meson/rpathtool.py

84 lines
2.9 KiB
Python
Raw Normal View History

2013-02-03 19:28:25 +08:00
#!/usr/bin/python3 -tt
# Copyright 2013 Jussi Pakkanen
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
2013-02-03 19:49:12 +08:00
import sys, struct
2013-02-03 20:11:04 +08:00
class SectionHeader():
def __init__(self, ifile):
#Elf64_Word
self.sh_name = struct.unpack('I', ifile.read(4))[0];
#Elf64_Word
self.sh_type = struct.unpack('I', ifile.read(4))[0]
#Elf64_Xword
self.sh_flags = struct.unpack('Q', ifile.read(8))[0];
#Elf64_Addr
self.sh_addr = struct.unpack('Q', ifile.read(8))[0];
#Elf64_Off
self.sh_offset = struct.unpack('Q', ifile.read(8))[0]
#Elf64_Xword
self.sh_size = struct.unpack('Q', ifile.read(8))[0];
#Elf64_Word
self.sh_link = struct.unpack('I', ifile.read(4))[0];
#Elf64_Word
self.sh_info = struct.unpack('I', ifile.read(4))[0];
#Elf64_Xword
self.sh_addralign = struct.unpack('Q', ifile.read(4))[0];
#Elf64_Xword
self.sh_entsize = struct.unpack('Q', ifile.read(8))[0];
2013-02-03 19:49:12 +08:00
class Elf():
def __init__(self, bfile):
2013-02-03 20:11:04 +08:00
self.bfile = bfile
2013-02-03 19:49:12 +08:00
self.bf = open(bfile, 'rb')
2013-02-03 20:11:04 +08:00
self.parse_header()
self.parse_sections()
def parse_header(self):
self.e_ident = struct.unpack('16s', self.bf.read(16))[0]
if self.e_ident[1:4] != b'ELF':
raise RuntimeError('File "%s" is not an ELF file.' % self.bfile)
2013-02-03 19:49:12 +08:00
self.e_type = struct.unpack('h', self.bf.read(2))[0]
self.e_machine = struct.unpack('h', self.bf.read(2))[0]
self.e_version = struct.unpack('i', self.bf.read(4))[0]
self.e_entry = struct.unpack('Q', self.bf.read(8))[0]
self.e_phoff = struct.unpack('Q', self.bf.read(8))[0]
self.e_shoff = struct.unpack('Q', self.bf.read(8))[0]
self.e_flags = struct.unpack('i', self.bf.read(4))[0]
self.e_ehsize = struct.unpack('h', self.bf.read(2))[0]
self.e_phentsize = struct.unpack('h', self.bf.read(2))[0]
self.e_phnum = struct.unpack('h', self.bf.read(2))[0]
self.e_shentsize = struct.unpack('h', self.bf.read(2))[0]
self.e_shnum = struct.unpack('h', self.bf.read(2))[0]
self.e_shstrndx = struct.unpack('h', self.bf.read(2))[0]
2013-02-03 19:28:25 +08:00
2013-02-03 20:11:04 +08:00
def parse_sections(self):
self.bf.seek(self.e_shoff)
self.sections = []
for i in range(self.e_shnum):
self.sections.append(self.bf)
2013-02-03 19:28:25 +08:00
def remove_rpath(bfile):
2013-02-03 19:49:12 +08:00
elf = Elf(bfile)
2013-02-03 19:28:25 +08:00
if __name__ == '__main__':
if len(sys.argv) != 2:
print('%s: <binary file>' % sys.argv[0])
exit(1)
bfile = sys.argv[1]
remove_rpath(bfile)