Searched refs:load_size (Results 1 – 8 of 8) sorted by relevance
114 load_size = os.path.getsize(headerised_filename)116 "crc32 " + hex(load_addr) + " " + hex(load_size) + " " + hex(crc_calc_adr)123 if load_size & 0xFFFF == 0:124 errase_size = load_size126 errase_size = load_size - (load_size & 0xFFFF) + 0x10000135 "sf write " + hex(load_addr) + " 0x0 " + hex(load_size) + " && " + \
132 load_size = os.path.getsize(headerised_filename)134 "crc32 " + hex(load_addr) + " " + hex(load_size) + " " + hex(crc_calc_adr)141 if load_size & 0xFFFF == 0:142 errase_size = load_size144 errase_size = load_size - (load_size & 0xFFFF) + 0x10000162 … "sf write " + hex(load_addr) + " " + hex(spi_flash_offset) + " " + hex(load_size) + " && " + \
190 unsigned long *load_size) in handle_cmdline_files() argument202 if (!load_addr || !load_size) in handle_cmdline_files()294 *load_size = alloc_size; in handle_cmdline_files()296 if (*load_size == 0) in handle_cmdline_files()
231 unsigned long load_size, in efi_measure_tagged_event() argument269 load_addr, load_size, &evt->event_data); in efi_measure_tagged_event()
1013 unsigned long *load_size);1018 unsigned long *load_size) in efi_load_dtb() argument1021 ULONG_MAX, ULONG_MAX, load_addr, load_size); in efi_load_dtb()
16 unsigned long load_size = -1; /* Work around bogus warning */ in BITSFUNC() local40 load_size = GET_BE(&pt[i].p_memsz); in BITSFUNC()51 if (stripped_len < load_size) in BITSFUNC()
48 unsigned long load_size = -1; /* Work around bogus warning */ in BITSFUNC() local76 load_size = GET_LE(&pt[i].p_memsz); in BITSFUNC()87 if (stripped_len < load_size) in BITSFUNC()
252 int load_size;