From e687a07f2e463472ad4609371f7b914b5de649a6 Mon Sep 17 00:00:00 2001
From: Alexander Gavrilov
dfhack.internal.getVTable(name)
Returns the pre-extracted vtable address name, or nil.
dfhack.internal.getBase()
-Returns the base address of the process.
+dfhack.internal.getRebaseDelta()
+Returns the ASLR rebase offset of the DF executable.
dfhack.internal.getMemRanges()
Returns a sequence of tables describing virtual memory ranges of the process.
diff --git a/library/LuaApi.cpp b/library/LuaApi.cpp index 3693070d0..092404e33 100644 --- a/library/LuaApi.cpp +++ b/library/LuaApi.cpp @@ -1036,7 +1036,7 @@ static void *checkaddr(lua_State *L, int idx, bool allow_null = false) return rv; } -static uint32_t getRebaseDelta() { return Core::getInstance().vinfo->getRebaseDelta(); } +static int getRebaseDelta() { return Core::getInstance().vinfo->getRebaseDelta(); } static const LuaWrapper::FunctionReg dfhack_internal_module[] = { WRAP(getRebaseDelta),