mirror of
https://github.com/holub/mame
synced 2025-05-16 19:00:43 +03:00
osd_is_bad_read_ptr is no more.
This commit is contained in:
parent
4d657d4bde
commit
f0ba9131eb
@ -757,28 +757,6 @@ void *osd_alloc_executable(size_t size);
|
|||||||
void osd_free_executable(void *ptr, size_t size);
|
void osd_free_executable(void *ptr, size_t size);
|
||||||
|
|
||||||
|
|
||||||
/*-----------------------------------------------------------------------------
|
|
||||||
osd_is_bad_read_ptr: attempt to determine if the given pointer will
|
|
||||||
generate an access violation if accessed for read
|
|
||||||
|
|
||||||
Parameters:
|
|
||||||
|
|
||||||
ptr - the pointer to examine
|
|
||||||
|
|
||||||
size - the number of bytes to reference
|
|
||||||
|
|
||||||
Return value:
|
|
||||||
|
|
||||||
TRUE if an access to the referenced memory will generate an access
|
|
||||||
violation on a read; FALSE otherwise.
|
|
||||||
|
|
||||||
Notes:
|
|
||||||
|
|
||||||
This function will eventually be deprecated.
|
|
||||||
-----------------------------------------------------------------------------*/
|
|
||||||
int osd_is_bad_read_ptr(const void *ptr, size_t size);
|
|
||||||
|
|
||||||
|
|
||||||
/*-----------------------------------------------------------------------------
|
/*-----------------------------------------------------------------------------
|
||||||
osd_break_into_debugger: break into the hosting system's debugger if one
|
osd_break_into_debugger: break into the hosting system's debugger if one
|
||||||
is attached
|
is attached
|
||||||
|
@ -32,17 +32,6 @@ void osd_free_executable(void *ptr, size_t size)
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
//============================================================
|
|
||||||
// osd_is_bad_read_ptr
|
|
||||||
//============================================================
|
|
||||||
|
|
||||||
int osd_is_bad_read_ptr(const void *ptr, size_t size)
|
|
||||||
{
|
|
||||||
// there is no standard way to do this, so just say no
|
|
||||||
return FALSE;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
//============================================================
|
//============================================================
|
||||||
// osd_break_into_debugger
|
// osd_break_into_debugger
|
||||||
//============================================================
|
//============================================================
|
||||||
|
@ -40,16 +40,6 @@ void osd_free_executable(void *ptr, size_t size)
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
//============================================================
|
|
||||||
// osd_is_bad_read_ptr
|
|
||||||
//============================================================
|
|
||||||
|
|
||||||
int osd_is_bad_read_ptr(const void *ptr, size_t size)
|
|
||||||
{
|
|
||||||
return IsBadReadPtr(ptr, size);
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
//============================================================
|
//============================================================
|
||||||
// osd_break_into_debugger
|
// osd_break_into_debugger
|
||||||
//============================================================
|
//============================================================
|
||||||
|
Loading…
Reference in New Issue
Block a user