2 * Copyright (c) 2007-2012 Kai Wang
3 * Copyright (c) 2003 David O'Brien. All rights reserved.
4 * Copyright (c) 2001 Jake Burkholder
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
16 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
17 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
18 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
19 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
20 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
21 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
22 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 #include <sys/param.h>
30 #include <sys/queue.h>
46 #ifdef USE_LIBARCHIVE_AR
48 #include <archive_entry.h>
53 ELFTC_VCSID("$Id: elfdump.c 3250 2015-10-06 13:56:15Z emaste $");
55 #if defined(ELFTC_NEED_ELF_NOTE_DEFINITION)
56 #include "native-elf-format.h"
57 #if ELFTC_CLASS == ELFCLASS32
58 typedef Elf32_Nhdr Elf_Note;
60 typedef Elf64_Nhdr Elf_Note;
64 /* elfdump(1) options. */
66 #define ED_EHDR (1<<1)
68 #define ED_HASH (1<<3)
69 #define ED_INTERP (1<<4)
70 #define ED_NOTE (1<<5)
71 #define ED_PHDR (1<<6)
73 #define ED_SHDR (1<<8)
74 #define ED_SYMTAB (1<<9)
75 #define ED_SYMVER (1<<10)
76 #define ED_CHECKSUM (1<<11)
77 #define ED_ALL ((1<<12)-1)
79 /* elfdump(1) run control flags. */
80 #define SOLARIS_FMT (1<<0)
81 #define PRINT_FILENAME (1<<1)
82 #define PRINT_ARSYM (1<<2)
83 #define ONLY_ARSYM (1<<3)
85 /* Convenient print macro. */
86 #define PRT(...) fprintf(ed->out, __VA_ARGS__)
88 /* Internal data structure for sections. */
90 const char *name; /* section name */
91 Elf_Scn *scn; /* section scn */
92 uint64_t off; /* section offset */
93 uint64_t sz; /* section size */
94 uint64_t entsize; /* section entsize */
95 uint64_t align; /* section alignment */
96 uint64_t type; /* section type */
97 uint64_t flags; /* section flags */
98 uint64_t addr; /* section virtual addr */
99 uint32_t link; /* section link ndx */
100 uint32_t info; /* section info ndx */
105 STAILQ_ENTRY(spec_name) sn_list;
108 /* Structure encapsulates the global data for readelf(1). */
110 FILE *out; /* output redirection. */
111 const char *filename; /* current processing file. */
112 const char *archive; /* archive name */
113 int options; /* command line options. */
114 int flags; /* run control flags. */
115 Elf *elf; /* underlying ELF descriptor. */
116 #ifndef USE_LIBARCHIVE_AR
117 Elf *ar; /* ar(1) archive descriptor. */
119 GElf_Ehdr ehdr; /* ELF header. */
120 int ec; /* ELF class. */
121 size_t shnum; /* #sections. */
122 struct section *sl; /* list of sections. */
123 STAILQ_HEAD(, spec_name) snl; /* list of names specified by -N. */
126 /* Relocation entry. */
136 #if defined(ELFTC_NEED_BYTEORDER_EXTENSIONS)
137 static __inline uint32_t
138 be32dec(const void *pp)
140 unsigned char const *p = (unsigned char const *)pp;
142 return ((p[0] << 24) | (p[1] << 16) | (p[2] << 8) | p[3]);
145 static __inline uint32_t
146 le32dec(const void *pp)
148 unsigned char const *p = (unsigned char const *)pp;
150 return ((p[3] << 24) | (p[2] << 16) | (p[1] << 8) | p[0]);
154 /* http://www.sco.com/developers/gabi/latest/ch5.dynamic.html#tag_encodings */
159 case 0: return "DT_NULL";
160 case 1: return "DT_NEEDED";
161 case 2: return "DT_PLTRELSZ";
162 case 3: return "DT_PLTGOT";
163 case 4: return "DT_HASH";
164 case 5: return "DT_STRTAB";
165 case 6: return "DT_SYMTAB";
166 case 7: return "DT_RELA";
167 case 8: return "DT_RELASZ";
168 case 9: return "DT_RELAENT";
169 case 10: return "DT_STRSZ";
170 case 11: return "DT_SYMENT";
171 case 12: return "DT_INIT";
172 case 13: return "DT_FINI";
173 case 14: return "DT_SONAME";
174 case 15: return "DT_RPATH";
175 case 16: return "DT_SYMBOLIC";
176 case 17: return "DT_REL";
177 case 18: return "DT_RELSZ";
178 case 19: return "DT_RELENT";
179 case 20: return "DT_PLTREL";
180 case 21: return "DT_DEBUG";
181 case 22: return "DT_TEXTREL";
182 case 23: return "DT_JMPREL";
183 case 24: return "DT_BIND_NOW";
184 case 25: return "DT_INIT_ARRAY";
185 case 26: return "DT_FINI_ARRAY";
186 case 27: return "DT_INIT_ARRAYSZ";
187 case 28: return "DT_FINI_ARRAYSZ";
188 case 29: return "DT_RUNPATH";
189 case 30: return "DT_FLAGS";
190 case 32: return "DT_PREINIT_ARRAY"; /* XXX: DT_ENCODING */
191 case 33: return "DT_PREINIT_ARRAYSZ";
192 /* 0x6000000D - 0x6ffff000 operating system-specific semantics */
193 case 0x6ffffdf5: return "DT_GNU_PRELINKED";
194 case 0x6ffffdf6: return "DT_GNU_CONFLICTSZ";
195 case 0x6ffffdf7: return "DT_GNU_LIBLISTSZ";
196 case 0x6ffffdf8: return "DT_SUNW_CHECKSUM";
197 case 0x6ffffdf9: return "DT_PLTPADSZ";
198 case 0x6ffffdfa: return "DT_MOVEENT";
199 case 0x6ffffdfb: return "DT_MOVESZ";
200 case 0x6ffffdfc: return "DT_FEATURE";
201 case 0x6ffffdfd: return "DT_POSFLAG_1";
202 case 0x6ffffdfe: return "DT_SYMINSZ";
203 case 0x6ffffdff: return "DT_SYMINENT (DT_VALRNGHI)";
204 case 0x6ffffe00: return "DT_ADDRRNGLO";
205 case 0x6ffffef5: return "DT_GNU_HASH";
206 case 0x6ffffef8: return "DT_GNU_CONFLICT";
207 case 0x6ffffef9: return "DT_GNU_LIBLIST";
208 case 0x6ffffefa: return "DT_CONFIG";
209 case 0x6ffffefb: return "DT_DEPAUDIT";
210 case 0x6ffffefc: return "DT_AUDIT";
211 case 0x6ffffefd: return "DT_PLTPAD";
212 case 0x6ffffefe: return "DT_MOVETAB";
213 case 0x6ffffeff: return "DT_SYMINFO (DT_ADDRRNGHI)";
214 case 0x6ffffff9: return "DT_RELACOUNT";
215 case 0x6ffffffa: return "DT_RELCOUNT";
216 case 0x6ffffffb: return "DT_FLAGS_1";
217 case 0x6ffffffc: return "DT_VERDEF";
218 case 0x6ffffffd: return "DT_VERDEFNUM";
219 case 0x6ffffffe: return "DT_VERNEED";
220 case 0x6fffffff: return "DT_VERNEEDNUM";
221 case 0x6ffffff0: return "DT_GNU_VERSYM";
222 /* 0x70000000 - 0x7fffffff processor-specific semantics */
223 case 0x70000000: return "DT_IA_64_PLT_RESERVE";
224 case 0x7ffffffd: return "DT_SUNW_AUXILIARY";
225 case 0x7ffffffe: return "DT_SUNW_USED";
226 case 0x7fffffff: return "DT_SUNW_FILTER";
227 default: return "ERROR: TAG NOT DEFINED";
232 e_machines(unsigned int mach)
234 static char machdesc[64];
237 case EM_NONE: return "EM_NONE";
238 case EM_M32: return "EM_M32";
239 case EM_SPARC: return "EM_SPARC";
240 case EM_386: return "EM_386";
241 case EM_68K: return "EM_68K";
242 case EM_88K: return "EM_88K";
243 case EM_IAMCU: return "EM_IAMCU";
244 case EM_860: return "EM_860";
245 case EM_MIPS: return "EM_MIPS";
246 case EM_PPC: return "EM_PPC";
247 case EM_PPC64: return "EM_PPC64";
248 case EM_ARM: return "EM_ARM";
249 case EM_ALPHA: return "EM_ALPHA (legacy)";
250 case EM_SPARCV9:return "EM_SPARCV9";
251 case EM_IA_64: return "EM_IA_64";
252 case EM_X86_64: return "EM_X86_64";
253 case EM_AARCH64:return "EM_AARCH64";
254 case EM_RISCV: return "EM_RISCV";
256 snprintf(machdesc, sizeof(machdesc),
257 "(unknown machine) -- type 0x%x", mach);
261 static const char *e_types[] = {
262 "ET_NONE", "ET_REL", "ET_EXEC", "ET_DYN", "ET_CORE"
265 static const char *ei_versions[] = {
266 "EV_NONE", "EV_CURRENT"
269 static const char *ei_classes[] = {
270 "ELFCLASSNONE", "ELFCLASS32", "ELFCLASS64"
273 static const char *ei_data[] = {
274 "ELFDATANONE", "ELFDATA2LSB", "ELFDATA2MSB"
277 static const char *ei_abis[256] = {
278 "ELFOSABI_NONE", "ELFOSABI_HPUX", "ELFOSABI_NETBSD", "ELFOSABI_LINUX",
279 "ELFOSABI_HURD", "ELFOSABI_86OPEN", "ELFOSABI_SOLARIS", "ELFOSABI_AIX",
280 "ELFOSABI_IRIX", "ELFOSABI_FREEBSD", "ELFOSABI_TRU64",
281 "ELFOSABI_MODESTO", "ELFOSABI_OPENBSD",
282 [255] = "ELFOSABI_STANDALONE"
285 static const char *p_types[] = {
286 "PT_NULL", "PT_LOAD", "PT_DYNAMIC", "PT_INTERP", "PT_NOTE",
287 "PT_SHLIB", "PT_PHDR", "PT_TLS"
290 static const char *p_flags[] = {
291 "", "PF_X", "PF_W", "PF_X|PF_W", "PF_R", "PF_X|PF_R", "PF_W|PF_R",
296 sh_name(struct elfdump *ed, int ndx)
301 case SHN_UNDEF: return "UNDEF";
302 case SHN_ABS: return "ABS";
303 case SHN_COMMON: return "COMMON";
305 if ((uint64_t)ndx < ed->shnum)
306 return (ed->sl[ndx].name);
308 snprintf(num, sizeof(num), "%d", ndx);
314 /* http://www.sco.com/developers/gabi/latest/ch4.sheader.html#sh_type */
316 sh_types(u_int64_t sht) {
318 case 0: return "SHT_NULL";
319 case 1: return "SHT_PROGBITS";
320 case 2: return "SHT_SYMTAB";
321 case 3: return "SHT_STRTAB";
322 case 4: return "SHT_RELA";
323 case 5: return "SHT_HASH";
324 case 6: return "SHT_DYNAMIC";
325 case 7: return "SHT_NOTE";
326 case 8: return "SHT_NOBITS";
327 case 9: return "SHT_REL";
328 case 10: return "SHT_SHLIB";
329 case 11: return "SHT_DYNSYM";
330 case 14: return "SHT_INIT_ARRAY";
331 case 15: return "SHT_FINI_ARRAY";
332 case 16: return "SHT_PREINIT_ARRAY";
333 case 17: return "SHT_GROUP";
334 case 18: return "SHT_SYMTAB_SHNDX";
335 /* 0x60000000 - 0x6fffffff operating system-specific semantics */
336 case 0x6ffffff0: return "XXX:VERSYM";
337 case 0x6ffffff4: return "SHT_SUNW_dof";
338 case 0x6ffffff6: return "SHT_GNU_HASH";
339 case 0x6ffffff7: return "SHT_GNU_LIBLIST";
340 case 0x6ffffffc: return "XXX:VERDEF";
341 case 0x6ffffffd: return "SHT_SUNW(GNU)_verdef";
342 case 0x6ffffffe: return "SHT_SUNW(GNU)_verneed";
343 case 0x6fffffff: return "SHT_SUNW(GNU)_versym";
344 /* 0x70000000 - 0x7fffffff processor-specific semantics */
345 case 0x70000000: return "SHT_IA_64_EXT";
346 case 0x70000001: return "SHT_IA_64_UNWIND";
347 case 0x7ffffffd: return "XXX:AUXILIARY";
348 case 0x7fffffff: return "XXX:FILTER";
349 /* 0x80000000 - 0xffffffff application programs */
350 default: return "ERROR: SHT NOT DEFINED";
355 * Define known section flags. These flags are defined in the order
356 * they are to be printed out.
358 #define DEFINE_SHFLAGS() \
361 DEFINE_SHF(EXECINSTR) \
363 DEFINE_SHF(STRINGS) \
364 DEFINE_SHF(INFO_LINK) \
365 DEFINE_SHF(LINK_ORDER) \
366 DEFINE_SHF(OS_NONCONFORMING) \
371 #define DEFINE_SHF(F) "SHF_" #F "|"
372 #define ALLSHFLAGS DEFINE_SHFLAGS()
375 sh_flags(uint64_t shf)
377 static char flg[sizeof(ALLSHFLAGS)+1];
382 #define DEFINE_SHF(N) \
384 strcat(flg, "SHF_" #N "|"); \
388 flg[strlen(flg) - 1] = '\0'; /* Remove the trailing "|". */
393 static const char *st_types[] = {
394 "STT_NOTYPE", "STT_OBJECT", "STT_FUNC", "STT_SECTION", "STT_FILE",
395 "STT_COMMON", "STT_TLS"
398 static const char *st_types_S[] = {
399 "NOTY", "OBJT", "FUNC", "SECT", "FILE"
402 static const char *st_bindings[] = {
403 "STB_LOCAL", "STB_GLOBAL", "STB_WEAK"
406 static const char *st_bindings_S[] = {
407 "LOCL", "GLOB", "WEAK"
410 static unsigned char st_others[] = {
415 r_type(unsigned int mach, unsigned int type)
418 case EM_NONE: return "";
422 case 0: return "R_386_NONE";
423 case 1: return "R_386_32";
424 case 2: return "R_386_PC32";
425 case 3: return "R_386_GOT32";
426 case 4: return "R_386_PLT32";
427 case 5: return "R_386_COPY";
428 case 6: return "R_386_GLOB_DAT";
429 case 7: return "R_386_JMP_SLOT";
430 case 8: return "R_386_RELATIVE";
431 case 9: return "R_386_GOTOFF";
432 case 10: return "R_386_GOTPC";
433 case 14: return "R_386_TLS_TPOFF";
434 case 15: return "R_386_TLS_IE";
435 case 16: return "R_386_TLS_GOTIE";
436 case 17: return "R_386_TLS_LE";
437 case 18: return "R_386_TLS_GD";
438 case 19: return "R_386_TLS_LDM";
439 case 24: return "R_386_TLS_GD_32";
440 case 25: return "R_386_TLS_GD_PUSH";
441 case 26: return "R_386_TLS_GD_CALL";
442 case 27: return "R_386_TLS_GD_POP";
443 case 28: return "R_386_TLS_LDM_32";
444 case 29: return "R_386_TLS_LDM_PUSH";
445 case 30: return "R_386_TLS_LDM_CALL";
446 case 31: return "R_386_TLS_LDM_POP";
447 case 32: return "R_386_TLS_LDO_32";
448 case 33: return "R_386_TLS_IE_32";
449 case 34: return "R_386_TLS_LE_32";
450 case 35: return "R_386_TLS_DTPMOD32";
451 case 36: return "R_386_TLS_DTPOFF32";
452 case 37: return "R_386_TLS_TPOFF32";
457 case 0: return "R_ARM_NONE";
458 case 1: return "R_ARM_PC24";
459 case 2: return "R_ARM_ABS32";
460 case 3: return "R_ARM_REL32";
461 case 4: return "R_ARM_PC13";
462 case 5: return "R_ARM_ABS16";
463 case 6: return "R_ARM_ABS12";
464 case 7: return "R_ARM_THM_ABS5";
465 case 8: return "R_ARM_ABS8";
466 case 9: return "R_ARM_SBREL32";
467 case 10: return "R_ARM_THM_PC22";
468 case 11: return "R_ARM_THM_PC8";
469 case 12: return "R_ARM_AMP_VCALL9";
470 case 13: return "R_ARM_SWI24";
471 case 14: return "R_ARM_THM_SWI8";
472 case 15: return "R_ARM_XPC25";
473 case 16: return "R_ARM_THM_XPC22";
474 case 20: return "R_ARM_COPY";
475 case 21: return "R_ARM_GLOB_DAT";
476 case 22: return "R_ARM_JUMP_SLOT";
477 case 23: return "R_ARM_RELATIVE";
478 case 24: return "R_ARM_GOTOFF";
479 case 25: return "R_ARM_GOTPC";
480 case 26: return "R_ARM_GOT32";
481 case 27: return "R_ARM_PLT32";
482 case 100: return "R_ARM_GNU_VTENTRY";
483 case 101: return "R_ARM_GNU_VTINHERIT";
484 case 250: return "R_ARM_RSBREL32";
485 case 251: return "R_ARM_THM_RPC22";
486 case 252: return "R_ARM_RREL32";
487 case 253: return "R_ARM_RABS32";
488 case 254: return "R_ARM_RPC24";
489 case 255: return "R_ARM_RBASE";
494 case 0: return "R_IA_64_NONE";
495 case 33: return "R_IA_64_IMM14";
496 case 34: return "R_IA_64_IMM22";
497 case 35: return "R_IA_64_IMM64";
498 case 36: return "R_IA_64_DIR32MSB";
499 case 37: return "R_IA_64_DIR32LSB";
500 case 38: return "R_IA_64_DIR64MSB";
501 case 39: return "R_IA_64_DIR64LSB";
502 case 42: return "R_IA_64_GPREL22";
503 case 43: return "R_IA_64_GPREL64I";
504 case 44: return "R_IA_64_GPREL32MSB";
505 case 45: return "R_IA_64_GPREL32LSB";
506 case 46: return "R_IA_64_GPREL64MSB";
507 case 47: return "R_IA_64_GPREL64LSB";
508 case 50: return "R_IA_64_LTOFF22";
509 case 51: return "R_IA_64_LTOFF64I";
510 case 58: return "R_IA_64_PLTOFF22";
511 case 59: return "R_IA_64_PLTOFF64I";
512 case 62: return "R_IA_64_PLTOFF64MSB";
513 case 63: return "R_IA_64_PLTOFF64LSB";
514 case 67: return "R_IA_64_FPTR64I";
515 case 68: return "R_IA_64_FPTR32MSB";
516 case 69: return "R_IA_64_FPTR32LSB";
517 case 70: return "R_IA_64_FPTR64MSB";
518 case 71: return "R_IA_64_FPTR64LSB";
519 case 72: return "R_IA_64_PCREL60B";
520 case 73: return "R_IA_64_PCREL21B";
521 case 74: return "R_IA_64_PCREL21M";
522 case 75: return "R_IA_64_PCREL21F";
523 case 76: return "R_IA_64_PCREL32MSB";
524 case 77: return "R_IA_64_PCREL32LSB";
525 case 78: return "R_IA_64_PCREL64MSB";
526 case 79: return "R_IA_64_PCREL64LSB";
527 case 82: return "R_IA_64_LTOFF_FPTR22";
528 case 83: return "R_IA_64_LTOFF_FPTR64I";
529 case 84: return "R_IA_64_LTOFF_FPTR32MSB";
530 case 85: return "R_IA_64_LTOFF_FPTR32LSB";
531 case 86: return "R_IA_64_LTOFF_FPTR64MSB";
532 case 87: return "R_IA_64_LTOFF_FPTR64LSB";
533 case 92: return "R_IA_64_SEGREL32MSB";
534 case 93: return "R_IA_64_SEGREL32LSB";
535 case 94: return "R_IA_64_SEGREL64MSB";
536 case 95: return "R_IA_64_SEGREL64LSB";
537 case 100: return "R_IA_64_SECREL32MSB";
538 case 101: return "R_IA_64_SECREL32LSB";
539 case 102: return "R_IA_64_SECREL64MSB";
540 case 103: return "R_IA_64_SECREL64LSB";
541 case 108: return "R_IA_64_REL32MSB";
542 case 109: return "R_IA_64_REL32LSB";
543 case 110: return "R_IA_64_REL64MSB";
544 case 111: return "R_IA_64_REL64LSB";
545 case 116: return "R_IA_64_LTV32MSB";
546 case 117: return "R_IA_64_LTV32LSB";
547 case 118: return "R_IA_64_LTV64MSB";
548 case 119: return "R_IA_64_LTV64LSB";
549 case 121: return "R_IA_64_PCREL21BI";
550 case 122: return "R_IA_64_PCREL22";
551 case 123: return "R_IA_64_PCREL64I";
552 case 128: return "R_IA_64_IPLTMSB";
553 case 129: return "R_IA_64_IPLTLSB";
554 case 133: return "R_IA_64_SUB";
555 case 134: return "R_IA_64_LTOFF22X";
556 case 135: return "R_IA_64_LDXMOV";
557 case 145: return "R_IA_64_TPREL14";
558 case 146: return "R_IA_64_TPREL22";
559 case 147: return "R_IA_64_TPREL64I";
560 case 150: return "R_IA_64_TPREL64MSB";
561 case 151: return "R_IA_64_TPREL64LSB";
562 case 154: return "R_IA_64_LTOFF_TPREL22";
563 case 166: return "R_IA_64_DTPMOD64MSB";
564 case 167: return "R_IA_64_DTPMOD64LSB";
565 case 170: return "R_IA_64_LTOFF_DTPMOD22";
566 case 177: return "R_IA_64_DTPREL14";
567 case 178: return "R_IA_64_DTPREL22";
568 case 179: return "R_IA_64_DTPREL64I";
569 case 180: return "R_IA_64_DTPREL32MSB";
570 case 181: return "R_IA_64_DTPREL32LSB";
571 case 182: return "R_IA_64_DTPREL64MSB";
572 case 183: return "R_IA_64_DTPREL64LSB";
573 case 186: return "R_IA_64_LTOFF_DTPREL22";
578 case 0: return "R_MIPS_NONE";
579 case 1: return "R_MIPS_16";
580 case 2: return "R_MIPS_32";
581 case 3: return "R_MIPS_REL32";
582 case 4: return "R_MIPS_26";
583 case 5: return "R_MIPS_HI16";
584 case 6: return "R_MIPS_LO16";
585 case 7: return "R_MIPS_GPREL16";
586 case 8: return "R_MIPS_LITERAL";
587 case 9: return "R_MIPS_GOT16";
588 case 10: return "R_MIPS_PC16";
589 case 11: return "R_MIPS_CALL16";
590 case 12: return "R_MIPS_GPREL32";
591 case 21: return "R_MIPS_GOTHI16";
592 case 22: return "R_MIPS_GOTLO16";
593 case 30: return "R_MIPS_CALLHI16";
594 case 31: return "R_MIPS_CALLLO16";
599 case 0: return "R_PPC_NONE";
600 case 1: return "R_PPC_ADDR32";
601 case 2: return "R_PPC_ADDR24";
602 case 3: return "R_PPC_ADDR16";
603 case 4: return "R_PPC_ADDR16_LO";
604 case 5: return "R_PPC_ADDR16_HI";
605 case 6: return "R_PPC_ADDR16_HA";
606 case 7: return "R_PPC_ADDR14";
607 case 8: return "R_PPC_ADDR14_BRTAKEN";
608 case 9: return "R_PPC_ADDR14_BRNTAKEN";
609 case 10: return "R_PPC_REL24";
610 case 11: return "R_PPC_REL14";
611 case 12: return "R_PPC_REL14_BRTAKEN";
612 case 13: return "R_PPC_REL14_BRNTAKEN";
613 case 14: return "R_PPC_GOT16";
614 case 15: return "R_PPC_GOT16_LO";
615 case 16: return "R_PPC_GOT16_HI";
616 case 17: return "R_PPC_GOT16_HA";
617 case 18: return "R_PPC_PLTREL24";
618 case 19: return "R_PPC_COPY";
619 case 20: return "R_PPC_GLOB_DAT";
620 case 21: return "R_PPC_JMP_SLOT";
621 case 22: return "R_PPC_RELATIVE";
622 case 23: return "R_PPC_LOCAL24PC";
623 case 24: return "R_PPC_UADDR32";
624 case 25: return "R_PPC_UADDR16";
625 case 26: return "R_PPC_REL32";
626 case 27: return "R_PPC_PLT32";
627 case 28: return "R_PPC_PLTREL32";
628 case 29: return "R_PPC_PLT16_LO";
629 case 30: return "R_PPC_PLT16_HI";
630 case 31: return "R_PPC_PLT16_HA";
631 case 32: return "R_PPC_SDAREL16";
632 case 33: return "R_PPC_SECTOFF";
633 case 34: return "R_PPC_SECTOFF_LO";
634 case 35: return "R_PPC_SECTOFF_HI";
635 case 36: return "R_PPC_SECTOFF_HA";
636 case 67: return "R_PPC_TLS";
637 case 68: return "R_PPC_DTPMOD32";
638 case 69: return "R_PPC_TPREL16";
639 case 70: return "R_PPC_TPREL16_LO";
640 case 71: return "R_PPC_TPREL16_HI";
641 case 72: return "R_PPC_TPREL16_HA";
642 case 73: return "R_PPC_TPREL32";
643 case 74: return "R_PPC_DTPREL16";
644 case 75: return "R_PPC_DTPREL16_LO";
645 case 76: return "R_PPC_DTPREL16_HI";
646 case 77: return "R_PPC_DTPREL16_HA";
647 case 78: return "R_PPC_DTPREL32";
648 case 79: return "R_PPC_GOT_TLSGD16";
649 case 80: return "R_PPC_GOT_TLSGD16_LO";
650 case 81: return "R_PPC_GOT_TLSGD16_HI";
651 case 82: return "R_PPC_GOT_TLSGD16_HA";
652 case 83: return "R_PPC_GOT_TLSLD16";
653 case 84: return "R_PPC_GOT_TLSLD16_LO";
654 case 85: return "R_PPC_GOT_TLSLD16_HI";
655 case 86: return "R_PPC_GOT_TLSLD16_HA";
656 case 87: return "R_PPC_GOT_TPREL16";
657 case 88: return "R_PPC_GOT_TPREL16_LO";
658 case 89: return "R_PPC_GOT_TPREL16_HI";
659 case 90: return "R_PPC_GOT_TPREL16_HA";
660 case 101: return "R_PPC_EMB_NADDR32";
661 case 102: return "R_PPC_EMB_NADDR16";
662 case 103: return "R_PPC_EMB_NADDR16_LO";
663 case 104: return "R_PPC_EMB_NADDR16_HI";
664 case 105: return "R_PPC_EMB_NADDR16_HA";
665 case 106: return "R_PPC_EMB_SDAI16";
666 case 107: return "R_PPC_EMB_SDA2I16";
667 case 108: return "R_PPC_EMB_SDA2REL";
668 case 109: return "R_PPC_EMB_SDA21";
669 case 110: return "R_PPC_EMB_MRKREF";
670 case 111: return "R_PPC_EMB_RELSEC16";
671 case 112: return "R_PPC_EMB_RELST_LO";
672 case 113: return "R_PPC_EMB_RELST_HI";
673 case 114: return "R_PPC_EMB_RELST_HA";
674 case 115: return "R_PPC_EMB_BIT_FLD";
675 case 116: return "R_PPC_EMB_RELSDA";
681 case 0: return "R_SPARC_NONE";
682 case 1: return "R_SPARC_8";
683 case 2: return "R_SPARC_16";
684 case 3: return "R_SPARC_32";
685 case 4: return "R_SPARC_DISP8";
686 case 5: return "R_SPARC_DISP16";
687 case 6: return "R_SPARC_DISP32";
688 case 7: return "R_SPARC_WDISP30";
689 case 8: return "R_SPARC_WDISP22";
690 case 9: return "R_SPARC_HI22";
691 case 10: return "R_SPARC_22";
692 case 11: return "R_SPARC_13";
693 case 12: return "R_SPARC_LO10";
694 case 13: return "R_SPARC_GOT10";
695 case 14: return "R_SPARC_GOT13";
696 case 15: return "R_SPARC_GOT22";
697 case 16: return "R_SPARC_PC10";
698 case 17: return "R_SPARC_PC22";
699 case 18: return "R_SPARC_WPLT30";
700 case 19: return "R_SPARC_COPY";
701 case 20: return "R_SPARC_GLOB_DAT";
702 case 21: return "R_SPARC_JMP_SLOT";
703 case 22: return "R_SPARC_RELATIVE";
704 case 23: return "R_SPARC_UA32";
705 case 24: return "R_SPARC_PLT32";
706 case 25: return "R_SPARC_HIPLT22";
707 case 26: return "R_SPARC_LOPLT10";
708 case 27: return "R_SPARC_PCPLT32";
709 case 28: return "R_SPARC_PCPLT22";
710 case 29: return "R_SPARC_PCPLT10";
711 case 30: return "R_SPARC_10";
712 case 31: return "R_SPARC_11";
713 case 32: return "R_SPARC_64";
714 case 33: return "R_SPARC_OLO10";
715 case 34: return "R_SPARC_HH22";
716 case 35: return "R_SPARC_HM10";
717 case 36: return "R_SPARC_LM22";
718 case 37: return "R_SPARC_PC_HH22";
719 case 38: return "R_SPARC_PC_HM10";
720 case 39: return "R_SPARC_PC_LM22";
721 case 40: return "R_SPARC_WDISP16";
722 case 41: return "R_SPARC_WDISP19";
723 case 42: return "R_SPARC_GLOB_JMP";
724 case 43: return "R_SPARC_7";
725 case 44: return "R_SPARC_5";
726 case 45: return "R_SPARC_6";
727 case 46: return "R_SPARC_DISP64";
728 case 47: return "R_SPARC_PLT64";
729 case 48: return "R_SPARC_HIX22";
730 case 49: return "R_SPARC_LOX10";
731 case 50: return "R_SPARC_H44";
732 case 51: return "R_SPARC_M44";
733 case 52: return "R_SPARC_L44";
734 case 53: return "R_SPARC_REGISTER";
735 case 54: return "R_SPARC_UA64";
736 case 55: return "R_SPARC_UA16";
737 case 56: return "R_SPARC_TLS_GD_HI22";
738 case 57: return "R_SPARC_TLS_GD_LO10";
739 case 58: return "R_SPARC_TLS_GD_ADD";
740 case 59: return "R_SPARC_TLS_GD_CALL";
741 case 60: return "R_SPARC_TLS_LDM_HI22";
742 case 61: return "R_SPARC_TLS_LDM_LO10";
743 case 62: return "R_SPARC_TLS_LDM_ADD";
744 case 63: return "R_SPARC_TLS_LDM_CALL";
745 case 64: return "R_SPARC_TLS_LDO_HIX22";
746 case 65: return "R_SPARC_TLS_LDO_LOX10";
747 case 66: return "R_SPARC_TLS_LDO_ADD";
748 case 67: return "R_SPARC_TLS_IE_HI22";
749 case 68: return "R_SPARC_TLS_IE_LO10";
750 case 69: return "R_SPARC_TLS_IE_LD";
751 case 70: return "R_SPARC_TLS_IE_LDX";
752 case 71: return "R_SPARC_TLS_IE_ADD";
753 case 72: return "R_SPARC_TLS_LE_HIX22";
754 case 73: return "R_SPARC_TLS_LE_LOX10";
755 case 74: return "R_SPARC_TLS_DTPMOD32";
756 case 75: return "R_SPARC_TLS_DTPMOD64";
757 case 76: return "R_SPARC_TLS_DTPOFF32";
758 case 77: return "R_SPARC_TLS_DTPOFF64";
759 case 78: return "R_SPARC_TLS_TPOFF32";
760 case 79: return "R_SPARC_TLS_TPOFF64";
765 case 0: return "R_X86_64_NONE";
766 case 1: return "R_X86_64_64";
767 case 2: return "R_X86_64_PC32";
768 case 3: return "R_X86_64_GOT32";
769 case 4: return "R_X86_64_PLT32";
770 case 5: return "R_X86_64_COPY";
771 case 6: return "R_X86_64_GLOB_DAT";
772 case 7: return "R_X86_64_JMP_SLOT";
773 case 8: return "R_X86_64_RELATIVE";
774 case 9: return "R_X86_64_GOTPCREL";
775 case 10: return "R_X86_64_32";
776 case 11: return "R_X86_64_32S";
777 case 12: return "R_X86_64_16";
778 case 13: return "R_X86_64_PC16";
779 case 14: return "R_X86_64_8";
780 case 15: return "R_X86_64_PC8";
781 case 16: return "R_X86_64_DTPMOD64";
782 case 17: return "R_X86_64_DTPOFF64";
783 case 18: return "R_X86_64_TPOFF64";
784 case 19: return "R_X86_64_TLSGD";
785 case 20: return "R_X86_64_TLSLD";
786 case 21: return "R_X86_64_DTPOFF32";
787 case 22: return "R_X86_64_GOTTPOFF";
788 case 23: return "R_X86_64_TPOFF32";
795 static void add_name(struct elfdump *ed, const char *name);
796 static void elf_print_object(struct elfdump *ed);
797 static void elf_print_elf(struct elfdump *ed);
798 static void elf_print_ehdr(struct elfdump *ed);
799 static void elf_print_phdr(struct elfdump *ed);
800 static void elf_print_shdr(struct elfdump *ed);
801 static void elf_print_symtab(struct elfdump *ed, int i);
802 static void elf_print_symtabs(struct elfdump *ed);
803 static void elf_print_symver(struct elfdump *ed);
804 static void elf_print_verdef(struct elfdump *ed, struct section *s);
805 static void elf_print_verneed(struct elfdump *ed, struct section *s);
806 static void elf_print_interp(struct elfdump *ed);
807 static void elf_print_dynamic(struct elfdump *ed);
808 static void elf_print_rel_entry(struct elfdump *ed, struct section *s,
809 int j, struct rel_entry *r);
810 static void elf_print_rela(struct elfdump *ed, struct section *s,
812 static void elf_print_rel(struct elfdump *ed, struct section *s,
814 static void elf_print_reloc(struct elfdump *ed);
815 static void elf_print_got(struct elfdump *ed);
816 static void elf_print_got_section(struct elfdump *ed, struct section *s);
817 static void elf_print_note(struct elfdump *ed);
818 static void elf_print_svr4_hash(struct elfdump *ed, struct section *s);
819 static void elf_print_svr4_hash64(struct elfdump *ed, struct section *s);
820 static void elf_print_gnu_hash(struct elfdump *ed, struct section *s);
821 static void elf_print_hash(struct elfdump *ed);
822 static void elf_print_checksum(struct elfdump *ed);
823 static void find_gotrel(struct elfdump *ed, struct section *gs,
824 struct rel_entry *got);
825 static struct spec_name *find_name(struct elfdump *ed, const char *name);
826 static int get_ent_count(const struct section *s, int *ent_count);
827 static const char *get_symbol_name(struct elfdump *ed, int symtab, int i);
828 static const char *get_string(struct elfdump *ed, int strtab, size_t off);
829 static void get_versym(struct elfdump *ed, int i, uint16_t **vs, int *nvs);
830 static void load_sections(struct elfdump *ed);
831 static void unload_sections(struct elfdump *ed);
832 static void usage(void);
833 #ifdef USE_LIBARCHIVE_AR
834 static int ac_detect_ar(int fd);
835 static void ac_print_ar(struct elfdump *ed, int fd);
837 static void elf_print_ar(struct elfdump *ed, int fd);
838 #endif /* USE_LIBARCHIVE_AR */
840 static struct option elfdump_longopts[] =
842 { "help", no_argument, NULL, 'H' },
843 { "version", no_argument, NULL, 'V' },
848 main(int ac, char **av)
850 struct elfdump *ed, ed_storage;
851 struct spec_name *sn;
855 memset(ed, 0, sizeof(*ed));
856 STAILQ_INIT(&ed->snl);
858 while ((ch = getopt_long(ac, av, "acdeiGHhknN:prsSvVw:",
859 elfdump_longopts, NULL)) != -1)
862 ed->options = ED_ALL;
865 ed->options |= ED_SHDR;
868 ed->options |= ED_DYN;
871 ed->options |= ED_EHDR;
874 ed->options |= ED_INTERP;
877 ed->options |= ED_GOT;
880 ed->options |= ED_HASH;
883 ed->options |= ED_CHECKSUM;
886 ed->options |= ED_NOTE;
889 add_name(ed, optarg);
892 ed->options |= ED_PHDR;
895 ed->options |= ED_REL;
898 ed->options |= ED_SYMTAB;
901 ed->flags |= SOLARIS_FMT;
904 ed->options |= ED_SYMVER;
907 (void) printf("%s (%s)\n", ELFTC_GETPROGNAME(),
912 if ((ed->out = fopen(optarg, "w")) == NULL)
913 err(EXIT_FAILURE, "%s", optarg);
924 if (ed->options == 0)
925 ed->options = ED_ALL;
927 if (ed->options & ED_SYMTAB &&
928 (STAILQ_EMPTY(&ed->snl) || (sn = find_name(ed, "ARSYM")) != NULL)) {
929 ed->flags |= PRINT_ARSYM;
931 STAILQ_REMOVE(&ed->snl, sn, spec_name, sn_list);
932 if (STAILQ_EMPTY(&ed->snl))
933 ed->flags |= ONLY_ARSYM;
939 ed->flags |= PRINT_FILENAME;
940 if (elf_version(EV_CURRENT) == EV_NONE)
941 errx(EXIT_FAILURE, "ELF library initialization failed: %s",
944 for (i = 0; i < ac; i++) {
945 ed->filename = av[i];
947 elf_print_object(ed);
953 #ifdef USE_LIBARCHIVE_AR
955 /* Archive symbol table entry. */
962 * Convenient wrapper for general libarchive error handling.
964 #define AC(CALL) do { \
966 warnx("%s", archive_error_string(a)); \
972 * Detect an ar(1) archive using libarchive(3).
978 struct archive_entry *entry;
982 if ((a = archive_read_new()) == NULL)
984 archive_read_support_format_ar(a);
985 if (archive_read_open_fd(a, fd, 10240) == ARCHIVE_OK)
986 r = archive_read_next_header(a, &entry);
987 archive_read_close(a);
988 archive_read_free(a);
990 return (r == ARCHIVE_OK);
994 * Dump an ar(1) archive using libarchive(3).
997 ac_print_ar(struct elfdump *ed, int fd)
1000 struct archive_entry *entry;
1001 struct arsym_entry *arsym;
1009 if (lseek(fd, 0, SEEK_SET) == -1)
1010 err(EXIT_FAILURE, "lseek failed");
1011 if ((a = archive_read_new()) == NULL)
1012 errx(EXIT_FAILURE, "%s", archive_error_string(a));
1013 archive_read_support_format_ar(a);
1014 AC(archive_read_open_fd(a, fd, 10240));
1016 r = archive_read_next_header(a, &entry);
1017 if (r == ARCHIVE_FATAL)
1018 errx(EXIT_FAILURE, "%s", archive_error_string(a));
1019 if (r == ARCHIVE_EOF)
1021 if (r == ARCHIVE_WARN || r == ARCHIVE_RETRY)
1022 warnx("%s", archive_error_string(a));
1023 if (r == ARCHIVE_RETRY)
1025 name = archive_entry_pathname(entry);
1026 size = archive_entry_size(entry);
1029 if ((buff = malloc(size)) == NULL) {
1030 warn("malloc failed");
1033 if (archive_read_data(a, buff, size) != (ssize_t)size) {
1034 warnx("%s", archive_error_string(a));
1040 * Note that when processing arsym via libarchive, there is
1041 * no way to tell which member a certain symbol belongs to,
1042 * since we can not just "lseek" to a member offset and read
1043 * the member header.
1045 if (!strcmp(name, "/") && ed->flags & PRINT_ARSYM) {
1052 arsym = calloc(cnt, sizeof(*arsym));
1054 err(EXIT_FAILURE, "calloc failed");
1055 b += sizeof(uint32_t);
1056 for (i = 0; (size_t)i < cnt; i++) {
1057 arsym[i].off = be32dec(b);
1058 b += sizeof(uint32_t);
1060 for (i = 0; (size_t)i < cnt; i++) {
1061 arsym[i].sym_name = b;
1064 if (ed->flags & SOLARIS_FMT) {
1065 PRT("\nSymbol Table: (archive)\n");
1066 PRT(" index offset symbol\n");
1068 PRT("\nsymbol table (archive):\n");
1069 for (i = 0; (size_t)i < cnt; i++) {
1070 if (ed->flags & SOLARIS_FMT) {
1071 snprintf(idx, sizeof(idx), "[%d]", i);
1074 (uintmax_t)arsym[i].off);
1075 PRT("%s\n", arsym[i].sym_name);
1077 PRT("\nentry: %d\n", i);
1078 PRT("\toffset: %#jx\n",
1079 (uintmax_t)arsym[i].off);
1080 PRT("\tsymbol: %s\n",
1086 /* No need to continue if we only dump ARSYM. */
1087 if (ed->flags & ONLY_ARSYM) {
1088 AC(archive_read_close(a));
1089 AC(archive_read_free(a));
1094 if ((ed->elf = elf_memory(buff, size)) == NULL) {
1095 warnx("elf_memroy() failed: %s",
1100 /* Skip non-ELF member. */
1101 if (elf_kind(ed->elf) == ELF_K_ELF) {
1102 printf("\n%s(%s):\n", ed->archive, name);
1108 AC(archive_read_close(a));
1109 AC(archive_read_free(a));
1112 #else /* USE_LIBARCHIVE_AR */
1115 * Dump an ar(1) archive.
1118 elf_print_ar(struct elfdump *ed, int fd)
1130 if (ed->flags & PRINT_ARSYM) {
1132 if ((arsym = elf_getarsym(ed->ar, &cnt)) == NULL) {
1133 warnx("elf_getarsym failed: %s", elf_errmsg(-1));
1138 if (ed->flags & SOLARIS_FMT) {
1139 PRT("\nSymbol Table: (archive)\n");
1140 PRT(" index offset member name and symbol\n");
1142 PRT("\nsymbol table (archive):\n");
1143 for (i = 0; (size_t)i < cnt - 1; i++) {
1144 if (elf_rand(ed->ar, arsym[i].as_off) !=
1146 warnx("elf_rand failed: %s", elf_errmsg(-1));
1149 if ((e = elf_begin(fd, ELF_C_READ, ed->ar)) == NULL) {
1150 warnx("elf_begin failed: %s", elf_errmsg(-1));
1153 if ((arh = elf_getarhdr(e)) == NULL) {
1154 warnx("elf_getarhdr failed: %s",
1158 if (ed->flags & SOLARIS_FMT) {
1159 snprintf(idx, sizeof(idx), "[%d]", i);
1162 (uintmax_t)arsym[i].as_off);
1163 PRT("(%s):%s\n", arh->ar_name,
1166 PRT("\nentry: %d\n", i);
1167 PRT("\toffset: %#jx\n",
1168 (uintmax_t)arsym[i].as_off);
1169 PRT("\tmember: %s\n", arh->ar_name);
1170 PRT("\tsymbol: %s\n", arsym[i].as_name);
1175 /* No need to continue if we only dump ARSYM. */
1176 if (ed->flags & ONLY_ARSYM)
1182 /* Rewind the archive. */
1183 if (elf_rand(ed->ar, SARMAG) != SARMAG) {
1184 warnx("elf_rand failed: %s", elf_errmsg(-1));
1188 /* Dump each member of the archive. */
1190 while ((ed->elf = elf_begin(fd, cmd, ed->ar)) != NULL) {
1191 /* Skip non-ELF member. */
1192 if (elf_kind(ed->elf) == ELF_K_ELF) {
1193 if ((arh = elf_getarhdr(ed->elf)) == NULL) {
1194 warnx("elf_getarhdr failed: %s",
1198 printf("\n%s(%s):\n", ed->archive, arh->ar_name);
1201 cmd = elf_next(ed->elf);
1206 #endif /* USE_LIBARCHIVE_AR */
1209 * Dump an object. (ELF object or ar(1) archive)
1212 elf_print_object(struct elfdump *ed)
1216 if ((fd = open(ed->filename, O_RDONLY)) == -1) {
1217 warn("open %s failed", ed->filename);
1221 #ifdef USE_LIBARCHIVE_AR
1222 if (ac_detect_ar(fd)) {
1223 ed->archive = ed->filename;
1224 ac_print_ar(ed, fd);
1227 #endif /* USE_LIBARCHIVE_AR */
1229 if ((ed->elf = elf_begin(fd, ELF_C_READ, NULL)) == NULL) {
1230 warnx("elf_begin() failed: %s", elf_errmsg(-1));
1234 switch (elf_kind(ed->elf)) {
1236 warnx("Not an ELF file.");
1239 if (ed->flags & PRINT_FILENAME)
1240 printf("\n%s:\n", ed->filename);
1244 #ifndef USE_LIBARCHIVE_AR
1245 ed->archive = ed->filename;
1246 elf_print_ar(ed, fd);
1250 warnx("Internal: libelf returned unknown elf kind.");
1258 * Dump an ELF object.
1261 elf_print_elf(struct elfdump *ed)
1264 if (gelf_getehdr(ed->elf, &ed->ehdr) == NULL) {
1265 warnx("gelf_getehdr failed: %s", elf_errmsg(-1));
1268 if ((ed->ec = gelf_getclass(ed->elf)) == ELFCLASSNONE) {
1269 warnx("gelf_getclass failed: %s", elf_errmsg(-1));
1273 if (ed->options & (ED_SHDR | ED_DYN | ED_REL | ED_GOT | ED_SYMTAB |
1274 ED_SYMVER | ED_NOTE | ED_HASH))
1277 if (ed->options & ED_EHDR)
1279 if (ed->options & ED_PHDR)
1281 if (ed->options & ED_INTERP)
1282 elf_print_interp(ed);
1283 if (ed->options & ED_SHDR)
1285 if (ed->options & ED_DYN)
1286 elf_print_dynamic(ed);
1287 if (ed->options & ED_REL)
1288 elf_print_reloc(ed);
1289 if (ed->options & ED_GOT)
1291 if (ed->options & ED_SYMTAB)
1292 elf_print_symtabs(ed);
1293 if (ed->options & ED_SYMVER)
1294 elf_print_symver(ed);
1295 if (ed->options & ED_NOTE)
1297 if (ed->options & ED_HASH)
1299 if (ed->options & ED_CHECKSUM)
1300 elf_print_checksum(ed);
1302 unload_sections(ed);
1306 * Read the section headers from ELF object and store them in the
1310 load_sections(struct elfdump *ed)
1316 size_t shstrndx, ndx;
1319 assert(ed->sl == NULL);
1321 if (!elf_getshnum(ed->elf, &ed->shnum)) {
1322 warnx("elf_getshnum failed: %s", elf_errmsg(-1));
1327 if ((ed->sl = calloc(ed->shnum, sizeof(*ed->sl))) == NULL)
1328 err(EXIT_FAILURE, "calloc failed");
1329 if (!elf_getshstrndx(ed->elf, &shstrndx)) {
1330 warnx("elf_getshstrndx failed: %s", elf_errmsg(-1));
1333 if ((scn = elf_getscn(ed->elf, 0)) == NULL) {
1334 warnx("elf_getscn failed: %s", elf_errmsg(-1));
1339 if (gelf_getshdr(scn, &sh) == NULL) {
1340 warnx("gelf_getshdr failed: %s", elf_errmsg(-1));
1344 if ((name = elf_strptr(ed->elf, shstrndx, sh.sh_name)) == NULL) {
1348 if ((ndx = elf_ndxscn(scn)) == SHN_UNDEF)
1349 if ((elferr = elf_errno()) != 0) {
1350 warnx("elf_ndxscn failed: %s",
1351 elf_errmsg(elferr));
1354 if (ndx >= ed->shnum) {
1355 warnx("section index of '%s' out of range", name);
1361 s->off = sh.sh_offset;
1363 s->entsize = sh.sh_entsize;
1364 s->align = sh.sh_addralign;
1365 s->type = sh.sh_type;
1366 s->flags = sh.sh_flags;
1367 s->addr = sh.sh_addr;
1368 s->link = sh.sh_link;
1369 s->info = sh.sh_info;
1370 } while ((scn = elf_nextscn(ed->elf, scn)) != NULL);
1371 elferr = elf_errno();
1373 warnx("elf_nextscn failed: %s", elf_errmsg(elferr));
1377 * Release section related resources.
1380 unload_sections(struct elfdump *ed)
1382 if (ed->sl != NULL) {
1389 * Add a name to the '-N' name list.
1392 add_name(struct elfdump *ed, const char *name)
1394 struct spec_name *sn;
1396 if (find_name(ed, name))
1398 if ((sn = malloc(sizeof(*sn))) == NULL) {
1399 warn("malloc failed");
1403 STAILQ_INSERT_TAIL(&ed->snl, sn, sn_list);
1407 * Lookup a name in the '-N' name list.
1409 static struct spec_name *
1410 find_name(struct elfdump *ed, const char *name)
1412 struct spec_name *sn;
1414 STAILQ_FOREACH(sn, &ed->snl, sn_list) {
1415 if (!strcmp(sn->name, name))
1423 * Retrieve the name of a symbol using the section index of the symbol
1424 * table and the index of the symbol within that table.
1427 get_symbol_name(struct elfdump *ed, int symtab, int i)
1429 static char sname[64];
1436 s = &ed->sl[symtab];
1437 if (s->type != SHT_SYMTAB && s->type != SHT_DYNSYM)
1440 if ((data = elf_getdata(s->scn, NULL)) == NULL) {
1441 elferr = elf_errno();
1443 warnx("elf_getdata failed: %s", elf_errmsg(elferr));
1446 if (gelf_getsym(data, i, &sym) != &sym)
1448 if (GELF_ST_TYPE(sym.st_info) == STT_SECTION) {
1449 if (sym.st_shndx < ed->shnum) {
1450 snprintf(sname, sizeof(sname), "%s (section)",
1451 ed->sl[sym.st_shndx].name);
1456 if ((name = elf_strptr(ed->elf, s->link, sym.st_name)) == NULL)
1463 * Retrieve a string using string table section index and the string offset.
1466 get_string(struct elfdump *ed, int strtab, size_t off)
1470 if ((name = elf_strptr(ed->elf, strtab, off)) == NULL)
1477 * Dump the ELF Executable Header.
1480 elf_print_ehdr(struct elfdump *ed)
1483 if (!STAILQ_EMPTY(&ed->snl))
1486 if (ed->flags & SOLARIS_FMT) {
1487 PRT("\nELF Header\n");
1488 PRT(" ei_magic: { %#x, %c, %c, %c }\n",
1489 ed->ehdr.e_ident[0], ed->ehdr.e_ident[1],
1490 ed->ehdr.e_ident[2], ed->ehdr.e_ident[3]);
1491 PRT(" ei_class: %-18s",
1492 ei_classes[ed->ehdr.e_ident[EI_CLASS]]);
1493 PRT(" ei_data: %s\n", ei_data[ed->ehdr.e_ident[EI_DATA]]);
1494 PRT(" e_machine: %-18s", e_machines(ed->ehdr.e_machine));
1495 PRT(" e_version: %s\n", ei_versions[ed->ehdr.e_version]);
1496 PRT(" e_type: %s\n", e_types[ed->ehdr.e_type]);
1497 PRT(" e_flags: %18d\n", ed->ehdr.e_flags);
1498 PRT(" e_entry: %#18jx", (uintmax_t)ed->ehdr.e_entry);
1499 PRT(" e_ehsize: %6d", ed->ehdr.e_ehsize);
1500 PRT(" e_shstrndx:%5d\n", ed->ehdr.e_shstrndx);
1501 PRT(" e_shoff: %#18jx", (uintmax_t)ed->ehdr.e_shoff);
1502 PRT(" e_shentsize: %3d", ed->ehdr.e_shentsize);
1503 PRT(" e_shnum: %5d\n", ed->ehdr.e_shnum);
1504 PRT(" e_phoff: %#18jx", (uintmax_t)ed->ehdr.e_phoff);
1505 PRT(" e_phentsize: %3d", ed->ehdr.e_phentsize);
1506 PRT(" e_phnum: %5d\n", ed->ehdr.e_phnum);
1508 PRT("\nelf header:\n");
1510 PRT("\te_ident: %s %s %s\n",
1511 ei_classes[ed->ehdr.e_ident[EI_CLASS]],
1512 ei_data[ed->ehdr.e_ident[EI_DATA]],
1513 ei_abis[ed->ehdr.e_ident[EI_OSABI]]);
1514 PRT("\te_type: %s\n", e_types[ed->ehdr.e_type]);
1515 PRT("\te_machine: %s\n", e_machines(ed->ehdr.e_machine));
1516 PRT("\te_version: %s\n", ei_versions[ed->ehdr.e_version]);
1517 PRT("\te_entry: %#jx\n", (uintmax_t)ed->ehdr.e_entry);
1518 PRT("\te_phoff: %ju\n", (uintmax_t)ed->ehdr.e_phoff);
1519 PRT("\te_shoff: %ju\n", (uintmax_t) ed->ehdr.e_shoff);
1520 PRT("\te_flags: %u\n", ed->ehdr.e_flags);
1521 PRT("\te_ehsize: %u\n", ed->ehdr.e_ehsize);
1522 PRT("\te_phentsize: %u\n", ed->ehdr.e_phentsize);
1523 PRT("\te_phnum: %u\n", ed->ehdr.e_phnum);
1524 PRT("\te_shentsize: %u\n", ed->ehdr.e_shentsize);
1525 PRT("\te_shnum: %u\n", ed->ehdr.e_shnum);
1526 PRT("\te_shstrndx: %u\n", ed->ehdr.e_shstrndx);
1531 * Dump the ELF Program Header Table.
1534 elf_print_phdr(struct elfdump *ed)
1540 if (elf_getphnum(ed->elf, &phnum) == 0) {
1541 warnx("elf_getphnum failed: %s", elf_errmsg(-1));
1545 for (i = 0; (u_int64_t) i < phnum; i++) {
1546 if (gelf_getphdr(ed->elf, i, &ph) != &ph) {
1547 warnx("elf_getphdr failed: %s", elf_errmsg(-1));
1550 if (!STAILQ_EMPTY(&ed->snl) &&
1551 find_name(ed, p_types[ph.p_type & 0x7]) == NULL)
1553 if (ed->flags & SOLARIS_FMT) {
1554 PRT("\nProgram Header[%d]:\n", i);
1555 PRT(" p_vaddr: %#-14jx", (uintmax_t)ph.p_vaddr);
1556 PRT(" p_flags: [ %s ]\n", p_flags[ph.p_flags]);
1557 PRT(" p_paddr: %#-14jx", (uintmax_t)ph.p_paddr);
1558 PRT(" p_type: [ %s ]\n", p_types[ph.p_type & 0x7]);
1559 PRT(" p_filesz: %#-14jx",
1560 (uintmax_t)ph.p_filesz);
1561 PRT(" p_memsz: %#jx\n", (uintmax_t)ph.p_memsz);
1562 PRT(" p_offset: %#-14jx",
1563 (uintmax_t)ph.p_offset);
1564 PRT(" p_align: %#jx\n", (uintmax_t)ph.p_align);
1567 PRT("\nprogram header:\n");
1571 PRT("entry: %d\n", i);
1572 PRT("\tp_type: %s\n", p_types[ph.p_type & 0x7]);
1573 PRT("\tp_offset: %ju\n", (uintmax_t)ph.p_offset);
1574 PRT("\tp_vaddr: %#jx\n", (uintmax_t)ph.p_vaddr);
1575 PRT("\tp_paddr: %#jx\n", (uintmax_t)ph.p_paddr);
1576 PRT("\tp_filesz: %ju\n", (uintmax_t)ph.p_filesz);
1577 PRT("\tp_memsz: %ju\n", (uintmax_t)ph.p_memsz);
1578 PRT("\tp_flags: %s\n", p_flags[ph.p_flags]);
1579 PRT("\tp_align: %ju\n", (uintmax_t)ph.p_align);
1585 * Dump the ELF Section Header Table.
1588 elf_print_shdr(struct elfdump *ed)
1593 if (!STAILQ_EMPTY(&ed->snl))
1596 if ((ed->flags & SOLARIS_FMT) == 0)
1597 PRT("\nsection header:\n");
1598 for (i = 0; (size_t)i < ed->shnum; i++) {
1600 if (ed->flags & SOLARIS_FMT) {
1603 PRT("\nSection Header[%d]:", i);
1604 PRT(" sh_name: %s\n", s->name);
1605 PRT(" sh_addr: %#-14jx", (uintmax_t)s->addr);
1607 PRT(" sh_flags: [ %s ]\n", sh_flags(s->flags));
1609 PRT(" sh_flags: 0\n");
1610 PRT(" sh_size: %#-14jx", (uintmax_t)s->sz);
1611 PRT(" sh_type: [ %s ]\n", sh_types(s->type));
1612 PRT(" sh_offset: %#-14jx", (uintmax_t)s->off);
1613 PRT(" sh_entsize: %#jx\n", (uintmax_t)s->entsize);
1614 PRT(" sh_link: %-14u", s->link);
1615 PRT(" sh_info: %u\n", s->info);
1616 PRT(" sh_addralign: %#jx\n", (uintmax_t)s->align);
1619 PRT("entry: %ju\n", (uintmax_t)i);
1620 PRT("\tsh_name: %s\n", s->name);
1621 PRT("\tsh_type: %s\n", sh_types(s->type));
1622 PRT("\tsh_flags: %s\n", sh_flags(s->flags));
1623 PRT("\tsh_addr: %#jx\n", (uintmax_t)s->addr);
1624 PRT("\tsh_offset: %ju\n", (uintmax_t)s->off);
1625 PRT("\tsh_size: %ju\n", (uintmax_t)s->sz);
1626 PRT("\tsh_link: %u\n", s->link);
1627 PRT("\tsh_info: %u\n", s->info);
1628 PRT("\tsh_addralign: %ju\n", (uintmax_t)s->align);
1629 PRT("\tsh_entsize: %ju\n", (uintmax_t)s->entsize);
1635 * Return number of entries in the given section. We'd prefer ent_count be a
1636 * size_t, but libelf APIs already use int for section indices.
1639 get_ent_count(const struct section *s, int *ent_count)
1641 if (s->entsize == 0) {
1642 warnx("section %s has entry size 0", s->name);
1644 } else if (s->sz / s->entsize > INT_MAX) {
1645 warnx("section %s has invalid section count", s->name);
1648 *ent_count = (int)(s->sz / s->entsize);
1653 * Retrieve the content of the corresponding SHT_SUNW_versym section for
1654 * a symbol table section.
1657 get_versym(struct elfdump *ed, int i, uint16_t **vs, int *nvs)
1664 for (j = 0; (size_t)j < ed->shnum; j++) {
1666 if (s->type == SHT_SUNW_versym && s->link == (uint32_t)i)
1669 if ((size_t)j >= ed->shnum) {
1674 if ((data = elf_getdata(s->scn, NULL)) == NULL) {
1675 elferr = elf_errno();
1677 warnx("elf_getdata failed: %s", elf_errmsg(elferr));
1683 assert(data->d_size == s->sz);
1684 if (!get_ent_count(s, nvs))
1689 * Dump the symbol table section.
1692 elf_print_symtab(struct elfdump *ed, int i)
1700 int len, j, elferr, nvs;
1703 if (ed->flags & SOLARIS_FMT)
1704 PRT("\nSymbol Table Section: %s\n", s->name);
1706 PRT("\nsymbol table (%s):\n", s->name);
1708 if ((data = elf_getdata(s->scn, NULL)) == NULL) {
1709 elferr = elf_errno();
1711 warnx("elf_getdata failed: %s", elf_errmsg(elferr));
1716 assert(data->d_size == s->sz);
1717 if (!get_ent_count(s, &len))
1719 if (ed->flags & SOLARIS_FMT) {
1720 if (ed->ec == ELFCLASS32)
1721 PRT(" index value ");
1723 PRT(" index value ");
1724 PRT("size type bind oth ver shndx name\n");
1725 get_versym(ed, i, &vs, &nvs);
1726 if (vs != NULL && nvs != len) {
1727 warnx("#symbol not equal to #versym");
1731 for (j = 0; j < len; j++) {
1732 if (gelf_getsym(data, j, &sym) != &sym) {
1733 warnx("gelf_getsym failed: %s", elf_errmsg(-1));
1736 name = get_string(ed, s->link, sym.st_name);
1737 if (ed->flags & SOLARIS_FMT) {
1738 snprintf(idx, sizeof(idx), "[%d]", j);
1739 if (ed->ec == ELFCLASS32)
1743 PRT("0x%8.8jx ", (uintmax_t)sym.st_value);
1744 if (ed->ec == ELFCLASS32)
1745 PRT("0x%8.8jx ", (uintmax_t)sym.st_size);
1747 PRT("0x%12.12jx ", (uintmax_t)sym.st_size);
1748 PRT("%s ", st_types_S[GELF_ST_TYPE(sym.st_info)]);
1749 PRT("%s ", st_bindings_S[GELF_ST_BIND(sym.st_info)]);
1750 PRT("%c ", st_others[sym.st_other]);
1751 PRT("%3u ", (vs == NULL ? 0 : vs[j]));
1752 PRT("%-11.11s ", sh_name(ed, sym.st_shndx));
1755 PRT("\nentry: %d\n", j);
1756 PRT("\tst_name: %s\n", name);
1757 PRT("\tst_value: %#jx\n", (uintmax_t)sym.st_value);
1758 PRT("\tst_size: %ju\n", (uintmax_t)sym.st_size);
1759 PRT("\tst_info: %s %s\n",
1760 st_types[GELF_ST_TYPE(sym.st_info)],
1761 st_bindings[GELF_ST_BIND(sym.st_info)]);
1762 PRT("\tst_shndx: %ju\n", (uintmax_t)sym.st_shndx);
1768 * Dump the symbol tables. (.dynsym and .symtab)
1771 elf_print_symtabs(struct elfdump *ed)
1775 for (i = 0; (size_t)i < ed->shnum; i++)
1776 if ((ed->sl[i].type == SHT_SYMTAB ||
1777 ed->sl[i].type == SHT_DYNSYM) &&
1778 (STAILQ_EMPTY(&ed->snl) || find_name(ed, ed->sl[i].name)))
1779 elf_print_symtab(ed, i);
1783 * Dump the content of .dynamic section.
1786 elf_print_dynamic(struct elfdump *ed)
1796 for (i = 0; (size_t)i < ed->shnum; i++) {
1798 if (s->type == SHT_DYNAMIC &&
1799 (STAILQ_EMPTY(&ed->snl) || find_name(ed, s->name)))
1802 if ((size_t)i >= ed->shnum)
1805 if (ed->flags & SOLARIS_FMT) {
1806 PRT("Dynamic Section: %s\n", s->name);
1807 PRT(" index tag value\n");
1809 PRT("\ndynamic:\n");
1811 if ((data = elf_getdata(s->scn, NULL)) == NULL) {
1812 elferr = elf_errno();
1814 warnx("elf_getdata failed: %s", elf_errmsg(elferr));
1817 assert(data->d_size == s->sz);
1818 if (!get_ent_count(s, &len))
1820 for (i = 0; i < len; i++) {
1821 if (gelf_getdyn(data, i, &dyn) != &dyn) {
1822 warnx("gelf_getdyn failed: %s", elf_errmsg(-1));
1826 if (ed->flags & SOLARIS_FMT) {
1827 snprintf(idx, sizeof(idx), "[%d]", i);
1828 PRT("%10s %-16s ", idx, d_tags(dyn.d_tag));
1831 PRT("entry: %d\n", i);
1832 PRT("\td_tag: %s\n", d_tags(dyn.d_tag));
1838 if ((name = elf_strptr(ed->elf, s->link,
1839 dyn.d_un.d_val)) == NULL)
1841 if (ed->flags & SOLARIS_FMT)
1842 PRT("%#-16jx %s\n", (uintmax_t)dyn.d_un.d_val,
1845 PRT("\td_val: %s\n", name);
1862 if (ed->flags & SOLARIS_FMT)
1863 PRT("%#jx\n", (uintmax_t)dyn.d_un.d_val);
1865 PRT("\td_val: %ju\n",
1866 (uintmax_t)dyn.d_un.d_val);
1878 if (ed->flags & SOLARIS_FMT)
1879 PRT("%#jx\n", (uintmax_t)dyn.d_un.d_ptr);
1881 PRT("\td_ptr: %#jx\n",
1882 (uintmax_t)dyn.d_un.d_ptr);
1888 if (ed->flags & SOLARIS_FMT)
1896 * Dump a .rel/.rela section entry.
1899 elf_print_rel_entry(struct elfdump *ed, struct section *s, int j,
1900 struct rel_entry *r)
1903 if (ed->flags & SOLARIS_FMT) {
1904 PRT(" %-23s ", r_type(ed->ehdr.e_machine,
1905 GELF_R_TYPE(r->u_r.rel.r_info)));
1906 PRT("%#12jx ", (uintmax_t)r->u_r.rel.r_offset);
1907 if (r->type == SHT_RELA)
1908 PRT("%10jd ", (intmax_t)r->u_r.rela.r_addend);
1911 PRT("%-14s ", s->name);
1912 PRT("%s\n", r->symn);
1915 PRT("entry: %d\n", j);
1916 PRT("\tr_offset: %#jx\n", (uintmax_t)r->u_r.rel.r_offset);
1917 if (ed->ec == ELFCLASS32)
1918 PRT("\tr_info: %#jx\n", (uintmax_t)
1919 ELF32_R_INFO(ELF64_R_SYM(r->u_r.rel.r_info),
1920 ELF64_R_TYPE(r->u_r.rel.r_info)));
1922 PRT("\tr_info: %#jx\n", (uintmax_t)r->u_r.rel.r_info);
1923 if (r->type == SHT_RELA)
1924 PRT("\tr_addend: %jd\n",
1925 (intmax_t)r->u_r.rela.r_addend);
1930 * Dump a relocation section of type SHT_RELA.
1933 elf_print_rela(struct elfdump *ed, struct section *s, Elf_Data *data)
1938 if (ed->flags & SOLARIS_FMT) {
1939 PRT("\nRelocation Section: %s\n", s->name);
1941 "addend section with respect to\n");
1943 PRT("\nrelocation with addend (%s):\n", s->name);
1945 assert(data->d_size == s->sz);
1946 if (!get_ent_count(s, &len))
1948 for (j = 0; j < len; j++) {
1949 if (gelf_getrela(data, j, &r.u_r.rela) != &r.u_r.rela) {
1950 warnx("gelf_getrela failed: %s",
1954 r.symn = get_symbol_name(ed, s->link,
1955 GELF_R_SYM(r.u_r.rela.r_info));
1956 elf_print_rel_entry(ed, s, j, &r);
1961 * Dump a relocation section of type SHT_REL.
1964 elf_print_rel(struct elfdump *ed, struct section *s, Elf_Data *data)
1969 if (ed->flags & SOLARIS_FMT) {
1970 PRT("\nRelocation Section: %s\n", s->name);
1972 "section with respect to\n");
1974 PRT("\nrelocation (%s):\n", s->name);
1976 assert(data->d_size == s->sz);
1977 if (!get_ent_count(s, &len))
1979 for (j = 0; j < len; j++) {
1980 if (gelf_getrel(data, j, &r.u_r.rel) != &r.u_r.rel) {
1981 warnx("gelf_getrel failed: %s", elf_errmsg(-1));
1984 r.symn = get_symbol_name(ed, s->link,
1985 GELF_R_SYM(r.u_r.rel.r_info));
1986 elf_print_rel_entry(ed, s, j, &r);
1991 * Dump relocation sections.
1994 elf_print_reloc(struct elfdump *ed)
2000 for (i = 0; (size_t)i < ed->shnum; i++) {
2002 if ((s->type == SHT_REL || s->type == SHT_RELA) &&
2003 (STAILQ_EMPTY(&ed->snl) || find_name(ed, s->name))) {
2005 if ((data = elf_getdata(s->scn, NULL)) == NULL) {
2006 elferr = elf_errno();
2008 warnx("elf_getdata failed: %s",
2009 elf_errmsg(elferr));
2012 if (s->type == SHT_REL)
2013 elf_print_rel(ed, s, data);
2015 elf_print_rela(ed, s, data);
2021 * Dump the content of PT_INTERP segment.
2024 elf_print_interp(struct elfdump *ed)
2031 if (!STAILQ_EMPTY(&ed->snl) && find_name(ed, "PT_INTERP") == NULL)
2034 if ((s = elf_rawfile(ed->elf, NULL)) == NULL) {
2035 warnx("elf_rawfile failed: %s", elf_errmsg(-1));
2038 if (!elf_getphnum(ed->elf, &phnum)) {
2039 warnx("elf_getphnum failed: %s", elf_errmsg(-1));
2042 for (i = 0; (size_t)i < phnum; i++) {
2043 if (gelf_getphdr(ed->elf, i, &phdr) != &phdr) {
2044 warnx("elf_getphdr failed: %s", elf_errmsg(-1));
2047 if (phdr.p_type == PT_INTERP) {
2049 PRT("\t%s\n", s + phdr.p_offset);
2055 * Search the relocation sections for entries refering to the .got section.
2058 find_gotrel(struct elfdump *ed, struct section *gs, struct rel_entry *got)
2063 int elferr, i, j, k, len;
2065 for(i = 0; (size_t)i < ed->shnum; i++) {
2067 if (s->type != SHT_REL && s->type != SHT_RELA)
2070 if ((data = elf_getdata(s->scn, NULL)) == NULL) {
2071 elferr = elf_errno();
2073 warnx("elf_getdata failed: %s",
2074 elf_errmsg(elferr));
2077 memset(&r, 0, sizeof(struct rel_entry));
2079 assert(data->d_size == s->sz);
2080 if (!get_ent_count(s, &len))
2082 for (j = 0; j < len; j++) {
2083 if (s->type == SHT_REL) {
2084 if (gelf_getrel(data, j, &r.u_r.rel) !=
2086 warnx("gelf_getrel failed: %s",
2091 if (gelf_getrela(data, j, &r.u_r.rela) !=
2093 warnx("gelf_getrel failed: %s",
2098 if (r.u_r.rel.r_offset >= gs->addr &&
2099 r.u_r.rel.r_offset < gs->addr + gs->sz) {
2100 r.symn = get_symbol_name(ed, s->link,
2101 GELF_R_SYM(r.u_r.rel.r_info));
2102 k = (r.u_r.rel.r_offset - gs->addr) /
2104 memcpy(&got[k], &r, sizeof(struct rel_entry));
2111 elf_print_got_section(struct elfdump *ed, struct section *s)
2113 struct rel_entry *got;
2114 Elf_Data *data, dst;
2117 if (s->entsize == 0) {
2118 /* XXX IA64 GOT section generated by gcc has entry size 0. */
2120 s->entsize = s->align;
2125 if (!get_ent_count(s, &len))
2127 if (ed->flags & SOLARIS_FMT)
2128 PRT("\nGlobal Offset Table Section: %s (%d entries)\n",
2131 PRT("\nglobal offset table: %s\n", s->name);
2133 if ((data = elf_getdata(s->scn, NULL)) == NULL) {
2134 elferr = elf_errno();
2136 warnx("elf_getdata failed: %s", elf_errmsg(elferr));
2141 * GOT section has section type SHT_PROGBITS, thus libelf treats it as
2142 * byte stream and will not perfrom any translation on it. As a result,
2143 * an exlicit call to gelf_xlatetom is needed here. Depends on arch,
2144 * GOT section should be translated to either WORD or XWORD.
2146 if (ed->ec == ELFCLASS32)
2147 data->d_type = ELF_T_WORD;
2149 data->d_type = ELF_T_XWORD;
2150 memcpy(&dst, data, sizeof(Elf_Data));
2151 if (gelf_xlatetom(ed->elf, &dst, data, ed->ehdr.e_ident[EI_DATA]) !=
2153 warnx("gelf_xlatetom failed: %s", elf_errmsg(-1));
2156 assert(dst.d_size == s->sz);
2157 if (ed->flags & SOLARIS_FMT) {
2159 * In verbose/Solaris mode, we search the relocation sections
2160 * and try to find the corresponding reloc entry for each GOT
2163 if ((got = calloc(len, sizeof(struct rel_entry))) == NULL)
2164 err(EXIT_FAILURE, "calloc failed");
2165 find_gotrel(ed, s, got);
2166 if (ed->ec == ELFCLASS32) {
2167 PRT(" ndx addr value reloc ");
2168 PRT("addend symbol\n");
2170 PRT(" ndx addr value ");
2171 PRT("reloc addend symbol\n");
2173 for(i = 0; i < len; i++) {
2175 if (ed->ec == ELFCLASS32) {
2176 PRT("%-8.8jx ", s->addr + i * s->entsize);
2177 PRT("%-8.8x ", *((uint32_t *)dst.d_buf + i));
2179 PRT("%-16.16jx ", s->addr + i * s->entsize);
2180 PRT("%-16.16jx ", *((uint64_t *)dst.d_buf + i));
2182 PRT("%-18s ", r_type(ed->ehdr.e_machine,
2183 GELF_R_TYPE(got[i].u_r.rel.r_info)));
2184 if (ed->ec == ELFCLASS32)
2186 (intmax_t)got[i].u_r.rela.r_addend);
2189 (intmax_t)got[i].u_r.rela.r_addend);
2190 if (got[i].symn == NULL)
2192 PRT("%s\n", got[i].symn);
2196 for(i = 0; i < len; i++) {
2197 PRT("\nentry: %d\n", i);
2198 if (ed->ec == ELFCLASS32)
2199 PRT("\t%#x\n", *((uint32_t *)dst.d_buf + i));
2201 PRT("\t%#jx\n", *((uint64_t *)dst.d_buf + i));
2207 * Dump the content of Global Offset Table section.
2210 elf_print_got(struct elfdump *ed)
2215 if (!STAILQ_EMPTY(&ed->snl))
2219 for (i = 0; (size_t)i < ed->shnum; i++) {
2221 if (s->name && !strncmp(s->name, ".got", 4) &&
2222 (STAILQ_EMPTY(&ed->snl) || find_name(ed, s->name)))
2223 elf_print_got_section(ed, s);
2228 * Dump the content of .note.ABI-tag section.
2231 elf_print_note(struct elfdump *ed)
2244 for (i = 0; (size_t)i < ed->shnum; i++) {
2246 if (s->type == SHT_NOTE && s->name &&
2247 !strcmp(s->name, ".note.ABI-tag") &&
2248 (STAILQ_EMPTY(&ed->snl) || find_name(ed, s->name)))
2251 if ((size_t)i >= ed->shnum)
2253 if (ed->flags & SOLARIS_FMT)
2254 PRT("\nNote Section: %s\n", s->name);
2256 PRT("\nnote (%s):\n", s->name);
2258 if ((data = elf_getdata(s->scn, NULL)) == NULL) {
2259 elferr = elf_errno();
2261 warnx("elf_getdata failed: %s", elf_errmsg(elferr));
2265 count = data->d_size;
2266 while (count > sizeof(Elf_Note)) {
2267 en = (Elf_Note *) (uintptr_t) src;
2268 namesz = en->n_namesz;
2269 descsz = en->n_descsz;
2270 src += sizeof(Elf_Note);
2271 count -= sizeof(Elf_Note);
2272 if (ed->flags & SOLARIS_FMT) {
2273 PRT("\n type %#x\n", en->n_type);
2274 PRT(" namesz %#x:\n", en->n_namesz);
2278 src += roundup2(namesz, 4);
2279 count -= roundup2(namesz, 4);
2282 * Note that we dump the whole desc part if we're in
2283 * "Solaris mode", while in the normal mode, we only look
2284 * at the first 4 bytes (a 32bit word) of the desc, i.e,
2285 * we assume that it's always a FreeBSD version number.
2287 if (ed->flags & SOLARIS_FMT) {
2288 PRT(" descsz %#x:", en->n_descsz);
2289 for (i = 0; (uint32_t)i < descsz; i++) {
2290 if ((i & 0xF) == 0) {
2291 snprintf(idx, sizeof(idx), "desc[%d]",
2293 PRT("\n %-9s", idx);
2294 } else if ((i & 0x3) == 0)
2296 PRT(" %2.2x", src[i]);
2300 if (ed->ehdr.e_ident[EI_DATA] == ELFDATA2MSB)
2301 desc = be32dec(src);
2303 desc = le32dec(src);
2306 src += roundup2(descsz, 4);
2307 count -= roundup2(descsz, 4);
2312 * Dump a hash table.
2315 elf_print_svr4_hash(struct elfdump *ed, struct section *s)
2319 uint32_t *bucket, *chain;
2320 uint32_t nbucket, nchain;
2321 uint32_t *bl, *c, maxl, total;
2322 int i, j, first, elferr;
2325 if (ed->flags & SOLARIS_FMT)
2326 PRT("\nHash Section: %s\n", s->name);
2328 PRT("\nhash table (%s):\n", s->name);
2330 if ((data = elf_getdata(s->scn, NULL)) == NULL) {
2331 elferr = elf_errno();
2333 warnx("elf_getdata failed: %s",
2334 elf_errmsg(elferr));
2337 if (data->d_size < 2 * sizeof(uint32_t)) {
2338 warnx(".hash section too small");
2344 if (nbucket <= 0 || nchain <= 0) {
2345 warnx("Malformed .hash section");
2348 if (data->d_size != (nbucket + nchain + 2) * sizeof(uint32_t)) {
2349 warnx("Malformed .hash section");
2353 chain = &buf[2 + nbucket];
2355 if (ed->flags & SOLARIS_FMT) {
2357 if ((bl = calloc(nbucket, sizeof(*bl))) == NULL)
2358 err(EXIT_FAILURE, "calloc failed");
2359 for (i = 0; (uint32_t)i < nbucket; i++)
2360 for (j = bucket[i]; j > 0 && (uint32_t)j < nchain;
2364 if ((c = calloc(maxl + 1, sizeof(*c))) == NULL)
2365 err(EXIT_FAILURE, "calloc failed");
2366 for (i = 0; (uint32_t)i < nbucket; i++)
2368 PRT(" bucket symndx name\n");
2369 for (i = 0; (uint32_t)i < nbucket; i++) {
2371 for (j = bucket[i]; j > 0 && (uint32_t)j < nchain;
2378 snprintf(idx, sizeof(idx), "[%d]", j);
2380 PRT("%s\n", get_symbol_name(ed, s->link, j));
2385 for (i = 0; (uint32_t)i <= maxl; i++) {
2387 PRT("%10u buckets contain %8d symbols\n", c[i], i);
2389 PRT("%10u buckets %8u symbols (globals)\n", nbucket,
2392 PRT("\nnbucket: %u\n", nbucket);
2393 PRT("nchain: %u\n\n", nchain);
2394 for (i = 0; (uint32_t)i < nbucket; i++)
2395 PRT("bucket[%d]:\n\t%u\n\n", i, bucket[i]);
2396 for (i = 0; (uint32_t)i < nchain; i++)
2397 PRT("chain[%d]:\n\t%u\n\n", i, chain[i]);
2402 * Dump a 64bit hash table.
2405 elf_print_svr4_hash64(struct elfdump *ed, struct section *s)
2407 Elf_Data *data, dst;
2409 uint64_t *bucket, *chain;
2410 uint64_t nbucket, nchain;
2411 uint64_t *bl, *c, maxl, total;
2412 int i, j, elferr, first;
2415 if (ed->flags & SOLARIS_FMT)
2416 PRT("\nHash Section: %s\n", s->name);
2418 PRT("\nhash table (%s):\n", s->name);
2421 * ALPHA uses 64-bit hash entries. Since libelf assumes that
2422 * .hash section contains only 32-bit entry, an explicit
2423 * gelf_xlatetom is needed here.
2426 if ((data = elf_rawdata(s->scn, NULL)) == NULL) {
2427 elferr = elf_errno();
2429 warnx("elf_rawdata failed: %s",
2430 elf_errmsg(elferr));
2433 data->d_type = ELF_T_XWORD;
2434 memcpy(&dst, data, sizeof(Elf_Data));
2435 if (gelf_xlatetom(ed->elf, &dst, data,
2436 ed->ehdr.e_ident[EI_DATA]) != &dst) {
2437 warnx("gelf_xlatetom failed: %s", elf_errmsg(-1));
2440 if (dst.d_size < 2 * sizeof(uint64_t)) {
2441 warnx(".hash section too small");
2447 if (nbucket <= 0 || nchain <= 0) {
2448 warnx("Malformed .hash section");
2451 if (dst.d_size != (nbucket + nchain + 2) * sizeof(uint64_t)) {
2452 warnx("Malformed .hash section");
2456 chain = &buf[2 + nbucket];
2458 if (ed->flags & SOLARIS_FMT) {
2460 if ((bl = calloc(nbucket, sizeof(*bl))) == NULL)
2461 err(EXIT_FAILURE, "calloc failed");
2462 for (i = 0; (uint64_t)i < nbucket; i++)
2463 for (j = bucket[i]; j > 0 && (uint64_t)j < nchain;
2467 if ((c = calloc(maxl + 1, sizeof(*c))) == NULL)
2468 err(EXIT_FAILURE, "calloc failed");
2469 for (i = 0; (uint64_t)i < nbucket; i++)
2471 PRT(" bucket symndx name\n");
2472 for (i = 0; (uint64_t)i < nbucket; i++) {
2474 for (j = bucket[i]; j > 0 && (uint64_t)j < nchain;
2481 snprintf(idx, sizeof(idx), "[%d]", j);
2483 PRT("%s\n", get_symbol_name(ed, s->link, j));
2488 for (i = 0; (uint64_t)i <= maxl; i++) {
2490 PRT("%10ju buckets contain %8d symbols\n",
2491 (uintmax_t)c[i], i);
2493 PRT("%10ju buckets %8ju symbols (globals)\n",
2494 (uintmax_t)nbucket, (uintmax_t)total);
2496 PRT("\nnbucket: %ju\n", (uintmax_t)nbucket);
2497 PRT("nchain: %ju\n\n", (uintmax_t)nchain);
2498 for (i = 0; (uint64_t)i < nbucket; i++)
2499 PRT("bucket[%d]:\n\t%ju\n\n", i, (uintmax_t)bucket[i]);
2500 for (i = 0; (uint64_t)i < nchain; i++)
2501 PRT("chain[%d]:\n\t%ju\n\n", i, (uintmax_t)chain[i]);
2507 * Dump a GNU hash table.
2510 elf_print_gnu_hash(struct elfdump *ed, struct section *s)
2515 uint32_t *bucket, *chain;
2516 uint32_t nbucket, nchain, symndx, maskwords, shift2;
2517 uint32_t *bl, *c, maxl, total;
2518 int i, j, first, elferr, dynsymcount;
2521 if (ed->flags & SOLARIS_FMT)
2522 PRT("\nGNU Hash Section: %s\n", s->name);
2524 PRT("\ngnu hash table (%s):\n", s->name);
2526 if ((data = elf_getdata(s->scn, NULL)) == NULL) {
2527 elferr = elf_errno();
2529 warnx("elf_getdata failed: %s",
2530 elf_errmsg(elferr));
2533 if (data->d_size < 4 * sizeof(uint32_t)) {
2534 warnx(".gnu.hash section too small");
2543 ds = &ed->sl[s->link];
2544 if (!get_ent_count(ds, &dynsymcount))
2546 nchain = dynsymcount - symndx;
2547 if (data->d_size != 4 * sizeof(uint32_t) + maskwords *
2548 (ed->ec == ELFCLASS32 ? sizeof(uint32_t) : sizeof(uint64_t)) +
2549 (nbucket + nchain) * sizeof(uint32_t)) {
2550 warnx("Malformed .gnu.hash section");
2553 bucket = buf + (ed->ec == ELFCLASS32 ? maskwords : maskwords * 2);
2554 chain = bucket + nbucket;
2556 if (ed->flags & SOLARIS_FMT) {
2558 if ((bl = calloc(nbucket, sizeof(*bl))) == NULL)
2559 err(EXIT_FAILURE, "calloc failed");
2560 for (i = 0; (uint32_t)i < nbucket; i++)
2562 j > 0 && (uint32_t)j - symndx < nchain;
2566 if (chain[j - symndx] & 1)
2569 if ((c = calloc(maxl + 1, sizeof(*c))) == NULL)
2570 err(EXIT_FAILURE, "calloc failed");
2571 for (i = 0; (uint32_t)i < nbucket; i++)
2573 PRT(" bucket symndx name\n");
2574 for (i = 0; (uint32_t)i < nbucket; i++) {
2577 j > 0 && (uint32_t)j - symndx < nchain;
2584 snprintf(idx, sizeof(idx), "[%d]", j );
2586 PRT("%s\n", get_symbol_name(ed, s->link, j));
2587 if (chain[j - symndx] & 1)
2593 for (i = 0; (uint32_t)i <= maxl; i++) {
2595 PRT("%10u buckets contain %8d symbols\n", c[i], i);
2597 PRT("%10u buckets %8u symbols (globals)\n", nbucket,
2600 PRT("\nnbucket: %u\n", nbucket);
2601 PRT("symndx: %u\n", symndx);
2602 PRT("maskwords: %u\n", maskwords);
2603 PRT("shift2: %u\n", shift2);
2604 PRT("nchain: %u\n\n", nchain);
2605 for (i = 0; (uint32_t)i < nbucket; i++)
2606 PRT("bucket[%d]:\n\t%u\n\n", i, bucket[i]);
2607 for (i = 0; (uint32_t)i < nchain; i++)
2608 PRT("chain[%d]:\n\t%u\n\n", i, chain[i]);
2616 elf_print_hash(struct elfdump *ed)
2621 for (i = 0; (size_t)i < ed->shnum; i++) {
2623 if ((s->type == SHT_HASH || s->type == SHT_GNU_HASH) &&
2624 (STAILQ_EMPTY(&ed->snl) || find_name(ed, s->name))) {
2625 if (s->type == SHT_GNU_HASH)
2626 elf_print_gnu_hash(ed, s);
2627 else if (ed->ehdr.e_machine == EM_ALPHA &&
2629 elf_print_svr4_hash64(ed, s);
2631 elf_print_svr4_hash(ed, s);
2637 * Dump the content of a Version Definition(SHT_SUNW_Verdef) Section.
2640 elf_print_verdef(struct elfdump *ed, struct section *s)
2647 uint8_t *buf, *end, *buf2;
2648 int i, j, elferr, count;
2650 if (ed->flags & SOLARIS_FMT)
2651 PRT("Version Definition Section: %s\n", s->name);
2653 PRT("\nversion definition section (%s):\n", s->name);
2655 if ((data = elf_getdata(s->scn, NULL)) == NULL) {
2656 elferr = elf_errno();
2658 warnx("elf_getdata failed: %s",
2659 elf_errmsg(elferr));
2663 end = buf + data->d_size;
2665 if (ed->flags & SOLARIS_FMT)
2666 PRT(" index version dependency\n");
2667 while (buf + sizeof(Elf32_Verdef) <= end) {
2668 vd = (Elf32_Verdef *) (uintptr_t) buf;
2669 if (ed->flags & SOLARIS_FMT) {
2670 snprintf(idx, sizeof(idx), "[%d]", vd->vd_ndx);
2673 PRT("\nentry: %d\n", i++);
2674 PRT("\tvd_version: %u\n", vd->vd_version);
2675 PRT("\tvd_flags: %u\n", vd->vd_flags);
2676 PRT("\tvd_ndx: %u\n", vd->vd_ndx);
2677 PRT("\tvd_cnt: %u\n", vd->vd_cnt);
2678 PRT("\tvd_hash: %u\n", vd->vd_hash);
2679 PRT("\tvd_aux: %u\n", vd->vd_aux);
2680 PRT("\tvd_next: %u\n\n", vd->vd_next);
2682 buf2 = buf + vd->vd_aux;
2685 while (buf2 + sizeof(Elf32_Verdaux) <= end && j < vd->vd_cnt) {
2686 vda = (Elf32_Verdaux *) (uintptr_t) buf2;
2687 str = get_string(ed, s->link, vda->vda_name);
2688 if (ed->flags & SOLARIS_FMT) {
2690 PRT("%-26.26s", str);
2691 else if (count == 1)
2692 PRT(" %-20.20s", str);
2694 PRT("\n%40.40s", "");
2698 PRT("\t\tvda: %d\n", j++);
2699 PRT("\t\t\tvda_name: %s\n", str);
2700 PRT("\t\t\tvda_next: %u\n", vda->vda_next);
2702 if (vda->vda_next == 0) {
2703 if (ed->flags & SOLARIS_FMT) {
2704 if (vd->vd_flags & VER_FLG_BASE) {
2706 PRT("%-20.20s", "");
2707 PRT("%s", "[ BASE ]");
2713 if (ed->flags & SOLARIS_FMT)
2715 buf2 += vda->vda_next;
2717 if (vd->vd_next == 0)
2724 * Dump the content of a Version Needed(SHT_SUNW_Verneed) Section.
2727 elf_print_verneed(struct elfdump *ed, struct section *s)
2732 uint8_t *buf, *end, *buf2;
2733 int i, j, elferr, first;
2735 if (ed->flags & SOLARIS_FMT)
2736 PRT("\nVersion Needed Section: %s\n", s->name);
2738 PRT("\nversion need section (%s):\n", s->name);
2740 if ((data = elf_getdata(s->scn, NULL)) == NULL) {
2741 elferr = elf_errno();
2743 warnx("elf_getdata failed: %s",
2744 elf_errmsg(elferr));
2748 end = buf + data->d_size;
2749 if (ed->flags & SOLARIS_FMT)
2750 PRT(" file version\n");
2752 while (buf + sizeof(Elf32_Verneed) <= end) {
2753 vn = (Elf32_Verneed *) (uintptr_t) buf;
2754 if (ed->flags & SOLARIS_FMT)
2756 get_string(ed, s->link, vn->vn_file));
2758 PRT("\nentry: %d\n", i++);
2759 PRT("\tvn_version: %u\n", vn->vn_version);
2760 PRT("\tvn_cnt: %u\n", vn->vn_cnt);
2761 PRT("\tvn_file: %s\n",
2762 get_string(ed, s->link, vn->vn_file));
2763 PRT("\tvn_aux: %u\n", vn->vn_aux);
2764 PRT("\tvn_next: %u\n\n", vn->vn_next);
2766 buf2 = buf + vn->vn_aux;
2769 while (buf2 + sizeof(Elf32_Vernaux) <= end && j < vn->vn_cnt) {
2770 vna = (Elf32_Vernaux *) (uintptr_t) buf2;
2771 if (ed->flags & SOLARIS_FMT) {
2776 PRT("%s\n", get_string(ed, s->link,
2779 PRT("\t\tvna: %d\n", j++);
2780 PRT("\t\t\tvna_hash: %u\n", vna->vna_hash);
2781 PRT("\t\t\tvna_flags: %u\n", vna->vna_flags);
2782 PRT("\t\t\tvna_other: %u\n", vna->vna_other);
2783 PRT("\t\t\tvna_name: %s\n",
2784 get_string(ed, s->link, vna->vna_name));
2785 PRT("\t\t\tvna_next: %u\n", vna->vna_next);
2787 if (vna->vna_next == 0)
2789 buf2 += vna->vna_next;
2791 if (vn->vn_next == 0)
2798 * Dump the symbol-versioning sections.
2801 elf_print_symver(struct elfdump *ed)
2806 for (i = 0; (size_t)i < ed->shnum; i++) {
2808 if (!STAILQ_EMPTY(&ed->snl) && !find_name(ed, s->name))
2810 if (s->type == SHT_SUNW_verdef)
2811 elf_print_verdef(ed, s);
2812 if (s->type == SHT_SUNW_verneed)
2813 elf_print_verneed(ed, s);
2818 * Dump the ELF checksum. See gelf_checksum(3) for details.
2821 elf_print_checksum(struct elfdump *ed)
2824 if (!STAILQ_EMPTY(&ed->snl))
2827 PRT("\nelf checksum: %#lx\n", gelf_checksum(ed->elf));
2830 #define USAGE_MESSAGE "\
2831 Usage: %s [options] file...\n\
2832 Display information about ELF objects and ar(1) archives.\n\n\
2834 -a Show all information.\n\
2835 -c Show shared headers.\n\
2836 -d Show dynamic symbols.\n\
2837 -e Show the ELF header.\n\
2839 -H | --help Show a usage message and exit.\n\
2840 -h Show hash values.\n\
2841 -i Show the dynamic interpreter.\n\
2842 -k Show the ELF checksum.\n\
2843 -n Show the contents of note sections.\n\
2844 -N NAME Show the section named \"NAME\".\n\
2845 -p Show the program header.\n\
2846 -r Show relocations.\n\
2847 -s Show the symbol table.\n\
2848 -S Use the Solaris elfdump format.\n\
2849 -v Show symbol-versioning information.\n\
2850 -V | --version Print a version identifier and exit.\n\
2851 -w FILE Write output to \"FILE\".\n"
2856 fprintf(stderr, USAGE_MESSAGE, ELFTC_GETPROGNAME());