From 876fc2cb3ad77a7a393d6be9e480d92889b1b9a3 Mon Sep 17 00:00:00 2001 From: Peter Veenstra Date: Tue, 12 Jul 2005 18:59:31 +0000 Subject: [PATCH] Disable a few warnings. Added a check for images over 1 mb.(Kippesoep) Imported-from: https://svn.code.sf.net/p/dosbox/code-0/dosbox/trunk@2236 --- src/dos/dos_execute.cpp | 15 ++++++--------- 1 file changed, 6 insertions(+), 9 deletions(-) diff --git a/src/dos/dos_execute.cpp b/src/dos/dos_execute.cpp index ba686254..abf3699d 100644 --- a/src/dos/dos_execute.cpp +++ b/src/dos/dos_execute.cpp @@ -16,7 +16,7 @@ * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */ -/* $Id: dos_execute.cpp,v 1.46 2005-07-04 20:20:19 c2woody Exp $ */ +/* $Id: dos_execute.cpp,v 1.47 2005-07-12 18:59:31 qbix79 Exp $ */ #include #include @@ -252,6 +252,9 @@ bool DOS_Execute(char * name,PhysPt block_pt,Bit8u flags) { if (len 1 MB"); + head.pages&=0x07ff; headersize = head.headersize*16; imagesize = head.pages*512-headersize; if (imagesize+headersize<512) imagesize = 512-headersize; @@ -299,13 +302,13 @@ bool DOS_Execute(char * name,PhysPt block_pt,Bit8u flags) { while (imagesize>0x7FFF) { readsize=0x8000;DOS_ReadFile(fhandle,loadbuf,&readsize); MEM_BlockWrite(loadaddress,loadbuf,readsize); - if (readsize!=0x8000) LOG(LOG_EXEC,LOG_NORMAL)("Illegal header"); +// if (readsize!=0x8000) LOG(LOG_EXEC,LOG_NORMAL)("Illegal header"); loadaddress+=0x8000;imagesize-=0x8000; } if (imagesize>0) { readsize=(Bit16u)imagesize;DOS_ReadFile(fhandle,loadbuf,&readsize); MEM_BlockWrite(loadaddress,loadbuf,readsize); - if (readsize!=imagesize) LOG(LOG_EXEC,LOG_NORMAL)("Illegal header"); +// if (readsize!=imagesize) LOG(LOG_EXEC,LOG_NORMAL)("Illegal header"); } /* Relocate the exe image */ Bit16u relocate; @@ -410,9 +413,3 @@ bool DOS_Execute(char * name,PhysPt block_pt,Bit8u flags) { } return false; } - - - - - -