]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - arch/x86/boot/compressed/relocs.c
Linux 3.4-rc7
[mirror_ubuntu-artful-kernel.git] / arch / x86 / boot / compressed / relocs.c
CommitLineData
968de4f0
EB
1#include <stdio.h>
2#include <stdarg.h>
3#include <stdlib.h>
4#include <stdint.h>
5#include <string.h>
6#include <errno.h>
7#include <unistd.h>
8#include <elf.h>
9#include <byteswap.h>
10#define USE_BSD
11#include <endian.h>
873b5271 12#include <regex.h>
55f9709c 13#include <tools/le_byteshift.h>
873b5271
PA
14
15static void die(char *fmt, ...);
968de4f0 16
ca820181 17#define ARRAY_SIZE(x) (sizeof(x) / sizeof((x)[0]))
968de4f0 18static Elf32_Ehdr ehdr;
968de4f0
EB
19static unsigned long reloc_count, reloc_idx;
20static unsigned long *relocs;
21
908ec7af
PA
22struct section {
23 Elf32_Shdr shdr;
24 struct section *link;
25 Elf32_Sym *symtab;
26 Elf32_Rel *reltab;
27 char *strtab;
28};
29static struct section *secs;
30
6a044b3a
VG
31/*
32 * Following symbols have been audited. There values are constant and do
33 * not change if bzImage is loaded at a different physical address than
34 * the address for which it has been compiled. Don't warn user about
35 * absolute relocations present w.r.t these symbols.
36 */
873b5271
PA
37static const char abs_sym_regex[] =
38 "^(xen_irq_disable_direct_reloc$|"
39 "xen_save_fl_direct_reloc$|"
40 "VDSO|"
41 "__crc_)";
42static regex_t abs_sym_regex_c;
43static int is_abs_reloc(const char *sym_name)
44{
45 return !regexec(&abs_sym_regex_c, sym_name, 0, NULL, 0);
46}
6a044b3a 47
873b5271
PA
48/*
49 * These symbols are known to be relative, even if the linker marks them
50 * as absolute (typically defined outside any section in the linker script.)
51 */
52static const char rel_sym_regex[] =
53 "^_end$";
54static regex_t rel_sym_regex_c;
55static int is_rel_reloc(const char *sym_name)
6a044b3a 56{
873b5271
PA
57 return !regexec(&rel_sym_regex_c, sym_name, 0, NULL, 0);
58}
6a044b3a 59
873b5271
PA
60static void regex_init(void)
61{
62 char errbuf[128];
63 int err;
64
65 err = regcomp(&abs_sym_regex_c, abs_sym_regex,
66 REG_EXTENDED|REG_NOSUB);
67 if (err) {
68 regerror(err, &abs_sym_regex_c, errbuf, sizeof errbuf);
69 die("%s", errbuf);
70 }
71
72 err = regcomp(&rel_sym_regex_c, rel_sym_regex,
73 REG_EXTENDED|REG_NOSUB);
74 if (err) {
75 regerror(err, &rel_sym_regex_c, errbuf, sizeof errbuf);
76 die("%s", errbuf);
77 }
6a044b3a
VG
78}
79
968de4f0
EB
80static void die(char *fmt, ...)
81{
82 va_list ap;
83 va_start(ap, fmt);
84 vfprintf(stderr, fmt, ap);
85 va_end(ap);
86 exit(1);
87}
88
89static const char *sym_type(unsigned type)
90{
91 static const char *type_name[] = {
92#define SYM_TYPE(X) [X] = #X
93 SYM_TYPE(STT_NOTYPE),
94 SYM_TYPE(STT_OBJECT),
95 SYM_TYPE(STT_FUNC),
96 SYM_TYPE(STT_SECTION),
97 SYM_TYPE(STT_FILE),
98 SYM_TYPE(STT_COMMON),
99 SYM_TYPE(STT_TLS),
100#undef SYM_TYPE
101 };
102 const char *name = "unknown sym type name";
ca820181 103 if (type < ARRAY_SIZE(type_name)) {
968de4f0
EB
104 name = type_name[type];
105 }
106 return name;
107}
108
109static const char *sym_bind(unsigned bind)
110{
111 static const char *bind_name[] = {
112#define SYM_BIND(X) [X] = #X
113 SYM_BIND(STB_LOCAL),
114 SYM_BIND(STB_GLOBAL),
115 SYM_BIND(STB_WEAK),
116#undef SYM_BIND
117 };
118 const char *name = "unknown sym bind name";
ca820181 119 if (bind < ARRAY_SIZE(bind_name)) {
968de4f0
EB
120 name = bind_name[bind];
121 }
122 return name;
123}
124
125static const char *sym_visibility(unsigned visibility)
126{
127 static const char *visibility_name[] = {
128#define SYM_VISIBILITY(X) [X] = #X
129 SYM_VISIBILITY(STV_DEFAULT),
130 SYM_VISIBILITY(STV_INTERNAL),
131 SYM_VISIBILITY(STV_HIDDEN),
132 SYM_VISIBILITY(STV_PROTECTED),
133#undef SYM_VISIBILITY
134 };
135 const char *name = "unknown sym visibility name";
ca820181 136 if (visibility < ARRAY_SIZE(visibility_name)) {
968de4f0
EB
137 name = visibility_name[visibility];
138 }
139 return name;
140}
141
142static const char *rel_type(unsigned type)
143{
144 static const char *type_name[] = {
145#define REL_TYPE(X) [X] = #X
146 REL_TYPE(R_386_NONE),
147 REL_TYPE(R_386_32),
148 REL_TYPE(R_386_PC32),
149 REL_TYPE(R_386_GOT32),
150 REL_TYPE(R_386_PLT32),
151 REL_TYPE(R_386_COPY),
152 REL_TYPE(R_386_GLOB_DAT),
153 REL_TYPE(R_386_JMP_SLOT),
154 REL_TYPE(R_386_RELATIVE),
155 REL_TYPE(R_386_GOTOFF),
156 REL_TYPE(R_386_GOTPC),
157#undef REL_TYPE
158 };
159 const char *name = "unknown type rel type name";
873b5271 160 if (type < ARRAY_SIZE(type_name) && type_name[type]) {
968de4f0
EB
161 name = type_name[type];
162 }
163 return name;
164}
165
166static const char *sec_name(unsigned shndx)
167{
168 const char *sec_strtab;
169 const char *name;
908ec7af 170 sec_strtab = secs[ehdr.e_shstrndx].strtab;
968de4f0
EB
171 name = "<noname>";
172 if (shndx < ehdr.e_shnum) {
908ec7af 173 name = sec_strtab + secs[shndx].shdr.sh_name;
968de4f0
EB
174 }
175 else if (shndx == SHN_ABS) {
176 name = "ABSOLUTE";
177 }
178 else if (shndx == SHN_COMMON) {
179 name = "COMMON";
180 }
181 return name;
182}
183
184static const char *sym_name(const char *sym_strtab, Elf32_Sym *sym)
185{
186 const char *name;
187 name = "<noname>";
188 if (sym->st_name) {
189 name = sym_strtab + sym->st_name;
190 }
191 else {
908ec7af 192 name = sec_name(secs[sym->st_shndx].shdr.sh_name);
968de4f0
EB
193 }
194 return name;
195}
196
197
198
13da9e20 199#if BYTE_ORDER == LITTLE_ENDIAN
968de4f0
EB
200#define le16_to_cpu(val) (val)
201#define le32_to_cpu(val) (val)
202#endif
13da9e20 203#if BYTE_ORDER == BIG_ENDIAN
968de4f0
EB
204#define le16_to_cpu(val) bswap_16(val)
205#define le32_to_cpu(val) bswap_32(val)
206#endif
207
208static uint16_t elf16_to_cpu(uint16_t val)
209{
210 return le16_to_cpu(val);
211}
212
213static uint32_t elf32_to_cpu(uint32_t val)
214{
215 return le32_to_cpu(val);
216}
217
218static void read_ehdr(FILE *fp)
219{
220 if (fread(&ehdr, sizeof(ehdr), 1, fp) != 1) {
221 die("Cannot read ELF header: %s\n",
222 strerror(errno));
223 }
8bd1796d 224 if (memcmp(ehdr.e_ident, ELFMAG, SELFMAG) != 0) {
968de4f0
EB
225 die("No ELF magic\n");
226 }
227 if (ehdr.e_ident[EI_CLASS] != ELFCLASS32) {
228 die("Not a 32 bit executable\n");
229 }
230 if (ehdr.e_ident[EI_DATA] != ELFDATA2LSB) {
231 die("Not a LSB ELF executable\n");
232 }
233 if (ehdr.e_ident[EI_VERSION] != EV_CURRENT) {
234 die("Unknown ELF version\n");
235 }
236 /* Convert the fields to native endian */
237 ehdr.e_type = elf16_to_cpu(ehdr.e_type);
238 ehdr.e_machine = elf16_to_cpu(ehdr.e_machine);
239 ehdr.e_version = elf32_to_cpu(ehdr.e_version);
240 ehdr.e_entry = elf32_to_cpu(ehdr.e_entry);
241 ehdr.e_phoff = elf32_to_cpu(ehdr.e_phoff);
242 ehdr.e_shoff = elf32_to_cpu(ehdr.e_shoff);
243 ehdr.e_flags = elf32_to_cpu(ehdr.e_flags);
244 ehdr.e_ehsize = elf16_to_cpu(ehdr.e_ehsize);
245 ehdr.e_phentsize = elf16_to_cpu(ehdr.e_phentsize);
246 ehdr.e_phnum = elf16_to_cpu(ehdr.e_phnum);
247 ehdr.e_shentsize = elf16_to_cpu(ehdr.e_shentsize);
248 ehdr.e_shnum = elf16_to_cpu(ehdr.e_shnum);
249 ehdr.e_shstrndx = elf16_to_cpu(ehdr.e_shstrndx);
250
251 if ((ehdr.e_type != ET_EXEC) && (ehdr.e_type != ET_DYN)) {
252 die("Unsupported ELF header type\n");
253 }
254 if (ehdr.e_machine != EM_386) {
255 die("Not for x86\n");
256 }
257 if (ehdr.e_version != EV_CURRENT) {
258 die("Unknown ELF version\n");
259 }
260 if (ehdr.e_ehsize != sizeof(Elf32_Ehdr)) {
261 die("Bad Elf header size\n");
262 }
263 if (ehdr.e_phentsize != sizeof(Elf32_Phdr)) {
264 die("Bad program header entry\n");
265 }
266 if (ehdr.e_shentsize != sizeof(Elf32_Shdr)) {
267 die("Bad section header entry\n");
268 }
269 if (ehdr.e_shstrndx >= ehdr.e_shnum) {
270 die("String table index out of bounds\n");
271 }
272}
273
274static void read_shdrs(FILE *fp)
275{
276 int i;
908ec7af
PA
277 Elf32_Shdr shdr;
278
279 secs = calloc(ehdr.e_shnum, sizeof(struct section));
280 if (!secs) {
281 die("Unable to allocate %d section headers\n",
282 ehdr.e_shnum);
968de4f0
EB
283 }
284 if (fseek(fp, ehdr.e_shoff, SEEK_SET) < 0) {
285 die("Seek to %d failed: %s\n",
286 ehdr.e_shoff, strerror(errno));
287 }
908ec7af
PA
288 for (i = 0; i < ehdr.e_shnum; i++) {
289 struct section *sec = &secs[i];
290 if (fread(&shdr, sizeof shdr, 1, fp) != 1)
291 die("Cannot read ELF section headers %d/%d: %s\n",
292 i, ehdr.e_shnum, strerror(errno));
293 sec->shdr.sh_name = elf32_to_cpu(shdr.sh_name);
294 sec->shdr.sh_type = elf32_to_cpu(shdr.sh_type);
295 sec->shdr.sh_flags = elf32_to_cpu(shdr.sh_flags);
296 sec->shdr.sh_addr = elf32_to_cpu(shdr.sh_addr);
297 sec->shdr.sh_offset = elf32_to_cpu(shdr.sh_offset);
298 sec->shdr.sh_size = elf32_to_cpu(shdr.sh_size);
299 sec->shdr.sh_link = elf32_to_cpu(shdr.sh_link);
300 sec->shdr.sh_info = elf32_to_cpu(shdr.sh_info);
301 sec->shdr.sh_addralign = elf32_to_cpu(shdr.sh_addralign);
302 sec->shdr.sh_entsize = elf32_to_cpu(shdr.sh_entsize);
303 if (sec->shdr.sh_link < ehdr.e_shnum)
304 sec->link = &secs[sec->shdr.sh_link];
968de4f0
EB
305 }
306
307}
308
309static void read_strtabs(FILE *fp)
310{
311 int i;
908ec7af
PA
312 for (i = 0; i < ehdr.e_shnum; i++) {
313 struct section *sec = &secs[i];
314 if (sec->shdr.sh_type != SHT_STRTAB) {
968de4f0
EB
315 continue;
316 }
908ec7af
PA
317 sec->strtab = malloc(sec->shdr.sh_size);
318 if (!sec->strtab) {
968de4f0 319 die("malloc of %d bytes for strtab failed\n",
908ec7af 320 sec->shdr.sh_size);
968de4f0 321 }
908ec7af 322 if (fseek(fp, sec->shdr.sh_offset, SEEK_SET) < 0) {
968de4f0 323 die("Seek to %d failed: %s\n",
908ec7af 324 sec->shdr.sh_offset, strerror(errno));
968de4f0 325 }
908ec7af
PA
326 if (fread(sec->strtab, 1, sec->shdr.sh_size, fp)
327 != sec->shdr.sh_size) {
968de4f0
EB
328 die("Cannot read symbol table: %s\n",
329 strerror(errno));
330 }
331 }
332}
333
334static void read_symtabs(FILE *fp)
335{
336 int i,j;
908ec7af
PA
337 for (i = 0; i < ehdr.e_shnum; i++) {
338 struct section *sec = &secs[i];
339 if (sec->shdr.sh_type != SHT_SYMTAB) {
968de4f0
EB
340 continue;
341 }
908ec7af
PA
342 sec->symtab = malloc(sec->shdr.sh_size);
343 if (!sec->symtab) {
968de4f0 344 die("malloc of %d bytes for symtab failed\n",
908ec7af 345 sec->shdr.sh_size);
968de4f0 346 }
908ec7af 347 if (fseek(fp, sec->shdr.sh_offset, SEEK_SET) < 0) {
968de4f0 348 die("Seek to %d failed: %s\n",
908ec7af 349 sec->shdr.sh_offset, strerror(errno));
968de4f0 350 }
908ec7af
PA
351 if (fread(sec->symtab, 1, sec->shdr.sh_size, fp)
352 != sec->shdr.sh_size) {
968de4f0
EB
353 die("Cannot read symbol table: %s\n",
354 strerror(errno));
355 }
908ec7af
PA
356 for (j = 0; j < sec->shdr.sh_size/sizeof(Elf32_Sym); j++) {
357 Elf32_Sym *sym = &sec->symtab[j];
358 sym->st_name = elf32_to_cpu(sym->st_name);
359 sym->st_value = elf32_to_cpu(sym->st_value);
360 sym->st_size = elf32_to_cpu(sym->st_size);
361 sym->st_shndx = elf16_to_cpu(sym->st_shndx);
968de4f0
EB
362 }
363 }
364}
365
366
367static void read_relocs(FILE *fp)
368{
369 int i,j;
908ec7af
PA
370 for (i = 0; i < ehdr.e_shnum; i++) {
371 struct section *sec = &secs[i];
372 if (sec->shdr.sh_type != SHT_REL) {
968de4f0
EB
373 continue;
374 }
908ec7af
PA
375 sec->reltab = malloc(sec->shdr.sh_size);
376 if (!sec->reltab) {
968de4f0 377 die("malloc of %d bytes for relocs failed\n",
908ec7af 378 sec->shdr.sh_size);
968de4f0 379 }
908ec7af 380 if (fseek(fp, sec->shdr.sh_offset, SEEK_SET) < 0) {
968de4f0 381 die("Seek to %d failed: %s\n",
908ec7af 382 sec->shdr.sh_offset, strerror(errno));
968de4f0 383 }
908ec7af
PA
384 if (fread(sec->reltab, 1, sec->shdr.sh_size, fp)
385 != sec->shdr.sh_size) {
968de4f0
EB
386 die("Cannot read symbol table: %s\n",
387 strerror(errno));
388 }
908ec7af
PA
389 for (j = 0; j < sec->shdr.sh_size/sizeof(Elf32_Rel); j++) {
390 Elf32_Rel *rel = &sec->reltab[j];
391 rel->r_offset = elf32_to_cpu(rel->r_offset);
392 rel->r_info = elf32_to_cpu(rel->r_info);
968de4f0
EB
393 }
394 }
395}
396
397
398static void print_absolute_symbols(void)
399{
400 int i;
401 printf("Absolute symbols\n");
402 printf(" Num: Value Size Type Bind Visibility Name\n");
908ec7af
PA
403 for (i = 0; i < ehdr.e_shnum; i++) {
404 struct section *sec = &secs[i];
968de4f0 405 char *sym_strtab;
968de4f0 406 int j;
908ec7af
PA
407
408 if (sec->shdr.sh_type != SHT_SYMTAB) {
968de4f0
EB
409 continue;
410 }
908ec7af
PA
411 sym_strtab = sec->link->strtab;
412 for (j = 0; j < sec->shdr.sh_size/sizeof(Elf32_Sym); j++) {
968de4f0
EB
413 Elf32_Sym *sym;
414 const char *name;
908ec7af 415 sym = &sec->symtab[j];
968de4f0
EB
416 name = sym_name(sym_strtab, sym);
417 if (sym->st_shndx != SHN_ABS) {
418 continue;
419 }
420 printf("%5d %08x %5d %10s %10s %12s %s\n",
421 j, sym->st_value, sym->st_size,
422 sym_type(ELF32_ST_TYPE(sym->st_info)),
423 sym_bind(ELF32_ST_BIND(sym->st_info)),
424 sym_visibility(ELF32_ST_VISIBILITY(sym->st_other)),
425 name);
426 }
427 }
428 printf("\n");
429}
430
431static void print_absolute_relocs(void)
432{
6a044b3a
VG
433 int i, printed = 0;
434
908ec7af
PA
435 for (i = 0; i < ehdr.e_shnum; i++) {
436 struct section *sec = &secs[i];
437 struct section *sec_applies, *sec_symtab;
968de4f0
EB
438 char *sym_strtab;
439 Elf32_Sym *sh_symtab;
968de4f0 440 int j;
908ec7af 441 if (sec->shdr.sh_type != SHT_REL) {
968de4f0
EB
442 continue;
443 }
908ec7af
PA
444 sec_symtab = sec->link;
445 sec_applies = &secs[sec->shdr.sh_info];
446 if (!(sec_applies->shdr.sh_flags & SHF_ALLOC)) {
968de4f0
EB
447 continue;
448 }
908ec7af
PA
449 sh_symtab = sec_symtab->symtab;
450 sym_strtab = sec_symtab->link->strtab;
451 for (j = 0; j < sec->shdr.sh_size/sizeof(Elf32_Rel); j++) {
968de4f0
EB
452 Elf32_Rel *rel;
453 Elf32_Sym *sym;
454 const char *name;
908ec7af 455 rel = &sec->reltab[j];
968de4f0
EB
456 sym = &sh_symtab[ELF32_R_SYM(rel->r_info)];
457 name = sym_name(sym_strtab, sym);
458 if (sym->st_shndx != SHN_ABS) {
459 continue;
460 }
6a044b3a
VG
461
462 /* Absolute symbols are not relocated if bzImage is
463 * loaded at a non-compiled address. Display a warning
464 * to user at compile time about the absolute
465 * relocations present.
466 *
467 * User need to audit the code to make sure
468 * some symbols which should have been section
469 * relative have not become absolute because of some
470 * linker optimization or wrong programming usage.
471 *
472 * Before warning check if this absolute symbol
473 * relocation is harmless.
474 */
873b5271 475 if (is_abs_reloc(name) || is_rel_reloc(name))
6a044b3a
VG
476 continue;
477
478 if (!printed) {
479 printf("WARNING: Absolute relocations"
480 " present\n");
481 printf("Offset Info Type Sym.Value "
482 "Sym.Name\n");
483 printed = 1;
484 }
485
968de4f0
EB
486 printf("%08x %08x %10s %08x %s\n",
487 rel->r_offset,
488 rel->r_info,
489 rel_type(ELF32_R_TYPE(rel->r_info)),
490 sym->st_value,
491 name);
492 }
493 }
6a044b3a
VG
494
495 if (printed)
496 printf("\n");
968de4f0
EB
497}
498
499static void walk_relocs(void (*visit)(Elf32_Rel *rel, Elf32_Sym *sym))
500{
501 int i;
502 /* Walk through the relocations */
908ec7af 503 for (i = 0; i < ehdr.e_shnum; i++) {
968de4f0
EB
504 char *sym_strtab;
505 Elf32_Sym *sh_symtab;
908ec7af 506 struct section *sec_applies, *sec_symtab;
968de4f0 507 int j;
908ec7af
PA
508 struct section *sec = &secs[i];
509
510 if (sec->shdr.sh_type != SHT_REL) {
968de4f0
EB
511 continue;
512 }
908ec7af
PA
513 sec_symtab = sec->link;
514 sec_applies = &secs[sec->shdr.sh_info];
515 if (!(sec_applies->shdr.sh_flags & SHF_ALLOC)) {
968de4f0
EB
516 continue;
517 }
908ec7af 518 sh_symtab = sec_symtab->symtab;
cc65f1ec 519 sym_strtab = sec_symtab->link->strtab;
908ec7af 520 for (j = 0; j < sec->shdr.sh_size/sizeof(Elf32_Rel); j++) {
968de4f0
EB
521 Elf32_Rel *rel;
522 Elf32_Sym *sym;
523 unsigned r_type;
908ec7af 524 rel = &sec->reltab[j];
968de4f0
EB
525 sym = &sh_symtab[ELF32_R_SYM(rel->r_info)];
526 r_type = ELF32_R_TYPE(rel->r_info);
527 /* Don't visit relocations to absolute symbols */
873b5271
PA
528 if (sym->st_shndx == SHN_ABS &&
529 !is_rel_reloc(sym_name(sym_strtab, sym))) {
968de4f0
EB
530 continue;
531 }
873b5271
PA
532 switch (r_type) {
533 case R_386_NONE:
534 case R_386_PC32:
46176b4f
TH
535 /*
536 * NONE can be ignored and and PC relative
537 * relocations don't need to be adjusted.
538 */
873b5271
PA
539 break;
540 case R_386_32:
968de4f0
EB
541 /* Visit relocations that need to be adjusted */
542 visit(rel, sym);
873b5271
PA
543 break;
544 default:
545 die("Unsupported relocation type: %s (%d)\n",
546 rel_type(r_type), r_type);
547 break;
968de4f0
EB
548 }
549 }
550 }
551}
552
553static void count_reloc(Elf32_Rel *rel, Elf32_Sym *sym)
554{
555 reloc_count += 1;
556}
557
558static void collect_reloc(Elf32_Rel *rel, Elf32_Sym *sym)
559{
560 /* Remember the address that needs to be adjusted. */
561 relocs[reloc_idx++] = rel->r_offset;
562}
563
564static int cmp_relocs(const void *va, const void *vb)
565{
566 const unsigned long *a, *b;
567 a = va; b = vb;
568 return (*a == *b)? 0 : (*a > *b)? 1 : -1;
569}
570
571static void emit_relocs(int as_text)
572{
573 int i;
574 /* Count how many relocations I have and allocate space for them. */
575 reloc_count = 0;
576 walk_relocs(count_reloc);
577 relocs = malloc(reloc_count * sizeof(relocs[0]));
578 if (!relocs) {
579 die("malloc of %d entries for relocs failed\n",
580 reloc_count);
581 }
582 /* Collect up the relocations */
583 reloc_idx = 0;
584 walk_relocs(collect_reloc);
585
586 /* Order the relocations for more efficient processing */
587 qsort(relocs, reloc_count, sizeof(relocs[0]), cmp_relocs);
588
589 /* Print the relocations */
590 if (as_text) {
591 /* Print the relocations in a form suitable that
592 * gas will like.
593 */
594 printf(".section \".data.reloc\",\"a\"\n");
595 printf(".balign 4\n");
908ec7af 596 for (i = 0; i < reloc_count; i++) {
968de4f0
EB
597 printf("\t .long 0x%08lx\n", relocs[i]);
598 }
599 printf("\n");
600 }
601 else {
602 unsigned char buf[4];
968de4f0 603 /* Print a stop */
873b5271 604 fwrite("\0\0\0\0", 4, 1, stdout);
968de4f0 605 /* Now print each relocation */
908ec7af 606 for (i = 0; i < reloc_count; i++) {
55f9709c 607 put_unaligned_le32(relocs[i], buf);
873b5271 608 fwrite(buf, 4, 1, stdout);
968de4f0
EB
609 }
610 }
611}
612
613static void usage(void)
614{
6a044b3a 615 die("relocs [--abs-syms |--abs-relocs | --text] vmlinux\n");
968de4f0
EB
616}
617
618int main(int argc, char **argv)
619{
6a044b3a 620 int show_absolute_syms, show_absolute_relocs;
968de4f0
EB
621 int as_text;
622 const char *fname;
623 FILE *fp;
624 int i;
625
873b5271
PA
626 regex_init();
627
6a044b3a
VG
628 show_absolute_syms = 0;
629 show_absolute_relocs = 0;
968de4f0
EB
630 as_text = 0;
631 fname = NULL;
908ec7af 632 for (i = 1; i < argc; i++) {
968de4f0
EB
633 char *arg = argv[i];
634 if (*arg == '-') {
6a044b3a
VG
635 if (strcmp(argv[1], "--abs-syms") == 0) {
636 show_absolute_syms = 1;
637 continue;
638 }
639
640 if (strcmp(argv[1], "--abs-relocs") == 0) {
641 show_absolute_relocs = 1;
968de4f0
EB
642 continue;
643 }
644 else if (strcmp(argv[1], "--text") == 0) {
645 as_text = 1;
646 continue;
647 }
648 }
649 else if (!fname) {
650 fname = arg;
651 continue;
652 }
653 usage();
654 }
655 if (!fname) {
656 usage();
657 }
658 fp = fopen(fname, "r");
659 if (!fp) {
660 die("Cannot open %s: %s\n",
661 fname, strerror(errno));
662 }
663 read_ehdr(fp);
664 read_shdrs(fp);
665 read_strtabs(fp);
666 read_symtabs(fp);
667 read_relocs(fp);
6a044b3a 668 if (show_absolute_syms) {
968de4f0 669 print_absolute_symbols();
6a044b3a
VG
670 return 0;
671 }
672 if (show_absolute_relocs) {
968de4f0
EB
673 print_absolute_relocs();
674 return 0;
675 }
676 emit_relocs(as_text);
677 return 0;
678}