From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 47312 invoked by alias); 3 Mar 2020 16:58:23 -0000 Mailing-List: contact gdb-patches-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: gdb-patches-owner@sourceware.org Received: (qmail 47304 invoked by uid 89); 3 Mar 2020 16:58:23 -0000 Authentication-Results: sourceware.org; auth=none X-Spam-SWARE-Status: No, score=-7.7 required=5.0 tests=AWL,BAYES_00,GIT_PATCH_2,SPF_HELO_PASS,SPF_PASS autolearn=ham version=3.3.1 spammy=HX-Languages-Length:741 X-HELO: simark.ca Received: from simark.ca (HELO simark.ca) (158.69.221.121) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with ESMTP; Tue, 03 Mar 2020 16:58:21 +0000 Received: from [172.16.0.95] (192-222-181-218.qc.cable.ebox.net [192.222.181.218]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by simark.ca (Postfix) with ESMTPSA id 3EAEE1E4B2; Tue, 3 Mar 2020 11:58:20 -0500 (EST) Subject: Re: [PATCH v3] Rebase executable to match relocated base address To: Hannes Domani , gdb-patches@sourceware.org References: <20200303162207.17473-1-ssbssa.ref@yahoo.de> <20200303162207.17473-1-ssbssa@yahoo.de> From: Simon Marchi Message-ID: Date: Tue, 03 Mar 2020 16:58:00 -0000 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.4.1 MIME-Version: 1.0 In-Reply-To: <20200303162207.17473-1-ssbssa@yahoo.de> Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-SW-Source: 2020-03/txt/msg00060.txt On 2020-03-03 11:22 a.m., Hannes Domani via gdb-patches wrote: > Windows executables linked with -dynamicbase get a new base address > when loaded, which makes debugging impossible if the executable isn't > also rebased in gdb. > > The new base address is read from the Process Environment Block. > > gdb/ChangeLog: > > 2020-03-03 Hannes Domani > > * windows-tdep.c (windows_solib_create_inferior_hook): New function. > (windows_init_abi): Set and use windows_so_ops. > --- > v2: > This version now no longer needs the fake auxv entry. > > v3: > - Use of explicit comparison operators. > - Use copy of solib_target_so_ops. Thanks, that version LGTM. Simon