讀取ELF文件

/* elfparse.c - gcc elfparse.c -o elfparse */

#include <stdio.h>
#include <string.h>
#include <errno.h>
#include <elf.h>
#include <unistd.h>
#include <stdlib.h>
#include <sys/mman.h>
#include <stdint.h>
#include <sys/stat.h>
#include <fcntl.h>

int main(int argc, char **argv)
{
    int fd, i;
    uint8_t *mem;
    struct stat st;
    char *StringTable, *interp;

    Elf64_Ehdr *ehdr;//ELF file header
    Elf64_Phdr *phdr;//program header
    Elf64_Shdr *shdr;//section header

    if(argc < 2){
        printf("Usage: %s <executable>\n", argv[0]);
        exit(0);
    }

    printf("Elf64_Ehdr size: %d\n", sizeof(Elf64_Ehdr));

    if((fd = open(argv[1], O_RDONLY)) < 0){
        perror("open");
        exit(-1);
    }

    if(fstat(fd, &st) < 0){
        perror("fstat");
        exit(-1);
    }

    /* Map the executable into memory */
    mem = mmap(NULL, st.st_size, PROT_READ, MAP_PRIVATE, fd, 0);
    if(mem == MAP_FAILED){/*mmap may have many fuctions. I read*/
        perror("mmap");/*a blog, share memory, Changing disk to*/
        exit(-1);/*memory when memory is not enough may all use*/
    }/*mmap(). This is real mapping. This is the blog address: */
    /*https://blog.csdn.net/yanerhao/article/details/77829191  */

    /**
     * The initial ELF Header starts at offset 0
     * of our mapped memory
     */
    ehdr = (Elf64_Ehdr*)mem;

    /**
     * The shdr table and phdr table offsets are
     * given by e_shoff and e_phoff members of the
     * Elf64_Ehdr
     */
    phdr = (Elf64_Phdr*)&mem[ehdr->e_phoff];
    shdr = (Elf64_Shdr*)&mem[ehdr->e_shoff];

    /**
     * Check to see if the ELF magic (The first 4 bytes)
     * match up as 0x7f E L F (0x7f 45 4c 46)
     */
    if(mem[0] != 0x7f && strcmp(&mem[1], "ELF")){
        fprintf(stderr, "%s is not an ELF file\n", argv[1]);
        exit(-1);
    }

    /**
     * We are only parsing executables with this code
     * so ET_EXEC marks an executables.
     */
//    if(ehdr->e_type != ET_EXEC){
//        fprintf(stderr, "%s is not an executable\n", argv[1]);
//        exit(-1);
//    }

    printf("Program Entry point: 0x%x\n", ehdr->e_entry);

    /**
     * We find the string table for the section header
     * names with e_shstrndx which gives the index of
     * which section holds the string table.
     * e_shstrndx is the index of section .shstrtab
     * .shstrtab holds all sections's name, just a strings
     * ending with /0.
     */
    StringTable = &mem[shdr[ehdr->e_shstrndx].sh_offset];
    /**
      * Print each section header name and address.
      * Notice we get the index into the string table
      * that contains each section header name with
      * the shdr.sh_name member.
      */
    printf("Section header total:%d list:\n\n", ehdr->e_shnum);
    for(i = 0; i < ehdr->e_shnum; i++)
        printf("[%d]%s: 0x%x\n", i, &StringTable[shdr[i].sh_name], shdr[i].sh_addr);

    /**
      * Print out each segment name, and address.
      * Except for PT_INTERP we print the path to
      * the dynamic linker (Interpreter).
      */
    printf("\nProgram header total:%d list:\n\n", ehdr->e_phnum);
    for(i = 0; i < ehdr->e_phnum; i++){
        //         printf("phdr[%d].p_type=%d\n", i, phdr[i].p_type);
        switch(phdr[i].p_type){
        case PT_LOAD:
            /**
                  * We know that text segment starts
                  * at offset 0. And only one other
                  * possible loadable segment exists
                  * which is the data segment.
                  */
            // if(phdr[i].p_offset == 0)
            if (0 != (phdr[i].p_flags == (PF_X | PF_R))) {
                char *pp = &mem[phdr[i].p_offset];
                printf("Text segment: 0x%x  flag:%d\n", phdr[i].p_vaddr, phdr[i].p_flags);
            }
            else
                printf("Data segment: 0x%x  flag:%d\n",phdr[i].p_vaddr, phdr[i].p_flags);
            break;
        case PT_INTERP:
            interp = strdup((char*)&mem[phdr[i].p_offset]);
            printf("Interpreter: %s\n", interp);
            break;
        case PT_NOTE:
            printf("Note segment: 0x%x\n", phdr[i].p_vaddr);
            break;
        case PT_DYNAMIC:
            printf("Dynamic segment: 0x%x\n", phdr[i].p_vaddr);
            break;
        case PT_PHDR:
            printf("Phdr segment: 0x%x\n", phdr[i].p_vaddr);
            break;
        case PT_GNU_EH_FRAME:
            printf("GCC .eh_frame_hdr segment: 0x%x\n", phdr[i].p_vaddr);
            break;
        case PT_GNU_STACK:
            printf("Indicates stack executability: 0x%x\n", phdr[i].p_vaddr);
            break;
        case PT_GNU_RELRO:
            printf("Read-only after relocation: 0x%x\n", phdr[i].p_vaddr);
            break;
        case PT_TLS:
            printf("Thread-local storage segment: 0x%x\n", phdr[i].p_vaddr);
            break;
        default:
            printf("type:%d, %x\n", phdr[i].p_type, phdr[i].p_type);
            break;
        }
    }

    exit(0);
}

 

發表評論
所有評論
還沒有人評論,想成為第一個評論的人麼? 請在上方評論欄輸入並且點擊發布.
相關文章