Folks:
There is a new subdirectory in the mspgcc CVS tree called "ubroff" (sic)
in which is my experimental decoder for IAR's UBROF-5 file format. (Thank you
Dmitry for putting it there.)
My hope is that enough UBROF-5 can be deciphered to allow a future version
of 'objdump' to create files suitable for IAR's C-SPY *directly* from
the ELF binaries produced by the gcc/binutils toolset.
Currently we have to go through disassembling ELF binaries and reassembling
them with IAR's assembler. This works (nice one, Steve Johnson!), but is
somewhat hairy.
--------------------------------
Anyone wishing to join in, please get a copy of "ubrof.c" from CVS by the
usual means and get hacking.
To compile: "cc -o ubrof ubrof.c"
To use: "./ubrof fred.d43 > fred.lst" or variants thereof.
The source code is the documentation! Much is unknown. Some of my assumed
decipherments may be wrong. However, it looks like being able to generate
a "flash image only" UBROF file is not far off. Adding in useful symbolic
debug stuff for C-SPY will be a bit trickier.
--
Steve Hosgood |
[email protected] | "A good plan today is better
Phone: +44 1792 203707 + ask for Steve | than a perfect plan tomorrow"
Fax: +44 70922 70944 | - Conrad Brean
--------------------------------------------+
http://tallyho.bc.nu/~steve | ( from the film "Wag the Dog" )