blob: b1fd9c43bf421d8339ab5b679a2075c74d65d191 [file] [log] [blame]
Eli Bendersky3edefab2011-09-16 14:52:54 +03001#!/usr/bin/env python
Eli Bendersky933f6992011-09-09 08:11:06 +03002#-------------------------------------------------------------------------------
Eli Bendersky2fc0f2a2011-09-17 10:39:29 +03003# scripts/readelf.py
Eli Bendersky933f6992011-09-09 08:11:06 +03004#
5# A clone of 'readelf' in Python, based on the pyelftools library
6#
7# Eli Bendersky (eliben@gmail.com)
8# This code is in the public domain
9#-------------------------------------------------------------------------------
Eli Bendersky53e86db2011-09-18 06:04:30 +030010import os, sys
Eli Bendersky933f6992011-09-09 08:11:06 +030011from optparse import OptionParser
Eli Bendersky53e86db2011-09-18 06:04:30 +030012import string
13
Eli Bendersky933f6992011-09-09 08:11:06 +030014
15# If elftools is not installed, maybe we're running from the root or scripts
16# dir of the source distribution
17#
18try:
19 import elftools
20except ImportError:
21 sys.path.extend(['.', '..'])
22
Eli Bendersky0b27ba42011-09-17 06:44:02 +030023from elftools import __version__
Eli Bendersky933f6992011-09-09 08:11:06 +030024from elftools.common.exceptions import ELFError
25from elftools.elf.elffile import ELFFile
Eli Bendersky3f4de3e2011-09-14 05:58:06 +030026from elftools.elf.segments import InterpSegment
Eli Bendersky84066b22011-09-20 06:48:52 +030027from elftools.elf.sections import SymbolTableSection, RelocationSection
Eli Bendersky933f6992011-09-09 08:11:06 +030028from elftools.elf.descriptions import (
29 describe_ei_class, describe_ei_data, describe_ei_version,
Eli Benderskyde8d71e2011-09-09 08:22:35 +030030 describe_ei_osabi, describe_e_type, describe_e_machine,
Eli Bendersky26de2ac2011-09-13 06:50:28 +030031 describe_e_version_numeric, describe_p_type, describe_p_flags,
Eli Bendersky377bd862011-09-16 11:10:44 +030032 describe_sh_type, describe_sh_flags,
Eli Bendersky3edefab2011-09-16 14:52:54 +030033 describe_symbol_type, describe_symbol_bind, describe_symbol_visibility,
Eli Bendersky89a824f2011-09-23 10:59:59 +030034 describe_symbol_shndx, describe_reloc_type,
Eli Bendersky933f6992011-09-09 08:11:06 +030035 )
eliben0fc47af2011-10-02 13:47:12 +020036from elftools.dwarf.dwarfinfo import DWARFInfo, DebugSectionLocator
Eli Bendersky933f6992011-09-09 08:11:06 +030037
38
39class ReadElf(object):
40 """ display_* methods are used to emit output into the output stream
41 """
42 def __init__(self, file, output):
43 """ file:
44 stream object with the ELF file to read
45
46 output:
47 output stream to write to
48 """
49 self.elffile = ELFFile(file)
50 self.output = output
eliben0fc47af2011-10-02 13:47:12 +020051
52 # Lazily initialized if a debug dump is requested
53 self._dwarfinfo = None
Eli Bendersky933f6992011-09-09 08:11:06 +030054
55 def display_file_header(self):
56 """ Display the ELF file header
57 """
58 self._emitline('ELF Header:')
59 self._emit(' Magic: ')
60 self._emitline(' '.join('%2.2x' % ord(b)
61 for b in self.elffile.e_ident_raw))
62 header = self.elffile.header
63 e_ident = header['e_ident']
64 self._emitline(' Class: %s' %
65 describe_ei_class(e_ident['EI_CLASS']))
66 self._emitline(' Data: %s' %
67 describe_ei_data(e_ident['EI_DATA']))
68 self._emitline(' Version: %s' %
69 describe_ei_version(e_ident['EI_VERSION']))
70 self._emitline(' OS/ABI: %s' %
71 describe_ei_osabi(e_ident['EI_OSABI']))
72 self._emitline(' ABI Version: %d' %
73 e_ident['EI_ABIVERSION'])
74 self._emitline(' Type: %s' %
75 describe_e_type(header['e_type']))
Eli Benderskyde8d71e2011-09-09 08:22:35 +030076 self._emitline(' Machine: %s' %
77 describe_e_machine(header['e_machine']))
78 self._emitline(' Version: %s' %
79 describe_e_version_numeric(header['e_version']))
Eli Benderskyd62928d2011-09-09 10:05:57 +030080 self._emitline(' Entry point address: %s' %
Eli Bendersky26de2ac2011-09-13 06:50:28 +030081 self._format_hex(header['e_entry']))
Eli Bendersky2fc0f2a2011-09-17 10:39:29 +030082 self._emit(' Start of program headers: %s' %
Eli Benderskyd62928d2011-09-09 10:05:57 +030083 header['e_phoff'])
84 self._emitline(' (bytes into file)')
Eli Bendersky2fc0f2a2011-09-17 10:39:29 +030085 self._emit(' Start of section headers: %s' %
Eli Benderskyd62928d2011-09-09 10:05:57 +030086 header['e_shoff'])
87 self._emitline(' (bytes into file)')
88 self._emitline(' Flags: %s' %
Eli Bendersky26de2ac2011-09-13 06:50:28 +030089 self._format_hex(header['e_flags']))
Eli Benderskyd62928d2011-09-09 10:05:57 +030090 self._emitline(' Size of this header: %s (bytes)' %
91 header['e_ehsize'])
92 self._emitline(' Size of program headers: %s (bytes)' %
93 header['e_phentsize'])
94 self._emitline(' Number of program headers: %s' %
95 header['e_phnum'])
96 self._emitline(' Size of section headers: %s (bytes)' %
97 header['e_shentsize'])
98 self._emitline(' Number of section headers: %s' %
99 header['e_shnum'])
100 self._emitline(' Section header string table index: %s' %
101 header['e_shstrndx'])
Eli Bendersky933f6992011-09-09 08:11:06 +0300102
Eli Bendersky0b27ba42011-09-17 06:44:02 +0300103 def display_program_headers(self, show_heading=True):
104 """ Display the ELF program headers.
105 If show_heading is True, displays the heading for this information
106 (Elf file type is...)
Eli Bendersky26de2ac2011-09-13 06:50:28 +0300107 """
108 self._emitline()
Eli Bendersky2fc0f2a2011-09-17 10:39:29 +0300109 if self.elffile.num_segments() == 0:
110 self._emitline('There are no program headers in this file.')
111 return
112
Eli Bendersky26de2ac2011-09-13 06:50:28 +0300113 elfheader = self.elffile.header
Eli Bendersky0b27ba42011-09-17 06:44:02 +0300114 if show_heading:
115 self._emitline('Elf file type is %s' %
116 describe_e_type(elfheader['e_type']))
117 self._emitline('Entry point is %s' %
118 self._format_hex(elfheader['e_entry']))
119 # readelf weirness - why isn't e_phoff printed as hex? (for section
120 # headers, it is...)
121 self._emitline('There are %s program headers, starting at offset %s' % (
122 elfheader['e_phnum'], elfheader['e_phoff']))
123 self._emitline()
Eli Bendersky26de2ac2011-09-13 06:50:28 +0300124
Eli Bendersky2fc0f2a2011-09-17 10:39:29 +0300125 self._emitline('Program Headers:')
Eli Bendersky26de2ac2011-09-13 06:50:28 +0300126
127 # Now comes the table of program headers with their attributes. Note
128 # that due to different formatting constraints of 32-bit and 64-bit
129 # addresses, there are some conditions on elfclass here.
130 #
131 # First comes the table heading
132 #
133 if self.elffile.elfclass == 32:
134 self._emitline(' Type Offset VirtAddr PhysAddr FileSiz MemSiz Flg Align')
135 else:
136 self._emitline(' Type Offset VirtAddr PhysAddr')
137 self._emitline(' FileSiz MemSiz Flags Align')
138
139 # Now the entries
140 #
141 for segment in self.elffile.iter_segments():
142 self._emit(' %-14s ' % describe_p_type(segment['p_type']))
143
144 if self.elffile.elfclass == 32:
145 self._emitline('%s %s %s %s %s %-3s %s' % (
146 self._format_hex(segment['p_offset'], fieldsize=6),
147 self._format_hex(segment['p_vaddr'], fullhex=True),
148 self._format_hex(segment['p_paddr'], fullhex=True),
149 self._format_hex(segment['p_filesz'], fieldsize=5),
150 self._format_hex(segment['p_memsz'], fieldsize=5),
151 describe_p_flags(segment['p_flags']),
152 self._format_hex(segment['p_align'])))
Eli Benderskya41c3c02011-09-14 06:18:28 +0300153 else: # 64
154 self._emitline('%s %s %s' % (
155 self._format_hex(segment['p_offset'], fullhex=True),
156 self._format_hex(segment['p_vaddr'], fullhex=True),
157 self._format_hex(segment['p_paddr'], fullhex=True)))
158 self._emitline(' %s %s %-3s %s' % (
159 self._format_hex(segment['p_filesz'], fullhex=True),
160 self._format_hex(segment['p_memsz'], fullhex=True),
161 describe_p_flags(segment['p_flags']),
162 # lead0x set to False for p_align, to mimic readelf.
163 # No idea why the difference from 32-bit mode :-|
164 self._format_hex(segment['p_align'], lead0x=False)))
Eli Bendersky26de2ac2011-09-13 06:50:28 +0300165
Eli Bendersky3f4de3e2011-09-14 05:58:06 +0300166 if isinstance(segment, InterpSegment):
167 self._emitline(' [Requesting program interpreter: %s]' %
168 segment.get_interp_name())
169
Eli Bendersky58585b02011-09-15 07:07:54 +0300170 # Sections to segments mapping
171 #
172 if self.elffile.num_sections() == 0:
173 # No sections? We're done
174 return
175
176 self._emitline('\n Section to Segment mapping:')
Eli Bendersky2fc0f2a2011-09-17 10:39:29 +0300177 self._emitline(' Segment Sections...')
Eli Bendersky58585b02011-09-15 07:07:54 +0300178
179 for nseg, segment in enumerate(self.elffile.iter_segments()):
Eli Bendersky2fc0f2a2011-09-17 10:39:29 +0300180 self._emit(' %2.2d ' % nseg)
Eli Bendersky58585b02011-09-15 07:07:54 +0300181
182 for section in self.elffile.iter_sections():
183 if ( not section.is_null() and
184 segment.section_in_segment(section)):
185 self._emit('%s ' % section.name)
186
187 self._emitline('')
188
Eli Bendersky0b27ba42011-09-17 06:44:02 +0300189 def display_section_headers(self, show_heading=True):
Eli Bendersky377bd862011-09-16 11:10:44 +0300190 """ Display the ELF section headers
191 """
192 elfheader = self.elffile.header
Eli Bendersky0b27ba42011-09-17 06:44:02 +0300193 if show_heading:
194 self._emitline('There are %s section headers, starting at offset %s' % (
195 elfheader['e_shnum'], self._format_hex(elfheader['e_shoff'])))
Eli Bendersky26de2ac2011-09-13 06:50:28 +0300196
Eli Bendersky2fc0f2a2011-09-17 10:39:29 +0300197 self._emitline('\nSection Header%s:' % (
Eli Bendersky377bd862011-09-16 11:10:44 +0300198 's' if elfheader['e_shnum'] > 1 else ''))
Eli Bendersky26de2ac2011-09-13 06:50:28 +0300199
Eli Bendersky377bd862011-09-16 11:10:44 +0300200 # Different formatting constraints of 32-bit and 64-bit addresses
201 #
202 if self.elffile.elfclass == 32:
203 self._emitline(' [Nr] Name Type Addr Off Size ES Flg Lk Inf Al')
204 else:
205 self._emitline(' [Nr] Name Type Address Offset')
206 self._emitline(' Size EntSize Flags Link Info Align')
207
208 # Now the entries
209 #
210 for nsec, section in enumerate(self.elffile.iter_sections()):
211 self._emit(' [%2u] %-17.17s %-15.15s ' % (
212 nsec, section.name, describe_sh_type(section['sh_type'])))
213
214 if self.elffile.elfclass == 32:
215 self._emitline('%s %s %s %s %3s %2s %3s %2s' % (
216 self._format_hex(section['sh_addr'], fieldsize=8, lead0x=False),
217 self._format_hex(section['sh_offset'], fieldsize=6, lead0x=False),
218 self._format_hex(section['sh_size'], fieldsize=6, lead0x=False),
219 self._format_hex(section['sh_entsize'], fieldsize=2, lead0x=False),
220 describe_sh_flags(section['sh_flags']),
221 section['sh_link'], section['sh_info'],
222 section['sh_addralign']))
223 else: # 64
224 self._emitline(' %s %s' % (
225 self._format_hex(section['sh_addr'], fullhex=True, lead0x=False),
226 self._format_hex(section['sh_offset'],
227 fieldsize=16 if section['sh_offset'] > 0xffffffff else 8,
228 lead0x=False)))
229 self._emitline(' %s %s %3s %2s %3s %s' % (
230 self._format_hex(section['sh_size'], fullhex=True, lead0x=False),
231 self._format_hex(section['sh_entsize'], fullhex=True, lead0x=False),
232 describe_sh_flags(section['sh_flags']),
233 section['sh_link'], section['sh_info'],
234 section['sh_addralign']))
235
236 self._emitline('Key to Flags:')
237 self._emitline(' W (write), A (alloc), X (execute), M (merge), S (strings)')
238 self._emitline(' I (info), L (link order), G (group), x (unknown)')
239 self._emitline(' O (extra OS processing required) o (OS specific), p (processor specific)')
240
Eli Bendersky3edefab2011-09-16 14:52:54 +0300241 def display_symbol_tables(self):
242 """ Display the symbol tables contained in the file
243 """
244 for section in self.elffile.iter_sections():
245 if not isinstance(section, SymbolTableSection):
246 continue
247
248 if section['sh_entsize'] == 0:
249 self._emitline("\nSymbol table '%s' has a sh_entsize of zero!" % (
250 section.name))
251 continue
252
253 self._emitline("\nSymbol table '%s' contains %s entries:" % (
254 section.name, section.num_symbols()))
255
256 if self.elffile.elfclass == 32:
257 self._emitline(' Num: Value Size Type Bind Vis Ndx Name')
258 else: # 64
259 self._emitline(' Num: Value Size Type Bind Vis Ndx Name')
260
261 for nsym, symbol in enumerate(section.iter_symbols()):
Eli Benderskyb6fa3652011-09-16 15:20:20 +0300262 # symbol names are truncated to 25 chars, similarly to readelf
263 self._emitline('%6d: %s %5d %-7s %-6s %-7s %4s %.25s' % (
Eli Bendersky3edefab2011-09-16 14:52:54 +0300264 nsym,
265 self._format_hex(symbol['st_value'], fullhex=True, lead0x=False),
266 symbol['st_size'],
267 describe_symbol_type(symbol['st_info']['type']),
268 describe_symbol_bind(symbol['st_info']['bind']),
269 describe_symbol_visibility(symbol['st_other']['visibility']),
270 describe_symbol_shndx(symbol['st_shndx']),
271 symbol.name))
272
Eli Bendersky84066b22011-09-20 06:48:52 +0300273 def display_relocations(self):
274 """ Display the relocations contained in the file
275 """
276 has_relocation_sections = False
277 for section in self.elffile.iter_sections():
278 if not isinstance(section, RelocationSection):
279 continue
280
281 has_relocation_sections = True
282 self._emitline("\nRelocation section '%s' at offset %s contains %s entries:" % (
Eli Bendersky7c1ffa62011-09-22 06:37:07 +0300283 section.name,
284 self._format_hex(section['sh_offset']),
285 section.num_relocations()))
Eli Bendersky89a824f2011-09-23 10:59:59 +0300286 if section.is_RELA():
287 self._emitline(" Offset Info Type Sym. Value Sym. Name + Addend")
288 else:
289 self._emitline(" Offset Info Type Sym.Value Sym. Name")
290
291 # The symbol table section pointed to in sh_link
292 symtable = self.elffile.get_section(section['sh_link'])
293
Eli Bendersky84066b22011-09-20 06:48:52 +0300294 for rel in section.iter_relocations():
Eli Bendersky89a824f2011-09-23 10:59:59 +0300295 hexwidth = 8 if self.elffile.elfclass == 32 else 12
Eli Bendersky099d48f2011-09-23 12:03:48 +0300296 self._emit('%s %s %-17.17s' % (
Eli Bendersky89a824f2011-09-23 10:59:59 +0300297 self._format_hex(rel['r_offset'],
298 fieldsize=hexwidth, lead0x=False),
299 self._format_hex(rel['r_info'],
300 fieldsize=hexwidth, lead0x=False),
301 describe_reloc_type(
Eli Bendersky099d48f2011-09-23 12:03:48 +0300302 rel['r_info_type'], self.elffile['e_machine'])))
303
304 if rel['r_info_sym'] == 0:
305 self._emitline()
306 continue
307
308 symbol = symtable.get_symbol(rel['r_info_sym'])
Eli Benderskyadf707a2011-09-23 15:23:41 +0300309 # Some symbols have zero 'st_name', so instead what's used is
310 # the name of the section they point at
311 if symbol['st_name'] == 0:
312 symsec = self.elffile.get_section(symbol['st_shndx'])
313 symbol_name = symsec.name
314 else:
315 symbol_name = symbol.name
Eli Bendersky6434a962011-09-23 17:14:08 +0300316 self._emit(' %s %s%22.22s' % (
Eli Bendersky89a824f2011-09-23 10:59:59 +0300317 self._format_hex(
318 symbol['st_value'],
319 fullhex=True, lead0x=False),
320 ' ' if self.elffile.elfclass == 32 else '',
Eli Benderskyadf707a2011-09-23 15:23:41 +0300321 symbol_name))
Eli Bendersky89a824f2011-09-23 10:59:59 +0300322 if section.is_RELA():
323 self._emit(' %s %x' % (
324 '+' if rel['r_addend'] >= 0 else '-',
325 abs(rel['r_addend'])))
326 self._emitline()
Eli Bendersky84066b22011-09-20 06:48:52 +0300327
328 if not has_relocation_sections:
329 self._emitline('\nThere are no relocations in this file.')
330
Eli Benderskyc4a4c072011-09-17 15:28:28 +0300331 def display_hex_dump(self, section_spec):
332 """ Display a hex dump of a section. section_spec is either a section
333 number or a name.
334 """
eliben54e39b22011-09-19 13:10:57 +0300335 section = self._section_from_spec(section_spec)
336 if section is None:
Eli Benderskyc4a4c072011-09-17 15:28:28 +0300337 self._emitline("Section '%s' does not exist in the file!" % (
338 section_spec))
339 return
340
Eli Benderskyc4a4c072011-09-17 15:28:28 +0300341 self._emitline("\nHex dump of section '%s':" % section.name)
Eli Benderskyadf707a2011-09-23 15:23:41 +0300342 self._note_relocs_for_section(section)
Eli Benderskyc4a4c072011-09-17 15:28:28 +0300343 addr = section['sh_addr']
344 data = section.data()
345 dataptr = 0
346
347 while dataptr < len(data):
348 bytesleft = len(data) - dataptr
349 # chunks of 16 bytes per line
350 linebytes = 16 if bytesleft > 16 else bytesleft
351
352 self._emit(' %s ' % self._format_hex(addr, fieldsize=8))
353 for i in range(16):
354 if i < linebytes:
355 self._emit('%2.2x' % ord(data[dataptr + i]))
356 else:
357 self._emit(' ')
358 if i % 4 == 3:
359 self._emit(' ')
360
361 for i in range(linebytes):
362 c = data[dataptr + i]
Eli Bendersky099d48f2011-09-23 12:03:48 +0300363 if c >= ' ' and ord(c) < 0x7f:
Eli Benderskyc4a4c072011-09-17 15:28:28 +0300364 self._emit(c)
365 else:
366 self._emit('.')
367
368 self._emitline()
369 addr += linebytes
370 dataptr += linebytes
371
372 self._emitline()
373
Eli Bendersky53e86db2011-09-18 06:04:30 +0300374 def display_string_dump(self, section_spec):
375 """ Display a strings dump of a section. section_spec is either a
376 section number or a name.
377 """
eliben54e39b22011-09-19 13:10:57 +0300378 section = self._section_from_spec(section_spec)
379 if section is None:
Eli Bendersky53e86db2011-09-18 06:04:30 +0300380 self._emitline("Section '%s' does not exist in the file!" % (
381 section_spec))
382 return
383
384 printables = set(string.printable)
Eli Bendersky53e86db2011-09-18 06:04:30 +0300385 self._emitline("\nString dump of section '%s':" % section.name)
386
387 found = False
388 data = section.data()
389 dataptr = 0
390
391 while dataptr < len(data):
392 while dataptr < len(data) and data[dataptr] not in printables:
393 dataptr += 1
394
395 if dataptr >= len(data):
396 break
397
398 endptr = dataptr
399 while endptr < len(data) and data[endptr] != '\x00':
400 endptr += 1
401
402 found = True
403 self._emitline(' [%6x] %s' % (
404 dataptr, data[dataptr:endptr]))
405
406 dataptr = endptr
407
408 if not found:
409 self._emitline(' No strings found in this section.')
410 else:
411 self._emitline()
Eli Benderskyc4a4c072011-09-17 15:28:28 +0300412
eliben0fc47af2011-10-02 13:47:12 +0200413 def display_debug_dump(self, section_name):
414 """ Dump a DWARF section
415 """
416 self._init_dwarfinfo()
417 if self._dwarfinfo is None:
418 return
419
420 if section_name == 'info':
421 self._dump_debug_info()
422 else:
423 self._emitline('debug dump not yet supported for "%s"' % section_name)
424
Eli Bendersky26de2ac2011-09-13 06:50:28 +0300425 def _format_hex(self, addr, fieldsize=None, fullhex=False, lead0x=True):
Eli Bendersky6a12cde2011-09-09 10:23:16 +0300426 """ Format an address into a hexadecimal string.
Eli Benderskyd62928d2011-09-09 10:05:57 +0300427
Eli Bendersky26de2ac2011-09-13 06:50:28 +0300428 fieldsize:
429 Size of the hexadecimal field (with leading zeros to fit the
430 address into. For example with fieldsize=8, the format will
431 be %08x
432 If None, the minimal required field size will be used.
433
Eli Bendersky6a12cde2011-09-09 10:23:16 +0300434 fullhex:
Eli Bendersky26de2ac2011-09-13 06:50:28 +0300435 If True, override fieldsize to set it to the maximal size
436 needed for the elfclass
Eli Bendersky6a12cde2011-09-09 10:23:16 +0300437
438 lead0x:
439 If True, leading 0x is added
Eli Benderskyd62928d2011-09-09 10:05:57 +0300440 """
Eli Bendersky6a12cde2011-09-09 10:23:16 +0300441 s = '0x' if lead0x else ''
442 if fullhex:
Eli Bendersky26de2ac2011-09-13 06:50:28 +0300443 fieldsize = 8 if self.elffile.elfclass == 32 else 16
444 if fieldsize is None:
445 field = '%x'
Eli Bendersky6a12cde2011-09-09 10:23:16 +0300446 else:
Eli Bendersky26de2ac2011-09-13 06:50:28 +0300447 field = '%' + '0%sx' % fieldsize
448 return s + field % addr
Eli Benderskyd62928d2011-09-09 10:05:57 +0300449
eliben54e39b22011-09-19 13:10:57 +0300450 def _section_from_spec(self, spec):
451 """ Retrieve a section given a "spec" (either number or name).
Eli Benderskyc4a4c072011-09-17 15:28:28 +0300452 Return None if no such section exists in the file.
453 """
454 try:
455 num = int(spec)
eliben54e39b22011-09-19 13:10:57 +0300456 if num < self.elffile.num_sections():
457 return self.elffile.get_section(num)
458 else:
459 return None
Eli Benderskyc4a4c072011-09-17 15:28:28 +0300460 except ValueError:
461 # Not a number. Must be a name then
eliben54e39b22011-09-19 13:10:57 +0300462 return self.elffile.get_section_by_name(spec)
Eli Benderskyc4a4c072011-09-17 15:28:28 +0300463
Eli Benderskyadf707a2011-09-23 15:23:41 +0300464 def _note_relocs_for_section(self, section):
465 """ If there are relocation sections pointing to the givne section,
466 emit a note about it.
467 """
468 for relsec in self.elffile.iter_sections():
469 if isinstance(relsec, RelocationSection):
470 info_idx = relsec['sh_info']
471 if self.elffile.get_section(info_idx) == section:
472 self._emitline(' Note: This section has relocations against it, but these have NOT been applied to this dump.')
473 return
474
eliben0fc47af2011-10-02 13:47:12 +0200475 def _init_dwarfinfo(self):
476 """ Initialize the DWARF info contained in the file and assign it to
477 self._dwarfinfo.
478 Leave self._dwarfinfo at None if no DWARF info was found in the file
479 """
480 if self._dwarfinfo is not None:
481 return
482
483 if self.elffile.has_dwarf_info():
484 self._dwarfinfo = self.elffile.get_dwarf_info()
485 else:
486 self._dwarfinfo = None
487
488 def _dump_debug_info(self):
489 """ Dump the debugging info section.
490 """
491 # Offset of the .debug_info section in the stream
492 section_offset = self._dwarfinfo.debug_info_loc.offset
493
494 for cu in self._dwarfinfo.iter_CUs():
495 self._emitline(' Compilation Unit @ offset %s' %
496 self._format_hex(cu.cu_offset - section_offset))
497 self._emitline(' Length: %s (%s)' % (
498 self._format_hex(cu['unit_length']),
499 '%s-bit' % cu.dwarf_format()))
500 self._emitline(' Version: %s' % cu['version']),
501 self._emitline(' Abbrev Offset: %s' % cu['debug_abbrev_offset']),
502 self._emitline(' Pointer Size: %s' % cu['address_size'])
503
504 # The nesting depth of each DIE within the tree of DIEs must be
505 # displayed. To implement this, a counter is incremented each time
506 # the current DIE has children, and decremented when a null die is
507 # encountered. Due to the way the DIE tree is serialized, this will
508 # correctly reflect the nesting depth
509 #
510 die_depth = 0
511 for die in cu.iter_DIEs():
512 if die.is_null():
513 die_depth -= 1
514 continue
515 self._emitline(' <%s><%x>: Abbrev Number: %s' % (
516 die_depth, die.offset - section_offset, die.abbrev_code))
517
518 if die.has_children:
519 die_depth += 1
520
Eli Bendersky26de2ac2011-09-13 06:50:28 +0300521 def _emit(self, s=''):
Eli Bendersky933f6992011-09-09 08:11:06 +0300522 """ Emit an object to output
523 """
524 self.output.write(str(s))
Eli Benderskyd62928d2011-09-09 10:05:57 +0300525
Eli Bendersky26de2ac2011-09-13 06:50:28 +0300526 def _emitline(self, s=''):
Eli Bendersky933f6992011-09-09 08:11:06 +0300527 """ Emit an object to output, followed by a newline
528 """
529 self.output.write(str(s) + '\n')
530
531
Eli Bendersky0b27ba42011-09-17 06:44:02 +0300532SCRIPT_DESCRIPTION = 'Display information about the contents of ELF format files'
533VERSION_STRING = '%%prog: based on pyelftools %s' % __version__
534
535
Eli Bendersky933f6992011-09-09 08:11:06 +0300536def main():
Eli Bendersky0b27ba42011-09-17 06:44:02 +0300537 # parse the command-line arguments and invoke ReadElf
Eli Bendersky40eb1702011-09-16 16:59:52 +0300538 optparser = OptionParser(
Eli Benderskyecde41b2011-09-16 17:16:20 +0300539 usage='usage: %prog [options] <elf-file>',
Eli Bendersky0b27ba42011-09-17 06:44:02 +0300540 description=SCRIPT_DESCRIPTION,
Eli Bendersky40eb1702011-09-16 16:59:52 +0300541 add_help_option=False, # -h is a real option of readelf
Eli Bendersky0b27ba42011-09-17 06:44:02 +0300542 prog='readelf.py',
543 version=VERSION_STRING)
Eli Bendersky40eb1702011-09-16 16:59:52 +0300544 optparser.add_option('-H', '--help',
545 action='store_true', dest='help',
546 help='Display this information')
547 optparser.add_option('-h', '--file-header',
Eli Benderskyecde41b2011-09-16 17:16:20 +0300548 action='store_true', dest='show_file_header',
549 help='Display the ELF file header')
Eli Bendersky40eb1702011-09-16 16:59:52 +0300550 optparser.add_option('-l', '--program-headers', '--segments',
Eli Bendersky0b27ba42011-09-17 06:44:02 +0300551 action='store_true', dest='show_program_header',
Eli Benderskyecde41b2011-09-16 17:16:20 +0300552 help='Display the program headers')
Eli Bendersky40eb1702011-09-16 16:59:52 +0300553 optparser.add_option('-S', '--section-headers', '--sections',
Eli Bendersky0b27ba42011-09-17 06:44:02 +0300554 action='store_true', dest='show_section_header',
Eli Benderskyecde41b2011-09-16 17:16:20 +0300555 help="Display the sections' headers")
Eli Bendersky40eb1702011-09-16 16:59:52 +0300556 optparser.add_option('-e', '--headers',
Eli Benderskyecde41b2011-09-16 17:16:20 +0300557 action='store_true', dest='show_all_headers',
558 help='Equivalent to: -h -l -S')
Eli Bendersky40eb1702011-09-16 16:59:52 +0300559 optparser.add_option('-s', '--symbols', '--syms',
Eli Benderskyecde41b2011-09-16 17:16:20 +0300560 action='store_true', dest='show_symbols',
561 help='Display the symbol table')
Eli Bendersky84066b22011-09-20 06:48:52 +0300562 optparser.add_option('-r', '--relocs',
563 action='store_true', dest='show_relocs',
564 help='Display the relocations (if present)')
Eli Benderskyc4a4c072011-09-17 15:28:28 +0300565 optparser.add_option('-x', '--hex-dump',
566 action='store', dest='show_hex_dump', metavar='<number|name>',
567 help='Dump the contents of section <number|name> as bytes')
Eli Bendersky53e86db2011-09-18 06:04:30 +0300568 optparser.add_option('-p', '--string-dump',
569 action='store', dest='show_string_dump', metavar='<number|name>',
570 help='Dump the contents of section <number|name> as strings')
eliben0fc47af2011-10-02 13:47:12 +0200571 optparser.add_option('--debug-dump',
572 action='store', dest='debug_dump_section', metavar='<section>',
573 help='Display the contents of DWARF debug sections')
Eli Bendersky53e86db2011-09-18 06:04:30 +0300574
Eli Bendersky933f6992011-09-09 08:11:06 +0300575 options, args = optparser.parse_args()
576
Eli Bendersky40eb1702011-09-16 16:59:52 +0300577 if options.help or len(args) == 0:
578 optparser.print_help()
579 sys.exit(0)
580
Eli Bendersky0b27ba42011-09-17 06:44:02 +0300581 if options.show_all_headers:
582 do_file_header = do_section_header = do_program_header = True
583 else:
584 do_file_header = options.show_file_header
585 do_section_header = options.show_section_header
586 do_program_header = options.show_program_header
587
Eli Bendersky933f6992011-09-09 08:11:06 +0300588 with open(args[0], 'rb') as file:
589 try:
590 readelf = ReadElf(file, sys.stdout)
Eli Bendersky0b27ba42011-09-17 06:44:02 +0300591 if do_file_header:
592 readelf.display_file_header()
Eli Bendersky0b27ba42011-09-17 06:44:02 +0300593 if do_section_header:
594 readelf.display_section_headers(
595 show_heading=not do_file_header)
Eli Bendersky2fc0f2a2011-09-17 10:39:29 +0300596 if do_program_header:
597 readelf.display_program_headers(
598 show_heading=not do_file_header)
Eli Bendersky0b27ba42011-09-17 06:44:02 +0300599 if options.show_symbols:
600 readelf.display_symbol_tables()
Eli Bendersky84066b22011-09-20 06:48:52 +0300601 if options.show_relocs:
602 readelf.display_relocations()
Eli Benderskyc4a4c072011-09-17 15:28:28 +0300603 if options.show_hex_dump:
604 readelf.display_hex_dump(options.show_hex_dump)
Eli Bendersky53e86db2011-09-18 06:04:30 +0300605 if options.show_string_dump:
606 readelf.display_string_dump(options.show_string_dump)
eliben0fc47af2011-10-02 13:47:12 +0200607 if options.debug_dump_section:
608 readelf.display_debug_dump(options.debug_dump_section)
Eli Bendersky933f6992011-09-09 08:11:06 +0300609 except ELFError as ex:
Eli Bendersky0b27ba42011-09-17 06:44:02 +0300610 sys.stderr.write('ELF error: %s\n' % ex)
Eli Bendersky933f6992011-09-09 08:11:06 +0300611 sys.exit(1)
612
613
614#-------------------------------------------------------------------------------
615if __name__ == '__main__':
616 main()
617