 NO_GENERIC_LICENSE[Firmware-cypress-rpidistro] = "LICENCE.cypress-rpidistro" 27 git://github.com/RPi-Distro/bluez-firmware;branch=bookworm;protocol=https \ [all …]
|
/openbmc/phosphor-webui/app/common/directives/ |
H A D | firmware-list.html | 4 <p class="inline firmware__active-version">Functional firmware version: {{version}}</p> 24 …iv class="table__row" ng-class="firmware.activationStatus == 'Functional' ? 'firmware__primary' : … 28 …ng-click="!$first && changePriority(firmware.imageId, firmware.Version, firmware.Priority, imageLi… 29 … ng-show="firmware.activationStatus == 'Functional' || firmware.activationStatus == 'Active'"> 30 <span class="accessible-text">firmware up in priority</span></div> 32 …List[$index + 1].activationStatus)) && changePriority(firmware.imageId, firmware.Version, firmware… 33 … ng-show="firmware.activationStatus == 'Functional' || firmware.activationStatus == 'Active'"> 34 <span class="accessible-text">firmware down in priority</span></div> 38 <span>{{firmware.activationStatus}}</span> 40 <div class="table__cell firmware__version" ng-class="{'active':firmware.isExtended}"> [all …]
|
/openbmc/linux/drivers/net/wireless/marvell/libertas/ |
H A D | firmware.c | 3 * Firmware loading and handling functions. 7 #include <linux/firmware.h> 16 const struct firmware *helper, const struct firmware *mainfw) in lbs_fw_loaded() 20 lbs_deb_fw("firmware load complete, code %d\n", ret); in lbs_fw_loaded() 32 void (*cb)(const struct firmware *fw, void *context)) in do_load_firmware() 45 static void main_firmware_cb(const struct firmware *firmware, void *context) in main_firmware_cb() argument 49 if (!firmware) { in main_firmware_cb() 50 /* Failed to find firmware: try next table entry */ in main_firmware_cb() 55 /* Firmware found! */ in main_firmware_cb() 56 lbs_fw_loaded(priv, 0, priv->helper_fw, firmware); in main_firmware_cb() [all …]
|
/openbmc/openbmc-test-automation/redfish/update_service/ |
H A D | test_firmware_inventory.robot | 60 [Documentation] Get firmware inventory entries and do health check status. 108 … Run Keyword If '${entry}' == '${actual_count}' Fail BMC version not there in Firmware Inventory 150 [Documentation] Verify the redfish firmware inventory path is updateable. 190 Verify Redfish Software Image And Firmware Inventory Are Same 191 [Documentation] Verify the firmware software inventory is same as software images of managers. 213 Check If Firmware Image Is Same In Firmware Inventory And Redfish Read Operation 214 [Documentation] Check the Redfish firmware inventory path is same as in 215 ... active software image of Redfish managers and firmware inventory of update service. 218 Verify Active Software Image And Firmware Inventory Is Same 221 Check If Backup Firmware Image Is Same In Firmware Inventory And Redfish Read Operation [all …]
|
/openbmc/qemu/docs/interop/ |
H A D | firmware.json | 14 # = Firmware 25 # Lists the firmware-OS interface types provided by various firmware 28 # @bios: Traditional x86 BIOS interface. For example, firmware built 32 # 1275-1994 standard. Examples for firmware projects that 35 # @uboot: Firmware interface defined by the U-Boot project. 37 # @uefi: Firmware interface defined by the UEFI specification. For 38 # example, firmware built from the edk2 (EFI Development Kit II) 49 # Defines the device types that firmware can be mapped into. 51 # @flash: The firmware executable and its accompanying NVRAM file are to 54 # @kernel: The firmware is to be loaded like a Linux kernel. This is [all …]
|
/openbmc/linux/drivers/base/firmware_loader/builtin/ |
H A D | main.c | 2 /* Builtin firmware support */ 4 #include <linux/firmware.h> 5 #include "../firmware.h" 19 static bool fw_copy_to_prealloc_buf(struct firmware *fw, in fw_copy_to_prealloc_buf() 31 * firmware_request_builtin() - load builtin firmware 32 * @fw: pointer to firmware struct 33 * @name: name of firmware file 38 * if the firmware was built-in and if so use it right away. This can be used 41 * This looks for the firmware in the built-in kernel. Only if the kernel was 42 * built-in with the firmware you are looking for will this return successfully. [all …]
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-kernel/broadcom-bt-firmware/ |
H A D | broadcom-bt-firmware_12.0.1.1105_p3.bb | 4 SUMMARY = "Broadcom Bluetooth firmware files" 5 DESCRIPTION = "Firmware for Broadcom Bluetooth devices. Note that in case of BT+WiFi devices, separ… 6 HOMEPAGE = "https://github.com/winterheart/broadcom-bt-firmware" 8 LICENSE = "Firmware-Broadcom-WIDCOMM" 9 NO_GENERIC_LICENSE[Firmware-Broadcom-WIDCOMM] = "LICENSE.broadcom_bcm20702" 12 SRC_URI = "git://github.com/winterheart/broadcom-bt-firmware.git;branch=master;protocol=https" 28 install -d ${D}${nonarch_base_libdir}/firmware/brcm/ 29 cp brcm/*.hcd ${D}${nonarch_base_libdir}/firmware/brcm/ 32 install -m 0644 LICENSE.broadcom_bcm20702 ${D}${nonarch_base_libdir}/firmware/brcm/ 35 install -m 0644 DEVICES.md ${D}${nonarch_base_libdir}/firmware/brcm/ [all …]
|
/openbmc/docs/designs/ |
H A D | redfish-resource-supplement-for-pfr.md | 1 # Redfish resource supplement for Platform Firmware Resilience (PFR) 11 The platform is a collection of fundamental hardware and firmware components 12 needed to boot and operate a system. The Platform Firmware Resiliency(PFR) in 14 resiliency of platform firmware and data against potentially destructive 21 represent the PFR provisioning status such as platform firmware is provisioned 27 Platform Firmware Resilience technology in NIST SP 800-93 provide common 43 - BMC shall provide the way to represent Platform Firmware Resilience 46 - Event logs should be logged to redfish for Platform Firmware Resilience. 50 Different OEM's has there own way of implementing the Platform Firmware 57 Platform Firmware Resilience. It covers only generic redfish ComputerSystem OEM [all …]
|
/openbmc/openbmc-test-automation/redfish/extended/ |
H A D | redfish_bmc_code_update.robot | 7 # Firmware update states: 50 [Documentation] Update the firmware image. 66 # Check if the existing firmware is functional. 68 ... The existing ${image_version} firmware is already functional. 70 ${sw_inv}= Get Functional Firmware BMC image 71 ${nonfunctional_sw_inv}= Get Non Functional Firmware ${sw_inv} False 76 ... Set Backup Firmware To Functional ${image_version} ${state} 78 Print Timen Performing firmware update ${image_version}. 80 Redfish Update Firmware 83 Redfish BMC Code Update Running And Backup Image With Same Firmware [all …]
|
/openbmc/linux/drivers/media/usb/as102/ |
H A D | as102_fw.c | 11 #include <linux/firmware.h> 38 * Parse INTEL HEX firmware file to extract address and data. 48 pr_err("invalid firmware file\n"); in parse_hex_line() 93 const struct firmware *firmware) { in as102_firmware_upload() argument 104 for (total_read_bytes = 0; total_read_bytes < firmware->size; ) { in as102_firmware_upload() 109 (u8 *) (firmware->data + total_read_bytes), in as102_firmware_upload() 120 if (total_read_bytes == firmware->size) { in as102_firmware_upload() 158 const struct firmware *firmware = NULL; in as102_fw_upload() local 172 /* allocate buffer to store firmware upload command and data */ in as102_fw_upload() 179 /* request kernel to locate firmware file: part1 */ in as102_fw_upload() [all …]
|
/openbmc/linux/include/linux/ |
H A D | firmware.h | 12 struct firmware { struct 16 /* firmware loader private fields */ argument 21 * enum fw_upload_err - firmware upload error codes argument 24 * @FW_UPLOAD_ERR_TIMEOUT: SW timed out on handshake with HW/firmware 27 * @FW_UPLOAD_ERR_INVALID_SIZE: invalid firmware image size 46 void *priv; /* firmware loader private fields */ 50 * struct fw_upload_ops - device specific operations to support firmware upload 82 * Built-in firmware functionality is only available if FW_LOADER=y, but not 86 bool firmware_request_builtin(struct firmware *fw, const char *name); 88 static inline bool firmware_request_builtin(struct firmware *fw, in firmware_request_builtin() [all …]
|
/openbmc/linux/Documentation/networking/device_drivers/ethernet/netronome/ |
H A D | nfp.rst | 15 - `Acquiring Firmware`_ 28 Acquiring Firmware 31 The NFP3800, NFP4000 and NFP6000 devices require application specific firmware 32 to function. Application firmware can be located either on the host file system 33 or in the device flash (if supported by management firmware). 35 Firmware files on the host filesystem contain card type (`AMDA-*` string), media 36 config etc. They should be placed in `/lib/firmware/netronome` directory to 37 load firmware from the host file system. 39 Firmware for basic NIC operation is available in the upstream 40 `linux-firmware.git` repository. [all …]
|