2 * Win32 WOW Generic Thunk API
4 * Copyright 1999 Ulrich Weigand
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2.1 of the License, or (at your option) any later version.
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
22 #include "wine/port.h"
28 #include "wine/winbase16.h"
35 #include "kernel_private.h"
36 #include "kernel16_private.h"
37 #include "wine/exception.h"
38 #include "wine/debug.h"
40 WINE_DEFAULT_DEBUG_CHANNEL(thunk
);
41 WINE_DECLARE_DEBUG_CHANNEL(relay
);
42 WINE_DECLARE_DEBUG_CHANNEL(snoop
);
45 * These are the 16-bit side WOW routines. They reside in wownt16.h
46 * in the SDK; since we don't support Win16 source code anyway, I've
47 * placed them here for compilation with Wine ...
50 DWORD WINAPI
GetVDMPointer32W16(SEGPTR
,UINT16
);
52 DWORD WINAPI
LoadLibraryEx32W16(LPCSTR
,DWORD
,DWORD
);
53 DWORD WINAPI
GetProcAddress32W16(DWORD
,LPCSTR
);
54 DWORD WINAPI
FreeLibrary32W16(DWORD
);
56 #define CPEX_DEST_STDCALL 0x00000000L
57 #define CPEX_DEST_CDECL 0x80000000L
62 /* symbols exported from relay16.s */
63 extern DWORD WINAPI
wine_call_to_16( FARPROC16 target
, DWORD cbArgs
, PEXCEPTION_HANDLER handler
);
64 extern void WINAPI
wine_call_to_16_regs( CONTEXT86
*context
, DWORD cbArgs
, PEXCEPTION_HANDLER handler
);
65 extern void __wine_call_to_16_ret(void);
66 extern void CALL32_CBClient_Ret();
67 extern void CALL32_CBClientEx_Ret();
68 extern void DPMI_PendingEventCheck();
69 extern void DPMI_PendingEventCheck_Cleanup();
70 extern void DPMI_PendingEventCheck_Return();
71 extern BYTE __wine_call16_start
[];
72 extern BYTE __wine_call16_end
[];
74 extern void RELAY16_InitDebugLists(void);
76 static SEGPTR call16_ret_addr
; /* segptr to __wine_call_to_16_ret routine */
78 static WORD dpmi_checker_selector
;
79 static DWORD dpmi_checker_offset_call
;
80 static DWORD dpmi_checker_offset_cleanup
;
81 static DWORD dpmi_checker_offset_return
;
83 /***********************************************************************
86 BOOL
WOWTHUNK_Init(void)
88 /* allocate the code selector for CallTo16 routines */
90 WORD codesel
= wine_ldt_alloc_entries(1);
92 if (!codesel
) return FALSE
;
93 wine_ldt_set_base( &entry
, __wine_call16_start
);
94 wine_ldt_set_limit( &entry
, (BYTE
*)(&CallTo16_TebSelector
+ 1) - __wine_call16_start
- 1 );
95 wine_ldt_set_flags( &entry
, WINE_LDT_FLAGS_CODE
| WINE_LDT_FLAGS_32BIT
);
96 wine_ldt_set_entry( codesel
, &entry
);
98 /* Patch the return addresses for CallTo16 routines */
100 CallTo16_DataSelector
= wine_get_ds();
101 call16_ret_addr
= MAKESEGPTR( codesel
, (BYTE
*)__wine_call_to_16_ret
- __wine_call16_start
);
102 CALL32_CBClient_RetAddr
=
103 MAKESEGPTR( codesel
, (BYTE
*)CALL32_CBClient_Ret
- __wine_call16_start
);
104 CALL32_CBClientEx_RetAddr
=
105 MAKESEGPTR( codesel
, (BYTE
*)CALL32_CBClientEx_Ret
- __wine_call16_start
);
107 /* Prepare selector and offsets for DPMI event checking. */
108 dpmi_checker_selector
= codesel
;
109 dpmi_checker_offset_call
= (BYTE
*)DPMI_PendingEventCheck
- __wine_call16_start
;
110 dpmi_checker_offset_cleanup
= (BYTE
*)DPMI_PendingEventCheck_Cleanup
- __wine_call16_start
;
111 dpmi_checker_offset_return
= (BYTE
*)DPMI_PendingEventCheck_Return
- __wine_call16_start
;
113 if (TRACE_ON(relay
) || TRACE_ON(snoop
)) RELAY16_InitDebugLists();
119 /*************************************************************
122 * Fix a selector load that caused an exception if it's in the
125 static BOOL
fix_selector( CONTEXT
*context
)
128 BYTE
*instr
= (BYTE
*)context
->Eip
;
130 if (instr
< __wine_call16_start
|| instr
>= __wine_call16_end
) return FALSE
;
133 while (*instr
== 0x66 || *instr
== 0x67) instr
++;
137 case 0x07: /* pop es */
138 case 0x17: /* pop ss */
139 case 0x1f: /* pop ds */
141 case 0x0f: /* extended instruction */
144 case 0xa1: /* pop fs */
145 case 0xa9: /* pop gs */
154 stack
= wine_ldt_get_ptr( context
->SegSs
, context
->Esp
);
155 TRACE( "fixing up selector %x for pop instruction\n", *stack
);
161 /*************************************************************
164 * Make resuming the context check for pending DPMI events
165 * before the original context is restored. This is required
166 * because DPMI events are asynchronous, they are blocked while
167 * Wine 32-bit code is being executed and we want to prevent
168 * a race when returning back to 16-bit or 32-bit DPMI context.
170 static void insert_event_check( CONTEXT
*context
)
172 char *stack
= wine_ldt_get_ptr( context
->SegSs
, context
->Esp
);
174 /* don't do event check while in system code */
175 if (wine_ldt_is_system(context
->SegCs
))
178 if(context
->SegCs
== dpmi_checker_selector
&&
179 context
->Eip
>= dpmi_checker_offset_call
&&
180 context
->Eip
<= dpmi_checker_offset_cleanup
)
183 * Nested call. Stack will be preserved.
186 else if(context
->SegCs
== dpmi_checker_selector
&&
187 context
->Eip
== dpmi_checker_offset_return
)
190 * Nested call. We have just finished popping the fs
191 * register, lets put it back into stack.
194 stack
-= sizeof(WORD
);
195 *(WORD
*)stack
= context
->SegFs
;
202 * Call is not nested.
203 * Push modified registers into stack.
204 * These will be popped by the assembler stub.
207 stack
-= sizeof(DWORD
);
208 *(DWORD
*)stack
= context
->EFlags
;
210 stack
-= sizeof(DWORD
);
211 *(DWORD
*)stack
= context
->SegCs
;
213 stack
-= sizeof(DWORD
);
214 *(DWORD
*)stack
= context
->Eip
;
216 stack
-= sizeof(WORD
);
217 *(WORD
*)stack
= context
->SegFs
;
223 * Modify the context so that we jump into assembler stub.
224 * TEB access is made easier by providing the stub
225 * with the correct fs register value.
228 context
->SegCs
= dpmi_checker_selector
;
229 context
->Eip
= dpmi_checker_offset_call
;
230 context
->SegFs
= wine_get_fs();
234 /*************************************************************
237 * Handler for exceptions occurring in 16-bit code.
239 static DWORD
call16_handler( EXCEPTION_RECORD
*record
, EXCEPTION_REGISTRATION_RECORD
*frame
,
240 CONTEXT
*context
, EXCEPTION_REGISTRATION_RECORD
**pdispatcher
)
242 if (record
->ExceptionFlags
& (EH_UNWINDING
| EH_EXIT_UNWIND
))
244 /* unwinding: restore the stack pointer in the TEB, and leave the Win16 mutex */
245 STACK32FRAME
*frame32
= (STACK32FRAME
*)((char *)frame
- offsetof(STACK32FRAME
,frame
));
246 NtCurrentTeb()->WOW32Reserved
= (void *)frame32
->frame16
;
249 else if (record
->ExceptionCode
== EXCEPTION_ACCESS_VIOLATION
||
250 record
->ExceptionCode
== EXCEPTION_PRIV_INSTRUCTION
)
252 if (wine_ldt_is_system(context
->SegCs
))
254 if (fix_selector( context
)) return ExceptionContinueExecution
;
259 DWORD ret
= __wine_emulate_instruction( record
, context
);
262 * Insert check for pending DPMI events. Note that this
263 * check must be inserted after instructions have been
264 * emulated because the instruction emulation requires
265 * original CS:IP and the emulation may change TEB.dpmi_vif.
267 if(get_vm86_teb_info()->dpmi_vif
)
268 insert_event_check( context
);
270 if (ret
!= ExceptionContinueSearch
) return ret
;
272 /* check for Win16 __GP handler */
273 if ((gpHandler
= HasGPHandler16( MAKESEGPTR( context
->SegCs
, context
->Eip
) )))
275 WORD
*stack
= wine_ldt_get_ptr( context
->SegSs
, context
->Esp
);
276 *--stack
= context
->SegCs
;
277 *--stack
= context
->Eip
;
279 if (!IS_SELECTOR_32BIT(context
->SegSs
))
280 context
->Esp
= MAKELONG( LOWORD(context
->Esp
- 2*sizeof(WORD
)),
281 HIWORD(context
->Esp
) );
283 context
->Esp
-= 2*sizeof(WORD
);
285 context
->SegCs
= SELECTOROF( gpHandler
);
286 context
->Eip
= OFFSETOF( gpHandler
);
287 return ExceptionContinueExecution
;
291 else if (record
->ExceptionCode
== EXCEPTION_VM86_STI
)
293 insert_event_check( context
);
295 return ExceptionContinueSearch
;
299 /*************************************************************
302 * Handler for exceptions occurring in vm86 code.
304 static DWORD
vm86_handler( EXCEPTION_RECORD
*record
, EXCEPTION_REGISTRATION_RECORD
*frame
,
305 CONTEXT
*context
, EXCEPTION_REGISTRATION_RECORD
**pdispatcher
)
307 if (record
->ExceptionFlags
& (EH_UNWINDING
| EH_EXIT_UNWIND
))
308 return ExceptionContinueSearch
;
310 if (record
->ExceptionCode
== EXCEPTION_ACCESS_VIOLATION
||
311 record
->ExceptionCode
== EXCEPTION_PRIV_INSTRUCTION
)
313 return __wine_emulate_instruction( record
, context
);
316 return ExceptionContinueSearch
;
322 BOOL
WOWTHUNK_Init(void)
327 #endif /* __i386__ */
331 * 32-bit WOW routines (in WOW32, but actually forwarded to KERNEL32)
334 /**********************************************************************
335 * K32WOWGetDescriptor (KERNEL32.70)
337 BOOL WINAPI
K32WOWGetDescriptor( SEGPTR segptr
, LPLDT_ENTRY ldtent
)
339 return GetThreadSelectorEntry( GetCurrentThread(),
340 segptr
>> 16, ldtent
);
343 /**********************************************************************
344 * K32WOWGetVDMPointer (KERNEL32.56)
346 LPVOID WINAPI
K32WOWGetVDMPointer( DWORD vp
, DWORD dwBytes
, BOOL fProtectedMode
)
348 /* FIXME: add size check too */
350 if ( fProtectedMode
)
353 return DOSMEM_MapRealToLinear( vp
);
356 /**********************************************************************
357 * K32WOWGetVDMPointerFix (KERNEL32.68)
359 LPVOID WINAPI
K32WOWGetVDMPointerFix( DWORD vp
, DWORD dwBytes
, BOOL fProtectedMode
)
362 * Hmmm. According to the docu, we should call:
364 * GlobalFix16( SELECTOROF(vp) );
366 * But this is unnecessary under Wine, as we never move global
367 * memory segments in linear memory anyway.
369 * (I'm not so sure what we are *supposed* to do if
370 * fProtectedMode is TRUE, anyway ...)
373 return K32WOWGetVDMPointer( vp
, dwBytes
, fProtectedMode
);
376 /**********************************************************************
377 * K32WOWGetVDMPointerUnfix (KERNEL32.69)
379 VOID WINAPI
K32WOWGetVDMPointerUnfix( DWORD vp
)
382 * See above why we don't call:
384 * GlobalUnfix16( SELECTOROF(vp) );
389 /**********************************************************************
390 * K32WOWGlobalAlloc16 (KERNEL32.59)
392 WORD WINAPI
K32WOWGlobalAlloc16( WORD wFlags
, DWORD cb
)
394 return (WORD
)GlobalAlloc16( wFlags
, cb
);
397 /**********************************************************************
398 * K32WOWGlobalFree16 (KERNEL32.62)
400 WORD WINAPI
K32WOWGlobalFree16( WORD hMem
)
402 return (WORD
)GlobalFree16( (HGLOBAL16
)hMem
);
405 /**********************************************************************
406 * K32WOWGlobalUnlock16 (KERNEL32.61)
408 BOOL WINAPI
K32WOWGlobalUnlock16( WORD hMem
)
410 return (BOOL
)GlobalUnlock16( (HGLOBAL16
)hMem
);
413 /**********************************************************************
414 * K32WOWGlobalAllocLock16 (KERNEL32.63)
416 DWORD WINAPI
K32WOWGlobalAllocLock16( WORD wFlags
, DWORD cb
, WORD
*phMem
)
418 WORD hMem
= K32WOWGlobalAlloc16( wFlags
, cb
);
419 if (phMem
) *phMem
= hMem
;
421 return K32WOWGlobalLock16( hMem
);
424 /**********************************************************************
425 * K32WOWGlobalLockSize16 (KERNEL32.65)
427 DWORD WINAPI
K32WOWGlobalLockSize16( WORD hMem
, PDWORD pcb
)
430 *pcb
= GlobalSize16( (HGLOBAL16
)hMem
);
432 return K32WOWGlobalLock16( hMem
);
435 /**********************************************************************
436 * K32WOWGlobalUnlockFree16 (KERNEL32.64)
438 WORD WINAPI
K32WOWGlobalUnlockFree16( DWORD vpMem
)
440 if ( !K32WOWGlobalUnlock16( HIWORD(vpMem
) ) )
443 return K32WOWGlobalFree16( HIWORD(vpMem
) );
447 /**********************************************************************
448 * K32WOWYield16 (KERNEL32.66)
450 VOID WINAPI
K32WOWYield16( void )
453 * This does the right thing for both Win16 and Win32 tasks.
454 * More or less, at least :-/
459 /**********************************************************************
460 * K32WOWDirectedYield16 (KERNEL32.67)
462 VOID WINAPI
K32WOWDirectedYield16( WORD htask16
)
465 * Argh. Our scheduler doesn't like DirectedYield by Win32
466 * tasks at all. So we do hope that this routine is indeed
467 * only ever called by Win16 tasks that have thunked up ...
469 DirectedYield16( (HTASK16
)htask16
);
473 /***********************************************************************
474 * K32WOWHandle32 (KERNEL32.57)
476 HANDLE WINAPI
K32WOWHandle32( WORD handle
, WOW_HANDLE_TYPE type
)
487 case WOW_TYPE_HBITMAP
:
488 case WOW_TYPE_HBRUSH
:
489 case WOW_TYPE_HPALETTE
:
491 case WOW_TYPE_HACCEL
:
492 return (HANDLE
)(ULONG_PTR
)handle
;
494 case WOW_TYPE_HMETAFILE
:
495 FIXME( "conversion of metafile handles not supported yet\n" );
496 return (HANDLE
)(ULONG_PTR
)handle
;
499 return ((TDB
*)GlobalLock16(handle
))->teb
->ClientId
.UniqueThread
;
501 case WOW_TYPE_FULLHWND
:
502 FIXME( "conversion of full window handles not supported yet\n" );
503 return (HANDLE
)(ULONG_PTR
)handle
;
506 ERR( "handle 0x%04x of unknown type %d\n", handle
, type
);
507 return (HANDLE
)(ULONG_PTR
)handle
;
511 /***********************************************************************
512 * K32WOWHandle16 (KERNEL32.58)
514 WORD WINAPI
K32WOWHandle16( HANDLE handle
, WOW_HANDLE_TYPE type
)
525 case WOW_TYPE_HBITMAP
:
526 case WOW_TYPE_HBRUSH
:
527 case WOW_TYPE_HPALETTE
:
529 case WOW_TYPE_HACCEL
:
530 case WOW_TYPE_FULLHWND
:
531 if ( HIWORD(handle
) )
532 ERR( "handle %p of type %d has non-zero HIWORD\n", handle
, type
);
533 return LOWORD(handle
);
535 case WOW_TYPE_HMETAFILE
:
536 FIXME( "conversion of metafile handles not supported yet\n" );
537 return LOWORD(handle
);
540 return TASK_GetTaskFromThread( (DWORD
)handle
);
543 ERR( "handle %p of unknown type %d\n", handle
, type
);
544 return LOWORD(handle
);
548 /**********************************************************************
549 * K32WOWCallback16Ex (KERNEL32.55)
551 BOOL WINAPI
K32WOWCallback16Ex( DWORD vpfn16
, DWORD dwFlags
,
552 DWORD cbArgs
, LPVOID pArgs
, LPDWORD pdwRetCode
)
556 * Arguments must be prepared in the correct order by the caller
557 * (both for PASCAL and CDECL calling convention), so we simply
558 * copy them to the 16-bit stack ...
560 char *stack
= (char *)CURRENT_STACK16
- cbArgs
;
562 memcpy( stack
, pArgs
, cbArgs
);
564 if (dwFlags
& (WCB16_REGS
|WCB16_REGS_LONG
))
566 CONTEXT
*context
= (CONTEXT
*)pdwRetCode
;
570 DWORD count
= cbArgs
/ sizeof(WORD
);
571 WORD
* wstack
= (WORD
*)stack
;
573 DPRINTF("%04x:CallTo16(func=%04x:%04x,ds=%04x",
574 GetCurrentThreadId(),
575 context
->SegCs
, LOWORD(context
->Eip
), context
->SegDs
);
576 while (count
) DPRINTF( ",%04x", wstack
[--count
] );
577 DPRINTF(") ss:sp=%04x:%04x",
578 SELECTOROF(NtCurrentTeb()->WOW32Reserved
), OFFSETOF(NtCurrentTeb()->WOW32Reserved
) );
579 DPRINTF(" ax=%04x bx=%04x cx=%04x dx=%04x si=%04x di=%04x bp=%04x es=%04x fs=%04x\n",
580 (WORD
)context
->Eax
, (WORD
)context
->Ebx
, (WORD
)context
->Ecx
,
581 (WORD
)context
->Edx
, (WORD
)context
->Esi
, (WORD
)context
->Edi
,
582 (WORD
)context
->Ebp
, (WORD
)context
->SegEs
, (WORD
)context
->SegFs
);
583 SYSLEVEL_CheckNotLevel( 2 );
586 if (context
->EFlags
& 0x00020000) /* v86 mode */
588 EXCEPTION_REGISTRATION_RECORD frame
;
589 frame
.Handler
= vm86_handler
;
591 __wine_push_frame( &frame
);
592 __wine_enter_vm86( context
);
593 __wine_pop_frame( &frame
);
594 if (errno
!= 0) /* enter_vm86 will fall with ENOSYS on x64 kernels */
596 ERR("__wine_enter_vm86 failed (errno=%d)\n", errno
);
598 SetLastError(ERROR_NOT_SUPPORTED
);
600 SetLastError(ERROR_GEN_FAILURE
);
606 /* push return address */
607 if (dwFlags
& WCB16_REGS_LONG
)
609 stack
-= sizeof(DWORD
);
610 *((DWORD
*)stack
) = HIWORD(call16_ret_addr
);
611 stack
-= sizeof(DWORD
);
612 *((DWORD
*)stack
) = LOWORD(call16_ret_addr
);
613 cbArgs
+= 2 * sizeof(DWORD
);
617 stack
-= sizeof(SEGPTR
);
618 *((SEGPTR
*)stack
) = call16_ret_addr
;
619 cbArgs
+= sizeof(SEGPTR
);
623 * Start call by checking for pending events.
624 * Note that wine_call_to_16_regs overwrites context stack
625 * pointer so we may modify it here without a problem.
627 if (get_vm86_teb_info()->dpmi_vif
)
629 context
->SegSs
= wine_get_ds();
630 context
->Esp
= (DWORD
)stack
;
631 insert_event_check( context
);
632 cbArgs
+= (DWORD
)stack
- context
->Esp
;
636 wine_call_to_16_regs( context
, cbArgs
, call16_handler
);
642 DPRINTF("%04x:RetFrom16() ss:sp=%04x:%04x ",
643 GetCurrentThreadId(), SELECTOROF(NtCurrentTeb()->WOW32Reserved
),
644 OFFSETOF(NtCurrentTeb()->WOW32Reserved
));
645 DPRINTF(" ax=%04x bx=%04x cx=%04x dx=%04x bp=%04x sp=%04x\n",
646 (WORD
)context
->Eax
, (WORD
)context
->Ebx
, (WORD
)context
->Ecx
,
647 (WORD
)context
->Edx
, (WORD
)context
->Ebp
, (WORD
)context
->Esp
);
648 SYSLEVEL_CheckNotLevel( 2 );
657 DWORD count
= cbArgs
/ sizeof(WORD
);
658 WORD
* wstack
= (WORD
*)stack
;
660 DPRINTF("%04x:CallTo16(func=%04x:%04x,ds=%04x",
661 GetCurrentThreadId(), HIWORD(vpfn16
), LOWORD(vpfn16
),
662 SELECTOROF(NtCurrentTeb()->WOW32Reserved
) );
663 while (count
) DPRINTF( ",%04x", wstack
[--count
] );
664 DPRINTF(") ss:sp=%04x:%04x\n",
665 SELECTOROF(NtCurrentTeb()->WOW32Reserved
), OFFSETOF(NtCurrentTeb()->WOW32Reserved
) );
666 SYSLEVEL_CheckNotLevel( 2 );
669 /* push return address */
670 stack
-= sizeof(SEGPTR
);
671 *((SEGPTR
*)stack
) = call16_ret_addr
;
672 cbArgs
+= sizeof(SEGPTR
);
675 * Actually, we should take care whether the called routine cleans up
676 * its stack or not. Fortunately, our wine_call_to_16 core doesn't rely on
677 * the callee to do so; after the routine has returned, the 16-bit
678 * stack pointer is always reset to the position it had before.
681 ret
= wine_call_to_16( (FARPROC16
)vpfn16
, cbArgs
, call16_handler
);
682 if (pdwRetCode
) *pdwRetCode
= ret
;
687 DPRINTF("%04x:RetFrom16() ss:sp=%04x:%04x retval=%08x\n",
688 GetCurrentThreadId(), SELECTOROF(NtCurrentTeb()->WOW32Reserved
),
689 OFFSETOF(NtCurrentTeb()->WOW32Reserved
), ret
);
690 SYSLEVEL_CheckNotLevel( 2 );
694 assert(0); /* cannot call to 16-bit on non-Intel architectures */
695 #endif /* __i386__ */
697 return TRUE
; /* success */
700 /**********************************************************************
701 * K32WOWCallback16 (KERNEL32.54)
703 DWORD WINAPI
K32WOWCallback16( DWORD vpfn16
, DWORD dwParam
)
707 if ( !K32WOWCallback16Ex( vpfn16
, WCB16_PASCAL
,
708 sizeof(DWORD
), &dwParam
, &ret
) )
716 * 16-bit WOW routines (in KERNEL)
719 /**********************************************************************
720 * GetVDMPointer32W (KERNEL.516)
722 DWORD WINAPI
GetVDMPointer32W16( SEGPTR vp
, UINT16 fMode
)
724 GlobalPageLock16(GlobalHandle16(SELECTOROF(vp
)));
725 return (DWORD
)K32WOWGetVDMPointer( vp
, 0, (DWORD
)fMode
);
728 /***********************************************************************
729 * LoadLibraryEx32W (KERNEL.513)
731 DWORD WINAPI
LoadLibraryEx32W16( LPCSTR lpszLibFile
, DWORD hFile
, DWORD dwFlags
)
740 SetLastError(ERROR_INVALID_PARAMETER
);
744 /* if the file cannot be found, call LoadLibraryExA anyway, since it might be
745 a builtin module. This case is handled in MODULE_LoadLibraryExA */
747 if ((p
= strrchr( lpszLibFile
, '.' )) && !strchr( p
, '\\' )) /* got an extension */
749 if (OpenFile16( lpszLibFile
, &ofs
, OF_EXIST
) != HFILE_ERROR16
)
750 lpszLibFile
= ofs
.szPathName
;
754 char buffer
[MAX_PATH
+4];
755 strcpy( buffer
, lpszLibFile
);
756 strcat( buffer
, ".dll" );
757 if (OpenFile16( buffer
, &ofs
, OF_EXIST
) != HFILE_ERROR16
)
758 lpszLibFile
= ofs
.szPathName
;
761 ReleaseThunkLock( &mutex_count
);
762 hModule
= LoadLibraryExA( lpszLibFile
, (HANDLE
)hFile
, dwFlags
);
763 RestoreThunkLock( mutex_count
);
765 return (DWORD
)hModule
;
768 /***********************************************************************
769 * GetProcAddress32W (KERNEL.515)
771 DWORD WINAPI
GetProcAddress32W16( DWORD hModule
, LPCSTR lpszProc
)
773 return (DWORD
)GetProcAddress( (HMODULE
)hModule
, lpszProc
);
776 /***********************************************************************
777 * FreeLibrary32W (KERNEL.514)
779 DWORD WINAPI
FreeLibrary32W16( DWORD hLibModule
)
784 ReleaseThunkLock( &mutex_count
);
785 retv
= FreeLibrary( (HMODULE
)hLibModule
);
786 RestoreThunkLock( mutex_count
);
791 /**********************************************************************
794 static DWORD
WOW_CallProc32W16( FARPROC proc32
, DWORD nrofargs
, DWORD
*args
)
799 ReleaseThunkLock( &mutex_count
);
802 * FIXME: If ( nrofargs & CPEX_DEST_CDECL ) != 0, we should call a
803 * 32-bit CDECL routine ...
806 if (!proc32
) ret
= 0;
807 else switch (nrofargs
)
809 case 0: ret
= proc32();
811 case 1: ret
= proc32(args
[0]);
813 case 2: ret
= proc32(args
[0],args
[1]);
815 case 3: ret
= proc32(args
[0],args
[1],args
[2]);
817 case 4: ret
= proc32(args
[0],args
[1],args
[2],args
[3]);
819 case 5: ret
= proc32(args
[0],args
[1],args
[2],args
[3],args
[4]);
821 case 6: ret
= proc32(args
[0],args
[1],args
[2],args
[3],args
[4],args
[5]);
823 case 7: ret
= proc32(args
[0],args
[1],args
[2],args
[3],args
[4],args
[5],args
[6]);
825 case 8: ret
= proc32(args
[0],args
[1],args
[2],args
[3],args
[4],args
[5],args
[6],args
[7]);
827 case 9: ret
= proc32(args
[0],args
[1],args
[2],args
[3],args
[4],args
[5],args
[6],args
[7],args
[8]);
829 case 10:ret
= proc32(args
[0],args
[1],args
[2],args
[3],args
[4],args
[5],args
[6],args
[7],args
[8],args
[9]);
831 case 11:ret
= proc32(args
[0],args
[1],args
[2],args
[3],args
[4],args
[5],args
[6],args
[7],args
[8],args
[9],args
[10]);
833 case 12:ret
= proc32(args
[0],args
[1],args
[2],args
[3],args
[4],args
[5],args
[6],args
[7],args
[8],args
[9],args
[10],args
[11]);
835 case 13:ret
= proc32(args
[0],args
[1],args
[2],args
[3],args
[4],args
[5],args
[6],args
[7],args
[8],args
[9],args
[10],args
[11],args
[12]);
837 case 14:ret
= proc32(args
[0],args
[1],args
[2],args
[3],args
[4],args
[5],args
[6],args
[7],args
[8],args
[9],args
[10],args
[11],args
[12],args
[13]);
839 case 15:ret
= proc32(args
[0],args
[1],args
[2],args
[3],args
[4],args
[5],args
[6],args
[7],args
[8],args
[9],args
[10],args
[11],args
[12],args
[13],args
[14]);
842 /* FIXME: should go up to 32 arguments */
843 ERR("Unsupported number of arguments %d, please report.\n",nrofargs
);
848 RestoreThunkLock( mutex_count
);
850 TRACE("returns %08x\n",ret
);
854 /**********************************************************************
855 * CallProc32W (KERNEL.517)
857 DWORD WINAPIV
CallProc32W16( DWORD nrofargs
, DWORD argconvmask
, FARPROC proc32
, VA_LIST16 valist
)
862 TRACE("(%d,%d,%p args[",nrofargs
,argconvmask
,proc32
);
864 for (i
=0;i
<nrofargs
;i
++)
866 if (argconvmask
& (1<<i
))
868 SEGPTR ptr
= VA_ARG16( valist
, SEGPTR
);
869 /* pascal convention, have to reverse the arguments order */
870 args
[nrofargs
- i
- 1] = (DWORD
)MapSL(ptr
);
871 TRACE("%08x(%p),",ptr
,MapSL(ptr
));
875 DWORD arg
= VA_ARG16( valist
, DWORD
);
876 /* pascal convention, have to reverse the arguments order */
877 args
[nrofargs
- i
- 1] = arg
;
883 /* POP nrofargs DWORD arguments and 3 DWORD parameters */
884 stack16_pop( (3 + nrofargs
) * sizeof(DWORD
) );
886 return WOW_CallProc32W16( proc32
, nrofargs
, args
);
889 /**********************************************************************
890 * _CallProcEx32W (KERNEL.518)
892 DWORD WINAPIV
CallProcEx32W16( DWORD nrofargs
, DWORD argconvmask
, FARPROC proc32
, VA_LIST16 valist
)
897 TRACE("(%d,%d,%p args[",nrofargs
,argconvmask
,proc32
);
899 for (i
=0;i
<nrofargs
;i
++)
901 if (argconvmask
& (1<<i
))
903 SEGPTR ptr
= VA_ARG16( valist
, SEGPTR
);
904 args
[i
] = (DWORD
)MapSL(ptr
);
905 TRACE("%08x(%p),",ptr
,MapSL(ptr
));
909 DWORD arg
= VA_ARG16( valist
, DWORD
);
915 return WOW_CallProc32W16( proc32
, nrofargs
, args
);
919 /**********************************************************************
920 * WOW16Call (KERNEL.500)
925 DWORD WINAPIV
WOW16Call(WORD x
, WORD y
, WORD z
, VA_LIST16 args
)
929 FIXME("(0x%04x,0x%04x,%d),calling (",x
,y
,z
);
931 for (i
=0;i
<x
/2;i
++) {
932 WORD a
= VA_ARG16(args
,WORD
);
935 calladdr
= VA_ARG16(args
,DWORD
);
936 stack16_pop( 3*sizeof(WORD
) + x
+ sizeof(DWORD
) );
937 DPRINTF(") calling address was 0x%08x\n",calladdr
);