Displaying 9 results from an estimated 9 matches for "virtualquery".
2006 Oct 06
13
Need some help with latest win32-mmap
Hi all,
I''ve got the latest win32-mmap code checked into CVS. Unfortunately, it
seems that I''m not able to open an existing mapping and retrieve set
data. Below is a simple example that seems like it ought to work but
doesn''t. Any ideas?
# map1.rb
require ''win32/mmap''
include Win32
mmap = MMap.new(:name => ''alpha'', :size
2012 Jan 07
0
[LLVMdev] [llvm-commits] [PATCH][Compiler-rt] Windows implementation of mmap functionality in clear_cache_test and enable_execute_stack_test
Hi Ruben,
> I see I missed some curly braces. I also modified spacing a tiny bit.
Doesn't seem so. E.g. you have:
+ if ( !VirtualQuery(addr, &b, sizeof(b)) )
+ exit(1);
+ if( !VirtualProtect(b.BaseAddress, b.RegionSize,
PAGE_EXECUTE_READWRITE, &b.Protect) )
Add space after "if". Do not put spaces after "(" and before ")". Same
for other places in the file.
--
With best regards, Ant...
2012 Jan 07
3
[LLVMdev] [PATCH][Compiler-rt] Windows implementation of mmap functionality in clear_cache_test and enable_execute_stack_test
...ke executable the page containing execution_buffer
char* start = (char*)((uintptr_t)execution_buffer & (-4095));
char* end = (char*)((uintptr_t)(&execution_buffer[128+4096]) & (-4095));
+#if defined(_WIN32)
+ DWORD dummy_oldProt;
+ MEMORY_BASIC_INFORMATION b;
+ if ( !VirtualQuery(start, &b, sizeof(b)) )
+ return 1;
+ if ( !VirtualProtect(b.BaseAddress, b.RegionSize, PAGE_EXECUTE_READWRITE, &b.Protect) )
+#else
if ( mprotect(start, end-start, PROT_READ|PROT_WRITE|PROT_EXEC) != 0 )
+#endif
return 1;
// verify you can copy and execute a f...
2012 Jan 07
1
[LLVMdev] [llvm-commits] [PATCH][Compiler-rt] Windows implementation of mmap functionality in clear_cache_test and enable_execute_stack_test
...ke executable the page containing execution_buffer
char* start = (char*)((uintptr_t)execution_buffer & (-4095));
char* end = (char*)((uintptr_t)(&execution_buffer[128+4096]) & (-4095));
+#if defined(_WIN32)
+ DWORD dummy_oldProt;
+ MEMORY_BASIC_INFORMATION b;
+ if ( !VirtualQuery(start, &b, sizeof(b)) )
+ return 1;
+ if ( !VirtualProtect(b.BaseAddress, b.RegionSize, PAGE_EXECUTE_READWRITE, &b.Protect) )
+#else
if ( mprotect(start, end-start, PROT_READ|PROT_WRITE|PROT_EXEC) != 0 )
+#endif
return 1;
// verify you can copy and execute a f...
2012 Jan 07
2
[LLVMdev] [llvm-commits] [PATCH][Compiler-rt] Windows implementation of mmap functionality in clear_cache_test and enable_execute_stack_test
2012/1/7 Anton Korobeynikov <anton at korobeynikov.info>
> Hi Ruben,
>
> > I see I missed some curly braces. I also modified spacing a tiny bit.
> Doesn't seem so. E.g. you have:
>
> + if ( !VirtualQuery(addr, &b, sizeof(b)) )
> + exit(1);
> + if( !VirtualProtect(b.BaseAddress, b.RegionSize,
> PAGE_EXECUTE_READWRITE, &b.Protect) )
> Add space after "if". Do not put spaces after "(" and before ")". Same
> for other places in the file.
&g...
2001 Dec 08
1
LoadOEMResource crash [Was: Re: Problem report: SHRINKER.ERR, fix to DEVICE_Open/CreateFileA? ]
Hi Pavel,
Right, my app also crashes in a different place under winedbg, although
it crashes in the same winedbg place under gdb.
I took a closer look at wine --winver nt40 --debugmsg +all.
I found something interesting. If I search for queue_exception, I find
that there is an exception raised before the LoadOEMCall, about
328klines in:
0806d398:Call
2013 Jun 25
0
[LLVMdev] [PATCH] Windows implementation of enable_execute_stack
...const uintptr_t pageSize = sysconf(_SC_PAGESIZE);
> #endif /* __APPLE__ */
>
> followed by the generic Unix implementation. Neither applies to Win32, so
> I ifdef'ed the whole thing.
>
>
>> > + MEMORY_BASIC_INFORMATION b;
>> > +
>> > + if (!VirtualQuery(addr, &b, sizeof(b)))
>> > + exit(1);
>> > + if (!VirtualProtect(b.BaseAddress, b.RegionSize,
>> PAGE_EXECUTE_READWRITE, &b.Protect))
>> > + exit(1);
>> > +#endif /* _WIN32 */
>> > }
>>
>> Aside from that, patch LGTM....
2005 May 05
2
LockWindowUpdate
Hi,
I've got a program that produces these error messages when started with wine.
fixme:dc:LockWindowUpdate (0x10024), partial stub!
fixme:dc:LockWindowUpdate ((nil)), partial stub!
fixme:dc:LockWindowUpdate (0x10024), partial stub!
fixme:dc:LockWindowUpdate ((nil)), partial stub!
fixme:dc:LockWindowUpdate (0x10024), partial stub!
fixme:dc:LockWindowUpdate ((nil)), partial stub!
The program
2001 Dec 11
0
VirtualProtect and app crash: what's your interpretation?
...764000 off
6200 size
1400 flags 50000040
0806d398: dup_handle( src_process=-1, src_handle=24, dst_process=-1,
access=00000000, inherit=0, options=2 )
0806d398: dup_handle() = 0 { handle=28, fd=-1 }
View: 0x400000 - 0x765fff 28
0x400000 - 0x765fff c-rw-
That address is filled via a call to VirtualQuery, storing the
allocation base address of the virtual memory space containing the
address 0x75D5F0.
Why is the app trying to read from 0x456010? Where did it get the
0x56000 offset from? That offset was stored in 0x75D66C. That address is
not mentioned explicitly anywhere else, but looking at th...