blob: c11a197387662bc618f2ae3515453a054497ee38 [file] [log] [blame]
Eli Bendersky3edefab2011-09-16 14:52:54 +03001#!/usr/bin/env python
Eli Bendersky933f6992011-09-09 08:11:06 +03002#-------------------------------------------------------------------------------
Eli Bendersky2fc0f2a2011-09-17 10:39:29 +03003# scripts/readelf.py
Eli Bendersky933f6992011-09-09 08:11:06 +03004#
5# A clone of 'readelf' in Python, based on the pyelftools library
6#
7# Eli Bendersky (eliben@gmail.com)
8# This code is in the public domain
9#-------------------------------------------------------------------------------
Eli Bendersky53e86db2011-09-18 06:04:30 +030010import os, sys
Eli Bendersky933f6992011-09-09 08:11:06 +030011from optparse import OptionParser
Eli Bendersky53e86db2011-09-18 06:04:30 +030012import string
13
Eli Bendersky933f6992011-09-09 08:11:06 +030014
15# If elftools is not installed, maybe we're running from the root or scripts
16# dir of the source distribution
17#
18try:
19 import elftools
20except ImportError:
21 sys.path.extend(['.', '..'])
22
Eli Bendersky0b27ba42011-09-17 06:44:02 +030023from elftools import __version__
Eli Bendersky933f6992011-09-09 08:11:06 +030024from elftools.common.exceptions import ELFError
25from elftools.elf.elffile import ELFFile
Eli Bendersky3f4de3e2011-09-14 05:58:06 +030026from elftools.elf.segments import InterpSegment
Eli Bendersky149315a2011-11-24 08:12:37 +020027from elftools.elf.sections import SymbolTableSection
28from elftools.elf.relocation import RelocationSection
Eli Bendersky933f6992011-09-09 08:11:06 +030029from elftools.elf.descriptions import (
30 describe_ei_class, describe_ei_data, describe_ei_version,
Eli Benderskyde8d71e2011-09-09 08:22:35 +030031 describe_ei_osabi, describe_e_type, describe_e_machine,
Eli Bendersky26de2ac2011-09-13 06:50:28 +030032 describe_e_version_numeric, describe_p_type, describe_p_flags,
Eli Bendersky377bd862011-09-16 11:10:44 +030033 describe_sh_type, describe_sh_flags,
Eli Bendersky3edefab2011-09-16 14:52:54 +030034 describe_symbol_type, describe_symbol_bind, describe_symbol_visibility,
Eli Bendersky89a824f2011-09-23 10:59:59 +030035 describe_symbol_shndx, describe_reloc_type,
Eli Bendersky933f6992011-09-09 08:11:06 +030036 )
Eli Bendersky149315a2011-11-24 08:12:37 +020037from elftools.dwarf.dwarfinfo import DWARFInfo
elibenaee11d22011-10-26 10:42:34 +020038from elftools.dwarf.descriptions import describe_attr_value
Eli Benderskybf83b1b2011-12-06 06:48:10 +020039from elftools.dwarf.constants import (
40 DW_LNS_copy, DW_LNS_set_file, DW_LNE_define_file)
Eli Bendersky933f6992011-09-09 08:11:06 +030041
42
43class ReadElf(object):
44 """ display_* methods are used to emit output into the output stream
45 """
46 def __init__(self, file, output):
47 """ file:
48 stream object with the ELF file to read
49
50 output:
51 output stream to write to
52 """
53 self.elffile = ELFFile(file)
54 self.output = output
eliben0fc47af2011-10-02 13:47:12 +020055
56 # Lazily initialized if a debug dump is requested
57 self._dwarfinfo = None
Eli Bendersky933f6992011-09-09 08:11:06 +030058
59 def display_file_header(self):
60 """ Display the ELF file header
61 """
62 self._emitline('ELF Header:')
63 self._emit(' Magic: ')
64 self._emitline(' '.join('%2.2x' % ord(b)
65 for b in self.elffile.e_ident_raw))
66 header = self.elffile.header
67 e_ident = header['e_ident']
68 self._emitline(' Class: %s' %
69 describe_ei_class(e_ident['EI_CLASS']))
70 self._emitline(' Data: %s' %
71 describe_ei_data(e_ident['EI_DATA']))
72 self._emitline(' Version: %s' %
73 describe_ei_version(e_ident['EI_VERSION']))
74 self._emitline(' OS/ABI: %s' %
75 describe_ei_osabi(e_ident['EI_OSABI']))
76 self._emitline(' ABI Version: %d' %
77 e_ident['EI_ABIVERSION'])
78 self._emitline(' Type: %s' %
79 describe_e_type(header['e_type']))
Eli Benderskyde8d71e2011-09-09 08:22:35 +030080 self._emitline(' Machine: %s' %
81 describe_e_machine(header['e_machine']))
82 self._emitline(' Version: %s' %
83 describe_e_version_numeric(header['e_version']))
Eli Benderskyd62928d2011-09-09 10:05:57 +030084 self._emitline(' Entry point address: %s' %
Eli Bendersky26de2ac2011-09-13 06:50:28 +030085 self._format_hex(header['e_entry']))
Eli Bendersky2fc0f2a2011-09-17 10:39:29 +030086 self._emit(' Start of program headers: %s' %
Eli Benderskyd62928d2011-09-09 10:05:57 +030087 header['e_phoff'])
88 self._emitline(' (bytes into file)')
Eli Bendersky2fc0f2a2011-09-17 10:39:29 +030089 self._emit(' Start of section headers: %s' %
Eli Benderskyd62928d2011-09-09 10:05:57 +030090 header['e_shoff'])
91 self._emitline(' (bytes into file)')
92 self._emitline(' Flags: %s' %
Eli Bendersky26de2ac2011-09-13 06:50:28 +030093 self._format_hex(header['e_flags']))
Eli Benderskyd62928d2011-09-09 10:05:57 +030094 self._emitline(' Size of this header: %s (bytes)' %
95 header['e_ehsize'])
96 self._emitline(' Size of program headers: %s (bytes)' %
97 header['e_phentsize'])
98 self._emitline(' Number of program headers: %s' %
99 header['e_phnum'])
100 self._emitline(' Size of section headers: %s (bytes)' %
101 header['e_shentsize'])
102 self._emitline(' Number of section headers: %s' %
103 header['e_shnum'])
104 self._emitline(' Section header string table index: %s' %
105 header['e_shstrndx'])
Eli Bendersky933f6992011-09-09 08:11:06 +0300106
Eli Bendersky0b27ba42011-09-17 06:44:02 +0300107 def display_program_headers(self, show_heading=True):
108 """ Display the ELF program headers.
109 If show_heading is True, displays the heading for this information
110 (Elf file type is...)
Eli Bendersky26de2ac2011-09-13 06:50:28 +0300111 """
112 self._emitline()
Eli Bendersky2fc0f2a2011-09-17 10:39:29 +0300113 if self.elffile.num_segments() == 0:
114 self._emitline('There are no program headers in this file.')
115 return
116
Eli Bendersky26de2ac2011-09-13 06:50:28 +0300117 elfheader = self.elffile.header
Eli Bendersky0b27ba42011-09-17 06:44:02 +0300118 if show_heading:
119 self._emitline('Elf file type is %s' %
120 describe_e_type(elfheader['e_type']))
121 self._emitline('Entry point is %s' %
122 self._format_hex(elfheader['e_entry']))
123 # readelf weirness - why isn't e_phoff printed as hex? (for section
124 # headers, it is...)
125 self._emitline('There are %s program headers, starting at offset %s' % (
126 elfheader['e_phnum'], elfheader['e_phoff']))
127 self._emitline()
Eli Bendersky26de2ac2011-09-13 06:50:28 +0300128
Eli Bendersky2fc0f2a2011-09-17 10:39:29 +0300129 self._emitline('Program Headers:')
Eli Bendersky26de2ac2011-09-13 06:50:28 +0300130
131 # Now comes the table of program headers with their attributes. Note
132 # that due to different formatting constraints of 32-bit and 64-bit
133 # addresses, there are some conditions on elfclass here.
134 #
135 # First comes the table heading
136 #
137 if self.elffile.elfclass == 32:
138 self._emitline(' Type Offset VirtAddr PhysAddr FileSiz MemSiz Flg Align')
139 else:
140 self._emitline(' Type Offset VirtAddr PhysAddr')
141 self._emitline(' FileSiz MemSiz Flags Align')
142
143 # Now the entries
144 #
145 for segment in self.elffile.iter_segments():
146 self._emit(' %-14s ' % describe_p_type(segment['p_type']))
147
148 if self.elffile.elfclass == 32:
149 self._emitline('%s %s %s %s %s %-3s %s' % (
150 self._format_hex(segment['p_offset'], fieldsize=6),
151 self._format_hex(segment['p_vaddr'], fullhex=True),
152 self._format_hex(segment['p_paddr'], fullhex=True),
153 self._format_hex(segment['p_filesz'], fieldsize=5),
154 self._format_hex(segment['p_memsz'], fieldsize=5),
155 describe_p_flags(segment['p_flags']),
156 self._format_hex(segment['p_align'])))
Eli Benderskya41c3c02011-09-14 06:18:28 +0300157 else: # 64
158 self._emitline('%s %s %s' % (
159 self._format_hex(segment['p_offset'], fullhex=True),
160 self._format_hex(segment['p_vaddr'], fullhex=True),
161 self._format_hex(segment['p_paddr'], fullhex=True)))
162 self._emitline(' %s %s %-3s %s' % (
163 self._format_hex(segment['p_filesz'], fullhex=True),
164 self._format_hex(segment['p_memsz'], fullhex=True),
165 describe_p_flags(segment['p_flags']),
166 # lead0x set to False for p_align, to mimic readelf.
167 # No idea why the difference from 32-bit mode :-|
168 self._format_hex(segment['p_align'], lead0x=False)))
Eli Bendersky26de2ac2011-09-13 06:50:28 +0300169
Eli Bendersky3f4de3e2011-09-14 05:58:06 +0300170 if isinstance(segment, InterpSegment):
171 self._emitline(' [Requesting program interpreter: %s]' %
172 segment.get_interp_name())
173
Eli Bendersky58585b02011-09-15 07:07:54 +0300174 # Sections to segments mapping
175 #
176 if self.elffile.num_sections() == 0:
177 # No sections? We're done
178 return
179
180 self._emitline('\n Section to Segment mapping:')
Eli Bendersky2fc0f2a2011-09-17 10:39:29 +0300181 self._emitline(' Segment Sections...')
Eli Bendersky58585b02011-09-15 07:07:54 +0300182
183 for nseg, segment in enumerate(self.elffile.iter_segments()):
Eli Bendersky2fc0f2a2011-09-17 10:39:29 +0300184 self._emit(' %2.2d ' % nseg)
Eli Bendersky58585b02011-09-15 07:07:54 +0300185
186 for section in self.elffile.iter_sections():
187 if ( not section.is_null() and
188 segment.section_in_segment(section)):
189 self._emit('%s ' % section.name)
190
191 self._emitline('')
192
Eli Bendersky0b27ba42011-09-17 06:44:02 +0300193 def display_section_headers(self, show_heading=True):
Eli Bendersky377bd862011-09-16 11:10:44 +0300194 """ Display the ELF section headers
195 """
196 elfheader = self.elffile.header
Eli Bendersky0b27ba42011-09-17 06:44:02 +0300197 if show_heading:
198 self._emitline('There are %s section headers, starting at offset %s' % (
199 elfheader['e_shnum'], self._format_hex(elfheader['e_shoff'])))
Eli Bendersky26de2ac2011-09-13 06:50:28 +0300200
Eli Bendersky2fc0f2a2011-09-17 10:39:29 +0300201 self._emitline('\nSection Header%s:' % (
Eli Bendersky377bd862011-09-16 11:10:44 +0300202 's' if elfheader['e_shnum'] > 1 else ''))
Eli Bendersky26de2ac2011-09-13 06:50:28 +0300203
Eli Bendersky377bd862011-09-16 11:10:44 +0300204 # Different formatting constraints of 32-bit and 64-bit addresses
205 #
206 if self.elffile.elfclass == 32:
207 self._emitline(' [Nr] Name Type Addr Off Size ES Flg Lk Inf Al')
208 else:
209 self._emitline(' [Nr] Name Type Address Offset')
210 self._emitline(' Size EntSize Flags Link Info Align')
211
212 # Now the entries
213 #
214 for nsec, section in enumerate(self.elffile.iter_sections()):
215 self._emit(' [%2u] %-17.17s %-15.15s ' % (
216 nsec, section.name, describe_sh_type(section['sh_type'])))
217
218 if self.elffile.elfclass == 32:
219 self._emitline('%s %s %s %s %3s %2s %3s %2s' % (
220 self._format_hex(section['sh_addr'], fieldsize=8, lead0x=False),
221 self._format_hex(section['sh_offset'], fieldsize=6, lead0x=False),
222 self._format_hex(section['sh_size'], fieldsize=6, lead0x=False),
223 self._format_hex(section['sh_entsize'], fieldsize=2, lead0x=False),
224 describe_sh_flags(section['sh_flags']),
225 section['sh_link'], section['sh_info'],
226 section['sh_addralign']))
227 else: # 64
228 self._emitline(' %s %s' % (
229 self._format_hex(section['sh_addr'], fullhex=True, lead0x=False),
230 self._format_hex(section['sh_offset'],
231 fieldsize=16 if section['sh_offset'] > 0xffffffff else 8,
232 lead0x=False)))
233 self._emitline(' %s %s %3s %2s %3s %s' % (
234 self._format_hex(section['sh_size'], fullhex=True, lead0x=False),
235 self._format_hex(section['sh_entsize'], fullhex=True, lead0x=False),
236 describe_sh_flags(section['sh_flags']),
237 section['sh_link'], section['sh_info'],
238 section['sh_addralign']))
239
240 self._emitline('Key to Flags:')
Eli Bendersky93e630d2011-11-16 07:22:57 +0200241 self._emit(' W (write), A (alloc), X (execute), M (merge), S (strings)')
242 if self.elffile['e_machine'] in ('EM_X86_64', 'EM_L10M'):
243 self._emitline(', l (large)')
244 else:
245 self._emitline()
246 self._emitline(' I (info), L (link order), G (group), T (TLS), E (exclude), x (unknown)')
Eli Bendersky377bd862011-09-16 11:10:44 +0300247 self._emitline(' O (extra OS processing required) o (OS specific), p (processor specific)')
248
Eli Bendersky3edefab2011-09-16 14:52:54 +0300249 def display_symbol_tables(self):
250 """ Display the symbol tables contained in the file
251 """
252 for section in self.elffile.iter_sections():
253 if not isinstance(section, SymbolTableSection):
254 continue
255
256 if section['sh_entsize'] == 0:
257 self._emitline("\nSymbol table '%s' has a sh_entsize of zero!" % (
258 section.name))
259 continue
260
261 self._emitline("\nSymbol table '%s' contains %s entries:" % (
262 section.name, section.num_symbols()))
263
264 if self.elffile.elfclass == 32:
265 self._emitline(' Num: Value Size Type Bind Vis Ndx Name')
266 else: # 64
267 self._emitline(' Num: Value Size Type Bind Vis Ndx Name')
268
269 for nsym, symbol in enumerate(section.iter_symbols()):
Eli Benderskyb6fa3652011-09-16 15:20:20 +0300270 # symbol names are truncated to 25 chars, similarly to readelf
271 self._emitline('%6d: %s %5d %-7s %-6s %-7s %4s %.25s' % (
Eli Bendersky3edefab2011-09-16 14:52:54 +0300272 nsym,
273 self._format_hex(symbol['st_value'], fullhex=True, lead0x=False),
274 symbol['st_size'],
275 describe_symbol_type(symbol['st_info']['type']),
276 describe_symbol_bind(symbol['st_info']['bind']),
277 describe_symbol_visibility(symbol['st_other']['visibility']),
278 describe_symbol_shndx(symbol['st_shndx']),
279 symbol.name))
280
Eli Bendersky84066b22011-09-20 06:48:52 +0300281 def display_relocations(self):
282 """ Display the relocations contained in the file
283 """
284 has_relocation_sections = False
285 for section in self.elffile.iter_sections():
286 if not isinstance(section, RelocationSection):
287 continue
288
289 has_relocation_sections = True
290 self._emitline("\nRelocation section '%s' at offset %s contains %s entries:" % (
Eli Bendersky7c1ffa62011-09-22 06:37:07 +0300291 section.name,
292 self._format_hex(section['sh_offset']),
293 section.num_relocations()))
Eli Bendersky89a824f2011-09-23 10:59:59 +0300294 if section.is_RELA():
295 self._emitline(" Offset Info Type Sym. Value Sym. Name + Addend")
296 else:
297 self._emitline(" Offset Info Type Sym.Value Sym. Name")
298
299 # The symbol table section pointed to in sh_link
300 symtable = self.elffile.get_section(section['sh_link'])
301
Eli Bendersky84066b22011-09-20 06:48:52 +0300302 for rel in section.iter_relocations():
Eli Bendersky89a824f2011-09-23 10:59:59 +0300303 hexwidth = 8 if self.elffile.elfclass == 32 else 12
Eli Bendersky099d48f2011-09-23 12:03:48 +0300304 self._emit('%s %s %-17.17s' % (
Eli Bendersky89a824f2011-09-23 10:59:59 +0300305 self._format_hex(rel['r_offset'],
306 fieldsize=hexwidth, lead0x=False),
307 self._format_hex(rel['r_info'],
308 fieldsize=hexwidth, lead0x=False),
309 describe_reloc_type(
Eli Bendersky067b3fd2011-11-18 12:02:57 +0200310 rel['r_info_type'], self.elffile)))
Eli Bendersky099d48f2011-09-23 12:03:48 +0300311
312 if rel['r_info_sym'] == 0:
313 self._emitline()
314 continue
315
316 symbol = symtable.get_symbol(rel['r_info_sym'])
Eli Benderskyadf707a2011-09-23 15:23:41 +0300317 # Some symbols have zero 'st_name', so instead what's used is
318 # the name of the section they point at
319 if symbol['st_name'] == 0:
320 symsec = self.elffile.get_section(symbol['st_shndx'])
321 symbol_name = symsec.name
322 else:
323 symbol_name = symbol.name
Eli Bendersky6434a962011-09-23 17:14:08 +0300324 self._emit(' %s %s%22.22s' % (
Eli Bendersky89a824f2011-09-23 10:59:59 +0300325 self._format_hex(
326 symbol['st_value'],
327 fullhex=True, lead0x=False),
328 ' ' if self.elffile.elfclass == 32 else '',
Eli Benderskyadf707a2011-09-23 15:23:41 +0300329 symbol_name))
Eli Bendersky89a824f2011-09-23 10:59:59 +0300330 if section.is_RELA():
331 self._emit(' %s %x' % (
332 '+' if rel['r_addend'] >= 0 else '-',
333 abs(rel['r_addend'])))
334 self._emitline()
Eli Bendersky84066b22011-09-20 06:48:52 +0300335
336 if not has_relocation_sections:
337 self._emitline('\nThere are no relocations in this file.')
338
Eli Benderskyc4a4c072011-09-17 15:28:28 +0300339 def display_hex_dump(self, section_spec):
340 """ Display a hex dump of a section. section_spec is either a section
341 number or a name.
342 """
eliben54e39b22011-09-19 13:10:57 +0300343 section = self._section_from_spec(section_spec)
344 if section is None:
Eli Benderskyc4a4c072011-09-17 15:28:28 +0300345 self._emitline("Section '%s' does not exist in the file!" % (
346 section_spec))
347 return
348
Eli Benderskyc4a4c072011-09-17 15:28:28 +0300349 self._emitline("\nHex dump of section '%s':" % section.name)
Eli Benderskyadf707a2011-09-23 15:23:41 +0300350 self._note_relocs_for_section(section)
Eli Benderskyc4a4c072011-09-17 15:28:28 +0300351 addr = section['sh_addr']
352 data = section.data()
353 dataptr = 0
354
355 while dataptr < len(data):
356 bytesleft = len(data) - dataptr
357 # chunks of 16 bytes per line
358 linebytes = 16 if bytesleft > 16 else bytesleft
359
360 self._emit(' %s ' % self._format_hex(addr, fieldsize=8))
361 for i in range(16):
362 if i < linebytes:
363 self._emit('%2.2x' % ord(data[dataptr + i]))
364 else:
365 self._emit(' ')
366 if i % 4 == 3:
367 self._emit(' ')
368
369 for i in range(linebytes):
370 c = data[dataptr + i]
Eli Bendersky099d48f2011-09-23 12:03:48 +0300371 if c >= ' ' and ord(c) < 0x7f:
Eli Benderskyc4a4c072011-09-17 15:28:28 +0300372 self._emit(c)
373 else:
374 self._emit('.')
375
376 self._emitline()
377 addr += linebytes
378 dataptr += linebytes
379
380 self._emitline()
381
Eli Bendersky53e86db2011-09-18 06:04:30 +0300382 def display_string_dump(self, section_spec):
383 """ Display a strings dump of a section. section_spec is either a
384 section number or a name.
385 """
eliben54e39b22011-09-19 13:10:57 +0300386 section = self._section_from_spec(section_spec)
387 if section is None:
Eli Bendersky53e86db2011-09-18 06:04:30 +0300388 self._emitline("Section '%s' does not exist in the file!" % (
389 section_spec))
390 return
391
392 printables = set(string.printable)
Eli Bendersky53e86db2011-09-18 06:04:30 +0300393 self._emitline("\nString dump of section '%s':" % section.name)
394
395 found = False
396 data = section.data()
397 dataptr = 0
398
399 while dataptr < len(data):
400 while dataptr < len(data) and data[dataptr] not in printables:
401 dataptr += 1
402
403 if dataptr >= len(data):
404 break
405
406 endptr = dataptr
407 while endptr < len(data) and data[endptr] != '\x00':
408 endptr += 1
409
410 found = True
411 self._emitline(' [%6x] %s' % (
412 dataptr, data[dataptr:endptr]))
413
414 dataptr = endptr
415
416 if not found:
417 self._emitline(' No strings found in this section.')
418 else:
419 self._emitline()
Eli Benderskyc4a4c072011-09-17 15:28:28 +0300420
Eli Bendersky5ec2dde2011-12-04 07:05:31 +0200421 def display_debug_dump(self, dump_what):
eliben0fc47af2011-10-02 13:47:12 +0200422 """ Dump a DWARF section
423 """
424 self._init_dwarfinfo()
425 if self._dwarfinfo is None:
426 return
427
Eli Bendersky5ec2dde2011-12-04 07:05:31 +0200428 if dump_what == 'info':
eliben0fc47af2011-10-02 13:47:12 +0200429 self._dump_debug_info()
Eli Bendersky5ec2dde2011-12-04 07:05:31 +0200430 elif dump_what == 'decodedline':
431 self._dump_debug_line_programs()
eliben0fc47af2011-10-02 13:47:12 +0200432 else:
Eli Bendersky5ec2dde2011-12-04 07:05:31 +0200433 self._emitline('debug dump not yet supported for "%s"' % dump_what)
eliben0fc47af2011-10-02 13:47:12 +0200434
Eli Bendersky26de2ac2011-09-13 06:50:28 +0300435 def _format_hex(self, addr, fieldsize=None, fullhex=False, lead0x=True):
Eli Bendersky6a12cde2011-09-09 10:23:16 +0300436 """ Format an address into a hexadecimal string.
Eli Benderskyd62928d2011-09-09 10:05:57 +0300437
Eli Bendersky26de2ac2011-09-13 06:50:28 +0300438 fieldsize:
439 Size of the hexadecimal field (with leading zeros to fit the
440 address into. For example with fieldsize=8, the format will
441 be %08x
442 If None, the minimal required field size will be used.
443
Eli Bendersky6a12cde2011-09-09 10:23:16 +0300444 fullhex:
Eli Bendersky26de2ac2011-09-13 06:50:28 +0300445 If True, override fieldsize to set it to the maximal size
446 needed for the elfclass
Eli Bendersky6a12cde2011-09-09 10:23:16 +0300447
448 lead0x:
449 If True, leading 0x is added
Eli Benderskyd62928d2011-09-09 10:05:57 +0300450 """
Eli Bendersky6a12cde2011-09-09 10:23:16 +0300451 s = '0x' if lead0x else ''
452 if fullhex:
Eli Bendersky26de2ac2011-09-13 06:50:28 +0300453 fieldsize = 8 if self.elffile.elfclass == 32 else 16
454 if fieldsize is None:
455 field = '%x'
Eli Bendersky6a12cde2011-09-09 10:23:16 +0300456 else:
Eli Bendersky26de2ac2011-09-13 06:50:28 +0300457 field = '%' + '0%sx' % fieldsize
458 return s + field % addr
Eli Benderskyd62928d2011-09-09 10:05:57 +0300459
eliben54e39b22011-09-19 13:10:57 +0300460 def _section_from_spec(self, spec):
461 """ Retrieve a section given a "spec" (either number or name).
Eli Benderskyc4a4c072011-09-17 15:28:28 +0300462 Return None if no such section exists in the file.
463 """
464 try:
465 num = int(spec)
eliben54e39b22011-09-19 13:10:57 +0300466 if num < self.elffile.num_sections():
467 return self.elffile.get_section(num)
468 else:
469 return None
Eli Benderskyc4a4c072011-09-17 15:28:28 +0300470 except ValueError:
471 # Not a number. Must be a name then
eliben54e39b22011-09-19 13:10:57 +0300472 return self.elffile.get_section_by_name(spec)
Eli Benderskyc4a4c072011-09-17 15:28:28 +0300473
Eli Benderskyadf707a2011-09-23 15:23:41 +0300474 def _note_relocs_for_section(self, section):
475 """ If there are relocation sections pointing to the givne section,
476 emit a note about it.
477 """
478 for relsec in self.elffile.iter_sections():
479 if isinstance(relsec, RelocationSection):
480 info_idx = relsec['sh_info']
481 if self.elffile.get_section(info_idx) == section:
482 self._emitline(' Note: This section has relocations against it, but these have NOT been applied to this dump.')
483 return
484
eliben0fc47af2011-10-02 13:47:12 +0200485 def _init_dwarfinfo(self):
486 """ Initialize the DWARF info contained in the file and assign it to
487 self._dwarfinfo.
488 Leave self._dwarfinfo at None if no DWARF info was found in the file
489 """
490 if self._dwarfinfo is not None:
491 return
492
493 if self.elffile.has_dwarf_info():
494 self._dwarfinfo = self.elffile.get_dwarf_info()
495 else:
496 self._dwarfinfo = None
497
498 def _dump_debug_info(self):
499 """ Dump the debugging info section.
500 """
eliben985c2c12011-11-14 17:53:23 +0200501 self._emitline('Contents of the .debug_info section:\n')
502
eliben0fc47af2011-10-02 13:47:12 +0200503 # Offset of the .debug_info section in the stream
Eli Bendersky149315a2011-11-24 08:12:37 +0200504 section_offset = self._dwarfinfo.debug_info_sec.global_offset
Eli Bendersky6062bf72011-11-23 06:54:40 +0200505
eliben0fc47af2011-10-02 13:47:12 +0200506 for cu in self._dwarfinfo.iter_CUs():
eliben985c2c12011-11-14 17:53:23 +0200507 self._emitline(' Compilation Unit @ offset %s:' %
Eli Bendersky149315a2011-11-24 08:12:37 +0200508 self._format_hex(cu.cu_offset))
eliben0fc47af2011-10-02 13:47:12 +0200509 self._emitline(' Length: %s (%s)' % (
510 self._format_hex(cu['unit_length']),
511 '%s-bit' % cu.dwarf_format()))
512 self._emitline(' Version: %s' % cu['version']),
513 self._emitline(' Abbrev Offset: %s' % cu['debug_abbrev_offset']),
514 self._emitline(' Pointer Size: %s' % cu['address_size'])
515
516 # The nesting depth of each DIE within the tree of DIEs must be
517 # displayed. To implement this, a counter is incremented each time
518 # the current DIE has children, and decremented when a null die is
519 # encountered. Due to the way the DIE tree is serialized, this will
520 # correctly reflect the nesting depth
521 #
522 die_depth = 0
523 for die in cu.iter_DIEs():
524 if die.is_null():
525 die_depth -= 1
526 continue
elibenaee11d22011-10-26 10:42:34 +0200527 self._emitline(' <%s><%x>: Abbrev Number: %s (%s)' % (
528 die_depth,
Eli Bendersky149315a2011-11-24 08:12:37 +0200529 die.offset,
elibenaee11d22011-10-26 10:42:34 +0200530 die.abbrev_code,
531 die.tag))
532
Eli Bendersky41c971a2011-10-27 14:29:32 +0200533 for attr in die.attributes.itervalues():
elibenaee11d22011-10-26 10:42:34 +0200534 self._emitline(' <%2x> %-18s: %s' % (
Eli Bendersky149315a2011-11-24 08:12:37 +0200535 attr.offset,
Eli Bendersky41c971a2011-10-27 14:29:32 +0200536 attr.name,
eliben3bc9c342011-10-26 13:10:58 +0200537 describe_attr_value(
Eli Bendersky5be3be82011-10-27 14:28:12 +0200538 attr, die, section_offset)))
eliben0fc47af2011-10-02 13:47:12 +0200539
540 if die.has_children:
541 die_depth += 1
elibenaee11d22011-10-26 10:42:34 +0200542
Eli Benderskyf5670e82011-11-24 09:05:44 +0200543 self._emitline()
eliben0fc47af2011-10-02 13:47:12 +0200544
Eli Bendersky5ec2dde2011-12-04 07:05:31 +0200545 def _dump_debug_line_programs(self):
546 """ Dump the (decoded) line programs from .debug_line
547 The programs are dumped in the order of the CUs they belong to.
548 """
Eli Benderskybf83b1b2011-12-06 06:48:10 +0200549 self._emitline('Decoded dump of debug contents of section .debug_line:\n')
Eli Bendersky5ec2dde2011-12-04 07:05:31 +0200550
551 for cu in self._dwarfinfo.iter_CUs():
552 lineprogram = self._dwarfinfo.line_program_for_CU(cu)
553
554 cu_filename = ''
555 if len(lineprogram['include_directory']) > 0:
556 cu_filename = '%s/%s' % (
557 lineprogram['include_directory'][0],
558 lineprogram['file_entry'][0].name)
559 else:
560 cu_filename = lineprogram['file_entry'][0].name
561
562 self._emitline('CU: %s:' % cu_filename)
563 self._emitline('File name Line number Starting address')
564
Eli Benderskybf83b1b2011-12-06 06:48:10 +0200565 # Print each state's file, line and address information. For some
566 # instructions other output is needed to be compatible with
567 # readelf.
568 for entry in lineprogram.get_entries():
569 state = entry.state
570 if state is None:
571 # Special handling for commands that don't set a new state
572 if entry.command == DW_LNS_set_file:
573 file_entry = lineprogram['file_entry'][entry.args[0] - 1]
574 if file_entry.dir_index == 0:
575 # current directory
576 self._emitline('\n./%s:[++]' % (
577 file_entry.name))
578 else:
579 self._emitline('\n%s/%s:' % (
580 lineprogram['include_directory'][file_entry.dir_index - 1],
581 file_entry.name))
582 elif entry.command == DW_LNE_define_file:
583 self._emitline('%s:' % (
584 lineprogram['include_directory'][entry.args[0].dir_index]))
585 elif not state.end_sequence:
586 # readelf doesn't print the state after end_sequence
587 # instructions. I think it's a bug but to be compatible
588 # I don't print them too.
Eli Bendersky5ec2dde2011-12-04 07:05:31 +0200589 self._emitline('%-35s %11d %18s' % (
590 lineprogram['file_entry'][state.file - 1].name,
591 state.line,
592 '0' if state.address == 0 else
593 self._format_hex(state.address)))
Eli Benderskybf83b1b2011-12-06 06:48:10 +0200594 if entry.command == DW_LNS_copy:
595 # Another readelf oddity...
596 self._emitline()
Eli Bendersky5ec2dde2011-12-04 07:05:31 +0200597
Eli Bendersky26de2ac2011-09-13 06:50:28 +0300598 def _emit(self, s=''):
Eli Bendersky933f6992011-09-09 08:11:06 +0300599 """ Emit an object to output
600 """
601 self.output.write(str(s))
Eli Benderskyd62928d2011-09-09 10:05:57 +0300602
Eli Bendersky26de2ac2011-09-13 06:50:28 +0300603 def _emitline(self, s=''):
Eli Bendersky933f6992011-09-09 08:11:06 +0300604 """ Emit an object to output, followed by a newline
605 """
606 self.output.write(str(s) + '\n')
607
608
Eli Bendersky0b27ba42011-09-17 06:44:02 +0300609SCRIPT_DESCRIPTION = 'Display information about the contents of ELF format files'
610VERSION_STRING = '%%prog: based on pyelftools %s' % __version__
611
612
Eli Bendersky0193fb82011-11-26 16:16:16 +0200613def main(stream=None):
Eli Bendersky0b27ba42011-09-17 06:44:02 +0300614 # parse the command-line arguments and invoke ReadElf
Eli Bendersky40eb1702011-09-16 16:59:52 +0300615 optparser = OptionParser(
Eli Benderskyecde41b2011-09-16 17:16:20 +0300616 usage='usage: %prog [options] <elf-file>',
Eli Bendersky0b27ba42011-09-17 06:44:02 +0300617 description=SCRIPT_DESCRIPTION,
Eli Bendersky40eb1702011-09-16 16:59:52 +0300618 add_help_option=False, # -h is a real option of readelf
Eli Bendersky0b27ba42011-09-17 06:44:02 +0300619 prog='readelf.py',
620 version=VERSION_STRING)
Eli Bendersky40eb1702011-09-16 16:59:52 +0300621 optparser.add_option('-H', '--help',
622 action='store_true', dest='help',
623 help='Display this information')
624 optparser.add_option('-h', '--file-header',
Eli Benderskyecde41b2011-09-16 17:16:20 +0300625 action='store_true', dest='show_file_header',
626 help='Display the ELF file header')
Eli Bendersky40eb1702011-09-16 16:59:52 +0300627 optparser.add_option('-l', '--program-headers', '--segments',
Eli Bendersky0b27ba42011-09-17 06:44:02 +0300628 action='store_true', dest='show_program_header',
Eli Benderskyecde41b2011-09-16 17:16:20 +0300629 help='Display the program headers')
Eli Bendersky40eb1702011-09-16 16:59:52 +0300630 optparser.add_option('-S', '--section-headers', '--sections',
Eli Bendersky0b27ba42011-09-17 06:44:02 +0300631 action='store_true', dest='show_section_header',
Eli Benderskyecde41b2011-09-16 17:16:20 +0300632 help="Display the sections' headers")
Eli Bendersky40eb1702011-09-16 16:59:52 +0300633 optparser.add_option('-e', '--headers',
Eli Benderskyecde41b2011-09-16 17:16:20 +0300634 action='store_true', dest='show_all_headers',
635 help='Equivalent to: -h -l -S')
Eli Bendersky40eb1702011-09-16 16:59:52 +0300636 optparser.add_option('-s', '--symbols', '--syms',
Eli Benderskyecde41b2011-09-16 17:16:20 +0300637 action='store_true', dest='show_symbols',
638 help='Display the symbol table')
Eli Bendersky84066b22011-09-20 06:48:52 +0300639 optparser.add_option('-r', '--relocs',
640 action='store_true', dest='show_relocs',
641 help='Display the relocations (if present)')
Eli Benderskyc4a4c072011-09-17 15:28:28 +0300642 optparser.add_option('-x', '--hex-dump',
643 action='store', dest='show_hex_dump', metavar='<number|name>',
644 help='Dump the contents of section <number|name> as bytes')
Eli Bendersky53e86db2011-09-18 06:04:30 +0300645 optparser.add_option('-p', '--string-dump',
646 action='store', dest='show_string_dump', metavar='<number|name>',
647 help='Dump the contents of section <number|name> as strings')
eliben0fc47af2011-10-02 13:47:12 +0200648 optparser.add_option('--debug-dump',
Eli Bendersky5ec2dde2011-12-04 07:05:31 +0200649 action='store', dest='debug_dump_what', metavar='<section>',
eliben0fc47af2011-10-02 13:47:12 +0200650 help='Display the contents of DWARF debug sections')
Eli Bendersky53e86db2011-09-18 06:04:30 +0300651
Eli Bendersky933f6992011-09-09 08:11:06 +0300652 options, args = optparser.parse_args()
653
Eli Bendersky40eb1702011-09-16 16:59:52 +0300654 if options.help or len(args) == 0:
655 optparser.print_help()
656 sys.exit(0)
657
Eli Bendersky0b27ba42011-09-17 06:44:02 +0300658 if options.show_all_headers:
659 do_file_header = do_section_header = do_program_header = True
660 else:
661 do_file_header = options.show_file_header
662 do_section_header = options.show_section_header
663 do_program_header = options.show_program_header
664
Eli Bendersky933f6992011-09-09 08:11:06 +0300665 with open(args[0], 'rb') as file:
666 try:
Eli Bendersky0193fb82011-11-26 16:16:16 +0200667 readelf = ReadElf(file, stream or sys.stdout)
Eli Bendersky0b27ba42011-09-17 06:44:02 +0300668 if do_file_header:
669 readelf.display_file_header()
Eli Bendersky0b27ba42011-09-17 06:44:02 +0300670 if do_section_header:
671 readelf.display_section_headers(
672 show_heading=not do_file_header)
Eli Bendersky2fc0f2a2011-09-17 10:39:29 +0300673 if do_program_header:
674 readelf.display_program_headers(
675 show_heading=not do_file_header)
Eli Bendersky0b27ba42011-09-17 06:44:02 +0300676 if options.show_symbols:
677 readelf.display_symbol_tables()
Eli Bendersky84066b22011-09-20 06:48:52 +0300678 if options.show_relocs:
679 readelf.display_relocations()
Eli Benderskyc4a4c072011-09-17 15:28:28 +0300680 if options.show_hex_dump:
681 readelf.display_hex_dump(options.show_hex_dump)
Eli Bendersky53e86db2011-09-18 06:04:30 +0300682 if options.show_string_dump:
683 readelf.display_string_dump(options.show_string_dump)
Eli Bendersky5ec2dde2011-12-04 07:05:31 +0200684 if options.debug_dump_what:
685 readelf.display_debug_dump(options.debug_dump_what)
Eli Bendersky933f6992011-09-09 08:11:06 +0300686 except ELFError as ex:
Eli Bendersky0b27ba42011-09-17 06:44:02 +0300687 sys.stderr.write('ELF error: %s\n' % ex)
Eli Bendersky933f6992011-09-09 08:11:06 +0300688 sys.exit(1)
689
690
Eli Bendersky0193fb82011-11-26 16:16:16 +0200691def profile_main():
692 # Run 'main' redirecting its output to readelfout.txt
693 # Saves profiling information in readelf.profile
694 PROFFILE = 'readelf.profile'
695 import cProfile
696 cProfile.run('main(open("readelfout.txt", "w"))', PROFFILE)
697
698 # Dig in some profiling stats
699 import pstats
700 p = pstats.Stats(PROFFILE)
701 p.sort_stats('cumulative').print_stats(25)
702
703
Eli Bendersky933f6992011-09-09 08:11:06 +0300704#-------------------------------------------------------------------------------
705if __name__ == '__main__':
Eli Bendersky4f4d80c2011-11-26 16:49:27 +0200706 main()
707 #profile_main()
Eli Bendersky0193fb82011-11-26 16:16:16 +0200708
Eli Bendersky933f6992011-09-09 08:11:06 +0300709