nitesh.jain added a comment. In https://reviews.llvm.org/D35784#820237, @clayborg wrote:
> Looking at an ELF file with DWARF, I see: > > (lldb) image dump sections > Dumping sections for 1 modules. > Sections for > '/Volumes/android/aosp/out/target/product/generic/symbols/system/lib/libart.so' > (arm): > SectID Type File Address Perm > File Off. File Size Flags Section Name > ---------- ---------------- --------------------------------------- ---- > ---------- ---------- ---------- ---------------------------- > 0x00000001 regular --- > 0x00000000 0x00000000 0x00000000 libart.so. > 0x00000002 regular [0x0000000000000154-0x0000000000000167) r-- > 0x00000154 0x00000013 0x00000002 libart.so..interp > 0x00000003 elf-dynamic-symbols [0x0000000000000168-0x0000000000010d18) > r-- 0x00000168 0x00010bb0 0x00000002 libart.so..dynsym > 0x00000004 regular [0x0000000000010d18-0x000000000005228f) r-- > 0x00010d18 0x00041577 0x00000002 libart.so..dynstr > 0x00000005 regular [0x0000000000052290-0x000000000005a590) r-- > 0x00052290 0x00008300 0x00000002 libart.so..hash > 0x00000006 elf-relocation-entries [0x000000000005a590-0x0000000000067870) > r-- 0x0005a590 0x0000d2e0 0x00000002 libart.so..rel.dyn > 0x00000007 elf-relocation-entries [0x0000000000067870-0x0000000000068398) > r-- 0x00067870 0x00000b28 0x00000002 libart.so..rel.plt > 0x00000008 regular [0x0000000000068398-0x0000000000069468) r-x > 0x00068398 0x000010d0 0x00000006 libart.so..plt > 0x00000009 code [0x0000000000069470-0x00000000002a94f8) r-x > 0x00069470 0x00240088 0x00000006 libart.so..text > 0x0000000a ARM.exidx [0x00000000002a94f8-0x00000000002b12d0) r-- > 0x002a94f8 0x00007dd8 0x00000082 libart.so..ARM.exidx > 0x0000000b ARM.extab [0x00000000002b12d0-0x00000000002b1e44) r-- > 0x002b12d0 0x00000b74 0x00000002 libart.so..ARM.extab > 0x0000000c regular [0x00000000002b1e48-0x00000000002e39e4) r-- > 0x002b1e48 0x00031b9c 0x00000002 libart.so..rodata > 0x0000000d eh-frame [0x00000000002e39e4-0x00000000002e5fa8) r-- > 0x002e39e4 0x000025c4 0x00000002 libart.so..eh_frame > 0x0000000e regular [0x00000000002e5fa8-0x00000000002e63d4) r-- > 0x002e5fa8 0x0000042c 0x00000002 libart.so..eh_frame_hdr > 0x0000000f regular [0x00000000002e7e38-0x00000000002eaa24) rw- > 0x002e6e38 0x00002bec 0x00000003 libart.so..data.rel.ro.local > 0x00000010 regular [0x00000000002eaa24-0x00000000002eaa28) rw- > 0x002e9a24 0x00000004 0x00000003 libart.so..fini_array > 0x00000011 regular [0x00000000002eaa28-0x00000000002ee370) rw- > 0x002e9a28 0x00003948 0x00000003 libart.so..data.rel.ro > 0x00000012 regular [0x00000000002ee370-0x00000000002ee3c0) rw- > 0x002ed370 0x00000050 0x00000003 libart.so..init_array > 0x00000013 elf-dynamic-link-info [0x00000000002ee3c0-0x00000000002ee4f0) > rw- 0x002ed3c0 0x00000130 0x00000003 libart.so..dynamic > 0x00000014 regular [0x00000000002ee4f4-0x00000000002ef000) rw- > 0x002ed4f4 0x00000b0c 0x00000003 libart.so..got > 0x00000015 data [0x00000000002ef000-0x00000000002ef8c4) rw- > 0x002ee000 0x000008c4 0x00000003 libart.so..data > 0x00000016 zero-fill [0x00000000002ef8c8-0x00000000002f11fc) rw- > 0x002ee8c8 0x00000000 0x00000003 libart.so..bss > 0x00000017 regular --- > 0x002ee8c4 0x00000010 0x00000030 libart.so..comment > 0x00000018 dwarf-line --- > 0x002ee8d4 0x002c10eb 0x00000000 libart.so..debug_line > 0x00000019 dwarf-info --- > 0x005af9bf 0x054eb22a 0x00000000 libart.so..debug_info > 0x0000001a dwarf-abbrev --- > 0x05a9abe9 0x000f5e5b 0x00000000 libart.so..debug_abbrev > 0x0000001b dwarf-aranges --- > 0x05b90a48 0x00011960 0x00000000 libart.so..debug_aranges > 0x0000001c dwarf-loc --- > 0x05ba23a8 0x00a0d623 0x00000000 libart.so..debug_loc > 0x0000001d dwarf-ranges --- > 0x065af9cb 0x0029c7b0 0x00000000 libart.so..debug_ranges > 0x0000001e dwarf-macro --- > 0x0684c17b 0x000ada15 0x00000000 libart.so..debug_macro > 0x0000001f dwarf-str --- > 0x068f9b90 0x004a45e9 0x00000030 libart.so..debug_str > 0x00000020 dwarf-frame --- > 0x06d9e17c 0x0003fc6c 0x00000000 libart.so..debug_frame > 0x00000021 regular --- > 0x06dddde8 0x0000001c 0x00000000 libart.so..note.gnu.gold-version > 0x00000022 regular --- > 0x06ddde04 0x00000038 0x00000000 libart.so..ARM.attributes > 0x00000023 elf-symbol-table --- > 0x06ddde3c 0x00056c30 0x00000000 libart.so..symtab > 0x00000024 regular --- > 0x06e34a6c 0x0006c9e6 0x00000000 libart.so..strtab > 0x00000025 regular --- > 0x06ea1452 0x0000017b 0x00000000 libart.so..shstrtab > > > Note how all DWARF sections have no file address. They are known to not be > valid addresses. Are you seeing something different with your ELF file? Or do > you have two ELF files? One without symbols and one with? The output of > "image dump sections" should look like above where no DWARF sections have > anything valid in the "File Address" column. The output of image dump sections show all Dwarf sections with no file address. The issue was when i try to add breakpoint on address **(0xbcf0).** Symtab::FindSymbolContainingFileAddress return **$debug_ranges627** instead of **main** symbol. Hence there is a failure in setting breakpoint. 2: 000000000000bcc4 1664 FUNC GLOBAL DEFAULT 10 main 49686: 000000000000bcf0 0 NOTYPE LOCAL DEFAULT 40 $debug_ranges627 https://reviews.llvm.org/D35784 _______________________________________________ lldb-commits mailing list lldb-commits@lists.llvm.org http://lists.llvm.org/cgi-bin/mailman/listinfo/lldb-commits