aboutsummaryrefslogtreecommitdiff
path: root/bfd/nlmcode.h
diff options
context:
space:
mode:
authorFred Fish <fnf@specifix.com>1993-07-20 22:07:39 +0000
committerFred Fish <fnf@specifix.com>1993-07-20 22:07:39 +0000
commitf03b1f0d44b7b45484b5225e927dfec2998afed7 (patch)
treedb9dbbd436a472c5eeb6274d80d021d0a7e9c329 /bfd/nlmcode.h
parentdf61743d3ee6b72c98e921f828a93e6890a200b8 (diff)
downloadgdb-f03b1f0d44b7b45484b5225e927dfec2998afed7.zip
gdb-f03b1f0d44b7b45484b5225e927dfec2998afed7.tar.gz
gdb-f03b1f0d44b7b45484b5225e927dfec2998afed7.tar.bz2
* libnlm.h (nlm_obj_tdata): Rename hidden struct members to avoid
apparent Sun C preprocessor recursion. Fix access macros. * nlmcode.h: Remove spurious '&' before several array references.
Diffstat (limited to 'bfd/nlmcode.h')
-rw-r--r--bfd/nlmcode.h8
1 files changed, 4 insertions, 4 deletions
diff --git a/bfd/nlmcode.h b/bfd/nlmcode.h
index 127eb94..741fe89 100644
--- a/bfd/nlmcode.h
+++ b/bfd/nlmcode.h
@@ -96,7 +96,7 @@ DEFUN (nlm_object_p, (abfd), bfd * abfd)
/* Check to see if we have an NLM file by matching the NLM signature. */
- if (strncmp (&x_fxdhdr.signature, NLM_SIGNATURE, NLM_SIGNATURE_SIZE) != 0)
+ if (strncmp (x_fxdhdr.signature, NLM_SIGNATURE, NLM_SIGNATURE_SIZE) != 0)
{
wrong:
bfd_error = wrong_format;
@@ -107,7 +107,7 @@ DEFUN (nlm_object_p, (abfd), bfd * abfd)
a sane version number after doing byte swapping appropriate for this
XVEC. (Hack alert!) */
- if (get_word (abfd, (bfd_byte *) &x_fxdhdr.version) > 0xFFFF)
+ if (get_word (abfd, (bfd_byte *) x_fxdhdr.version) > 0xFFFF)
{
goto wrong;
}
@@ -269,7 +269,7 @@ DEFUN (nlm_swap_variable_header_in, (abfd),
/* Read and convert the stackSize field. */
- if (bfd_read ((PTR) &temp, sizeof (temp), 1, abfd) != sizeof (temp))
+ if (bfd_read ((PTR) temp, sizeof (temp), 1, abfd) != sizeof (temp))
{
bfd_error = system_call_error;
return (false);
@@ -278,7 +278,7 @@ DEFUN (nlm_swap_variable_header_in, (abfd),
/* Read and convert the reserved field. */
- if (bfd_read ((PTR) &temp, sizeof (temp), 1, abfd) != sizeof (temp))
+ if (bfd_read ((PTR) temp, sizeof (temp), 1, abfd) != sizeof (temp))
{
bfd_error = system_call_error;
return (false);