/Zephyr-Core-3.7.0/include/zephyr/mgmt/mcumgr/grp/img_mgmt/ |
D | img_mgmt_client.h | 15 * @brief MCUmgr Image management client API 26 * @brief Image list flags. 29 /** Bootable image */ 33 /** Confirmed image */ 35 /** Active image */ 37 /** Permanent image state */ 42 * @brief Image list data. 45 /** Image slot num */ 47 /** Image number */ 49 /** Image SHA256 checksum */ [all …]
|
D | img_mgmt.h | 14 #include <bootutil/image.h> 31 * Image state flags 42 * Swap Types for image management state machine 51 * Command IDs for image management group. 61 * Command result codes for image management group. 73 /** There is no image in the slot. */ 76 /** The image in the slot has no TLVs (tag, length, value). */ 79 /** The image in the slot has an invalid TLV type and/or length. */ 82 /** The image in the slot has multiple hash TLVs, which is invalid. */ 85 /** The image in the slot has an invalid TLV size. */ [all …]
|
/Zephyr-Core-3.7.0/include/zephyr/dfu/ |
D | mcuboot.h | 10 * @brief MCUboot public API for MCUboot control of image boot process 26 * @brief MCUboot public API for MCUboot control of image boot process 28 * @defgroup mcuboot_api MCUboot image control API 78 /** Swap failed because image to be run is not valid */ 86 * @brief MCUboot image header representation for image version 88 * The header for an MCUboot firmware image contains an embedded 100 * @brief Model for the MCUboot image header as of version 1 102 * This represents the data present in the image header, in version 1 109 /** The size of the image, in bytes. */ 111 /** The image version. */ [all …]
|
/Zephyr-Core-3.7.0/subsys/mgmt/mcumgr/grp/img_mgmt/ |
D | Kconfig | 5 # The Kconfig file is dedicated to Application Image management group of 16 bool "Mcumgr handlers for image management" 24 Enables MCUmgr handlers for image management 31 bool "Use heap mem pool for flash image DFU context" 33 Use heap to allocate flash image upload context, otherwise a static variable will 34 be used. The context object is used by MCUMGR_GRP_IMG_MANAGER to buffer image writes 35 and has significant size, mainly affected by image write buffer of 59 bool "Verbose error responses when uploading application image" 66 bool "Allow to confirm secondary slot of non-active image" 69 Allows to confirm secondary (non-active) slot of non-active image. [all …]
|
/Zephyr-Core-3.7.0/tests/cmake/zephyr_get/ |
D | CMakeLists.txt | 42 # IMAGE <image-1> <expected-value-for-image-1> 43 # [IMAGE <image-2> <expected-value-for-image-2> ...] 53 if(expected_value STREQUAL "IMAGE") 56 if(NOT ARGV${i} STREQUAL "IMAGE") 57 message(FATAL_ERROR "Invalid argument ${i}: '${ARGV${i}}' (expected 'IMAGE')") 71 message(FATAL_ERROR "No value provided for image: '${IMAGE_NAME}'") 129 IMAGE no_sysbuild "cmake cache" 131 # LOCAL sysbuild-defined value for this primary image. 132 IMAGE zephyr_get "sysbuild.main" 134 # the LOCAL sysbuild-defined value for this secondary image. [all …]
|
D | sysbuild.cmake | 3 # Add a few copies of the same image, so that we can configure 7 set(image ${DEFAULT_IMAGE}_${suffix}) variable 8 if(NOT TARGET ${image}) 10 APPLICATION ${image} 13 list(APPEND IMAGES ${image}) 19 foreach(image ${IMAGES}) 20 sysbuild_get(ASSERT_FAIL_COUNT IMAGE ${image} CACHE) 22 set(failures "${failures}\n - ${image}: ${ASSERT_FAIL_COUNT} assertion(s) failed") 28 message(FATAL_ERROR "Test failures per sysbuild image: ${failures}")
|
/Zephyr-Core-3.7.0/scripts/pylib/pytest-twister-harness/tests/fixtures/ |
D | mcumgr_fixture_test.py | 25 patched_run_command.assert_called_with('image list') 27 mcumgr.image_upload('/path/to/image', timeout=100) 28 patched_run_command.assert_called_with('-t 100 image upload /path/to/image') 30 mcumgr.image_upload('/path/to/image', slot=2, timeout=100) 31 patched_run_command.assert_called_with('-t 100 image upload /path/to/image -e -n 2') 34 patched_run_command.assert_called_with('image test ABCD') 37 patched_run_command.assert_called_with('image confirm ABCD') 43 image=0 slot=0 58 image=0 slot=0 63 image=0 slot=1 [all …]
|
/Zephyr-Core-3.7.0/subsys/dfu/ |
D | Kconfig | 11 bool "DFU image manager" 14 Enable support for managing DFU image. 19 prompt "Image manager" 22 Choice support for managing DFU image. 26 bool "Image manager for mcuboot" 30 Enable support for managing DFU image downloaded using mcuboot. 40 Enable shell module, which provides information about image slots and 58 Estimated size of update image data, which is used to prevent loading of firmware updates 63 int "Image writer buffer size" 66 Size (in Bytes) of buffer for image writer. Must be a multiple of [all …]
|
/Zephyr-Core-3.7.0/doc/connectivity/bluetooth/api/mesh/ |
D | dfu_srv.rst | 8 receive the firmware image binary from the Distributor node. 20 started. Each firmware image in the image list must be independently updatable, and should have its 24 firmware update capabilities could have three entries in the firmware image list, each with their 31 the binary image. The interaction between the Firmware Update Server, BLOB Transfer Server and 44 firmware image metadata. The Firmware Update Server performs the transfer check by calling the 61 :ref:`bluetooth_mesh_models_rpr_srv` is supported, the Composition Data of the new firmware image 63 firmware image will be represented by Models Metadata Page 128. Composition Data Pages 0, 1 and 2, 65 firmware image until the device is reprovisioned with Node Provisioning Protocol Interface (NPPI) 73 and 130. The Models Metadata for the old image will be loaded into Models Metadata Page 0, and the 74 Models Metadata for the new image will be loaded into Models Metadata Page 128. [all …]
|
/Zephyr-Core-3.7.0/scripts/pylib/pytest-twister-harness/src/twister_harness/helpers/ |
D | mcumgr.py | 23 image: int 57 def image_upload(self, image: Path | str, slot: int | None = None, timeout: int = 30): 58 command = f'-t {timeout} image upload {image}' 62 logger.info('Image successfully uploaded') 65 output = self.run_command('image list') 71 re_image = re.compile(r'image=(\d+)\s+slot=(\d+)') 79 image=int(m.group(1)), 94 for image in image_list: 95 if 'active' not in image.flags: 96 return image.hash [all …]
|
/Zephyr-Core-3.7.0/subsys/mgmt/mcumgr/grp/img_mgmt/include/mgmt/mcumgr/grp/img_mgmt/ |
D | img_mgmt_priv.h | 31 * @brief Marks the image in the specified slot as pending. On the next reboot, 32 * the system will perform a boot of the specified image. 35 * @param permanent Whether the image should be used permanently or only tested once: 36 * 0=run image once, then confirm or revert. 37 * 1=run image forever. 44 * @brief Marks the image in slot 0 as confirmed. The system will continue 45 * booting into the image in slot 0 until told to boot from a different slot. 52 * @brief Reads the specified chunk of data from an image slot. 64 * @brief Writes the specified chunk of image data to slot 1. 67 * @param data The image data to write. [all …]
|
/Zephyr-Core-3.7.0/share/sysbuild/images/bootloader/ |
D | CMakeLists.txt | 7 set(image mcuboot) variable 9 APPLICATION ${image} 14 sysbuild_add_dependencies(CONFIGURE ${DEFAULT_IMAGE} ${image}) 15 sysbuild_add_dependencies(FLASH ${DEFAULT_IMAGE} ${image}) 17 set_config_string(${image} CONFIG_BOOT_SIGNATURE_KEY_FILE "${SB_CONFIG_BOOT_SIGNATURE_KEY_FILE}") 18 set_config_bool(${image} CONFIG_BOOT_ENCRYPT_IMAGE "${SB_CONFIG_BOOT_ENCRYPTION}") 20 …set_config_string(${image} CONFIG_BOOT_ENCRYPTION_KEY_FILE "${SB_CONFIG_BOOT_ENCRYPTION_KEY_FILE}")
|
/Zephyr-Core-3.7.0/subsys/bluetooth/mesh/ |
D | dfu_slot.h | 11 * @param slot A valid DFU image slot. 25 /** @brief Reserve a new DFU image slot for a distributable image. 27 * A DFU image slot represents a single distributable DFU image with all its 41 * @param size The size of the image. 51 /** @brief Set the new fwid for the incoming image for a reserved slot. 81 /** @brief Delete a committed DFU image slot. 90 /** @brief Delete all DFU image slots. 96 /** @brief Get the DFU image slot at the given firmware image list index. 98 * @param idx DFU image slot index. 100 * @return The DFU image slot at the given index, or NULL if no slot exists with the [all …]
|
/Zephyr-Core-3.7.0/samples/subsys/mgmt/mcumgr/smp_svr/ |
D | README.rst | 149 Signing the sample image 155 To sign the sample image built in the previous step: 161 The above command creates an image file called :file:`zephyr.signed.bin` in the 164 For more information on image signing and ``west sign``, see the :ref:`west-sign` 167 Flashing the sample image 170 Upload the :file:`zephyr.signed.bin` file from the previous to image slot-0 of your 173 To upload the initial image file to an empty slot-0, use ``west flash`` like normal. 174 ``west flash`` will automatically detect slot-0 address and confirm the image. 180 The *signed* image file needs to be used specifically, otherwise the non-signed version 181 will be used and the image won't be runnable. [all …]
|
/Zephyr-Core-3.7.0/boards/st/nucleo_l552ze_q/ |
D | nucleo_l552ze_q_stm32l552xx_ns.dts | 41 * multiple image boot, no tests. 50 /* Secure image primary slot */ 52 label = "image-0"; 55 /* Non-secure image primary slot */ 57 label = "image-0-nonsecure"; 60 /* Secure image secondary slot */ 62 label = "image-1"; 65 /* Non-secure image secondary slot */ 67 label = "image-1-nonsecure";
|
/Zephyr-Core-3.7.0/share/sysbuild/cmake/modules/ |
D | sysbuild_images.cmake | 12 # This is where all Zephyr applications are added to the multi-image build. 18 foreach(image ${IMAGES_CONFIGURATION_ORDER}) 19 …build_module_call(PRE_IMAGE_CMAKE MODULES ${SYSBUILD_MODULE_NAMES} IMAGES ${IMAGES} IMAGE ${image}) 20 ExternalZephyrProject_Cmake(APPLICATION ${image}) 21 …uild_module_call(POST_IMAGE_CMAKE MODULES ${SYSBUILD_MODULE_NAMES} IMAGES ${IMAGES} IMAGE ${image})
|
/Zephyr-Core-3.7.0/boards/nordic/nrf9131ek/ |
D | nrf9131ek_nrf9131_partition_conf.dtsi | 13 * Secure image will be placed, by default, in flash0 15 * Secure image will use sram0 for system memory. 17 * Non-Secure image will be placed in slot0_ns, and use 20 * Note that the Secure image only requires knowledge of 21 * the beginning of the Non-Secure image (not its size). 42 * - Lowest 88 kB SRAM allocated to Secure image (sram0_s). 45 * - Upper 128 kB allocated to Non-Secure image (sram0_ns). 47 * are allocated to the Non-Secure image.
|
/Zephyr-Core-3.7.0/boards/nordic/nrf9161dk/ |
D | nrf9161dk_nrf9161_partition_conf.dtsi | 13 * Secure image will be placed, by default, in flash0 15 * Secure image will use sram0 for system memory. 17 * Non-Secure image will be placed in slot0_ns, and use 20 * Note that the Secure image only requires knowledge of 21 * the beginning of the Non-Secure image (not its size). 42 * - Lowest 88 kB SRAM allocated to Secure image (sram0_s). 45 * - Upper 128 kB allocated to Non-Secure image (sram0_ns). 47 * are allocated to the Non-Secure image.
|
/Zephyr-Core-3.7.0/boards/nordic/nrf9151dk/ |
D | nrf9151dk_nrf9151_partition_conf.dtsi | 13 * Secure image will be placed, by default, in flash0 15 * Secure image will use sram0 for system memory. 17 * Non-Secure image will be placed in slot0_ns, and use 20 * Note that the Secure image only requires knowledge of 21 * the beginning of the Non-Secure image (not its size). 42 * - Lowest 88 kB SRAM allocated to Secure image (sram0_s). 45 * - Upper 128 kB allocated to Non-Secure image (sram0_ns). 47 * are allocated to the Non-Secure image.
|
/Zephyr-Core-3.7.0/boards/nordic/nrf9160dk/ |
D | nrf9160dk_nrf9160_partition_conf.dtsi | 13 * Secure image will be placed, by default, in flash0 15 * Secure image will use sram0 for system memory. 17 * Non-Secure image will be placed in slot0_ns, and use 20 * Note that the Secure image only requires knowledge of 21 * the beginning of the Non-Secure image (not its size). 42 * - Lowest 88 kB SRAM allocated to Secure image (sram0_s). 45 * - Upper 128 kB allocated to Non-Secure image (sram0_ns). 47 * are allocated to the Non-Secure image.
|
/Zephyr-Core-3.7.0/share/sysbuild/cmake/ |
D | domains.cmake | 10 foreach(image ${IMAGES}) 11 set(domains_yaml "${domains_yaml}\n - name: ${image}") 12 set(domains_yaml "${domains_yaml}\n build_dir: $<TARGET_PROPERTY:${image},_EP_BINARY_DIR>") 15 foreach(image ${IMAGES_FLASHING_ORDER}) 16 set(flash_cond "$<NOT:$<BOOL:$<TARGET_PROPERTY:${image},BUILD_ONLY>>>") 17 set(domains_yaml "${domains_yaml}$<${flash_cond}:\n - ${image}>")
|
/Zephyr-Core-3.7.0/boards/innblue/innblue21/ |
D | innblue21_partition_conf.dtsi | 13 * Secure image will be placed, by default, in flash0 15 * Secure image will use sram0 for system memory. 17 * Non-Secure image will be placed in slot0_ns, and use 20 * Note that the Secure image only requires knowledge of 21 * the beginning of the Non-Secure image (not its size). 42 * - Lowest 64 kB SRAM allocated to Secure image (sram0). 45 * - Upper 128 kB allocated to Non-Secure image (sram0_ns).
|
/Zephyr-Core-3.7.0/boards/innblue/innblue22/ |
D | innblue22_partition_conf.dtsi | 13 * Secure image will be placed, by default, in flash0 15 * Secure image will use sram0 for system memory. 17 * Non-Secure image will be placed in slot0_ns, and use 20 * Note that the Secure image only requires knowledge of 21 * the beginning of the Non-Secure image (not its size). 42 * - Lowest 64 kB SRAM allocated to Secure image (sram0). 45 * - Upper 128 kB allocated to Non-Secure image (sram0_ns).
|
/Zephyr-Core-3.7.0/boards/st/b_u585i_iot02a/ |
D | b_u585i_iot02a_stm32u585xx_ns.dts | 47 /* Secure image primary slot */ 49 label = "image-0"; 52 /* Non-secure image primary slot */ 54 label = "image-0-nonsecure"; 57 /* Secure image secondary slot */ 59 label = "image-1"; 62 /* Non-secure image secondary slot */ 64 label = "image-1-nonsecure";
|
/Zephyr-Core-3.7.0/boards/circuitdojo/feather/ |
D | circuitdojo_feather_nrf9160_partition_conf.dtsi | 14 * Secure image will be placed, by default, in flash0 16 * Secure image will use sram0 for system memory. 18 * Non-Secure image will be placed in slot0_ns, and use 21 * Note that the Secure image only requires knowledge of 22 * the beginning of the Non-Secure image (not its size). 43 * - Lowest 64 kB SRAM allocated to Secure image (sram0_s). 46 * - Upper 128 kB allocated to Non-Secure image (sram0_ns).
|