4fa053ce97
[*] Harden POSIX FS Remove
2023-09-20 20:17:42 +01:00
5d12f1a203
[*] Resolve IO regressions (4. Hello FS) (Mostly UNIX)
2023-09-18 07:11:34 +01:00
11ef18cbf0
[*] moar regressions :(
2023-09-18 06:09:29 +01:00
09b044ab2e
[*] amend 9be76adb23
2023-09-17 22:21:24 +01:00
9be76adb23
[*] Further drop required symbols from OLE (COM) and SHELL32 (NT Shell)
...
[*] Optimize NT file and URI opener
2023-09-17 21:33:14 +01:00
84c0e94282
[*] 523abaf0
cont: not so sure on the UNIX-like variant either
2023-09-17 14:03:03 +01:00
523abaf0bb
[*] security: bIsIntranetTrusted not properly respected
2023-09-17 13:57:58 +01:00
9a294cf955
[*] (Mostly Linux) Harden FS apis
2023-09-16 01:20:28 +01:00
d0538ea4de
[*] NT/Win32-like: Use Win32Open as opposed to CreateFileW
2023-09-13 02:27:18 +01:00
a8696c0b7e
[*] ...no
2023-09-13 00:02:26 +01:00
6181d97c3c
[*] Improve internal path consistency
...
[*] Removes some unnecessary panics
2023-09-12 20:49:02 +01:00
b46390f83a
[*] Remove explicit Windows version check assuming certain file systems and platforms can be stupid
2023-09-12 01:35:54 +01:00
6062a16d9c
[*] Prevent overflow into UNC root namespace of hostnames and volumes via path or filename overflow
2023-09-12 00:52:16 +01:00
92593be412
[*] FS path mitigation: begin to handle >= MAX_PATHs by enforcing UNC \\?\ prefixes across every single Win32/NT api we hit (if relevant. im sure some long paths may still break things.)
2023-09-10 23:49:47 +01:00
5107911ba5
[*] Exploit mitigation - file protocols can be valid paths
2023-09-10 16:30:59 +01:00
d112179c83
[*] May as well make this in line with the others
2023-09-04 16:45:42 +01:00
bcf3fabd83
[*] FS Resources (GetWritableAppdata): fail over to this path instead of failing
2023-09-04 16:32:28 +01:00
47cec914cb
[*] Refactor FIOConfig::ddefaultBrand -> (AuOptional) FIOConfig::optDefaultBrand
...
[+] FIOConfig::bIsIntranetTrusted
2023-08-29 21:10:53 +01:00
b5a452a43d
[+] AuFS::IsFileBlocked
...
[+] AuFS::IsFileTrusted
2023-08-29 20:30:09 +01:00
3503d0ec68
[+] Added Linux signal configuration and separate LinuxConfig type (LinuxConfig)
...
[*] Fix Linux regressions in previous NT commit
2023-08-29 03:11:28 +01:00
5cf7533eab
[*] Linux and UNIX QOL
2023-08-27 12:42:10 +01:00
cf363b9f5b
[*] Ensure this never throws
2023-08-22 09:45:32 +01:00
ebce7e0048
[*] Alternative solution for FOLDERID_UserProgramFiles when targeting <= Windows Vista
2023-08-18 18:38:11 +01:00
78634d11db
[*] NT File Stream: unlikely race condition
2023-08-15 14:48:54 +01:00
3df8621944
[+] NT: IOHandle::IsFile(), IOHandle::IsTTY(), IOHandle::IsPipe()
...
[*] Revert to supporting write-only handles
2023-08-15 14:46:21 +01:00
9cea2fe82a
[*] This was bothering me
2023-08-15 14:19:23 +01:00
79371fc82f
[*] Linux stat regression?
2023-08-15 09:03:22 +01:00
4db0d3c6af
[*] Regressed written length check in: 7100c807
2023-08-15 08:45:44 +01:00
1f173a8799
[*] Begin resolving 8 months of Linux neglect
2023-08-11 16:51:42 +01:00
7100c807c8
[*] Unify FS write utilities
2023-08-11 06:21:42 +01:00
424cccd00a
[+] IAsyncTransaction::HasCompleted
2023-08-09 00:14:36 +01:00
df6f29bf38
[+] IAsyncTransaction::SetBaseOffset
2023-08-09 00:02:35 +01:00
3ff5d8a74e
[*] NT FSStream: Added more push debug errors
2023-07-29 10:13:25 +01:00
c05a859638
[*] nt: fix new blocking over async paths (eos handling)
2023-07-29 10:07:27 +01:00
a79caa707f
[*] autism
2023-07-29 10:00:16 +01:00
a8daf3ff4f
[*] Minor failover fix (Nt delete on close)
2023-07-29 09:48:18 +01:00
9ce4e08d36
[+] IFileStream::GetHandle()
2023-07-29 09:13:43 +01:00
7e2aa2de3d
[+] AuIO::IIOHandle
2023-07-29 08:02:47 +01:00
0cf38d5fcd
[*] Fix: IPC test fails on Windows 7
2023-07-28 17:54:30 +01:00
7fa0a52e2c
[*] Fix FS Watcher under Windows XP -> Windows 7
2023-07-28 14:20:45 +01:00
d45dc977d8
[*] NT: Further reduce Win32 link-time requirements cont ( 1948dd0c
)
2023-07-24 12:48:42 +01:00
1948dd0c1a
[*] Further reduce Win32 link-time requirements
2023-07-24 07:17:08 +01:00
4d1201a4c1
[+] EStreamForward::eNewConsoleWindow
...
[*] NT: Improve the selection of flags used when spawning processes
[*] NT: Caught regression in NTs FS/generic transaction IsSignaled
2023-07-06 13:44:32 +01:00
ca2c0462ab
[*] Continue to refactor allocations of synchronization primitive away
...
[*] NT: Fix missing CoTaskMemFree leak on startup
[*] Fix ConsoleStd restart bug
2023-06-28 10:33:12 +01:00
1fa433540b
[*] Experimental lower-latency IO pipes
...
[*] revert win32 net tx hardening - do not use the Reset function to null pSocket
[*] fix a bytebuffer circular buffer path
[*] update how TLS protocol stacks can snap the stack
2023-05-11 16:05:00 +01:00
2fdf730263
[*] Stats now return nanoseconds timestamps
2023-05-03 08:57:21 +01:00
30b0c2e0ba
[*] Preemptive GetOverlappedResult fast-paths under WaitMultiple2 that rely on the alertable yield under next read/write cannot be trusted if the read count is zero.
...
Direct IO-specific quirk?
Windows 7 specific quirk?
Direct IO under Win7 specific quirk?
idk, but this fixes it
2023-04-26 07:25:45 +01:00
00129255f8
[*] changed this to be a soft-failure
2023-04-19 04:03:49 +01:00
53a29a6c13
[*] flag consistency
2023-04-16 23:41:06 +01:00
4cac821fbb
[+] Added critical log level
...
[*] Fix win32 DELETE bug
2023-04-16 23:38:31 +01:00