dbghelp: Fix broken sw_read_mem() call in i386 stack backtrace.
authorAlexandre Julliard <julliard@winehq.org>
Thu, 4 Feb 2010 18:24:00 +0000 (19:24 +0100)
committerAlexandre Julliard <julliard@winehq.org>
Thu, 4 Feb 2010 18:32:12 +0000 (19:32 +0100)
dlls/dbghelp/cpu_i386.c

index 32a341f3a305817c7f1a8e84cf115c0a56d7076a..f3de65235392e0e1dfb19db723fbe600f1ee984f 100644 (file)
@@ -236,7 +236,7 @@ static BOOL i386_stack_walk(struct cpu_stack_walk* csw, LPSTACKFRAME64 frame)
                 tmp.Offset  = OFFSETOF(next_switch);
                 p = sw_xlat_addr(csw, &tmp);
 
-                if (!sw_read_mem(csw->hProcess, p, &frame16, sizeof(frame16)))
+                if (!sw_read_mem(csw, p, &frame16, sizeof(frame16)))
                 {
                     WARN("Bad stack frame 0x%08x\n", p);
                     goto done_err;