mirror of
https://github.com/holub/mame
synced 2025-05-16 10:52:43 +03:00
osd_is_bad_read_ptr is no more.
This commit is contained in:
parent
4d657d4bde
commit
f0ba9131eb
@ -757,28 +757,6 @@ void *osd_alloc_executable(size_t size);
|
||||
void osd_free_executable(void *ptr, size_t size);
|
||||
|
||||
|
||||
/*-----------------------------------------------------------------------------
|
||||
osd_is_bad_read_ptr: attempt to determine if the given pointer will
|
||||
generate an access violation if accessed for read
|
||||
|
||||
Parameters:
|
||||
|
||||
ptr - the pointer to examine
|
||||
|
||||
size - the number of bytes to reference
|
||||
|
||||
Return value:
|
||||
|
||||
TRUE if an access to the referenced memory will generate an access
|
||||
violation on a read; FALSE otherwise.
|
||||
|
||||
Notes:
|
||||
|
||||
This function will eventually be deprecated.
|
||||
-----------------------------------------------------------------------------*/
|
||||
int osd_is_bad_read_ptr(const void *ptr, size_t size);
|
||||
|
||||
|
||||
/*-----------------------------------------------------------------------------
|
||||
osd_break_into_debugger: break into the hosting system's debugger if one
|
||||
is attached
|
||||
|
@ -32,17 +32,6 @@ void osd_free_executable(void *ptr, size_t size)
|
||||
}
|
||||
|
||||
|
||||
//============================================================
|
||||
// osd_is_bad_read_ptr
|
||||
//============================================================
|
||||
|
||||
int osd_is_bad_read_ptr(const void *ptr, size_t size)
|
||||
{
|
||||
// there is no standard way to do this, so just say no
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
|
||||
//============================================================
|
||||
// osd_break_into_debugger
|
||||
//============================================================
|
||||
|
@ -40,16 +40,6 @@ void osd_free_executable(void *ptr, size_t size)
|
||||
}
|
||||
|
||||
|
||||
//============================================================
|
||||
// osd_is_bad_read_ptr
|
||||
//============================================================
|
||||
|
||||
int osd_is_bad_read_ptr(const void *ptr, size_t size)
|
||||
{
|
||||
return IsBadReadPtr(ptr, size);
|
||||
}
|
||||
|
||||
|
||||
//============================================================
|
||||
// osd_break_into_debugger
|
||||
//============================================================
|
||||
|
Loading…
Reference in New Issue
Block a user