
26 Dec
2014
26 Dec
'14
11 a.m.
Dear Alexey,
In message 1419587516-30541-1-git-send-email-abrodkin@synopsys.com you wrote:
MetaWare debugger doesn't support PIE (position-independent executable) so the only way to load U-Boot in MDB is to fake it by:
- Reset PIE flag in ELF header
- Strip all debug information from elf
Even though it could be done manually but having this automated way is very convenient. User may build U-Boot that will be loaded on target via MDB saying "make mdbtrick".
I wonder if such manipulation helps? Are you really able to debug PIE code on the target just by fooling the debugger about it like this? I would expect that it would fail to work if it really doesn't support PIE?
Best regards,
Wolfgang Denk
--
DENX Software Engineering GmbH, MD: Wolfgang Denk & Detlev Zundel
HRB 165235 Munich, Office: Kirchenstr.5, D-82194 Groebenzell, Germany
Phone: (+49)-8142-66989-10 Fax: (+49)-8142-66989-80 Email: wd@denx.de
Computers are not intelligent. They only think they are.