c - readelf-like tool for Mac OS X? -


There reading Mac OS tool offset the X binary transfer will print information about the table and symbol the same is readelf output

  readelf -r app rehabilitation section '.rel.dyn' offset 0x5ec 2 entries: Offset info Sym.Value symbol. Offset information follows Sym.Value symbol: name 08049d58 00,001,706 R_386_GLOB_DAT 00000000 __gmon_start__ 08049d60 00,000,305 R_386_COPY 08049d60 _ZSt4cout rehabilitation section '.rel.plt' are 13 entries in the offset 0x5fc. Name 08049d24 00,000,107 R_386_JUMP_SLOT 0804868c print 08049d28 00,000,207 R_386_JUMP_SLOT 0804869c _ZNSt8ios_base4InitC1E 08049d2c 00,000,507 R_386_JUMP_SLOT 080486ac _ZStlsISt11char_traits 08049d30 00,000,607 R_386_JUMP_SLOT 080486bc _ZNSolsEPFRSoS_E 08049d34 00,000,707 R_386_JUMP_SLOT 08,048,664 _init 08049d38 00,000,807 R_386_JUMP_SLOT 080486dc sleep 08049d3c 00,000,907 R_386_JUMP_SLOT 080486ec _ZNKSsixEj 08049d40 00000b07 R_386_JUMP_SLOT 080486fc _ZNKSs4sizeEv 08049d44 00000c07 R_386_JUMP_SLOT 0804870c __libc_start_main 08049d48 00000d07 R_386_JUMP_SLOT 08048ae4 _fini 08049d4c 00,001,307 R_386_JUMP_SLOT 0804872c _ZSt4endlIcSt11char_tr 08049d50 00,001,507 R_386_JUMP_SLOT 0804873c __gxx_personality_v0 08049d54 00,001,607 R_386_JUMP_SLOT 0804874c _ZNSt8ios_base4InitD1E  

in this example, the print to load a function library (I At the time of writing) running. The readelf app is capable of displaying information about its location in the binary. Using

:.

  1. Using macports port binutils set
  2. gobjdump -p / path / to / app using

:

  1. do brew update & amp; & Amp; The decoction binutils are installed
  2. gobjdump -p / path / to / apps

, of course, many other orders Note-Line option Note that the binutils port warns that it may fail to create other ports due to the installation. It can still be easy to see the port installed / surrounding / port uninstall.

It is not surprising that there is no fundamental tool already to do this.


Comments