[ale] listing symbols and shared libs in executable

Danny Cox danscox at mindspring.com
Thu Feb 14 09:57:31 EST 2002


On Thu, 2002-02-14 at 09:31, Charles Shapiro wrote:
> You might be thinking of nm(1). Works only with unstripped executables
> though. Another goodie for this is readelf, which will give great gobs
> of information even about a stripped executable:
> 
> bash-2.04$ readelf -a /bin/ls | wc -l
>     322
> 
> It has no man page on my (work) RedHat 7.2 system; use "info binutils"
> to find out about it.
> 
> Other useful hacking --erm-- research utilities include strings(1),
> which dumps every string in a random file and strace(1), which is the
> Linux synonym for truss.
> Run a program under strace and you'll get out a list of every system
> call it makes.

	ldd will list the *shared* library path names an ELF executable will
use.

	ltrace is similar to strace, but lists shared library calls/args, much
like strace.  Very cool.

-- 
kernel, n.: A part of an operating system that preserves the
medieval traditions of sorcery and black art.

Danny


---
This message has been sent through the ALE general discussion list.
See http://www.ale.org/mailing-lists.shtml for more info. Problems should be 
sent to listmaster at ale dot org.






More information about the Ale mailing list