This is probably not the correct interpretation of this error.
The Win32 error above is more likely to indicate the actual problem.
Flags
Severity
Success
This code indicates success, rather than an error.
This may not be the correct interpretation of this code,
or possibly the program is handling errors incorrectly.
This question is a prologue to the one I previously asked here. I'm working on an IP camera project that is based on TI OMAP-L138. All in all, the H264 encoded video is streamed via live555 libraries over RTSP. For Live555 I'm using deviceSource based framed source. However, when I [...] read more
This is a crash I am trying to analyze for so many days. Can anyone please help me analyzing the issue? Any help would be greatly appreciated. We have customized the Language Monitor for our printer. There is a thread that polls the printer for it's status for every minute. [...] read more
I have an ARM binary of which I need to find exactly at which addresses its function's prologues end and the epilogues begin. In other words, I need the boundaries of the function bodies. For instance, if I have a function whose assembly is something like: 0x00000320 <+0>: push {r7, [...] read more
With mspgcc-size I can get an output like this: text data bss dec hex 13072 236 65296 78604 1330c We know that: Flash = data + text RAM = data + bss How can I extract the size of ROM/RAM from the selected -mmcu=msp430g2553 with the toolchain? e.g. ROM: 8192 [...] read more
I'm trying to use GDS in AMD GPU, but I can not make it work. My GPU is AMD RX580. I used this OpenCL kernel: __kernel __attribute__((reqd_work_group_size(64, 1, 1))) void localVarExample(__global int *res) { int i = get_global_id(0); __local int x; if (i == 0) { x = 0; } [...] read more
I need the bytes of a BIN file converted to a unsigned int, in this format (JavaScript): p.write4(shellcode.add32(0x00000000), 0x00000be9); p.write4(shellcode.add32(0x00000004), 0x90909000); p.write4(shellcode.add32(0x00000008), 0x90909090); p.write4(shellcode.add32(0x0000000c), 0x90909090); p.write4(shellcode.add32(0x00000010), 0x0082b955); p.write4(shellcode.add32(0x00000014), 0x8948c000); p.write4(shellcode.add32(0x00000018), 0x415741e5); p.write4(shellcode.add32(0x0000001c), 0x41554156); p.write4(shellcode.add32(0x00000020), 0x83485354); p.write4(shellcode.add32(0x00000024), 0x320f18ec); p.write4(shellcode.add32(0x00000028), 0x89d58949); p.write4(shellcode.add32(0x0000002c), 0x64b948c0); p.write4(shellcode.add32(0x00000030), 0x77737069); p.write4(shellcode.add32(0x00000034), 0x49000000); p.write4(shellcode.add32(0x00000038), 0x4120e5c1); p.write4(shellcode.add32(0x0000003c), 0x000200bc); p.write4(shellcode.add32(0x00000040), [...] read more
I have written code for a uPP device driver to be used with an OMAPL138 based custom board for data acquisition through a camera lens. The code for my device driver is: /* * A device driver for the Texas Instruments * Universal Paralllel Port (UPP) * * Modified by: [...] read more
I'm trying to implement Pitch/Yaw for my Camera class in D3D, but my Pitch() function, throws a "Access Violation reading location 0x0000008C". I googled a bit and saw I can't use XMVECTOR in a class/struct because of 16 bit alignment. However I already knew that and I double checked that [...] read more
I am using the dwarfdump command with these options -fFpPEo against a binary file. The output looks like this: fde: < 7><0x00000000:0x00000092><clear><fde offset 0x00005d70 length: 0x00000030><eh offset none> 0x00000000: <off cfa=00(r13) > 0x00000004: <off cfa=24(r13) > <off r4=-24(cfa) > <off r5=-20(cfa) > <off r6=-16(cfa) > <off r7=-12(cfa) > <off r8=-8(cfa) [...] read more
I've been using an online compiler but I'm not sure why the memory is being split the way it is It's coming out as: 00a8 0000001d 00ac 01000000 when 00a8 should just hold the whole hex value as 0000011d. .pos 0 irmovl $1, %eax # int i = 1 irmovl [...] read more
I have code at the end of my program that is as follows: ldrb r2, [r1, #12] sub r2, r2, #48 cmp r2, r7 beq Check sub r0, r0, #1 Check add r0, #1 END If cmp r2, r7 decides r2 & r7 are equal, the program jumps to Check [...] read more