mirror of
https://git.proxmox.com/git/fwupd
synced 2025-05-28 09:39:05 +00:00
![]() Conceptually we were trying to stuff subtly different actions into one vfunc: * Read firmware from the device to update the verification checksums * Read a firmware blob from the device for debugging For the first action we might want to mask out the sections of the flash with serial numbers (so the verification hashes match the ones published on the LVFS) and for the second we want just a raw ROM file from the hardware with no pre-processing that we can compare against an external SPI dumper. Split out ->dump_firmware to get the raw blob, and allow plugins to also implement ->read_firmware() if they have to mask out specific offsets or remove specific images from the FuFirmware container. In the common case when masking is not required, fall back to using a 'binary' FuFirmware automatically to make most plugins simpler. |
||
---|---|---|
.. | ||
fuzzing | ||
tests | ||
fu-optionrom-device.c | ||
fu-optionrom-device.h | ||
fu-plugin-optionrom.c | ||
fu-rom-tool.c | ||
fu-rom.c | ||
fu-rom.h | ||
fu-self-test.c | ||
fuzzing.md | ||
meson.build | ||
optionrom.quirk | ||
README.md |
OptionROM Support
Introduction
This plugin reads the version numbers of PCI devices. It cannot deploy firmware onto devices but is used to list devices with known firmware updates that may require booting into another operating system to apply.
This plugin is also able to read and parse the firmware of some PCI devices which allows some host state verification to be done.
GUID Generation
These devices use the standard USB DeviceInstanceId values, e.g.
PCI\VEN_%04X&DEV_%04X
Additionally, GUIDs found in OptionROMs may also be added.
Vendor ID Security
The device is not upgradable and thus requires no vendor ID set.