- Timestamp:
- Nov 5, 2000, 2:40:47 PM (25 years ago)
- Location:
- trunk/src/kernel32
- Files:
-
- 5 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/src/kernel32/exceptstackdump.cpp
r3528 r4555 1 /* $Id: exceptstackdump.cpp,v 1. 2 2000-05-13 07:16:11sandervl Exp $ */1 /* $Id: exceptstackdump.cpp,v 1.3 2000-11-05 13:40:45 sandervl Exp $ */ 2 2 /* 3 3 * Stack dump code … … 240 240 // dprintf(("skiploop %x (rc %x, Attr %x Size %d)\n", *stacktop, rc, Attr, Size)); 241 241 if(WinExe && WinExe->insideModule(addr) && WinExe->insideModuleCode(addr)) { 242 sprintf(Name, "%s .EXE", WinExe->getModuleName());242 sprintf(Name, "%s", WinExe->getModuleName()); 243 243 dprintf(("%-13s at 0x%08x\n", Name, addr)); 244 244 } … … 246 246 Win32DllBase *dll = Win32DllBase::findModuleByAddr(addr); 247 247 if(dll && dll->insideModuleCode(addr)) { 248 sprintf(Name, "%s .DLL", dll->getModuleName());248 sprintf(Name, "%s", dll->getModuleName()); 249 249 dprintf(("%-13s at 0x%08x\n", Name, addr)); 250 250 } … … 291 291 else { 292 292 if(WinExe && WinExe->insideModule(addr) && WinExe->insideModuleCode(addr)) { 293 sprintf(Name, "%s .EXE", WinExe->getModuleName());293 sprintf(Name, "%s", WinExe->getModuleName()); 294 294 dprintf(("%-13s at 0x%08x\n", Name, addr)); 295 295 } … … 297 297 Win32DllBase *dll = Win32DllBase::findModuleByAddr(addr); 298 298 if(dll && dll->insideModuleCode(addr)) { 299 sprintf(Name, "%s .DLL", dll->getModuleName());299 sprintf(Name, "%s", dll->getModuleName()); 300 300 dprintf(("%-13s at 0x%08x\n", Name, addr)); 301 301 } … … 309 309 addr = pCtxRec->ctx_RegEip; 310 310 if(WinExe && WinExe->insideModule(addr) && WinExe->insideModuleCode(addr)) { 311 sprintf(Name, "%s .EXE", WinExe->getModuleName());311 sprintf(Name, "%s", WinExe->getModuleName()); 312 312 dprintf(("%-13s at 0x%08x\n", Name, addr)); 313 313 } … … 315 315 Win32DllBase *dll = Win32DllBase::findModuleByAddr(addr); 316 316 if(dll && dll->insideModuleCode(addr)) { 317 sprintf(Name, "%s .DLL", dll->getModuleName());317 sprintf(Name, "%s", dll->getModuleName()); 318 318 dprintf(("%-13s at 0x%08x\n", Name, addr)); 319 319 } -
trunk/src/kernel32/oslibdos.cpp
r4474 r4555 1 /* $Id: oslibdos.cpp,v 1. 49 2000-10-10 17:14:04sandervl Exp $ */1 /* $Id: oslibdos.cpp,v 1.50 2000-11-05 13:40:45 sandervl Exp $ */ 2 2 /* 3 3 * Wrappers for OS/2 Dos* API … … 2037 2037 2038 2038 2039 HINSTANCE OSLibDosLoadModule(LPSTR szModName) 2040 { 2041 APIRET rc; 2042 HMODULE hModule = NULLHANDLE; 2043 char name[ CCHMAXPATH ]; 2044 2045 rc = DosLoadModule(name, CCHMAXPATH, szModName, &hModule); 2046 if(rc) { 2047 SetLastError(error2WinError(rc,ERROR_FILE_NOT_FOUND)); 2048 return 0; 2049 } 2050 SetLastError(ERROR_SUCCESS_W); 2051 return hModule; 2052 } 2053 2039 2054 ULONG OSLibDosQuerySysInfo(ULONG iStart, ULONG iLast, PVOID pBuf, ULONG cbBuf) 2040 2055 { -
trunk/src/kernel32/oslibdos.h
r4473 r4555 1 /* $Id: oslibdos.h,v 1.2 5 2000-10-09 22:51:19sandervl Exp $ */1 /* $Id: oslibdos.h,v 1.26 2000-11-05 13:40:46 sandervl Exp $ */ 2 2 3 3 /* … … 285 285 ULONG OSLibDosQueryModuleName(ULONG hModule, int cchName, char *pszName); 286 286 ULONG OSLibDosQueryDir(DWORD length, LPSTR lpszCurDir); 287 288 HINSTANCE OSLibDosLoadModule(LPSTR szModName); -
trunk/src/kernel32/winimagepeldr.cpp
r4523 r4555 1 /* $Id: winimagepeldr.cpp,v 1.6 3 2000-10-23 13:42:45sandervl Exp $ */1 /* $Id: winimagepeldr.cpp,v 1.64 2000-11-05 13:40:46 sandervl Exp $ */ 2 2 3 3 /* … … 777 777 realBaseAddress = 0; 778 778 779 //Allocated in peldr.dll779 //Allocated in by pe.exe 780 780 if(reservedMem && reservedMem == oh.ImageBase) { 781 781 realBaseAddress = oh.ImageBase; -
trunk/src/kernel32/wprocess.cpp
r4523 r4555 1 /* $Id: wprocess.cpp,v 1.10 6 2000-10-23 13:42:47 sandervl Exp $ */1 /* $Id: wprocess.cpp,v 1.107 2000-11-05 13:40:47 sandervl Exp $ */ 2 2 3 3 /* … … 791 791 * Endif 792 792 */ 793 //only call O pen32 if LX binary or win32k process793 //only call OS/2 if LX binary or win32k process 794 794 if(!fPeLoader || fPE != ERROR_SUCCESS) 795 795 { 796 hDll = O 32_LoadLibrary(szModname);796 hDll = OSLibDosLoadModule(szModname); 797 797 if (hDll) 798 798 { … … 818 818 return hDll; //happens when LoadLibrary is called in kernel32's initterm (nor harmful) 819 819 820 dprintf(("KERNEL32: LoadLibraryExA(%s, 0x%x, 0x%x): returns 0x%x. Loaded %s using O32_LoadLibrary.",820 dprintf(("KERNEL32: LoadLibraryExA(%s, 0x%x, 0x%x): returns 0x%x. Loaded %s using DosLoadModule.", 821 821 lpszLibFile, hFile, dwFlags, hDll, szModname)); 822 822 return pModule->getInstanceHandle(); 823 823 } 824 dprintf(("KERNEL32: LoadLibraryExA(%s, 0x%x, 0x%x): O32_LoadLibrary(%s) failed. LastError=%d",824 dprintf(("KERNEL32: LoadLibraryExA(%s, 0x%x, 0x%x): DosLoadModule (%s) failed. LastError=%d", 825 825 lpszLibFile, hFile, dwFlags, szModname, GetLastError())); 826 826 }
Note:
See TracChangeset
for help on using the changeset viewer.