ARM binaries

ARM binaries are contained inside .wad files in update partitions. The .wad format and how to decrypt it is described in WAD_Files.

ELF format

IOS modules, at least, use bare ELF files. The files seem to be compiled with GCC 3.4.3, and they are EABI compliant.

ELFLOADER format

The ELFLOADER ARM binary format is used for the "bootup" files, including the IOS kernel (or the entirety of the IOS in earlier versions which are monolithic) and BOOT2. Once decrypted, the data has the following format:

Start End Length Description
0x000 0x004 0x004 Header size = 0x0010
0x004 0x008 0x004 Offset to ELF file after header
0x008 0x00C 0x004 Size of ELF file
0x00C 0x010 0x004 0x00 padding / unused
0x010 variable variable ELF file stub loader binary
variable variable variable ELF file

BOOT2 elf loader

The BOOT2 elf stub loader sets up a stack, calculates its own address, and switches to THUMB mode. Then it does the following:

 if( ! (*((u32 *)0xD800060) & 0x20) ) {
   *((u32 *)0xD800060) |= 0x20;
 }

0xD800000 seems to be the start of the (a?) hardware register space.

After this, it loads the ELF file, and then zeroes out the memory area where the ELF file resides. Then it goes back to ARM mode and vectors to 0xFFFF0000 (the entrypoint of the ARM / vector table). The entire BOOT2 code seems to be position-independent: it can be loaded at any address and will still work, as long as it doesn't overlap with the destination of the ELF load. The entire BOOT2 file cleartext is loaded and then the loader is called, so the loader can calculate the offset of the header simply by subtracting 0x10 from the PC at its entrypoint.