linux学习手册,Linux命令学习手册

}

2)编译如下:

[quietheart@lv-k bak]$ g++ -c myfile.cpp

[quietheart@lv-k bak]$ g++ -shared -fPCI -o libmy.so myfile.o

[quietheart@lv-k bak]$ ar -r libmy.a myfile.o

ar: creating libmy.a

3)编译之后,查看生成的文件:

[quietheart@lv-k bak]$ ls -l

总计 44

-rw-r--r-- 1 quietheart quietheart 2154 07-08 16:14 libmy.a

-rwxr-xr-x 1 quietheart quietheart 5707 07-08 16:08 libmy.so

-rwxr-xr-x 1 quietheart quietheart  117 07-08 16:06 myfile.cpp

-rwxr-xr-x 1 quietheart quietheart   63 07-08 16:08 myfile.h

-rw-r--r-- 1 quietheart quietheart 2004 07-08 16:08 myfile.o

libmy.a  libmy.so  myfile.cpp  myfile.h  myfile.o

这里,分别生成目标文件myfile.o,共享库文件libmy.so,和静态库文件libmy.a。

基于以上可执行文件和库,这里给出一些常用的命令。

*读取可执行文件形式的elf文件头信息:

[quietheart@lv-k cppDemo]$ readelf -h main

输入之后,输出信息如下:

ELF Header:

Magic:   7f 45 4c 46 01 01 01 00 00 00 00 00 00 00 00 00

Class:                             ELF32

Data:                              2's complement, little endian

Version:                           1 (current)

OS/ABI:                            UNIX - System V

ABI Version:                       0

Type:                              EXEC (Executable file)

Machine:                           Intel 80386

Version:                           0x1

Entry point address:               0x8048580

Start of program headers:          52 (bytes into file)

Start of section headers:          3232 (bytes into file)

Flags:                             0x0

Size of this header:               52 (bytes)

Size of program headers:           32 (bytes)

Number of program headers:         8

Size of section headers:           40 (bytes)

Number of section headers:         29

Section header string table index: 26

这里,可见可执行文件的elf文件,其类型为EXEC(可执行文件)。另外,含调试信息的"main.debug"和不含调试信息的"main"除了一些大小信息之外,其内容是一样的。并且由此可见文件的体系结构为Intel 80386。

*读取目标文件形式的elf文件头信息:

[quietheart@lv-k bak]$ readelf -h myfile.o

输入之后,输出信息大致如下:

ELF Header:

Magic:   7f 45 4c 46 01 01 01 00 00 00 00 00 00 00 00 00

Class:                             ELF32

Data:                              2's complement, little endian

Version:                           1 (current)

OS/ABI:                            UNIX - System V

ABI Version:                       0

Type:                              REL (Relocatable file)

Machine:                           Intel 80386

Version:                           0x1

Entry point address:               0x0

Start of program headers:          0 (bytes into file)

Start of section headers:          516 (bytes into file)

Flags:                             0x0

Size of this header:               52 (bytes)

Size of program headers:           0 (bytes)

Number of program headers:         0

Size of section headers:           40 (bytes)

Number of section headers:         15

Section header string table index: 12

这里,可见目标文件的elf文件,其类型为REL(可重定位文件)。

*读取静态库文件形式的elf文件头信息:

[quietheart@lv-k bak]$ readelf -h libmy.a

输入之后,输出信息大致如下:

File: libmy.a(myfile.o)

ELF Header:

Magic:   7f 45 4c 46 01 01 01 00 00 00 00 00 00 00 00 00

Class:                             ELF32

Data:                              2's complement, little endian

Version:                           1 (current)

OS/ABI:                            UNIX - System V

ABI Version:                       0

Type:                              REL (Relocatable file)

Machine:                           Intel 80386

Version:                           0x1

Entry point address:               0x0

Start of program headers:          0 (bytes into file)

Start of section headers:          516 (bytes into file)

Flags:                             0x0

Size of this header:               52 (bytes)

Size of program headers:           0 (bytes)

Number of program headers:         0

Size of section headers:           40 (bytes)

Number of section headers:         15

Section header string table index: 12

这里,可见静态库文件的elf文件,其类型为REL(可重定位文件)。

*读取动态库文件形式的elf文件头信息:

[quietheart@lv-k bak]$ readelf -h libmy.so

ELF Header:

Magic:   7f 45 4c 46 01 01 01 00 00 00 00 00 00 00 00 00

Class:                             ELF32

Data:                              2's complement, little endian

Version:                           1 (current)

OS/ABI:                            UNIX - System V

ABI Version:                       0

Type:                              DYN (Shared object file)

Machine:                           Intel 80386

Version:                           0x1

Entry point address:               0x550

Start of program headers:          52 (bytes into file)

Start of section headers:          2768 (bytes into file)

Flags:                             0x0

Size of this header:               52 (bytes)

Size of program headers:           32 (bytes)

Number of program headers:         5

Size of section headers:           40 (bytes)

Number of section headers:         27

Section header string table index: 24

这里,可见动态库文件的elf文件,其类型为DYN(共享目标文件)。

*查看可执行的elf文件程序头表信息:

[quietheart@lv-k cppDemo]$ readelf -l main

输入之后,输出信息如下:

Elf file type is EXEC (Executable file)

Entry point 0x8048580

There are 8 program headers, starting at offset 52

Program Headers:

Type           Offset   VirtAddr   PhysAddr   FileSiz MemSiz  Flg Align

PHDR           0x000034 0x08048034 0x08048034 0x00100 0x00100 R E 0x4

INTERP         0x000134 0x08048134 0x08048134 0x00013 0x00013 R   0x1

[Requesting program interpreter: /lib/ld-linux.so.2]

LOAD           0x000000 0x08048000 0x08048000 0x00970 0x00970 R E 0x1000

LOAD           0x000970 0x08049970 0x08049970 0x00130 0x001c8 RW  0x1000

DYNAMIC        0x000988 0x08049988 0x08049988 0x000e0 0x000e0 RW  0x4

NOTE           0x000148 0x08048148 0x08048148 0x00020 0x00020 R   0x4

GNU_EH_FRAME   0x000820 0x08048820 0x08048820 0x00044 0x00044 R   0x4

GNU_STACK      0x000000 0x00000000 0x00000000 0x00000 0x00000 RW  0x4

Section to Segment mapping:

Segment Sections...

00

01     .interp

02     .interp .note.ABI-tag .gnu.hash .dynsym .dynstr .gnu.version .gnu.version_r .rel.dyn .rel.plt .init .plt .text .fini .rodata .eh_frame_hdr .eh_frame

03     .ctors .dtors .jcr .dynamic .got .got.plt .data .bss

04     .dynamic

05     .note.ABI-tag

06     .eh_frame_hdr

07

这里,含调试信息的"main.debug"和不含调试信息的"main"其内容是一样的。

*查看目标文件的elf文件程序头表信息:

[quietheart@lv-k bak]$ readelf -l myfile.o

输入之后,输出信息类似如下:

There are no program headers in this file.

这里可知,可重定位的目标文件,它没程序头表。

*查看静态库文件的elf文件程序头表信息:

[quietheart@lv-k bak]$ readelf -l libmy.a

输入之后,输出信息类似如下:

File: libmy.a(myfile.o)

There are no program headers in this file.

这里可知,可重定位的静态库文件,它没程序头表。

*查看动态库文件的elf文件程序头表信息:

[quietheart@lv-k bak]$ readelf -l libmy.so

Elf file type is DYN (Shared object file)

Entry point 0x550

There are 5 program headers, starting at offset 52

Program Headers:

Type           Offset   VirtAddr   PhysAddr   FileSiz MemSiz  Flg Align

LOAD           0x000000 0x00000000 0x00000000 0x007f4 0x007f4 R E 0x1000

LOAD           0x0007f4 0x000017f4 0x000017f4 0x0011c 0x00128 RW  0x1000

DYNAMIC        0x000810 0x00001810 0x00001810 0x000e0 0x000e0 RW  0x4

GNU_EH_FRAME   0x000738 0x00000738 0x00000738 0x0002c 0x0002c R   0x4

GNU_STACK      0x000000 0x00000000 0x00000000 0x00000 0x00000 RW  0x4

Section to Segment mapping:

Segment Sections...

00     .gnu.hash .dynsym .dynstr .gnu.version .gnu.version_r .rel.dyn .rel.plt .init .plt .text .fini .rodata .eh_frame_hdr .eh_frame

01     .ctors .dtors .jcr .data.rel.ro .dynamic .got .got.plt .bss

02     .dynamic

03     .eh_frame_hdr

04

这里可知,做为共享目标文件的动态库,它程序头表。

*查看一个可执行的elf文件的节信息:

[quietheart@lv-k cppDemo]$ readelf -S main

输入之后,输出信息如下:

There are 29 section headers, starting at offset 0xca0:

Section Headers:

[Nr] Name              Type            Addr     Off    Size   ES Flg Lk Inf Al

[ 0]                   NULL            00000000 000000 000000 00      0   0  0

[ 1] .interp           PROGBITS        08048134 000134 000013 00   A  0   0  1

[ 2] .note.ABI-tag     NOTE            08048148 000148 000020 00   A  0   0  4

[ 3] .gnu.hash         GNU_HASH        08048168 000168 000030 04   A  4   0  4

[ 4] .dynsym           DYNSYM          08048198 000198 0000d0 10   A  5   1  4

[ 5] .dynstr           STRTAB          08048268 000268 000183 00   A  0   0  1

[ 6] .gnu.version      VERSYM          080483ec 0003ec 00001a 02   A  4   0  2

[ 7] .gnu.version_r    VERNEED         08048408 000408 000060 00   A  5   2  4

[ 8] .rel.dyn          REL             08048468 000468 000010 08   A  4   0  4

[ 9] .rel.plt          REL             08048478 000478 000048 08   A  4  11  4

[10] .init             PROGBITS        080484c0 0004c0 000017 00  AX  0   0  4

[11] .plt              PROGBITS        080484d8 0004d8 0000a0 04  AX  0   0  4

[12] .text             PROGBITS        08048580 000580 000268 00  AX  0   0 16

[13] .fini             PROGBITS        080487e8 0007e8 00001c 00  AX  0   0  4

[14] .rodata           PROGBITS        08048804 000804 00001a 00   A  0   0  4

[15] .eh_frame_hdr     PROGBITS        08048820 000820 000044 00   A  0   0  4

[16] .eh_frame         PROGBITS        08048864 000864 00010c 00   A  0   0  4

[17] .ctors            PROGBITS        08049970 000970 00000c 00  WA  0   0  4

[18] .dtors            PROGBITS        0804997c 00097c 000008 00  WA  0   0  4

[19] .jcr              PROGBITS        08049984 000984 000004 00  WA  0   0  4

[20] .dynamic          DYNAMIC         08049988 000988 0000e0 08  WA  5   0  4

[21] .got              PROGBITS        08049a68 000a68 000004 04  WA  0   0  4

[22] .got.plt          PROGBITS        08049a6c 000a6c 000030 04  WA  0   0  4

[23] .data             PROGBITS        08049a9c 000a9c 000004 00  WA  0   0  4

[24] .bss              NOBITS          08049aa0 000aa0 000098 00  WA  0   0  8

[25] .comment          PROGBITS        00000000 000aa0 000114 00      0   0  1

[26] .shstrtab         STRTAB          00000000 000bb4 0000e9 00      0   0  1

[27] .symtab           SYMTAB          00000000 001128 000510 10     28  53  4

[28] .strtab           STRTAB          00000000 001638 0003f4 00      0   0  1

Key to Flags:

W (write), A (alloc), X (execute), M (merge), S (strings)

I (info), L (link order), G (group), x (unknown)

O (extra OS processing required) o (OS specific), p (processor specific)

这里,main是可执行文件,不含调试信息。

*查看一个包含调试信息的可执行的elf文件的节信息:

[quietheart@lv-k cppDemo]$ readelf -S main.debug

输入之后,输出如下:

There are 37 section headers, starting at offset 0x88c8:

Section Headers:

[Nr] Name              Type            Addr     Off    Size   ES Flg Lk Inf Al

[ 0]                   NULL            00000000 000000 000000 00      0   0  0

[ 1] .interp           PROGBITS        08048134 000134 000013 00   A  0   0  1

[ 2] .note.ABI-tag     NOTE            08048148 000148 000020 00   A  0   0  4

[ 3] .gnu.hash         GNU_HASH        08048168 000168 000030 04   A  4   0  4

[ 4] .dynsym           DYNSYM          08048198 000198 0000d0 10   A  5   1  4

[ 5] .dynstr           STRTAB          08048268 000268 000183 00   A  0   0  1

[ 6] .gnu.version      VERSYM          080483ec 0003ec 00001a 02   A  4   0  2

[ 7] .gnu.version_r    VERNEED         08048408 000408 000060 00   A  5   2  4

[ 8] .rel.dyn          REL             08048468 000468 000010 08   A  4   0  4

[ 9] .rel.plt          REL             08048478 000478 000048 08   A  4  11  4

[10] .init             PROGBITS        080484c0 0004c0 000017 00  AX  0   0  4

[11] .plt              PROGBITS        080484d8 0004d8 0000a0 04  AX  0   0  4

[12] .text             PROGBITS        08048580 000580 000268 00  AX  0   0 16

[13] .fini             PROGBITS        080487e8 0007e8 00001c 00  AX  0   0  4

[14] .rodata           PROGBITS        08048804 000804 00001a 00   A  0   0  4

[15] .eh_frame_hdr     PROGBITS        08048820 000820 000044 00   A  0   0  4

[16] .eh_frame         PROGBITS        08048864 000864 00010c 00   A  0   0  4

[17] .ctors            PROGBITS        08049970 000970 00000c 00  WA  0   0  4

[18] .dtors            PROGBITS        0804997c 00097c 000008 00  WA  0   0  4

[19] .jcr              PROGBITS        08049984 000984 000004 00  WA  0   0  4

[20] .dynamic          DYNAMIC         08049988 000988 0000e0 08  WA  5   0  4

[21] .got              PROGBITS        08049a68 000a68 000004 04  WA  0   0  4

[22] .got.plt          PROGBITS        08049a6c 000a6c 000030 04  WA  0   0  4

[23] .data             PROGBITS        08049a9c 000a9c 000004 00  WA  0   0  4

[24] .bss              NOBITS          08049aa0 000aa0 000098 00  WA  0   0  8

[25] .comment          PROGBITS        00000000 000aa0 000114 00      0   0  1

[26] .debug_aranges    PROGBITS        00000000 000bb4 000020 00      0   0  1

[27] .debug_pubnames   PROGBITS        00000000 000bd4 000028 00      0   0  1

[28] .debug_info       PROGBITS        00000000 000bfc 0067aa 00      0   0  1

[29] .debug_abbrev     PROGBITS        00000000 0073a6 000726 00      0   0  1

[30] .debug_line       PROGBITS        00000000 007acc 0003e1 00      0   0  1

[31] .debug_frame      PROGBITS        00000000 007eb0 00009c 00      0   0  4

[32] .debug_str        PROGBITS        00000000 007f4c 000735 00      0   0  1

[33] .debug_loc        PROGBITS        00000000 008681 0000f3 00      0   0  1

[34] .shstrtab         STRTAB          00000000 008774 000151 00      0   0  1

[35] .symtab           SYMTAB          00000000 008e90 000590 10     36  61  4

[36] .strtab           STRTAB          00000000 009420 0003f4 00      0   0  1

Key to Flags:

W (write), A (alloc), X (execute), M (merge), S (strings)

I (info), L (link order), G (group), x (unknown)

O (extra OS processing required) o (OS specific), p (processor specific)

可见,相对非调试版本的可执行文件,多了".debug*"段的信息。

*查看一个目标文件的elf文件的节信息:

[quietheart@lv-k bak]$ readelf -S myfile.o

输入之后,输出如下:

There are 15 section headers, starting at offset 0x204:

Section Headers:

[Nr] Name              Type            Addr     Off    Size   ES Flg Lk Inf Al

[ 0]                   NULL            00000000 000000 000000 00      0   0  0

[ 1] .text             PROGBITS        00000000 000034 00009e 00  AX  0   0  4

[ 2] .rel.text         REL             00000000 000744 000060 08     13   1  4

[ 3] .data             PROGBITS        00000000 0000d4 000000 00  WA  0   0  4

[ 4] .bss              NOBITS          00000000 0000d4 000001 00  WA  0   0  4

[ 5] .ctors            PROGBITS        00000000 0000d4 000004 00  WA  0   0  4

[ 6] .rel.ctors        REL             00000000 0007a4 000008 08     13   5  4

[ 7] .rodata           PROGBITS        00000000 0000d8 000006 00   A  0   0  1

[ 8] .eh_frame         PROGBITS        00000000 0000e0 00008c 00   A  0   0  4

[ 9] .rel.eh_frame     REL             00000000 0007ac 000028 08     13   8  4

[10] .comment          PROGBITS        00000000 00016c 00002e 00      0   0  1

[11] .note.GNU-stack   PROGBITS        00000000 00019a 000000 00      0   0  1

[12] .shstrtab         STRTAB          00000000 00019a 00006a 00      0   0  1

[13] .symtab           SYMTAB          00000000 00045c 000180 10     14  14  4

[14] .strtab           STRTAB          00000000 0005dc 000166 00      0   0  1

Key to Flags:

W (write), A (alloc), X (execute), M (merge), S (strings)

I (info), L (link order), G (group), x (unknown)

O (extra OS processing required) o (OS specific), p (processor specific)

*查看一个静态库文件的elf文件的节信息:

[quietheart@lv-k bak]$ readelf -S libmy.a

输入之后,输出如下:

File: libmy.a(myfile.o)

There are 15 section headers, starting at offset 0x204:

Section Headers:

[Nr] Name              Type            Addr     Off    Size   ES Flg Lk Inf Al

[ 0]                   NULL            00000000 000000 000000 00      0   0  0

[ 1] .text             PROGBITS        00000000 000034 00009e 00  AX  0   0  4

[ 2] .rel.text         REL             00000000 000744 000060 08     13   1  4

[ 3] .data             PROGBITS        00000000 0000d4 000000 00  WA  0   0  4

[ 4] .bss              NOBITS          00000000 0000d4 000001 00  WA  0   0  4

[ 5] .ctors            PROGBITS        00000000 0000d4 000004 00  WA  0   0  4

[ 6] .rel.ctors        REL             00000000 0007a4 000008 08     13   5  4

[ 7] .rodata           PROGBITS        00000000 0000d8 000006 00   A  0   0  1

[ 8] .eh_frame         PROGBITS        00000000 0000e0 00008c 00   A  0   0  4

[ 9] .rel.eh_frame     REL             00000000 0007ac 000028 08     13   8  4

[10] .comment          PROGBITS        00000000 00016c 00002e 00      0   0  1

[11] .note.GNU-stack   PROGBITS        00000000 00019a 000000 00      0   0  1

[12] .shstrtab         STRTAB          00000000 00019a 00006a 00      0   0  1

[13] .symtab           SYMTAB          00000000 00045c 000180 10     14  14  4

[14] .strtab           STRTAB          00000000 0005dc 000166 00      0   0  1

Key to Flags:

W (write), A (alloc), X (execute), M (merge), S (strings)

I (info), L (link order), G (group), x (unknown)

O (extra OS processing required) o (OS specific), p (processor specific)

*查看一个动态库文件的elf文件的节信息:

[quietheart@lv-k bak]$ readelf -S libmy.so

输入之后,输出如下:

There are 27 section headers, starting at offset 0xad0:

Section Headers:

[Nr] Name              Type            Addr     Off    Size   ES Flg Lk Inf Al

[ 0]                   NULL            00000000 000000 000000 00      0   0  0

[ 1] .gnu.hash         GNU_HASH        000000d4 0000d4 00003c 04   A  2   0  4

[ 2] .dynsym           DYNSYM          00000110 000110 000120 10   A  3   1  4

[ 3] .dynstr           STRTAB          00000230 000230 000199 00   A  0   0  1

[ 4] .gnu.version      VERSYM          000003ca 0003ca 000024 02   A  2   0  2

[ 5] .gnu.version_r    VERNEED         000003f0 0003f0 000050 00   A  3   2  4

[ 6] .rel.dyn          REL             00000440 000440 0000b0 08   A  2   0  4

[ 7] .rel.plt          REL             000004f0 0004f0 000010 08   A  2   9  4

[ 8] .init             PROGBITS        00000500 000500 000017 00  AX  0   0  4

[ 9] .plt              PROGBITS        00000518 000518 000030 04  AX  0   0  4

[10] .text             PROGBITS        00000550 000550 0001c4 00  AX  0   0 16

[11] .fini             PROGBITS        00000714 000714 00001c 00  AX  0   0  4

[12] .rodata           PROGBITS        00000730 000730 000006 00   A  0   0  1

[13] .eh_frame_hdr     PROGBITS        00000738 000738 00002c 00   A  0   0  4

[14] .eh_frame         PROGBITS        00000764 000764 000090 00   A  0   0  4

[15] .ctors            PROGBITS        000017f4 0007f4 00000c 00  WA  0   0  4

[16] .dtors            PROGBITS        00001800 000800 000008 00  WA  0   0  4

[17] .jcr              PROGBITS        00001808 000808 000004 00  WA  0   0  4

[18] .data.rel.ro      PROGBITS        0000180c 00080c 000004 00  WA  0   0  4

[19] .dynamic          DYNAMIC         00001810 000810 0000e0 08  WA  3   0  4

[20] .got              PROGBITS        000018f0 0008f0 00000c 04  WA  0   0  4

[21] .got.plt          PROGBITS        000018fc 0008fc 000014 04  WA  0   0  4

[22] .bss              NOBITS          00001910 000910 00000c 00  WA  0   0  4

[23] .comment          PROGBITS        00000000 000910 0000e6 00      0   0  1

[24] .shstrtab         STRTAB          00000000 0009f6 0000da 00      0   0  1

[25] .symtab           SYMTAB          00000000 000f08 000410 10     26  48  4

[26] .strtab           STRTAB          00000000 001318 000333 00      0   0  1

Key to Flags:

W (write), A (alloc), X (execute), M (merge), S (strings)

I (info), L (link order), G (group), x (unknown)

O (extra OS processing required) o (OS specific), p (processor specific)

[其它]

曾想将这个命令和其他binutils(例如objcopy,objdump,gprof,gcc,gdb等编译相关工具)工具作为单独工具来分类,可是对其输出解释的不够详细,所以只能做为一个命令了,更详细地解释,需要结合对elf文件有深入地了解。

更多信息的参考资料:

http://www.cnblogs.com/amethyst623/articles/1946499.html

info readelf

info binutils

关于elf文件的资料参见:

http://linux.chinaunix.net/techdoc/beginner/2009/04/23/1108716.shtml

http://www.dz3w.com/mcu/linux/0070701.html

http://www.sudu.cn/info/html/edu/20080428/302819.html

或者"man elf"

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值