| /OK3568_Linux_fs/yocto/poky/meta/recipes-kernel/linux-firmware/ |
| H A D | linux-firmware_20230210.bb | 1 SUMMARY = "Firmware files for use with Linux kernel" 3 DESCRIPTION = "Linux firmware is a package distributed alongside the Linux kernel \ 4 that contains firmware binary blobs necessary for partial or full functionality \ 9 Firmware-Abilis \ 10 & Firmware-adsp_sst \ 11 & Firmware-agere \ 12 & Firmware-amdgpu \ 13 & Firmware-amd-ucode \ 14 & Firmware-amlogic_vdec \ 15 & Firmware-atheros_firmware \ [all …]
|
| /OK3568_Linux_fs/buildroot/package/linux-firmware/ |
| H A D | Config.in | 2 bool "linux-firmware" 4 This package provides various binary firmware files (closed 7 https://git.kernel.org/?p=linux/kernel/git/firmware/linux-firmware.git 11 menu "Audio firmware" 16 Firmware files for Intel Baytrail SST DSP audio. 20 menu "Video firmware" 23 bool "AMD GPU video card firmware" 25 Firmware files for AMD GPU video cards. 28 bool "Intel i915 video card firmware" 30 Firmware files for the Intel i915 video cards. [all …]
|
| /OK3568_Linux_fs/kernel/drivers/base/firmware_loader/ |
| H A D | Kconfig | 2 menu "Firmware loader" 5 tristate "Firmware loading facility" if EXPERT 8 This enables the firmware loading facility in the kernel. The kernel 9 will first look for built-in firmware, if it has any. Next, it will 10 look for the requested firmware in a series of filesystem paths: 13 o /lib/firmware/updates/UTS_RELEASE 14 o /lib/firmware/updates 15 o /lib/firmware/UTS_RELEASE 16 o /lib/firmware 20 need firmware. [all …]
|
| H A D | main.c | 3 * main.c - Multi purpose firmware loading support 7 * Please see Documentation/driver-api/firmware/ for more information. 25 #include <linux/firmware.h> 42 #include "firmware.h" 46 MODULE_DESCRIPTION("Multi purpose firmware loading support"); 57 * Names of firmware images which have been cached successfully 59 * helper can trace which firmware images have been cached 95 /* Builtin firmware support */ 102 static bool fw_copy_to_prealloc_buf(struct firmware *fw, in fw_copy_to_prealloc_buf() 113 static bool fw_get_builtin_firmware(struct firmware *fw, const char *name, in fw_get_builtin_firmware() [all …]
|
| /OK3568_Linux_fs/yocto/meta-rockchip/recipes-kernel/rkwifibt-firmware/ |
| H A D | rkwifibt-firmware.bb | 4 SUMMARY = "Rockchip WIFI/BT firmware files" 20 install -d ${D}/lib/firmware/rtlbt/ 22 cp -u $(find ${S}/firmware/ -type f) ${D}/lib/firmware/ 23 ln -rsf ${D}/lib/firmware/*rtl*_* ${D}/lib/firmware/rtlbt/ 47 lib/firmware/fw_bcm40181a2_apsta.bin \ 48 lib/firmware/fw_bcm40181a2.bin \ 49 lib/firmware/nvram_ap6181.txt \ 53 lib/firmware/fw_bcm43438a1_apsta.bin \ 54 lib/firmware/fw_bcm43438a1.bin \ 55 lib/firmware/nvram_ap6212a.txt \ [all …]
|
| /OK3568_Linux_fs/kernel/Documentation/driver-api/firmware/ |
| H A D | fallback-mechanisms.rst | 6 filesystem lookup on the root filesystem or when the firmware simply cannot be 8 configuration options related to supporting the firmware fallback mechanism are: 10 * CONFIG_FW_LOADER_USER_HELPER: enables building the firmware fallback 15 enable the kobject uevent fallback mechanism on all firmware API calls 21 manually load the firmware. Read below for more details. 31 Justifying the firmware fallback mechanism 40 * Races upon resume from suspend. This is resolved by the firmware cache, but 41 the firmware cache is only supported if you use uevents, and its not 44 * Firmware is not accessible through typical means: 47 * The firmware provides very unique device specific data tailored for [all …]
|
| H A D | firmware_cache.rst | 2 Firmware cache 5 When Linux resumes from suspend some device drivers require firmware lookups to 7 firmware lookups are not possible, during this short period of time firmware 9 the root filesystem for firmware delays user experience with device 10 functionality. In order to support these requirements the firmware 11 infrastructure implements a firmware cache for device drivers for most API 14 The firmware cache makes using certain firmware API calls safe during a device 16 the firmware by themselves for dealing with firmware loss during system resume. 18 The firmware cache works by requesting for firmware prior to suspend and 19 caching it in memory. Upon resume device drivers using the firmware API will [all …]
|
| H A D | built-in-fw.rst | 2 Built-in firmware 5 Firmware can be built-in to the kernel, this means building the firmware 6 into vmlinux directly, to enable avoiding having to look for firmware from 7 the filesystem. Instead, firmware can be looked for inside the kernel 8 directly. You can enable built-in firmware using the kernel configuration 14 There are a few reasons why you might want to consider building your firmware 18 * Firmware is needed for accessing the boot device, and the user doesn't 19 want to stuff the firmware into the boot initramfs. 22 able to make use of built-in firmware: 24 * Legalese - firmware is non-GPL compatible [all …]
|
| /OK3568_Linux_fs/kernel/drivers/gpu/drm/tegra/ |
| H A D | falcon.c | 8 #include <linux/firmware.h> 59 const struct firmware *firmware) in falcon_copy_firmware_image() argument 61 u32 *virt = falcon->firmware.virt; in falcon_copy_firmware_image() 65 for (i = 0; i < firmware->size / sizeof(u32); i++) in falcon_copy_firmware_image() 66 virt[i] = le32_to_cpu(((u32 *)firmware->data)[i]); in falcon_copy_firmware_image() 71 struct falcon_fw_bin_header_v1 *bin = (void *)falcon->firmware.virt; in falcon_parse_firmware_image() 76 dev_err(falcon->dev, "incorrect firmware magic\n"); in falcon_parse_firmware_image() 82 dev_err(falcon->dev, "unsupported firmware version\n"); in falcon_parse_firmware_image() 86 /* check that the firmware size is consistent */ in falcon_parse_firmware_image() 87 if (bin->size > falcon->firmware.size) { in falcon_parse_firmware_image() [all …]
|
| /OK3568_Linux_fs/kernel/Documentation/ABI/stable/ |
| H A D | sysfs-driver-firmware-zynqmp | 1 What: /sys/devices/platform/firmware\:zynqmp-firmware/ggs* 17 # cat /sys/devices/platform/firmware\:zynqmp-firmware/ggs0 18 # echo <value> > /sys/devices/platform/firmware\:zynqmp-firmware/ggs0 22 # cat /sys/devices/platform/firmware\:zynqmp-firmware/ggs0 23 # echo 0x1234ABCD > /sys/devices/platform/firmware\:zynqmp-firmware/ggs0 27 What: /sys/devices/platform/firmware\:zynqmp-firmware/pggs* 46 # cat /sys/devices/platform/firmware\:zynqmp-firmware/pggs0 47 # echo <value> > /sys/devices/platform/firmware\:zynqmp-firmware/pggs0 51 # cat /sys/devices/platform/firmware\:zynqmp-firmware/pggs0 52 # echo 0x1234ABCD > /sys/devices/platform/firmware\:zynqmp-firmware/pggs0 [all …]
|
| /OK3568_Linux_fs/kernel/Documentation/driver-api/nvdimm/ |
| H A D | firmware-activate.rst | 4 NVDIMM Runtime Firmware Activation 7 Some persistent memory devices run a firmware locally on the device / 9 and health monitoring. The process of updating that firmware typically 13 DSM specification [1], has added support for activating firmware at 17 to advertise and control their local runtime firmware activation 20 The libnvdimm bus object, ndbusX, implements an ndbusX/firmware/activate 21 attribute that shows the state of the firmware activation as one of 'idle', 25 No devices are set / armed to activate firmware 37 activation. In that scenario the potential for firmware activation to 40 The 'ndbusX/firmware/activate' property can be written with a value of [all …]
|
| /OK3568_Linux_fs/kernel/drivers/net/wireless/marvell/libertas/ |
| H A D | firmware.c | 3 * Firmware loading and handling functions. 7 #include <linux/firmware.h> 16 const struct firmware *helper, const struct firmware *mainfw) in lbs_fw_loaded() 20 lbs_deb_fw("firmware load complete, code %d\n", ret); in lbs_fw_loaded() 32 void (*cb)(const struct firmware *fw, void *context)) in do_load_firmware() 45 static void main_firmware_cb(const struct firmware *firmware, void *context) in main_firmware_cb() argument 49 if (!firmware) { in main_firmware_cb() 50 /* Failed to find firmware: try next table entry */ in main_firmware_cb() 55 /* Firmware found! */ in main_firmware_cb() 56 lbs_fw_loaded(priv, 0, priv->helper_fw, firmware); in main_firmware_cb() [all …]
|
| /OK3568_Linux_fs/kernel/Documentation/networking/device_drivers/ethernet/netronome/ |
| H A D | nfp.rst | 13 - `Acquiring Firmware`_ 24 Acquiring Firmware 27 The NFP4000 and NFP6000 devices require application specific firmware 28 to function. Application firmware can be located either on the host file system 29 or in the device flash (if supported by management firmware). 31 Firmware files on the host filesystem contain card type (`AMDA-*` string), media 32 config etc. They should be placed in `/lib/firmware/netronome` directory to 33 load firmware from the host file system. 35 Firmware for basic NIC operation is available in the upstream 36 `linux-firmware.git` repository. [all …]
|
| /OK3568_Linux_fs/kernel/scripts/ |
| H A D | extract_xc3028.pl | 19 # cp xc3028-v24.fw /lib/firmware 20 # cp xc3028-v27.fw /lib/firmware 33 die "This firmware requires the md5sum command - see http://www.gnu.org/software/coreutils/\n"; 163 # Firmware 0, type: BASE FW F8MHZ (0x00000003), id: (0000000000000000), size: 6635 172 # Firmware 1, type: BASE FW F8MHZ MTS (0x00000007), id: (0000000000000000), size: 6635 181 # Firmware 2, type: BASE FW FM (0x00000401), id: (0000000000000000), size: 6525 190 # Firmware 3, type: BASE FW FM INPUT1 (0x00000c01), id: (0000000000000000), size: 6539 199 # Firmware 4, type: BASE FW (0x00000001), id: (0000000000000000), size: 6633 208 # Firmware 5, type: BASE FW MTS (0x00000005), id: (0000000000000000), size: 6617 217 # Firmware 6, type: STD FW (0x00000000), id: PAL/BG A2/A (0000000100000007), size: 161 [all …]
|
| /OK3568_Linux_fs/kernel/Documentation/ABI/testing/ |
| H A D | sysfs-firmware-efi-esrt | 1 What: /sys/firmware/efi/esrt/ 5 (ESRT), a catalog of firmware for which can be updated with 10 What: /sys/firmware/efi/esrt/fw_resource_count 15 What: /sys/firmware/efi/esrt/fw_resource_count_max 20 really only useful to the system firmware itself. 22 What: /sys/firmware/efi/esrt/fw_resource_version 25 Description: The version of the ESRT structure provided by the firmware. 27 What: /sys/firmware/efi/esrt/entries/entry$N/ 32 example: /sys/firmware/efi/esrt/entries/entry0/ 34 What: /sys/firmware/efi/esrt/entries/entry$N/fw_type [all …]
|
| /OK3568_Linux_fs/u-boot/arch/arm/cpu/armv8/ |
| H A D | sec_firmware.c | 23 * Secure firmware load addr 24 * Flags used: 0x1 secure firmware has been loaded to secure memory 25 * 0x2 secure firmware is running 30 #define SEC_FIRMWARE_FIT_IMAGE "firmware" 51 printf("SEC Firmware: %s: no such config\n", conf_node_name); in sec_firmware_get_data() 58 printf("SEC Firmware: No '%s' in config\n", in sec_firmware_get_data() 63 /* Verify secure firmware image */ in sec_firmware_get_data() 65 printf("SEC Firmware: Bad firmware image (bad CRC)\n"); in sec_firmware_get_data() 70 printf("SEC Firmware: Can't get %s subimage data/size", in sec_firmware_get_data() 77 printf("SEC Firmware: Can't get description\n"); in sec_firmware_get_data() [all …]
|
| /OK3568_Linux_fs/kernel/drivers/hid/intel-ish-hid/ |
| H A D | ishtp-fw-loader.c | 3 * ISH-TP client driver for ISH firmware loading 8 #include <linux/firmware.h> 15 /* Number of times we attempt to load the firmware before giving up */ 23 * ISH Shim firmware loader reserves 4 Kb buffer in SRAM. The buffer is 25 * firmware loader. Reason for the odd size of 3968 bytes? Each IPC 34 * LOADER_CMD_XFER_QUERY Query the Shim firmware loader for 36 * LOADER_CMD_XFER_FRAGMENT Transfer one firmware image fragment at a 38 * multiple times until the entire firmware 40 * LOADER_CMD_START Start executing the main firmware. 53 * ISH firmware max delay for one transmit failure is 1 Hz, [all …]
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-kernel/broadcom-bt-firmware/ |
| H A D | broadcom-bt-firmware_12.0.1.1105_p3.bb | 4 SUMMARY = "Broadcom Bluetooth firmware files" 5 DESCRIPTION = "Firmware for Broadcom Bluetooth devices. Note that in case of BT+WiFi devices, separ… 6 HOMEPAGE = "https://github.com/winterheart/broadcom-bt-firmware" 8 LICENSE = "Firmware-Broadcom-WIDCOMM" 9 NO_GENERIC_LICENSE[Firmware-Broadcom-WIDCOMM] = "LICENSE.broadcom_bcm20702" 12 SRC_URI = "git://github.com/winterheart/broadcom-bt-firmware.git;branch=master;protocol=https" 28 install -d ${D}${nonarch_base_libdir}/firmware/brcm/ 29 cp brcm/*.hcd ${D}${nonarch_base_libdir}/firmware/brcm/ 32 install -m 0644 LICENSE.broadcom_bcm20702 ${D}${nonarch_base_libdir}/firmware/brcm/ 35 install -m 0644 DEVICES.md ${D}${nonarch_base_libdir}/firmware/brcm/ [all …]
|
| /OK3568_Linux_fs/tools/windows/RKDevTool/RKDevTool_Release/Language/ |
| H A D | English.ini | 7 BUTTON_1011=Firmware 42 LABEL_1024=Firmware: 44 LABEL_1041=Firmware: 49 TABCTRL_1000_Tab_1=Upgrade Firmware 132 INFO_UNPACK_UNION_START=Start to unpack union firmware... 133 INFO_UNPACK_UNION_OK=Unpack union firmware ok 134 ERROR_UNPACK_UNION_FAIL=Unpack union firmware failed 135 INFO_UNPACK_ANDROID_START=Start to unpack android firmware... 136 INFO_UNPACK_ANDROID_OK=Unpack android firmware ok,store in the output dir of tool 137 ERROR_UNPACK_ANDROID_FAIL=Unpack android firmware failed [all …]
|
| /OK3568_Linux_fs/kernel/drivers/media/usb/as102/ |
| H A D | as102_fw.c | 11 #include <linux/firmware.h> 38 * Parse INTEL HEX firmware file to extract address and data. 48 pr_err("invalid firmware file\n"); in parse_hex_line() 93 const struct firmware *firmware) { in as102_firmware_upload() argument 104 for (total_read_bytes = 0; total_read_bytes < firmware->size; ) { in as102_firmware_upload() 109 (u8 *) (firmware->data + total_read_bytes), in as102_firmware_upload() 120 if (total_read_bytes == firmware->size) { in as102_firmware_upload() 158 const struct firmware *firmware = NULL; in as102_fw_upload() local 172 /* allocate buffer to store firmware upload command and data */ in as102_fw_upload() 179 /* request kernel to locate firmware file: part1 */ in as102_fw_upload() [all …]
|
| /OK3568_Linux_fs/u-boot/fit/ |
| H A D | u-boot.its | 29 description = "ARM Trusted Firmware"; 31 type = "firmware"; 33 os = "arm-trusted-firmware"; 41 description = "ARM Trusted Firmware"; 43 type = "firmware"; 45 os = "arm-trusted-firmware"; 53 description = "ARM Trusted Firmware"; 55 type = "firmware"; 57 os = "arm-trusted-firmware"; 65 description = "ARM Trusted Firmware"; [all …]
|
| /OK3568_Linux_fs/u-boot/drivers/qe/ |
| H A D | qe.c | 329 /* Firmware information stored here for qe_get_firmware_info() */ 333 * Set to 1 if QE firmware has been uploaded, and therefore 376 * 'calc_size' is the calculated size, in bytes, of the firmware structure and 381 int qe_upload_firmware(const struct qe_firmware *firmware) in qe_upload_firmware() argument 396 if (!firmware) { in qe_upload_firmware() 401 hdr = &firmware->header; in qe_upload_firmware() 421 if ((firmware->count < 1) || (firmware->count > MAX_QE_RISC)) { in qe_upload_firmware() 427 calc_size += (firmware->count - 1) * sizeof(struct qe_microcode); in qe_upload_firmware() 429 for (i = 0; i < firmware->count; i++) in qe_upload_firmware() 436 be32_to_cpu(firmware->microcode[i].count); in qe_upload_firmware() [all …]
|
| /OK3568_Linux_fs/kernel/drivers/scsi/fnic/ |
| H A D | fcpio.h | 25 * communication by the host driver to the fcp firmware. 81 * Header status codes from the firmware 87 * If a request to the firmware is rejected, the original request 97 * Once a request is processed, the firmware will usually return 118 * to mark commands with a unique tag. When the firmware responds to 121 * The only firmware requests that will use the rx_id/ox_id fields instead 163 * The header for an fcpio request, whether from the firmware or from the 199 * fcpio_icmnd_16: host -> firmware request 247 * fcpio_icmnd_32: host -> firmware request 275 * fcpio_itmf: host -> firmware request [all …]
|
| /OK3568_Linux_fs/kernel/Documentation/devicetree/bindings/soc/fsl/cpm_qe/ |
| H A D | qe.txt | 26 - fsl,firmware-phandle: 27 Usage: required only if there is no fsl,qe-firmware child node 29 Definition: Points to a firmware node (see "QE Firmware Node" below) 30 that contains the firmware that should be uploaded for this QE. 31 The compatible property for the firmware node should say, 32 "fsl,qe-firmware". 135 * QE Firmware Node 137 This node defines a firmware binary that is embedded in the device tree, for 138 the purpose of passing the firmware from bootloader to the kernel, or from 141 The firmware node itself contains the firmware binary contents, a compatible [all …]
|
| /OK3568_Linux_fs/kernel/drivers/soc/qcom/ |
| H A D | mdt_loader.c | 12 #include <linux/firmware.h> 36 * @fw: firmware object for the mdt file 38 * Returns size of the loaded firmware blob, or -EINVAL on failure. 40 ssize_t qcom_mdt_get_size(const struct firmware *fw) in qcom_mdt_get_size() 71 * @fw: firmware of mdt header or mbn 74 * The mechanism that performs the authentication of the loading firmware 79 * In the case of split firmware the hash is found directly following the ELF 86 void *qcom_mdt_read_metadata(const struct firmware *fw, size_t *data_len) in qcom_mdt_read_metadata() 129 static int __qcom_mdt_load(struct device *dev, const struct firmware *fw, in __qcom_mdt_load() 130 const char *firmware, int pas_id, void *mem_region, in __qcom_mdt_load() argument [all …]
|