| commit | 584cf46d0ab5960cca76bfaf414cee5641166868 | [log] [tgz] |
|---|---|---|
| author | Hannes Domani <ssbssa@yahoo.de> | Wed Feb 12 17:53:32 2020 +0100 |
| committer | Hannes Domani <ssbssa@yahoo.de> | Tue Mar 03 18:41:59 2020 +0100 |
| tree | 238d93e7302f94acc16b119f34eee3d0c81c3438 | |
| parent | b8ba13856360d1cae00269a0ffe291cf573bb575 [diff] |
Rebase executable to match relocated base address Windows executables linked with -dynamicbase get a new base address when loaded, which makes debugging impossible if the executable isn't also rebased in gdb. The new base address is read from the Process Environment Block. gdb/ChangeLog: 2020-03-03 Hannes Domani <ssbssa@yahoo.de> * windows-tdep.c (windows_solib_create_inferior_hook): New function. (windows_init_abi): Set and use windows_so_ops.