2 * Win32 WOW Generic Thunk API
4 * Copyright 1999 Ulrich Weigand
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2.1 of the License, or (at your option) any later version.
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
22 #include "wine/port.h"
27 #include "wine/winbase16.h"
35 #include "kernel_private.h"
36 #include "kernel16_private.h"
37 #include "wine/exception.h"
38 #include "wine/debug.h"
40 WINE_DEFAULT_DEBUG_CHANNEL(thunk);
41 WINE_DECLARE_DEBUG_CHANNEL(relay);
42 WINE_DECLARE_DEBUG_CHANNEL(snoop);
45 * These are the 16-bit side WOW routines. They reside in wownt16.h
46 * in the SDK; since we don't support Win16 source code anyway, I've
47 * placed them here for compilation with Wine ...
50 DWORD WINAPI GetVDMPointer32W16(SEGPTR,UINT16);
52 DWORD WINAPI LoadLibraryEx32W16(LPCSTR,DWORD,DWORD);
53 DWORD WINAPI GetProcAddress32W16(DWORD,LPCSTR);
54 DWORD WINAPI FreeLibrary32W16(DWORD);
56 #define CPEX_DEST_STDCALL 0x00000000L
57 #define CPEX_DEST_CDECL 0x80000000L
62 /* symbols exported from relay16.s */
63 extern DWORD WINAPI wine_call_to_16( FARPROC16 target, DWORD cbArgs, PEXCEPTION_HANDLER handler );
64 extern void WINAPI wine_call_to_16_regs( CONTEXT86 *context, DWORD cbArgs, PEXCEPTION_HANDLER handler );
65 extern void __wine_call_to_16_ret(void);
66 extern void CALL32_CBClient_Ret();
67 extern void CALL32_CBClientEx_Ret();
68 extern void DPMI_PendingEventCheck();
69 extern void DPMI_PendingEventCheck_Cleanup();
70 extern void DPMI_PendingEventCheck_Return();
71 extern BYTE __wine_call16_start[];
72 extern BYTE __wine_call16_end[];
74 extern void RELAY16_InitDebugLists(void);
76 static SEGPTR call16_ret_addr; /* segptr to __wine_call_to_16_ret routine */
78 static WORD dpmi_checker_selector;
79 static DWORD dpmi_checker_offset_call;
80 static DWORD dpmi_checker_offset_cleanup;
81 static DWORD dpmi_checker_offset_return;
83 /***********************************************************************
86 BOOL WOWTHUNK_Init(void)
88 /* allocate the code selector for CallTo16 routines */
90 WORD codesel = wine_ldt_alloc_entries(1);
92 if (!codesel) return FALSE;
93 wine_ldt_set_base( &entry, __wine_call16_start );
94 wine_ldt_set_limit( &entry, (BYTE *)(&CallTo16_TebSelector + 1) - __wine_call16_start - 1 );
95 wine_ldt_set_flags( &entry, WINE_LDT_FLAGS_CODE | WINE_LDT_FLAGS_32BIT );
96 wine_ldt_set_entry( codesel, &entry );
98 /* Patch the return addresses for CallTo16 routines */
100 CallTo16_DataSelector = wine_get_ds();
101 call16_ret_addr = MAKESEGPTR( codesel, (BYTE *)__wine_call_to_16_ret - __wine_call16_start );
102 CALL32_CBClient_RetAddr =
103 MAKESEGPTR( codesel, (BYTE *)CALL32_CBClient_Ret - __wine_call16_start );
104 CALL32_CBClientEx_RetAddr =
105 MAKESEGPTR( codesel, (BYTE *)CALL32_CBClientEx_Ret - __wine_call16_start );
107 /* Prepare selector and offsets for DPMI event checking. */
108 dpmi_checker_selector = codesel;
109 dpmi_checker_offset_call = (BYTE *)DPMI_PendingEventCheck - __wine_call16_start;
110 dpmi_checker_offset_cleanup = (BYTE *)DPMI_PendingEventCheck_Cleanup - __wine_call16_start;
111 dpmi_checker_offset_return = (BYTE *)DPMI_PendingEventCheck_Return - __wine_call16_start;
113 if (TRACE_ON(relay) || TRACE_ON(snoop)) RELAY16_InitDebugLists();
119 /*************************************************************
122 * Fix a selector load that caused an exception if it's in the
125 static BOOL fix_selector( CONTEXT *context )
128 BYTE *instr = (BYTE *)context->Eip;
130 if (instr < __wine_call16_start || instr >= __wine_call16_end) return FALSE;
133 while (*instr == 0x66 || *instr == 0x67) instr++;
137 case 0x07: /* pop es */
138 case 0x17: /* pop ss */
139 case 0x1f: /* pop ds */
141 case 0x0f: /* extended instruction */
144 case 0xa1: /* pop fs */
145 case 0xa9: /* pop gs */
154 stack = wine_ldt_get_ptr( context->SegSs, context->Esp );
155 TRACE( "fixing up selector %x for pop instruction\n", *stack );
161 /*************************************************************
164 * Make resuming the context check for pending DPMI events
165 * before the original context is restored. This is required
166 * because DPMI events are asynchronous, they are blocked while
167 * Wine 32-bit code is being executed and we want to prevent
168 * a race when returning back to 16-bit or 32-bit DPMI context.
170 static void insert_event_check( CONTEXT *context )
172 char *stack = wine_ldt_get_ptr( context->SegSs, context->Esp );
174 /* don't do event check while in system code */
175 if (wine_ldt_is_system(context->SegCs))
178 if(context->SegCs == dpmi_checker_selector &&
179 context->Eip >= dpmi_checker_offset_call &&
180 context->Eip <= dpmi_checker_offset_cleanup)
183 * Nested call. Stack will be preserved.
186 else if(context->SegCs == dpmi_checker_selector &&
187 context->Eip == dpmi_checker_offset_return)
190 * Nested call. We have just finished popping the fs
191 * register, lets put it back into stack.
194 stack -= sizeof(WORD);
195 *(WORD*)stack = context->SegFs;
202 * Call is not nested.
203 * Push modified registers into stack.
204 * These will be popped by the assembler stub.
207 stack -= sizeof(DWORD);
208 *(DWORD*)stack = context->EFlags;
210 stack -= sizeof(DWORD);
211 *(DWORD*)stack = context->SegCs;
213 stack -= sizeof(DWORD);
214 *(DWORD*)stack = context->Eip;
216 stack -= sizeof(WORD);
217 *(WORD*)stack = context->SegFs;
223 * Modify the context so that we jump into assembler stub.
224 * TEB access is made easier by providing the stub
225 * with the correct fs register value.
228 context->SegCs = dpmi_checker_selector;
229 context->Eip = dpmi_checker_offset_call;
230 context->SegFs = wine_get_fs();
234 /*************************************************************
237 * Handler for exceptions occurring in 16-bit code.
239 static DWORD call16_handler( EXCEPTION_RECORD *record, EXCEPTION_REGISTRATION_RECORD *frame,
240 CONTEXT *context, EXCEPTION_REGISTRATION_RECORD **pdispatcher )
242 if (record->ExceptionFlags & (EH_UNWINDING | EH_EXIT_UNWIND))
244 /* unwinding: restore the stack pointer in the TEB, and leave the Win16 mutex */
245 STACK32FRAME *frame32 = (STACK32FRAME *)((char *)frame - offsetof(STACK32FRAME,frame));
246 NtCurrentTeb()->WOW32Reserved = (void *)frame32->frame16;
249 else if (record->ExceptionCode == EXCEPTION_ACCESS_VIOLATION ||
250 record->ExceptionCode == EXCEPTION_PRIV_INSTRUCTION)
252 if (wine_ldt_is_system(context->SegCs))
254 if (fix_selector( context )) return ExceptionContinueExecution;
259 DWORD ret = INSTR_EmulateInstruction( record, context );
262 * Insert check for pending DPMI events. Note that this
263 * check must be inserted after instructions have been
264 * emulated because the instruction emulation requires
265 * original CS:IP and the emulation may change TEB.dpmi_vif.
267 if(NtCurrentTeb()->dpmi_vif)
268 insert_event_check( context );
270 if (ret != ExceptionContinueSearch) return ret;
272 /* check for Win16 __GP handler */
273 if ((gpHandler = HasGPHandler16( MAKESEGPTR( context->SegCs, context->Eip ) )))
275 WORD *stack = wine_ldt_get_ptr( context->SegSs, context->Esp );
276 *--stack = context->SegCs;
277 *--stack = context->Eip;
279 if (!IS_SELECTOR_32BIT(context->SegSs))
280 context->Esp = MAKELONG( LOWORD(context->Esp - 2*sizeof(WORD)),
281 HIWORD(context->Esp) );
283 context->Esp -= 2*sizeof(WORD);
285 context->SegCs = SELECTOROF( gpHandler );
286 context->Eip = OFFSETOF( gpHandler );
287 return ExceptionContinueExecution;
291 else if (record->ExceptionCode == EXCEPTION_VM86_STI)
293 insert_event_check( context );
295 return ExceptionContinueSearch;
299 /*************************************************************
302 * Handler for exceptions occurring in vm86 code.
304 static DWORD vm86_handler( EXCEPTION_RECORD *record, EXCEPTION_REGISTRATION_RECORD *frame,
305 CONTEXT *context, EXCEPTION_REGISTRATION_RECORD **pdispatcher )
307 if (record->ExceptionFlags & (EH_UNWINDING | EH_EXIT_UNWIND))
308 return ExceptionContinueSearch;
310 if (record->ExceptionCode == EXCEPTION_ACCESS_VIOLATION ||
311 record->ExceptionCode == EXCEPTION_PRIV_INSTRUCTION)
313 return INSTR_EmulateInstruction( record, context );
316 return ExceptionContinueSearch;
322 BOOL WOWTHUNK_Init(void)
327 #endif /* __i386__ */
331 * 32-bit WOW routines (in WOW32, but actually forwarded to KERNEL32)
334 /**********************************************************************
335 * K32WOWGetDescriptor (KERNEL32.70)
337 BOOL WINAPI K32WOWGetDescriptor( SEGPTR segptr, LPLDT_ENTRY ldtent )
339 return GetThreadSelectorEntry( GetCurrentThread(),
340 segptr >> 16, ldtent );
343 /**********************************************************************
344 * K32WOWGetVDMPointer (KERNEL32.56)
346 LPVOID WINAPI K32WOWGetVDMPointer( DWORD vp, DWORD dwBytes, BOOL fProtectedMode )
348 /* FIXME: add size check too */
350 if ( fProtectedMode )
353 return DOSMEM_MapRealToLinear( vp );
356 /**********************************************************************
357 * K32WOWGetVDMPointerFix (KERNEL32.68)
359 LPVOID WINAPI K32WOWGetVDMPointerFix( DWORD vp, DWORD dwBytes, BOOL fProtectedMode )
362 * Hmmm. According to the docu, we should call:
364 * GlobalFix16( SELECTOROF(vp) );
366 * But this is unnecessary under Wine, as we never move global
367 * memory segments in linear memory anyway.
369 * (I'm not so sure what we are *supposed* to do if
370 * fProtectedMode is TRUE, anyway ...)
373 return K32WOWGetVDMPointer( vp, dwBytes, fProtectedMode );
376 /**********************************************************************
377 * K32WOWGetVDMPointerUnfix (KERNEL32.69)
379 VOID WINAPI K32WOWGetVDMPointerUnfix( DWORD vp )
382 * See above why we don't call:
384 * GlobalUnfix16( SELECTOROF(vp) );
389 /**********************************************************************
390 * K32WOWGlobalAlloc16 (KERNEL32.59)
392 WORD WINAPI K32WOWGlobalAlloc16( WORD wFlags, DWORD cb )
394 return (WORD)GlobalAlloc16( wFlags, cb );
397 /**********************************************************************
398 * K32WOWGlobalFree16 (KERNEL32.62)
400 WORD WINAPI K32WOWGlobalFree16( WORD hMem )
402 return (WORD)GlobalFree16( (HGLOBAL16)hMem );
405 /**********************************************************************
406 * K32WOWGlobalUnlock16 (KERNEL32.61)
408 BOOL WINAPI K32WOWGlobalUnlock16( WORD hMem )
410 return (BOOL)GlobalUnlock16( (HGLOBAL16)hMem );
413 /**********************************************************************
414 * K32WOWGlobalAllocLock16 (KERNEL32.63)
416 DWORD WINAPI K32WOWGlobalAllocLock16( WORD wFlags, DWORD cb, WORD *phMem )
418 WORD hMem = K32WOWGlobalAlloc16( wFlags, cb );
419 if (phMem) *phMem = hMem;
421 return K32WOWGlobalLock16( hMem );
424 /**********************************************************************
425 * K32WOWGlobalLockSize16 (KERNEL32.65)
427 DWORD WINAPI K32WOWGlobalLockSize16( WORD hMem, PDWORD pcb )
430 *pcb = GlobalSize16( (HGLOBAL16)hMem );
432 return K32WOWGlobalLock16( hMem );
435 /**********************************************************************
436 * K32WOWGlobalUnlockFree16 (KERNEL32.64)
438 WORD WINAPI K32WOWGlobalUnlockFree16( DWORD vpMem )
440 if ( !K32WOWGlobalUnlock16( HIWORD(vpMem) ) )
443 return K32WOWGlobalFree16( HIWORD(vpMem) );
447 /**********************************************************************
448 * K32WOWYield16 (KERNEL32.66)
450 VOID WINAPI K32WOWYield16( void )
453 * This does the right thing for both Win16 and Win32 tasks.
454 * More or less, at least :-/
459 /**********************************************************************
460 * K32WOWDirectedYield16 (KERNEL32.67)
462 VOID WINAPI K32WOWDirectedYield16( WORD htask16 )
465 * Argh. Our scheduler doesn't like DirectedYield by Win32
466 * tasks at all. So we do hope that this routine is indeed
467 * only ever called by Win16 tasks that have thunked up ...
469 DirectedYield16( (HTASK16)htask16 );
473 /***********************************************************************
474 * K32WOWHandle32 (KERNEL32.57)
476 HANDLE WINAPI K32WOWHandle32( WORD handle, WOW_HANDLE_TYPE type )
487 case WOW_TYPE_HBITMAP:
488 case WOW_TYPE_HBRUSH:
489 case WOW_TYPE_HPALETTE:
491 case WOW_TYPE_HACCEL:
492 return (HANDLE)(ULONG_PTR)handle;
494 case WOW_TYPE_HMETAFILE:
495 FIXME( "conversion of metafile handles not supported yet\n" );
496 return (HANDLE)(ULONG_PTR)handle;
499 return ((TDB *)GlobalLock16(handle))->teb->ClientId.UniqueThread;
501 case WOW_TYPE_FULLHWND:
502 FIXME( "conversion of full window handles not supported yet\n" );
503 return (HANDLE)(ULONG_PTR)handle;
506 ERR( "handle 0x%04x of unknown type %d\n", handle, type );
507 return (HANDLE)(ULONG_PTR)handle;
511 /***********************************************************************
512 * K32WOWHandle16 (KERNEL32.58)
514 WORD WINAPI K32WOWHandle16( HANDLE handle, WOW_HANDLE_TYPE type )
525 case WOW_TYPE_HBITMAP:
526 case WOW_TYPE_HBRUSH:
527 case WOW_TYPE_HPALETTE:
529 case WOW_TYPE_HACCEL:
530 case WOW_TYPE_FULLHWND:
531 if ( HIWORD(handle ) )
532 ERR( "handle %p of type %d has non-zero HIWORD\n", handle, type );
533 return LOWORD(handle);
535 case WOW_TYPE_HMETAFILE:
536 FIXME( "conversion of metafile handles not supported yet\n" );
537 return LOWORD(handle);
540 return TASK_GetTaskFromThread( (DWORD)handle );
543 ERR( "handle %p of unknown type %d\n", handle, type );
544 return LOWORD(handle);
548 /**********************************************************************
549 * K32WOWCallback16Ex (KERNEL32.55)
551 BOOL WINAPI K32WOWCallback16Ex( DWORD vpfn16, DWORD dwFlags,
552 DWORD cbArgs, LPVOID pArgs, LPDWORD pdwRetCode )
556 * Arguments must be prepared in the correct order by the caller
557 * (both for PASCAL and CDECL calling convention), so we simply
558 * copy them to the 16-bit stack ...
560 char *stack = (char *)CURRENT_STACK16 - cbArgs;
562 memcpy( stack, pArgs, cbArgs );
564 if (dwFlags & (WCB16_REGS|WCB16_REGS_LONG))
566 CONTEXT *context = (CONTEXT *)pdwRetCode;
570 DWORD count = cbArgs / sizeof(WORD);
571 WORD * wstack = (WORD *)stack;
573 DPRINTF("%04x:CallTo16(func=%04x:%04x,ds=%04x",
574 GetCurrentThreadId(),
575 context->SegCs, LOWORD(context->Eip), context->SegDs );
576 while (count) DPRINTF( ",%04x", wstack[--count] );
577 DPRINTF(") ss:sp=%04x:%04x",
578 SELECTOROF(NtCurrentTeb()->WOW32Reserved), OFFSETOF(NtCurrentTeb()->WOW32Reserved) );
579 DPRINTF(" ax=%04x bx=%04x cx=%04x dx=%04x si=%04x di=%04x bp=%04x es=%04x fs=%04x\n",
580 (WORD)context->Eax, (WORD)context->Ebx, (WORD)context->Ecx,
581 (WORD)context->Edx, (WORD)context->Esi, (WORD)context->Edi,
582 (WORD)context->Ebp, (WORD)context->SegEs, (WORD)context->SegFs );
583 SYSLEVEL_CheckNotLevel( 2 );
586 if (context->EFlags & 0x00020000) /* v86 mode */
588 EXCEPTION_REGISTRATION_RECORD frame;
589 frame.Handler = vm86_handler;
590 __wine_push_frame( &frame );
591 __wine_enter_vm86( context );
592 __wine_pop_frame( &frame );
596 /* push return address */
597 if (dwFlags & WCB16_REGS_LONG)
599 stack -= sizeof(DWORD);
600 *((DWORD *)stack) = HIWORD(call16_ret_addr);
601 stack -= sizeof(DWORD);
602 *((DWORD *)stack) = LOWORD(call16_ret_addr);
603 cbArgs += 2 * sizeof(DWORD);
607 stack -= sizeof(SEGPTR);
608 *((SEGPTR *)stack) = call16_ret_addr;
609 cbArgs += sizeof(SEGPTR);
613 * Start call by checking for pending events.
614 * Note that wine_call_to_16_regs overwrites context stack
615 * pointer so we may modify it here without a problem.
617 if (NtCurrentTeb()->dpmi_vif)
619 context->SegSs = wine_get_ds();
620 context->Esp = (DWORD)stack;
621 insert_event_check( context );
622 cbArgs += (DWORD)stack - context->Esp;
626 wine_call_to_16_regs( context, cbArgs, call16_handler );
632 DPRINTF("%04x:RetFrom16() ss:sp=%04x:%04x ",
633 GetCurrentThreadId(), SELECTOROF(NtCurrentTeb()->WOW32Reserved),
634 OFFSETOF(NtCurrentTeb()->WOW32Reserved));
635 DPRINTF(" ax=%04x bx=%04x cx=%04x dx=%04x bp=%04x sp=%04x\n",
636 (WORD)context->Eax, (WORD)context->Ebx, (WORD)context->Ecx,
637 (WORD)context->Edx, (WORD)context->Ebp, (WORD)context->Esp );
638 SYSLEVEL_CheckNotLevel( 2 );
647 DWORD count = cbArgs / sizeof(WORD);
648 WORD * wstack = (WORD *)stack;
650 DPRINTF("%04x:CallTo16(func=%04x:%04x,ds=%04x",
651 GetCurrentThreadId(), HIWORD(vpfn16), LOWORD(vpfn16),
652 SELECTOROF(NtCurrentTeb()->WOW32Reserved) );
653 while (count) DPRINTF( ",%04x", wstack[--count] );
654 DPRINTF(") ss:sp=%04x:%04x\n",
655 SELECTOROF(NtCurrentTeb()->WOW32Reserved), OFFSETOF(NtCurrentTeb()->WOW32Reserved) );
656 SYSLEVEL_CheckNotLevel( 2 );
659 /* push return address */
660 stack -= sizeof(SEGPTR);
661 *((SEGPTR *)stack) = call16_ret_addr;
662 cbArgs += sizeof(SEGPTR);
665 * Actually, we should take care whether the called routine cleans up
666 * its stack or not. Fortunately, our wine_call_to_16 core doesn't rely on
667 * the callee to do so; after the routine has returned, the 16-bit
668 * stack pointer is always reset to the position it had before.
671 ret = wine_call_to_16( (FARPROC16)vpfn16, cbArgs, call16_handler );
672 if (pdwRetCode) *pdwRetCode = ret;
677 DPRINTF("%04x:RetFrom16() ss:sp=%04x:%04x retval=%08x\n",
678 GetCurrentThreadId(), SELECTOROF(NtCurrentTeb()->WOW32Reserved),
679 OFFSETOF(NtCurrentTeb()->WOW32Reserved), ret);
680 SYSLEVEL_CheckNotLevel( 2 );
684 assert(0); /* cannot call to 16-bit on non-Intel architectures */
685 #endif /* __i386__ */
687 return TRUE; /* success */
690 /**********************************************************************
691 * K32WOWCallback16 (KERNEL32.54)
693 DWORD WINAPI K32WOWCallback16( DWORD vpfn16, DWORD dwParam )
697 if ( !K32WOWCallback16Ex( vpfn16, WCB16_PASCAL,
698 sizeof(DWORD), &dwParam, &ret ) )
706 * 16-bit WOW routines (in KERNEL)
709 /**********************************************************************
710 * GetVDMPointer32W (KERNEL.516)
712 DWORD WINAPI GetVDMPointer32W16( SEGPTR vp, UINT16 fMode )
714 GlobalPageLock16(GlobalHandle16(SELECTOROF(vp)));
715 return (DWORD)K32WOWGetVDMPointer( vp, 0, (DWORD)fMode );
718 /***********************************************************************
719 * LoadLibraryEx32W (KERNEL.513)
721 DWORD WINAPI LoadLibraryEx32W16( LPCSTR lpszLibFile, DWORD hFile, DWORD dwFlags )
730 SetLastError(ERROR_INVALID_PARAMETER);
734 /* if the file cannot be found, call LoadLibraryExA anyway, since it might be
735 a builtin module. This case is handled in MODULE_LoadLibraryExA */
737 if ((p = strrchr( lpszLibFile, '.' )) && !strchr( p, '\\' )) /* got an extension */
739 if (OpenFile16( lpszLibFile, &ofs, OF_EXIST ) != HFILE_ERROR16)
740 lpszLibFile = ofs.szPathName;
744 char buffer[MAX_PATH+4];
745 strcpy( buffer, lpszLibFile );
746 strcat( buffer, ".dll" );
747 if (OpenFile16( buffer, &ofs, OF_EXIST ) != HFILE_ERROR16)
748 lpszLibFile = ofs.szPathName;
751 ReleaseThunkLock( &mutex_count );
752 hModule = LoadLibraryExA( lpszLibFile, (HANDLE)hFile, dwFlags );
753 RestoreThunkLock( mutex_count );
755 return (DWORD)hModule;
758 /***********************************************************************
759 * GetProcAddress32W (KERNEL.515)
761 DWORD WINAPI GetProcAddress32W16( DWORD hModule, LPCSTR lpszProc )
763 return (DWORD)GetProcAddress( (HMODULE)hModule, lpszProc );
766 /***********************************************************************
767 * FreeLibrary32W (KERNEL.514)
769 DWORD WINAPI FreeLibrary32W16( DWORD hLibModule )
774 ReleaseThunkLock( &mutex_count );
775 retv = FreeLibrary( (HMODULE)hLibModule );
776 RestoreThunkLock( mutex_count );
781 /**********************************************************************
784 static DWORD WOW_CallProc32W16( FARPROC proc32, DWORD nrofargs, DWORD *args )
789 ReleaseThunkLock( &mutex_count );
792 * FIXME: If ( nrofargs & CPEX_DEST_CDECL ) != 0, we should call a
793 * 32-bit CDECL routine ...
796 if (!proc32) ret = 0;
797 else switch (nrofargs)
799 case 0: ret = proc32();
801 case 1: ret = proc32(args[0]);
803 case 2: ret = proc32(args[0],args[1]);
805 case 3: ret = proc32(args[0],args[1],args[2]);
807 case 4: ret = proc32(args[0],args[1],args[2],args[3]);
809 case 5: ret = proc32(args[0],args[1],args[2],args[3],args[4]);
811 case 6: ret = proc32(args[0],args[1],args[2],args[3],args[4],args[5]);
813 case 7: ret = proc32(args[0],args[1],args[2],args[3],args[4],args[5],args[6]);
815 case 8: ret = proc32(args[0],args[1],args[2],args[3],args[4],args[5],args[6],args[7]);
817 case 9: ret = proc32(args[0],args[1],args[2],args[3],args[4],args[5],args[6],args[7],args[8]);
819 case 10:ret = proc32(args[0],args[1],args[2],args[3],args[4],args[5],args[6],args[7],args[8],args[9]);
821 case 11:ret = proc32(args[0],args[1],args[2],args[3],args[4],args[5],args[6],args[7],args[8],args[9],args[10]);
823 case 12:ret = proc32(args[0],args[1],args[2],args[3],args[4],args[5],args[6],args[7],args[8],args[9],args[10],args[11]);
825 case 13:ret = proc32(args[0],args[1],args[2],args[3],args[4],args[5],args[6],args[7],args[8],args[9],args[10],args[11],args[12]);
827 case 14:ret = proc32(args[0],args[1],args[2],args[3],args[4],args[5],args[6],args[7],args[8],args[9],args[10],args[11],args[12],args[13]);
829 case 15:ret = proc32(args[0],args[1],args[2],args[3],args[4],args[5],args[6],args[7],args[8],args[9],args[10],args[11],args[12],args[13],args[14]);
832 /* FIXME: should go up to 32 arguments */
833 ERR("Unsupported number of arguments %d, please report.\n",nrofargs);
838 RestoreThunkLock( mutex_count );
840 TRACE("returns %08x\n",ret);
844 /**********************************************************************
845 * CallProc32W (KERNEL.517)
847 DWORD WINAPIV CallProc32W16( DWORD nrofargs, DWORD argconvmask, FARPROC proc32, VA_LIST16 valist )
852 TRACE("(%d,%d,%p args[",nrofargs,argconvmask,proc32);
854 for (i=0;i<nrofargs;i++)
856 if (argconvmask & (1<<i))
858 SEGPTR ptr = VA_ARG16( valist, SEGPTR );
859 /* pascal convention, have to reverse the arguments order */
860 args[nrofargs - i - 1] = (DWORD)MapSL(ptr);
861 TRACE("%08x(%p),",ptr,MapSL(ptr));
865 DWORD arg = VA_ARG16( valist, DWORD );
866 /* pascal convention, have to reverse the arguments order */
867 args[nrofargs - i - 1] = arg;
873 /* POP nrofargs DWORD arguments and 3 DWORD parameters */
874 stack16_pop( (3 + nrofargs) * sizeof(DWORD) );
876 return WOW_CallProc32W16( proc32, nrofargs, args );
879 /**********************************************************************
880 * _CallProcEx32W (KERNEL.518)
882 DWORD WINAPIV CallProcEx32W16( DWORD nrofargs, DWORD argconvmask, FARPROC proc32, VA_LIST16 valist )
887 TRACE("(%d,%d,%p args[",nrofargs,argconvmask,proc32);
889 for (i=0;i<nrofargs;i++)
891 if (argconvmask & (1<<i))
893 SEGPTR ptr = VA_ARG16( valist, SEGPTR );
894 args[i] = (DWORD)MapSL(ptr);
895 TRACE("%08x(%p),",ptr,MapSL(ptr));
899 DWORD arg = VA_ARG16( valist, DWORD );
905 return WOW_CallProc32W16( proc32, nrofargs, args );
909 /**********************************************************************
910 * WOW16Call (KERNEL.500)
915 DWORD WINAPIV WOW16Call(WORD x, WORD y, WORD z, VA_LIST16 args)
919 FIXME("(0x%04x,0x%04x,%d),calling (",x,y,z);
921 for (i=0;i<x/2;i++) {
922 WORD a = VA_ARG16(args,WORD);
925 calladdr = VA_ARG16(args,DWORD);
926 stack16_pop( 3*sizeof(WORD) + x + sizeof(DWORD) );
927 DPRINTF(") calling address was 0x%08x\n",calladdr);