Daniel Dunbar | fb4a6b3 | 2009-08-21 09:11:24 +0000 | [diff] [blame] | 1 | #!/usr/bin/env python |
| 2 | |
| 3 | import struct |
| 4 | import sys |
Daniel Dunbar | 8906ff1 | 2009-08-22 07:22:36 +0000 | [diff] [blame] | 5 | import StringIO |
Daniel Dunbar | fb4a6b3 | 2009-08-21 09:11:24 +0000 | [diff] [blame] | 6 | |
| 7 | class Reader: |
| 8 | def __init__(self, path): |
| 9 | if path == '-': |
Daniel Dunbar | 8906ff1 | 2009-08-22 07:22:36 +0000 | [diff] [blame] | 10 | # Snarf all the data so we can seek. |
| 11 | self.file = StringIO.StringIO(sys.stdin.read()) |
Daniel Dunbar | fb4a6b3 | 2009-08-21 09:11:24 +0000 | [diff] [blame] | 12 | else: |
| 13 | self.file = open(path,'rb') |
| 14 | self.isLSB = None |
Daniel Dunbar | f0a0be4 | 2010-03-13 22:10:11 +0000 | [diff] [blame^] | 15 | self.is64Bit = None |
Daniel Dunbar | 8906ff1 | 2009-08-22 07:22:36 +0000 | [diff] [blame] | 16 | |
| 17 | self.string_table = None |
Daniel Dunbar | fb4a6b3 | 2009-08-21 09:11:24 +0000 | [diff] [blame] | 18 | |
Daniel Dunbar | fb4a6b3 | 2009-08-21 09:11:24 +0000 | [diff] [blame] | 19 | def tell(self): |
Daniel Dunbar | 8906ff1 | 2009-08-22 07:22:36 +0000 | [diff] [blame] | 20 | return self.file.tell() |
| 21 | |
| 22 | def seek(self, pos): |
| 23 | self.file.seek(pos) |
Daniel Dunbar | fb4a6b3 | 2009-08-21 09:11:24 +0000 | [diff] [blame] | 24 | |
| 25 | def read(self, N): |
| 26 | data = self.file.read(N) |
Daniel Dunbar | fb4a6b3 | 2009-08-21 09:11:24 +0000 | [diff] [blame] | 27 | if len(data) != N: |
| 28 | raise ValueError,"Out of data!" |
| 29 | return data |
| 30 | |
Daniel Dunbar | 8906ff1 | 2009-08-22 07:22:36 +0000 | [diff] [blame] | 31 | def read8(self): |
| 32 | return ord(self.read(1)) |
| 33 | |
| 34 | def read16(self): |
| 35 | return struct.unpack('><'[self.isLSB] + 'H', self.read(2))[0] |
| 36 | |
Daniel Dunbar | fb4a6b3 | 2009-08-21 09:11:24 +0000 | [diff] [blame] | 37 | def read32(self): |
Daniel Dunbar | 8333a8a | 2009-08-22 09:28:33 +0000 | [diff] [blame] | 38 | # Force to 32-bit, if possible; otherwise these might be long ints on a |
| 39 | # big-endian platform. FIXME: Why??? |
| 40 | Value = struct.unpack('><'[self.isLSB] + 'I', self.read(4))[0] |
| 41 | return int(Value) |
Daniel Dunbar | fb4a6b3 | 2009-08-21 09:11:24 +0000 | [diff] [blame] | 42 | |
Daniel Dunbar | f0a0be4 | 2010-03-13 22:10:11 +0000 | [diff] [blame^] | 43 | def read64(self): |
| 44 | return struct.unpack('><'[self.isLSB] + 'Q', self.read(8))[0] |
| 45 | |
Daniel Dunbar | 8906ff1 | 2009-08-22 07:22:36 +0000 | [diff] [blame] | 46 | def registerStringTable(self, strings): |
| 47 | if self.string_table is not None: |
| 48 | raise ValueError,"%s: warning: multiple string tables" % sys.argv[0] |
| 49 | |
| 50 | self.string_table = strings |
| 51 | |
| 52 | def getString(self, index): |
| 53 | if self.string_table is None: |
| 54 | raise ValueError,"%s: warning: no string table registered" % sys.argv[0] |
| 55 | |
| 56 | end = self.string_table.index('\x00', index) |
| 57 | return self.string_table[index:end] |
| 58 | |
Daniel Dunbar | fb4a6b3 | 2009-08-21 09:11:24 +0000 | [diff] [blame] | 59 | def dumpmacho(path, opts): |
| 60 | f = Reader(path) |
| 61 | |
| 62 | magic = f.read(4) |
| 63 | if magic == '\xFE\xED\xFA\xCE': |
Daniel Dunbar | f0a0be4 | 2010-03-13 22:10:11 +0000 | [diff] [blame^] | 64 | f.isLSB, f.is64Bit = False, False |
Daniel Dunbar | fb4a6b3 | 2009-08-21 09:11:24 +0000 | [diff] [blame] | 65 | elif magic == '\xCE\xFA\xED\xFE': |
Daniel Dunbar | f0a0be4 | 2010-03-13 22:10:11 +0000 | [diff] [blame^] | 66 | f.isLSB, f.is64Bit = True, False |
| 67 | elif magic == '\xFE\xED\xFA\xCF': |
| 68 | f.isLSB, f.is64Bit = False, True |
| 69 | elif magic == '\xCF\xFA\xED\xFE': |
| 70 | f.isLSB, f.is64Bit = True, True |
Daniel Dunbar | fb4a6b3 | 2009-08-21 09:11:24 +0000 | [diff] [blame] | 71 | else: |
| 72 | raise ValueError,"Not a Mach-O object file: %r (bad magic)" % path |
| 73 | |
| 74 | print "('cputype', %r)" % f.read32() |
| 75 | print "('cpusubtype', %r)" % f.read32() |
| 76 | filetype = f.read32() |
| 77 | print "('filetype', %r)" % filetype |
| 78 | |
| 79 | numLoadCommands = f.read32() |
| 80 | print "('num_load_commands', %r)" % filetype |
| 81 | |
| 82 | loadCommandsSize = f.read32() |
| 83 | print "('load_commands_size', %r)" % loadCommandsSize |
| 84 | |
| 85 | print "('flag', %r)" % f.read32() |
| 86 | |
Daniel Dunbar | f0a0be4 | 2010-03-13 22:10:11 +0000 | [diff] [blame^] | 87 | if f.is64Bit: |
| 88 | print "('reserved', %r)" % f.read32() |
| 89 | |
Daniel Dunbar | fb4a6b3 | 2009-08-21 09:11:24 +0000 | [diff] [blame] | 90 | start = f.tell() |
| 91 | |
| 92 | print "('load_commands', [" |
| 93 | for i in range(numLoadCommands): |
| 94 | dumpLoadCommand(f, i, opts) |
| 95 | print "])" |
| 96 | |
| 97 | if f.tell() - start != loadCommandsSize: |
Daniel Dunbar | f0a0be4 | 2010-03-13 22:10:11 +0000 | [diff] [blame^] | 98 | raise ValueError,"%s: warning: invalid load commands size: %r" % ( |
| 99 | sys.argv[0], loadCommandsSize) |
Daniel Dunbar | fb4a6b3 | 2009-08-21 09:11:24 +0000 | [diff] [blame] | 100 | |
| 101 | def dumpLoadCommand(f, i, opts): |
| 102 | start = f.tell() |
| 103 | |
| 104 | print " # Load Command %r" % i |
| 105 | cmd = f.read32() |
| 106 | print " (('command', %r)" % cmd |
| 107 | cmdSize = f.read32() |
| 108 | print " ('size', %r)" % cmdSize |
| 109 | |
| 110 | if cmd == 1: |
Daniel Dunbar | f0a0be4 | 2010-03-13 22:10:11 +0000 | [diff] [blame^] | 111 | dumpSegmentLoadCommand(f, opts, False) |
Daniel Dunbar | fb4a6b3 | 2009-08-21 09:11:24 +0000 | [diff] [blame] | 112 | elif cmd == 2: |
| 113 | dumpSymtabCommand(f, opts) |
| 114 | elif cmd == 11: |
| 115 | dumpDysymtabCommand(f, opts) |
Daniel Dunbar | f0a0be4 | 2010-03-13 22:10:11 +0000 | [diff] [blame^] | 116 | elif cmd == 25: |
| 117 | dumpSegmentLoadCommand(f, opts, True) |
Daniel Dunbar | 3bc1b19 | 2009-10-24 20:32:36 +0000 | [diff] [blame] | 118 | elif cmd == 27: |
| 119 | import uuid |
| 120 | print " ('uuid', %s)" % uuid.UUID(bytes=f.read(16)) |
Daniel Dunbar | fb4a6b3 | 2009-08-21 09:11:24 +0000 | [diff] [blame] | 121 | else: |
Daniel Dunbar | f0a0be4 | 2010-03-13 22:10:11 +0000 | [diff] [blame^] | 122 | print >>sys.stderr,"%s: warning: unknown load command: %r" % ( |
| 123 | sys.argv[0], cmd) |
Daniel Dunbar | fb4a6b3 | 2009-08-21 09:11:24 +0000 | [diff] [blame] | 124 | f.read(cmdSize - 8) |
| 125 | print " )," |
| 126 | |
| 127 | if f.tell() - start != cmdSize: |
Daniel Dunbar | f0a0be4 | 2010-03-13 22:10:11 +0000 | [diff] [blame^] | 128 | raise ValueError,"%s: warning: invalid load command size: %r" % ( |
| 129 | sys.argv[0], cmdSize) |
Daniel Dunbar | fb4a6b3 | 2009-08-21 09:11:24 +0000 | [diff] [blame] | 130 | |
Daniel Dunbar | f0a0be4 | 2010-03-13 22:10:11 +0000 | [diff] [blame^] | 131 | def dumpSegmentLoadCommand(f, opts, is64Bit): |
Daniel Dunbar | fb4a6b3 | 2009-08-21 09:11:24 +0000 | [diff] [blame] | 132 | print " ('segment_name', %r)" % f.read(16) |
Daniel Dunbar | f0a0be4 | 2010-03-13 22:10:11 +0000 | [diff] [blame^] | 133 | if is64Bit: |
| 134 | print " ('vm_addr', %r)" % f.read64() |
| 135 | print " ('vm_size', %r)" % f.read64() |
| 136 | print " ('file_offset', %r)" % f.read64() |
| 137 | print " ('file_size', %r)" % f.read64() |
| 138 | else: |
| 139 | print " ('vm_addr', %r)" % f.read32() |
| 140 | print " ('vm_size', %r)" % f.read32() |
| 141 | print " ('file_offset', %r)" % f.read32() |
| 142 | print " ('file_size', %r)" % f.read32() |
Daniel Dunbar | fb4a6b3 | 2009-08-21 09:11:24 +0000 | [diff] [blame] | 143 | print " ('maxprot', %r)" % f.read32() |
| 144 | print " ('initprot', %r)" % f.read32() |
| 145 | numSections = f.read32() |
| 146 | print " ('num_sections', %r)" % numSections |
| 147 | print " ('flags', %r)" % f.read32() |
| 148 | |
| 149 | print " ('sections', [" |
| 150 | for i in range(numSections): |
Daniel Dunbar | f0a0be4 | 2010-03-13 22:10:11 +0000 | [diff] [blame^] | 151 | dumpSection(f, i, opts, is64Bit) |
Daniel Dunbar | fb4a6b3 | 2009-08-21 09:11:24 +0000 | [diff] [blame] | 152 | print " ])" |
| 153 | |
| 154 | def dumpSymtabCommand(f, opts): |
Daniel Dunbar | 8906ff1 | 2009-08-22 07:22:36 +0000 | [diff] [blame] | 155 | symoff = f.read32() |
| 156 | print " ('symoff', %r)" % symoff |
| 157 | nsyms = f.read32() |
| 158 | print " ('nsyms', %r)" % nsyms |
| 159 | stroff = f.read32() |
| 160 | print " ('stroff', %r)" % stroff |
| 161 | strsize = f.read32() |
| 162 | print " ('strsize', %r)" % strsize |
| 163 | |
| 164 | prev_pos = f.tell() |
| 165 | |
| 166 | f.seek(stroff) |
| 167 | string_data = f.read(strsize) |
| 168 | print " ('_string_data', %r)" % string_data |
| 169 | |
| 170 | f.registerStringTable(string_data) |
| 171 | |
| 172 | f.seek(symoff) |
| 173 | print " ('_symbols', [" |
| 174 | for i in range(nsyms): |
| 175 | dumpNlist32(f, i, opts) |
| 176 | print " ])" |
| 177 | |
| 178 | f.seek(prev_pos) |
| 179 | |
| 180 | def dumpNlist32(f, i, opts): |
| 181 | print " # Symbol %r" % i |
| 182 | n_strx = f.read32() |
| 183 | print " (('n_strx', %r)" % n_strx |
| 184 | n_type = f.read8() |
| 185 | print " ('n_type', %#x)" % n_type |
| 186 | n_sect = f.read8() |
Daniel Dunbar | d889ac3 | 2009-08-22 10:09:17 +0000 | [diff] [blame] | 187 | print " ('n_sect', %r)" % n_sect |
Daniel Dunbar | 8906ff1 | 2009-08-22 07:22:36 +0000 | [diff] [blame] | 188 | n_desc = f.read16() |
| 189 | print " ('n_desc', %r)" % n_desc |
| 190 | n_value = f.read32() |
| 191 | print " ('n_value', %r)" % n_value |
| 192 | print " ('_string', %r)" % f.getString(n_strx) |
| 193 | print " )," |
Daniel Dunbar | fb4a6b3 | 2009-08-21 09:11:24 +0000 | [diff] [blame] | 194 | |
| 195 | def dumpDysymtabCommand(f, opts): |
| 196 | print " ('ilocalsym', %r)" % f.read32() |
| 197 | print " ('nlocalsym', %r)" % f.read32() |
| 198 | print " ('iextdefsym', %r)" % f.read32() |
| 199 | print " ('nextdefsym', %r)" % f.read32() |
| 200 | print " ('iundefsym', %r)" % f.read32() |
| 201 | print " ('nundefsym', %r)" % f.read32() |
| 202 | print " ('tocoff', %r)" % f.read32() |
| 203 | print " ('ntoc', %r)" % f.read32() |
| 204 | print " ('modtaboff', %r)" % f.read32() |
| 205 | print " ('nmodtab', %r)" % f.read32() |
| 206 | print " ('extrefsymoff', %r)" % f.read32() |
| 207 | print " ('nextrefsyms', %r)" % f.read32() |
Daniel Dunbar | 8906ff1 | 2009-08-22 07:22:36 +0000 | [diff] [blame] | 208 | indirectsymoff = f.read32() |
| 209 | print " ('indirectsymoff', %r)" % indirectsymoff |
| 210 | nindirectsyms = f.read32() |
| 211 | print " ('nindirectsyms', %r)" % nindirectsyms |
Daniel Dunbar | fb4a6b3 | 2009-08-21 09:11:24 +0000 | [diff] [blame] | 212 | print " ('extreloff', %r)" % f.read32() |
| 213 | print " ('nextrel', %r)" % f.read32() |
| 214 | print " ('locreloff', %r)" % f.read32() |
| 215 | print " ('nlocrel', %r)" % f.read32() |
| 216 | |
Daniel Dunbar | 8906ff1 | 2009-08-22 07:22:36 +0000 | [diff] [blame] | 217 | prev_pos = f.tell() |
| 218 | |
| 219 | f.seek(indirectsymoff) |
| 220 | print " ('_indirect_symbols', [" |
| 221 | for i in range(nindirectsyms): |
| 222 | print " # Indirect Symbol %r" % i |
Daniel Dunbar | 573e536 | 2009-08-26 04:28:45 +0000 | [diff] [blame] | 223 | print " (('symbol_index', %#x),)," % f.read32() |
Daniel Dunbar | 8906ff1 | 2009-08-22 07:22:36 +0000 | [diff] [blame] | 224 | print " ])" |
| 225 | |
| 226 | f.seek(prev_pos) |
| 227 | |
Daniel Dunbar | f0a0be4 | 2010-03-13 22:10:11 +0000 | [diff] [blame^] | 228 | def dumpSection(f, i, opts, is64Bit): |
Daniel Dunbar | fb4a6b3 | 2009-08-21 09:11:24 +0000 | [diff] [blame] | 229 | print " # Section %r" % i |
| 230 | print " (('section_name', %r)" % f.read(16) |
| 231 | print " ('segment_name', %r)" % f.read(16) |
Daniel Dunbar | f0a0be4 | 2010-03-13 22:10:11 +0000 | [diff] [blame^] | 232 | if is64Bit: |
| 233 | print " ('address', %r)" % f.read64() |
| 234 | size = f.read64() |
| 235 | print " ('size', %r)" % size |
| 236 | else: |
| 237 | print " ('address', %r)" % f.read32() |
| 238 | size = f.read32() |
| 239 | print " ('size', %r)" % size |
Daniel Dunbar | 6c2e2d1 | 2009-08-26 13:57:44 +0000 | [diff] [blame] | 240 | offset = f.read32() |
| 241 | print " ('offset', %r)" % offset |
| 242 | print " ('alignment', %r)" % f.read32() |
| 243 | reloc_offset = f.read32() |
| 244 | print " ('reloc_offset', %r)" % reloc_offset |
| 245 | num_reloc = f.read32() |
| 246 | print " ('num_reloc', %r)" % num_reloc |
Daniel Dunbar | fb4a6b3 | 2009-08-21 09:11:24 +0000 | [diff] [blame] | 247 | print " ('flags', %#x)" % f.read32() |
| 248 | print " ('reserved1', %r)" % f.read32() |
| 249 | print " ('reserved2', %r)" % f.read32() |
Daniel Dunbar | f0a0be4 | 2010-03-13 22:10:11 +0000 | [diff] [blame^] | 250 | if is64Bit: |
| 251 | print " ('reserved3', %r)" % f.read32() |
Daniel Dunbar | fb4a6b3 | 2009-08-21 09:11:24 +0000 | [diff] [blame] | 252 | print " )," |
Daniel Dunbar | 6c2e2d1 | 2009-08-26 13:57:44 +0000 | [diff] [blame] | 253 | |
| 254 | prev_pos = f.tell() |
| 255 | |
| 256 | f.seek(reloc_offset) |
| 257 | print " ('_relocations', [" |
| 258 | for i in range(num_reloc): |
| 259 | print " # Relocation %r" % i |
| 260 | print " (('word-0', %#x)," % f.read32() |
| 261 | print " ('word-1', %#x))," % f.read32() |
| 262 | print " ])" |
| 263 | |
| 264 | if opts.dumpSectionData: |
| 265 | f.seek(offset) |
| 266 | print " ('_section_data', %r)" % f.read(size) |
| 267 | |
| 268 | f.seek(prev_pos) |
Daniel Dunbar | fb4a6b3 | 2009-08-21 09:11:24 +0000 | [diff] [blame] | 269 | |
| 270 | def main(): |
| 271 | from optparse import OptionParser, OptionGroup |
| 272 | parser = OptionParser("usage: %prog [options] {files}") |
Daniel Dunbar | 6c2e2d1 | 2009-08-26 13:57:44 +0000 | [diff] [blame] | 273 | parser.add_option("", "--dump-section-data", dest="dumpSectionData", |
| 274 | help="Dump the contents of sections", |
| 275 | action="store_true", default=False) |
Daniel Dunbar | fb4a6b3 | 2009-08-21 09:11:24 +0000 | [diff] [blame] | 276 | (opts, args) = parser.parse_args() |
| 277 | |
| 278 | if not args: |
| 279 | args.append('-') |
| 280 | |
| 281 | for arg in args: |
| 282 | dumpmacho(arg, opts) |
| 283 | |
| 284 | if __name__ == '__main__': |
| 285 | main() |