[ale] listing symbols and shared libs in executable
Danny Cox
danscox at mindspring.com
Thu Feb 14 09:57:31 EST 2002
On Thu, 2002-02-14 at 09:31, Charles Shapiro wrote:
> You might be thinking of nm(1). Works only with unstripped executables
> though. Another goodie for this is readelf, which will give great gobs
> of information even about a stripped executable:
>
> bash-2.04$ readelf -a /bin/ls | wc -l
> 322
>
> It has no man page on my (work) RedHat 7.2 system; use "info binutils"
> to find out about it.
>
> Other useful hacking --erm-- research utilities include strings(1),
> which dumps every string in a random file and strace(1), which is the
> Linux synonym for truss.
> Run a program under strace and you'll get out a list of every system
> call it makes.
ldd will list the *shared* library path names an ELF executable will
use.
ltrace is similar to strace, but lists shared library calls/args, much
like strace. Very cool.
--
kernel, n.: A part of an operating system that preserves the
medieval traditions of sorcery and black art.
Danny
---
This message has been sent through the ALE general discussion list.
See http://www.ale.org/mailing-lists.shtml for more info. Problems should be
sent to listmaster at ale dot org.
More information about the Ale
mailing list