this question is wrong, the XXXServer.debug file is debug symbol file, the .text is different from XXXServer. Another question, what is using of XXXServer.sym? Why need it when we have XXXServer.debug file.
After cross Compiled Linux DS binaries on Win10( v13_clang-7.0.1-centos7), I got four files:
- Test1Server
- Test1Server.debug
- Test1Server.sym
- Test1Server.target
the Test1Server is running ok, but Test1Server.debug launch failed, is not Test1Server.debug a debug version?how can I get sym info when using systemtap to analyse DS process? thanks, expect your help!
$ ./Test1Server.debug
-bash: ./Test1Server.debug: cannot execute binary file
$ objdump -x Test1Server.debug
Test1Server.debug: file format elf64-x86-64
Test1Server.debug
architecture: i386:x86-64, flags 0x00000112:
EXEC_P, HAS_SYMS, D_PAGED
start address 0x000000000228a000
Program Header:
PHDR off 0x0000000000000040 vaddr 0x0000000000200040 paddr 0x0000000000200040 align 2**3
filesz 0x0000000000000268 memsz 0x0000000000000268 flags r--
INTERP off 0x00000000000002a8 vaddr 0x00000000002002a8 paddr 0x00000000002002a8 align 2**0
filesz 0x0000000000000000 memsz 0x000000000000001c flags r--
LOAD off 0x0000000000000000 vaddr 0x0000000000200000 paddr 0x0000000000200000 align 2**12
filesz 0x00000000002a3f78 memsz 0x0000000002089edc flags r--
LOAD off 0x00000000002a4000 vaddr 0x000000000228a000 paddr 0x000000000228a000 align 2**12
filesz 0x0000000000000000 memsz 0x00000000041cfa30 flags r-x
LOAD off 0x00000000002a4000 vaddr 0x000000000645a000 paddr 0x000000000645a000 align 2**12
filesz 0x0000000000000000 memsz 0x000000000073ebd0 flags rw-
TLS off 0x00000000002a4000 vaddr 0x0000000006489000 paddr 0x0000000006489000 align 2**3
filesz 0x0000000000000000 memsz 0x00000000000000d0 flags r--
DYNAMIC off 0x00000000002a4000 vaddr 0x00000000064f1e18 paddr 0x00000000064f1e18 align 2**3
filesz 0x0000000000000000 memsz 0x0000000000000210 flags rw-
NULL off 0x0000000000000000 vaddr 0x0000000000000000 paddr 0x0000000000000000 align 2**0
filesz 0x0000000000000000 memsz 0x0000000000000000 flags ---
EH_FRAME off 0x00000000002a3f78 vaddr 0x0000000001411ed8 paddr 0x0000000001411ed8 align 2**2
filesz 0x0000000000000000 memsz 0x0000000000297f94 flags r--
STACK off 0x0000000000000000 vaddr 0x0000000000000000 paddr 0x0000000000000000 align 2**0
filesz 0x0000000000000000 memsz 0x0000000000000000 flags rw-
NOTE off 0x00000000002a3f40 vaddr 0x00000000004a3f40 paddr 0x00000000004a3f40 align 2**2
filesz 0x0000000000000038 memsz 0x0000000000000038 flags r--
Dynamic Section:
Sections:
Idx Name Size VMA LMA File off Algn
0 .interp 0000001c 00000000002002a8 00000000002002a8 000002a8 2**0
ALLOC, READONLY
1 .dynsym 000b3b68 00000000002002c8 00000000002002c8 000002a8 2**3
ALLOC, READONLY
2 .gnu.version 0000ef9e 00000000002b3e30 00000000002b3e30 000002a8 2**1
ALLOC, READONLY
3 .gnu.version_r 000001d0 00000000002c2dd0 00000000002c2dd0 000002a8 2**2
ALLOC, READONLY
4 .gnu.hash 000351c4 00000000002c2fa0 00000000002c2fa0 000002a8 2**3
ALLOC, READONLY
5 .dynstr 001a92ba 00000000002f8164 00000000002f8164 000002a8 2**0
ALLOC, READONLY
6 .rela.dyn 00000348 00000000004a1420 00000000004a1420 000002a8 2**3
ALLOC, READONLY
7 .rela.plt 000027d8 00000000004a1768 00000000004a1768 000002a8 2**3
ALLOC, READONLY
8 .note.ABI-tag 00000020 00000000004a3f40 00000000004a3f40 002a3f40 2**2
CONTENTS, ALLOC, LOAD, READONLY, DATA
9 .note.gnu.build-id 00000018 00000000004a3f60 00000000004a3f60 002a3f60 2**2
CONTENTS, ALLOC, LOAD, READONLY, DATA
10 .rodata 00f557ec 00000000004a4000 00000000004a4000 002a3f78 2**12
ALLOC, READONLY
11 .gcc_except_table 000186ec 00000000013f97ec 00000000013f97ec 002a3f78 2**2
ALLOC, READONLY
12 .eh_frame_hdr 00297f94 0000000001411ed8 0000000001411ed8 002a3f78 2**2
ALLOC, READONLY
13 .eh_frame 00be006c 00000000016a9e70 00000000016a9e70 002a3f78 2**3
ALLOC, READONLY
14 .text 0400bf40 000000000228a000 000000000228a000 002a4000 2**8
ALLOC, READONLY, CODE
15 .init 00000029 0000000006295f40 0000000006295f40 002a4000 2**2
ALLOC, READONLY, CODE
16 .fini 0000000e 0000000006295f6c 0000000006295f6c 002a4000 2**2
ALLOC, READONLY, CODE
17 .uedbg 001c200b 0000000006295f80 0000000006295f80 002a4000 2**4
ALLOC, READONLY, CODE
18 .plt 00001aa0 0000000006457f90 0000000006457f90 002a4000 2**4
ALLOC, READONLY, CODE
19 .data 0002e278 000000000645a000 000000000645a000 002a4000 2**5
ALLOC
20 .tm_clone_table 00000000 0000000006488278 0000000006488278 002a4000 2**3
ALLOC
21 .got.plt 00000d60 0000000006488278 0000000006488278 002a4000 2**3
ALLOC
22 .tdata 00000004 0000000006489000 0000000006489000 002a4000 2**2
ALLOC, THREAD_LOCAL
23 .tbss 000000c8 0000000006489008 0000000006489008 002a4000 2**3
ALLOC, THREAD_LOCAL
24 .ctors 00000018 0000000006489008 0000000006489008 002a4000 2**3
ALLOC
25 .dtors 00000010 0000000006489020 0000000006489020 002a4000 2**3
ALLOC
26 .jcr 00000008 0000000006489030 0000000006489030 002a4000 2**3
ALLOC
27 .init_array 00000e28 0000000006489038 0000000006489038 002a4000 2**3
ALLOC
28 .data.rel.ro 00067fb8 0000000006489e60 0000000006489e60 002a4000 2**5
ALLOC
29 .dynamic 00000210 00000000064f1e18 00000000064f1e18 002a4000 2**3
ALLOC
30 .got 00005ca0 00000000064f2028 00000000064f2028 002a4000 2**3
ALLOC
31 .bss 006a0bd0 00000000064f8000 00000000064f8000 002a4000 2**6
ALLOC
32 .comment 000001bd 0000000000000000 0000000000000000 002a3f78 2**0
CONTENTS, READONLY
33 .debug_str 0875a8d2 0000000000000000 0000000000000000 002a4135 2**0
CONTENTS, READONLY, DEBUGGING
34 .debug_loc 0d3fe67c 0000000000000000 0000000000000000 089fea07 2**0
CONTENTS, READONLY, DEBUGGING
35 .debug_abbrev 0025979d 0000000000000000 0000000000000000 15dfd083 2**0
CONTENTS, READONLY, DEBUGGING
36 .debug_info 171df9d2 0000000000000000 0000000000000000 16056820 2**0
CONTENTS, READONLY, DEBUGGING
37 .debug_ranges 02e43e90 0000000000000000 0000000000000000 2d2361f2 2**0
CONTENTS, READONLY, DEBUGGING
38 .debug_macinfo 0029a3ed 0000000000000000 0000000000000000 3007a082 2**0
CONTENTS, READONLY, DEBUGGING
39 .debug_names 04c17244 0000000000000000 0000000000000000 30314470 2**2
CONTENTS, READONLY, DEBUGGING
40 .debug_line 03b30c7d 0000000000000000 0000000000000000 34f2b6b4 2**0
CONTENTS, READONLY, DEBUGGING
41 .debug_pubnames 0052d296 0000000000000000 0000000000000000 38a5c331 2**0
CONTENTS, READONLY, DEBUGGING
42 .debug_pubtypes 002b4f16 0000000000000000 0000000000000000 38f895c7 2**0
CONTENTS, READONLY, DEBUGGING
43 .debug_aranges 000033d0 0000000000000000 0000000000000000 3923e4dd 2**0
CONTENTS, READONLY, DEBUGGING
SYMBOL TABLE:
0000000000000000 l df *ABS* 0000000000000000 init.c
0000000000000000 l df *ABS* 0000000000000000 crtstuff.c
0000000006489008 l O .ctors 0000000000000000 __CTOR_LIST__
0000000006489020 l O .dtors 0000000000000000 __DTOR_LIST__
0000000006489030 l O .jcr 0000000000000000 __JCR_LIST__
0000000006488278 l O .tm_clone_table 0000000000000000 __TMC_LIST__
000000000228a02a l F .text 0000000000000000 deregister_tm_clones
000000000228a053 l F .text 0000000000000000 register_tm_clones
000000000228a090 l F .text 0000000000000000 __do_global_dtors_aux
00000000064f8e08 l O .bss 0000000000000001 completed.6900
00000000064f8e10 l O .bss 0000000000000008 dtor_idx.6902
000000000228a0e6 l F .text 0000000000000000 frame_dummy
000000000645a008 l O .data 0000000000000000 .hidden __dso_handle
0000000000000000 l df *ABS* 0000000000000000 Module.Launch.cpp
00000000022a5ea0 l F .text 0000000000000dc4 _GLOBAL__sub_I_Module.Launch.cpp
0000000006296090 l F .uedbg 0000000000000005 _Z19DispatchCheckVerifyIbZN11FEngineLoop4TickEvE4$_18ET_OT0_
0000000006296020 l F .uedbg 0000000000000005 _Z19DispatchCheckVerifyIbZN11FEngineLoop7PreInitEPKDsE3$_8ET_OT0_
0000000006296040 l F .uedbg 0000000000000005 _Z19DispatchCheckVerifyIbZN11FEngineLoop7PreInitEPKDsE4$_11ET_OT0_
0000000006296050 l F .uedbg 0000000000000005 _Z19DispatchCheckVerifyIbZN11FEngineLoop7PreInitEPKDsE4$_13ET_OT0_
00000000064f9560 l O .bss 0000000000000008 _ZGVZN11FEngineLoop4TickEvE12FrameEndSync
... ...
.sym can be used to symbolicate the crash callstack even without the presence of .debug (which is debugger-level info).
Get, Thank you