]> git.ipfire.org Git - people/ms/u-boot.git/blame_incremental - doc/mkimage.1
mkimage: Support automatic creating of a FIT without a .its
[people/ms/u-boot.git] / doc / mkimage.1
... / ...
CommitLineData
1.TH MKIMAGE 1 "2010-05-16"
2
3.SH NAME
4mkimage \- Generate image for U-Boot
5.SH SYNOPSIS
6.B mkimage
7.RB "\-l [" "uimage file name" "]"
8
9.B mkimage
10.RB [\fIoptions\fP] " \-f [" "image tree source file" "]" " [" "uimage file name" "]"
11
12.B mkimage
13.RB [\fIoptions\fP] " \-F [" "uimage file name" "]"
14
15.B mkimage
16.RB [\fIoptions\fP] " (legacy mode)"
17
18.SH "DESCRIPTION"
19The
20.B mkimage
21command is used to create images for use with the U-Boot boot loader.
22These images can contain the linux kernel, device tree blob, root file
23system image, firmware images etc., either separate or combined.
24
25.B mkimage
26supports two different formats:
27
28The old
29.I legacy image
30format concatenates the individual parts (for example, kernel image,
31device tree blob and ramdisk image) and adds a 64 bytes header
32containing information about target architecture, operating system,
33image type, compression method, entry points, time stamp, checksums,
34etc.
35
36The new
37.I FIT (Flattened Image Tree) format
38allows for more flexibility in handling images of various types and also
39enhances integrity protection of images with stronger checksums. It also
40supports verified boot.
41
42.SH "OPTIONS"
43
44.B List image information:
45
46.TP
47.BI "\-l [" "uimage file name" "]"
48mkimage lists the information contained in the header of an existing U-Boot image.
49
50.P
51.B Create old legacy image:
52
53.TP
54.BI "\-A [" "architecture" "]"
55Set architecture. Pass \-h as the architecture to see the list of supported architectures.
56
57.TP
58.BI "\-O [" "os" "]"
59Set operating system. bootm command of u-boot changes boot method by os type.
60Pass \-h as the OS to see the list of supported OS.
61
62.TP
63.BI "\-T [" "image type" "]"
64Set image type.
65Pass \-h as the image to see the list of supported image type.
66
67.TP
68.BI "\-C [" "compression type" "]"
69Set compression type.
70Pass \-h as the compression to see the list of supported compression type.
71
72.TP
73.BI "\-a [" "load addess" "]"
74Set load address with a hex number.
75
76.TP
77.BI "\-e [" "entry point" "]"
78Set entry point with a hex number.
79
80.TP
81.BI "\-l"
82List the contents of an image.
83
84.TP
85.BI "\-n [" "image name" "]"
86Set image name to 'image name'.
87
88.TP
89.BI "\-d [" "image data file" "]"
90Use image data from 'image data file'.
91
92.TP
93.BI "\-x"
94Set XIP (execute in place) flag.
95
96.P
97.B Create FIT image:
98
99.TP
100.BI "\-c [" "comment" "]"
101Specifies a comment to be added when signing. This is typically a useful
102message which describes how the image was signed or some other useful
103information.
104
105.TP
106.BI "\-D [" "dtc options" "]"
107Provide special options to the device tree compiler that is used to
108create the image.
109
110.TP
111.BI "\-f [" "image tree source file" " | " "auto" "]"
112Image tree source file that describes the structure and contents of the
113FIT image.
114
115This can be automatically generated for some simple cases.
116Use "-f auto" for this. In that case the arguments -d, -A, -O, -T, -C, -a
117and -e are used to specify the image to include in the FIT and its attributes.
118No .its file is required.
119
120.TP
121.BI "\-F"
122Indicates that an existing FIT image should be modified. No dtc
123compilation is performed and the \-f flag should not be given.
124This can be used to sign images with additional keys after initial image
125creation.
126
127.TP
128.BI "\-k [" "key_directory" "]"
129Specifies the directory containing keys to use for signing. This directory
130should contain a private key file <name>.key for use with signing and a
131certificate <name>.crt (containing the public key) for use with verification.
132
133.TP
134.BI "\-K [" "key_destination" "]"
135Specifies a compiled device tree binary file (typically .dtb) to write
136public key information into. When a private key is used to sign an image,
137the corresponding public key is written into this file for for run-time
138verification. Typically the file here is the device tree binary used by
139CONFIG_OF_CONTROL in U-Boot.
140
141.TP
142.BI "\-r
143Specifies that keys used to sign the FIT are required. This means that they
144must be verified for the image to boot. Without this option, the verification
145will be optional (useful for testing but not for release).
146
147.SH EXAMPLES
148
149List image information:
150.nf
151.B mkimage -l uImage
152.fi
153.P
154Create legacy image with compressed PowerPC Linux kernel:
155.nf
156.B mkimage -A powerpc -O linux -T kernel -C gzip \\\\
157.br
158.B -a 0 -e 0 -n Linux -d vmlinux.gz uImage
159.fi
160.P
161Create FIT image with compressed PowerPC Linux kernel:
162.nf
163.B mkimage -f kernel.its kernel.itb
164.fi
165.P
166Create FIT image with compressed kernel and sign it with keys in the
167/public/signing-keys directory. Add corresponding public keys into u-boot.dtb,
168skipping those for which keys cannot be found. Also add a comment.
169.nf
170.B mkimage -f kernel.its -k /public/signing-keys -K u-boot.dtb \\\\
171.br
172.B -c """Kernel 3.8 image for production devices""" kernel.itb
173.fi
174
175.P
176Update an existing FIT image, signing it with additional keys.
177Add corresponding public keys into u-boot.dtb. This will resign all images
178with keys that are available in the new directory. Images that request signing
179with unavailable keys are skipped.
180.nf
181.B mkimage -F -k /secret/signing-keys -K u-boot.dtb \\\\
182.br
183.B -c """Kernel 3.8 image for production devices""" kernel.itb
184.fi
185
186.P
187Create a FIT image containing a kernel, using automatic mode. No .its file
188is required.
189.nf
190.B mkimage -f auto -A arm -O linux -T kernel -C none -a 43e00000 -e 0 \\\\
191.br
192.B -c """Kernel 4.4 image for production devices""" -d vmlinuz kernel.itb
193.fi
194
195.SH HOMEPAGE
196http://www.denx.de/wiki/U-Boot/WebHome
197.PP
198.SH AUTHOR
199This manual page was written by Nobuhiro Iwamatsu <iwamatsu@nigauri.org>
200and Wolfgang Denk <wd@denx.de>. It was updated for image signing by
201Simon Glass <sjg@chromium.org>.