blacktop / ipsw

iOS/macOS Research Swiss Army Knife
https://blacktop.github.io/ipsw
MIT License
2k stars 155 forks source link

extract dylib from dylib cache fail #546

Closed lilili87222 closed 2 months ago

lilili87222 commented 2 months ago

What happened?

ipsw dyld extract ".\private\preboot\Cryptexes\OS\System\Library\Caches\com.apple.dyld\dyld_shared_cache_arm64e" --all -o out 57s [=====================================================================>--------| 3040/3408 ] Usage: ipsw dyld extract [flags]

Aliases: extract, e

Flags: -a, --all Split ALL dylibs -c, --cache string Path to .a2s addr to sym cache file (speeds up analysis) --force Overwrite existing extracted dylib(s) -h, --help help for extract --objc Add ObjC metadata to extracted dylib(s) symtab -o, --output string Directory to extract the dylib(s) --slide Apply slide info to extracted dylib(s) --stubs Add stub islands to extracted dylib(s) symtab

Global Flags: --color colorize output --config string config file (default is $HOME/.config/ipsw/config.yaml) --no-color disable colorize output -V, --verbose verbose output

⨯ failed to extract dylib /System/Library/PrivateFrameworks/CoreALD.framework/CoreALD: failed to optimize load commands: failed to remap offset in LC_ENCRYPTION_INFO_64: failed to remap offset 0x4000

How can we reproduce this?

just call dylib extract to extract arm64e file from ios device.

ipsw version

ipsw latest version

Search

Code of Conduct

Additional context

windows 10

lilili87222 commented 2 months ago

this is the same issue as https://github.com/blacktop/ipsw/issues/467