Home
last modified time | relevance | path

Searched full:firmware (Results 1 – 25 of 4254) sorted by relevance

12345678910>>...171

/openbmc/openbmc/poky/meta/recipes-kernel/linux-firmware/
H A Dlinux-firmware_20241210.bb1 SUMMARY = "Firmware files for use with Linux kernel"
3 DESCRIPTION = "Linux firmware is a package distributed alongside the Linux kernel \
4 that contains firmware binary blobs necessary for partial or full functionality \
9 Firmware-Abilis \
10 & Firmware-adsp_sst \
11 & Firmware-agere \
12 & Firmware-amdgpu \
13 & Firmware-amd-ucode \
14 & Firmware-amlogic_vdec \
15 & Firmware-amphion_vpu \
[all …]
/openbmc/linux/Documentation/ABI/stable/
H A Dsysfs-driver-firmware-zynqmp1 What: /sys/devices/platform/firmware\:zynqmp-firmware/ggs*
17 # cat /sys/devices/platform/firmware\:zynqmp-firmware/ggs0
18 # echo <value> > /sys/devices/platform/firmware\:zynqmp-firmware/ggs0
22 # cat /sys/devices/platform/firmware\:zynqmp-firmware/ggs0
23 # echo 0x1234ABCD > /sys/devices/platform/firmware\:zynqmp-firmware/ggs0
27 What: /sys/devices/platform/firmware\:zynqmp-firmware/pggs*
46 # cat /sys/devices/platform/firmware\:zynqmp-firmware/pggs0
47 # echo <value> > /sys/devices/platform/firmware\:zynqmp-firmware/pggs0
51 # cat /sys/devices/platform/firmware\:zynqmp-firmware/pggs0
52 # echo 0x1234ABCD > /sys/devices/platform/firmware\:zynqmp-firmware/pggs0
[all …]
/openbmc/linux/drivers/base/firmware_loader/
H A DKconfig2 menu "Firmware loader"
5 tristate "Firmware loading facility" if EXPERT
10 This enables the firmware loading facility in the kernel. The kernel
11 will first look for built-in firmware, if it has any. Next, it will
12 look for the requested firmware in a series of filesystem paths:
15 o /lib/firmware/updates/UTS_RELEASE
16 o /lib/firmware/updates
17 o /lib/firmware/UTS_RELEASE
18 o /lib/firmware
22 need firmware.
[all …]
H A Dmain.c3 * main.c - Multi purpose firmware loading support
7 * Please see Documentation/driver-api/firmware/ for more information.
26 #include <linux/firmware.h>
44 #include "firmware.h"
48 MODULE_DESCRIPTION("Multi purpose firmware loading support");
59 * Names of firmware images which have been cached successfully
61 * helper can trace which firmware images have been cached
166 /* Returns 1 for batching firmware requests with the same name */
307 * ZSTD-compressed firmware support
371 * XZ-compressed firmware support
[all …]
/openbmc/linux/drivers/gpu/drm/tegra/
H A Dfalcon.c8 #include <linux/firmware.h>
52 * Use second DMA context (i.e. the one for firmware). Strictly in falcon_copy_chunk()
53 * speaking, at this point both DMA contexts point to the firmware in falcon_copy_chunk()
54 * stream ID, but this register's value will be reused by the firmware in falcon_copy_chunk()
67 const struct firmware *firmware) in falcon_copy_firmware_image() argument
69 u32 *virt = falcon->firmware.virt; in falcon_copy_firmware_image()
73 for (i = 0; i < firmware->size / sizeof(u32); i++) in falcon_copy_firmware_image()
74 virt[i] = le32_to_cpu(((__le32 *)firmware->data)[i]); in falcon_copy_firmware_image()
79 struct falcon_fw_bin_header_v1 *bin = (void *)falcon->firmware.virt; in falcon_parse_firmware_image()
84 dev_err(falcon->dev, "incorrect firmware magic\n"); in falcon_parse_firmware_image()
[all …]
/openbmc/linux/Documentation/driver-api/nvdimm/
H A Dfirmware-activate.rst4 NVDIMM Runtime Firmware Activation
7 Some persistent memory devices run a firmware locally on the device /
9 and health monitoring. The process of updating that firmware typically
13 DSM specification [1], has added support for activating firmware at
17 to advertise and control their local runtime firmware activation
20 The libnvdimm bus object, ndbusX, implements an ndbusX/firmware/activate
21 attribute that shows the state of the firmware activation as one of 'idle',
25 No devices are set / armed to activate firmware
37 activation. In that scenario the potential for firmware activation to
40 The 'ndbusX/firmware/activate' property can be written with a value of
[all …]
/openbmc/linux/Documentation/driver-api/firmware/
H A Dfirmware_cache.rst2 Firmware cache
5 When Linux resumes from suspend some device drivers require firmware lookups to
7 firmware lookups are not possible, during this short period of time firmware
9 the root filesystem for firmware delays user experience with device
10 functionality. In order to support these requirements the firmware
11 infrastructure implements a firmware cache for device drivers for most API
14 The firmware cache makes using certain firmware API calls safe during a device
16 the firmware by themselves for dealing with firmware loss during system resume.
18 The firmware cache works by requesting for firmware prior to suspend and
19 caching it in memory. Upon resume device drivers using the firmware API will
[all …]
H A Dfallback-mechanisms.rst6 filesystem lookup on the root filesystem or when the firmware simply cannot be
8 configuration options related to supporting the firmware fallback mechanism are:
10 * CONFIG_FW_LOADER_USER_HELPER: enables building the firmware fallback
15 enable the kobject uevent fallback mechanism on all firmware API calls
21 manually load the firmware. Read below for more details.
31 Justifying the firmware fallback mechanism
40 * Races upon resume from suspend. This is resolved by the firmware cache, but
41 the firmware cache is only supported if you use uevents, and its not
44 * Firmware is not accessible through typical means:
47 * The firmware provides very unique device specific data tailored for
[all …]
H A Dfirmware-usage-guidelines.rst2 Firmware Guidelines
6 firmware files to keep their hardware working. At the same time updated
7 firmware files must not cause any regressions for users of older kernel
10 Drivers that use firmware from linux-firmware should follow the rules in
11 this guide. (Where there is limited control of the firmware,
15 * Firmware files shall be designed in a way that it allows checking for
16 firmware ABI version changes. It is recommended that firmware files be
18 the firmware files in linux-firmware be named with some device
19 specific name, and just the major version. The firmware version should
20 be stored in the firmware header, or as an exception, as part of the
[all …]
H A Dbuilt-in-fw.rst2 Built-in firmware
5 Firmware can be built-in to the kernel, this means building the firmware
6 into vmlinux directly, to enable avoiding having to look for firmware from
7 the filesystem. Instead, firmware can be looked for inside the kernel
8 directly. You can enable built-in firmware using the kernel configuration
14 There are a few reasons why you might want to consider building your firmware
18 * Firmware is needed for accessing the boot device, and the user doesn't
19 want to stuff the firmware into the boot initramfs.
22 able to make use of built-in firmware:
24 * Legalese - firmware is non-GPL compatible
[all …]
/openbmc/openbmc/meta-raspberrypi/recipes-kernel/linux-firmware-rpidistro/
H A Dlinux-firmware-rpidistro_git.bb1 SUMMARY = "Linux kernel firmware files from Raspbian distribution"
2 DESCRIPTION = "Updated firmware files for RaspberryPi hardware. \
4 to linux-firmware for general use."
5 HOMEPAGE = "https://github.com/RPi-Distro/firmware-nonfree"
18 SRC_URI = "git://github.com/RPi-Distro/firmware-nonfree;branch=bookworm;protocol=https \
19 file://0001-Default-43455-firmware-to-standard-variant.patch \
31 install -d ${D}${nonarch_base_libdir}/firmware/brcm ${D}${nonarch_base_libdir}/firmware/cypress
33 cp debian/copyright ${D}${nonarch_base_libdir}/firmware/copyright.firmware-nonfree-rpidistro
42 …eserve=mode,links -v debian/config/brcm80211/brcm/${fw}.* ${D}${nonarch_base_libdir}/firmware/brcm/
45 …eserve=mode,links -v debian/config/brcm80211/cypress/* ${D}${nonarch_base_libdir}/firmware/cypress/
[all …]
/openbmc/linux/Documentation/ABI/testing/
H A Dsysfs-class-firmware1 What: /sys/class/firmware/.../data
5 Description: The data sysfs file is used for firmware-fallback and for
6 firmware uploads. Cat a firmware image to this sysfs file
7 after you echo 1 to the loading sysfs file. When the firmware
9 sequence will signal the completion of the firmware write and
10 signal the lower-level driver that the firmware data is
13 What: /sys/class/firmware/.../cancel
17 Description: Write-only. For firmware uploads, write a "1" to this file to
18 request that the transfer of firmware data to the lower-level
21 progress) or (ENODEV) if there is no firmware update in progress.
[all …]
H A Dsysfs-firmware-efi-esrt1 What: /sys/firmware/efi/esrt/
5 (ESRT), a catalog of firmware for which can be updated with
10 What: /sys/firmware/efi/esrt/fw_resource_count
15 What: /sys/firmware/efi/esrt/fw_resource_count_max
20 really only useful to the system firmware itself.
22 What: /sys/firmware/efi/esrt/fw_resource_version
25 Description: The version of the ESRT structure provided by the firmware.
27 What: /sys/firmware/efi/esrt/entries/entry<N>/
32 example: /sys/firmware/efi/esrt/entries/entry0/
34 What: /sys/firmware/efi/esrt/entries/entry<N>/fw_type
[all …]
/openbmc/openbmc/meta-raspberrypi/recipes-kernel/bluez-firmware-rpidistro/
H A Dbluez-firmware-rpidistro_git.bb1 SUMMARY = "Linux kernel Bluetooth firmware files from Raspbian distribution"
2 DESCRIPTION = "Updated Bluetooth firmware files for RaspberryPi hardware. \
4 to linux-firmware for general use."
5 HOMEPAGE = "https://github.com/RPi-Distro/bluez-firmware"
10 # changed in linux-firmware.
14 # conflicts with linux-firmware.
16 # [^1]: https://github.com/RPi-Distro/bluez-firmware/issues/1
17 LICENSE = "Firmware-cypress-rpidistro"
24 NO_GENERIC_LICENSE[Firmware-cypress-rpidistro] = "LICENCE.cypress-rpidistro"
27 git://github.com/RPi-Distro/bluez-firmware;branch=bookworm;protocol=https \
[all …]
/openbmc/phosphor-webui/app/common/directives/
H A Dfirmware-list.html4 <p class="inline firmware__active-version">Functional firmware version: {{version}}</p>
24 …iv class="table__row" ng-class="firmware.activationStatus == 'Functional' ? 'firmware__primary' : …
28 …ng-click="!$first && changePriority(firmware.imageId, firmware.Version, firmware.Priority, imageLi…
29 … ng-show="firmware.activationStatus == 'Functional' || firmware.activationStatus == 'Active'">
30 <span class="accessible-text">firmware up in priority</span></div>
32 …List[$index + 1].activationStatus)) && changePriority(firmware.imageId, firmware.Version, firmware
33 … ng-show="firmware.activationStatus == 'Functional' || firmware.activationStatus == 'Active'">
34 <span class="accessible-text">firmware down in priority</span></div>
38 <span>{{firmware.activationStatus}}</span>
40 <div class="table__cell firmware__version" ng-class="{'active':firmware.isExtended}">
[all …]
/openbmc/linux/drivers/net/wireless/marvell/libertas/
H A Dfirmware.c3 * Firmware loading and handling functions.
7 #include <linux/firmware.h>
16 const struct firmware *helper, const struct firmware *mainfw) in lbs_fw_loaded()
20 lbs_deb_fw("firmware load complete, code %d\n", ret); in lbs_fw_loaded()
32 void (*cb)(const struct firmware *fw, void *context)) in do_load_firmware()
45 static void main_firmware_cb(const struct firmware *firmware, void *context) in main_firmware_cb() argument
49 if (!firmware) { in main_firmware_cb()
50 /* Failed to find firmware: try next table entry */ in main_firmware_cb()
55 /* Firmware found! */ in main_firmware_cb()
56 lbs_fw_loaded(priv, 0, priv->helper_fw, firmware); in main_firmware_cb()
[all …]
/openbmc/openbmc-test-automation/redfish/update_service/
H A Dtest_firmware_inventory.robot60 [Documentation] Get firmware inventory entries and do health check status.
108 … Run Keyword If '${entry}' == '${actual_count}' Fail BMC version not there in Firmware Inventory
150 [Documentation] Verify the redfish firmware inventory path is updateable.
190 Verify Redfish Software Image And Firmware Inventory Are Same
191 [Documentation] Verify the firmware software inventory is same as software images of managers.
213 Check If Firmware Image Is Same In Firmware Inventory And Redfish Read Operation
214 [Documentation] Check the Redfish firmware inventory path is same as in
215 ... active software image of Redfish managers and firmware inventory of update service.
218 Verify Active Software Image And Firmware Inventory Is Same
221 Check If Backup Firmware Image Is Same In Firmware Inventory And Redfish Read Operation
[all …]
/openbmc/qemu/docs/interop/
H A Dfirmware.json14 # = Firmware
25 # Lists the firmware-OS interface types provided by various firmware
28 # @bios: Traditional x86 BIOS interface. For example, firmware built
32 # 1275-1994 standard. Examples for firmware projects that
35 # @uboot: Firmware interface defined by the U-Boot project.
37 # @uefi: Firmware interface defined by the UEFI specification. For
38 # example, firmware built from the edk2 (EFI Development Kit II)
49 # Defines the device types that firmware can be mapped into.
51 # @flash: The firmware executable and its accompanying NVRAM file are to
54 # @kernel: The firmware is to be loaded like a Linux kernel. This is
[all …]
/openbmc/linux/drivers/base/firmware_loader/builtin/
H A Dmain.c2 /* Builtin firmware support */
4 #include <linux/firmware.h>
5 #include "../firmware.h"
19 static bool fw_copy_to_prealloc_buf(struct firmware *fw, in fw_copy_to_prealloc_buf()
31 * firmware_request_builtin() - load builtin firmware
32 * @fw: pointer to firmware struct
33 * @name: name of firmware file
38 * if the firmware was built-in and if so use it right away. This can be used
41 * This looks for the firmware in the built-in kernel. Only if the kernel was
42 * built-in with the firmware you are looking for will this return successfully.
[all …]
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-kernel/broadcom-bt-firmware/
H A Dbroadcom-bt-firmware_12.0.1.1105_p3.bb4 SUMMARY = "Broadcom Bluetooth firmware files"
5 DESCRIPTION = "Firmware for Broadcom Bluetooth devices. Note that in case of BT+WiFi devices, separ…
6 HOMEPAGE = "https://github.com/winterheart/broadcom-bt-firmware"
8 LICENSE = "Firmware-Broadcom-WIDCOMM"
9 NO_GENERIC_LICENSE[Firmware-Broadcom-WIDCOMM] = "LICENSE.broadcom_bcm20702"
12 SRC_URI = "git://github.com/winterheart/broadcom-bt-firmware.git;branch=master;protocol=https"
28 install -d ${D}${nonarch_base_libdir}/firmware/brcm/
29 cp brcm/*.hcd ${D}${nonarch_base_libdir}/firmware/brcm/
32 install -m 0644 LICENSE.broadcom_bcm20702 ${D}${nonarch_base_libdir}/firmware/brcm/
35 install -m 0644 DEVICES.md ${D}${nonarch_base_libdir}/firmware/brcm/
[all …]
/openbmc/docs/designs/
H A Dredfish-resource-supplement-for-pfr.md1 # Redfish resource supplement for Platform Firmware Resilience (PFR)
11 The platform is a collection of fundamental hardware and firmware components
12 needed to boot and operate a system. The Platform Firmware Resiliency(PFR) in
14 resiliency of platform firmware and data against potentially destructive
21 represent the PFR provisioning status such as platform firmware is provisioned
27 Platform Firmware Resilience technology in NIST SP 800-93 provide common
43 - BMC shall provide the way to represent Platform Firmware Resilience
46 - Event logs should be logged to redfish for Platform Firmware Resilience.
50 Different OEM's has there own way of implementing the Platform Firmware
57 Platform Firmware Resilience. It covers only generic redfish ComputerSystem OEM
[all …]
/openbmc/openbmc-test-automation/redfish/extended/
H A Dredfish_bmc_code_update.robot7 # Firmware update states:
50 [Documentation] Update the firmware image.
66 # Check if the existing firmware is functional.
68 ... The existing ${image_version} firmware is already functional.
70 ${sw_inv}= Get Functional Firmware BMC image
71 ${nonfunctional_sw_inv}= Get Non Functional Firmware ${sw_inv} False
76 ... Set Backup Firmware To Functional ${image_version} ${state}
78 Print Timen Performing firmware update ${image_version}.
80 Redfish Update Firmware
83 Redfish BMC Code Update Running And Backup Image With Same Firmware
[all …]
/openbmc/linux/drivers/media/usb/as102/
H A Das102_fw.c11 #include <linux/firmware.h>
38 * Parse INTEL HEX firmware file to extract address and data.
48 pr_err("invalid firmware file\n"); in parse_hex_line()
93 const struct firmware *firmware) { in as102_firmware_upload() argument
104 for (total_read_bytes = 0; total_read_bytes < firmware->size; ) { in as102_firmware_upload()
109 (u8 *) (firmware->data + total_read_bytes), in as102_firmware_upload()
120 if (total_read_bytes == firmware->size) { in as102_firmware_upload()
158 const struct firmware *firmware = NULL; in as102_fw_upload() local
172 /* allocate buffer to store firmware upload command and data */ in as102_fw_upload()
179 /* request kernel to locate firmware file: part1 */ in as102_fw_upload()
[all …]
/openbmc/linux/include/linux/
H A Dfirmware.h12 struct firmware { struct
16 /* firmware loader private fields */ argument
21 * enum fw_upload_err - firmware upload error codes argument
24 * @FW_UPLOAD_ERR_TIMEOUT: SW timed out on handshake with HW/firmware
27 * @FW_UPLOAD_ERR_INVALID_SIZE: invalid firmware image size
46 void *priv; /* firmware loader private fields */
50 * struct fw_upload_ops - device specific operations to support firmware upload
82 * Built-in firmware functionality is only available if FW_LOADER=y, but not
86 bool firmware_request_builtin(struct firmware *fw, const char *name);
88 static inline bool firmware_request_builtin(struct firmware *fw, in firmware_request_builtin()
[all …]
/openbmc/linux/Documentation/networking/device_drivers/ethernet/netronome/
H A Dnfp.rst15 - `Acquiring Firmware`_
28 Acquiring Firmware
31 The NFP3800, NFP4000 and NFP6000 devices require application specific firmware
32 to function. Application firmware can be located either on the host file system
33 or in the device flash (if supported by management firmware).
35 Firmware files on the host filesystem contain card type (`AMDA-*` string), media
36 config etc. They should be placed in `/lib/firmware/netronome` directory to
37 load firmware from the host file system.
39 Firmware for basic NIC operation is available in the upstream
40 `linux-firmware.git` repository.
[all …]

12345678910>>...171