Home
last modified time | relevance | path

Searched full:image (Results 1 – 25 of 1340) sorted by relevance

12345678910>>...54

/Zephyr-Core-3.7.0/include/zephyr/mgmt/mcumgr/grp/img_mgmt/
Dimg_mgmt_client.h15 * @brief MCUmgr Image management client API
26 * @brief Image list flags.
29 /** Bootable image */
33 /** Confirmed image */
35 /** Active image */
37 /** Permanent image state */
42 * @brief Image list data.
45 /** Image slot num */
47 /** Image number */
49 /** Image SHA256 checksum */
[all …]
Dimg_mgmt.h14 #include <bootutil/image.h>
31 * Image state flags
42 * Swap Types for image management state machine
51 * Command IDs for image management group.
61 * Command result codes for image management group.
73 /** There is no image in the slot. */
76 /** The image in the slot has no TLVs (tag, length, value). */
79 /** The image in the slot has an invalid TLV type and/or length. */
82 /** The image in the slot has multiple hash TLVs, which is invalid. */
85 /** The image in the slot has an invalid TLV size. */
[all …]
/Zephyr-Core-3.7.0/include/zephyr/dfu/
Dmcuboot.h10 * @brief MCUboot public API for MCUboot control of image boot process
26 * @brief MCUboot public API for MCUboot control of image boot process
28 * @defgroup mcuboot_api MCUboot image control API
78 /** Swap failed because image to be run is not valid */
86 * @brief MCUboot image header representation for image version
88 * The header for an MCUboot firmware image contains an embedded
100 * @brief Model for the MCUboot image header as of version 1
102 * This represents the data present in the image header, in version 1
109 /** The size of the image, in bytes. */
111 /** The image version. */
[all …]
/Zephyr-Core-3.7.0/subsys/mgmt/mcumgr/grp/img_mgmt/
DKconfig5 # The Kconfig file is dedicated to Application Image management group of
16 bool "Mcumgr handlers for image management"
24 Enables MCUmgr handlers for image management
31 bool "Use heap mem pool for flash image DFU context"
33 Use heap to allocate flash image upload context, otherwise a static variable will
34 be used. The context object is used by MCUMGR_GRP_IMG_MANAGER to buffer image writes
35 and has significant size, mainly affected by image write buffer of
59 bool "Verbose error responses when uploading application image"
66 bool "Allow to confirm secondary slot of non-active image"
69 Allows to confirm secondary (non-active) slot of non-active image.
[all …]
/Zephyr-Core-3.7.0/tests/cmake/zephyr_get/
DCMakeLists.txt42 # IMAGE <image-1> <expected-value-for-image-1>
43 # [IMAGE <image-2> <expected-value-for-image-2> ...]
53 if(expected_value STREQUAL "IMAGE")
56 if(NOT ARGV${i} STREQUAL "IMAGE")
57 message(FATAL_ERROR "Invalid argument ${i}: '${ARGV${i}}' (expected 'IMAGE')")
71 message(FATAL_ERROR "No value provided for image: '${IMAGE_NAME}'")
129 IMAGE no_sysbuild "cmake cache"
131 # LOCAL sysbuild-defined value for this primary image.
132 IMAGE zephyr_get "sysbuild.main"
134 # the LOCAL sysbuild-defined value for this secondary image.
[all …]
Dsysbuild.cmake3 # Add a few copies of the same image, so that we can configure
7 set(image ${DEFAULT_IMAGE}_${suffix}) variable
8 if(NOT TARGET ${image})
10 APPLICATION ${image}
13 list(APPEND IMAGES ${image})
19 foreach(image ${IMAGES})
20 sysbuild_get(ASSERT_FAIL_COUNT IMAGE ${image} CACHE)
22 set(failures "${failures}\n - ${image}: ${ASSERT_FAIL_COUNT} assertion(s) failed")
28 message(FATAL_ERROR "Test failures per sysbuild image: ${failures}")
/Zephyr-Core-3.7.0/scripts/pylib/pytest-twister-harness/tests/fixtures/
Dmcumgr_fixture_test.py25 patched_run_command.assert_called_with('image list')
27 mcumgr.image_upload('/path/to/image', timeout=100)
28 patched_run_command.assert_called_with('-t 100 image upload /path/to/image')
30 mcumgr.image_upload('/path/to/image', slot=2, timeout=100)
31 patched_run_command.assert_called_with('-t 100 image upload /path/to/image -e -n 2')
34 patched_run_command.assert_called_with('image test ABCD')
37 patched_run_command.assert_called_with('image confirm ABCD')
43 image=0 slot=0
58 image=0 slot=0
63 image=0 slot=1
[all …]
/Zephyr-Core-3.7.0/subsys/dfu/
DKconfig11 bool "DFU image manager"
14 Enable support for managing DFU image.
19 prompt "Image manager"
22 Choice support for managing DFU image.
26 bool "Image manager for mcuboot"
30 Enable support for managing DFU image downloaded using mcuboot.
40 Enable shell module, which provides information about image slots and
58 Estimated size of update image data, which is used to prevent loading of firmware updates
63 int "Image writer buffer size"
66 Size (in Bytes) of buffer for image writer. Must be a multiple of
[all …]
/Zephyr-Core-3.7.0/doc/connectivity/bluetooth/api/mesh/
Ddfu_srv.rst8 receive the firmware image binary from the Distributor node.
20 started. Each firmware image in the image list must be independently updatable, and should have its
24 firmware update capabilities could have three entries in the firmware image list, each with their
31 the binary image. The interaction between the Firmware Update Server, BLOB Transfer Server and
44 firmware image metadata. The Firmware Update Server performs the transfer check by calling the
61 :ref:`bluetooth_mesh_models_rpr_srv` is supported, the Composition Data of the new firmware image
63 firmware image will be represented by Models Metadata Page 128. Composition Data Pages 0, 1 and 2,
65 firmware image until the device is reprovisioned with Node Provisioning Protocol Interface (NPPI)
73 and 130. The Models Metadata for the old image will be loaded into Models Metadata Page 0, and the
74 Models Metadata for the new image will be loaded into Models Metadata Page 128.
[all …]
/Zephyr-Core-3.7.0/scripts/pylib/pytest-twister-harness/src/twister_harness/helpers/
Dmcumgr.py23 image: int
57 def image_upload(self, image: Path | str, slot: int | None = None, timeout: int = 30):
58 command = f'-t {timeout} image upload {image}'
62 logger.info('Image successfully uploaded')
65 output = self.run_command('image list')
71 re_image = re.compile(r'image=(\d+)\s+slot=(\d+)')
79 image=int(m.group(1)),
94 for image in image_list:
95 if 'active' not in image.flags:
96 return image.hash
[all …]
/Zephyr-Core-3.7.0/subsys/mgmt/mcumgr/grp/img_mgmt/include/mgmt/mcumgr/grp/img_mgmt/
Dimg_mgmt_priv.h31 * @brief Marks the image in the specified slot as pending. On the next reboot,
32 * the system will perform a boot of the specified image.
35 * @param permanent Whether the image should be used permanently or only tested once:
36 * 0=run image once, then confirm or revert.
37 * 1=run image forever.
44 * @brief Marks the image in slot 0 as confirmed. The system will continue
45 * booting into the image in slot 0 until told to boot from a different slot.
52 * @brief Reads the specified chunk of data from an image slot.
64 * @brief Writes the specified chunk of image data to slot 1.
67 * @param data The image data to write.
[all …]
/Zephyr-Core-3.7.0/share/sysbuild/images/bootloader/
DCMakeLists.txt7 set(image mcuboot) variable
9 APPLICATION ${image}
14 sysbuild_add_dependencies(CONFIGURE ${DEFAULT_IMAGE} ${image})
15 sysbuild_add_dependencies(FLASH ${DEFAULT_IMAGE} ${image})
17 set_config_string(${image} CONFIG_BOOT_SIGNATURE_KEY_FILE "${SB_CONFIG_BOOT_SIGNATURE_KEY_FILE}")
18 set_config_bool(${image} CONFIG_BOOT_ENCRYPT_IMAGE "${SB_CONFIG_BOOT_ENCRYPTION}")
20 …set_config_string(${image} CONFIG_BOOT_ENCRYPTION_KEY_FILE "${SB_CONFIG_BOOT_ENCRYPTION_KEY_FILE}")
/Zephyr-Core-3.7.0/subsys/bluetooth/mesh/
Ddfu_slot.h11 * @param slot A valid DFU image slot.
25 /** @brief Reserve a new DFU image slot for a distributable image.
27 * A DFU image slot represents a single distributable DFU image with all its
41 * @param size The size of the image.
51 /** @brief Set the new fwid for the incoming image for a reserved slot.
81 /** @brief Delete a committed DFU image slot.
90 /** @brief Delete all DFU image slots.
96 /** @brief Get the DFU image slot at the given firmware image list index.
98 * @param idx DFU image slot index.
100 * @return The DFU image slot at the given index, or NULL if no slot exists with the
[all …]
/Zephyr-Core-3.7.0/samples/subsys/mgmt/mcumgr/smp_svr/
DREADME.rst149 Signing the sample image
155 To sign the sample image built in the previous step:
161 The above command creates an image file called :file:`zephyr.signed.bin` in the
164 For more information on image signing and ``west sign``, see the :ref:`west-sign`
167 Flashing the sample image
170 Upload the :file:`zephyr.signed.bin` file from the previous to image slot-0 of your
173 To upload the initial image file to an empty slot-0, use ``west flash`` like normal.
174 ``west flash`` will automatically detect slot-0 address and confirm the image.
180 The *signed* image file needs to be used specifically, otherwise the non-signed version
181 will be used and the image won't be runnable.
[all …]
/Zephyr-Core-3.7.0/boards/st/nucleo_l552ze_q/
Dnucleo_l552ze_q_stm32l552xx_ns.dts41 * multiple image boot, no tests.
50 /* Secure image primary slot */
52 label = "image-0";
55 /* Non-secure image primary slot */
57 label = "image-0-nonsecure";
60 /* Secure image secondary slot */
62 label = "image-1";
65 /* Non-secure image secondary slot */
67 label = "image-1-nonsecure";
/Zephyr-Core-3.7.0/share/sysbuild/cmake/modules/
Dsysbuild_images.cmake12 # This is where all Zephyr applications are added to the multi-image build.
18 foreach(image ${IMAGES_CONFIGURATION_ORDER})
19 …build_module_call(PRE_IMAGE_CMAKE MODULES ${SYSBUILD_MODULE_NAMES} IMAGES ${IMAGES} IMAGE ${image})
20 ExternalZephyrProject_Cmake(APPLICATION ${image})
21 …uild_module_call(POST_IMAGE_CMAKE MODULES ${SYSBUILD_MODULE_NAMES} IMAGES ${IMAGES} IMAGE ${image})
/Zephyr-Core-3.7.0/boards/nordic/nrf9131ek/
Dnrf9131ek_nrf9131_partition_conf.dtsi13 * Secure image will be placed, by default, in flash0
15 * Secure image will use sram0 for system memory.
17 * Non-Secure image will be placed in slot0_ns, and use
20 * Note that the Secure image only requires knowledge of
21 * the beginning of the Non-Secure image (not its size).
42 * - Lowest 88 kB SRAM allocated to Secure image (sram0_s).
45 * - Upper 128 kB allocated to Non-Secure image (sram0_ns).
47 * are allocated to the Non-Secure image.
/Zephyr-Core-3.7.0/boards/nordic/nrf9161dk/
Dnrf9161dk_nrf9161_partition_conf.dtsi13 * Secure image will be placed, by default, in flash0
15 * Secure image will use sram0 for system memory.
17 * Non-Secure image will be placed in slot0_ns, and use
20 * Note that the Secure image only requires knowledge of
21 * the beginning of the Non-Secure image (not its size).
42 * - Lowest 88 kB SRAM allocated to Secure image (sram0_s).
45 * - Upper 128 kB allocated to Non-Secure image (sram0_ns).
47 * are allocated to the Non-Secure image.
/Zephyr-Core-3.7.0/boards/nordic/nrf9151dk/
Dnrf9151dk_nrf9151_partition_conf.dtsi13 * Secure image will be placed, by default, in flash0
15 * Secure image will use sram0 for system memory.
17 * Non-Secure image will be placed in slot0_ns, and use
20 * Note that the Secure image only requires knowledge of
21 * the beginning of the Non-Secure image (not its size).
42 * - Lowest 88 kB SRAM allocated to Secure image (sram0_s).
45 * - Upper 128 kB allocated to Non-Secure image (sram0_ns).
47 * are allocated to the Non-Secure image.
/Zephyr-Core-3.7.0/boards/nordic/nrf9160dk/
Dnrf9160dk_nrf9160_partition_conf.dtsi13 * Secure image will be placed, by default, in flash0
15 * Secure image will use sram0 for system memory.
17 * Non-Secure image will be placed in slot0_ns, and use
20 * Note that the Secure image only requires knowledge of
21 * the beginning of the Non-Secure image (not its size).
42 * - Lowest 88 kB SRAM allocated to Secure image (sram0_s).
45 * - Upper 128 kB allocated to Non-Secure image (sram0_ns).
47 * are allocated to the Non-Secure image.
/Zephyr-Core-3.7.0/share/sysbuild/cmake/
Ddomains.cmake10 foreach(image ${IMAGES})
11 set(domains_yaml "${domains_yaml}\n - name: ${image}")
12 set(domains_yaml "${domains_yaml}\n build_dir: $<TARGET_PROPERTY:${image},_EP_BINARY_DIR>")
15 foreach(image ${IMAGES_FLASHING_ORDER})
16 set(flash_cond "$<NOT:$<BOOL:$<TARGET_PROPERTY:${image},BUILD_ONLY>>>")
17 set(domains_yaml "${domains_yaml}$<${flash_cond}:\n - ${image}>")
/Zephyr-Core-3.7.0/boards/innblue/innblue21/
Dinnblue21_partition_conf.dtsi13 * Secure image will be placed, by default, in flash0
15 * Secure image will use sram0 for system memory.
17 * Non-Secure image will be placed in slot0_ns, and use
20 * Note that the Secure image only requires knowledge of
21 * the beginning of the Non-Secure image (not its size).
42 * - Lowest 64 kB SRAM allocated to Secure image (sram0).
45 * - Upper 128 kB allocated to Non-Secure image (sram0_ns).
/Zephyr-Core-3.7.0/boards/innblue/innblue22/
Dinnblue22_partition_conf.dtsi13 * Secure image will be placed, by default, in flash0
15 * Secure image will use sram0 for system memory.
17 * Non-Secure image will be placed in slot0_ns, and use
20 * Note that the Secure image only requires knowledge of
21 * the beginning of the Non-Secure image (not its size).
42 * - Lowest 64 kB SRAM allocated to Secure image (sram0).
45 * - Upper 128 kB allocated to Non-Secure image (sram0_ns).
/Zephyr-Core-3.7.0/boards/st/b_u585i_iot02a/
Db_u585i_iot02a_stm32u585xx_ns.dts47 /* Secure image primary slot */
49 label = "image-0";
52 /* Non-secure image primary slot */
54 label = "image-0-nonsecure";
57 /* Secure image secondary slot */
59 label = "image-1";
62 /* Non-secure image secondary slot */
64 label = "image-1-nonsecure";
/Zephyr-Core-3.7.0/boards/circuitdojo/feather/
Dcircuitdojo_feather_nrf9160_partition_conf.dtsi14 * Secure image will be placed, by default, in flash0
16 * Secure image will use sram0 for system memory.
18 * Non-Secure image will be placed in slot0_ns, and use
21 * Note that the Secure image only requires knowledge of
22 * the beginning of the Non-Secure image (not its size).
43 * - Lowest 64 kB SRAM allocated to Secure image (sram0_s).
46 * - Upper 128 kB allocated to Non-Secure image (sram0_ns).

12345678910>>...54