Home
last modified time | relevance | path

Searched refs:image (Results 1 – 25 of 646) sorted by relevance

12345678910>>...26

/u-boot/tools/binman/
A Dcontrol.py224 image.CollectBintools()
229 def ShowAltFormats(image): argument
261 image.CollectBintools()
309 image.LoadData()
310 image.CollectBintools()
381 image.CollectBintools()
386 return image
410 image.mark_build_done()
453 return image
626 image.BuildImage()
[all …]
A Dimage_test.py9 from binman.image import Image
14 image = Image('name', 'node', test=True)
16 image.LookupSymbol('_binman_something_prop_', False, 'msg', 0)
22 image = Image('name', 'node', test=True)
23 image._entries = {}
25 image.LookupSymbol('_binman_type_prop_pname', False, 'msg', 0)
30 image = Image('name', 'node', test=True)
31 image._entries = {}
40 image = Image('name', 'node', test=True)
41 image._entries = {'u-boot': 1}
[all …]
/u-boot/lib/efi_loader/
A Defi_firmware.c49 void *image, in efi_firmware_get_image_unsupported() argument
62 const void *image, in efi_firmware_check_image_unsupported() argument
93 const void *image, in efi_firmware_set_package_info_unsupported() argument
195 const void *image = *p_image; in efi_firmware_capsule_authenticate() local
218 image = capsule_payload; in efi_firmware_capsule_authenticate()
226 header = (void *)image; in efi_firmware_capsule_authenticate()
240 *p_image = image; in efi_firmware_capsule_authenticate()
327 const void *image, in efi_firmware_fit_set_image() argument
345 if (fit_update(image)) in efi_firmware_fit_set_image()
387 const void *image, in efi_firmware_raw_set_image() argument
[all …]
/u-boot/doc/
A DREADME.ti-secure32 bootable image was not created.
36 ${TI_SECURE_DEV_PKG}/scripts/create-boot-image.sh
49 create-boot-image.sh \
57 MLO - Generates an image for SD/MMC/eMMC media
81 create-boot-image.sh \
111 create-boot-image.sh \
128 u-boot-spl_HS_MLO - boot image for SD/MMC/eMMC. This image is
143 create-boot-image.sh \
180 image that it loads.
186 image. These DTB image may be one of many available to the boot
[all …]
A DREADME.commands.spl1 The spl command is used to export a boot parameter image to RAM. Later
6 used. (kernel image, initrd-image, fdt-image etc.)
20 nand read 0x82000000 0x280000 0x400000 /* Read kernel image from NAND*/
23 nand write 0x80000100 0x680000 0x20000 /* write the image - one page */
27 nand read 0x82000000 0x280000 0x400000 /* Read kernel image from NAND*/
/u-boot/tools/
A Difdtool.c64 (char *)ptr - image); in find_fd()
444 fdb = find_fd(image, size); in write_regions()
832 char *image; in main() local
1030 image = malloc(rom_size); in main()
1031 if (!image) { in main()
1036 memset(image, '\xff', rom_size); in main()
1049 ret = dump_fd(image, size); in main()
1082 set_em100_mode(image, size); in main()
1085 lock_descriptor(image, size); in main()
1088 unlock_descriptor(image, size); in main()
[all …]
/u-boot/doc/usage/cmd/
A Dbootm.rst37 OS sub-image to boot (must be preceded by colon ':')
44 FDT sub-image to boot
48 Note on current image address
51 When bootm is called without arguments, the image at current image address is
95 address of legacy image to boot. If the image includes a second component
99 address of legacy image to use as ramdisk
102 address of legacy image to use as FDT
113 the current image address.
124 Boot kernel image located at <addr1>.
134 with the ramdisk from the image.
[all …]
A Dsource.rst12 source [<addr>][:[<image>]|#[<config>]]
21 * legacy U-Boot image format
32 image
33 name of an image in a FIT file
41 if no configuration is defined, the default image.
46 FIT image
49 For creating a FIT image an image tree source file (\*.its) is needed. Here is
57 description = "FIT image to test the source command";
89 The FIT image file (boot.itb) is created with:
147 Legacy U-Boot image
[all …]
A Dseama.rst19 This type of flash image is found in some D-Link routers such as
24 This U-Boot command will read and decode a SEAMA image from raw NAND
32 the image index (0, 1, 2..) can be omitted
40 Loading SEAMA image 0 from nand0
43 image size 8781764
45 Decoding SEAMA image 0x01000040..0x01860004 to 0x01000000
60 loaded SEAMA image.
/u-boot/arch/arm/cpu/armv8/fsl-layerscape/doc/
A DREADME.qspi17 The difference between QSPI boot RCW image and NOR boot image is the PBI
21 RCW image should be written to the beginning of QSPI flash device.
26 => sf erase 0 +<size of rcw image>
28 => sf write <rcw image in memory> 0 <size of rcw image>
31 To get the QSPI image, build u-boot with QSPI config, for example,
32 <board_name>_qspi_defconfig. The image needed is u-boot-dtb.bin.
33 The u-boot image should be written to 0x10000(but 0x1000 for LS1043A, LS2080A).
37 => sf erase 10000 +<size of u-boot image>
39 => sf write <u-boot image in memory> 10000 <size of u-boot image>
/u-boot/doc/imx/mkimage/
A Dimx8image.txt7 A Boot image consists of:
14 only contain the SECO firmware image, the 2nd container can contain
16 - SCF FW image
17 - M4 FW image
18 - AP FW image
21 "System Boot and section", "5.9 (Boot image) of the processor's manual"
29 APPEND [ahab container image]
30 - indicates the ahah image that will be put in the 1st container
31 When creating container image will be loaded by SPL, this entry
35 IMAGE [SCU|M40|M41|A35|A53|A72] [image file] [load address]
/u-boot/boot/
A DMakefile18 obj-y += image.o image-board.o
20 obj-$(CONFIG_ANDROID_BOOT_IMAGE) += image-android.o image-android-dt.o
38 obj-$(CONFIG_$(SPL_TPL_)OF_LIBFDT) += image-fdt.o
40 obj-$(CONFIG_$(SPL_TPL_)FIT) += image-fit.o
42 obj-$(CONFIG_$(SPL_TPL_)IMAGE_PRE_LOAD) += image-pre-load.o
43 obj-$(CONFIG_$(SPL_TPL_)IMAGE_SIGN_INFO) += image-sig.o
44 obj-$(CONFIG_$(SPL_TPL_)FIT_SIGNATURE) += image-fit-sig.o
45 obj-$(CONFIG_$(SPL_TPL_)FIT_CIPHER) += image-cipher.o
47 obj-$(CONFIG_CMD_ADTIMG) += image-android-dt.o
/u-boot/arch/arm/mach-keystone/
A Dmon.c110 void *image = *p_image; in board_fit_image_post_process() local
112 if (strncmp(image + KS2_HS_SEC_TAG_OFFSET, "KEYS", 4)) { in board_fit_image_post_process()
117 result = k2_hs_bm_auth(KS2_AUTH_CMD, image); in board_fit_image_post_process()
128 *p_size = get_unaligned_le32(image + (*p_size - 4)); in board_fit_image_post_process()
129 memcpy(image, image + KS2_HS_SEC_HEADER_LEN, *p_size); in board_fit_image_post_process()
/u-boot/doc/board/toradex/
A Dcolibri_imx7.rst10 - NAND IMX image adjustments before flashing
32 * **Boot data** -indicates the program image location, program image size
35 * **User image**: U-Boot image (``u-boot-dtb.bin``)
38 IMX image adjustments prior to flashing
51 in **Boot Data** section of IMX image.
66 * ``877ff000`` - Program image address
67 * ``000a8060`` - Program image size
74 and then pad the image:
86 beginning of the image.
92 Flash U-Boot IMX image to eMMC
[all …]
/u-boot/doc/SPL/
A DREADME.spl-secure-boot13 The SPL image is responsible for loading the next stage boot loader, which is
14 the main u-boot image. For secure boot process on these platforms ROM verifies
15 SPL image, so to continue chain of trust SPL image verifies U-boot image using
17 (appended to U-boot image) to validate the U-boot binary just before passing
/u-boot/lib/
A Dbinman.c25 ofnode image; member
67 node = binman->image; in binman_entry_find_internal()
84 return binman_entry_find_internal(binman->image, name, entry); in binman_entry_find()
106 return ofnode_find_subnode(binman->image, name); in binman_section_find_node()
130 binman->image = node; in binman_select_subnode()
132 ofnode_get_name(binman->image)); in binman_select_subnode()
144 ret = find_image_node(&binman->image); in binman_init()
149 ofnode_get_name(binman->image)); in binman_init()
/u-boot/arch/riscv/lib/
A Dimage.c36 int booti_setup(ulong image, ulong *relocated_addr, ulong *size, in booti_setup() argument
41 lhdr = (struct linux_image_h *)map_sysmem(image, 0); in booti_setup()
54 (gd->ram_base <= image && image < gd->ram_base + gd->ram_size)) { in booti_setup()
57 *relocated_addr = image; in booti_setup()
/u-boot/lib/efi_selftest/
A Defi_selftest_startimage_return.c40 static u8 *image; variable
48 static efi_status_t decompress(u8 **image) in decompress() argument
73 *image = buf; in decompress()
91 decompress(&image); in setup()
105 if (image) { in teardown()
106 r = boottime->free_pool(image); in teardown()
127 ret = boottime->load_image(false, image_handle, NULL, image, in execute()
A Defi_selftest_startimage_exit.c40 static u8 *image; variable
48 static efi_status_t decompress(u8 **image) in decompress() argument
73 *image = buf; in decompress()
91 decompress(&image); in setup()
105 if (image) { in teardown()
106 r = boottime->free_pool(image); in teardown()
130 ret = boottime->load_image(false, image_handle, NULL, image, in execute()
/u-boot/board/toradex/apalis-imx8/
A Dapalis-imx8-imximage.cfg6 * and create imx8image boot image
14 /* Append seco container image */
18 /* Add scfw image with exec attribute */
20 /* Add ATF image with exec attribute */
22 /* Add U-Boot image with load attribute */
/u-boot/board/toradex/colibri-imx8x/
A Dcolibri-imx8x-imximage.cfg6 * and create imx8image boot image
14 /* Append seco container image */
18 /* Add scfw image with exec attribute */
20 /* Add ATF image with exec attribute */
22 /* Add U-Boot image with load attribute */
/u-boot/doc/imx/habv4/guides/
A Dencrypted_boot.txt3 An authenticated U-Boot image is used as starting point for
4 Encrypted Boot. The image is encrypted by i.MX Code Signing
5 Tool (CST). The CST replaces only the image data of
9 The image data is encrypted with a Encryption Key (DEK).
12 which needs to be appended to the U-Boot image and specified in
15 The DEK blob is generated by an authenticated U-Boot image with
16 the dek_blob cmd enabled. The image used for DEK blob generation
32 U-Boot image. Note that the blob needs to be transferred back
34 the final image.
/u-boot/board/advantech/imx8qm_rom7720_a1/
A Dimximage.cfg11 /* Append seco container image */
15 /* Add scfw image with exec attribute */
17 /* Add ATF image with exec attribute */
19 /* Add U-Boot image with load attribute */
/u-boot/board/congatec/cgtqmx8/
A Dimximage.cfg11 /* Append seco container image */
15 /* Add scfw image with exec attribute */
17 /* Add ATF image with exec attribute */
19 /* Add U-Boot image with load attribute */
/u-boot/board/freescale/imx8qxp_mek/
A Dimximage.cfg6 * and create imx8image boot image
13 /* Append seco container image */
17 /* Add scfw image with exec attribute */
19 /* Add ATF image with exec attribute */

Completed in 40 milliseconds

12345678910>>...26