You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The signed test application will be at `test-app/image_v1_signed.bin`.
2101
2100
2102
-
### Flashing Test Application
2101
+
**Test Application Details:**
2102
+
- Uses generic `boot_arm64_start.S` startup code (shared with other AArch64 platforms)
2103
+
- Uses generic `AARCH64.ld` linker script with `@WOLFBOOT_LOAD_ADDRESS@` placeholder
2104
+
- Displays current exception level (EL) and firmware version
2105
+
- Entry point: `_start` (in `boot_arm64_start.S`) which sets up stack, clears BSS, and calls `main()`
2106
+
2107
+
### Firmware Update Testing
2108
+
2109
+
wolfBoot supports firmware updates using the UPDATE partition. The bootloader automatically selects the image with the higher version number from either the BOOT or UPDATE partition.
2103
2110
2104
-
After flashing `BOOT.BIN` to QSPI offset 0x0, flash the signed test app to the boot partition at offset `0x800000` using your preferred method.
2111
+
**Partition Layout:**
2112
+
- BOOT partition: `0x800000`
2113
+
- UPDATE partition: `0x3400000`
2114
+
- For RAM-based boot (Versal), images are loaded to `WOLFBOOT_LOAD_ADDRESS` (`0x10000000`)
2115
+
2116
+
**Update Behavior:**
2117
+
- wolfBoot checks both BOOT and UPDATE partitions on boot
2118
+
- Selects the partition with the higher version number
2119
+
- Falls back to the other partition if verification fails
2120
+
- The test application displays the firmware version it was signed with
2121
+
2122
+
To test firmware updates, build and sign the test application with different version numbers, then flash them to the appropriate partitions using your preferred method.
0 commit comments