| /u-boot/tools/binman/ |
| A D | control.py | 224 image.CollectBintools() 229 def ShowAltFormats(image): argument 261 image.CollectBintools() 309 image.LoadData() 310 image.CollectBintools() 381 image.CollectBintools() 386 return image 410 image.mark_build_done() 453 return image 626 image.BuildImage() [all …]
|
| A D | image_test.py | 9 from binman.image import Image 14 image = Image('name', 'node', test=True) 16 image.LookupSymbol('_binman_something_prop_', False, 'msg', 0) 22 image = Image('name', 'node', test=True) 23 image._entries = {} 25 image.LookupSymbol('_binman_type_prop_pname', False, 'msg', 0) 30 image = Image('name', 'node', test=True) 31 image._entries = {} 40 image = Image('name', 'node', test=True) 41 image._entries = {'u-boot': 1} [all …]
|
| /u-boot/lib/efi_loader/ |
| A D | efi_firmware.c | 49 void *image, in efi_firmware_get_image_unsupported() argument 62 const void *image, in efi_firmware_check_image_unsupported() argument 93 const void *image, in efi_firmware_set_package_info_unsupported() argument 195 const void *image = *p_image; in efi_firmware_capsule_authenticate() local 218 image = capsule_payload; in efi_firmware_capsule_authenticate() 226 header = (void *)image; in efi_firmware_capsule_authenticate() 240 *p_image = image; in efi_firmware_capsule_authenticate() 327 const void *image, in efi_firmware_fit_set_image() argument 345 if (fit_update(image)) in efi_firmware_fit_set_image() 387 const void *image, in efi_firmware_raw_set_image() argument [all …]
|
| /u-boot/doc/ |
| A D | README.ti-secure | 32 bootable image was not created. 36 ${TI_SECURE_DEV_PKG}/scripts/create-boot-image.sh 49 create-boot-image.sh \ 57 MLO - Generates an image for SD/MMC/eMMC media 81 create-boot-image.sh \ 111 create-boot-image.sh \ 128 u-boot-spl_HS_MLO - boot image for SD/MMC/eMMC. This image is 143 create-boot-image.sh \ 180 image that it loads. 186 image. These DTB image may be one of many available to the boot [all …]
|
| A D | README.commands.spl | 1 The spl command is used to export a boot parameter image to RAM. Later 6 used. (kernel image, initrd-image, fdt-image etc.) 20 nand read 0x82000000 0x280000 0x400000 /* Read kernel image from NAND*/ 23 nand write 0x80000100 0x680000 0x20000 /* write the image - one page */ 27 nand read 0x82000000 0x280000 0x400000 /* Read kernel image from NAND*/
|
| /u-boot/tools/ |
| A D | ifdtool.c | 64 (char *)ptr - image); in find_fd() 444 fdb = find_fd(image, size); in write_regions() 832 char *image; in main() local 1030 image = malloc(rom_size); in main() 1031 if (!image) { in main() 1036 memset(image, '\xff', rom_size); in main() 1049 ret = dump_fd(image, size); in main() 1082 set_em100_mode(image, size); in main() 1085 lock_descriptor(image, size); in main() 1088 unlock_descriptor(image, size); in main() [all …]
|
| /u-boot/doc/usage/cmd/ |
| A D | bootm.rst | 37 OS sub-image to boot (must be preceded by colon ':') 44 FDT sub-image to boot 48 Note on current image address 51 When bootm is called without arguments, the image at current image address is 95 address of legacy image to boot. If the image includes a second component 99 address of legacy image to use as ramdisk 102 address of legacy image to use as FDT 113 the current image address. 124 Boot kernel image located at <addr1>. 134 with the ramdisk from the image. [all …]
|
| A D | source.rst | 12 source [<addr>][:[<image>]|#[<config>]] 21 * legacy U-Boot image format 32 image 33 name of an image in a FIT file 41 if no configuration is defined, the default image. 46 FIT image 49 For creating a FIT image an image tree source file (\*.its) is needed. Here is 57 description = "FIT image to test the source command"; 89 The FIT image file (boot.itb) is created with: 147 Legacy U-Boot image [all …]
|
| A D | seama.rst | 19 This type of flash image is found in some D-Link routers such as 24 This U-Boot command will read and decode a SEAMA image from raw NAND 32 the image index (0, 1, 2..) can be omitted 40 Loading SEAMA image 0 from nand0 43 image size 8781764 45 Decoding SEAMA image 0x01000040..0x01860004 to 0x01000000 60 loaded SEAMA image.
|
| /u-boot/arch/arm/cpu/armv8/fsl-layerscape/doc/ |
| A D | README.qspi | 17 The difference between QSPI boot RCW image and NOR boot image is the PBI 21 RCW image should be written to the beginning of QSPI flash device. 26 => sf erase 0 +<size of rcw image> 28 => sf write <rcw image in memory> 0 <size of rcw image> 31 To get the QSPI image, build u-boot with QSPI config, for example, 32 <board_name>_qspi_defconfig. The image needed is u-boot-dtb.bin. 33 The u-boot image should be written to 0x10000(but 0x1000 for LS1043A, LS2080A). 37 => sf erase 10000 +<size of u-boot image> 39 => sf write <u-boot image in memory> 10000 <size of u-boot image>
|
| /u-boot/doc/imx/mkimage/ |
| A D | imx8image.txt | 7 A Boot image consists of: 14 only contain the SECO firmware image, the 2nd container can contain 16 - SCF FW image 17 - M4 FW image 18 - AP FW image 21 "System Boot and section", "5.9 (Boot image) of the processor's manual" 29 APPEND [ahab container image] 30 - indicates the ahah image that will be put in the 1st container 31 When creating container image will be loaded by SPL, this entry 35 IMAGE [SCU|M40|M41|A35|A53|A72] [image file] [load address]
|
| /u-boot/boot/ |
| A D | Makefile | 18 obj-y += image.o image-board.o 20 obj-$(CONFIG_ANDROID_BOOT_IMAGE) += image-android.o image-android-dt.o 38 obj-$(CONFIG_$(SPL_TPL_)OF_LIBFDT) += image-fdt.o 40 obj-$(CONFIG_$(SPL_TPL_)FIT) += image-fit.o 42 obj-$(CONFIG_$(SPL_TPL_)IMAGE_PRE_LOAD) += image-pre-load.o 43 obj-$(CONFIG_$(SPL_TPL_)IMAGE_SIGN_INFO) += image-sig.o 44 obj-$(CONFIG_$(SPL_TPL_)FIT_SIGNATURE) += image-fit-sig.o 45 obj-$(CONFIG_$(SPL_TPL_)FIT_CIPHER) += image-cipher.o 47 obj-$(CONFIG_CMD_ADTIMG) += image-android-dt.o
|
| /u-boot/arch/arm/mach-keystone/ |
| A D | mon.c | 110 void *image = *p_image; in board_fit_image_post_process() local 112 if (strncmp(image + KS2_HS_SEC_TAG_OFFSET, "KEYS", 4)) { in board_fit_image_post_process() 117 result = k2_hs_bm_auth(KS2_AUTH_CMD, image); in board_fit_image_post_process() 128 *p_size = get_unaligned_le32(image + (*p_size - 4)); in board_fit_image_post_process() 129 memcpy(image, image + KS2_HS_SEC_HEADER_LEN, *p_size); in board_fit_image_post_process()
|
| /u-boot/doc/board/toradex/ |
| A D | colibri_imx7.rst | 10 - NAND IMX image adjustments before flashing 32 * **Boot data** -indicates the program image location, program image size 35 * **User image**: U-Boot image (``u-boot-dtb.bin``) 38 IMX image adjustments prior to flashing 51 in **Boot Data** section of IMX image. 66 * ``877ff000`` - Program image address 67 * ``000a8060`` - Program image size 74 and then pad the image: 86 beginning of the image. 92 Flash U-Boot IMX image to eMMC [all …]
|
| /u-boot/doc/SPL/ |
| A D | README.spl-secure-boot | 13 The SPL image is responsible for loading the next stage boot loader, which is 14 the main u-boot image. For secure boot process on these platforms ROM verifies 15 SPL image, so to continue chain of trust SPL image verifies U-boot image using 17 (appended to U-boot image) to validate the U-boot binary just before passing
|
| /u-boot/lib/ |
| A D | binman.c | 25 ofnode image; member 67 node = binman->image; in binman_entry_find_internal() 84 return binman_entry_find_internal(binman->image, name, entry); in binman_entry_find() 106 return ofnode_find_subnode(binman->image, name); in binman_section_find_node() 130 binman->image = node; in binman_select_subnode() 132 ofnode_get_name(binman->image)); in binman_select_subnode() 144 ret = find_image_node(&binman->image); in binman_init() 149 ofnode_get_name(binman->image)); in binman_init()
|
| /u-boot/arch/riscv/lib/ |
| A D | image.c | 36 int booti_setup(ulong image, ulong *relocated_addr, ulong *size, in booti_setup() argument 41 lhdr = (struct linux_image_h *)map_sysmem(image, 0); in booti_setup() 54 (gd->ram_base <= image && image < gd->ram_base + gd->ram_size)) { in booti_setup() 57 *relocated_addr = image; in booti_setup()
|
| /u-boot/lib/efi_selftest/ |
| A D | efi_selftest_startimage_return.c | 40 static u8 *image; variable 48 static efi_status_t decompress(u8 **image) in decompress() argument 73 *image = buf; in decompress() 91 decompress(&image); in setup() 105 if (image) { in teardown() 106 r = boottime->free_pool(image); in teardown() 127 ret = boottime->load_image(false, image_handle, NULL, image, in execute()
|
| A D | efi_selftest_startimage_exit.c | 40 static u8 *image; variable 48 static efi_status_t decompress(u8 **image) in decompress() argument 73 *image = buf; in decompress() 91 decompress(&image); in setup() 105 if (image) { in teardown() 106 r = boottime->free_pool(image); in teardown() 130 ret = boottime->load_image(false, image_handle, NULL, image, in execute()
|
| /u-boot/board/toradex/apalis-imx8/ |
| A D | apalis-imx8-imximage.cfg | 6 * and create imx8image boot image 14 /* Append seco container image */ 18 /* Add scfw image with exec attribute */ 20 /* Add ATF image with exec attribute */ 22 /* Add U-Boot image with load attribute */
|
| /u-boot/board/toradex/colibri-imx8x/ |
| A D | colibri-imx8x-imximage.cfg | 6 * and create imx8image boot image 14 /* Append seco container image */ 18 /* Add scfw image with exec attribute */ 20 /* Add ATF image with exec attribute */ 22 /* Add U-Boot image with load attribute */
|
| /u-boot/doc/imx/habv4/guides/ |
| A D | encrypted_boot.txt | 3 An authenticated U-Boot image is used as starting point for 4 Encrypted Boot. The image is encrypted by i.MX Code Signing 5 Tool (CST). The CST replaces only the image data of 9 The image data is encrypted with a Encryption Key (DEK). 12 which needs to be appended to the U-Boot image and specified in 15 The DEK blob is generated by an authenticated U-Boot image with 16 the dek_blob cmd enabled. The image used for DEK blob generation 32 U-Boot image. Note that the blob needs to be transferred back 34 the final image.
|
| /u-boot/board/advantech/imx8qm_rom7720_a1/ |
| A D | imximage.cfg | 11 /* Append seco container image */ 15 /* Add scfw image with exec attribute */ 17 /* Add ATF image with exec attribute */ 19 /* Add U-Boot image with load attribute */
|
| /u-boot/board/congatec/cgtqmx8/ |
| A D | imximage.cfg | 11 /* Append seco container image */ 15 /* Add scfw image with exec attribute */ 17 /* Add ATF image with exec attribute */ 19 /* Add U-Boot image with load attribute */
|
| /u-boot/board/freescale/imx8qxp_mek/ |
| A D | imximage.cfg | 6 * and create imx8image boot image 13 /* Append seco container image */ 17 /* Add scfw image with exec attribute */ 19 /* Add ATF image with exec attribute */
|