This is the mail archive of the
gdb-patches@sourceware.org
mailing list for the GDB project.
Re: Regression on prelinked-sepdebug-shlibs
On Thu, Jan 07, 2010 at 03:22:21PM +0100, Tristan Gingold wrote:
> $ readelf -S sep
> There are 14 section headers, starting at offset 0x136c:
>
> Section Headers:
> [Nr] Name Type Addr Off Size ES Flg Lk Inf Al
> [ 0] NULL 00000000 000000 000000 00 0 0 0
> [ 1] sec_zero PROGBITS 00000000 001000 00000a 00 AX 0 0 1
Notice the non-zero offset.
% readelf -l sep
Elf file type is EXEC (Executable file)
Entry point 0x80480f8
There are 5 program headers, starting at offset 52
Program Headers:
Type Offset VirtAddr PhysAddr FileSiz MemSiz Flg Align
LOAD 0x001000 0x00000000 0x00000000 0x0000a 0x0000a R E 0x1000
LOAD 0x0010d4 0x080480d4 0x080480d4 0x00039 0x00039 R E 0x1000
The file offset 0 is not mapped. That means the program headers, at
offset 52, are not mapped. So ld.so can't find them.
I'm surprised the static executable worked, but I can see how that
might happen.
--
Daniel Jacobowitz
CodeSourcery