mirror of
https://github.com/momo5502/emulator.git
synced 2026-01-19 03:33:56 +00:00
129 lines
3.3 KiB
C++
129 lines
3.3 KiB
C++
#include "syscall_dispatcher.hpp"
|
|
#include "syscall_utils.hpp"
|
|
|
|
static void serialize(utils::buffer_serializer& buffer, const syscall_handler_entry& obj)
|
|
{
|
|
buffer.write(obj.name);
|
|
}
|
|
|
|
static void deserialize(utils::buffer_deserializer& buffer, syscall_handler_entry& obj)
|
|
{
|
|
buffer.read(obj.name);
|
|
obj.handler = nullptr;
|
|
}
|
|
|
|
void syscall_dispatcher::serialize(utils::buffer_serializer& buffer) const
|
|
{
|
|
buffer.write_map(this->handlers_);
|
|
}
|
|
|
|
void syscall_dispatcher::deserialize(utils::buffer_deserializer& buffer)
|
|
{
|
|
buffer.read_map(this->handlers_);
|
|
this->add_handlers();
|
|
}
|
|
|
|
|
|
void syscall_dispatcher::setup(const exported_symbols& ntdll_exports, const exported_symbols& win32u_exports)
|
|
{
|
|
this->handlers_ = {};
|
|
|
|
const auto ntdll_syscalls = find_syscalls(ntdll_exports);
|
|
const auto win32u_syscalls = find_syscalls(win32u_exports);
|
|
|
|
map_syscalls(this->handlers_, ntdll_syscalls, 0);
|
|
map_syscalls(this->handlers_, win32u_syscalls, 0x1000);
|
|
|
|
this->add_handlers();
|
|
}
|
|
|
|
void syscall_dispatcher::add_handlers()
|
|
{
|
|
std::map<std::string, syscall_handler> handler_mapping{};
|
|
|
|
syscall_dispatcher::add_handlers(handler_mapping);
|
|
|
|
for (auto& entry : this->handlers_)
|
|
{
|
|
const auto handler = handler_mapping.find(entry.second.name);
|
|
if (handler == handler_mapping.end())
|
|
{
|
|
continue;
|
|
}
|
|
|
|
entry.second.handler = handler->second;
|
|
|
|
#ifndef NDEBUG
|
|
handler_mapping.erase(handler);
|
|
#endif
|
|
}
|
|
}
|
|
|
|
void syscall_dispatcher::dispatch(windows_emulator& win_emu)
|
|
{
|
|
auto& emu = win_emu.emu();
|
|
auto& context = win_emu.process();
|
|
|
|
const auto address = emu.read_instruction_pointer();
|
|
const auto syscall_id = emu.reg<uint32_t>(x64_register::eax);
|
|
|
|
|
|
const syscall_context c{win_emu, emu, context, true};
|
|
|
|
try
|
|
{
|
|
const auto entry = this->handlers_.find(syscall_id);
|
|
if (entry == this->handlers_.end())
|
|
{
|
|
printf("Unknown syscall: 0x%X\n", syscall_id);
|
|
c.emu.reg<uint64_t>(x64_register::rax, STATUS_NOT_SUPPORTED);
|
|
c.emu.stop();
|
|
return;
|
|
}
|
|
|
|
if (!entry->second.handler)
|
|
{
|
|
printf("Unimplemented syscall: %s - 0x%X\n", entry->second.name.c_str(), syscall_id);
|
|
c.emu.reg<uint64_t>(x64_register::rax, STATUS_NOT_SUPPORTED);
|
|
c.emu.stop();
|
|
return;
|
|
}
|
|
|
|
const auto* mod = context.module_manager.find_by_address(address);
|
|
if (mod != context.ntdll && mod != context.win32u)
|
|
{
|
|
win_emu.logger.print(color::blue, "Executing inline syscall: %s (0x%X) at 0x%llX (%s)\n",
|
|
entry->second.name.c_str(),
|
|
syscall_id,
|
|
address, mod ? mod->name.c_str() : "<N/A>");
|
|
}
|
|
else
|
|
{
|
|
win_emu.logger.print(color::dark_gray, "Executing syscall: %s (0x%X) at 0x%llX\n",
|
|
entry->second.name.c_str(),
|
|
syscall_id,
|
|
address);
|
|
}
|
|
|
|
entry->second.handler(c);
|
|
}
|
|
catch (std::exception& e)
|
|
{
|
|
printf("Syscall threw an exception: %X (0x%llX) - %s\n", syscall_id, address, e.what());
|
|
emu.reg<uint64_t>(x64_register::rax, STATUS_UNSUCCESSFUL);
|
|
emu.stop();
|
|
}
|
|
catch (...)
|
|
{
|
|
printf("Syscall threw an unknown exception: %X (0x%llX)\n", syscall_id, address);
|
|
emu.reg<uint64_t>(x64_register::rax, STATUS_UNSUCCESSFUL);
|
|
emu.stop();
|
|
}
|
|
}
|
|
|
|
syscall_dispatcher::syscall_dispatcher(const exported_symbols& ntdll_exports,
|
|
const exported_symbols& win32u_exports)
|
|
{
|
|
this->setup(ntdll_exports, win32u_exports);
|
|
}
|