mirror of
https://git.proxmox.com/git/fwupd
synced 2025-08-08 05:17:31 +00:00
Fix some typos spotted using codespell
This commit is contained in:
parent
02ac92c17c
commit
dce91204c9
@ -18,7 +18,7 @@ from the PackageKit Coding Style.
|
|||||||
* Prefer descriptive names over abbreviations (unless well-known)
|
* Prefer descriptive names over abbreviations (unless well-known)
|
||||||
and shortening of names. e.g `device` not `dev`
|
and shortening of names. e.g `device` not `dev`
|
||||||
|
|
||||||
* Single statments inside if/else should not be enclosed by '{}'
|
* Single statements inside if/else should not be enclosed by '{}'
|
||||||
|
|
||||||
* Use comments to explain why something is being done, but also avoid
|
* Use comments to explain why something is being done, but also avoid
|
||||||
over-documenting the obvious. Here is an example of useless comment:
|
over-documenting the obvious. Here is an example of useless comment:
|
||||||
|
2
RELEASE
2
RELEASE
@ -29,7 +29,7 @@ git push
|
|||||||
|
|
||||||
ninja dist
|
ninja dist
|
||||||
|
|
||||||
3a. Generate the additon verification metadata
|
3a. Generate the additional verification metadata
|
||||||
|
|
||||||
gpg -b -a meson-dist/fwupd-${release_ver}.tar.xz
|
gpg -b -a meson-dist/fwupd-${release_ver}.tar.xz
|
||||||
|
|
||||||
|
@ -90,7 +90,7 @@ The XML is organized by a top level element representing the dependencies needed
|
|||||||
|
|
||||||
The child elements represent individual dependencies for all distributions.
|
The child elements represent individual dependencies for all distributions.
|
||||||
* This element has an attribute ***id*** that represents the most common package name used by distributions
|
* This element has an attribute ***id*** that represents the most common package name used by distributions
|
||||||
* This element has an attribute ***type*** that reprsents if the package is needed at build time or runtime.
|
* This element has an attribute ***type*** that represents if the package is needed at build time or runtime.
|
||||||
|
|
||||||
Each dependency then has a mapping to individual distributions (___distro___).
|
Each dependency then has a mapping to individual distributions (___distro___).
|
||||||
* This element has an attribute ***id*** that represents the distribution.
|
* This element has an attribute ***id*** that represents the distribution.
|
||||||
|
@ -41,7 +41,7 @@ bin file inside the archive, I would pass `--exe dell-thunderbolt-firmware.exe -
|
|||||||
`--developer-name` Name of the firmware developer (e.g. Dell) **REQUIRED**
|
`--developer-name` Name of the firmware developer (e.g. Dell) **REQUIRED**
|
||||||
|
|
||||||
`--release-version` Version number of the firmware package (e.g. 4.21.01.002) **REQUIRED**
|
`--release-version` Version number of the firmware package (e.g. 4.21.01.002) **REQUIRED**
|
||||||
`--release-description` Description of the firmware release, again this can theoretically include HTML but I didnt try it.
|
`--release-description` Description of the firmware release, again this can theoretically include HTML but I didn't try it.
|
||||||
|
|
||||||
`--exe` Executable file to extract firmware from (e.g. `dell-thunderbolt-firmware.exe`) **REQUIRED**
|
`--exe` Executable file to extract firmware from (e.g. `dell-thunderbolt-firmware.exe`) **REQUIRED**
|
||||||
|
|
||||||
|
@ -37,7 +37,7 @@ If, for instance, a plugin needs the old system firmware blob (for a bsdiff)
|
|||||||
then the plugin can write to this directory and the startup.sh script will be
|
then the plugin can write to this directory and the startup.sh script will be
|
||||||
able to access it as the chroot-ed `/boot`.
|
able to access it as the chroot-ed `/boot`.
|
||||||
|
|
||||||
Firmware `.cab` files using this funtionality should list the `.tar` file:
|
Firmware `.cab` files using this functionality should list the `.tar` file:
|
||||||
|
|
||||||
<release>
|
<release>
|
||||||
<checksum filename="firmware.tar" target="content"/>
|
<checksum filename="firmware.tar" target="content"/>
|
||||||
|
@ -291,7 +291,7 @@
|
|||||||
<li>Allow building with older meson</li>
|
<li>Allow building with older meson</li>
|
||||||
<li>Detect the EFI system partition location at runtime</li>
|
<li>Detect the EFI system partition location at runtime</li>
|
||||||
<li>Do not use 8bitdo bootloader commands after a successful flash</li>
|
<li>Do not use 8bitdo bootloader commands after a successful flash</li>
|
||||||
<li>Enable accesing downloaded files in flatpak and snap</li>
|
<li>Enable accessing downloaded files in flatpak and snap</li>
|
||||||
<li>Fix a potential buffer overflow when applying a DFU patch</li>
|
<li>Fix a potential buffer overflow when applying a DFU patch</li>
|
||||||
<li>Fix downgrading older releases to devices</li>
|
<li>Fix downgrading older releases to devices</li>
|
||||||
<li>Fix flashing devices that require a manual replug</li>
|
<li>Fix flashing devices that require a manual replug</li>
|
||||||
@ -405,7 +405,7 @@
|
|||||||
<li>Clarify which devices don't have upgrades</li>
|
<li>Clarify which devices don't have upgrades</li>
|
||||||
<li>Ensure the Thunderbolt version is xx.yy</li>
|
<li>Ensure the Thunderbolt version is xx.yy</li>
|
||||||
<li>Fix a daemon warning when using fwupdmgr get-results</li>
|
<li>Fix a daemon warning when using fwupdmgr get-results</li>
|
||||||
<li>Fix crasher with MST flashing</li>
|
<li>Fix crash with MST flashing</li>
|
||||||
<li>Fix DFU detach with newer releases of libusb</li>
|
<li>Fix DFU detach with newer releases of libusb</li>
|
||||||
<li>Include the device VID and PID when generating the device-id</li>
|
<li>Include the device VID and PID when generating the device-id</li>
|
||||||
<li>Set the RemoteId when using GetDetails</li>
|
<li>Set the RemoteId when using GetDetails</li>
|
||||||
@ -553,7 +553,7 @@
|
|||||||
<li>Disable unifying support if no CONFIG_HIDRAW support</li>
|
<li>Disable unifying support if no CONFIG_HIDRAW support</li>
|
||||||
<li>Do not auto-open all USB devices at startup</li>
|
<li>Do not auto-open all USB devices at startup</li>
|
||||||
<li>Do not fail to load the daemon if cached metadata is invalid</li>
|
<li>Do not fail to load the daemon if cached metadata is invalid</li>
|
||||||
<li>Do not use system-specific infomation for UEFI PCI devices</li>
|
<li>Do not use system-specific information for UEFI PCI devices</li>
|
||||||
<li>Fix a crash when using fu_plugin_device_add_delay()</li>
|
<li>Fix a crash when using fu_plugin_device_add_delay()</li>
|
||||||
<li>Fix the libdfu self test failure on s390 and ppc64</li>
|
<li>Fix the libdfu self test failure on s390 and ppc64</li>
|
||||||
<li>Fix various printing issues with the progressbar</li>
|
<li>Fix various printing issues with the progressbar</li>
|
||||||
@ -648,7 +648,7 @@
|
|||||||
<li>Split up the Unifying HID++2.0 and HID++1.0 functionality</li>
|
<li>Split up the Unifying HID++2.0 and HID++1.0 functionality</li>
|
||||||
<li>Store the metadata files rather than merging to one store</li>
|
<li>Store the metadata files rather than merging to one store</li>
|
||||||
<li>Use a longer timeout for some Unifying operations</li>
|
<li>Use a longer timeout for some Unifying operations</li>
|
||||||
<li>Use the UFY DeviceID prefix for Unifying devides</li>
|
<li>Use the UFY DeviceID prefix for Unifying devices</li>
|
||||||
</ul>
|
</ul>
|
||||||
</description>
|
</description>
|
||||||
</release>
|
</release>
|
||||||
|
@ -155,7 +155,7 @@ fu_plugin_startup (FuPlugin *plugin, GError **error)
|
|||||||
</section>
|
</section>
|
||||||
|
|
||||||
<section>
|
<section>
|
||||||
<title>Creating an abstact device</title>
|
<title>Creating an abstract device</title>
|
||||||
<para>
|
<para>
|
||||||
This section shows how you would create a device which is exported
|
This section shows how you would create a device which is exported
|
||||||
to the daemon and thus can be queried and updated by the client software.
|
to the daemon and thus can be queried and updated by the client software.
|
||||||
@ -294,7 +294,7 @@ fu_plugin_update (FuPlugin *plugin,
|
|||||||
For some hardware, we might want to do an action before or after
|
For some hardware, we might want to do an action before or after
|
||||||
the actual firmware is squirted into the device.
|
the actual firmware is squirted into the device.
|
||||||
This could be something as simple as checking the system battery
|
This could be something as simple as checking the system battery
|
||||||
level is over a certain theshold, or it could be as complicated as
|
level is over a certain threshold, or it could be as complicated as
|
||||||
ensuring a vendor-specific GPIO is asserted when specific types
|
ensuring a vendor-specific GPIO is asserted when specific types
|
||||||
of hardware are updated.
|
of hardware are updated.
|
||||||
</para>
|
</para>
|
||||||
@ -334,7 +334,7 @@ fu_plugin_update_cleanup (FuPlugin *plugin, FuDevice *device, GError **error)
|
|||||||
<title>Detaching to bootloader mode</title>
|
<title>Detaching to bootloader mode</title>
|
||||||
<para>
|
<para>
|
||||||
Some hardware can only be updated in a special bootloader mode, which
|
Some hardware can only be updated in a special bootloader mode, which
|
||||||
for most devices can be switched to automaticaly.
|
for most devices can be switched to automatically.
|
||||||
In some cases the user to do something manually, for instance
|
In some cases the user to do something manually, for instance
|
||||||
re-inserting the hardware with a secret button pressed.
|
re-inserting the hardware with a secret button pressed.
|
||||||
</para>
|
</para>
|
||||||
|
@ -651,7 +651,7 @@ fwupd_client_proxy_call_cb (GObject *source, GAsyncResult *res, gpointer user_da
|
|||||||
* @error: the #GError, or %NULL
|
* @error: the #GError, or %NULL
|
||||||
*
|
*
|
||||||
* Activates up a device, which normally means the device switches to a new
|
* Activates up a device, which normally means the device switches to a new
|
||||||
* firmware verson. This should only be called when data loss cannot occur.
|
* firmware version. This should only be called when data loss cannot occur.
|
||||||
*
|
*
|
||||||
* Returns: %TRUE for success
|
* Returns: %TRUE for success
|
||||||
*
|
*
|
||||||
|
@ -180,7 +180,7 @@ typedef enum {
|
|||||||
* FwupdUpdateState:
|
* FwupdUpdateState:
|
||||||
* @FWUPD_UPDATE_STATE_UNKNOWN: Unknown
|
* @FWUPD_UPDATE_STATE_UNKNOWN: Unknown
|
||||||
* @FWUPD_UPDATE_STATE_PENDING: Update is pending
|
* @FWUPD_UPDATE_STATE_PENDING: Update is pending
|
||||||
* @FWUPD_UPDATE_STATE_SUCCESS: Update was successfull
|
* @FWUPD_UPDATE_STATE_SUCCESS: Update was successful
|
||||||
* @FWUPD_UPDATE_STATE_FAILED: Update failed
|
* @FWUPD_UPDATE_STATE_FAILED: Update failed
|
||||||
* @FWUPD_UPDATE_STATE_NEEDS_REBOOT: Waiting for a reboot to apply
|
* @FWUPD_UPDATE_STATE_NEEDS_REBOOT: Waiting for a reboot to apply
|
||||||
*
|
*
|
||||||
|
@ -122,7 +122,7 @@ if get_option('introspection')
|
|||||||
# 2. The map file is required to build the lib that the GIR is built from
|
# 2. The map file is required to build the lib that the GIR is built from
|
||||||
#
|
#
|
||||||
# To avoid the circular dep, and to ensure we don't change exported API
|
# To avoid the circular dep, and to ensure we don't change exported API
|
||||||
# accidentaly actually check in a version of the version script to git.
|
# accidentally actually check in a version of the version script to git.
|
||||||
mapfile_target = custom_target('mapfile',
|
mapfile_target = custom_target('mapfile',
|
||||||
input: gir[0],
|
input: gir[0],
|
||||||
output: 'fwupd.map',
|
output: 'fwupd.map',
|
||||||
|
@ -48,7 +48,7 @@ lt_revision = '0'
|
|||||||
lt_age = '0'
|
lt_age = '0'
|
||||||
lt_version = '@0@.@1@.@2@'.format(lt_current, lt_age, lt_revision)
|
lt_version = '@0@.@1@.@2@'.format(lt_current, lt_age, lt_revision)
|
||||||
|
|
||||||
# get suported warning flags
|
# get supported warning flags
|
||||||
warning_flags = [
|
warning_flags = [
|
||||||
'-fstack-protector-strong',
|
'-fstack-protector-strong',
|
||||||
'-Waggregate-return',
|
'-Waggregate-return',
|
||||||
@ -77,7 +77,7 @@ warning_flags = [
|
|||||||
'-Wmissing-prototypes',
|
'-Wmissing-prototypes',
|
||||||
'-Wnested-externs',
|
'-Wnested-externs',
|
||||||
'-Wno-cast-function-type',
|
'-Wno-cast-function-type',
|
||||||
'-Wno-address-of-packed-member', # incompatable with g_autoptr()
|
'-Wno-address-of-packed-member', # incompatible with g_autoptr()
|
||||||
'-Wno-unknown-pragmas',
|
'-Wno-unknown-pragmas',
|
||||||
'-Wno-discarded-qualifiers',
|
'-Wno-discarded-qualifiers',
|
||||||
'-Wno-missing-field-initializers',
|
'-Wno-missing-field-initializers',
|
||||||
|
@ -715,7 +715,7 @@ fu_dell_dock_mst_invalidate_bank (FuDevice *symbiote, MSTBank bank_in_use,
|
|||||||
new_tag = g_bytes_get_data (bytes_new, NULL);
|
new_tag = g_bytes_get_data (bytes_new, NULL);
|
||||||
g_debug ("CRC byte is currently 0x%x", new_tag[3]);
|
g_debug ("CRC byte is currently 0x%x", new_tag[3]);
|
||||||
|
|
||||||
/* tag succesfully cleared */
|
/* tag successfully cleared */
|
||||||
if ((new_tag[3] == 0xff && crc_tag[3] != 0xff) ||
|
if ((new_tag[3] == 0xff && crc_tag[3] != 0xff) ||
|
||||||
(new_tag[3] == 0x00 && crc_tag[3] == 0xff)) {
|
(new_tag[3] == 0x00 && crc_tag[3] == 0xff)) {
|
||||||
break;
|
break;
|
||||||
|
@ -115,7 +115,7 @@ typedef enum {
|
|||||||
* @DFU_CIPHER_KIND_XTEA: XTEA cipher detected
|
* @DFU_CIPHER_KIND_XTEA: XTEA cipher detected
|
||||||
* @DFU_CIPHER_KIND_RSA: RSA cipher detected
|
* @DFU_CIPHER_KIND_RSA: RSA cipher detected
|
||||||
*
|
*
|
||||||
* The type of cipher used for transfering the firmware.
|
* The type of cipher used for transferring the firmware.
|
||||||
**/
|
**/
|
||||||
typedef enum {
|
typedef enum {
|
||||||
DFU_CIPHER_KIND_NONE,
|
DFU_CIPHER_KIND_NONE,
|
||||||
|
@ -228,7 +228,7 @@ dfu_element_set_target_size (DfuElement *element, guint32 target_size)
|
|||||||
g_assert (buf != NULL);
|
g_assert (buf != NULL);
|
||||||
memcpy (buf, data, length);
|
memcpy (buf, data, length);
|
||||||
|
|
||||||
/* set the pading value */
|
/* set the padding value */
|
||||||
if (priv->padding_value != 0x00) {
|
if (priv->padding_value != 0x00) {
|
||||||
memset (buf + length,
|
memset (buf + length,
|
||||||
priv->padding_value,
|
priv->padding_value,
|
||||||
|
@ -161,7 +161,7 @@ dfu_firmware_to_metadata (DfuFirmware *firmware, GError **error)
|
|||||||
g_set_error (error,
|
g_set_error (error,
|
||||||
FWUPD_ERROR,
|
FWUPD_ERROR,
|
||||||
FWUPD_ERROR_NOT_SUPPORTED,
|
FWUPD_ERROR_NOT_SUPPORTED,
|
||||||
"metdata key too long: %s",
|
"metadata key too long: %s",
|
||||||
key);
|
key);
|
||||||
return NULL;
|
return NULL;
|
||||||
}
|
}
|
||||||
|
@ -222,7 +222,7 @@ dfu_firmware_dfu_func (void)
|
|||||||
g_assert_cmpint (dfu_firmware_get_size (firmware), ==, 0x8eB4);
|
g_assert_cmpint (dfu_firmware_get_size (firmware), ==, 0x8eB4);
|
||||||
g_assert_cmpint (dfu_firmware_get_cipher_kind (firmware), ==, DFU_CIPHER_KIND_NONE);
|
g_assert_cmpint (dfu_firmware_get_cipher_kind (firmware), ==, DFU_CIPHER_KIND_NONE);
|
||||||
|
|
||||||
/* can we roundtrip without loosing data */
|
/* can we roundtrip without losing data */
|
||||||
roundtrip_orig = dfu_self_test_get_bytes_for_file (file, &error);
|
roundtrip_orig = dfu_self_test_get_bytes_for_file (file, &error);
|
||||||
g_assert_no_error (error);
|
g_assert_no_error (error);
|
||||||
g_assert (roundtrip_orig != NULL);
|
g_assert (roundtrip_orig != NULL);
|
||||||
@ -263,7 +263,7 @@ dfu_firmware_dfuse_func (void)
|
|||||||
g_assert_cmpint (dfu_firmware_get_size (firmware), ==, 0x168d5);
|
g_assert_cmpint (dfu_firmware_get_size (firmware), ==, 0x168d5);
|
||||||
g_assert_cmpint (dfu_firmware_get_cipher_kind (firmware), ==, DFU_CIPHER_KIND_NONE);
|
g_assert_cmpint (dfu_firmware_get_cipher_kind (firmware), ==, DFU_CIPHER_KIND_NONE);
|
||||||
|
|
||||||
/* can we roundtrip without loosing data */
|
/* can we roundtrip without losing data */
|
||||||
roundtrip_orig = dfu_self_test_get_bytes_for_file (file, &error);
|
roundtrip_orig = dfu_self_test_get_bytes_for_file (file, &error);
|
||||||
g_assert_no_error (error);
|
g_assert_no_error (error);
|
||||||
g_assert (roundtrip_orig != NULL);
|
g_assert (roundtrip_orig != NULL);
|
||||||
@ -308,7 +308,7 @@ dfu_firmware_metadata_func (void)
|
|||||||
g_assert_cmpstr (dfu_firmware_get_metadata (firmware, "key"), ==, "value");
|
g_assert_cmpstr (dfu_firmware_get_metadata (firmware, "key"), ==, "value");
|
||||||
g_assert_cmpstr (dfu_firmware_get_metadata (firmware, "???"), ==, NULL);
|
g_assert_cmpstr (dfu_firmware_get_metadata (firmware, "???"), ==, NULL);
|
||||||
|
|
||||||
/* can we roundtrip without loosing data */
|
/* can we roundtrip without losing data */
|
||||||
roundtrip_orig = dfu_self_test_get_bytes_for_file (file, &error);
|
roundtrip_orig = dfu_self_test_get_bytes_for_file (file, &error);
|
||||||
g_assert_no_error (error);
|
g_assert_no_error (error);
|
||||||
g_assert (roundtrip_orig != NULL);
|
g_assert (roundtrip_orig != NULL);
|
||||||
|
@ -117,7 +117,7 @@ dfu_target_stm_upload_element (DfuTarget *target,
|
|||||||
g_set_error (error,
|
g_set_error (error,
|
||||||
FWUPD_ERROR,
|
FWUPD_ERROR,
|
||||||
FWUPD_ERROR_NOT_SUPPORTED,
|
FWUPD_ERROR_NOT_SUPPORTED,
|
||||||
"memory sector at 0x%04x is not readble",
|
"memory sector at 0x%04x is not readable",
|
||||||
(guint) offset);
|
(guint) offset);
|
||||||
return NULL;
|
return NULL;
|
||||||
}
|
}
|
||||||
|
@ -1042,7 +1042,7 @@ dfu_target_upload (DfuTarget *target,
|
|||||||
if (zone_cur == zone_last)
|
if (zone_cur == zone_last)
|
||||||
continue;
|
continue;
|
||||||
|
|
||||||
/* get the size of the entire continous zone */
|
/* get the size of the entire continuous zone */
|
||||||
zone_size = dfu_target_get_size_of_zone (target, zone_cur);
|
zone_size = dfu_target_get_size_of_zone (target, zone_cur);
|
||||||
zone_last = zone_cur;
|
zone_last = zone_cur;
|
||||||
|
|
||||||
|
@ -30,7 +30,7 @@ G_DECLARE_DERIVABLE_TYPE (DfuTarget, dfu_target, DFU, TARGET, GUsbDevice)
|
|||||||
* @DFU_TARGET_TRANSFER_FLAG_ANY_CIPHER: Allow any cipher kinds to be downloaded
|
* @DFU_TARGET_TRANSFER_FLAG_ANY_CIPHER: Allow any cipher kinds to be downloaded
|
||||||
* @DFU_TARGET_TRANSFER_FLAG_ADDR_HEURISTIC: Automatically detect the address to use
|
* @DFU_TARGET_TRANSFER_FLAG_ADDR_HEURISTIC: Automatically detect the address to use
|
||||||
*
|
*
|
||||||
* The optional flags used for transfering firmware.
|
* The optional flags used for transferring firmware.
|
||||||
**/
|
**/
|
||||||
typedef enum {
|
typedef enum {
|
||||||
DFU_TARGET_TRANSFER_FLAG_NONE = 0,
|
DFU_TARGET_TRANSFER_FLAG_NONE = 0,
|
||||||
|
@ -2156,7 +2156,7 @@ dfu_tool_detach (DfuToolPrivate *priv, gchar **values, GError **error)
|
|||||||
if (priv->transfer_size > 0)
|
if (priv->transfer_size > 0)
|
||||||
dfu_device_set_transfer_size (device, priv->transfer_size);
|
dfu_device_set_transfer_size (device, priv->transfer_size);
|
||||||
|
|
||||||
/* detatch */
|
/* detach */
|
||||||
locker = fu_device_locker_new (device, error);
|
locker = fu_device_locker_new (device, error);
|
||||||
if (locker == NULL)
|
if (locker == NULL)
|
||||||
return FALSE;
|
return FALSE;
|
||||||
|
@ -9,7 +9,7 @@ This plugin is used to update hardware that uses the fastboot protocol.
|
|||||||
Firmware Format
|
Firmware Format
|
||||||
---------------
|
---------------
|
||||||
|
|
||||||
The daemon will decompress the cabinet archive and extract a firmare blob in
|
The daemon will decompress the cabinet archive and extract a firmware blob in
|
||||||
ZIP file format. Inside the zip file must be all the firmware images for each
|
ZIP file format. Inside the zip file must be all the firmware images for each
|
||||||
partition and a manifest file. The partition images can be in any format, but
|
partition and a manifest file. The partition images can be in any format, but
|
||||||
the manifest must be either an Android `flashfile.xml` format file, or a QFIL
|
the manifest must be either an Android `flashfile.xml` format file, or a QFIL
|
||||||
|
@ -277,7 +277,7 @@ fu_rts54hid_device_setup (FuDevice *device, GError **error)
|
|||||||
if (!fu_rts54hid_device_ensure_status (self, error))
|
if (!fu_rts54hid_device_ensure_status (self, error))
|
||||||
return FALSE;
|
return FALSE;
|
||||||
|
|
||||||
/* both conditons must be set */
|
/* both conditions must be set */
|
||||||
if (!self->fw_auth) {
|
if (!self->fw_auth) {
|
||||||
fu_device_set_update_error (device,
|
fu_device_set_update_error (device,
|
||||||
"device does not support authentication");
|
"device does not support authentication");
|
||||||
|
@ -272,7 +272,7 @@ fu_rts54hub_device_setup (FuDevice *device, GError **error)
|
|||||||
if (!fu_rts54hub_device_ensure_status (self, error))
|
if (!fu_rts54hub_device_ensure_status (self, error))
|
||||||
return FALSE;
|
return FALSE;
|
||||||
|
|
||||||
/* all three conditons must be set */
|
/* all three conditions must be set */
|
||||||
if (!self->running_on_flash) {
|
if (!self->running_on_flash) {
|
||||||
fu_device_set_update_error (device,
|
fu_device_set_update_error (device,
|
||||||
"device is abnormally running from ROM");
|
"device is abnormally running from ROM");
|
||||||
|
@ -25,7 +25,7 @@ G_BEGIN_DECLS
|
|||||||
#define SIO_LDNxx_IDX_IOBAD0 0x60 /* 16 bit */
|
#define SIO_LDNxx_IDX_IOBAD0 0x60 /* 16 bit */
|
||||||
#define SIO_LDNxx_IDX_IOBAD1 0x62 /* 16 bit */
|
#define SIO_LDNxx_IDX_IOBAD1 0x62 /* 16 bit */
|
||||||
|
|
||||||
/* these registers are only accessable by EC */
|
/* these registers are only accessible by EC */
|
||||||
#define GCTRL_ECHIPID1 0x2000
|
#define GCTRL_ECHIPID1 0x2000
|
||||||
#define GCTRL_ECHIPID2 0x2001
|
#define GCTRL_ECHIPID2 0x2001
|
||||||
#define GCTRL_ECHIPVER 0x2002
|
#define GCTRL_ECHIPVER 0x2002
|
||||||
|
@ -317,7 +317,7 @@ fu_plugin_synapticsmst_enumerate (FuPlugin *plugin,
|
|||||||
dev_id_str = g_strdup_printf ("MST-DIRECT-%s-0-0", aux_node);
|
dev_id_str = g_strdup_printf ("MST-DIRECT-%s-0-0", aux_node);
|
||||||
fu_dev = fu_plugin_cache_lookup (plugin, dev_id_str);
|
fu_dev = fu_plugin_cache_lookup (plugin, dev_id_str);
|
||||||
|
|
||||||
/* If we open succesfully a device exists here */
|
/* If we open successfully a device exists here */
|
||||||
device = synapticsmst_device_new (SYNAPTICSMST_DEVICE_KIND_DIRECT, aux_node, 0, 0);
|
device = synapticsmst_device_new (SYNAPTICSMST_DEVICE_KIND_DIRECT, aux_node, 0, 0);
|
||||||
if (!synapticsmst_device_open (device, &error_local)) {
|
if (!synapticsmst_device_open (device, &error_local)) {
|
||||||
/* No device exists here, but was there - remove from DB */
|
/* No device exists here, but was there - remove from DB */
|
||||||
|
@ -424,7 +424,7 @@ fwup_delete_boot_entry(VOID)
|
|||||||
|
|
||||||
/*
|
/*
|
||||||
* check if the boot path created by fwupdate,
|
* check if the boot path created by fwupdate,
|
||||||
* check with EFI_LOAD_OPTION decription
|
* check with EFI_LOAD_OPTION description
|
||||||
*/
|
*/
|
||||||
EFI_LOAD_OPTION *load_op = (EFI_LOAD_OPTION *) info_ptr;
|
EFI_LOAD_OPTION *load_op = (EFI_LOAD_OPTION *) info_ptr;
|
||||||
if (_StrHasPrefix(load_op->description, L"Linux Firmware Updater") ||
|
if (_StrHasPrefix(load_op->description, L"Linux Firmware Updater") ||
|
||||||
|
@ -10,7 +10,7 @@ Nordic (U0007) device and the Texas Instruments (U0008) version.
|
|||||||
This plugin will not work with the different "Nano" dongle (U0010) as it does
|
This plugin will not work with the different "Nano" dongle (U0010) as it does
|
||||||
not use the Unifying protocol.
|
not use the Unifying protocol.
|
||||||
|
|
||||||
Some bootloader protocol infomation was taken from the Mousejack[1] project,
|
Some bootloader protocol information was taken from the Mousejack[1] project,
|
||||||
specifically logitech-usb-restore.py and unifying.py. Other documentation was
|
specifically logitech-usb-restore.py and unifying.py. Other documentation was
|
||||||
supplied by Logitech.
|
supplied by Logitech.
|
||||||
|
|
||||||
|
@ -157,7 +157,7 @@ fu_unifying_bootloader_texas_write_firmware (FuDevice *device, GBytes *fw, GErro
|
|||||||
memcpy (req->data, payload->data, payload->len);
|
memcpy (req->data, payload->data, payload->len);
|
||||||
if (!fu_unifying_bootloader_request (self, req, error)) {
|
if (!fu_unifying_bootloader_request (self, req, error)) {
|
||||||
g_prefix_error (error,
|
g_prefix_error (error,
|
||||||
"failed to write ram bufer @0x%02x: ",
|
"failed to write ram buffer @0x%02x: ",
|
||||||
req->addr);
|
req->addr);
|
||||||
return FALSE;
|
return FALSE;
|
||||||
}
|
}
|
||||||
|
@ -210,7 +210,7 @@ fu_unifying_peripheral_poll (FuDevice *device, GError **error)
|
|||||||
g_warning ("failed to get pending read: %s", error_local->message);
|
g_warning ("failed to get pending read: %s", error_local->message);
|
||||||
return TRUE;
|
return TRUE;
|
||||||
}
|
}
|
||||||
/* no data to recieve */
|
/* no data to receive */
|
||||||
g_clear_error (&error_local);
|
g_clear_error (&error_local);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -14,7 +14,7 @@ understanding it would be used to build a plugin under a LGPLv2+ licence.
|
|||||||
Wacom devices are actually composite devices, with the main ARM CPU being
|
Wacom devices are actually composite devices, with the main ARM CPU being
|
||||||
programmed using a more complicated erase, write, verify algorithm based
|
programmed using a more complicated erase, write, verify algorithm based
|
||||||
on a historical update protocol. The "sub-module" devices use a newer protocol,
|
on a historical update protocol. The "sub-module" devices use a newer protocol,
|
||||||
again based on HID, but are handled differently depending on thier type.
|
again based on HID, but are handled differently depending on their type.
|
||||||
|
|
||||||
Firmware Format
|
Firmware Format
|
||||||
---------------
|
---------------
|
||||||
|
@ -120,7 +120,7 @@ fu_device_list_get_all (FuDeviceList *self)
|
|||||||
* @self: A #FuDeviceList
|
* @self: A #FuDeviceList
|
||||||
*
|
*
|
||||||
* Returns all the active devices that have been added to the device list.
|
* Returns all the active devices that have been added to the device list.
|
||||||
* An active device is defined as a device that is currently conected and has
|
* An active device is defined as a device that is currently connected and has
|
||||||
* is owned by a plugin.
|
* is owned by a plugin.
|
||||||
*
|
*
|
||||||
* Returns: (transfer container) (element-type FuDevice): the devices
|
* Returns: (transfer container) (element-type FuDevice): the devices
|
||||||
@ -649,7 +649,7 @@ fu_device_list_replug_cb (gpointer user_data)
|
|||||||
* @device: A #FuDevice
|
* @device: A #FuDevice
|
||||||
* @error: A #GError, or %NULL
|
* @error: A #GError, or %NULL
|
||||||
*
|
*
|
||||||
* Waits for a specific devic to replug if %FWUPD_DEVICE_FLAG_WAIT_FOR_REPLUG
|
* Waits for a specific device to replug if %FWUPD_DEVICE_FLAG_WAIT_FOR_REPLUG
|
||||||
* is set.
|
* is set.
|
||||||
*
|
*
|
||||||
* If the device does not exist this function returns without an error.
|
* If the device does not exist this function returns without an error.
|
||||||
|
@ -2148,7 +2148,7 @@ fu_device_setup (FuDevice *self, GError **error)
|
|||||||
* @error: A #GError, or %NULL
|
* @error: A #GError, or %NULL
|
||||||
*
|
*
|
||||||
* Activates up a device, which normally means the device switches to a new
|
* Activates up a device, which normally means the device switches to a new
|
||||||
* firmware verson. This should only be called when data loss cannot occur.
|
* firmware version. This should only be called when data loss cannot occur.
|
||||||
*
|
*
|
||||||
* Returns: %TRUE for success
|
* Returns: %TRUE for success
|
||||||
*
|
*
|
||||||
|
@ -1355,7 +1355,7 @@ fu_engine_create_release_metadata (FuEngine *self, FuPlugin *plugin, GError **er
|
|||||||
* @flags: The #FwupdInstallFlags, e.g. %FWUPD_DEVICE_FLAG_UPDATABLE
|
* @flags: The #FwupdInstallFlags, e.g. %FWUPD_DEVICE_FLAG_UPDATABLE
|
||||||
* @error: A #GError, or %NULL
|
* @error: A #GError, or %NULL
|
||||||
*
|
*
|
||||||
* Installs a specfic firmware file on a device.
|
* Installs a specific firmware file on a device.
|
||||||
*
|
*
|
||||||
* By this point all the requirements and tests should have been done in
|
* By this point all the requirements and tests should have been done in
|
||||||
* fu_engine_check_requirements() so this should not fail before running
|
* fu_engine_check_requirements() so this should not fail before running
|
||||||
@ -3027,7 +3027,7 @@ fu_engine_get_downgrades (FuEngine *self, const gchar *device_id, GError **error
|
|||||||
continue;
|
continue;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* don't show releases we are not allowed to dowgrade to */
|
/* don't show releases we are not allowed to downgrade to */
|
||||||
if (fwupd_release_has_flag (rel_tmp, FWUPD_RELEASE_FLAG_BLOCKED_VERSION)) {
|
if (fwupd_release_has_flag (rel_tmp, FWUPD_RELEASE_FLAG_BLOCKED_VERSION)) {
|
||||||
g_string_append_printf (error_str, "%s=lowest, ",
|
g_string_append_printf (error_str, "%s=lowest, ",
|
||||||
fwupd_release_get_version (rel_tmp));
|
fwupd_release_get_version (rel_tmp));
|
||||||
|
@ -21,7 +21,7 @@
|
|||||||
*
|
*
|
||||||
* This list of plugins provides a way to get the specific plugin quickly using
|
* This list of plugins provides a way to get the specific plugin quickly using
|
||||||
* a hash table and also any plugin-list specific functionality such as
|
* a hash table and also any plugin-list specific functionality such as
|
||||||
* sorting by dependancy order.
|
* sorting by dependency order.
|
||||||
*
|
*
|
||||||
* See also: #FuPlugin
|
* See also: #FuPlugin
|
||||||
*/
|
*/
|
||||||
|
@ -667,7 +667,7 @@ fu_plugin_set_runtime_versions (FuPlugin *self, GHashTable *runtime_versions)
|
|||||||
* @component_id: An AppStream component id, e.g. "org.gnome.Software"
|
* @component_id: An AppStream component id, e.g. "org.gnome.Software"
|
||||||
* @version: A version string, e.g. "1.2.3"
|
* @version: A version string, e.g. "1.2.3"
|
||||||
*
|
*
|
||||||
* Sets a runtime version of a specific dependancy.
|
* Sets a runtime version of a specific dependency.
|
||||||
*
|
*
|
||||||
* Since: 1.0.7
|
* Since: 1.0.7
|
||||||
**/
|
**/
|
||||||
@ -697,7 +697,7 @@ fu_plugin_set_compile_versions (FuPlugin *self, GHashTable *compile_versions)
|
|||||||
* @component_id: An AppStream component id, e.g. "org.gnome.Software"
|
* @component_id: An AppStream component id, e.g. "org.gnome.Software"
|
||||||
* @version: A version string, e.g. "1.2.3"
|
* @version: A version string, e.g. "1.2.3"
|
||||||
*
|
*
|
||||||
* Sets a compile-time version of a specific dependancy.
|
* Sets a compile-time version of a specific dependency.
|
||||||
*
|
*
|
||||||
* Since: 1.0.7
|
* Since: 1.0.7
|
||||||
**/
|
**/
|
||||||
|
@ -982,7 +982,7 @@ fu_util_download_chunk_cb (SoupMessage *msg, SoupBuffer *chunk, gpointer user_da
|
|||||||
if (header_size < body_length)
|
if (header_size < body_length)
|
||||||
return;
|
return;
|
||||||
|
|
||||||
/* calulate percentage */
|
/* calculate percentage */
|
||||||
percentage = (guint) ((100 * body_length) / header_size);
|
percentage = (guint) ((100 * body_length) / header_size);
|
||||||
g_debug ("progress: %u%%", percentage);
|
g_debug ("progress: %u%%", percentage);
|
||||||
fu_progressbar_update (priv->progressbar, FWUPD_STATUS_DOWNLOADING, percentage);
|
fu_progressbar_update (priv->progressbar, FWUPD_STATUS_DOWNLOADING, percentage);
|
||||||
|
@ -6,7 +6,7 @@
|
|||||||
<doc:doc>
|
<doc:doc>
|
||||||
<doc:description>
|
<doc:description>
|
||||||
<doc:para>
|
<doc:para>
|
||||||
The interface used for quering firmware for the system.
|
The interface used for querying firmware for the system.
|
||||||
</doc:para>
|
</doc:para>
|
||||||
</doc:description>
|
</doc:description>
|
||||||
</doc:doc>
|
</doc:doc>
|
||||||
|
Loading…
Reference in New Issue
Block a user