Mirror of the gdb mailing list
 help / color / mirror / Atom feed
* Stack segments for Aarch64
@ 2024-06-06  9:17 Phil Phil via Gdb
  2024-06-06  9:23 ` Luis Machado via Gdb
  0 siblings, 1 reply; 8+ messages in thread
From: Phil Phil via Gdb @ 2024-06-06  9:17 UTC (permalink / raw)
  To: gdb

Greetings,

I'm trying get some memory info on an Aarch64 for a coredump. The aarch64 gdb produces this output for info proc mappings

          Start Addr           End Addr       Size     Offset objfile
        0x557ead9000       0x5582dee000  0x4315000        0x0 /usr/bin/myproc
        0x5582dfe000       0x5582f0a000   0x10c000  0x4315000 /usr/bin/myproc
        0x5582f0a000       0x5582f24000    0x1a000  0x4421000 /usr/bin/myproc

I'm missing at least two things here compared to the x64 output:


  *
No read/write permissions
  *
Stack segments are not shown.

Any ideas on how to make these two things visible on Aarch64?

Regards

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: Stack segments for Aarch64
  2024-06-06  9:17 Stack segments for Aarch64 Phil Phil via Gdb
@ 2024-06-06  9:23 ` Luis Machado via Gdb
  2024-06-06  9:33   ` Phil Phil via Gdb
  0 siblings, 1 reply; 8+ messages in thread
From: Luis Machado via Gdb @ 2024-06-06  9:23 UTC (permalink / raw)
  To: Phil Phil, gdb

Hi,

On 6/6/24 10:17, Phil Phil via Gdb wrote:
> Greetings,
> 
> I'm trying get some memory info on an Aarch64 for a coredump. The aarch64 gdb produces this output for info proc mappings
> 
>           Start Addr           End Addr       Size     Offset objfile
>         0x557ead9000       0x5582dee000  0x4315000        0x0 /usr/bin/myproc
>         0x5582dfe000       0x5582f0a000   0x10c000  0x4315000 /usr/bin/myproc
>         0x5582f0a000       0x5582f24000    0x1a000  0x4421000 /usr/bin/myproc
> 
> I'm missing at least two things here compared to the x64 output:
> 
> 
>   *
> No read/write permissions
>   *
> Stack segments are not shown.
> 
> Any ideas on how to make these two things visible on Aarch64?
> 
> Regards

What aarch64 debugging setup do you have? Versions etc? Remote?

For me, running native gdb on aarch64:

process 1681741
Mapped address spaces:

          Start Addr           End Addr       Size     Offset  Perms  objfile
      0xaaaaaaaa0000     0xaaaaac3c6000  0x1926000        0x0  r-xp   /home/ubuntu/work/build/binutils-gdb-master/gdb/gdb
      0xaaaaac3d5000     0xaaaaacd2a000   0x955000  0x1925000  r--p   /home/ubuntu/work/build/binutils-gdb-master/gdb/gdb
      0xaaaaacfc6000     0xaaaaad069000    0xa3000        0x0  rw-p   [heap]
...
      0xfffffffdf000    0x1000000000000    0x21000        0x0  rw-p   [stack]

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: Stack segments for Aarch64
  2024-06-06  9:23 ` Luis Machado via Gdb
@ 2024-06-06  9:33   ` Phil Phil via Gdb
  2024-06-06  9:41     ` Luis Machado via Gdb
  0 siblings, 1 reply; 8+ messages in thread
From: Phil Phil via Gdb @ 2024-06-06  9:33 UTC (permalink / raw)
  To: Luis Machado, gdb

GDB 12.1 coredump post mortem coredump debugging on an x64 Linux desktop.  I do not see a perms column in info proc mappings.
________________________________
From: Luis Machado <luis.machado@arm.com>
Sent: Thursday, June 6, 2024 9:23 AM
To: Phil Phil <heidegg@hotmail.com>; gdb@sourceware.org <gdb@sourceware.org>
Subject: Re: Stack segments for Aarch64

Hi,

On 6/6/24 10:17, Phil Phil via Gdb wrote:
> Greetings,
>
> I'm trying get some memory info on an Aarch64 for a coredump. The aarch64 gdb produces this output for info proc mappings
>
>           Start Addr           End Addr       Size     Offset objfile
>         0x557ead9000       0x5582dee000  0x4315000        0x0 /usr/bin/myproc
>         0x5582dfe000       0x5582f0a000   0x10c000  0x4315000 /usr/bin/myproc
>         0x5582f0a000       0x5582f24000    0x1a000  0x4421000 /usr/bin/myproc
>
> I'm missing at least two things here compared to the x64 output:
>
>
>   *
> No read/write permissions
>   *
> Stack segments are not shown.
>
> Any ideas on how to make these two things visible on Aarch64?
>
> Regards

What aarch64 debugging setup do you have? Versions etc? Remote?

For me, running native gdb on aarch64:

process 1681741
Mapped address spaces:

          Start Addr           End Addr       Size     Offset  Perms  objfile
      0xaaaaaaaa0000     0xaaaaac3c6000  0x1926000        0x0  r-xp   /home/ubuntu/work/build/binutils-gdb-master/gdb/gdb
      0xaaaaac3d5000     0xaaaaacd2a000   0x955000  0x1925000  r--p   /home/ubuntu/work/build/binutils-gdb-master/gdb/gdb
      0xaaaaacfc6000     0xaaaaad069000    0xa3000        0x0  rw-p   [heap]
...
      0xfffffffdf000    0x1000000000000    0x21000        0x0  rw-p   [stack]

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: Stack segments for Aarch64
  2024-06-06  9:33   ` Phil Phil via Gdb
@ 2024-06-06  9:41     ` Luis Machado via Gdb
  2024-06-06  9:57       ` Phil Phil via Gdb
  0 siblings, 1 reply; 8+ messages in thread
From: Luis Machado via Gdb @ 2024-06-06  9:41 UTC (permalink / raw)
  To: Phil Phil, gdb

Hi,

On 6/6/24 10:33, Phil Phil wrote:
> GDB 12.1 coredump post mortem coredump debugging on an x64 Linux desktop.  I do not see a perms column in info proc mappings.
> 

Ah, so it is corefile debugging. Checking on my end, I don't see the permissions column either. Now it escapes me if we have any
special reason for that or if it is just an oversight somewhere. As for the stack marker, I suppose we lose that reference
when the corefile is generated. That reference comes from /proc/<pid>/maps when we do "info proc mapping".

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
> *From:* Luis Machado <luis.machado@arm.com>
> *Sent:* Thursday, June 6, 2024 9:23 AM
> *To:* Phil Phil <heidegg@hotmail.com>; gdb@sourceware.org <gdb@sourceware.org>
> *Subject:* Re: Stack segments for Aarch64
>  
> Hi,
> 
> On 6/6/24 10:17, Phil Phil via Gdb wrote:
>> Greetings,
>> 
>> I'm trying get some memory info on an Aarch64 for a coredump. The aarch64 gdb produces this output for info proc mappings
>> 
>>           Start Addr           End Addr       Size     Offset objfile
>>         0x557ead9000       0x5582dee000  0x4315000        0x0 /usr/bin/myproc
>>         0x5582dfe000       0x5582f0a000   0x10c000  0x4315000 /usr/bin/myproc
>>         0x5582f0a000       0x5582f24000    0x1a000  0x4421000 /usr/bin/myproc
>> 
>> I'm missing at least two things here compared to the x64 output:
>> 
>> 
>>   *
>> No read/write permissions
>>   *
>> Stack segments are not shown.
>> 
>> Any ideas on how to make these two things visible on Aarch64?
>> 
>> Regards
> 
> What aarch64 debugging setup do you have? Versions etc? Remote?
> 
> For me, running native gdb on aarch64:
> 
> process 1681741
> Mapped address spaces:
> 
>           Start Addr           End Addr       Size     Offset  Perms  objfile
>       0xaaaaaaaa0000     0xaaaaac3c6000  0x1926000        0x0  r-xp   /home/ubuntu/work/build/binutils-gdb-master/gdb/gdb
>       0xaaaaac3d5000     0xaaaaacd2a000   0x955000  0x1925000  r--p   /home/ubuntu/work/build/binutils-gdb-master/gdb/gdb
>       0xaaaaacfc6000     0xaaaaad069000    0xa3000        0x0  rw-p   [heap]
> ...
>       0xfffffffdf000    0x1000000000000    0x21000        0x0  rw-p   [stack]


^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: Stack segments for Aarch64
  2024-06-06  9:41     ` Luis Machado via Gdb
@ 2024-06-06  9:57       ` Phil Phil via Gdb
  2024-06-06 10:15         ` Luis Machado via Gdb
  0 siblings, 1 reply; 8+ messages in thread
From: Phil Phil via Gdb @ 2024-06-06  9:57 UTC (permalink / raw)
  To: Luis Machado, gdb

Should the stack segment still be there though? I compared a stackpointer to the memory areas from info proc mappings and I can't find a match.
________________________________
From: Luis Machado <luis.machado@arm.com>
Sent: Thursday, June 6, 2024 9:41 AM
To: Phil Phil <heidegg@hotmail.com>; gdb@sourceware.org <gdb@sourceware.org>
Subject: Re: Stack segments for Aarch64

Hi,

On 6/6/24 10:33, Phil Phil wrote:
> GDB 12.1 coredump post mortem coredump debugging on an x64 Linux desktop.  I do not see a perms column in info proc mappings.
>

Ah, so it is corefile debugging. Checking on my end, I don't see the permissions column either. Now it escapes me if we have any
special reason for that or if it is just an oversight somewhere. As for the stack marker, I suppose we lose that reference
when the corefile is generated. That reference comes from /proc/<pid>/maps when we do "info proc mapping".

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
> *From:* Luis Machado <luis.machado@arm.com>
> *Sent:* Thursday, June 6, 2024 9:23 AM
> *To:* Phil Phil <heidegg@hotmail.com>; gdb@sourceware.org <gdb@sourceware.org>
> *Subject:* Re: Stack segments for Aarch64
>
> Hi,
>
> On 6/6/24 10:17, Phil Phil via Gdb wrote:
>> Greetings,
>>
>> I'm trying get some memory info on an Aarch64 for a coredump. The aarch64 gdb produces this output for info proc mappings
>>
>>           Start Addr           End Addr       Size     Offset objfile
>>         0x557ead9000       0x5582dee000  0x4315000        0x0 /usr/bin/myproc
>>         0x5582dfe000       0x5582f0a000   0x10c000  0x4315000 /usr/bin/myproc
>>         0x5582f0a000       0x5582f24000    0x1a000  0x4421000 /usr/bin/myproc
>>
>> I'm missing at least two things here compared to the x64 output:
>>
>>
>>   *
>> No read/write permissions
>>   *
>> Stack segments are not shown.
>>
>> Any ideas on how to make these two things visible on Aarch64?
>>
>> Regards
>
> What aarch64 debugging setup do you have? Versions etc? Remote?
>
> For me, running native gdb on aarch64:
>
> process 1681741
> Mapped address spaces:
>
>           Start Addr           End Addr       Size     Offset  Perms  objfile
>       0xaaaaaaaa0000     0xaaaaac3c6000  0x1926000        0x0  r-xp   /home/ubuntu/work/build/binutils-gdb-master/gdb/gdb
>       0xaaaaac3d5000     0xaaaaacd2a000   0x955000  0x1925000  r--p   /home/ubuntu/work/build/binutils-gdb-master/gdb/gdb
>       0xaaaaacfc6000     0xaaaaad069000    0xa3000        0x0  rw-p   [heap]
> ...
>       0xfffffffdf000    0x1000000000000    0x21000        0x0  rw-p   [stack]


^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: Stack segments for Aarch64
  2024-06-06  9:57       ` Phil Phil via Gdb
@ 2024-06-06 10:15         ` Luis Machado via Gdb
  2024-06-06 10:27           ` Phil Phil via Gdb
  0 siblings, 1 reply; 8+ messages in thread
From: Luis Machado via Gdb @ 2024-06-06 10:15 UTC (permalink / raw)
  To: Phil Phil, gdb

On 6/6/24 10:57, Phil Phil wrote:
> Should the stack segment still be there though? I compared a stackpointer to the memory areas from info proc mappings and I can't find a match. 

You'll likely find it in a core file section instead: maint info sections.

For me:

 [28]     0xfffffffdf000->0x1000000000000 at 0x00191350: load13 ALLOC LOAD HAS_CONTENTS

Does that help? GDB will look things up in the core file instead of memory, which is probably
why the way it displays things is slightly different.

It could be improved I suppose.

> ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
> *From:* Luis Machado <luis.machado@arm.com>
> *Sent:* Thursday, June 6, 2024 9:41 AM
> *To:* Phil Phil <heidegg@hotmail.com>; gdb@sourceware.org <gdb@sourceware.org>
> *Subject:* Re: Stack segments for Aarch64
>  
> Hi,
> 
> On 6/6/24 10:33, Phil Phil wrote:
>> GDB 12.1 coredump post mortem coredump debugging on an x64 Linux desktop.  I do not see a perms column in info proc mappings.
>> 
> 
> Ah, so it is corefile debugging. Checking on my end, I don't see the permissions column either. Now it escapes me if we have any
> special reason for that or if it is just an oversight somewhere. As for the stack marker, I suppose we lose that reference
> when the corefile is generated. That reference comes from /proc/<pid>/maps when we do "info proc mapping".
> 
> ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
>> *From:* Luis Machado <luis.machado@arm.com>
>> *Sent:* Thursday, June 6, 2024 9:23 AM
>> *To:* Phil Phil <heidegg@hotmail.com>; gdb@sourceware.org <gdb@sourceware.org>
>> *Subject:* Re: Stack segments for Aarch64
>>  
>> Hi,
>> 
>> On 6/6/24 10:17, Phil Phil via Gdb wrote:
>>> Greetings,
>>> 
>>> I'm trying get some memory info on an Aarch64 for a coredump. The aarch64 gdb produces this output for info proc mappings
>>> 
>>>           Start Addr           End Addr       Size     Offset objfile
>>>         0x557ead9000       0x5582dee000  0x4315000        0x0 /usr/bin/myproc
>>>         0x5582dfe000       0x5582f0a000   0x10c000  0x4315000 /usr/bin/myproc
>>>         0x5582f0a000       0x5582f24000    0x1a000  0x4421000 /usr/bin/myproc
>>> 
>>> I'm missing at least two things here compared to the x64 output:
>>> 
>>> 
>>>   *
>>> No read/write permissions
>>>   *
>>> Stack segments are not shown.
>>> 
>>> Any ideas on how to make these two things visible on Aarch64?
>>> 
>>> Regards
>> 
>> What aarch64 debugging setup do you have? Versions etc? Remote?
>> 
>> For me, running native gdb on aarch64:
>> 
>> process 1681741
>> Mapped address spaces:
>> 
>>           Start Addr           End Addr       Size     Offset  Perms  objfile
>>       0xaaaaaaaa0000     0xaaaaac3c6000  0x1926000        0x0  r-xp   /home/ubuntu/work/build/binutils-gdb-master/gdb/gdb
>>       0xaaaaac3d5000     0xaaaaacd2a000   0x955000  0x1925000  r--p   /home/ubuntu/work/build/binutils-gdb-master/gdb/gdb
>>       0xaaaaacfc6000     0xaaaaad069000    0xa3000        0x0  rw-p   [heap]
>> ...
>>       0xfffffffdf000    0x1000000000000    0x21000        0x0  rw-p   [stack]
> 


^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: Stack segments for Aarch64
  2024-06-06 10:15         ` Luis Machado via Gdb
@ 2024-06-06 10:27           ` Phil Phil via Gdb
  2024-06-06 10:29             ` Luis Machado via Gdb
  0 siblings, 1 reply; 8+ messages in thread
From: Phil Phil via Gdb @ 2024-06-06 10:27 UTC (permalink / raw)
  To: Luis Machado, gdb

Would you suggest that the output of maintenance info sections is more "complete" if you want to see all mapped memory regions?
________________________________
From: Luis Machado <luis.machado@arm.com>
Sent: Thursday, June 6, 2024 10:15 AM
To: Phil Phil <heidegg@hotmail.com>; gdb@sourceware.org <gdb@sourceware.org>
Subject: Re: Stack segments for Aarch64

On 6/6/24 10:57, Phil Phil wrote:
> Should the stack segment still be there though? I compared a stackpointer to the memory areas from info proc mappings and I can't find a match.

You'll likely find it in a core file section instead: maint info sections.

For me:

 [28]     0xfffffffdf000->0x1000000000000 at 0x00191350: load13 ALLOC LOAD HAS_CONTENTS

Does that help? GDB will look things up in the core file instead of memory, which is probably
why the way it displays things is slightly different.

It could be improved I suppose.

> ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
> *From:* Luis Machado <luis.machado@arm.com>
> *Sent:* Thursday, June 6, 2024 9:41 AM
> *To:* Phil Phil <heidegg@hotmail.com>; gdb@sourceware.org <gdb@sourceware.org>
> *Subject:* Re: Stack segments for Aarch64
>
> Hi,
>
> On 6/6/24 10:33, Phil Phil wrote:
>> GDB 12.1 coredump post mortem coredump debugging on an x64 Linux desktop.  I do not see a perms column in info proc mappings.
>>
>
> Ah, so it is corefile debugging. Checking on my end, I don't see the permissions column either. Now it escapes me if we have any
> special reason for that or if it is just an oversight somewhere. As for the stack marker, I suppose we lose that reference
> when the corefile is generated. That reference comes from /proc/<pid>/maps when we do "info proc mapping".
>
> ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
>> *From:* Luis Machado <luis.machado@arm.com>
>> *Sent:* Thursday, June 6, 2024 9:23 AM
>> *To:* Phil Phil <heidegg@hotmail.com>; gdb@sourceware.org <gdb@sourceware.org>
>> *Subject:* Re: Stack segments for Aarch64
>>
>> Hi,
>>
>> On 6/6/24 10:17, Phil Phil via Gdb wrote:
>>> Greetings,
>>>
>>> I'm trying get some memory info on an Aarch64 for a coredump. The aarch64 gdb produces this output for info proc mappings
>>>
>>>           Start Addr           End Addr       Size     Offset objfile
>>>         0x557ead9000       0x5582dee000  0x4315000        0x0 /usr/bin/myproc
>>>         0x5582dfe000       0x5582f0a000   0x10c000  0x4315000 /usr/bin/myproc
>>>         0x5582f0a000       0x5582f24000    0x1a000  0x4421000 /usr/bin/myproc
>>>
>>> I'm missing at least two things here compared to the x64 output:
>>>
>>>
>>>   *
>>> No read/write permissions
>>>   *
>>> Stack segments are not shown.
>>>
>>> Any ideas on how to make these two things visible on Aarch64?
>>>
>>> Regards
>>
>> What aarch64 debugging setup do you have? Versions etc? Remote?
>>
>> For me, running native gdb on aarch64:
>>
>> process 1681741
>> Mapped address spaces:
>>
>>           Start Addr           End Addr       Size     Offset  Perms  objfile
>>       0xaaaaaaaa0000     0xaaaaac3c6000  0x1926000        0x0  r-xp   /home/ubuntu/work/build/binutils-gdb-master/gdb/gdb
>>       0xaaaaac3d5000     0xaaaaacd2a000   0x955000  0x1925000  r--p   /home/ubuntu/work/build/binutils-gdb-master/gdb/gdb
>>       0xaaaaacfc6000     0xaaaaad069000    0xa3000        0x0  rw-p   [heap]
>> ...
>>       0xfffffffdf000    0x1000000000000    0x21000        0x0  rw-p   [stack]
>


^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: Stack segments for Aarch64
  2024-06-06 10:27           ` Phil Phil via Gdb
@ 2024-06-06 10:29             ` Luis Machado via Gdb
  0 siblings, 0 replies; 8+ messages in thread
From: Luis Machado via Gdb @ 2024-06-06 10:29 UTC (permalink / raw)
  To: Phil Phil, gdb

Right, "maint info sections" would complement "info proc mapping", if you want to have the visibility of all
the interacting pieces in exec, core file and memory.

On 6/6/24 11:27, Phil Phil wrote:
> Would you suggest that the output of maintenance info sections is more "complete" if you want to see all mapped memory regions?
> ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
> *From:* Luis Machado <luis.machado@arm.com>
> *Sent:* Thursday, June 6, 2024 10:15 AM
> *To:* Phil Phil <heidegg@hotmail.com>; gdb@sourceware.org <gdb@sourceware.org>
> *Subject:* Re: Stack segments for Aarch64
>  
> On 6/6/24 10:57, Phil Phil wrote:
>> Should the stack segment still be there though? I compared a stackpointer to the memory areas from info proc mappings and I can't find a match. 
> 
> You'll likely find it in a core file section instead: maint info sections.
> 
> For me:
> 
>  [28]     0xfffffffdf000->0x1000000000000 at 0x00191350: load13 ALLOC LOAD HAS_CONTENTS
> 
> Does that help? GDB will look things up in the core file instead of memory, which is probably
> why the way it displays things is slightly different.
> 
> It could be improved I suppose.
> 
>> ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
>> *From:* Luis Machado <luis.machado@arm.com>
>> *Sent:* Thursday, June 6, 2024 9:41 AM
>> *To:* Phil Phil <heidegg@hotmail.com>; gdb@sourceware.org <gdb@sourceware.org>
>> *Subject:* Re: Stack segments for Aarch64
>>  
>> Hi,
>> 
>> On 6/6/24 10:33, Phil Phil wrote:
>>> GDB 12.1 coredump post mortem coredump debugging on an x64 Linux desktop.  I do not see a perms column in info proc mappings.
>>> 
>> 
>> Ah, so it is corefile debugging. Checking on my end, I don't see the permissions column either. Now it escapes me if we have any
>> special reason for that or if it is just an oversight somewhere. As for the stack marker, I suppose we lose that reference
>> when the corefile is generated. That reference comes from /proc/<pid>/maps when we do "info proc mapping".
>> 
>> ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
>>> *From:* Luis Machado <luis.machado@arm.com>
>>> *Sent:* Thursday, June 6, 2024 9:23 AM
>>> *To:* Phil Phil <heidegg@hotmail.com>; gdb@sourceware.org <gdb@sourceware.org>
>>> *Subject:* Re: Stack segments for Aarch64
>>>  
>>> Hi,
>>> 
>>> On 6/6/24 10:17, Phil Phil via Gdb wrote:
>>>> Greetings,
>>>> 
>>>> I'm trying get some memory info on an Aarch64 for a coredump. The aarch64 gdb produces this output for info proc mappings
>>>> 
>>>>           Start Addr           End Addr       Size     Offset objfile
>>>>         0x557ead9000       0x5582dee000  0x4315000        0x0 /usr/bin/myproc
>>>>         0x5582dfe000       0x5582f0a000   0x10c000  0x4315000 /usr/bin/myproc
>>>>         0x5582f0a000       0x5582f24000    0x1a000  0x4421000 /usr/bin/myproc
>>>> 
>>>> I'm missing at least two things here compared to the x64 output:
>>>> 
>>>> 
>>>>   *
>>>> No read/write permissions
>>>>   *
>>>> Stack segments are not shown.
>>>> 
>>>> Any ideas on how to make these two things visible on Aarch64?
>>>> 
>>>> Regards
>>> 
>>> What aarch64 debugging setup do you have? Versions etc? Remote?
>>> 
>>> For me, running native gdb on aarch64:
>>> 
>>> process 1681741
>>> Mapped address spaces:
>>> 
>>>           Start Addr           End Addr       Size     Offset  Perms  objfile
>>>       0xaaaaaaaa0000     0xaaaaac3c6000  0x1926000        0x0  r-xp   /home/ubuntu/work/build/binutils-gdb-master/gdb/gdb
>>>       0xaaaaac3d5000     0xaaaaacd2a000   0x955000  0x1925000  r--p   /home/ubuntu/work/build/binutils-gdb-master/gdb/gdb
>>>       0xaaaaacfc6000     0xaaaaad069000    0xa3000        0x0  rw-p   [heap]
>>> ...
>>>       0xfffffffdf000    0x1000000000000    0x21000        0x0  rw-p   [stack]
>> 
> 


^ permalink raw reply	[flat|nested] 8+ messages in thread

end of thread, other threads:[~2024-06-06 10:30 UTC | newest]

Thread overview: 8+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2024-06-06  9:17 Stack segments for Aarch64 Phil Phil via Gdb
2024-06-06  9:23 ` Luis Machado via Gdb
2024-06-06  9:33   ` Phil Phil via Gdb
2024-06-06  9:41     ` Luis Machado via Gdb
2024-06-06  9:57       ` Phil Phil via Gdb
2024-06-06 10:15         ` Luis Machado via Gdb
2024-06-06 10:27           ` Phil Phil via Gdb
2024-06-06 10:29             ` Luis Machado via Gdb

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox