@@ -271,19 +271,6 @@ config BOOT_FIRMWARE_LOADER
271
271
272
272
endchoice
273
273
274
- # Workaround for not being able to have commas in macro arguments
275
- DT_CHOSEN_Z_SRAM := zephyr,sram
276
-
277
- if BOOT_RAM_LOAD
278
- config BOOT_IMAGE_EXECUTABLE_RAM_START
279
- hex "Boot image executable ram start"
280
- default $(dt_chosen_reg_addr_hex,$(DT_CHOSEN_Z_SRAM))
281
-
282
- config BOOT_IMAGE_EXECUTABLE_RAM_SIZE
283
- int "Boot image executable base size"
284
- default $(dt_chosen_reg_size_int,$(DT_CHOSEN_Z_SRAM),0)
285
- endif
286
-
287
274
config BOOT_DIRECT_XIP_REVERT
288
275
bool "Enable the revert mechanism in direct-xip mode"
289
276
depends on BOOT_DIRECT_XIP
@@ -320,6 +307,28 @@ config BOOT_SWAP_SAVE_ENCTLV
320
307
321
308
endif # !SINGLE_APPLICATION_SLOT
322
309
310
+ config SINGLE_APPLICATION_SLOT_RAM_LOAD
311
+ bool "RAM load for single application slot"
312
+ select SINGLE_APPLICATION_SLOT
313
+ help
314
+ If y, the image is loaded to RAM and executed from there. For this reason,
315
+ the image has to be linked to be executed from RAM. The address that the
316
+ image is copied to is specified using the load-addr argument to the
317
+ imgtool.py script which writes it to the image header.
318
+
319
+ # Workaround for not being able to have commas in macro arguments
320
+ DT_CHOSEN_Z_SRAM := zephyr,sram
321
+
322
+ if BOOT_RAM_LOAD || SINGLE_APPLICATION_SLOT_RAM_LOAD
323
+ config BOOT_IMAGE_EXECUTABLE_RAM_START
324
+ hex "Boot image executable ram start"
325
+ default $(dt_chosen_reg_addr_hex,$(DT_CHOSEN_Z_SRAM))
326
+
327
+ config BOOT_IMAGE_EXECUTABLE_RAM_SIZE
328
+ int "Boot image executable base size"
329
+ default $(dt_chosen_reg_size_int,$(DT_CHOSEN_Z_SRAM),0)
330
+ endif
331
+
323
332
config BOOT_ENCRYPTION_SUPPORT
324
333
bool
325
334
help
0 commit comments