Commit Graph

186 Commits

Author SHA1 Message Date
7bc533b710 [*] More POSIX bugs 2023-09-20 21:13:43 +01:00
4fa053ce97 [*] Harden POSIX FS Remove 2023-09-20 20:17:42 +01:00
5d12f1a203 [*] Resolve IO regressions (4. Hello FS) (Mostly UNIX) 2023-09-18 07:11:34 +01:00
11ef18cbf0 [*] moar regressions :( 2023-09-18 06:09:29 +01:00
09b044ab2e [*] amend 9be76adb23 2023-09-17 22:21:24 +01:00
9be76adb23 [*] Further drop required symbols from OLE (COM) and SHELL32 (NT Shell)
[*] Optimize NT file and URI opener
2023-09-17 21:33:14 +01:00
84c0e94282 [*] 523abaf0 cont: not so sure on the UNIX-like variant either 2023-09-17 14:03:03 +01:00
523abaf0bb [*] security: bIsIntranetTrusted not properly respected 2023-09-17 13:57:58 +01:00
9a294cf955 [*] (Mostly Linux) Harden FS apis 2023-09-16 01:20:28 +01:00
d0538ea4de [*] NT/Win32-like: Use Win32Open as opposed to CreateFileW 2023-09-13 02:27:18 +01:00
a8696c0b7e [*] ...no 2023-09-13 00:02:26 +01:00
6181d97c3c [*] Improve internal path consistency
[*] Removes some unnecessary panics
2023-09-12 20:49:02 +01:00
b46390f83a [*] Remove explicit Windows version check assuming certain file systems and platforms can be stupid 2023-09-12 01:35:54 +01:00
6062a16d9c [*] Prevent overflow into UNC root namespace of hostnames and volumes via path or filename overflow 2023-09-12 00:52:16 +01:00
92593be412 [*] FS path mitigation: begin to handle >= MAX_PATHs by enforcing UNC \\?\ prefixes across every single Win32/NT api we hit (if relevant. im sure some long paths may still break things.) 2023-09-10 23:49:47 +01:00
5107911ba5 [*] Exploit mitigation - file protocols can be valid paths 2023-09-10 16:30:59 +01:00
d112179c83 [*] May as well make this in line with the others 2023-09-04 16:45:42 +01:00
bcf3fabd83 [*] FS Resources (GetWritableAppdata): fail over to this path instead of failing 2023-09-04 16:32:28 +01:00
47cec914cb [*] Refactor FIOConfig::ddefaultBrand -> (AuOptional) FIOConfig::optDefaultBrand
[+] FIOConfig::bIsIntranetTrusted
2023-08-29 21:10:53 +01:00
b5a452a43d [+] AuFS::IsFileBlocked
[+] AuFS::IsFileTrusted
2023-08-29 20:30:09 +01:00
3503d0ec68 [+] Added Linux signal configuration and separate LinuxConfig type (LinuxConfig)
[*] Fix Linux regressions in previous NT commit
2023-08-29 03:11:28 +01:00
5cf7533eab [*] Linux and UNIX QOL 2023-08-27 12:42:10 +01:00
cf363b9f5b [*] Ensure this never throws 2023-08-22 09:45:32 +01:00
ebce7e0048 [*] Alternative solution for FOLDERID_UserProgramFiles when targeting <= Windows Vista 2023-08-18 18:38:11 +01:00
78634d11db [*] NT File Stream: unlikely race condition 2023-08-15 14:48:54 +01:00
3df8621944 [+] NT: IOHandle::IsFile(), IOHandle::IsTTY(), IOHandle::IsPipe()
[*] Revert to supporting write-only handles
2023-08-15 14:46:21 +01:00
9cea2fe82a [*] This was bothering me 2023-08-15 14:19:23 +01:00
79371fc82f [*] Linux stat regression? 2023-08-15 09:03:22 +01:00
4db0d3c6af [*] Regressed written length check in: 7100c807 2023-08-15 08:45:44 +01:00
1f173a8799 [*] Begin resolving 8 months of Linux neglect 2023-08-11 16:51:42 +01:00
7100c807c8 [*] Unify FS write utilities 2023-08-11 06:21:42 +01:00
424cccd00a [+] IAsyncTransaction::HasCompleted 2023-08-09 00:14:36 +01:00
df6f29bf38 [+] IAsyncTransaction::SetBaseOffset 2023-08-09 00:02:35 +01:00
3ff5d8a74e [*] NT FSStream: Added more push debug errors 2023-07-29 10:13:25 +01:00
c05a859638 [*] nt: fix new blocking over async paths (eos handling) 2023-07-29 10:07:27 +01:00
a79caa707f [*] autism 2023-07-29 10:00:16 +01:00
a8daf3ff4f [*] Minor failover fix (Nt delete on close) 2023-07-29 09:48:18 +01:00
9ce4e08d36 [+] IFileStream::GetHandle() 2023-07-29 09:13:43 +01:00
7e2aa2de3d [+] AuIO::IIOHandle 2023-07-29 08:02:47 +01:00
0cf38d5fcd [*] Fix: IPC test fails on Windows 7 2023-07-28 17:54:30 +01:00
7fa0a52e2c [*] Fix FS Watcher under Windows XP -> Windows 7 2023-07-28 14:20:45 +01:00
d45dc977d8 [*] NT: Further reduce Win32 link-time requirements cont (1948dd0c) 2023-07-24 12:48:42 +01:00
1948dd0c1a [*] Further reduce Win32 link-time requirements 2023-07-24 07:17:08 +01:00
4d1201a4c1 [+] EStreamForward::eNewConsoleWindow
[*] NT: Improve the selection of flags used when spawning processes
[*] NT: Caught regression in NTs FS/generic transaction IsSignaled
2023-07-06 13:44:32 +01:00
ca2c0462ab [*] Continue to refactor allocations of synchronization primitive away
[*] NT: Fix missing CoTaskMemFree leak on startup
[*] Fix ConsoleStd restart bug
2023-06-28 10:33:12 +01:00
1fa433540b [*] Experimental lower-latency IO pipes
[*] revert win32 net tx hardening - do not use the Reset function to null pSocket
[*] fix a bytebuffer circular buffer path
[*] update how TLS protocol stacks can snap the stack
2023-05-11 16:05:00 +01:00
2fdf730263 [*] Stats now return nanoseconds timestamps 2023-05-03 08:57:21 +01:00
30b0c2e0ba [*] Preemptive GetOverlappedResult fast-paths under WaitMultiple2 that rely on the alertable yield under next read/write cannot be trusted if the read count is zero.
Direct IO-specific quirk?
Windows 7 specific quirk?
Direct IO under Win7 specific quirk?
idk, but this fixes it
2023-04-26 07:25:45 +01:00
00129255f8 [*] changed this to be a soft-failure 2023-04-19 04:03:49 +01:00
53a29a6c13 [*] flag consistency 2023-04-16 23:41:06 +01:00