diff options
author | Corinna Vinschen <corinna@vinschen.de> | 2016-07-02 12:36:05 +0200 |
---|---|---|
committer | Corinna Vinschen <corinna@vinschen.de> | 2016-07-02 12:36:05 +0200 |
commit | 85db21730beb3bb40723fa9b9f2dea5016fc4b4c (patch) | |
tree | 25b0062d4afb921d067e3459ad5cb40747df84dd /newlib/doc/makedocbook.py | |
parent | 9f54ceadae4336b83a724bd3370c0c2dcd00b935 (diff) | |
download | cygnal-85db21730beb3bb40723fa9b9f2dea5016fc4b4c.tar.gz cygnal-85db21730beb3bb40723fa9b9f2dea5016fc4b4c.tar.bz2 cygnal-85db21730beb3bb40723fa9b9f2dea5016fc4b4c.zip |
ldd: Handle executable relocation when setting breakpoint
set_entry_point_break() uses GetModuleInformation to fetch the
address of the exe's entry point. However, just as with
lpStartAddress from the CREATE_PROCESS_DEBUG_EVENT event, the
returned address is only computed from the PE file header. It's
not actually the entry point in memory, if the executable is
relocated (ASLR). See
https://msdn.microsoft.com/en-us/library/windows/desktop/ms684229(v=vs.85).aspx
Convert this to using the info from CREATE_PROCESS_DEBUG_EVENT
combined with the offset from the PE file header's AddressOfEntryPoint
to deal with relocation.
Signed-off-by: Corinna Vinschen <corinna@vinschen.de>
Diffstat (limited to 'newlib/doc/makedocbook.py')
0 files changed, 0 insertions, 0 deletions