Matching up offsets in iOS crash dump to disassembled binary

后端 未结 2 1489
我寻月下人不归
我寻月下人不归 2021-02-13 05:04

I\'m having trouble matching up the offsets in the stack traces of iOS crash dumps with offsets in the disassembly of the binary as output by otool.

Can anybody confirm

2条回答
  •  忘掉有多难
    2021-02-13 05:54

    Provided that myapp did not strip out symbols you'll be able to use atos.

    You can always man atos for more details but this should be sufficient for your problem:

    -o symbol_file # debugging information output by the compiler this may be a dSYM or the binary itself depending on who you saved symbol information
    -l load address # the base address in the process space at which your library is loaded into the springboard process (Looks like 0x1000)
    Also a list of addresses you wish to symbolicate
    
    Usage:
        atos -o myapp -l 0x1000 0x00005b0a 0x0005bca ... etc
    

    That output should be a list of symbol names to the terminal. Again, this requires that the myapp did not have symbols stripped out.

提交回复
热议问题