Commit Graph

2007 Commits

Author SHA1 Message Date
Ben Vanik 5954d23438 Merge branch 'debug' 2015-05-09 18:01:40 -07:00
Ben Vanik 7a00b76a6e Debugger stuff, and changing to vcproj's/sln. 2015-05-09 17:48:12 -07:00
Ben Vanik 9ba1a84370 Merge pull request #199 from DrChat/ui_setup
Setup UI menu code
2015-05-09 15:40:37 -07:00
Dr. Chat 459024059a Setup UI menu code 2015-05-09 17:32:55 -05:00
Ben Vanik 4411a4499d XEX-style exports, dumping exports, and prepping kernel export lookup. 2015-05-09 00:59:03 -07:00
Ben Vanik 23eb343484 Calling DllMain, fixing ref count, and fixing module search. 2015-05-09 00:56:42 -07:00
Ben Vanik 0c646f4bc2 Prevent some stack overflows in MMIO handler. 2015-05-09 00:53:28 -07:00
Ben Vanik ca2beb4f65 Merge pull request #198 from DrChat/module_entry
Initialize modules in XexLoadImage
2015-05-08 20:55:18 -07:00
Dr. Chat 0f2b1491b7 Call a DLL's entry-point function in XexLoadImage 2015-05-08 22:51:03 -05:00
Dr. Chat 8deb622abb Execute module entry-point function if it has one. 2015-05-08 22:50:54 -05:00
Ben Vanik 94c62b91d0 --trace_functions and --trace_function_coverage 2015-05-05 22:44:36 -07:00
Ben Vanik ade5388728 bool-ifying xe::cpu 2015-05-05 18:52:54 -07:00
Ben Vanik a38b05db24 Chunked mapped memory writer. 2015-05-05 18:52:53 -07:00
Ben Vanik 499bed21c0 Moving debugger. 2015-05-05 18:52:53 -07:00
Ben Vanik b07d5b8ed3 Fixing compile warnings. 2015-05-05 18:52:37 -07:00
Ben Vanik 3f1131c65f Merge pull request #197 from DrChat/export_ordinal
Find Xexport by ordinal
2015-05-05 16:57:08 -07:00
Dr. Chat bffd2624fc Lookup XEX export by ordinal 2015-05-05 18:54:01 -05:00
Rick Gibbed 7898851856 Merge pull request #196 from DrChat/vec_shl
Emulated VECTOR_SHR 32-bit instruction
2015-05-05 16:02:35 -05:00
Dr. Chat 2e9aec194f Ctrl+C Ctrl+V 2015-05-05 16:00:41 -05:00
Dr. Chat 26d8858684 Emulated vector shr 2015-05-05 15:58:51 -05:00
Rick Gibbed abf97ea44d Merge pull request #195 from DrChat/emulation
Emulate some vector arithmetic opcodes (until we get a native implementation)
2015-05-05 15:41:15 -05:00
Dr. Chat cb127ae9ba Emulate some vector arithmetic opcodes (until we get a native implementation) 2015-05-05 15:39:37 -05:00
Ben Vanik 966e520ac5 Merge pull request #194 from DrChat/launchtitle_params
XamLoaderLaunchTitle log parameters
2015-05-05 13:19:01 -07:00
Dr. Chat 54d84f04e3 XamLoaderLaunchTitle log parameters 2015-05-05 15:17:45 -05:00
Ben Vanik 87811bbf2b Merge pull request #193 from DrChat/alt_sha_splat
OPCODE_VECTOR_SHA and SPLAT_I16 for non-AVX2 CPUs
2015-05-05 12:37:24 -07:00
Dr. Chat cff09a4509 OPCODE_VECTOR_SHA and SPLAT_I16 for non-AVX2 CPUs 2015-05-05 14:35:37 -05:00
gibbed 3249f84700 It's vpblendw. 2015-05-05 13:58:21 -05:00
gibbed 6694461698 Fixed ecx restore in EmitShlXX/EmitShrXX/EmitShaXX. 2015-05-05 13:58:03 -05:00
Ben Vanik 743e01209b Update x64_sequences.cc 2015-05-05 10:23:04 -07:00
Rick Gibbed c2b0b7ec23 Merge pull request #192 from DrChat/permute_alt
PERMUTE_I32 Non-AVX2 Instructions
2015-05-05 12:19:53 -05:00
Dr. Chat c3f1e74814 And actually use vpblendw 2015-05-05 12:16:38 -05:00
Dr. Chat c1f9952cbd PERMUTE_I32 Alternative instructions 2015-05-05 12:16:31 -05:00
Ben Vanik 539365def2 Merge pull request #191 from DrChat/cntlz_fix
Fix CNTLZ (I think)
2015-05-05 06:57:48 -07:00
Dr. Chat 0e836f2eec Fix CNTLZ (I think)
SAR alt. instruction
2015-05-05 08:53:41 -05:00
Ben Vanik 649eb1cf8e Merge pull request #190 from DrChat/load_module
XexLoadImage support for user modules
2015-05-04 20:32:12 -07:00
Ben Vanik 442e5f2840 clang-format 2015-05-04 20:24:02 -07:00
Ben Vanik 0f14575592 Shrinking debug info. 2015-05-04 20:24:02 -07:00
Dr. Chat 1b111f0313 Thread safety 2015-05-04 22:16:48 -05:00
Dr. Chat f12a8dbe20 Release modules on destruction 2015-05-04 22:07:58 -05:00
Dr. Chat 9f0663efa2 XexLoadImage for user modules 2015-05-04 22:03:14 -05:00
Ben Vanik 00c1b5fbbc Merge pull request #189 from DrChat/oops
Whoops (fix XexGetProcedureAddress)
2015-05-04 19:41:26 -07:00
Dr. Chat d86674ed82 Whoops 2015-05-04 21:39:43 -05:00
Ben Vanik c4784e6dcd Merge pull request #187 from DrChat/upstream
XexGetProcedureAddress by proc name
2015-05-04 18:59:37 -07:00
Dr. Chat 9603a0a683 Formatting 2015-05-04 20:58:30 -05:00
Dr. Chat 1571c51a56 Kill some unused code 2015-05-04 20:33:04 -05:00
Dr. Chat e90475a31b kill the TODO 2015-05-04 20:26:18 -05:00
Ben Vanik 549d37bfac Merge pull request #188 from DrChat/protected_tests
Protect PPC test with __try __except
2015-05-04 18:18:52 -07:00
Dr. Chat bb398f32ca Guard test code with __try __except 2015-05-04 20:12:02 -05:00
Dr. Chat 6a602affed Don't parse loader export table for now (since it's referenced to with an exact address) 2015-05-04 18:16:31 -05:00
Dr. Chat 211cd0760a Use header->exe_address instead (in-case the module is relocated) 2015-05-04 18:11:39 -05:00