From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-wr1-x435.google.com (mail-wr1-x435.google.com [IPv6:2a00:1450:4864:20::435]) by sourceware.org (Postfix) with ESMTPS id 0C9E2385841B for ; Fri, 11 Feb 2022 13:51:25 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.1 sourceware.org 0C9E2385841B Received: by mail-wr1-x435.google.com with SMTP id v12so15447997wrv.2 for ; Fri, 11 Feb 2022 05:51:24 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=ziZCn9zRDNwtd6kkLExdM/zPs+/oWmyGePkF1x+jzxY=; b=XlBH7murYRdaMjidxjbhhNcbtmgroVo5SxY73jdvaK2frFBZ6jPfAXYIuzbyya8sk6 2V1zTYmpM+1k8jyIapGJM7d+Bz6f/7uUcskVQLVHwCWprlvmOkd0/RyTSxShoE0r29Ly Mtc9hwnAxKrFVIGrSIWQ7suvmOARnVGXr3IlwVkXbATuSlacTMcDYILQLUdmyM+fJPSJ RYd2eugif8vZQwWqYkCiAiIAdYCk8rPeBtDstLC/ANnXxMxsy0aAI6tMt8So5C2+gSM7 7skQb49ivZMRRjqsrUfoyy/wUNR+LGU2DwG31T2GSBU5aw9St3yiwsHRGDpWbkOKUxed KfUQ== X-Gm-Message-State: AOAM531hEUHna5oR+Ud4BZvWxiYR0M1xild+LH/MNo08R37cFpxgErWL rjHeeENy7F8xIFUHgyDWSYFX X-Google-Smtp-Source: ABdhPJzxF3NLb1+jxqqa+0+DdPeTkjGybQ9SxhFAxQPCKoK4sDgub/A4GouWjmeAoV7AVirrcNYMEg== X-Received: by 2002:a5d:4b8d:: with SMTP id b13mr1420037wrt.571.1644587483992; Fri, 11 Feb 2022 05:51:23 -0800 (PST) Received: from takamaka.home ([45.147.211.82]) by smtp.gmail.com with ESMTPSA id a13sm4005753wmq.28.2022.02.11.05.51.23 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 11 Feb 2022 05:51:23 -0800 (PST) Received: by takamaka.home (Postfix, from userid 1000) id AE0F7A4A5A; Fri, 11 Feb 2022 14:51:28 +0100 (CET) Date: Fri, 11 Feb 2022 14:51:28 +0100 From: Joel Brobecker To: Edgar Mobile via Gdb Cc: Joel Brobecker Subject: Re: Query parameters / dwarf info for a function Message-ID: References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-5.4 required=5.0 tests=BAYES_00, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, DKIM_VALID_EF, RCVD_IN_DNSWL_NONE, SPF_HELO_NONE, SPF_PASS, TXREP, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.4 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on server2.sourceware.org X-BeenThere: gdb@sourceware.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Gdb mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 11 Feb 2022 13:51:27 -0000 Hi Edgar, > can someone tell me if there is a gdb command to query the dwarf info > of a function, specifically the memory location of the parameters, > just through its name during post-mortem debugging ( I cannot stop > inside the function because the program isn't running ) ? If you're wondering about the location of the parameters, I think a better tool would be readelf or objdump, which are both able to dump the DWARF info in a human-readable way. E.g. readelf -wi EXE -- Joel