This is the mail archive of the gdb-patches@sourceware.org mailing list for the GDB project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

Re: Regression on prelinked-sepdebug-shlibs


On Thu, Jan 07, 2010 at 03:22:21PM +0100, Tristan Gingold wrote:
> $ readelf -S sep
> There are 14 section headers, starting at offset 0x136c:
> 
> Section Headers:
>   [Nr] Name              Type            Addr     Off    Size   ES Flg Lk Inf Al
>   [ 0]                   NULL            00000000 000000 000000 00      0   0  0
>   [ 1] sec_zero          PROGBITS        00000000 001000 00000a 00  AX  0   0  1

Notice the non-zero offset.

% readelf -l sep

Elf file type is EXEC (Executable file)
Entry point 0x80480f8
There are 5 program headers, starting at offset 52

Program Headers:
  Type           Offset   VirtAddr   PhysAddr   FileSiz MemSiz  Flg Align
  LOAD           0x001000 0x00000000 0x00000000 0x0000a 0x0000a R E 0x1000
  LOAD           0x0010d4 0x080480d4 0x080480d4 0x00039 0x00039 R E 0x1000

The file offset 0 is not mapped.  That means the program headers, at
offset 52, are not mapped.  So ld.so can't find them.

I'm surprised the static executable worked, but I can see how that
might happen.

-- 
Daniel Jacobowitz
CodeSourcery


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]