https://sourceware.org/bugzilla/show_bug.cgi?id=28220
Bug ID: 28220 Summary: dwarf_location_attr returns high-bit junk from .debug_addr when fetching 32-bit addresses Product: elfutils Version: unspecified Status: UNCONFIRMED Severity: normal Priority: P2 Component: libdw Assignee: unassigned at sourceware dot org Reporter: gprocida at google dot com CC: elfutils-devel at sourceware dot org Target Milestone: --- In libdw, there are snippets of code of the form: dwarf_formaddr.c: 71 if (address_size == 4) 72 *addr = read_4ubyte_unaligned (dbg, datap); 73 else 74 *addr = read_8ubyte_unaligned (dbg, datap); However, when I use the public interfaces in order to read locations, it goes wrong when for Clang-built 32-bit objects with DWARF 5 debug information, with extra junk in the upper 32 bits. The attachment contains a full example. It's possible that I'm using the API incorrectly. This is the debug output for the problematic case: clang 5 32 bias=0 bias=0 dwarf=0x55f103cf8a10 elf=0x55f103cf5610 version=5 unit_type=1 cu_die.addr=0x7fc3032e0078 cu_die.cu=0x55f103cf8e98 cu_die.abbrev=0 sub_die.addr=0 sub_die.cu=0 sub_die.abbrev=0 unit_id=0 address_size=4 offset_size=4 dwarf_string_attr(die, 1b) comp_dir=/usr/local/google/home/gprocida/dev/libabigail/b195152239 child.addr=0x7fc3032e008a child.cu=0x55f103cf8e98 child.abbrev=0 dwarf_string_attr(die, 3) dwarf_bool_attr(die, 3f) dwarf_location_attr(die, 2) attribute code=0x2 form=0x18 (expected=18) expr=0x55f103cf8ff8 exprlen=1 op.atom=a1 op.number=0 op.number2=0 op.offset=0 result code=0x11 form=0x1 (expected=1) address=0x1000400010000 variable name=x name2=x external=1 location=1000400010000 child.addr=0x7fc3032e0095 child.cu=0x55f103cf8e98 child.abbrev=0 child.addr=0x7fc3032e0099 child.cu=0x55f103cf8e98 child.abbrev=0 dwarf_string_attr(die, 3) dwarf_bool_attr(die, 3f) dwarf_location_attr(die, 2) attribute code=0x2 form=0x18 (expected=18) expr=0x55f103cf9048 exprlen=1 op.atom=a1 op.number=1 op.number2=0 op.offset=0 result code=0x11 form=0x1 (expected=1) address=0x6265440000010004 variable name=y name2=y external=1 location=6265440000010004 Note that variable x's address includes variable y's address as the upper 32 bits and that variable y has junk in the upper 32 bits. -- You are receiving this mail because: You are on the CC list for the bug.