Hello, Lewin! You wrote on Wed, 08 Sep 2004 01:40:00 GMT:
??>> final binary yamon-02.23DB1550_el.elf doesn't contain definition of ??>> target machine anymore. And therefore 'convert' utility cannot handle ??>> it..
LAW> What does objdump tell you about the size and position of the segments LAW> inside this file?
'objdump' is telling the following (I omitted the symbol information):
yamon-02.23DB1550_el.elf: file format elf32-little yamon-02.23DB1550_el.elf architecture: UNKNOWN!, flags 0x00000112: EXEC_P, HAS_SYMS, D_PAGED start address 0x9fc10000
Program Header: LOAD off 0x00000000 vaddr 0x8003d000 paddr 0x8003d000 align 2**12 filesz 0x00000680 memsz 0x000456a4 flags rw- LOAD off 0x00001000 vaddr 0x9fc10000 paddr 0x9fc10000 align 2**12 filesz 0x00002308 memsz 0x00002308 flags r-x LOAD off 0x00004000 vaddr 0x80005000 paddr 0x9fc12308 align 2**12 filesz 0x00038680 memsz 0x00038680 flags rwx
Sections: Idx Name Size VMA LMA File off Algn 0 .text_init 00002308 9fc10000 9fc10000 00001000 2**3 CONTENTS, ALLOC, LOAD, READONLY, CODE 1 .text_ram 0002b190 80005000 9fc12308 00004000 2**3 CONTENTS, ALLOC, LOAD, READONLY, CODE 2 .data 0000d4f0 80030190 9fc3d498 0002f190 2**2 CONTENTS, ALLOC, LOAD, DATA 3 .bss 00045024 8003d680 8003d680 00000680 2**4 ALLOC 4 .pdr 00007cc0 00000000 00000000 0003c680 2**2 CONTENTS, READONLY 5 .mdebug.abi32 00000000 00000000 00000000 000d6b80 2**0 CONTENTS, READONLY
LAW> Did you build this file, or is it a black box you downloaded from LAW> somewhere?
No, these are the sources of Yamon bootloader, provided by AMD with their devel. board Alchemy AU1550. Also they provided toolchain, based on GNU tools, for building.
I followed the instructions and build the code.. Now I'm trying to debug in the JTAG emulator. That's the story.
With best regards, Roman Mashak. E-mail: snipped-for-privacy@tusur.ru