| /openbmc/openbmc/meta-raspberrypi/recipes-kernel/linux-firmware-rpidistro/ |
| H A D | linux-firmware-rpidistro_git.bb | 1 SUMMARY = "Linux kernel firmware files from Raspbian distribution" 2 DESCRIPTION = "Updated firmware files for RaspberryPi hardware. \ 4 to linux-firmware for general use." 5 HOMEPAGE = "https://github.com/RPi-Distro/firmware-nonfree" 18 SRC_URI = "git://github.com/RPi-Distro/firmware-nonfree;branch=bookworm;protocol=https \ 19 file://0001-Default-43455-firmware-to-standard-variant.patch \ 30 # The minimal firmware doesn't work with Raspberry Pi 5, so default to the 31 # standard firmware 36 install -d ${D}${nonarch_base_libdir}/firmware/brcm ${D}${nonarch_base_libdir}/firmware/cypress 38 cp debian/copyright ${D}${nonarch_base_libdir}/firmware/copyright.firmware-nonfree-rpidistro [all …]
|
| /openbmc/openbmc/poky/meta/recipes-kernel/linux-firmware/ |
| H A D | linux-firmware_20250509.bb | 3 DESCRIPTION = "Linux firmware is a package distributed alongside the Linux kernel \ 4 that contains firmware binary blobs necessary for partial or full functionality \ 67 & Firmware-ralink-firmware \ 74 & Firmware-ueagle-atm4-firmware \ 131 file://LICENCE.open-ath9k-htc-firmware;md5=1b33c9f4d17bc4d457bdb23727046837 \ 145 file://LICENCE.ralink-firmware.txt;md5=ab2c269277c45476fb449673911a2dfd \ 152 file://LICENCE.ueagle-atm4-firmware;md5=4ed7ea6b507ccc583b9d594417714118 \ 212 NO_GENERIC_LICENSE[Firmware-ath9k-htc] = "LICENCE.open-ath9k-htc-firmware" 226 NO_GENERIC_LICENSE[Firmware-ralink-firmware] = "LICENCE.ralink-firmware.txt" 233 NO_GENERIC_LICENSE[Firmware-ueagle-atm4-firmware] = "LICENCE.ueagle-atm4-firmware" [all …]
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-kernel/broadcom-bt-firmware/ |
| H A D | broadcom-bt-firmware_12.0.1.1105_p3.bb | 4 SUMMARY = "Broadcom Bluetooth firmware files" 5 …m Bluetooth devices. Note that in case of BT+WiFi devices, separate WiFi firmware might be needed." 6 HOMEPAGE = "https://github.com/winterheart/broadcom-bt-firmware" 12 SRC_URI = "git://github.com/winterheart/broadcom-bt-firmware.git;branch=master;protocol=https" 28 install -d ${D}${nonarch_base_libdir}/firmware/brcm/ 29 cp brcm/*.hcd ${D}${nonarch_base_libdir}/firmware/brcm/ 32 install -m 0644 LICENSE.broadcom_bcm20702 ${D}${nonarch_base_libdir}/firmware/brcm/ 35 install -m 0644 DEVICES.md ${D}${nonarch_base_libdir}/firmware/brcm/ 59 FILES:${PN}-bcm20702a1 = "${nonarch_base_libdir}/firmware/brcm/BCM20702A1*hcd" 60 FILES:${PN}-bcm20702b0 = "${nonarch_base_libdir}/firmware/brcm/BCM20702B0*hcd" [all …]
|
| /openbmc/openbmc/meta-raspberrypi/recipes-bsp/rpi-eeprom/ |
| H A D | rpi-eeprom_git.bb | 36 # copy firmware files 37 install -d ${D}${base_libdir}/firmware/raspberrypi/bootloader-2711/default 38 install -d ${D}${base_libdir}/firmware/raspberrypi/bootloader-2711/latest 39 install -d ${D}${base_libdir}/firmware/raspberrypi/bootloader-2712/default 40 install -d ${D}${base_libdir}/firmware/raspberrypi/bootloader-2712/latest 42 …install -m 644 ${S}/firmware-2711/default/* ${D}${base_libdir}/firmware/raspberrypi/bootloader-271… 43 …install -m 644 ${S}/firmware-2711/latest/* ${D}${base_libdir}/firmware/raspberrypi/bootloader-2711… 44 …install -m 644 ${S}/firmware-2712/default/* ${D}${base_libdir}/firmware/raspberrypi/bootloader-271… 45 …install -m 644 ${S}/firmware-2712/latest/* ${D}${base_libdir}/firmware/raspberrypi/bootloader-2712… 47 ln -s default ${D}${base_libdir}/firmware/raspberrypi/bootloader-2711/critical [all …]
|
| /openbmc/openbmc/meta-raspberrypi/recipes-kernel/bluez-firmware-rpidistro/ |
| H A D | bluez-firmware-rpidistro_git.bb | 1 SUMMARY = "Linux kernel Bluetooth firmware files from Raspbian distribution" 2 DESCRIPTION = "Updated Bluetooth firmware files for RaspberryPi hardware. \ 4 to linux-firmware for general use." 5 HOMEPAGE = "https://github.com/RPi-Distro/bluez-firmware" 10 # changed in linux-firmware. 14 # conflicts with linux-firmware. 16 # [^1]: https://github.com/RPi-Distro/bluez-firmware/issues/1 27 git://github.com/RPi-Distro/bluez-firmware;branch=bookworm;protocol=https \ 51 install -d ${D}${nonarch_base_libdir}/firmware/brcm 53 cp LICENCE.cypress-rpidistro ${D}${nonarch_base_libdir}/firmware [all …]
|
| /openbmc/u-boot/drivers/qe/ |
| H A D | qe.c | 456 int qe_upload_firmware(const struct qe_firmware *firmware) in qe_upload_firmware() argument 471 if (!firmware) { in qe_upload_firmware() 476 hdr = &firmware->header; in qe_upload_firmware() 496 if ((firmware->count < 1) || (firmware->count > MAX_QE_RISC)) { in qe_upload_firmware() 502 calc_size += (firmware->count - 1) * sizeof(struct qe_microcode); in qe_upload_firmware() 504 for (i = 0; i < firmware->count; i++) in qe_upload_firmware() 511 be32_to_cpu(firmware->microcode[i].count); in qe_upload_firmware() 523 crc = be32_to_cpu(*(u32 *)((void *)firmware + calc_size)); in qe_upload_firmware() 524 if (crc != (crc32(-1, (const void *) firmware, calc_size) ^ -1)) { in qe_upload_firmware() 532 if (!firmware->split) { in qe_upload_firmware() [all …]
|
| /openbmc/openbmc/meta-arm/meta-arm/recipes-bsp/images/ |
| H A D | firmware-deploy-image.bb | 1 SUMMARY = "Firmware image deploying multi-config firmware" 2 DESCRIPTION = "Image for deploying a firmware set on platforms using multi-config" 13 # Users of this recipe are expected to provide the list of firmware images 20 for firmware in ${FIRMWARE_BINARIES}; do 21 echo "cp -av ${firmware_loc}/${firmware} ${DEPLOYDIR}/" 22 cp -av "${firmware_loc}/${firmware}" ${DEPLOYDIR}/ 23 if [ -L "${firmware_loc}/${firmware}" ]; then 24 echo "cp -av ${firmware_loc}/$(readlink ${firmware_loc}/${firmware}) ${DEPLOYDIR}/" 25 cp -av "${firmware_loc}/$(readlink ${firmware_loc}/${firmware})" ${DEPLOYDIR}/
|
| /openbmc/qemu/docs/interop/ |
| H A D | firmware.json | 27 # Lists the firmware-OS interface types provided by various firmware 30 # @bios: Traditional x86 BIOS interface. For example, firmware built 34 # 1275-1994 standard. Examples for firmware projects that 40 # example, firmware built from the edk2 (EFI Development Kit II) 51 # Defines the device types that firmware can be mapped into. 53 # @flash: The firmware executable and its accompanying NVRAM file are to 56 # @kernel: The firmware is to be loaded like a Linux kernel. This is 60 # @memory: The firmware is to be mapped into memory. 62 # @igvm: The firmware is defined by a file conforming to the IGVM 78 # firmware files. [all …]
|
| /openbmc/u-boot/board/freescale/imx8mq_evk/ |
| H A D | README | 5 - Build the ARM Trusted firmware binary 10 Get and Build the ARM Trusted firmware 18 Get the ddr and hdmi firmware 20 $ wget https://www.nxp.com/lgfiles/NMG/MAD/YOCTO/firmware-imx-7.9.bin 21 $ chmod +x firmware-imx-7.9.bin 22 $ ./firmware-imx-7.9.bin 23 $ cp firmware-imx-7.9/firmware/hdmi/cadence/signed_hdmi_imx8m.bin $(srctree) 24 $ cp firmware-imx-7.9/firmware/ddr/synopsys/lpddr4*.bin $(srctree)
|
| /openbmc/openbmc/meta-arm/meta-arm/recipes-bsp/scp-firmware/ |
| H A D | scp-firmware_2.16.0.bb | 3 HOMEPAGE = "https://gitlab.arm.com/firmware/SCP-firmware" 9 SRC_URI_SCP_FIRMWARE ?= "gitsm://git.gitlab.arm.com/firmware/SCP-firmware.git;protocol=https" 17 PROVIDES += "virtual/control-processor-firmware" 79 install -d ${D}/firmware 84 … install -D "${B}/${TYPE}/${FW}/bin/${SCP_PLATFORM}-bl1.bin" "${D}/firmware/${FW}_${TYPE}.bin" 85 … install -D "${B}/${TYPE}/${FW}/bin/${SCP_PLATFORM}-bl1.elf" "${D}/firmware/${FW}_${TYPE}.elf" 87 …install -D "${B}/${TYPE}/${FW}/bin/${SCP_PLATFORM}-${FW}-bl1.bin" "${D}/firmware/${FW}_${TYPE}.bin" 88 …install -D "${B}/${TYPE}/${FW}/bin/${SCP_PLATFORM}-${FW}-bl1.elf" "${D}/firmware/${FW}_${TYPE}.elf" 92 … install -D "${B}/${TYPE}/${FW}/bin/${SCP_PLATFORM}-bl2.bin" "${D}/firmware/${FW}_${TYPE}.bin" 93 … install -D "${B}/${TYPE}/${FW}/bin/${SCP_PLATFORM}-bl2.elf" "${D}/firmware/${FW}_${TYPE}.elf" [all …]
|
| /openbmc/u-boot/doc/uImage.FIT/ |
| H A D | sec_firmware_ppa.its | 6 * For booting PPA (SEC Firmware), "firmware" is searched and loaded. 9 * respective load offsets from firmware image address. 16 firmware@1 { 19 type = "firmware"; 34 type = "firmware"; 44 description = "PPA Secure firmware"; 45 firmware = "firmware@1";
|
| /openbmc/pldm/docs/ |
| H A D | fw_update_configuration.md | 3 PLDM supports firmware updates through two mechanisms: 5 1. **D-Bus API**: Using the StartUpdate D-Bus interface for firmware updates 6 2. **Inotify monitoring**: Automatic detection of firmware packages placed in 9 The inotify-based firmware update monitoring can be enabled or disabled using 11 monitor the `/tmp/images` directory for new firmware packages and process them 12 automatically. When disabled, only D-Bus API-based firmware updates will be 13 supported. To disable inotify-based firmware update monitoring (default): 19 To enable inotify-based firmware update monitoring:
|
| /openbmc/u-boot/board/freescale/imx8qxp_mek/ |
| H A D | README | 6 - Build the ARM Trusted firmware binary 12 Get and Build the ARM Trusted firmware 23 $ wget https://www.nxp.com/lgfiles/NMG/MAD/YOCTO/imx-sc-firmware-0.7.bin 24 $ chmod +x imx-sc-firmware-0.7.bin 25 $ ./imx-sc-firmware-0.7.bin 26 $ wget https://www.nxp.com/lgfiles/NMG/MAD/YOCTO/firmware-imx-7.6.bin 27 $ chmod +x firmware-imx-7.6.bin 28 $ ./firmware-imx-7.6.bin 37 $ cp firmware-imx-7.6/firmware/seco/ahab-container.img . 38 $ cp imx-sc-firmware-0.7/mx8qx-mek-scfw-tcm.bin .
|
| /openbmc/openbmc/meta-openembedded/meta-networking/recipes-support/linux-atm/linux-atm/ |
| H A D | install-from-buildir.patch | 12 $(MKDIR_P) $(DESTDIR)/lib/firmware 13 - $(INSTALL_DATA) $(srcdir)/pca200e.bin $(DESTDIR)/lib/firmware 14 - $(INSTALL_DATA) $(srcdir)/pca200e_ecd.bin2 $(DESTDIR)/lib/firmware 15 - $(INSTALL_DATA) $(srcdir)/sba200e_ecd.bin2 $(DESTDIR)/lib/firmware 16 + $(INSTALL_DATA) $(builddir)/pca200e.bin $(DESTDIR)/lib/firmware 17 + $(INSTALL_DATA) $(builddir)/pca200e_ecd.bin2 $(DESTDIR)/lib/firmware 18 + $(INSTALL_DATA) $(builddir)/sba200e_ecd.bin2 $(DESTDIR)/lib/firmware
|
| H A D | 0001-make-Add-PREFIX-knob.patch | 21 - $(MKDIR_P) $(DESTDIR)/lib/firmware 22 - $(INSTALL_DATA) $(builddir)/pca200e.bin $(DESTDIR)/lib/firmware 23 - $(INSTALL_DATA) $(builddir)/pca200e_ecd.bin2 $(DESTDIR)/lib/firmware 24 - $(INSTALL_DATA) $(builddir)/sba200e_ecd.bin2 $(DESTDIR)/lib/firmware 25 + $(MKDIR_P) $(DESTDIR)$(ROOTPREFIX)/lib/firmware 26 + $(INSTALL_DATA) $(builddir)/pca200e.bin $(DESTDIR)$(ROOTPREFIX)/lib/firmware 27 + $(INSTALL_DATA) $(builddir)/pca200e_ecd.bin2 $(DESTDIR)$(ROOTPREFIX)/lib/firmware 28 + $(INSTALL_DATA) $(builddir)/sba200e_ecd.bin2 $(DESTDIR)$(ROOTPREFIX)/lib/firmware
|
| /openbmc/qemu/docs/devel/migration/ |
| H A D | best-practices.rst | 30 on the destination it includes the firmware from the source. Even after 31 resetting a VM, the old firmware is used. Only once QEMU has been restarted 32 is the new firmware in use. 34 - Changes in firmware size can cause changes in the required RAMBlock size 35 to hold the firmware and thus migration can fail. In practice it's best 36 to pad firmware images to convenient powers of 2 with plenty of space 40 emulation code can work with older firmware to allow forward migration. 42 - Care should be taken with newer firmware so that backward migration 45 In some cases it may be best to tie specific firmware versions to specific 47 support. This is also useful when newer versions of firmware outgrow
|
| /openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/external-system/ |
| H A D | external-system_0.1.0.bb | 41 …all -D -p -m 0644 ${B}/product/${PRODUCT}/firmware/release/bin/firmware.bin ${D}${nonarch_base_lib… 42 …all -D -p -m 0644 ${B}/product/${PRODUCT}/firmware/release/bin/firmware.elf ${D}${nonarch_base_lib… 45 FILES:${PN} = "${nonarch_base_libdir}/firmware/es_flashfw.bin" 46 FILES:${PN}-elf = "${nonarch_base_libdir}/firmware/es_flashfw.elf" 50 SYSROOT_DIRS += "${nonarch_base_libdir}/firmware" 55 cp -rf ${D}${nonarch_base_libdir}/firmware/* ${DEPLOYDIR}/
|
| /openbmc/qemu/hw/avr/ |
| H A D | boot.c | 61 MemoryRegion *program_mr, const char *firmware) in avr_load_firmware() argument 68 filename = qemu_find_file(QEMU_FILE_TYPE_BIOS, firmware); in avr_load_firmware() 70 error_report("Unable to find %s", firmware); in avr_load_firmware() 86 firmware, entry); in avr_load_firmware() 92 firmware, cpu_len, mcu_cpu_type); in avr_load_firmware() 99 firmware, in avr_load_firmware() 109 firmware); in avr_load_firmware()
|
| /openbmc/webui-vue/src/store/modules/Operations/ |
| H A D | FirmwareStore.js | 19 (firmware) => firmware.id === state.bmcActiveFirmwareId, 24 (firmware) => firmware.id === state.biosActiveFirmwareId, 29 (firmware) => firmware.id !== state.bmcActiveFirmwareId, 34 (firmware) => firmware.id !== state.biosActiveFirmwareId, 41 setBmcFirmware: (state, firmware) => (state.bmcFirmware = firmware), 42 setBiosFirmware: (state, firmware) => (state.biosFirmware = firmware),
|
| /openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/trusted-firmware-a/ |
| H A D | trusted-firmware-a_%.bbappend | 6 MACHINE_TFA_REQUIRE:corstone1000 = "trusted-firmware-a-corstone1000.inc" 7 MACHINE_TFA_REQUIRE:fvp-base = "trusted-firmware-a-fvp-base.inc" 8 MACHINE_TFA_REQUIRE:juno = "trusted-firmware-a-juno.inc" 9 MACHINE_TFA_REQUIRE:sbsa-ref = "trusted-firmware-a-sbsa-ref.inc" 10 MACHINE_TFA_REQUIRE:sgi575 = "trusted-firmware-a-sgi575.inc"
|
| /openbmc/openbmc/meta-arm/meta-arm-bsp/conf/machine/include/ |
| H A D | corstone1000.inc | 6 PREFERRED_VERSION_trusted-firmware-m ?= "2.1.%" 10 PREFERRED_VERSION_trusted-firmware-a ?= "2.11.%" 40 KERNEL_IMAGETYPE:firmware = "Image.gz" 53 WKS_FILE:firmware ?= "corstone1000-flash-firmware.wks.in" 58 # If not building under the firmware multiconf we need to build the actual firmware 59 FIRMWARE_DEPLOYMENT ?= "firmware-deploy-image" 60 FIRMWARE_DEPLOYMENT:firmware ?= ""
|
| /openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/ |
| H A D | python3-uefi-firmware_1.12.bb | 1 SUMMARY = "Various data structures and parsing tools for UEFI firmware." 2 DESCRIPTION = "This package contains Python UEFI firmware parser tool. The \ 3 UEFI firmware parser is a simple module and set of scripts for parsing, \ 4 extracting, and recreating UEFI firmware volumes. This includes parsing \ 6 HOMEPAGE = "https://github.com/theopolis/uefi-firmware-parser" 10 SRC_URI = "git://github.com/theopolis/uefi-firmware-parser;protocol=https;branch=master"
|
| /openbmc/openbmc/meta-arm/meta-arm/recipes-bsp/trusted-firmware-m/ |
| H A D | trusted-firmware-m_2.1.1.bb | 1 require recipes-bsp/trusted-firmware-m/trusted-firmware-m-${PV}-src.inc 2 require recipes-bsp/trusted-firmware-m/trusted-firmware-m.inc
|
| H A D | trusted-firmware-m_2.2.0.bb | 1 require recipes-bsp/trusted-firmware-m/trusted-firmware-m-${PV}-src.inc 2 require recipes-bsp/trusted-firmware-m/trusted-firmware-m.inc
|
| H A D | trusted-firmware-m-scripts-native_2.2.0.bb | 1 require recipes-bsp/trusted-firmware-m/trusted-firmware-m-${PV}-src.inc 2 require recipes-bsp/trusted-firmware-m/trusted-firmware-m-scripts-native.inc
|