Home
last modified time | relevance | path

Searched refs:image (Results 1 – 25 of 526) sorted by relevance

12345678910>>...22

/u-boot/tools/binman/
A Dcontrol.py260 image.LoadData()
265 image.ResetForPack()
335 return image
399 return image
464 image.ExpandEntries()
500 image.GetEntryOffsets()
522 image.SetImagePos()
528 image.WriteSymbols()
532 image.ResetForPack()
538 image.BuildImage()
[all …]
A Dimage_test.py9 from binman.image import Image
14 image = Image('name', 'node', test=True)
16 image.LookupSymbol('_binman_something_prop_', False, 'msg', 0)
22 image = Image('name', 'node', test=True)
23 image._entries = {}
25 image.LookupSymbol('_binman_type_prop_pname', False, 'msg', 0)
30 image = Image('name', 'node', test=True)
31 image._entries = {}
40 image = Image('name', 'node', test=True)
41 image._entries = {'u-boot': 1}
[all …]
/u-boot/doc/
A DREADME.ti-secure32 bootable image was not created.
36 ${TI_SECURE_DEV_PKG}/scripts/create-boot-image.sh
49 create-boot-image.sh \
57 MLO - Generates an image for SD/MMC/eMMC media
81 create-boot-image.sh \
111 create-boot-image.sh \
128 u-boot-spl_HS_MLO - boot image for SD/MMC/eMMC. This image is
143 create-boot-image.sh \
180 image that it loads.
186 image. These DTB image may be one of many available to the boot
[all …]
A DREADME.commands.spl1 The spl command is used to export a boot parameter image to RAM. Later
6 used. (kernel image, initrd-image, fdt-image etc.)
20 nand read 0x82000000 0x280000 0x400000 /* Read kernel image from NAND*/
23 nand write 0x80000100 0x680000 0x20000 /* write the image - one page */
27 nand read 0x82000000 0x280000 0x400000 /* Read kernel image from NAND*/
A DREADME.nokia_rx518 NOLO is expecting a kernel image and will treat any image it finds in
11 appended to u-boot.bin at 0x40000. NOLO will load the entire image into
16 the appended kernel image will be booted using some generated and some
19 For generating combined image of u-boot and kernel there is a simple script
34 * 0. if keyboard is closed boot automatically attached kernel image
37 * 3. try boot from attached kernel image
57 * run kernload - Load kernel image ${mmckernfile}
58 * run initrdload - Load initrd image ${mmcinitrdfile}
59 * run kernboot - Boot loaded kernel image
60 * run kerninitrdboot - Boot loaded kernel image with loaded initrd image
[all …]
A DREADME.splashprepare7 image data before it is processed and sent to the frame buffer by
13 board specific splash image locations, routines for loading splash image from
24 formatted with a file system or a FIT image. In case of a filesystem, the splash
28 To enable loading the splash image from a FIT image, CONFIG_FIT must be
29 enabled. The FIT image has to start at the 'offset' field address in the
30 selected splash location. The name of splash image within the FIT shall be
/u-boot/tools/
A Difdtool.c64 (char *)ptr - image); in find_fd()
444 fdb = find_fd(image, size); in write_regions()
832 char *image; in main() local
1030 image = malloc(rom_size); in main()
1031 if (!image) { in main()
1036 memset(image, '\xff', rom_size); in main()
1049 ret = dump_fd(image, size); in main()
1082 set_em100_mode(image, size); in main()
1085 lock_descriptor(image, size); in main()
1088 unlock_descriptor(image, size); in main()
[all …]
A Dmkeficapsule.c295 + sizeof(image) in create_fwbin()
319 image.version = 0x00000003; in create_fwbin()
321 image.update_image_index = index; in create_fwbin()
322 image.reserved[0] = 0; in create_fwbin()
323 image.reserved[1] = 0; in create_fwbin()
324 image.reserved[2] = 0; in create_fwbin()
325 image.update_image_size = bin_stat.st_size; in create_fwbin()
327 image.update_hardware_instance = instance; in create_fwbin()
328 image.image_capsule_support = 0; in create_fwbin()
330 size = fwrite(&image, 1, sizeof(image), f); in create_fwbin()
[all …]
/u-boot/arch/arm/cpu/armv8/fsl-layerscape/doc/
A DREADME.qspi17 The difference between QSPI boot RCW image and NOR boot image is the PBI
21 RCW image should be written to the beginning of QSPI flash device.
26 => sf erase 0 +<size of rcw image>
28 => sf write <rcw image in memory> 0 <size of rcw image>
31 To get the QSPI image, build u-boot with QSPI config, for example,
32 <board_name>_qspi_defconfig. The image needed is u-boot-dtb.bin.
33 The u-boot image should be written to 0x10000(but 0x1000 for LS1043A, LS2080A).
37 => sf erase 10000 +<size of u-boot image>
39 => sf write <u-boot image in memory> 10000 <size of u-boot image>
/u-boot/doc/imx/mkimage/
A Dimx8image.txt7 A Boot image consists of:
14 only contain the SECO firmware image, the 2nd container can contain
16 - SCF FW image
17 - M4 FW image
18 - AP FW image
21 "System Boot and section", "5.9 (Boot image) of the processor's manual"
29 APPEND [ahab container image]
30 - indicates the ahah image that will be put in the 1st container
31 When creating container image will be loaded by SPL, this entry
35 IMAGE [SCU|M40|M41|A35|A53|A72] [image file] [load address]
/u-boot/arch/arm/mach-keystone/
A Dmon.c109 void *image = *p_image; in board_fit_image_post_process() local
111 if (strncmp(image + KS2_HS_SEC_TAG_OFFSET, "KEYS", 4)) { in board_fit_image_post_process()
116 result = k2_hs_bm_auth(KS2_AUTH_CMD, image); in board_fit_image_post_process()
127 *p_size = get_unaligned_le32(image + (*p_size - 4)); in board_fit_image_post_process()
128 memcpy(image, image + KS2_HS_SEC_HEADER_LEN, *p_size); in board_fit_image_post_process()
/u-boot/doc/uImage.FIT/
A Dcommand_syntax_extensions.txt29 2. bootm <addr1> /* single image at <addr1> */
30 3. bootm <addr1> /* multi-image at <addr1> */
31 4. bootm <addr1> - /* multi-image at <addr1> */
48 the current image address.
51 Ad. 2. Boot kernel image located at <addr1>.
56 with the ramdisk from the image.
71 from the image at <addr2>.
126 - new uImage sub-image specification
127 <addr>:<sub-image unit_name>
168 Note on current image address
[all …]
/u-boot/doc/board/toradex/
A Dcolibri_imx7.rst10 - NAND IMX image adjustments before flashing
32 * **Boot data** -indicates the program image location, program image size
35 * **User image**: U-Boot image (``u-boot-dtb.bin``)
38 IMX image adjustments prior to flashing
51 in **Boot Data** section of IMX image.
66 * ``877ff000`` - Program image address
67 * ``000a8060`` - Program image size
74 and then pad the image:
86 beginning of the image.
92 Flash U-Boot IMX image to eMMC
[all …]
/u-boot/doc/SPL/
A DREADME.spl-secure-boot13 The SPL image is responsible for loading the next stage boot loader, which is
14 the main u-boot image. For secure boot process on these platforms ROM verifies
15 SPL image, so to continue chain of trust SPL image verifies U-boot image using
17 (appended to U-boot image) to validate the U-boot binary just before passing
/u-boot/lib/efi_loader/
A Defi_firmware.c43 void *image, in efi_firmware_get_image_unsupported() argument
56 const void *image, in efi_firmware_check_image_unsupported() argument
87 const void *image, in efi_firmware_set_package_info_unsupported() argument
296 const void *image, in efi_firmware_fit_set_image() argument
305 if (!image || image_index != 1) in efi_firmware_fit_set_image()
308 if (fit_update(image)) in efi_firmware_fit_set_image()
405 const void *image, in efi_firmware_raw_set_image() argument
420 if (!image) in efi_firmware_raw_set_image()
440 image = capsule_payload; in efi_firmware_raw_set_image()
448 header = (void *)image; in efi_firmware_raw_set_image()
[all …]
/u-boot/lib/
A Dbinman.c25 ofnode image; member
67 node = binman->image; in binman_entry_find_internal()
84 return binman_entry_find_internal(binman->image, name, entry); in binman_entry_find()
106 return ofnode_find_subnode(binman->image, name); in binman_section_find_node()
130 binman->image = node; in binman_select_subnode()
132 ofnode_get_name(binman->image)); in binman_select_subnode()
144 ret = find_image_node(&binman->image); in binman_init()
149 ofnode_get_name(binman->image)); in binman_init()
/u-boot/board/sbc8641d/
A DREADME37 a recently installed non-functional image, to perform a recovery from
38 that non-functional image goes essentially as follows:
40 a) power down the board and jumper JP10 to select the functional image.
42 c) while on, using static precautions, move JP10 back to the failed image.
43 d) use "md fff00000" to confirm you are looking at the failed image
45 f) get new image, i.e. "tftp 200000 /somepath/u-boot.bin"
46 g) erase failed image: "erase FFF00000 FFF5FFFF"
47 h) copy in new image: "cp.b 200000 FFF00000 60000"
48 i) ensure new image is written: "md fff00000"
49 k) power cycle the board and confirm new image works.
/u-boot/lib/efi_selftest/
A Defi_selftest_startimage_return.c40 static u8 *image; variable
48 static efi_status_t decompress(u8 **image) in decompress() argument
73 *image = buf; in decompress()
91 decompress(&image); in setup()
105 if (image) { in teardown()
106 r = boottime->free_pool(image); in teardown()
127 ret = boottime->load_image(false, image_handle, NULL, image, in execute()
A Defi_selftest_startimage_exit.c40 static u8 *image; variable
48 static efi_status_t decompress(u8 **image) in decompress() argument
73 *image = buf; in decompress()
91 decompress(&image); in setup()
105 if (image) { in teardown()
106 r = boottime->free_pool(image); in teardown()
130 ret = boottime->load_image(false, image_handle, NULL, image, in execute()
/u-boot/board/freescale/imx8mm_evk/
A Dboot.cmd6 if fatload mmc 1:${mmcpart} ${kernel_addr_r} ${image}; then
8 echo Load image and .dtb from SD card(mmc1);
16 if fatload mmc 2:${mmcpart} ${kernel_addr_r} ${image}; then
18 echo Load image and .dtb from eMMC(mmc2);
26 if dhcp ${kernel_addr_r} ${serverip}:${image}; then
28 echo Load image and .dtb from net(dhcp);
/u-boot/board/toradex/apalis-imx8x/
A Dapalis-imx8x-imximage.cfg6 * and create imx8image boot image
15 /* Append seco container image */
19 /* Add scfw image with exec attribute */
21 /* Add ATF image with exec attribute */
23 /* Add U-Boot image with load attribute */
/u-boot/board/toradex/colibri-imx8x/
A Dcolibri-imx8x-imximage.cfg6 * and create imx8image boot image
15 /* Append seco container image */
19 /* Add scfw image with exec attribute */
21 /* Add ATF image with exec attribute */
23 /* Add U-Boot image with load attribute */
/u-boot/board/toradex/apalis-imx8/
A Dapalis-imx8-imximage.cfg6 * and create imx8image boot image
15 /* Append seco container image */
19 /* Add scfw image with exec attribute */
21 /* Add ATF image with exec attribute */
23 /* Add U-Boot image with load attribute */
/u-boot/doc/imx/habv4/guides/
A Dencrypted_boot.txt3 An authenticated U-Boot image is used as starting point for
4 Encrypted Boot. The image is encrypted by i.MX Code Signing
5 Tool (CST). The CST replaces only the image data of
9 The image data is encrypted with a Encryption Key (DEK).
12 which needs to be appended to the U-Boot image and specified in
15 The DEK blob is generated by an authenticated U-Boot image with
16 the dek_blob cmd enabled. The image used for DEK blob generation
32 U-Boot image. Note that the blob needs to be transferred back
34 the final image.
/u-boot/board/advantech/imx8qm_rom7720_a1/
A Dimximage.cfg12 /* Append seco container image */
16 /* Add scfw image with exec attribute */
18 /* Add ATF image with exec attribute */
20 /* Add U-Boot image with load attribute */

Completed in 69 milliseconds

12345678910>>...22