2 * COPYRIGHT: See COPYING in the top level directory
3 * PROJECT: ReactOS kernel
4 * PURPOSE: Native User stubs
5 * FILE: subsys/win32k/ntuser/stubs.c
6 * PROGRAMER: Casper S. Hornstrup (chorns@users.sourceforge.net)
8 * 04-06-2001 CSH Created
17 NtUserAssociateInputContext(
29 NtUserAttachThreadInput(
35 PETHREAD Thread
, ThreadTo
;
36 PTHREADINFO pti
, ptiTo
;
40 Status
= PsLookupThreadByThreadId((HANDLE
)idAttach
, &Thread
);
41 if (!NT_SUCCESS(Status
))
43 SetLastWin32Error(ERROR_INVALID_PARAMETER
);
46 Status
= PsLookupThreadByThreadId((HANDLE
)idAttachTo
, &ThreadTo
);
47 if (!NT_SUCCESS(Status
))
49 SetLastWin32Error(ERROR_INVALID_PARAMETER
);
50 ObDereferenceObject(Thread
);
54 pti
= PsGetThreadWin32Thread(Thread
);
55 ptiTo
= PsGetThreadWin32Thread(ThreadTo
);
56 ObDereferenceObject(Thread
);
57 ObDereferenceObject(ThreadTo
);
59 Ret
= UserAttachThreadInput( pti
, ptiTo
, fAttach
);
67 // Works like BitBlt, http://msdn.microsoft.com/en-us/library/ms532278(VS.85).aspx
84 Ret
= NtGdiBitBlt( hdc
,
114 NtUserConvertMemHandle(
125 NtUserCreateLocalMemHandle(
138 NtUserDdeGetQualityOfService(
141 OUT PSECURITY_QUALITY_OF_SERVICE pqosPrev
)
164 NtUserDdeSetQualityOfService(
166 IN PSECURITY_QUALITY_OF_SERVICE pqosNew
,
167 OUT PSECURITY_QUALITY_OF_SERVICE pqosPrev
)
191 NtUserDrawAnimatedRects(
214 NtUserExcludeUpdateRgn(
240 NtUserGetControlBrush(
252 * Called from PaintRect, works almost like wine PaintRect16 but returns hBrush.
256 NtUserGetControlColor(
260 UINT CtlMsg
) // Wine PaintRect: WM_CTLCOLORMSGBOX + hbrush
283 NtUserGetMouseMovePointsEx(
285 LPMOUSEMOVEPOINT lppt
,
286 LPMOUSEMOVEPOINT lpptBuf
,
290 UserEnterExclusive();
292 if ((cbSize
!= sizeof(MOUSEMOVEPOINT
)) || (nBufPoints
< 0) || (nBufPoints
> 64))
295 SetLastWin32Error(ERROR_INVALID_PARAMETER
);
301 ProbeForRead(lppt
, cbSize
, 1);
302 ProbeForWrite(lpptBuf
, cbSize
, 1);
304 _SEH2_EXCEPT(EXCEPTION_EXECUTE_HANDLER
)
306 SetLastNtError(_SEH2_GetExceptionCode());
307 SetLastWin32Error(ERROR_NOACCESS
);
312 Call a subfunction of GetMouseMovePointsEx!
315 case GMMP_USE_DISPLAY_POINTS:
316 case GMMP_USE_HIGH_RESOLUTION_POINTS:
319 SetLastWin32Error(GMMP_ERR_POINT_NOT_FOUND);
320 return GMMP_ERR_POINT_NOT_FOUND;
332 NtUserImpersonateDdeClientWindow(
343 NtUserInitializeClientPfnArrays(
344 PPFNCLIENT pfnClientA
,
345 PPFNCLIENT pfnClientW
,
346 PPFNCLIENTWORKER pfnClientWorker
,
349 NTSTATUS Status
= STATUS_SUCCESS
;
350 DPRINT("Enter NtUserInitializeClientPfnArrays User32 0x%x\n",hmodUser
);
352 if (ClientPfnInit
) return Status
;
354 UserEnterExclusive();
358 ProbeForRead( pfnClientA
, sizeof(PFNCLIENT
), 1);
359 ProbeForRead( pfnClientW
, sizeof(PFNCLIENT
), 1);
360 ProbeForRead( pfnClientWorker
, sizeof(PFNCLIENTWORKER
), 1);
361 RtlCopyMemory(&gpsi
->apfnClientA
, pfnClientA
, sizeof(PFNCLIENT
));
362 RtlCopyMemory(&gpsi
->apfnClientW
, pfnClientW
, sizeof(PFNCLIENT
));
363 RtlCopyMemory(&gpsi
->apfnClientWorker
, pfnClientWorker
, sizeof(PFNCLIENTWORKER
));
365 //// FIXME! HAX! Temporary until server side is finished.
366 //// Copy the client side procs for now.
367 RtlCopyMemory(&gpsi
->aStoCidPfn
, pfnClientW
, sizeof(gpsi
->aStoCidPfn
));
369 hModClient
= hmodUser
;
370 ClientPfnInit
= TRUE
;
372 _SEH2_EXCEPT(EXCEPTION_EXECUTE_HANDLER
)
374 Status
=_SEH2_GetExceptionCode();
378 if (!NT_SUCCESS(Status
))
380 DPRINT1("Failed reading Client Pfns from user space.\n");
381 SetLastNtError(Status
);
411 NtUserLockWorkStation(VOID
)
420 NtUserMNDragLeave(VOID
)
440 NtUserModifyUserStartupInfoFlags(
451 NtUserNotifyIMEStatus(
463 NtUserQueryUserCounters(
477 NtUserRegisterTasklist(
487 NtUserSetConsoleReserveKeys(
537 IN CONST INT
*lpaElements
,
538 IN CONST COLORREF
*lpaRgbValues
,
542 NTSTATUS Status
= STATUS_SUCCESS
;
543 UserEnterExclusive();
546 ProbeForRead(lpaElements
,
549 ProbeForRead(lpaRgbValues
,
552 // Developers: We are thread locked and calling gdi.
553 Ret
= IntSetSysColors(cElements
, (INT
*)lpaElements
, (COLORREF
*)lpaRgbValues
);
555 _SEH2_EXCEPT(EXCEPTION_EXECUTE_HANDLER
)
557 Status
= _SEH2_GetExceptionCode();
560 if (!NT_SUCCESS(Status
))
562 SetLastNtError(Status
);
567 UserPostMessage(HWND_BROADCAST
, WM_SYSCOLORCHANGE
, 0, 0);
575 NtUserSetThreadState(
586 NtUserTrackMouseEvent(
587 LPTRACKMOUSEEVENT lpEventTrack
)
597 NtUserUpdateInputContext(
609 NtUserUpdateInstance(
621 NtUserUserHandleGrantAccess(
622 IN HANDLE hUserHandle
,
633 NtUserWaitForMsgAndEvent(
643 NtUserWin32PoolAllocationStats(
658 NtUserYieldTask(VOID
)
668 NtUserCheckImeHotKey(
678 NtUserConsoleControl(
689 NtUserCreateInputContext(
698 NtUserDestroyInputContext(
707 NtUserDisableThreadIme(
716 NtUserGetAppImeLevel(
745 NtUserGetRawInputBuffer(
756 NtUserGetRawInputData(
769 NtUserGetRawInputDeviceInfo(
782 NtUserGetRawInputDeviceList(
783 PRAWINPUTDEVICELIST pRawInputDeviceList
,
793 NtUserGetRegisteredRawInputDevices(
794 PRAWINPUTDEVICE pRawInputDevices
,
804 NtUserHardErrorControl(
817 UINT cmd
, // Wine SW_ commands
826 NtUserNotifyProcessCreate(
849 NtUserProcessConnect(
851 PUSERCONNECT pUserConnect
,
854 NTSTATUS Status
= STATUS_SUCCESS
;
855 DPRINT("NtUserProcessConnect\n");
856 if (pUserConnect
&& ( Size
== sizeof(USERCONNECT
) ))
858 PPROCESSINFO W32Process
;
861 W32Process
= PsGetCurrentProcessWin32Process();
864 pUserConnect
->siClient
.psi
= gpsi
;
865 pUserConnect
->siClient
.aheList
= gHandleTable
;
866 pUserConnect
->siClient
.ulSharedDelta
= (ULONG_PTR
)W32Process
->HeapMappings
.KernelMapping
-
867 (ULONG_PTR
)W32Process
->HeapMappings
.UserMapping
;
869 _SEH2_EXCEPT(EXCEPTION_EXECUTE_HANDLER
)
871 Status
= _SEH2_GetExceptionCode();
874 if (!NT_SUCCESS(Status
))
876 SetLastNtError(Status
);
881 return STATUS_UNSUCCESSFUL
;
886 NtUserQueryInformationThread(
899 NtUserQueryInputContext(
909 NtUserRealInternalGetMessage(
923 NtUserRealWaitMessageEx(
933 NtUserRegisterUserApiHook(
934 PUNICODE_STRING m_dllname1
,
935 PUNICODE_STRING m_funname1
,
939 UserEnterExclusive();
947 NtUserRegisterRawInputDevices(
948 IN PCRAWINPUTDEVICE pRawInputDevices
,
949 IN UINT uiNumDevices
,
958 NtUserResolveDesktop(
970 NtUserSetAppImeLevel(
989 NtUserSetInformationProcess(
1001 NtUserSetInformationThread(IN HANDLE ThreadHandle
,
1002 IN USERTHREADINFOCLASS ThreadInformationClass
,
1003 IN PVOID ThreadInformation
,
1004 IN ULONG ThreadInformationLength
)
1007 if (ThreadInformationClass
== UserThreadInitiateShutdown
)
1009 DPRINT1("Shutdown initiated\n");
1011 else if (ThreadInformationClass
== UserThreadEndShutdown
)
1013 DPRINT1("Shutdown ended\n");
1020 return STATUS_SUCCESS
;
1025 NtUserSetThreadLayoutHandles(
1035 NtUserSoundSentry(VOID
)
1043 NtUserTestForInteractiveUser(
1050 /* http://www.cyber-ta.org/releases/malware-analysis/public/SOURCES/b47155634ccb2c30630da7e3666d3d07/b47155634ccb2c30630da7e3666d3d07.trace.html#NtUserGetIconSize */
1080 NtUserUnregisterUserApiHook(VOID
)
1088 NtUserGetLayeredWindowAttributes(
1100 NtUserValidateTimerCallback(
1106 PWINDOW_OBJECT Window
= NULL
;
1112 Window
= UserGetWindowObject(hWnd
);
1113 if (!Window
|| !Window
->Wnd
)
1117 Ret
= ValidateTimerCallback(PsGetCurrentThreadWin32Thread(), Window
, wParam
, lParam
);
1126 NtUserRemoteConnect(
1137 NtUserRemoteRedrawRectangle(
1149 NtUserRemoteRedrawScreen(VOID
)
1157 NtUserRemoteStopScreenUpdates(VOID
)
1165 NtUserCtxDisplayIOCtl(