ntdll: Avoid using the CONTEXT86 type.

oldstable
Alexandre Julliard 2010-10-20 15:33:49 +02:00
parent 303079f16a
commit 085d398302
2 changed files with 4 additions and 4 deletions

View File

@ -444,7 +444,7 @@ static LONGLONG WINAPI relay_call( struct relay_descr *descr, unsigned int idx,
#ifdef __i386__
void WINAPI __regs_relay_call_regs( struct relay_descr *descr, unsigned int idx,
unsigned int orig_eax, unsigned int ret_addr,
CONTEXT86 *context )
CONTEXT *context )
{
WORD ordinal = LOWORD(idx);
BYTE nb_args = LOBYTE(HIWORD(idx));
@ -922,7 +922,7 @@ static void SNOOP_PrintArg(DWORD x)
#define CALLER1REF (*(DWORD*)context->Esp)
void WINAPI __regs_SNOOP_Entry( CONTEXT86 *context )
void WINAPI __regs_SNOOP_Entry( CONTEXT *context )
{
DWORD ordinal=0,entry = context->Eip - 5;
SNOOP_DLL *dll = firstdll;
@ -1015,7 +1015,7 @@ void WINAPI __regs_SNOOP_Entry( CONTEXT86 *context )
}
void WINAPI __regs_SNOOP_Return( CONTEXT86 *context )
void WINAPI __regs_SNOOP_Return( CONTEXT *context )
{
SNOOP_RETURNENTRY *ret = (SNOOP_RETURNENTRY*)(context->Eip - 5);
SNOOP_FUN *fun = &ret->dll->funs[ret->ordinal];

View File

@ -1428,7 +1428,7 @@ NTSTATUS context_from_server( CONTEXT *to, const context_t *from )
* Check if the fault location is a privileged instruction.
* Based on the instruction emulation code in dlls/kernel/instr.c.
*/
static inline DWORD is_privileged_instr( CONTEXT86 *context )
static inline DWORD is_privileged_instr( CONTEXT *context )
{
const BYTE *instr;
unsigned int prefix_count = 0;