Bootloader Embed SoftBoot Firmware

This MotoHawk™ block allows the application to embed a target specific SoftBoot application firmware image into a reserved area of memory.

Block ID

Bootloader Embedded SoftBoot

Library

MotoHawk_prelim_lib/Module Configuration Blocks

Description

The boot code will preferentially load and execute this soft boot firmware when programming rather than waiting for an external tool to transmit a soft boot application over a communications bus.

The result is that programming of the module may be possible for service tools that may not be capable of a two-step programming procedure.

Note that an embedded SoftBoot, once present, will not be erased when the host MotoHawk™ application is reprogrammed. Therefore, in order to remove the embedded SoftBoot image from the control, this block must be placed in a MotoHawk™ application with the "Embed SoftBoot" checkbox in the unchecked state. This will remove any previously embedded SoftBoot image.

When an Encryption Key is available, a secure, end-to-end programming path is possible when matched with suitable bootstrap capability in the supported hardware.

Block Parameters

Parameter Field Values Comments/Description
Name (Optional) Alpha-numeric text, single-quote enclosed Name of the image. If Name is empty, a unique one will be automatically generated. Must be C-legal.
Resource Drop-down list Module resource (target module dependent)
Embed Soft Boot Checkbox When checked, the SoftBoot image will be embedded, when unchecked, any previous SoftBoot image will be removed
Soft Boot File Path Single quote enclosed string Contains a path to the SoftBoot SR/SRZ file to embed.
Force Boot causes Embedded SB to run Checkbox When checked, Hard Boot will immediately load the Embedded Soft Boot image when the Force Boot is applied.
Embed Encryption Key Checkbox An Encryption Key is embedded along with the Soft Boot image when checked.
Encryption Key Single quote enclosed string Contains an even number of (hexadecimal) characters that represent the encryption key in bytes, for example 'A44FF34902ABCD47AABBCCDD3E1F5A9E'. Note also that a '0x' prefix should not be present.
Use Calibration Check Box Parameters with an asterisk will support calibration when this checkbox is ticked.
Read Access Level 0-8 Sets security level 1 lowest, 8 highest, for user access to read value. A setting of zero indicates unsecured access is allowed.
Write Access Level 0-8 Sets security level 1 lowest, 8 highest, for user access to write value. A setting of zero indicates unsecured access is allowed.
Instrumentation Group Alpha-numeric text, single-quote enclosed Determines folder name and hierarchy that is applied to calibration parameters defined by this table.

Use "|" character between folder names to delineate subgroup structure.