/u-boot-v2022.01-rc1/tools/binman/ |
A D | control.py | 262 image.LoadData() 267 image.ResetForPack() 337 return image 401 return image 469 image.ExpandEntries() 505 image.GetEntryOffsets() 527 image.SetImagePos() 533 image.WriteSymbols() 537 image.ResetForPack() 543 image.BuildImage() [all …]
|
A D | image_test.py | 9 from binman.image import Image 14 image = Image('name', 'node', test=True) 16 image.LookupSymbol('_binman_something_prop_', False, 'msg', 0) 22 image = Image('name', 'node', test=True) 23 image._entries = {} 25 image.LookupSymbol('_binman_type_prop_pname', False, 'msg', 0) 30 image = Image('name', 'node', test=True) 31 image._entries = {} 40 image = Image('name', 'node', test=True) 41 image._entries = {'u-boot': 1} [all …]
|
/u-boot-v2022.01-rc1/doc/ |
A D | README.ti-secure | 32 bootable image was not created. 36 ${TI_SECURE_DEV_PKG}/scripts/create-boot-image.sh 49 create-boot-image.sh \ 57 MLO - Generates an image for SD/MMC/eMMC media 81 create-boot-image.sh \ 111 create-boot-image.sh \ 128 u-boot-spl_HS_MLO - boot image for SD/MMC/eMMC. This image is 143 create-boot-image.sh \ 180 image that it loads. 186 image. These DTB image may be one of many available to the boot [all …]
|
A D | README.commands.spl | 1 The spl command is used to export a boot parameter image to RAM. Later 6 used. (kernel image, initrd-image, fdt-image etc.) 20 nand read 0x82000000 0x280000 0x400000 /* Read kernel image from NAND*/ 23 nand write 0x80000100 0x680000 0x20000 /* write the image - one page */ 27 nand read 0x82000000 0x280000 0x400000 /* Read kernel image from NAND*/
|
A D | README.nokia_rx51 | 8 NOLO is expecting a kernel image and will treat any image it finds in 11 appended to u-boot.bin at 0x40000. NOLO will load the entire image into 16 the appended kernel image will be booted using some generated and some 35 * 0. if keyboard is closed boot automatically attached kernel image 38 * 3. try boot from attached kernel image 59 * run kernload - Load kernel image ${mmckernfile} 60 * run initrdload - Load initrd image ${mmcinitrdfile} 61 * run kernboot - Boot loaded kernel image 62 * run kerninitrdboot - Boot loaded kernel image with loaded initrd image 65 * run trymmckernboot - Try to load and boot kernel image ${mmckernfile} [all …]
|
A D | README.splashprepare | 7 image data before it is processed and sent to the frame buffer by 13 board specific splash image locations, routines for loading splash image from 24 formatted with a file system or a FIT image. In case of a filesystem, the splash 28 To enable loading the splash image from a FIT image, CONFIG_FIT must be 29 enabled. The FIT image has to start at the 'offset' field address in the 30 selected splash location. The name of splash image within the FIT shall be
|
/u-boot-v2022.01-rc1/tools/ |
A D | ifdtool.c | 64 (char *)ptr - image); in find_fd() 444 fdb = find_fd(image, size); in write_regions() 832 char *image; in main() local 1030 image = malloc(rom_size); in main() 1031 if (!image) { in main() 1036 memset(image, '\xff', rom_size); in main() 1049 ret = dump_fd(image, size); in main() 1082 set_em100_mode(image, size); in main() 1085 lock_descriptor(image, size); in main() 1088 unlock_descriptor(image, size); in main() [all …]
|
A D | mkeficapsule.c | 107 + sizeof(image) in create_fwbin() 131 image.version = 0x00000003; in create_fwbin() 133 image.update_image_index = index; in create_fwbin() 134 image.reserved[0] = 0; in create_fwbin() 135 image.reserved[1] = 0; in create_fwbin() 136 image.reserved[2] = 0; in create_fwbin() 137 image.update_image_size = bin_stat.st_size; in create_fwbin() 139 image.update_hardware_instance = instance; in create_fwbin() 140 image.image_capsule_support = 0; in create_fwbin() 142 size = fwrite(&image, 1, sizeof(image), f); in create_fwbin() [all …]
|
/u-boot-v2022.01-rc1/arch/arm/cpu/armv8/fsl-layerscape/doc/ |
A D | README.qspi | 17 The difference between QSPI boot RCW image and NOR boot image is the PBI 21 RCW image should be written to the beginning of QSPI flash device. 26 => sf erase 0 +<size of rcw image> 28 => sf write <rcw image in memory> 0 <size of rcw image> 31 To get the QSPI image, build u-boot with QSPI config, for example, 32 <board_name>_qspi_defconfig. The image needed is u-boot-dtb.bin. 33 The u-boot image should be written to 0x10000(but 0x1000 for LS1043A, LS2080A). 37 => sf erase 10000 +<size of u-boot image> 39 => sf write <u-boot image in memory> 10000 <size of u-boot image>
|
/u-boot-v2022.01-rc1/doc/imx/mkimage/ |
A D | imx8image.txt | 7 A Boot image consists of: 14 only contain the SECO firmware image, the 2nd container can contain 16 - SCF FW image 17 - M4 FW image 18 - AP FW image 21 "System Boot and section", "5.9 (Boot image) of the processor's manual" 29 APPEND [ahab container image] 30 - indicates the ahah image that will be put in the 1st container 31 When creating container image will be loaded by SPL, this entry 35 IMAGE [SCU|M40|M41|A35|A53|A72] [image file] [load address]
|
/u-boot-v2022.01-rc1/doc/uImage.FIT/ |
A D | command_syntax_extensions.txt | 29 2. bootm <addr1> /* single image at <addr1> */ 30 3. bootm <addr1> /* multi-image at <addr1> */ 31 4. bootm <addr1> - /* multi-image at <addr1> */ 48 the current image address. 51 Ad. 2. Boot kernel image located at <addr1>. 56 with the ramdisk from the image. 71 from the image at <addr2>. 126 - new uImage sub-image specification 127 <addr>:<sub-image unit_name> 168 Note on current image address [all …]
|
/u-boot-v2022.01-rc1/arch/arm/mach-keystone/ |
A D | mon.c | 110 void *image = *p_image; in board_fit_image_post_process() local 112 if (strncmp(image + KS2_HS_SEC_TAG_OFFSET, "KEYS", 4)) { in board_fit_image_post_process() 117 result = k2_hs_bm_auth(KS2_AUTH_CMD, image); in board_fit_image_post_process() 128 *p_size = get_unaligned_le32(image + (*p_size - 4)); in board_fit_image_post_process() 129 memcpy(image, image + KS2_HS_SEC_HEADER_LEN, *p_size); in board_fit_image_post_process()
|
/u-boot-v2022.01-rc1/doc/board/toradex/ |
A D | colibri_imx7.rst | 10 - NAND IMX image adjustments before flashing 32 * **Boot data** -indicates the program image location, program image size 35 * **User image**: U-Boot image (``u-boot-dtb.bin``) 38 IMX image adjustments prior to flashing 51 in **Boot Data** section of IMX image. 66 * ``877ff000`` - Program image address 67 * ``000a8060`` - Program image size 74 and then pad the image: 86 beginning of the image. 92 Flash U-Boot IMX image to eMMC [all …]
|
/u-boot-v2022.01-rc1/doc/SPL/ |
A D | README.spl-secure-boot | 13 The SPL image is responsible for loading the next stage boot loader, which is 14 the main u-boot image. For secure boot process on these platforms ROM verifies 15 SPL image, so to continue chain of trust SPL image verifies U-boot image using 17 (appended to U-boot image) to validate the U-boot binary just before passing
|
/u-boot-v2022.01-rc1/lib/efi_loader/ |
A D | efi_firmware.c | 43 void *image, in efi_firmware_get_image_unsupported() argument 56 const void *image, in efi_firmware_check_image_unsupported() argument 87 const void *image, in efi_firmware_set_package_info_unsupported() argument 296 const void *image, in efi_firmware_fit_set_image() argument 305 if (!image || image_index != 1) in efi_firmware_fit_set_image() 308 if (fit_update(image)) in efi_firmware_fit_set_image() 405 const void *image, in efi_firmware_raw_set_image() argument 420 if (!image) in efi_firmware_raw_set_image() 439 image = capsule_payload; in efi_firmware_raw_set_image() 447 header = (void *)image; in efi_firmware_raw_set_image() [all …]
|
/u-boot-v2022.01-rc1/lib/ |
A D | binman.c | 25 ofnode image; member 67 node = binman->image; in binman_entry_find_internal() 84 return binman_entry_find_internal(binman->image, name, entry); in binman_entry_find() 106 return ofnode_find_subnode(binman->image, name); in binman_section_find_node() 130 binman->image = node; in binman_select_subnode() 132 ofnode_get_name(binman->image)); in binman_select_subnode() 144 ret = find_image_node(&binman->image); in binman_init() 149 ofnode_get_name(binman->image)); in binman_init()
|
/u-boot-v2022.01-rc1/arch/riscv/lib/ |
A D | image.c | 36 int booti_setup(ulong image, ulong *relocated_addr, ulong *size, in booti_setup() argument 41 lhdr = (struct linux_image_h *)map_sysmem(image, 0); in booti_setup() 54 (gd->ram_base <= image && image < gd->ram_base + gd->ram_size)) { in booti_setup() 57 *relocated_addr = image; in booti_setup()
|
/u-boot-v2022.01-rc1/lib/efi_selftest/ |
A D | efi_selftest_startimage_return.c | 40 static u8 *image; variable 48 static efi_status_t decompress(u8 **image) in decompress() argument 73 *image = buf; in decompress() 91 decompress(&image); in setup() 105 if (image) { in teardown() 106 r = boottime->free_pool(image); in teardown() 127 ret = boottime->load_image(false, image_handle, NULL, image, in execute()
|
A D | efi_selftest_startimage_exit.c | 40 static u8 *image; variable 48 static efi_status_t decompress(u8 **image) in decompress() argument 73 *image = buf; in decompress() 91 decompress(&image); in setup() 105 if (image) { in teardown() 106 r = boottime->free_pool(image); in teardown() 130 ret = boottime->load_image(false, image_handle, NULL, image, in execute()
|
/u-boot-v2022.01-rc1/board/toradex/apalis-imx8/ |
A D | apalis-imx8-imximage.cfg | 6 * and create imx8image boot image 15 /* Append seco container image */ 19 /* Add scfw image with exec attribute */ 21 /* Add ATF image with exec attribute */ 23 /* Add U-Boot image with load attribute */
|
/u-boot-v2022.01-rc1/board/toradex/apalis-imx8x/ |
A D | apalis-imx8x-imximage.cfg | 6 * and create imx8image boot image 15 /* Append seco container image */ 19 /* Add scfw image with exec attribute */ 21 /* Add ATF image with exec attribute */ 23 /* Add U-Boot image with load attribute */
|
/u-boot-v2022.01-rc1/board/toradex/colibri-imx8x/ |
A D | colibri-imx8x-imximage.cfg | 6 * and create imx8image boot image 15 /* Append seco container image */ 19 /* Add scfw image with exec attribute */ 21 /* Add ATF image with exec attribute */ 23 /* Add U-Boot image with load attribute */
|
/u-boot-v2022.01-rc1/doc/imx/habv4/guides/ |
A D | encrypted_boot.txt | 3 An authenticated U-Boot image is used as starting point for 4 Encrypted Boot. The image is encrypted by i.MX Code Signing 5 Tool (CST). The CST replaces only the image data of 9 The image data is encrypted with a Encryption Key (DEK). 12 which needs to be appended to the U-Boot image and specified in 15 The DEK blob is generated by an authenticated U-Boot image with 16 the dek_blob cmd enabled. The image used for DEK blob generation 32 U-Boot image. Note that the blob needs to be transferred back 34 the final image.
|
/u-boot-v2022.01-rc1/board/advantech/imx8qm_rom7720_a1/ |
A D | imximage.cfg | 12 /* Append seco container image */ 16 /* Add scfw image with exec attribute */ 18 /* Add ATF image with exec attribute */ 20 /* Add U-Boot image with load attribute */
|
/u-boot-v2022.01-rc1/board/congatec/cgtqmx8/ |
A D | imximage.cfg | 12 /* Append seco container image */ 16 /* Add scfw image with exec attribute */ 18 /* Add ATF image with exec attribute */ 20 /* Add U-Boot image with load attribute */
|