Commit Graph

705 Commits

Author SHA1 Message Date
08f790c3af [*] Update fenceless notes in AuMutex.NT.cpp 2023-05-08 14:46:20 +01:00
1ec1d4d01e [*] update these members [ns-scale stat refactoring] 2023-05-03 13:34:41 +01:00
2fdf730263 [*] Stats now return nanoseconds timestamps 2023-05-03 08:57:21 +01:00
75ad160559 [*] cascade errors here plox 2023-05-02 11:27:06 +01:00
fca5b90b85 [*] adjust tls coefficients 2023-04-30 14:46:36 +01:00
7c1a1566fd [*] missing tls impersonation in bd94b73d 2023-04-30 09:05:14 +01:00
448d840e4c [*] missing free in bd94b73d 2023-04-30 09:02:13 +01:00
bd94b73dde [+] New TLSView implementation
[+] AuTLSVariable
2023-04-30 08:24:27 +01:00
6683d3cfdc [+] IProtocolPiece.GetNextPiece
[+] IProtocolPiece.ReallocateDrainBuffer
[*] Harden protocol piece use after destroy
2023-04-29 07:00:29 +01:00
c787d85485 [*] bug: fix process time counters under win32 2023-04-29 05:26:53 +01:00
0175809d0a [*] Compression pipe now returns false should an error occur 2023-04-29 03:10:08 +01:00
4086fc94bb [*] bug fix: RNG strings werent deterministic 2023-04-28 04:59:09 +01:00
da69428d7e [+] IProtocolStack::PrependInterceptorEx
[+] IProtocolStack::PrependSingleFrameProcessor
[+] IProtocolStack::PrependSingleFrameProcessorEx
[+] IProtocolStack::GetArrayOfInterceptors
[+] IProtocolStack::GetInterceptorAtIndex
[+] IProtocolPiece::ToInputWriter
[+] IProtocolPiece::GetExtendedInterceptor
[+] IProtocolPiece::GetShortPipeInterceptor
2023-04-28 02:41:45 +01:00
f8219542c5 [*] precache socket network state errors here before the last transaction is released 2023-04-27 10:44:15 +01:00
eb4ee3143d [*] bug: missing link 2023-04-27 10:26:41 +01:00
f1e9a7262b [*] pipe processors with a stack attached to them should destroy the stack to forcefully break circular references in user code 2023-04-27 06:10:09 +01:00
f70d6392d9 [*] harden 2023-04-27 01:34:29 +01:00
efadd964be [*] Improved disconnect reason reporting: HasErrorCode under the NT network async stream object 2023-04-26 20:32:25 +01:00
4b79aa902b [*] i dont think this path should ever be hit, but just to be certain, lets check the networks output channel translation object for an error if the socketbase doesnt know of the last fatal error code 2023-04-26 20:22:11 +01:00
b8540c77a7 [*] improved network error reporting 2023-04-26 20:13:17 +01:00
3f0368b99d [*] cache these adapter allocations away 2023-04-26 07:37:14 +01:00
30b0c2e0ba [*] Preemptive GetOverlappedResult fast-paths under WaitMultiple2 that rely on the alertable yield under next read/write cannot be trusted if the read count is zero.
Direct IO-specific quirk?
Windows 7 specific quirk?
Direct IO under Win7 specific quirk?
idk, but this fixes it
2023-04-26 07:25:45 +01:00
22c4d25759 [*] amend cdf5a499, bKillPipeOnFirstRootLevelFalse not respected 2023-04-25 12:57:15 +01:00
cdf5a499cb [*] Improved pipe work awareness under protocol stack to allow for propagation of error conditions such that the top most interceptor can kill the pipe work 2023-04-25 12:13:16 +01:00
e0d7bbea01 [*] stream regression 2023-04-25 10:09:37 +01:00
664eb270dc [+] IIOPipeWork::GetBytesProcessedInterframe
[*] IOPipeProcessors will now cap reported progression to the requested length if the requested page size would mean we overrun it.
2023-04-25 07:38:36 +01:00
f52175d7ce [*] build error 2023-04-25 02:59:18 +01:00
36dee459ca [*] TryLockRead was unware of RWRenterableLocks specifications
(not an issue for regular blocking lock paths)
2023-04-24 19:39:36 +01:00
8dcf857da5 [*] updated comments 2023-04-23 19:39:54 +01:00
f74a41e286 [*] Refactor our thread primitives for an SOO change, where the SOO[_t]-suffix is no longer required, resulting a new type conflict issue 2023-04-23 19:25:37 +01:00
5fd655b501 [*] further deprecate 2023-04-22 23:08:49 +01:00
772d08fee6 [*] amend 2a33d61e 2023-04-22 23:04:46 +01:00
2a33d61e63 [*] further deprecate high res clock
[*] further posix resolution reporting
2023-04-22 22:58:20 +01:00
945d54ef78 [*] i did a dumb 2023-04-22 22:38:37 +01:00
6d73dde240 [+] Thread + Process clocks 2023-04-21 22:08:56 +01:00
92af491fe8 [*] if (count == 1) * 2023-04-21 18:52:30 +01:00
36c163d90c [*] 2af2eadf cont 2023-04-19 23:57:56 +01:00
d7d514c6b7 [*] protocol-stack ticks now check against the buffers error flags to ensure Writes/Reads weren't being silently dropped in user code 2023-04-19 23:46:56 +01:00
2af2eadfa8 [*] Resolve: protocol-stack link bug (multiple append failure / missing next link) 2023-04-19 23:35:48 +01:00
00129255f8 [*] changed this to be a soft-failure 2023-04-19 04:03:49 +01:00
11ba608727 [*] bonk 2023-04-19 03:54:55 +01:00
bfd4069994 [*] logger mitigations cont - current thread callback may as well be sanitized as well 2023-04-18 02:30:11 +01:00
b32bf5f1f1 [*] Logger mitigations
Closes #47
2023-04-18 02:09:16 +01:00
b2311a8824 [+] IProcessSectionMapView::LockSwap
[+] IProcessSectionMapView::UnlockSwap
[*] Fix critical tag under ILogger
[*] Added missing includes to experimental APIs
2023-04-17 15:55:51 +01:00
0c494cb99a [*] another preemptive linux fix. i missed a step in calculating the mask (i didnt calculate the mask at all) 2023-04-16 23:58:27 +01:00
53a29a6c13 [*] flag consistency 2023-04-16 23:41:06 +01:00
4cac821fbb [+] Added critical log level
[*] Fix win32 DELETE bug
2023-04-16 23:38:31 +01:00
5d979bff6d [*] I dont think this path is really hit but still we shouldnt wake up after 4 seconds under here 2023-04-12 12:26:53 +01:00
abed78a15f [*] QtCore6 crash on Windows 7 2023-04-06 22:24:47 +01:00
6e7cee70e1 [*] added mandatory smt spin here 2023-04-05 09:42:48 +01:00