/u-boot/tools/binman/ |
A D | control.py | 260 image.LoadData() 265 image.ResetForPack() 335 return image 399 return image 464 image.ExpandEntries() 500 image.GetEntryOffsets() 522 image.SetImagePos() 528 image.WriteSymbols() 532 image.ResetForPack() 538 image.BuildImage() [all …]
|
A D | image_test.py | 9 from binman.image import Image 14 image = Image('name', 'node', test=True) 16 image.LookupSymbol('_binman_something_prop_', False, 'msg', 0) 22 image = Image('name', 'node', test=True) 23 image._entries = {} 25 image.LookupSymbol('_binman_type_prop_pname', False, 'msg', 0) 30 image = Image('name', 'node', test=True) 31 image._entries = {} 40 image = Image('name', 'node', test=True) 41 image._entries = {'u-boot': 1} [all …]
|
/u-boot/doc/ |
A D | README.ti-secure | 32 bootable image was not created. 36 ${TI_SECURE_DEV_PKG}/scripts/create-boot-image.sh 49 create-boot-image.sh \ 57 MLO - Generates an image for SD/MMC/eMMC media 81 create-boot-image.sh \ 111 create-boot-image.sh \ 128 u-boot-spl_HS_MLO - boot image for SD/MMC/eMMC. This image is 143 create-boot-image.sh \ 180 image that it loads. 186 image. These DTB image may be one of many available to the boot [all …]
|
A D | README.commands.spl | 1 The spl command is used to export a boot parameter image to RAM. Later 6 used. (kernel image, initrd-image, fdt-image etc.) 20 nand read 0x82000000 0x280000 0x400000 /* Read kernel image from NAND*/ 23 nand write 0x80000100 0x680000 0x20000 /* write the image - one page */ 27 nand read 0x82000000 0x280000 0x400000 /* Read kernel image from NAND*/
|
A D | README.nokia_rx51 | 8 NOLO is expecting a kernel image and will treat any image it finds in 11 appended to u-boot.bin at 0x40000. NOLO will load the entire image into 16 the appended kernel image will be booted using some generated and some 19 For generating combined image of u-boot and kernel there is a simple script 34 * 0. if keyboard is closed boot automatically attached kernel image 37 * 3. try boot from attached kernel image 57 * run kernload - Load kernel image ${mmckernfile} 58 * run initrdload - Load initrd image ${mmcinitrdfile} 59 * run kernboot - Boot loaded kernel image 60 * run kerninitrdboot - Boot loaded kernel image with loaded initrd image [all …]
|
A D | README.splashprepare | 7 image data before it is processed and sent to the frame buffer by 13 board specific splash image locations, routines for loading splash image from 24 formatted with a file system or a FIT image. In case of a filesystem, the splash 28 To enable loading the splash image from a FIT image, CONFIG_FIT must be 29 enabled. The FIT image has to start at the 'offset' field address in the 30 selected splash location. The name of splash image within the FIT shall be
|
/u-boot/tools/ |
A D | ifdtool.c | 64 (char *)ptr - image); in find_fd() 444 fdb = find_fd(image, size); in write_regions() 832 char *image; in main() local 1030 image = malloc(rom_size); in main() 1031 if (!image) { in main() 1036 memset(image, '\xff', rom_size); in main() 1049 ret = dump_fd(image, size); in main() 1082 set_em100_mode(image, size); in main() 1085 lock_descriptor(image, size); in main() 1088 unlock_descriptor(image, size); in main() [all …]
|
A D | mkeficapsule.c | 295 + sizeof(image) in create_fwbin() 319 image.version = 0x00000003; in create_fwbin() 321 image.update_image_index = index; in create_fwbin() 322 image.reserved[0] = 0; in create_fwbin() 323 image.reserved[1] = 0; in create_fwbin() 324 image.reserved[2] = 0; in create_fwbin() 325 image.update_image_size = bin_stat.st_size; in create_fwbin() 327 image.update_hardware_instance = instance; in create_fwbin() 328 image.image_capsule_support = 0; in create_fwbin() 330 size = fwrite(&image, 1, sizeof(image), f); in create_fwbin() [all …]
|
/u-boot/arch/arm/cpu/armv8/fsl-layerscape/doc/ |
A D | README.qspi | 17 The difference between QSPI boot RCW image and NOR boot image is the PBI 21 RCW image should be written to the beginning of QSPI flash device. 26 => sf erase 0 +<size of rcw image> 28 => sf write <rcw image in memory> 0 <size of rcw image> 31 To get the QSPI image, build u-boot with QSPI config, for example, 32 <board_name>_qspi_defconfig. The image needed is u-boot-dtb.bin. 33 The u-boot image should be written to 0x10000(but 0x1000 for LS1043A, LS2080A). 37 => sf erase 10000 +<size of u-boot image> 39 => sf write <u-boot image in memory> 10000 <size of u-boot image>
|
/u-boot/doc/imx/mkimage/ |
A D | imx8image.txt | 7 A Boot image consists of: 14 only contain the SECO firmware image, the 2nd container can contain 16 - SCF FW image 17 - M4 FW image 18 - AP FW image 21 "System Boot and section", "5.9 (Boot image) of the processor's manual" 29 APPEND [ahab container image] 30 - indicates the ahah image that will be put in the 1st container 31 When creating container image will be loaded by SPL, this entry 35 IMAGE [SCU|M40|M41|A35|A53|A72] [image file] [load address]
|
/u-boot/arch/arm/mach-keystone/ |
A D | mon.c | 109 void *image = *p_image; in board_fit_image_post_process() local 111 if (strncmp(image + KS2_HS_SEC_TAG_OFFSET, "KEYS", 4)) { in board_fit_image_post_process() 116 result = k2_hs_bm_auth(KS2_AUTH_CMD, image); in board_fit_image_post_process() 127 *p_size = get_unaligned_le32(image + (*p_size - 4)); in board_fit_image_post_process() 128 memcpy(image, image + KS2_HS_SEC_HEADER_LEN, *p_size); in board_fit_image_post_process()
|
/u-boot/doc/uImage.FIT/ |
A D | command_syntax_extensions.txt | 29 2. bootm <addr1> /* single image at <addr1> */ 30 3. bootm <addr1> /* multi-image at <addr1> */ 31 4. bootm <addr1> - /* multi-image at <addr1> */ 48 the current image address. 51 Ad. 2. Boot kernel image located at <addr1>. 56 with the ramdisk from the image. 71 from the image at <addr2>. 126 - new uImage sub-image specification 127 <addr>:<sub-image unit_name> 168 Note on current image address [all …]
|
/u-boot/doc/board/toradex/ |
A D | colibri_imx7.rst | 10 - NAND IMX image adjustments before flashing 32 * **Boot data** -indicates the program image location, program image size 35 * **User image**: U-Boot image (``u-boot-dtb.bin``) 38 IMX image adjustments prior to flashing 51 in **Boot Data** section of IMX image. 66 * ``877ff000`` - Program image address 67 * ``000a8060`` - Program image size 74 and then pad the image: 86 beginning of the image. 92 Flash U-Boot IMX image to eMMC [all …]
|
/u-boot/doc/SPL/ |
A D | README.spl-secure-boot | 13 The SPL image is responsible for loading the next stage boot loader, which is 14 the main u-boot image. For secure boot process on these platforms ROM verifies 15 SPL image, so to continue chain of trust SPL image verifies U-boot image using 17 (appended to U-boot image) to validate the U-boot binary just before passing
|
/u-boot/lib/efi_loader/ |
A D | efi_firmware.c | 43 void *image, in efi_firmware_get_image_unsupported() argument 56 const void *image, in efi_firmware_check_image_unsupported() argument 87 const void *image, in efi_firmware_set_package_info_unsupported() argument 296 const void *image, in efi_firmware_fit_set_image() argument 305 if (!image || image_index != 1) in efi_firmware_fit_set_image() 308 if (fit_update(image)) in efi_firmware_fit_set_image() 405 const void *image, in efi_firmware_raw_set_image() argument 420 if (!image) in efi_firmware_raw_set_image() 440 image = capsule_payload; in efi_firmware_raw_set_image() 448 header = (void *)image; in efi_firmware_raw_set_image() [all …]
|
/u-boot/lib/ |
A D | binman.c | 25 ofnode image; member 67 node = binman->image; in binman_entry_find_internal() 84 return binman_entry_find_internal(binman->image, name, entry); in binman_entry_find() 106 return ofnode_find_subnode(binman->image, name); in binman_section_find_node() 130 binman->image = node; in binman_select_subnode() 132 ofnode_get_name(binman->image)); in binman_select_subnode() 144 ret = find_image_node(&binman->image); in binman_init() 149 ofnode_get_name(binman->image)); in binman_init()
|
/u-boot/board/sbc8641d/ |
A D | README | 37 a recently installed non-functional image, to perform a recovery from 38 that non-functional image goes essentially as follows: 40 a) power down the board and jumper JP10 to select the functional image. 42 c) while on, using static precautions, move JP10 back to the failed image. 43 d) use "md fff00000" to confirm you are looking at the failed image 45 f) get new image, i.e. "tftp 200000 /somepath/u-boot.bin" 46 g) erase failed image: "erase FFF00000 FFF5FFFF" 47 h) copy in new image: "cp.b 200000 FFF00000 60000" 48 i) ensure new image is written: "md fff00000" 49 k) power cycle the board and confirm new image works.
|
/u-boot/lib/efi_selftest/ |
A D | efi_selftest_startimage_return.c | 40 static u8 *image; variable 48 static efi_status_t decompress(u8 **image) in decompress() argument 73 *image = buf; in decompress() 91 decompress(&image); in setup() 105 if (image) { in teardown() 106 r = boottime->free_pool(image); in teardown() 127 ret = boottime->load_image(false, image_handle, NULL, image, in execute()
|
A D | efi_selftest_startimage_exit.c | 40 static u8 *image; variable 48 static efi_status_t decompress(u8 **image) in decompress() argument 73 *image = buf; in decompress() 91 decompress(&image); in setup() 105 if (image) { in teardown() 106 r = boottime->free_pool(image); in teardown() 130 ret = boottime->load_image(false, image_handle, NULL, image, in execute()
|
/u-boot/board/freescale/imx8mm_evk/ |
A D | boot.cmd | 6 if fatload mmc 1:${mmcpart} ${kernel_addr_r} ${image}; then 8 echo Load image and .dtb from SD card(mmc1); 16 if fatload mmc 2:${mmcpart} ${kernel_addr_r} ${image}; then 18 echo Load image and .dtb from eMMC(mmc2); 26 if dhcp ${kernel_addr_r} ${serverip}:${image}; then 28 echo Load image and .dtb from net(dhcp);
|
/u-boot/board/toradex/apalis-imx8x/ |
A D | apalis-imx8x-imximage.cfg | 6 * and create imx8image boot image 15 /* Append seco container image */ 19 /* Add scfw image with exec attribute */ 21 /* Add ATF image with exec attribute */ 23 /* Add U-Boot image with load attribute */
|
/u-boot/board/toradex/colibri-imx8x/ |
A D | colibri-imx8x-imximage.cfg | 6 * and create imx8image boot image 15 /* Append seco container image */ 19 /* Add scfw image with exec attribute */ 21 /* Add ATF image with exec attribute */ 23 /* Add U-Boot image with load attribute */
|
/u-boot/board/toradex/apalis-imx8/ |
A D | apalis-imx8-imximage.cfg | 6 * and create imx8image boot image 15 /* Append seco container image */ 19 /* Add scfw image with exec attribute */ 21 /* Add ATF image with exec attribute */ 23 /* Add U-Boot image with load attribute */
|
/u-boot/doc/imx/habv4/guides/ |
A D | encrypted_boot.txt | 3 An authenticated U-Boot image is used as starting point for 4 Encrypted Boot. The image is encrypted by i.MX Code Signing 5 Tool (CST). The CST replaces only the image data of 9 The image data is encrypted with a Encryption Key (DEK). 12 which needs to be appended to the U-Boot image and specified in 15 The DEK blob is generated by an authenticated U-Boot image with 16 the dek_blob cmd enabled. The image used for DEK blob generation 32 U-Boot image. Note that the blob needs to be transferred back 34 the final image.
|
/u-boot/board/advantech/imx8qm_rom7720_a1/ |
A D | imximage.cfg | 12 /* Append seco container image */ 16 /* Add scfw image with exec attribute */ 18 /* Add ATF image with exec attribute */ 20 /* Add U-Boot image with load attribute */
|