Converting RTL methods to the new style.
This commit is contained in:
parent
c4e0347932
commit
64eb2aa2b3
|
@ -166,12 +166,25 @@ SHIM_CALL RtlFillMemoryUlong_shim(
|
||||||
|
|
||||||
|
|
||||||
// http://msdn.microsoft.com/en-us/library/ff561918
|
// http://msdn.microsoft.com/en-us/library/ff561918
|
||||||
SHIM_CALL RtlInitAnsiString_shim(
|
void xeRtlInitAnsiString(uint32_t destination_ptr, uint32_t source_ptr) {
|
||||||
xe_ppc_state_t* ppc_state, KernelState* state) {
|
KernelState* state = shared_kernel_state_;
|
||||||
|
XEASSERTNOTNULL(state);
|
||||||
|
|
||||||
// VOID
|
// VOID
|
||||||
// _Out_ PANSI_STRING DestinationString,
|
// _Out_ PANSI_STRING DestinationString,
|
||||||
// _In_opt_ PCSZ SourceString
|
// _In_opt_ PCSZ SourceString
|
||||||
|
|
||||||
|
const char* source = source_ptr ? (char*)IMPL_MEM_ADDR(source_ptr) : NULL;
|
||||||
|
|
||||||
|
uint16_t length = source ? (uint16_t)xestrlena(source) : 0;
|
||||||
|
IMPL_SET_MEM_16(destination_ptr + 2, length * 2);
|
||||||
|
IMPL_SET_MEM_16(destination_ptr + 0, length * 2);
|
||||||
|
IMPL_SET_MEM_32(destination_ptr + 4, source_ptr);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
SHIM_CALL RtlInitAnsiString_shim(
|
||||||
|
xe_ppc_state_t* ppc_state, KernelState* state) {
|
||||||
uint32_t destination_ptr = SHIM_GET_ARG_32(0);
|
uint32_t destination_ptr = SHIM_GET_ARG_32(0);
|
||||||
uint32_t source_ptr = SHIM_GET_ARG_32(1);
|
uint32_t source_ptr = SHIM_GET_ARG_32(1);
|
||||||
|
|
||||||
|
@ -179,30 +192,35 @@ SHIM_CALL RtlInitAnsiString_shim(
|
||||||
XELOGD("RtlInitAnsiString(%.8X, %.8X = %s)",
|
XELOGD("RtlInitAnsiString(%.8X, %.8X = %s)",
|
||||||
destination_ptr, source_ptr, source ? source : "<null>");
|
destination_ptr, source_ptr, source ? source : "<null>");
|
||||||
|
|
||||||
uint16_t length = source ? (uint16_t)xestrlena(source) : 0;
|
xeRtlInitAnsiString(destination_ptr, source_ptr);
|
||||||
SHIM_SET_MEM_16(destination_ptr + 0, length * 2);
|
|
||||||
SHIM_SET_MEM_16(destination_ptr + 2, length * 2);
|
|
||||||
SHIM_SET_MEM_32(destination_ptr + 4, source_ptr);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
// http://msdn.microsoft.com/en-us/library/ff561899
|
// http://msdn.microsoft.com/en-us/library/ff561899
|
||||||
SHIM_CALL RtlFreeAnsiString_shim(
|
void xeRtlFreeAnsiString(uint32_t string_ptr) {
|
||||||
xe_ppc_state_t* ppc_state, KernelState* state) {
|
KernelState* state = shared_kernel_state_;
|
||||||
|
XEASSERTNOTNULL(state);
|
||||||
|
|
||||||
// VOID
|
// VOID
|
||||||
// _Inout_ PANSI_STRING AnsiString
|
// _Inout_ PANSI_STRING AnsiString
|
||||||
|
|
||||||
uint32_t string_ptr = SHIM_GET_ARG_32(0);
|
|
||||||
|
|
||||||
XELOGD("RtlFreeAnsiString(%.8X)", string_ptr);
|
|
||||||
|
|
||||||
//uint32_t buffer = SHIM_MEM_32(string_ptr + 4);
|
//uint32_t buffer = SHIM_MEM_32(string_ptr + 4);
|
||||||
// TODO(benvanik): free the buffer
|
// TODO(benvanik): free the buffer
|
||||||
XELOGE("RtlFreeAnsiString leaking buffer");
|
XELOGE("RtlFreeAnsiString leaking buffer");
|
||||||
|
|
||||||
SHIM_SET_MEM_16(string_ptr + 0, 0);
|
IMPL_SET_MEM_16(string_ptr + 0, 0);
|
||||||
SHIM_SET_MEM_16(string_ptr + 2, 0);
|
IMPL_SET_MEM_16(string_ptr + 2, 0);
|
||||||
SHIM_SET_MEM_32(string_ptr + 4, 0);
|
IMPL_SET_MEM_32(string_ptr + 4, 0);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
SHIM_CALL RtlFreeAnsiString_shim(
|
||||||
|
xe_ppc_state_t* ppc_state, KernelState* state) {
|
||||||
|
uint32_t string_ptr = SHIM_GET_ARG_32(0);
|
||||||
|
|
||||||
|
XELOGD("RtlFreeAnsiString(%.8X)", string_ptr);
|
||||||
|
|
||||||
|
xeRtlFreeAnsiString(string_ptr);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
@ -214,12 +232,26 @@ SHIM_CALL RtlFreeAnsiString_shim(
|
||||||
|
|
||||||
|
|
||||||
// http://msdn.microsoft.com/en-us/library/ff561934
|
// http://msdn.microsoft.com/en-us/library/ff561934
|
||||||
SHIM_CALL RtlInitUnicodeString_shim(
|
void xeRtlInitUnicodeString(uint32_t destination_ptr, uint32_t source_ptr) {
|
||||||
xe_ppc_state_t* ppc_state, KernelState* state) {
|
KernelState* state = shared_kernel_state_;
|
||||||
|
XEASSERTNOTNULL(state);
|
||||||
|
|
||||||
// VOID
|
// VOID
|
||||||
// _Out_ PUNICODE_STRING DestinationString,
|
// _Out_ PUNICODE_STRING DestinationString,
|
||||||
// _In_opt_ PCWSTR SourceString
|
// _In_opt_ PCWSTR SourceString
|
||||||
|
|
||||||
|
const wchar_t* source =
|
||||||
|
source_ptr ? (const wchar_t*)IMPL_MEM_ADDR(source_ptr) : NULL;
|
||||||
|
|
||||||
|
uint16_t length = source ? (uint16_t)xestrlenw(source) : 0;
|
||||||
|
IMPL_SET_MEM_16(destination_ptr + 0, length * 2);
|
||||||
|
IMPL_SET_MEM_16(destination_ptr + 2, length * 2);
|
||||||
|
IMPL_SET_MEM_32(destination_ptr + 4, source_ptr);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
SHIM_CALL RtlInitUnicodeString_shim(
|
||||||
|
xe_ppc_state_t* ppc_state, KernelState* state) {
|
||||||
uint32_t destination_ptr = SHIM_GET_ARG_32(0);
|
uint32_t destination_ptr = SHIM_GET_ARG_32(0);
|
||||||
uint32_t source_ptr = SHIM_GET_ARG_32(1);
|
uint32_t source_ptr = SHIM_GET_ARG_32(1);
|
||||||
|
|
||||||
|
@ -228,41 +260,66 @@ SHIM_CALL RtlInitUnicodeString_shim(
|
||||||
XELOGD("RtlInitUnicodeString(%.8X, %.8X = %ls)",
|
XELOGD("RtlInitUnicodeString(%.8X, %.8X = %ls)",
|
||||||
destination_ptr, source_ptr, source ? source : L"<null>");
|
destination_ptr, source_ptr, source ? source : L"<null>");
|
||||||
|
|
||||||
uint16_t length = source ? (uint16_t)xestrlenw(source) : 0;
|
xeRtlInitUnicodeString(destination_ptr, source_ptr);
|
||||||
SHIM_SET_MEM_16(destination_ptr + 0, length * 2);
|
|
||||||
SHIM_SET_MEM_16(destination_ptr + 2, length * 2);
|
|
||||||
SHIM_SET_MEM_32(destination_ptr + 4, source_ptr);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
// http://msdn.microsoft.com/en-us/library/ff561903
|
// http://msdn.microsoft.com/en-us/library/ff561903
|
||||||
SHIM_CALL RtlFreeUnicodeString_shim(
|
void xeRtlFreeUnicodeString(uint32_t string_ptr) {
|
||||||
xe_ppc_state_t* ppc_state, KernelState* state) {
|
KernelState* state = shared_kernel_state_;
|
||||||
|
XEASSERTNOTNULL(state);
|
||||||
|
|
||||||
// VOID
|
// VOID
|
||||||
// _Inout_ PUNICODE_STRING UnicodeString
|
// _Inout_ PUNICODE_STRING UnicodeString
|
||||||
|
|
||||||
|
//uint32_t buffer = IMPL_MEM_32(string_ptr + 4);
|
||||||
|
// TODO(benvanik): free the buffer
|
||||||
|
XELOGE("RtlFreeUnicodeString leaking buffer");
|
||||||
|
|
||||||
|
IMPL_SET_MEM_16(string_ptr + 0, 0);
|
||||||
|
IMPL_SET_MEM_16(string_ptr + 2, 0);
|
||||||
|
IMPL_SET_MEM_32(string_ptr + 4, 0);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
SHIM_CALL RtlFreeUnicodeString_shim(
|
||||||
|
xe_ppc_state_t* ppc_state, KernelState* state) {
|
||||||
uint32_t string_ptr = SHIM_GET_ARG_32(0);
|
uint32_t string_ptr = SHIM_GET_ARG_32(0);
|
||||||
|
|
||||||
XELOGD("RtlFreeUnicodeString(%.8X)", string_ptr);
|
XELOGD("RtlFreeUnicodeString(%.8X)", string_ptr);
|
||||||
|
|
||||||
//uint32_t buffer = SHIM_MEM_32(string_ptr + 4);
|
xeRtlFreeUnicodeString(string_ptr);
|
||||||
// TODO(benvanik): free the buffer
|
|
||||||
XELOGE("RtlFreeUnicodeString leaking buffer");
|
|
||||||
|
|
||||||
SHIM_SET_MEM_16(string_ptr + 0, 0);
|
|
||||||
SHIM_SET_MEM_16(string_ptr + 2, 0);
|
|
||||||
SHIM_SET_MEM_32(string_ptr + 4, 0);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
// http://msdn.microsoft.com/en-us/library/ff562969
|
// http://msdn.microsoft.com/en-us/library/ff562969
|
||||||
SHIM_CALL RtlUnicodeStringToAnsiString_shim(
|
X_STATUS xeRtlUnicodeStringToAnsiString(
|
||||||
xe_ppc_state_t* ppc_state, KernelState* state) {
|
uint32_t destination_ptr, uint32_t source_ptr, uint32_t alloc_dest) {
|
||||||
|
KernelState* state = shared_kernel_state_;
|
||||||
|
XEASSERTNOTNULL(state);
|
||||||
|
|
||||||
// NTSTATUS
|
// NTSTATUS
|
||||||
// _Inout_ PANSI_STRING DestinationString,
|
// _Inout_ PANSI_STRING DestinationString,
|
||||||
// _In_ PCUNICODE_STRING SourceString,
|
// _In_ PCUNICODE_STRING SourceString,
|
||||||
// _In_ BOOLEAN AllocateDestinationString
|
// _In_ BOOLEAN AllocateDestinationString
|
||||||
|
|
||||||
|
XELOGE("RtlUnicodeStringToAnsiString not yet implemented");
|
||||||
|
XEASSERTALWAYS();
|
||||||
|
|
||||||
|
if (alloc_dest) {
|
||||||
|
// Allocate a new buffer to place the string into.
|
||||||
|
//IMPL_SET_MEM_32(destination_ptr + 4, buffer_ptr);
|
||||||
|
} else {
|
||||||
|
// Reuse the buffer in the target.
|
||||||
|
//uint32_t buffer_size = IMPL_MEM_16(destination_ptr + 2);
|
||||||
|
}
|
||||||
|
|
||||||
|
return X_STATUS_UNSUCCESSFUL;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
SHIM_CALL RtlUnicodeStringToAnsiString_shim(
|
||||||
|
xe_ppc_state_t* ppc_state, KernelState* state) {
|
||||||
uint32_t destination_ptr = SHIM_GET_ARG_32(0);
|
uint32_t destination_ptr = SHIM_GET_ARG_32(0);
|
||||||
uint32_t source_ptr = SHIM_GET_ARG_32(1);
|
uint32_t source_ptr = SHIM_GET_ARG_32(1);
|
||||||
uint32_t alloc_dest = SHIM_GET_ARG_32(2);
|
uint32_t alloc_dest = SHIM_GET_ARG_32(2);
|
||||||
|
@ -270,26 +327,48 @@ SHIM_CALL RtlUnicodeStringToAnsiString_shim(
|
||||||
XELOGD("RtlUnicodeStringToAnsiString(%.8X, %.8X, %d)",
|
XELOGD("RtlUnicodeStringToAnsiString(%.8X, %.8X, %d)",
|
||||||
destination_ptr, source_ptr, alloc_dest);
|
destination_ptr, source_ptr, alloc_dest);
|
||||||
|
|
||||||
XELOGE("RtlUnicodeStringToAnsiString not yet implemented");
|
X_STATUS result = xeRtlUnicodeStringToAnsiString(
|
||||||
|
destination_ptr, source_ptr, alloc_dest);
|
||||||
|
SHIM_SET_RETURN(result);
|
||||||
|
}
|
||||||
|
|
||||||
if (alloc_dest) {
|
|
||||||
// Allocate a new buffer to place the string into.
|
uint32_t xeRtlImageXexHeaderField(uint32_t xex_header_base_ptr,
|
||||||
//SHIM_SET_MEM_32(destination_ptr + 4, buffer_ptr);
|
uint32_t image_field) {
|
||||||
} else {
|
KernelState* state = shared_kernel_state_;
|
||||||
// Reuse the buffer in the target.
|
XEASSERTNOTNULL(state);
|
||||||
//uint32_t buffer_size = SHIM_MEM_16(destination_ptr + 2);
|
|
||||||
|
// PVOID
|
||||||
|
// PVOID XexHeaderBase
|
||||||
|
// DWORD ImageField
|
||||||
|
|
||||||
|
// NOTE: this is totally faked!
|
||||||
|
// We set the XexExecutableModuleHandle pointer to a block that has at offset
|
||||||
|
// 0x58 a pointer to our XexHeaderBase. If the value passed doesn't match
|
||||||
|
// then die.
|
||||||
|
// The only ImageField I've seen in the wild is
|
||||||
|
// 0x20401 (XEX_HEADER_DEFAULT_HEAP_SIZE), so that's all we'll support.
|
||||||
|
|
||||||
|
XModule* module = NULL;
|
||||||
|
|
||||||
|
// TODO(benvanik): use xex_header_base to dereference this.
|
||||||
|
// Right now we are only concerned with games making this call on their main
|
||||||
|
// module, so this hack is fine.
|
||||||
|
module = state->GetExecutableModule();
|
||||||
|
|
||||||
|
const xe_xex2_header_t* xex_header = module->xex_header();
|
||||||
|
for (size_t n = 0; n < xex_header->header_count; n++) {
|
||||||
|
if (xex_header->headers[n].key == image_field) {
|
||||||
|
return xex_header->headers[n].value;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
SHIM_SET_RETURN(X_STATUS_UNSUCCESSFUL);
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
SHIM_CALL RtlImageXexHeaderField_shim(
|
SHIM_CALL RtlImageXexHeaderField_shim(
|
||||||
xe_ppc_state_t* ppc_state, KernelState* state) {
|
xe_ppc_state_t* ppc_state, KernelState* state) {
|
||||||
// PVOID
|
|
||||||
// PVOID XexHeaderBase
|
|
||||||
// DWORD ImageField
|
|
||||||
|
|
||||||
uint32_t xex_header_base = SHIM_GET_ARG_32(0);
|
uint32_t xex_header_base = SHIM_GET_ARG_32(0);
|
||||||
uint32_t image_field = SHIM_GET_ARG_32(1);
|
uint32_t image_field = SHIM_GET_ARG_32(1);
|
||||||
|
|
||||||
|
@ -304,29 +383,8 @@ SHIM_CALL RtlImageXexHeaderField_shim(
|
||||||
"RtlImageXexHeaderField(%.8X, %.8X)",
|
"RtlImageXexHeaderField(%.8X, %.8X)",
|
||||||
xex_header_base, image_field);
|
xex_header_base, image_field);
|
||||||
|
|
||||||
if (xex_header_base != 0x80101100) {
|
uint32_t result = xeRtlImageXexHeaderField(xex_header_base, image_field);
|
||||||
XELOGE("RtlImageXexHeaderField with non-magic base NOT IMPLEMENTED");
|
SHIM_SET_RETURN(result);
|
||||||
SHIM_SET_RETURN(0);
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
XModule* module = NULL;
|
|
||||||
|
|
||||||
// TODO(benvanik): use xex_header_base to dereference this.
|
|
||||||
// Right now we are only concerned with games making this call on their main
|
|
||||||
// module, so this hack is fine.
|
|
||||||
module = state->GetExecutableModule();
|
|
||||||
|
|
||||||
uint32_t return_value = 0;
|
|
||||||
const xe_xex2_header_t* xex_header = module->xex_header();
|
|
||||||
for (size_t n = 0; n < xex_header->header_count; n++) {
|
|
||||||
if (xex_header->headers[n].key == image_field) {
|
|
||||||
return_value = xex_header->headers[n].value;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
SHIM_SET_RETURN(return_value);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
@ -365,16 +423,14 @@ typedef struct {
|
||||||
|
|
||||||
XEASSERTSTRUCTSIZE(X_RTL_CRITICAL_SECTION, 28);
|
XEASSERTSTRUCTSIZE(X_RTL_CRITICAL_SECTION, 28);
|
||||||
|
|
||||||
SHIM_CALL RtlInitializeCriticalSection_shim(
|
void xeRtlInitializeCriticalSection(uint32_t cs_ptr) {
|
||||||
xe_ppc_state_t* ppc_state, KernelState* state) {
|
KernelState* state = shared_kernel_state_;
|
||||||
|
XEASSERTNOTNULL(state);
|
||||||
|
|
||||||
// VOID
|
// VOID
|
||||||
// _Out_ LPCRITICAL_SECTION lpCriticalSection
|
// _Out_ LPCRITICAL_SECTION lpCriticalSection
|
||||||
|
|
||||||
uint32_t cs_ptr = SHIM_GET_ARG_32(0);
|
X_RTL_CRITICAL_SECTION* cs = (X_RTL_CRITICAL_SECTION*)IMPL_MEM_ADDR(cs_ptr);
|
||||||
|
|
||||||
XELOGD("RtlInitializeCriticalSection(%.8X)", cs_ptr);
|
|
||||||
|
|
||||||
X_RTL_CRITICAL_SECTION* cs = (X_RTL_CRITICAL_SECTION*)SHIM_MEM_ADDR(cs_ptr);
|
|
||||||
cs->unknown00 = 1;
|
cs->unknown00 = 1;
|
||||||
cs->spin_count_div_256 = 0;
|
cs->spin_count_div_256 = 0;
|
||||||
cs->lock_count = -1;
|
cs->lock_count = -1;
|
||||||
|
@ -383,52 +439,68 @@ SHIM_CALL RtlInitializeCriticalSection_shim(
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
SHIM_CALL RtlInitializeCriticalSectionAndSpinCount_shim(
|
SHIM_CALL RtlInitializeCriticalSection_shim(
|
||||||
xe_ppc_state_t* ppc_state, KernelState* state) {
|
xe_ppc_state_t* ppc_state, KernelState* state) {
|
||||||
|
uint32_t cs_ptr = SHIM_GET_ARG_32(0);
|
||||||
|
|
||||||
|
XELOGD("RtlInitializeCriticalSection(%.8X)", cs_ptr);
|
||||||
|
|
||||||
|
xeRtlInitializeCriticalSection(cs_ptr);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
X_STATUS xeRtlInitializeCriticalSectionAndSpinCount(
|
||||||
|
uint32_t cs_ptr, uint32_t spin_count) {
|
||||||
|
KernelState* state = shared_kernel_state_;
|
||||||
|
XEASSERTNOTNULL(state);
|
||||||
|
|
||||||
// NTSTATUS
|
// NTSTATUS
|
||||||
// _Out_ LPCRITICAL_SECTION lpCriticalSection,
|
// _Out_ LPCRITICAL_SECTION lpCriticalSection,
|
||||||
// _In_ DWORD dwSpinCount
|
// _In_ DWORD dwSpinCount
|
||||||
|
|
||||||
uint32_t cs_ptr = SHIM_GET_ARG_32(0);
|
|
||||||
uint32_t spin_count = SHIM_GET_ARG_32(1);
|
|
||||||
|
|
||||||
XELOGD("RtlInitializeCriticalSectionAndSpinCount(%.8X, %d)",
|
|
||||||
cs_ptr, spin_count);
|
|
||||||
|
|
||||||
// Spin count is rouned up to 256 intervals then packed in.
|
// Spin count is rouned up to 256 intervals then packed in.
|
||||||
//uint32_t spin_count_div_256 = (uint32_t)floor(spin_count / 256.0f + 0.5f);
|
//uint32_t spin_count_div_256 = (uint32_t)floor(spin_count / 256.0f + 0.5f);
|
||||||
uint32_t spin_count_div_256 = (spin_count + 255) >> 8;
|
uint32_t spin_count_div_256 = (spin_count + 255) >> 8;
|
||||||
if (spin_count_div_256 > 255)
|
if (spin_count_div_256 > 255) {
|
||||||
{
|
|
||||||
spin_count_div_256 = 255;
|
spin_count_div_256 = 255;
|
||||||
}
|
}
|
||||||
|
|
||||||
X_RTL_CRITICAL_SECTION* cs = (X_RTL_CRITICAL_SECTION*)SHIM_MEM_ADDR(cs_ptr);
|
X_RTL_CRITICAL_SECTION* cs = (X_RTL_CRITICAL_SECTION*)IMPL_MEM_ADDR(cs_ptr);
|
||||||
cs->unknown00 = 1;
|
cs->unknown00 = 1;
|
||||||
cs->spin_count_div_256 = spin_count_div_256;
|
cs->spin_count_div_256 = spin_count_div_256;
|
||||||
cs->lock_count = -1;
|
cs->lock_count = -1;
|
||||||
cs->recursion_count = 0;
|
cs->recursion_count = 0;
|
||||||
cs->owning_thread_id = 0;
|
cs->owning_thread_id = 0;
|
||||||
|
|
||||||
SHIM_SET_RETURN(X_STATUS_SUCCESS);
|
return X_STATUS_SUCCESS;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
SHIM_CALL RtlEnterCriticalSection_shim(
|
SHIM_CALL RtlInitializeCriticalSectionAndSpinCount_shim(
|
||||||
xe_ppc_state_t* ppc_state, KernelState* state) {
|
xe_ppc_state_t* ppc_state, KernelState* state) {
|
||||||
|
uint32_t cs_ptr = SHIM_GET_ARG_32(0);
|
||||||
|
uint32_t spin_count = SHIM_GET_ARG_32(1);
|
||||||
|
|
||||||
|
XELOGD("RtlInitializeCriticalSectionAndSpinCount(%.8X, %d)",
|
||||||
|
cs_ptr, spin_count);
|
||||||
|
|
||||||
|
X_STATUS result = xeRtlInitializeCriticalSectionAndSpinCount(
|
||||||
|
cs_ptr, spin_count);
|
||||||
|
SHIM_SET_RETURN(result);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
// TODO(benvanik): remove the need for passing in thread_id.
|
||||||
|
void xeRtlEnterCriticalSection(uint32_t cs_ptr, uint32_t thread_id) {
|
||||||
|
KernelState* state = shared_kernel_state_;
|
||||||
|
XEASSERTNOTNULL(state);
|
||||||
|
|
||||||
// VOID
|
// VOID
|
||||||
// _Inout_ LPCRITICAL_SECTION lpCriticalSection
|
// _Inout_ LPCRITICAL_SECTION lpCriticalSection
|
||||||
|
|
||||||
uint32_t cs_ptr = SHIM_GET_ARG_32(0);
|
X_RTL_CRITICAL_SECTION* cs = (X_RTL_CRITICAL_SECTION*)IMPL_MEM_ADDR(cs_ptr);
|
||||||
|
|
||||||
XELOGD("RtlEnterCriticalSection(%.8X)", cs_ptr);
|
|
||||||
|
|
||||||
X_RTL_CRITICAL_SECTION* cs = (X_RTL_CRITICAL_SECTION*)SHIM_MEM_ADDR(cs_ptr);
|
|
||||||
|
|
||||||
const uint8_t* thread_state_block = ppc_state->membase + ppc_state->r[13];
|
|
||||||
uint32_t thread_id = XThread::GetCurrentThreadId(thread_state_block);
|
|
||||||
uint32_t spin_wait_remaining = cs->spin_count_div_256 * 256;
|
uint32_t spin_wait_remaining = cs->spin_count_div_256 * 256;
|
||||||
|
|
||||||
spin:
|
spin:
|
||||||
if (xe_atomic_inc_32(&cs->lock_count)) {
|
if (xe_atomic_inc_32(&cs->lock_count)) {
|
||||||
// If this thread already owns the CS increment the recursion count.
|
// If this thread already owns the CS increment the recursion count.
|
||||||
|
@ -454,47 +526,66 @@ spin:
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
SHIM_CALL RtlTryEnterCriticalSection_shim(
|
SHIM_CALL RtlEnterCriticalSection_shim(
|
||||||
xe_ppc_state_t* ppc_state, KernelState* state) {
|
xe_ppc_state_t* ppc_state, KernelState* state) {
|
||||||
// DWORD
|
|
||||||
// _Inout_ LPCRITICAL_SECTION lpCriticalSection
|
|
||||||
|
|
||||||
uint32_t cs_ptr = SHIM_GET_ARG_32(0);
|
uint32_t cs_ptr = SHIM_GET_ARG_32(0);
|
||||||
|
|
||||||
XELOGD("RtlTryEnterCriticalSection(%.8X)", cs_ptr);
|
XELOGD("RtlEnterCriticalSection(%.8X)", cs_ptr);
|
||||||
|
|
||||||
X_RTL_CRITICAL_SECTION* cs = (X_RTL_CRITICAL_SECTION*)SHIM_MEM_ADDR(cs_ptr);
|
|
||||||
|
|
||||||
const uint8_t* thread_state_block = ppc_state->membase + ppc_state->r[13];
|
const uint8_t* thread_state_block = ppc_state->membase + ppc_state->r[13];
|
||||||
uint32_t thread_id = XThread::GetCurrentThreadId(thread_state_block);
|
uint32_t thread_id = XThread::GetCurrentThreadId(thread_state_block);
|
||||||
|
|
||||||
|
xeRtlEnterCriticalSection(cs_ptr, thread_id);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
// TODO(benvanik): remove the need for passing in thread_id.
|
||||||
|
uint32_t xeRtlTryEnterCriticalSection(uint32_t cs_ptr, uint32_t thread_id) {
|
||||||
|
KernelState* state = shared_kernel_state_;
|
||||||
|
XEASSERTNOTNULL(state);
|
||||||
|
|
||||||
|
// DWORD
|
||||||
|
// _Inout_ LPCRITICAL_SECTION lpCriticalSection
|
||||||
|
|
||||||
|
X_RTL_CRITICAL_SECTION* cs = (X_RTL_CRITICAL_SECTION*)IMPL_MEM_ADDR(cs_ptr);
|
||||||
|
|
||||||
if (xe_atomic_cas_32(-1, 0, &cs->lock_count)) {
|
if (xe_atomic_cas_32(-1, 0, &cs->lock_count)) {
|
||||||
// Able to steal the lock right away.
|
// Able to steal the lock right away.
|
||||||
cs->owning_thread_id = thread_id;
|
cs->owning_thread_id = thread_id;
|
||||||
cs->recursion_count = 1;
|
cs->recursion_count = 1;
|
||||||
SHIM_SET_RETURN(1);
|
return 1;
|
||||||
return;
|
|
||||||
} else if (cs->owning_thread_id == thread_id) {
|
} else if (cs->owning_thread_id == thread_id) {
|
||||||
xe_atomic_inc_32(&cs->lock_count);
|
xe_atomic_inc_32(&cs->lock_count);
|
||||||
++cs->recursion_count;
|
++cs->recursion_count;
|
||||||
SHIM_SET_RETURN(1);
|
return 1;
|
||||||
return;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
SHIM_SET_RETURN(0);
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
SHIM_CALL RtlLeaveCriticalSection_shim(
|
SHIM_CALL RtlTryEnterCriticalSection_shim(
|
||||||
xe_ppc_state_t* ppc_state, KernelState* state) {
|
xe_ppc_state_t* ppc_state, KernelState* state) {
|
||||||
|
uint32_t cs_ptr = SHIM_GET_ARG_32(0);
|
||||||
|
|
||||||
|
XELOGD("RtlTryEnterCriticalSection(%.8X)", cs_ptr);
|
||||||
|
|
||||||
|
const uint8_t* thread_state_block = ppc_state->membase + ppc_state->r[13];
|
||||||
|
uint32_t thread_id = XThread::GetCurrentThreadId(thread_state_block);
|
||||||
|
|
||||||
|
uint32_t result = xeRtlTryEnterCriticalSection(cs_ptr, thread_id);
|
||||||
|
SHIM_SET_RETURN(result);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
void xeRtlLeaveCriticalSection(uint32_t cs_ptr) {
|
||||||
|
KernelState* state = shared_kernel_state_;
|
||||||
|
XEASSERTNOTNULL(state);
|
||||||
|
|
||||||
// VOID
|
// VOID
|
||||||
// _Inout_ LPCRITICAL_SECTION lpCriticalSection
|
// _Inout_ LPCRITICAL_SECTION lpCriticalSection
|
||||||
|
|
||||||
uint32_t cs_ptr = SHIM_GET_ARG_32(0);
|
X_RTL_CRITICAL_SECTION* cs = (X_RTL_CRITICAL_SECTION*)IMPL_MEM_ADDR(cs_ptr);
|
||||||
|
|
||||||
XELOGD("RtlLeaveCriticalSection(%.8X)", cs_ptr);
|
|
||||||
|
|
||||||
X_RTL_CRITICAL_SECTION* cs = (X_RTL_CRITICAL_SECTION*)SHIM_MEM_ADDR(cs_ptr);
|
|
||||||
|
|
||||||
// Drop recursion count - if we are still not zero'ed return.
|
// Drop recursion count - if we are still not zero'ed return.
|
||||||
uint32_t recursion_count = --cs->recursion_count;
|
uint32_t recursion_count = --cs->recursion_count;
|
||||||
|
@ -513,6 +604,16 @@ SHIM_CALL RtlLeaveCriticalSection_shim(
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
SHIM_CALL RtlLeaveCriticalSection_shim(
|
||||||
|
xe_ppc_state_t* ppc_state, KernelState* state) {
|
||||||
|
uint32_t cs_ptr = SHIM_GET_ARG_32(0);
|
||||||
|
|
||||||
|
XELOGD("RtlLeaveCriticalSection(%.8X)", cs_ptr);
|
||||||
|
|
||||||
|
xeRtlLeaveCriticalSection(cs_ptr);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
} // namespace xboxkrnl
|
} // namespace xboxkrnl
|
||||||
} // namespace kernel
|
} // namespace kernel
|
||||||
} // namespace xe
|
} // namespace xe
|
||||||
|
|
|
@ -23,13 +23,29 @@ namespace xboxkrnl {
|
||||||
|
|
||||||
uint32_t xeRtlCompareMemory(uint32_t source1_ptr, uint32_t source2_ptr,
|
uint32_t xeRtlCompareMemory(uint32_t source1_ptr, uint32_t source2_ptr,
|
||||||
uint32_t length);
|
uint32_t length);
|
||||||
|
|
||||||
uint32_t xeRtlCompareMemoryUlong(uint32_t source_ptr, uint32_t length,
|
uint32_t xeRtlCompareMemoryUlong(uint32_t source_ptr, uint32_t length,
|
||||||
uint32_t pattern);
|
uint32_t pattern);
|
||||||
|
|
||||||
void xeRtlFillMemoryUlong(uint32_t destination_ptr, uint32_t length,
|
void xeRtlFillMemoryUlong(uint32_t destination_ptr, uint32_t length,
|
||||||
uint32_t pattern);
|
uint32_t pattern);
|
||||||
|
|
||||||
|
void xeRtlInitAnsiString(uint32_t destination_ptr, uint32_t source_ptr);
|
||||||
|
void xeRtlFreeAnsiString(uint32_t string_ptr);
|
||||||
|
|
||||||
|
void xeRtlInitUnicodeString(uint32_t destination_ptr, uint32_t source_ptr);
|
||||||
|
void xeRtlFreeUnicodeString(uint32_t string_ptr);
|
||||||
|
X_STATUS xeRtlUnicodeStringToAnsiString(
|
||||||
|
uint32_t destination_ptr, uint32_t source_ptr, uint32_t alloc_dest);
|
||||||
|
|
||||||
|
uint32_t xeRtlImageXexHeaderField(uint32_t xex_header_base_ptr,
|
||||||
|
uint32_t image_field);
|
||||||
|
|
||||||
|
void xeRtlInitializeCriticalSection(uint32_t cs_ptr);
|
||||||
|
X_STATUS xeRtlInitializeCriticalSectionAndSpinCount(
|
||||||
|
uint32_t cs_ptr, uint32_t spin_count);
|
||||||
|
void xeRtlEnterCriticalSection(uint32_t cs_ptr, uint32_t thread_id);
|
||||||
|
uint32_t xeRtlTryEnterCriticalSection(uint32_t cs_ptr, uint32_t thread_id);
|
||||||
|
void xeRtlLeaveCriticalSection(uint32_t cs_ptr);
|
||||||
|
|
||||||
|
|
||||||
} // namespace xboxkrnl
|
} // namespace xboxkrnl
|
||||||
} // namespace kernel
|
} // namespace kernel
|
||||||
|
|
|
@ -49,6 +49,11 @@ namespace kernel {
|
||||||
|
|
||||||
#define IMPL_MEM_ADDR(a) (a==0?NULL:xe_memory_addr(state->memory(), a))
|
#define IMPL_MEM_ADDR(a) (a==0?NULL:xe_memory_addr(state->memory(), a))
|
||||||
|
|
||||||
|
#define IMPL_MEM_16(a) (uint16_t)XEGETUINT16BE(IMPL_MEM_ADDR(a));
|
||||||
|
#define IMPL_MEM_32(a) (uint32_t)XEGETUINT32BE(IMPL_MEM_ADDR(a));
|
||||||
|
#define IMPL_SET_MEM_16(a, v) (*(uint16_t*)IMPL_MEM_ADDR(a)) = XESWAP16(v)
|
||||||
|
#define IMPL_SET_MEM_32(a, v) (*(uint32_t*)IMPL_MEM_ADDR(a)) = XESWAP32(v)
|
||||||
|
|
||||||
|
|
||||||
} // namespace kernel
|
} // namespace kernel
|
||||||
} // namespace xe
|
} // namespace xe
|
||||||
|
|
Loading…
Reference in New Issue