This is the mail archive of the gdb-patches@sourceware.org mailing list for the GDB project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

Re: [PATCH v3] Rebase executable to match relocated base address


 Am Dienstag, 3. März 2020, 17:58:22 MEZ hat Simon Marchi <simark@simark.ca> Folgendes geschrieben:

> On 2020-03-03 11:22 a.m., Hannes Domani via gdb-patches wrote:
>
> > Windows executables linked with -dynamicbase get a new base address
> > when loaded, which makes debugging impossible if the executable isn't
> > also rebased in gdb.
> >
> > The new base address is read from the Process Environment Block.
> >
> > gdb/ChangeLog:
> >
> > 2020-03-03  Hannes Domani  <ssbssa@yahoo.de>
> >
> >     * windows-tdep.c (windows_solib_create_inferior_hook): New function.
> >     (windows_init_abi): Set and use windows_so_ops.
> > ---
> > v2:
> > This version now no longer needs the fake auxv entry.
> >
> > v3:
> > - Use of explicit comparison operators.
> > - Use copy of solib_target_so_ops.
>
> Thanks, that version LGTM.

Pushed, thanks.


Regards
Hannes Domani


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]