[fa.info-vax] Images revisited

info-vax@ucbvax.ARPA (12/15/84)

From: *Hobbit* <AWalker@RUTGERS.ARPA>

Eventually and with a little help we found the answer to the image problem.
The image activator checks the version of your VMSRTL.EXE and matches that
against the global symbol descriptor of VMSRTL_001 in your image in 
question.  If the version of the image GSD is LEQ the version of your library,
it allows the program to run.  Otherwise it complains.

The initial thought was to fix the match flag bits in the image VMSRTL GSD,
but that didn't work.  Munging the version of that GSD to be equal or less
than that of your runtime library is the right thing to do.  I didn't try
simply zeroing it; in other words didn't get to the point of needing
a bigger hammer.  The code is relatively easy; set up your RABs to read
a fixed 512 byte record, $get it, mung the bits, and $update it back out.

Now, another question:  Is there a utility that will allow me to play with
image headers in a more human fashion?  Patch apparently only deals with the
code and can't look at a file as binary data.

_H*
-------