bug-binutils
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Bug binutils/18428] New: [PATCH] added ENCRYPTION_INFO_64 load command


From: jon.appelberg at gmail dot com
Subject: [Bug binutils/18428] New: [PATCH] added ENCRYPTION_INFO_64 load command for mach-o
Date: Tue, 19 May 2015 10:35:25 +0000

https://sourceware.org/bugzilla/show_bug.cgi?id=18428

            Bug ID: 18428
           Summary: [PATCH] added ENCRYPTION_INFO_64 load command for
                    mach-o
           Product: binutils
           Version: 2.26 (HEAD)
            Status: NEW
          Severity: enhancement
          Priority: P2
         Component: binutils
          Assignee: unassigned at sourceware dot org
          Reporter: jon.appelberg at gmail dot com
  Target Milestone: ---

Created attachment 8325
  --> https://sourceware.org/bugzilla/attachment.cgi?id=8325&action=edit
patch file to add support for load command '0x2c' on mach-o binary

Support for load command '0x2c' for mach-o binaries was missing for the mach-o
binaries. 

How to reproduce issue: 
1) Install binutils for x86_64-apple-darwin:
./configure --prefix=$CROSSTOOLDIR --target=x86_64-apple-darwin
--enable-64-bit-bfd --disable-nls --disable-werror ; make
2) Run objdump -P load <apple iOS 64bit executable> |grep encr -A1
=>
  Load command #12 (size:  20, offset: 2552): encryption_info
  cryptoff: 0x00004000  cryptsize: 0x01d2c000 (endoff 0x01d30000) cryptid: 0
  BFD: <apple iOS 64bit executable>(0x100000c-0x0): unknown load command 0x2c

Expected output: 
  Load command #12 (size:  20, offset: 2552): encryption_info
    cryptoff: 0x00004000  cryptsize: 0x01d2c000 (endoff 0x01d30000) cryptid: 0
  --
  Load command #12 (size:  24, offset: 3144): encryption_info_64
    cryptoff: 0x00004000  cryptsize: 0x01a24000 (endoff 0x01a28000) cryptid: 0


This command is useful at least for iOS executables which now have the 64bit
header in addition to 32bit header.

Patch available in gist:
https://gist.github.com/jappelbe/b0cfa0ff48e739e4755f

Patch also attached.

-- 
You are receiving this mail because:
You are on the CC list for the bug.



reply via email to

[Prev in Thread] Current Thread [Next in Thread]