mirror of
https://git.proxmox.com/git/fwupd
synced 2025-08-03 01:41:56 +00:00
Fix some typos spotted using codespell
This commit is contained in:
parent
02ac92c17c
commit
dce91204c9
@ -18,7 +18,7 @@ from the PackageKit Coding Style.
|
||||
* Prefer descriptive names over abbreviations (unless well-known)
|
||||
and shortening of names. e.g `device` not `dev`
|
||||
|
||||
* Single statments inside if/else should not be enclosed by '{}'
|
||||
* Single statements inside if/else should not be enclosed by '{}'
|
||||
|
||||
* Use comments to explain why something is being done, but also avoid
|
||||
over-documenting the obvious. Here is an example of useless comment:
|
||||
|
2
RELEASE
2
RELEASE
@ -29,7 +29,7 @@ git push
|
||||
|
||||
ninja dist
|
||||
|
||||
3a. Generate the additon verification metadata
|
||||
3a. Generate the additional verification metadata
|
||||
|
||||
gpg -b -a meson-dist/fwupd-${release_ver}.tar.xz
|
||||
|
||||
|
@ -90,7 +90,7 @@ The XML is organized by a top level element representing the dependencies needed
|
||||
|
||||
The child elements represent individual dependencies for all distributions.
|
||||
* This element has an attribute ***id*** that represents the most common package name used by distributions
|
||||
* This element has an attribute ***type*** that reprsents if the package is needed at build time or runtime.
|
||||
* This element has an attribute ***type*** that represents if the package is needed at build time or runtime.
|
||||
|
||||
Each dependency then has a mapping to individual distributions (___distro___).
|
||||
* This element has an attribute ***id*** that represents the distribution.
|
||||
|
@ -41,7 +41,7 @@ bin file inside the archive, I would pass `--exe dell-thunderbolt-firmware.exe -
|
||||
`--developer-name` Name of the firmware developer (e.g. Dell) **REQUIRED**
|
||||
|
||||
`--release-version` Version number of the firmware package (e.g. 4.21.01.002) **REQUIRED**
|
||||
`--release-description` Description of the firmware release, again this can theoretically include HTML but I didnt try it.
|
||||
`--release-description` Description of the firmware release, again this can theoretically include HTML but I didn't try it.
|
||||
|
||||
`--exe` Executable file to extract firmware from (e.g. `dell-thunderbolt-firmware.exe`) **REQUIRED**
|
||||
|
||||
|
@ -37,7 +37,7 @@ If, for instance, a plugin needs the old system firmware blob (for a bsdiff)
|
||||
then the plugin can write to this directory and the startup.sh script will be
|
||||
able to access it as the chroot-ed `/boot`.
|
||||
|
||||
Firmware `.cab` files using this funtionality should list the `.tar` file:
|
||||
Firmware `.cab` files using this functionality should list the `.tar` file:
|
||||
|
||||
<release>
|
||||
<checksum filename="firmware.tar" target="content"/>
|
||||
|
@ -291,7 +291,7 @@
|
||||
<li>Allow building with older meson</li>
|
||||
<li>Detect the EFI system partition location at runtime</li>
|
||||
<li>Do not use 8bitdo bootloader commands after a successful flash</li>
|
||||
<li>Enable accesing downloaded files in flatpak and snap</li>
|
||||
<li>Enable accessing downloaded files in flatpak and snap</li>
|
||||
<li>Fix a potential buffer overflow when applying a DFU patch</li>
|
||||
<li>Fix downgrading older releases to devices</li>
|
||||
<li>Fix flashing devices that require a manual replug</li>
|
||||
@ -405,7 +405,7 @@
|
||||
<li>Clarify which devices don't have upgrades</li>
|
||||
<li>Ensure the Thunderbolt version is xx.yy</li>
|
||||
<li>Fix a daemon warning when using fwupdmgr get-results</li>
|
||||
<li>Fix crasher with MST flashing</li>
|
||||
<li>Fix crash with MST flashing</li>
|
||||
<li>Fix DFU detach with newer releases of libusb</li>
|
||||
<li>Include the device VID and PID when generating the device-id</li>
|
||||
<li>Set the RemoteId when using GetDetails</li>
|
||||
@ -553,7 +553,7 @@
|
||||
<li>Disable unifying support if no CONFIG_HIDRAW support</li>
|
||||
<li>Do not auto-open all USB devices at startup</li>
|
||||
<li>Do not fail to load the daemon if cached metadata is invalid</li>
|
||||
<li>Do not use system-specific infomation for UEFI PCI devices</li>
|
||||
<li>Do not use system-specific information for UEFI PCI devices</li>
|
||||
<li>Fix a crash when using fu_plugin_device_add_delay()</li>
|
||||
<li>Fix the libdfu self test failure on s390 and ppc64</li>
|
||||
<li>Fix various printing issues with the progressbar</li>
|
||||
@ -648,7 +648,7 @@
|
||||
<li>Split up the Unifying HID++2.0 and HID++1.0 functionality</li>
|
||||
<li>Store the metadata files rather than merging to one store</li>
|
||||
<li>Use a longer timeout for some Unifying operations</li>
|
||||
<li>Use the UFY DeviceID prefix for Unifying devides</li>
|
||||
<li>Use the UFY DeviceID prefix for Unifying devices</li>
|
||||
</ul>
|
||||
</description>
|
||||
</release>
|
||||
|
@ -155,7 +155,7 @@ fu_plugin_startup (FuPlugin *plugin, GError **error)
|
||||
</section>
|
||||
|
||||
<section>
|
||||
<title>Creating an abstact device</title>
|
||||
<title>Creating an abstract device</title>
|
||||
<para>
|
||||
This section shows how you would create a device which is exported
|
||||
to the daemon and thus can be queried and updated by the client software.
|
||||
@ -294,7 +294,7 @@ fu_plugin_update (FuPlugin *plugin,
|
||||
For some hardware, we might want to do an action before or after
|
||||
the actual firmware is squirted into the device.
|
||||
This could be something as simple as checking the system battery
|
||||
level is over a certain theshold, or it could be as complicated as
|
||||
level is over a certain threshold, or it could be as complicated as
|
||||
ensuring a vendor-specific GPIO is asserted when specific types
|
||||
of hardware are updated.
|
||||
</para>
|
||||
@ -334,7 +334,7 @@ fu_plugin_update_cleanup (FuPlugin *plugin, FuDevice *device, GError **error)
|
||||
<title>Detaching to bootloader mode</title>
|
||||
<para>
|
||||
Some hardware can only be updated in a special bootloader mode, which
|
||||
for most devices can be switched to automaticaly.
|
||||
for most devices can be switched to automatically.
|
||||
In some cases the user to do something manually, for instance
|
||||
re-inserting the hardware with a secret button pressed.
|
||||
</para>
|
||||
|
@ -651,7 +651,7 @@ fwupd_client_proxy_call_cb (GObject *source, GAsyncResult *res, gpointer user_da
|
||||
* @error: the #GError, or %NULL
|
||||
*
|
||||
* Activates up a device, which normally means the device switches to a new
|
||||
* firmware verson. This should only be called when data loss cannot occur.
|
||||
* firmware version. This should only be called when data loss cannot occur.
|
||||
*
|
||||
* Returns: %TRUE for success
|
||||
*
|
||||
|
@ -180,7 +180,7 @@ typedef enum {
|
||||
* FwupdUpdateState:
|
||||
* @FWUPD_UPDATE_STATE_UNKNOWN: Unknown
|
||||
* @FWUPD_UPDATE_STATE_PENDING: Update is pending
|
||||
* @FWUPD_UPDATE_STATE_SUCCESS: Update was successfull
|
||||
* @FWUPD_UPDATE_STATE_SUCCESS: Update was successful
|
||||
* @FWUPD_UPDATE_STATE_FAILED: Update failed
|
||||
* @FWUPD_UPDATE_STATE_NEEDS_REBOOT: Waiting for a reboot to apply
|
||||
*
|
||||
|
@ -122,7 +122,7 @@ if get_option('introspection')
|
||||
# 2. The map file is required to build the lib that the GIR is built from
|
||||
#
|
||||
# To avoid the circular dep, and to ensure we don't change exported API
|
||||
# accidentaly actually check in a version of the version script to git.
|
||||
# accidentally actually check in a version of the version script to git.
|
||||
mapfile_target = custom_target('mapfile',
|
||||
input: gir[0],
|
||||
output: 'fwupd.map',
|
||||
|
@ -48,7 +48,7 @@ lt_revision = '0'
|
||||
lt_age = '0'
|
||||
lt_version = '@0@.@1@.@2@'.format(lt_current, lt_age, lt_revision)
|
||||
|
||||
# get suported warning flags
|
||||
# get supported warning flags
|
||||
warning_flags = [
|
||||
'-fstack-protector-strong',
|
||||
'-Waggregate-return',
|
||||
@ -77,7 +77,7 @@ warning_flags = [
|
||||
'-Wmissing-prototypes',
|
||||
'-Wnested-externs',
|
||||
'-Wno-cast-function-type',
|
||||
'-Wno-address-of-packed-member', # incompatable with g_autoptr()
|
||||
'-Wno-address-of-packed-member', # incompatible with g_autoptr()
|
||||
'-Wno-unknown-pragmas',
|
||||
'-Wno-discarded-qualifiers',
|
||||
'-Wno-missing-field-initializers',
|
||||
|
@ -715,7 +715,7 @@ fu_dell_dock_mst_invalidate_bank (FuDevice *symbiote, MSTBank bank_in_use,
|
||||
new_tag = g_bytes_get_data (bytes_new, NULL);
|
||||
g_debug ("CRC byte is currently 0x%x", new_tag[3]);
|
||||
|
||||
/* tag succesfully cleared */
|
||||
/* tag successfully cleared */
|
||||
if ((new_tag[3] == 0xff && crc_tag[3] != 0xff) ||
|
||||
(new_tag[3] == 0x00 && crc_tag[3] == 0xff)) {
|
||||
break;
|
||||
|
@ -115,7 +115,7 @@ typedef enum {
|
||||
* @DFU_CIPHER_KIND_XTEA: XTEA cipher detected
|
||||
* @DFU_CIPHER_KIND_RSA: RSA cipher detected
|
||||
*
|
||||
* The type of cipher used for transfering the firmware.
|
||||
* The type of cipher used for transferring the firmware.
|
||||
**/
|
||||
typedef enum {
|
||||
DFU_CIPHER_KIND_NONE,
|
||||
|
@ -228,7 +228,7 @@ dfu_element_set_target_size (DfuElement *element, guint32 target_size)
|
||||
g_assert (buf != NULL);
|
||||
memcpy (buf, data, length);
|
||||
|
||||
/* set the pading value */
|
||||
/* set the padding value */
|
||||
if (priv->padding_value != 0x00) {
|
||||
memset (buf + length,
|
||||
priv->padding_value,
|
||||
|
@ -161,7 +161,7 @@ dfu_firmware_to_metadata (DfuFirmware *firmware, GError **error)
|
||||
g_set_error (error,
|
||||
FWUPD_ERROR,
|
||||
FWUPD_ERROR_NOT_SUPPORTED,
|
||||
"metdata key too long: %s",
|
||||
"metadata key too long: %s",
|
||||
key);
|
||||
return NULL;
|
||||
}
|
||||
|
@ -222,7 +222,7 @@ dfu_firmware_dfu_func (void)
|
||||
g_assert_cmpint (dfu_firmware_get_size (firmware), ==, 0x8eB4);
|
||||
g_assert_cmpint (dfu_firmware_get_cipher_kind (firmware), ==, DFU_CIPHER_KIND_NONE);
|
||||
|
||||
/* can we roundtrip without loosing data */
|
||||
/* can we roundtrip without losing data */
|
||||
roundtrip_orig = dfu_self_test_get_bytes_for_file (file, &error);
|
||||
g_assert_no_error (error);
|
||||
g_assert (roundtrip_orig != NULL);
|
||||
@ -263,7 +263,7 @@ dfu_firmware_dfuse_func (void)
|
||||
g_assert_cmpint (dfu_firmware_get_size (firmware), ==, 0x168d5);
|
||||
g_assert_cmpint (dfu_firmware_get_cipher_kind (firmware), ==, DFU_CIPHER_KIND_NONE);
|
||||
|
||||
/* can we roundtrip without loosing data */
|
||||
/* can we roundtrip without losing data */
|
||||
roundtrip_orig = dfu_self_test_get_bytes_for_file (file, &error);
|
||||
g_assert_no_error (error);
|
||||
g_assert (roundtrip_orig != NULL);
|
||||
@ -308,7 +308,7 @@ dfu_firmware_metadata_func (void)
|
||||
g_assert_cmpstr (dfu_firmware_get_metadata (firmware, "key"), ==, "value");
|
||||
g_assert_cmpstr (dfu_firmware_get_metadata (firmware, "???"), ==, NULL);
|
||||
|
||||
/* can we roundtrip without loosing data */
|
||||
/* can we roundtrip without losing data */
|
||||
roundtrip_orig = dfu_self_test_get_bytes_for_file (file, &error);
|
||||
g_assert_no_error (error);
|
||||
g_assert (roundtrip_orig != NULL);
|
||||
|
@ -117,7 +117,7 @@ dfu_target_stm_upload_element (DfuTarget *target,
|
||||
g_set_error (error,
|
||||
FWUPD_ERROR,
|
||||
FWUPD_ERROR_NOT_SUPPORTED,
|
||||
"memory sector at 0x%04x is not readble",
|
||||
"memory sector at 0x%04x is not readable",
|
||||
(guint) offset);
|
||||
return NULL;
|
||||
}
|
||||
|
@ -1042,7 +1042,7 @@ dfu_target_upload (DfuTarget *target,
|
||||
if (zone_cur == zone_last)
|
||||
continue;
|
||||
|
||||
/* get the size of the entire continous zone */
|
||||
/* get the size of the entire continuous zone */
|
||||
zone_size = dfu_target_get_size_of_zone (target, zone_cur);
|
||||
zone_last = zone_cur;
|
||||
|
||||
|
@ -30,7 +30,7 @@ G_DECLARE_DERIVABLE_TYPE (DfuTarget, dfu_target, DFU, TARGET, GUsbDevice)
|
||||
* @DFU_TARGET_TRANSFER_FLAG_ANY_CIPHER: Allow any cipher kinds to be downloaded
|
||||
* @DFU_TARGET_TRANSFER_FLAG_ADDR_HEURISTIC: Automatically detect the address to use
|
||||
*
|
||||
* The optional flags used for transfering firmware.
|
||||
* The optional flags used for transferring firmware.
|
||||
**/
|
||||
typedef enum {
|
||||
DFU_TARGET_TRANSFER_FLAG_NONE = 0,
|
||||
|
@ -2156,7 +2156,7 @@ dfu_tool_detach (DfuToolPrivate *priv, gchar **values, GError **error)
|
||||
if (priv->transfer_size > 0)
|
||||
dfu_device_set_transfer_size (device, priv->transfer_size);
|
||||
|
||||
/* detatch */
|
||||
/* detach */
|
||||
locker = fu_device_locker_new (device, error);
|
||||
if (locker == NULL)
|
||||
return FALSE;
|
||||
|
@ -9,7 +9,7 @@ This plugin is used to update hardware that uses the fastboot protocol.
|
||||
Firmware Format
|
||||
---------------
|
||||
|
||||
The daemon will decompress the cabinet archive and extract a firmare blob in
|
||||
The daemon will decompress the cabinet archive and extract a firmware blob in
|
||||
ZIP file format. Inside the zip file must be all the firmware images for each
|
||||
partition and a manifest file. The partition images can be in any format, but
|
||||
the manifest must be either an Android `flashfile.xml` format file, or a QFIL
|
||||
|
@ -277,7 +277,7 @@ fu_rts54hid_device_setup (FuDevice *device, GError **error)
|
||||
if (!fu_rts54hid_device_ensure_status (self, error))
|
||||
return FALSE;
|
||||
|
||||
/* both conditons must be set */
|
||||
/* both conditions must be set */
|
||||
if (!self->fw_auth) {
|
||||
fu_device_set_update_error (device,
|
||||
"device does not support authentication");
|
||||
|
@ -272,7 +272,7 @@ fu_rts54hub_device_setup (FuDevice *device, GError **error)
|
||||
if (!fu_rts54hub_device_ensure_status (self, error))
|
||||
return FALSE;
|
||||
|
||||
/* all three conditons must be set */
|
||||
/* all three conditions must be set */
|
||||
if (!self->running_on_flash) {
|
||||
fu_device_set_update_error (device,
|
||||
"device is abnormally running from ROM");
|
||||
|
@ -25,7 +25,7 @@ G_BEGIN_DECLS
|
||||
#define SIO_LDNxx_IDX_IOBAD0 0x60 /* 16 bit */
|
||||
#define SIO_LDNxx_IDX_IOBAD1 0x62 /* 16 bit */
|
||||
|
||||
/* these registers are only accessable by EC */
|
||||
/* these registers are only accessible by EC */
|
||||
#define GCTRL_ECHIPID1 0x2000
|
||||
#define GCTRL_ECHIPID2 0x2001
|
||||
#define GCTRL_ECHIPVER 0x2002
|
||||
|
@ -317,7 +317,7 @@ fu_plugin_synapticsmst_enumerate (FuPlugin *plugin,
|
||||
dev_id_str = g_strdup_printf ("MST-DIRECT-%s-0-0", aux_node);
|
||||
fu_dev = fu_plugin_cache_lookup (plugin, dev_id_str);
|
||||
|
||||
/* If we open succesfully a device exists here */
|
||||
/* If we open successfully a device exists here */
|
||||
device = synapticsmst_device_new (SYNAPTICSMST_DEVICE_KIND_DIRECT, aux_node, 0, 0);
|
||||
if (!synapticsmst_device_open (device, &error_local)) {
|
||||
/* No device exists here, but was there - remove from DB */
|
||||
|
@ -424,7 +424,7 @@ fwup_delete_boot_entry(VOID)
|
||||
|
||||
/*
|
||||
* check if the boot path created by fwupdate,
|
||||
* check with EFI_LOAD_OPTION decription
|
||||
* check with EFI_LOAD_OPTION description
|
||||
*/
|
||||
EFI_LOAD_OPTION *load_op = (EFI_LOAD_OPTION *) info_ptr;
|
||||
if (_StrHasPrefix(load_op->description, L"Linux Firmware Updater") ||
|
||||
|
@ -10,7 +10,7 @@ Nordic (U0007) device and the Texas Instruments (U0008) version.
|
||||
This plugin will not work with the different "Nano" dongle (U0010) as it does
|
||||
not use the Unifying protocol.
|
||||
|
||||
Some bootloader protocol infomation was taken from the Mousejack[1] project,
|
||||
Some bootloader protocol information was taken from the Mousejack[1] project,
|
||||
specifically logitech-usb-restore.py and unifying.py. Other documentation was
|
||||
supplied by Logitech.
|
||||
|
||||
|
@ -157,7 +157,7 @@ fu_unifying_bootloader_texas_write_firmware (FuDevice *device, GBytes *fw, GErro
|
||||
memcpy (req->data, payload->data, payload->len);
|
||||
if (!fu_unifying_bootloader_request (self, req, error)) {
|
||||
g_prefix_error (error,
|
||||
"failed to write ram bufer @0x%02x: ",
|
||||
"failed to write ram buffer @0x%02x: ",
|
||||
req->addr);
|
||||
return FALSE;
|
||||
}
|
||||
|
@ -210,7 +210,7 @@ fu_unifying_peripheral_poll (FuDevice *device, GError **error)
|
||||
g_warning ("failed to get pending read: %s", error_local->message);
|
||||
return TRUE;
|
||||
}
|
||||
/* no data to recieve */
|
||||
/* no data to receive */
|
||||
g_clear_error (&error_local);
|
||||
}
|
||||
|
||||
|
@ -14,7 +14,7 @@ understanding it would be used to build a plugin under a LGPLv2+ licence.
|
||||
Wacom devices are actually composite devices, with the main ARM CPU being
|
||||
programmed using a more complicated erase, write, verify algorithm based
|
||||
on a historical update protocol. The "sub-module" devices use a newer protocol,
|
||||
again based on HID, but are handled differently depending on thier type.
|
||||
again based on HID, but are handled differently depending on their type.
|
||||
|
||||
Firmware Format
|
||||
---------------
|
||||
|
@ -120,7 +120,7 @@ fu_device_list_get_all (FuDeviceList *self)
|
||||
* @self: A #FuDeviceList
|
||||
*
|
||||
* Returns all the active devices that have been added to the device list.
|
||||
* An active device is defined as a device that is currently conected and has
|
||||
* An active device is defined as a device that is currently connected and has
|
||||
* is owned by a plugin.
|
||||
*
|
||||
* Returns: (transfer container) (element-type FuDevice): the devices
|
||||
@ -649,7 +649,7 @@ fu_device_list_replug_cb (gpointer user_data)
|
||||
* @device: A #FuDevice
|
||||
* @error: A #GError, or %NULL
|
||||
*
|
||||
* Waits for a specific devic to replug if %FWUPD_DEVICE_FLAG_WAIT_FOR_REPLUG
|
||||
* Waits for a specific device to replug if %FWUPD_DEVICE_FLAG_WAIT_FOR_REPLUG
|
||||
* is set.
|
||||
*
|
||||
* If the device does not exist this function returns without an error.
|
||||
|
@ -2148,7 +2148,7 @@ fu_device_setup (FuDevice *self, GError **error)
|
||||
* @error: A #GError, or %NULL
|
||||
*
|
||||
* Activates up a device, which normally means the device switches to a new
|
||||
* firmware verson. This should only be called when data loss cannot occur.
|
||||
* firmware version. This should only be called when data loss cannot occur.
|
||||
*
|
||||
* Returns: %TRUE for success
|
||||
*
|
||||
|
@ -1355,7 +1355,7 @@ fu_engine_create_release_metadata (FuEngine *self, FuPlugin *plugin, GError **er
|
||||
* @flags: The #FwupdInstallFlags, e.g. %FWUPD_DEVICE_FLAG_UPDATABLE
|
||||
* @error: A #GError, or %NULL
|
||||
*
|
||||
* Installs a specfic firmware file on a device.
|
||||
* Installs a specific firmware file on a device.
|
||||
*
|
||||
* By this point all the requirements and tests should have been done in
|
||||
* fu_engine_check_requirements() so this should not fail before running
|
||||
@ -3027,7 +3027,7 @@ fu_engine_get_downgrades (FuEngine *self, const gchar *device_id, GError **error
|
||||
continue;
|
||||
}
|
||||
|
||||
/* don't show releases we are not allowed to dowgrade to */
|
||||
/* don't show releases we are not allowed to downgrade to */
|
||||
if (fwupd_release_has_flag (rel_tmp, FWUPD_RELEASE_FLAG_BLOCKED_VERSION)) {
|
||||
g_string_append_printf (error_str, "%s=lowest, ",
|
||||
fwupd_release_get_version (rel_tmp));
|
||||
|
@ -21,7 +21,7 @@
|
||||
*
|
||||
* This list of plugins provides a way to get the specific plugin quickly using
|
||||
* a hash table and also any plugin-list specific functionality such as
|
||||
* sorting by dependancy order.
|
||||
* sorting by dependency order.
|
||||
*
|
||||
* See also: #FuPlugin
|
||||
*/
|
||||
|
@ -667,7 +667,7 @@ fu_plugin_set_runtime_versions (FuPlugin *self, GHashTable *runtime_versions)
|
||||
* @component_id: An AppStream component id, e.g. "org.gnome.Software"
|
||||
* @version: A version string, e.g. "1.2.3"
|
||||
*
|
||||
* Sets a runtime version of a specific dependancy.
|
||||
* Sets a runtime version of a specific dependency.
|
||||
*
|
||||
* Since: 1.0.7
|
||||
**/
|
||||
@ -697,7 +697,7 @@ fu_plugin_set_compile_versions (FuPlugin *self, GHashTable *compile_versions)
|
||||
* @component_id: An AppStream component id, e.g. "org.gnome.Software"
|
||||
* @version: A version string, e.g. "1.2.3"
|
||||
*
|
||||
* Sets a compile-time version of a specific dependancy.
|
||||
* Sets a compile-time version of a specific dependency.
|
||||
*
|
||||
* Since: 1.0.7
|
||||
**/
|
||||
|
@ -982,7 +982,7 @@ fu_util_download_chunk_cb (SoupMessage *msg, SoupBuffer *chunk, gpointer user_da
|
||||
if (header_size < body_length)
|
||||
return;
|
||||
|
||||
/* calulate percentage */
|
||||
/* calculate percentage */
|
||||
percentage = (guint) ((100 * body_length) / header_size);
|
||||
g_debug ("progress: %u%%", percentage);
|
||||
fu_progressbar_update (priv->progressbar, FWUPD_STATUS_DOWNLOADING, percentage);
|
||||
|
@ -6,7 +6,7 @@
|
||||
<doc:doc>
|
||||
<doc:description>
|
||||
<doc:para>
|
||||
The interface used for quering firmware for the system.
|
||||
The interface used for querying firmware for the system.
|
||||
</doc:para>
|
||||
</doc:description>
|
||||
</doc:doc>
|
||||
|
Loading…
Reference in New Issue
Block a user