windows: Factorize handling of DLL load address offset
authorJoel Brobecker <brobecker@adacore.com>
Mon, 24 Feb 2014 23:21:13 +0000 (15:21 -0800)
committerJoel Brobecker <brobecker@adacore.com>
Wed, 26 Feb 2014 20:03:52 +0000 (12:03 -0800)
commit850a0f76c25f74c4f3f86b079893e26ae2d52a9a
tree91ce04158d37350207722fbc47e398a0cf00a889
parentf25b3fc33406d83293679955ac9fba088cd5ac5c
windows: Factorize handling of DLL load address offset

This patch is a small cleanup that moves the magic 0x1000 offset
to apply to a DLL's base address inside the win32_add_one_solib
function, rather than delegate that reponsibility to its callers.

gdb/gdbserver/ChangeLog:

* win32-low.c (win32_add_one_solib): Add 0x1000 to load_addr.
Add comment.
(win32_add_all_dlls): Remove 0x1000 offset applied to DLL
base address when calling win32_add_one_solib.
(handle_load_dll): Delete local variable load_addr.
Remove 0x1000 offset applied to DLL base address when calling
win32_add_one_solib.
(handle_unload_dll): Add comment.
gdb/gdbserver/ChangeLog
gdb/gdbserver/win32-low.c