otool

What is your favorite disassembler tool in Mac OS X? [closed]

牧云@^-^@ 提交于 2019-12-04 07:23:26
问题 Closed. This question is off-topic. It is not currently accepting answers. Want to improve this question? Update the question so it's on-topic for Stack Overflow. Closed 4 years ago . I am using the otool , nm and Fraise text editor to disassemble the Mach-o binaries. My workflow at this point is pretty straightforward: 1. List the existed symbols. nm -g 2. Get the disasm code. otool -vt 3. Copy and paste this output to a text file. 4. Read and comment the codes in the text editor :) I am

Matching up offsets in iOS crash dump to disassembled binary

大兔子大兔子 提交于 2019-12-03 10:45:26
I'm having trouble matching up the offsets in the stack traces of iOS crash dumps with offsets in the disassembly of the binary as output by otool. Can anybody confirm how in principle I match these up. For example, if I get a line in the crash dump: 0 myapp 0x00005b0a 0x1000 + 19210 would I expect the offset of the offending instruction in the binary file to be 0x5b0a, 0x4b0a.... or something else? In its decoding of the header information, otool also gives, for example, this information (the actual code starts at offset 0x0000224c in the file): Section sectname __text segname __TEXT addr

Disassemble default iOS apps with otool

泪湿孤枕 提交于 2019-12-03 08:46:02
问题 When I try to disassemble the stock iOS apps (not app store ones) with otool it isn't split into different methods. It's just one massive section. Here's the command I'm using: otool -tV theApp.app/theApp >~/Desktop/output.txt Is there a way to get the disassembly split into methods? 回答1: No, there isn't. Those applications have been stripped, which means they contain no information about where functions begin or end. However, since objective-c is dynamic, any objective-c methods will have

iOS otool to detect private apis [closed]

此生再无相见时 提交于 2019-12-03 04:40:41
问题 This question is unlikely to help any future visitors; it is only relevant to a small geographic area, a specific moment in time, or an extraordinarily narrow situation that is not generally applicable to the worldwide audience of the internet. For help making this question more broadly applicable, visit the help center. Closed 6 years ago . I am a first time ios developer and cannot find any documentation on private apis. So I have been searching for some type of tutorial on how to use otool

iOS otool to detect private apis [closed]

与世无争的帅哥 提交于 2019-12-02 18:55:41
I am a first time ios developer and cannot find any documentation on private apis. So I have been searching for some type of tutorial on how to use otool. The only certain thing that I can find is that I had to download the command line tools through xcode preferences. I also keep seeing references to linking it to the .app file, but I don't know where I can find this and how to use it in tool. Any links or suggestions? Victor Ronin Otool usage Here is official documentation Here is the question about otool usage: how to use otool Detect private api usage How does Apple know you are using

how to use otool

故事扮演 提交于 2019-12-02 16:22:32
apple suggested me to use "strings" or "otool" to dect the private api (isinf) in my code , I am totally newbie so any help how to use those tools Open Terminal ( Ctrl + Space -> Type 'Terminal').. and print example: otool -MVv yourlib.a for help: otool --help I use nm to inspect my binaries. Usage can't be simpler: nm <filename> It will list some weird memory-address or whatever, then a visibility character and lastly the symbol. T is public, but check out the man page of nm to find out more about this. Press Ctrl + space to open up the terminal. 来源: https://stackoverflow.com/questions

What is your favorite disassembler tool in Mac OS X? [closed]

谁说我不能喝 提交于 2019-12-02 13:55:48
I am using the otool , nm and Fraise text editor to disassemble the Mach-o binaries. My workflow at this point is pretty straightforward: 1. List the existed symbols. nm -g 2. Get the disasm code. otool -vt 3. Copy and paste this output to a text file. 4. Read and comment the codes in the text editor :) I am looking for the tools that simplify the working with disasm code on Mac OS X . Peter Murphy You might want to try Hopper Disassemble r, osxdbg , Machoview , otx (otool GUI) and Affinic Debugger GUI . I als know of http://www.hopperapp.com/ , but never used it. (cannot be compared to Ida

Wrong method implementation address from otool for armv7?

一个人想着一个人 提交于 2019-11-28 11:44:06
I'm constantly getting 1 byte offset for implementation address of method shown by 'otool'. For an example 'otool -o' gives 0xe99d5 but 'otool -tvV' gives: +[NSError(SomeCategory) someMethod]: 000e99d4 b590 push {r4, r7, lr} 000e99d6 f6441184 movw r1, 0x4984 000e99da af01 add r7, sp, #4 000e99dc f2c0010a movt r1, 0xa So method starts at 0xe99d4. 0xe99d5 looks wrong, not aligned. I believe that 'otool' works fine and I don't understand some aspects of implementation. How to interpret the output ? Modern ARM cores has two types of instruction sets. Original one is called arm mode where each

Why is install_name_tool and otool necessary for Mach-O libraries in Mac Os X?

匆匆过客 提交于 2019-11-27 17:10:40
I am developing a Cocoa Application using the latest version of Xcode 4, I want to link dynamic libraries to my project ( dylibs ). I read somewhere that adding the libraries in my project was not enough as I have to run install_name_tool and otool to make my project use the libraries that were bundled in my project. I have read the manual pages for install_name_tool , but I do not understand WHY I have to do this. How do libraries work? Especially interested in the part where the application and the libraries have paths that point to specific places in my machine, like /usr/local/lib

Wrong method implementation address from otool for armv7?

瘦欲@ 提交于 2019-11-27 06:24:10
问题 I'm constantly getting 1 byte offset for implementation address of method shown by 'otool'. For an example 'otool -o' gives 0xe99d5 but 'otool -tvV' gives: +[NSError(SomeCategory) someMethod]: 000e99d4 b590 push {r4, r7, lr} 000e99d6 f6441184 movw r1, 0x4984 000e99da af01 add r7, sp, #4 000e99dc f2c0010a movt r1, 0xa So method starts at 0xe99d4. 0xe99d5 looks wrong, not aligned. I believe that 'otool' works fine and I don't understand some aspects of implementation. How to interpret the