[Dosemu-cvs] SF.net SVN: dosemu:[1887] branches/debugger/src/arch/linux/debugger/mhpdbg. c
Brought to you by:
bartoldeman
From: <sbr...@us...> - 2009-04-21 21:55:16
|
Revision: 1887 http://dosemu.svn.sourceforge.net/dosemu/?rev=1887&view=rev Author: sbronson Date: 2009-04-21 21:55:11 +0000 (Tue, 21 Apr 2009) Log Message: ----------- Remove "integer to pointer without cast" warning where I set bpload_bp to the IRET address of the EXEC call, as read off the stack. Modified Paths: -------------- branches/debugger/src/arch/linux/debugger/mhpdbg.c Modified: branches/debugger/src/arch/linux/debugger/mhpdbg.c =================================================================== --- branches/debugger/src/arch/linux/debugger/mhpdbg.c 2009-04-21 21:54:50 UTC (rev 1886) +++ branches/debugger/src/arch/linux/debugger/mhpdbg.c 2009-04-21 21:55:11 UTC (rev 1887) @@ -349,8 +349,8 @@ if ((mhpdbgc.bpload==1) && (DBG_ARG(mhpdbgc.currcode) == 0x21) && (LWORD(eax) == 0x4b00) ) { /* mhpdbgc.bpload_bp=((long)LWORD(cs) << 4) +LWORD(eip); */ - mhpdbgc.bpload_bp = MK_FP32(READ_WORD(SEG_ADR((Bit16u *), ss, sp) + 1), - READ_WORD(SEG_ADR((Bit16u *), ss, sp) + 0)); + mhpdbgc.bpload_bp = (long) MK_FP32(READ_WORD(SEG_ADR((Bit16u *), ss, sp) + 1), + READ_WORD(SEG_ADR((Bit16u *), ss, sp) + 0)); if (mhp_setbp(mhpdbgc.bpload_bp)) { mhp_printf("\n\nbpload: intercepting EXEC:\n", LWORD(cs), REG(eip)); This was sent by the SourceForge.net collaborative development platform, the world's largest Open Source development site. |