Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
W
wine-winehq
Project
Project
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Registry
Registry
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
wine
wine-winehq
Commits
085d3983
Commit
085d3983
authored
Oct 20, 2010
by
Alexandre Julliard
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
ntdll: Avoid using the CONTEXT86 type.
parent
303079f1
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
with
4 additions
and
4 deletions
+4
-4
relay.c
dlls/ntdll/relay.c
+3
-3
signal_i386.c
dlls/ntdll/signal_i386.c
+1
-1
No files found.
dlls/ntdll/relay.c
View file @
085d3983
...
...
@@ -444,7 +444,7 @@ static LONGLONG WINAPI relay_call( struct relay_descr *descr, unsigned int idx,
#ifdef __i386__
void
WINAPI
__regs_relay_call_regs
(
struct
relay_descr
*
descr
,
unsigned
int
idx
,
unsigned
int
orig_eax
,
unsigned
int
ret_addr
,
CONTEXT
86
*
context
)
CONTEXT
*
context
)
{
WORD
ordinal
=
LOWORD
(
idx
);
BYTE
nb_args
=
LOBYTE
(
HIWORD
(
idx
));
...
...
@@ -922,7 +922,7 @@ static void SNOOP_PrintArg(DWORD x)
#define CALLER1REF (*(DWORD*)context->Esp)
void
WINAPI
__regs_SNOOP_Entry
(
CONTEXT
86
*
context
)
void
WINAPI
__regs_SNOOP_Entry
(
CONTEXT
*
context
)
{
DWORD
ordinal
=
0
,
entry
=
context
->
Eip
-
5
;
SNOOP_DLL
*
dll
=
firstdll
;
...
...
@@ -1015,7 +1015,7 @@ void WINAPI __regs_SNOOP_Entry( CONTEXT86 *context )
}
void
WINAPI
__regs_SNOOP_Return
(
CONTEXT
86
*
context
)
void
WINAPI
__regs_SNOOP_Return
(
CONTEXT
*
context
)
{
SNOOP_RETURNENTRY
*
ret
=
(
SNOOP_RETURNENTRY
*
)(
context
->
Eip
-
5
);
SNOOP_FUN
*
fun
=
&
ret
->
dll
->
funs
[
ret
->
ordinal
];
...
...
dlls/ntdll/signal_i386.c
View file @
085d3983
...
...
@@ -1428,7 +1428,7 @@ NTSTATUS context_from_server( CONTEXT *to, const context_t *from )
* Check if the fault location is a privileged instruction.
* Based on the instruction emulation code in dlls/kernel/instr.c.
*/
static
inline
DWORD
is_privileged_instr
(
CONTEXT
86
*
context
)
static
inline
DWORD
is_privileged_instr
(
CONTEXT
*
context
)
{
const
BYTE
*
instr
;
unsigned
int
prefix_count
=
0
;
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment