mtoctest.py   [plain text]


#!/usr/bin/python

import sys
import getopt

def Usage():
  print "Unkown command line args"
  
  
def main():
  try:
    opts, args = getopt.getopt(sys.argv[1:],"hav:",["help","arch=","verbose"]) 
  except getopt.GetoptError:
    print "Unkown command line args"
    sys.exit(2)

  Verbose = 0
  for o,a in opts:
    if o in ("-h", "--help"):
      Usage ()
      sys.exit ()
    elif o in ("-a", "--arch"):
      Arch = a
    else:
      Usage ()
      sys.exit ()
    

  if Verbose:
	print "\nmach-o load commands:"
  otoolload = open("otool-load.log", "r")
  data = otoolload.read()
  otoolload.close()
  
  
  # extract extry point from '	    ss  0x00000000 eflags 0x00000000 eip 0x00000259 cs  0x00000000'
  if Arch == "i386":
    eip = data.find("eip")
    if eip != -1:
      EntryPoint = int (data[eip + 4:eip + 4 + 10], 16)
  
  if Arch == "arm":
    r15 = data.find("r15")
    if r15 != -1:
      EntryPoint = int (data[r15 + 4:r15 + 4 + 10], 16)
  
  # extract entry point from '   r15  0x0000000000000000 rip 0x0000000000000253'
  if Arch == "x86_64":
    rip = data.find("rip")
    if rip != -1:
      EntryPoint = int (data[rip + 4:rip + 4 + 18], 16)
  
  if EntryPoint == 0:
    print "FAIL - no entry point for PE/COFF image"
    sys.exit(-1)
  else:
	if Verbose:
		print "Entry Point = 0x%08x" % EntryPoint
  
  
  if Verbose:
	print "\nPE/COFF dump:"
  objdump = open("objdump-raw.log", "r")
  data = objdump.read()
  objdump.close()
  
  # Extract 'SizeOfImage		00000360'
  Index = data.find("SizeOfImage")
  End = data[Index:].find("\n")
  SizeOfImage = int (data[Index+11:Index + End], 16);
  if Verbose:
	print "SizeOfImage = 0x%08x" % SizeOfImage
  
  #Parse '  0 .text         00000080  00000240  00000240  00000240  2**2'
  #      '                  CONTENTS, ALLOC, LOAD, READONLY, CODE       '
  EndOfTable = data.find("SYMBOL TABLE:")
  Index = data.find("Idx Name")
  End   = data[Index:].find("\n")
  Index = Index + End + 1
  
  PeCoffEnd = 0
  while Index < EndOfTable:
    End   = data[Index:].find("\n")
    Split = data[Index:Index+End].split()
    # Split[0] Indx
    # Split[1] Name i.e. .text
    # Split[2] Size
    # Split[3] VMA
    # Split[4] LMA
    # Split[5] File Off
    # Split[6] Align
    if int(Split[3],16) != int(Split[5],16):
      print "FAIL - %s VMA %08x not equal File off %08x XIP will not work" % (Split[1], int(Split[3],16), int(Split[5],16))
      sys.exit(-1)
  
    if int(Split[3],16) + int(Split[2],16) > PeCoffEnd:
      PeCoffEnd = int(Split[3],16) + int(Split[2],16)
    
    if Split[1] == ".text":
      SecStart = int(Split[3],16)
      SecEnd = int(Split[3],16) + int(Split[2],16)
      if (EntryPoint < SecStart) or (EntryPoint > SecEnd):
        print "FAIL - Entry point (0x%x) not in .text section (0x%x - 0x%x)" % (EntryPoint, SecStart, SecEnd)
        sys.exit(-1)
    
    if Verbose:
		print "%10s" % Split[1] + ' ' + Split[2] + ' ' + Split[3] + ' ' + Split[4] + ' ' + Split[5] + " End = %x" % PeCoffEnd
    Index += data[Index:].find("\n") + 1
    Index += data[Index:].find("\n") + 1
  
  if SizeOfImage < PeCoffEnd:
    print "FAIL - PE/COFF Header SizeOfImage (0x%x) is not correct. Image larger than size (0x%x)." % (SizeOfImage, PeCoffEnd)
    sys.exit(-1)
  
  if Verbose:
	print "\nmach-o relocations:"
  otoolreloc = open("otool-reloc.log", "r")
  lines = otoolreloc.readlines()
  otoolreloc.close()
  
  found = False
  for line in lines:
    if found:
      chunk = line.split()
      if Verbose:
        print chunk[0]
    if line.find ("address") > -1:
      found = True
  
  if Verbose:
	print


if __name__ == "__main__":
    main()