Matching the #BL602 Bootloader Code ... With the Partition Table that's flashed to BL602 🤔
"Exploring the role of trauma in underpinning sexualised drug use (‘chemsex’) among gay, bisexual and other men who have sex with men in Singapore"
#PinePhone: "How can non-techies support the progress?"
"America’s Medical System Has a Long History of Relying on Filipino Nurses to Fight on the Frontlines"
"What Oxford taught me about posh people"
https://unherd.com/2021/05/what-oxford-taught-me-about-posh-people/
#BL602 Bootloader installs the Application Firmware ... With eFuse Protection (optional)
Quick check of #BL602 Boot2 Disassembly ... To be sure that it matches the Boot2 Bootloader that we have been flashing to BL602. Great exercise for learning #RISCV Assembly! 👍
https://github.com/lupyuen/bl_iot_sdk/releases/download/v8.0.2/bl602_boot2.S
A smart home consumer's wish list
https://raymondjulin.com/blog/a-smart-home-consumers-wish-list
MyCobot robotic arm is offered with Raspberry Pi 4 or M5Stack ESP32 modules
"She memorised IBM typewriter codes for 5,400 Chinese characters but couldn’t save tech giant’s ill-fated machine"
"I lost millions through #cryptocurrency addiction"
When #BL602 boots, it runs the Boot2 Bootloader Firmware at 0x2300 0000 ... Which loads the Application Firmware into (yikes!) 0x2300 0000 ... Let's investigate how the Bootloader makes this self-overlay possible
#BL602 Linker Map shows Boot2 Code is always loaded at 0x2300 0300 ... Let's find out what's inside
https://github.com/lupyuen/bl_iot_sdk/releases/download/v8.0.1/sdk_app_blinky.map
My hunch: #BL602 Boot2 and ESP32 Secure Boot V2 have similar bootloader features 🤔
https://docs.espressif.com/projects/esp-idf/en/latest/esp32/security/secure-boot-v2.html
IoT Techie and Educator / Apache NuttX PMC