Flags:
-a, --all Split ALL dylibs
-c, --cache string Path to .a2s addr to sym cache file (speeds up analysis)
--force Overwrite existing extracted dylib(s)
-h, --help help for extract
--objc Add ObjC metadata to extracted dylib(s) symtab
-o, --output string Directory to extract the dylib(s)
--slide Apply slide info to extracted dylib(s)
--stubs Add stub islands to extracted dylib(s) symtab
Global Flags:
--color colorize output
--config string config file (default is $HOME/.config/ipsw/config.yaml)
--no-color disable colorize output
-V, --verbose verbose output
⨯ failed to extract dylib /System/Library/PrivateFrameworks/CoreALD.framework/CoreALD: failed to optimize load commands: failed to remap offset in LC_ENCRYPTION_INFO_64: failed to remap offset 0x4000
How can we reproduce this?
just call dylib extract to extract arm64e file from ios device.
ipsw version
ipsw latest version
Search
[X] I did search for other open and closed issues before opening this
Code of Conduct
[X] I agree to follow this project's Code of Conduct
What happened?
ipsw dyld extract ".\private\preboot\Cryptexes\OS\System\Library\Caches\com.apple.dyld\dyld_shared_cache_arm64e" --all -o out 57s [=====================================================================>--------| 3040/3408 ] Usage: ipsw dyld extract [flags]
Aliases: extract, e
Flags: -a, --all Split ALL dylibs -c, --cache string Path to .a2s addr to sym cache file (speeds up analysis) --force Overwrite existing extracted dylib(s) -h, --help help for extract --objc Add ObjC metadata to extracted dylib(s) symtab -o, --output string Directory to extract the dylib(s) --slide Apply slide info to extracted dylib(s) --stubs Add stub islands to extracted dylib(s) symtab
Global Flags: --color colorize output --config string config file (default is $HOME/.config/ipsw/config.yaml) --no-color disable colorize output -V, --verbose verbose output
⨯ failed to extract dylib /System/Library/PrivateFrameworks/CoreALD.framework/CoreALD: failed to optimize load commands: failed to remap offset in LC_ENCRYPTION_INFO_64: failed to remap offset 0x4000
How can we reproduce this?
just call dylib extract to extract arm64e file from ios device.
ipsw version
Search
Code of Conduct
Additional context
windows 10