Drop autoloading kernel32 symbols available since Vista
This commit is contained in:
parent
450b2dc8ed
commit
9d163cf80c
|
@ -577,14 +577,9 @@ LoadDLLfunc (GetUdpTable, 12, iphlpapi)
|
|||
LoadDLLfunc (if_indextoname, 8, iphlpapi)
|
||||
LoadDLLfunc (if_nametoindex, 4, iphlpapi)
|
||||
|
||||
LoadDLLfunc (CreateSymbolicLinkW, 12, kernel32)
|
||||
LoadDLLfuncEx2 (DiscardVirtualMemory, 8, kernel32, 1, 127)
|
||||
LoadDLLfuncEx (GetLogicalProcessorInformationEx, 12, kernel32, 1)
|
||||
LoadDLLfuncEx (GetNamedPipeClientProcessId, 8, kernel32, 1)
|
||||
LoadDLLfunc (GetSystemTimePreciseAsFileTime, 4, kernel32)
|
||||
LoadDLLfuncEx (IdnToAscii, 20, kernel32, 1)
|
||||
LoadDLLfuncEx (IdnToUnicode, 20, kernel32, 1)
|
||||
LoadDLLfunc (LocaleNameToLCID, 8, kernel32)
|
||||
LoadDLLfuncEx (PrefetchVirtualMemory, 16, kernel32, 1)
|
||||
LoadDLLfunc (SetThreadGroupAffinity, 12, kernel32)
|
||||
|
||||
|
|
|
@ -1556,9 +1556,6 @@ fhandler_pty_master::pty_master_thread ()
|
|||
termios_printf ("ReadFile, %E");
|
||||
goto reply;
|
||||
}
|
||||
/* This function is only available since Vista, unfortunately.
|
||||
In earlier OSes we simply have to believe that the client
|
||||
has no malicious intent (== sends arbitrary PIDs). */
|
||||
if (!GetNamedPipeClientProcessId (master_ctl, &pid))
|
||||
pid = req.pid;
|
||||
if (get_object_sd (input_available_event, sd))
|
||||
|
|
Loading…
Reference in New Issue