From: David W. <we...@cw...> - 2002-06-29 10:28:05
|
On Sat, Jun 29, 2002 at 02:06:01AM +0200, Casper Hornstrup wrote: > While trying to make the loader understand .stabs sections, I face a > problem with non-standard PE image sections. > > The problem is that when the .stabs image section is read from, an > access violation occur. The image section has PAGE_READONLY (0x2) as > protection so what else can give this access violation? > The loader doesn't load NOLOAD sections so your code wouldn't be able to find stabs/stabstr sections in the mapping of images, it will need to look in the original executable. I think it would be better to seperate the debugging sections of the unstripped executables into another file as NT does to save space. Additionally wouldn't it be easier to do the interpretation of the debugging information in the debugger - either pice/kdb for in-kernel debugging or gdb for debugging over a serial line. |