fwupd/plugins/optionrom
Richard Hughes fbd8b5d325 Add fu_device_dump_firmware()
Conceptually we were trying to stuff subtly different actions into one vfunc:

 * Read firmware from the device to update the verification checksums

 * Read a firmware blob from the device for debugging

For the first action we might want to mask out the sections of the flash with
serial numbers (so the verification hashes match the ones published on the LVFS)
and for the second we want just a raw ROM file from the hardware with no
pre-processing that we can compare against an external SPI dumper.

Split out ->dump_firmware to get the raw blob, and allow plugins to also
implement ->read_firmware() if they have to mask out specific offsets or remove
specific images from the FuFirmware container.

In the common case when masking is not required, fall back to using a 'binary'
FuFirmware automatically to make most plugins simpler.
2020-09-24 10:54:27 -05:00
..
fuzzing Rename and modernize the udev plugin 2019-10-09 14:59:54 +01:00
tests Rename and modernize the udev plugin 2019-10-09 14:59:54 +01:00
fu-optionrom-device.c Add fu_device_dump_firmware() 2020-09-24 10:54:27 -05:00
fu-optionrom-device.h trivial: Remove G_BEGIN_DECLS from all private headers 2019-10-09 20:02:16 +01:00
fu-plugin-optionrom.c trivial: stop including fu-hash.h as part of fu-plugin-vfuncs.h 2019-11-25 09:29:46 +00:00
fu-rom-tool.c Rename and modernize the udev plugin 2019-10-09 14:59:54 +01:00
fu-rom.c Add fu_device_dump_firmware() 2020-09-24 10:54:27 -05:00
fu-rom.h Add fu_device_dump_firmware() 2020-09-24 10:54:27 -05:00
fu-self-test.c Install the installed tests 2020-08-28 10:10:43 -05:00
fuzzing.md Rename and modernize the udev plugin 2019-10-09 14:59:54 +01:00
meson.build Install the installed tests 2020-08-28 10:10:43 -05:00
optionrom.quirk Set all FuUdevDevice plugins to use FU_QUIRKS_PLUGIN 2019-10-09 20:02:16 +01:00
README.md trivial: Document the use of vendor-id in each plugin 2019-12-11 18:10:44 +00:00

OptionROM Support

Introduction

This plugin reads the version numbers of PCI devices. It cannot deploy firmware onto devices but is used to list devices with known firmware updates that may require booting into another operating system to apply.

This plugin is also able to read and parse the firmware of some PCI devices which allows some host state verification to be done.

GUID Generation

These devices use the standard USB DeviceInstanceId values, e.g.

  • PCI\VEN_%04X&DEV_%04X

Additionally, GUIDs found in OptionROMs may also be added.

Vendor ID Security

The device is not upgradable and thus requires no vendor ID set.