从 ARM-GCC 编译的 elf 文件中提取详细的符号信息(结构成员)

inn*_*out 8 debugging gcc arm elf objdump

我正在使用 ARM-GCC 4.7.4 为 Cortex-M4 编译代码。对于我们的调试工具,我需要有关人类可读格式(例如 .txt)的所有变量的名称、类型和地址的知识。地图文件提供了大部分信息,遗憾的是没有提供如下结构内容:

typedef struct {    float32_t   Ref;        // Input:   Reference Value
            float32_t   Fdb;        // Variable:    Feedback Value
            float32_t   Err;        // Input:   Control Error
            float32_t   Kp;     // Parameter:   Gain of the Proportional Part
            float32_t   Up;         // Output:  Output of Proportional Part
            float32_t   Ki;     // Parameter:   Gain of the Integral Part
            float32_t   Ui;     // Output:  Output of the Integral Part
            float32_t   OutPreSat;  // Output:  Not saturated Output
            float32_t   OutMax;     // Parameter:   Maximum Output
            float32_t   OutMin;     // Parameter:   Minimum Output
            float32_t   Out;        // Output:  Saturated Output
        } PI_REG;

 PI_REG BU_Uctrl_Udc_PI_Reg = BU_UCTRL_UDC_PI_REG_INIT;
Run Code Online (Sandbox Code Playgroud)

因此,我尝试使用 nm、readelf 和 objdump 工具从使用参数 –g3 以 dwarf-2 格式编译的 .elf 文件中获取一些内容。只有使用 objdump 我才能找到我搜索的信息:

objdump –Wi myfile.elf >symbols.txt
Run Code Online (Sandbox Code Playgroud)

可以在symbols.txt 文件中找到有关typedef PI_REG 的以下信息:

 <1><38883>: Abbrev Number: 2 (DW_TAG_base_type)
    <38884>   DW_AT_byte_size   : 4
    <38885>   DW_AT_encoding    : 4 (float)
    <38886>   DW_AT_name        : (indirect string, offset: 0x2c63e): float 
 <1><38891>: Abbrev Number: 11 (DW_TAG_typedef)
    <38892>   DW_AT_name        : (indirect string, offset: 0xb336d): float32_t
    <38896>   DW_AT_decl_file   : 4 
    <38897>   DW_AT_decl_line   : 370   
    <38899>   DW_AT_type        : <0x38883>
 <1><390d7>: Abbrev Number: 14 (DW_TAG_structure_type)
    <390d8>   DW_AT_byte_size   : 44    
    <390d9>   DW_AT_decl_file   : 6 
    <390da>   DW_AT_decl_line   : 26    
    <390db>   DW_AT_sibling     : <0x39176> 
 <2><390df>: Abbrev Number: 16 (DW_TAG_member)
    <390e0>   DW_AT_name        : Ref   
    <390e4>   DW_AT_decl_file   : 6 
    <390e5>   DW_AT_decl_line   : 26    
    <390e6>   DW_AT_type        : <0x38891> 
    <390ea>   DW_AT_data_member_location: 2 byte block: 23 0 (DW_OP_plus_uconst: 0) 
 <2><390ed>: Abbrev Number: 16 (DW_TAG_member)
    <390ee>   DW_AT_name        : Fdb   
    <390f2>   DW_AT_decl_file   : 6 
    <390f3>   DW_AT_decl_line   : 27    
    <390f4>   DW_AT_type        : <0x38891> 
    <390f8>   DW_AT_data_member_location: 2 byte block: 23 4 (DW_OP_plus_uconst: 4)
Run Code Online (Sandbox Code Playgroud)

[省略了偏移量 6-32 的结构成员]

 <2><39159>: Abbrev Number: 15 (DW_TAG_member)
    <3915a>   DW_AT_name        : (indirect string, offset: 0xc1d9a): OutMin    
    <3915e>   DW_AT_decl_file   : 6 
    <3915f>   DW_AT_decl_line   : 35    
    <39160>   DW_AT_type        : <0x38891>
    <39164>   DW_AT_data_member_location: 2 byte block: 23 24 (DW_OP_plus_uconst: 36) 
 <2><39167>: Abbrev Number: 16 (DW_TAG_member)
    <39168>   DW_AT_name        : Out   
    <3916c>   DW_AT_decl_file   : 6 
    <3916d>   DW_AT_decl_line   : 36    
    <3916e>   DW_AT_type        : <0x38891>
    <39172>   DW_AT_data_member_location: 2 byte block: 23 28 (DW_OP_plus_uconst: 40) 
 <1><39176>: Abbrev Number: 3 (DW_TAG_typedef)
    <39177>   DW_AT_name        : (indirect string, offset: 0xc00d0): PI_REG    
    <3917b>   DW_AT_decl_file   : 6 
    <3917c>   DW_AT_decl_line   : 37    
    <3917d>   DW_AT_type        : <0x390d7> 

 <1><3c348>: Abbrev Number: 29 (DW_TAG_variable)
    <3c349>   DW_AT_name        : (indirect string, offset: 0xc3ece): BU_Uctrl_Udc_PI_Reg
    <3c34d>   DW_AT_decl_file   : 1 
    <3c34e>   DW_AT_decl_line   : 40    
    <3c34f>   DW_AT_type        : <0x39176> 
    <3c353>   DW_AT_external    : 1 
    <3c354>   DW_AT_location    : 5 byte block: 3 fc 67 0 20 (DW_OP_addr: 200067fc)
Run Code Online (Sandbox Code Playgroud)

如果我想获取有关变量的信息,例如结构 BU_Uctrl_Udc_PI_Reg,我必须执行以下操作:

Find an entry called “DW_TAG_variable” and gather following information:
------------------------------------------------------------------------
 - DW_AT_name: The name is BU_Uctrl_Udc_PI_Reg
 - DW_OP_addr: Base address is 200067fc
 - DW_AT_type: The data type can be found at line 39176 

Search line 39176 and gather following information:
-----------------------------------------------------
 - It is a typedef (DW_TAG_typedef)
 - DW_AT_name: The typedef name is PI_REG
 - DW_AT_type: The definition can be found at line 390d7

Search line 390d7 and gather following information:
---------------------------------------------------
 - It is a structure (DW_TAG_structure_type) 
 - DW_AT_byte_size: It is 44 bytes wide

Search the structure Members in upcoming lines until 44 bytes are reached:
--------------------------------------------------------

1. Member (DW_TAG_member):
 - DW_AT_name: Ref
 - DW_AT_data_member_location: 200067fc + 0
 - DW_AT_type: The data type can be found at line 38891:
 - DW_TAG_typedef: float32_t
 - DW_AT_type: The data type can be found at line 38883: 
 - DW_TAG_base_type: float
 - DW_AT_byte_size: 4 bytes

2. Member (DW_TAG_member):
 - DW_AT_name: Fdb
 - DW_AT_data_member_location: 200067fc + 4
 - DW_AT_type: The data type can be found at line 38891:
 - DW_TAG_typedef: float32_t
 - DW_AT_type: The data type can be found at line 38883:
 - DW_TAG_base_type: float
 - DW_AT_byte_size: 4 bytes

[left out Members 3-9]

10. Member (DW_TAG_member):
 - DW_AT_name: OutMin
 - DW_AT_data_member_location: 200067fc + 36
 - DW_AT_type: The data type can be found at line 38891:
 - DW_TAG_typedef: float32_t
 - DW_AT_type: The data type can be found at line 38883:
 - DW_TAG_base_type: float
 - DW_AT_byte_size: 4 bytes

 11. Member (DW_TAG_member):
 - DW_AT_name: Out
 - DW_AT_data_member_location: 200067fc + 40
 - DW_AT_type: The data type can be found at line 38891:
 - DW_TAG_typedef: float32_t
 - DW_AT_type: The data type can be found at line 38883:
 - DW_TAG_base_type: float
 - DW_AT_byte_size: 4 bytes
Run Code Online (Sandbox Code Playgroud)

坦率地说,一个自动收集上述信息的脚本文件会比我的应用程序更复杂。此外,我不得不承认,我真的不知道如何编写这样的脚本。有没有更简单的方法来获取此类信息?objdump 是否有一些参数可以帮助我解决这个问题,尽管我想我尝试了所有相关的参数?或者是否存在能够做到这一点的工具?最后,我需要一个这样的表(另外,拥有所有枚举当然也可以在 .elf 文件中找到):

0x200067fc  float   BU_Uctrl_Udc_PI_Reg.Ref
0x20006800  float   BU_Uctrl_Udc_PI_Reg.Fdb
[…]
0x20006832  float   BU_Uctrl_Udc_PI_Reg.OutMin
0x20006836  float   BU_Uctrl_Udc_PI_Reg.Out
Run Code Online (Sandbox Code Playgroud)

带有参数 --text的工具 Fromelf http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.dui0477c/index.html(包含在 Keil µVision 中)正好提供了这样的表格,但不幸的是我不能使用它,因为它应该需要 .elf 或者在这种情况下称为 .axf 文件使用 Arm Compiler Toolchain 编译才能工作。此外还有许可证问题。

感谢您的任何提示。

小智 5

pahole 是你需要的吗?它可以转储具有大小和偏移量的变量结构。

\n\n
pahole \xe2\x88\x92\xe2\x88\x92reorganize \xe2\x88\x92C foo xxx.out\n\nstruct foo {\nint a; / 0 4 /\nchar c[4]; / 4 4 /\nvoid b; / 8 8 /\nlong g; / 16 8 /\n}; / size: 24, cachelines: 1 /\n/ last cacheline: 24 bytes /\n/ saved 8 bytes! /\n
Run Code Online (Sandbox Code Playgroud)\n

  • 在 ubuntu 上,使用 sudo apt-get install dwarves 安装 (2认同)

Emp*_*ian 3

您应该能够要求 GDB 为您打印此信息,例如

gdb -q a.out
(gdb) ptype PI_REG
Run Code Online (Sandbox Code Playgroud)