2 * ARM64EC signal handling routines
4 * Copyright 1999, 2005, 2023 Alexandre Julliard
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2.1 of the License, or (at your option) any later version.
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
27 #define WIN32_NO_STATUS
30 #include "wine/exception.h"
31 #include "wine/list.h"
32 #include "ntdll_misc.h"
34 #include "wine/debug.h"
35 #include "ntsyscalls.h"
37 WINE_DEFAULT_DEBUG_CHANNEL(seh
);
38 WINE_DECLARE_DEBUG_CHANNEL(relay
);
40 /*******************************************************************
45 #define SYSCALL_ENTRY(id,name,args) __id_##name = id,
50 #define SYSCALL_API __attribute__((naked))
51 #define SYSCALL_FUNC(name) __ASM_SYSCALL_FUNC( __id_##name, name )
53 NTSTATUS SYSCALL_API
NtAcceptConnectPort( HANDLE
*handle
, ULONG id
, LPC_MESSAGE
*msg
, BOOLEAN accept
,
54 LPC_SECTION_WRITE
*write
, LPC_SECTION_READ
*read
)
56 SYSCALL_FUNC( NtAcceptConnectPort
);
59 NTSTATUS SYSCALL_API
NtAccessCheck( PSECURITY_DESCRIPTOR descr
, HANDLE token
, ACCESS_MASK access
,
60 GENERIC_MAPPING
*mapping
, PRIVILEGE_SET
*privs
, ULONG
*retlen
,
61 ULONG
*access_granted
, NTSTATUS
*access_status
)
63 SYSCALL_FUNC( NtAccessCheck
);
66 NTSTATUS SYSCALL_API
NtAccessCheckAndAuditAlarm( UNICODE_STRING
*subsystem
, HANDLE handle
,
67 UNICODE_STRING
*typename
, UNICODE_STRING
*objectname
,
68 PSECURITY_DESCRIPTOR descr
, ACCESS_MASK access
,
69 GENERIC_MAPPING
*mapping
, BOOLEAN creation
,
70 ACCESS_MASK
*access_granted
, BOOLEAN
*access_status
,
73 SYSCALL_FUNC( NtAccessCheckAndAuditAlarm
);
76 NTSTATUS SYSCALL_API
NtAddAtom( const WCHAR
*name
, ULONG length
, RTL_ATOM
*atom
)
78 SYSCALL_FUNC( NtAddAtom
);
81 NTSTATUS SYSCALL_API
NtAdjustGroupsToken( HANDLE token
, BOOLEAN reset
, TOKEN_GROUPS
*groups
,
82 ULONG length
, TOKEN_GROUPS
*prev
, ULONG
*retlen
)
84 SYSCALL_FUNC( NtAdjustGroupsToken
);
87 NTSTATUS SYSCALL_API
NtAdjustPrivilegesToken( HANDLE token
, BOOLEAN disable
, TOKEN_PRIVILEGES
*privs
,
88 DWORD length
, TOKEN_PRIVILEGES
*prev
, DWORD
*retlen
)
90 SYSCALL_FUNC( NtAdjustPrivilegesToken
);
93 NTSTATUS SYSCALL_API
NtAlertResumeThread( HANDLE handle
, ULONG
*count
)
95 SYSCALL_FUNC( NtAlertResumeThread
);
98 NTSTATUS SYSCALL_API
NtAlertThread( HANDLE handle
)
100 SYSCALL_FUNC( NtAlertThread
);
103 NTSTATUS SYSCALL_API
NtAlertThreadByThreadId( HANDLE tid
)
105 SYSCALL_FUNC( NtAlertThreadByThreadId
);
108 NTSTATUS SYSCALL_API
NtAllocateLocallyUniqueId( LUID
*luid
)
110 SYSCALL_FUNC( NtAllocateLocallyUniqueId
);
113 NTSTATUS SYSCALL_API
NtAllocateUuids( ULARGE_INTEGER
*time
, ULONG
*delta
, ULONG
*sequence
, UCHAR
*seed
)
115 SYSCALL_FUNC( NtAllocateUuids
);
118 NTSTATUS SYSCALL_API
NtAllocateVirtualMemory( HANDLE process
, PVOID
*ret
, ULONG_PTR zero_bits
,
119 SIZE_T
*size_ptr
, ULONG type
, ULONG protect
)
121 SYSCALL_FUNC( NtAllocateVirtualMemory
);
124 NTSTATUS SYSCALL_API
NtAllocateVirtualMemoryEx( HANDLE process
, PVOID
*ret
, SIZE_T
*size_ptr
, ULONG type
,
125 ULONG protect
, MEM_EXTENDED_PARAMETER
*parameters
,
128 SYSCALL_FUNC( NtAllocateVirtualMemoryEx
);
131 NTSTATUS SYSCALL_API
NtAreMappedFilesTheSame(PVOID addr1
, PVOID addr2
)
133 SYSCALL_FUNC( NtAreMappedFilesTheSame
);
136 NTSTATUS SYSCALL_API
NtAssignProcessToJobObject( HANDLE job
, HANDLE process
)
138 SYSCALL_FUNC( NtAssignProcessToJobObject
);
141 NTSTATUS SYSCALL_API
NtCallbackReturn( void *ret_ptr
, ULONG ret_len
, NTSTATUS status
)
143 SYSCALL_FUNC( NtCallbackReturn
);
146 NTSTATUS SYSCALL_API
NtCancelIoFile( HANDLE handle
, IO_STATUS_BLOCK
*io_status
)
148 SYSCALL_FUNC( NtCancelIoFile
);
151 NTSTATUS SYSCALL_API
NtCancelIoFileEx( HANDLE handle
, IO_STATUS_BLOCK
*io
, IO_STATUS_BLOCK
*io_status
)
153 SYSCALL_FUNC( NtCancelIoFileEx
);
156 NTSTATUS SYSCALL_API
NtCancelSynchronousIoFile( HANDLE handle
, IO_STATUS_BLOCK
*io
,
157 IO_STATUS_BLOCK
*io_status
)
159 SYSCALL_FUNC( NtCancelSynchronousIoFile
);
162 NTSTATUS SYSCALL_API
NtCancelTimer( HANDLE handle
, BOOLEAN
*state
)
164 SYSCALL_FUNC( NtCancelTimer
);
167 NTSTATUS SYSCALL_API
NtClearEvent( HANDLE handle
)
169 SYSCALL_FUNC( NtClearEvent
);
172 NTSTATUS SYSCALL_API
NtClose( HANDLE handle
)
174 SYSCALL_FUNC( NtClose
);
177 NTSTATUS SYSCALL_API
NtCommitTransaction( HANDLE transaction
, BOOLEAN wait
)
179 SYSCALL_FUNC( NtCommitTransaction
);
182 NTSTATUS SYSCALL_API
NtCompareObjects( HANDLE first
, HANDLE second
)
184 SYSCALL_FUNC( NtCompareObjects
);
187 NTSTATUS SYSCALL_API
NtCompareTokens( HANDLE first
, HANDLE second
, BOOLEAN
*equal
)
189 SYSCALL_FUNC( NtCompareTokens
);
192 NTSTATUS SYSCALL_API
NtCompleteConnectPort( HANDLE handle
)
194 SYSCALL_FUNC( NtCompleteConnectPort
);
197 NTSTATUS SYSCALL_API
NtConnectPort( HANDLE
*handle
, UNICODE_STRING
*name
, SECURITY_QUALITY_OF_SERVICE
*qos
,
198 LPC_SECTION_WRITE
*write
, LPC_SECTION_READ
*read
, ULONG
*max_len
,
199 void *info
, ULONG
*info_len
)
201 SYSCALL_FUNC( NtConnectPort
);
204 static NTSTATUS SYSCALL_API
syscall_NtContinue( ARM64_NT_CONTEXT
*context
, BOOLEAN alertable
)
206 __ASM_SYSCALL_FUNC( __id_NtContinue
, syscall_NtContinue
);
209 NTSTATUS WINAPI
NtContinue( CONTEXT
*context
, BOOLEAN alertable
)
211 ARM64_NT_CONTEXT arm_ctx
;
213 context_x64_to_arm( &arm_ctx
, (ARM64EC_NT_CONTEXT
*)context
);
214 return syscall_NtContinue( &arm_ctx
, alertable
);
217 NTSTATUS SYSCALL_API
NtCreateDebugObject( HANDLE
*handle
, ACCESS_MASK access
,
218 OBJECT_ATTRIBUTES
*attr
, ULONG flags
)
220 SYSCALL_FUNC( NtCreateDebugObject
);
223 NTSTATUS SYSCALL_API
NtCreateDirectoryObject( HANDLE
*handle
, ACCESS_MASK access
, OBJECT_ATTRIBUTES
*attr
)
225 SYSCALL_FUNC( NtCreateDirectoryObject
);
228 NTSTATUS SYSCALL_API
NtCreateEvent( HANDLE
*handle
, ACCESS_MASK access
, const OBJECT_ATTRIBUTES
*attr
,
229 EVENT_TYPE type
, BOOLEAN state
)
231 SYSCALL_FUNC( NtCreateEvent
);
234 NTSTATUS SYSCALL_API
NtCreateFile( HANDLE
*handle
, ACCESS_MASK access
, OBJECT_ATTRIBUTES
*attr
,
235 IO_STATUS_BLOCK
*io
, LARGE_INTEGER
*alloc_size
,
236 ULONG attributes
, ULONG sharing
, ULONG disposition
,
237 ULONG options
, void *ea_buffer
, ULONG ea_length
)
239 SYSCALL_FUNC( NtCreateFile
);
242 NTSTATUS SYSCALL_API
NtCreateIoCompletion( HANDLE
*handle
, ACCESS_MASK access
, OBJECT_ATTRIBUTES
*attr
,
245 SYSCALL_FUNC( NtCreateIoCompletion
);
248 NTSTATUS SYSCALL_API
NtCreateJobObject( HANDLE
*handle
, ACCESS_MASK access
, const OBJECT_ATTRIBUTES
*attr
)
250 SYSCALL_FUNC( NtCreateJobObject
);
253 NTSTATUS SYSCALL_API
NtCreateKey( HANDLE
*key
, ACCESS_MASK access
, const OBJECT_ATTRIBUTES
*attr
,
254 ULONG index
, const UNICODE_STRING
*class, ULONG options
, ULONG
*dispos
)
256 SYSCALL_FUNC( NtCreateKey
);
259 NTSTATUS SYSCALL_API
NtCreateKeyTransacted( HANDLE
*key
, ACCESS_MASK access
, const OBJECT_ATTRIBUTES
*attr
,
260 ULONG index
, const UNICODE_STRING
*class, ULONG options
,
261 HANDLE transacted
, ULONG
*dispos
)
263 SYSCALL_FUNC( NtCreateKeyTransacted
);
266 NTSTATUS SYSCALL_API
NtCreateKeyedEvent( HANDLE
*handle
, ACCESS_MASK access
,
267 const OBJECT_ATTRIBUTES
*attr
, ULONG flags
)
269 SYSCALL_FUNC( NtCreateKeyedEvent
);
272 NTSTATUS SYSCALL_API
NtCreateLowBoxToken( HANDLE
*token_handle
, HANDLE token
, ACCESS_MASK access
,
273 OBJECT_ATTRIBUTES
*attr
, SID
*sid
, ULONG count
,
274 SID_AND_ATTRIBUTES
*capabilities
, ULONG handle_count
,
277 SYSCALL_FUNC( NtCreateLowBoxToken
);
280 NTSTATUS SYSCALL_API
NtCreateMailslotFile( HANDLE
*handle
, ULONG access
, OBJECT_ATTRIBUTES
*attr
,
281 IO_STATUS_BLOCK
*io
, ULONG options
, ULONG quota
, ULONG msg_size
,
282 LARGE_INTEGER
*timeout
)
284 SYSCALL_FUNC( NtCreateMailslotFile
);
287 NTSTATUS SYSCALL_API
NtCreateMutant( HANDLE
*handle
, ACCESS_MASK access
, const OBJECT_ATTRIBUTES
*attr
,
290 SYSCALL_FUNC( NtCreateMutant
);
293 NTSTATUS SYSCALL_API
NtCreateNamedPipeFile( HANDLE
*handle
, ULONG access
, OBJECT_ATTRIBUTES
*attr
,
294 IO_STATUS_BLOCK
*io
, ULONG sharing
, ULONG dispo
, ULONG options
,
295 ULONG pipe_type
, ULONG read_mode
, ULONG completion_mode
,
296 ULONG max_inst
, ULONG inbound_quota
, ULONG outbound_quota
,
297 LARGE_INTEGER
*timeout
)
299 SYSCALL_FUNC( NtCreateNamedPipeFile
);
302 NTSTATUS SYSCALL_API
NtCreatePagingFile( UNICODE_STRING
*name
, LARGE_INTEGER
*min_size
,
303 LARGE_INTEGER
*max_size
, LARGE_INTEGER
*actual_size
)
305 SYSCALL_FUNC( NtCreatePagingFile
);
308 NTSTATUS SYSCALL_API
NtCreatePort( HANDLE
*handle
, OBJECT_ATTRIBUTES
*attr
, ULONG info_len
,
309 ULONG data_len
, ULONG
*reserved
)
311 SYSCALL_FUNC( NtCreatePort
);
314 NTSTATUS SYSCALL_API
NtCreateSection( HANDLE
*handle
, ACCESS_MASK access
, const OBJECT_ATTRIBUTES
*attr
,
315 const LARGE_INTEGER
*size
, ULONG protect
,
316 ULONG sec_flags
, HANDLE file
)
318 SYSCALL_FUNC( NtCreateSection
);
321 NTSTATUS SYSCALL_API
NtCreateSemaphore( HANDLE
*handle
, ACCESS_MASK access
, const OBJECT_ATTRIBUTES
*attr
,
322 LONG initial
, LONG max
)
324 SYSCALL_FUNC( NtCreateSemaphore
);
327 NTSTATUS SYSCALL_API
NtCreateSymbolicLinkObject( HANDLE
*handle
, ACCESS_MASK access
,
328 OBJECT_ATTRIBUTES
*attr
, UNICODE_STRING
*target
)
330 SYSCALL_FUNC( NtCreateSymbolicLinkObject
);
333 NTSTATUS SYSCALL_API
NtCreateThread( HANDLE
*handle
, ACCESS_MASK access
, OBJECT_ATTRIBUTES
*attr
,
334 HANDLE process
, CLIENT_ID
*id
, CONTEXT
*ctx
, INITIAL_TEB
*teb
,
337 SYSCALL_FUNC( NtCreateThread
);
340 NTSTATUS SYSCALL_API
NtCreateThreadEx( HANDLE
*handle
, ACCESS_MASK access
, OBJECT_ATTRIBUTES
*attr
,
341 HANDLE process
, PRTL_THREAD_START_ROUTINE start
, void *param
,
342 ULONG flags
, ULONG_PTR zero_bits
, SIZE_T stack_commit
,
343 SIZE_T stack_reserve
, PS_ATTRIBUTE_LIST
*attr_list
)
345 SYSCALL_FUNC( NtCreateThreadEx
);
348 NTSTATUS SYSCALL_API
NtCreateTimer( HANDLE
*handle
, ACCESS_MASK access
, const OBJECT_ATTRIBUTES
*attr
,
351 SYSCALL_FUNC( NtCreateTimer
);
354 NTSTATUS SYSCALL_API
NtCreateToken( HANDLE
*handle
, ACCESS_MASK access
, OBJECT_ATTRIBUTES
*attr
,
355 TOKEN_TYPE type
, LUID
*token_id
, LARGE_INTEGER
*expire
,
356 TOKEN_USER
*user
, TOKEN_GROUPS
*groups
, TOKEN_PRIVILEGES
*privs
,
357 TOKEN_OWNER
*owner
, TOKEN_PRIMARY_GROUP
*group
,
358 TOKEN_DEFAULT_DACL
*dacl
, TOKEN_SOURCE
*source
)
360 SYSCALL_FUNC( NtCreateToken
);
363 NTSTATUS SYSCALL_API
NtCreateTransaction( HANDLE
*handle
, ACCESS_MASK mask
, OBJECT_ATTRIBUTES
*obj_attr
,
364 GUID
*guid
, HANDLE tm
, ULONG options
, ULONG isol_level
,
365 ULONG isol_flags
, PLARGE_INTEGER timeout
,
366 UNICODE_STRING
*description
)
368 SYSCALL_FUNC( NtCreateTransaction
);
371 NTSTATUS SYSCALL_API
NtCreateUserProcess( HANDLE
*process_handle_ptr
, HANDLE
*thread_handle_ptr
,
372 ACCESS_MASK process_access
, ACCESS_MASK thread_access
,
373 OBJECT_ATTRIBUTES
*process_attr
, OBJECT_ATTRIBUTES
*thread_attr
,
374 ULONG process_flags
, ULONG thread_flags
,
375 RTL_USER_PROCESS_PARAMETERS
*params
, PS_CREATE_INFO
*info
,
376 PS_ATTRIBUTE_LIST
*ps_attr
)
378 SYSCALL_FUNC( NtCreateUserProcess
);
381 NTSTATUS SYSCALL_API
NtDebugActiveProcess( HANDLE process
, HANDLE debug
)
383 SYSCALL_FUNC( NtDebugActiveProcess
);
386 NTSTATUS SYSCALL_API
NtDebugContinue( HANDLE handle
, CLIENT_ID
*client
, NTSTATUS status
)
388 SYSCALL_FUNC( NtDebugContinue
);
391 NTSTATUS SYSCALL_API
NtDelayExecution( BOOLEAN alertable
, const LARGE_INTEGER
*timeout
)
393 SYSCALL_FUNC( NtDelayExecution
);
396 NTSTATUS SYSCALL_API
NtDeleteAtom( RTL_ATOM atom
)
398 SYSCALL_FUNC( NtDeleteAtom
);
401 NTSTATUS SYSCALL_API
NtDeleteFile( OBJECT_ATTRIBUTES
*attr
)
403 SYSCALL_FUNC( NtDeleteFile
);
406 NTSTATUS SYSCALL_API
NtDeleteKey( HANDLE key
)
408 SYSCALL_FUNC( NtDeleteKey
);
411 NTSTATUS SYSCALL_API
NtDeleteValueKey( HANDLE key
, const UNICODE_STRING
*name
)
413 SYSCALL_FUNC( NtDeleteValueKey
);
416 NTSTATUS SYSCALL_API
NtDeviceIoControlFile( HANDLE handle
, HANDLE event
, PIO_APC_ROUTINE apc
,
417 void *apc_context
, IO_STATUS_BLOCK
*io
, ULONG code
,
418 void *in_buffer
, ULONG in_size
,
419 void *out_buffer
, ULONG out_size
)
421 SYSCALL_FUNC( NtDeviceIoControlFile
);
424 NTSTATUS SYSCALL_API
NtDisplayString( UNICODE_STRING
*string
)
426 SYSCALL_FUNC( NtDisplayString
);
429 NTSTATUS SYSCALL_API
NtDuplicateObject( HANDLE source_process
, HANDLE source
, HANDLE dest_process
,
430 HANDLE
*dest
, ACCESS_MASK access
, ULONG attributes
, ULONG options
)
432 SYSCALL_FUNC( NtDuplicateObject
);
435 NTSTATUS SYSCALL_API
NtDuplicateToken( HANDLE token
, ACCESS_MASK access
, OBJECT_ATTRIBUTES
*attr
,
436 BOOLEAN effective_only
, TOKEN_TYPE type
, HANDLE
*handle
)
438 SYSCALL_FUNC( NtDuplicateToken
);
441 NTSTATUS SYSCALL_API
NtEnumerateKey( HANDLE handle
, ULONG index
, KEY_INFORMATION_CLASS info_class
,
442 void *info
, DWORD length
, DWORD
*result_len
)
444 SYSCALL_FUNC( NtEnumerateKey
);
447 NTSTATUS SYSCALL_API
NtEnumerateValueKey( HANDLE handle
, ULONG index
, KEY_VALUE_INFORMATION_CLASS info_class
,
448 void *info
, DWORD length
, DWORD
*result_len
)
450 SYSCALL_FUNC( NtEnumerateValueKey
);
453 NTSTATUS SYSCALL_API
NtFilterToken( HANDLE token
, ULONG flags
, TOKEN_GROUPS
*disable_sids
,
454 TOKEN_PRIVILEGES
*privileges
, TOKEN_GROUPS
*restrict_sids
,
457 SYSCALL_FUNC( NtFilterToken
);
460 NTSTATUS SYSCALL_API
NtFindAtom( const WCHAR
*name
, ULONG length
, RTL_ATOM
*atom
)
462 SYSCALL_FUNC( NtFindAtom
);
465 NTSTATUS SYSCALL_API
NtFlushBuffersFile( HANDLE handle
, IO_STATUS_BLOCK
*io
)
467 SYSCALL_FUNC( NtFlushBuffersFile
);
470 NTSTATUS SYSCALL_API
NtFlushInstructionCache( HANDLE handle
, const void *addr
, SIZE_T size
)
472 SYSCALL_FUNC( NtFlushInstructionCache
);
475 NTSTATUS SYSCALL_API
NtFlushKey( HANDLE key
)
477 SYSCALL_FUNC( NtFlushKey
);
480 NTSTATUS SYSCALL_API
NtFlushProcessWriteBuffers(void)
482 SYSCALL_FUNC( NtFlushProcessWriteBuffers
);
485 NTSTATUS SYSCALL_API
NtFlushVirtualMemory( HANDLE process
, LPCVOID
*addr_ptr
,
486 SIZE_T
*size_ptr
, ULONG unknown
)
488 SYSCALL_FUNC( NtFlushVirtualMemory
);
491 NTSTATUS SYSCALL_API
NtFreeVirtualMemory( HANDLE process
, PVOID
*addr_ptr
, SIZE_T
*size_ptr
, ULONG type
)
493 SYSCALL_FUNC( NtFreeVirtualMemory
);
496 NTSTATUS SYSCALL_API
NtFsControlFile( HANDLE handle
, HANDLE event
, PIO_APC_ROUTINE apc
, void *apc_context
,
497 IO_STATUS_BLOCK
*io
, ULONG code
, void *in_buffer
, ULONG in_size
,
498 void *out_buffer
, ULONG out_size
)
500 SYSCALL_FUNC( NtFsControlFile
);
503 static NTSTATUS SYSCALL_API
syscall_NtGetContextThread( HANDLE handle
, ARM64_NT_CONTEXT
*context
)
505 __ASM_SYSCALL_FUNC( __id_NtGetContextThread
, syscall_NtGetContextThread
);
508 NTSTATUS WINAPI
NtGetContextThread( HANDLE handle
, CONTEXT
*context
)
510 ARM64_NT_CONTEXT arm_ctx
= { .ContextFlags
= ctx_flags_x64_to_arm( context
->ContextFlags
) };
511 NTSTATUS status
= syscall_NtGetContextThread( handle
, &arm_ctx
);
513 if (!status
) context_arm_to_x64( (ARM64EC_NT_CONTEXT
*)context
, &arm_ctx
);
517 ULONG SYSCALL_API
NtGetCurrentProcessorNumber(void)
519 SYSCALL_FUNC( NtGetCurrentProcessorNumber
);
522 NTSTATUS SYSCALL_API
NtGetNextThread( HANDLE process
, HANDLE thread
, ACCESS_MASK access
, ULONG attributes
,
523 ULONG flags
, HANDLE
*handle
)
525 SYSCALL_FUNC( NtGetNextThread
);
528 NTSTATUS SYSCALL_API
NtGetNlsSectionPtr( ULONG type
, ULONG id
, void *unknown
, void **ptr
, SIZE_T
*size
)
530 SYSCALL_FUNC( NtGetNlsSectionPtr
);
533 NTSTATUS SYSCALL_API
NtGetWriteWatch( HANDLE process
, ULONG flags
, PVOID base
, SIZE_T size
,
534 PVOID
*addresses
, ULONG_PTR
*count
, ULONG
*granularity
)
536 SYSCALL_FUNC( NtGetWriteWatch
);
539 NTSTATUS SYSCALL_API
NtImpersonateAnonymousToken( HANDLE thread
)
541 SYSCALL_FUNC( NtImpersonateAnonymousToken
);
544 NTSTATUS SYSCALL_API
NtInitializeNlsFiles( void **ptr
, LCID
*lcid
, LARGE_INTEGER
*size
)
546 SYSCALL_FUNC( NtInitializeNlsFiles
);
549 NTSTATUS SYSCALL_API
NtInitiatePowerAction( POWER_ACTION action
, SYSTEM_POWER_STATE state
,
550 ULONG flags
, BOOLEAN async
)
552 SYSCALL_FUNC( NtInitiatePowerAction
);
555 NTSTATUS SYSCALL_API
NtIsProcessInJob( HANDLE process
, HANDLE job
)
557 SYSCALL_FUNC( NtIsProcessInJob
);
560 NTSTATUS SYSCALL_API
NtListenPort( HANDLE handle
, LPC_MESSAGE
*msg
)
562 SYSCALL_FUNC( NtListenPort
);
565 NTSTATUS SYSCALL_API
NtLoadDriver( const UNICODE_STRING
*name
)
567 SYSCALL_FUNC( NtLoadDriver
);
570 NTSTATUS SYSCALL_API
NtLoadKey( const OBJECT_ATTRIBUTES
*attr
, OBJECT_ATTRIBUTES
*file
)
572 SYSCALL_FUNC( NtLoadKey
);
575 NTSTATUS SYSCALL_API
NtLoadKey2( const OBJECT_ATTRIBUTES
*attr
, OBJECT_ATTRIBUTES
*file
, ULONG flags
)
577 SYSCALL_FUNC( NtLoadKey2
);
580 NTSTATUS SYSCALL_API
NtLoadKeyEx( const OBJECT_ATTRIBUTES
*attr
, OBJECT_ATTRIBUTES
*file
, ULONG flags
,
581 HANDLE trustkey
, HANDLE event
, ACCESS_MASK access
,
582 HANDLE
*roothandle
, IO_STATUS_BLOCK
*iostatus
)
584 SYSCALL_FUNC( NtLoadKeyEx
);
587 NTSTATUS SYSCALL_API
NtLockFile( HANDLE file
, HANDLE event
, PIO_APC_ROUTINE apc
, void* apc_user
,
588 IO_STATUS_BLOCK
*io_status
, LARGE_INTEGER
*offset
,
589 LARGE_INTEGER
*count
, ULONG
*key
, BOOLEAN dont_wait
, BOOLEAN exclusive
)
591 SYSCALL_FUNC( NtLockFile
);
594 NTSTATUS SYSCALL_API
NtLockVirtualMemory( HANDLE process
, PVOID
*addr
, SIZE_T
*size
, ULONG unknown
)
596 SYSCALL_FUNC( NtLockVirtualMemory
);
599 NTSTATUS SYSCALL_API
NtMakeTemporaryObject( HANDLE handle
)
601 SYSCALL_FUNC( NtMakeTemporaryObject
);
604 NTSTATUS SYSCALL_API
NtMapViewOfSection( HANDLE handle
, HANDLE process
, PVOID
*addr_ptr
,
605 ULONG_PTR zero_bits
, SIZE_T commit_size
,
606 const LARGE_INTEGER
*offset_ptr
, SIZE_T
*size_ptr
,
607 SECTION_INHERIT inherit
, ULONG alloc_type
, ULONG protect
)
609 SYSCALL_FUNC( NtMapViewOfSection
);
612 NTSTATUS SYSCALL_API
NtMapViewOfSectionEx( HANDLE handle
, HANDLE process
, PVOID
*addr_ptr
,
613 const LARGE_INTEGER
*offset_ptr
, SIZE_T
*size_ptr
,
614 ULONG alloc_type
, ULONG protect
,
615 MEM_EXTENDED_PARAMETER
*parameters
, ULONG count
)
617 SYSCALL_FUNC( NtMapViewOfSectionEx
);
620 NTSTATUS SYSCALL_API
NtNotifyChangeDirectoryFile( HANDLE handle
, HANDLE event
, PIO_APC_ROUTINE apc
,
621 void *apc_context
, IO_STATUS_BLOCK
*iosb
, void *buffer
,
622 ULONG buffer_size
, ULONG filter
, BOOLEAN subtree
)
624 SYSCALL_FUNC( NtNotifyChangeDirectoryFile
);
627 NTSTATUS SYSCALL_API
NtNotifyChangeKey( HANDLE key
, HANDLE event
, PIO_APC_ROUTINE apc
, void *apc_context
,
628 IO_STATUS_BLOCK
*io
, ULONG filter
, BOOLEAN subtree
,
629 void *buffer
, ULONG length
, BOOLEAN async
)
631 SYSCALL_FUNC( NtNotifyChangeKey
);
634 NTSTATUS SYSCALL_API
NtNotifyChangeMultipleKeys( HANDLE key
, ULONG count
, OBJECT_ATTRIBUTES
*attr
,
635 HANDLE event
, PIO_APC_ROUTINE apc
, void *apc_context
,
636 IO_STATUS_BLOCK
*io
, ULONG filter
, BOOLEAN subtree
,
637 void *buffer
, ULONG length
, BOOLEAN async
)
639 SYSCALL_FUNC( NtNotifyChangeMultipleKeys
);
642 NTSTATUS SYSCALL_API
NtOpenDirectoryObject( HANDLE
*handle
, ACCESS_MASK access
, const OBJECT_ATTRIBUTES
*attr
)
644 SYSCALL_FUNC( NtOpenDirectoryObject
);
647 NTSTATUS SYSCALL_API
NtOpenEvent( HANDLE
*handle
, ACCESS_MASK access
, const OBJECT_ATTRIBUTES
*attr
)
649 SYSCALL_FUNC( NtOpenEvent
);
652 NTSTATUS SYSCALL_API
NtOpenFile( HANDLE
*handle
, ACCESS_MASK access
, OBJECT_ATTRIBUTES
*attr
,
653 IO_STATUS_BLOCK
*io
, ULONG sharing
, ULONG options
)
655 SYSCALL_FUNC( NtOpenFile
);
658 NTSTATUS SYSCALL_API
NtOpenIoCompletion( HANDLE
*handle
, ACCESS_MASK access
, const OBJECT_ATTRIBUTES
*attr
)
660 SYSCALL_FUNC( NtOpenIoCompletion
);
663 NTSTATUS SYSCALL_API
NtOpenJobObject( HANDLE
*handle
, ACCESS_MASK access
, const OBJECT_ATTRIBUTES
*attr
)
665 SYSCALL_FUNC( NtOpenJobObject
);
668 NTSTATUS SYSCALL_API
NtOpenKey( HANDLE
*key
, ACCESS_MASK access
, const OBJECT_ATTRIBUTES
*attr
)
670 SYSCALL_FUNC( NtOpenKey
);
673 NTSTATUS SYSCALL_API
NtOpenKeyEx( HANDLE
*key
, ACCESS_MASK access
, const OBJECT_ATTRIBUTES
*attr
, ULONG options
)
675 SYSCALL_FUNC( NtOpenKeyEx
);
678 NTSTATUS SYSCALL_API
NtOpenKeyTransacted( HANDLE
*key
, ACCESS_MASK access
, const OBJECT_ATTRIBUTES
*attr
,
681 SYSCALL_FUNC( NtOpenKeyTransacted
);
684 NTSTATUS SYSCALL_API
NtOpenKeyTransactedEx( HANDLE
*key
, ACCESS_MASK access
, const OBJECT_ATTRIBUTES
*attr
,
685 ULONG options
, HANDLE transaction
)
687 SYSCALL_FUNC( NtOpenKeyTransactedEx
);
690 NTSTATUS SYSCALL_API
NtOpenKeyedEvent( HANDLE
*handle
, ACCESS_MASK access
, const OBJECT_ATTRIBUTES
*attr
)
692 SYSCALL_FUNC( NtOpenKeyedEvent
);
695 NTSTATUS SYSCALL_API
NtOpenMutant( HANDLE
*handle
, ACCESS_MASK access
, const OBJECT_ATTRIBUTES
*attr
)
697 SYSCALL_FUNC( NtOpenMutant
);
700 NTSTATUS SYSCALL_API
NtOpenProcess( HANDLE
*handle
, ACCESS_MASK access
,
701 const OBJECT_ATTRIBUTES
*attr
, const CLIENT_ID
*id
)
703 SYSCALL_FUNC( NtOpenProcess
);
706 NTSTATUS SYSCALL_API
NtOpenProcessToken( HANDLE process
, DWORD access
, HANDLE
*handle
)
708 SYSCALL_FUNC( NtOpenProcessToken
);
711 NTSTATUS SYSCALL_API
NtOpenProcessTokenEx( HANDLE process
, DWORD access
, DWORD attributes
, HANDLE
*handle
)
713 SYSCALL_FUNC( NtOpenProcessTokenEx
);
716 NTSTATUS SYSCALL_API
NtOpenSection( HANDLE
*handle
, ACCESS_MASK access
, const OBJECT_ATTRIBUTES
*attr
)
718 SYSCALL_FUNC( NtOpenSection
);
721 NTSTATUS SYSCALL_API
NtOpenSemaphore( HANDLE
*handle
, ACCESS_MASK access
, const OBJECT_ATTRIBUTES
*attr
)
723 SYSCALL_FUNC( NtOpenSemaphore
);
726 NTSTATUS SYSCALL_API
NtOpenSymbolicLinkObject( HANDLE
*handle
, ACCESS_MASK access
,
727 const OBJECT_ATTRIBUTES
*attr
)
729 SYSCALL_FUNC( NtOpenSymbolicLinkObject
);
732 NTSTATUS SYSCALL_API
NtOpenThread( HANDLE
*handle
, ACCESS_MASK access
,
733 const OBJECT_ATTRIBUTES
*attr
, const CLIENT_ID
*id
)
735 SYSCALL_FUNC( NtOpenThread
);
738 NTSTATUS SYSCALL_API
NtOpenThreadToken( HANDLE thread
, DWORD access
, BOOLEAN self
, HANDLE
*handle
)
740 SYSCALL_FUNC( NtOpenThreadToken
);
743 NTSTATUS SYSCALL_API
NtOpenThreadTokenEx( HANDLE thread
, DWORD access
, BOOLEAN self
, DWORD attributes
,
746 SYSCALL_FUNC( NtOpenThreadTokenEx
);
749 NTSTATUS SYSCALL_API
NtOpenTimer( HANDLE
*handle
, ACCESS_MASK access
, const OBJECT_ATTRIBUTES
*attr
)
751 SYSCALL_FUNC( NtOpenTimer
);
754 NTSTATUS SYSCALL_API
NtPowerInformation( POWER_INFORMATION_LEVEL level
, void *input
, ULONG in_size
,
755 void *output
, ULONG out_size
)
757 SYSCALL_FUNC( NtPowerInformation
);
760 NTSTATUS SYSCALL_API
NtPrivilegeCheck( HANDLE token
, PRIVILEGE_SET
*privs
, BOOLEAN
*res
)
762 SYSCALL_FUNC( NtPrivilegeCheck
);
765 NTSTATUS SYSCALL_API
NtProtectVirtualMemory( HANDLE process
, PVOID
*addr_ptr
, SIZE_T
*size_ptr
,
766 ULONG new_prot
, ULONG
*old_prot
)
768 SYSCALL_FUNC( NtProtectVirtualMemory
);
771 NTSTATUS SYSCALL_API
NtPulseEvent( HANDLE handle
, LONG
*prev_state
)
773 SYSCALL_FUNC( NtPulseEvent
);
776 NTSTATUS SYSCALL_API
NtQueryAttributesFile( const OBJECT_ATTRIBUTES
*attr
, FILE_BASIC_INFORMATION
*info
)
778 SYSCALL_FUNC( NtQueryAttributesFile
);
781 NTSTATUS SYSCALL_API
NtQueryDefaultLocale( BOOLEAN user
, LCID
*lcid
)
783 SYSCALL_FUNC( NtQueryDefaultLocale
);
786 NTSTATUS SYSCALL_API
NtQueryDefaultUILanguage( LANGID
*lang
)
788 SYSCALL_FUNC( NtQueryDefaultUILanguage
);
791 NTSTATUS SYSCALL_API
NtQueryDirectoryFile( HANDLE handle
, HANDLE event
, PIO_APC_ROUTINE apc_routine
,
792 void *apc_context
, IO_STATUS_BLOCK
*io
, void *buffer
,
793 ULONG length
, FILE_INFORMATION_CLASS info_class
,
794 BOOLEAN single_entry
, UNICODE_STRING
*mask
,
795 BOOLEAN restart_scan
)
797 SYSCALL_FUNC( NtQueryDirectoryFile
);
800 NTSTATUS SYSCALL_API
NtQueryDirectoryObject( HANDLE handle
, DIRECTORY_BASIC_INFORMATION
*buffer
,
801 ULONG size
, BOOLEAN single_entry
, BOOLEAN restart
,
802 ULONG
*context
, ULONG
*ret_size
)
804 SYSCALL_FUNC( NtQueryDirectoryObject
);
807 NTSTATUS SYSCALL_API
NtQueryEaFile( HANDLE handle
, IO_STATUS_BLOCK
*io
, void *buffer
, ULONG length
,
808 BOOLEAN single_entry
, void *list
, ULONG list_len
,
809 ULONG
*index
, BOOLEAN restart
)
811 SYSCALL_FUNC( NtQueryEaFile
);
814 NTSTATUS SYSCALL_API
NtQueryEvent( HANDLE handle
, EVENT_INFORMATION_CLASS
class,
815 void *info
, ULONG len
, ULONG
*ret_len
)
817 SYSCALL_FUNC( NtQueryEvent
);
820 NTSTATUS SYSCALL_API
NtQueryFullAttributesFile( const OBJECT_ATTRIBUTES
*attr
,
821 FILE_NETWORK_OPEN_INFORMATION
*info
)
823 SYSCALL_FUNC( NtQueryFullAttributesFile
);
826 NTSTATUS SYSCALL_API
NtQueryInformationAtom( RTL_ATOM atom
, ATOM_INFORMATION_CLASS
class,
827 void *ptr
, ULONG size
, ULONG
*retsize
)
829 SYSCALL_FUNC( NtQueryInformationAtom
);
832 NTSTATUS SYSCALL_API
NtQueryInformationFile( HANDLE handle
, IO_STATUS_BLOCK
*io
,
833 void *ptr
, ULONG len
, FILE_INFORMATION_CLASS
class )
835 SYSCALL_FUNC( NtQueryInformationFile
);
838 NTSTATUS SYSCALL_API
NtQueryInformationJobObject( HANDLE handle
, JOBOBJECTINFOCLASS
class, void *info
,
839 ULONG len
, ULONG
*ret_len
)
841 SYSCALL_FUNC( NtQueryInformationJobObject
);
844 NTSTATUS SYSCALL_API
NtQueryInformationProcess( HANDLE handle
, PROCESSINFOCLASS
class, void *info
,
845 ULONG size
, ULONG
*ret_len
)
847 SYSCALL_FUNC( NtQueryInformationProcess
);
850 NTSTATUS SYSCALL_API
NtQueryInformationThread( HANDLE handle
, THREADINFOCLASS
class,
851 void *data
, ULONG length
, ULONG
*ret_len
)
853 SYSCALL_FUNC( NtQueryInformationThread
);
856 NTSTATUS SYSCALL_API
NtQueryInformationToken( HANDLE token
, TOKEN_INFORMATION_CLASS
class,
857 void *info
, ULONG length
, ULONG
*retlen
)
859 SYSCALL_FUNC( NtQueryInformationToken
);
862 NTSTATUS SYSCALL_API
NtQueryInstallUILanguage( LANGID
*lang
)
864 SYSCALL_FUNC( NtQueryInstallUILanguage
);
867 NTSTATUS SYSCALL_API
NtQueryIoCompletion( HANDLE handle
, IO_COMPLETION_INFORMATION_CLASS
class,
868 void *buffer
, ULONG len
, ULONG
*ret_len
)
870 SYSCALL_FUNC( NtQueryIoCompletion
);
873 NTSTATUS SYSCALL_API
NtQueryKey( HANDLE handle
, KEY_INFORMATION_CLASS info_class
,
874 void *info
, DWORD length
, DWORD
*result_len
)
876 SYSCALL_FUNC( NtQueryKey
);
879 NTSTATUS SYSCALL_API
NtQueryLicenseValue( const UNICODE_STRING
*name
, ULONG
*type
,
880 void *data
, ULONG length
, ULONG
*retlen
)
882 SYSCALL_FUNC( NtQueryLicenseValue
);
885 NTSTATUS SYSCALL_API
NtQueryMultipleValueKey( HANDLE key
, KEY_MULTIPLE_VALUE_INFORMATION
*info
,
886 ULONG count
, void *buffer
, ULONG length
, ULONG
*retlen
)
888 SYSCALL_FUNC( NtQueryMultipleValueKey
);
891 NTSTATUS SYSCALL_API
NtQueryMutant( HANDLE handle
, MUTANT_INFORMATION_CLASS
class,
892 void *info
, ULONG len
, ULONG
*ret_len
)
894 SYSCALL_FUNC( NtQueryMutant
);
897 NTSTATUS SYSCALL_API
NtQueryObject( HANDLE handle
, OBJECT_INFORMATION_CLASS info_class
,
898 void *ptr
, ULONG len
, ULONG
*used_len
)
900 SYSCALL_FUNC( NtQueryObject
);
903 NTSTATUS SYSCALL_API
NtQueryPerformanceCounter( LARGE_INTEGER
*counter
, LARGE_INTEGER
*frequency
)
905 SYSCALL_FUNC( NtQueryPerformanceCounter
);
908 NTSTATUS SYSCALL_API
NtQuerySection( HANDLE handle
, SECTION_INFORMATION_CLASS
class, void *ptr
,
909 SIZE_T size
, SIZE_T
*ret_size
)
911 SYSCALL_FUNC( NtQuerySection
);
914 NTSTATUS SYSCALL_API
NtQuerySecurityObject( HANDLE handle
, SECURITY_INFORMATION info
,
915 PSECURITY_DESCRIPTOR descr
, ULONG length
, ULONG
*retlen
)
917 SYSCALL_FUNC( NtQuerySecurityObject
);
920 NTSTATUS SYSCALL_API
NtQuerySemaphore( HANDLE handle
, SEMAPHORE_INFORMATION_CLASS
class,
921 void *info
, ULONG len
, ULONG
*ret_len
)
923 SYSCALL_FUNC( NtQuerySemaphore
);
926 NTSTATUS SYSCALL_API
NtQuerySymbolicLinkObject( HANDLE handle
, UNICODE_STRING
*target
, ULONG
*length
)
928 SYSCALL_FUNC( NtQuerySymbolicLinkObject
);
931 NTSTATUS SYSCALL_API
NtQuerySystemEnvironmentValue( UNICODE_STRING
*name
, WCHAR
*buffer
, ULONG length
,
934 SYSCALL_FUNC( NtQuerySystemEnvironmentValue
);
937 NTSTATUS SYSCALL_API
NtQuerySystemEnvironmentValueEx( UNICODE_STRING
*name
, GUID
*vendor
, void *buffer
,
938 ULONG
*retlen
, ULONG
*attrib
)
940 SYSCALL_FUNC( NtQuerySystemEnvironmentValueEx
);
943 NTSTATUS SYSCALL_API
NtQuerySystemInformation( SYSTEM_INFORMATION_CLASS
class,
944 void *info
, ULONG size
, ULONG
*ret_size
)
946 SYSCALL_FUNC( NtQuerySystemInformation
);
949 NTSTATUS SYSCALL_API
NtQuerySystemInformationEx( SYSTEM_INFORMATION_CLASS
class, void *query
,
950 ULONG query_len
, void *info
, ULONG size
, ULONG
*ret_size
)
952 SYSCALL_FUNC( NtQuerySystemInformationEx
);
955 NTSTATUS SYSCALL_API
NtQuerySystemTime( LARGE_INTEGER
*time
)
957 SYSCALL_FUNC( NtQuerySystemTime
);
960 NTSTATUS SYSCALL_API
NtQueryTimer( HANDLE handle
, TIMER_INFORMATION_CLASS
class,
961 void *info
, ULONG len
, ULONG
*ret_len
)
963 SYSCALL_FUNC( NtQueryTimer
);
966 NTSTATUS SYSCALL_API
NtQueryTimerResolution( ULONG
*min_res
, ULONG
*max_res
, ULONG
*current_res
)
968 SYSCALL_FUNC( NtQueryTimerResolution
);
971 NTSTATUS SYSCALL_API
NtQueryValueKey( HANDLE handle
, const UNICODE_STRING
*name
,
972 KEY_VALUE_INFORMATION_CLASS info_class
,
973 void *info
, DWORD length
, DWORD
*result_len
)
975 SYSCALL_FUNC( NtQueryValueKey
);
978 NTSTATUS SYSCALL_API
NtQueryVirtualMemory( HANDLE process
, LPCVOID addr
, MEMORY_INFORMATION_CLASS info_class
,
979 PVOID buffer
, SIZE_T len
, SIZE_T
*res_len
)
981 SYSCALL_FUNC( NtQueryVirtualMemory
);
984 NTSTATUS SYSCALL_API
NtQueryVolumeInformationFile( HANDLE handle
, IO_STATUS_BLOCK
*io
, void *buffer
,
985 ULONG length
, FS_INFORMATION_CLASS info_class
)
987 SYSCALL_FUNC( NtQueryVolumeInformationFile
);
990 NTSTATUS SYSCALL_API
NtQueueApcThread( HANDLE handle
, PNTAPCFUNC func
, ULONG_PTR arg1
,
991 ULONG_PTR arg2
, ULONG_PTR arg3
)
993 SYSCALL_FUNC( NtQueueApcThread
);
996 static NTSTATUS SYSCALL_API
syscall_NtRaiseException( EXCEPTION_RECORD
*rec
, ARM64_NT_CONTEXT
*context
, BOOL first_chance
)
998 __ASM_SYSCALL_FUNC( __id_NtRaiseException
, syscall_NtRaiseException
);
1001 NTSTATUS WINAPI
NtRaiseException( EXCEPTION_RECORD
*rec
, CONTEXT
*context
, BOOL first_chance
)
1003 ARM64_NT_CONTEXT arm_ctx
;
1005 context_x64_to_arm( &arm_ctx
, (ARM64EC_NT_CONTEXT
*)context
);
1006 return syscall_NtRaiseException( rec
, &arm_ctx
, first_chance
);
1009 NTSTATUS SYSCALL_API
NtRaiseHardError( NTSTATUS status
, ULONG count
, UNICODE_STRING
*params_mask
,
1010 void **params
, HARDERROR_RESPONSE_OPTION option
,
1011 HARDERROR_RESPONSE
*response
)
1013 SYSCALL_FUNC( NtRaiseHardError
);
1016 NTSTATUS SYSCALL_API
NtReadFile( HANDLE handle
, HANDLE event
, PIO_APC_ROUTINE apc
, void *apc_user
,
1017 IO_STATUS_BLOCK
*io
, void *buffer
, ULONG length
,
1018 LARGE_INTEGER
*offset
, ULONG
*key
)
1020 SYSCALL_FUNC( NtReadFile
);
1023 NTSTATUS SYSCALL_API
NtReadFileScatter( HANDLE file
, HANDLE event
, PIO_APC_ROUTINE apc
, void *apc_user
,
1024 IO_STATUS_BLOCK
*io
, FILE_SEGMENT_ELEMENT
*segments
,
1025 ULONG length
, LARGE_INTEGER
*offset
, ULONG
*key
)
1027 SYSCALL_FUNC( NtReadFileScatter
);
1030 NTSTATUS SYSCALL_API
NtReadVirtualMemory( HANDLE process
, const void *addr
, void *buffer
,
1031 SIZE_T size
, SIZE_T
*bytes_read
)
1033 SYSCALL_FUNC( NtReadVirtualMemory
);
1036 NTSTATUS SYSCALL_API
NtRegisterThreadTerminatePort( HANDLE handle
)
1038 SYSCALL_FUNC( NtRegisterThreadTerminatePort
);
1041 NTSTATUS SYSCALL_API
NtReleaseKeyedEvent( HANDLE handle
, const void *key
,
1042 BOOLEAN alertable
, const LARGE_INTEGER
*timeout
)
1044 SYSCALL_FUNC( NtReleaseKeyedEvent
);
1047 NTSTATUS SYSCALL_API
NtReleaseMutant( HANDLE handle
, LONG
*prev_count
)
1049 SYSCALL_FUNC( NtReleaseMutant
);
1052 NTSTATUS SYSCALL_API
NtReleaseSemaphore( HANDLE handle
, ULONG count
, ULONG
*previous
)
1054 SYSCALL_FUNC( NtReleaseSemaphore
);
1057 NTSTATUS SYSCALL_API
NtRemoveIoCompletion( HANDLE handle
, ULONG_PTR
*key
, ULONG_PTR
*value
,
1058 IO_STATUS_BLOCK
*io
, LARGE_INTEGER
*timeout
)
1060 SYSCALL_FUNC( NtRemoveIoCompletion
);
1063 NTSTATUS SYSCALL_API
NtRemoveIoCompletionEx( HANDLE handle
, FILE_IO_COMPLETION_INFORMATION
*info
,
1064 ULONG count
, ULONG
*written
, LARGE_INTEGER
*timeout
,
1067 SYSCALL_FUNC( NtRemoveIoCompletionEx
);
1070 NTSTATUS SYSCALL_API
NtRemoveProcessDebug( HANDLE process
, HANDLE debug
)
1072 SYSCALL_FUNC( NtRemoveProcessDebug
);
1075 NTSTATUS SYSCALL_API
NtRenameKey( HANDLE key
, UNICODE_STRING
*name
)
1077 SYSCALL_FUNC( NtRenameKey
);
1080 NTSTATUS SYSCALL_API
NtReplaceKey( OBJECT_ATTRIBUTES
*attr
, HANDLE key
, OBJECT_ATTRIBUTES
*replace
)
1082 SYSCALL_FUNC( NtReplaceKey
);
1085 NTSTATUS SYSCALL_API
NtReplyWaitReceivePort( HANDLE handle
, ULONG
*id
, LPC_MESSAGE
*reply
, LPC_MESSAGE
*msg
)
1087 SYSCALL_FUNC( NtReplyWaitReceivePort
);
1090 NTSTATUS SYSCALL_API
NtRequestWaitReplyPort( HANDLE handle
, LPC_MESSAGE
*msg_in
, LPC_MESSAGE
*msg_out
)
1092 SYSCALL_FUNC( NtRequestWaitReplyPort
);
1095 NTSTATUS SYSCALL_API
NtResetEvent( HANDLE handle
, LONG
*prev_state
)
1097 SYSCALL_FUNC( NtResetEvent
);
1100 NTSTATUS SYSCALL_API
NtResetWriteWatch( HANDLE process
, PVOID base
, SIZE_T size
)
1102 SYSCALL_FUNC( NtResetWriteWatch
);
1105 NTSTATUS SYSCALL_API
NtRestoreKey( HANDLE key
, HANDLE file
, ULONG flags
)
1107 SYSCALL_FUNC( NtRestoreKey
);
1110 NTSTATUS SYSCALL_API
NtResumeProcess( HANDLE handle
)
1112 SYSCALL_FUNC( NtResumeProcess
);
1115 NTSTATUS SYSCALL_API
NtResumeThread( HANDLE handle
, ULONG
*count
)
1117 SYSCALL_FUNC( NtResumeThread
);
1120 NTSTATUS SYSCALL_API
NtRollbackTransaction( HANDLE transaction
, BOOLEAN wait
)
1122 SYSCALL_FUNC( NtRollbackTransaction
);
1125 NTSTATUS SYSCALL_API
NtSaveKey( HANDLE key
, HANDLE file
)
1127 SYSCALL_FUNC( NtSaveKey
);
1130 NTSTATUS SYSCALL_API
NtSecureConnectPort( HANDLE
*handle
, UNICODE_STRING
*name
,
1131 SECURITY_QUALITY_OF_SERVICE
*qos
, LPC_SECTION_WRITE
*write
,
1132 PSID sid
, LPC_SECTION_READ
*read
, ULONG
*max_len
,
1133 void *info
, ULONG
*info_len
)
1135 SYSCALL_FUNC( NtSecureConnectPort
);
1138 static NTSTATUS SYSCALL_API
syscall_NtSetContextThread( HANDLE handle
, const ARM64_NT_CONTEXT
*context
)
1140 __ASM_SYSCALL_FUNC( __id_NtSetContextThread
, syscall_NtSetContextThread
);
1143 NTSTATUS WINAPI
NtSetContextThread( HANDLE handle
, const CONTEXT
*context
)
1145 ARM64_NT_CONTEXT arm_ctx
;
1147 context_x64_to_arm( &arm_ctx
, (ARM64EC_NT_CONTEXT
*)context
);
1148 return syscall_NtSetContextThread( handle
, &arm_ctx
);
1151 NTSTATUS SYSCALL_API
NtSetDebugFilterState( ULONG component_id
, ULONG level
, BOOLEAN state
)
1153 SYSCALL_FUNC( NtSetDebugFilterState
);
1156 NTSTATUS SYSCALL_API
NtSetDefaultLocale( BOOLEAN user
, LCID lcid
)
1158 SYSCALL_FUNC( NtSetDefaultLocale
);
1161 NTSTATUS SYSCALL_API
NtSetDefaultUILanguage( LANGID lang
)
1163 SYSCALL_FUNC( NtSetDefaultUILanguage
);
1166 NTSTATUS SYSCALL_API
NtSetEaFile( HANDLE handle
, IO_STATUS_BLOCK
*io
, void *buffer
, ULONG length
)
1168 SYSCALL_FUNC( NtSetEaFile
);
1171 NTSTATUS SYSCALL_API
NtSetEvent( HANDLE handle
, LONG
*prev_state
)
1173 SYSCALL_FUNC( NtSetEvent
);
1176 NTSTATUS SYSCALL_API
NtSetInformationDebugObject( HANDLE handle
, DEBUGOBJECTINFOCLASS
class,
1177 void *info
, ULONG len
, ULONG
*ret_len
)
1179 SYSCALL_FUNC( NtSetInformationDebugObject
);
1182 NTSTATUS SYSCALL_API
NtSetInformationFile( HANDLE handle
, IO_STATUS_BLOCK
*io
,
1183 void *ptr
, ULONG len
, FILE_INFORMATION_CLASS
class )
1185 SYSCALL_FUNC( NtSetInformationFile
);
1188 NTSTATUS SYSCALL_API
NtSetInformationJobObject( HANDLE handle
, JOBOBJECTINFOCLASS
class,
1189 void *info
, ULONG len
)
1191 SYSCALL_FUNC( NtSetInformationJobObject
);
1194 NTSTATUS SYSCALL_API
NtSetInformationKey( HANDLE key
, int class, void *info
, ULONG length
)
1196 SYSCALL_FUNC( NtSetInformationKey
);
1199 NTSTATUS SYSCALL_API
NtSetInformationObject( HANDLE handle
, OBJECT_INFORMATION_CLASS info_class
,
1200 void *ptr
, ULONG len
)
1202 SYSCALL_FUNC( NtSetInformationObject
);
1205 NTSTATUS SYSCALL_API
NtSetInformationProcess( HANDLE handle
, PROCESSINFOCLASS
class,
1206 void *info
, ULONG size
)
1208 SYSCALL_FUNC( NtSetInformationProcess
);
1211 NTSTATUS SYSCALL_API
NtSetInformationThread( HANDLE handle
, THREADINFOCLASS
class,
1212 const void *data
, ULONG length
)
1214 SYSCALL_FUNC( NtSetInformationThread
);
1217 NTSTATUS SYSCALL_API
NtSetInformationToken( HANDLE token
, TOKEN_INFORMATION_CLASS
class,
1218 void *info
, ULONG length
)
1220 SYSCALL_FUNC( NtSetInformationToken
);
1223 NTSTATUS SYSCALL_API
NtSetInformationVirtualMemory( HANDLE process
,
1224 VIRTUAL_MEMORY_INFORMATION_CLASS info_class
,
1225 ULONG_PTR count
, PMEMORY_RANGE_ENTRY addresses
,
1226 PVOID ptr
, ULONG size
)
1228 SYSCALL_FUNC( NtSetInformationVirtualMemory
);
1231 NTSTATUS SYSCALL_API
NtSetIntervalProfile( ULONG interval
, KPROFILE_SOURCE source
)
1233 SYSCALL_FUNC( NtSetIntervalProfile
);
1236 NTSTATUS SYSCALL_API
NtSetIoCompletion( HANDLE handle
, ULONG_PTR key
, ULONG_PTR value
,
1237 NTSTATUS status
, SIZE_T count
)
1239 SYSCALL_FUNC( NtSetIoCompletion
);
1242 NTSTATUS SYSCALL_API
NtSetLdtEntries( ULONG sel1
, LDT_ENTRY entry1
, ULONG sel2
, LDT_ENTRY entry2
)
1244 SYSCALL_FUNC( NtSetLdtEntries
);
1247 NTSTATUS SYSCALL_API
NtSetSecurityObject( HANDLE handle
, SECURITY_INFORMATION info
,
1248 PSECURITY_DESCRIPTOR descr
)
1250 SYSCALL_FUNC( NtSetSecurityObject
);
1253 NTSTATUS SYSCALL_API
NtSetSystemInformation( SYSTEM_INFORMATION_CLASS
class, void *info
, ULONG length
)
1255 SYSCALL_FUNC( NtSetSystemInformation
);
1258 NTSTATUS SYSCALL_API
NtSetSystemTime( const LARGE_INTEGER
*new, LARGE_INTEGER
*old
)
1260 SYSCALL_FUNC( NtSetSystemTime
);
1263 NTSTATUS SYSCALL_API
NtSetThreadExecutionState( EXECUTION_STATE new_state
, EXECUTION_STATE
*old_state
)
1265 SYSCALL_FUNC( NtSetThreadExecutionState
);
1268 NTSTATUS SYSCALL_API
NtSetTimer( HANDLE handle
, const LARGE_INTEGER
*when
, PTIMER_APC_ROUTINE callback
,
1269 void *arg
, BOOLEAN resume
, ULONG period
, BOOLEAN
*state
)
1271 SYSCALL_FUNC( NtSetTimer
);
1274 NTSTATUS SYSCALL_API
NtSetTimerResolution( ULONG res
, BOOLEAN set
, ULONG
*current_res
)
1276 SYSCALL_FUNC( NtSetTimerResolution
);
1279 NTSTATUS SYSCALL_API
NtSetValueKey( HANDLE key
, const UNICODE_STRING
*name
, ULONG index
,
1280 ULONG type
, const void *data
, ULONG count
)
1282 SYSCALL_FUNC( NtSetValueKey
);
1285 NTSTATUS SYSCALL_API
NtSetVolumeInformationFile( HANDLE handle
, IO_STATUS_BLOCK
*io
, void *info
,
1286 ULONG length
, FS_INFORMATION_CLASS
class )
1288 SYSCALL_FUNC( NtSetVolumeInformationFile
);
1291 NTSTATUS SYSCALL_API
NtShutdownSystem( SHUTDOWN_ACTION action
)
1293 SYSCALL_FUNC( NtShutdownSystem
);
1296 NTSTATUS SYSCALL_API
NtSignalAndWaitForSingleObject( HANDLE signal
, HANDLE wait
,
1297 BOOLEAN alertable
, const LARGE_INTEGER
*timeout
)
1299 SYSCALL_FUNC( NtSignalAndWaitForSingleObject
);
1302 NTSTATUS SYSCALL_API
NtSuspendProcess( HANDLE handle
)
1304 SYSCALL_FUNC( NtSuspendProcess
);
1307 NTSTATUS SYSCALL_API
NtSuspendThread( HANDLE handle
, ULONG
*count
)
1309 SYSCALL_FUNC( NtSuspendThread
);
1312 NTSTATUS SYSCALL_API
NtSystemDebugControl( SYSDBG_COMMAND command
, void *in_buff
, ULONG in_len
,
1313 void *out_buff
, ULONG out_len
, ULONG
*retlen
)
1315 SYSCALL_FUNC( NtSystemDebugControl
);
1318 NTSTATUS SYSCALL_API
NtTerminateJobObject( HANDLE handle
, NTSTATUS status
)
1320 SYSCALL_FUNC( NtTerminateJobObject
);
1323 NTSTATUS SYSCALL_API
NtTerminateProcess( HANDLE handle
, LONG exit_code
)
1325 SYSCALL_FUNC( NtTerminateProcess
);
1328 NTSTATUS SYSCALL_API
NtTerminateThread( HANDLE handle
, LONG exit_code
)
1330 SYSCALL_FUNC( NtTerminateThread
);
1333 NTSTATUS SYSCALL_API
NtTestAlert(void)
1335 SYSCALL_FUNC( NtTestAlert
);
1338 NTSTATUS SYSCALL_API
NtTraceControl( ULONG code
, void *inbuf
, ULONG inbuf_len
,
1339 void *outbuf
, ULONG outbuf_len
, ULONG
*size
)
1341 SYSCALL_FUNC( NtTraceControl
);
1344 NTSTATUS SYSCALL_API
NtUnloadDriver( const UNICODE_STRING
*name
)
1346 SYSCALL_FUNC( NtUnloadDriver
);
1349 NTSTATUS SYSCALL_API
NtUnloadKey( OBJECT_ATTRIBUTES
*attr
)
1351 SYSCALL_FUNC( NtUnloadKey
);
1354 NTSTATUS SYSCALL_API
NtUnlockFile( HANDLE handle
, IO_STATUS_BLOCK
*io_status
, LARGE_INTEGER
*offset
,
1355 LARGE_INTEGER
*count
, ULONG
*key
)
1357 SYSCALL_FUNC( NtUnlockFile
);
1360 NTSTATUS SYSCALL_API
NtUnlockVirtualMemory( HANDLE process
, PVOID
*addr
, SIZE_T
*size
, ULONG unknown
)
1362 SYSCALL_FUNC( NtUnlockVirtualMemory
);
1365 NTSTATUS SYSCALL_API
NtUnmapViewOfSection( HANDLE process
, PVOID addr
)
1367 SYSCALL_FUNC( NtUnmapViewOfSection
);
1370 NTSTATUS SYSCALL_API
NtUnmapViewOfSectionEx( HANDLE process
, PVOID addr
, ULONG flags
)
1372 SYSCALL_FUNC( NtUnmapViewOfSectionEx
);
1375 NTSTATUS SYSCALL_API
NtWaitForAlertByThreadId( const void *address
, const LARGE_INTEGER
*timeout
)
1377 SYSCALL_FUNC( NtWaitForAlertByThreadId
);
1380 NTSTATUS SYSCALL_API
NtWaitForDebugEvent( HANDLE handle
, BOOLEAN alertable
, LARGE_INTEGER
*timeout
,
1381 DBGUI_WAIT_STATE_CHANGE
*state
)
1383 SYSCALL_FUNC( NtWaitForDebugEvent
);
1386 NTSTATUS SYSCALL_API
NtWaitForKeyedEvent( HANDLE handle
, const void *key
,
1387 BOOLEAN alertable
, const LARGE_INTEGER
*timeout
)
1389 SYSCALL_FUNC( NtWaitForKeyedEvent
);
1392 NTSTATUS SYSCALL_API
NtWaitForMultipleObjects( DWORD count
, const HANDLE
*handles
, BOOLEAN wait_any
,
1393 BOOLEAN alertable
, const LARGE_INTEGER
*timeout
)
1395 SYSCALL_FUNC( NtWaitForMultipleObjects
);
1398 NTSTATUS SYSCALL_API
NtWaitForSingleObject( HANDLE handle
, BOOLEAN alertable
, const LARGE_INTEGER
*timeout
)
1400 SYSCALL_FUNC( NtWaitForSingleObject
);
1403 NTSTATUS SYSCALL_API
NtWriteFile( HANDLE handle
, HANDLE event
, PIO_APC_ROUTINE apc
, void *apc_user
,
1404 IO_STATUS_BLOCK
*io
, const void *buffer
, ULONG length
,
1405 LARGE_INTEGER
*offset
, ULONG
*key
)
1407 SYSCALL_FUNC( NtWriteFile
);
1410 NTSTATUS SYSCALL_API
NtWriteFileGather( HANDLE file
, HANDLE event
, PIO_APC_ROUTINE apc
, void *apc_user
,
1411 IO_STATUS_BLOCK
*io
, FILE_SEGMENT_ELEMENT
*segments
,
1412 ULONG length
, LARGE_INTEGER
*offset
, ULONG
*key
)
1414 SYSCALL_FUNC( NtWriteFileGather
);
1417 NTSTATUS SYSCALL_API
NtWriteVirtualMemory( HANDLE process
, void *addr
, const void *buffer
,
1418 SIZE_T size
, SIZE_T
*bytes_written
)
1420 SYSCALL_FUNC( NtWriteVirtualMemory
);
1423 NTSTATUS SYSCALL_API
NtYieldExecution(void)
1425 SYSCALL_FUNC( NtYieldExecution
);
1428 NTSTATUS SYSCALL_API
wine_nt_to_unix_file_name( const OBJECT_ATTRIBUTES
*attr
, char *nameA
, ULONG
*size
,
1431 SYSCALL_FUNC( wine_nt_to_unix_file_name
);
1434 NTSTATUS SYSCALL_API
wine_unix_to_nt_file_name( const char *name
, WCHAR
*buffer
, ULONG
*size
)
1436 SYSCALL_FUNC( wine_unix_to_nt_file_name
);
1439 static void * const arm64ec_syscalls
[] =
1441 #define SYSCALL_ENTRY(id,name,args) name,
1443 #undef SYSCALL_ENTRY
1447 /***********************************************************************
1448 * LdrpGetX64Information
1450 static NTSTATUS WINAPI
LdrpGetX64Information( ULONG type
, void *output
, void *extra_info
)
1458 __asm__
__volatile__( "mrs %0, fpcr; mrs %1, fpsr" : "=r" (fpcr
), "=r" (fpsr
) );
1459 *(UINT
*)output
= fpcsr_to_mxcsr( fpcr
, fpsr
);
1460 return STATUS_SUCCESS
;
1463 FIXME( "not implemented type %u\n", type
);
1464 return STATUS_INVALID_PARAMETER
;
1468 /***********************************************************************
1469 * LdrpSetX64Information
1471 static NTSTATUS WINAPI
LdrpSetX64Information( ULONG type
, ULONG_PTR input
, void *extra_info
)
1477 UINT64 fpcsr
= mxcsr_to_fpcsr( input
);
1478 __asm__
__volatile__( "msr fpcr, %0; msr fpsr, %1" :: "r" (fpcsr
), "r" (fpcsr
>> 32) );
1479 return STATUS_SUCCESS
;
1482 FIXME( "not implemented type %u\n", type
);
1483 return STATUS_INVALID_PARAMETER
;
1488 /*******************************************************************
1489 * KiUserExceptionDispatcher (NTDLL.@)
1491 NTSTATUS WINAPI
KiUserExceptionDispatcher( EXCEPTION_RECORD
*rec
, CONTEXT
*context
)
1493 FIXME( "not implemented\n" );
1494 return STATUS_INVALID_DISPOSITION
;
1498 /*******************************************************************
1499 * KiUserApcDispatcher (NTDLL.@)
1501 void WINAPI
dispatch_apc( void (CALLBACK
*func
)(ULONG_PTR
,ULONG_PTR
,ULONG_PTR
,CONTEXT
*),
1502 ULONG_PTR arg1
, ULONG_PTR arg2
, ULONG_PTR arg3
,
1503 BOOLEAN alertable
, ARM64_NT_CONTEXT
*arm_ctx
)
1505 ARM64EC_NT_CONTEXT context
;
1507 context_arm_to_x64( &context
, arm_ctx
);
1508 func( arg1
, arg2
, arg3
, &context
.AMD64_Context
);
1509 NtContinue( &context
.AMD64_Context
, alertable
);
1511 __ASM_GLOBAL_FUNC( "#KiUserApcDispatcher",
1512 __ASM_SEH(".seh_context\n\t")
1514 __ASM_SEH(".seh_stackalloc 0x30\n\t")
1515 __ASM_SEH(".seh_endprologue\n\t")
1516 "ldp x0, x1, [sp]\n\t" /* func, arg1 */
1517 "ldp x2, x3, [sp, #0x10]\n\t" /* arg2, arg3 */
1518 "ldr w4, [sp, #0x20]\n\t" /* alertable */
1519 "add x5, sp, #0x30\n\t" /* context */
1520 "bl " __ASM_NAME("dispatch_apc") "\n\t"
1524 /*******************************************************************
1525 * KiUserCallbackDispatcher (NTDLL.@)
1527 __ASM_GLOBAL_FUNC( "#KiUserCallbackDispatcher",
1528 ".seh_pushframe\n\t"
1530 ".seh_stackalloc 0x20\n\t"
1532 ".seh_save_reg lr, 0x18\n\t"
1533 ".seh_endprologue\n\t"
1534 ".seh_handler " __ASM_NAME("user_callback_handler") ", @except\n\t"
1535 "ldr x0, [sp]\n\t" /* args */
1536 "ldp w1, w2, [sp, #0x08]\n\t" /* len, id */
1537 "ldr x3, [x18, 0x60]\n\t" /* peb */
1538 "ldr x3, [x3, 0x58]\n\t" /* peb->KernelCallbackTable */
1539 "ldr x15, [x3, x2, lsl #3]\n\t"
1541 ".globl \"#KiUserCallbackDispatcherReturn\"\n"
1542 "\"#KiUserCallbackDispatcherReturn\":\n\t"
1543 "mov x2, x0\n\t" /* status */
1544 "mov x1, #0\n\t" /* ret_len */
1545 "mov x0, x1\n\t" /* ret_ptr */
1546 "bl " __ASM_NAME("NtCallbackReturn") "\n\t"
1547 "bl " __ASM_NAME("RtlRaiseStatus") "\n\t"
1551 /**************************************************************************
1552 * RtlIsEcCode (NTDLL.@)
1554 BOOLEAN WINAPI
RtlIsEcCode( const void *ptr
)
1556 const UINT64
*map
= (const UINT64
*)NtCurrentTeb()->Peb
->EcCodeBitMap
;
1557 ULONG_PTR page
= (ULONG_PTR
)ptr
/ page_size
;
1558 return (map
[page
/ 64] >> (page
& 63)) & 1;
1562 /***********************************************************************
1563 * RtlCaptureContext (NTDLL.@)
1565 void WINAPI
RtlCaptureContext( CONTEXT
*context
)
1567 FIXME( "not implemented\n" );
1571 /*******************************************************************
1572 * RtlRestoreContext (NTDLL.@)
1574 void CDECL
RtlRestoreContext( CONTEXT
*context
, EXCEPTION_RECORD
*rec
)
1576 FIXME( "not implemented\n" );
1580 /*******************************************************************
1581 * RtlUnwindEx (NTDLL.@)
1583 void WINAPI
RtlUnwindEx( PVOID end_frame
, PVOID target_ip
, EXCEPTION_RECORD
*rec
,
1584 PVOID retval
, CONTEXT
*context
, UNWIND_HISTORY_TABLE
*table
)
1586 FIXME( "not implemented\n" );
1590 /*******************************************************************
1591 * __C_specific_handler (NTDLL.@)
1593 EXCEPTION_DISPOSITION WINAPI
__C_specific_handler( EXCEPTION_RECORD
*rec
,
1596 struct _DISPATCHER_CONTEXT
*dispatch
)
1598 FIXME( "not implemented\n" );
1599 return ExceptionContinueSearch
;
1603 /*************************************************************************
1604 * RtlCaptureStackBackTrace (NTDLL.@)
1606 USHORT WINAPI
RtlCaptureStackBackTrace( ULONG skip
, ULONG count
, PVOID
*buffer
, ULONG
*hash
)
1608 FIXME( "not implemented\n" );
1613 static int code_match( BYTE
*code
, const BYTE
*seq
, size_t len
)
1615 for ( ; len
; len
--, code
++, seq
++) if (*seq
&& *code
!= *seq
) return 0;
1619 void *check_call( void **target
, void *exit_thunk
, void *dest
)
1621 static const BYTE jmp_sequence
[] =
1623 0xff, 0x25 /* jmp *xxx(%rip) */
1625 static const BYTE fast_forward_sequence
[] =
1627 0x48, 0x8b, 0xc4, /* mov %rsp,%rax */
1628 0x48, 0x89, 0x58, 0x20, /* mov %rbx,0x20(%rax) */
1629 0x55, /* push %rbp */
1630 0x5d, /* pop %rbp */
1631 0xe9 /* jmp arm_code */
1633 static const BYTE syscall_sequence
[] =
1635 0x4c, 0x8b, 0xd1, /* mov %rcx,%r10 */
1636 0xb8, 0, 0, 0, 0, /* mov $xxx,%eax */
1637 0xf6, 0x04, 0x25, 0x08, /* testb $0x1,0x7ffe0308 */
1638 0x03, 0xfe, 0x7f, 0x01,
1639 0x75, 0x03, /* jne 1f */
1640 0x0f, 0x05, /* syscall */
1642 0xcd, 0x2e, /* 1: int $0x2e */
1648 if (dest
== __wine_unix_call_dispatcher
) return dest
;
1649 if (RtlIsEcCode( dest
)) return dest
;
1650 if (code_match( dest
, jmp_sequence
, sizeof(jmp_sequence
) ))
1652 int *off_ptr
= (int *)((char *)dest
+ sizeof(jmp_sequence
));
1653 void **addr_ptr
= (void **)((char *)(off_ptr
+ 1) + *off_ptr
);
1657 if (!((ULONG_PTR
)dest
& 15)) /* fast-forward and syscall thunks are always aligned */
1659 if (code_match( dest
, fast_forward_sequence
, sizeof(fast_forward_sequence
) ))
1661 int *off_ptr
= (int *)((char *)dest
+ sizeof(fast_forward_sequence
));
1662 return (char *)(off_ptr
+ 1) + *off_ptr
;
1664 if (code_match( dest
, syscall_sequence
, sizeof(syscall_sequence
) ))
1666 ULONG id
= ((ULONG
*)dest
)[1];
1667 if (id
< ARRAY_SIZE(arm64ec_syscalls
)) return arm64ec_syscalls
[id
];
1675 static void __attribute__((naked
)) arm64x_check_call(void)
1677 asm( "stp x29, x30, [sp,#-0xb0]!\n\t"
1679 "stp x0, x1, [sp, #0x10]\n\t"
1680 "stp x2, x3, [sp, #0x20]\n\t"
1681 "stp x4, x5, [sp, #0x30]\n\t"
1682 "stp x6, x7, [sp, #0x40]\n\t"
1683 "stp x8, x9, [sp, #0x50]\n\t"
1684 "stp x10, x15, [sp, #0x60]\n\t"
1685 "stp d0, d1, [sp, #0x70]\n\t"
1686 "stp d2, d3, [sp, #0x80]\n\t"
1687 "stp d4, d5, [sp, #0x90]\n\t"
1688 "stp d6, d7, [sp, #0xa0]\n\t"
1689 "add x0, sp, #0x58\n\t" /* x9 = &target */
1690 "mov x1, x10\n\t" /* x10 = exit_thunk */
1691 "mov x2, x11\n\t" /* x11 = dest */
1692 "bl " __ASM_NAME("check_call") "\n\t"
1694 "ldp x0, x1, [sp, #0x10]\n\t"
1695 "ldp x2, x3, [sp, #0x20]\n\t"
1696 "ldp x4, x5, [sp, #0x30]\n\t"
1697 "ldp x6, x7, [sp, #0x40]\n\t"
1698 "ldp x8, x9, [sp, #0x50]\n\t"
1699 "ldp x10, x15, [sp, #0x60]\n\t"
1700 "ldp d0, d1, [sp, #0x70]\n\t"
1701 "ldp d2, d3, [sp, #0x80]\n\t"
1702 "ldp d4, d5, [sp, #0x90]\n\t"
1703 "ldp d6, d7, [sp, #0xa0]\n\t"
1704 "ldp x29, x30, [sp], #0xb0\n\t"
1709 /**************************************************************************
1710 * __chkstk (NTDLL.@)
1712 * Supposed to touch all the stack pages, but we shouldn't need that.
1714 void __attribute__((naked
)) __chkstk(void)
1720 /**************************************************************************
1721 * __chkstk_arm64ec (NTDLL.@)
1723 * Supposed to touch all the stack pages, but we shouldn't need that.
1725 void __attribute__((naked
)) __chkstk_arm64ec(void)
1731 /***********************************************************************
1732 * RtlRaiseException (NTDLL.@)
1734 void WINAPI
RtlRaiseException( struct _EXCEPTION_RECORD
* rec
)
1736 FIXME( "not implemented\n" );
1740 /***********************************************************************
1741 * RtlUserThreadStart (NTDLL.@)
1743 void WINAPI
RtlUserThreadStart( PRTL_THREAD_START_ROUTINE entry
, void *arg
)
1747 pBaseThreadInitThunk( 0, (LPTHREAD_START_ROUTINE
)entry
, arg
);
1749 __EXCEPT(call_unhandled_exception_filter
)
1751 NtTerminateProcess( GetCurrentProcess(), GetExceptionCode() );
1757 /******************************************************************
1758 * LdrInitializeThunk (NTDLL.@)
1760 void WINAPI
LdrInitializeThunk( CONTEXT
*arm_context
, ULONG_PTR unk2
, ULONG_PTR unk3
, ULONG_PTR unk4
)
1762 ARM64EC_NT_CONTEXT context
;
1764 if (!__os_arm64x_check_call
)
1766 __os_arm64x_check_call
= arm64x_check_call
;
1767 __os_arm64x_check_icall
= arm64x_check_call
;
1768 __os_arm64x_check_icall_cfg
= arm64x_check_call
;
1769 __os_arm64x_get_x64_information
= LdrpGetX64Information
;
1770 __os_arm64x_set_x64_information
= LdrpSetX64Information
;
1773 context_arm_to_x64( &context
, (ARM64_NT_CONTEXT
*)arm_context
);
1774 loader_init( &context
.AMD64_Context
, (void **)&context
.X0
);
1775 TRACE_(relay
)( "\1Starting thread proc %p (arg=%p)\n", (void *)context
.X0
, (void *)context
.X1
);
1776 NtContinue( &context
.AMD64_Context
, TRUE
);
1780 /***********************************************************************
1781 * process_breakpoint
1783 __ASM_GLOBAL_FUNC( "#process_breakpoint",
1784 ".seh_endprologue\n\t"
1785 ".seh_handler process_breakpoint_handler, @except\n\t"
1788 "process_breakpoint_handler:\n\t"
1789 "ldr x4, [x2, #0x108]\n\t" /* context->Pc */
1790 "add x4, x4, #4\n\t"
1791 "str x4, [x2, #0x108]\n\t"
1792 "mov w0, #0\n\t" /* ExceptionContinueExecution */
1795 /***********************************************************************
1796 * DbgUiRemoteBreakin (NTDLL.@)
1798 void WINAPI
DbgUiRemoteBreakin( void *arg
)
1800 if (NtCurrentTeb()->Peb
->BeingDebugged
)
1812 RtlExitUserThread( STATUS_SUCCESS
);
1815 /**********************************************************************
1816 * DbgBreakPoint (NTDLL.@)
1818 void __attribute__((naked
)) DbgBreakPoint(void)
1820 asm( ".seh_proc DbgBreakPoint\n\t"
1821 ".seh_endprologue\n\t"
1828 /**********************************************************************
1829 * DbgUserBreakPoint (NTDLL.@)
1831 void __attribute__((naked
)) DbgUserBreakPoint(void)
1833 asm( ".seh_proc DbgUserBreakPoint\n\t"
1834 ".seh_endprologue\n\t"
1840 #endif /* __arm64ec__ */