25:
440:
175:
system or in some systems, by synchronizing a branch with the originating branch by merging all new changes in the latter to the former. For example,
404:
429:
260:
229:
197:(DST) rebasing tool TZMOVE.EXE uses to recalculate and reschedule appointment dates that are affected by DST.
461:
287:
251:. The Morgan Kaufmann Series in Software Engineering and Programming (1 ed.). San Francisco, USA:
95:
212:
187:
78:
is the process of modifying data based on one reference to another. It can be one of the following:
297:
274:
148:
43:
301:
207:
144:
395:
373:
354:
334:
319:
102:
363:
344:
194:
168:
151:
117:
68:
8:
385:
217:
39:
67:
This article is about computing activities. For the use of a new base for the CPI, see
408:
289:
425:
266:
256:
191:
223:
172:
128:
421:
252:
140:
242:
176:
91:
87:
455:
444:
390:
368:
349:
47:
270:
381:
386:"An In-Depth Look into the Win32 Portable Executable File Format, Part 2"
183:
do this (but Darcs extends the concept and calls it "patch commutation").
164:
108:(DCSS) were an early example of this technique, though not called
139:
byte into all code pointers; This eliminates a certain class of
116:
platforms to avoid the overhead of address relocation of system
329:
314:
246:
180:
124:
113:
292:
16:
Process of modifying data based on one reference to another
131:
use rebasing to force the use of code addresses below
143:security problems related to improper checking of
34:may lack focus or may be about more than one topic
90:image in such a way that it is guaranteed to use
453:
441:"Dynamic Linking in Linux and Windows, part two"
38:Please help improve this article, possibly by
439:Thomas, Reji; Reddy, Bhasker (2006-08-14).
438:
327:
312:
112:. The technique is used extensively on
415:
380:
342:
454:
405:"Rebasing Win32 DLLs: The Whole Story"
361:
241:
86:Rebasing is the process of creating a
402:
345:"Improving Application Startup Time"
296:
42:the article and/or by introducing a
18:
94:without conflicting with any other
81:
13:
364:"The Performance Benefits of NGen"
343:Caldato, Claudio (February 2006).
313:Riemersma, Thiadmer (2000-12-01).
235:
14:
473:
418:Debugging applications: Microsoft
302:"How did Windows 95 rebase DLLs?"
420:. Microsoft programming series.
403:Asche, Rüdiger R. (1995-09-18).
23:
277:from the original on 2012-12-05
46:, or discuss this issue on the
163:Rebasing is the act of moving
1:
230:Dynamic dead code elimination
157:
123:Some security extensions to
106:discontinuous saved segments
7:
362:Biswas, Surupa (May 2006).
201:
10:
478:
66:
328:Mark Baker (2004-03-25).
213:Position-independent code
98:loadable in the system.
135:in order to introduce a
186:The mechanism that the
145:null-terminated strings
416:Robbins, John (2000).
330:"Optimizing DLL Loads"
208:Relocation (computing)
396:Microsoft Corporation
374:Microsoft Corporation
355:Microsoft Corporation
315:"Rebasing Win32 DLLs"
195:daylight saving time
152:programming language
69:consumer price index
248:Linkers and Loaders
218:Portable Executable
44:disambiguation page
462:Computer libraries
424:. pp. 34–36.
335:Dr. Dobb's Journal
320:Dr. Dobb's Journal
188:Microsoft Exchange
431:978-0-7356-0886-3
306:The Old New Thing
65:
64:
469:
448:
435:
412:
407:. Archived from
399:
377:
358:
339:
324:
309:
285:
283:
282:
224:High memory area
173:revision control
147:, common in the
138:
134:
120:by the loader.
96:shared libraries
82:Shared libraries
60:
57:
51:
27:
26:
19:
477:
476:
472:
471:
470:
468:
467:
466:
452:
451:
432:
422:Microsoft Press
280:
278:
263:
255:. p. 218.
253:Morgan Kaufmann
243:Levine, John R.
238:
236:Further reading
204:
167:to a different
160:
141:buffer overflow
136:
132:
84:
72:
61:
55:
52:
37:
28:
24:
17:
12:
11:
5:
475:
465:
464:
450:
449:
436:
430:
413:
411:on 2011-07-07.
400:
384:(March 2002).
378:
359:
340:
325:
310:
300:(2004-12-17).
294:
261:
237:
234:
233:
232:
227:
221:
215:
210:
203:
200:
199:
198:
184:
159:
156:
92:virtual memory
88:shared library
83:
80:
74:In computing,
63:
62:
56:September 2016
31:
29:
22:
15:
9:
6:
4:
3:
2:
474:
463:
460:
459:
457:
446:
445:Symantec Corp
442:
437:
433:
427:
423:
419:
414:
410:
406:
401:
397:
393:
392:
391:MSDN Magazine
387:
383:
382:Pietrek, Matt
379:
375:
371:
370:
369:MSDN Magazine
365:
360:
356:
352:
351:
350:MSDN Magazine
346:
341:
337:
336:
331:
326:
322:
321:
316:
311:
307:
303:
299:
298:Chen, Raymond
295:
293:
290:
288:
276:
272:
268:
264:
262:1-55860-496-0
258:
254:
250:
249:
244:
240:
239:
231:
228:
225:
222:
219:
216:
214:
211:
209:
206:
205:
196:
193:
189:
185:
182:
178:
174:
171:when using a
170:
166:
162:
161:
155:
153:
150:
146:
142:
130:
126:
121:
119:
115:
111:
107:
104:
99:
97:
93:
89:
79:
77:
70:
59:
49:
45:
41:
35:
32:This article
30:
21:
20:
417:
409:the original
389:
367:
348:
333:
318:
305:
279:. Retrieved
247:
122:
109:
105:
100:
85:
75:
73:
53:
33:
281:2020-01-12
165:changesets
158:Other uses
133:0x00ffffff
245:(2000) .
48:talk page
40:splitting
456:Category
291:Errata:
275:Archived
271:42413382
202:See also
110:rebasing
76:rebasing
192:Outlook
428:
286:Code:
269:
259:
169:branch
103:VM/370
226:(HMA)
181:Darcs
125:Linux
114:Win32
426:ISBN
267:OCLC
257:ISBN
220:(PE)
179:and
137:0x00
118:DLLs
101:IBM
190:or
177:Git
129:x86
458::
443:.
394:.
388:.
372:.
366:.
353:.
347:.
332:.
317:.
304:.
273:.
265:.
154:.
447:.
434:.
398:.
376:.
357:.
338:.
323:.
308:.
284:.
149:C
127:/
71:.
58:)
54:(
50:.
36:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.