From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 580 invoked by alias); 7 Jun 2008 18:14:59 -0000 Received: (qmail 564 invoked by uid 22791); 7 Jun 2008 18:14:59 -0000 X-Spam-Check-By: sourceware.org Received: from dessent.net (HELO dessent.net) (69.60.119.225) by sourceware.org (qpsmtpd/0.31) with ESMTP; Sat, 07 Jun 2008 18:14:38 +0000 Received: from localhost ([127.0.0.1] helo=dessent.net) by dessent.net with esmtp (Exim 4.50) id 1K52vy-0000c8-67; Sat, 07 Jun 2008 18:14:34 +0000 Message-ID: <484AD008.8845E46E@dessent.net> Date: Sat, 07 Jun 2008 18:14:00 -0000 From: Brian Dessent Reply-To: gdb@sourceware.org X-Mailer: Mozilla 4.79 [en] (Windows NT 5.0; U) MIME-Version: 1.0 To: Bruce Korb CC: Eli Zaretskii , Michael Snyder , gdb@sourceware.org Subject: Re: How can I get a memory map out of a core file? References: <668c430c0806061345m3c480d95nac5d19b02998715c@mail.gmail.com> <1212789259.3601.426.camel@localhost.localdomain> <200806070930.21380.Bruce.Korb@gmail.com> Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-IsSubscribed: yes Mailing-List: contact gdb-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: gdb-owner@sourceware.org X-SW-Source: 2008-06/txt/msg00048.txt.bz2 Bruce Korb wrote: > was attempted. So, for me, the ideal solution is a command that yields > (figures out) the valid address ranges, and an adequate backup would Doesn't "info target" do this? $ ulimit -c 10000; top & kill -ABRT $! && fg %1 [1] 2347 top Aborted (core dumped) $ gdb -batch -x <(echo 'info target') -c core Using host libthread_db library "/lib/tls/libthread_db.so.1". (no debugging symbols found) Core was generated by `top'. Program terminated with signal 6, Aborted. #0 0x40000c20 in ?? () Local core dump file: `/home/brian/core', file type elf32-i386. 0x08054000 - 0x08055000 is load2 0x08055000 - 0x08058000 is load3 0x40016000 - 0x40017000 is load5 0xbffff000 - 0xc0000000 is load6 0xffffe000 - 0xfffff000 is load7 Though I suppose those section names are not really all that useful, but in conjunction with the executable it should be possible to reverse engineer which library / executable each corresponds to. Brian