diff --git a/src/windows-emulator/syscalls.cpp b/src/windows-emulator/syscalls.cpp index 1a126832..5ac9f715 100644 --- a/src/windows-emulator/syscalls.cpp +++ b/src/windows-emulator/syscalls.cpp @@ -350,6 +350,7 @@ namespace syscalls uint64_t token_information, ULONG token_information_length, emulator_object return_length); NTSTATUS handle_NtQuerySecurityAttributesToken(); + NTSTATUS handle_NtAdjustPrivilegesToken(); NTSTATUS handle_NtQueryPerformanceCounter(const syscall_context& c, const emulator_object performance_counter, const emulator_object performance_frequency) @@ -1067,6 +1068,7 @@ void syscall_dispatcher::add_handlers(std::map& ha add_handler(NtOpenProcessToken); add_handler(NtOpenProcessTokenEx); add_handler(NtQuerySecurityAttributesToken); + add_handler(NtAdjustPrivilegesToken); add_handler(NtQueryLicenseValue); add_handler(NtTestAlert); add_handler(NtContinue); diff --git a/src/windows-emulator/syscalls/process.cpp b/src/windows-emulator/syscalls/process.cpp index 5c79929d..ad41c16b 100644 --- a/src/windows-emulator/syscalls/process.cpp +++ b/src/windows-emulator/syscalls/process.cpp @@ -184,7 +184,8 @@ namespace syscalls || info_class == ProcessDefaultHardErrorMode // || info_class == ProcessRaiseUMExceptionOnInvalidHandleClose // || info_class == ProcessDynamicFunctionTableInformation // - || info_class == ProcessPriorityBoost) + || info_class == ProcessPriorityBoost // + || info_class == ProcessPriorityClassEx) { return STATUS_SUCCESS; } diff --git a/src/windows-emulator/syscalls/token.cpp b/src/windows-emulator/syscalls/token.cpp index 00146eb8..3fbdb0b0 100644 --- a/src/windows-emulator/syscalls/token.cpp +++ b/src/windows-emulator/syscalls/token.cpp @@ -366,4 +366,10 @@ namespace syscalls // puts("NtQuerySecurityAttributesToken not supported"); return STATUS_NOT_SUPPORTED; } + + NTSTATUS handle_NtAdjustPrivilegesToken() + { + // puts("NtQuerySecurityAttributesToken not supported"); + return STATUS_NOT_SUPPORTED; + } }