Post AVGzAXBS7lqIP09pCq by thaytan@aus.social
 (DIR) More posts by thaytan@aus.social
 (DIR) Post #AVGytcQPNtVZjc5SNc by thaytan@aus.social
       2023-05-03T08:50:45Z
       
       0 likes, 0 repeats
       
       I have an Arm Cortex M3 firmware image, that's been converted to raw using objdump and having getting Ghidra to match things up - I think because I don't know the right load address. Anyone got ideas?
       
 (DIR) Post #AVGytdCcUe4a98dxWi by mjg59@nondeterministic.computer
       2023-05-03T08:53:38Z
       
       0 likes, 0 repeats
       
       @thaytan Ugh I have used something that looks at the disassembly and makes a good guess about the load address and I can't find it right now
       
 (DIR) Post #AVGz23kLgfDSmuRGZU by mjg59@nondeterministic.computer
       2023-05-03T08:54:08Z
       
       0 likes, 0 repeats
       
       @thaytan If you know the specific SoC and if it's just running directly on that you can probably guess the load address from the spec sheet
       
 (DIR) Post #AVGzAXBS7lqIP09pCq by thaytan@aus.social
       2023-05-03T08:54:59Z
       
       0 likes, 0 repeats
       
       @mjg59 That sounds exactly like what I had in mind - try and find some instructions with absolute address references and guess from there
       
 (DIR) Post #AVGzKwgGBMjWNKX2H2 by thaytan@aus.social
       2023-05-03T08:56:36Z
       
       0 likes, 0 repeats
       
       @mjg59 No, it's an OTA App block that gets loaded by an unknown bootloader