From patchwork Mon Nov 28 12:05:35 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: =?utf-8?q?Marc_Poulhi=C3=A8s?= X-Patchwork-Id: 26718 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:adf:f944:0:0:0:0:0 with SMTP id q4csp5613389wrr; Mon, 28 Nov 2022 04:08:36 -0800 (PST) X-Google-Smtp-Source: AA0mqf6lB2EZyNAvPoyBjfwXFVDxqDYozk5O9XUEdNlANdd+sAbsA9aKmZZRE+/B38+8bkpFrhZk X-Received: by 2002:aa7:c690:0:b0:46a:e2b8:1be9 with SMTP id n16-20020aa7c690000000b0046ae2b81be9mr10942240edq.182.1669637316448; Mon, 28 Nov 2022 04:08:36 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1669637316; cv=none; d=google.com; s=arc-20160816; b=VLgWDrulopc1Sx1QIwjxaHEimPvxPb+xNI3woZGc4oqu9Re7jYi2mc2FTUMvwqRWtn Q3btJe5BpW6/hn576jm8AFZAKouAIzYpWy9ajsRujfu/FHKVOspau/C4iVwDj7F5iUj4 TUKXZr5YwuGTSUzwIpejKRigsU+zadQtXvrqcSRW1+rXVZ+2E2smrObaxSC4BQCVV0Fr V8GgiR8FUGP0b4gsm6QtM9ZPvajwjVBtpMiIm+EpUftFf8sZvhyjpTZRidmcgW7k3MsB g/0fBoVqcXPWy/byY3RRVAIVXajoHoN7wqXqHOs9nuQGSHFnaBOqbWHAo8FGZa5SFOse zsyw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=sender:errors-to:reply-to:from:list-subscribe:list-help:list-post :list-archive:list-unsubscribe:list-id:precedence :content-transfer-encoding:mime-version:message-id:date:subject:cc :to:dmarc-filter:delivered-to:dkim-signature:dkim-filter; bh=mlSljGS/DXkDWxHZ53FJA3GBeEdYCxkSE+8mqz4sEV8=; b=ev77822rBP5KS/VeyeAigPR4ZNwbvWQaQHAU6H8mk1SZoYP2rTal3PX6BS0UAOyFuz 4UOz8k5yMV9UX346s+LQFlADGjoSO+VER8kP7dmK5ECePvT3RG3Sakx3ROUlj1DjShBz sdlALnEzHdx2aWwptxH84LQ4E+qAEyGZGx1oAiclXDtN5o6VmFpSaWgJPzNoSDUnT7gf aGQjfNVqHKNFEVHYbsk7Tfivbdr6anaiPrKvi5+EBw+Y98nD899n+PJM+Zz2MUH7+RF1 ARFpkKKOfq6txcem59I82wTEz/+PyQwUS6B462oWipYfXFX8RDPbo0VYLPgxMMxRVz3S aBfw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gcc.gnu.org header.s=default header.b=wAF9Sjt7; spf=pass (google.com: domain of gcc-patches-bounces+ouuuleilei=gmail.com@gcc.gnu.org designates 2620:52:3:1:0:246e:9693:128c as permitted sender) smtp.mailfrom="gcc-patches-bounces+ouuuleilei=gmail.com@gcc.gnu.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=gnu.org Received: from sourceware.org (server2.sourceware.org. [2620:52:3:1:0:246e:9693:128c]) by mx.google.com with ESMTPS id js3-20020a17090797c300b0077547abf08fsi11314814ejc.169.2022.11.28.04.08.36 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 28 Nov 2022 04:08:36 -0800 (PST) Received-SPF: pass (google.com: domain of gcc-patches-bounces+ouuuleilei=gmail.com@gcc.gnu.org designates 2620:52:3:1:0:246e:9693:128c as permitted sender) client-ip=2620:52:3:1:0:246e:9693:128c; Authentication-Results: mx.google.com; dkim=pass header.i=@gcc.gnu.org header.s=default header.b=wAF9Sjt7; spf=pass (google.com: domain of gcc-patches-bounces+ouuuleilei=gmail.com@gcc.gnu.org designates 2620:52:3:1:0:246e:9693:128c as permitted sender) smtp.mailfrom="gcc-patches-bounces+ouuuleilei=gmail.com@gcc.gnu.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=gnu.org Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id 7C72F384EF7C for ; Mon, 28 Nov 2022 12:06:53 +0000 (GMT) DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org 7C72F384EF7C DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gcc.gnu.org; s=default; t=1669637213; bh=mlSljGS/DXkDWxHZ53FJA3GBeEdYCxkSE+8mqz4sEV8=; h=To:Cc:Subject:Date:List-Id:List-Unsubscribe:List-Archive: List-Post:List-Help:List-Subscribe:From:Reply-To:From; b=wAF9Sjt7mS0hY8scImoTCERrA+I7n53eWZI9hPymO//3QFtmH04A0o9pJZY0AhXZ/ 6cbwCXXKEARZsu5BTgGbC1t3z88kDsD17KX+vz7PkcNSMssPBby62hqQo3461iw68y uAwc5Egf3+yTEWYP+ZYdSyqheIMV6x5Cp/AGzOP0= X-Original-To: gcc-patches@gcc.gnu.org Delivered-To: gcc-patches@gcc.gnu.org Received: from mail-wm1-x333.google.com (mail-wm1-x333.google.com [IPv6:2a00:1450:4864:20::333]) by sourceware.org (Postfix) with ESMTPS id 068A4384F6DA for ; Mon, 28 Nov 2022 12:05:41 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.1 sourceware.org 068A4384F6DA Received: by mail-wm1-x333.google.com with SMTP id o30so8291563wms.2 for ; Mon, 28 Nov 2022 04:05:40 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=mlSljGS/DXkDWxHZ53FJA3GBeEdYCxkSE+8mqz4sEV8=; b=DD1U0ZfNvSkih3YlBBt0jBhhDpfuZ+YyJknWCcJgUus43RTIKOTu4sJSQ6C1D9zfq8 PouzuqPYbpFTi5EAxgaPvyVTT5edtccB86wuv89X1WX1xV4cGjIY4c0SzyRp1hP8AGIz 1OiScD5JnlgRF9x2FT8q6pbpsmQaSFZj3PMaqn8nWJlRFvhwAxQD9Pa+mQHmcah5zy7O /y4iVE4RaQH+Hfq0HUOErdROBFftGv7801hh/zFVkzb0cS+OkBiTRgTWcZ+tZBGjrkB7 ZLKVHijRNriwsm3xZ19V7uAfprH5IXJVzOZ2mPc2XnxEqBTplnnBMekPzdoQQlSVKrSC mk5A== X-Gm-Message-State: ANoB5plZe/S+NuFKUr5PUNomV+ExPzclw/9y5RAvQZ0FkeMHc1k9bbmv UkgLJTeGtLl/A1SeThQYcRCawg0QdkXfeQ== X-Received: by 2002:a05:600c:5407:b0:3cf:774b:ce5a with SMTP id he7-20020a05600c540700b003cf774bce5amr29013351wmb.0.1669637139605; Mon, 28 Nov 2022 04:05:39 -0800 (PST) Received: from localhost.localdomain (static-176-191-105-132.ftth.abo.bbox.fr. [176.191.105.132]) by smtp.gmail.com with ESMTPSA id w13-20020adfec4d000000b00241dd5de644sm10641622wrn.97.2022.11.28.04.05.38 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 28 Nov 2022 04:05:39 -0800 (PST) To: gcc-patches@gcc.gnu.org Cc: Eric Botcazou Subject: [COMMITTED] ada: Adjust runtime library and User's Guide to PIE default on Linux Date: Mon, 28 Nov 2022 13:05:35 +0100 Message-Id: <20221128120535.171749-1-poulhies@adacore.com> X-Mailer: git-send-email 2.34.1 MIME-Version: 1.0 X-Spam-Status: No, score=-13.5 required=5.0 tests=BAYES_00, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, DKIM_VALID_EF, GIT_PATCH_0, RCVD_IN_DNSWL_NONE, SPF_HELO_NONE, SPF_PASS, TXREP autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org X-BeenThere: gcc-patches@gcc.gnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Gcc-patches mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-Patchwork-Original-From: =?utf-8?q?Marc_Poulhi=C3=A8s_via_Gcc-patches?= From: =?utf-8?q?Marc_Poulhi=C3=A8s?= Reply-To: =?utf-8?q?Marc_Poulhi=C3=A8s?= Errors-To: gcc-patches-bounces+ouuuleilei=gmail.com@gcc.gnu.org Sender: "Gcc-patches" X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1750741618526847235?= X-GMAIL-MSGID: =?utf-8?q?1750741618526847235?= From: Eric Botcazou gcc/ada/ * libgnat/g-traceb.ads: Minor tweaks in the commentary. (Executable_Load_Address): New function. * doc/gnat_ugn/gnat_and_program_execution.rst (Non-Symbolic Traceback): Adjust to PIE default on Linux. (Symbolic Traceback): Likewise. * doc/gnat_ugn/gnat_utility_programs.rst (gnatsymbolize): Likewise. * gnat_ugn.texi: Regenerate. Tested on x86_64-pc-linux-gnu, committed on master. --- .../gnat_ugn/gnat_and_program_execution.rst | 46 ++++++++++------- .../doc/gnat_ugn/gnat_utility_programs.rst | 30 +++++------ gcc/ada/gnat_ugn.texi | 50 ++++++++++++------- gcc/ada/libgnat/g-traceb.ads | 36 +++++++------ 4 files changed, 98 insertions(+), 64 deletions(-) diff --git a/gcc/ada/doc/gnat_ugn/gnat_and_program_execution.rst b/gcc/ada/doc/gnat_ugn/gnat_and_program_execution.rst index c239c363eae..45ecea75416 100644 --- a/gcc/ada/doc/gnat_ugn/gnat_and_program_execution.rst +++ b/gcc/ada/doc/gnat_ugn/gnat_and_program_execution.rst @@ -859,16 +859,18 @@ bug occurs, and then be able to retrieve the sequence of calls with the same program compiled with debug information. However the ``addr2line`` tool does not work with Position-Independent Code -(PIC), the historical example being Windows DLLs, which nowadays encompasses -Position-Independent Executables (PIE) on recent Windows versions. - -In order to translate addresses into the source lines with Position-Independent -Executables on recent Windows versions, in other words without using the switch -:switch:`-no-pie` during linking, you need to use the ``gnatsymbolize`` tool -with :switch:`--load` instead of the ``addr2line`` tool. The main difference -is that you need to copy the Load Address output in the traceback ahead of the -sequence of addresses. And the default mode of ``gnatsymbolize`` is equivalent -to that of ``addr2line`` with the above switches, so none of them is needed:: +(PIC), the historical example being Linux dynamic libraries and Windows DLLs, +which nowadays encompasse Position-Independent Executables (PIE) on recent +Linux and Windows versions. + +In order to translate addresses the source lines with Position-Independent +Executables on recent Linux and Windows versions, in other words without +using the switch :switch:`-no-pie` during linking, you need to use the +``gnatsymbolize`` tool with :switch:`--load` instead of the ``addr2line`` +tool. The main difference is that you need to copy the Load Address output +in the traceback ahead of the sequence of addresses. And the default mode +of ``gnatsymbolize`` is equivalent to that of ``addr2line`` with the above +switches, so none of them is needed:: $ gnatmake stb -g -bargs -E $ stb @@ -879,7 +881,7 @@ to that of ``addr2line`` with the above switches, so none of them is needed:: Call stack traceback locations: 0x401373 0x40138b 0x40139c 0x401335 0x4011c4 0x4011f1 0x77e892a4 - $ gnatsymbolize --load stb 0x400000 0x401373 0x40138b 0x40139c 0x401335 + $ gnatsymbolize --load stb 0x400000 0x401373 0x40138b 0x40139c 0x401335 \ 0x4011c4 0x4011f1 0x77e892a4 0x00401373 Stb.P1 at stb.adb:5 @@ -957,12 +959,17 @@ addresses to strings: with Ada.Text_IO; with GNAT.Traceback; with GNAT.Debug_Utilities; + with System; procedure STB is use Ada; + use Ada.Text_IO; use GNAT; use GNAT.Traceback; + use System; + + LA : constant Address := Executable_Load_Address; procedure P1 is TB : Tracebacks_Array (1 .. 10); @@ -972,14 +979,14 @@ addresses to strings: begin Call_Chain (TB, Len); - Text_IO.Put ("In STB.P1 : "); + Put ("In STB.P1 : "); for K in 1 .. Len loop - Text_IO.Put (Debug_Utilities.Image (TB (K))); - Text_IO.Put (' '); + Put (Debug_Utilities.Image_C (TB (K))); + Put (' '); end loop; - Text_IO.New_Line; + New_Line; end P1; procedure P2 is @@ -988,6 +995,10 @@ addresses to strings: end P2; begin + if LA /= Null_Address then + Put_Line ("Load address: " & Debug_Utilities.Image_C (LA)); + end if; + P2; end STB; @@ -996,8 +1007,9 @@ addresses to strings: $ gnatmake stb -g $ stb - In STB.P1 : 16#0040_F1E4# 16#0040_14F2# 16#0040_170B# 16#0040_171C# - 16#0040_1461# 16#0040_11C4# 16#0040_11F1# 16#77E8_92A4# + Load address: 0x400000 + In STB.P1 : 0x40F1E4 0x4014F2 0x40170B 0x40171C 0x401461 0x4011C4 \ + 0x4011F1 0x77E892A4 You can then get further information by invoking the ``addr2line`` tool or diff --git a/gcc/ada/doc/gnat_ugn/gnat_utility_programs.rst b/gcc/ada/doc/gnat_ugn/gnat_utility_programs.rst index 17d3e0d0cca..f2d42e96bd4 100644 --- a/gcc/ada/doc/gnat_ugn/gnat_utility_programs.rst +++ b/gcc/ada/doc/gnat_ugn/gnat_utility_programs.rst @@ -2187,30 +2187,32 @@ building specialized scripts. This program, when built and run, prints a list of addresses which correspond to the traceback when inside function ``Call_Me_Third``. - For instance, on x86_64 GNU/Linux: + For instance, on x86-64 GNU/Linux: :: $ gnatmake -g -q foo.adb $ ./foo - 0x0000000000402561 - 0x00000000004025EF - 0x00000000004025FB - 0x0000000000402611 - 0x00000000004024C7 + Load address: 0x00005586C9D7D000 + 0x00005586C9D81105 + 0x00005586C9D8119B + 0x00005586C9D811A7 + 0x00005586C9D8128C + 0x00005586C9D81069 ``gnatsymbolize`` can be used to translate those addresses into code locations as follow: :: - $ gnatsymbolize foo 0x0000000000402561 0x00000000004025EF \ - 0x00000000004025FB 0x0000000000402611 0x00000000004024C7 - Pck.Call_Me_Third at pck.adb:12 - Pck.Call_Me_Second at pck.adb:20 - Pck.Call_Me_First at pck.adb:25 - Foo at foo.adb:6 - Main at b~foo.adb:184 + $ gnatsymbolize --load foo 0x00005586C9D7D000 0x00005586C9D81105 \ + 0x00005586C9D8119B 0x00005586C9D811A7 0x00005586C9D8128C \ + 0x00005586C9D81069 + 0x5586c9d81105 Pck.Call_Me_Third at pck.adb:12 + 0x5586c9d8119b Pck.Call_Me_Second at pck.adb:20 + 0x5586c9d811a7 Pck.Call_Me_First at pck.adb:25 + 0x5586c9d8128c Foo at foo.adb:6 + 0x5586c9d81069 Main at b~foo.adb:199 Switches for ``gnatsymbolize`` ------------------------------ @@ -2243,7 +2245,7 @@ building specialized scripts. :switch:`--load` Interpret the first address as the load address of the executable. - This is needed for position-independent executables on Windows. + This is needed for position-independent executables on Linux and Windows. Requirements for Correct Operation ---------------------------------- diff --git a/gcc/ada/gnat_ugn.texi b/gcc/ada/gnat_ugn.texi index f268be01ad1..5224a1201b8 100644 --- a/gcc/ada/gnat_ugn.texi +++ b/gcc/ada/gnat_ugn.texi @@ -19,7 +19,7 @@ @copying @quotation -GNAT User's Guide for Native Platforms , Nov 18, 2022 +GNAT User's Guide for Native Platforms , Nov 28, 2022 AdaCore @@ -11100,7 +11100,7 @@ of the pragma @code{Restriction_Warnings}. `[warning-as-error]' Used to tag warning messages that have been converted to error messages by use of the pragma Warning_As_Error. Note that such warnings are prefixed by -the string “error: “ rather than “warning: “. +the string “error: ” rather than “warning: “. @item `[enabled by default]' @@ -19128,16 +19128,18 @@ bug occurs, and then be able to retrieve the sequence of calls with the same program compiled with debug information. However the @code{addr2line} tool does not work with Position-Independent Code -(PIC), the historical example being Windows DLLs, which nowadays encompasses -Position-Independent Executables (PIE) on recent Windows versions. +(PIC), the historical example being Linux dynamic libraries and Windows DLLs, +which nowadays encompasse Position-Independent Executables (PIE) on recent +Linux and Windows versions. -In order to translate addresses into the source lines with Position-Independent -Executables on recent Windows versions, in other words without using the switch -@code{-no-pie} during linking, you need to use the @code{gnatsymbolize} tool -with @code{--load} instead of the @code{addr2line} tool. The main difference -is that you need to copy the Load Address output in the traceback ahead of the -sequence of addresses. And the default mode of @code{gnatsymbolize} is equivalent -to that of @code{addr2line} with the above switches, so none of them is needed: +In order to translate addresses the source lines with Position-Independent +Executables on recent Linux and Windows versions, in other words without +using the switch @code{-no-pie} during linking, you need to use the +@code{gnatsymbolize} tool with @code{--load} instead of the @code{addr2line} +tool. The main difference is that you need to copy the Load Address output +in the traceback ahead of the sequence of addresses. And the default mode +of @code{gnatsymbolize} is equivalent to that of @code{addr2line} with the above +switches, so none of them is needed: @example $ gnatmake stb -g -bargs -E @@ -19149,7 +19151,7 @@ Load address: 0x400000 Call stack traceback locations: 0x401373 0x40138b 0x40139c 0x401335 0x4011c4 0x4011f1 0x77e892a4 -$ gnatsymbolize --load stb 0x400000 0x401373 0x40138b 0x40139c 0x401335 +$ gnatsymbolize --load stb 0x400000 0x401373 0x40138b 0x40139c 0x401335 \ 0x4011c4 0x4011f1 0x77e892a4 0x00401373 Stb.P1 at stb.adb:5 @@ -19234,12 +19236,17 @@ addresses to strings: with Ada.Text_IO; with GNAT.Traceback; with GNAT.Debug_Utilities; +with System; procedure STB is use Ada; + use Ada.Text_IO; use GNAT; use GNAT.Traceback; + use System; + + LA : constant Address := Executable_Load_Address; procedure P1 is TB : Tracebacks_Array (1 .. 10); @@ -19249,14 +19256,14 @@ procedure STB is begin Call_Chain (TB, Len); - Text_IO.Put ("In STB.P1 : "); + Put ("In STB.P1 : "); for K in 1 .. Len loop - Text_IO.Put (Debug_Utilities.Image (TB (K))); - Text_IO.Put (' '); + Put (Debug_Utilities.Image_C (TB (K))); + Put (' '); end loop; - Text_IO.New_Line; + New_Line; end P1; procedure P2 is @@ -19265,6 +19272,10 @@ procedure STB is end P2; begin + if LA /= Null_Address then + Put_Line ("Load address: " & Debug_Utilities.Image_C (LA)); + end if; + P2; end STB; @end example @@ -19273,8 +19284,9 @@ end STB; $ gnatmake stb -g $ stb -In STB.P1 : 16#0040_F1E4# 16#0040_14F2# 16#0040_170B# 16#0040_171C# -16#0040_1461# 16#0040_11C4# 16#0040_11F1# 16#77E8_92A4# +Load address: 0x400000 +In STB.P1 : 0x40F1E4 0x4014F2 0x40170B 0x40171C 0x401461 0x4011C4 \ + 0x4011F1 0x77E892A4 @end example @end quotation @@ -29386,8 +29398,8 @@ to permit their use in free software. @printindex ge -@anchor{cf}@w{ } @anchor{gnat_ugn/gnat_utility_programs switches-related-to-project-files}@w{ } +@anchor{cf}@w{ } @c %**end of body @bye diff --git a/gcc/ada/libgnat/g-traceb.ads b/gcc/ada/libgnat/g-traceb.ads index 074b7a6b191..163201c5bef 100644 --- a/gcc/ada/libgnat/g-traceb.ads +++ b/gcc/ada/libgnat/g-traceb.ads @@ -38,38 +38,36 @@ -- The traceback information is in the form of absolute code locations. -- These code locations may be converted to corresponding source locations --- using the external addr2line utility, or from within GDB. +-- using the addr2line or gnatsymbolize utilities, or from within GDB. -- In order to use this facility, in some cases the binder must be invoked -- with -E switch (store the backtrace with exception occurrence). Please -- refer to gnatbind documentation for more information. --- To analyze the code locations later using addr2line or gdb, the necessary --- units must be compiled with the debugging switch -g in the usual manner. --- Note that it is not necessary to compile with -g to use Call_Chain. In --- other words, the following sequence of steps can be used: +-- To analyze the code locations later using addr2line, gnatsymbolize or GDB, +-- the necessary units must be compiled with the debugging switch -g in the +-- usual manner. Note that it is not necessary to compile with -g to use +-- Call_Chain. In other words, the following sequence of steps can be used: -- Compile without -g -- Run the program, and call Call_Chain -- Recompile with -g --- Use addr2line to interpret the absolute call locations (note that --- addr2line expects addresses in hexadecimal format). +-- Use addr2line or gnatsymbolize to interpret the absolute call locations +-- (note that addr2line expects addresses in hexadecimal format). -- This capability is currently supported on the following targets: --- AiX PowerPC +-- AIX PowerPC -- GNU/Linux x86 -- GNU/Linux PowerPC -- LynxOS x86 --- LynxOS 178 xcoff PowerPC --- LynxOS 178 elf PowerPC +-- LynxOS-178 PowerPC -- Solaris x86 --- Solaris sparc +-- Solaris SPARC -- VxWorks ARM --- VxWorks7 ARM -- VxWorks PowerPC -- VxWorks x86 --- Windows XP +-- Windows -- Note: see also GNAT.Traceback.Symbolic, a child unit in file g-trasym.ads -- providing symbolic trace back capability for a subset of the above targets. @@ -101,11 +99,21 @@ package GNAT.Traceback is function Call_Chain (Max_Len : Positive; Skip_Frames : Natural := 1) return Tracebacks_Array; - -- Returns up to Max_Len tracebacks corresponding to the current call + -- Return up to Max_Len tracebacks corresponding to the current call -- chain. Result array order is the same as in above procedure Call_Chain -- except that Skip_Frames says how many of the most recent calls should be -- excluded from the result, starting with this procedure itself: 1 means -- exclude the frame for this procedure, 2 means 1 + exclude the frame for -- this procedure's caller, ... + function Executable_Load_Address return System.Address; + pragma Import (C, + Executable_Load_Address, + "__gnat_get_executable_load_address"); + -- Return the load address of the executable or System.Null_Address if the + -- executable has been loaded at the address computed by the static linker. + -- This address is needed to interpret the absolute call locations given by + -- the subprograms of this unit when Position-Independent Executables (PIE) + -- are used on recent GNU/Linux and Windows versions. + end GNAT.Traceback;