Bootloader Embed SoftBoot Firmware
This MotoHawk™ block allows the application to embed a target specific SoftBoot application firmware image into a reserved area of memory.
Block ID
Bootloader Embedded SoftBoot
Library
MotoHawk_prelim_lib/Module Configuration Blocks
Description
The boot code will preferentially load and execute this soft boot firmware when programming rather than waiting for an external tool to transmit a soft boot application over a communications bus.
The result is that programming of the module may be possible for service tools that may not be capable of a two-step programming procedure.
Note that an embedded SoftBoot, once present, will not be erased when the host MotoHawk™ application is reprogrammed. Therefore, in order to remove the embedded SoftBoot image from the control, this block must be placed in a MotoHawk™ application with the "Embed SoftBoot" checkbox in the unchecked state. This will remove any previously embedded SoftBoot image.
When an Encryption Key is available, a secure, end-to-end programming path is possible when matched with suitable bootstrap capability in the supported hardware.
Block Parameters
Parameter Field | Values | Comments/Description |
---|---|---|
Name (Optional) | Alpha-numeric text, single-quote enclosed | Name of the image. If Name is empty, a unique one will be automatically generated. Must be C-legal. |
Resource | Drop-down list | Module resource (target module dependent) |
Embed Soft Boot | Checkbox | When checked, the SoftBoot image will be embedded, when unchecked, any previous SoftBoot image will be removed |
Soft Boot File Path | Single quote enclosed string | Contains a path to the SoftBoot SR/SRZ file to embed. |
Force Boot causes Embedded SB to run | Checkbox | When checked, Hard Boot will immediately load the Embedded Soft Boot image when the Force Boot is applied. |
Embed Encryption Key | Checkbox | An Encryption Key is embedded along with the Soft Boot image when checked. |
Encryption Key | Single quote enclosed string | Contains an even number of (hexadecimal) characters that represent the encryption key in bytes, for example 'A44FF34902ABCD47AABBCCDD3E1F5A9E'. Note also that a '0x' prefix should not be present. |
Use Calibration | Check Box | Parameters with an asterisk will support calibration when this checkbox is ticked. |
Read Access Level | 0-8 | Sets security level 1 lowest, 8 highest, for user access to read value. A setting of zero indicates unsecured access is allowed. |
Write Access Level | 0-8 | Sets security level 1 lowest, 8 highest, for user access to write value. A setting of zero indicates unsecured access is allowed. |
Instrumentation Group | Alpha-numeric text, single-quote enclosed | Determines folder name and hierarchy that is applied to calibration parameters defined by this table. Use "|" character between folder names to delineate subgroup structure. |