math.elfdump 2.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145
  1. elf header:
  2. EI_MAG = b'\x7fELF'
  3. EI_CLASS = 0x1
  4. EI_DATA = 0x1
  5. EI_VERSION = 0x1
  6. EI_OSABI = 0x0
  7. EI_ABIVERSION = 0x0
  8. EI_PAD = b'\x00\x00\x00\x00\x00\x00\x00'
  9. e_type = 0x2
  10. e_machine = 0xf3
  11. e_version = 0x1
  12. e_entry = 0x10134
  13. e_phoff = 0x34
  14. e_shoff = 0x364
  15. e_flags = 0x0
  16. e_ehsize = 0x34
  17. e_phentsize = 0x20
  18. e_phnum = 0x3
  19. e_shentsize = 0x28
  20. e_shnum = 0x8
  21. e_shstrndx = 0x7
  22. Program Header:
  23. p_type = 0x70000003
  24. p_offset = 0x184
  25. p_vaddr = 0x0
  26. p_paddr = 0x0
  27. p_filesz = 0x1c
  28. p_memsz = 0x0
  29. p_flags = 0x4
  30. p_align = 0x1
  31. Program Header:
  32. p_type = 0x1
  33. p_offset = 0x0
  34. p_vaddr = 0x10000
  35. p_paddr = 0x10000
  36. p_filesz = 0x169
  37. p_memsz = 0x169
  38. p_flags = 0x5
  39. p_align = 0x1000
  40. Program Header:
  41. p_type = 0x6474e551
  42. p_offset = 0x0
  43. p_vaddr = 0x0
  44. p_paddr = 0x0
  45. p_filesz = 0x0
  46. p_memsz = 0x0
  47. p_flags = 0x6
  48. p_align = 0x10
  49. Section Header 0:
  50. sh_name = 0x0
  51. sh_type = 0x0
  52. sh_flags = 0x0
  53. sh_addr = 0x0
  54. sh_offset = 0x0
  55. sh_size = 0x0
  56. sh_link = 0x0
  57. sh_info = 0x0
  58. sh_addralign = 0x0
  59. sh_entsize = 0x0
  60. name_text =
  61. Section Header 1:
  62. sh_name = 0x1b
  63. sh_type = 0x1
  64. sh_flags = 0x6
  65. sh_addr = 0x10094
  66. sh_offset = 0x94
  67. sh_size = 0xd0
  68. sh_link = 0x0
  69. sh_info = 0x0
  70. sh_addralign = 0x4
  71. sh_entsize = 0x0
  72. name_text = .text
  73. Section Header 2:
  74. sh_name = 0x21
  75. sh_type = 0x1
  76. sh_flags = 0x2
  77. sh_addr = 0x10164
  78. sh_offset = 0x164
  79. sh_size = 0x5
  80. sh_link = 0x0
  81. sh_info = 0x0
  82. sh_addralign = 0x4
  83. sh_entsize = 0x0
  84. name_text = .rodata
  85. Section Header 3:
  86. sh_name = 0x29
  87. sh_type = 0x1
  88. sh_flags = 0x30
  89. sh_addr = 0x0
  90. sh_offset = 0x169
  91. sh_size = 0x1b
  92. sh_link = 0x0
  93. sh_info = 0x0
  94. sh_addralign = 0x1
  95. sh_entsize = 0x1
  96. name_text = .comment
  97. Section Header 4:
  98. sh_name = 0x32
  99. sh_type = 0x70000003
  100. sh_flags = 0x0
  101. sh_addr = 0x0
  102. sh_offset = 0x184
  103. sh_size = 0x1c
  104. sh_link = 0x0
  105. sh_info = 0x0
  106. sh_addralign = 0x1
  107. sh_entsize = 0x0
  108. name_text = .riscv.attributes
  109. Section Header 5:
  110. sh_name = 0x1
  111. sh_type = 0x2
  112. sh_flags = 0x0
  113. sh_addr = 0x0
  114. sh_offset = 0x1a0
  115. sh_size = 0x110
  116. sh_link = 0x6
  117. sh_info = 0x7
  118. sh_addralign = 0x4
  119. sh_entsize = 0x10
  120. name_text = .symtab
  121. Section Header 6:
  122. sh_name = 0x9
  123. sh_type = 0x3
  124. sh_flags = 0x0
  125. sh_addr = 0x0
  126. sh_offset = 0x2b0
  127. sh_size = 0x6e
  128. sh_link = 0x0
  129. sh_info = 0x0
  130. sh_addralign = 0x1
  131. sh_entsize = 0x0
  132. name_text = .strtab
  133. Section Header 7:
  134. sh_name = 0x11
  135. sh_type = 0x3
  136. sh_flags = 0x0
  137. sh_addr = 0x0
  138. sh_offset = 0x31e
  139. sh_size = 0x44
  140. sh_link = 0x0
  141. sh_info = 0x0
  142. sh_addralign = 0x1
  143. sh_entsize = 0x0
  144. name_text = .shstrtab