Hello all.
I'm trying to understand the "header" bytes of a NuttX .bin file (ELF?),
so I can try and locate and use the ARM Cortex A (SAMA5D2) reset and
stack pointer vectors in an MCUboot image.
It seems that there are 32 bytes (after the MCUboot header) of a
repeating pattern (0xe59ff018) but I am not sure what follows, other
than spotting the "start" address (that matches that reported when I
download/debug code via JTAG) about 24 bytes later.
Can anyone help me understand how to work this out? It is probably
related to the start assembly code (which is not my forte) and perhaps
in the map file?
Context - trying to finish off a boot_image.c function that is copying a
NuttX/MCUboot imgtool.py signed binary over to SDRAM to execute it.
Thanks!
TimJTi/TimH
- bin/ELF headers Tim Hardisty
-