[Info-vax] ELF images on X86

John Reagan xyzzy1959 at gmail.com
Wed Mar 31 15:13:16 EDT 2021


On Wednesday, March 31, 2021 at 12:00:36 PM UTC-4, osuv... at gmail.com wrote:
> What machine architecture code (ehdr$w_e_machine) do they use on OpenVMS x86 images?

>From ANALYZE/IMAGE

This is an OpenVMS X86-64 (Elf format) executable image file

Image Identification Information, in section 13.

    Image name:                                 "HW"
    Global Symbol Table name:                   "HW"
    Image file identification:                  "V1.0"
    Image build identification:                 ""
    Link identification:                        "Linker I02-83"
    Link Date/Time:                             31-MAR-2021 15:07:30.20

Image Transfer Information, in segment 5.

    Main Transfer
        Entry Address:                          0000000080000060 (segment 2.)

Image Activation Information, in segment 6.

    Link flags
        Call SYS$IMGSTA
        Image has main transfer
        Traceback records in image file
    Shareable Image List
        DECC$SHR
            (LESS/EQUAL, 1., 1.)

Elf Header Information, at file address 0.

    Class:                                      ELF-64
    Data:                                       Little-endian byte order
    Elf Header Version:                         1.
    OS ABI:                                     OpenVMS
    OS ABI Version:                             2.
    Type:                                       Executable
    Machine Architecture:                       X86_64
    Elf File Version:                           1.
    VMS Completion Code:                        SUCCESS


>From readelf (on OpenVMS Itanium)

$ readobj -file-headers hw.exe

File: hw.exe
Format: ELF64-x86-64
Arch: x86_64
AddressSize: 64bit
LoadName:
ElfHeader {
  Ident {
    Magic: (7F 45 4C 46)
    Class: 64-bit (0x2)
    DataEncoding: LittleEndian (0x1)
    FileVersion: 1
    OS/ABI: OpenVMS (0xD)
    ABIVersion: 2
    Unused: (00 00 00 00 00 00 00)
  }
  Type: Executable (0x2)
  Machine: EM_X86_64 (0x3E)
  Version: 1
  Entry: 0x6000
  ProgramHeaderOffset: 0x48
  SectionHeaderOffset: 0x2600
  Flags [ (0x0)
  ]
  HeaderSize: 72
  ProgramHeaderEntrySize: 56
  ProgramHeaderCount: 7
  SectionHeaderEntrySize: 64
  SectionHeaderCount: 15
  StringTableSectionIndex: 1
}



More information about the Info-vax mailing list