From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 25939 invoked by alias); 19 Feb 2015 16:10:43 -0000 Mailing-List: contact gdb-patches-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: gdb-patches-owner@sourceware.org Received: (qmail 25930 invoked by uid 89); 19 Feb 2015 16:10:42 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-3.4 required=5.0 tests=AWL,BAYES_00,SPF_HELO_PASS,SPF_PASS,T_RP_MATCHES_RCVD autolearn=ham version=3.3.2 X-HELO: mx1.redhat.com Received: from mx1.redhat.com (HELO mx1.redhat.com) (209.132.183.28) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with (AES256-GCM-SHA384 encrypted) ESMTPS; Thu, 19 Feb 2015 16:10:42 +0000 Received: from int-mx10.intmail.prod.int.phx2.redhat.com (int-mx10.intmail.prod.int.phx2.redhat.com [10.5.11.23]) by mx1.redhat.com (8.14.4/8.14.4) with ESMTP id t1JGAZHw012397 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Thu, 19 Feb 2015 11:10:35 -0500 Received: from greed.delorie.com (ovpn-113-24.phx2.redhat.com [10.3.113.24]) by int-mx10.intmail.prod.int.phx2.redhat.com (8.14.4/8.14.4) with ESMTP id t1JGAYrk000434 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Thu, 19 Feb 2015 11:10:34 -0500 Received: from greed.delorie.com (greed.delorie.com [127.0.0.1]) by greed.delorie.com (8.14.4/8.14.4) with ESMTP id t1JGAXiQ005295; Thu, 19 Feb 2015 11:10:33 -0500 Received: (from dj@localhost) by greed.delorie.com (8.14.4/8.14.4/Submit) id t1JGAXni005293; Thu, 19 Feb 2015 11:10:33 -0500 Date: Thu, 19 Feb 2015 16:10:00 -0000 Message-Id: <201502191610.t1JGAXni005293@greed.delorie.com> From: DJ Delorie To: Amrita Honap CC: gdb-patches@sourceware.org In-reply-to: (message from Amrita Honap on Thu, 19 Feb 2015 10:52:46 +0000) Subject: Re: [PATCH RL78]:Fix offset for mem_get_si in sim References: X-IsSubscribed: yes X-SW-Source: 2015-02/txt/msg00545.txt.bz2 > - | mem_get_byte (address + 2) * 16777216; > + | mem_get_byte (address + 3) * 16777216; This is OK, thanks!