<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: bootloader jump to app in S32K</title>
    <link>https://community.nxp.com/t5/S32K/bootloader-jump-to-app/m-p/1788613#M30645</link>
    <description>&lt;P&gt;Hello ,&lt;/P&gt;&lt;P&gt;i have used same program. for K344, it's OK to jump from bootloader to APP. But when I used same way to test K311. it doesn't jump. Could you give some suggestion?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 15 Jan 2024 08:06:52 GMT</pubDate>
    <dc:creator>scott071209</dc:creator>
    <dc:date>2024-01-15T08:06:52Z</dc:date>
    <item>
      <title>bootloader jump to app</title>
      <link>https://community.nxp.com/t5/S32K/bootloader-jump-to-app/m-p/1755476#M28543</link>
      <description>&lt;P&gt;At present, I am upgrading the bootloader of S32K344. After the upgrade, the boot fails to jump to the app. I have done the following steps in total:&lt;/P&gt;&lt;P&gt;1. Assign the app address value to the vector table offset register&lt;/P&gt;&lt;P&gt;S32_SCB-&amp;gt;VTOR = 0x600000 ;&lt;/P&gt;&lt;P&gt;2. Jump to the address of reset interrupt function in the APP interrupt vector table&lt;/P&gt;&lt;P&gt;((JumpToPtr) (*((uint32 *)( 0x600000 + 4))))();&lt;/P&gt;&lt;P&gt;3. Only this sentence of the LD file has been changed in the app firmware:&lt;/P&gt;&lt;P&gt;int_pflash : ORIGIN = 0x00600000, LENGTH = 0x001D4000&lt;/P&gt;&lt;P&gt;PE can run the APP firmware in a single step directly (app firmware can run normally), but the following situation occurs when jumping after the app is upgraded.&lt;/P&gt;&lt;P&gt;“Break at address "0x600800" with no debug information available, or outside of program code.”&lt;/P&gt;&lt;P&gt;Of course, I have also tried to jump directly after entering the boot, and this information still appears. I don't know where the problem is, but on the K1 chip these operations are OK. But at present, this problem appears on K3, is the kernel of M7 "app_address+4" is not the position of the reset function in the interrupt vector table? Is it something else? Is there a solution to this problem?&lt;/P&gt;</description>
      <pubDate>Fri, 10 Nov 2023 08:22:26 GMT</pubDate>
      <guid>https://community.nxp.com/t5/S32K/bootloader-jump-to-app/m-p/1755476#M28543</guid>
      <dc:creator>Jackson_Ping</dc:creator>
      <dc:date>2023-11-10T08:22:26Z</dc:date>
    </item>
    <item>
      <title>Re: bootloader jump to app</title>
      <link>https://community.nxp.com/t5/S32K/bootloader-jump-to-app/m-p/1760610#M28813</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/225504"&gt;@Jackson_Ping&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Can you try this code?&lt;/P&gt;
&lt;P&gt;ADDR_APP = 0x600000;&lt;/P&gt;
&lt;P&gt;func = *(UINT32 volatile *)(ADDR_APP + 0xC);&lt;BR /&gt;func = *(UINT32 volatile *)(((UINT32)func) + 0x4);&lt;BR /&gt;func = (((UINT32)func) &amp;amp; 0xFFFFFFFFU);&lt;BR /&gt;(* (void (*) (void)) func)();&lt;/P&gt;
&lt;P&gt;At ADDR_APP there should be 0x5AA55AA5&lt;BR /&gt;At ADDR_APP + offset 0xC, there is the core start address.&lt;BR /&gt;(RM, Table 189. Image vector table).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Daniel&lt;/P&gt;</description>
      <pubDate>Mon, 20 May 2024 12:00:47 GMT</pubDate>
      <guid>https://community.nxp.com/t5/S32K/bootloader-jump-to-app/m-p/1760610#M28813</guid>
      <dc:creator>danielmartynek</dc:creator>
      <dc:date>2024-05-20T12:00:47Z</dc:date>
    </item>
    <item>
      <title>Re: bootloader jump to app</title>
      <link>https://community.nxp.com/t5/S32K/bootloader-jump-to-app/m-p/1761433#M28847</link>
      <description>&lt;P&gt;Hi.&lt;SPAN&gt;Daniel,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you very much for your answer,I've solved my problem.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;But I still have a problem, that is, I found a piece of code in the LD file, a piece of content called "boot_header" occupies 2048 bytes, I am not very clear what "boot_header" means&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="微信图片_20231122102637.png" style="width: 388px;"&gt;&lt;img src="https://community.nxp.com/t5/image/serverpage/image-id/250974i4609447CD5302692/image-size/large?v=v2&amp;amp;px=999" role="button" title="微信图片_20231122102637.png" alt="微信图片_20231122102637.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2023 02:32:06 GMT</pubDate>
      <guid>https://community.nxp.com/t5/S32K/bootloader-jump-to-app/m-p/1761433#M28847</guid>
      <dc:creator>Jackson_Ping</dc:creator>
      <dc:date>2023-11-22T02:32:06Z</dc:date>
    </item>
    <item>
      <title>Re: bootloader jump to app</title>
      <link>https://community.nxp.com/t5/S32K/bootloader-jump-to-app/m-p/1761871#M28881</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/225504"&gt;@Jackson_Ping&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;The boot_header does not occupy 2048B it is just alligned to this value.&lt;/P&gt;
&lt;P&gt;The boot_header is defined in startup_cm7.s&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="danielmartynek_0-1700649832106.png" style="width: 710px;"&gt;&lt;img src="https://community.nxp.com/t5/image/serverpage/image-id/251098i285CE978F31FE5F6/image-dimensions/710x162?v=v2" width="710" height="162" role="button" title="danielmartynek_0-1700649832106.png" alt="danielmartynek_0-1700649832106.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;RM rev7, Table 189. Image vector table&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;BR, Daniel&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2023 10:45:47 GMT</pubDate>
      <guid>https://community.nxp.com/t5/S32K/bootloader-jump-to-app/m-p/1761871#M28881</guid>
      <dc:creator>danielmartynek</dc:creator>
      <dc:date>2023-11-22T10:45:47Z</dc:date>
    </item>
    <item>
      <title>Re: bootloader jump to app</title>
      <link>https://community.nxp.com/t5/S32K/bootloader-jump-to-app/m-p/1761886#M28882</link>
      <description>&lt;P&gt;Hi.&lt;SPAN&gt;Daniel,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I have understood.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Thanks for your answer!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best Regards,&lt;/P&gt;&lt;P&gt;Jackson&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2023 11:09:50 GMT</pubDate>
      <guid>https://community.nxp.com/t5/S32K/bootloader-jump-to-app/m-p/1761886#M28882</guid>
      <dc:creator>Jackson_Ping</dc:creator>
      <dc:date>2023-11-22T11:09:50Z</dc:date>
    </item>
    <item>
      <title>Re: bootloader jump to app</title>
      <link>https://community.nxp.com/t5/S32K/bootloader-jump-to-app/m-p/1788613#M30645</link>
      <description>&lt;P&gt;Hello ,&lt;/P&gt;&lt;P&gt;i have used same program. for K344, it's OK to jump from bootloader to APP. But when I used same way to test K311. it doesn't jump. Could you give some suggestion?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jan 2024 08:06:52 GMT</pubDate>
      <guid>https://community.nxp.com/t5/S32K/bootloader-jump-to-app/m-p/1788613#M30645</guid>
      <dc:creator>scott071209</dc:creator>
      <dc:date>2024-01-15T08:06:52Z</dc:date>
    </item>
    <item>
      <title>Re: bootloader jump to app</title>
      <link>https://community.nxp.com/t5/S32K/bootloader-jump-to-app/m-p/1788621#M30647</link>
      <description>&lt;P&gt;You need to find the exact location of the interrupt vector table correctly. The location of the interrupt vector table for K1 and K3 is different. The interrupt vector table can be found in the LD file or map table.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jan 2024 08:17:10 GMT</pubDate>
      <guid>https://community.nxp.com/t5/S32K/bootloader-jump-to-app/m-p/1788621#M30647</guid>
      <dc:creator>Jackson_Ping</dc:creator>
      <dc:date>2024-01-15T08:17:10Z</dc:date>
    </item>
    <item>
      <title>Re: bootloader jump to app</title>
      <link>https://community.nxp.com/t5/S32K/bootloader-jump-to-app/m-p/1851356#M34478</link>
      <description>&lt;P&gt;Hi, I am using the project "S32K344_Can_bootloader_RTD200" in the microprocessor S32K344. I want to download an application with the program of bootloader. I have achieved the jump from program to application but I have different questions. 1. I want to use #define EN_DELAY_TIME but when I uncomment the command in the folder "public_in", the program has different errors. My target to use "Backdoor", that is to say, I want to check if the program has to enter to bootloader or not. I don´t know the process and the different functions that I have to use to achieve the target. I want to use the function "Boot_CheckReqBootloaderMode(void)" but when I debug the program, it never enters to the "if". Could you explain me the process and the steps to achieve the target. I add different functions that I think are important. 2. I don´t know if I have to modificate the parameters of "static tJumpAppDelayTimeInfo gs_stJumpAPPDelayTimeInfo = {FALSE, 0u};". I have to change this structure ? You can see all structure in one of the next pictures. I need the reply as soon as possible since I have to send a project very soon.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JonAnder_Amante_0-1713768678337.png" style="width: 400px;"&gt;&lt;img src="https://community.nxp.com/t5/image/serverpage/image-id/274933iA3DE6E57264F0F53/image-size/medium?v=v2&amp;amp;px=400" role="button" title="JonAnder_Amante_0-1713768678337.png" alt="JonAnder_Amante_0-1713768678337.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JonAnder_Amante_1-1713768678340.png" style="width: 400px;"&gt;&lt;img src="https://community.nxp.com/t5/image/serverpage/image-id/274934i8EC578A15AC65D83/image-size/medium?v=v2&amp;amp;px=400" role="button" title="JonAnder_Amante_1-1713768678340.png" alt="JonAnder_Amante_1-1713768678340.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JonAnder_Amante_2-1713768678341.png" style="width: 400px;"&gt;&lt;img src="https://community.nxp.com/t5/image/serverpage/image-id/274935i5BDFCA7EE3994147/image-size/medium?v=v2&amp;amp;px=400" role="button" title="JonAnder_Amante_2-1713768678341.png" alt="JonAnder_Amante_2-1713768678341.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JonAnder_Amante_3-1713768678350.png" style="width: 400px;"&gt;&lt;img src="https://community.nxp.com/t5/image/serverpage/image-id/274936i8F13F7BCCF5C6ECD/image-size/medium?v=v2&amp;amp;px=400" role="button" title="JonAnder_Amante_3-1713768678350.png" alt="JonAnder_Amante_3-1713768678350.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JonAnder_Amante_4-1713768678343.png" style="width: 400px;"&gt;&lt;img src="https://community.nxp.com/t5/image/serverpage/image-id/274937iCD9D41699B334CBB/image-size/medium?v=v2&amp;amp;px=400" role="button" title="JonAnder_Amante_4-1713768678343.png" alt="JonAnder_Amante_4-1713768678343.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for all,&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2024 06:52:53 GMT</pubDate>
      <guid>https://community.nxp.com/t5/S32K/bootloader-jump-to-app/m-p/1851356#M34478</guid>
      <dc:creator>JonAnder_Amante</dc:creator>
      <dc:date>2024-04-22T06:52:53Z</dc:date>
    </item>
  </channel>
</rss>

