- 14 Oct, 2014 2 commits
-
-
Matteo Bruni authored
-
Matteo Bruni authored
-
- 13 Oct, 2014 17 commits
-
-
Jacek Caban authored
-
Sebastian Lackner authored
Checking for ATL thunks can be disabled by setting MEM_EXECUTE_OPTION_DISABLE_THUNK_EMULATION.
-
Sebastian Lackner authored
-
Sebastian Lackner authored
-
Sebastian Lackner authored
The ATL check leads to problems when a page is protected with guard page protection. raise_segv_exception is called with EXCEPTION_EXECUTE_FAULT. The ATL check tries to read the memory, and triggers another exception handler. This time the virtual_handle_fault check is executed, and removes the guard page protection. Afterwards, when the ATL check returns, the exception is _not_ catched by virtual_handle_fault, but instead passed to the application.
-
Sebastian Lackner authored
-
Qian Hong authored
-
André Hentschel authored
-
André Hentschel authored
-
Jacek Caban authored
-
Jactry Zeng authored
-
Jacek Caban authored
-
Nikolay Sivov authored
-
Nikolay Sivov authored
-
Francois Gouget authored
-
Iván Matellanes authored
-
Iván Matellanes authored
-
- 09 Oct, 2014 17 commits
-
-
Matteo Bruni authored
-
Matteo Bruni authored
-
Jacek Caban authored
-
Jacek Caban authored
-
Jacek Caban authored
-
Jacek Caban authored
-
Jacek Caban authored
-
Jacek Caban authored
-
Aric Stewart authored
-
Austin English authored
-
André Hentschel authored
-
David Heidelberger authored
-
Henri Verbeet authored
-
Henri Verbeet authored
-
Henri Verbeet authored
-
Henri Verbeet authored
-
Henri Verbeet authored
-
- 08 Oct, 2014 4 commits
-
-
André Hentschel authored
-
André Hentschel authored
-
André Hentschel authored
-
André Hentschel authored
-