From 51034297bf0e08a86ed6edd11631bdd9daf98afc Mon Sep 17 00:00:00 2001 From: redthing1 Date: Mon, 5 Jan 2026 18:43:04 -0800 Subject: [PATCH] object syscalls: wire up the new syscalls --- src/windows-emulator/syscalls.cpp | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/src/windows-emulator/syscalls.cpp b/src/windows-emulator/syscalls.cpp index c3bf4699..32775ee5 100644 --- a/src/windows-emulator/syscalls.cpp +++ b/src/windows-emulator/syscalls.cpp @@ -155,8 +155,11 @@ namespace syscalls NTSTATUS handle_NtQueryObject(const syscall_context& c, handle handle, OBJECT_INFORMATION_CLASS object_information_class, emulator_pointer object_information, ULONG object_information_length, emulator_object return_length); + NTSTATUS handle_NtCompareObjects(const syscall_context& c, handle first, handle second); NTSTATUS handle_NtWaitForMultipleObjects(const syscall_context& c, ULONG count, emulator_object handles, WAIT_TYPE wait_type, BOOLEAN alertable, emulator_object timeout); + NTSTATUS handle_NtWaitForMultipleObjects32(const syscall_context& c, ULONG count, emulator_object handles, WAIT_TYPE wait_type, + BOOLEAN alertable, emulator_object timeout); NTSTATUS handle_NtWaitForSingleObject(const syscall_context& c, handle h, BOOLEAN alertable, emulator_object timeout); NTSTATUS handle_NtSetInformationObject(); NTSTATUS handle_NtQuerySecurityObject(const syscall_context& c, handle /*h*/, SECURITY_INFORMATION /*security_information*/, @@ -1151,8 +1154,10 @@ void syscall_dispatcher::add_handlers(std::map& ha add_handler(NtGetCurrentProcessorNumberEx); add_handler(NtGetCurrentProcessorNumber); add_handler(NtQueryObject); + add_handler(NtCompareObjects); add_handler(NtQueryAttributesFile); add_handler(NtWaitForMultipleObjects); + add_handler(NtWaitForMultipleObjects32); add_handler(NtCreateMutant); add_handler(NtReleaseMutant); add_handler(NtDuplicateToken);