heartofalion

Members
  • Content count

    9
  • Joined

  • Last visited

Community Reputation

107 Neutral

About heartofalion

  • Rank
    Newbie
  1. Access violation writing location 0x764f3398

    HOLY CRAP I GOT IT. For some reason linking libglu32.a was causing the problems!   10+ hours of troubleshooting and it was that simple!
  2. Access violation writing location 0x764f3398

      He sent me solution and everything, but as a test I create a new project copy and pasted the source into new files. Then linked the correct files. Still no luck. I have also tried compiling on a netbook and a virtual machine with a different OS with absolutely 0 luck.
  3. Where to publish my first 2D Game!?!?!?

    To get on steam you need to get greenlit (via user votes, so you would need to get alot of hype around your game) or get valve to notice you. Again you'll need alot of hype. If you want to use PC as a platform, i would suggest distribution via a personal website plus the suggestions above.   Mobile, you just need to purchase the developer packge via apple (100$) and you can drop your game on the app store. I believe android doesnt require a dev package....i could be wrong about that though.   My suggestion is get your game out there on as many platforms as you can right now, and hopefully get your name out there. Then, with some luck get noticed by Sony/Valve/Microsoft and get your game on their distribution platform, and really start bringing in the $.
  4. Access violation writing location 0x764f3398

    I'd also like to add that if Seth sends me the .exe i can run it fine. But if I compile it on my own, i receive the aforementioned error.
  5. Access violation writing location 0x764f3398

    Pardon the double post.   Here is gs_support.c as it is on my PC.   /*** *gs_support.c - initialize the global buffer overrun security cookie * * Copyright (c) Microsoft Corporation. All rights reserved. * *Purpose: * Define __security_init_cookie, which is called at startup to initialize * the global buffer overrun security cookie used by the /GS compile flag. * *******************************************************************************/ #include <windows.h> #include <intrin.h> #if defined (_M_IX86) && defined (_CRTBLD) && !defined (_SYSCRT) && defined (_DEBUG) /* * __security_init_cookie must be called before any exception handlers using * the cookie are registered. We do a spot check for this condition in the * debug version of the x86 CRT. */ #define CHECK_FOR_LATE_COOKIE_INIT #include <cmsgs.h> // for _RT_COOKIE_INIT_TXT typedef EXCEPTION_DISPOSITION (*PEXCEPTION_ROUTINE) ( IN struct _EXCEPTION_RECORD *ExceptionRecord, IN PVOID EstablisherFrame, IN OUT struct _CONTEXT *ContextRecord, IN OUT PVOID DispatcherContext ); typedef struct _EXCEPTION_REGISTRATION_RECORD { struct _EXCEPTION_REGISTRATION_RECORD *Next; PEXCEPTION_ROUTINE Handler; } EXCEPTION_REGISTRATION_RECORD; typedef EXCEPTION_REGISTRATION_RECORD *PEXCEPTION_REGISTRATION_RECORD; #define EXCEPTION_CHAIN_END ((struct _EXCEPTION_REGISTRATION_RECORD * POINTER_32)-1) EXCEPTION_DISPOSITION __cdecl _except_handler4( IN struct _EXCEPTION_RECORD *ExceptionRecord, IN PVOID EstablisherFrame, IN OUT struct _CONTEXT *ContextRecord, IN OUT PVOID DispatcherContext ); #endif /* defined (_M_IX86) && defined (_CRTBLD) && !defined (_SYSCRT) && defined (_DEBUG) */ /* * Default value used for the global /GS security cookie, defined here and * in gs_cookie.c (since standalone SDK build can't use CRT's internal.h). */ #ifdef _WIN64 #define DEFAULT_SECURITY_COOKIE 0x00002B992DDFA232 #else /* _WIN64 */ #define DEFAULT_SECURITY_COOKIE 0xBB40E64E #endif /* _WIN64 */ /* * The global security cookie. This name is known to the compiler. */ extern UINT_PTR __security_cookie; extern UINT_PTR __security_cookie_complement; /* * Union to facilitate converting from FILETIME to unsigned __int64 */ typedef union { unsigned __int64 ft_scalar; FILETIME ft_struct; } FT; /*** *__security_init_cookie(cookie) - init buffer overrun security cookie. * *Purpose: * Initialize the global buffer overrun security cookie which is used by * the /GS compile switch to detect overwrites to local array variables * the potentially corrupt the return address. This routine is called * at EXE/DLL startup. * *Entry: * *Exit: * *Exceptions: * *******************************************************************************/ void __cdecl __security_init_cookie(void) { UINT_PTR cookie; FT systime={0}; LARGE_INTEGER perfctr; /* * Do nothing if the global cookie has already been initialized. On x86, * reinitialize the cookie if it has been previously initialized to a * value with the high word 0x0000. Some versions of Windows will init * the cookie in the loader, but using an older mechanism which forced the * high word to zero. */ if (__security_cookie != DEFAULT_SECURITY_COOKIE #if defined (_X86_) && (__security_cookie & 0xFFFF0000) != 0 #endif /* defined (_X86_) */ ) { __security_cookie_complement = ~__security_cookie; return; } /* * Initialize the global cookie with an unpredictable value which is * different for each module in a process. Combine a number of sources * of randomness. */ GetSystemTimeAsFileTime(&systime.ft_struct); #if defined (_WIN64) cookie = systime.ft_scalar; #else /* defined (_WIN64) */ cookie = systime.ft_struct.dwLowDateTime; cookie ^= systime.ft_struct.dwHighDateTime; #endif /* defined (_WIN64) */ cookie ^= GetCurrentProcessId(); cookie ^= GetCurrentThreadId(); cookie ^= GetTickCount(); QueryPerformanceCounter(&perfctr); #if defined (_WIN64) cookie ^= perfctr.QuadPart; #else /* defined (_WIN64) */ cookie ^= perfctr.LowPart; cookie ^= perfctr.HighPart; #endif /* defined (_WIN64) */ #if defined (_WIN64) /* * On Win64, generate a cookie with the most significant word set to zero, * as a defense against buffer overruns involving null-terminated strings. * Don't do so on Win32, as it's more important to keep 32 bits of cookie. */ cookie &= 0x0000FFFFffffFFFFi64; #endif /* defined (_WIN64) */ /* * Make sure the cookie is initialized to a value that will prevent us from * reinitializing it if this routine is ever called twice. */ if (cookie == DEFAULT_SECURITY_COOKIE) { cookie = DEFAULT_SECURITY_COOKIE + 1; } #if defined (_X86_) else if ((cookie & 0xFFFF0000) == 0) { cookie |= ( (cookie|0x4711) << 16); } #endif /* defined (_X86_) */ __security_cookie = cookie; __security_cookie_complement = ~cookie; }
  6. Should I post my First Game Project on PSN

    My understanding is that going through M$ certification can be extremely expensive. Especially for patching. Phil fish creator of fez said that they wanted 40,000$ to certify a patch for the game on xbla. I'm not sure what its like for sony
  7. Access violation writing location 0x764f3398

    https://subversion.assembla.com/svn/mojos/kernel/crt/src/gs_support.c Posting from my phone but this looks like the file. I wont be able to verify until i get home tonight but it looks right. I'll drop it onto pastebin when I get home.
  8. Access violation writing location 0x764f3398

    I should have also stated, the person I received the code from can compile and run it no problem. The code snippets I posted are not written by me, but rather already on the machine. When i try and execute the .exe it gives me the errors i pasted first and then points to the    cookie = systime.ft_struct.dwLowDateTime;   I just posted the whole function so the were would be context for that cookie line.   Also I have been to the link you posted, and the topic originator never ends up getting his problem solved. Which seemed to be the case in most of the links I found via google.   I am able to write a small program to make sure glut works, and it does no problem. But as i said when i try and run the .exe for this it breaks and points to cookie = systime.ft_struct.dwLowDateTime;.   Thanks for your reply!
  9. Hello,   I am trying to run a Demo, I get the following errors. I am trying to use glut and bullet physics. The code compiles but during execution the following happens.   EDIT: Also the person who sent me the code for the demo is able to compile and run the .exe without issue. /EDIT   First-chance exception at 0x001070ae in ***: 0xC0000005: Access violation writing location 0x764f3398. Unhandled exception at 0x77d015de in ***: 0xC0000005: Access violation writing location 0x764f3398. First-chance exception at 0x77cf016e in ***: 0x00000000: The operation completed successfully. Unhandled exception at 0x77d015de in ***: 0x00000000: The operation completed successfully. First-chance exception at 0x77cf016e in ***: 0x00000000: The operation completed successfully. Unhandled exception at 0x77d015de in ***: 0x00000000: The operation completed successfully.    It breaks and points to the following code in gs_support.c   cookie = systime.ft_struct.dwLowDateTime;   Which is part of the following  void __cdecl __security_init_cookie(void) { UINT_PTR cookie; FT systime={0}; LARGE_INTEGER perfctr; /* * Do nothing if the global cookie has already been initialized. On x86, * reinitialize the cookie if it has been previously initialized to a * value with the high word 0x0000. Some versions of Windows will init * the cookie in the loader, but using an older mechanism which forced the * high word to zero. */ if (__security_cookie != DEFAULT_SECURITY_COOKIE #if defined (_X86_) && (__security_cookie & 0xFFFF0000) != 0 #endif /* defined (_X86_) */ ) { __security_cookie_complement = ~__security_cookie; return; } /* * Initialize the global cookie with an unpredictable value which is * different for each module in a process. Combine a number of sources * of randomness. */ GetSystemTimeAsFileTime(&systime.ft_struct); #if defined (_WIN64) cookie = systime.ft_scalar; #else /* defined (_WIN64) */ cookie = systime.ft_struct.dwLowDateTime; cookie ^= systime.ft_struct.dwHighDateTime; #endif /* defined (_WIN64) */ cookie ^= GetCurrentProcessId(); cookie ^= GetCurrentThreadId(); cookie ^= GetTickCount(); QueryPerformanceCounter(&perfctr); #if defined (_WIN64) cookie ^= perfctr.QuadPart; #else /* defined (_WIN64) */ cookie ^= perfctr.LowPart; cookie ^= perfctr.HighPart; #endif /* defined (_WIN64) */ #if defined (_WIN64) /* * On Win64, generate a cookie with the most significant word set to zero, * as a defense against buffer overruns involving null-terminated strings. * Don't do so on Win32, as it's more important to keep 32 bits of cookie. */ cookie &= 0x0000FFFFffffFFFFi64; #endif /* defined (_WIN64) */ /* * Make sure the cookie is initialized to a value that will prevent us from * reinitializing it if this routine is ever called twice. */ if (cookie == DEFAULT_SECURITY_COOKIE) { cookie = DEFAULT_SECURITY_COOKIE + 1; } #if defined (_X86_) else if ((cookie & 0xFFFF0000) == 0) { cookie |= ( (cookie|0x4711) << 16); } #endif /* defined (_X86_) */ __security_cookie = cookie; __security_cookie_complement = ~cookie; }   gs_support.c is a system created file that I did not write.   I'm using Visual Studio 10   on Windows 7 ultimate x64     I've been beating my head against a wall so any help is appreciated!   Thanks!