There reading Mac OS tool offset the X binary transfer will print information about the table and symbol in this example, the the same is readelf output
readelf -r app rehabilitation section '.rel.dyn' offset 0x5ec 2 entries: Offset info Sym.Value symbol. Offset information follows Sym.Value symbol: name 08049d58 00,001,706 R_386_GLOB_DAT 00000000 __gmon_start__ 08049d60 00,000,305 R_386_COPY 08049d60 _ZSt4cout rehabilitation section '.rel.plt' are 13 entries in the offset 0x5fc. Name 08049d24 00,000,107 R_386_JUMP_SLOT 0804868c print 08049d28 00,000,207 R_386_JUMP_SLOT 0804869c _ZNSt8ios_base4InitC1E 08049d2c 00,000,507 R_386_JUMP_SLOT 080486ac _ZStlsISt11char_traits 08049d30 00,000,607 R_386_JUMP_SLOT 080486bc _ZNSolsEPFRSoS_E 08049d34 00,000,707 R_386_JUMP_SLOT 08,048,664 _init 08049d38 00,000,807 R_386_JUMP_SLOT 080486dc sleep 08049d3c 00,000,907 R_386_JUMP_SLOT 080486ec _ZNKSsixEj 08049d40 00000b07 R_386_JUMP_SLOT 080486fc _ZNKSs4sizeEv 08049d44 00000c07 R_386_JUMP_SLOT 0804870c __libc_start_main 08049d48 00000d07 R_386_JUMP_SLOT 08048ae4 _fini 08049d4c 00,001,307 R_386_JUMP_SLOT 0804872c _ZSt4endlIcSt11char_tr 08049d50 00,001,507 R_386_JUMP_SLOT 0804873c __gxx_personality_v0 08049d54 00,001,607 R_386_JUMP_SLOT 0804874c _ZNSt8ios_base4InitD1E print to load a function library (I At the time of writing) running. The readelf app is capable of displaying information about its location in the binary. Using
:.
- Using macports
port binutils set -
gobjdump -p / path / to / app using
:
- do
brew update & amp; & Amp; The decoction binutils are installed -
gobjdump -p / path / to / apps
, of course, many other orders Note-Line option Note that the binutils port warns that it may fail to create other ports due to the installation. It can still be easy to see the port installed / surrounding / port uninstall.
It is not surprising that there is no fundamental tool already to do this.
Comments
Post a Comment