Commit Graph

1061 Commits

Author SHA1 Message Date
ab6f00f094 [*] NT build regression 2023-09-17 00:35:23 +01:00
a4f6db7ec9 [*] Linux IPC reliability: finally got around to closing #48 2023-09-16 23:30:10 +01:00
f2339bb0a9 [+] AuIO::Loop::NewLSIOHandle(const AuSPtr<IIOHandle> &pHandle)
[-] Rip 2021-10-1 LSCondVar
2023-09-16 22:59:26 +01:00
f13efd0cbf [+] AuProcesses::IProcess::GetOutputAndInputHandles()
[+] AuProcesses::IProcess::GetErrorStreamHandle()
2023-09-16 22:08:10 +01:00
644c294c36 [+] Unix AuProcesses: missing optAffinity support 2023-09-16 21:49:30 +01:00
841fa39321 [*] CmdLine has been deserving of the Au prefix for quite some time 2023-09-16 21:33:38 +01:00
6c5e99ba8f [-] ...an api that shouldn't exist anymore 2023-09-16 21:12:50 +01:00
7010155916 [*] Improved schedular regressed intraprocess command dispatch of main thread cmds 2023-09-16 18:08:27 +01:00
9a294cf955 [*] (Mostly Linux) Harden FS apis 2023-09-16 01:20:28 +01:00
9bfd895fc4 [*] Linux: replace the initial map scanners aggressive filtering to not dismiss potential hits. Also parses file offsets for these section maps. 2023-09-15 23:50:00 +01:00
e3a493bf9c [+] const AuList<AuString> &AuCmdLine::GetValues(const AuString &key) 2023-09-15 20:12:01 +01:00
ac86fd481b [*] caught runtime regressions 2023-09-15 18:21:47 +01:00
d0fb19f87e [*] Global build regressions caused by addd4080 2023-09-15 18:09:34 +01:00
d49d4ad4fc [*] addd4080 cont 2023-09-15 16:54:21 +01:00
addd4080b2 [*] Adjust PId_t::pool null behaviour 2023-09-15 16:48:55 +01:00
3ba93439c8 [*] NT Processes: GetProcessId() now returns a pointer to a _PROCESS_INFORMATION struct 2023-09-15 16:25:40 +01:00
67b047eead [*] UNIX Processes: fix overmap regression in (d166a00d) and added support for envblock updates missing in (d166a00d) 2023-09-15 16:03:41 +01:00
a80524d573 [-] AuProcesses::EStandardHandle 2023-09-15 15:55:46 +01:00
d166a00d81 [*] Linux: begin catching up AuProcesses to NT 2023-09-15 00:11:14 +01:00
81775a76bf [*] Linux: build regressions 2023-09-15 00:10:40 +01:00
0f88b16395 [*] d0538ea4 cont support for CreateFile2W if required 2023-09-14 03:02:42 +01:00
db8db7b0cc [+] Secret visible symbol: Aurora::Win32Open/AuWin32Open 2023-09-13 15:35:09 +01:00
599d77e341 [*] default args for Win32Open bc lazy 2023-09-13 15:09:53 +01:00
c79b0b5921 [*] missing W suffix 2023-09-13 14:17:45 +01:00
fe8ef28930 [*] tism 2023-09-13 04:04:45 +01:00
f177b67e1f [*] GetLastError() == ERROR_FILE_EXISTS fast path 2023-09-13 03:48:10 +01:00
18ac961ac9 [*] (dwFlags & 0x4ffff7) && (!pCreateFile2) check
[*] (dwAttributes & 0xFFB00008) && (!pCreateFile2)
2023-09-13 03:38:59 +01:00
b4d5f4c127 [+] AuIO::IO::EStandardStream
[+] AuIO::IOHandle::InitFromStreamEnum(...)
2023-09-13 02:50:59 +01:00
d0538ea4de [*] NT/Win32-like: Use Win32Open as opposed to CreateFileW 2023-09-13 02:27:18 +01:00
a8696c0b7e [*] ...no 2023-09-13 00:02:26 +01:00
729c9f8508 [*] Ensure WaitFor always respects 0 timeouts, no matter the flags 2023-09-12 22:06:55 +01:00
6ff27c6855 [*] This was bothering me - 4b0a7c65 cont 2023-09-12 21:56:58 +01:00
6181d97c3c [*] Improve internal path consistency
[*] Removes some unnecessary panics
2023-09-12 20:49:02 +01:00
bf03124f92 [+] AuThreading::TryWait 2023-09-12 18:47:25 +01:00
8e54071d60 [-] Remove 2 year old 0.0 WaitFor back-off implementation 2023-09-12 18:30:45 +01:00
4b0a7c651a [*] Guess I should finalize this for linux. The verbosity of writing a cas in the wait loops is stupid if we arent doing anything special with the bits. 2023-09-12 16:12:54 +01:00
00260294b2 [*] Guess this got twisted, or maybe my intention was to zero out if we cant get accurate topology from apic bits; i don't recall 2023-09-12 14:11:09 +01:00
403c186f0a [*] Improve NT semaphore: use a different internal api now. Might help uncontested servers with work queues using semaphores 2023-09-12 13:28:46 +01:00
ffd61d4d54 [*] NT: AuProcess this is better 2023-09-12 02:01:12 +01:00
b46390f83a [*] Remove explicit Windows version check assuming certain file systems and platforms can be stupid 2023-09-12 01:35:54 +01:00
6062a16d9c [*] Prevent overflow into UNC root namespace of hostnames and volumes via path or filename overflow 2023-09-12 00:52:16 +01:00
92593be412 [*] FS path mitigation: begin to handle >= MAX_PATHs by enforcing UNC \\?\ prefixes across every single Win32/NT api we hit (if relevant. im sure some long paths may still break things.) 2023-09-10 23:49:47 +01:00
d727859cc2 [*] Linux/Modern NT regression in new optimized event wait path 2023-09-10 23:06:58 +01:00
22efbff12f [*] 74dc6772 cont: this structure is going to be padded to 32bits anyway. this makes the atomic operations easier 2023-09-10 18:10:36 +01:00
4915c5e6bf [*] dont like me stds' - big baz 2023-09-10 17:58:36 +01:00
5107911ba5 [*] Exploit mitigation - file protocols can be valid paths 2023-09-10 16:30:59 +01:00
445085d069 [*] old win32 - fix c6c35a58: missing ms to ns conversion 2023-09-10 15:51:26 +01:00
b539cfb353 [*] 74dc6772 cont: improvements 2023-09-10 15:04:32 +01:00
c6c35a588c [*] Switch to astatic Aurora::Utility::RateLimiter limiter` for gRuntimeConfig.threadingConfig.bWinXpThrough7BlazeOptimizerPower 2023-09-10 14:53:54 +01:00
74dc6772b0 [+] Non-mutually exclusive binary semaphore / event wait path
[+] ThreadingConfig::gPreferFutexEvent
2023-09-10 14:50:59 +01:00