From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 82997 invoked by alias); 18 Apr 2019 10:12:33 -0000 Mailing-List: contact gdb-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: gdb-owner@sourceware.org Received: (qmail 82986 invoked by uid 89); 18 Apr 2019 10:12:33 -0000 Authentication-Results: sourceware.org; auth=none X-Spam-SWARE-Status: No, score=-1.6 required=5.0 tests=AWL,BAYES_00,SPF_HELO_PASS autolearn=ham version=3.3.1 spammy=razin, Razin X-HELO: mx1.redhat.com Received: from mx1.redhat.com (HELO mx1.redhat.com) (209.132.183.28) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with ESMTP; Thu, 18 Apr 2019 10:12:32 +0000 Received: from smtp.corp.redhat.com (int-mx08.intmail.prod.int.phx2.redhat.com [10.5.11.23]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 35C8A3001A70; Thu, 18 Apr 2019 10:12:31 +0000 (UTC) Received: from host1.jankratochvil.net (ovpn-117-178.ams2.redhat.com [10.36.117.178]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 7356D19C6A; Thu, 18 Apr 2019 10:12:30 +0000 (UTC) Date: Thu, 18 Apr 2019 10:12:00 -0000 From: Jan Kratochvil To: Artem Razin Cc: gdb@sourceware.org Subject: Re: Reading DWARF debug information from a PE executable Message-ID: <20190418101227.GA1565677@host1.jankratochvil.net> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.11.3 (2019-02-01) X-SW-Source: 2019-04/txt/msg00017.txt.bz2 On Wed, 17 Apr 2019 18:20:58 +0200, Artem Razin wrote: > Or probably there are other ways to work with DWARF in case of PE > executables... liblldb parses DWARF in PE for you with its SB* public C++ and Python API. (lldb) target create "2.exe" Current executable set to '2.exe' (x86_64). (lldb) b main Breakpoint 1: where = 2.exe`main + 13 at 2.c:4:10, address = 0x000000000040156d (lldb) p s (s) $0 = (i = 0) Jan