firmware_register,
    firmware_unregister,
    firmware_get,
    firmware_get_flags,
    firmware_put — firmware
    image loading and management
#include
    <sys/param.h>
  
  #include <sys/systm.h>
  
  #include <sys/linker.h>
  
  #include <sys/firmware.h>
struct firmware {
	const char	*name;		/* system-wide name */
	const void	*data;		/* location of image */
	size_t		datasize;	/* size of image in bytes */
	unsigned int	version;	/* version of the image */
};
 
const struct firmware *
firmware_register(const char
  *imagename, const void *data,
  size_t datasize, unsigned int
  version, const struct firmware *parent);
int
  
  firmware_unregister(const
    char *imagename);
const struct firmware *
  
  firmware_get(const
    char *imagename);
const struct firmware *
  
  firmware_get_flags(const
    char *imagename, uint32_t
    flags);
void
  
  firmware_put(const
    struct firmware *fp, int
    flags);
The firmware abstraction provides a
    convenient interface for loading firmware images
    into the kernel, and for accessing such images from kernel components.
A firmware image (or
    image for brevity) is an opaque block of data
    residing in kernel memory. It is associated to a unique
    imagename which constitutes a search key, and to an
    integer version number, which is also an opaque
    piece of information for the firmware subsystem.
An image is registered with the
    firmware subsystem by calling the function
    firmware_register(),
    and unregistered by calling firmware_unregister().
    These functions are usually (but not exclusively) called by specially
    crafted kernel modules that contain the firmware image. The modules can be
    statically compiled in the kernel, or loaded by
    /boot/loader, manually at runtime, or on demand by
    the firmware subsystem.
Clients of the firmware
    subsystem can request access to a given image by calling the function
    firmware_get()
    with the imagename they want as an argument, or by
    calling
    firmware_get_flags()
    with the imagename and flags
    they want as an arguments. If a matching image is not already registered,
    the firmware subsystem will try to load it using the mechanisms specified
    below (typically, a kernel module with
    firmware_register the same name as the image).
The kernel firmware_register firmware API
    is made of the following functions:
firmware_register()
    registers with the kernel an image of size datasize
    located at address data, under the name
    imagename.
The function returns NULL on error (e.g. because an image with the
    same name already exists, or the image table is full), or a
    const struct firmware * pointer to the image
    requested.
firmware_unregister()
    tries to unregister the firmware image imagename
    from the system. The function is successful and returns 0 if there are no
    pending references to the image, otherwise it does not unregister the image
    and returns EBUSY.
firmware_get()
    and
    firmware_get_flags()
    return the requested firmware image. The flags
    argument may be set to FIRMWARE_GET_NOWARN to
    indicate that errors on firmware load or registration should only be logged
    in case of booverbose. If the image is not yet
    registered with the system, the functions try to load it. This involves the
    linker subsystem and disk access, so firmware_get()
    or firmware_get_flags() must not be called with any
    locks (except for Giant). Note also that if the
    firmware image is loaded from a filesystem it must already be mounted. In
    particular this means that it may be necessary to defer requests from a
    driver attach method unless it is known the root filesystem is already
    mounted.
On success,
    firmware_get()
    and
    firmware_get_flags()
    return a pointer to the image description and increase the reference count
    for this image. On failure, the functions return NULL.
firmware_put()
    drops a reference to a firmware image. The flags
    argument may be set to FIRMWARE_UNLOAD to indicate
    that firmware_put is free to reclaim resources associated with the firmware
    image if this is the last reference. By default a firmware image will be
    deferred to a
    taskqueue(9)
    thread so the call may be done while holding a lock. In certain cases, such
    as on driver detach, this cannot be allowed.
As mentioned before, any component of the system can register
    firmware images at any time by simply calling
    firmware_register().
This is typically done when a module
    containing a firmware image is given control, whether compiled in, or
    preloaded by /boot/loader, or manually loaded with
    kldload(8).
    However, a system can implement additional mechanisms to bring these images
    in memory before calling
    firmware_register().
When
    firmware_get()
    or
    firmware_get_flags()
    does not find the requested image, it tries to load it using one of the
    available loading mechanisms. At the moment, there is only one, namely
    Loadable kernel modules.
A firmware image named foo is looked up by
    trying to load the module named foo.ko, using the
    facilities described in
    kld(4). In
    particular, images are looked up in the directories specified by the sysctl
    variable kern.module_path which on most systems
    defaults to /boot/kernel;/boot/modules.
Note that in case a module contains multiple
    images, the caller should first request a
    firmware_get()
    or
    firmware_get_flags()
    for the first image contained in the module, followed by requests for the
    other images.
A firmware module is built by embedding the
    firmware image into a suitable loadable kernel
    module that calls firmware_register() on loading,
    and firmware_unregister() on unloading.
Various system scripts and makefiles let you build a module by
    simply writing a Makefile with the following entries:
        KMOD=   imagename
        FIRMWS= image_file:imagename[:version]
        .include <bsd.kmod.mk>
 
where KMOD is the basename of the module; FIRMWS is a list of colon-separated
  tuples indicating the image_file's to be embedded in the module, the imagename
  and version of each firmware image.
If you need to embed firmware images into a system, you should
    write appropriate entries in the <files.arch> file, e.g. this example
    is from sys/arm/xscale/ixp425/files.ixp425:
ixp425_npe_fw.c                         optional npe_fw                 \
        compile-with    "${AWK} -f $S/tools/fw_stub.awk			\
			IxNpeMicrocode.dat:npe_fw -mnpe -c${.TARGET}"	\
        no-implicit-rule before-depend local                            \
        clean           "ixp425_npe_fw.c"
#
# NB: ld encodes the path in the binary symbols generated for the
#     firmware image so link the file to the object directory to
#     get known values for reference in the _fw.c file.
#
IxNpeMicrocode.fwo  optional npe_fw					\
        dependency      "IxNpeMicrocode.dat"				\
        compile-with    "${LD} -b binary -d -warn-common		\
			    -r -d -o ${.TARGET} IxNpeMicrocode.dat"	\
        no-implicit-rule                                                \
        clean           "IxNpeMicrocode.fwo"
 
Firmware was previously committed to the source tree as uuencoded
    files, but this is no longer required; the binary firmware file should be
    committed to the tree as provided by the vendor.
Note that generating the firmware modules in this way requires the
    availability of the following tools:
    awk(1),
    make(1),
    the compiler and the linker.
The firmware system was introduced in
    FreeBSD 6.1.