Removed zap_ptr hack from Bugzilla #602...it was incorrect.

(The actual bug was in SDL code removed from the 1.3 codebase.)

--HG--
extra : convert_revision : svn%3Ac70aab31-4412-0410-b14c-859654838e24/trunk%403219
This commit is contained in:
Ryan C. Gordon 2008-09-15 20:48:51 +00:00
parent 7792866ddb
commit 0d38b678ae

View file

@ -210,13 +210,6 @@ SDL_NAME(XF86VidModeGetGamma) (Display * dpy, int screen,
return True;
}
/* this is to prevent an unaligned memory write on CPUs that need that. */
static void
zap_ptr(char *ptr, size_t size)
{
memset(ptr, '\0', size);
}
Bool SDL_NAME(XF86VidModeGetModeLine) (dpy, screen, dotclock, modeline)
Display *
dpy;
@ -292,7 +285,7 @@ SDL_NAME(XF86VidModeModeLine) * modeline;
_XRead(dpy, (char *) modeline->private,
modeline->privsize * sizeof(INT32));
} else {
zap_ptr((char *) &modeline->private, sizeof(modeline->private));
modeline->private = NULL;
}
UnlockDisplay(dpy);
SyncHandle();