mirror of
https://github.com/brain-hackers/u-boot-brain
synced 2024-09-30 08:30:50 +09:00
a804b5ce2d
Given a multi-file image created through the mkimage's -d option: $ mkimage -A x86 -O linux -T multi -n x86 -d vmlinuz:initrd.img:System.map \ multi.img Image Name: x86 Created: Thu Jul 25 10:29:13 2013 Image Type: Intel x86 Linux Multi-File Image (gzip compressed) Data Size: 13722956 Bytes = 13401.32 kB = 13.09 MB Load Address: 00000000 Entry Point: 00000000 Contents: Image 0: 4040128 Bytes = 3945.44 kB = 3.85 MB Image 1: 7991719 Bytes = 7804.41 kB = 7.62 MB Image 2: 1691092 Bytes = 1651.46 kB = 1.61 MB It is possible to perform the innverse operation -- extracting any file from the image -- by using the dumpimage's -i option: $ dumpimage -i multi.img -p 2 System.map Although it's feasible to retrieve "data files" from image through scripting, the requirement to embed tools such 'dd', 'awk' and 'sed' for this sole purpose is cumbersome and unreliable -- once you must keep track of file sizes inside the image. Furthermore, extracting data files using "dumpimage" tool is faster than through scripting. Signed-off-by: Guilherme Maciel Ferreira <guilherme.maciel.ferreira@gmail.com> Signed-off-by: Simon Glass <sjg@chromium.org>
23 lines
250 B
Plaintext
23 lines
250 B
Plaintext
/bmp_logo
|
|
/envcrc
|
|
/gen_eth_addr
|
|
/img2srec
|
|
/kwboot
|
|
/dumpimage
|
|
/mkenvimage
|
|
/mkimage
|
|
/mpc86x_clk
|
|
/mxsboot
|
|
/ncb
|
|
/ncp
|
|
/proftool
|
|
/ubsha1
|
|
/xway-swap-bytes
|
|
/*.exe
|
|
/easylogo/easylogo
|
|
/env/crc32.c
|
|
/env/fw_printenv
|
|
/gdb/gdbcont
|
|
/gdb/gdbsend
|
|
/kernel-doc/docproc
|