This is the mail archive of the
gdb-patches@sourceware.org
mailing list for the GDB project.
Re: [PATCH v3] Rebase executable to match relocated base address
- From: Simon Marchi <simark at simark dot ca>
- To: Hannes Domani <ssbssa at yahoo dot de>, gdb-patches at sourceware dot org
- Date: Tue, 3 Mar 2020 11:58:19 -0500
- Subject: Re: [PATCH v3] Rebase executable to match relocated base address
- References: <20200303162207.17473-1-ssbssa.ref@yahoo.de> <20200303162207.17473-1-ssbssa@yahoo.de>
On 2020-03-03 11:22 a.m., Hannes Domani via gdb-patches wrote:
> Windows executables linked with -dynamicbase get a new base address
> when loaded, which makes debugging impossible if the executable isn't
> also rebased in gdb.
>
> The new base address is read from the Process Environment Block.
>
> gdb/ChangeLog:
>
> 2020-03-03 Hannes Domani <ssbssa@yahoo.de>
>
> * windows-tdep.c (windows_solib_create_inferior_hook): New function.
> (windows_init_abi): Set and use windows_so_ops.
> ---
> v2:
> This version now no longer needs the fake auxv entry.
>
> v3:
> - Use of explicit comparison operators.
> - Use copy of solib_target_so_ops.
Thanks, that version LGTM.
Simon