-
Alexander Viro authored
* s_4bri.c has a nasty typo - bogus & in qBri_cpu_trapped(). We have void *base; followed by regs[0] = READ_DWORD((&base + offset) + 0x70); which is *NOT* what is meant there - instead of access to memory pointed to by base we get access to _stack_ at some offset from the place where the local variable base lives. Signed-off-by: Armin Schindler <armin@melware.de> Signed-off-by: Al Viro <viro@parcelfarce.linux.theplanet.co.uk> Signed-off-by: Linus Torvalds <torvalds@osdl.org>
42f61295