Introduction

This plugin updates BCM57xx wired network adaptors from Broadcom using a reverse-engineered flashing protocol. It is designed to be used with the clean-room reimplementation of the BCM5719 firmware found here: https://github.com/meklort/bcm5719-fw

Protocol

BCM57xx devices support a custom com.broadcom.bcm57xx protocol which is implemented as ioctls like ethtool does.

GUID Generation

These devices use the standard PCI instance IDs, for example:

  • PCI\VEN_14E4&DEV_1657
  • PCI\VEN_14E4&DEV_1657&SUBSYS_17AA222E

Update Behavior

The device usually presents in runtime mode, and the firmware is written to the device without disconnecting the working kernel driver. Once complete the APE is reset which may cause a brief link reconnection.

On flash failure the device is nonfunctional, but is recoverable using direct BAR writes, which is typically much slower than updating the device using the kernel driver and the ethtool API.

Vendor ID Security

The vendor ID is set from the PCI vendor, in this instance set to PCI:0x14E4

External Interface Access

This plugin requires the SIOCETHTOOL ioctl interface.