Rebase executable to match relocated base address
authorHannes Domani <ssbssa@yahoo.de>
Wed, 12 Feb 2020 16:53:32 +0000 (17:53 +0100)
committerHannes Domani <ssbssa@yahoo.de>
Tue, 3 Mar 2020 17:41:59 +0000 (18:41 +0100)
commit584cf46d0ab5960cca76bfaf414cee5641166868
tree238d93e7302f94acc16b119f34eee3d0c81c3438
parentb8ba13856360d1cae00269a0ffe291cf573bb575
Rebase executable to match relocated base address

Windows executables linked with -dynamicbase get a new base address
when loaded, which makes debugging impossible if the executable isn't
also rebased in gdb.

The new base address is read from the Process Environment Block.

gdb/ChangeLog:

2020-03-03  Hannes Domani  <ssbssa@yahoo.de>

* windows-tdep.c (windows_solib_create_inferior_hook): New function.
(windows_init_abi): Set and use windows_so_ops.
gdb/ChangeLog
gdb/windows-tdep.c