[OpenPower-Firmware] SBE questions
Dean Sanner
dsanner at us.ibm.com
Tue Jul 23 03:25:55 AEST 2019
Hi Marty,
> Ok, and one more thing (probably not, but I've managed to get a proper
> full seeprom dumped and un-ecc'd): does ppe42-binutils currently have
I take it that I don't need to go into iicmaster details? (It is an
IBM service processor specific IBM tool -- I was just trying show how
to suck the images off the PROM and reconstruct)
> the guts to disassemble flat binary (not elf) targets. There's a -M ppe42
> switch but no -m switch equivalent (you apparently need a -M -m and -b
binary
> flag to dissassemble flat binaries), and I can't seem to get
> powerpc-eabi-objdump
> to make disassembling sbe_seeprom_DD2.bin look like sbe_seeprom_DD2.dis
> (this is mostly just a run against a known set of binaries and
> disassembly to verify against; both were produced from
sbe_seeprom_DD2.out,
> an elf file, or at least I assume so).
Once you have the image off and ECC removed -- you can then use the
p9_xip_tool
to extract various sections. This is the output of "report"
output/build/hcode-hw071319a.940/output/bin/p9_xip_tool.exe
output/host/powerpc64le-buildroot-linux-gnu/sysroot/openpower_pnor_scratch/p9n_23.sbe_seeprom.bin
report
Image section type : 0x00 "XIP image"
Magic number : 0x584950205345504d "XIP SEPM"
Header version : 0x09
Link Address : 0x00000000ff800000
L1 Loader Address : 0xff800244
L2 Loader Address : 0xffffe400
Kernel Address : 0xfffe8998
Image size : 0x00031c58 (203864)
Normalized : Yes
TOC Sorted : Yes
Build Date : 07/22/2019
Build Time : 10:33
Build User : dsanner
Build Host : gfwr609.rchland.ibm.com
Build Tag : 07595bbf345cb9a1b
Section Table :
Name Align DD Start End Size
.header 1 0 0x00000000 0x0000015b 0x0000015c (348)
.fixed 8 0 0x00000400 0x00000547 0x00000148 (328)
.fixedtoc 8 0 0x0001e930 0x0001ebb7 0x00000288 (648)
.toc 4 0 0x0001ebb8 0x0001f02b 0x00000474
(1140)
.strings 1 0 0x0001f02c 0x0001f81c 0x000007f1
(2033)
.loader_text 4 0 0x00000200 0x0000039b 0x0000019c (412)
.pibrepr_data 8 0 0x00000000 0x00000000 (0)
.text 4 0 0x00000548 0x0001e92f 0x0001e3e8
(123880)
.data 8 0 0x00000000 0x00000000 (0)
.base 4 0 0x0001fb30 0x0002fee2 0x000103b3
(66483)
.baseloader 8 0 0x0001f820 0x0001fb2f 0x00000310 (784)
.overrides 8 0 0x00000000 0x00000000 (0)
.rings 8 0 0x0002fee8 0x00031c53 0x00001d6c
(7532)
.overlays 8 0 0x00000000 0x00000000 (0)
.hbbl 8 0 0x00000000 0x00000000 (0)
to extract the actual "code" you want to suck off the .text portion and
then examine:
p9_xip_tool.exe p9n_23.sbe_seeprom.bin extract .text sbe.code.bin
If you want to add/remove sections you can do it like this:
p9_xip_tool.exe p9n_10.sbe_seeprom.bin delete .hbbl
p9_xip_tool.exe p9n_10.sbe_seeprom.bin append .hbbl ../hbbl_test.bin
Hope that helps accomplish what you want
Dean Sanner
dsanner at us.ibm.com
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.ozlabs.org/pipermail/openpower-firmware/attachments/20190722/d5e678ee/attachment.htm>
More information about the OpenPower-Firmware
mailing list