@@ -271,19 +271,6 @@ config BOOT_FIRMWARE_LOADER
271271
272272endchoice
273273
274- # Workaround for not being able to have commas in macro arguments
275- DT_CHOSEN_Z_SRAM := zephyr,sram
276-
277- if BOOT_RAM_LOAD
278- config BOOT_IMAGE_EXECUTABLE_RAM_START
279- hex "Boot image executable ram start"
280- default $(dt_chosen_reg_addr_hex,$(DT_CHOSEN_Z_SRAM))
281-
282- config BOOT_IMAGE_EXECUTABLE_RAM_SIZE
283- int "Boot image executable base size"
284- default $(dt_chosen_reg_size_int,$(DT_CHOSEN_Z_SRAM),0)
285- endif
286-
287274config BOOT_DIRECT_XIP_REVERT
288275 bool "Enable the revert mechanism in direct-xip mode"
289276 depends on BOOT_DIRECT_XIP
@@ -320,6 +307,31 @@ config BOOT_SWAP_SAVE_ENCTLV
320307
321308endif # !SINGLE_APPLICATION_SLOT
322309
310+ if SINGLE_APPLICATION_SLOT
311+
312+ config SINGLE_APPLICATION_SLOT_RAM_LOAD
313+ bool "RAM load for single application slot"
314+ help
315+ If y, the image is loaded to RAM and executed from there. For this reason,
316+ the image has to be linked to be executed from RAM. The address that the
317+ image is copied to is specified using the load-addr argument to the
318+ imgtool.py script which writes it to the image header.
319+
320+ endif # SINGLE_APPLICATION_SLOT
321+
322+ # Workaround for not being able to have commas in macro arguments
323+ DT_CHOSEN_Z_SRAM := zephyr,sram
324+
325+ if BOOT_RAM_LOAD || SINGLE_APPLICATION_SLOT_RAM_LOAD
326+ config BOOT_IMAGE_EXECUTABLE_RAM_START
327+ hex "Boot image executable ram start"
328+ default $(dt_chosen_reg_addr_hex,$(DT_CHOSEN_Z_SRAM))
329+
330+ config BOOT_IMAGE_EXECUTABLE_RAM_SIZE
331+ int "Boot image executable base size"
332+ default $(dt_chosen_reg_size_int,$(DT_CHOSEN_Z_SRAM),0)
333+ endif
334+
323335config BOOT_ENCRYPTION_SUPPORT
324336 bool
325337 help
0 commit comments