Home
last modified time | relevance | path

Searched refs:image (Results 1 – 25 of 966) sorted by relevance

12345678910>>...39

/Zephyr-latest/dts/common/nordic/
Dnrf5340_cpuapp_partition.dtsi15 * 0x0001_0000 Primary image area (448 KB):
16 * 0x0001_0000 Secure image primary (256 KB)
17 * 0x0005_0000 Non-secure image primary (192 KB)
18 * 0x0008_0000 Secondary image area (448 KB):
19 * 0x0008_0000 Secure image secondary (256 KB)
20 * 0x000c_0000 Non-secure image secondary (192 KB)
37 label = "image-0";
41 label = "image-0-nonsecure";
45 label = "image-1";
49 label = "image-1-nonsecure";
[all …]
Dnrf91xx_partition.dtsi15 * 0x0001_0000 Primary image area (448 KB):
16 * 0x0001_0000 Secure image primary (256 KB)
17 * 0x0005_0000 Non-secure image primary (192 KB)
18 * 0x0008_0000 Secondary image area (448 KB):
19 * 0x0008_0000 Secure image secondary (256 KB)
20 * 0x000c_0000 Non-secure image secondary (192 KB)
37 label = "image-0";
41 label = "image-0-nonsecure";
45 label = "image-1";
49 label = "image-1-nonsecure";
[all …]
/Zephyr-latest/share/sysbuild/images/bootloader/
DCMakeLists.txt7 set(image mcuboot) variable
9 APPLICATION ${image}
14 sysbuild_add_dependencies(CONFIGURE ${DEFAULT_IMAGE} ${image})
15 sysbuild_add_dependencies(FLASH ${DEFAULT_IMAGE} ${image})
17 set_config_string(${image} CONFIG_BOOT_SIGNATURE_KEY_FILE "${SB_CONFIG_BOOT_SIGNATURE_KEY_FILE}")
18 set_config_bool(${image} CONFIG_BOOT_ENCRYPT_IMAGE "${SB_CONFIG_BOOT_ENCRYPTION}")
20 …set_config_string(${image} CONFIG_BOOT_ENCRYPTION_KEY_FILE "${SB_CONFIG_BOOT_ENCRYPTION_KEY_FILE}")
/Zephyr-latest/tests/cmake/zephyr_get/
Dsysbuild.cmake3 # Add a few copies of the same image, so that we can configure
7 set(image ${DEFAULT_IMAGE}_${suffix}) variable
8 if(NOT TARGET ${image})
10 APPLICATION ${image}
13 list(APPEND IMAGES ${image})
19 foreach(image ${IMAGES})
20 sysbuild_get(ASSERT_FAIL_COUNT IMAGE ${image} CACHE)
22 set(failures "${failures}\n - ${image}: ${ASSERT_FAIL_COUNT} assertion(s) failed")
28 message(FATAL_ERROR "Test failures per sysbuild image: ${failures}")
/Zephyr-latest/share/sysbuild/cmake/
Ddomains.cmake10 foreach(image ${IMAGES})
11 set(domains_yaml "${domains_yaml}\n - name: ${image}")
12 set(domains_yaml "${domains_yaml}\n build_dir: $<TARGET_PROPERTY:${image},_EP_BINARY_DIR>")
15 foreach(image ${IMAGES_FLASHING_ORDER})
16 set(flash_cond "$<NOT:$<BOOL:$<TARGET_PROPERTY:${image},BUILD_ONLY>>>")
17 set(domains_yaml "${domains_yaml}$<${flash_cond}:\n - ${image}>")
/Zephyr-latest/boards/st/nucleo_l552ze_q/
Dnucleo_l552ze_q_stm32l552xx_ns.dts41 * multiple image boot, no tests.
50 /* Secure image primary slot */
52 label = "image-0";
55 /* Non-secure image primary slot */
57 label = "image-0-nonsecure";
60 /* Secure image secondary slot */
62 label = "image-1";
65 /* Non-secure image secondary slot */
67 label = "image-1-nonsecure";
/Zephyr-latest/boards/st/b_u585i_iot02a/
Db_u585i_iot02a_stm32u585xx_ns.dts47 /* Secure image primary slot */
49 label = "image-0";
52 /* Non-secure image primary slot */
54 label = "image-0-nonsecure";
57 /* Secure image secondary slot */
59 label = "image-1";
62 /* Non-secure image secondary slot */
64 label = "image-1-nonsecure";
/Zephyr-latest/doc/services/device_mgmt/smp_groups/
Dsmp_group_1.rst3 Application/software image management group
6 Application/software image management group defines following commands:
35 The "slot" and "image" definition comes from mcuboot where "image" would
43 to single application, but will name them as "image-0" and "image-1" respectively.
53 | 1 | "slot0_partition" | "image-0" |
54 | | "slot1_partition" | "image-1" |
56 | 2 | "slot2_partition" | "image-2" |
57 | | "slot3_partition" | "image-3" |
99 Below definition of the response contains "image" field that has been marked
101 does not support more than one image. The field is mandatory when application
[all …]
/Zephyr-latest/scripts/pylib/pytest-twister-harness/src/twister_harness/helpers/
Dmcumgr.py22 image: int
56 def image_upload(self, image: Path | str, slot: int | None = None, timeout: int = 30):
78 image=int(m.group(1)),
93 for image in image_list:
94 if 'active' not in image.flags:
95 return image.hash
101 for image in image_list:
102 if 'confirmed' not in image.flags:
103 return image.hash
/Zephyr-latest/subsys/mgmt/mcumgr/grp/img_mgmt/
DKconfig16 bool "Mcumgr handlers for image management"
24 Enables MCUmgr handlers for image management
31 bool "Use heap mem pool for flash image DFU context"
33 Use heap to allocate flash image upload context, otherwise a static variable will
34 be used. The context object is used by MCUMGR_GRP_IMG_MANAGER to buffer image writes
35 and has significant size, mainly affected by image write buffer of
59 bool "Verbose error responses when uploading application image"
66 bool "Allow to confirm secondary slot of non-active image"
69 Allows to confirm secondary (non-active) slot of non-active image.
71 image, via MCUmgr commands, to prevent confirming something that is
[all …]
/Zephyr-latest/dts/common/espressif/
Dpartitions_0x0_amp_16M.dtsi20 label = "image-0";
25 label = "image-0-appcpu";
30 label = "image-1";
35 label = "image-1-appcpu";
45 label = "image-scratch";
Dpartitions_0x0_amp_2M.dtsi20 label = "image-0";
25 label = "image-0-appcpu";
30 label = "image-1";
35 label = "image-1-appcpu";
45 label = "image-scratch";
Dpartitions_0x0_amp_32M.dtsi20 label = "image-0";
25 label = "image-0-appcpu";
30 label = "image-1";
35 label = "image-1-appcpu";
45 label = "image-scratch";
Dpartitions_0x0_amp_4M.dtsi20 label = "image-0";
25 label = "image-0-appcpu";
30 label = "image-1";
35 label = "image-1-appcpu";
45 label = "image-scratch";
Dpartitions_0x0_amp_8M.dtsi20 label = "image-0";
25 label = "image-0-appcpu";
30 label = "image-1";
35 label = "image-1-appcpu";
45 label = "image-scratch";
Dpartitions_0x1000_amp_16M.dtsi20 label = "image-0";
25 label = "image-0-appcpu";
30 label = "image-1";
35 label = "image-1-appcpu";
45 label = "image-scratch";
Dpartitions_0x1000_amp_2M.dtsi20 label = "image-0";
25 label = "image-0-appcpu";
30 label = "image-1";
35 label = "image-1-appcpu";
45 label = "image-scratch";
Dpartitions_0x1000_amp_32M.dtsi20 label = "image-0";
25 label = "image-0-appcpu";
30 label = "image-1";
35 label = "image-1-appcpu";
45 label = "image-scratch";
Dpartitions_0x1000_amp_4M.dtsi20 label = "image-0";
25 label = "image-0-appcpu";
30 label = "image-1";
35 label = "image-1-appcpu";
45 label = "image-scratch";
Dpartitions_0x1000_amp_8M.dtsi20 label = "image-0";
25 label = "image-0-appcpu";
30 label = "image-1";
35 label = "image-1-appcpu";
45 label = "image-scratch";
/Zephyr-latest/boards/ezurio/bl5340_dvk/
Dbl5340_dvk_nrf5340_cpuapp_partition_conf.dtsi14 * Secure image will be placed, by default, in flash0
16 * Secure image will use sram0 for system memory.
18 * Non-Secure image will be placed in slot0_ns, and use
21 * Note that the Secure image only requires knowledge of
22 * the beginning of the Non-Secure image (not its size).
43 * - Lowest 256 kB SRAM allocated to Secure image (sram0_s)
44 * - Middle 192 kB allocated to Non-Secure image (sram0_ns)
/Zephyr-latest/tests/subsys/dfu/mcuboot_multi/
Dnative_sim.overlay22 label = "image-0";
26 label = "image-1";
30 label = "image-2";
34 label = "image-3";
Dnrf52840dk_nrf52840.overlay23 label = "image-0";
27 label = "image-1";
31 label = "image-2";
35 label = "image-3";
/Zephyr-latest/tests/subsys/mgmt/mcumgr/img_mgmt_slot_info/boards/
Dnrf52840dk_nrf52840_dual_slot.overlay22 label = "image-0";
26 label = "image-1";
30 label = "image-2";
34 label = "image-3";
/Zephyr-latest/doc/connectivity/bluetooth/api/mesh/
Ddfu_srv.rst8 receive the firmware image binary from the Distributor node.
20 started. Each firmware image in the image list must be independently updatable, and should have its
24 firmware update capabilities could have three entries in the firmware image list, each with their
31 the binary image. The interaction between the Firmware Update Server, BLOB Transfer Server and
44 firmware image metadata. The Firmware Update Server performs the transfer check by calling the
61 :ref:`bluetooth_mesh_models_rpr_srv` is supported, the Composition Data of the new firmware image
63 firmware image will be represented by Models Metadata Page 128. Composition Data Pages 0, 1 and 2,
65 firmware image until the device is reprovisioned with Node Provisioning Protocol Interface (NPPI)
73 and 130. The Models Metadata for the old image will be loaded into Models Metadata Page 0, and the
74 Models Metadata for the new image will be loaded into Models Metadata Page 128.
[all …]

12345678910>>...39