/Zephyr-latest/include/zephyr/mgmt/mcumgr/grp/img_mgmt/ |
D | img_mgmt_client.h | 15 * @brief MCUmgr Image management client API 26 * @brief Image list flags. 29 /** Bootable image */ 33 /** Confirmed image */ 35 /** Active image */ 37 /** Permanent image state */ 42 * @brief Image list data. 45 /** Image slot num */ 47 /** Image number */ 49 /** Image SHA256 checksum */ [all …]
|
D | img_mgmt.h | 14 #include <bootutil/image.h> 31 * Image state flags 42 * Swap Types for image management state machine 51 * Command IDs for image management group. 62 * Command result codes for image management group. 74 /** There is no image in the slot. */ 77 /** The image in the slot has no TLVs (tag, length, value). */ 80 /** The image in the slot has an invalid TLV type and/or length. */ 83 /** The image in the slot has multiple hash TLVs, which is invalid. */ 86 /** The image in the slot has an invalid TLV size. */ [all …]
|
/Zephyr-latest/include/zephyr/dfu/ |
D | mcuboot.h | 10 * @brief MCUboot public API for MCUboot control of image boot process 26 * @brief MCUboot public API for MCUboot control of image boot process 28 * @defgroup mcuboot_api MCUboot image control API 78 /** Swap failed because image to be run is not valid */ 86 * @brief MCUboot image header representation for image version 88 * The header for an MCUboot firmware image contains an embedded 100 * @brief Model for the MCUboot image header as of version 1 102 * This represents the data present in the image header, in version 1 109 /** The size of the image, in bytes. */ 111 /** The image version. */ [all …]
|
/Zephyr-latest/tests/cmake/zephyr_get/ |
D | CMakeLists.txt | 50 # IMAGE <image-1> <expected-value-for-image-1> 51 # [IMAGE <image-2> <expected-value-for-image-2> ...] 61 if(expected_value STREQUAL "IMAGE") 64 if(NOT ARGV${i} STREQUAL "IMAGE") 65 message(FATAL_ERROR "Invalid argument ${i}: '${ARGV${i}}' (expected 'IMAGE')") 79 message(FATAL_ERROR "No value provided for image: '${IMAGE_NAME}'") 140 IMAGE no_sysbuild "cmake cache" 142 # LOCAL sysbuild-defined value for this primary image. 143 IMAGE zephyr_get "sysbuild.main" 145 # the LOCAL sysbuild-defined value for this secondary image. [all …]
|
D | sysbuild.cmake | 3 # Add a few copies of the same image, so that we can configure 7 set(image ${DEFAULT_IMAGE}_${suffix}) variable 8 if(NOT TARGET ${image}) 10 APPLICATION ${image} 13 list(APPEND IMAGES ${image}) 19 foreach(image ${IMAGES}) 20 sysbuild_get(ASSERT_FAIL_COUNT IMAGE ${image} CACHE) 22 set(failures "${failures}\n - ${image}: ${ASSERT_FAIL_COUNT} assertion(s) failed") 28 message(FATAL_ERROR "Test failures per sysbuild image: ${failures}")
|
/Zephyr-latest/subsys/mgmt/mcumgr/grp/img_mgmt/ |
D | Kconfig | 5 # The Kconfig file is dedicated to Application Image management group of 16 bool "Mcumgr handlers for image management" 24 Enables MCUmgr handlers for image management 31 bool "Use heap mem pool for flash image DFU context" 33 Use heap to allocate flash image upload context, otherwise a static variable will 34 be used. The context object is used by MCUMGR_GRP_IMG_MANAGER to buffer image writes 35 and has significant size, mainly affected by image write buffer of 59 bool "Verbose error responses when uploading application image" 66 bool "Allow to confirm secondary slot of non-active image" 69 Allows to confirm secondary (non-active) slot of non-active image. [all …]
|
/Zephyr-latest/dts/common/nordic/ |
D | nrf5340_cpuapp_partition.dtsi | 15 * 0x0001_0000 Primary image area (448 KB): 16 * 0x0001_0000 Secure image primary (256 KB) 17 * 0x0005_0000 Non-secure image primary (192 KB) 18 * 0x0008_0000 Secondary image area (448 KB): 19 * 0x0008_0000 Secure image secondary (256 KB) 20 * 0x000c_0000 Non-secure image secondary (192 KB) 37 label = "image-0"; 41 label = "image-0-nonsecure"; 45 label = "image-1"; 49 label = "image-1-nonsecure"; [all …]
|
D | nrf91xx_partition.dtsi | 15 * 0x0001_0000 Primary image area (448 KB): 16 * 0x0001_0000 Secure image primary (256 KB) 17 * 0x0005_0000 Non-secure image primary (192 KB) 18 * 0x0008_0000 Secondary image area (448 KB): 19 * 0x0008_0000 Secure image secondary (256 KB) 20 * 0x000c_0000 Non-secure image secondary (192 KB) 37 label = "image-0"; 41 label = "image-0-nonsecure"; 45 label = "image-1"; 49 label = "image-1-nonsecure"; [all …]
|
/Zephyr-latest/scripts/pylib/pytest-twister-harness/tests/fixtures/ |
D | mcumgr_fixture_test.py | 25 patched_run_command.assert_called_with('image list') 27 mcumgr.image_upload('/path/to/image', timeout=100) 28 patched_run_command.assert_called_with('-t 100 image upload /path/to/image') 30 mcumgr.image_upload('/path/to/image', slot=2, timeout=100) 31 patched_run_command.assert_called_with('-t 100 image upload /path/to/image -e -n 2') 34 patched_run_command.assert_called_with('image test ABCD') 37 patched_run_command.assert_called_with('image confirm ABCD') 43 image=0 slot=0 58 image=0 slot=0 63 image=0 slot=1 [all …]
|
/Zephyr-latest/subsys/dfu/ |
D | Kconfig | 11 bool "DFU image manager" 15 Enable support for managing DFU image. 20 prompt "Image manager" 23 Choice support for managing DFU image. 27 bool "Image manager for mcuboot" 31 Enable support for managing DFU image downloaded using mcuboot. 41 Enable shell module, which provides information about image slots and 59 Estimated size of update image data, which is used to prevent loading of firmware updates 64 int "Image writer buffer size" 67 Size (in Bytes) of buffer for image writer. Must be a multiple of [all …]
|
/Zephyr-latest/scripts/pylib/pytest-twister-harness/src/twister_harness/helpers/ |
D | mcumgr.py | 22 image: int 56 def image_upload(self, image: Path | str, slot: int | None = None, timeout: int = 30): 57 command = f'-t {timeout} image upload {image}' 61 logger.info('Image successfully uploaded') 64 output = self.run_command('image list') 70 re_image = re.compile(r'image=(\d+)\s+slot=(\d+)') 78 image=int(m.group(1)), 93 for image in image_list: 94 if 'active' not in image.flags: 95 return image.hash [all …]
|
/Zephyr-latest/doc/connectivity/bluetooth/api/mesh/ |
D | dfu_srv.rst | 8 receive the firmware image binary from the Distributor node. 20 started. Each firmware image in the image list must be independently updatable, and should have its 24 firmware update capabilities could have three entries in the firmware image list, each with their 31 the binary image. The interaction between the Firmware Update Server, BLOB Transfer Server and 44 firmware image metadata. The Firmware Update Server performs the transfer check by calling the 61 :ref:`bluetooth_mesh_models_rpr_srv` is supported, the Composition Data of the new firmware image 63 firmware image will be represented by Models Metadata Page 128. Composition Data Pages 0, 1 and 2, 65 firmware image until the device is reprovisioned with Node Provisioning Protocol Interface (NPPI) 73 and 130. The Models Metadata for the old image will be loaded into Models Metadata Page 0, and the 74 Models Metadata for the new image will be loaded into Models Metadata Page 128. [all …]
|
/Zephyr-latest/subsys/mgmt/mcumgr/grp/img_mgmt/include/mgmt/mcumgr/grp/img_mgmt/ |
D | img_mgmt_priv.h | 31 * @brief Marks the image in the specified slot as pending. On the next reboot, 32 * the system will perform a boot of the specified image. 35 * @param permanent Whether the image should be used permanently or only tested once: 36 * 0=run image once, then confirm or revert. 37 * 1=run image forever. 44 * @brief Marks the image in slot 0 as confirmed. The system will continue 45 * booting into the image in slot 0 until told to boot from a different slot. 52 * @brief Reads the specified chunk of data from an image slot. 64 * @brief Writes the specified chunk of image data to slot 1. 67 * @param data The image data to write. [all …]
|
/Zephyr-latest/share/sysbuild/images/bootloader/ |
D | CMakeLists.txt | 7 set(image mcuboot) variable 9 APPLICATION ${image} 14 sysbuild_add_dependencies(CONFIGURE ${DEFAULT_IMAGE} ${image}) 15 sysbuild_add_dependencies(FLASH ${DEFAULT_IMAGE} ${image}) 17 set_config_string(${image} CONFIG_BOOT_SIGNATURE_KEY_FILE "${SB_CONFIG_BOOT_SIGNATURE_KEY_FILE}") 18 set_config_bool(${image} CONFIG_BOOT_ENCRYPT_IMAGE "${SB_CONFIG_BOOT_ENCRYPTION}") 20 …set_config_string(${image} CONFIG_BOOT_ENCRYPTION_KEY_FILE "${SB_CONFIG_BOOT_ENCRYPTION_KEY_FILE}")
|
/Zephyr-latest/soc/nxp/imxrt/imxrt118x/ |
D | Kconfig | 38 hex "Image container" 41 Image container is a boot image format that is used by ROM. Container 42 format consists container header, image arrary entry, signature block 47 # image. If ROM_START_OFFSET changed, you also need to change CONTAINER_USER_IMAGE_OFFSET 50 hex "The offset between container header and user image" 53 The offset between container and user image. IF change the user image 55 value, this will make ROM could get the user image start address.
|
/Zephyr-latest/subsys/bluetooth/mesh/ |
D | dfu_slot.h | 11 * @param slot A valid DFU image slot. 25 /** @brief Reserve a new DFU image slot for a distributable image. 27 * A DFU image slot represents a single distributable DFU image with all its 41 * @param size The size of the image. 51 /** @brief Set the new fwid for the incoming image for a reserved slot. 81 /** @brief Delete a committed DFU image slot. 90 /** @brief Delete all DFU image slots. 96 /** @brief Get the DFU image slot at the given firmware image list index. 98 * @param idx DFU image slot index. 100 * @return The DFU image slot at the given index, or NULL if no slot exists with the [all …]
|
/Zephyr-latest/samples/subsys/mgmt/mcumgr/smp_svr/ |
D | README.rst | 151 Signing the sample image 157 To sign the sample image built in the previous step: 163 The above command creates an image file called :file:`zephyr.signed.bin` in the 166 For more information on image signing and ``west sign``, see the :ref:`west-sign` 169 Flashing the sample image 172 Upload the :file:`zephyr.signed.bin` file from the previous to image slot-0 of your 175 To upload the initial image file to an empty slot-0, use ``west flash`` like normal. 176 ``west flash`` will automatically detect slot-0 address and confirm the image. 182 The *signed* image file needs to be used specifically, otherwise the non-signed version 183 will be used and the image won't be runnable. [all …]
|
/Zephyr-latest/boards/st/nucleo_l552ze_q/ |
D | nucleo_l552ze_q_stm32l552xx_ns.dts | 41 * multiple image boot, no tests. 50 /* Secure image primary slot */ 52 label = "image-0"; 55 /* Non-secure image primary slot */ 57 label = "image-0-nonsecure"; 60 /* Secure image secondary slot */ 62 label = "image-1"; 65 /* Non-secure image secondary slot */ 67 label = "image-1-nonsecure";
|
/Zephyr-latest/share/sysbuild/cmake/modules/ |
D | sysbuild_images.cmake | 12 # This is where all Zephyr applications are added to the multi-image build. 18 foreach(image ${IMAGES_CONFIGURATION_ORDER}) 19 …build_module_call(PRE_IMAGE_CMAKE MODULES ${SYSBUILD_MODULE_NAMES} IMAGES ${IMAGES} IMAGE ${image}) 20 ExternalZephyrProject_Cmake(APPLICATION ${image}) 21 …uild_module_call(POST_IMAGE_CMAKE MODULES ${SYSBUILD_MODULE_NAMES} IMAGES ${IMAGES} IMAGE ${image})
|
D | sysbuild_extensions.cmake | 6 # load_cache(IMAGE <image> BINARY_DIR <dir>) 12 # the name given as value to the IMAGE argument. 14 # IMAGE: image name identifying the cache for later sysbuild_get() lookup calls. 17 set(single_args IMAGE BINARY_DIR) 47 # sysbuild_get(<variable> IMAGE <image> [VAR <image-variable>] <KCONFIG|CACHE>) 50 # identified by image. 58 # sysbuild_get(PROJECT_NAME IMAGE my_sample CACHE) 62 # sysbuild_get(my_sample_PROJECT_NAME IMAGE my_sample VAR PROJECT_NAME CACHE) 66 # sysbuild_get(my_sample_CONFIG_FOO IMAGE my_sample VAR CONFIG_FOO KCONFIG) 72 # IMAGE: image name identifying the cache to use for variable lookup. [all …]
|
/Zephyr-latest/share/sysbuild/cmake/ |
D | domains.cmake | 10 foreach(image ${IMAGES}) 11 set(domains_yaml "${domains_yaml}\n - name: ${image}") 12 set(domains_yaml "${domains_yaml}\n build_dir: $<TARGET_PROPERTY:${image},_EP_BINARY_DIR>") 15 foreach(image ${IMAGES_FLASHING_ORDER}) 16 set(flash_cond "$<NOT:$<BOOL:$<TARGET_PROPERTY:${image},BUILD_ONLY>>>") 17 set(domains_yaml "${domains_yaml}$<${flash_cond}:\n - ${image}>")
|
/Zephyr-latest/boards/st/b_u585i_iot02a/ |
D | b_u585i_iot02a_stm32u585xx_ns.dts | 47 /* Secure image primary slot */ 49 label = "image-0"; 52 /* Non-secure image primary slot */ 54 label = "image-0-nonsecure"; 57 /* Secure image secondary slot */ 59 label = "image-1"; 62 /* Non-secure image secondary slot */ 64 label = "image-1-nonsecure";
|
/Zephyr-latest/boards/ezurio/bl5340_dvk/ |
D | bl5340_dvk_nrf5340_cpuapp_partition_conf.dtsi | 14 * Secure image will be placed, by default, in flash0 16 * Secure image will use sram0 for system memory. 18 * Non-Secure image will be placed in slot0_ns, and use 21 * Note that the Secure image only requires knowledge of 22 * the beginning of the Non-Secure image (not its size). 43 * - Lowest 256 kB SRAM allocated to Secure image (sram0_s) 44 * - Middle 192 kB allocated to Non-Secure image (sram0_ns)
|
/Zephyr-latest/doc/services/device_mgmt/ |
D | dfu.rst | 10 upgrade the image of a Zephyr-based application at run time. It currently 14 * :zephyr_file:`subsys/dfu/img_util/`: Image management code 16 The DFU subsystem deals with image management, but not with the transport 17 or management protocols themselves required to send the image to the target 23 Flash Image 26 The flash image API as part of the Device Firmware Upgrade (DFU) subsystem 28 image chunks to flash. 41 application images. It allows to select application image and boot type 58 `MCUboot boot loader`_. It interfaces with MCUboot and is aware of the image 82 to flash the Zephyr application image at the correct offset (right after the
|
/Zephyr-latest/boards/raytac/mdbt53_db_40/ |
D | Kconfig.defconfig | 13 # secure image (TRUSTED_EXECUTION_SECURE=y), the secure FW image shall always 23 # If the secure firmware is to be combined with a non-secure image 24 # (TRUSTED_EXECUTION_SECURE=y), the secure FW image SRAM shall always 25 # be restricted to the secure image SRAM partition (sram-secure-partition). 27 # may be used by the image. 29 # For the non-secure version of the board, the firmware image SRAM is
|