Commit 0c59e862 authored by Alexandre Julliard's avatar Alexandre Julliard

ntdll: Add a wrapper macro for ARM64EC syscalls.

parent f7c665fd
......@@ -48,18 +48,19 @@ ALL_SYSCALLS64
};
#define SYSCALL_API __attribute__((naked))
#define SYSCALL_FUNC(name) __ASM_SYSCALL_FUNC( __id_##name )
NTSTATUS SYSCALL_API NtAcceptConnectPort( HANDLE *handle, ULONG id, LPC_MESSAGE *msg, BOOLEAN accept,
LPC_SECTION_WRITE *write, LPC_SECTION_READ *read )
{
__ASM_SYSCALL_FUNC( __id_NtAcceptConnectPort );
SYSCALL_FUNC( NtAcceptConnectPort );
}
NTSTATUS SYSCALL_API NtAccessCheck( PSECURITY_DESCRIPTOR descr, HANDLE token, ACCESS_MASK access,
GENERIC_MAPPING *mapping, PRIVILEGE_SET *privs, ULONG *retlen,
ULONG *access_granted, NTSTATUS *access_status )
{
__ASM_SYSCALL_FUNC( __id_NtAccessCheck );
SYSCALL_FUNC( NtAccessCheck );
}
NTSTATUS SYSCALL_API NtAccessCheckAndAuditAlarm( UNICODE_STRING *subsystem, HANDLE handle,
......@@ -69,135 +70,135 @@ NTSTATUS SYSCALL_API NtAccessCheckAndAuditAlarm( UNICODE_STRING *subsystem, HAND
ACCESS_MASK *access_granted, BOOLEAN *access_status,
BOOLEAN *onclose )
{
__ASM_SYSCALL_FUNC( __id_NtAccessCheckAndAuditAlarm );
SYSCALL_FUNC( NtAccessCheckAndAuditAlarm );
}
NTSTATUS SYSCALL_API NtAddAtom( const WCHAR *name, ULONG length, RTL_ATOM *atom )
{
__ASM_SYSCALL_FUNC( __id_NtAddAtom );
SYSCALL_FUNC( NtAddAtom );
}
NTSTATUS SYSCALL_API NtAdjustGroupsToken( HANDLE token, BOOLEAN reset, TOKEN_GROUPS *groups,
ULONG length, TOKEN_GROUPS *prev, ULONG *retlen )
{
__ASM_SYSCALL_FUNC( __id_NtAdjustGroupsToken );
SYSCALL_FUNC( NtAdjustGroupsToken );
}
NTSTATUS SYSCALL_API NtAdjustPrivilegesToken( HANDLE token, BOOLEAN disable, TOKEN_PRIVILEGES *privs,
DWORD length, TOKEN_PRIVILEGES *prev, DWORD *retlen )
{
__ASM_SYSCALL_FUNC( __id_NtAdjustPrivilegesToken );
SYSCALL_FUNC( NtAdjustPrivilegesToken );
}
NTSTATUS SYSCALL_API NtAlertResumeThread( HANDLE handle, ULONG *count )
{
__ASM_SYSCALL_FUNC( __id_NtAlertResumeThread );
SYSCALL_FUNC( NtAlertResumeThread );
}
NTSTATUS SYSCALL_API NtAlertThread( HANDLE handle )
{
__ASM_SYSCALL_FUNC( __id_NtAlertThread );
SYSCALL_FUNC( NtAlertThread );
}
NTSTATUS SYSCALL_API NtAlertThreadByThreadId( HANDLE tid )
{
__ASM_SYSCALL_FUNC( __id_NtAlertThreadByThreadId );
SYSCALL_FUNC( NtAlertThreadByThreadId );
}
NTSTATUS SYSCALL_API NtAllocateLocallyUniqueId( LUID *luid )
{
__ASM_SYSCALL_FUNC( __id_NtAllocateLocallyUniqueId );
SYSCALL_FUNC( NtAllocateLocallyUniqueId );
}
NTSTATUS SYSCALL_API NtAllocateUuids( ULARGE_INTEGER *time, ULONG *delta, ULONG *sequence, UCHAR *seed )
{
__ASM_SYSCALL_FUNC( __id_NtAllocateUuids );
SYSCALL_FUNC( NtAllocateUuids );
}
NTSTATUS SYSCALL_API NtAllocateVirtualMemory( HANDLE process, PVOID *ret, ULONG_PTR zero_bits,
SIZE_T *size_ptr, ULONG type, ULONG protect )
{
__ASM_SYSCALL_FUNC( __id_NtAllocateVirtualMemory );
SYSCALL_FUNC( NtAllocateVirtualMemory );
}
NTSTATUS SYSCALL_API NtAllocateVirtualMemoryEx( HANDLE process, PVOID *ret, SIZE_T *size_ptr, ULONG type,
ULONG protect, MEM_EXTENDED_PARAMETER *parameters,
ULONG count )
{
__ASM_SYSCALL_FUNC( __id_NtAllocateVirtualMemoryEx );
SYSCALL_FUNC( NtAllocateVirtualMemoryEx );
}
NTSTATUS SYSCALL_API NtAreMappedFilesTheSame(PVOID addr1, PVOID addr2)
{
__ASM_SYSCALL_FUNC( __id_NtAreMappedFilesTheSame );
SYSCALL_FUNC( NtAreMappedFilesTheSame );
}
NTSTATUS SYSCALL_API NtAssignProcessToJobObject( HANDLE job, HANDLE process )
{
__ASM_SYSCALL_FUNC( __id_NtAssignProcessToJobObject );
SYSCALL_FUNC( NtAssignProcessToJobObject );
}
NTSTATUS SYSCALL_API NtCallbackReturn( void *ret_ptr, ULONG ret_len, NTSTATUS status )
{
__ASM_SYSCALL_FUNC( __id_NtCallbackReturn );
SYSCALL_FUNC( NtCallbackReturn );
}
NTSTATUS SYSCALL_API NtCancelIoFile( HANDLE handle, IO_STATUS_BLOCK *io_status )
{
__ASM_SYSCALL_FUNC( __id_NtCancelIoFile );
SYSCALL_FUNC( NtCancelIoFile );
}
NTSTATUS SYSCALL_API NtCancelIoFileEx( HANDLE handle, IO_STATUS_BLOCK *io, IO_STATUS_BLOCK *io_status )
{
__ASM_SYSCALL_FUNC( __id_NtCancelIoFileEx );
SYSCALL_FUNC( NtCancelIoFileEx );
}
NTSTATUS SYSCALL_API NtCancelSynchronousIoFile( HANDLE handle, IO_STATUS_BLOCK *io,
IO_STATUS_BLOCK *io_status )
{
__ASM_SYSCALL_FUNC( __id_NtCancelSynchronousIoFile );
SYSCALL_FUNC( NtCancelSynchronousIoFile );
}
NTSTATUS SYSCALL_API NtCancelTimer( HANDLE handle, BOOLEAN *state )
{
__ASM_SYSCALL_FUNC( __id_NtCancelTimer );
SYSCALL_FUNC( NtCancelTimer );
}
NTSTATUS SYSCALL_API NtClearEvent( HANDLE handle )
{
__ASM_SYSCALL_FUNC( __id_NtClearEvent );
SYSCALL_FUNC( NtClearEvent );
}
NTSTATUS SYSCALL_API NtClose( HANDLE handle )
{
__ASM_SYSCALL_FUNC( __id_NtClose );
SYSCALL_FUNC( NtClose );
}
NTSTATUS SYSCALL_API NtCommitTransaction( HANDLE transaction, BOOLEAN wait )
{
__ASM_SYSCALL_FUNC( __id_NtCommitTransaction );
SYSCALL_FUNC( NtCommitTransaction );
}
NTSTATUS SYSCALL_API NtCompareObjects( HANDLE first, HANDLE second )
{
__ASM_SYSCALL_FUNC( __id_NtCompareObjects );
SYSCALL_FUNC( NtCompareObjects );
}
NTSTATUS SYSCALL_API NtCompareTokens( HANDLE first, HANDLE second, BOOLEAN *equal )
{
__ASM_SYSCALL_FUNC( __id_NtCompareTokens );
SYSCALL_FUNC( NtCompareTokens );
}
NTSTATUS SYSCALL_API NtCompleteConnectPort( HANDLE handle )
{
__ASM_SYSCALL_FUNC( __id_NtCompleteConnectPort );
SYSCALL_FUNC( NtCompleteConnectPort );
}
NTSTATUS SYSCALL_API NtConnectPort( HANDLE *handle, UNICODE_STRING *name, SECURITY_QUALITY_OF_SERVICE *qos,
LPC_SECTION_WRITE *write, LPC_SECTION_READ *read, ULONG *max_len,
void *info, ULONG *info_len )
{
__ASM_SYSCALL_FUNC( __id_NtConnectPort );
SYSCALL_FUNC( NtConnectPort );
}
static NTSTATUS SYSCALL_API syscall_NtContinue( ARM64_NT_CONTEXT *context, BOOLEAN alertable )
......@@ -216,18 +217,18 @@ NTSTATUS WINAPI NtContinue( CONTEXT *context, BOOLEAN alertable )
NTSTATUS SYSCALL_API NtCreateDebugObject( HANDLE *handle, ACCESS_MASK access,
OBJECT_ATTRIBUTES *attr, ULONG flags )
{
__ASM_SYSCALL_FUNC( __id_NtCreateDebugObject );
SYSCALL_FUNC( NtCreateDebugObject );
}
NTSTATUS SYSCALL_API NtCreateDirectoryObject( HANDLE *handle, ACCESS_MASK access, OBJECT_ATTRIBUTES *attr )
{
__ASM_SYSCALL_FUNC( __id_NtCreateDirectoryObject );
SYSCALL_FUNC( NtCreateDirectoryObject );
}
NTSTATUS SYSCALL_API NtCreateEvent( HANDLE *handle, ACCESS_MASK access, const OBJECT_ATTRIBUTES *attr,
EVENT_TYPE type, BOOLEAN state )
{
__ASM_SYSCALL_FUNC( __id_NtCreateEvent );
SYSCALL_FUNC( NtCreateEvent );
}
NTSTATUS SYSCALL_API NtCreateFile( HANDLE *handle, ACCESS_MASK access, OBJECT_ATTRIBUTES *attr,
......@@ -235,37 +236,37 @@ NTSTATUS SYSCALL_API NtCreateFile( HANDLE *handle, ACCESS_MASK access, OBJECT_AT
ULONG attributes, ULONG sharing, ULONG disposition,
ULONG options, void *ea_buffer, ULONG ea_length )
{
__ASM_SYSCALL_FUNC( __id_NtCreateFile );
SYSCALL_FUNC( NtCreateFile );
}
NTSTATUS SYSCALL_API NtCreateIoCompletion( HANDLE *handle, ACCESS_MASK access, OBJECT_ATTRIBUTES *attr,
ULONG threads )
{
__ASM_SYSCALL_FUNC( __id_NtCreateIoCompletion );
SYSCALL_FUNC( NtCreateIoCompletion );
}
NTSTATUS SYSCALL_API NtCreateJobObject( HANDLE *handle, ACCESS_MASK access, const OBJECT_ATTRIBUTES *attr )
{
__ASM_SYSCALL_FUNC( __id_NtCreateJobObject );
SYSCALL_FUNC( NtCreateJobObject );
}
NTSTATUS SYSCALL_API NtCreateKey( HANDLE *key, ACCESS_MASK access, const OBJECT_ATTRIBUTES *attr,
ULONG index, const UNICODE_STRING *class, ULONG options, ULONG *dispos )
{
__ASM_SYSCALL_FUNC( __id_NtCreateKey );
SYSCALL_FUNC( NtCreateKey );
}
NTSTATUS SYSCALL_API NtCreateKeyTransacted( HANDLE *key, ACCESS_MASK access, const OBJECT_ATTRIBUTES *attr,
ULONG index, const UNICODE_STRING *class, ULONG options,
HANDLE transacted, ULONG *dispos )
{
__ASM_SYSCALL_FUNC( __id_NtCreateKeyTransacted );
SYSCALL_FUNC( NtCreateKeyTransacted );
}
NTSTATUS SYSCALL_API NtCreateKeyedEvent( HANDLE *handle, ACCESS_MASK access,
const OBJECT_ATTRIBUTES *attr, ULONG flags )
{
__ASM_SYSCALL_FUNC( __id_NtCreateKeyedEvent );
SYSCALL_FUNC( NtCreateKeyedEvent );
}
NTSTATUS SYSCALL_API NtCreateLowBoxToken( HANDLE *token_handle, HANDLE token, ACCESS_MASK access,
......@@ -273,20 +274,20 @@ NTSTATUS SYSCALL_API NtCreateLowBoxToken( HANDLE *token_handle, HANDLE token, AC
SID_AND_ATTRIBUTES *capabilities, ULONG handle_count,
HANDLE *handle )
{
__ASM_SYSCALL_FUNC( __id_NtCreateLowBoxToken );
SYSCALL_FUNC( NtCreateLowBoxToken );
}
NTSTATUS SYSCALL_API NtCreateMailslotFile( HANDLE *handle, ULONG access, OBJECT_ATTRIBUTES *attr,
IO_STATUS_BLOCK *io, ULONG options, ULONG quota, ULONG msg_size,
LARGE_INTEGER *timeout )
{
__ASM_SYSCALL_FUNC( __id_NtCreateMailslotFile );
SYSCALL_FUNC( NtCreateMailslotFile );
}
NTSTATUS SYSCALL_API NtCreateMutant( HANDLE *handle, ACCESS_MASK access, const OBJECT_ATTRIBUTES *attr,
BOOLEAN owned )
{
__ASM_SYSCALL_FUNC( __id_NtCreateMutant );
SYSCALL_FUNC( NtCreateMutant );
}
NTSTATUS SYSCALL_API NtCreateNamedPipeFile( HANDLE *handle, ULONG access, OBJECT_ATTRIBUTES *attr,
......@@ -295,45 +296,45 @@ NTSTATUS SYSCALL_API NtCreateNamedPipeFile( HANDLE *handle, ULONG access, OBJECT
ULONG max_inst, ULONG inbound_quota, ULONG outbound_quota,
LARGE_INTEGER *timeout )
{
__ASM_SYSCALL_FUNC( __id_NtCreateNamedPipeFile );
SYSCALL_FUNC( NtCreateNamedPipeFile );
}
NTSTATUS SYSCALL_API NtCreatePagingFile( UNICODE_STRING *name, LARGE_INTEGER *min_size,
LARGE_INTEGER *max_size, LARGE_INTEGER *actual_size )
{
__ASM_SYSCALL_FUNC( __id_NtCreatePagingFile );
SYSCALL_FUNC( NtCreatePagingFile );
}
NTSTATUS SYSCALL_API NtCreatePort( HANDLE *handle, OBJECT_ATTRIBUTES *attr, ULONG info_len,
ULONG data_len, ULONG *reserved )
{
__ASM_SYSCALL_FUNC( __id_NtCreatePort );
SYSCALL_FUNC( NtCreatePort );
}
NTSTATUS SYSCALL_API NtCreateSection( HANDLE *handle, ACCESS_MASK access, const OBJECT_ATTRIBUTES *attr,
const LARGE_INTEGER *size, ULONG protect,
ULONG sec_flags, HANDLE file )
{
__ASM_SYSCALL_FUNC( __id_NtCreateSection );
SYSCALL_FUNC( NtCreateSection );
}
NTSTATUS SYSCALL_API NtCreateSemaphore( HANDLE *handle, ACCESS_MASK access, const OBJECT_ATTRIBUTES *attr,
LONG initial, LONG max )
{
__ASM_SYSCALL_FUNC( __id_NtCreateSemaphore );
SYSCALL_FUNC( NtCreateSemaphore );
}
NTSTATUS SYSCALL_API NtCreateSymbolicLinkObject( HANDLE *handle, ACCESS_MASK access,
OBJECT_ATTRIBUTES *attr, UNICODE_STRING *target )
{
__ASM_SYSCALL_FUNC( __id_NtCreateSymbolicLinkObject );
SYSCALL_FUNC( NtCreateSymbolicLinkObject );
}
NTSTATUS SYSCALL_API NtCreateThread( HANDLE *handle, ACCESS_MASK access, OBJECT_ATTRIBUTES *attr,
HANDLE process, CLIENT_ID *id, CONTEXT *ctx, INITIAL_TEB *teb,
BOOLEAN suspended )
{
__ASM_SYSCALL_FUNC( __id_NtCreateThread );
SYSCALL_FUNC( NtCreateThread );
}
NTSTATUS SYSCALL_API NtCreateThreadEx( HANDLE *handle, ACCESS_MASK access, OBJECT_ATTRIBUTES *attr,
......@@ -341,13 +342,13 @@ NTSTATUS SYSCALL_API NtCreateThreadEx( HANDLE *handle, ACCESS_MASK access, OBJEC
ULONG flags, ULONG_PTR zero_bits, SIZE_T stack_commit,
SIZE_T stack_reserve, PS_ATTRIBUTE_LIST *attr_list )
{
__ASM_SYSCALL_FUNC( __id_NtCreateThreadEx );
SYSCALL_FUNC( NtCreateThreadEx );
}
NTSTATUS SYSCALL_API NtCreateTimer( HANDLE *handle, ACCESS_MASK access, const OBJECT_ATTRIBUTES *attr,
TIMER_TYPE type )
{
__ASM_SYSCALL_FUNC( __id_NtCreateTimer );
SYSCALL_FUNC( NtCreateTimer );
}
NTSTATUS SYSCALL_API NtCreateToken( HANDLE *handle, ACCESS_MASK access, OBJECT_ATTRIBUTES *attr,
......@@ -356,7 +357,7 @@ NTSTATUS SYSCALL_API NtCreateToken( HANDLE *handle, ACCESS_MASK access, OBJECT_A
TOKEN_OWNER *owner, TOKEN_PRIMARY_GROUP *group,
TOKEN_DEFAULT_DACL *dacl, TOKEN_SOURCE *source )
{
__ASM_SYSCALL_FUNC( __id_NtCreateToken );
SYSCALL_FUNC( NtCreateToken );
}
NTSTATUS SYSCALL_API NtCreateTransaction( HANDLE *handle, ACCESS_MASK mask, OBJECT_ATTRIBUTES *obj_attr,
......@@ -364,7 +365,7 @@ NTSTATUS SYSCALL_API NtCreateTransaction( HANDLE *handle, ACCESS_MASK mask, OBJE
ULONG isol_flags, PLARGE_INTEGER timeout,
UNICODE_STRING *description )
{
__ASM_SYSCALL_FUNC( __id_NtCreateTransaction );
SYSCALL_FUNC( NtCreateTransaction );
}
NTSTATUS SYSCALL_API NtCreateUserProcess( HANDLE *process_handle_ptr, HANDLE *thread_handle_ptr,
......@@ -374,42 +375,42 @@ NTSTATUS SYSCALL_API NtCreateUserProcess( HANDLE *process_handle_ptr, HANDLE *th
RTL_USER_PROCESS_PARAMETERS *params, PS_CREATE_INFO *info,
PS_ATTRIBUTE_LIST *ps_attr )
{
__ASM_SYSCALL_FUNC( __id_NtCreateUserProcess );
SYSCALL_FUNC( NtCreateUserProcess );
}
NTSTATUS SYSCALL_API NtDebugActiveProcess( HANDLE process, HANDLE debug )
{
__ASM_SYSCALL_FUNC( __id_NtDebugActiveProcess );
SYSCALL_FUNC( NtDebugActiveProcess );
}
NTSTATUS SYSCALL_API NtDebugContinue( HANDLE handle, CLIENT_ID *client, NTSTATUS status )
{
__ASM_SYSCALL_FUNC( __id_NtDebugContinue );
SYSCALL_FUNC( NtDebugContinue );
}
NTSTATUS SYSCALL_API NtDelayExecution( BOOLEAN alertable, const LARGE_INTEGER *timeout )
{
__ASM_SYSCALL_FUNC( __id_NtDelayExecution );
SYSCALL_FUNC( NtDelayExecution );
}
NTSTATUS SYSCALL_API NtDeleteAtom( RTL_ATOM atom )
{
__ASM_SYSCALL_FUNC( __id_NtDeleteAtom );
SYSCALL_FUNC( NtDeleteAtom );
}
NTSTATUS SYSCALL_API NtDeleteFile( OBJECT_ATTRIBUTES *attr )
{
__ASM_SYSCALL_FUNC( __id_NtDeleteFile );
SYSCALL_FUNC( NtDeleteFile );
}
NTSTATUS SYSCALL_API NtDeleteKey( HANDLE key )
{
__ASM_SYSCALL_FUNC( __id_NtDeleteKey );
SYSCALL_FUNC( NtDeleteKey );
}
NTSTATUS SYSCALL_API NtDeleteValueKey( HANDLE key, const UNICODE_STRING *name )
{
__ASM_SYSCALL_FUNC( __id_NtDeleteValueKey );
SYSCALL_FUNC( NtDeleteValueKey );
}
NTSTATUS SYSCALL_API NtDeviceIoControlFile( HANDLE handle, HANDLE event, PIO_APC_ROUTINE apc,
......@@ -417,86 +418,86 @@ NTSTATUS SYSCALL_API NtDeviceIoControlFile( HANDLE handle, HANDLE event, PIO_APC
void *in_buffer, ULONG in_size,
void *out_buffer, ULONG out_size )
{
__ASM_SYSCALL_FUNC( __id_NtDeviceIoControlFile );
SYSCALL_FUNC( NtDeviceIoControlFile );
}
NTSTATUS SYSCALL_API NtDisplayString( UNICODE_STRING *string )
{
__ASM_SYSCALL_FUNC( __id_NtDisplayString );
SYSCALL_FUNC( NtDisplayString );
}
NTSTATUS SYSCALL_API NtDuplicateObject( HANDLE source_process, HANDLE source, HANDLE dest_process,
HANDLE *dest, ACCESS_MASK access, ULONG attributes, ULONG options )
{
__ASM_SYSCALL_FUNC( __id_NtDuplicateObject );
SYSCALL_FUNC( NtDuplicateObject );
}
NTSTATUS SYSCALL_API NtDuplicateToken( HANDLE token, ACCESS_MASK access, OBJECT_ATTRIBUTES *attr,
BOOLEAN effective_only, TOKEN_TYPE type, HANDLE *handle )
{
__ASM_SYSCALL_FUNC( __id_NtDuplicateToken );
SYSCALL_FUNC( NtDuplicateToken );
}
NTSTATUS SYSCALL_API NtEnumerateKey( HANDLE handle, ULONG index, KEY_INFORMATION_CLASS info_class,
void *info, DWORD length, DWORD *result_len )
{
__ASM_SYSCALL_FUNC( __id_NtEnumerateKey );
SYSCALL_FUNC( NtEnumerateKey );
}
NTSTATUS SYSCALL_API NtEnumerateValueKey( HANDLE handle, ULONG index, KEY_VALUE_INFORMATION_CLASS info_class,
void *info, DWORD length, DWORD *result_len )
{
__ASM_SYSCALL_FUNC( __id_NtEnumerateValueKey );
SYSCALL_FUNC( NtEnumerateValueKey );
}
NTSTATUS SYSCALL_API NtFilterToken( HANDLE token, ULONG flags, TOKEN_GROUPS *disable_sids,
TOKEN_PRIVILEGES *privileges, TOKEN_GROUPS *restrict_sids,
HANDLE *new_token )
{
__ASM_SYSCALL_FUNC( __id_NtFilterToken );
SYSCALL_FUNC( NtFilterToken );
}
NTSTATUS SYSCALL_API NtFindAtom( const WCHAR *name, ULONG length, RTL_ATOM *atom )
{
__ASM_SYSCALL_FUNC( __id_NtFindAtom );
SYSCALL_FUNC( NtFindAtom );
}
NTSTATUS SYSCALL_API NtFlushBuffersFile( HANDLE handle, IO_STATUS_BLOCK *io )
{
__ASM_SYSCALL_FUNC( __id_NtFlushBuffersFile );
SYSCALL_FUNC( NtFlushBuffersFile );
}
NTSTATUS SYSCALL_API NtFlushInstructionCache( HANDLE handle, const void *addr, SIZE_T size )
{
__ASM_SYSCALL_FUNC( __id_NtFlushInstructionCache );
SYSCALL_FUNC( NtFlushInstructionCache );
}
NTSTATUS SYSCALL_API NtFlushKey( HANDLE key )
{
__ASM_SYSCALL_FUNC( __id_NtFlushKey );
SYSCALL_FUNC( NtFlushKey );
}
NTSTATUS SYSCALL_API NtFlushProcessWriteBuffers(void)
{
__ASM_SYSCALL_FUNC( __id_NtFlushProcessWriteBuffers );
SYSCALL_FUNC( NtFlushProcessWriteBuffers );
}
NTSTATUS SYSCALL_API NtFlushVirtualMemory( HANDLE process, LPCVOID *addr_ptr,
SIZE_T *size_ptr, ULONG unknown )
{
__ASM_SYSCALL_FUNC( __id_NtFlushVirtualMemory );
SYSCALL_FUNC( NtFlushVirtualMemory );
}
NTSTATUS SYSCALL_API NtFreeVirtualMemory( HANDLE process, PVOID *addr_ptr, SIZE_T *size_ptr, ULONG type )
{
__ASM_SYSCALL_FUNC( __id_NtFreeVirtualMemory );
SYSCALL_FUNC( NtFreeVirtualMemory );
}
NTSTATUS SYSCALL_API NtFsControlFile( HANDLE handle, HANDLE event, PIO_APC_ROUTINE apc, void *apc_context,
IO_STATUS_BLOCK *io, ULONG code, void *in_buffer, ULONG in_size,
void *out_buffer, ULONG out_size )
{
__ASM_SYSCALL_FUNC( __id_NtFsControlFile );
SYSCALL_FUNC( NtFsControlFile );
}
static NTSTATUS SYSCALL_API syscall_NtGetContextThread( HANDLE handle, ARM64_NT_CONTEXT *context )
......@@ -515,89 +516,89 @@ NTSTATUS WINAPI NtGetContextThread( HANDLE handle, CONTEXT *context )
ULONG SYSCALL_API NtGetCurrentProcessorNumber(void)
{
__ASM_SYSCALL_FUNC( __id_NtGetCurrentProcessorNumber );
SYSCALL_FUNC( NtGetCurrentProcessorNumber );
}
NTSTATUS SYSCALL_API NtGetNextThread( HANDLE process, HANDLE thread, ACCESS_MASK access, ULONG attributes,
ULONG flags, HANDLE *handle )
{
__ASM_SYSCALL_FUNC( __id_NtGetNextThread );
SYSCALL_FUNC( NtGetNextThread );
}
NTSTATUS SYSCALL_API NtGetNlsSectionPtr( ULONG type, ULONG id, void *unknown, void **ptr, SIZE_T *size )
{
__ASM_SYSCALL_FUNC( __id_NtGetNlsSectionPtr );
SYSCALL_FUNC( NtGetNlsSectionPtr );
}
NTSTATUS SYSCALL_API NtGetWriteWatch( HANDLE process, ULONG flags, PVOID base, SIZE_T size,
PVOID *addresses, ULONG_PTR *count, ULONG *granularity )
{
__ASM_SYSCALL_FUNC( __id_NtGetWriteWatch );
SYSCALL_FUNC( NtGetWriteWatch );
}
NTSTATUS SYSCALL_API NtImpersonateAnonymousToken( HANDLE thread )
{
__ASM_SYSCALL_FUNC( __id_NtImpersonateAnonymousToken );
SYSCALL_FUNC( NtImpersonateAnonymousToken );
}
NTSTATUS SYSCALL_API NtInitializeNlsFiles( void **ptr, LCID *lcid, LARGE_INTEGER *size )
{
__ASM_SYSCALL_FUNC( __id_NtInitializeNlsFiles );
SYSCALL_FUNC( NtInitializeNlsFiles );
}
NTSTATUS SYSCALL_API NtInitiatePowerAction( POWER_ACTION action, SYSTEM_POWER_STATE state,
ULONG flags, BOOLEAN async )
{
__ASM_SYSCALL_FUNC( __id_NtInitiatePowerAction );
SYSCALL_FUNC( NtInitiatePowerAction );
}
NTSTATUS SYSCALL_API NtIsProcessInJob( HANDLE process, HANDLE job )
{
__ASM_SYSCALL_FUNC( __id_NtIsProcessInJob );
SYSCALL_FUNC( NtIsProcessInJob );
}
NTSTATUS SYSCALL_API NtListenPort( HANDLE handle, LPC_MESSAGE *msg )
{
__ASM_SYSCALL_FUNC( __id_NtListenPort );
SYSCALL_FUNC( NtListenPort );
}
NTSTATUS SYSCALL_API NtLoadDriver( const UNICODE_STRING *name )
{
__ASM_SYSCALL_FUNC( __id_NtLoadDriver );
SYSCALL_FUNC( NtLoadDriver );
}
NTSTATUS SYSCALL_API NtLoadKey( const OBJECT_ATTRIBUTES *attr, OBJECT_ATTRIBUTES *file )
{
__ASM_SYSCALL_FUNC( __id_NtLoadKey );
SYSCALL_FUNC( NtLoadKey );
}
NTSTATUS SYSCALL_API NtLoadKey2( const OBJECT_ATTRIBUTES *attr, OBJECT_ATTRIBUTES *file, ULONG flags )
{
__ASM_SYSCALL_FUNC( __id_NtLoadKey2 );
SYSCALL_FUNC( NtLoadKey2 );
}
NTSTATUS SYSCALL_API NtLoadKeyEx( const OBJECT_ATTRIBUTES *attr, OBJECT_ATTRIBUTES *file, ULONG flags,
HANDLE trustkey, HANDLE event, ACCESS_MASK access,
HANDLE *roothandle, IO_STATUS_BLOCK *iostatus )
{
__ASM_SYSCALL_FUNC( __id_NtLoadKeyEx );
SYSCALL_FUNC( NtLoadKeyEx );
}
NTSTATUS SYSCALL_API NtLockFile( HANDLE file, HANDLE event, PIO_APC_ROUTINE apc, void* apc_user,
IO_STATUS_BLOCK *io_status, LARGE_INTEGER *offset,
LARGE_INTEGER *count, ULONG *key, BOOLEAN dont_wait, BOOLEAN exclusive )
{
__ASM_SYSCALL_FUNC( __id_NtLockFile );
SYSCALL_FUNC( NtLockFile );
}
NTSTATUS SYSCALL_API NtLockVirtualMemory( HANDLE process, PVOID *addr, SIZE_T *size, ULONG unknown )
{
__ASM_SYSCALL_FUNC( __id_NtLockVirtualMemory );
SYSCALL_FUNC( NtLockVirtualMemory );
}
NTSTATUS SYSCALL_API NtMakeTemporaryObject( HANDLE handle )
{
__ASM_SYSCALL_FUNC( __id_NtMakeTemporaryObject );
SYSCALL_FUNC( NtMakeTemporaryObject );
}
NTSTATUS SYSCALL_API NtMapViewOfSection( HANDLE handle, HANDLE process, PVOID *addr_ptr,
......@@ -605,7 +606,7 @@ NTSTATUS SYSCALL_API NtMapViewOfSection( HANDLE handle, HANDLE process, PVOID *a
const LARGE_INTEGER *offset_ptr, SIZE_T *size_ptr,
SECTION_INHERIT inherit, ULONG alloc_type, ULONG protect )
{
__ASM_SYSCALL_FUNC( __id_NtMapViewOfSection );
SYSCALL_FUNC( NtMapViewOfSection );
}
NTSTATUS SYSCALL_API NtMapViewOfSectionEx( HANDLE handle, HANDLE process, PVOID *addr_ptr,
......@@ -613,21 +614,21 @@ NTSTATUS SYSCALL_API NtMapViewOfSectionEx( HANDLE handle, HANDLE process, PVOID
ULONG alloc_type, ULONG protect,
MEM_EXTENDED_PARAMETER *parameters, ULONG count )
{
__ASM_SYSCALL_FUNC( __id_NtMapViewOfSectionEx );
SYSCALL_FUNC( NtMapViewOfSectionEx );
}
NTSTATUS SYSCALL_API NtNotifyChangeDirectoryFile( HANDLE handle, HANDLE event, PIO_APC_ROUTINE apc,
void *apc_context, IO_STATUS_BLOCK *iosb, void *buffer,
ULONG buffer_size, ULONG filter, BOOLEAN subtree )
{
__ASM_SYSCALL_FUNC( __id_NtNotifyChangeDirectoryFile );
SYSCALL_FUNC( NtNotifyChangeDirectoryFile );
}
NTSTATUS SYSCALL_API NtNotifyChangeKey( HANDLE key, HANDLE event, PIO_APC_ROUTINE apc, void *apc_context,
IO_STATUS_BLOCK *io, ULONG filter, BOOLEAN subtree,
void *buffer, ULONG length, BOOLEAN async )
{
__ASM_SYSCALL_FUNC( __id_NtNotifyChangeKey );
SYSCALL_FUNC( NtNotifyChangeKey );
}
NTSTATUS SYSCALL_API NtNotifyChangeMultipleKeys( HANDLE key, ULONG count, OBJECT_ATTRIBUTES *attr,
......@@ -635,156 +636,156 @@ NTSTATUS SYSCALL_API NtNotifyChangeMultipleKeys( HANDLE key, ULONG count, OBJECT
IO_STATUS_BLOCK *io, ULONG filter, BOOLEAN subtree,
void *buffer, ULONG length, BOOLEAN async )
{
__ASM_SYSCALL_FUNC( __id_NtNotifyChangeMultipleKeys );
SYSCALL_FUNC( NtNotifyChangeMultipleKeys );
}
NTSTATUS SYSCALL_API NtOpenDirectoryObject( HANDLE *handle, ACCESS_MASK access, const OBJECT_ATTRIBUTES *attr )
{
__ASM_SYSCALL_FUNC( __id_NtOpenDirectoryObject );
SYSCALL_FUNC( NtOpenDirectoryObject );
}
NTSTATUS SYSCALL_API NtOpenEvent( HANDLE *handle, ACCESS_MASK access, const OBJECT_ATTRIBUTES *attr )
{
__ASM_SYSCALL_FUNC( __id_NtOpenEvent );
SYSCALL_FUNC( NtOpenEvent );
}
NTSTATUS SYSCALL_API NtOpenFile( HANDLE *handle, ACCESS_MASK access, OBJECT_ATTRIBUTES *attr,
IO_STATUS_BLOCK *io, ULONG sharing, ULONG options )
{
__ASM_SYSCALL_FUNC( __id_NtOpenFile );
SYSCALL_FUNC( NtOpenFile );
}
NTSTATUS SYSCALL_API NtOpenIoCompletion( HANDLE *handle, ACCESS_MASK access, const OBJECT_ATTRIBUTES *attr )
{
__ASM_SYSCALL_FUNC( __id_NtOpenIoCompletion );
SYSCALL_FUNC( NtOpenIoCompletion );
}
NTSTATUS SYSCALL_API NtOpenJobObject( HANDLE *handle, ACCESS_MASK access, const OBJECT_ATTRIBUTES *attr )
{
__ASM_SYSCALL_FUNC( __id_NtOpenJobObject );
SYSCALL_FUNC( NtOpenJobObject );
}
NTSTATUS SYSCALL_API NtOpenKey( HANDLE *key, ACCESS_MASK access, const OBJECT_ATTRIBUTES *attr )
{
__ASM_SYSCALL_FUNC( __id_NtOpenKey );
SYSCALL_FUNC( NtOpenKey );
}
NTSTATUS SYSCALL_API NtOpenKeyEx( HANDLE *key, ACCESS_MASK access, const OBJECT_ATTRIBUTES *attr, ULONG options )
{
__ASM_SYSCALL_FUNC( __id_NtOpenKeyEx );
SYSCALL_FUNC( NtOpenKeyEx );
}
NTSTATUS SYSCALL_API NtOpenKeyTransacted( HANDLE *key, ACCESS_MASK access, const OBJECT_ATTRIBUTES *attr,
HANDLE transaction )
{
__ASM_SYSCALL_FUNC( __id_NtOpenKeyTransacted );
SYSCALL_FUNC( NtOpenKeyTransacted );
}
NTSTATUS SYSCALL_API NtOpenKeyTransactedEx( HANDLE *key, ACCESS_MASK access, const OBJECT_ATTRIBUTES *attr,
ULONG options, HANDLE transaction )
{
__ASM_SYSCALL_FUNC( __id_NtOpenKeyTransactedEx );
SYSCALL_FUNC( NtOpenKeyTransactedEx );
}
NTSTATUS SYSCALL_API NtOpenKeyedEvent( HANDLE *handle, ACCESS_MASK access, const OBJECT_ATTRIBUTES *attr )
{
__ASM_SYSCALL_FUNC( __id_NtOpenKeyedEvent );
SYSCALL_FUNC( NtOpenKeyedEvent );
}
NTSTATUS SYSCALL_API NtOpenMutant( HANDLE *handle, ACCESS_MASK access, const OBJECT_ATTRIBUTES *attr )
{
__ASM_SYSCALL_FUNC( __id_NtOpenMutant );
SYSCALL_FUNC( NtOpenMutant );
}
NTSTATUS SYSCALL_API NtOpenProcess( HANDLE *handle, ACCESS_MASK access,
const OBJECT_ATTRIBUTES *attr, const CLIENT_ID *id )
{
__ASM_SYSCALL_FUNC( __id_NtOpenProcess );
SYSCALL_FUNC( NtOpenProcess );
}
NTSTATUS SYSCALL_API NtOpenProcessToken( HANDLE process, DWORD access, HANDLE *handle )
{
__ASM_SYSCALL_FUNC( __id_NtOpenProcessToken );
SYSCALL_FUNC( NtOpenProcessToken );
}
NTSTATUS SYSCALL_API NtOpenProcessTokenEx( HANDLE process, DWORD access, DWORD attributes, HANDLE *handle )
{
__ASM_SYSCALL_FUNC( __id_NtOpenProcessTokenEx );
SYSCALL_FUNC( NtOpenProcessTokenEx );
}
NTSTATUS SYSCALL_API NtOpenSection( HANDLE *handle, ACCESS_MASK access, const OBJECT_ATTRIBUTES *attr )
{
__ASM_SYSCALL_FUNC( __id_NtOpenSection );
SYSCALL_FUNC( NtOpenSection );
}
NTSTATUS SYSCALL_API NtOpenSemaphore( HANDLE *handle, ACCESS_MASK access, const OBJECT_ATTRIBUTES *attr )
{
__ASM_SYSCALL_FUNC( __id_NtOpenSemaphore );
SYSCALL_FUNC( NtOpenSemaphore );
}
NTSTATUS SYSCALL_API NtOpenSymbolicLinkObject( HANDLE *handle, ACCESS_MASK access,
const OBJECT_ATTRIBUTES *attr )
{
__ASM_SYSCALL_FUNC( __id_NtOpenSymbolicLinkObject );
SYSCALL_FUNC( NtOpenSymbolicLinkObject );
}
NTSTATUS SYSCALL_API NtOpenThread( HANDLE *handle, ACCESS_MASK access,
const OBJECT_ATTRIBUTES *attr, const CLIENT_ID *id )
{
__ASM_SYSCALL_FUNC( __id_NtOpenThread );
SYSCALL_FUNC( NtOpenThread );
}
NTSTATUS SYSCALL_API NtOpenThreadToken( HANDLE thread, DWORD access, BOOLEAN self, HANDLE *handle )
{
__ASM_SYSCALL_FUNC( __id_NtOpenThreadToken );
SYSCALL_FUNC( NtOpenThreadToken );
}
NTSTATUS SYSCALL_API NtOpenThreadTokenEx( HANDLE thread, DWORD access, BOOLEAN self, DWORD attributes,
HANDLE *handle )
{
__ASM_SYSCALL_FUNC( __id_NtOpenThreadTokenEx );
SYSCALL_FUNC( NtOpenThreadTokenEx );
}
NTSTATUS SYSCALL_API NtOpenTimer( HANDLE *handle, ACCESS_MASK access, const OBJECT_ATTRIBUTES *attr )
{
__ASM_SYSCALL_FUNC( __id_NtOpenTimer );
SYSCALL_FUNC( NtOpenTimer );
}
NTSTATUS SYSCALL_API NtPowerInformation( POWER_INFORMATION_LEVEL level, void *input, ULONG in_size,
void *output, ULONG out_size )
{
__ASM_SYSCALL_FUNC( __id_NtPowerInformation );
SYSCALL_FUNC( NtPowerInformation );
}
NTSTATUS SYSCALL_API NtPrivilegeCheck( HANDLE token, PRIVILEGE_SET *privs, BOOLEAN *res )
{
__ASM_SYSCALL_FUNC( __id_NtPrivilegeCheck );
SYSCALL_FUNC( NtPrivilegeCheck );
}
NTSTATUS SYSCALL_API NtProtectVirtualMemory( HANDLE process, PVOID *addr_ptr, SIZE_T *size_ptr,
ULONG new_prot, ULONG *old_prot )
{
__ASM_SYSCALL_FUNC( __id_NtProtectVirtualMemory );
SYSCALL_FUNC( NtProtectVirtualMemory );
}
NTSTATUS SYSCALL_API NtPulseEvent( HANDLE handle, LONG *prev_state )
{
__ASM_SYSCALL_FUNC( __id_NtPulseEvent );
SYSCALL_FUNC( NtPulseEvent );
}
NTSTATUS SYSCALL_API NtQueryAttributesFile( const OBJECT_ATTRIBUTES *attr, FILE_BASIC_INFORMATION *info )
{
__ASM_SYSCALL_FUNC( __id_NtQueryAttributesFile );
SYSCALL_FUNC( NtQueryAttributesFile );
}
NTSTATUS SYSCALL_API NtQueryDefaultLocale( BOOLEAN user, LCID *lcid )
{
__ASM_SYSCALL_FUNC( __id_NtQueryDefaultLocale );
SYSCALL_FUNC( NtQueryDefaultLocale );
}
NTSTATUS SYSCALL_API NtQueryDefaultUILanguage( LANGID *lang )
{
__ASM_SYSCALL_FUNC( __id_NtQueryDefaultUILanguage );
SYSCALL_FUNC( NtQueryDefaultUILanguage );
}
NTSTATUS SYSCALL_API NtQueryDirectoryFile( HANDLE handle, HANDLE event, PIO_APC_ROUTINE apc_routine,
......@@ -793,203 +794,203 @@ NTSTATUS SYSCALL_API NtQueryDirectoryFile( HANDLE handle, HANDLE event, PIO_APC_
BOOLEAN single_entry, UNICODE_STRING *mask,
BOOLEAN restart_scan )
{
__ASM_SYSCALL_FUNC( __id_NtQueryDirectoryFile );
SYSCALL_FUNC( NtQueryDirectoryFile );
}
NTSTATUS SYSCALL_API NtQueryDirectoryObject( HANDLE handle, DIRECTORY_BASIC_INFORMATION *buffer,
ULONG size, BOOLEAN single_entry, BOOLEAN restart,
ULONG *context, ULONG *ret_size )
{
__ASM_SYSCALL_FUNC( __id_NtQueryDirectoryObject );
SYSCALL_FUNC( NtQueryDirectoryObject );
}
NTSTATUS SYSCALL_API NtQueryEaFile( HANDLE handle, IO_STATUS_BLOCK *io, void *buffer, ULONG length,
BOOLEAN single_entry, void *list, ULONG list_len,
ULONG *index, BOOLEAN restart )
{
__ASM_SYSCALL_FUNC( __id_NtQueryEaFile );
SYSCALL_FUNC( NtQueryEaFile );
}
NTSTATUS SYSCALL_API NtQueryEvent( HANDLE handle, EVENT_INFORMATION_CLASS class,
void *info, ULONG len, ULONG *ret_len )
{
__ASM_SYSCALL_FUNC( __id_NtQueryEvent );
SYSCALL_FUNC( NtQueryEvent );
}
NTSTATUS SYSCALL_API NtQueryFullAttributesFile( const OBJECT_ATTRIBUTES *attr,
FILE_NETWORK_OPEN_INFORMATION *info )
{
__ASM_SYSCALL_FUNC( __id_NtQueryFullAttributesFile );
SYSCALL_FUNC( NtQueryFullAttributesFile );
}
NTSTATUS SYSCALL_API NtQueryInformationAtom( RTL_ATOM atom, ATOM_INFORMATION_CLASS class,
void *ptr, ULONG size, ULONG *retsize )
{
__ASM_SYSCALL_FUNC( __id_NtQueryInformationAtom );
SYSCALL_FUNC( NtQueryInformationAtom );
}
NTSTATUS SYSCALL_API NtQueryInformationFile( HANDLE handle, IO_STATUS_BLOCK *io,
void *ptr, ULONG len, FILE_INFORMATION_CLASS class )
{
__ASM_SYSCALL_FUNC( __id_NtQueryInformationFile );
SYSCALL_FUNC( NtQueryInformationFile );
}
NTSTATUS SYSCALL_API NtQueryInformationJobObject( HANDLE handle, JOBOBJECTINFOCLASS class, void *info,
ULONG len, ULONG *ret_len )
{
__ASM_SYSCALL_FUNC( __id_NtQueryInformationJobObject );
SYSCALL_FUNC( NtQueryInformationJobObject );
}
NTSTATUS SYSCALL_API NtQueryInformationProcess( HANDLE handle, PROCESSINFOCLASS class, void *info,
ULONG size, ULONG *ret_len )
{
__ASM_SYSCALL_FUNC( __id_NtQueryInformationProcess );
SYSCALL_FUNC( NtQueryInformationProcess );
}
NTSTATUS SYSCALL_API NtQueryInformationThread( HANDLE handle, THREADINFOCLASS class,
void *data, ULONG length, ULONG *ret_len )
{
__ASM_SYSCALL_FUNC( __id_NtQueryInformationThread );
SYSCALL_FUNC( NtQueryInformationThread );
}
NTSTATUS SYSCALL_API NtQueryInformationToken( HANDLE token, TOKEN_INFORMATION_CLASS class,
void *info, ULONG length, ULONG *retlen )
{
__ASM_SYSCALL_FUNC( __id_NtQueryInformationToken );
SYSCALL_FUNC( NtQueryInformationToken );
}
NTSTATUS SYSCALL_API NtQueryInstallUILanguage( LANGID *lang )
{
__ASM_SYSCALL_FUNC( __id_NtQueryInstallUILanguage );
SYSCALL_FUNC( NtQueryInstallUILanguage );
}
NTSTATUS SYSCALL_API NtQueryIoCompletion( HANDLE handle, IO_COMPLETION_INFORMATION_CLASS class,
void *buffer, ULONG len, ULONG *ret_len )
{
__ASM_SYSCALL_FUNC( __id_NtQueryIoCompletion );
SYSCALL_FUNC( NtQueryIoCompletion );
}
NTSTATUS SYSCALL_API NtQueryKey( HANDLE handle, KEY_INFORMATION_CLASS info_class,
void *info, DWORD length, DWORD *result_len )
{
__ASM_SYSCALL_FUNC( __id_NtQueryKey );
SYSCALL_FUNC( NtQueryKey );
}
NTSTATUS SYSCALL_API NtQueryLicenseValue( const UNICODE_STRING *name, ULONG *type,
void *data, ULONG length, ULONG *retlen )
{
__ASM_SYSCALL_FUNC( __id_NtQueryLicenseValue );
SYSCALL_FUNC( NtQueryLicenseValue );
}
NTSTATUS SYSCALL_API NtQueryMultipleValueKey( HANDLE key, KEY_MULTIPLE_VALUE_INFORMATION *info,
ULONG count, void *buffer, ULONG length, ULONG *retlen )
{
__ASM_SYSCALL_FUNC( __id_NtQueryMultipleValueKey );
SYSCALL_FUNC( NtQueryMultipleValueKey );
}
NTSTATUS SYSCALL_API NtQueryMutant( HANDLE handle, MUTANT_INFORMATION_CLASS class,
void *info, ULONG len, ULONG *ret_len )
{
__ASM_SYSCALL_FUNC( __id_NtQueryMutant );
SYSCALL_FUNC( NtQueryMutant );
}
NTSTATUS SYSCALL_API NtQueryObject( HANDLE handle, OBJECT_INFORMATION_CLASS info_class,
void *ptr, ULONG len, ULONG *used_len )
{
__ASM_SYSCALL_FUNC( __id_NtQueryObject );
SYSCALL_FUNC( NtQueryObject );
}
NTSTATUS SYSCALL_API NtQueryPerformanceCounter( LARGE_INTEGER *counter, LARGE_INTEGER *frequency )
{
__ASM_SYSCALL_FUNC( __id_NtQueryPerformanceCounter );
SYSCALL_FUNC( NtQueryPerformanceCounter );
}
NTSTATUS SYSCALL_API NtQuerySection( HANDLE handle, SECTION_INFORMATION_CLASS class, void *ptr,
SIZE_T size, SIZE_T *ret_size )
{
__ASM_SYSCALL_FUNC( __id_NtQuerySection );
SYSCALL_FUNC( NtQuerySection );
}
NTSTATUS SYSCALL_API NtQuerySecurityObject( HANDLE handle, SECURITY_INFORMATION info,
PSECURITY_DESCRIPTOR descr, ULONG length, ULONG *retlen )
{
__ASM_SYSCALL_FUNC( __id_NtQuerySecurityObject );
SYSCALL_FUNC( NtQuerySecurityObject );
}
NTSTATUS SYSCALL_API NtQuerySemaphore( HANDLE handle, SEMAPHORE_INFORMATION_CLASS class,
void *info, ULONG len, ULONG *ret_len )
{
__ASM_SYSCALL_FUNC( __id_NtQuerySemaphore );
SYSCALL_FUNC( NtQuerySemaphore );
}
NTSTATUS SYSCALL_API NtQuerySymbolicLinkObject( HANDLE handle, UNICODE_STRING *target, ULONG *length )
{
__ASM_SYSCALL_FUNC( __id_NtQuerySymbolicLinkObject );
SYSCALL_FUNC( NtQuerySymbolicLinkObject );
}
NTSTATUS SYSCALL_API NtQuerySystemEnvironmentValue( UNICODE_STRING *name, WCHAR *buffer, ULONG length,
ULONG *retlen )
{
__ASM_SYSCALL_FUNC( __id_NtQuerySystemEnvironmentValue );
SYSCALL_FUNC( NtQuerySystemEnvironmentValue );
}
NTSTATUS SYSCALL_API NtQuerySystemEnvironmentValueEx( UNICODE_STRING *name, GUID *vendor, void *buffer,
ULONG *retlen, ULONG *attrib )
{
__ASM_SYSCALL_FUNC( __id_NtQuerySystemEnvironmentValueEx );
SYSCALL_FUNC( NtQuerySystemEnvironmentValueEx );
}
NTSTATUS SYSCALL_API NtQuerySystemInformation( SYSTEM_INFORMATION_CLASS class,
void *info, ULONG size, ULONG *ret_size )
{
__ASM_SYSCALL_FUNC( __id_NtQuerySystemInformation );
SYSCALL_FUNC( NtQuerySystemInformation );
}
NTSTATUS SYSCALL_API NtQuerySystemInformationEx( SYSTEM_INFORMATION_CLASS class, void *query,
ULONG query_len, void *info, ULONG size, ULONG *ret_size )
{
__ASM_SYSCALL_FUNC( __id_NtQuerySystemInformationEx );
SYSCALL_FUNC( NtQuerySystemInformationEx );
}
NTSTATUS SYSCALL_API NtQuerySystemTime( LARGE_INTEGER *time )
{
__ASM_SYSCALL_FUNC( __id_NtQuerySystemTime );
SYSCALL_FUNC( NtQuerySystemTime );
}
NTSTATUS SYSCALL_API NtQueryTimer( HANDLE handle, TIMER_INFORMATION_CLASS class,
void *info, ULONG len, ULONG *ret_len )
{
__ASM_SYSCALL_FUNC( __id_NtQueryTimer );
SYSCALL_FUNC( NtQueryTimer );
}
NTSTATUS SYSCALL_API NtQueryTimerResolution( ULONG *min_res, ULONG *max_res, ULONG *current_res )
{
__ASM_SYSCALL_FUNC( __id_NtQueryTimerResolution );
SYSCALL_FUNC( NtQueryTimerResolution );
}
NTSTATUS SYSCALL_API NtQueryValueKey( HANDLE handle, const UNICODE_STRING *name,
KEY_VALUE_INFORMATION_CLASS info_class,
void *info, DWORD length, DWORD *result_len )
{
__ASM_SYSCALL_FUNC( __id_NtQueryValueKey );
SYSCALL_FUNC( NtQueryValueKey );
}
NTSTATUS SYSCALL_API NtQueryVirtualMemory( HANDLE process, LPCVOID addr, MEMORY_INFORMATION_CLASS info_class,
PVOID buffer, SIZE_T len, SIZE_T *res_len )
{
__ASM_SYSCALL_FUNC( __id_NtQueryVirtualMemory );
SYSCALL_FUNC( NtQueryVirtualMemory );
}
NTSTATUS SYSCALL_API NtQueryVolumeInformationFile( HANDLE handle, IO_STATUS_BLOCK *io, void *buffer,
ULONG length, FS_INFORMATION_CLASS info_class )
{
__ASM_SYSCALL_FUNC( __id_NtQueryVolumeInformationFile );
SYSCALL_FUNC( NtQueryVolumeInformationFile );
}
NTSTATUS SYSCALL_API NtQueueApcThread( HANDLE handle, PNTAPCFUNC func, ULONG_PTR arg1,
ULONG_PTR arg2, ULONG_PTR arg3 )
{
__ASM_SYSCALL_FUNC( __id_NtQueueApcThread );
SYSCALL_FUNC( NtQueueApcThread );
}
static NTSTATUS SYSCALL_API syscall_NtRaiseException( EXCEPTION_RECORD *rec, ARM64_NT_CONTEXT *context, BOOL first_chance )
......@@ -1009,121 +1010,121 @@ NTSTATUS SYSCALL_API NtRaiseHardError( NTSTATUS status, ULONG count, UNICODE_STR
void **params, HARDERROR_RESPONSE_OPTION option,
HARDERROR_RESPONSE *response )
{
__ASM_SYSCALL_FUNC( __id_NtRaiseHardError );
SYSCALL_FUNC( NtRaiseHardError );
}
NTSTATUS SYSCALL_API NtReadFile( HANDLE handle, HANDLE event, PIO_APC_ROUTINE apc, void *apc_user,
IO_STATUS_BLOCK *io, void *buffer, ULONG length,
LARGE_INTEGER *offset, ULONG *key )
{
__ASM_SYSCALL_FUNC( __id_NtReadFile );
SYSCALL_FUNC( NtReadFile );
}
NTSTATUS SYSCALL_API NtReadFileScatter( HANDLE file, HANDLE event, PIO_APC_ROUTINE apc, void *apc_user,
IO_STATUS_BLOCK *io, FILE_SEGMENT_ELEMENT *segments,
ULONG length, LARGE_INTEGER *offset, ULONG *key )
{
__ASM_SYSCALL_FUNC( __id_NtReadFileScatter );
SYSCALL_FUNC( NtReadFileScatter );
}
NTSTATUS SYSCALL_API NtReadVirtualMemory( HANDLE process, const void *addr, void *buffer,
SIZE_T size, SIZE_T *bytes_read )
{
__ASM_SYSCALL_FUNC( __id_NtReadVirtualMemory );
SYSCALL_FUNC( NtReadVirtualMemory );
}
NTSTATUS SYSCALL_API NtRegisterThreadTerminatePort( HANDLE handle )
{
__ASM_SYSCALL_FUNC( __id_NtRegisterThreadTerminatePort );
SYSCALL_FUNC( NtRegisterThreadTerminatePort );
}
NTSTATUS SYSCALL_API NtReleaseKeyedEvent( HANDLE handle, const void *key,
BOOLEAN alertable, const LARGE_INTEGER *timeout )
{
__ASM_SYSCALL_FUNC( __id_NtReleaseKeyedEvent );
SYSCALL_FUNC( NtReleaseKeyedEvent );
}
NTSTATUS SYSCALL_API NtReleaseMutant( HANDLE handle, LONG *prev_count )
{
__ASM_SYSCALL_FUNC( __id_NtReleaseMutant );
SYSCALL_FUNC( NtReleaseMutant );
}
NTSTATUS SYSCALL_API NtReleaseSemaphore( HANDLE handle, ULONG count, ULONG *previous )
{
__ASM_SYSCALL_FUNC( __id_NtReleaseSemaphore );
SYSCALL_FUNC( NtReleaseSemaphore );
}
NTSTATUS SYSCALL_API NtRemoveIoCompletion( HANDLE handle, ULONG_PTR *key, ULONG_PTR *value,
IO_STATUS_BLOCK *io, LARGE_INTEGER *timeout )
{
__ASM_SYSCALL_FUNC( __id_NtRemoveIoCompletion );
SYSCALL_FUNC( NtRemoveIoCompletion );
}
NTSTATUS SYSCALL_API NtRemoveIoCompletionEx( HANDLE handle, FILE_IO_COMPLETION_INFORMATION *info,
ULONG count, ULONG *written, LARGE_INTEGER *timeout,
BOOLEAN alertable )
{
__ASM_SYSCALL_FUNC( __id_NtRemoveIoCompletionEx );
SYSCALL_FUNC( NtRemoveIoCompletionEx );
}
NTSTATUS SYSCALL_API NtRemoveProcessDebug( HANDLE process, HANDLE debug )
{
__ASM_SYSCALL_FUNC( __id_NtRemoveProcessDebug );
SYSCALL_FUNC( NtRemoveProcessDebug );
}
NTSTATUS SYSCALL_API NtRenameKey( HANDLE key, UNICODE_STRING *name )
{
__ASM_SYSCALL_FUNC( __id_NtRenameKey );
SYSCALL_FUNC( NtRenameKey );
}
NTSTATUS SYSCALL_API NtReplaceKey( OBJECT_ATTRIBUTES *attr, HANDLE key, OBJECT_ATTRIBUTES *replace )
{
__ASM_SYSCALL_FUNC( __id_NtReplaceKey );
SYSCALL_FUNC( NtReplaceKey );
}
NTSTATUS SYSCALL_API NtReplyWaitReceivePort( HANDLE handle, ULONG *id, LPC_MESSAGE *reply, LPC_MESSAGE *msg )
{
__ASM_SYSCALL_FUNC( __id_NtReplyWaitReceivePort );
SYSCALL_FUNC( NtReplyWaitReceivePort );
}
NTSTATUS SYSCALL_API NtRequestWaitReplyPort( HANDLE handle, LPC_MESSAGE *msg_in, LPC_MESSAGE *msg_out )
{
__ASM_SYSCALL_FUNC( __id_NtRequestWaitReplyPort );
SYSCALL_FUNC( NtRequestWaitReplyPort );
}
NTSTATUS SYSCALL_API NtResetEvent( HANDLE handle, LONG *prev_state )
{
__ASM_SYSCALL_FUNC( __id_NtResetEvent );
SYSCALL_FUNC( NtResetEvent );
}
NTSTATUS SYSCALL_API NtResetWriteWatch( HANDLE process, PVOID base, SIZE_T size )
{
__ASM_SYSCALL_FUNC( __id_NtResetWriteWatch );
SYSCALL_FUNC( NtResetWriteWatch );
}
NTSTATUS SYSCALL_API NtRestoreKey( HANDLE key, HANDLE file, ULONG flags )
{
__ASM_SYSCALL_FUNC( __id_NtRestoreKey );
SYSCALL_FUNC( NtRestoreKey );
}
NTSTATUS SYSCALL_API NtResumeProcess( HANDLE handle )
{
__ASM_SYSCALL_FUNC( __id_NtResumeProcess );
SYSCALL_FUNC( NtResumeProcess );
}
NTSTATUS SYSCALL_API NtResumeThread( HANDLE handle, ULONG *count )
{
__ASM_SYSCALL_FUNC( __id_NtResumeThread );
SYSCALL_FUNC( NtResumeThread );
}
NTSTATUS SYSCALL_API NtRollbackTransaction( HANDLE transaction, BOOLEAN wait )
{
__ASM_SYSCALL_FUNC( __id_NtRollbackTransaction );
SYSCALL_FUNC( NtRollbackTransaction );
}
NTSTATUS SYSCALL_API NtSaveKey( HANDLE key, HANDLE file )
{
__ASM_SYSCALL_FUNC( __id_NtSaveKey );
SYSCALL_FUNC( NtSaveKey );
}
NTSTATUS SYSCALL_API NtSecureConnectPort( HANDLE *handle, UNICODE_STRING *name,
......@@ -1131,7 +1132,7 @@ NTSTATUS SYSCALL_API NtSecureConnectPort( HANDLE *handle, UNICODE_STRING *name,
PSID sid, LPC_SECTION_READ *read, ULONG *max_len,
void *info, ULONG *info_len )
{
__ASM_SYSCALL_FUNC( __id_NtSecureConnectPort );
SYSCALL_FUNC( NtSecureConnectPort );
}
static NTSTATUS SYSCALL_API syscall_NtSetContextThread( HANDLE handle, const ARM64_NT_CONTEXT *context )
......@@ -1149,74 +1150,74 @@ NTSTATUS WINAPI NtSetContextThread( HANDLE handle, const CONTEXT *context )
NTSTATUS SYSCALL_API NtSetDebugFilterState( ULONG component_id, ULONG level, BOOLEAN state )
{
__ASM_SYSCALL_FUNC( __id_NtSetDebugFilterState );
SYSCALL_FUNC( NtSetDebugFilterState );
}
NTSTATUS SYSCALL_API NtSetDefaultLocale( BOOLEAN user, LCID lcid )
{
__ASM_SYSCALL_FUNC( __id_NtSetDefaultLocale );
SYSCALL_FUNC( NtSetDefaultLocale );
}
NTSTATUS SYSCALL_API NtSetDefaultUILanguage( LANGID lang )
{
__ASM_SYSCALL_FUNC( __id_NtSetDefaultUILanguage );
SYSCALL_FUNC( NtSetDefaultUILanguage );
}
NTSTATUS SYSCALL_API NtSetEaFile( HANDLE handle, IO_STATUS_BLOCK *io, void *buffer, ULONG length )
{
__ASM_SYSCALL_FUNC( __id_NtSetEaFile );
SYSCALL_FUNC( NtSetEaFile );
}
NTSTATUS SYSCALL_API NtSetEvent( HANDLE handle, LONG *prev_state )
{
__ASM_SYSCALL_FUNC( __id_NtSetEvent );
SYSCALL_FUNC( NtSetEvent );
}
NTSTATUS SYSCALL_API NtSetInformationDebugObject( HANDLE handle, DEBUGOBJECTINFOCLASS class,
void *info, ULONG len, ULONG *ret_len )
{
__ASM_SYSCALL_FUNC( __id_NtSetInformationDebugObject );
SYSCALL_FUNC( NtSetInformationDebugObject );
}
NTSTATUS SYSCALL_API NtSetInformationFile( HANDLE handle, IO_STATUS_BLOCK *io,
void *ptr, ULONG len, FILE_INFORMATION_CLASS class )
{
__ASM_SYSCALL_FUNC( __id_NtSetInformationFile );
SYSCALL_FUNC( NtSetInformationFile );
}
NTSTATUS SYSCALL_API NtSetInformationJobObject( HANDLE handle, JOBOBJECTINFOCLASS class,
void *info, ULONG len )
{
__ASM_SYSCALL_FUNC( __id_NtSetInformationJobObject );
SYSCALL_FUNC( NtSetInformationJobObject );
}
NTSTATUS SYSCALL_API NtSetInformationKey( HANDLE key, int class, void *info, ULONG length )
{
__ASM_SYSCALL_FUNC( __id_NtSetInformationKey );
SYSCALL_FUNC( NtSetInformationKey );
}
NTSTATUS SYSCALL_API NtSetInformationObject( HANDLE handle, OBJECT_INFORMATION_CLASS info_class,
void *ptr, ULONG len )
{
__ASM_SYSCALL_FUNC( __id_NtSetInformationObject );
SYSCALL_FUNC( NtSetInformationObject );
}
NTSTATUS SYSCALL_API NtSetInformationProcess( HANDLE handle, PROCESSINFOCLASS class,
void *info, ULONG size )
{
__ASM_SYSCALL_FUNC( __id_NtSetInformationProcess );
SYSCALL_FUNC( NtSetInformationProcess );
}
NTSTATUS SYSCALL_API NtSetInformationThread( HANDLE handle, THREADINFOCLASS class,
const void *data, ULONG length )
{
__ASM_SYSCALL_FUNC( __id_NtSetInformationThread );
SYSCALL_FUNC( NtSetInformationThread );
}
NTSTATUS SYSCALL_API NtSetInformationToken( HANDLE token, TOKEN_INFORMATION_CLASS class,
void *info, ULONG length )
{
__ASM_SYSCALL_FUNC( __id_NtSetInformationToken );
SYSCALL_FUNC( NtSetInformationToken );
}
NTSTATUS SYSCALL_API NtSetInformationVirtualMemory( HANDLE process,
......@@ -1224,215 +1225,215 @@ NTSTATUS SYSCALL_API NtSetInformationVirtualMemory( HANDLE process,
ULONG_PTR count, PMEMORY_RANGE_ENTRY addresses,
PVOID ptr, ULONG size )
{
__ASM_SYSCALL_FUNC( __id_NtSetInformationVirtualMemory );
SYSCALL_FUNC( NtSetInformationVirtualMemory );
}
NTSTATUS SYSCALL_API NtSetIntervalProfile( ULONG interval, KPROFILE_SOURCE source )
{
__ASM_SYSCALL_FUNC( __id_NtSetIntervalProfile );
SYSCALL_FUNC( NtSetIntervalProfile );
}
NTSTATUS SYSCALL_API NtSetIoCompletion( HANDLE handle, ULONG_PTR key, ULONG_PTR value,
NTSTATUS status, SIZE_T count )
{
__ASM_SYSCALL_FUNC( __id_NtSetIoCompletion );
SYSCALL_FUNC( NtSetIoCompletion );
}
NTSTATUS SYSCALL_API NtSetLdtEntries( ULONG sel1, LDT_ENTRY entry1, ULONG sel2, LDT_ENTRY entry2 )
{
__ASM_SYSCALL_FUNC( __id_NtSetLdtEntries );
SYSCALL_FUNC( NtSetLdtEntries );
}
NTSTATUS SYSCALL_API NtSetSecurityObject( HANDLE handle, SECURITY_INFORMATION info,
PSECURITY_DESCRIPTOR descr )
{
__ASM_SYSCALL_FUNC( __id_NtSetSecurityObject );
SYSCALL_FUNC( NtSetSecurityObject );
}
NTSTATUS SYSCALL_API NtSetSystemInformation( SYSTEM_INFORMATION_CLASS class, void *info, ULONG length )
{
__ASM_SYSCALL_FUNC( __id_NtSetSystemInformation );
SYSCALL_FUNC( NtSetSystemInformation );
}
NTSTATUS SYSCALL_API NtSetSystemTime( const LARGE_INTEGER *new, LARGE_INTEGER *old )
{
__ASM_SYSCALL_FUNC( __id_NtSetSystemTime );
SYSCALL_FUNC( NtSetSystemTime );
}
NTSTATUS SYSCALL_API NtSetThreadExecutionState( EXECUTION_STATE new_state, EXECUTION_STATE *old_state )
{
__ASM_SYSCALL_FUNC( __id_NtSetThreadExecutionState );
SYSCALL_FUNC( NtSetThreadExecutionState );
}
NTSTATUS SYSCALL_API NtSetTimer( HANDLE handle, const LARGE_INTEGER *when, PTIMER_APC_ROUTINE callback,
void *arg, BOOLEAN resume, ULONG period, BOOLEAN *state )
{
__ASM_SYSCALL_FUNC( __id_NtSetTimer );
SYSCALL_FUNC( NtSetTimer );
}
NTSTATUS SYSCALL_API NtSetTimerResolution( ULONG res, BOOLEAN set, ULONG *current_res )
{
__ASM_SYSCALL_FUNC( __id_NtSetTimerResolution );
SYSCALL_FUNC( NtSetTimerResolution );
}
NTSTATUS SYSCALL_API NtSetValueKey( HANDLE key, const UNICODE_STRING *name, ULONG index,
ULONG type, const void *data, ULONG count )
{
__ASM_SYSCALL_FUNC( __id_NtSetValueKey );
SYSCALL_FUNC( NtSetValueKey );
}
NTSTATUS SYSCALL_API NtSetVolumeInformationFile( HANDLE handle, IO_STATUS_BLOCK *io, void *info,
ULONG length, FS_INFORMATION_CLASS class )
{
__ASM_SYSCALL_FUNC( __id_NtSetVolumeInformationFile );
SYSCALL_FUNC( NtSetVolumeInformationFile );
}
NTSTATUS SYSCALL_API NtShutdownSystem( SHUTDOWN_ACTION action )
{
__ASM_SYSCALL_FUNC( __id_NtShutdownSystem );
SYSCALL_FUNC( NtShutdownSystem );
}
NTSTATUS SYSCALL_API NtSignalAndWaitForSingleObject( HANDLE signal, HANDLE wait,
BOOLEAN alertable, const LARGE_INTEGER *timeout )
{
__ASM_SYSCALL_FUNC( __id_NtSignalAndWaitForSingleObject );
SYSCALL_FUNC( NtSignalAndWaitForSingleObject );
}
NTSTATUS SYSCALL_API NtSuspendProcess( HANDLE handle )
{
__ASM_SYSCALL_FUNC( __id_NtSuspendProcess );
SYSCALL_FUNC( NtSuspendProcess );
}
NTSTATUS SYSCALL_API NtSuspendThread( HANDLE handle, ULONG *count )
{
__ASM_SYSCALL_FUNC( __id_NtSuspendThread );
SYSCALL_FUNC( NtSuspendThread );
}
NTSTATUS SYSCALL_API NtSystemDebugControl( SYSDBG_COMMAND command, void *in_buff, ULONG in_len,
void *out_buff, ULONG out_len, ULONG *retlen )
{
__ASM_SYSCALL_FUNC( __id_NtSystemDebugControl );
SYSCALL_FUNC( NtSystemDebugControl );
}
NTSTATUS SYSCALL_API NtTerminateJobObject( HANDLE handle, NTSTATUS status )
{
__ASM_SYSCALL_FUNC( __id_NtTerminateJobObject );
SYSCALL_FUNC( NtTerminateJobObject );
}
NTSTATUS SYSCALL_API NtTerminateProcess( HANDLE handle, LONG exit_code )
{
__ASM_SYSCALL_FUNC( __id_NtTerminateProcess );
SYSCALL_FUNC( NtTerminateProcess );
}
NTSTATUS SYSCALL_API NtTerminateThread( HANDLE handle, LONG exit_code )
{
__ASM_SYSCALL_FUNC( __id_NtTerminateThread );
SYSCALL_FUNC( NtTerminateThread );
}
NTSTATUS SYSCALL_API NtTestAlert(void)
{
__ASM_SYSCALL_FUNC( __id_NtTestAlert );
SYSCALL_FUNC( NtTestAlert );
}
NTSTATUS SYSCALL_API NtTraceControl( ULONG code, void *inbuf, ULONG inbuf_len,
void *outbuf, ULONG outbuf_len, ULONG *size )
{
__ASM_SYSCALL_FUNC( __id_NtTraceControl );
SYSCALL_FUNC( NtTraceControl );
}
NTSTATUS SYSCALL_API NtUnloadDriver( const UNICODE_STRING *name )
{
__ASM_SYSCALL_FUNC( __id_NtUnloadDriver );
SYSCALL_FUNC( NtUnloadDriver );
}
NTSTATUS SYSCALL_API NtUnloadKey( OBJECT_ATTRIBUTES *attr )
{
__ASM_SYSCALL_FUNC( __id_NtUnloadKey );
SYSCALL_FUNC( NtUnloadKey );
}
NTSTATUS SYSCALL_API NtUnlockFile( HANDLE handle, IO_STATUS_BLOCK *io_status, LARGE_INTEGER *offset,
LARGE_INTEGER *count, ULONG *key )
{
__ASM_SYSCALL_FUNC( __id_NtUnlockFile );
SYSCALL_FUNC( NtUnlockFile );
}
NTSTATUS SYSCALL_API NtUnlockVirtualMemory( HANDLE process, PVOID *addr, SIZE_T *size, ULONG unknown )
{
__ASM_SYSCALL_FUNC( __id_NtUnlockVirtualMemory );
SYSCALL_FUNC( NtUnlockVirtualMemory );
}
NTSTATUS SYSCALL_API NtUnmapViewOfSection( HANDLE process, PVOID addr )
{
__ASM_SYSCALL_FUNC( __id_NtUnmapViewOfSection );
SYSCALL_FUNC( NtUnmapViewOfSection );
}
NTSTATUS SYSCALL_API NtUnmapViewOfSectionEx( HANDLE process, PVOID addr, ULONG flags )
{
__ASM_SYSCALL_FUNC( __id_NtUnmapViewOfSectionEx );
SYSCALL_FUNC( NtUnmapViewOfSectionEx );
}
NTSTATUS SYSCALL_API NtWaitForAlertByThreadId( const void *address, const LARGE_INTEGER *timeout )
{
__ASM_SYSCALL_FUNC( __id_NtWaitForAlertByThreadId );
SYSCALL_FUNC( NtWaitForAlertByThreadId );
}
NTSTATUS SYSCALL_API NtWaitForDebugEvent( HANDLE handle, BOOLEAN alertable, LARGE_INTEGER *timeout,
DBGUI_WAIT_STATE_CHANGE *state )
{
__ASM_SYSCALL_FUNC( __id_NtWaitForDebugEvent );
SYSCALL_FUNC( NtWaitForDebugEvent );
}
NTSTATUS SYSCALL_API NtWaitForKeyedEvent( HANDLE handle, const void *key,
BOOLEAN alertable, const LARGE_INTEGER *timeout )
{
__ASM_SYSCALL_FUNC( __id_NtWaitForKeyedEvent );
SYSCALL_FUNC( NtWaitForKeyedEvent );
}
NTSTATUS SYSCALL_API NtWaitForMultipleObjects( DWORD count, const HANDLE *handles, BOOLEAN wait_any,
BOOLEAN alertable, const LARGE_INTEGER *timeout )
{
__ASM_SYSCALL_FUNC( __id_NtWaitForMultipleObjects );
SYSCALL_FUNC( NtWaitForMultipleObjects );
}
NTSTATUS SYSCALL_API NtWaitForSingleObject( HANDLE handle, BOOLEAN alertable, const LARGE_INTEGER *timeout )
{
__ASM_SYSCALL_FUNC( __id_NtWaitForSingleObject );
SYSCALL_FUNC( NtWaitForSingleObject );
}
NTSTATUS SYSCALL_API NtWriteFile( HANDLE handle, HANDLE event, PIO_APC_ROUTINE apc, void *apc_user,
IO_STATUS_BLOCK *io, const void *buffer, ULONG length,
LARGE_INTEGER *offset, ULONG *key )
{
__ASM_SYSCALL_FUNC( __id_NtWriteFile );
SYSCALL_FUNC( NtWriteFile );
}
NTSTATUS SYSCALL_API NtWriteFileGather( HANDLE file, HANDLE event, PIO_APC_ROUTINE apc, void *apc_user,
IO_STATUS_BLOCK *io, FILE_SEGMENT_ELEMENT *segments,
ULONG length, LARGE_INTEGER *offset, ULONG *key )
{
__ASM_SYSCALL_FUNC( __id_NtWriteFileGather );
SYSCALL_FUNC( NtWriteFileGather );
}
NTSTATUS SYSCALL_API NtWriteVirtualMemory( HANDLE process, void *addr, const void *buffer,
SIZE_T size, SIZE_T *bytes_written )
{
__ASM_SYSCALL_FUNC( __id_NtWriteVirtualMemory );
SYSCALL_FUNC( NtWriteVirtualMemory );
}
NTSTATUS SYSCALL_API NtYieldExecution(void)
{
__ASM_SYSCALL_FUNC( __id_NtYieldExecution );
SYSCALL_FUNC( NtYieldExecution );
}
NTSTATUS SYSCALL_API wine_nt_to_unix_file_name( const OBJECT_ATTRIBUTES *attr, char *nameA, ULONG *size,
UINT disposition )
{
__ASM_SYSCALL_FUNC( __id_wine_nt_to_unix_file_name );
SYSCALL_FUNC( wine_nt_to_unix_file_name );
}
NTSTATUS SYSCALL_API wine_unix_to_nt_file_name( const char *name, WCHAR *buffer, ULONG *size )
{
__ASM_SYSCALL_FUNC( __id_wine_unix_to_nt_file_name );
SYSCALL_FUNC( wine_unix_to_nt_file_name );
}
static void * const arm64ec_syscalls[] =
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment