Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(3)

Unified Diff: tools/dump-static-initializers.py

Issue 7837013: Check in a tool to dump static initializers from a binary (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: cleanup Created 9 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « no previous file | no next file » | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: tools/dump-static-initializers.py
diff --git a/tools/dump-static-initializers.py b/tools/dump-static-initializers.py
new file mode 100755
index 0000000000000000000000000000000000000000..214392371471db7f864fd368ddf50b306ae8923e
--- /dev/null
+++ b/tools/dump-static-initializers.py
@@ -0,0 +1,107 @@
+#!/usr/bin/python
+# Copyright (c) 2011 The Chromium Authors. All rights reserved.
+# Use of this source code is governed by a BSD-style license that can be
+# found in the LICENSE file.
+
+"""Dump functions called by static intializers in a Linux binary.
Nico 2011/09/06 22:45:00 "in a Linux release binary"?
+
+A brief overview of static initialization:
+1) the compiler writes out, per object file, a function that contains
Nico 2011/09/06 22:45:00 nit: move "per object file" to the beginning or en
+ the static intializers for that file.
+2) the compiler also writes out a pointer to that function in a special
+ section.
+3) at link time, the linker concatenates the function pointer sections
+ into a single list of all initializers.
+4) at run time, on startup the binary runs all function pointers.
+
+The functions in (1) all have mangled names of the form
+ _GLOBAL__I_foobar.cc
+using objdump, we can disassemble those functions and dump all symbols that
+they reference.
Nico 2011/09/06 22:45:00 Example invocation command line?
+"""
+
+import re
+import subprocess
+import sys
+
+# A map of symbol => informative text about it.
+NOTES = {
+ '__cxa_atexit@plt': 'registers a dtor to run at exit',
+ 'std::__ioinit': '#includes <iostream>, use <ostream> instead',
+}
+
+class Demangler(object):
+ """A wrapper around c++filt to provide a function to demangle symbols."""
+ def __init__(self):
+ self.cppfilt = subprocess.Popen(['c++filt'],
+ stdin=subprocess.PIPE,
+ stdout=subprocess.PIPE)
+
+ def Demangle(self, sym):
+ """Given mangled symbol |sym|, return its demangled form."""
+ self.cppfilt.stdin.write(sym + '\n')
+ return self.cppfilt.stdout.readline().strip()
+
+
+# Regex matching nm output for the symbols we're interested in.
Nico 2011/09/06 22:45:00 nit: Add "# Matches e.g. '+923afe3 5647 t _GLOBAL_
+nm_re = re.compile(r'(\S+) (\S+) t _GLOBAL__I_(.*)')
Nico 2011/09/06 22:45:00 (Unactionable remark: I like how a script that fig
+def ParseNm(binary):
+ """Given a binary, yield static initializers as (start, size, file) pairs."""
+
+ nm = subprocess.Popen(['nm', '-S', binary], stdout=subprocess.PIPE)
+ for line in nm.stdout:
+ match = nm_re.match(line)
+ if match:
+ addr, size, filename = match.groups()
+ yield int(addr, 16), int(size, 16), filename
+
+
+# Regex matching objdump output for the symbols we're interested in.
Nico 2011/09/06 22:45:00 nit: also add an example matching line
+disassembly_re = re.compile(r'^\s+[0-9a-f]+:.*<(\S+)>')
+def ExtractSymbolReferences(binary, start, end):
+ """Given a span of addresses, yields symbol references from disassembly."""
+ cmd = ['objdump', binary, '--disassemble',
+ '--start-address=0x%x' % start, '--stop-address=0x%x' % end]
+ objdump = subprocess.Popen(cmd, stdout=subprocess.PIPE)
+
+ refs = set()
+ for line in objdump.stdout:
+ #print line,
Nico 2011/09/06 22:45:00 remove?
+ match = disassembly_re.search(line)
+ if match:
+ (ref,) = match.groups()
+ if ref.startswith('.LC') or ref.startswith('_DYNAMIC'):
+ # Ignore these, they are uninformative.
+ continue
+ if ref.startswith('_GLOBAL__I_'):
+ # Probably a relative jump within this function.
+ continue
+ refs.add(ref)
+ continue
+ if '__static_initialization_and_destruction' in line:
+ raise RuntimeError, ('code mentions '
+ '__static_initialization_and_destruction; '
+ 'did you accidentally use a Debug binary?')
+
+ for ref in sorted(refs):
+ yield ref
+
+
+(binary,) = sys.argv[1:]
Lei Zhang 2011/09/06 23:02:37 print a help message when len(argv) != 2.
+demangler = Demangler()
+for addr, size, filename in ParseNm(binary):
+ if size == 2:
+ # gcc generates a two-byte 'repz retq' initializer when there is nothing
+ # to do. jyasskin tells me this is fixed in gcc 4.6.
+ # Two bytes is too small to do anything, so just ignore it.
+ continue
+
+ print '%s (0x%x 0x%x)' % (filename, addr, addr+size)
+ for ref in ExtractSymbolReferences(binary, addr, addr+size):
+ ref = demangler.Demangle(ref)
+ if ref in NOTES:
+ print ' ', '%s [%s]' % (ref, NOTES[ref])
+ else:
+ print ' ', ref
+ print
+
« no previous file with comments | « no previous file | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698