| Commit message (Collapse) | Author | Age |
| ... | |
| |
|
|
| |
Change-Id: I9ce73b907fa6276b9cd1f285156623bdafa6d548
|
| |
|
|
| |
Change-Id: If3ebae2e60f324c93f85a4f1a6f30257cccb735d
|
| |
|
|
| |
Change-Id: I0153192f41ccc5fb98e7e9f6f110d97bd76dbc47
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
| |
This is a common problem that proprietary tools don't handle ELF
files correctly. ELF sections use a virtual address and the
virtual -> physical translation is done though segments. This
allows to have a load (physical) address different from the
virtual one. Here is the trick: proprietary tools usually don't
take the pain to do the translation and just grab the virtual
address. This commit implements proper translation in elftosb1
knowing that this introduce a deviation from the behaviour of the
proprietary tool.
Change-Id: I91721a3a8dead382a0603f84ae3b35c5eb9704eb
|
| |
|
|
|
|
|
| |
The tool still lacks some feature of the proprietary one but
can create files with all the basic features.
Change-Id: Ib0c91210940ca829291ce70945f88dc510a49974
|
| |
|
|
| |
Change-Id: I6530bdf27896d8325dec4e2ba31c7e6a0131a286
|
| |
|
|
| |
Change-Id: Ib68746e11b43eadbbe0443626d4dc65d998348fa
|
| |
|
|
| |
Change-Id: I17daaff068fcd3a8c70c52db5fa209082461173f
|
| |
|
|
| |
Change-Id: Ie00306a3c78e7490afe9964bd55ce53019e603ed
|
| |
|
|
| |
Change-Id: Ic36d3a8fcf09350dff5988eb860d76eb11608cc2
|
| |
|
|
| |
Change-Id: I34776ba3608bb5d25ce0d0fb3c6f228a4c9effc0
|
| |
|
|
| |
Change-Id: I6cfb432cd474ca00d7dff77577c0aa499b78fe2d
|
| |
|
|
| |
Change-Id: I13147009f2573d80c2c3dca2852a6d7b45174e9d
|
| |
|
|
| |
Change-Id: Id756cab14c9151ea74d628d002e1a203c5fbf01a
|
| |
|
|
| |
Change-Id: I3a4fc048466b9e4d7290237efc1cefb07fd0a118
|
| |
|
|
| |
Change-Id: I6c8e5f3faf04741e4a13c1e705e9e869ccf8cfec
|
| |
|
|
|
|
|
|
|
| |
This tool is very preliminary but could be use for whatever
purpose since the format of the rsrc sections is now known.
By the way it appears that this format is the same as the
one use by the stmp36xx for its resources.
Change-Id: Idd7057f5cdce5af9726904169bb100c8bacb0981
|
| |
|
|
|
|
|
|
| |
While elf simplification is a powerful tool it can be useful to
prevent it from happening for debug purposes. Also add a missing
switch description in usage() and missing static.
Change-Id: I80a1904dc4340c412bd3de1c124a2e38d6ac11a2
|
| |
|
|
|
|
|
|
|
| |
This is less useful is most cases because sb2 doesn't have the
size restritions but some elf are produced with one section per
file and still yield dozens or hundreds of sections. And this free
anyway so we can do it.
Change-Id: Ia5ca83a8375063ecc7052d1ea73b2b21c00be730
|
| |
|
|
| |
Change-Id: Icfac5a2aa6a7b3582054321df003c6bb217b59d0
|
| |
|
|
|
|
|
|
|
|
| |
Load, fill and call/jump instructions are extracted as elf files
like for sb2. Because of the size limitations of the sb1
instructions, the resulting elf files can easily have hundreds of
sections. The (currently) implemented elf simplification method
will hopefully reduce this to a few sections only
Change-Id: I8fd6ed935ac3128f244bbd71c782e2a0a1c6d44a
|
| |
|
|
|
|
|
| |
Implement actual loading of a sb1 file to a structure in full
generality. Also implement dumping for debug purpose
Change-Id: I320035ea628719480a79aaccb05dce9a83256927
|
| |
|
|
| |
Change-Id: I701a301efa369c9e1247e10d226ba69e6064d1b2
|
| |
|
|
|
|
|
|
|
|
|
| |
The STMP36xx series also uses .sb files but with a different
format. The main differences are the encryption and the lack of
sections, making it basically a list of commands: fill, load,
call, jump, switch mode, set sdram settings. Currently only the
sbtoelf has support for the sb1 and can only dump the list of
commands. Actual support for elf creation will come later.
Change-Id: I1f2e0230c91ac64efd0e8430e0c5212098c599fd
|
| |
|
|
|
|
|
|
|
| |
In the case of encrypted SB files without any key match, it is
still possible to dump the section headers. The force option
allows one to do so. It also allows to dump unencrypted sections
of encrypted files if there are some.
Change-Id: I36280230679ac5903f9c451c68c276f5c6959536
|
|
|
Change-Id: I0d8d6831b35037725486f61fc363de87bc8ba92e
|