mirror of
https://github.com/azahar-emu/ext-boost
synced 2025-11-07 23:59:57 +01:00
121 lines
3.0 KiB
C++
121 lines
3.0 KiB
C++
/*
|
|
*
|
|
* Copyright (c) 1998-2004
|
|
* John Maddock
|
|
*
|
|
* Use, modification and distribution are subject to the
|
|
* Boost Software License, Version 1.0. (See accompanying file
|
|
* LICENSE_1_0.txt or copy at http://www.boost.org/LICENSE_1_0.txt)
|
|
*
|
|
*/
|
|
|
|
/*
|
|
* LOCATION: see http://www.boost.org for most recent version.
|
|
* FILE: regex.cpp
|
|
* VERSION: see <boost/version.hpp>
|
|
* DESCRIPTION: Misc boost::regbase member funnctions.
|
|
*/
|
|
|
|
|
|
#define BOOST_REGEX_SOURCE
|
|
|
|
#include <boost/regex/config.hpp>
|
|
|
|
#ifdef BOOST_REGEX_HAS_MS_STACK_GUARD
|
|
|
|
#include <malloc.h>
|
|
|
|
#ifndef WIN32_LEAN_AND_MEAN
|
|
# define WIN32_LEAN_AND_MEAN
|
|
#endif
|
|
#ifndef NOMINMAX
|
|
# define NOMINMAX
|
|
#endif
|
|
#define NOGDI
|
|
#define NOUSER
|
|
#include <windows.h>
|
|
#include <stdexcept>
|
|
#include <boost/regex/pattern_except.hpp>
|
|
#include <boost/regex/v4/protected_call.hpp>
|
|
|
|
namespace boost {
|
|
namespace BOOST_REGEX_DETAIL_NS {
|
|
|
|
static void execute_eror()
|
|
{
|
|
// we only get here after a stack overflow,
|
|
// this has to be a separate proceedure because we
|
|
// can't mix __try{}__except block with local objects
|
|
// that have destructors:
|
|
reset_stack_guard_page();
|
|
std::runtime_error err("Out of stack space, while attempting to match a regular expression.");
|
|
raise_runtime_error(err);
|
|
}
|
|
|
|
bool BOOST_REGEX_CALL abstract_protected_call::execute()const
|
|
{
|
|
__try{
|
|
return this->call();
|
|
}__except(EXCEPTION_STACK_OVERFLOW == GetExceptionCode())
|
|
{
|
|
execute_eror();
|
|
}
|
|
// We never really get here at all:
|
|
return false;
|
|
}
|
|
|
|
BOOST_REGEX_DECL void BOOST_REGEX_CALL reset_stack_guard_page()
|
|
{
|
|
#if defined(BOOST_REGEX_HAS_MS_STACK_GUARD) && defined(_MSC_VER) && (_MSC_VER >= 1300)
|
|
_resetstkoflw();
|
|
#else
|
|
//
|
|
// We need to locate the current page being used by the stack,
|
|
// move to the page below it and then deallocate and protect
|
|
// that page. Note that ideally we would protect only the lowest
|
|
// stack page that has been allocated: in practice there
|
|
// seems to be no easy way to locate this page, in any case as
|
|
// long as the next page is protected, then Windows will figure
|
|
// the rest out for us...
|
|
//
|
|
SYSTEM_INFO si;
|
|
GetSystemInfo(&si);
|
|
MEMORY_BASIC_INFORMATION mi;
|
|
DWORD previous_protection_status;
|
|
//
|
|
// this is an address in our stack space:
|
|
//
|
|
LPBYTE page = (LPBYTE)&page;
|
|
//
|
|
// Get the current memory page in use:
|
|
//
|
|
VirtualQuery(page, &mi, sizeof(mi));
|
|
//
|
|
// Go to the page one below this:
|
|
//
|
|
page = (LPBYTE)(mi.BaseAddress)-si.dwPageSize;
|
|
//
|
|
// Free and protect everything from the start of the
|
|
// allocation range, to the end of the page below the
|
|
// one in use:
|
|
//
|
|
if (!VirtualFree(mi.AllocationBase, (LPBYTE)page - (LPBYTE)mi.AllocationBase, MEM_DECOMMIT)
|
|
|| !VirtualProtect(page, si.dwPageSize, PAGE_GUARD | PAGE_READWRITE, &previous_protection_status))
|
|
{
|
|
throw std::bad_exception();
|
|
}
|
|
#endif
|
|
}
|
|
}
|
|
} // namspaces
|
|
#endif
|
|
|
|
#if defined(BOOST_RE_USE_VCL) && defined(BOOST_REGEX_DYN_LINK)
|
|
|
|
int WINAPI DllEntryPoint(HINSTANCE , unsigned long , void*)
|
|
{
|
|
return 1;
|
|
}
|
|
#endif
|
|
|