On Sun, Dec 01, 2013 at 12:43:11PM -0700, Simon Glass wrote:

> From: Guilherme Maciel Ferreira <guilherme.maciel.ferre...@gmail.com>
> 
> Given a multi-file image created through the mkimage's -d option:
> 
>   $ mkimage -A x86 -O linux -T multi -n x86 -d vmlinuz:initrd.img:System.map \
>   multi.img
> 
>   Image Name:   x86
>   Created:      Thu Jul 25 10:29:13 2013
>   Image Type:   Intel x86 Linux Multi-File Image (gzip compressed)
>   Data Size:    13722956 Bytes = 13401.32 kB = 13.09 MB
>   Load Address: 00000000
>   Entry Point:  00000000
>   Contents:
>      Image 0: 4040128 Bytes = 3945.44 kB = 3.85 MB
>      Image 1: 7991719 Bytes = 7804.41 kB = 7.62 MB
>      Image 2: 1691092 Bytes = 1651.46 kB = 1.61 MB
> 
> It is possible to perform the innverse operation -- extracting any file from
> the image -- by using the dumpimage's -i option:
> 
>   $ dumpimage -i multi.img -p 2 System.map
> 
> Although it's feasible to retrieve "data files" from image through scripting,
> the requirement to embed tools such 'dd', 'awk' and 'sed' for this sole 
> purpose
> is cumbersome and unreliable -- once you must keep track of file sizes inside
> the image. Furthermore, extracting data files using "dumpimage" tool is faster
> than through scripting.
> 
> Signed-off-by: Guilherme Maciel Ferreira <guilherme.maciel.ferre...@gmail.com>
> Signed-off-by: Simon Glass <s...@chromium.org>

Applied to u-boot/master, thanks!

-- 
Tom

Attachment: signature.asc
Description: Digital signature

_______________________________________________
U-Boot mailing list
U-Boot@lists.denx.de
http://lists.denx.de/mailman/listinfo/u-boot

Reply via email to