Firmware Image Format
This is technical documentation for the firmware image format used by the ROM bootloader. These are the images created by esptool.py elf2image
.
The firmware file consists of a header, an extended header, a variable number of data segments and a footer. Multi-byte fields are little-endian.
File Header
The image header is 8 bytes long:
Byte |
Description |
---|---|
0 |
Magic number (always |
1 |
Number of segments |
2 |
SPI Flash Mode ( |
3 |
High four bits - Flash size ( Low four bits - Flash frequency ( |
4-7 |
Entry point address |
esptool.py
overrides the 2nd and 3rd (counted from 0) bytes according to the SPI flash info provided through the command line option. These bytes are only overridden if this is a bootloader image (an image written to a correct bootloader offset of 0x2000), in this case, the appended SHA256 digest is also updated to reflect the header changes. Generating images without SHA256 digest can be achieved by running esptool.py elf2image
with the --dont-append-digest
argument.
Extended File Header
The 16-byte long extended header comes right after the image header, individual segments come right after it:
Byte |
Description |
---|---|
0 |
WP pin when SPI pins set via efuse (read by ROM bootloader) |
1-3 |
Drive settings for the SPI flash pins (read by ROM bootloader) |
4-5 |
Chip ID (which ESP device is this image for) |
6 |
Minimal chip revision supported by the image (deprecated, use the following field) |
7-8 |
Minimal chip revision supported by the image (in format: major * 100 + minor) |
9-10 |
Maximal chip revision supported by the image (in format: major * 100 + minor) |
11-14 |
Reserved bytes in additional header space, currently unused |
15 |
Hash appended (If 1, SHA256 digest is appended after the checksum) |
Segment
Byte |
Description |
---|---|
0-3 |
Memory offset |
4-7 |
Segment size |
8…n |
Data |
Analyzing a Binary Image
To analyze a binary image and get a complete summary of its headers and segments, use the image_info command with the --version 2
option.