/Linux-v6.1/drivers/firmware/efi/ |
D | capsule.c | 3 * EFI capsule support. 34 * efi_capsule_pending - has a capsule been passed to the firmware? 35 * @reset_type: store the type of EFI reset if capsule is pending 37 * To ensure that the registered capsule is processed correctly by the 38 * firmware we need to perform a specific type of reset. If a capsule is 63 * Whitelist of EFI capsule flags that we support. 74 * efi_capsule_supported - does the firmware support the capsule? 75 * @guid: vendor guid of capsule 76 * @flags: capsule flags 77 * @size: size of capsule data [all …]
|
D | capsule-loader.c | 3 * EFI capsule loader driver. 47 pr_err("invalid capsule size\n"); in __efi_capsule_setup_info() 51 /* Check if the capsule binary supported */ in __efi_capsule_setup_info() 57 pr_err("capsule not supported\n"); in __efi_capsule_setup_info() 81 * efi_capsule_setup_info - obtain the efi capsule header in the binary and 87 * Platforms with non-standard capsule update mechanisms can override 88 * this __weak function so they can perform any required capsule 115 * cap_info->capsule may have been assigned already by a quirk in efi_capsule_submit_update() 118 if (!cap_info->capsule) { in efi_capsule_submit_update() 119 cap_info->capsule = vmap(cap_info->pages, cap_info->index, in efi_capsule_submit_update() [all …]
|
D | Makefile | 17 obj-$(CONFIG_EFI) += capsule.o 45 obj-$(CONFIG_EFI_CAPSULE_LOADER) += capsule-loader.o
|
D | reboot.c | 40 "capsule update requires %s reset... Performing " in efi_reboot()
|
D | Kconfig | 170 tristate "EFI capsule loader" 175 capsule support in the firmware, which many OEMs do not provide.
|
D | esrt.c | 8 * "Capsule Update" feature. This module allows userland utilities to evaluate
|
/Linux-v6.1/tools/power/acpi/man/ |
D | pfrut.8 | 35 Load the capsule file into the system. 36 To be more specific, the capsule file will be copied to the 40 Stage the capsule image from communication buffer into Management Mode 44 Activate a previous staged capsule image.
|
/Linux-v6.1/include/uapi/linux/ |
D | pfrut.h | 34 * Stage a capsule image from communication buffer and perform authentication. 45 * Activate a previously staged capsule image. 75 * struct pfru_payload_hdr - Capsule file payload header. 77 * @sig: Signature of this capsule file. 83 * this capsule image support.
|
/Linux-v6.1/tools/power/acpi/tools/pfrut/ |
D | pfrut.c | 9 * on the /dev/pfr_update is to load the EFI capsule into 314 perror("Can not open capsule file..."); in main() 322 perror("Can not fstat capsule file..."); in main() 333 perror("Failed to mmap capsule file."); in main() 342 printf("Load %d bytes of capsule file into the system\n", in main() 346 perror("Failed to load capsule file"); in main()
|
/Linux-v6.1/tools/wmi/ |
D | dell-smbios-example.c | 190 printf("UEFI Capsule enabled token is: %d\n", ret); in main() 192 printf("UEFI Capsule disabled token is: %d\n", ret); in main() 194 /* activate UEFI capsule token if disabled */ in main() 196 printf("Enabling UEFI capsule token"); in main()
|
/Linux-v6.1/arch/x86/platform/efi/ |
D | quirks.c | 31 * Header prepended to the standard EFI capsule on Quark systems the are based 637 * cap_info->capsule should point at a virtual mapping of the entire in qrk_capsule_setup_info() 638 * capsule, starting at the capsule header. Our image has the Quark in qrk_capsule_setup_info() 640 * mapping created by the generic capsule code. in qrk_capsule_setup_info() 642 * virtual mapping, let's just point cap_info->capsule at our copy in qrk_capsule_setup_info() 643 * of the capsule header. in qrk_capsule_setup_info() 645 cap_info->capsule = &cap_info->header; in qrk_capsule_setup_info()
|
/Linux-v6.1/include/linux/ |
D | nvme-tcp.h | 123 * struct nvme_tcp_cmd_pdu - nvme tcp command capsule pdu 134 * struct nvme_tcp_rsp_pdu - nvme tcp response capsule pdu
|
D | efi.h | 198 * EFI capsule flags 206 efi_capsule_header_t *capsule; member 1095 extern int efi_capsule_update(efi_capsule_header_t *capsule,
|
D | nvme.h | 826 * @NVME_SGL_FMT_OFFSET: relative offset of the in-capsule data block
|
/Linux-v6.1/drivers/nvme/target/ |
D | fabrics-cmd.c | 105 pr_debug("received unknown capsule type 0x%x\n", in nvmet_parse_fabrics_admin_cmd() 128 pr_debug("received unknown capsule type 0x%x\n", in nvmet_parse_fabrics_io_cmd() 358 pr_debug("invalid capsule type 0x%x on unconnected queue.\n", in nvmet_parse_connect_cmd()
|
D | admin-cmd.c | 455 * Max command capsule size is sqe + in-capsule data size. in nvmet_execute_identify_ctrl() 456 * Disable in-capsule data for Metadata capable controllers. in nvmet_execute_identify_ctrl() 463 /* Max response capsule size is cqe */ in nvmet_execute_identify_ctrl()
|
D | rdma.c | 1026 pr_err("Ctrl Fatal Error: capsule size less than 64 bytes\n"); in nvmet_rdma_recv_done()
|
/Linux-v6.1/drivers/nvme/host/ |
D | fabrics.c | 134 * Used by the host system to retrieve a 32-bit capsule property value 137 * ("Capsule property" is an "PCIe register concept" applied to the 179 * Used by the host system to retrieve a 64-bit capsule property value 182 * ("Capsule property" is an "PCIe register concept" applied to the 224 * Used by the NVMe host system to write a 32-bit capsule property value 227 * ("Capsule property" is an "PCIe register concept" applied to the 264 * @cmd: This is the SQE portion of a submission capsule. 265 * @data: This is the "Data" portion of a submission capsule.
|
D | fc.c | 3115 /* FC-NVME does not have other data in the capsule */ in nvme_fc_create_association()
|
/Linux-v6.1/drivers/acpi/ |
D | pfr_update.c | 99 /* pfru_code_inj_guid is the UUID to identify code injection EFI capsule file */ 104 /* pfru_drv_update_guid is the UUID to identify driver update EFI capsule file */ 282 * If the code in the capsule is older than the current in applicable_image() 471 /* check if the capsule header has a valid version number */ in pfru_write()
|
/Linux-v6.1/Documentation/devicetree/bindings/gnss/ |
D | brcm,bcm4751.yaml | 15 bus requires CTS/RTS support. The number of the capsule is more
|
/Linux-v6.1/arch/x86/kernel/ |
D | reboot.c | 602 * If an EFI capsule has been registered with the firmware then in native_machine_emergency_restart() 606 pr_info("EFI capsule is pending, forcing EFI reboot.\n"); in native_machine_emergency_restart()
|
/Linux-v6.1/drivers/firmware/efi/test/ |
D | efi_test.c | 622 * obtain the address of the capsule as it resides in the in efi_runtime_query_capsulecaps()
|
/Linux-v6.1/Documentation/driver-api/ |
D | pin-control.rst | 544 pins/balls underneath the capsule. Pick some enumeration that makes sense to
|
/Linux-v6.1/drivers/net/ethernet/sfc/ |
D | mcdi_pcol.h | 766 /* enum: Full virtual channel from capsule header. */ 768 /* enum: Low bits of virtual channel from capsule header. */ 954 /* enum: True to override the capsule virtual channel for network deliveries.
|