blob: a854e9115143100b51a50c55b9a5c81da99bb045 [file] [log] [blame]
Alexandre Julliardaf0bae51995-10-03 17:06:08 +00001/*
2 * VxD emulation
3 *
4 * Copyright 1995 Anand Kumria
Alexandre Julliard0799c1a2002-03-09 23:29:33 +00005 *
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2.1 of the License, or (at your option) any later version.
10 *
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
15 *
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, write to the Free Software
18 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
Alexandre Julliardaf0bae51995-10-03 17:06:08 +000019 */
20
Patrik Stridvalld016f812002-08-17 00:43:16 +000021#include "config.h"
Patrik Stridvall51e6c0c2002-08-31 19:04:14 +000022#include "wine/port.h"
Patrik Stridvalld016f812002-08-17 00:43:16 +000023
Alexandre Julliard642d3131998-07-12 19:29:36 +000024#include <fcntl.h>
25#include <memory.h>
Patrik Stridvall51e6c0c2002-08-31 19:04:14 +000026#include <stdio.h>
Jeremy Whited3e22d92000-02-10 19:03:02 +000027#include <sys/types.h>
Patrik Stridvalld016f812002-08-17 00:43:16 +000028#ifdef HAVE_UNISTD_H
29# include <unistd.h>
30#endif
Alexandre Julliard642d3131998-07-12 19:29:36 +000031#include "winbase.h"
Jeremy Whited3e22d92000-02-10 19:03:02 +000032#include "windef.h"
Patrik Stridvall9c1de6d2002-09-12 22:07:02 +000033#include "winternl.h"
Jeremy Whited3e22d92000-02-10 19:03:02 +000034#include "wingdi.h"
Marcus Meissner219cfd81999-02-24 13:05:13 +000035#include "winuser.h"
36#include "wine/winbase16.h"
37#include "wine/winuser16.h"
Alexandre Julliardaf0bae51995-10-03 17:06:08 +000038#include "msdos.h"
39#include "miscemu.h"
Alexandre Julliardbecb9a32000-12-11 03:48:15 +000040#include "module.h"
Alexandre Julliard642d3131998-07-12 19:29:36 +000041#include "selectors.h"
Alexandre Julliard642d3131998-07-12 19:29:36 +000042#include "task.h"
Alexandre Julliard642d3131998-07-12 19:29:36 +000043#include "file.h"
Alexandre Julliard0799c1a2002-03-09 23:29:33 +000044#include "wine/debug.h"
Alexandre Julliardaf0bae51995-10-03 17:06:08 +000045
Alexandre Julliard0799c1a2002-03-09 23:29:33 +000046WINE_DEFAULT_DEBUG_CHANNEL(vxd);
Patrik Stridvallb4b9fae1999-04-19 14:56:29 +000047
Alexandre Julliardaf0bae51995-10-03 17:06:08 +000048
Alexandre Julliard139a4b11996-11-02 14:24:07 +000049#define VXD_BARF(context,name) \
Alexandre Julliard61fece01999-06-26 19:09:08 +000050 DPRINTF( "vxd %s: unknown/not implemented parameters:\n" \
Alexandre Julliard139a4b11996-11-02 14:24:07 +000051 "vxd %s: AX %04x, BX %04x, CX %04x, DX %04x, " \
52 "SI %04x, DI %04x, DS %04x, ES %04x\n", \
53 (name), (name), AX_reg(context), BX_reg(context), \
54 CX_reg(context), DX_reg(context), SI_reg(context), \
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +000055 DI_reg(context), (WORD)context->SegDs, (WORD)context->SegEs )
Alexandre Julliard139a4b11996-11-02 14:24:07 +000056
Alexandre Julliardbecb9a32000-12-11 03:48:15 +000057UINT W32S_offset = 0;
Alexandre Julliard670cdc41997-08-24 16:00:30 +000058
59static WORD VXD_WinVersion(void)
60{
Alexandre Julliard3db94ef1997-09-28 17:43:24 +000061 WORD version = LOWORD(GetVersion16());
Alexandre Julliard670cdc41997-08-24 16:00:30 +000062 return (version >> 8) | (version << 8);
63}
64
Alexandre Julliardaf0bae51995-10-03 17:06:08 +000065/***********************************************************************
Patrik Stridvall3ca98232001-06-20 23:03:14 +000066 * VXD_VMM (WPROCS.401)
Alexandre Julliardd30dfd21998-09-27 18:28:36 +000067 */
Ulrich Weigandff9c44f1999-06-27 15:28:51 +000068void WINAPI VXD_VMM ( CONTEXT86 *context )
Alexandre Julliardd30dfd21998-09-27 18:28:36 +000069{
70 unsigned service = AX_reg(context);
71
Alexandre Julliard908464d2000-11-01 03:11:12 +000072 TRACE("[%04x] VMM\n", (UINT16)service);
Alexandre Julliardd30dfd21998-09-27 18:28:36 +000073
74 switch(service)
75 {
76 case 0x0000: /* version */
Alexandre Julliard3fa613c2002-08-31 18:47:00 +000077 SET_AX( context, VXD_WinVersion() );
Alexandre Julliardd30dfd21998-09-27 18:28:36 +000078 RESET_CFLAG(context);
79 break;
80
Ulrich Weigandff1c5691998-10-14 18:01:08 +000081 case 0x026d: /* Get_Debug_Flag '/m' */
82 case 0x026e: /* Get_Debug_Flag '/n' */
Alexandre Julliard3fa613c2002-08-31 18:47:00 +000083 SET_AL( context, 0 );
Ulrich Weigandff1c5691998-10-14 18:01:08 +000084 RESET_CFLAG(context);
85 break;
86
Alexandre Julliardd30dfd21998-09-27 18:28:36 +000087 default:
88 VXD_BARF( context, "VMM" );
89 }
90}
91
92/***********************************************************************
Patrik Stridvall3ca98232001-06-20 23:03:14 +000093 * VXD_PageFile (WPROCS.433)
Alexandre Julliardaf0bae51995-10-03 17:06:08 +000094 */
Alexandre Julliard617955d1999-06-26 18:40:24 +000095void WINAPI VXD_PageFile( CONTEXT86 *context )
Alexandre Julliardaf0bae51995-10-03 17:06:08 +000096{
Alexandre Julliard670cdc41997-08-24 16:00:30 +000097 unsigned service = AX_reg(context);
98
Alexandre Julliardaf0bae51995-10-03 17:06:08 +000099 /* taken from Ralf Brown's Interrupt List */
100
Alexandre Julliard61fece01999-06-26 19:09:08 +0000101 TRACE("[%04x] PageFile\n", (UINT16)service );
Alexandre Julliardaf0bae51995-10-03 17:06:08 +0000102
Alexandre Julliard670cdc41997-08-24 16:00:30 +0000103 switch(service)
Alexandre Julliardaf0bae51995-10-03 17:06:08 +0000104 {
105 case 0x00: /* get version, is this windows version? */
Alexandre Julliard61fece01999-06-26 19:09:08 +0000106 TRACE("returning version\n");
Alexandre Julliard3fa613c2002-08-31 18:47:00 +0000107 SET_AX( context, VXD_WinVersion() );
Alexandre Julliardca22b331996-07-12 19:02:39 +0000108 RESET_CFLAG(context);
Alexandre Julliardaf0bae51995-10-03 17:06:08 +0000109 break;
110
111 case 0x01: /* get swap file info */
Alexandre Julliard61fece01999-06-26 19:09:08 +0000112 TRACE("VxD PageFile: returning swap file info\n");
Alexandre Julliard3fa613c2002-08-31 18:47:00 +0000113 SET_AX( context, 0x00 ); /* paging disabled */
Vincent Béron9a624912002-05-31 23:06:46 +0000114 context->Ecx = 0; /* maximum size of paging file */
Alexandre Julliardaf0bae51995-10-03 17:06:08 +0000115 /* FIXME: do I touch DS:SI or DS:DI? */
Alexandre Julliardca22b331996-07-12 19:02:39 +0000116 RESET_CFLAG(context);
Alexandre Julliardaf0bae51995-10-03 17:06:08 +0000117 break;
118
119 case 0x02: /* delete permanent swap on exit */
Alexandre Julliard61fece01999-06-26 19:09:08 +0000120 TRACE("VxD PageFile: supposed to delete swap\n");
Alexandre Julliardca22b331996-07-12 19:02:39 +0000121 RESET_CFLAG(context);
Alexandre Julliardaf0bae51995-10-03 17:06:08 +0000122 break;
123
124 case 0x03: /* current temporary swap file size */
Alexandre Julliard61fece01999-06-26 19:09:08 +0000125 TRACE("VxD PageFile: what is current temp. swap size\n");
Alexandre Julliardca22b331996-07-12 19:02:39 +0000126 RESET_CFLAG(context);
Alexandre Julliardaf0bae51995-10-03 17:06:08 +0000127 break;
128
129 case 0x04: /* read or write?? INTERRUP.D */
130 case 0x05: /* cancel?? INTERRUP.D */
131 case 0x06: /* test I/O valid INTERRUP.D */
132 default:
Alexandre Julliard139a4b11996-11-02 14:24:07 +0000133 VXD_BARF( context, "pagefile" );
Alexandre Julliardaf0bae51995-10-03 17:06:08 +0000134 break;
135 }
136}
137
Ulrich Weigand0b597bc1998-10-11 19:01:33 +0000138/***********************************************************************
Patrik Stridvall3ca98232001-06-20 23:03:14 +0000139 * VXD_Reboot (WPROCS.409)
Ulrich Weigand0b597bc1998-10-11 19:01:33 +0000140 */
Ulrich Weigandff9c44f1999-06-27 15:28:51 +0000141void WINAPI VXD_Reboot ( CONTEXT86 *context )
Ulrich Weigand0b597bc1998-10-11 19:01:33 +0000142{
143 unsigned service = AX_reg(context);
144
Alexandre Julliard908464d2000-11-01 03:11:12 +0000145 TRACE("[%04x] Reboot\n", (UINT16)service);
Ulrich Weigand0b597bc1998-10-11 19:01:33 +0000146
147 switch(service)
148 {
149 case 0x0000: /* version */
Alexandre Julliard3fa613c2002-08-31 18:47:00 +0000150 SET_AX( context, VXD_WinVersion() );
Ulrich Weigand0b597bc1998-10-11 19:01:33 +0000151 RESET_CFLAG(context);
152 break;
153
154 default:
155 VXD_BARF( context, "REBOOT" );
156 }
157}
158
159/***********************************************************************
Patrik Stridvall3ca98232001-06-20 23:03:14 +0000160 * VXD_VDD (WPROCS.410)
Ulrich Weigand0b597bc1998-10-11 19:01:33 +0000161 */
Ulrich Weigandff9c44f1999-06-27 15:28:51 +0000162void WINAPI VXD_VDD ( CONTEXT86 *context )
Ulrich Weigand0b597bc1998-10-11 19:01:33 +0000163{
164 unsigned service = AX_reg(context);
165
Alexandre Julliard908464d2000-11-01 03:11:12 +0000166 TRACE("[%04x] VDD\n", (UINT16)service);
Ulrich Weigand0b597bc1998-10-11 19:01:33 +0000167
168 switch(service)
169 {
170 case 0x0000: /* version */
Alexandre Julliard3fa613c2002-08-31 18:47:00 +0000171 SET_AX( context, VXD_WinVersion() );
Ulrich Weigand0b597bc1998-10-11 19:01:33 +0000172 RESET_CFLAG(context);
173 break;
174
175 default:
176 VXD_BARF( context, "VDD" );
177 }
178}
Alexandre Julliardaf0bae51995-10-03 17:06:08 +0000179
180/***********************************************************************
Patrik Stridvall3ca98232001-06-20 23:03:14 +0000181 * VXD_VMD (WPROCS.412)
Ulrich Weigandab635b21998-11-14 18:33:34 +0000182 */
Ulrich Weigandff9c44f1999-06-27 15:28:51 +0000183void WINAPI VXD_VMD ( CONTEXT86 *context )
Ulrich Weigandab635b21998-11-14 18:33:34 +0000184{
185 unsigned service = AX_reg(context);
186
Alexandre Julliard908464d2000-11-01 03:11:12 +0000187 TRACE("[%04x] VMD\n", (UINT16)service);
Ulrich Weigandab635b21998-11-14 18:33:34 +0000188
189 switch(service)
190 {
191 case 0x0000: /* version */
Alexandre Julliard3fa613c2002-08-31 18:47:00 +0000192 SET_AX( context, VXD_WinVersion() );
Ulrich Weigandab635b21998-11-14 18:33:34 +0000193 RESET_CFLAG(context);
194 break;
195
196 default:
197 VXD_BARF( context, "VMD" );
198 }
199}
200
201/***********************************************************************
Patrik Stridvall3ca98232001-06-20 23:03:14 +0000202 * VXD_VXDLoader (WPROCS.439)
James Abbatiello5f150ba2000-08-28 19:29:26 +0000203 */
204void WINAPI VXD_VXDLoader( CONTEXT86 *context )
205{
206 unsigned service = AX_reg(context);
207
208 TRACE("[%04x] VXDLoader\n", (UINT16)service);
209
210 switch (service)
211 {
212 case 0x0000: /* get version */
213 TRACE("returning version\n");
Alexandre Julliard3fa613c2002-08-31 18:47:00 +0000214 SET_AX( context, 0x0000 );
215 SET_DX( context, VXD_WinVersion() );
James Abbatiello5f150ba2000-08-28 19:29:26 +0000216 RESET_CFLAG(context);
217 break;
218
219 case 0x0001: /* load device */
220 FIXME("load device %04lx:%04x (%s)\n",
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +0000221 context->SegDs, DX_reg(context),
Alexandre Julliard982a2232000-12-13 20:20:09 +0000222 debugstr_a(MapSL(MAKESEGPTR(context->SegDs, DX_reg(context)))));
Alexandre Julliard3fa613c2002-08-31 18:47:00 +0000223 SET_AX( context, 0x0000 );
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +0000224 context->SegEs = 0x0000;
Alexandre Julliard3fa613c2002-08-31 18:47:00 +0000225 SET_DI( context, 0x0000 );
James Abbatiello5f150ba2000-08-28 19:29:26 +0000226 RESET_CFLAG(context);
227 break;
228
229 case 0x0002: /* unload device */
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +0000230 FIXME("unload device (%08lx)\n", context->Ebx);
Alexandre Julliard3fa613c2002-08-31 18:47:00 +0000231 SET_AX( context, 0x0000 );
James Abbatiello5f150ba2000-08-28 19:29:26 +0000232 RESET_CFLAG(context);
233 break;
234
235 default:
236 VXD_BARF( context, "VXDLDR" );
Alexandre Julliard3fa613c2002-08-31 18:47:00 +0000237 SET_AX( context, 0x000B ); /* invalid function number */
James Abbatiello5f150ba2000-08-28 19:29:26 +0000238 SET_CFLAG(context);
239 break;
Vincent Béron9a624912002-05-31 23:06:46 +0000240 }
James Abbatiello5f150ba2000-08-28 19:29:26 +0000241}
242
243/***********************************************************************
Patrik Stridvall3ca98232001-06-20 23:03:14 +0000244 * VXD_Shell (WPROCS.423)
Alexandre Julliardaf0bae51995-10-03 17:06:08 +0000245 */
Alexandre Julliard617955d1999-06-26 18:40:24 +0000246void WINAPI VXD_Shell( CONTEXT86 *context )
Alexandre Julliardaf0bae51995-10-03 17:06:08 +0000247{
Alexandre Julliard670cdc41997-08-24 16:00:30 +0000248 unsigned service = DX_reg(context);
Alexandre Julliardaf0bae51995-10-03 17:06:08 +0000249
Alexandre Julliard61fece01999-06-26 19:09:08 +0000250 TRACE("[%04x] Shell\n", (UINT16)service);
Alexandre Julliard670cdc41997-08-24 16:00:30 +0000251
252 switch (service) /* Ralf Brown says EDX, but I use DX instead */
Alexandre Julliardaf0bae51995-10-03 17:06:08 +0000253 {
254 case 0x0000:
Alexandre Julliard61fece01999-06-26 19:09:08 +0000255 TRACE("returning version\n");
Alexandre Julliard3fa613c2002-08-31 18:47:00 +0000256 SET_AX( context, VXD_WinVersion() );
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +0000257 context->Ebx = 1; /* system VM Handle */
Alexandre Julliardaf0bae51995-10-03 17:06:08 +0000258 break;
259
260 case 0x0001:
261 case 0x0002:
262 case 0x0003:
Juergen Schmiedf08b8191999-05-22 10:33:50 +0000263 /* SHELL_SYSMODAL_Message
264 ebx virtual maschine handle
265 eax message box flags
266 ecx address of message
267 edi address of caption
268 return response in eax
269 */
Alexandre Julliardaf0bae51995-10-03 17:06:08 +0000270 case 0x0004:
Juergen Schmiedf08b8191999-05-22 10:33:50 +0000271 /* SHELL_Message
272 ebx virtual maschine handle
273 eax message box flags
274 ecx address of message
275 edi address of caption
276 esi address callback
277 edx reference data for callback
278 return response in eax
279 */
Alexandre Julliardaf0bae51995-10-03 17:06:08 +0000280 case 0x0005:
Alexandre Julliard139a4b11996-11-02 14:24:07 +0000281 VXD_BARF( context, "shell" );
Alexandre Julliardaf0bae51995-10-03 17:06:08 +0000282 break;
283
284 case 0x0006: /* SHELL_Get_VM_State */
Alexandre Julliard61fece01999-06-26 19:09:08 +0000285 TRACE("VxD Shell: returning VM state\n");
Alexandre Julliardaf0bae51995-10-03 17:06:08 +0000286 /* Actually we don't, not yet. We have to return a structure
287 * and I am not to sure how to set it up and return it yet,
288 * so for now let's do nothing. I can (hopefully) get this
289 * by the next release
290 */
Alexandre Julliardca22b331996-07-12 19:02:39 +0000291 /* RESET_CFLAG(context); */
Alexandre Julliardaf0bae51995-10-03 17:06:08 +0000292 break;
293
294 case 0x0007:
295 case 0x0008:
296 case 0x0009:
297 case 0x000A:
298 case 0x000B:
299 case 0x000C:
300 case 0x000D:
301 case 0x000E:
302 case 0x000F:
303 case 0x0010:
304 case 0x0011:
305 case 0x0012:
306 case 0x0013:
307 case 0x0014:
308 case 0x0015:
309 case 0x0016:
Ulrich Weigandab635b21998-11-14 18:33:34 +0000310 VXD_BARF( context, "SHELL" );
311 break;
312
313 /* the new Win95 shell API */
314 case 0x0100: /* get version */
Alexandre Julliard3fa613c2002-08-31 18:47:00 +0000315 SET_AX( context, VXD_WinVersion() );
Ulrich Weigandab635b21998-11-14 18:33:34 +0000316 break;
317
318 case 0x0104: /* retrieve Hook_Properties list */
319 case 0x0105: /* call Hook_Properties callbacks */
320 VXD_BARF( context, "SHELL" );
321 break;
322
323 case 0x0106: /* install timeout callback */
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +0000324 TRACE("VxD Shell: ignoring shell callback (%ld sec.)\n", context->Ebx);
Ulrich Weigandab635b21998-11-14 18:33:34 +0000325 SET_CFLAG(context);
326 break;
327
328 case 0x0107: /* get version of any VxD */
Alexandre Julliardaf0bae51995-10-03 17:06:08 +0000329 default:
Ulrich Weigandab635b21998-11-14 18:33:34 +0000330 VXD_BARF( context, "SHELL" );
Alexandre Julliardaf0bae51995-10-03 17:06:08 +0000331 break;
332 }
333}
334
335
336/***********************************************************************
Patrik Stridvall3ca98232001-06-20 23:03:14 +0000337 * VXD_Comm (WPROCS.414)
Alexandre Julliardaf0bae51995-10-03 17:06:08 +0000338 */
Alexandre Julliard617955d1999-06-26 18:40:24 +0000339void WINAPI VXD_Comm( CONTEXT86 *context )
Alexandre Julliardaf0bae51995-10-03 17:06:08 +0000340{
Alexandre Julliard670cdc41997-08-24 16:00:30 +0000341 unsigned service = AX_reg(context);
Alexandre Julliardaf0bae51995-10-03 17:06:08 +0000342
Alexandre Julliard61fece01999-06-26 19:09:08 +0000343 TRACE("[%04x] Comm\n", (UINT16)service);
Alexandre Julliard670cdc41997-08-24 16:00:30 +0000344
345 switch (service)
Alexandre Julliardaf0bae51995-10-03 17:06:08 +0000346 {
347 case 0x0000: /* get version */
Alexandre Julliard61fece01999-06-26 19:09:08 +0000348 TRACE("returning version\n");
Alexandre Julliard3fa613c2002-08-31 18:47:00 +0000349 SET_AX( context, VXD_WinVersion() );
Alexandre Julliardca22b331996-07-12 19:02:39 +0000350 RESET_CFLAG(context);
Alexandre Julliardaf0bae51995-10-03 17:06:08 +0000351 break;
352
353 case 0x0001: /* set port global */
354 case 0x0002: /* get focus */
355 case 0x0003: /* virtualise port */
356 default:
Alexandre Julliard139a4b11996-11-02 14:24:07 +0000357 VXD_BARF( context, "comm" );
Alexandre Julliardaf0bae51995-10-03 17:06:08 +0000358 }
359}
Alexandre Julliard670cdc41997-08-24 16:00:30 +0000360
361/***********************************************************************
Patrik Stridvall3ca98232001-06-20 23:03:14 +0000362 * VXD_Timer (WPROCS.405)
Alexandre Julliard670cdc41997-08-24 16:00:30 +0000363 */
Ulrich Weigandff9c44f1999-06-27 15:28:51 +0000364void WINAPI VXD_Timer( CONTEXT86 *context )
Alexandre Julliard670cdc41997-08-24 16:00:30 +0000365{
366 unsigned service = AX_reg(context);
367
Alexandre Julliard61fece01999-06-26 19:09:08 +0000368 TRACE("[%04x] Virtual Timer\n", (UINT16)service);
Alexandre Julliard670cdc41997-08-24 16:00:30 +0000369
370 switch(service)
371 {
372 case 0x0000: /* version */
Alexandre Julliard3fa613c2002-08-31 18:47:00 +0000373 SET_AX( context, VXD_WinVersion() );
Alexandre Julliard670cdc41997-08-24 16:00:30 +0000374 RESET_CFLAG(context);
375 break;
376
377 case 0x0100: /* clock tick time, in 840nsecs */
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +0000378 context->Eax = GetTickCount();
Alexandre Julliard670cdc41997-08-24 16:00:30 +0000379
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +0000380 context->Edx = context->Eax >> 22;
381 context->Eax <<= 10; /* not very precise */
Alexandre Julliard670cdc41997-08-24 16:00:30 +0000382 break;
383
384 case 0x0101: /* current Windows time, msecs */
385 case 0x0102: /* current VM time, msecs */
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +0000386 context->Eax = GetTickCount();
Alexandre Julliard670cdc41997-08-24 16:00:30 +0000387 break;
388
389 default:
390 VXD_BARF( context, "VTD" );
391 }
392}
393
Alexandre Julliard642d3131998-07-12 19:29:36 +0000394/***********************************************************************
Patrik Stridvall3ca98232001-06-20 23:03:14 +0000395 * VXD_TimerAPI (WPROCS.1490)
Alexandre Julliardd30dfd21998-09-27 18:28:36 +0000396 */
Ulrich Weigand1cd07941998-12-10 11:01:09 +0000397static DWORD System_Time = 0;
398static WORD System_Time_Selector = 0;
399static void System_Time_Tick( WORD timer ) { System_Time += 55; }
Ulrich Weigandff9c44f1999-06-27 15:28:51 +0000400void WINAPI VXD_TimerAPI ( CONTEXT86 *context )
Alexandre Julliardd30dfd21998-09-27 18:28:36 +0000401{
Alexandre Julliardd30dfd21998-09-27 18:28:36 +0000402 unsigned service = AX_reg(context);
403
Alexandre Julliard908464d2000-11-01 03:11:12 +0000404 TRACE("[%04x] TimerAPI\n", (UINT16)service);
Alexandre Julliardd30dfd21998-09-27 18:28:36 +0000405
406 switch(service)
407 {
408 case 0x0000: /* version */
Alexandre Julliard3fa613c2002-08-31 18:47:00 +0000409 SET_AX( context, VXD_WinVersion() );
Alexandre Julliardd30dfd21998-09-27 18:28:36 +0000410 RESET_CFLAG(context);
411 break;
412
413 case 0x0009: /* get system time selector */
Ulrich Weigand1cd07941998-12-10 11:01:09 +0000414 if ( !System_Time_Selector )
415 {
Alexandre Julliard914406f2000-11-14 01:54:49 +0000416 System_Time_Selector = SELECTOR_AllocBlock( &System_Time, sizeof(DWORD), WINE_LDT_FLAGS_DATA );
Ulrich Weigand1cd07941998-12-10 11:01:09 +0000417 CreateSystemTimer( 55, System_Time_Tick );
418 }
Alexandre Julliardd30dfd21998-09-27 18:28:36 +0000419
Alexandre Julliard3fa613c2002-08-31 18:47:00 +0000420 SET_AX( context, System_Time_Selector );
Alexandre Julliardd30dfd21998-09-27 18:28:36 +0000421 RESET_CFLAG(context);
422 break;
423
424 default:
425 VXD_BARF( context, "VTDAPI" );
426 }
427}
428
429/***********************************************************************
Patrik Stridvall3ca98232001-06-20 23:03:14 +0000430 * VXD_ConfigMG (WPROCS.451)
Alexandre Julliardd30dfd21998-09-27 18:28:36 +0000431 */
Ulrich Weigandff9c44f1999-06-27 15:28:51 +0000432void WINAPI VXD_ConfigMG ( CONTEXT86 *context )
Alexandre Julliardd30dfd21998-09-27 18:28:36 +0000433{
434 unsigned service = AX_reg(context);
435
Alexandre Julliard908464d2000-11-01 03:11:12 +0000436 TRACE("[%04x] ConfigMG\n", (UINT16)service);
Alexandre Julliardd30dfd21998-09-27 18:28:36 +0000437
438 switch(service)
439 {
440 case 0x0000: /* version */
Alexandre Julliard3fa613c2002-08-31 18:47:00 +0000441 SET_AX( context, VXD_WinVersion() );
Alexandre Julliardd30dfd21998-09-27 18:28:36 +0000442 RESET_CFLAG(context);
443 break;
444
445 default:
446 VXD_BARF( context, "CONFIGMG" );
447 }
448}
449
450/***********************************************************************
Patrik Stridvall3ca98232001-06-20 23:03:14 +0000451 * VXD_Enable (WPROCS.455)
Ulrich Weigandab635b21998-11-14 18:33:34 +0000452 */
Ulrich Weigandff9c44f1999-06-27 15:28:51 +0000453void WINAPI VXD_Enable ( CONTEXT86 *context )
Ulrich Weigandab635b21998-11-14 18:33:34 +0000454{
455 unsigned service = AX_reg(context);
456
Alexandre Julliard908464d2000-11-01 03:11:12 +0000457 TRACE("[%04x] Enable\n", (UINT16)service);
Ulrich Weigandab635b21998-11-14 18:33:34 +0000458
459 switch(service)
460 {
461 case 0x0000: /* version */
Alexandre Julliard3fa613c2002-08-31 18:47:00 +0000462 SET_AX( context, VXD_WinVersion() );
Ulrich Weigandab635b21998-11-14 18:33:34 +0000463 RESET_CFLAG(context);
464 break;
465
466 default:
467 VXD_BARF( context, "ENABLE" );
468 }
469}
470
471/***********************************************************************
Patrik Stridvall3ca98232001-06-20 23:03:14 +0000472 * VXD_APM (WPROCS.438)
Ulrich Weigandab635b21998-11-14 18:33:34 +0000473 */
Ulrich Weigandff9c44f1999-06-27 15:28:51 +0000474void WINAPI VXD_APM ( CONTEXT86 *context )
Ulrich Weigandab635b21998-11-14 18:33:34 +0000475{
476 unsigned service = AX_reg(context);
477
Alexandre Julliard908464d2000-11-01 03:11:12 +0000478 TRACE("[%04x] APM\n", (UINT16)service);
Ulrich Weigandab635b21998-11-14 18:33:34 +0000479
480 switch(service)
481 {
482 case 0x0000: /* version */
Alexandre Julliard3fa613c2002-08-31 18:47:00 +0000483 SET_AX( context, VXD_WinVersion() );
Ulrich Weigandab635b21998-11-14 18:33:34 +0000484 RESET_CFLAG(context);
485 break;
486
487 default:
488 VXD_BARF( context, "APM" );
489 }
490}
491
492/***********************************************************************
Patrik Stridvall3ca98232001-06-20 23:03:14 +0000493 * VXD_Win32s (WPROCS.445)
Alexandre Julliard642d3131998-07-12 19:29:36 +0000494 *
495 * This is an implementation of the services of the Win32s VxD.
496 * Since official documentation of these does not seem to be available,
Vincent Béron9a624912002-05-31 23:06:46 +0000497 * certain arguments of some of the services remain unclear.
Alexandre Julliard642d3131998-07-12 19:29:36 +0000498 *
Vincent Béron9a624912002-05-31 23:06:46 +0000499 * FIXME: The following services are currently unimplemented:
Alexandre Julliard642d3131998-07-12 19:29:36 +0000500 * Exception handling (0x01, 0x1C)
501 * Debugger support (0x0C, 0x14, 0x17)
502 * Low-level memory access (0x02, 0x03, 0x0A, 0x0B)
503 * Memory Statistics (0x1B)
Vincent Béron9a624912002-05-31 23:06:46 +0000504 *
Alexandre Julliard642d3131998-07-12 19:29:36 +0000505 *
506 * We have a specific problem running Win32s on Linux (and probably also
507 * the other x86 unixes), since Win32s tries to allocate its main 'flat
508 * code/data segment' selectors with a base of 0xffff0000 (and limit 4GB).
Vincent Béron9a624912002-05-31 23:06:46 +0000509 * The rationale for this seems to be that they want one the one hand to
510 * be able to leave the Win 3.1 memory (starting with the main DOS memory)
Alexandre Julliard642d3131998-07-12 19:29:36 +0000511 * at linear address 0, but want at other hand to have offset 0 of the
512 * flat data/code segment point to an unmapped page (to catch NULL pointer
513 * accesses). Hence they allocate the flat segments with a base of 0xffff0000
514 * so that the Win 3.1 memory area at linear address zero shows up in the
515 * flat segments at offset 0x10000 (since linear addresses wrap around at
516 * 4GB). To compensate for that discrepancy between flat segment offsets
517 * and plain linear addresses, all flat pointers passed between the 32-bit
518 * and the 16-bit parts of Win32s are shifted by 0x10000 in the appropriate
519 * direction by the glue code (mainly) in W32SKRNL and WIN32S16.
520 *
521 * The problem for us is now that Linux does not allow a LDT selector with
522 * base 0xffff0000 to be created, since it would 'see' a part of the kernel
523 * address space. To address this problem we introduce *another* offset:
524 * We add 0x10000 to every linear address we get as an argument from Win32s.
525 * This means especially that the flat code/data selectors get actually
526 * allocated with base 0x0, so that flat offsets and (real) linear addresses
527 * do again agree! In fact, every call e.g. of a Win32s VxD service now
528 * has all pointer arguments (which are offsets in the flat data segement)
529 * first reduced by 0x10000 by the W32SKRNL glue code, and then again
530 * increased by 0x10000 by *our* code.
531 *
532 * Note that to keep everything consistent, this offset has to be applied by
533 * every Wine function that operates on 'linear addresses' passed to it by
534 * Win32s. Fortunately, since Win32s does not directly call any Wine 32-bit
535 * API routines, this affects only two locations: this VxD and the DPMI
536 * handler. (NOTE: Should any Win32s application pass a linear address to
537 * any routine apart from those, e.g. some other VxD handler, that code
538 * would have to take the offset into account as well!)
539 *
Alexandre Julliardbecb9a32000-12-11 03:48:15 +0000540 * The offset is set the first time any application calls the GetVersion()
541 * service of the Win32s VxD. (Note that the offset is never reset.)
Vincent Béron9a624912002-05-31 23:06:46 +0000542 *
Alexandre Julliard642d3131998-07-12 19:29:36 +0000543 */
544
Ulrich Weigandff9c44f1999-06-27 15:28:51 +0000545void WINAPI VXD_Win32s( CONTEXT86 *context )
Alexandre Julliard642d3131998-07-12 19:29:36 +0000546{
Alexandre Julliard642d3131998-07-12 19:29:36 +0000547 switch (AX_reg(context))
548 {
549 case 0x0000: /* Get Version */
550 /*
551 * Input: None
552 *
553 * Output: EAX: LoWord: Win32s Version (1.30)
554 * HiWord: VxD Version (200)
555 *
556 * EBX: Build (172)
557 *
558 * ECX: ??? (1)
559 *
560 * EDX: Debugging Flags
561 *
Vincent Béron9a624912002-05-31 23:06:46 +0000562 * EDI: Error Flag
Alexandre Julliard642d3131998-07-12 19:29:36 +0000563 * 0 if OK,
564 * 1 if VMCPD VxD not found
565 */
566
Alexandre Julliard61fece01999-06-26 19:09:08 +0000567 TRACE("GetVersion()\n");
Vincent Béron9a624912002-05-31 23:06:46 +0000568
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +0000569 context->Eax = VXD_WinVersion() | (200 << 16);
570 context->Ebx = 0;
571 context->Ecx = 0;
572 context->Edx = 0;
573 context->Edi = 0;
Alexandre Julliard642d3131998-07-12 19:29:36 +0000574
Vincent Béron9a624912002-05-31 23:06:46 +0000575 /*
Alexandre Julliard642d3131998-07-12 19:29:36 +0000576 * If this is the first time we are called for this process,
577 * hack the memory image of WIN32S16 so that it doesn't try
578 * to access the GDT directly ...
579 *
Vincent Béron9a624912002-05-31 23:06:46 +0000580 * The first code segment of WIN32S16 (version 1.30) contains
Alexandre Julliard642d3131998-07-12 19:29:36 +0000581 * an unexported function somewhere between the exported functions
582 * SetFS and StackLinearToSegmented that tries to find a selector
583 * in the LDT that maps to the memory image of the LDT itself.
584 * If it succeeds, it stores this selector into a global variable
585 * which will be used to speed up execution by using this selector
586 * to modify the LDT directly instead of using the DPMI calls.
587 *
588 * To perform this search of the LDT, this function uses the
589 * sgdt and sldt instructions to find the linear address of
590 * the (GDT and then) LDT. While those instructions themselves
591 * execute without problem, the linear address that sgdt returns
592 * points (at least under Linux) to the kernel address space, so
593 * that any subsequent access leads to a segfault.
594 *
595 * Fortunately, WIN32S16 still contains as a fallback option the
596 * mechanism of using DPMI calls to modify LDT selectors instead
597 * of direct writes to the LDT. Thus we can circumvent the problem
598 * by simply replacing the first byte of the offending function
599 * with an 'retf' instruction. This means that the global variable
600 * supposed to contain the LDT alias selector will remain zero,
601 * and hence WIN32S16 will fall back to using DPMI calls.
602 *
603 * The heuristic we employ to _find_ that function is as follows:
604 * We search between the addresses of the exported symbols SetFS
605 * and StackLinearToSegmented for the byte sequence '0F 01 04'
606 * (this is the opcode of 'sgdt [si]'). We then search backwards
Andreas Mohr8bc7f162002-02-27 01:34:08 +0000607 * from this address for the last occurrence of 'CB' (retf) that marks
Alexandre Julliard642d3131998-07-12 19:29:36 +0000608 * the end of the preceeding function. The following byte (which
609 * should now be the first byte of the function we are looking for)
610 * will be replaced by 'CB' (retf).
611 *
612 * This heuristic works for the retail as well as the debug version
613 * of Win32s version 1.30. For versions earlier than that this
614 * hack should not be necessary at all, since the whole mechanism
615 * ('PERF130') was introduced only in 1.30 to improve the overall
616 * performance of Win32s.
617 */
618
Alexandre Julliardbecb9a32000-12-11 03:48:15 +0000619 if (!W32S_offset)
Alexandre Julliard642d3131998-07-12 19:29:36 +0000620 {
621 HMODULE16 hModule = GetModuleHandle16("win32s16");
Alexandre Julliard5ce902b2000-11-27 21:59:08 +0000622 SEGPTR func1 = (SEGPTR)GetProcAddress16(hModule, "SetFS");
623 SEGPTR func2 = (SEGPTR)GetProcAddress16(hModule, "StackLinearToSegmented");
Alexandre Julliard642d3131998-07-12 19:29:36 +0000624
Vincent Béron9a624912002-05-31 23:06:46 +0000625 if ( hModule && func1 && func2
Alexandre Julliard642d3131998-07-12 19:29:36 +0000626 && SELECTOROF(func1) == SELECTOROF(func2))
627 {
Alexandre Julliard982a2232000-12-13 20:20:09 +0000628 BYTE *start = MapSL(func1);
629 BYTE *end = MapSL(func2);
Alexandre Julliard642d3131998-07-12 19:29:36 +0000630 BYTE *p, *retv = NULL;
631 int found = 0;
632
633 for (p = start; p < end; p++)
634 if (*p == 0xCB) found = 0, retv = p;
635 else if (*p == 0x0F) found = 1;
636 else if (*p == 0x01 && found == 1) found = 2;
637 else if (*p == 0x04 && found == 2) { found = 3; break; }
638 else found = 0;
639
640 if (found == 3 && retv)
641 {
Alexandre Julliard61fece01999-06-26 19:09:08 +0000642 TRACE("PERF130 hack: "
Alexandre Julliard642d3131998-07-12 19:29:36 +0000643 "Replacing byte %02X at offset %04X:%04X\n",
Vincent Béron9a624912002-05-31 23:06:46 +0000644 *(retv+1), SELECTOROF(func1),
Alexandre Julliard642d3131998-07-12 19:29:36 +0000645 OFFSETOF(func1) + retv+1-start);
646
647 *(retv+1) = (BYTE)0xCB;
648 }
649 }
650 }
651
Vincent Béron9a624912002-05-31 23:06:46 +0000652 /*
Alexandre Julliard642d3131998-07-12 19:29:36 +0000653 * Mark process as Win32s, so that subsequent DPMI calls
Andreas Mohra00b49f1998-12-07 10:48:09 +0000654 * will perform the W32S_APP2WINE/W32S_WINE2APP address shift.
Alexandre Julliard642d3131998-07-12 19:29:36 +0000655 */
Alexandre Julliardbecb9a32000-12-11 03:48:15 +0000656 W32S_offset = 0x10000;
657 break;
Alexandre Julliard642d3131998-07-12 19:29:36 +0000658
659
660 case 0x0001: /* Install Exception Handling */
661 /*
662 * Input: EBX: Flat address of W32SKRNL Exception Data
663 *
664 * ECX: LoWord: Flat Code Selector
665 * HiWord: Flat Data Selector
666 *
Vincent Béron9a624912002-05-31 23:06:46 +0000667 * EDX: Flat address of W32SKRNL Exception Handler
Alexandre Julliard642d3131998-07-12 19:29:36 +0000668 * (this is equal to W32S_BackTo32 + 0x40)
669 *
670 * ESI: SEGPTR KERNEL.HASGPHANDLER
671 *
672 * EDI: SEGPTR phCurrentTask (KERNEL.THHOOK + 0x10)
673 *
674 * Output: EAX: 0 if OK
675 */
676
Vincent Béron9a624912002-05-31 23:06:46 +0000677 TRACE("[0001] EBX=%lx ECX=%lx EDX=%lx ESI=%lx EDI=%lx\n",
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +0000678 context->Ebx, context->Ecx, context->Edx,
679 context->Esi, context->Edi);
Alexandre Julliard642d3131998-07-12 19:29:36 +0000680
681 /* FIXME */
682
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +0000683 context->Eax = 0;
Alexandre Julliard642d3131998-07-12 19:29:36 +0000684 break;
685
686
687 case 0x0002: /* Set Page Access Flags */
688 /*
689 * Input: EBX: New access flags
690 * Bit 2: User Page if set, Supervisor Page if clear
691 * Bit 1: Read-Write if set, Read-Only if clear
692 *
693 * ECX: Size of memory area to change
694 *
695 * EDX: Flat start address of memory area
696 *
697 * Output: EAX: Size of area changed
698 */
699
Vincent Béron9a624912002-05-31 23:06:46 +0000700 TRACE("[0002] EBX=%lx ECX=%lx EDX=%lx\n",
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +0000701 context->Ebx, context->Ecx, context->Edx);
Alexandre Julliard642d3131998-07-12 19:29:36 +0000702
703 /* FIXME */
704
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +0000705 context->Eax = context->Ecx;
Alexandre Julliard642d3131998-07-12 19:29:36 +0000706 break;
707
708
709 case 0x0003: /* Get Page Access Flags */
710 /*
711 * Input: EDX: Flat address of page to query
712 *
713 * Output: EAX: Page access flags
714 * Bit 2: User Page if set, Supervisor Page if clear
715 * Bit 1: Read-Write if set, Read-Only if clear
716 */
717
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +0000718 TRACE("[0003] EDX=%lx\n", context->Edx);
Alexandre Julliard642d3131998-07-12 19:29:36 +0000719
720 /* FIXME */
721
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +0000722 context->Eax = 6;
Alexandre Julliard642d3131998-07-12 19:29:36 +0000723 break;
724
725
726 case 0x0004: /* Map Module */
727 /*
728 * Input: ECX: IMTE (offset in Module Table) of new module
729 *
730 * EDX: Flat address of Win32s Module Table
731 *
732 * Output: EAX: 0 if OK
733 */
734
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +0000735 if (!context->Edx || CX_reg(context) == 0xFFFF)
Alexandre Julliard642d3131998-07-12 19:29:36 +0000736 {
Alexandre Julliard61fece01999-06-26 19:09:08 +0000737 TRACE("MapModule: Initialization call\n");
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +0000738 context->Eax = 0;
Alexandre Julliard642d3131998-07-12 19:29:36 +0000739 }
740 else
741 {
742 /*
743 * Structure of a Win32s Module Table Entry:
744 */
745 struct Win32sModule
746 {
747 DWORD flags;
748 DWORD flatBaseAddr;
749 LPCSTR moduleName;
750 LPCSTR pathName;
751 LPCSTR unknown;
752 LPBYTE baseAddr;
753 DWORD hModule;
754 DWORD relocDelta;
755 };
756
Vincent Béron9a624912002-05-31 23:06:46 +0000757 /*
758 * Note: This function should set up a demand-paged memory image
Alexandre Julliard642d3131998-07-12 19:29:36 +0000759 * of the given module. Since mmap does not allow file offsets
760 * not aligned at 1024 bytes, we simply load the image fully
761 * into memory.
762 */
763
Vincent Béron9a624912002-05-31 23:06:46 +0000764 struct Win32sModule *moduleTable =
Alexandre Julliardbecb9a32000-12-11 03:48:15 +0000765 (struct Win32sModule *)W32S_APP2WINE(context->Edx);
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +0000766 struct Win32sModule *module = moduleTable + context->Ecx;
Alexandre Julliard642d3131998-07-12 19:29:36 +0000767
Alexandre Julliarda5dea212002-08-09 19:57:38 +0000768 IMAGE_NT_HEADERS *nt_header = RtlImageNtHeader( (HMODULE)module->baseAddr );
769 IMAGE_SECTION_HEADER *pe_seg = (IMAGE_SECTION_HEADER*)((char *)&nt_header->OptionalHeader +
770 nt_header->FileHeader.SizeOfOptionalHeader);
771
Alexandre Julliard642d3131998-07-12 19:29:36 +0000772
Alexandre Julliarda3960291999-02-26 11:11:13 +0000773 HFILE image = _lopen(module->pathName, OF_READ);
Alexandre Julliard908464d2000-11-01 03:11:12 +0000774 BOOL error = (image == HFILE_ERROR);
Alexandre Julliarda3960291999-02-26 11:11:13 +0000775 UINT i;
Alexandre Julliard642d3131998-07-12 19:29:36 +0000776
Alexandre Julliard61fece01999-06-26 19:09:08 +0000777 TRACE("MapModule: Loading %s\n", module->pathName);
Alexandre Julliard642d3131998-07-12 19:29:36 +0000778
Vincent Béron9a624912002-05-31 23:06:46 +0000779 for (i = 0;
780 !error && i < nt_header->FileHeader.NumberOfSections;
Alexandre Julliard642d3131998-07-12 19:29:36 +0000781 i++, pe_seg++)
782 if(!(pe_seg->Characteristics & IMAGE_SCN_CNT_UNINITIALIZED_DATA))
783 {
784 DWORD off = pe_seg->PointerToRawData;
785 DWORD len = pe_seg->SizeOfRawData;
786 LPBYTE addr = module->baseAddr + pe_seg->VirtualAddress;
787
Alexandre Julliard61fece01999-06-26 19:09:08 +0000788 TRACE("MapModule: "
Vincent Béron9a624912002-05-31 23:06:46 +0000789 "Section %d at %08lx from %08lx len %08lx\n",
Alexandre Julliard642d3131998-07-12 19:29:36 +0000790 i, (DWORD)addr, off, len);
791
Alexandre Julliarda3960291999-02-26 11:11:13 +0000792 if ( _llseek(image, off, SEEK_SET) != off
793 || _lread(image, addr, len) != len)
Alexandre Julliard642d3131998-07-12 19:29:36 +0000794 error = TRUE;
795 }
Vincent Béron9a624912002-05-31 23:06:46 +0000796
Alexandre Julliarda3960291999-02-26 11:11:13 +0000797 _lclose(image);
Alexandre Julliard642d3131998-07-12 19:29:36 +0000798
799 if (error)
Alexandre Julliard61fece01999-06-26 19:09:08 +0000800 ERR("MapModule: Unable to load %s\n", module->pathName);
Alexandre Julliard642d3131998-07-12 19:29:36 +0000801
802 else if (module->relocDelta != 0)
803 {
804 IMAGE_DATA_DIRECTORY *dir = nt_header->OptionalHeader.DataDirectory
805 + IMAGE_DIRECTORY_ENTRY_BASERELOC;
806 IMAGE_BASE_RELOCATION *r = (IMAGE_BASE_RELOCATION *)
807 (dir->Size? module->baseAddr + dir->VirtualAddress : 0);
808
Alexandre Julliard61fece01999-06-26 19:09:08 +0000809 TRACE("MapModule: Reloc delta %08lx\n", module->relocDelta);
Alexandre Julliard642d3131998-07-12 19:29:36 +0000810
811 while (r && r->VirtualAddress)
812 {
813 LPBYTE page = module->baseAddr + r->VirtualAddress;
Dmitry Timoshkov6b6596a2001-11-23 18:44:43 +0000814 WORD *TypeOffset = (WORD *)(r + 1);
815 int count = (r->SizeOfBlock - sizeof(*r)) / sizeof(*TypeOffset);
Alexandre Julliard642d3131998-07-12 19:29:36 +0000816
Vincent Béron9a624912002-05-31 23:06:46 +0000817 TRACE("MapModule: %d relocations for page %08lx\n",
Alexandre Julliard642d3131998-07-12 19:29:36 +0000818 count, (DWORD)page);
819
820 for(i = 0; i < count; i++)
821 {
Dmitry Timoshkov6b6596a2001-11-23 18:44:43 +0000822 int offset = TypeOffset[i] & 0xFFF;
823 int type = TypeOffset[i] >> 12;
Alexandre Julliard642d3131998-07-12 19:29:36 +0000824 switch(type)
825 {
Vincent Béron9a624912002-05-31 23:06:46 +0000826 case IMAGE_REL_BASED_ABSOLUTE:
Alexandre Julliard642d3131998-07-12 19:29:36 +0000827 break;
828 case IMAGE_REL_BASED_HIGH:
829 *(WORD *)(page+offset) += HIWORD(module->relocDelta);
830 break;
831 case IMAGE_REL_BASED_LOW:
832 *(WORD *)(page+offset) += LOWORD(module->relocDelta);
833 break;
834 case IMAGE_REL_BASED_HIGHLOW:
835 *(DWORD*)(page+offset) += module->relocDelta;
836 break;
837 default:
Alexandre Julliard61fece01999-06-26 19:09:08 +0000838 WARN("MapModule: Unsupported fixup type\n");
Alexandre Julliard642d3131998-07-12 19:29:36 +0000839 break;
840 }
841 }
842
843 r = (IMAGE_BASE_RELOCATION *)((LPBYTE)r + r->SizeOfBlock);
844 }
845 }
846
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +0000847 context->Eax = 0;
Alexandre Julliard642d3131998-07-12 19:29:36 +0000848 RESET_CFLAG(context);
849 }
850 break;
851
852
853 case 0x0005: /* UnMap Module */
854 /*
Vincent Béron9a624912002-05-31 23:06:46 +0000855 * Input: EDX: Flat address of module image
Alexandre Julliard642d3131998-07-12 19:29:36 +0000856 *
857 * Output: EAX: 1 if OK
858 */
Vincent Béron9a624912002-05-31 23:06:46 +0000859
Alexandre Julliardbecb9a32000-12-11 03:48:15 +0000860 TRACE("UnMapModule: %lx\n", (DWORD)W32S_APP2WINE(context->Edx));
Alexandre Julliard642d3131998-07-12 19:29:36 +0000861
862 /* As we didn't map anything, there's nothing to unmap ... */
863
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +0000864 context->Eax = 1;
Alexandre Julliard642d3131998-07-12 19:29:36 +0000865 break;
866
867
868 case 0x0006: /* VirtualAlloc */
Vincent Béron9a624912002-05-31 23:06:46 +0000869 /*
Alexandre Julliard642d3131998-07-12 19:29:36 +0000870 * Input: ECX: Current Process
871 *
872 * EDX: Flat address of arguments on stack
Vincent Béron9a624912002-05-31 23:06:46 +0000873 *
Alexandre Julliard642d3131998-07-12 19:29:36 +0000874 * DWORD *retv [out] Flat base address of allocated region
875 * LPVOID base [in] Flat address of region to reserve/commit
876 * DWORD size [in] Size of region
877 * DWORD type [in] Type of allocation
878 * DWORD prot [in] Type of access protection
879 *
880 * Output: EAX: NtStatus
881 */
882 {
Alexandre Julliardbecb9a32000-12-11 03:48:15 +0000883 DWORD *stack = (DWORD *)W32S_APP2WINE(context->Edx);
884 DWORD *retv = (DWORD *)W32S_APP2WINE(stack[0]);
885 LPVOID base = (LPVOID) W32S_APP2WINE(stack[1]);
Alexandre Julliard642d3131998-07-12 19:29:36 +0000886 DWORD size = stack[2];
887 DWORD type = stack[3];
888 DWORD prot = stack[4];
889 DWORD result;
890
Vincent Béron9a624912002-05-31 23:06:46 +0000891 TRACE("VirtualAlloc(%lx, %lx, %lx, %lx, %lx)\n",
Alexandre Julliard642d3131998-07-12 19:29:36 +0000892 (DWORD)retv, (DWORD)base, size, type, prot);
893
894 if (type & 0x80000000)
895 {
Alexandre Julliard61fece01999-06-26 19:09:08 +0000896 WARN("VirtualAlloc: strange type %lx\n", type);
Alexandre Julliard642d3131998-07-12 19:29:36 +0000897 type &= 0x7fffffff;
898 }
899
900 if (!base && (type & MEM_COMMIT) && prot == PAGE_READONLY)
901 {
Alexandre Julliard61fece01999-06-26 19:09:08 +0000902 WARN("VirtualAlloc: NLS hack, allowing write access!\n");
Alexandre Julliard642d3131998-07-12 19:29:36 +0000903 prot = PAGE_READWRITE;
904 }
905
906 result = (DWORD)VirtualAlloc(base, size, type, prot);
907
Alexandre Julliardbecb9a32000-12-11 03:48:15 +0000908 if (W32S_WINE2APP(result))
909 *retv = W32S_WINE2APP(result),
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +0000910 context->Eax = STATUS_SUCCESS;
Alexandre Julliard642d3131998-07-12 19:29:36 +0000911 else
912 *retv = 0,
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +0000913 context->Eax = STATUS_NO_MEMORY; /* FIXME */
Alexandre Julliard642d3131998-07-12 19:29:36 +0000914 }
915 break;
916
917
918 case 0x0007: /* VirtualFree */
Vincent Béron9a624912002-05-31 23:06:46 +0000919 /*
Alexandre Julliard642d3131998-07-12 19:29:36 +0000920 * Input: ECX: Current Process
921 *
922 * EDX: Flat address of arguments on stack
Vincent Béron9a624912002-05-31 23:06:46 +0000923 *
Alexandre Julliard642d3131998-07-12 19:29:36 +0000924 * DWORD *retv [out] TRUE if success, FALSE if failure
925 * LPVOID base [in] Flat address of region
926 * DWORD size [in] Size of region
927 * DWORD type [in] Type of operation
928 *
929 * Output: EAX: NtStatus
930 */
931 {
Alexandre Julliardbecb9a32000-12-11 03:48:15 +0000932 DWORD *stack = (DWORD *)W32S_APP2WINE(context->Edx);
933 DWORD *retv = (DWORD *)W32S_APP2WINE(stack[0]);
934 LPVOID base = (LPVOID) W32S_APP2WINE(stack[1]);
Alexandre Julliard642d3131998-07-12 19:29:36 +0000935 DWORD size = stack[2];
936 DWORD type = stack[3];
937 DWORD result;
938
Vincent Béron9a624912002-05-31 23:06:46 +0000939 TRACE("VirtualFree(%lx, %lx, %lx, %lx)\n",
Alexandre Julliard642d3131998-07-12 19:29:36 +0000940 (DWORD)retv, (DWORD)base, size, type);
941
942 result = VirtualFree(base, size, type);
943
944 if (result)
945 *retv = TRUE,
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +0000946 context->Eax = STATUS_SUCCESS;
Alexandre Julliard642d3131998-07-12 19:29:36 +0000947 else
948 *retv = FALSE,
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +0000949 context->Eax = STATUS_NO_MEMORY; /* FIXME */
Alexandre Julliard642d3131998-07-12 19:29:36 +0000950 }
951 break;
952
953
954 case 0x0008: /* VirtualProtect */
Vincent Béron9a624912002-05-31 23:06:46 +0000955 /*
Alexandre Julliard642d3131998-07-12 19:29:36 +0000956 * Input: ECX: Current Process
957 *
958 * EDX: Flat address of arguments on stack
Vincent Béron9a624912002-05-31 23:06:46 +0000959 *
Alexandre Julliard642d3131998-07-12 19:29:36 +0000960 * DWORD *retv [out] TRUE if success, FALSE if failure
961 * LPVOID base [in] Flat address of region
962 * DWORD size [in] Size of region
963 * DWORD new_prot [in] Desired access protection
964 * DWORD *old_prot [out] Previous access protection
965 *
966 * Output: EAX: NtStatus
967 */
968 {
Alexandre Julliardbecb9a32000-12-11 03:48:15 +0000969 DWORD *stack = (DWORD *)W32S_APP2WINE(context->Edx);
970 DWORD *retv = (DWORD *)W32S_APP2WINE(stack[0]);
971 LPVOID base = (LPVOID) W32S_APP2WINE(stack[1]);
Alexandre Julliard642d3131998-07-12 19:29:36 +0000972 DWORD size = stack[2];
973 DWORD new_prot = stack[3];
Alexandre Julliardbecb9a32000-12-11 03:48:15 +0000974 DWORD *old_prot = (DWORD *)W32S_APP2WINE(stack[4]);
Alexandre Julliard642d3131998-07-12 19:29:36 +0000975 DWORD result;
976
Vincent Béron9a624912002-05-31 23:06:46 +0000977 TRACE("VirtualProtect(%lx, %lx, %lx, %lx, %lx)\n",
Alexandre Julliard642d3131998-07-12 19:29:36 +0000978 (DWORD)retv, (DWORD)base, size, new_prot, (DWORD)old_prot);
979
980 result = VirtualProtect(base, size, new_prot, old_prot);
981
982 if (result)
983 *retv = TRUE,
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +0000984 context->Eax = STATUS_SUCCESS;
Alexandre Julliard642d3131998-07-12 19:29:36 +0000985 else
986 *retv = FALSE,
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +0000987 context->Eax = STATUS_NO_MEMORY; /* FIXME */
Alexandre Julliard642d3131998-07-12 19:29:36 +0000988 }
989 break;
990
991
992 case 0x0009: /* VirtualQuery */
Vincent Béron9a624912002-05-31 23:06:46 +0000993 /*
Alexandre Julliard642d3131998-07-12 19:29:36 +0000994 * Input: ECX: Current Process
995 *
996 * EDX: Flat address of arguments on stack
Vincent Béron9a624912002-05-31 23:06:46 +0000997 *
Alexandre Julliard642d3131998-07-12 19:29:36 +0000998 * DWORD *retv [out] Nr. bytes returned
999 * LPVOID base [in] Flat address of region
1000 * LPMEMORY_BASIC_INFORMATION info [out] Info buffer
1001 * DWORD len [in] Size of buffer
1002 *
1003 * Output: EAX: NtStatus
1004 */
1005 {
Alexandre Julliardbecb9a32000-12-11 03:48:15 +00001006 DWORD *stack = (DWORD *)W32S_APP2WINE(context->Edx);
1007 DWORD *retv = (DWORD *)W32S_APP2WINE(stack[0]);
1008 LPVOID base = (LPVOID) W32S_APP2WINE(stack[1]);
Patrik Stridvallba9dc782002-11-04 22:43:24 +00001009 PMEMORY_BASIC_INFORMATION info =
1010 (PMEMORY_BASIC_INFORMATION)W32S_APP2WINE(stack[2]);
Alexandre Julliard642d3131998-07-12 19:29:36 +00001011 DWORD len = stack[3];
1012 DWORD result;
1013
Vincent Béron9a624912002-05-31 23:06:46 +00001014 TRACE("VirtualQuery(%lx, %lx, %lx, %lx)\n",
Alexandre Julliard642d3131998-07-12 19:29:36 +00001015 (DWORD)retv, (DWORD)base, (DWORD)info, len);
1016
1017 result = VirtualQuery(base, info, len);
1018
1019 *retv = result;
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +00001020 context->Eax = STATUS_SUCCESS;
Alexandre Julliard642d3131998-07-12 19:29:36 +00001021 }
1022 break;
1023
1024
1025 case 0x000A: /* SetVirtMemProcess */
1026 /*
1027 * Input: ECX: Process Handle
1028 *
1029 * EDX: Flat address of region
1030 *
1031 * Output: EAX: NtStatus
1032 */
1033
Alexandre Julliard61fece01999-06-26 19:09:08 +00001034 TRACE("[000a] ECX=%lx EDX=%lx\n",
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +00001035 context->Ecx, context->Edx);
Alexandre Julliard642d3131998-07-12 19:29:36 +00001036
1037 /* FIXME */
1038
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +00001039 context->Eax = STATUS_SUCCESS;
Alexandre Julliard642d3131998-07-12 19:29:36 +00001040 break;
1041
1042
1043 case 0x000B: /* ??? some kind of cleanup */
1044 /*
1045 * Input: ECX: Process Handle
1046 *
1047 * Output: EAX: NtStatus
1048 */
1049
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +00001050 TRACE("[000b] ECX=%lx\n", context->Ecx);
Alexandre Julliard642d3131998-07-12 19:29:36 +00001051
1052 /* FIXME */
1053
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +00001054 context->Eax = STATUS_SUCCESS;
Alexandre Julliard642d3131998-07-12 19:29:36 +00001055 break;
1056
1057
1058 case 0x000C: /* Set Debug Flags */
1059 /*
1060 * Input: EDX: Debug Flags
1061 *
1062 * Output: EDX: Previous Debug Flags
1063 */
1064
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +00001065 FIXME("[000c] EDX=%lx\n", context->Edx);
Alexandre Julliard642d3131998-07-12 19:29:36 +00001066
1067 /* FIXME */
1068
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +00001069 context->Edx = 0;
Alexandre Julliard642d3131998-07-12 19:29:36 +00001070 break;
1071
1072
1073 case 0x000D: /* NtCreateSection */
Vincent Béron9a624912002-05-31 23:06:46 +00001074 /*
Alexandre Julliard642d3131998-07-12 19:29:36 +00001075 * Input: EDX: Flat address of arguments on stack
Vincent Béron9a624912002-05-31 23:06:46 +00001076 *
Alexandre Julliard642d3131998-07-12 19:29:36 +00001077 * HANDLE32 *retv [out] Handle of Section created
1078 * DWORD flags1 [in] (?? unknown ??)
1079 * DWORD atom [in] Name of Section to create
1080 * LARGE_INTEGER *size [in] Size of Section
1081 * DWORD protect [in] Access protection
1082 * DWORD flags2 [in] (?? unknown ??)
1083 * HFILE32 hFile [in] Handle of file to map
1084 * DWORD psp [in] (Win32s: PSP that hFile belongs to)
1085 *
1086 * Output: EAX: NtStatus
1087 */
1088 {
Alexandre Julliardbecb9a32000-12-11 03:48:15 +00001089 DWORD *stack = (DWORD *) W32S_APP2WINE(context->Edx);
1090 HANDLE *retv = (HANDLE *)W32S_APP2WINE(stack[0]);
Alexandre Julliard642d3131998-07-12 19:29:36 +00001091 DWORD flags1 = stack[1];
1092 DWORD atom = stack[2];
Alexandre Julliardbecb9a32000-12-11 03:48:15 +00001093 LARGE_INTEGER *size = (LARGE_INTEGER *)W32S_APP2WINE(stack[3]);
Alexandre Julliard642d3131998-07-12 19:29:36 +00001094 DWORD protect = stack[4];
1095 DWORD flags2 = stack[5];
Alexandre Julliard5ce902b2000-11-27 21:59:08 +00001096 HANDLE hFile = DosFileHandleToWin32Handle(stack[6]);
Alexandre Julliard642d3131998-07-12 19:29:36 +00001097 DWORD psp = stack[7];
1098
Alexandre Julliarda3960291999-02-26 11:11:13 +00001099 HANDLE result = INVALID_HANDLE_VALUE;
Alexandre Julliard642d3131998-07-12 19:29:36 +00001100 char name[128];
1101
Alexandre Julliard61fece01999-06-26 19:09:08 +00001102 TRACE("NtCreateSection(%lx, %lx, %lx, %lx, %lx, %lx, %lx, %lx)\n",
Alexandre Julliard642d3131998-07-12 19:29:36 +00001103 (DWORD)retv, flags1, atom, (DWORD)size, protect, flags2,
1104 (DWORD)hFile, psp);
1105
Alexandre Julliarda3960291999-02-26 11:11:13 +00001106 if (!atom || GlobalGetAtomNameA(atom, name, sizeof(name)))
Alexandre Julliard642d3131998-07-12 19:29:36 +00001107 {
Alexandre Julliard61fece01999-06-26 19:09:08 +00001108 TRACE("NtCreateSection: name=%s\n", atom? name : NULL);
Alexandre Julliard642d3131998-07-12 19:29:36 +00001109
Vincent Béron9a624912002-05-31 23:06:46 +00001110 result = CreateFileMappingA(hFile, NULL, protect,
1111 size? size->s.HighPart : 0,
1112 size? size->s.LowPart : 0,
Alexandre Julliard642d3131998-07-12 19:29:36 +00001113 atom? name : NULL);
1114 }
1115
Alexandre Julliarda3960291999-02-26 11:11:13 +00001116 if (result == INVALID_HANDLE_VALUE)
Alexandre Julliard61fece01999-06-26 19:09:08 +00001117 WARN("NtCreateSection: failed!\n");
Alexandre Julliard642d3131998-07-12 19:29:36 +00001118 else
Alexandre Julliard61fece01999-06-26 19:09:08 +00001119 TRACE("NtCreateSection: returned %lx\n", (DWORD)result);
Alexandre Julliard642d3131998-07-12 19:29:36 +00001120
Alexandre Julliarda3960291999-02-26 11:11:13 +00001121 if (result != INVALID_HANDLE_VALUE)
Alexandre Julliard642d3131998-07-12 19:29:36 +00001122 *retv = result,
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +00001123 context->Eax = STATUS_SUCCESS;
Alexandre Julliard642d3131998-07-12 19:29:36 +00001124 else
1125 *retv = result,
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +00001126 context->Eax = STATUS_NO_MEMORY; /* FIXME */
Alexandre Julliard642d3131998-07-12 19:29:36 +00001127 }
1128 break;
1129
1130
1131 case 0x000E: /* NtOpenSection */
Vincent Béron9a624912002-05-31 23:06:46 +00001132 /*
Alexandre Julliard642d3131998-07-12 19:29:36 +00001133 * Input: EDX: Flat address of arguments on stack
Vincent Béron9a624912002-05-31 23:06:46 +00001134 *
Alexandre Julliard642d3131998-07-12 19:29:36 +00001135 * HANDLE32 *retv [out] Handle of Section opened
1136 * DWORD protect [in] Access protection
1137 * DWORD atom [in] Name of Section to create
1138 *
1139 * Output: EAX: NtStatus
1140 */
1141 {
Alexandre Julliardbecb9a32000-12-11 03:48:15 +00001142 DWORD *stack = (DWORD *)W32S_APP2WINE(context->Edx);
1143 HANDLE *retv = (HANDLE *)W32S_APP2WINE(stack[0]);
Alexandre Julliard642d3131998-07-12 19:29:36 +00001144 DWORD protect = stack[1];
1145 DWORD atom = stack[2];
1146
Alexandre Julliarda3960291999-02-26 11:11:13 +00001147 HANDLE result = INVALID_HANDLE_VALUE;
Alexandre Julliard642d3131998-07-12 19:29:36 +00001148 char name[128];
1149
Vincent Béron9a624912002-05-31 23:06:46 +00001150 TRACE("NtOpenSection(%lx, %lx, %lx)\n",
Alexandre Julliard642d3131998-07-12 19:29:36 +00001151 (DWORD)retv, protect, atom);
1152
Alexandre Julliarda3960291999-02-26 11:11:13 +00001153 if (atom && GlobalGetAtomNameA(atom, name, sizeof(name)))
Alexandre Julliard642d3131998-07-12 19:29:36 +00001154 {
Alexandre Julliard61fece01999-06-26 19:09:08 +00001155 TRACE("NtOpenSection: name=%s\n", name);
Alexandre Julliard642d3131998-07-12 19:29:36 +00001156
Alexandre Julliarda3960291999-02-26 11:11:13 +00001157 result = OpenFileMappingA(protect, FALSE, name);
Alexandre Julliard642d3131998-07-12 19:29:36 +00001158 }
1159
Alexandre Julliarda3960291999-02-26 11:11:13 +00001160 if (result == INVALID_HANDLE_VALUE)
Alexandre Julliard61fece01999-06-26 19:09:08 +00001161 WARN("NtOpenSection: failed!\n");
Alexandre Julliard642d3131998-07-12 19:29:36 +00001162 else
Alexandre Julliard61fece01999-06-26 19:09:08 +00001163 TRACE("NtOpenSection: returned %lx\n", (DWORD)result);
Alexandre Julliard642d3131998-07-12 19:29:36 +00001164
Alexandre Julliarda3960291999-02-26 11:11:13 +00001165 if (result != INVALID_HANDLE_VALUE)
Alexandre Julliard642d3131998-07-12 19:29:36 +00001166 *retv = result,
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +00001167 context->Eax = STATUS_SUCCESS;
Alexandre Julliard642d3131998-07-12 19:29:36 +00001168 else
1169 *retv = result,
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +00001170 context->Eax = STATUS_NO_MEMORY; /* FIXME */
Alexandre Julliard642d3131998-07-12 19:29:36 +00001171 }
1172 break;
1173
1174
1175 case 0x000F: /* NtCloseSection */
Vincent Béron9a624912002-05-31 23:06:46 +00001176 /*
Alexandre Julliard642d3131998-07-12 19:29:36 +00001177 * Input: EDX: Flat address of arguments on stack
Vincent Béron9a624912002-05-31 23:06:46 +00001178 *
Alexandre Julliard642d3131998-07-12 19:29:36 +00001179 * HANDLE32 handle [in] Handle of Section to close
1180 * DWORD *id [out] Unique ID (?? unclear ??)
1181 *
1182 * Output: EAX: NtStatus
1183 */
1184 {
Alexandre Julliardbecb9a32000-12-11 03:48:15 +00001185 DWORD *stack = (DWORD *)W32S_APP2WINE(context->Edx);
Alexandre Julliard73755972002-07-31 19:26:03 +00001186 HANDLE handle = (HANDLE)stack[0];
Alexandre Julliardbecb9a32000-12-11 03:48:15 +00001187 DWORD *id = (DWORD *)W32S_APP2WINE(stack[1]);
Alexandre Julliard642d3131998-07-12 19:29:36 +00001188
Alexandre Julliard61fece01999-06-26 19:09:08 +00001189 TRACE("NtCloseSection(%lx, %lx)\n", (DWORD)handle, (DWORD)id);
Alexandre Julliard642d3131998-07-12 19:29:36 +00001190
1191 CloseHandle(handle);
1192 if (id) *id = 0; /* FIXME */
1193
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +00001194 context->Eax = STATUS_SUCCESS;
Alexandre Julliard642d3131998-07-12 19:29:36 +00001195 }
1196 break;
1197
1198
1199 case 0x0010: /* NtDupSection */
Vincent Béron9a624912002-05-31 23:06:46 +00001200 /*
Alexandre Julliard642d3131998-07-12 19:29:36 +00001201 * Input: EDX: Flat address of arguments on stack
Vincent Béron9a624912002-05-31 23:06:46 +00001202 *
Alexandre Julliard642d3131998-07-12 19:29:36 +00001203 * HANDLE32 handle [in] Handle of Section to duplicate
1204 *
1205 * Output: EAX: NtStatus
1206 */
1207 {
Alexandre Julliardbecb9a32000-12-11 03:48:15 +00001208 DWORD *stack = (DWORD *)W32S_APP2WINE(context->Edx);
Alexandre Julliard73755972002-07-31 19:26:03 +00001209 HANDLE handle = (HANDLE)stack[0];
Alexandre Julliarda3960291999-02-26 11:11:13 +00001210 HANDLE new_handle;
Alexandre Julliard642d3131998-07-12 19:29:36 +00001211
Alexandre Julliard61fece01999-06-26 19:09:08 +00001212 TRACE("NtDupSection(%lx)\n", (DWORD)handle);
Vincent Béron9a624912002-05-31 23:06:46 +00001213
Alexandre Julliard62a8b431999-01-19 17:48:23 +00001214 DuplicateHandle( GetCurrentProcess(), handle,
1215 GetCurrentProcess(), &new_handle,
1216 0, FALSE, DUPLICATE_SAME_ACCESS );
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +00001217 context->Eax = STATUS_SUCCESS;
Alexandre Julliard642d3131998-07-12 19:29:36 +00001218 }
1219 break;
1220
1221
1222 case 0x0011: /* NtMapViewOfSection */
Vincent Béron9a624912002-05-31 23:06:46 +00001223 /*
Alexandre Julliard642d3131998-07-12 19:29:36 +00001224 * Input: EDX: Flat address of arguments on stack
Vincent Béron9a624912002-05-31 23:06:46 +00001225 *
Alexandre Julliard642d3131998-07-12 19:29:36 +00001226 * HANDLE32 SectionHandle [in] Section to be mapped
1227 * DWORD ProcessHandle [in] Process to be mapped into
1228 * DWORD * BaseAddress [in/out] Address to be mapped at
1229 * DWORD ZeroBits [in] (?? unclear ??)
1230 * DWORD CommitSize [in] (?? unclear ??)
1231 * LARGE_INTEGER *SectionOffset [in] Offset within section
1232 * DWORD * ViewSize [in] Size of view
1233 * DWORD InheritDisposition [in] (?? unclear ??)
1234 * DWORD AllocationType [in] (?? unclear ??)
1235 * DWORD Protect [in] Access protection
1236 *
1237 * Output: EAX: NtStatus
1238 */
1239 {
Alexandre Julliardbecb9a32000-12-11 03:48:15 +00001240 DWORD * stack = (DWORD *)W32S_APP2WINE(context->Edx);
Alexandre Julliard73755972002-07-31 19:26:03 +00001241 HANDLE SectionHandle = (HANDLE)stack[0];
Alexandre Julliard642d3131998-07-12 19:29:36 +00001242 DWORD ProcessHandle = stack[1]; /* ignored */
Alexandre Julliardbecb9a32000-12-11 03:48:15 +00001243 DWORD * BaseAddress = (DWORD *)W32S_APP2WINE(stack[2]);
Alexandre Julliard642d3131998-07-12 19:29:36 +00001244 DWORD ZeroBits = stack[3];
1245 DWORD CommitSize = stack[4];
Alexandre Julliardbecb9a32000-12-11 03:48:15 +00001246 LARGE_INTEGER *SectionOffset = (LARGE_INTEGER *)W32S_APP2WINE(stack[5]);
1247 DWORD * ViewSize = (DWORD *)W32S_APP2WINE(stack[6]);
Alexandre Julliard642d3131998-07-12 19:29:36 +00001248 DWORD InheritDisposition = stack[7];
1249 DWORD AllocationType = stack[8];
1250 DWORD Protect = stack[9];
1251
Andreas Mohra00b49f1998-12-07 10:48:09 +00001252 LPBYTE address = (LPBYTE)(BaseAddress?
Alexandre Julliardbecb9a32000-12-11 03:48:15 +00001253 W32S_APP2WINE(*BaseAddress) : 0);
Alexandre Julliard642d3131998-07-12 19:29:36 +00001254 DWORD access = 0, result;
1255
1256 switch (Protect & ~(PAGE_GUARD|PAGE_NOCACHE))
1257 {
1258 case PAGE_READONLY: access = FILE_MAP_READ; break;
1259 case PAGE_READWRITE: access = FILE_MAP_WRITE; break;
1260 case PAGE_WRITECOPY: access = FILE_MAP_COPY; break;
1261
1262 case PAGE_EXECUTE_READ: access = FILE_MAP_READ; break;
1263 case PAGE_EXECUTE_READWRITE: access = FILE_MAP_WRITE; break;
1264 case PAGE_EXECUTE_WRITECOPY: access = FILE_MAP_COPY; break;
1265 }
1266
Alexandre Julliard61fece01999-06-26 19:09:08 +00001267 TRACE("NtMapViewOfSection"
Alexandre Julliard642d3131998-07-12 19:29:36 +00001268 "(%lx, %lx, %lx, %lx, %lx, %lx, %lx, %lx, %lx, %lx)\n",
Vincent Béron9a624912002-05-31 23:06:46 +00001269 (DWORD)SectionHandle, ProcessHandle, (DWORD)BaseAddress,
Alexandre Julliard642d3131998-07-12 19:29:36 +00001270 ZeroBits, CommitSize, (DWORD)SectionOffset, (DWORD)ViewSize,
1271 InheritDisposition, AllocationType, Protect);
Alexandre Julliard61fece01999-06-26 19:09:08 +00001272 TRACE("NtMapViewOfSection: "
Vincent Béron9a624912002-05-31 23:06:46 +00001273 "base=%lx, offset=%lx, size=%lx, access=%lx\n",
1274 (DWORD)address, SectionOffset? SectionOffset->s.LowPart : 0,
Alexandre Julliard642d3131998-07-12 19:29:36 +00001275 ViewSize? *ViewSize : 0, access);
1276
Vincent Béron9a624912002-05-31 23:06:46 +00001277 result = (DWORD)MapViewOfFileEx(SectionHandle, access,
1278 SectionOffset? SectionOffset->s.HighPart : 0,
Patrik Stridvall311e4561999-09-19 14:20:33 +00001279 SectionOffset? SectionOffset->s.LowPart : 0,
Alexandre Julliard642d3131998-07-12 19:29:36 +00001280 ViewSize? *ViewSize : 0, address);
1281
Alexandre Julliard61fece01999-06-26 19:09:08 +00001282 TRACE("NtMapViewOfSection: result=%lx\n", result);
Alexandre Julliard642d3131998-07-12 19:29:36 +00001283
Alexandre Julliardbecb9a32000-12-11 03:48:15 +00001284 if (W32S_WINE2APP(result))
Alexandre Julliard642d3131998-07-12 19:29:36 +00001285 {
Alexandre Julliardbecb9a32000-12-11 03:48:15 +00001286 if (BaseAddress) *BaseAddress = W32S_WINE2APP(result);
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +00001287 context->Eax = STATUS_SUCCESS;
Alexandre Julliard642d3131998-07-12 19:29:36 +00001288 }
1289 else
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +00001290 context->Eax = STATUS_NO_MEMORY; /* FIXME */
Alexandre Julliard642d3131998-07-12 19:29:36 +00001291 }
1292 break;
1293
1294
1295 case 0x0012: /* NtUnmapViewOfSection */
Vincent Béron9a624912002-05-31 23:06:46 +00001296 /*
Alexandre Julliard642d3131998-07-12 19:29:36 +00001297 * Input: EDX: Flat address of arguments on stack
Vincent Béron9a624912002-05-31 23:06:46 +00001298 *
Alexandre Julliard642d3131998-07-12 19:29:36 +00001299 * DWORD ProcessHandle [in] Process (defining address space)
1300 * LPBYTE BaseAddress [in] Base address of view to be unmapped
1301 *
1302 * Output: EAX: NtStatus
1303 */
1304 {
Alexandre Julliardbecb9a32000-12-11 03:48:15 +00001305 DWORD *stack = (DWORD *)W32S_APP2WINE(context->Edx);
Alexandre Julliard642d3131998-07-12 19:29:36 +00001306 DWORD ProcessHandle = stack[0]; /* ignored */
Alexandre Julliardbecb9a32000-12-11 03:48:15 +00001307 LPBYTE BaseAddress = (LPBYTE)W32S_APP2WINE(stack[1]);
Alexandre Julliard642d3131998-07-12 19:29:36 +00001308
Vincent Béron9a624912002-05-31 23:06:46 +00001309 TRACE("NtUnmapViewOfSection(%lx, %lx)\n",
Alexandre Julliard642d3131998-07-12 19:29:36 +00001310 ProcessHandle, (DWORD)BaseAddress);
1311
1312 UnmapViewOfFile(BaseAddress);
1313
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +00001314 context->Eax = STATUS_SUCCESS;
Alexandre Julliard642d3131998-07-12 19:29:36 +00001315 }
1316 break;
1317
1318
1319 case 0x0013: /* NtFlushVirtualMemory */
Vincent Béron9a624912002-05-31 23:06:46 +00001320 /*
Alexandre Julliard642d3131998-07-12 19:29:36 +00001321 * Input: EDX: Flat address of arguments on stack
Vincent Béron9a624912002-05-31 23:06:46 +00001322 *
Alexandre Julliard642d3131998-07-12 19:29:36 +00001323 * DWORD ProcessHandle [in] Process (defining address space)
1324 * LPBYTE *BaseAddress [in?] Base address of range to be flushed
1325 * DWORD *ViewSize [in?] Number of bytes to be flushed
1326 * DWORD *unknown [???] (?? unknown ??)
1327 *
1328 * Output: EAX: NtStatus
1329 */
1330 {
Alexandre Julliardbecb9a32000-12-11 03:48:15 +00001331 DWORD *stack = (DWORD *)W32S_APP2WINE(context->Edx);
Alexandre Julliard642d3131998-07-12 19:29:36 +00001332 DWORD ProcessHandle = stack[0]; /* ignored */
Alexandre Julliardbecb9a32000-12-11 03:48:15 +00001333 DWORD *BaseAddress = (DWORD *)W32S_APP2WINE(stack[1]);
1334 DWORD *ViewSize = (DWORD *)W32S_APP2WINE(stack[2]);
1335 DWORD *unknown = (DWORD *)W32S_APP2WINE(stack[3]);
Vincent Béron9a624912002-05-31 23:06:46 +00001336
Alexandre Julliardbecb9a32000-12-11 03:48:15 +00001337 LPBYTE address = (LPBYTE)(BaseAddress? W32S_APP2WINE(*BaseAddress) : 0);
Alexandre Julliard642d3131998-07-12 19:29:36 +00001338 DWORD size = ViewSize? *ViewSize : 0;
1339
Vincent Béron9a624912002-05-31 23:06:46 +00001340 TRACE("NtFlushVirtualMemory(%lx, %lx, %lx, %lx)\n",
1341 ProcessHandle, (DWORD)BaseAddress, (DWORD)ViewSize,
Alexandre Julliard642d3131998-07-12 19:29:36 +00001342 (DWORD)unknown);
Vincent Béron9a624912002-05-31 23:06:46 +00001343 TRACE("NtFlushVirtualMemory: base=%lx, size=%lx\n",
Alexandre Julliard642d3131998-07-12 19:29:36 +00001344 (DWORD)address, size);
1345
1346 FlushViewOfFile(address, size);
1347
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +00001348 context->Eax = STATUS_SUCCESS;
Alexandre Julliard642d3131998-07-12 19:29:36 +00001349 }
1350 break;
1351
1352
1353 case 0x0014: /* Get/Set Debug Registers */
1354 /*
1355 * Input: ECX: 0 if Get, 1 if Set
1356 *
1357 * EDX: Get: Flat address of buffer to receive values of
1358 * debug registers DR0 .. DR7
1359 * Set: Flat address of buffer containing values of
1360 * debug registers DR0 .. DR7 to be set
1361 * Output: None
1362 */
1363
Vincent Béron9a624912002-05-31 23:06:46 +00001364 FIXME("[0014] ECX=%lx EDX=%lx\n",
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +00001365 context->Ecx, context->Edx);
Alexandre Julliard642d3131998-07-12 19:29:36 +00001366
1367 /* FIXME */
1368 break;
1369
1370
1371 case 0x0015: /* Set Coprocessor Emulation Flag */
1372 /*
1373 * Input: EDX: 0 to deactivate, 1 to activate coprocessor emulation
1374 *
1375 * Output: None
1376 */
1377
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +00001378 TRACE("[0015] EDX=%lx\n", context->Edx);
Alexandre Julliard642d3131998-07-12 19:29:36 +00001379
1380 /* We don't care, as we always have a coprocessor anyway */
1381 break;
1382
1383
1384 case 0x0016: /* Init Win32S VxD PSP */
1385 /*
1386 * If called to query required PSP size:
1387 *
1388 * Input: EBX: 0
1389 * Output: EDX: Required size of Win32s VxD PSP
1390 *
1391 * If called to initialize allocated PSP:
1392 *
1393 * Input: EBX: LoWord: Selector of Win32s VxD PSP
1394 * HiWord: Paragraph of Win32s VxD PSP (DOSMEM)
1395 * Output: None
1396 */
Vincent Béron9a624912002-05-31 23:06:46 +00001397
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +00001398 if (context->Ebx == 0)
1399 context->Edx = 0x80;
Alexandre Julliard642d3131998-07-12 19:29:36 +00001400 else
1401 {
Alexandre Julliard982a2232000-12-13 20:20:09 +00001402 PDB16 *psp = MapSL( MAKESEGPTR( BX_reg(context), 0 ));
Alexandre Julliard642d3131998-07-12 19:29:36 +00001403 psp->nbFiles = 32;
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +00001404 psp->fileHandlesPtr = MAKELONG(HIWORD(context->Ebx), 0x5c);
Alexandre Julliard642d3131998-07-12 19:29:36 +00001405 memset((LPBYTE)psp + 0x5c, '\xFF', 32);
1406 }
1407 break;
1408
1409
1410 case 0x0017: /* Set Break Point */
1411 /*
1412 * Input: EBX: Offset of Break Point
1413 * CX: Selector of Break Point
1414 *
1415 * Output: None
1416 */
1417
Vincent Béron9a624912002-05-31 23:06:46 +00001418 FIXME("[0017] EBX=%lx CX=%x\n",
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +00001419 context->Ebx, CX_reg(context));
Alexandre Julliard642d3131998-07-12 19:29:36 +00001420
1421 /* FIXME */
1422 break;
1423
1424
1425 case 0x0018: /* VirtualLock */
Vincent Béron9a624912002-05-31 23:06:46 +00001426 /*
Alexandre Julliard642d3131998-07-12 19:29:36 +00001427 * Input: ECX: Current Process
1428 *
1429 * EDX: Flat address of arguments on stack
Vincent Béron9a624912002-05-31 23:06:46 +00001430 *
Alexandre Julliard642d3131998-07-12 19:29:36 +00001431 * DWORD *retv [out] TRUE if success, FALSE if failure
1432 * LPVOID base [in] Flat address of range to lock
1433 * DWORD size [in] Size of range
1434 *
1435 * Output: EAX: NtStatus
1436 */
1437 {
Alexandre Julliardbecb9a32000-12-11 03:48:15 +00001438 DWORD *stack = (DWORD *)W32S_APP2WINE(context->Edx);
1439 DWORD *retv = (DWORD *)W32S_APP2WINE(stack[0]);
1440 LPVOID base = (LPVOID) W32S_APP2WINE(stack[1]);
Alexandre Julliard642d3131998-07-12 19:29:36 +00001441 DWORD size = stack[2];
1442 DWORD result;
1443
Vincent Béron9a624912002-05-31 23:06:46 +00001444 TRACE("VirtualLock(%lx, %lx, %lx)\n",
Alexandre Julliard642d3131998-07-12 19:29:36 +00001445 (DWORD)retv, (DWORD)base, size);
1446
1447 result = VirtualLock(base, size);
1448
1449 if (result)
1450 *retv = TRUE,
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +00001451 context->Eax = STATUS_SUCCESS;
Alexandre Julliard642d3131998-07-12 19:29:36 +00001452 else
1453 *retv = FALSE,
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +00001454 context->Eax = STATUS_NO_MEMORY; /* FIXME */
Alexandre Julliard642d3131998-07-12 19:29:36 +00001455 }
1456 break;
1457
1458
1459 case 0x0019: /* VirtualUnlock */
Vincent Béron9a624912002-05-31 23:06:46 +00001460 /*
Alexandre Julliard642d3131998-07-12 19:29:36 +00001461 * Input: ECX: Current Process
1462 *
1463 * EDX: Flat address of arguments on stack
Vincent Béron9a624912002-05-31 23:06:46 +00001464 *
Alexandre Julliard642d3131998-07-12 19:29:36 +00001465 * DWORD *retv [out] TRUE if success, FALSE if failure
1466 * LPVOID base [in] Flat address of range to unlock
1467 * DWORD size [in] Size of range
1468 *
1469 * Output: EAX: NtStatus
1470 */
1471 {
Alexandre Julliardbecb9a32000-12-11 03:48:15 +00001472 DWORD *stack = (DWORD *)W32S_APP2WINE(context->Edx);
1473 DWORD *retv = (DWORD *)W32S_APP2WINE(stack[0]);
1474 LPVOID base = (LPVOID) W32S_APP2WINE(stack[1]);
Alexandre Julliard642d3131998-07-12 19:29:36 +00001475 DWORD size = stack[2];
1476 DWORD result;
1477
Vincent Béron9a624912002-05-31 23:06:46 +00001478 TRACE("VirtualUnlock(%lx, %lx, %lx)\n",
Alexandre Julliard642d3131998-07-12 19:29:36 +00001479 (DWORD)retv, (DWORD)base, size);
1480
1481 result = VirtualUnlock(base, size);
1482
1483 if (result)
1484 *retv = TRUE,
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +00001485 context->Eax = STATUS_SUCCESS;
Alexandre Julliard642d3131998-07-12 19:29:36 +00001486 else
1487 *retv = FALSE,
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +00001488 context->Eax = STATUS_NO_MEMORY; /* FIXME */
Alexandre Julliard642d3131998-07-12 19:29:36 +00001489 }
1490 break;
1491
1492
1493 case 0x001A: /* KGetSystemInfo */
1494 /*
1495 * Input: None
1496 *
1497 * Output: ECX: Start of sparse memory arena
1498 * EDX: End of sparse memory arena
1499 */
1500
Alexandre Julliard61fece01999-06-26 19:09:08 +00001501 TRACE("KGetSystemInfo()\n");
Vincent Béron9a624912002-05-31 23:06:46 +00001502
Alexandre Julliard642d3131998-07-12 19:29:36 +00001503 /*
Vincent Béron9a624912002-05-31 23:06:46 +00001504 * Note: Win32s reserves 0GB - 2GB for Win 3.1 and uses 2GB - 4GB as
1505 * sparse memory arena. We do it the other way around, since
Alexandre Julliard642d3131998-07-12 19:29:36 +00001506 * we have to reserve 3GB - 4GB for Linux, and thus use
1507 * 0GB - 3GB as sparse memory arena.
1508 *
1509 * FIXME: What about other OSes ?
1510 */
1511
Alexandre Julliardbecb9a32000-12-11 03:48:15 +00001512 context->Ecx = W32S_WINE2APP(0x00000000);
1513 context->Edx = W32S_WINE2APP(0xbfffffff);
Alexandre Julliard642d3131998-07-12 19:29:36 +00001514 break;
1515
1516
1517 case 0x001B: /* KGlobalMemStat */
1518 /*
1519 * Input: ESI: Flat address of buffer to receive memory info
1520 *
1521 * Output: None
1522 */
1523 {
1524 struct Win32sMemoryInfo
1525 {
1526 DWORD DIPhys_Count; /* Total physical pages */
1527 DWORD DIFree_Count; /* Free physical pages */
1528 DWORD DILin_Total_Count; /* Total virtual pages (private arena) */
1529 DWORD DILin_Total_Free; /* Free virtual pages (private arena) */
1530
1531 DWORD SparseTotal; /* Total size of sparse arena (bytes ?) */
1532 DWORD SparseFree; /* Free size of sparse arena (bytes ?) */
1533 };
1534
Vincent Béron9a624912002-05-31 23:06:46 +00001535 struct Win32sMemoryInfo *info =
Alexandre Julliardbecb9a32000-12-11 03:48:15 +00001536 (struct Win32sMemoryInfo *)W32S_APP2WINE(context->Esi);
Alexandre Julliard642d3131998-07-12 19:29:36 +00001537
Alexandre Julliard61fece01999-06-26 19:09:08 +00001538 FIXME("KGlobalMemStat(%lx)\n", (DWORD)info);
Alexandre Julliard642d3131998-07-12 19:29:36 +00001539
1540 /* FIXME */
1541 }
1542 break;
1543
1544
1545 case 0x001C: /* Enable/Disable Exceptions */
1546 /*
1547 * Input: ECX: 0 to disable, 1 to enable exception handling
1548 *
1549 * Output: None
1550 */
1551
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +00001552 TRACE("[001c] ECX=%lx\n", context->Ecx);
Alexandre Julliard642d3131998-07-12 19:29:36 +00001553
1554 /* FIXME */
1555 break;
1556
1557
1558 case 0x001D: /* VirtualAlloc called from 16-bit code */
Vincent Béron9a624912002-05-31 23:06:46 +00001559 /*
Alexandre Julliard642d3131998-07-12 19:29:36 +00001560 * Input: EDX: Segmented address of arguments on stack
Vincent Béron9a624912002-05-31 23:06:46 +00001561 *
Alexandre Julliard642d3131998-07-12 19:29:36 +00001562 * LPVOID base [in] Flat address of region to reserve/commit
1563 * DWORD size [in] Size of region
1564 * DWORD type [in] Type of allocation
1565 * DWORD prot [in] Type of access protection
1566 *
1567 * Output: EAX: NtStatus
1568 * EDX: Flat base address of allocated region
1569 */
1570 {
Alexandre Julliard982a2232000-12-13 20:20:09 +00001571 DWORD *stack = MapSL( MAKESEGPTR( LOWORD(context->Edx), HIWORD(context->Edx) ));
Alexandre Julliardbecb9a32000-12-11 03:48:15 +00001572 LPVOID base = (LPVOID)W32S_APP2WINE(stack[0]);
Alexandre Julliard642d3131998-07-12 19:29:36 +00001573 DWORD size = stack[1];
1574 DWORD type = stack[2];
1575 DWORD prot = stack[3];
1576 DWORD result;
1577
Vincent Béron9a624912002-05-31 23:06:46 +00001578 TRACE("VirtualAlloc16(%lx, %lx, %lx, %lx)\n",
Alexandre Julliard642d3131998-07-12 19:29:36 +00001579 (DWORD)base, size, type, prot);
1580
1581 if (type & 0x80000000)
1582 {
Alexandre Julliard61fece01999-06-26 19:09:08 +00001583 WARN("VirtualAlloc16: strange type %lx\n", type);
Alexandre Julliard642d3131998-07-12 19:29:36 +00001584 type &= 0x7fffffff;
1585 }
1586
1587 result = (DWORD)VirtualAlloc(base, size, type, prot);
1588
Alexandre Julliardbecb9a32000-12-11 03:48:15 +00001589 if (W32S_WINE2APP(result))
1590 context->Edx = W32S_WINE2APP(result),
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +00001591 context->Eax = STATUS_SUCCESS;
Alexandre Julliard642d3131998-07-12 19:29:36 +00001592 else
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +00001593 context->Edx = 0,
1594 context->Eax = STATUS_NO_MEMORY; /* FIXME */
1595 TRACE("VirtualAlloc16: returning base %lx\n", context->Edx);
Alexandre Julliard642d3131998-07-12 19:29:36 +00001596 }
1597 break;
1598
1599
1600 case 0x001E: /* VirtualFree called from 16-bit code */
Vincent Béron9a624912002-05-31 23:06:46 +00001601 /*
Alexandre Julliard642d3131998-07-12 19:29:36 +00001602 * Input: EDX: Segmented address of arguments on stack
Vincent Béron9a624912002-05-31 23:06:46 +00001603 *
Alexandre Julliard642d3131998-07-12 19:29:36 +00001604 * LPVOID base [in] Flat address of region
1605 * DWORD size [in] Size of region
1606 * DWORD type [in] Type of operation
1607 *
1608 * Output: EAX: NtStatus
1609 * EDX: TRUE if success, FALSE if failure
1610 */
1611 {
Alexandre Julliard982a2232000-12-13 20:20:09 +00001612 DWORD *stack = MapSL( MAKESEGPTR( LOWORD(context->Edx), HIWORD(context->Edx) ));
Alexandre Julliardbecb9a32000-12-11 03:48:15 +00001613 LPVOID base = (LPVOID)W32S_APP2WINE(stack[0]);
Alexandre Julliard642d3131998-07-12 19:29:36 +00001614 DWORD size = stack[1];
1615 DWORD type = stack[2];
1616 DWORD result;
1617
Vincent Béron9a624912002-05-31 23:06:46 +00001618 TRACE("VirtualFree16(%lx, %lx, %lx)\n",
Alexandre Julliard642d3131998-07-12 19:29:36 +00001619 (DWORD)base, size, type);
1620
1621 result = VirtualFree(base, size, type);
1622
1623 if (result)
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +00001624 context->Edx = TRUE,
1625 context->Eax = STATUS_SUCCESS;
Alexandre Julliard642d3131998-07-12 19:29:36 +00001626 else
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +00001627 context->Edx = FALSE,
1628 context->Eax = STATUS_NO_MEMORY; /* FIXME */
Alexandre Julliard642d3131998-07-12 19:29:36 +00001629 }
1630 break;
1631
1632
1633 case 0x001F: /* FWorkingSetSize */
1634 /*
1635 * Input: EDX: 0 if Get, 1 if Set
1636 *
1637 * ECX: Get: Buffer to receive Working Set Size
1638 * Set: Buffer containing Working Set Size
1639 *
1640 * Output: NtStatus
1641 */
1642 {
Alexandre Julliardbecb9a32000-12-11 03:48:15 +00001643 DWORD *ptr = (DWORD *)W32S_APP2WINE(context->Ecx);
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +00001644 BOOL set = context->Edx;
Vincent Béron9a624912002-05-31 23:06:46 +00001645
Alexandre Julliard61fece01999-06-26 19:09:08 +00001646 TRACE("FWorkingSetSize(%lx, %lx)\n", (DWORD)ptr, (DWORD)set);
Alexandre Julliard642d3131998-07-12 19:29:36 +00001647
1648 if (set)
1649 /* We do it differently ... */;
1650 else
1651 *ptr = 0x100;
1652
Alexandre Julliardd8fab2e2000-09-25 23:53:07 +00001653 context->Eax = STATUS_SUCCESS;
Alexandre Julliard642d3131998-07-12 19:29:36 +00001654 }
1655 break;
1656
1657
1658 default:
1659 VXD_BARF( context, "W32S" );
1660 }
1661
Alexandre Julliard642d3131998-07-12 19:29:36 +00001662}