Home
last modified time | relevance | path

Searched +full:image +full:- +full:0 (Results 1 – 25 of 827) sorted by relevance

12345678910>>...34

/Zephyr-latest/dts/common/nordic/
Dnrf5340_cpuapp_partition.dtsi4 * SPDX-License-Identifier: Apache-2.0
12 * This layout matches (by necessity) that in the TF-M repository:
14 * 0x0000_0000 BL2 - MCUBoot (64 KB)
15 * 0x0001_0000 Primary image area (448 KB):
16 * 0x0001_0000 Secure image primary (256 KB)
17 * 0x0005_0000 Non-secure image primary (192 KB)
18 * 0x0008_0000 Secondary image area (448 KB):
19 * 0x0008_0000 Secure image secondary (256 KB)
20 * 0x000c_0000 Non-secure image secondary (192 KB)
21 * 0x000f_0000 Protected Storage Area (16 KB)
[all …]
Dnrf91xx_partition.dtsi4 * SPDX-License-Identifier: Apache-2.0
12 * This layout matches (by necessity) that in the TF-M repository:
14 * 0x0000_0000 BL2 - MCUBoot (64 KB)
15 * 0x0001_0000 Primary image area (448 KB):
16 * 0x0001_0000 Secure image primary (256 KB)
17 * 0x0005_0000 Non-secure image primary (192 KB)
18 * 0x0008_0000 Secondary image area (448 KB):
19 * 0x0008_0000 Secure image secondary (256 KB)
20 * 0x000c_0000 Non-secure image secondary (192 KB)
21 * 0x000f_0000 Protected Storage Area (16 KB)
[all …]
/Zephyr-latest/scripts/pylib/pytest-twister-harness/tests/fixtures/
Dmcumgr_fixture_test.py3 # SPDX-License-Identifier: Apache-2.0
13 def fixture_mcumgr() -> MCUmgr:
20 ) -> None:
25 patched_run_command.assert_called_with('image list')
27 mcumgr.image_upload('/path/to/image', timeout=100)
28 patched_run_command.assert_called_with('-t 100 image upload /path/to/image')
30 mcumgr.image_upload('/path/to/image', slot=2, timeout=100)
31 patched_run_command.assert_called_with('-t 100 image upload /path/to/image -e -n 2')
34 patched_run_command.assert_called_with('image test ABCD')
37 patched_run_command.assert_called_with('image confirm ABCD')
[all …]
/Zephyr-latest/include/zephyr/mgmt/mcumgr/grp/img_mgmt/
Dimg_mgmt.h2 * Copyright (c) 2018-2021 mcumgr authors
3 * Copyright (c) 2022-2024 Nordic Semiconductor ASA
5 * SPDX-License-Identifier: Apache-2.0
14 #include <bootutil/image.h>
31 * Image state flags
33 #define IMG_MGMT_STATE_F_PENDING 0x01
34 #define IMG_MGMT_STATE_F_CONFIRMED 0x02
35 #define IMG_MGMT_STATE_F_ACTIVE 0x04
36 #define IMG_MGMT_STATE_F_PERMANENT 0x08
38 /* 255.255.65535.4294967295\0 */
[all …]
Dimg_mgmt_client.h4 * SPDX-License-Identifier: Apache-2.0
15 * @brief MCUmgr Image management client API
26 * @brief Image list flags.
29 /** Bootable image */
33 /** Confirmed image */
35 /** Active image */
37 /** Permanent image state */
42 * @brief Image list data.
45 /** Image slot num */
47 /** Image number */
[all …]
/Zephyr-latest/subsys/mgmt/mcumgr/grp/img_mgmt/include/mgmt/mcumgr/grp/img_mgmt/
Dimg_mgmt_priv.h2 * Copyright (c) 2018-2021 mcumgr authors
3 * Copyright (c) 2022-2023 Nordic Semiconductor ASA
5 * SPDX-License-Identifier: Apache-2.0
26 * @return 0 on success, MGMT_ERR_[...] code on failure.
31 * @brief Marks the image in the specified slot as pending. On the next reboot,
32 * the system will perform a boot of the specified image.
35 * @param permanent Whether the image should be used permanently or only tested once:
36 * 0=run image once, then confirm or revert.
37 * 1=run image forever.
39 * @return 0 on success, MGMT_ERR_[...] code on failure.
[all …]
/Zephyr-latest/boards/st/nucleo_l552ze_q/
Dnucleo_l552ze_q_stm32l552xx_ns.dts4 * SPDX-License-Identifier: Apache-2.0
7 /dts-v1/;
8 #include "nucleo_l552ze_q-common.dtsi"
11 model = "STMicroelectronics STM32L552ZE-NUCLEO-Q board";
12 compatible = "st,stm32l552ze-nucleo-q";
14 #address-cells = <1>;
15 #size-cells = <1>;
19 zephyr,shell-uart = &lpuart1;
22 zephyr,code-partition = &slot0_ns_partition;
34 compatible = "fixed-partitions";
[all …]
/Zephyr-latest/boards/ezurio/bl5340_dvk/
Dbl5340_dvk_nrf5340_cpuapp_partition_conf.dtsi2 * Copyright (c) 2019-2020 Nordic Semiconductor ASA
5 * SPDX-License-Identifier: Apache-2.0
11 * Zephyr build for BL5340 with ARM TrustZone-M support
12 * implies building Secure and Non-Secure Zephyr images.
14 * Secure image will be placed, by default, in flash0
16 * Secure image will use sram0 for system memory.
18 * Non-Secure image will be placed in slot0_ns, and use
21 * Note that the Secure image only requires knowledge of
22 * the beginning of the Non-Secure image (not its size).
26 reg = <0x00010000 0xa0000>;
[all …]
/Zephyr-latest/include/zephyr/dfu/
Dmcuboot.h5 * SPDX-License-Identifier: Apache-2.0
10 * @brief MCUboot public API for MCUboot control of image boot process
26 * @brief MCUboot public API for MCUboot control of image boot process
28 * @defgroup mcuboot_api MCUboot image control API
42 /** Attempt to boot the contents of slot 0. */
78 /** Swap failed because image to be run is not valid */
82 #define BOOT_IMG_VER_STRLEN_MAX 25 /* 255.255.65535.4294967295\0 */
86 * @brief MCUboot image header representation for image version
88 * The header for an MCUboot firmware image contains an embedded
100 * @brief Model for the MCUboot image header as of version 1
[all …]
/Zephyr-latest/boards/st/b_u585i_iot02a/
Db_u585i_iot02a_stm32u585xx_ns.dts4 * SPDX-License-Identifier: Apache-2.0
7 /dts-v1/;
8 #include "b_u585i_iot02a-common.dtsi"
11 model = "STMicroelectronics B-U585I-IOT02A discovery kit";
12 compatible = "st,b-u585i-iot02a";
16 zephyr,shell-uart = &usart1;
19 zephyr,code-partition = &slot0_ns_partition;
32 compatible = "fixed-partitions";
33 #address-cells = <1>;
34 #size-cells = <1>;
[all …]
/Zephyr-latest/scripts/pylib/pytest-twister-harness/tests/helpers/
Dshell_mcuboot_command_parser_test.py3 # SPDX-License-Identifier: Apache-2.0
10 def test_if_mcuboot_command_output_is_parsed_two_areas() -> None:
14 confirmed: 0
16 version: 0.0.2+0
17 image size: 68240
21 image ok: unset
23 version: 0.0.0+0
24 image size: 68240
28 image ok: unset
33 assert isinstance(mcuboot_parsed.areas[0], ShellMCUbootArea)
[all …]
/Zephyr-latest/samples/subsys/usb/dfu/
DREADME.rst1 .. zephyr:code-sample:: usb-dfu
3 :relevant-api: _usb_device_core_api
17 class provided by the Zephyr project depends on DFU image manager and
33 to be loaded at the offset of SLOT-0.
40 .. code-block:: console
42 west build -b nrf52840dk/nrf52840 zephyr/samples/subsys/usb/dfu -d build-dfu -- \
43 -DCONFIG_MCUBOOT_SIGNATURE_KEY_FILE=\"bootloader/mcuboot/root-rsa-2048.pem\"
47 the USB DFU sample at the offset of SLOT-0.
49 Build and sign a second application image e.g. :zephyr:code-sample:`hello_world`,
50 which will be used as an image for the update.
[all …]
/Zephyr-latest/samples/subsys/mgmt/mcumgr/smp_svr/
DREADME.rst3 .. zephyr:code-sample:: smp-svr
53 Bluetooth Low Energy (BLE) and do not have a built-in or pluggable BLE radio,
55 :ref:`bluetooth-hci-uart-bluez`.
66 .. code-block:: console
68 west build -b <board> -d build_mcuboot bootloader/mcuboot/boot/zephyr
69 west flash -d build_mcuboot
84 .. group-tab:: Bluetooth
88 .. code-block:: console
91 -b nrf52dk/nrf52832 \
93 -- \
[all …]
/Zephyr-latest/dts/common/espressif/
Dpartitions_0x0_amp_16M.dtsi4 * SPDX-License-Identifier: Apache-2.0
10 compatible = "fixed-partitions";
11 #address-cells = <1>;
12 #size-cells = <1>;
14 boot_partition: partition@0 {
16 reg = <0x0 DT_SIZE_K(64)>;
20 label = "image-0";
21 reg = <0x20000 DT_SIZE_K(6080)>;
25 label = "image-0-appcpu";
26 reg = <0x610000 DT_SIZE_K(1920)>;
[all …]
Dpartitions_0x0_amp_2M.dtsi4 * SPDX-License-Identifier: Apache-2.0
10 compatible = "fixed-partitions";
11 #address-cells = <1>;
12 #size-cells = <1>;
14 boot_partition: partition@0 {
16 reg = <0x0 DT_SIZE_K(64)>;
20 label = "image-0";
21 reg = <0x20000 DT_SIZE_K(576)>;
25 label = "image-0-appcpu";
26 reg = <0xB0000 DT_SIZE_K(256)>;
[all …]
Dpartitions_0x0_amp_32M.dtsi4 * SPDX-License-Identifier: Apache-2.0
10 compatible = "fixed-partitions";
11 #address-cells = <1>;
12 #size-cells = <1>;
14 boot_partition: partition@0 {
16 reg = <0x0 DT_SIZE_K(64)>;
20 label = "image-0";
21 reg = <0x20000 DT_SIZE_K(12352)>;
25 label = "image-0-appcpu";
26 reg = <0xC30000 DT_SIZE_K(3840)>;
[all …]
Dpartitions_0x0_amp_4M.dtsi4 * SPDX-License-Identifier: Apache-2.0
10 compatible = "fixed-partitions";
11 #address-cells = <1>;
12 #size-cells = <1>;
14 boot_partition: partition@0 {
16 reg = <0x0 DT_SIZE_K(64)>;
20 label = "image-0";
21 reg = <0x20000 DT_SIZE_K(1344)>;
25 label = "image-0-appcpu";
26 reg = <0x170000 DT_SIZE_K(512)>;
[all …]
Dpartitions_0x0_amp_8M.dtsi4 * SPDX-License-Identifier: Apache-2.0
10 compatible = "fixed-partitions";
11 #address-cells = <1>;
12 #size-cells = <1>;
14 boot_partition: partition@0 {
16 reg = <0x0 DT_SIZE_K(64)>;
20 label = "image-0";
21 reg = <0x20000 DT_SIZE_K(3136)>;
25 label = "image-0-appcpu";
26 reg = <0x330000 DT_SIZE_K(768)>;
[all …]
Dpartitions_0x1000_amp_16M.dtsi4 * SPDX-License-Identifier: Apache-2.0
10 compatible = "fixed-partitions";
11 #address-cells = <1>;
12 #size-cells = <1>;
16 reg = <0x1000 DT_SIZE_K(60)>;
20 label = "image-0";
21 reg = <0x20000 DT_SIZE_K(6080)>;
25 label = "image-0-appcpu";
26 reg = <0x610000 DT_SIZE_K(1920)>;
30 label = "image-1";
[all …]
Dpartitions_0x1000_amp_2M.dtsi4 * SPDX-License-Identifier: Apache-2.0
10 compatible = "fixed-partitions";
11 #address-cells = <1>;
12 #size-cells = <1>;
16 reg = <0x1000 DT_SIZE_K(60)>;
20 label = "image-0";
21 reg = <0x20000 DT_SIZE_K(576)>;
25 label = "image-0-appcpu";
26 reg = <0xB0000 DT_SIZE_K(256)>;
30 label = "image-1";
[all …]
Dpartitions_0x1000_amp_32M.dtsi4 * SPDX-License-Identifier: Apache-2.0
10 compatible = "fixed-partitions";
11 #address-cells = <1>;
12 #size-cells = <1>;
16 reg = <0x1000 DT_SIZE_K(60)>;
20 label = "image-0";
21 reg = <0x20000 DT_SIZE_K(12352)>;
25 label = "image-0-appcpu";
26 reg = <0xC24000 DT_SIZE_K(3840)>;
30 label = "image-1";
[all …]
Dpartitions_0x1000_amp_4M.dtsi4 * SPDX-License-Identifier: Apache-2.0
10 compatible = "fixed-partitions";
11 #address-cells = <1>;
12 #size-cells = <1>;
16 reg = <0x1000 DT_SIZE_K(60)>;
20 label = "image-0";
21 reg = <0x20000 DT_SIZE_K(1344)>;
25 label = "image-0-appcpu";
26 reg = <0x170000 DT_SIZE_K(512)>;
30 label = "image-1";
[all …]
Dpartitions_0x1000_amp_8M.dtsi4 * SPDX-License-Identifier: Apache-2.0
10 compatible = "fixed-partitions";
11 #address-cells = <1>;
12 #size-cells = <1>;
16 reg = <0x1000 DT_SIZE_K(60)>;
20 label = "image-0";
21 reg = <0x20000 DT_SIZE_K(3136)>;
25 label = "image-0-appcpu";
26 reg = <0x330000 DT_SIZE_K(768)>;
30 label = "image-1";
[all …]
/Zephyr-latest/subsys/mgmt/mcumgr/grp/img_mgmt/
DKconfig2 # Copyright Nordic Semiconductor ASA 2020-2022. All rights reserved.
3 # SPDX-License-Identifier: Apache-2.0
5 # The Kconfig file is dedicated to Application Image management group of
10 # MCUMGR_GRP_IMG_ -- general group options;
16 bool "Mcumgr handlers for image management"
24 Enables MCUmgr handlers for image management
28 if HEAP_MEM_POOL_SIZE > 0
31 bool "Use heap mem pool for flash image DFU context"
33 Use heap to allocate flash image upload context, otherwise a static variable will
34 be used. The context object is used by MCUMGR_GRP_IMG_MANAGER to buffer image writes
[all …]
/Zephyr-latest/soc/nxp/imxrt/imxrt118x/
DKconfig2 # SPDX-License-Identifier: Apache-2.0
38 hex "Image container"
39 default 0x1000
41 Image container is a boot image format that is used by ROM. Container
42 format consists container header, image arrary entry, signature block
46 # Note- This config present the offest between container header and user
47 # image. If ROM_START_OFFSET changed, you also need to change CONTAINER_USER_IMAGE_OFFSET
48 # value. CONTAINER_USER_IMAGE_OFFSET = ROM_START_OFFSET - IMAGE_CONTAINER_OFFSET.
50 hex "The offset between container header and user image"
51 default 0xA000
[all …]

12345678910>>...34