[Lldb-commits] [PATCH] D18464: Implement `target modules dump headers`

Adrian McCarthy via lldb-commits lldb-commits at lists.llvm.org
Thu Mar 24 15:36:13 PDT 2016


amccarth added a comment.

Literally:

  Dumping headers for 1 module(s).
  Headers for 'd:\src\fizzbuzz\a.exe':
      Module d:\src\fizzbuzz\a.exe
  04189230:       ObjectFilePECOFF, file = 'd:\src\fizzbuzz\a.exe', arch = i386
        SectID     Type             File Address                             File Off.  File Size  Flags      Section Name
        ---------- ---------------- ---------------------------------------  ---------- ---------- ---------- ------------------------
  ----
        0x00000001 data             [0x0000000000401000-0x00000000004085cc)  0x00000400 0x00007600 0x40000040 a.exe..rdata
        0x00000002 zero-fill        [0x0000000000409000-0x000000000040b244)  0x00000000 0x00000000 0xc0000080 a.exe..bss
        0x00000003 data             [0x000000000040c000-0x000000000040da8c)  0x00007a00 0x00001c00 0xc0000040 a.exe..data
        0x00000004 code             [0x000000000040e000-0x000000000042c7b8)  0x00009600 0x0001e800 0x60000020 a.exe..text
        0x00000005 data             [0x000000000042d000-0x000000000042d93c)  0x00027e00 0x00000a00 0x40000040 a.exe..xdata
        0x00000006 data             [0x000000000042e000-0x000000000042e887)  0x00028800 0x00000a00 0x40000040 a.exe..idata
        0x00000007 dwarf-abbrev     [0x000000000042f000-0x000000000042f6c1)  0x00029200 0x00000800 0x42000040 a.exe..debug_abbrev
        0x00000008 dwarf-info       [0x0000000000430000-0x000000000043ac12)  0x00029a00 0x0000ae00 0x42000040 a.exe..debug_info
        0x00000009 dwarf-line       [0x000000000043b000-0x000000000043ec3a)  0x00034800 0x00003e00 0x42000040 a.exe..debug_line
        0x0000000a dwarf-loc        [0x000000000043f000-0x000000000043f08e)  0x00038600 0x00000200 0x42000040 a.exe..debug_loc
        0x0000000b dwarf-pubnames   [0x0000000000440000-0x0000000000442ca3)  0x00038800 0x00002e00 0x42000040 a.exe..debug_pubnames
        0x0000000c dwarf-pubtypes   [0x0000000000443000-0x0000000000443b59)  0x0003b600 0x00000c00 0x42000040 a.exe..debug_pubtypes
        0x0000000d dwarf-ranges     [0x0000000000444000-0x0000000000444888)  0x0003c200 0x00000a00 0x42000040 a.exe..debug_ranges
        0x0000000e dwarf-str        [0x0000000000445000-0x0000000000450a55)  0x0003cc00 0x0000bc00 0x42000040 a.exe..debug_str
        0x0000000f regular          [0x0000000000451000-0x000000000045336c)  0x00048800 0x00002400 0x42000040 a.exe..reloc
  MSDOS Header
    e_magic    = 0x5a4d
    e_cblp     = 0x0000
    e_cp       = 0x0000
    e_crlc     = 0x0000
    e_cparhdr  = 0x0000
    e_minalloc = 0x0000
    e_maxalloc = 0x0000
    e_ss       = 0x0000
    e_sp       = 0x0000
    e_csum     = 0x0000
    e_ip       = 0x0000
    e_cs       = 0x0000
    e_lfarlc   = 0x0040
    e_ovno     = 0x0000
    e_res[4]   = { 0x0000, 0x0000, 0x0000, 0x0000 }
    e_oemid    = 0x0000
    e_oeminfo  = 0x0000
    e_res2[10] = { 0x0000, 0x0000, 0x0000, 0x0000, 0x0000, 0x0000, 0x0000, 0x0000, 0x0000, 0x0000 }
    e_lfanew   = 0x00000040
  COFF Header
    machine = 0x014c
    nsects  = 0x000f
    modtime = 0x00000000
    symoff  = 0x0004ac00
    nsyms   = 0x000015f2
    hdrsize = 0x00e0
  Optional COFF Header
    magic                   = 0x010b
    major_linker_version    = 0x00
    minor_linker_version    = 0x00
    code_size               = 0x0001e800
    data_size               = 0x0002c000
    bss_size                = 0x00000000
    entry                   = 0x000187b3
    code_offset             = 0x0000e000
    data_offset             = 0x00000000
    image_base              = 0x0000000000400000
    sect_alignment          = 0x00001000
    file_alignment          = 0x00000200
    major_os_system_version = 0x0006
    minor_os_system_version = 0x0000
    major_image_version     = 0x0000
    minor_image_version     = 0x0000
    major_subsystem_version = 0x0006
    minor_subsystem_version = 0x0000
    reserved1               = 0x00000000
    image_size              = 0x00053400
    header_size             = 0x00000400
    checksum                = 0x00000000
    subsystem               = 0x0003
    dll_flags               = 0x8140
    stack_reserve_size      = 0x0000000000100000
    stack_commit_size       = 0x0000000000001000
    heap_reserve_size       = 0x0000000000100000
    heap_commit_size        = 0x0000000000001000
    loader_flags            = 0x00000000
    num_data_dir_entries    = 0x00000010
    data_dirs[ 0] vmaddr = 0x00000000, vmsize = 0x00000000
    data_dirs[ 1] vmaddr = 0x0002e000, vmsize = 0x00000028
    data_dirs[ 2] vmaddr = 0x00000000, vmsize = 0x00000000
    data_dirs[ 3] vmaddr = 0x00000000, vmsize = 0x00000000
    data_dirs[ 4] vmaddr = 0x00000000, vmsize = 0x00000000
    data_dirs[ 5] vmaddr = 0x00051000, vmsize = 0x0000236c
    data_dirs[ 6] vmaddr = 0x00000000, vmsize = 0x00000000
    data_dirs[ 7] vmaddr = 0x00000000, vmsize = 0x00000000
    data_dirs[ 8] vmaddr = 0x00000000, vmsize = 0x00000000
    data_dirs[ 9] vmaddr = 0x00000000, vmsize = 0x00000000
    data_dirs[10] vmaddr = 0x00007ca0, vmsize = 0x00000040
    data_dirs[11] vmaddr = 0x00000000, vmsize = 0x00000000
    data_dirs[12] vmaddr = 0x0002e16c, vmsize = 0x00000144
    data_dirs[13] vmaddr = 0x00000000, vmsize = 0x00000000
    data_dirs[14] vmaddr = 0x00000000, vmsize = 0x00000000
    data_dirs[15] vmaddr = 0x00000000, vmsize = 0x00000000
  
  Section Headers
  IDX  name             vm addr    vm size    file off   file size  reloc off  line off   nreloc nline  flags
  ==== ---------------- ---------- ---------- ---------- ---------- ---------- ---------- ------ ------ ----------
  [ 0] .rdata           0x00001000 0x000075cc 0x00000400 0x00007600 0x00000000 0x00000000 0x0000 0x0000 0x40000040
  [ 1] .bss             0x00009000 0x00002244 0x00000000 0x00000000 0x00000000 0x00000000 0x0000 0x0000 0xc0000080
  [ 2] .data            0x0000c000 0x00001a8c 0x00007a00 0x00001c00 0x00000000 0x00000000 0x0000 0x0000 0xc0000040
  [ 3] .text            0x0000e000 0x0001e7b8 0x00009600 0x0001e800 0x00000000 0x00000000 0x0000 0x0000 0x60000020
  [ 4] .xdata           0x0002d000 0x0000093c 0x00027e00 0x00000a00 0x00000000 0x00000000 0x0000 0x0000 0x40000040
  [ 5] .idata           0x0002e000 0x00000887 0x00028800 0x00000a00 0x00000000 0x00000000 0x0000 0x0000 0x40000040
  [ 6] .debug_abbrev    0x0002f000 0x000006c1 0x00029200 0x00000800 0x00000000 0x00000000 0x0000 0x0000 0x42000040
  [ 7] .debug_info      0x00030000 0x0000ac12 0x00029a00 0x0000ae00 0x00000000 0x00000000 0x0000 0x0000 0x42000040
  [ 8] .debug_line      0x0003b000 0x00003c3a 0x00034800 0x00003e00 0x00000000 0x00000000 0x0000 0x0000 0x42000040
  [ 9] .debug_loc       0x0003f000 0x0000008e 0x00038600 0x00000200 0x00000000 0x00000000 0x0000 0x0000 0x42000040
  [10] .debug_pubnames  0x00040000 0x00002ca3 0x00038800 0x00002e00 0x00000000 0x00000000 0x0000 0x0000 0x42000040
  [11] .debug_pubtypes  0x00043000 0x00000b59 0x0003b600 0x00000c00 0x00000000 0x00000000 0x0000 0x0000 0x42000040
  [12] .debug_ranges    0x00044000 0x00000888 0x0003c200 0x00000a00 0x00000000 0x00000000 0x0000 0x0000 0x42000040
  [13] .debug_str       0x00045000 0x0000ba55 0x0003cc00 0x0000bc00 0x00000000 0x00000000 0x0000 0x0000 0x42000040
  [14] .reloc           0x00051000 0x0000236c 0x00048800 0x00002400 0x00000000 0x00000000 0x0000 0x0000 0x42000040
  
  04161368:     SymbolVendor (d:\src\fizzbuzz\a.exe)
  (lldb) target modules dump sections
  Dumping sections for 1 modules.
  Sections for 'd:\src\fizzbuzz\a.exe' (i686):
    SectID     Type             File Address                             File Off.  File Size  Flags      Section Name
    ---------- ---------------- ---------------------------------------  ---------- ---------- ---------- ----------------------------
  
    0x00000001 data             [0x0000000000401000-0x00000000004085cc)  0x00000400 0x00007600 0x40000040 a.exe..rdata
    0x00000002 zero-fill        [0x0000000000409000-0x000000000040b244)  0x00000000 0x00000000 0xc0000080 a.exe..bss
    0x00000003 data             [0x000000000040c000-0x000000000040da8c)  0x00007a00 0x00001c00 0xc0000040 a.exe..data
    0x00000004 code             [0x000000000040e000-0x000000000042c7b8)  0x00009600 0x0001e800 0x60000020 a.exe..text
    0x00000005 data             [0x000000000042d000-0x000000000042d93c)  0x00027e00 0x00000a00 0x40000040 a.exe..xdata
    0x00000006 data             [0x000000000042e000-0x000000000042e887)  0x00028800 0x00000a00 0x40000040 a.exe..idata
    0x00000007 dwarf-abbrev     [0x000000000042f000-0x000000000042f6c1)  0x00029200 0x00000800 0x42000040 a.exe..debug_abbrev
    0x00000008 dwarf-info       [0x0000000000430000-0x000000000043ac12)  0x00029a00 0x0000ae00 0x42000040 a.exe..debug_info
    0x00000009 dwarf-line       [0x000000000043b000-0x000000000043ec3a)  0x00034800 0x00003e00 0x42000040 a.exe..debug_line
    0x0000000a dwarf-loc        [0x000000000043f000-0x000000000043f08e)  0x00038600 0x00000200 0x42000040 a.exe..debug_loc
    0x0000000b dwarf-pubnames   [0x0000000000440000-0x0000000000442ca3)  0x00038800 0x00002e00 0x42000040 a.exe..debug_pubnames
    0x0000000c dwarf-pubtypes   [0x0000000000443000-0x0000000000443b59)  0x0003b600 0x00000c00 0x42000040 a.exe..debug_pubtypes
    0x0000000d dwarf-ranges     [0x0000000000444000-0x0000000000444888)  0x0003c200 0x00000a00 0x42000040 a.exe..debug_ranges
    0x0000000e dwarf-str        [0x0000000000445000-0x0000000000450a55)  0x0003cc00 0x0000bc00 0x42000040 a.exe..debug_str
    0x0000000f regular          [0x0000000000451000-0x000000000045336c)  0x00048800 0x00002400 0x42000040 a.exe..reloc


http://reviews.llvm.org/D18464





More information about the lldb-commits mailing list