Searched +full:image +full:- +full:0 (Results 1 – 25 of 827) sorted by relevance
12345678910>>...34
/Zephyr-latest/dts/common/nordic/ |
D | nrf5340_cpuapp_partition.dtsi | 4 * SPDX-License-Identifier: Apache-2.0 12 * This layout matches (by necessity) that in the TF-M repository: 14 * 0x0000_0000 BL2 - MCUBoot (64 KB) 15 * 0x0001_0000 Primary image area (448 KB): 16 * 0x0001_0000 Secure image primary (256 KB) 17 * 0x0005_0000 Non-secure image primary (192 KB) 18 * 0x0008_0000 Secondary image area (448 KB): 19 * 0x0008_0000 Secure image secondary (256 KB) 20 * 0x000c_0000 Non-secure image secondary (192 KB) 21 * 0x000f_0000 Protected Storage Area (16 KB) [all …]
|
D | nrf91xx_partition.dtsi | 4 * SPDX-License-Identifier: Apache-2.0 12 * This layout matches (by necessity) that in the TF-M repository: 14 * 0x0000_0000 BL2 - MCUBoot (64 KB) 15 * 0x0001_0000 Primary image area (448 KB): 16 * 0x0001_0000 Secure image primary (256 KB) 17 * 0x0005_0000 Non-secure image primary (192 KB) 18 * 0x0008_0000 Secondary image area (448 KB): 19 * 0x0008_0000 Secure image secondary (256 KB) 20 * 0x000c_0000 Non-secure image secondary (192 KB) 21 * 0x000f_0000 Protected Storage Area (16 KB) [all …]
|
/Zephyr-latest/scripts/pylib/pytest-twister-harness/tests/fixtures/ |
D | mcumgr_fixture_test.py | 3 # SPDX-License-Identifier: Apache-2.0 13 def fixture_mcumgr() -> MCUmgr: 20 ) -> None: 25 patched_run_command.assert_called_with('image list') 27 mcumgr.image_upload('/path/to/image', timeout=100) 28 patched_run_command.assert_called_with('-t 100 image upload /path/to/image') 30 mcumgr.image_upload('/path/to/image', slot=2, timeout=100) 31 patched_run_command.assert_called_with('-t 100 image upload /path/to/image -e -n 2') 34 patched_run_command.assert_called_with('image test ABCD') 37 patched_run_command.assert_called_with('image confirm ABCD') [all …]
|
/Zephyr-latest/include/zephyr/mgmt/mcumgr/grp/img_mgmt/ |
D | img_mgmt.h | 2 * Copyright (c) 2018-2021 mcumgr authors 3 * Copyright (c) 2022-2024 Nordic Semiconductor ASA 5 * SPDX-License-Identifier: Apache-2.0 14 #include <bootutil/image.h> 31 * Image state flags 33 #define IMG_MGMT_STATE_F_PENDING 0x01 34 #define IMG_MGMT_STATE_F_CONFIRMED 0x02 35 #define IMG_MGMT_STATE_F_ACTIVE 0x04 36 #define IMG_MGMT_STATE_F_PERMANENT 0x08 38 /* 255.255.65535.4294967295\0 */ [all …]
|
D | img_mgmt_client.h | 4 * SPDX-License-Identifier: Apache-2.0 15 * @brief MCUmgr Image management client API 26 * @brief Image list flags. 29 /** Bootable image */ 33 /** Confirmed image */ 35 /** Active image */ 37 /** Permanent image state */ 42 * @brief Image list data. 45 /** Image slot num */ 47 /** Image number */ [all …]
|
/Zephyr-latest/subsys/mgmt/mcumgr/grp/img_mgmt/include/mgmt/mcumgr/grp/img_mgmt/ |
D | img_mgmt_priv.h | 2 * Copyright (c) 2018-2021 mcumgr authors 3 * Copyright (c) 2022-2023 Nordic Semiconductor ASA 5 * SPDX-License-Identifier: Apache-2.0 26 * @return 0 on success, MGMT_ERR_[...] code on failure. 31 * @brief Marks the image in the specified slot as pending. On the next reboot, 32 * the system will perform a boot of the specified image. 35 * @param permanent Whether the image should be used permanently or only tested once: 36 * 0=run image once, then confirm or revert. 37 * 1=run image forever. 39 * @return 0 on success, MGMT_ERR_[...] code on failure. [all …]
|
/Zephyr-latest/boards/st/nucleo_l552ze_q/ |
D | nucleo_l552ze_q_stm32l552xx_ns.dts | 4 * SPDX-License-Identifier: Apache-2.0 7 /dts-v1/; 8 #include "nucleo_l552ze_q-common.dtsi" 11 model = "STMicroelectronics STM32L552ZE-NUCLEO-Q board"; 12 compatible = "st,stm32l552ze-nucleo-q"; 14 #address-cells = <1>; 15 #size-cells = <1>; 19 zephyr,shell-uart = &lpuart1; 22 zephyr,code-partition = &slot0_ns_partition; 34 compatible = "fixed-partitions"; [all …]
|
/Zephyr-latest/boards/ezurio/bl5340_dvk/ |
D | bl5340_dvk_nrf5340_cpuapp_partition_conf.dtsi | 2 * Copyright (c) 2019-2020 Nordic Semiconductor ASA 5 * SPDX-License-Identifier: Apache-2.0 11 * Zephyr build for BL5340 with ARM TrustZone-M support 12 * implies building Secure and Non-Secure Zephyr images. 14 * Secure image will be placed, by default, in flash0 16 * Secure image will use sram0 for system memory. 18 * Non-Secure image will be placed in slot0_ns, and use 21 * Note that the Secure image only requires knowledge of 22 * the beginning of the Non-Secure image (not its size). 26 reg = <0x00010000 0xa0000>; [all …]
|
/Zephyr-latest/include/zephyr/dfu/ |
D | mcuboot.h | 5 * SPDX-License-Identifier: Apache-2.0 10 * @brief MCUboot public API for MCUboot control of image boot process 26 * @brief MCUboot public API for MCUboot control of image boot process 28 * @defgroup mcuboot_api MCUboot image control API 42 /** Attempt to boot the contents of slot 0. */ 78 /** Swap failed because image to be run is not valid */ 82 #define BOOT_IMG_VER_STRLEN_MAX 25 /* 255.255.65535.4294967295\0 */ 86 * @brief MCUboot image header representation for image version 88 * The header for an MCUboot firmware image contains an embedded 100 * @brief Model for the MCUboot image header as of version 1 [all …]
|
/Zephyr-latest/boards/st/b_u585i_iot02a/ |
D | b_u585i_iot02a_stm32u585xx_ns.dts | 4 * SPDX-License-Identifier: Apache-2.0 7 /dts-v1/; 8 #include "b_u585i_iot02a-common.dtsi" 11 model = "STMicroelectronics B-U585I-IOT02A discovery kit"; 12 compatible = "st,b-u585i-iot02a"; 16 zephyr,shell-uart = &usart1; 19 zephyr,code-partition = &slot0_ns_partition; 32 compatible = "fixed-partitions"; 33 #address-cells = <1>; 34 #size-cells = <1>; [all …]
|
/Zephyr-latest/scripts/pylib/pytest-twister-harness/tests/helpers/ |
D | shell_mcuboot_command_parser_test.py | 3 # SPDX-License-Identifier: Apache-2.0 10 def test_if_mcuboot_command_output_is_parsed_two_areas() -> None: 14 confirmed: 0 16 version: 0.0.2+0 17 image size: 68240 21 image ok: unset 23 version: 0.0.0+0 24 image size: 68240 28 image ok: unset 33 assert isinstance(mcuboot_parsed.areas[0], ShellMCUbootArea) [all …]
|
/Zephyr-latest/samples/subsys/usb/dfu/ |
D | README.rst | 1 .. zephyr:code-sample:: usb-dfu 3 :relevant-api: _usb_device_core_api 17 class provided by the Zephyr project depends on DFU image manager and 33 to be loaded at the offset of SLOT-0. 40 .. code-block:: console 42 west build -b nrf52840dk/nrf52840 zephyr/samples/subsys/usb/dfu -d build-dfu -- \ 43 -DCONFIG_MCUBOOT_SIGNATURE_KEY_FILE=\"bootloader/mcuboot/root-rsa-2048.pem\" 47 the USB DFU sample at the offset of SLOT-0. 49 Build and sign a second application image e.g. :zephyr:code-sample:`hello_world`, 50 which will be used as an image for the update. [all …]
|
/Zephyr-latest/samples/subsys/mgmt/mcumgr/smp_svr/ |
D | README.rst | 3 .. zephyr:code-sample:: smp-svr 53 Bluetooth Low Energy (BLE) and do not have a built-in or pluggable BLE radio, 55 :ref:`bluetooth-hci-uart-bluez`. 66 .. code-block:: console 68 west build -b <board> -d build_mcuboot bootloader/mcuboot/boot/zephyr 69 west flash -d build_mcuboot 84 .. group-tab:: Bluetooth 88 .. code-block:: console 91 -b nrf52dk/nrf52832 \ 93 -- \ [all …]
|
/Zephyr-latest/dts/common/espressif/ |
D | partitions_0x0_amp_16M.dtsi | 4 * SPDX-License-Identifier: Apache-2.0 10 compatible = "fixed-partitions"; 11 #address-cells = <1>; 12 #size-cells = <1>; 14 boot_partition: partition@0 { 16 reg = <0x0 DT_SIZE_K(64)>; 20 label = "image-0"; 21 reg = <0x20000 DT_SIZE_K(6080)>; 25 label = "image-0-appcpu"; 26 reg = <0x610000 DT_SIZE_K(1920)>; [all …]
|
D | partitions_0x0_amp_2M.dtsi | 4 * SPDX-License-Identifier: Apache-2.0 10 compatible = "fixed-partitions"; 11 #address-cells = <1>; 12 #size-cells = <1>; 14 boot_partition: partition@0 { 16 reg = <0x0 DT_SIZE_K(64)>; 20 label = "image-0"; 21 reg = <0x20000 DT_SIZE_K(576)>; 25 label = "image-0-appcpu"; 26 reg = <0xB0000 DT_SIZE_K(256)>; [all …]
|
D | partitions_0x0_amp_32M.dtsi | 4 * SPDX-License-Identifier: Apache-2.0 10 compatible = "fixed-partitions"; 11 #address-cells = <1>; 12 #size-cells = <1>; 14 boot_partition: partition@0 { 16 reg = <0x0 DT_SIZE_K(64)>; 20 label = "image-0"; 21 reg = <0x20000 DT_SIZE_K(12352)>; 25 label = "image-0-appcpu"; 26 reg = <0xC30000 DT_SIZE_K(3840)>; [all …]
|
D | partitions_0x0_amp_4M.dtsi | 4 * SPDX-License-Identifier: Apache-2.0 10 compatible = "fixed-partitions"; 11 #address-cells = <1>; 12 #size-cells = <1>; 14 boot_partition: partition@0 { 16 reg = <0x0 DT_SIZE_K(64)>; 20 label = "image-0"; 21 reg = <0x20000 DT_SIZE_K(1344)>; 25 label = "image-0-appcpu"; 26 reg = <0x170000 DT_SIZE_K(512)>; [all …]
|
D | partitions_0x0_amp_8M.dtsi | 4 * SPDX-License-Identifier: Apache-2.0 10 compatible = "fixed-partitions"; 11 #address-cells = <1>; 12 #size-cells = <1>; 14 boot_partition: partition@0 { 16 reg = <0x0 DT_SIZE_K(64)>; 20 label = "image-0"; 21 reg = <0x20000 DT_SIZE_K(3136)>; 25 label = "image-0-appcpu"; 26 reg = <0x330000 DT_SIZE_K(768)>; [all …]
|
D | partitions_0x1000_amp_16M.dtsi | 4 * SPDX-License-Identifier: Apache-2.0 10 compatible = "fixed-partitions"; 11 #address-cells = <1>; 12 #size-cells = <1>; 16 reg = <0x1000 DT_SIZE_K(60)>; 20 label = "image-0"; 21 reg = <0x20000 DT_SIZE_K(6080)>; 25 label = "image-0-appcpu"; 26 reg = <0x610000 DT_SIZE_K(1920)>; 30 label = "image-1"; [all …]
|
D | partitions_0x1000_amp_2M.dtsi | 4 * SPDX-License-Identifier: Apache-2.0 10 compatible = "fixed-partitions"; 11 #address-cells = <1>; 12 #size-cells = <1>; 16 reg = <0x1000 DT_SIZE_K(60)>; 20 label = "image-0"; 21 reg = <0x20000 DT_SIZE_K(576)>; 25 label = "image-0-appcpu"; 26 reg = <0xB0000 DT_SIZE_K(256)>; 30 label = "image-1"; [all …]
|
D | partitions_0x1000_amp_32M.dtsi | 4 * SPDX-License-Identifier: Apache-2.0 10 compatible = "fixed-partitions"; 11 #address-cells = <1>; 12 #size-cells = <1>; 16 reg = <0x1000 DT_SIZE_K(60)>; 20 label = "image-0"; 21 reg = <0x20000 DT_SIZE_K(12352)>; 25 label = "image-0-appcpu"; 26 reg = <0xC24000 DT_SIZE_K(3840)>; 30 label = "image-1"; [all …]
|
D | partitions_0x1000_amp_4M.dtsi | 4 * SPDX-License-Identifier: Apache-2.0 10 compatible = "fixed-partitions"; 11 #address-cells = <1>; 12 #size-cells = <1>; 16 reg = <0x1000 DT_SIZE_K(60)>; 20 label = "image-0"; 21 reg = <0x20000 DT_SIZE_K(1344)>; 25 label = "image-0-appcpu"; 26 reg = <0x170000 DT_SIZE_K(512)>; 30 label = "image-1"; [all …]
|
D | partitions_0x1000_amp_8M.dtsi | 4 * SPDX-License-Identifier: Apache-2.0 10 compatible = "fixed-partitions"; 11 #address-cells = <1>; 12 #size-cells = <1>; 16 reg = <0x1000 DT_SIZE_K(60)>; 20 label = "image-0"; 21 reg = <0x20000 DT_SIZE_K(3136)>; 25 label = "image-0-appcpu"; 26 reg = <0x330000 DT_SIZE_K(768)>; 30 label = "image-1"; [all …]
|
/Zephyr-latest/subsys/mgmt/mcumgr/grp/img_mgmt/ |
D | Kconfig | 2 # Copyright Nordic Semiconductor ASA 2020-2022. All rights reserved. 3 # SPDX-License-Identifier: Apache-2.0 5 # The Kconfig file is dedicated to Application Image management group of 10 # MCUMGR_GRP_IMG_ -- general group options; 16 bool "Mcumgr handlers for image management" 24 Enables MCUmgr handlers for image management 28 if HEAP_MEM_POOL_SIZE > 0 31 bool "Use heap mem pool for flash image DFU context" 33 Use heap to allocate flash image upload context, otherwise a static variable will 34 be used. The context object is used by MCUMGR_GRP_IMG_MANAGER to buffer image writes [all …]
|
/Zephyr-latest/soc/nxp/imxrt/imxrt118x/ |
D | Kconfig | 2 # SPDX-License-Identifier: Apache-2.0 38 hex "Image container" 39 default 0x1000 41 Image container is a boot image format that is used by ROM. Container 42 format consists container header, image arrary entry, signature block 46 # Note- This config present the offest between container header and user 47 # image. If ROM_START_OFFSET changed, you also need to change CONTAINER_USER_IMAGE_OFFSET 48 # value. CONTAINER_USER_IMAGE_OFFSET = ROM_START_OFFSET - IMAGE_CONTAINER_OFFSET. 50 hex "The offset between container header and user image" 51 default 0xA000 [all …]
|
12345678910>>...34