ntdll: Add SEH information to ARM64EC breakpoints.
[wine.git] / dlls / ntdll / signal_arm64ec.c
bloba2b21f51ead286fddc3e935fe1172ab250a21216
1 /*
2 * ARM64EC signal handling routines
4 * Copyright 1999, 2005, 2023 Alexandre Julliard
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2.1 of the License, or (at your option) any later version.
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
21 #ifdef __arm64ec__
23 #include <stdlib.h>
24 #include <stdarg.h>
26 #include "ntstatus.h"
27 #define WIN32_NO_STATUS
28 #include "windef.h"
29 #include "winternl.h"
30 #include "wine/exception.h"
31 #include "wine/list.h"
32 #include "ntdll_misc.h"
33 #include "unwind.h"
34 #include "wine/debug.h"
35 #include "ntsyscalls.h"
37 WINE_DEFAULT_DEBUG_CHANNEL(seh);
38 WINE_DECLARE_DEBUG_CHANNEL(relay);
40 /*******************************************************************
41 * syscalls
43 enum syscall_ids
45 #define SYSCALL_ENTRY(id,name,args) __id_##name = id,
46 ALL_SYSCALLS64
47 #undef SYSCALL_ENTRY
50 #define SYSCALL_API __attribute__((naked))
51 #define SYSCALL_FUNC(name) __ASM_SYSCALL_FUNC( __id_##name, name )
53 NTSTATUS SYSCALL_API NtAcceptConnectPort( HANDLE *handle, ULONG id, LPC_MESSAGE *msg, BOOLEAN accept,
54 LPC_SECTION_WRITE *write, LPC_SECTION_READ *read )
56 SYSCALL_FUNC( NtAcceptConnectPort );
59 NTSTATUS SYSCALL_API NtAccessCheck( PSECURITY_DESCRIPTOR descr, HANDLE token, ACCESS_MASK access,
60 GENERIC_MAPPING *mapping, PRIVILEGE_SET *privs, ULONG *retlen,
61 ULONG *access_granted, NTSTATUS *access_status )
63 SYSCALL_FUNC( NtAccessCheck );
66 NTSTATUS SYSCALL_API NtAccessCheckAndAuditAlarm( UNICODE_STRING *subsystem, HANDLE handle,
67 UNICODE_STRING *typename, UNICODE_STRING *objectname,
68 PSECURITY_DESCRIPTOR descr, ACCESS_MASK access,
69 GENERIC_MAPPING *mapping, BOOLEAN creation,
70 ACCESS_MASK *access_granted, BOOLEAN *access_status,
71 BOOLEAN *onclose )
73 SYSCALL_FUNC( NtAccessCheckAndAuditAlarm );
76 NTSTATUS SYSCALL_API NtAddAtom( const WCHAR *name, ULONG length, RTL_ATOM *atom )
78 SYSCALL_FUNC( NtAddAtom );
81 NTSTATUS SYSCALL_API NtAdjustGroupsToken( HANDLE token, BOOLEAN reset, TOKEN_GROUPS *groups,
82 ULONG length, TOKEN_GROUPS *prev, ULONG *retlen )
84 SYSCALL_FUNC( NtAdjustGroupsToken );
87 NTSTATUS SYSCALL_API NtAdjustPrivilegesToken( HANDLE token, BOOLEAN disable, TOKEN_PRIVILEGES *privs,
88 DWORD length, TOKEN_PRIVILEGES *prev, DWORD *retlen )
90 SYSCALL_FUNC( NtAdjustPrivilegesToken );
93 NTSTATUS SYSCALL_API NtAlertResumeThread( HANDLE handle, ULONG *count )
95 SYSCALL_FUNC( NtAlertResumeThread );
98 NTSTATUS SYSCALL_API NtAlertThread( HANDLE handle )
100 SYSCALL_FUNC( NtAlertThread );
103 NTSTATUS SYSCALL_API NtAlertThreadByThreadId( HANDLE tid )
105 SYSCALL_FUNC( NtAlertThreadByThreadId );
108 NTSTATUS SYSCALL_API NtAllocateLocallyUniqueId( LUID *luid )
110 SYSCALL_FUNC( NtAllocateLocallyUniqueId );
113 NTSTATUS SYSCALL_API NtAllocateUuids( ULARGE_INTEGER *time, ULONG *delta, ULONG *sequence, UCHAR *seed )
115 SYSCALL_FUNC( NtAllocateUuids );
118 NTSTATUS SYSCALL_API NtAllocateVirtualMemory( HANDLE process, PVOID *ret, ULONG_PTR zero_bits,
119 SIZE_T *size_ptr, ULONG type, ULONG protect )
121 SYSCALL_FUNC( NtAllocateVirtualMemory );
124 NTSTATUS SYSCALL_API NtAllocateVirtualMemoryEx( HANDLE process, PVOID *ret, SIZE_T *size_ptr, ULONG type,
125 ULONG protect, MEM_EXTENDED_PARAMETER *parameters,
126 ULONG count )
128 SYSCALL_FUNC( NtAllocateVirtualMemoryEx );
131 NTSTATUS SYSCALL_API NtAreMappedFilesTheSame(PVOID addr1, PVOID addr2)
133 SYSCALL_FUNC( NtAreMappedFilesTheSame );
136 NTSTATUS SYSCALL_API NtAssignProcessToJobObject( HANDLE job, HANDLE process )
138 SYSCALL_FUNC( NtAssignProcessToJobObject );
141 NTSTATUS SYSCALL_API NtCallbackReturn( void *ret_ptr, ULONG ret_len, NTSTATUS status )
143 SYSCALL_FUNC( NtCallbackReturn );
146 NTSTATUS SYSCALL_API NtCancelIoFile( HANDLE handle, IO_STATUS_BLOCK *io_status )
148 SYSCALL_FUNC( NtCancelIoFile );
151 NTSTATUS SYSCALL_API NtCancelIoFileEx( HANDLE handle, IO_STATUS_BLOCK *io, IO_STATUS_BLOCK *io_status )
153 SYSCALL_FUNC( NtCancelIoFileEx );
156 NTSTATUS SYSCALL_API NtCancelSynchronousIoFile( HANDLE handle, IO_STATUS_BLOCK *io,
157 IO_STATUS_BLOCK *io_status )
159 SYSCALL_FUNC( NtCancelSynchronousIoFile );
162 NTSTATUS SYSCALL_API NtCancelTimer( HANDLE handle, BOOLEAN *state )
164 SYSCALL_FUNC( NtCancelTimer );
167 NTSTATUS SYSCALL_API NtClearEvent( HANDLE handle )
169 SYSCALL_FUNC( NtClearEvent );
172 NTSTATUS SYSCALL_API NtClose( HANDLE handle )
174 SYSCALL_FUNC( NtClose );
177 NTSTATUS SYSCALL_API NtCommitTransaction( HANDLE transaction, BOOLEAN wait )
179 SYSCALL_FUNC( NtCommitTransaction );
182 NTSTATUS SYSCALL_API NtCompareObjects( HANDLE first, HANDLE second )
184 SYSCALL_FUNC( NtCompareObjects );
187 NTSTATUS SYSCALL_API NtCompareTokens( HANDLE first, HANDLE second, BOOLEAN *equal )
189 SYSCALL_FUNC( NtCompareTokens );
192 NTSTATUS SYSCALL_API NtCompleteConnectPort( HANDLE handle )
194 SYSCALL_FUNC( NtCompleteConnectPort );
197 NTSTATUS SYSCALL_API NtConnectPort( HANDLE *handle, UNICODE_STRING *name, SECURITY_QUALITY_OF_SERVICE *qos,
198 LPC_SECTION_WRITE *write, LPC_SECTION_READ *read, ULONG *max_len,
199 void *info, ULONG *info_len )
201 SYSCALL_FUNC( NtConnectPort );
204 static NTSTATUS SYSCALL_API syscall_NtContinue( ARM64_NT_CONTEXT *context, BOOLEAN alertable )
206 __ASM_SYSCALL_FUNC( __id_NtContinue, syscall_NtContinue );
209 NTSTATUS WINAPI NtContinue( CONTEXT *context, BOOLEAN alertable )
211 ARM64_NT_CONTEXT arm_ctx;
213 context_x64_to_arm( &arm_ctx, (ARM64EC_NT_CONTEXT *)context );
214 return syscall_NtContinue( &arm_ctx, alertable );
217 NTSTATUS SYSCALL_API NtCreateDebugObject( HANDLE *handle, ACCESS_MASK access,
218 OBJECT_ATTRIBUTES *attr, ULONG flags )
220 SYSCALL_FUNC( NtCreateDebugObject );
223 NTSTATUS SYSCALL_API NtCreateDirectoryObject( HANDLE *handle, ACCESS_MASK access, OBJECT_ATTRIBUTES *attr )
225 SYSCALL_FUNC( NtCreateDirectoryObject );
228 NTSTATUS SYSCALL_API NtCreateEvent( HANDLE *handle, ACCESS_MASK access, const OBJECT_ATTRIBUTES *attr,
229 EVENT_TYPE type, BOOLEAN state )
231 SYSCALL_FUNC( NtCreateEvent );
234 NTSTATUS SYSCALL_API NtCreateFile( HANDLE *handle, ACCESS_MASK access, OBJECT_ATTRIBUTES *attr,
235 IO_STATUS_BLOCK *io, LARGE_INTEGER *alloc_size,
236 ULONG attributes, ULONG sharing, ULONG disposition,
237 ULONG options, void *ea_buffer, ULONG ea_length )
239 SYSCALL_FUNC( NtCreateFile );
242 NTSTATUS SYSCALL_API NtCreateIoCompletion( HANDLE *handle, ACCESS_MASK access, OBJECT_ATTRIBUTES *attr,
243 ULONG threads )
245 SYSCALL_FUNC( NtCreateIoCompletion );
248 NTSTATUS SYSCALL_API NtCreateJobObject( HANDLE *handle, ACCESS_MASK access, const OBJECT_ATTRIBUTES *attr )
250 SYSCALL_FUNC( NtCreateJobObject );
253 NTSTATUS SYSCALL_API NtCreateKey( HANDLE *key, ACCESS_MASK access, const OBJECT_ATTRIBUTES *attr,
254 ULONG index, const UNICODE_STRING *class, ULONG options, ULONG *dispos )
256 SYSCALL_FUNC( NtCreateKey );
259 NTSTATUS SYSCALL_API NtCreateKeyTransacted( HANDLE *key, ACCESS_MASK access, const OBJECT_ATTRIBUTES *attr,
260 ULONG index, const UNICODE_STRING *class, ULONG options,
261 HANDLE transacted, ULONG *dispos )
263 SYSCALL_FUNC( NtCreateKeyTransacted );
266 NTSTATUS SYSCALL_API NtCreateKeyedEvent( HANDLE *handle, ACCESS_MASK access,
267 const OBJECT_ATTRIBUTES *attr, ULONG flags )
269 SYSCALL_FUNC( NtCreateKeyedEvent );
272 NTSTATUS SYSCALL_API NtCreateLowBoxToken( HANDLE *token_handle, HANDLE token, ACCESS_MASK access,
273 OBJECT_ATTRIBUTES *attr, SID *sid, ULONG count,
274 SID_AND_ATTRIBUTES *capabilities, ULONG handle_count,
275 HANDLE *handle )
277 SYSCALL_FUNC( NtCreateLowBoxToken );
280 NTSTATUS SYSCALL_API NtCreateMailslotFile( HANDLE *handle, ULONG access, OBJECT_ATTRIBUTES *attr,
281 IO_STATUS_BLOCK *io, ULONG options, ULONG quota, ULONG msg_size,
282 LARGE_INTEGER *timeout )
284 SYSCALL_FUNC( NtCreateMailslotFile );
287 NTSTATUS SYSCALL_API NtCreateMutant( HANDLE *handle, ACCESS_MASK access, const OBJECT_ATTRIBUTES *attr,
288 BOOLEAN owned )
290 SYSCALL_FUNC( NtCreateMutant );
293 NTSTATUS SYSCALL_API NtCreateNamedPipeFile( HANDLE *handle, ULONG access, OBJECT_ATTRIBUTES *attr,
294 IO_STATUS_BLOCK *io, ULONG sharing, ULONG dispo, ULONG options,
295 ULONG pipe_type, ULONG read_mode, ULONG completion_mode,
296 ULONG max_inst, ULONG inbound_quota, ULONG outbound_quota,
297 LARGE_INTEGER *timeout )
299 SYSCALL_FUNC( NtCreateNamedPipeFile );
302 NTSTATUS SYSCALL_API NtCreatePagingFile( UNICODE_STRING *name, LARGE_INTEGER *min_size,
303 LARGE_INTEGER *max_size, LARGE_INTEGER *actual_size )
305 SYSCALL_FUNC( NtCreatePagingFile );
308 NTSTATUS SYSCALL_API NtCreatePort( HANDLE *handle, OBJECT_ATTRIBUTES *attr, ULONG info_len,
309 ULONG data_len, ULONG *reserved )
311 SYSCALL_FUNC( NtCreatePort );
314 NTSTATUS SYSCALL_API NtCreateSection( HANDLE *handle, ACCESS_MASK access, const OBJECT_ATTRIBUTES *attr,
315 const LARGE_INTEGER *size, ULONG protect,
316 ULONG sec_flags, HANDLE file )
318 SYSCALL_FUNC( NtCreateSection );
321 NTSTATUS SYSCALL_API NtCreateSemaphore( HANDLE *handle, ACCESS_MASK access, const OBJECT_ATTRIBUTES *attr,
322 LONG initial, LONG max )
324 SYSCALL_FUNC( NtCreateSemaphore );
327 NTSTATUS SYSCALL_API NtCreateSymbolicLinkObject( HANDLE *handle, ACCESS_MASK access,
328 OBJECT_ATTRIBUTES *attr, UNICODE_STRING *target )
330 SYSCALL_FUNC( NtCreateSymbolicLinkObject );
333 NTSTATUS SYSCALL_API NtCreateThread( HANDLE *handle, ACCESS_MASK access, OBJECT_ATTRIBUTES *attr,
334 HANDLE process, CLIENT_ID *id, CONTEXT *ctx, INITIAL_TEB *teb,
335 BOOLEAN suspended )
337 SYSCALL_FUNC( NtCreateThread );
340 NTSTATUS SYSCALL_API NtCreateThreadEx( HANDLE *handle, ACCESS_MASK access, OBJECT_ATTRIBUTES *attr,
341 HANDLE process, PRTL_THREAD_START_ROUTINE start, void *param,
342 ULONG flags, ULONG_PTR zero_bits, SIZE_T stack_commit,
343 SIZE_T stack_reserve, PS_ATTRIBUTE_LIST *attr_list )
345 SYSCALL_FUNC( NtCreateThreadEx );
348 NTSTATUS SYSCALL_API NtCreateTimer( HANDLE *handle, ACCESS_MASK access, const OBJECT_ATTRIBUTES *attr,
349 TIMER_TYPE type )
351 SYSCALL_FUNC( NtCreateTimer );
354 NTSTATUS SYSCALL_API NtCreateToken( HANDLE *handle, ACCESS_MASK access, OBJECT_ATTRIBUTES *attr,
355 TOKEN_TYPE type, LUID *token_id, LARGE_INTEGER *expire,
356 TOKEN_USER *user, TOKEN_GROUPS *groups, TOKEN_PRIVILEGES *privs,
357 TOKEN_OWNER *owner, TOKEN_PRIMARY_GROUP *group,
358 TOKEN_DEFAULT_DACL *dacl, TOKEN_SOURCE *source )
360 SYSCALL_FUNC( NtCreateToken );
363 NTSTATUS SYSCALL_API NtCreateTransaction( HANDLE *handle, ACCESS_MASK mask, OBJECT_ATTRIBUTES *obj_attr,
364 GUID *guid, HANDLE tm, ULONG options, ULONG isol_level,
365 ULONG isol_flags, PLARGE_INTEGER timeout,
366 UNICODE_STRING *description )
368 SYSCALL_FUNC( NtCreateTransaction );
371 NTSTATUS SYSCALL_API NtCreateUserProcess( HANDLE *process_handle_ptr, HANDLE *thread_handle_ptr,
372 ACCESS_MASK process_access, ACCESS_MASK thread_access,
373 OBJECT_ATTRIBUTES *process_attr, OBJECT_ATTRIBUTES *thread_attr,
374 ULONG process_flags, ULONG thread_flags,
375 RTL_USER_PROCESS_PARAMETERS *params, PS_CREATE_INFO *info,
376 PS_ATTRIBUTE_LIST *ps_attr )
378 SYSCALL_FUNC( NtCreateUserProcess );
381 NTSTATUS SYSCALL_API NtDebugActiveProcess( HANDLE process, HANDLE debug )
383 SYSCALL_FUNC( NtDebugActiveProcess );
386 NTSTATUS SYSCALL_API NtDebugContinue( HANDLE handle, CLIENT_ID *client, NTSTATUS status )
388 SYSCALL_FUNC( NtDebugContinue );
391 NTSTATUS SYSCALL_API NtDelayExecution( BOOLEAN alertable, const LARGE_INTEGER *timeout )
393 SYSCALL_FUNC( NtDelayExecution );
396 NTSTATUS SYSCALL_API NtDeleteAtom( RTL_ATOM atom )
398 SYSCALL_FUNC( NtDeleteAtom );
401 NTSTATUS SYSCALL_API NtDeleteFile( OBJECT_ATTRIBUTES *attr )
403 SYSCALL_FUNC( NtDeleteFile );
406 NTSTATUS SYSCALL_API NtDeleteKey( HANDLE key )
408 SYSCALL_FUNC( NtDeleteKey );
411 NTSTATUS SYSCALL_API NtDeleteValueKey( HANDLE key, const UNICODE_STRING *name )
413 SYSCALL_FUNC( NtDeleteValueKey );
416 NTSTATUS SYSCALL_API NtDeviceIoControlFile( HANDLE handle, HANDLE event, PIO_APC_ROUTINE apc,
417 void *apc_context, IO_STATUS_BLOCK *io, ULONG code,
418 void *in_buffer, ULONG in_size,
419 void *out_buffer, ULONG out_size )
421 SYSCALL_FUNC( NtDeviceIoControlFile );
424 NTSTATUS SYSCALL_API NtDisplayString( UNICODE_STRING *string )
426 SYSCALL_FUNC( NtDisplayString );
429 NTSTATUS SYSCALL_API NtDuplicateObject( HANDLE source_process, HANDLE source, HANDLE dest_process,
430 HANDLE *dest, ACCESS_MASK access, ULONG attributes, ULONG options )
432 SYSCALL_FUNC( NtDuplicateObject );
435 NTSTATUS SYSCALL_API NtDuplicateToken( HANDLE token, ACCESS_MASK access, OBJECT_ATTRIBUTES *attr,
436 BOOLEAN effective_only, TOKEN_TYPE type, HANDLE *handle )
438 SYSCALL_FUNC( NtDuplicateToken );
441 NTSTATUS SYSCALL_API NtEnumerateKey( HANDLE handle, ULONG index, KEY_INFORMATION_CLASS info_class,
442 void *info, DWORD length, DWORD *result_len )
444 SYSCALL_FUNC( NtEnumerateKey );
447 NTSTATUS SYSCALL_API NtEnumerateValueKey( HANDLE handle, ULONG index, KEY_VALUE_INFORMATION_CLASS info_class,
448 void *info, DWORD length, DWORD *result_len )
450 SYSCALL_FUNC( NtEnumerateValueKey );
453 NTSTATUS SYSCALL_API NtFilterToken( HANDLE token, ULONG flags, TOKEN_GROUPS *disable_sids,
454 TOKEN_PRIVILEGES *privileges, TOKEN_GROUPS *restrict_sids,
455 HANDLE *new_token )
457 SYSCALL_FUNC( NtFilterToken );
460 NTSTATUS SYSCALL_API NtFindAtom( const WCHAR *name, ULONG length, RTL_ATOM *atom )
462 SYSCALL_FUNC( NtFindAtom );
465 NTSTATUS SYSCALL_API NtFlushBuffersFile( HANDLE handle, IO_STATUS_BLOCK *io )
467 SYSCALL_FUNC( NtFlushBuffersFile );
470 NTSTATUS SYSCALL_API NtFlushInstructionCache( HANDLE handle, const void *addr, SIZE_T size )
472 SYSCALL_FUNC( NtFlushInstructionCache );
475 NTSTATUS SYSCALL_API NtFlushKey( HANDLE key )
477 SYSCALL_FUNC( NtFlushKey );
480 NTSTATUS SYSCALL_API NtFlushProcessWriteBuffers(void)
482 SYSCALL_FUNC( NtFlushProcessWriteBuffers );
485 NTSTATUS SYSCALL_API NtFlushVirtualMemory( HANDLE process, LPCVOID *addr_ptr,
486 SIZE_T *size_ptr, ULONG unknown )
488 SYSCALL_FUNC( NtFlushVirtualMemory );
491 NTSTATUS SYSCALL_API NtFreeVirtualMemory( HANDLE process, PVOID *addr_ptr, SIZE_T *size_ptr, ULONG type )
493 SYSCALL_FUNC( NtFreeVirtualMemory );
496 NTSTATUS SYSCALL_API NtFsControlFile( HANDLE handle, HANDLE event, PIO_APC_ROUTINE apc, void *apc_context,
497 IO_STATUS_BLOCK *io, ULONG code, void *in_buffer, ULONG in_size,
498 void *out_buffer, ULONG out_size )
500 SYSCALL_FUNC( NtFsControlFile );
503 static NTSTATUS SYSCALL_API syscall_NtGetContextThread( HANDLE handle, ARM64_NT_CONTEXT *context )
505 __ASM_SYSCALL_FUNC( __id_NtGetContextThread, syscall_NtGetContextThread );
508 NTSTATUS WINAPI NtGetContextThread( HANDLE handle, CONTEXT *context )
510 ARM64_NT_CONTEXT arm_ctx = { .ContextFlags = ctx_flags_x64_to_arm( context->ContextFlags ) };
511 NTSTATUS status = syscall_NtGetContextThread( handle, &arm_ctx );
513 if (!status) context_arm_to_x64( (ARM64EC_NT_CONTEXT *)context, &arm_ctx );
514 return status;
517 ULONG SYSCALL_API NtGetCurrentProcessorNumber(void)
519 SYSCALL_FUNC( NtGetCurrentProcessorNumber );
522 NTSTATUS SYSCALL_API NtGetNextThread( HANDLE process, HANDLE thread, ACCESS_MASK access, ULONG attributes,
523 ULONG flags, HANDLE *handle )
525 SYSCALL_FUNC( NtGetNextThread );
528 NTSTATUS SYSCALL_API NtGetNlsSectionPtr( ULONG type, ULONG id, void *unknown, void **ptr, SIZE_T *size )
530 SYSCALL_FUNC( NtGetNlsSectionPtr );
533 NTSTATUS SYSCALL_API NtGetWriteWatch( HANDLE process, ULONG flags, PVOID base, SIZE_T size,
534 PVOID *addresses, ULONG_PTR *count, ULONG *granularity )
536 SYSCALL_FUNC( NtGetWriteWatch );
539 NTSTATUS SYSCALL_API NtImpersonateAnonymousToken( HANDLE thread )
541 SYSCALL_FUNC( NtImpersonateAnonymousToken );
544 NTSTATUS SYSCALL_API NtInitializeNlsFiles( void **ptr, LCID *lcid, LARGE_INTEGER *size )
546 SYSCALL_FUNC( NtInitializeNlsFiles );
549 NTSTATUS SYSCALL_API NtInitiatePowerAction( POWER_ACTION action, SYSTEM_POWER_STATE state,
550 ULONG flags, BOOLEAN async )
552 SYSCALL_FUNC( NtInitiatePowerAction );
555 NTSTATUS SYSCALL_API NtIsProcessInJob( HANDLE process, HANDLE job )
557 SYSCALL_FUNC( NtIsProcessInJob );
560 NTSTATUS SYSCALL_API NtListenPort( HANDLE handle, LPC_MESSAGE *msg )
562 SYSCALL_FUNC( NtListenPort );
565 NTSTATUS SYSCALL_API NtLoadDriver( const UNICODE_STRING *name )
567 SYSCALL_FUNC( NtLoadDriver );
570 NTSTATUS SYSCALL_API NtLoadKey( const OBJECT_ATTRIBUTES *attr, OBJECT_ATTRIBUTES *file )
572 SYSCALL_FUNC( NtLoadKey );
575 NTSTATUS SYSCALL_API NtLoadKey2( const OBJECT_ATTRIBUTES *attr, OBJECT_ATTRIBUTES *file, ULONG flags )
577 SYSCALL_FUNC( NtLoadKey2 );
580 NTSTATUS SYSCALL_API NtLoadKeyEx( const OBJECT_ATTRIBUTES *attr, OBJECT_ATTRIBUTES *file, ULONG flags,
581 HANDLE trustkey, HANDLE event, ACCESS_MASK access,
582 HANDLE *roothandle, IO_STATUS_BLOCK *iostatus )
584 SYSCALL_FUNC( NtLoadKeyEx );
587 NTSTATUS SYSCALL_API NtLockFile( HANDLE file, HANDLE event, PIO_APC_ROUTINE apc, void* apc_user,
588 IO_STATUS_BLOCK *io_status, LARGE_INTEGER *offset,
589 LARGE_INTEGER *count, ULONG *key, BOOLEAN dont_wait, BOOLEAN exclusive )
591 SYSCALL_FUNC( NtLockFile );
594 NTSTATUS SYSCALL_API NtLockVirtualMemory( HANDLE process, PVOID *addr, SIZE_T *size, ULONG unknown )
596 SYSCALL_FUNC( NtLockVirtualMemory );
599 NTSTATUS SYSCALL_API NtMakeTemporaryObject( HANDLE handle )
601 SYSCALL_FUNC( NtMakeTemporaryObject );
604 NTSTATUS SYSCALL_API NtMapViewOfSection( HANDLE handle, HANDLE process, PVOID *addr_ptr,
605 ULONG_PTR zero_bits, SIZE_T commit_size,
606 const LARGE_INTEGER *offset_ptr, SIZE_T *size_ptr,
607 SECTION_INHERIT inherit, ULONG alloc_type, ULONG protect )
609 SYSCALL_FUNC( NtMapViewOfSection );
612 NTSTATUS SYSCALL_API NtMapViewOfSectionEx( HANDLE handle, HANDLE process, PVOID *addr_ptr,
613 const LARGE_INTEGER *offset_ptr, SIZE_T *size_ptr,
614 ULONG alloc_type, ULONG protect,
615 MEM_EXTENDED_PARAMETER *parameters, ULONG count )
617 SYSCALL_FUNC( NtMapViewOfSectionEx );
620 NTSTATUS SYSCALL_API NtNotifyChangeDirectoryFile( HANDLE handle, HANDLE event, PIO_APC_ROUTINE apc,
621 void *apc_context, IO_STATUS_BLOCK *iosb, void *buffer,
622 ULONG buffer_size, ULONG filter, BOOLEAN subtree )
624 SYSCALL_FUNC( NtNotifyChangeDirectoryFile );
627 NTSTATUS SYSCALL_API NtNotifyChangeKey( HANDLE key, HANDLE event, PIO_APC_ROUTINE apc, void *apc_context,
628 IO_STATUS_BLOCK *io, ULONG filter, BOOLEAN subtree,
629 void *buffer, ULONG length, BOOLEAN async )
631 SYSCALL_FUNC( NtNotifyChangeKey );
634 NTSTATUS SYSCALL_API NtNotifyChangeMultipleKeys( HANDLE key, ULONG count, OBJECT_ATTRIBUTES *attr,
635 HANDLE event, PIO_APC_ROUTINE apc, void *apc_context,
636 IO_STATUS_BLOCK *io, ULONG filter, BOOLEAN subtree,
637 void *buffer, ULONG length, BOOLEAN async )
639 SYSCALL_FUNC( NtNotifyChangeMultipleKeys );
642 NTSTATUS SYSCALL_API NtOpenDirectoryObject( HANDLE *handle, ACCESS_MASK access, const OBJECT_ATTRIBUTES *attr )
644 SYSCALL_FUNC( NtOpenDirectoryObject );
647 NTSTATUS SYSCALL_API NtOpenEvent( HANDLE *handle, ACCESS_MASK access, const OBJECT_ATTRIBUTES *attr )
649 SYSCALL_FUNC( NtOpenEvent );
652 NTSTATUS SYSCALL_API NtOpenFile( HANDLE *handle, ACCESS_MASK access, OBJECT_ATTRIBUTES *attr,
653 IO_STATUS_BLOCK *io, ULONG sharing, ULONG options )
655 SYSCALL_FUNC( NtOpenFile );
658 NTSTATUS SYSCALL_API NtOpenIoCompletion( HANDLE *handle, ACCESS_MASK access, const OBJECT_ATTRIBUTES *attr )
660 SYSCALL_FUNC( NtOpenIoCompletion );
663 NTSTATUS SYSCALL_API NtOpenJobObject( HANDLE *handle, ACCESS_MASK access, const OBJECT_ATTRIBUTES *attr )
665 SYSCALL_FUNC( NtOpenJobObject );
668 NTSTATUS SYSCALL_API NtOpenKey( HANDLE *key, ACCESS_MASK access, const OBJECT_ATTRIBUTES *attr )
670 SYSCALL_FUNC( NtOpenKey );
673 NTSTATUS SYSCALL_API NtOpenKeyEx( HANDLE *key, ACCESS_MASK access, const OBJECT_ATTRIBUTES *attr, ULONG options )
675 SYSCALL_FUNC( NtOpenKeyEx );
678 NTSTATUS SYSCALL_API NtOpenKeyTransacted( HANDLE *key, ACCESS_MASK access, const OBJECT_ATTRIBUTES *attr,
679 HANDLE transaction )
681 SYSCALL_FUNC( NtOpenKeyTransacted );
684 NTSTATUS SYSCALL_API NtOpenKeyTransactedEx( HANDLE *key, ACCESS_MASK access, const OBJECT_ATTRIBUTES *attr,
685 ULONG options, HANDLE transaction )
687 SYSCALL_FUNC( NtOpenKeyTransactedEx );
690 NTSTATUS SYSCALL_API NtOpenKeyedEvent( HANDLE *handle, ACCESS_MASK access, const OBJECT_ATTRIBUTES *attr )
692 SYSCALL_FUNC( NtOpenKeyedEvent );
695 NTSTATUS SYSCALL_API NtOpenMutant( HANDLE *handle, ACCESS_MASK access, const OBJECT_ATTRIBUTES *attr )
697 SYSCALL_FUNC( NtOpenMutant );
700 NTSTATUS SYSCALL_API NtOpenProcess( HANDLE *handle, ACCESS_MASK access,
701 const OBJECT_ATTRIBUTES *attr, const CLIENT_ID *id )
703 SYSCALL_FUNC( NtOpenProcess );
706 NTSTATUS SYSCALL_API NtOpenProcessToken( HANDLE process, DWORD access, HANDLE *handle )
708 SYSCALL_FUNC( NtOpenProcessToken );
711 NTSTATUS SYSCALL_API NtOpenProcessTokenEx( HANDLE process, DWORD access, DWORD attributes, HANDLE *handle )
713 SYSCALL_FUNC( NtOpenProcessTokenEx );
716 NTSTATUS SYSCALL_API NtOpenSection( HANDLE *handle, ACCESS_MASK access, const OBJECT_ATTRIBUTES *attr )
718 SYSCALL_FUNC( NtOpenSection );
721 NTSTATUS SYSCALL_API NtOpenSemaphore( HANDLE *handle, ACCESS_MASK access, const OBJECT_ATTRIBUTES *attr )
723 SYSCALL_FUNC( NtOpenSemaphore );
726 NTSTATUS SYSCALL_API NtOpenSymbolicLinkObject( HANDLE *handle, ACCESS_MASK access,
727 const OBJECT_ATTRIBUTES *attr )
729 SYSCALL_FUNC( NtOpenSymbolicLinkObject );
732 NTSTATUS SYSCALL_API NtOpenThread( HANDLE *handle, ACCESS_MASK access,
733 const OBJECT_ATTRIBUTES *attr, const CLIENT_ID *id )
735 SYSCALL_FUNC( NtOpenThread );
738 NTSTATUS SYSCALL_API NtOpenThreadToken( HANDLE thread, DWORD access, BOOLEAN self, HANDLE *handle )
740 SYSCALL_FUNC( NtOpenThreadToken );
743 NTSTATUS SYSCALL_API NtOpenThreadTokenEx( HANDLE thread, DWORD access, BOOLEAN self, DWORD attributes,
744 HANDLE *handle )
746 SYSCALL_FUNC( NtOpenThreadTokenEx );
749 NTSTATUS SYSCALL_API NtOpenTimer( HANDLE *handle, ACCESS_MASK access, const OBJECT_ATTRIBUTES *attr )
751 SYSCALL_FUNC( NtOpenTimer );
754 NTSTATUS SYSCALL_API NtPowerInformation( POWER_INFORMATION_LEVEL level, void *input, ULONG in_size,
755 void *output, ULONG out_size )
757 SYSCALL_FUNC( NtPowerInformation );
760 NTSTATUS SYSCALL_API NtPrivilegeCheck( HANDLE token, PRIVILEGE_SET *privs, BOOLEAN *res )
762 SYSCALL_FUNC( NtPrivilegeCheck );
765 NTSTATUS SYSCALL_API NtProtectVirtualMemory( HANDLE process, PVOID *addr_ptr, SIZE_T *size_ptr,
766 ULONG new_prot, ULONG *old_prot )
768 SYSCALL_FUNC( NtProtectVirtualMemory );
771 NTSTATUS SYSCALL_API NtPulseEvent( HANDLE handle, LONG *prev_state )
773 SYSCALL_FUNC( NtPulseEvent );
776 NTSTATUS SYSCALL_API NtQueryAttributesFile( const OBJECT_ATTRIBUTES *attr, FILE_BASIC_INFORMATION *info )
778 SYSCALL_FUNC( NtQueryAttributesFile );
781 NTSTATUS SYSCALL_API NtQueryDefaultLocale( BOOLEAN user, LCID *lcid )
783 SYSCALL_FUNC( NtQueryDefaultLocale );
786 NTSTATUS SYSCALL_API NtQueryDefaultUILanguage( LANGID *lang )
788 SYSCALL_FUNC( NtQueryDefaultUILanguage );
791 NTSTATUS SYSCALL_API NtQueryDirectoryFile( HANDLE handle, HANDLE event, PIO_APC_ROUTINE apc_routine,
792 void *apc_context, IO_STATUS_BLOCK *io, void *buffer,
793 ULONG length, FILE_INFORMATION_CLASS info_class,
794 BOOLEAN single_entry, UNICODE_STRING *mask,
795 BOOLEAN restart_scan )
797 SYSCALL_FUNC( NtQueryDirectoryFile );
800 NTSTATUS SYSCALL_API NtQueryDirectoryObject( HANDLE handle, DIRECTORY_BASIC_INFORMATION *buffer,
801 ULONG size, BOOLEAN single_entry, BOOLEAN restart,
802 ULONG *context, ULONG *ret_size )
804 SYSCALL_FUNC( NtQueryDirectoryObject );
807 NTSTATUS SYSCALL_API NtQueryEaFile( HANDLE handle, IO_STATUS_BLOCK *io, void *buffer, ULONG length,
808 BOOLEAN single_entry, void *list, ULONG list_len,
809 ULONG *index, BOOLEAN restart )
811 SYSCALL_FUNC( NtQueryEaFile );
814 NTSTATUS SYSCALL_API NtQueryEvent( HANDLE handle, EVENT_INFORMATION_CLASS class,
815 void *info, ULONG len, ULONG *ret_len )
817 SYSCALL_FUNC( NtQueryEvent );
820 NTSTATUS SYSCALL_API NtQueryFullAttributesFile( const OBJECT_ATTRIBUTES *attr,
821 FILE_NETWORK_OPEN_INFORMATION *info )
823 SYSCALL_FUNC( NtQueryFullAttributesFile );
826 NTSTATUS SYSCALL_API NtQueryInformationAtom( RTL_ATOM atom, ATOM_INFORMATION_CLASS class,
827 void *ptr, ULONG size, ULONG *retsize )
829 SYSCALL_FUNC( NtQueryInformationAtom );
832 NTSTATUS SYSCALL_API NtQueryInformationFile( HANDLE handle, IO_STATUS_BLOCK *io,
833 void *ptr, ULONG len, FILE_INFORMATION_CLASS class )
835 SYSCALL_FUNC( NtQueryInformationFile );
838 NTSTATUS SYSCALL_API NtQueryInformationJobObject( HANDLE handle, JOBOBJECTINFOCLASS class, void *info,
839 ULONG len, ULONG *ret_len )
841 SYSCALL_FUNC( NtQueryInformationJobObject );
844 NTSTATUS SYSCALL_API NtQueryInformationProcess( HANDLE handle, PROCESSINFOCLASS class, void *info,
845 ULONG size, ULONG *ret_len )
847 SYSCALL_FUNC( NtQueryInformationProcess );
850 NTSTATUS SYSCALL_API NtQueryInformationThread( HANDLE handle, THREADINFOCLASS class,
851 void *data, ULONG length, ULONG *ret_len )
853 SYSCALL_FUNC( NtQueryInformationThread );
856 NTSTATUS SYSCALL_API NtQueryInformationToken( HANDLE token, TOKEN_INFORMATION_CLASS class,
857 void *info, ULONG length, ULONG *retlen )
859 SYSCALL_FUNC( NtQueryInformationToken );
862 NTSTATUS SYSCALL_API NtQueryInstallUILanguage( LANGID *lang )
864 SYSCALL_FUNC( NtQueryInstallUILanguage );
867 NTSTATUS SYSCALL_API NtQueryIoCompletion( HANDLE handle, IO_COMPLETION_INFORMATION_CLASS class,
868 void *buffer, ULONG len, ULONG *ret_len )
870 SYSCALL_FUNC( NtQueryIoCompletion );
873 NTSTATUS SYSCALL_API NtQueryKey( HANDLE handle, KEY_INFORMATION_CLASS info_class,
874 void *info, DWORD length, DWORD *result_len )
876 SYSCALL_FUNC( NtQueryKey );
879 NTSTATUS SYSCALL_API NtQueryLicenseValue( const UNICODE_STRING *name, ULONG *type,
880 void *data, ULONG length, ULONG *retlen )
882 SYSCALL_FUNC( NtQueryLicenseValue );
885 NTSTATUS SYSCALL_API NtQueryMultipleValueKey( HANDLE key, KEY_MULTIPLE_VALUE_INFORMATION *info,
886 ULONG count, void *buffer, ULONG length, ULONG *retlen )
888 SYSCALL_FUNC( NtQueryMultipleValueKey );
891 NTSTATUS SYSCALL_API NtQueryMutant( HANDLE handle, MUTANT_INFORMATION_CLASS class,
892 void *info, ULONG len, ULONG *ret_len )
894 SYSCALL_FUNC( NtQueryMutant );
897 NTSTATUS SYSCALL_API NtQueryObject( HANDLE handle, OBJECT_INFORMATION_CLASS info_class,
898 void *ptr, ULONG len, ULONG *used_len )
900 SYSCALL_FUNC( NtQueryObject );
903 NTSTATUS SYSCALL_API NtQueryPerformanceCounter( LARGE_INTEGER *counter, LARGE_INTEGER *frequency )
905 SYSCALL_FUNC( NtQueryPerformanceCounter );
908 NTSTATUS SYSCALL_API NtQuerySection( HANDLE handle, SECTION_INFORMATION_CLASS class, void *ptr,
909 SIZE_T size, SIZE_T *ret_size )
911 SYSCALL_FUNC( NtQuerySection );
914 NTSTATUS SYSCALL_API NtQuerySecurityObject( HANDLE handle, SECURITY_INFORMATION info,
915 PSECURITY_DESCRIPTOR descr, ULONG length, ULONG *retlen )
917 SYSCALL_FUNC( NtQuerySecurityObject );
920 NTSTATUS SYSCALL_API NtQuerySemaphore( HANDLE handle, SEMAPHORE_INFORMATION_CLASS class,
921 void *info, ULONG len, ULONG *ret_len )
923 SYSCALL_FUNC( NtQuerySemaphore );
926 NTSTATUS SYSCALL_API NtQuerySymbolicLinkObject( HANDLE handle, UNICODE_STRING *target, ULONG *length )
928 SYSCALL_FUNC( NtQuerySymbolicLinkObject );
931 NTSTATUS SYSCALL_API NtQuerySystemEnvironmentValue( UNICODE_STRING *name, WCHAR *buffer, ULONG length,
932 ULONG *retlen )
934 SYSCALL_FUNC( NtQuerySystemEnvironmentValue );
937 NTSTATUS SYSCALL_API NtQuerySystemEnvironmentValueEx( UNICODE_STRING *name, GUID *vendor, void *buffer,
938 ULONG *retlen, ULONG *attrib )
940 SYSCALL_FUNC( NtQuerySystemEnvironmentValueEx );
943 NTSTATUS SYSCALL_API NtQuerySystemInformation( SYSTEM_INFORMATION_CLASS class,
944 void *info, ULONG size, ULONG *ret_size )
946 SYSCALL_FUNC( NtQuerySystemInformation );
949 NTSTATUS SYSCALL_API NtQuerySystemInformationEx( SYSTEM_INFORMATION_CLASS class, void *query,
950 ULONG query_len, void *info, ULONG size, ULONG *ret_size )
952 SYSCALL_FUNC( NtQuerySystemInformationEx );
955 NTSTATUS SYSCALL_API NtQuerySystemTime( LARGE_INTEGER *time )
957 SYSCALL_FUNC( NtQuerySystemTime );
960 NTSTATUS SYSCALL_API NtQueryTimer( HANDLE handle, TIMER_INFORMATION_CLASS class,
961 void *info, ULONG len, ULONG *ret_len )
963 SYSCALL_FUNC( NtQueryTimer );
966 NTSTATUS SYSCALL_API NtQueryTimerResolution( ULONG *min_res, ULONG *max_res, ULONG *current_res )
968 SYSCALL_FUNC( NtQueryTimerResolution );
971 NTSTATUS SYSCALL_API NtQueryValueKey( HANDLE handle, const UNICODE_STRING *name,
972 KEY_VALUE_INFORMATION_CLASS info_class,
973 void *info, DWORD length, DWORD *result_len )
975 SYSCALL_FUNC( NtQueryValueKey );
978 NTSTATUS SYSCALL_API NtQueryVirtualMemory( HANDLE process, LPCVOID addr, MEMORY_INFORMATION_CLASS info_class,
979 PVOID buffer, SIZE_T len, SIZE_T *res_len )
981 SYSCALL_FUNC( NtQueryVirtualMemory );
984 NTSTATUS SYSCALL_API NtQueryVolumeInformationFile( HANDLE handle, IO_STATUS_BLOCK *io, void *buffer,
985 ULONG length, FS_INFORMATION_CLASS info_class )
987 SYSCALL_FUNC( NtQueryVolumeInformationFile );
990 NTSTATUS SYSCALL_API NtQueueApcThread( HANDLE handle, PNTAPCFUNC func, ULONG_PTR arg1,
991 ULONG_PTR arg2, ULONG_PTR arg3 )
993 SYSCALL_FUNC( NtQueueApcThread );
996 static NTSTATUS SYSCALL_API syscall_NtRaiseException( EXCEPTION_RECORD *rec, ARM64_NT_CONTEXT *context, BOOL first_chance )
998 __ASM_SYSCALL_FUNC( __id_NtRaiseException, syscall_NtRaiseException );
1001 NTSTATUS WINAPI NtRaiseException( EXCEPTION_RECORD *rec, CONTEXT *context, BOOL first_chance )
1003 ARM64_NT_CONTEXT arm_ctx;
1005 context_x64_to_arm( &arm_ctx, (ARM64EC_NT_CONTEXT *)context );
1006 return syscall_NtRaiseException( rec, &arm_ctx, first_chance );
1009 NTSTATUS SYSCALL_API NtRaiseHardError( NTSTATUS status, ULONG count, UNICODE_STRING *params_mask,
1010 void **params, HARDERROR_RESPONSE_OPTION option,
1011 HARDERROR_RESPONSE *response )
1013 SYSCALL_FUNC( NtRaiseHardError );
1016 NTSTATUS SYSCALL_API NtReadFile( HANDLE handle, HANDLE event, PIO_APC_ROUTINE apc, void *apc_user,
1017 IO_STATUS_BLOCK *io, void *buffer, ULONG length,
1018 LARGE_INTEGER *offset, ULONG *key )
1020 SYSCALL_FUNC( NtReadFile );
1023 NTSTATUS SYSCALL_API NtReadFileScatter( HANDLE file, HANDLE event, PIO_APC_ROUTINE apc, void *apc_user,
1024 IO_STATUS_BLOCK *io, FILE_SEGMENT_ELEMENT *segments,
1025 ULONG length, LARGE_INTEGER *offset, ULONG *key )
1027 SYSCALL_FUNC( NtReadFileScatter );
1030 NTSTATUS SYSCALL_API NtReadVirtualMemory( HANDLE process, const void *addr, void *buffer,
1031 SIZE_T size, SIZE_T *bytes_read )
1033 SYSCALL_FUNC( NtReadVirtualMemory );
1036 NTSTATUS SYSCALL_API NtRegisterThreadTerminatePort( HANDLE handle )
1038 SYSCALL_FUNC( NtRegisterThreadTerminatePort );
1041 NTSTATUS SYSCALL_API NtReleaseKeyedEvent( HANDLE handle, const void *key,
1042 BOOLEAN alertable, const LARGE_INTEGER *timeout )
1044 SYSCALL_FUNC( NtReleaseKeyedEvent );
1047 NTSTATUS SYSCALL_API NtReleaseMutant( HANDLE handle, LONG *prev_count )
1049 SYSCALL_FUNC( NtReleaseMutant );
1052 NTSTATUS SYSCALL_API NtReleaseSemaphore( HANDLE handle, ULONG count, ULONG *previous )
1054 SYSCALL_FUNC( NtReleaseSemaphore );
1057 NTSTATUS SYSCALL_API NtRemoveIoCompletion( HANDLE handle, ULONG_PTR *key, ULONG_PTR *value,
1058 IO_STATUS_BLOCK *io, LARGE_INTEGER *timeout )
1060 SYSCALL_FUNC( NtRemoveIoCompletion );
1063 NTSTATUS SYSCALL_API NtRemoveIoCompletionEx( HANDLE handle, FILE_IO_COMPLETION_INFORMATION *info,
1064 ULONG count, ULONG *written, LARGE_INTEGER *timeout,
1065 BOOLEAN alertable )
1067 SYSCALL_FUNC( NtRemoveIoCompletionEx );
1070 NTSTATUS SYSCALL_API NtRemoveProcessDebug( HANDLE process, HANDLE debug )
1072 SYSCALL_FUNC( NtRemoveProcessDebug );
1075 NTSTATUS SYSCALL_API NtRenameKey( HANDLE key, UNICODE_STRING *name )
1077 SYSCALL_FUNC( NtRenameKey );
1080 NTSTATUS SYSCALL_API NtReplaceKey( OBJECT_ATTRIBUTES *attr, HANDLE key, OBJECT_ATTRIBUTES *replace )
1082 SYSCALL_FUNC( NtReplaceKey );
1085 NTSTATUS SYSCALL_API NtReplyWaitReceivePort( HANDLE handle, ULONG *id, LPC_MESSAGE *reply, LPC_MESSAGE *msg )
1087 SYSCALL_FUNC( NtReplyWaitReceivePort );
1090 NTSTATUS SYSCALL_API NtRequestWaitReplyPort( HANDLE handle, LPC_MESSAGE *msg_in, LPC_MESSAGE *msg_out )
1092 SYSCALL_FUNC( NtRequestWaitReplyPort );
1095 NTSTATUS SYSCALL_API NtResetEvent( HANDLE handle, LONG *prev_state )
1097 SYSCALL_FUNC( NtResetEvent );
1100 NTSTATUS SYSCALL_API NtResetWriteWatch( HANDLE process, PVOID base, SIZE_T size )
1102 SYSCALL_FUNC( NtResetWriteWatch );
1105 NTSTATUS SYSCALL_API NtRestoreKey( HANDLE key, HANDLE file, ULONG flags )
1107 SYSCALL_FUNC( NtRestoreKey );
1110 NTSTATUS SYSCALL_API NtResumeProcess( HANDLE handle )
1112 SYSCALL_FUNC( NtResumeProcess );
1115 NTSTATUS SYSCALL_API NtResumeThread( HANDLE handle, ULONG *count )
1117 SYSCALL_FUNC( NtResumeThread );
1120 NTSTATUS SYSCALL_API NtRollbackTransaction( HANDLE transaction, BOOLEAN wait )
1122 SYSCALL_FUNC( NtRollbackTransaction );
1125 NTSTATUS SYSCALL_API NtSaveKey( HANDLE key, HANDLE file )
1127 SYSCALL_FUNC( NtSaveKey );
1130 NTSTATUS SYSCALL_API NtSecureConnectPort( HANDLE *handle, UNICODE_STRING *name,
1131 SECURITY_QUALITY_OF_SERVICE *qos, LPC_SECTION_WRITE *write,
1132 PSID sid, LPC_SECTION_READ *read, ULONG *max_len,
1133 void *info, ULONG *info_len )
1135 SYSCALL_FUNC( NtSecureConnectPort );
1138 static NTSTATUS SYSCALL_API syscall_NtSetContextThread( HANDLE handle, const ARM64_NT_CONTEXT *context )
1140 __ASM_SYSCALL_FUNC( __id_NtSetContextThread, syscall_NtSetContextThread );
1143 NTSTATUS WINAPI NtSetContextThread( HANDLE handle, const CONTEXT *context )
1145 ARM64_NT_CONTEXT arm_ctx;
1147 context_x64_to_arm( &arm_ctx, (ARM64EC_NT_CONTEXT *)context );
1148 return syscall_NtSetContextThread( handle, &arm_ctx );
1151 NTSTATUS SYSCALL_API NtSetDebugFilterState( ULONG component_id, ULONG level, BOOLEAN state )
1153 SYSCALL_FUNC( NtSetDebugFilterState );
1156 NTSTATUS SYSCALL_API NtSetDefaultLocale( BOOLEAN user, LCID lcid )
1158 SYSCALL_FUNC( NtSetDefaultLocale );
1161 NTSTATUS SYSCALL_API NtSetDefaultUILanguage( LANGID lang )
1163 SYSCALL_FUNC( NtSetDefaultUILanguage );
1166 NTSTATUS SYSCALL_API NtSetEaFile( HANDLE handle, IO_STATUS_BLOCK *io, void *buffer, ULONG length )
1168 SYSCALL_FUNC( NtSetEaFile );
1171 NTSTATUS SYSCALL_API NtSetEvent( HANDLE handle, LONG *prev_state )
1173 SYSCALL_FUNC( NtSetEvent );
1176 NTSTATUS SYSCALL_API NtSetInformationDebugObject( HANDLE handle, DEBUGOBJECTINFOCLASS class,
1177 void *info, ULONG len, ULONG *ret_len )
1179 SYSCALL_FUNC( NtSetInformationDebugObject );
1182 NTSTATUS SYSCALL_API NtSetInformationFile( HANDLE handle, IO_STATUS_BLOCK *io,
1183 void *ptr, ULONG len, FILE_INFORMATION_CLASS class )
1185 SYSCALL_FUNC( NtSetInformationFile );
1188 NTSTATUS SYSCALL_API NtSetInformationJobObject( HANDLE handle, JOBOBJECTINFOCLASS class,
1189 void *info, ULONG len )
1191 SYSCALL_FUNC( NtSetInformationJobObject );
1194 NTSTATUS SYSCALL_API NtSetInformationKey( HANDLE key, int class, void *info, ULONG length )
1196 SYSCALL_FUNC( NtSetInformationKey );
1199 NTSTATUS SYSCALL_API NtSetInformationObject( HANDLE handle, OBJECT_INFORMATION_CLASS info_class,
1200 void *ptr, ULONG len )
1202 SYSCALL_FUNC( NtSetInformationObject );
1205 NTSTATUS SYSCALL_API NtSetInformationProcess( HANDLE handle, PROCESSINFOCLASS class,
1206 void *info, ULONG size )
1208 SYSCALL_FUNC( NtSetInformationProcess );
1211 NTSTATUS SYSCALL_API NtSetInformationThread( HANDLE handle, THREADINFOCLASS class,
1212 const void *data, ULONG length )
1214 SYSCALL_FUNC( NtSetInformationThread );
1217 NTSTATUS SYSCALL_API NtSetInformationToken( HANDLE token, TOKEN_INFORMATION_CLASS class,
1218 void *info, ULONG length )
1220 SYSCALL_FUNC( NtSetInformationToken );
1223 NTSTATUS SYSCALL_API NtSetInformationVirtualMemory( HANDLE process,
1224 VIRTUAL_MEMORY_INFORMATION_CLASS info_class,
1225 ULONG_PTR count, PMEMORY_RANGE_ENTRY addresses,
1226 PVOID ptr, ULONG size )
1228 SYSCALL_FUNC( NtSetInformationVirtualMemory );
1231 NTSTATUS SYSCALL_API NtSetIntervalProfile( ULONG interval, KPROFILE_SOURCE source )
1233 SYSCALL_FUNC( NtSetIntervalProfile );
1236 NTSTATUS SYSCALL_API NtSetIoCompletion( HANDLE handle, ULONG_PTR key, ULONG_PTR value,
1237 NTSTATUS status, SIZE_T count )
1239 SYSCALL_FUNC( NtSetIoCompletion );
1242 NTSTATUS SYSCALL_API NtSetLdtEntries( ULONG sel1, LDT_ENTRY entry1, ULONG sel2, LDT_ENTRY entry2 )
1244 SYSCALL_FUNC( NtSetLdtEntries );
1247 NTSTATUS SYSCALL_API NtSetSecurityObject( HANDLE handle, SECURITY_INFORMATION info,
1248 PSECURITY_DESCRIPTOR descr )
1250 SYSCALL_FUNC( NtSetSecurityObject );
1253 NTSTATUS SYSCALL_API NtSetSystemInformation( SYSTEM_INFORMATION_CLASS class, void *info, ULONG length )
1255 SYSCALL_FUNC( NtSetSystemInformation );
1258 NTSTATUS SYSCALL_API NtSetSystemTime( const LARGE_INTEGER *new, LARGE_INTEGER *old )
1260 SYSCALL_FUNC( NtSetSystemTime );
1263 NTSTATUS SYSCALL_API NtSetThreadExecutionState( EXECUTION_STATE new_state, EXECUTION_STATE *old_state )
1265 SYSCALL_FUNC( NtSetThreadExecutionState );
1268 NTSTATUS SYSCALL_API NtSetTimer( HANDLE handle, const LARGE_INTEGER *when, PTIMER_APC_ROUTINE callback,
1269 void *arg, BOOLEAN resume, ULONG period, BOOLEAN *state )
1271 SYSCALL_FUNC( NtSetTimer );
1274 NTSTATUS SYSCALL_API NtSetTimerResolution( ULONG res, BOOLEAN set, ULONG *current_res )
1276 SYSCALL_FUNC( NtSetTimerResolution );
1279 NTSTATUS SYSCALL_API NtSetValueKey( HANDLE key, const UNICODE_STRING *name, ULONG index,
1280 ULONG type, const void *data, ULONG count )
1282 SYSCALL_FUNC( NtSetValueKey );
1285 NTSTATUS SYSCALL_API NtSetVolumeInformationFile( HANDLE handle, IO_STATUS_BLOCK *io, void *info,
1286 ULONG length, FS_INFORMATION_CLASS class )
1288 SYSCALL_FUNC( NtSetVolumeInformationFile );
1291 NTSTATUS SYSCALL_API NtShutdownSystem( SHUTDOWN_ACTION action )
1293 SYSCALL_FUNC( NtShutdownSystem );
1296 NTSTATUS SYSCALL_API NtSignalAndWaitForSingleObject( HANDLE signal, HANDLE wait,
1297 BOOLEAN alertable, const LARGE_INTEGER *timeout )
1299 SYSCALL_FUNC( NtSignalAndWaitForSingleObject );
1302 NTSTATUS SYSCALL_API NtSuspendProcess( HANDLE handle )
1304 SYSCALL_FUNC( NtSuspendProcess );
1307 NTSTATUS SYSCALL_API NtSuspendThread( HANDLE handle, ULONG *count )
1309 SYSCALL_FUNC( NtSuspendThread );
1312 NTSTATUS SYSCALL_API NtSystemDebugControl( SYSDBG_COMMAND command, void *in_buff, ULONG in_len,
1313 void *out_buff, ULONG out_len, ULONG *retlen )
1315 SYSCALL_FUNC( NtSystemDebugControl );
1318 NTSTATUS SYSCALL_API NtTerminateJobObject( HANDLE handle, NTSTATUS status )
1320 SYSCALL_FUNC( NtTerminateJobObject );
1323 NTSTATUS SYSCALL_API NtTerminateProcess( HANDLE handle, LONG exit_code )
1325 SYSCALL_FUNC( NtTerminateProcess );
1328 NTSTATUS SYSCALL_API NtTerminateThread( HANDLE handle, LONG exit_code )
1330 SYSCALL_FUNC( NtTerminateThread );
1333 NTSTATUS SYSCALL_API NtTestAlert(void)
1335 SYSCALL_FUNC( NtTestAlert );
1338 NTSTATUS SYSCALL_API NtTraceControl( ULONG code, void *inbuf, ULONG inbuf_len,
1339 void *outbuf, ULONG outbuf_len, ULONG *size )
1341 SYSCALL_FUNC( NtTraceControl );
1344 NTSTATUS SYSCALL_API NtUnloadDriver( const UNICODE_STRING *name )
1346 SYSCALL_FUNC( NtUnloadDriver );
1349 NTSTATUS SYSCALL_API NtUnloadKey( OBJECT_ATTRIBUTES *attr )
1351 SYSCALL_FUNC( NtUnloadKey );
1354 NTSTATUS SYSCALL_API NtUnlockFile( HANDLE handle, IO_STATUS_BLOCK *io_status, LARGE_INTEGER *offset,
1355 LARGE_INTEGER *count, ULONG *key )
1357 SYSCALL_FUNC( NtUnlockFile );
1360 NTSTATUS SYSCALL_API NtUnlockVirtualMemory( HANDLE process, PVOID *addr, SIZE_T *size, ULONG unknown )
1362 SYSCALL_FUNC( NtUnlockVirtualMemory );
1365 NTSTATUS SYSCALL_API NtUnmapViewOfSection( HANDLE process, PVOID addr )
1367 SYSCALL_FUNC( NtUnmapViewOfSection );
1370 NTSTATUS SYSCALL_API NtUnmapViewOfSectionEx( HANDLE process, PVOID addr, ULONG flags )
1372 SYSCALL_FUNC( NtUnmapViewOfSectionEx );
1375 NTSTATUS SYSCALL_API NtWaitForAlertByThreadId( const void *address, const LARGE_INTEGER *timeout )
1377 SYSCALL_FUNC( NtWaitForAlertByThreadId );
1380 NTSTATUS SYSCALL_API NtWaitForDebugEvent( HANDLE handle, BOOLEAN alertable, LARGE_INTEGER *timeout,
1381 DBGUI_WAIT_STATE_CHANGE *state )
1383 SYSCALL_FUNC( NtWaitForDebugEvent );
1386 NTSTATUS SYSCALL_API NtWaitForKeyedEvent( HANDLE handle, const void *key,
1387 BOOLEAN alertable, const LARGE_INTEGER *timeout )
1389 SYSCALL_FUNC( NtWaitForKeyedEvent );
1392 NTSTATUS SYSCALL_API NtWaitForMultipleObjects( DWORD count, const HANDLE *handles, BOOLEAN wait_any,
1393 BOOLEAN alertable, const LARGE_INTEGER *timeout )
1395 SYSCALL_FUNC( NtWaitForMultipleObjects );
1398 NTSTATUS SYSCALL_API NtWaitForSingleObject( HANDLE handle, BOOLEAN alertable, const LARGE_INTEGER *timeout )
1400 SYSCALL_FUNC( NtWaitForSingleObject );
1403 NTSTATUS SYSCALL_API NtWriteFile( HANDLE handle, HANDLE event, PIO_APC_ROUTINE apc, void *apc_user,
1404 IO_STATUS_BLOCK *io, const void *buffer, ULONG length,
1405 LARGE_INTEGER *offset, ULONG *key )
1407 SYSCALL_FUNC( NtWriteFile );
1410 NTSTATUS SYSCALL_API NtWriteFileGather( HANDLE file, HANDLE event, PIO_APC_ROUTINE apc, void *apc_user,
1411 IO_STATUS_BLOCK *io, FILE_SEGMENT_ELEMENT *segments,
1412 ULONG length, LARGE_INTEGER *offset, ULONG *key )
1414 SYSCALL_FUNC( NtWriteFileGather );
1417 NTSTATUS SYSCALL_API NtWriteVirtualMemory( HANDLE process, void *addr, const void *buffer,
1418 SIZE_T size, SIZE_T *bytes_written )
1420 SYSCALL_FUNC( NtWriteVirtualMemory );
1423 NTSTATUS SYSCALL_API NtYieldExecution(void)
1425 SYSCALL_FUNC( NtYieldExecution );
1428 NTSTATUS SYSCALL_API wine_nt_to_unix_file_name( const OBJECT_ATTRIBUTES *attr, char *nameA, ULONG *size,
1429 UINT disposition )
1431 SYSCALL_FUNC( wine_nt_to_unix_file_name );
1434 NTSTATUS SYSCALL_API wine_unix_to_nt_file_name( const char *name, WCHAR *buffer, ULONG *size )
1436 SYSCALL_FUNC( wine_unix_to_nt_file_name );
1439 static void * const arm64ec_syscalls[] =
1441 #define SYSCALL_ENTRY(id,name,args) name,
1442 ALL_SYSCALLS64
1443 #undef SYSCALL_ENTRY
1447 /***********************************************************************
1448 * LdrpGetX64Information
1450 static NTSTATUS WINAPI LdrpGetX64Information( ULONG type, void *output, void *extra_info )
1452 switch (type)
1454 case 0:
1456 UINT64 fpcr, fpsr;
1458 __asm__ __volatile__( "mrs %0, fpcr; mrs %1, fpsr" : "=r" (fpcr), "=r" (fpsr) );
1459 *(UINT *)output = fpcsr_to_mxcsr( fpcr, fpsr );
1460 return STATUS_SUCCESS;
1462 default:
1463 FIXME( "not implemented type %u\n", type );
1464 return STATUS_INVALID_PARAMETER;
1468 /***********************************************************************
1469 * LdrpSetX64Information
1471 static NTSTATUS WINAPI LdrpSetX64Information( ULONG type, ULONG_PTR input, void *extra_info )
1473 switch (type)
1475 case 0:
1477 UINT64 fpcsr = mxcsr_to_fpcsr( input );
1478 __asm__ __volatile__( "msr fpcr, %0; msr fpsr, %1" :: "r" (fpcsr), "r" (fpcsr >> 32) );
1479 return STATUS_SUCCESS;
1481 default:
1482 FIXME( "not implemented type %u\n", type );
1483 return STATUS_INVALID_PARAMETER;
1488 /*******************************************************************
1489 * KiUserExceptionDispatcher (NTDLL.@)
1491 NTSTATUS WINAPI KiUserExceptionDispatcher( EXCEPTION_RECORD *rec, CONTEXT *context )
1493 FIXME( "not implemented\n" );
1494 return STATUS_INVALID_DISPOSITION;
1498 /*******************************************************************
1499 * KiUserApcDispatcher (NTDLL.@)
1501 void WINAPI dispatch_apc( void (CALLBACK *func)(ULONG_PTR,ULONG_PTR,ULONG_PTR,CONTEXT*),
1502 ULONG_PTR arg1, ULONG_PTR arg2, ULONG_PTR arg3,
1503 BOOLEAN alertable, ARM64_NT_CONTEXT *arm_ctx )
1505 ARM64EC_NT_CONTEXT context;
1507 context_arm_to_x64( &context, arm_ctx );
1508 func( arg1, arg2, arg3, &context.AMD64_Context );
1509 NtContinue( &context.AMD64_Context, alertable );
1511 __ASM_GLOBAL_FUNC( "#KiUserApcDispatcher",
1512 __ASM_SEH(".seh_context\n\t")
1513 "nop\n\t"
1514 __ASM_SEH(".seh_stackalloc 0x30\n\t")
1515 __ASM_SEH(".seh_endprologue\n\t")
1516 "ldp x0, x1, [sp]\n\t" /* func, arg1 */
1517 "ldp x2, x3, [sp, #0x10]\n\t" /* arg2, arg3 */
1518 "ldr w4, [sp, #0x20]\n\t" /* alertable */
1519 "add x5, sp, #0x30\n\t" /* context */
1520 "bl " __ASM_NAME("dispatch_apc") "\n\t"
1521 "brk #1" )
1524 /*******************************************************************
1525 * KiUserCallbackDispatcher (NTDLL.@)
1527 __ASM_GLOBAL_FUNC( "#KiUserCallbackDispatcher",
1528 ".seh_pushframe\n\t"
1529 "nop\n\t"
1530 ".seh_stackalloc 0x20\n\t"
1531 "nop\n\t"
1532 ".seh_save_reg lr, 0x18\n\t"
1533 ".seh_endprologue\n\t"
1534 ".seh_handler " __ASM_NAME("user_callback_handler") ", @except\n\t"
1535 "ldr x0, [sp]\n\t" /* args */
1536 "ldp w1, w2, [sp, #0x08]\n\t" /* len, id */
1537 "ldr x3, [x18, 0x60]\n\t" /* peb */
1538 "ldr x3, [x3, 0x58]\n\t" /* peb->KernelCallbackTable */
1539 "ldr x15, [x3, x2, lsl #3]\n\t"
1540 "blr x15\n\t"
1541 ".globl \"#KiUserCallbackDispatcherReturn\"\n"
1542 "\"#KiUserCallbackDispatcherReturn\":\n\t"
1543 "mov x2, x0\n\t" /* status */
1544 "mov x1, #0\n\t" /* ret_len */
1545 "mov x0, x1\n\t" /* ret_ptr */
1546 "bl " __ASM_NAME("NtCallbackReturn") "\n\t"
1547 "bl " __ASM_NAME("RtlRaiseStatus") "\n\t"
1548 "brk #1" )
1551 /**************************************************************************
1552 * RtlIsEcCode (NTDLL.@)
1554 BOOLEAN WINAPI RtlIsEcCode( const void *ptr )
1556 const UINT64 *map = (const UINT64 *)NtCurrentTeb()->Peb->EcCodeBitMap;
1557 ULONG_PTR page = (ULONG_PTR)ptr / page_size;
1558 return (map[page / 64] >> (page & 63)) & 1;
1562 /***********************************************************************
1563 * RtlCaptureContext (NTDLL.@)
1565 void WINAPI RtlCaptureContext( CONTEXT *context )
1567 FIXME( "not implemented\n" );
1571 /*******************************************************************
1572 * RtlRestoreContext (NTDLL.@)
1574 void CDECL RtlRestoreContext( CONTEXT *context, EXCEPTION_RECORD *rec )
1576 FIXME( "not implemented\n" );
1580 /*******************************************************************
1581 * RtlUnwindEx (NTDLL.@)
1583 void WINAPI RtlUnwindEx( PVOID end_frame, PVOID target_ip, EXCEPTION_RECORD *rec,
1584 PVOID retval, CONTEXT *context, UNWIND_HISTORY_TABLE *table )
1586 FIXME( "not implemented\n" );
1590 /*******************************************************************
1591 * __C_specific_handler (NTDLL.@)
1593 EXCEPTION_DISPOSITION WINAPI __C_specific_handler( EXCEPTION_RECORD *rec,
1594 void *frame,
1595 CONTEXT *context,
1596 struct _DISPATCHER_CONTEXT *dispatch )
1598 FIXME( "not implemented\n" );
1599 return ExceptionContinueSearch;
1603 /*************************************************************************
1604 * RtlCaptureStackBackTrace (NTDLL.@)
1606 USHORT WINAPI RtlCaptureStackBackTrace( ULONG skip, ULONG count, PVOID *buffer, ULONG *hash )
1608 FIXME( "not implemented\n" );
1609 return 0;
1613 static int code_match( BYTE *code, const BYTE *seq, size_t len )
1615 for ( ; len; len--, code++, seq++) if (*seq && *code != *seq) return 0;
1616 return 1;
1619 void *check_call( void **target, void *exit_thunk, void *dest )
1621 static const BYTE jmp_sequence[] =
1623 0xff, 0x25 /* jmp *xxx(%rip) */
1625 static const BYTE fast_forward_sequence[] =
1627 0x48, 0x8b, 0xc4, /* mov %rsp,%rax */
1628 0x48, 0x89, 0x58, 0x20, /* mov %rbx,0x20(%rax) */
1629 0x55, /* push %rbp */
1630 0x5d, /* pop %rbp */
1631 0xe9 /* jmp arm_code */
1633 static const BYTE syscall_sequence[] =
1635 0x4c, 0x8b, 0xd1, /* mov %rcx,%r10 */
1636 0xb8, 0, 0, 0, 0, /* mov $xxx,%eax */
1637 0xf6, 0x04, 0x25, 0x08, /* testb $0x1,0x7ffe0308 */
1638 0x03, 0xfe, 0x7f, 0x01,
1639 0x75, 0x03, /* jne 1f */
1640 0x0f, 0x05, /* syscall */
1641 0xc3, /* ret */
1642 0xcd, 0x2e, /* 1: int $0x2e */
1643 0xc3 /* ret */
1646 for (;;)
1648 if (dest == __wine_unix_call_dispatcher) return dest;
1649 if (RtlIsEcCode( dest )) return dest;
1650 if (code_match( dest, jmp_sequence, sizeof(jmp_sequence) ))
1652 int *off_ptr = (int *)((char *)dest + sizeof(jmp_sequence));
1653 void **addr_ptr = (void **)((char *)(off_ptr + 1) + *off_ptr);
1654 dest = *addr_ptr;
1655 continue;
1657 if (!((ULONG_PTR)dest & 15)) /* fast-forward and syscall thunks are always aligned */
1659 if (code_match( dest, fast_forward_sequence, sizeof(fast_forward_sequence) ))
1661 int *off_ptr = (int *)((char *)dest + sizeof(fast_forward_sequence));
1662 return (char *)(off_ptr + 1) + *off_ptr;
1664 if (code_match( dest, syscall_sequence, sizeof(syscall_sequence) ))
1666 ULONG id = ((ULONG *)dest)[1];
1667 if (id < ARRAY_SIZE(arm64ec_syscalls)) return arm64ec_syscalls[id];
1670 *target = dest;
1671 return exit_thunk;
1675 static void __attribute__((naked)) arm64x_check_call(void)
1677 asm( "stp x29, x30, [sp,#-0xb0]!\n\t"
1678 "mov x29, sp\n\t"
1679 "stp x0, x1, [sp, #0x10]\n\t"
1680 "stp x2, x3, [sp, #0x20]\n\t"
1681 "stp x4, x5, [sp, #0x30]\n\t"
1682 "stp x6, x7, [sp, #0x40]\n\t"
1683 "stp x8, x9, [sp, #0x50]\n\t"
1684 "stp x10, x15, [sp, #0x60]\n\t"
1685 "stp d0, d1, [sp, #0x70]\n\t"
1686 "stp d2, d3, [sp, #0x80]\n\t"
1687 "stp d4, d5, [sp, #0x90]\n\t"
1688 "stp d6, d7, [sp, #0xa0]\n\t"
1689 "add x0, sp, #0x58\n\t" /* x9 = &target */
1690 "mov x1, x10\n\t" /* x10 = exit_thunk */
1691 "mov x2, x11\n\t" /* x11 = dest */
1692 "bl " __ASM_NAME("check_call") "\n\t"
1693 "mov x11, x0\n\t"
1694 "ldp x0, x1, [sp, #0x10]\n\t"
1695 "ldp x2, x3, [sp, #0x20]\n\t"
1696 "ldp x4, x5, [sp, #0x30]\n\t"
1697 "ldp x6, x7, [sp, #0x40]\n\t"
1698 "ldp x8, x9, [sp, #0x50]\n\t"
1699 "ldp x10, x15, [sp, #0x60]\n\t"
1700 "ldp d0, d1, [sp, #0x70]\n\t"
1701 "ldp d2, d3, [sp, #0x80]\n\t"
1702 "ldp d4, d5, [sp, #0x90]\n\t"
1703 "ldp d6, d7, [sp, #0xa0]\n\t"
1704 "ldp x29, x30, [sp], #0xb0\n\t"
1705 "ret" );
1709 /**************************************************************************
1710 * __chkstk (NTDLL.@)
1712 * Supposed to touch all the stack pages, but we shouldn't need that.
1714 void __attribute__((naked)) __chkstk(void)
1716 asm( "ret" );
1720 /**************************************************************************
1721 * __chkstk_arm64ec (NTDLL.@)
1723 * Supposed to touch all the stack pages, but we shouldn't need that.
1725 void __attribute__((naked)) __chkstk_arm64ec(void)
1727 asm( "ret" );
1731 /***********************************************************************
1732 * RtlRaiseException (NTDLL.@)
1734 void WINAPI RtlRaiseException( struct _EXCEPTION_RECORD * rec)
1736 FIXME( "not implemented\n" );
1740 /***********************************************************************
1741 * RtlUserThreadStart (NTDLL.@)
1743 void WINAPI RtlUserThreadStart( PRTL_THREAD_START_ROUTINE entry, void *arg )
1745 __TRY
1747 pBaseThreadInitThunk( 0, (LPTHREAD_START_ROUTINE)entry, arg );
1749 __EXCEPT(call_unhandled_exception_filter)
1751 NtTerminateProcess( GetCurrentProcess(), GetExceptionCode() );
1753 __ENDTRY
1757 /******************************************************************
1758 * LdrInitializeThunk (NTDLL.@)
1760 void WINAPI LdrInitializeThunk( CONTEXT *arm_context, ULONG_PTR unk2, ULONG_PTR unk3, ULONG_PTR unk4 )
1762 ARM64EC_NT_CONTEXT context;
1764 if (!__os_arm64x_check_call)
1766 __os_arm64x_check_call = arm64x_check_call;
1767 __os_arm64x_check_icall = arm64x_check_call;
1768 __os_arm64x_check_icall_cfg = arm64x_check_call;
1769 __os_arm64x_get_x64_information = LdrpGetX64Information;
1770 __os_arm64x_set_x64_information = LdrpSetX64Information;
1773 context_arm_to_x64( &context, (ARM64_NT_CONTEXT *)arm_context );
1774 loader_init( &context.AMD64_Context, (void **)&context.X0 );
1775 TRACE_(relay)( "\1Starting thread proc %p (arg=%p)\n", (void *)context.X0, (void *)context.X1 );
1776 NtContinue( &context.AMD64_Context, TRUE );
1780 /***********************************************************************
1781 * process_breakpoint
1783 __ASM_GLOBAL_FUNC( "#process_breakpoint",
1784 ".seh_endprologue\n\t"
1785 ".seh_handler process_breakpoint_handler, @except\n\t"
1786 "brk #0xf000\n\t"
1787 "ret\n"
1788 "process_breakpoint_handler:\n\t"
1789 "ldr x4, [x2, #0x108]\n\t" /* context->Pc */
1790 "add x4, x4, #4\n\t"
1791 "str x4, [x2, #0x108]\n\t"
1792 "mov w0, #0\n\t" /* ExceptionContinueExecution */
1793 "ret" )
1795 /***********************************************************************
1796 * DbgUiRemoteBreakin (NTDLL.@)
1798 void WINAPI DbgUiRemoteBreakin( void *arg )
1800 if (NtCurrentTeb()->Peb->BeingDebugged)
1802 __TRY
1804 DbgBreakPoint();
1806 __EXCEPT_ALL
1808 /* do nothing */
1810 __ENDTRY
1812 RtlExitUserThread( STATUS_SUCCESS );
1815 /**********************************************************************
1816 * DbgBreakPoint (NTDLL.@)
1818 void __attribute__((naked)) DbgBreakPoint(void)
1820 asm( ".seh_proc DbgBreakPoint\n\t"
1821 ".seh_endprologue\n\t"
1822 "brk #0xf000\n\t"
1823 "ret\n\t"
1824 ".seh_endproc" );
1828 /**********************************************************************
1829 * DbgUserBreakPoint (NTDLL.@)
1831 void __attribute__((naked)) DbgUserBreakPoint(void)
1833 asm( ".seh_proc DbgUserBreakPoint\n\t"
1834 ".seh_endprologue\n\t"
1835 "brk #0xf000\n\t"
1836 "ret\n\t"
1837 ".seh_endproc" );
1840 #endif /* __arm64ec__ */