diff --git a/src/windows_emulator/syscalls.cpp b/src/windows_emulator/syscalls.cpp index 4499db6a..8dbdfa44 100644 --- a/src/windows_emulator/syscalls.cpp +++ b/src/windows_emulator/syscalls.cpp @@ -229,6 +229,11 @@ namespace return STATUS_NOT_SUPPORTED; } + NTSTATUS handle_NtOpenKeyEx() + { + return STATUS_NOT_SUPPORTED; + } + NTSTATUS handle_NtSetInformationThread(const syscall_context& c, const uint64_t /*thread_handle*/, const THREADINFOCLASS info_class, const uint64_t /*thread_information*/, @@ -1367,6 +1372,12 @@ namespace return STATUS_NOT_SUPPORTED; } + NTSTATUS handle_NtUserDisplayConfigGetDeviceInfo() + { + puts("NtUserDisplayConfigGetDeviceInfo not supported"); + return STATUS_NOT_SUPPORTED; + } + NTSTATUS handle_NtGdiInit2(const syscall_context& c) { c.proc.peb.access([&](PEB& peb) @@ -1725,6 +1736,8 @@ void syscall_dispatcher::add_handlers() add_handler(NtAlpcSendWaitReceivePort); add_handler(NtGdiInit2); add_handler(NtUserGetThreadState); + add_handler(NtOpenKeyEx); + add_handler(NtUserDisplayConfigGetDeviceInfo); #undef add_handler diff --git a/src/windows_emulator/windows_emulator.cpp b/src/windows_emulator/windows_emulator.cpp index af4ca0fc..35b1f877 100644 --- a/src/windows_emulator/windows_emulator.cpp +++ b/src/windows_emulator/windows_emulator.cpp @@ -551,7 +551,6 @@ void windows_emulator::setup_hooks() const auto ip = this->emu().read_instruction_pointer(); const char* name = this->process().module_manager.find_name(ip); - if (type == memory_violation_type::protection) { printf("Protection violation: %llX (%zX) - %s at %llX (%s)\n", address, size, permission.c_str(), ip, name);