diff options
author | Joel Brobecker <brobecker@adacore.com> | 2014-02-24 15:21:13 -0800 |
---|---|---|
committer | Joel Brobecker <brobecker@adacore.com> | 2014-02-26 12:03:52 -0800 |
commit | 850a0f76c25f74c4f3f86b079893e26ae2d52a9a (patch) | |
tree | 91ce04158d37350207722fbc47e398a0cf00a889 /elfcpp/sparc.h | |
parent | f25b3fc33406d83293679955ac9fba088cd5ac5c (diff) | |
download | binutils-850a0f76c25f74c4f3f86b079893e26ae2d52a9a.zip binutils-850a0f76c25f74c4f3f86b079893e26ae2d52a9a.tar.gz binutils-850a0f76c25f74c4f3f86b079893e26ae2d52a9a.tar.bz2 |
windows: Factorize handling of DLL load address offset
This patch is a small cleanup that moves the magic 0x1000 offset
to apply to a DLL's base address inside the win32_add_one_solib
function, rather than delegate that reponsibility to its callers.
gdb/gdbserver/ChangeLog:
* win32-low.c (win32_add_one_solib): Add 0x1000 to load_addr.
Add comment.
(win32_add_all_dlls): Remove 0x1000 offset applied to DLL
base address when calling win32_add_one_solib.
(handle_load_dll): Delete local variable load_addr.
Remove 0x1000 offset applied to DLL base address when calling
win32_add_one_solib.
(handle_unload_dll): Add comment.
Diffstat (limited to 'elfcpp/sparc.h')
0 files changed, 0 insertions, 0 deletions