Lines Matching refs:to
12 # Hidden option to mark a project as MCUboot
104 When possible to map storage device, at least for read operations,
105 to address space or RAM area, enabling this option allows hash
106 calculation functions to directly access the storage through that address
111 SHA requires image to be decrypted first, which is done in RAM.
225 Image to be verified needs to be accessible through memory address
269 This option instructs MCUboot to perform a clean-up of a set of
270 architecture core HW registers before jumping to the application
271 firmware. The clean-up sets these registers to their warm-reset
274 This option is enabled by default to prevent possible problems when
284 Sets contents of memory to 0 before jumping to application.
299 in MCUBoot. If enabled the public key is appended to the signed image
300 and requires the hash of the public key to be provisioned to the device
307 If y, the bootloader attempts to validate the signature of the
308 primary slot every boot. This adds the signature check time to
310 able to modify the flash image itself.
317 If y, the bootloader attempts to validate the signature of the
327 If y, the BOOT_IMAGE_UPGRADE_MODE will default to using "offset" instead of "scratch".
328 This is a separate bool config option, because Kconfig doesn't allow defaults to be
336 If y, the BOOT_IMAGE_UPGRADE_MODE will default to using
338 option, because Kconfig doesn't allow defaults to be
340 by swap using offset, but is kept to allow existing projects
341 to make use of it.
367 the primary slot, then the sector at X+1 in the primary is moved to index X in the
370 to all sectors in both slots being of the same size. This mode offers faster swap times
379 each sector X in the secondary slot, it is moved to index X in
381 moved to index X in the secondary.
383 but is currently limited to all sectors in both slots being of
391 without having to move/copy it into the primary slot. For this reason the
392 images must be linked to be executed from the given image slot. Using this
399 numbers, thereafter the selected image is copied to RAM and executed from
400 there. For this reason, the image has to be linked to be executed from RAM.
401 The address that the image is copied to is specified using the load-addr
402 argument to the imgtool.py script which writes it to the image header.
411 forced to the firmware loader.
423 If y, enables the revert mechanism in direct-xip similar to the one in
424 swap mode. It requires the trailer magic to be added to the signed image.
427 attempt to boot the previous image. The images can also be made permanent
435 primary slot to be initialized from a valid image in the secondary slot.
448 attacker who has access to the flash contents of the primary slot (eg
457 If y, the image is loaded to RAM and executed from there. For this reason,
458 the image has to be linked to be executed from RAM. The address that the
459 image is copied to is specified using the load-addr argument to the
460 imgtool.py script which writes it to the image header.
462 # Workaround for not being able to have commas in macro arguments
479 Instead of using information on the flash slots to decide which images
480 to load/update, the application provides the information from which
481 flash slot to load in runtime. This is useful when the application
482 reads the state for hardware straps or other sources to decide which
483 image to load. Usually, application will provide a boot_go_hook() to
484 decide which image to load.
489 Hidden option used to check if image encryption is supported.
500 on the fly when upgrading to the primary slot, as well as encrypted
501 back when swapping from the primary slot to the secondary slot. The
510 Note that for single slot operation, this can still be used to allow
564 memory usage; larger values allow it to support larger images.
573 # Workaround for not being able to have commas in macro arguments
597 Use retention to share data with application. Requires:
600 - Chosen node "zephyr,bootloader-info" to be set to the retention
616 This will allow data to be shared between MCUboot and an application,
619 Note: This requires a backend to function, see
640 Note: This requires a backend to function, see
666 Moderate level hardening: Long global fail loop to avoid break out,
667 control flow integrity check to discover discrepancy in expected code
673 Medium level hardening: Long global fail loop to avoid break out,
674 control flow integrity check to discover discrepancy in expected code
675 flow, double variables to discover register or memory corruption.
681 Maximum level hardening: Long global fail loop to avoid break out,
682 control flow integrity check to discover discrepancy in expected code
683 flow, double variables to discover register or memory corruption, random
684 delays to make code execution less predictable. Random delays requires an
697 bool "Wait for a prescribed duration to see if USB DFU is invoked"
704 If y, MCUboot waits for a prescribed duration of time to allow
705 for USB DFU to be invoked. Please note DFU always updates the
709 bool "Use GPIO to detect whether to trigger DFU mode"
716 If y, MCUboot uses GPIO to detect whether to invoke USB DFU.
725 Milliseconds to wait for USB DFU to be invoked.
733 Used to prevent the bootloader from loading on button press.
735 the one used to place the device in bootloader mode.
743 application that the bootloader can jump to.
776 definitions for this to work.
783 bool "Relocate the interrupt vector to the application"
787 Relocate the interrupt vector to the application before it is started.
804 minor and revision. Enable this option to take into account the build
819 example, a JTAG could be used to write an older version).
830 downgrades to some extent.
838 downgrade to some extent.
849 used to feed watchdog while doing time consuming operations.
864 Allow to provide procedures for override or extend native
866 update. It is up to the project customization to add required source
867 files to the build.
872 Allow to provide procedures for override or extend native
873 MCUboot's boot_go routine. It is up to the project customization to
874 add required source files to the build.
879 Allow to provide procedures for override or extend native
880 MCUboot's flash area routines. It is up to the project customization to
881 add required source files to the build.
884 bool "Enable hooks for responding to MCUboot status changes"
887 for some level of user feedback, for instance to change LED status to
898 Will flush and disable the instruction and data caches on the CPU prior to
900 increases protection against data leakage from MCUboot to applications via
930 If enabled, will include support for compressed images being loaded to the secondary slot
931 which then get decompressed into the primary slot. This mode allows the secondary slot to
941 The size of a secondary buffer used for writing decompressed data to the storage device.
973 # it to n here. Otherwise, having it on by default makes the most
1004 incorrectly uploads an update for image 1 to image 0's secondary slot
1009 also be useful when BOOT_DIRECT_XIP is enabled, to ensure that the image