[coreboot] Extracting an image created with mkelfImage

Brian Luckau bluckau at sgi.com
Tue Jan 10 00:12:17 CET 2012


Thanks!    

It is an initramfs but it was compressed (must just be very large in relative terms.)  After using your strategy to determine what to put into dd, I was able to use cpio and gzip to do the rest.

--Brian
________________________________________
From: coreboot-bounces at coreboot.org [coreboot-bounces at coreboot.org] on behalf of Brian Luckau [bluckau at sgi.com]
Sent: Monday, January 09, 2012 3:00 PM
To: Peter Stuge; coreboot at coreboot.org
Subject: Re: [coreboot] Extracting an image created with mkelfImage

Hi,

I'm not sure if I'm using the correct paramters but here is some of the information you requested.

# objdump -x -s -D Compute.ebi

Compute.ebi:     file format elf32-i386
Compute.ebi
architecture: i386, flags 0x00000102:
EXEC_P, D_PAGED
start address 0x00010000

Program Header:
    NOTE off    0x000000d4 vaddr 0x00000000 paddr 0x00000000 align 2**0
         filesz 0x000000a4 memsz 0x000000a4 flags rwx
    LOAD off    0x00000178 vaddr 0x00010000 paddr 0x00010000 align 2**0
         filesz 0x00001288 memsz 0x00005524 flags rwx
    LOAD off    0x00001400 vaddr 0x00020000 paddr 0x00020000 align 2**0
         filesz 0x00000000 memsz 0x00001070 flags rwx
    LOAD off    0x00001400 vaddr 0x00100000 paddr 0x00100000 align 2**0
         filesz 0x0020029c memsz 0x00700000 flags rwx
    LOAD off    0x0020169c vaddr 0x02800000 paddr 0x02800000 align 2**0
         filesz 0x007dbdc6 memsz 0x007dbdc6 flags rwx

Sections:
Idx Name          Size      VMA       LMA       File off  Algn
SYMBOL TABLE:
no symbols

root at admin cache]# readelf -a Compute.ebi
ELF Header:
  Magic:   7f 45 4c 46 01 01 01 00 00 00 00 00 00 00 00 00
  Class:                             ELF32
  Data:                              2's complement, little endian
  Version:                           1 (current)
  OS/ABI:                            UNIX - System V
  ABI Version:                       0
  Type:                              EXEC (Executable file)
  Machine:                           Intel 80386
  Version:                           0x1
  Entry point address:               0x10000
  Start of program headers:          52 (bytes into file)
  Start of section headers:          0 (bytes into file)
  Flags:                             0x0
  Size of this header:               52 (bytes)
  Size of program headers:           32 (bytes)
  Number of program headers:         5
  Size of section headers:           0 (bytes)
  Number of section headers:         0
  Section header string table index: 0

There are no sections in this file.

There are no sections in this file.

Program Headers:
  Type           Offset   VirtAddr   PhysAddr   FileSiz MemSiz  Flg Align
  NOTE           0x0000d4 0x00000000 0x00000000 0x000a4 0x000a4 RWE 0
  LOAD           0x000178 0x00010000 0x00010000 0x01288 0x05524 RWE 0
  LOAD           0x001400 0x00020000 0x00020000 0x00000 0x01070 RWE 0
  LOAD           0x001400 0x00100000 0x00100000 0x20029c 0x700000 RWE 0
  LOAD           0x20169c 0x02800000 0x02800000 0x7dbdc6 0x7dbdc6 RWE 0

There is no dynamic section in this file.

There are no relocations in this file.

There are no unwind sections in this file.

No version information found in this file.
__________________________
From: coreboot-bounces at coreboot.org [coreboot-bounces at coreboot.org] on behalf of Peter Stuge [peter at stuge.se]
Sent: Monday, January 09, 2012 2:30 PM
To: coreboot at coreboot.org
Subject: Re: [coreboot] Extracting an image created with mkelfImage

Hi Brian,

Brian Luckau wrote:
> I have an elf netowrk bootable image for linux that was created
> with mkelfImage.  How can I extract the file to view its contents
> (which kernel modules were included in the file, etc. )

The image may or may not include initrd, if yes it will quite likely
be compressed. What does readelf and/or objdump say about the file?

There's no pre-made tool for taking apart those ELF images. You can
of course always peruse the mkelfImage source code to find out all
details.

http://www.coreboot.org/Mkelfimage
svn co svn://coreboot.org/coreboot/trunk/util/mkelfImage


//Peter

--
coreboot mailing list: coreboot at coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

--
coreboot mailing list: coreboot at coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot




More information about the coreboot mailing list