radareorg / radare2

UNIX-like reverse engineering framework and command-line toolset
https://www.radare.org/
GNU Lesser General Public License v3.0
20.71k stars 3.01k forks source link

Substitute symbol addrs more correctly #680

Open montekki opened 10 years ago

montekki commented 10 years ago

if a hexadecimal address has a suffix (say, "0xbeef:16") it won't be substituted with symbol name:

radare1 radare2

radare commented 10 years ago

How to differentiate to segmented x86 addressing?

montekki commented 10 years ago

look at the binary's arch?

radare commented 10 years ago

i would prefer to be arch-independent, if a human can understand the disasm, a parser should too..

On 11 Mar 2014, at 08:27, Fedor Sakharov notifications@github.com wrote:

look at the binary's arch?

— Reply to this email directly or view it on GitHub.

radare commented 8 years ago

ping @montekki can you send a pr for that? checking for arch can be a dirty but working solution, so having this done with a couple of tests would be good for me

radare commented 8 years ago

also we can differentiate if the number starts with # instead of just 0x and if it contains :

radare commented 7 years ago

anyone?

Maijin commented 7 years ago

Can we have test-case or something to reproduce this 0xXXX:16 syntax ?

radare commented 7 years ago

from me?

On 19 Feb 2017, at 19:49, Maijin notifications@github.com wrote:

Can we have test-case or something to reproduce this 0xXXX:16 syntax ?

Maijin commented 7 years ago

Whoever got something to reproduce

trufae commented 4 years ago

Without a test case this issue is quite difficult to handle/understand/fix.