Home
last modified time | relevance | path

Searched full:image (Results 1 – 25 of 1240) sorted by relevance

12345678910>>...50

/Zephyr-latest/include/zephyr/mgmt/mcumgr/grp/img_mgmt/
Dimg_mgmt_client.h15 * @brief MCUmgr Image management client API
26 * @brief Image list flags.
29 /** Bootable image */
33 /** Confirmed image */
35 /** Active image */
37 /** Permanent image state */
42 * @brief Image list data.
45 /** Image slot num */
47 /** Image number */
49 /** Image SHA256 checksum */
[all …]
Dimg_mgmt.h14 #include <bootutil/image.h>
31 * Image state flags
42 * Swap Types for image management state machine
51 * Command IDs for image management group.
62 * Command result codes for image management group.
74 /** There is no image in the slot. */
77 /** The image in the slot has no TLVs (tag, length, value). */
80 /** The image in the slot has an invalid TLV type and/or length. */
83 /** The image in the slot has multiple hash TLVs, which is invalid. */
86 /** The image in the slot has an invalid TLV size. */
[all …]
/Zephyr-latest/include/zephyr/dfu/
Dmcuboot.h10 * @brief MCUboot public API for MCUboot control of image boot process
26 * @brief MCUboot public API for MCUboot control of image boot process
28 * @defgroup mcuboot_api MCUboot image control API
78 /** Swap failed because image to be run is not valid */
86 * @brief MCUboot image header representation for image version
88 * The header for an MCUboot firmware image contains an embedded
100 * @brief Model for the MCUboot image header as of version 1
102 * This represents the data present in the image header, in version 1
109 /** The size of the image, in bytes. */
111 /** The image version. */
[all …]
/Zephyr-latest/tests/cmake/zephyr_get/
DCMakeLists.txt50 # IMAGE <image-1> <expected-value-for-image-1>
51 # [IMAGE <image-2> <expected-value-for-image-2> ...]
61 if(expected_value STREQUAL "IMAGE")
64 if(NOT ARGV${i} STREQUAL "IMAGE")
65 message(FATAL_ERROR "Invalid argument ${i}: '${ARGV${i}}' (expected 'IMAGE')")
79 message(FATAL_ERROR "No value provided for image: '${IMAGE_NAME}'")
140 IMAGE no_sysbuild "cmake cache"
142 # LOCAL sysbuild-defined value for this primary image.
143 IMAGE zephyr_get "sysbuild.main"
145 # the LOCAL sysbuild-defined value for this secondary image.
[all …]
Dsysbuild.cmake3 # Add a few copies of the same image, so that we can configure
7 set(image ${DEFAULT_IMAGE}_${suffix}) variable
8 if(NOT TARGET ${image})
10 APPLICATION ${image}
13 list(APPEND IMAGES ${image})
19 foreach(image ${IMAGES})
20 sysbuild_get(ASSERT_FAIL_COUNT IMAGE ${image} CACHE)
22 set(failures "${failures}\n - ${image}: ${ASSERT_FAIL_COUNT} assertion(s) failed")
28 message(FATAL_ERROR "Test failures per sysbuild image: ${failures}")
/Zephyr-latest/subsys/mgmt/mcumgr/grp/img_mgmt/
DKconfig5 # The Kconfig file is dedicated to Application Image management group of
16 bool "Mcumgr handlers for image management"
24 Enables MCUmgr handlers for image management
31 bool "Use heap mem pool for flash image DFU context"
33 Use heap to allocate flash image upload context, otherwise a static variable will
34 be used. The context object is used by MCUMGR_GRP_IMG_MANAGER to buffer image writes
35 and has significant size, mainly affected by image write buffer of
59 bool "Verbose error responses when uploading application image"
66 bool "Allow to confirm secondary slot of non-active image"
69 Allows to confirm secondary (non-active) slot of non-active image.
[all …]
/Zephyr-latest/dts/common/nordic/
Dnrf5340_cpuapp_partition.dtsi15 * 0x0001_0000 Primary image area (448 KB):
16 * 0x0001_0000 Secure image primary (256 KB)
17 * 0x0005_0000 Non-secure image primary (192 KB)
18 * 0x0008_0000 Secondary image area (448 KB):
19 * 0x0008_0000 Secure image secondary (256 KB)
20 * 0x000c_0000 Non-secure image secondary (192 KB)
37 label = "image-0";
41 label = "image-0-nonsecure";
45 label = "image-1";
49 label = "image-1-nonsecure";
[all …]
Dnrf91xx_partition.dtsi15 * 0x0001_0000 Primary image area (448 KB):
16 * 0x0001_0000 Secure image primary (256 KB)
17 * 0x0005_0000 Non-secure image primary (192 KB)
18 * 0x0008_0000 Secondary image area (448 KB):
19 * 0x0008_0000 Secure image secondary (256 KB)
20 * 0x000c_0000 Non-secure image secondary (192 KB)
37 label = "image-0";
41 label = "image-0-nonsecure";
45 label = "image-1";
49 label = "image-1-nonsecure";
[all …]
/Zephyr-latest/scripts/pylib/pytest-twister-harness/tests/fixtures/
Dmcumgr_fixture_test.py25 patched_run_command.assert_called_with('image list')
27 mcumgr.image_upload('/path/to/image', timeout=100)
28 patched_run_command.assert_called_with('-t 100 image upload /path/to/image')
30 mcumgr.image_upload('/path/to/image', slot=2, timeout=100)
31 patched_run_command.assert_called_with('-t 100 image upload /path/to/image -e -n 2')
34 patched_run_command.assert_called_with('image test ABCD')
37 patched_run_command.assert_called_with('image confirm ABCD')
43 image=0 slot=0
58 image=0 slot=0
63 image=0 slot=1
[all …]
/Zephyr-latest/subsys/dfu/
DKconfig11 bool "DFU image manager"
15 Enable support for managing DFU image.
20 prompt "Image manager"
23 Choice support for managing DFU image.
27 bool "Image manager for mcuboot"
31 Enable support for managing DFU image downloaded using mcuboot.
41 Enable shell module, which provides information about image slots and
59 Estimated size of update image data, which is used to prevent loading of firmware updates
64 int "Image writer buffer size"
67 Size (in Bytes) of buffer for image writer. Must be a multiple of
[all …]
/Zephyr-latest/scripts/pylib/pytest-twister-harness/src/twister_harness/helpers/
Dmcumgr.py22 image: int
56 def image_upload(self, image: Path | str, slot: int | None = None, timeout: int = 30):
57 command = f'-t {timeout} image upload {image}'
61 logger.info('Image successfully uploaded')
64 output = self.run_command('image list')
70 re_image = re.compile(r'image=(\d+)\s+slot=(\d+)')
78 image=int(m.group(1)),
93 for image in image_list:
94 if 'active' not in image.flags:
95 return image.hash
[all …]
/Zephyr-latest/doc/connectivity/bluetooth/api/mesh/
Ddfu_srv.rst8 receive the firmware image binary from the Distributor node.
20 started. Each firmware image in the image list must be independently updatable, and should have its
24 firmware update capabilities could have three entries in the firmware image list, each with their
31 the binary image. The interaction between the Firmware Update Server, BLOB Transfer Server and
44 firmware image metadata. The Firmware Update Server performs the transfer check by calling the
61 :ref:`bluetooth_mesh_models_rpr_srv` is supported, the Composition Data of the new firmware image
63 firmware image will be represented by Models Metadata Page 128. Composition Data Pages 0, 1 and 2,
65 firmware image until the device is reprovisioned with Node Provisioning Protocol Interface (NPPI)
73 and 130. The Models Metadata for the old image will be loaded into Models Metadata Page 0, and the
74 Models Metadata for the new image will be loaded into Models Metadata Page 128.
[all …]
/Zephyr-latest/subsys/mgmt/mcumgr/grp/img_mgmt/include/mgmt/mcumgr/grp/img_mgmt/
Dimg_mgmt_priv.h31 * @brief Marks the image in the specified slot as pending. On the next reboot,
32 * the system will perform a boot of the specified image.
35 * @param permanent Whether the image should be used permanently or only tested once:
36 * 0=run image once, then confirm or revert.
37 * 1=run image forever.
44 * @brief Marks the image in slot 0 as confirmed. The system will continue
45 * booting into the image in slot 0 until told to boot from a different slot.
52 * @brief Reads the specified chunk of data from an image slot.
64 * @brief Writes the specified chunk of image data to slot 1.
67 * @param data The image data to write.
[all …]
/Zephyr-latest/share/sysbuild/images/bootloader/
DCMakeLists.txt7 set(image mcuboot) variable
9 APPLICATION ${image}
14 sysbuild_add_dependencies(CONFIGURE ${DEFAULT_IMAGE} ${image})
15 sysbuild_add_dependencies(FLASH ${DEFAULT_IMAGE} ${image})
17 set_config_string(${image} CONFIG_BOOT_SIGNATURE_KEY_FILE "${SB_CONFIG_BOOT_SIGNATURE_KEY_FILE}")
18 set_config_bool(${image} CONFIG_BOOT_ENCRYPT_IMAGE "${SB_CONFIG_BOOT_ENCRYPTION}")
20 …set_config_string(${image} CONFIG_BOOT_ENCRYPTION_KEY_FILE "${SB_CONFIG_BOOT_ENCRYPTION_KEY_FILE}")
/Zephyr-latest/soc/nxp/imxrt/imxrt118x/
DKconfig38 hex "Image container"
41 Image container is a boot image format that is used by ROM. Container
42 format consists container header, image arrary entry, signature block
47 # image. If ROM_START_OFFSET changed, you also need to change CONTAINER_USER_IMAGE_OFFSET
50 hex "The offset between container header and user image"
53 The offset between container and user image. IF change the user image
55 value, this will make ROM could get the user image start address.
/Zephyr-latest/subsys/bluetooth/mesh/
Ddfu_slot.h11 * @param slot A valid DFU image slot.
25 /** @brief Reserve a new DFU image slot for a distributable image.
27 * A DFU image slot represents a single distributable DFU image with all its
41 * @param size The size of the image.
51 /** @brief Set the new fwid for the incoming image for a reserved slot.
81 /** @brief Delete a committed DFU image slot.
90 /** @brief Delete all DFU image slots.
96 /** @brief Get the DFU image slot at the given firmware image list index.
98 * @param idx DFU image slot index.
100 * @return The DFU image slot at the given index, or NULL if no slot exists with the
[all …]
/Zephyr-latest/samples/subsys/mgmt/mcumgr/smp_svr/
DREADME.rst151 Signing the sample image
157 To sign the sample image built in the previous step:
163 The above command creates an image file called :file:`zephyr.signed.bin` in the
166 For more information on image signing and ``west sign``, see the :ref:`west-sign`
169 Flashing the sample image
172 Upload the :file:`zephyr.signed.bin` file from the previous to image slot-0 of your
175 To upload the initial image file to an empty slot-0, use ``west flash`` like normal.
176 ``west flash`` will automatically detect slot-0 address and confirm the image.
182 The *signed* image file needs to be used specifically, otherwise the non-signed version
183 will be used and the image won't be runnable.
[all …]
/Zephyr-latest/boards/st/nucleo_l552ze_q/
Dnucleo_l552ze_q_stm32l552xx_ns.dts41 * multiple image boot, no tests.
50 /* Secure image primary slot */
52 label = "image-0";
55 /* Non-secure image primary slot */
57 label = "image-0-nonsecure";
60 /* Secure image secondary slot */
62 label = "image-1";
65 /* Non-secure image secondary slot */
67 label = "image-1-nonsecure";
/Zephyr-latest/share/sysbuild/cmake/modules/
Dsysbuild_images.cmake12 # This is where all Zephyr applications are added to the multi-image build.
18 foreach(image ${IMAGES_CONFIGURATION_ORDER})
19 …build_module_call(PRE_IMAGE_CMAKE MODULES ${SYSBUILD_MODULE_NAMES} IMAGES ${IMAGES} IMAGE ${image})
20 ExternalZephyrProject_Cmake(APPLICATION ${image})
21 …uild_module_call(POST_IMAGE_CMAKE MODULES ${SYSBUILD_MODULE_NAMES} IMAGES ${IMAGES} IMAGE ${image})
Dsysbuild_extensions.cmake6 # load_cache(IMAGE <image> BINARY_DIR <dir>)
12 # the name given as value to the IMAGE argument.
14 # IMAGE: image name identifying the cache for later sysbuild_get() lookup calls.
17 set(single_args IMAGE BINARY_DIR)
47 # sysbuild_get(<variable> IMAGE <image> [VAR <image-variable>] <KCONFIG|CACHE>)
50 # identified by image.
58 # sysbuild_get(PROJECT_NAME IMAGE my_sample CACHE)
62 # sysbuild_get(my_sample_PROJECT_NAME IMAGE my_sample VAR PROJECT_NAME CACHE)
66 # sysbuild_get(my_sample_CONFIG_FOO IMAGE my_sample VAR CONFIG_FOO KCONFIG)
72 # IMAGE: image name identifying the cache to use for variable lookup.
[all …]
/Zephyr-latest/share/sysbuild/cmake/
Ddomains.cmake10 foreach(image ${IMAGES})
11 set(domains_yaml "${domains_yaml}\n - name: ${image}")
12 set(domains_yaml "${domains_yaml}\n build_dir: $<TARGET_PROPERTY:${image},_EP_BINARY_DIR>")
15 foreach(image ${IMAGES_FLASHING_ORDER})
16 set(flash_cond "$<NOT:$<BOOL:$<TARGET_PROPERTY:${image},BUILD_ONLY>>>")
17 set(domains_yaml "${domains_yaml}$<${flash_cond}:\n - ${image}>")
/Zephyr-latest/boards/st/b_u585i_iot02a/
Db_u585i_iot02a_stm32u585xx_ns.dts47 /* Secure image primary slot */
49 label = "image-0";
52 /* Non-secure image primary slot */
54 label = "image-0-nonsecure";
57 /* Secure image secondary slot */
59 label = "image-1";
62 /* Non-secure image secondary slot */
64 label = "image-1-nonsecure";
/Zephyr-latest/boards/ezurio/bl5340_dvk/
Dbl5340_dvk_nrf5340_cpuapp_partition_conf.dtsi14 * Secure image will be placed, by default, in flash0
16 * Secure image will use sram0 for system memory.
18 * Non-Secure image will be placed in slot0_ns, and use
21 * Note that the Secure image only requires knowledge of
22 * the beginning of the Non-Secure image (not its size).
43 * - Lowest 256 kB SRAM allocated to Secure image (sram0_s)
44 * - Middle 192 kB allocated to Non-Secure image (sram0_ns)
/Zephyr-latest/doc/services/device_mgmt/
Ddfu.rst10 upgrade the image of a Zephyr-based application at run time. It currently
14 * :zephyr_file:`subsys/dfu/img_util/`: Image management code
16 The DFU subsystem deals with image management, but not with the transport
17 or management protocols themselves required to send the image to the target
23 Flash Image
26 The flash image API as part of the Device Firmware Upgrade (DFU) subsystem
28 image chunks to flash.
41 application images. It allows to select application image and boot type
58 `MCUboot boot loader`_. It interfaces with MCUboot and is aware of the image
82 to flash the Zephyr application image at the correct offset (right after the
/Zephyr-latest/boards/raytac/mdbt53_db_40/
DKconfig.defconfig13 # secure image (TRUSTED_EXECUTION_SECURE=y), the secure FW image shall always
23 # If the secure firmware is to be combined with a non-secure image
24 # (TRUSTED_EXECUTION_SECURE=y), the secure FW image SRAM shall always
25 # be restricted to the secure image SRAM partition (sram-secure-partition).
27 # may be used by the image.
29 # For the non-secure version of the board, the firmware image SRAM is

12345678910>>...50