This is the mail archive of the
gdb@sourceware.org
mailing list for the GDB project.
Re: PowerPC SecurePLT - stepping into library function
- From: "Joseph S. Myers" <joseph at codesourcery dot com>
- To: Michael Eager <eager at eagerm dot com>
- Cc: gdb at sourceware dot org, Alan Modra <amodra at gmail dot com>
- Date: Fri, 6 Jan 2012 20:09:26 +0000 (UTC)
- Subject: Re: PowerPC SecurePLT - stepping into library function
- References: <4F075159.5090508@eagerm.com>
On Fri, 6 Jan 2012, Michael Eager wrote:
> It seems that the best way to fix this would be to create
> a new OSABI sniffer for SecurePLT which identifies that
> the executable was compiled with -msecurePLT. One issue
> is how to identify these programs. The Power Arch 32-bit ABI
> (Sect 5.2.5.2, note at end) says that these will have
> R_PPC_REL16 relocations. I don't see any of these relocs.
That's about relocatable objects, i.e. static relocations in .o files, not
dynamic relocations in executables and shared libraries.
> Is there any possibility of a chimera: an executable compiled
> using Secure PLT linking to libraries which use the old style
> PLT? Or vice-versa? I'm assuming that this cannot happen.
As far as I know that ought to work.
--
Joseph S. Myers
joseph@codesourcery.com