Originally posted by avis
View Post
"VAC documents at last count 14000 hypervisors they have to check for that cheaters have made all have windows claiming secureboot is enabled. Cheat developers are very active people."
Read this line carefully. Lets say I said "clamav documents x number of a particular type of virus where would you look for the count the signature files right" Yes googling for answer to clamav document x numbers of something would also be a dead end. VAC the program is really a form of locally running anti-virus style program looking for cheats.
Basically you attempted to google something that never had a google answer.
Originally posted by avis
View Post
What license do you need for windows 12 IoT core for embedded usage that need customization to run on platform like you use todo with CE and you email [email protected] to ask about that problem what do you think the answer is?
https://www.microsoft.com/en-us/shar...g-program.aspx << Its this one. The one that allows modification.
Yes windows Iot replaced "Windows Embedded Compact" and Microsoft has not updated the license agreement to reflect the change on the website when you come to in fact signing that agreement with microsoft that document is updated. Yes funny that you click on the windows embedded compact link in the contract and today you end up at bing with no results.
Windows IoT core does not have the win32 userspace but you have the ntdll and the core OS kernel. Yes Windows IOT has the same kernel core as your desktop versions.
There is more shared source license agreements than what are documented on the Microsoft website and Microsoft has not kept their shared source public pages 100 percent up to-date.
How would anti-cheat company get able to use a CE License to work on IoT. Simple looking at the possibility of making own game console using windows as core as excuse of course that allows them to submit patches up stream. Of course with the CE license they can submit changes upstream to Microsoft for possible include in new version of windows. Lets just say anti-cheat companies are not the only ones using this licensing loop hole.
err:ntdll:RtlpWaitForCriticalSection <<avis you were only looking at wine. This error shows up under windows event logs when programs don't work under Windows as well.
Its a generic error it can be drivers it can be software to software. You get that error under windows or wine lots of debugging ahead. The Hundreds of bugs reports in wine is not strange with this error.
https://learn.microsoft.com/en-us/wi...tion-time-outs That error is a trap in the windows nt design to go off when there is possible a dead lock due to waiting on a critical section for too long.
err:ntdll:RtlpWaitForCriticalSection with timeout after it means nothing that is problem because this has follows windows nt-12 kernel behavior exactly as Microsoft has defined to raise this error. People ask how to fix this. Something has gone wrong before you got to err:ntdll:RtlpWaitForCriticalSection to cause a critical section not to be acquirable in a suitable amount of time because the critical section lock has not been released.
Yes critical section timeout are part of windows design. Microsoft documents how to debug RtlpWaitForCriticalSection time outs under driver section of windows documentation even that you can have problem happen software to software.
err:ntdll:RtlpWaitForCriticalSection with timeout after it=critical-section-time-outs they are the same thing. Wine calls it one thing and windows in the eventlog calls it a critical section time out. Programs operating correctly critical section time outs should not be happening but they are in Windows NT-12 as safe guard against dead lock..
Notice how you said it had nothing do with drivers. Problem is how to debug err:ntdll:RtlpWaitForCriticalSection/critical-section-time-outs is only in the driver section of the Microsoft documentation even that problem just need two userspace threads using a(as in single) critical section and one not releasing as it should.
Get it yet err:ntdll:RtlpWaitForCriticalSection under wine or "critical section time outs" appearing in windows event logs contains nothing useful for how you end up at this point. All it tells you is that you have a deadlock event with a critical section that been caused by something that happened before that point. Neither message is a bug.
It is one of the issues I do have with wine. Messages that are absolutely correct behavior like the err:ntdll:RtlpWaitForCriticalSection timeout messages are mixed with err messages of known broken behavior.
Yes by windows NT design you with issues you should have a number of err:ntdll:RtlpWaitForCriticalSection/critical-section-time-outs as part of normal system operations. This is the fun part lot windows systems you check eventlog and you see critical section timeout messages and the computer appears to be operating normally.
Please note issues coming from ntdll with windows the solution more often than not will be in the driver documentation not the win32/win64 documentation because this is windows nt native problem. Native problems fall under drivers by NT design(this is Microsoft windows NT design for you sometimes it head scratching). This is why thinking ntdll is part of win32 is a problem causes you to look wrong place in Microsoft documentation for solutions.
err:ntdll:RtlpWaitForCriticalSection/critical-section-time-outs under wine/windows is a message you can get when program is working perfectly as expected. Debugging is required to work out if this is harmless normal behavior caused by holding critical sections little too long or deadlock. Yes NT design this message appears after the deadlock has possible been happening for 60 seconds. Lot of stuff can happen in 60 seconds.
Microsoft has had a string of updates that nuked peoples files.
Leave a comment: