[PATCH v3] Rebase executable to match relocated base address

Simon Marchi simark@simark.ca
Tue Mar 3 16:58:00 GMT 2020


On 2020-03-03 11:22 a.m., Hannes Domani via gdb-patches wrote:
> Windows executables linked with -dynamicbase get a new base address
> when loaded, which makes debugging impossible if the executable isn't
> also rebased in gdb.
> 
> The new base address is read from the Process Environment Block.
> 
> gdb/ChangeLog:
> 
> 2020-03-03  Hannes Domani  <ssbssa@yahoo.de>
> 
> 	* windows-tdep.c (windows_solib_create_inferior_hook): New function.
> 	(windows_init_abi): Set and use windows_so_ops.
> ---
> v2:
> This version now no longer needs the fake auxv entry.
> 
> v3:
> - Use of explicit comparison operators.
> - Use copy of solib_target_so_ops.
Thanks, that version LGTM.

Simon



More information about the Gdb-patches mailing list