Paul Gofman
|
8eacd3e507
server: Store PE image info in process structure.
|
2 years ago |
Alexandre Julliard
|
e3001b6a7c
configure: Assume that sys/mman.h is available on Unix.
|
2 years ago |
Alexandre Julliard
|
c954e5b9e6
server: Avoid using wine/port.h.
|
3 years ago |
Alexandre Julliard
|
93609869c8
server: Avoid mkstemps().
|
3 years ago |
Zebediah Figura
|
4f1c7ba5f9
server: Cancel asyncs through fd_ops.
|
3 years ago |
Alexandre Julliard
|
b08b4b8213
server: Store the entry point as image-relative in pe_image_info_t.
|
3 years ago |
Alexandre Julliard
|
649f70aba7
server: Don't generate dll load event for native binaries on Wow64.
|
3 years ago |
Qian Hong
|
4e84a553a8
ntdll: Truncate files through the server.
|
3 years ago |
Alexandre Julliard
|
2ff7a7676c
server: Add a native_machine global variable.
|
3 years ago |
Zebediah Figura
|
aa61e519d5
server: Free the old process image name if a second process image is mapped (Valgrind).
|
3 years ago |
Alexandre Julliard
|
734e3a91ac
server: Only the first mapping needs to be an image in NtAreMappedFilesTheSame().
|
3 years ago |
Alexandre Julliard
|
94d19eff22
server: Use a 64-bit machine for IL executables.
|
3 years ago |
Alexandre Julliard
|
8d50c34655
server: Check the supported machines list to validate an image mapping.
|
3 years ago |
Alexandre Julliard
|
a51f26badf
server: Return the process machine from the main exe instead of a CPU flag.
|
3 years ago |
Alexandre Julliard
|
191fd47e38
server: Get rid of the remaining PowerPC support.
|
3 years ago |
Zebediah Figura
|
101082253f
server: Do not forbid closing fd handles in other processes.
|
3 years ago |
Alexandre Julliard
|
cc9446f874
server: Don't change the reported machine for COM+ images.
|
3 years ago |
Alexandre Julliard
|
86947587d2
server: Remove the redundant cpu field in the PE image information.
|
3 years ago |
Alexandre Julliard
|
6531f262e3
server: Return the file name for image mappings in the get_mapping_info request.
|
3 years ago |
Alexandre Julliard
|
3c9b5379d1
server: Store a copy of the image file name in the process.
|
3 years ago |
Alexandre Julliard
|
9ce326eea0
server: Store a filename for memory views of .so dlls.
|
3 years ago |
Alexandre Julliard
|
ea33192660
server: Report load dll events upon mapping a SEC_IMAGE view.
|
3 years ago |
Alexandre Julliard
|
bd0a3c1a59
kernelbase: Implement GetMappedFileNameA/W.
|
3 years ago |
Alexandre Julliard
|
3472387777
server: Implement NtQueryVirtualMemory(MemorySectionName).
|
3 years ago |
Alexandre Julliard
|
3bb5381587
server: Return the NT name for the ProcessImageFileName query.
|
3 years ago |
Alexandre Julliard
|
d6ef9401b3
server: Use the object type information to implement access mapping.
|
3 years ago |
Alexandre Julliard
|
4d646de90d
server: Add generic mapping masks for all object types.
|
3 years ago |
Alexandre Julliard
|
c6f2aacb57
server: Add a type descriptor to all server objects.
|
3 years ago |
Alexandre Julliard
|
123023eac7
server: Fetch the data for the debug events from the process memory views.
|
3 years ago |
Alexandre Julliard
|
ced3892c65
ntdll: Create a SEC_IMAGE view also for .so builtins.
|
3 years ago |