Muutke küpsiste eelistusi

E-raamat: Embedded Firmware Solutions: Development Best Practices for the Internet of Things

  • Formaat: EPUB+DRM
  • Ilmumisaeg: 03-Feb-2015
  • Kirjastus: APress
  • Keel: eng
  • ISBN-13: 9781484200704
  • Formaat - EPUB+DRM
  • Hind: 4,08 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: EPUB+DRM
  • Ilmumisaeg: 03-Feb-2015
  • Kirjastus: APress
  • Keel: eng
  • ISBN-13: 9781484200704

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Embedded Firmware Solutions is the perfect introduction and daily-use field guide--for the thousands of firmware designers, hardware engineers, architects, managers, and developers--to Intel’s new firmware direction (including Quark coverage), showing how to integrate Intel® Architecture designs into their plans.

Featuring hands-on examples and exercises using Open Source codebases, like Coreboot and EFI Development Kit (tianocore) and Chromebook, this is the first book that combines a timely and thorough overview of firmware solutions for the rapidly evolving embedded ecosystem with in-depth coverage of requirements and optimization.

Muu info

This is an open access book, the electronic versions are freely accessible online.
About the Authors xv
About the Technical Reviewers xvii
Acknowledgments xix
Foreword xxi
Introduction xxiii
Chapter 1 Introduction 1(12)
What Is Embedded Firmware?
1(2)
Where Is Firmware?
3(1)
What Do Firmware Engineers Do?
3(1)
Firmware Preparation for New Hardware
3(1)
The Mystery of Bits
4(2)
Programming Guides
6(1)
The Intel® Firmware Support Package
7(1)
The Uniqueness of Embedded Firmware
8(1)
The Choice of Firmware Stacks
9(1)
Welcome to the Era of the Internet of Things
9(1)
Technical Coverage in This Book
10(1)
The Future of Firmware
10(3)
Chapter 2 Firmware Stacks for Embedded Systems 13(12)
Is a One-Size-Fits-All Solution Possible?
15(1)
Microkernel
16(1)
Real-Time Operating System (RTOS)
16(1)
Legacy BIOS
17(1)
Implementations of the UEFI Framework
18(1)
Open Source Firmware Stacks
18(1)
Proprietary Firmware Stacks
19(1)
Make or Buy
20(4)
The Advantages of Outsourcing
22(1)
The Disadvantages of Outsourcing
22(1)
In-House Development
23(1)
Summary
24(1)
Chapter 3 Intel® Firmware Support Package (Intel® FSP) 25(30)
The Intel FSP Philosophy
27(1)
What Is in Intel FSP?
28(3)
Intel FSP Binary Format
31(2)
Sample Boot Flow
33(3)
Locating the Entries of Intel FSP
36(3)
The Hard Way to Find Intel FSP APIs: Use Data Structure
36(2)
The Easy Way to Find FSP APIs: Use Hard-Coded Constants
38(1)
Programming Interface: The APIs of Intel FSP
39(5)
TempRamlnit
39(3)
FspinitEntry
42(1)
NotifyPhase
43(1)
Intel FSP Output
44(3)
API Execution Status
45(1)
Temporary Memory Data HOB
45(1)
Non-Volatile Storage HOB
46(1)
Sample Code for Parsing HOBs
46(1)
Customization of Intel FSP
47(2)
Downloading Intel FSP
49(3)
Microcode Patches
52(1)
Relocating Intel FSP
53(1)
Integration and Build
53(1)
The Future of Intel FSP
53(1)
What Is Coming in the Following
Chapters
54(1)
Chapter 4 Building coreboot with Intel FSP 55(42)
The Introduction of coreboot
55(1)
The Philosophy of coreboot
56(1)
A Brief History
57(4)
v1:1999-2000
57(1)
v2: 2000-2005
57(1)
v2+: 2005-2008
58(1)
v3: 2006-2008
59(1)
2008 LinuxBIOS Renamed "coreboot"
59(1)
v4: 2009-2012
59(1)
v4+:2012-2014
59(1)
Further Reading
60(1)
Prerequisites for Working with coreboot
61(3)
Community Organization
61(1)
Git and Gerrit
61(1)
Git Commit Messages
62(1)
coreboot Sign-off Procedure
63(1)
Working with the coreboot Community
64(1)
coreboot Do's
64(1)
coreboot Don'ts
65(1)
Nonsource Binaries in coreboot
65(1)
A Hands-on Example: Building coreboot for the MinnowBoard MAX Mainboard
65(11)
Environment
66(1)
Development Directory
67(1)
Downloading Intel FSP
67(1)
Installing Intel FSP
67(1)
Downloading the coreboot Source
68(1)
coreboot Toolchain
68(1)
coreboot Commit Hooks
69(1)
Creating a coreboot Development Branch
69(1)
Building the Mainboard
70(5)
Flashing the ROM
75(1)
coreboot Internals
76(4)
Boot Stages
76(1)
Additional Files
77(1)
CBFS
77(2)
CBFS Size
79(1)
Special Binaries
79(1)
Boot Flow Using Intel FSP
80(2)
Reset Vector and Bootblock
80(1)
romstage
80(1)
ramstage
81(1)
Payload
82(1)
coreboot Source
82(12)
coreboot Device Tree
82(5)
coreboot Hardwaremain State Machine
87(1)
Mainboard
88(2)
The Chipset Driver
90(4)
coreboot Troubleshooting and Debugging
94(1)
Postcodes
94(1)
Serial Debug
95(1)
EHCI USB Debug
95(1)
Summary
95(2)
Chapter 5 Chrome book Firmware Internals 97(24)
About Chrome book and Chrome OS
97(1)
Chrome OS Firmware Overview
98(1)
Chrome OS Security Philosophy
98(1)
Chrome OS Security Guiding Principles
98(1)
Power wash
99(1)
Chrome OS Boot Modes
99(1)
Verified (Normal) Mode
99(1)
Recovery Mode
99(1)
Developer Mode
100(1)
Chrome OS Coreboot
100(1)
x86
101(1)
ARM
101(1)
Depth charge Payload
101(3)
libpayload
102(1)
Verified Boot
103(1)
Verified Boot and Kernel Security
104(1)
Chrome OS Firmware Boot Log
104(1)
Boot Times Log
105(1)
Chrome OS Firmware Event Log
105(1)
Google SMI Linux Kernel Driver
106(1)
Chrome OS Extensions to the Firmware Image
106(7)
FMAP
106(3)
Google Binary Block (GBB)
109(3)
Vital Product Data (VPD)
112(1)
Firmware TPM Usage
112(1)
Chrome OS Firmware Update
113(1)
Chrome OS Utilities
113(5)
flashrom
114(1)
gbb_utility
114(1)
crossystem
115(2)
mosys
117(1)
Google Embedded Controller
118(2)
Power Sequencing
118(1)
Battery Charging
119(1)
Thermal Management
119(1)
Keyboard Controller
119(1)
Other Peripheral Controls
119(1)
Chrome EC Software Sync
119(1)
Summary
120(1)
Chapter 6 Intel FSP and UEFI Integration 121(24)
Introduction to EFI
121(4)
Introduction to FSP
123(2)
Introduction to EDK II
125(1)
Summary
125(1)
FSP Components
125(1)
FSP Wrapper Boot Flow
126(2)
Generic FSP Wrapper Boot Flow
128(1)
Normal Boot
128(4)
Boot Flow
128(1)
Memory Layout for a Normal Boot Flow
129(1)
FSP Normal Boot Data Structure
130(2)
S3 Boot
132(2)
Boot Flow
132(1)
S3 Memory Layout
132(1)
S3 NV Data Passing
133(1)
Capsule Flash Update
134(4)
Boot Flow
134(1)
Capsule Update Memory Layout
135(1)
Recovery Boot Flow
136(1)
FSP Recovery Memory Layout
137(1)
coreboot Payload Based upon EDK II
138(2)
Building Minnow and MinnowMax with FSP
140(3)
Future of the Intel FSP
143(2)
Conclusion
Chapter 7 Building Firmware for Quark Processors 145(28)
Overview of UEFI and PI
145(2)
History of Implementations and Specifications
146(1)
Introduction to EDK II Building Blocks
147(13)
PKG: Packaging
147(2)
Packages
149(1)
PCD: Platform Configuration Database
150(3)
DEC: Platform Declaration File
153(2)
DSC: Platform Description File
155(1)
FDF: Flash Description File
156(1)
Build: The EDK II Build Command
156(2)
INF: INF File
158(1)
More Information
159(1)
Introduction to the EDK II Subset
160(1)
Introduction to Quark
160(11)
ROM Flash Image Size Optimization
161(7)
RAM Footprint Optimization
168(3)
Conclusion
171(2)
Chapter 8 Putting It All Together 173(6)
RTOS and Intel FSP
174(1)
Intel FSP and Open Source Philosophy
175(1)
Customization and Production of Intel FSP
176(1)
It Is a Community Effort After All
176(3)
Appendix A: Sample Boot Setting File (BSF) 179(12)
Index 191
Vincent Zimmer is a Principal Engineer in the Software and Services Group at Intel Corporation. With over 22 years experience in embedded software development and design, Vincent holds nearly 300 U.S. patents and was awarded two Intel Achievement Awards for his development of firmware architecture and security. He has a Bachelor of Science in Electrical Engineering degree from Cornell University, Ithaca, New York, and a Master of Science in Computer Science degree from the University of Washington, Seattle.