[PATCH v3] Rebase executable to match relocated base address
Simon Marchi
simark@simark.ca
Tue Mar 3 16:58:00 GMT 2020
On 2020-03-03 11:22 a.m., Hannes Domani via gdb-patches wrote:
> Windows executables linked with -dynamicbase get a new base address
> when loaded, which makes debugging impossible if the executable isn't
> also rebased in gdb.
>
> The new base address is read from the Process Environment Block.
>
> gdb/ChangeLog:
>
> 2020-03-03 Hannes Domani <ssbssa@yahoo.de>
>
> * windows-tdep.c (windows_solib_create_inferior_hook): New function.
> (windows_init_abi): Set and use windows_so_ops.
> ---
> v2:
> This version now no longer needs the fake auxv entry.
>
> v3:
> - Use of explicit comparison operators.
> - Use copy of solib_target_so_ops.
Thanks, that version LGTM.
Simon
More information about the Gdb-patches
mailing list