Folks:
There is a new subdirectory in the mspgcc CVS tree called "ubroff" (sic)
in which is my experimental decoder for IAR's UBROF-5 file format. (Thank you
Dmitry for putting it there.)

My hope is that enough UBROF-5 can be deciphered to allow a future version
of 'objdump' to create files suitable for IAR's C-SPY *directly* from
the ELF binaries produced by the gcc/binutils toolset.

Currently we have to go through disassembling ELF binaries and reassembling
them with IAR's assembler. This works (nice one, Steve Johnson!), but is
somewhat hairy.

                   --------------------------------

Anyone wishing to join in, please get a copy of "ubrof.c" from CVS by the
usual means and get hacking.

To compile: "cc -o ubrof ubrof.c"

To use: "./ubrof fred.d43 > fred.lst" or variants thereof.

The source code is the documentation! Much is unknown. Some of my assumed
decipherments may be wrong. However, it looks like being able to generate
a "flash image only" UBROF file is not far off. Adding in useful symbolic
debug stuff for C-SPY will be a bit trickier.

--

Steve Hosgood                               |
[email protected]                          | "A good plan today is better
Phone: +44 1792 203707 + ask for Steve      |   than a perfect plan tomorrow"
Fax:   +44 70922 70944                      |              - Conrad Brean
--------------------------------------------+
        http://tallyho.bc.nu/~steve         |  ( from the film "Wag the Dog" )



Reply via email to