/* Backend hook signatures internal interface for libebl. Copyright (C) 2000,2001,2002,2004,2005,2006,2007,2008 Red Hat, Inc. This file is part of Red Hat elfutils. Red Hat elfutils is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; version 2 of the License. Red Hat elfutils is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with Red Hat elfutils; if not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston MA 02110-1301 USA. In addition, as a special exception, Red Hat, Inc. gives You the additional right to link the code of Red Hat elfutils with code licensed under any Open Source Initiative certified open source license (http://www.opensource.org/licenses/index.php) which requires the distribution of source code with any binary distribution and to distribute linked combinations of the two. Non-GPL Code permitted under this exception must only link to the code of Red Hat elfutils through those well defined interfaces identified in the file named EXCEPTION found in the source code files (the "Approved Interfaces"). The files of Non-GPL Code may instantiate templates or use macros or inline functions from the Approved Interfaces without causing the resulting work to be covered by the GNU General Public License. Only Red Hat, Inc. may make changes or additions to the list of Approved Interfaces. Red Hat's grant of this exception is conditioned upon your not adding any new exceptions. If you wish to add a new Approved Interface or exception, please contact Red Hat. You must obey the GNU General Public License in all respects for all of the Red Hat elfutils code and other code used in conjunction with Red Hat elfutils except the Non-GPL Code covered by this exception. If you modify this file, you may extend this exception to your version of the file, but you are not obligated to do so. If you do not wish to provide this exception without modification, you must delete this exception statement from your version and license this file solely under the GPL without exception. Red Hat elfutils is an included package of the Open Invention Network. An included package of the Open Invention Network is a package for which Open Invention Network licensees cross-license their patents. No patent license is granted, either expressly or impliedly, by designation as an included package. Should you wish to participate in the Open Invention Network licensing program, please visit www.openinventionnetwork.com <http://www.openinventionnetwork.com>. */ /* Return symbol representaton of object file type. */ const char *EBLHOOK(object_type_name) (int, char *, size_t); /* Return symbolic representation of relocation type. */ const char *EBLHOOK(reloc_type_name) (int, char *, size_t); /* Check relocation type. */ bool EBLHOOK(reloc_type_check) (int); /* Check if relocation type is for simple absolute relocations. */ Elf_Type EBLHOOK(reloc_simple_type) (Ebl *, int); /* Check relocation type use. */ bool EBLHOOK(reloc_valid_use) (Elf *, int); /* Return true if the symbol type is that referencing the GOT. */ bool EBLHOOK(gotpc_reloc_check) (Elf *, int); /* Return symbolic representation of segment type. */ const char *EBLHOOK(segment_type_name) (int, char *, size_t); /* Return symbolic representation of section type. */ const char *EBLHOOK(section_type_name) (int, char *, size_t); /* Return section name. */ const char *EBLHOOK(section_name) (int, int, char *, size_t); /* Return next machine flag name. */ const char *EBLHOOK(machine_flag_name) (GElf_Word *); /* Check whether machine flags are valid. */ bool EBLHOOK(machine_flag_check) (GElf_Word); /* Check whether SHF_MASKPROC flag bits are valid. */ bool EBLHOOK(machine_section_flag_check) (GElf_Xword); /* Check whether the section with the given index, header, and name is a special machine section that is valid despite a combination of flags or other details that are not generically valid. */ bool EBLHOOK(check_special_section) (Ebl *, int, const GElf_Shdr *, const char *); /* Return symbolic representation of symbol type. */ const char *EBLHOOK(symbol_type_name) (int, char *, size_t); /* Return symbolic representation of symbol binding. */ const char *EBLHOOK(symbol_binding_name) (int, char *, size_t); /* Return symbolic representation of dynamic tag. */ const char *EBLHOOK(dynamic_tag_name) (int64_t, char *, size_t); /* Check dynamic tag. */ bool EBLHOOK(dynamic_tag_check) (int64_t); /* Combine section header flags values. */ GElf_Word EBLHOOK(sh_flags_combine) (GElf_Word, GElf_Word); /* Return symbolic representation of OS ABI. */ const char *EBLHOOK(osabi_name) (int, char *, size_t); /* Name of a note entry type for core files. */ const char *EBLHOOK(core_note_type_name) (uint32_t, char *, size_t); /* Name of a note entry type for object files. */ const char *EBLHOOK(object_note_type_name) (uint32_t, char *, size_t); /* Describe core note format. */ int EBLHOOK(core_note) (GElf_Word, GElf_Word, GElf_Word *, size_t *, const Ebl_Register_Location **, size_t *, const Ebl_Core_Item **); /* Handle object file note. */ bool EBLHOOK(object_note) (const char *, uint32_t, uint32_t, const char *); /* Check object attribute. */ bool EBLHOOK(check_object_attribute) (Ebl *, const char *, int, uint64_t, const char **, const char **); /* Describe auxv element type. */ int EBLHOOK(auxv_info) (GElf_Xword, const char **, const char **); /* Check section name for being that of a debug informatino section. */ bool EBLHOOK(debugscn_p) (const char *); /* Check whether given relocation is a copy relocation. */ bool EBLHOOK(copy_reloc_p) (int); /* Check whether given relocation is a no-op relocation. */ bool EBLHOOK(none_reloc_p) (int); /* Check whether given relocation is a relative relocation. */ bool EBLHOOK(relative_reloc_p) (int); /* Check whether given symbol's value is ok despite normal checks. */ bool EBLHOOK(check_special_symbol) (Elf *, GElf_Ehdr *, const GElf_Sym *, const char *, const GElf_Shdr *); /* Check if backend uses a bss PLT in this file. */ bool EBLHOOK(bss_plt_p) (Elf *, GElf_Ehdr *); /* Return location expression to find return value given the DW_AT_type DIE of a DW_TAG_subprogram DIE. */ int EBLHOOK(return_value_location) (Dwarf_Die *functypedie, const Dwarf_Op **locp); /* Return register name information. */ ssize_t EBLHOOK(register_info) (Ebl *ebl, int regno, char *name, size_t namelen, const char **prefix, const char **setname, int *bits, int *type); /* Return system call ABI registers. */ int EBLHOOK(syscall_abi) (Ebl *ebl, int *sp, int *pc, int *callno, int args[6]); /* Disassembler function. */ int EBLHOOK(disasm) (const uint8_t **startp, const uint8_t *end, GElf_Addr addr, const char *fmt, DisasmOutputCB_t outcb, DisasmGetSymCB_t symcb, void *outcbarg, void *symcbarg); /* Destructor for ELF backend handle. */ void EBLHOOK(destr) (struct ebl *);