New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
debug an executable with dive into its libraries #22508
Comments
Do you plan to get function body? it is not possible. you need to open the .so itself. |
oh sorry.I was just testing and no. I misundertood your question. You misuse r2. pd 1 could you try same command with |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
I have an executable ELF file e.g.
aaa
. This executable file uses its library e.g.../bin/libaaa.so
. When I debugr2 -d aaa
I see some call functions from the librarylibaaa.so
e.g.sym.imp.AAAfunc1
at 0x44651.When I reach that call, I can only step over it. How can I deep dive into
libaaa.so
file to debug that function contents?The text was updated successfully, but these errors were encountered: