From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 21052 invoked by alias); 18 Mar 2014 23:44:28 -0000 Mailing-List: contact binutils-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: binutils-owner@sourceware.org Received: (qmail 21043 invoked by uid 89); 18 Mar 2014 23:44:27 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-2.2 required=5.0 tests=AWL,BAYES_00,FREEMAIL_FROM,RCVD_IN_DNSWL_LOW,SPF_PASS autolearn=ham version=3.3.2 X-HELO: mail-pb0-f50.google.com Received: from mail-pb0-f50.google.com (HELO mail-pb0-f50.google.com) (209.85.160.50) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with (AES128-SHA encrypted) ESMTPS; Tue, 18 Mar 2014 23:44:26 +0000 Received: by mail-pb0-f50.google.com with SMTP id md12so7998443pbc.23 for ; Tue, 18 Mar 2014 16:44:24 -0700 (PDT) X-Received: by 10.66.175.4 with SMTP id bw4mr36431801pac.56.1395186264802; Tue, 18 Mar 2014 16:44:24 -0700 (PDT) Received: from bubble.grove.modra.org ([101.166.26.37]) by mx.google.com with ESMTPSA id j3sm56294305pbh.38.2014.03.18.16.44.22 for (version=TLSv1.1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 18 Mar 2014 16:44:23 -0700 (PDT) Received: by bubble.grove.modra.org (Postfix, from userid 1000) id 131ACEA00D2; Wed, 19 Mar 2014 10:14:19 +1030 (CST) Date: Tue, 18 Mar 2014 23:44:00 -0000 From: Alan Modra To: "Radouch, Zdenek" Cc: "Paul_Koning@Dell.com" , "binutils@sourceware.org" Subject: Re: extract ELF load address with binutils? Message-ID: <20140318234418.GC9145@bubble.grove.modra.org> Mail-Followup-To: "Radouch, Zdenek" , "Paul_Koning@Dell.com" , "binutils@sourceware.org" References: <7ADBB2DB4DC7CF4CB641E9ADA826E5E2AAC571BC@HQ-MBX-01.wardrobe.irobot.com> <7ADBB2DB4DC7CF4CB641E9ADA826E5E2E1FBDF7F@hq-mbx-02.wardrobe.irobot.com> <7ADBB2DB4DC7CF4CB641E9ADA826E5E2E1FC0FF6@hq-mbx-02.wardrobe.irobot.com> <7ADBB2DB4DC7CF4CB641E9ADA826E5E2E1FC2052@hq-mbx-02.wardrobe.irobot.com> <7ADBB2DB4DC7CF4CB641E9ADA826E5E2E1FC207A@hq-mbx-02.wardrobe.irobot.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <7ADBB2DB4DC7CF4CB641E9ADA826E5E2E1FC207A@hq-mbx-02.wardrobe.irobot.com> User-Agent: Mutt/1.5.21 (2010-09-15) X-IsSubscribed: yes X-SW-Source: 2014-03/txt/msg00192.txt.bz2 On Tue, Mar 18, 2014 at 05:44:11PM +0000, Radouch, Zdenek wrote: > But as I (and objcopy) have illustrated: > 1. Not all LOAD types get loaded Correct, only those with p_filsiz (readelf -l FileSize column) non-zero. p_memsiz specifies a bss type area that is usually cleared to zero by a program loader. > 2. The address where the segment is loaded can be "wrong", when the loaded segment > has been padded. The address you showed isn't due to padding. You're seeing 0x158000 when .text starts at 0x15f000 because you linked the object for dynamic paging with a page size of 0x8000. That imposes constraints on p_vaddr. You will also be loading the ELF file header and program headers, which may not be what you want.. See ld -n and ld -N options. -- Alan Modra Australia Development Lab, IBM