2019-06-11 12:22:45 +02:00
|
|
|
/*
|
|
|
|
* Unit test suite for the virtual memory APIs.
|
|
|
|
*
|
|
|
|
* Copyright 2019 Remi Bernon for CodeWeavers
|
|
|
|
*
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
|
|
* License as published by the Free Software Foundation; either
|
|
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
* Lesser General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
|
|
* License along with this library; if not, write to the Free Software
|
|
|
|
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <stdio.h>
|
|
|
|
|
|
|
|
#include "ntstatus.h"
|
|
|
|
#define WIN32_NO_STATUS
|
|
|
|
#include "windef.h"
|
|
|
|
#include "winternl.h"
|
|
|
|
#include "wine/test.h"
|
2020-02-13 12:11:24 +01:00
|
|
|
#include "ddk/wdm.h"
|
2019-06-11 12:22:45 +02:00
|
|
|
|
2019-06-14 17:32:45 +02:00
|
|
|
static unsigned int page_size;
|
|
|
|
|
2020-08-19 23:23:00 +02:00
|
|
|
static DWORD64 (WINAPI *pGetEnabledXStateFeatures)(void);
|
2019-06-14 17:32:45 +02:00
|
|
|
static NTSTATUS (WINAPI *pRtlCreateUserStack)(SIZE_T, SIZE_T, ULONG, SIZE_T, SIZE_T, INITIAL_TEB *);
|
2020-08-19 23:23:00 +02:00
|
|
|
static ULONG64 (WINAPI *pRtlGetEnabledExtendedFeatures)(ULONG64);
|
2019-06-14 17:32:45 +02:00
|
|
|
static NTSTATUS (WINAPI *pRtlFreeUserStack)(void *);
|
2019-06-11 12:22:46 +02:00
|
|
|
static BOOL (WINAPI *pIsWow64Process)(HANDLE, PBOOL);
|
2020-10-17 03:44:17 +02:00
|
|
|
static NTSTATUS (WINAPI *pNtAllocateVirtualMemoryEx)(HANDLE, PVOID *, SIZE_T *, ULONG, ULONG,
|
|
|
|
MEM_EXTENDED_PARAMETER *, ULONG);
|
2019-08-01 10:07:41 +02:00
|
|
|
static const BOOL is_win64 = sizeof(void*) != sizeof(int);
|
2019-06-11 12:22:46 +02:00
|
|
|
|
2020-02-13 12:11:24 +01:00
|
|
|
static SYSTEM_BASIC_INFORMATION sbi;
|
|
|
|
|
2019-06-20 16:05:36 +02:00
|
|
|
static HANDLE create_target_process(const char *arg)
|
|
|
|
{
|
|
|
|
char **argv;
|
|
|
|
char cmdline[MAX_PATH];
|
|
|
|
PROCESS_INFORMATION pi;
|
|
|
|
BOOL ret;
|
|
|
|
STARTUPINFOA si = { 0 };
|
|
|
|
si.cb = sizeof(si);
|
|
|
|
|
|
|
|
winetest_get_mainargs(&argv);
|
|
|
|
sprintf(cmdline, "%s %s %s", argv[0], argv[1], arg);
|
|
|
|
ret = CreateProcessA(NULL, cmdline, NULL, NULL, FALSE, 0, NULL, NULL, &si, &pi);
|
|
|
|
ok(ret, "error: %u\n", GetLastError());
|
|
|
|
ret = CloseHandle(pi.hThread);
|
|
|
|
ok(ret, "error %u\n", GetLastError());
|
|
|
|
return pi.hProcess;
|
|
|
|
}
|
|
|
|
|
|
|
|
static UINT_PTR get_zero_bits(UINT_PTR p)
|
|
|
|
{
|
|
|
|
UINT_PTR z = 0;
|
|
|
|
|
|
|
|
#ifdef _WIN64
|
|
|
|
if (p >= 0xffffffff)
|
|
|
|
return (~(UINT_PTR)0) >> get_zero_bits(p >> 32);
|
|
|
|
#endif
|
|
|
|
|
2019-08-01 10:07:43 +02:00
|
|
|
if (p == 0) return 0;
|
2019-06-20 16:05:36 +02:00
|
|
|
while ((p >> (31 - z)) != 1) z++;
|
|
|
|
return z;
|
|
|
|
}
|
|
|
|
|
2019-08-01 10:07:43 +02:00
|
|
|
static UINT_PTR get_zero_bits_mask(ULONG_PTR z)
|
|
|
|
{
|
|
|
|
if (z >= 32)
|
|
|
|
{
|
|
|
|
z = get_zero_bits(z);
|
|
|
|
#ifdef _WIN64
|
|
|
|
if (z >= 32) return z;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
return (~(UINT32)0) >> z;
|
|
|
|
}
|
|
|
|
|
2019-06-20 16:05:34 +02:00
|
|
|
static void test_NtAllocateVirtualMemory(void)
|
2019-06-11 12:22:45 +02:00
|
|
|
{
|
|
|
|
void *addr1, *addr2;
|
|
|
|
NTSTATUS status;
|
|
|
|
SIZE_T size;
|
2019-08-01 10:07:40 +02:00
|
|
|
ULONG_PTR zero_bits;
|
2019-06-11 12:22:46 +02:00
|
|
|
BOOL is_wow64;
|
2019-06-11 12:22:45 +02:00
|
|
|
|
2019-08-01 10:07:41 +02:00
|
|
|
if (!pIsWow64Process || !pIsWow64Process(NtCurrentProcess(), &is_wow64)) is_wow64 = FALSE;
|
|
|
|
|
2019-06-11 12:22:45 +02:00
|
|
|
/* simple allocation should success */
|
|
|
|
size = 0x1000;
|
|
|
|
addr1 = NULL;
|
|
|
|
status = NtAllocateVirtualMemory(NtCurrentProcess(), &addr1, 0, &size,
|
|
|
|
MEM_RESERVE | MEM_COMMIT, PAGE_EXECUTE_READWRITE);
|
|
|
|
ok(status == STATUS_SUCCESS, "NtAllocateVirtualMemory returned %08x\n", status);
|
|
|
|
|
|
|
|
/* allocation conflicts because of 64k align */
|
|
|
|
size = 0x1000;
|
|
|
|
addr2 = (char *)addr1 + 0x1000;
|
|
|
|
status = NtAllocateVirtualMemory(NtCurrentProcess(), &addr2, 0, &size,
|
|
|
|
MEM_RESERVE | MEM_COMMIT, PAGE_EXECUTE_READWRITE);
|
|
|
|
ok(status == STATUS_CONFLICTING_ADDRESSES, "NtAllocateVirtualMemory returned %08x\n", status);
|
|
|
|
|
|
|
|
/* it should conflict, even when zero_bits is explicitly set */
|
|
|
|
size = 0x1000;
|
|
|
|
addr2 = (char *)addr1 + 0x1000;
|
|
|
|
status = NtAllocateVirtualMemory(NtCurrentProcess(), &addr2, 12, &size,
|
|
|
|
MEM_RESERVE | MEM_COMMIT, PAGE_EXECUTE_READWRITE);
|
|
|
|
ok(status == STATUS_CONFLICTING_ADDRESSES, "NtAllocateVirtualMemory returned %08x\n", status);
|
|
|
|
|
2019-06-11 12:22:46 +02:00
|
|
|
/* 1 zero bits should zero 63-31 upper bits */
|
|
|
|
size = 0x1000;
|
|
|
|
addr2 = NULL;
|
|
|
|
zero_bits = 1;
|
2019-06-20 16:05:34 +02:00
|
|
|
status = NtAllocateVirtualMemory(NtCurrentProcess(), &addr2, zero_bits, &size,
|
2019-08-01 10:07:42 +02:00
|
|
|
MEM_RESERVE | MEM_COMMIT | MEM_TOP_DOWN,
|
|
|
|
PAGE_READWRITE);
|
2019-06-11 12:22:46 +02:00
|
|
|
ok(status == STATUS_SUCCESS || status == STATUS_NO_MEMORY ||
|
|
|
|
broken(status == STATUS_INVALID_PARAMETER_3) /* winxp */,
|
|
|
|
"NtAllocateVirtualMemory returned %08x\n", status);
|
|
|
|
if (status == STATUS_SUCCESS)
|
|
|
|
{
|
|
|
|
ok(((UINT_PTR)addr2 >> (32 - zero_bits)) == 0,
|
|
|
|
"NtAllocateVirtualMemory returned address: %p\n", addr2);
|
|
|
|
|
|
|
|
size = 0;
|
|
|
|
status = NtFreeVirtualMemory(NtCurrentProcess(), &addr2, &size, MEM_RELEASE);
|
|
|
|
ok(status == STATUS_SUCCESS, "NtFreeVirtualMemory return %08x, addr2: %p\n", status, addr2);
|
|
|
|
}
|
|
|
|
|
|
|
|
for (zero_bits = 2; zero_bits <= 20; zero_bits++)
|
|
|
|
{
|
|
|
|
size = 0x1000;
|
|
|
|
addr2 = NULL;
|
|
|
|
status = NtAllocateVirtualMemory(NtCurrentProcess(), &addr2, zero_bits, &size,
|
2019-08-01 10:07:42 +02:00
|
|
|
MEM_RESERVE | MEM_COMMIT | MEM_TOP_DOWN,
|
|
|
|
PAGE_READWRITE);
|
2019-06-11 12:22:46 +02:00
|
|
|
ok(status == STATUS_SUCCESS || status == STATUS_NO_MEMORY ||
|
|
|
|
broken(zero_bits == 20 && status == STATUS_CONFLICTING_ADDRESSES) /* w1064v1809 */,
|
2019-08-01 10:07:40 +02:00
|
|
|
"NtAllocateVirtualMemory with %d zero_bits returned %08x\n", (int)zero_bits, status);
|
2019-06-11 12:22:46 +02:00
|
|
|
if (status == STATUS_SUCCESS)
|
|
|
|
{
|
|
|
|
ok(((UINT_PTR)addr2 >> (32 - zero_bits)) == 0,
|
2019-08-01 10:07:40 +02:00
|
|
|
"NtAllocateVirtualMemory with %d zero_bits returned address %p\n", (int)zero_bits, addr2);
|
2019-06-11 12:22:46 +02:00
|
|
|
|
|
|
|
size = 0;
|
|
|
|
status = NtFreeVirtualMemory(NtCurrentProcess(), &addr2, &size, MEM_RELEASE);
|
|
|
|
ok(status == STATUS_SUCCESS, "NtFreeVirtualMemory return %08x, addr2: %p\n", status, addr2);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-06-11 12:22:45 +02:00
|
|
|
/* 21 zero bits never succeeds */
|
|
|
|
size = 0x1000;
|
|
|
|
addr2 = NULL;
|
|
|
|
status = NtAllocateVirtualMemory(NtCurrentProcess(), &addr2, 21, &size,
|
|
|
|
MEM_RESERVE | MEM_COMMIT, PAGE_EXECUTE_READWRITE);
|
|
|
|
ok(status == STATUS_NO_MEMORY || status == STATUS_INVALID_PARAMETER,
|
|
|
|
"NtAllocateVirtualMemory returned %08x\n", status);
|
|
|
|
if (status == STATUS_SUCCESS)
|
|
|
|
{
|
|
|
|
size = 0;
|
|
|
|
status = NtFreeVirtualMemory(NtCurrentProcess(), &addr2, &size, MEM_RELEASE);
|
|
|
|
ok(status == STATUS_SUCCESS, "NtFreeVirtualMemory return %08x, addr2: %p\n", status, addr2);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* 22 zero bits is invalid */
|
|
|
|
size = 0x1000;
|
|
|
|
addr2 = NULL;
|
|
|
|
status = NtAllocateVirtualMemory(NtCurrentProcess(), &addr2, 22, &size,
|
|
|
|
MEM_RESERVE | MEM_COMMIT, PAGE_EXECUTE_READWRITE);
|
|
|
|
ok(status == STATUS_INVALID_PARAMETER_3 || status == STATUS_INVALID_PARAMETER,
|
|
|
|
"NtAllocateVirtualMemory returned %08x\n", status);
|
|
|
|
|
2019-08-01 10:07:43 +02:00
|
|
|
/* zero bits > 31 should be considered as a leading zeroes bitmask on 64bit and WoW64 */
|
2019-06-11 12:22:46 +02:00
|
|
|
size = 0x1000;
|
|
|
|
addr2 = NULL;
|
2019-08-01 10:07:43 +02:00
|
|
|
zero_bits = 0x1aaaaaaa;
|
2019-06-11 12:22:46 +02:00
|
|
|
status = NtAllocateVirtualMemory(NtCurrentProcess(), &addr2, zero_bits, &size,
|
2019-08-01 10:07:42 +02:00
|
|
|
MEM_RESERVE | MEM_COMMIT | MEM_TOP_DOWN,
|
|
|
|
PAGE_READWRITE);
|
2019-06-11 12:22:46 +02:00
|
|
|
|
2019-08-01 10:07:41 +02:00
|
|
|
if (!is_win64 && !is_wow64)
|
2019-06-11 12:22:46 +02:00
|
|
|
{
|
|
|
|
ok(status == STATUS_INVALID_PARAMETER_3, "NtAllocateVirtualMemory returned %08x\n", status);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
ok(status == STATUS_SUCCESS || status == STATUS_NO_MEMORY,
|
|
|
|
"NtAllocateVirtualMemory returned %08x\n", status);
|
|
|
|
if (status == STATUS_SUCCESS)
|
|
|
|
{
|
2019-08-01 10:07:43 +02:00
|
|
|
ok(((UINT_PTR)addr2 & ~get_zero_bits_mask(zero_bits)) == 0 &&
|
|
|
|
((UINT_PTR)addr2 & ~zero_bits) != 0, /* only the leading zeroes matter */
|
2019-06-11 12:22:46 +02:00
|
|
|
"NtAllocateVirtualMemory returned address %p\n", addr2);
|
|
|
|
|
|
|
|
size = 0;
|
|
|
|
status = NtFreeVirtualMemory(NtCurrentProcess(), &addr2, &size, MEM_RELEASE);
|
|
|
|
ok(status == STATUS_SUCCESS, "NtFreeVirtualMemory return %08x, addr2: %p\n", status, addr2);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-06-11 12:22:45 +02:00
|
|
|
/* AT_ROUND_TO_PAGE flag is not supported for NtAllocateVirtualMemory */
|
|
|
|
size = 0x1000;
|
|
|
|
addr2 = (char *)addr1 + 0x1000;
|
|
|
|
status = NtAllocateVirtualMemory(NtCurrentProcess(), &addr2, 0, &size,
|
|
|
|
MEM_RESERVE | MEM_COMMIT | AT_ROUND_TO_PAGE, PAGE_EXECUTE_READWRITE);
|
|
|
|
ok(status == STATUS_INVALID_PARAMETER_5 || status == STATUS_INVALID_PARAMETER,
|
|
|
|
"NtAllocateVirtualMemory returned %08x\n", status);
|
|
|
|
|
|
|
|
size = 0;
|
|
|
|
status = NtFreeVirtualMemory(NtCurrentProcess(), &addr1, &size, MEM_RELEASE);
|
|
|
|
ok(status == STATUS_SUCCESS, "NtFreeVirtualMemory failed\n");
|
2020-10-17 03:44:17 +02:00
|
|
|
|
|
|
|
if (!pNtAllocateVirtualMemoryEx)
|
|
|
|
{
|
|
|
|
win_skip("NtAllocateVirtualMemoryEx() is missing\n");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* simple allocation should succeed */
|
|
|
|
size = 0x1000;
|
|
|
|
addr1 = NULL;
|
|
|
|
status = pNtAllocateVirtualMemoryEx(NtCurrentProcess(), &addr1, &size, MEM_RESERVE | MEM_COMMIT,
|
|
|
|
PAGE_EXECUTE_READWRITE, NULL, 0);
|
|
|
|
ok(status == STATUS_SUCCESS, "NtAllocateVirtualMemoryEx returned %08x\n", status);
|
|
|
|
|
|
|
|
/* specifying a count of >0 with NULL parameters should fail */
|
|
|
|
status = pNtAllocateVirtualMemoryEx(NtCurrentProcess(), &addr1, &size, MEM_RESERVE | MEM_COMMIT,
|
|
|
|
PAGE_EXECUTE_READWRITE, NULL, 1);
|
|
|
|
ok(status == STATUS_INVALID_PARAMETER, "NtAllocateVirtualMemoryEx returned %08x\n", status);
|
2019-06-11 12:22:45 +02:00
|
|
|
}
|
|
|
|
|
2019-06-14 17:32:45 +02:00
|
|
|
static void test_RtlCreateUserStack(void)
|
|
|
|
{
|
|
|
|
IMAGE_NT_HEADERS *nt = RtlImageNtHeader( NtCurrentTeb()->Peb->ImageBaseAddress );
|
|
|
|
SIZE_T default_commit = nt->OptionalHeader.SizeOfStackCommit;
|
|
|
|
SIZE_T default_reserve = nt->OptionalHeader.SizeOfStackReserve;
|
|
|
|
INITIAL_TEB stack = {0};
|
|
|
|
unsigned int i;
|
|
|
|
NTSTATUS ret;
|
|
|
|
|
|
|
|
struct
|
|
|
|
{
|
|
|
|
SIZE_T commit, reserve, commit_align, reserve_align, expect_commit, expect_reserve;
|
|
|
|
}
|
|
|
|
tests[] =
|
|
|
|
{
|
|
|
|
{ 0, 0, 1, 1, default_commit, default_reserve},
|
|
|
|
{ 0x2000, 0, 1, 1, 0x2000, default_reserve},
|
|
|
|
{ 0x4000, 0, 1, 1, 0x4000, default_reserve},
|
|
|
|
{ 0, 0x200000, 1, 1, default_commit, 0x200000},
|
|
|
|
{ 0x4000, 0x200000, 1, 1, 0x4000, 0x200000},
|
|
|
|
{0x100000, 0x100000, 1, 1, 0x100000, 0x100000},
|
|
|
|
{ 0x20000, 0x20000, 1, 1, 0x20000, 0x100000},
|
|
|
|
|
|
|
|
{ 0, 0x110000, 1, 1, default_commit, 0x110000},
|
|
|
|
{ 0, 0x110000, 1, 0x40000, default_commit, 0x140000},
|
|
|
|
{ 0, 0x140000, 1, 0x40000, default_commit, 0x140000},
|
|
|
|
{ 0x11000, 0x140000, 1, 0x40000, 0x11000, 0x140000},
|
|
|
|
{ 0x11000, 0x140000, 0x4000, 0x40000, 0x14000, 0x140000},
|
|
|
|
{ 0, 0, 0x4000, 0x400000,
|
|
|
|
(default_commit + 0x3fff) & ~0x3fff,
|
|
|
|
(default_reserve + 0x3fffff) & ~0x3fffff},
|
|
|
|
};
|
|
|
|
|
|
|
|
if (!pRtlCreateUserStack)
|
|
|
|
{
|
|
|
|
win_skip("RtlCreateUserStack() is missing\n");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(tests); ++i)
|
|
|
|
{
|
|
|
|
memset(&stack, 0xcc, sizeof(stack));
|
|
|
|
ret = pRtlCreateUserStack(tests[i].commit, tests[i].reserve, 0,
|
|
|
|
tests[i].commit_align, tests[i].reserve_align, &stack);
|
|
|
|
ok(!ret, "%u: got status %#x\n", i, ret);
|
|
|
|
ok(!stack.OldStackBase, "%u: got OldStackBase %p\n", i, stack.OldStackBase);
|
|
|
|
ok(!stack.OldStackLimit, "%u: got OldStackLimit %p\n", i, stack.OldStackLimit);
|
|
|
|
ok(!((ULONG_PTR)stack.DeallocationStack & (page_size - 1)),
|
|
|
|
"%u: got unaligned memory %p\n", i, stack.DeallocationStack);
|
|
|
|
ok((ULONG_PTR)stack.StackBase - (ULONG_PTR)stack.DeallocationStack == tests[i].expect_reserve,
|
|
|
|
"%u: got reserve %#lx\n", i, (ULONG_PTR)stack.StackBase - (ULONG_PTR)stack.DeallocationStack);
|
|
|
|
todo_wine ok((ULONG_PTR)stack.StackBase - (ULONG_PTR)stack.StackLimit == tests[i].expect_commit,
|
|
|
|
"%u: got commit %#lx\n", i, (ULONG_PTR)stack.StackBase - (ULONG_PTR)stack.StackLimit);
|
|
|
|
pRtlFreeUserStack(stack.DeallocationStack);
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = pRtlCreateUserStack(0x11000, 0x110000, 0, 1, 0, &stack);
|
|
|
|
ok(ret == STATUS_INVALID_PARAMETER, "got %#x\n", ret);
|
|
|
|
|
|
|
|
ret = pRtlCreateUserStack(0x11000, 0x110000, 0, 0, 1, &stack);
|
|
|
|
ok(ret == STATUS_INVALID_PARAMETER, "got %#x\n", ret);
|
|
|
|
}
|
|
|
|
|
2019-06-20 16:05:36 +02:00
|
|
|
static void test_NtMapViewOfSection(void)
|
|
|
|
{
|
|
|
|
static const char testfile[] = "testfile.xxx";
|
|
|
|
static const char data[] = "test data for NtMapViewOfSection";
|
|
|
|
char buffer[sizeof(data)];
|
|
|
|
HANDLE file, mapping, process;
|
|
|
|
void *ptr, *ptr2;
|
|
|
|
BOOL is_wow64, ret;
|
|
|
|
DWORD status, written;
|
|
|
|
SIZE_T size, result;
|
|
|
|
LARGE_INTEGER offset;
|
2019-08-01 10:07:40 +02:00
|
|
|
ULONG_PTR zero_bits;
|
2019-06-20 16:05:36 +02:00
|
|
|
|
2019-08-01 10:07:41 +02:00
|
|
|
if (!pIsWow64Process || !pIsWow64Process(NtCurrentProcess(), &is_wow64)) is_wow64 = FALSE;
|
|
|
|
|
2019-06-20 16:05:36 +02:00
|
|
|
file = CreateFileA(testfile, GENERIC_READ|GENERIC_WRITE, 0, NULL, CREATE_ALWAYS, 0, 0);
|
|
|
|
ok(file != INVALID_HANDLE_VALUE, "Failed to create test file\n");
|
|
|
|
WriteFile(file, data, sizeof(data), &written, NULL);
|
|
|
|
SetFilePointer(file, 4096, NULL, FILE_BEGIN);
|
|
|
|
SetEndOfFile(file);
|
|
|
|
|
|
|
|
/* read/write mapping */
|
|
|
|
|
|
|
|
mapping = CreateFileMappingA(file, NULL, PAGE_READWRITE, 0, 4096, NULL);
|
|
|
|
ok(mapping != 0, "CreateFileMapping failed\n");
|
|
|
|
|
|
|
|
process = create_target_process("sleep");
|
|
|
|
ok(process != NULL, "Can't start process\n");
|
|
|
|
|
|
|
|
ptr = NULL;
|
|
|
|
size = 0;
|
|
|
|
offset.QuadPart = 0;
|
|
|
|
status = NtMapViewOfSection(mapping, process, &ptr, 0, 0, &offset, &size, 1, 0, PAGE_READWRITE);
|
|
|
|
ok(status == STATUS_SUCCESS, "NtMapViewOfSection returned %08x\n", status);
|
|
|
|
ok(!((ULONG_PTR)ptr & 0xffff), "returned memory %p is not aligned to 64k\n", ptr);
|
|
|
|
|
|
|
|
ret = ReadProcessMemory(process, ptr, buffer, sizeof(buffer), &result);
|
|
|
|
ok(ret, "ReadProcessMemory failed\n");
|
|
|
|
ok(result == sizeof(buffer), "ReadProcessMemory didn't read all data (%lx)\n", result);
|
|
|
|
ok(!memcmp(buffer, data, sizeof(buffer)), "Wrong data read\n");
|
|
|
|
|
2019-06-20 16:05:37 +02:00
|
|
|
/* 1 zero bits should zero 63-31 upper bits */
|
2019-06-20 16:05:36 +02:00
|
|
|
ptr2 = NULL;
|
|
|
|
size = 0;
|
2019-06-20 16:05:37 +02:00
|
|
|
zero_bits = 1;
|
2019-06-20 16:05:36 +02:00
|
|
|
offset.QuadPart = 0;
|
2019-08-01 10:07:42 +02:00
|
|
|
status = NtMapViewOfSection(mapping, process, &ptr2, zero_bits, 0, &offset, &size, 1, MEM_TOP_DOWN, PAGE_READWRITE);
|
2019-06-20 16:05:36 +02:00
|
|
|
ok(status == STATUS_SUCCESS || status == STATUS_NO_MEMORY,
|
|
|
|
"NtMapViewOfSection returned %08x\n", status);
|
|
|
|
if (status == STATUS_SUCCESS)
|
|
|
|
{
|
2019-06-20 16:05:37 +02:00
|
|
|
ok(((UINT_PTR)ptr2 >> (32 - zero_bits)) == 0,
|
|
|
|
"NtMapViewOfSection returned address: %p\n", ptr2);
|
|
|
|
|
2019-06-20 16:05:36 +02:00
|
|
|
status = NtUnmapViewOfSection(process, ptr2);
|
|
|
|
ok(status == STATUS_SUCCESS, "NtUnmapViewOfSection returned %08x\n", status);
|
|
|
|
}
|
|
|
|
|
2019-06-20 16:05:37 +02:00
|
|
|
for (zero_bits = 2; zero_bits <= 20; zero_bits++)
|
|
|
|
{
|
|
|
|
ptr2 = NULL;
|
|
|
|
size = 0;
|
|
|
|
offset.QuadPart = 0;
|
2019-08-01 10:07:42 +02:00
|
|
|
status = NtMapViewOfSection(mapping, process, &ptr2, zero_bits, 0, &offset, &size, 1, MEM_TOP_DOWN, PAGE_READWRITE);
|
2019-06-20 16:05:37 +02:00
|
|
|
ok(status == STATUS_SUCCESS || status == STATUS_NO_MEMORY,
|
2019-08-01 10:07:40 +02:00
|
|
|
"NtMapViewOfSection with %d zero_bits returned %08x\n", (int)zero_bits, status);
|
2019-06-20 16:05:37 +02:00
|
|
|
if (status == STATUS_SUCCESS)
|
|
|
|
{
|
|
|
|
ok(((UINT_PTR)ptr2 >> (32 - zero_bits)) == 0,
|
2019-08-01 10:07:40 +02:00
|
|
|
"NtMapViewOfSection with %d zero_bits returned address %p\n", (int)zero_bits, ptr2);
|
2019-06-20 16:05:37 +02:00
|
|
|
|
|
|
|
status = NtUnmapViewOfSection(process, ptr2);
|
|
|
|
ok(status == STATUS_SUCCESS, "NtUnmapViewOfSection returned %08x\n", status);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* 21 zero bits never succeeds */
|
|
|
|
ptr2 = NULL;
|
|
|
|
size = 0;
|
|
|
|
offset.QuadPart = 0;
|
|
|
|
status = NtMapViewOfSection(mapping, process, &ptr2, 21, 0, &offset, &size, 1, 0, PAGE_READWRITE);
|
|
|
|
ok(status == STATUS_NO_MEMORY || status == STATUS_INVALID_PARAMETER,
|
|
|
|
"NtMapViewOfSection returned %08x\n", status);
|
|
|
|
|
|
|
|
/* 22 zero bits is invalid */
|
2019-06-20 16:05:36 +02:00
|
|
|
ptr2 = NULL;
|
|
|
|
size = 0;
|
2019-06-20 16:05:37 +02:00
|
|
|
offset.QuadPart = 0;
|
2019-06-20 16:05:36 +02:00
|
|
|
status = NtMapViewOfSection(mapping, process, &ptr2, 22, 0, &offset, &size, 1, 0, PAGE_READWRITE);
|
|
|
|
ok(status == STATUS_INVALID_PARAMETER_4 || status == STATUS_INVALID_PARAMETER,
|
|
|
|
"NtMapViewOfSection returned %08x\n", status);
|
|
|
|
|
2019-08-01 10:07:43 +02:00
|
|
|
/* zero bits > 31 should be considered as a leading zeroes bitmask on 64bit and WoW64 */
|
2019-06-20 16:05:37 +02:00
|
|
|
ptr2 = NULL;
|
|
|
|
size = 0;
|
2019-08-01 10:07:43 +02:00
|
|
|
zero_bits = 0x1aaaaaaa;
|
2019-06-20 16:05:37 +02:00
|
|
|
offset.QuadPart = 0;
|
2019-08-01 10:07:42 +02:00
|
|
|
status = NtMapViewOfSection(mapping, process, &ptr2, zero_bits, 0, &offset, &size, 1, MEM_TOP_DOWN, PAGE_READWRITE);
|
2019-06-20 16:05:37 +02:00
|
|
|
|
2019-08-01 10:07:41 +02:00
|
|
|
if (!is_win64 && !is_wow64)
|
2019-06-20 16:05:37 +02:00
|
|
|
{
|
|
|
|
ok(status == STATUS_INVALID_PARAMETER_4, "NtMapViewOfSection returned %08x\n", status);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
ok(status == STATUS_SUCCESS || status == STATUS_NO_MEMORY,
|
|
|
|
"NtMapViewOfSection returned %08x\n", status);
|
|
|
|
if (status == STATUS_SUCCESS)
|
|
|
|
{
|
2019-08-01 10:07:43 +02:00
|
|
|
ok(((UINT_PTR)ptr2 & ~get_zero_bits_mask(zero_bits)) == 0 &&
|
|
|
|
((UINT_PTR)ptr2 & ~zero_bits) != 0, /* only the leading zeroes matter */
|
2019-06-20 16:05:37 +02:00
|
|
|
"NtMapViewOfSection returned address %p\n", ptr2);
|
|
|
|
|
|
|
|
status = NtUnmapViewOfSection(process, ptr2);
|
|
|
|
ok(status == STATUS_SUCCESS, "NtUnmapViewOfSection returned %08x\n", status);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-06-20 16:05:36 +02:00
|
|
|
/* mapping at the same page conflicts */
|
|
|
|
ptr2 = ptr;
|
|
|
|
size = 0;
|
|
|
|
offset.QuadPart = 0;
|
|
|
|
status = NtMapViewOfSection(mapping, process, &ptr2, 0, 0, &offset, &size, 1, 0, PAGE_READWRITE);
|
|
|
|
ok(status == STATUS_CONFLICTING_ADDRESSES, "NtMapViewOfSection returned %08x\n", status);
|
|
|
|
|
|
|
|
/* offset has to be aligned */
|
|
|
|
ptr2 = ptr;
|
|
|
|
size = 0;
|
|
|
|
offset.QuadPart = 1;
|
|
|
|
status = NtMapViewOfSection(mapping, process, &ptr2, 0, 0, &offset, &size, 1, 0, PAGE_READWRITE);
|
|
|
|
ok(status == STATUS_MAPPED_ALIGNMENT, "NtMapViewOfSection returned %08x\n", status);
|
|
|
|
|
|
|
|
/* ptr has to be aligned */
|
|
|
|
ptr2 = (char *)ptr + 42;
|
|
|
|
size = 0;
|
|
|
|
offset.QuadPart = 0;
|
|
|
|
status = NtMapViewOfSection(mapping, process, &ptr2, 0, 0, &offset, &size, 1, 0, PAGE_READWRITE);
|
|
|
|
ok(status == STATUS_MAPPED_ALIGNMENT, "NtMapViewOfSection returned %08x\n", status);
|
|
|
|
|
|
|
|
/* still not 64k aligned */
|
|
|
|
ptr2 = (char *)ptr + 0x1000;
|
|
|
|
size = 0;
|
|
|
|
offset.QuadPart = 0;
|
|
|
|
status = NtMapViewOfSection(mapping, process, &ptr2, 0, 0, &offset, &size, 1, 0, PAGE_READWRITE);
|
|
|
|
ok(status == STATUS_MAPPED_ALIGNMENT, "NtMapViewOfSection returned %08x\n", status);
|
|
|
|
|
|
|
|
/* when an address is passed, it has to satisfy the provided number of zero bits */
|
|
|
|
ptr2 = (char *)ptr + 0x1000;
|
|
|
|
size = 0;
|
|
|
|
offset.QuadPart = 0;
|
|
|
|
zero_bits = get_zero_bits(((UINT_PTR)ptr2) >> 1);
|
|
|
|
status = NtMapViewOfSection(mapping, process, &ptr2, zero_bits, 0, &offset, &size, 1, 0, PAGE_READWRITE);
|
|
|
|
ok(status == STATUS_INVALID_PARAMETER_4 || status == STATUS_INVALID_PARAMETER,
|
|
|
|
"NtMapViewOfSection returned %08x\n", status);
|
|
|
|
|
|
|
|
ptr2 = (char *)ptr + 0x1000;
|
|
|
|
size = 0;
|
|
|
|
offset.QuadPart = 0;
|
|
|
|
zero_bits = get_zero_bits((UINT_PTR)ptr2);
|
|
|
|
status = NtMapViewOfSection(mapping, process, &ptr2, zero_bits, 0, &offset, &size, 1, 0, PAGE_READWRITE);
|
|
|
|
ok(status == STATUS_MAPPED_ALIGNMENT, "NtMapViewOfSection returned %08x\n", status);
|
|
|
|
|
2019-08-01 10:07:41 +02:00
|
|
|
if (!is_win64 && !is_wow64)
|
2019-06-20 16:05:36 +02:00
|
|
|
{
|
|
|
|
/* new memory region conflicts with previous mapping */
|
|
|
|
ptr2 = ptr;
|
|
|
|
size = 0;
|
|
|
|
offset.QuadPart = 0;
|
|
|
|
status = NtMapViewOfSection(mapping, process, &ptr2, 0, 0, &offset,
|
|
|
|
&size, 1, AT_ROUND_TO_PAGE, PAGE_READWRITE);
|
|
|
|
ok(status == STATUS_CONFLICTING_ADDRESSES, "NtMapViewOfSection returned %08x\n", status);
|
|
|
|
|
|
|
|
ptr2 = (char *)ptr + 42;
|
|
|
|
size = 0;
|
|
|
|
offset.QuadPart = 0;
|
|
|
|
status = NtMapViewOfSection(mapping, process, &ptr2, 0, 0, &offset,
|
|
|
|
&size, 1, AT_ROUND_TO_PAGE, PAGE_READWRITE);
|
|
|
|
ok(status == STATUS_CONFLICTING_ADDRESSES, "NtMapViewOfSection returned %08x\n", status);
|
|
|
|
|
|
|
|
/* in contrary to regular NtMapViewOfSection, only 4kb align is enforced */
|
|
|
|
ptr2 = (char *)ptr + 0x1000;
|
|
|
|
size = 0;
|
|
|
|
offset.QuadPart = 0;
|
|
|
|
status = NtMapViewOfSection(mapping, process, &ptr2, 0, 0, &offset,
|
|
|
|
&size, 1, AT_ROUND_TO_PAGE, PAGE_READWRITE);
|
|
|
|
ok(status == STATUS_SUCCESS, "NtMapViewOfSection returned %08x\n", status);
|
|
|
|
ok((char *)ptr2 == (char *)ptr + 0x1000,
|
|
|
|
"expected address %p, got %p\n", (char *)ptr + 0x1000, ptr2);
|
|
|
|
status = NtUnmapViewOfSection(process, ptr2);
|
|
|
|
ok(status == STATUS_SUCCESS, "NtUnmapViewOfSection returned %08x\n", status);
|
|
|
|
|
|
|
|
/* the address is rounded down if not on a page boundary */
|
|
|
|
ptr2 = (char *)ptr + 0x1001;
|
|
|
|
size = 0;
|
|
|
|
offset.QuadPart = 0;
|
|
|
|
status = NtMapViewOfSection(mapping, process, &ptr2, 0, 0, &offset,
|
|
|
|
&size, 1, AT_ROUND_TO_PAGE, PAGE_READWRITE);
|
|
|
|
ok(status == STATUS_SUCCESS, "NtMapViewOfSection returned %08x\n", status);
|
|
|
|
ok((char *)ptr2 == (char *)ptr + 0x1000,
|
|
|
|
"expected address %p, got %p\n", (char *)ptr + 0x1000, ptr2);
|
|
|
|
status = NtUnmapViewOfSection(process, ptr2);
|
|
|
|
ok(status == STATUS_SUCCESS, "NtUnmapViewOfSection returned %08x\n", status);
|
|
|
|
|
|
|
|
ptr2 = (char *)ptr + 0x2000;
|
|
|
|
size = 0;
|
|
|
|
offset.QuadPart = 0;
|
|
|
|
status = NtMapViewOfSection(mapping, process, &ptr2, 0, 0, &offset,
|
|
|
|
&size, 1, AT_ROUND_TO_PAGE, PAGE_READWRITE);
|
|
|
|
ok(status == STATUS_SUCCESS, "NtMapViewOfSection returned %08x\n", status);
|
|
|
|
ok((char *)ptr2 == (char *)ptr + 0x2000,
|
|
|
|
"expected address %p, got %p\n", (char *)ptr + 0x2000, ptr2);
|
|
|
|
status = NtUnmapViewOfSection(process, ptr2);
|
|
|
|
ok(status == STATUS_SUCCESS, "NtUnmapViewOfSection returned %08x\n", status);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
ptr2 = (char *)ptr + 0x1000;
|
|
|
|
size = 0;
|
|
|
|
offset.QuadPart = 0;
|
|
|
|
status = NtMapViewOfSection(mapping, process, &ptr2, 0, 0, &offset,
|
|
|
|
&size, 1, AT_ROUND_TO_PAGE, PAGE_READWRITE);
|
|
|
|
todo_wine
|
|
|
|
ok(status == STATUS_INVALID_PARAMETER_9 || status == STATUS_INVALID_PARAMETER,
|
|
|
|
"NtMapViewOfSection returned %08x\n", status);
|
|
|
|
}
|
|
|
|
|
|
|
|
status = NtUnmapViewOfSection(process, ptr);
|
|
|
|
ok(status == STATUS_SUCCESS, "NtUnmapViewOfSection returned %08x\n", status);
|
|
|
|
|
|
|
|
NtClose(mapping);
|
|
|
|
|
|
|
|
CloseHandle(file);
|
|
|
|
DeleteFileA(testfile);
|
|
|
|
|
|
|
|
TerminateProcess(process, 0);
|
|
|
|
CloseHandle(process);
|
|
|
|
}
|
|
|
|
|
2020-08-19 23:22:59 +02:00
|
|
|
#define SUPPORTED_XSTATE_FEATURES ((1 << XSTATE_LEGACY_FLOATING_POINT) | (1 << XSTATE_LEGACY_SSE) | (1 << XSTATE_AVX))
|
|
|
|
|
2020-02-13 12:11:24 +01:00
|
|
|
static void test_user_shared_data(void)
|
|
|
|
{
|
2020-08-19 23:22:59 +02:00
|
|
|
struct old_xstate_configuration
|
|
|
|
{
|
|
|
|
ULONG64 EnabledFeatures;
|
|
|
|
ULONG Size;
|
|
|
|
ULONG OptimizedSave:1;
|
|
|
|
ULONG CompactionEnabled:1;
|
|
|
|
XSTATE_FEATURE Features[MAXIMUM_XSTATE_FEATURES];
|
|
|
|
};
|
|
|
|
|
|
|
|
static const ULONG feature_offsets[] =
|
|
|
|
{
|
|
|
|
0,
|
|
|
|
160, /*offsetof(XMM_SAVE_AREA32, XmmRegisters)*/
|
|
|
|
512 /* sizeof(XMM_SAVE_AREA32) */ + offsetof(XSTATE, YmmContext),
|
|
|
|
};
|
|
|
|
static const ULONG feature_sizes[] =
|
|
|
|
{
|
|
|
|
160,
|
|
|
|
256, /*sizeof(M128A) * 16 */
|
|
|
|
sizeof(YMMCONTEXT),
|
|
|
|
};
|
2020-02-13 12:11:24 +01:00
|
|
|
const KSHARED_USER_DATA *user_shared_data = (void *)0x7ffe0000;
|
2020-08-19 23:22:59 +02:00
|
|
|
XSTATE_CONFIGURATION xstate = user_shared_data->XState;
|
2020-08-19 23:23:00 +02:00
|
|
|
ULONG64 feature_mask;
|
2020-08-19 23:22:59 +02:00
|
|
|
unsigned int i;
|
2020-02-13 12:11:24 +01:00
|
|
|
|
|
|
|
ok(user_shared_data->NumberOfPhysicalPages == sbi.MmNumberOfPhysicalPages,
|
|
|
|
"Got number of physical pages %#x, expected %#x.\n",
|
|
|
|
user_shared_data->NumberOfPhysicalPages, sbi.MmNumberOfPhysicalPages);
|
2020-02-13 12:11:25 +01:00
|
|
|
|
|
|
|
#if defined(__i386__) || defined(__x86_64__)
|
|
|
|
ok(user_shared_data->ProcessorFeatures[PF_RDTSC_INSTRUCTION_AVAILABLE] /* Supported since Pentium CPUs. */,
|
|
|
|
"_RDTSC not available.\n");
|
|
|
|
#endif
|
2020-05-25 17:42:01 +02:00
|
|
|
ok(user_shared_data->ActiveProcessorCount == NtCurrentTeb()->Peb->NumberOfProcessors
|
|
|
|
|| broken(!user_shared_data->ActiveProcessorCount) /* before Win7 */,
|
|
|
|
"Got unexpected ActiveProcessorCount %u.\n", user_shared_data->ActiveProcessorCount);
|
2020-05-25 17:42:02 +02:00
|
|
|
ok(user_shared_data->ActiveGroupCount == 1
|
|
|
|
|| broken(!user_shared_data->ActiveGroupCount) /* before Win7 */,
|
|
|
|
"Got unexpected ActiveGroupCount %u.\n", user_shared_data->ActiveGroupCount);
|
2020-08-19 23:22:59 +02:00
|
|
|
|
2020-08-19 23:23:00 +02:00
|
|
|
if (!pRtlGetEnabledExtendedFeatures)
|
|
|
|
{
|
|
|
|
skip("RtlGetEnabledExtendedFeatures is not available.\n");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
feature_mask = pRtlGetEnabledExtendedFeatures(~(ULONG64)0);
|
|
|
|
if (!feature_mask)
|
|
|
|
{
|
|
|
|
skip("XState features are not available.\n");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2020-08-19 23:22:59 +02:00
|
|
|
if (!xstate.EnabledFeatures)
|
|
|
|
{
|
|
|
|
struct old_xstate_configuration *xs_old
|
|
|
|
= (struct old_xstate_configuration *)((char *)user_shared_data + 0x3e0);
|
|
|
|
|
|
|
|
memset(&xstate, 0, sizeof(xstate));
|
|
|
|
xstate.EnabledFeatures = xstate.EnabledVolatileFeatures = xs_old->EnabledFeatures;
|
|
|
|
memcpy(&xstate.Size, &xs_old->Size, sizeof(*xs_old) - offsetof(struct old_xstate_configuration, Size));
|
|
|
|
for (i = 0; i < 3; ++i)
|
|
|
|
xstate.AllFeatures[i] = xs_old->Features[i].Size;
|
|
|
|
xstate.AllFeatureSize = 512 + sizeof(XSTATE);
|
|
|
|
}
|
|
|
|
|
|
|
|
trace("XState EnabledFeatures %s.\n", wine_dbgstr_longlong(xstate.EnabledFeatures));
|
2020-08-19 23:23:00 +02:00
|
|
|
feature_mask = pRtlGetEnabledExtendedFeatures(0);
|
|
|
|
ok(!feature_mask, "Got unexpected feature_mask %s.\n", wine_dbgstr_longlong(feature_mask));
|
|
|
|
feature_mask = pRtlGetEnabledExtendedFeatures(~(ULONG64)0);
|
|
|
|
ok(feature_mask == xstate.EnabledFeatures, "Got unexpected feature_mask %s.\n",
|
|
|
|
wine_dbgstr_longlong(feature_mask));
|
|
|
|
feature_mask = pGetEnabledXStateFeatures();
|
|
|
|
ok(feature_mask == xstate.EnabledFeatures, "Got unexpected feature_mask %s.\n",
|
|
|
|
wine_dbgstr_longlong(feature_mask));
|
2020-08-19 23:22:59 +02:00
|
|
|
ok((xstate.EnabledFeatures & SUPPORTED_XSTATE_FEATURES) == SUPPORTED_XSTATE_FEATURES,
|
|
|
|
"Got unexpected EnabledFeatures %s.\n", wine_dbgstr_longlong(xstate.EnabledFeatures));
|
|
|
|
ok((xstate.EnabledVolatileFeatures & SUPPORTED_XSTATE_FEATURES) == xstate.EnabledFeatures,
|
|
|
|
"Got unexpected EnabledVolatileFeatures %s.\n", wine_dbgstr_longlong(xstate.EnabledVolatileFeatures));
|
|
|
|
ok(xstate.Size >= 512 + sizeof(XSTATE), "Got unexpected Size %u.\n", xstate.Size);
|
|
|
|
if (xstate.CompactionEnabled)
|
|
|
|
ok(xstate.OptimizedSave, "Got zero OptimizedSave with compaction enabled.\n");
|
|
|
|
ok(!xstate.AlignedFeatures, "Got unexpected AlignedFeatures %s.\n",
|
|
|
|
wine_dbgstr_longlong(xstate.AlignedFeatures));
|
|
|
|
ok(xstate.AllFeatureSize >= 512 + sizeof(XSTATE), "Got unexpected AllFeatureSize %u.\n",
|
|
|
|
xstate.AllFeatureSize);
|
|
|
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(feature_sizes); ++i)
|
|
|
|
{
|
2020-09-07 15:31:20 +02:00
|
|
|
ok(xstate.AllFeatures[i] == feature_sizes[i]
|
|
|
|
|| broken(!xstate.AllFeatures[i]) /* win10pro */,
|
|
|
|
"Got unexpected AllFeatures[%u] %u, expected %u.\n", i,
|
2020-08-19 23:22:59 +02:00
|
|
|
xstate.AllFeatures[i], feature_sizes[i]);
|
|
|
|
ok(xstate.Features[i].Size == feature_sizes[i], "Got unexpected Features[%u].Size %u, expected %u.\n", i,
|
|
|
|
xstate.Features[i].Size, feature_sizes[i]);
|
|
|
|
ok(xstate.Features[i].Offset == feature_offsets[i], "Got unexpected Features[%u].Offset %u, expected %u.\n",
|
|
|
|
i, xstate.Features[i].Offset, feature_offsets[i]);
|
|
|
|
}
|
2020-02-13 12:11:24 +01:00
|
|
|
}
|
|
|
|
|
2020-11-25 20:19:43 +01:00
|
|
|
static void perform_relocations( void *module, INT_PTR delta )
|
|
|
|
{
|
|
|
|
IMAGE_NT_HEADERS *nt;
|
|
|
|
IMAGE_BASE_RELOCATION *rel, *end;
|
|
|
|
const IMAGE_DATA_DIRECTORY *relocs;
|
|
|
|
const IMAGE_SECTION_HEADER *sec;
|
|
|
|
ULONG protect_old[96], i;
|
|
|
|
|
|
|
|
nt = RtlImageNtHeader( module );
|
|
|
|
relocs = &nt->OptionalHeader.DataDirectory[IMAGE_DIRECTORY_ENTRY_BASERELOC];
|
|
|
|
if (!relocs->VirtualAddress || !relocs->Size) return;
|
|
|
|
sec = (const IMAGE_SECTION_HEADER *)((const char *)&nt->OptionalHeader +
|
|
|
|
nt->FileHeader.SizeOfOptionalHeader);
|
|
|
|
for (i = 0; i < nt->FileHeader.NumberOfSections; i++)
|
|
|
|
{
|
|
|
|
void *addr = (char *)module + sec[i].VirtualAddress;
|
|
|
|
SIZE_T size = sec[i].SizeOfRawData;
|
|
|
|
NtProtectVirtualMemory( NtCurrentProcess(), &addr,
|
|
|
|
&size, PAGE_READWRITE, &protect_old[i] );
|
|
|
|
}
|
|
|
|
rel = (IMAGE_BASE_RELOCATION *)((char *)module + relocs->VirtualAddress);
|
|
|
|
end = (IMAGE_BASE_RELOCATION *)((char *)rel + relocs->Size);
|
|
|
|
while (rel && rel < end - 1 && rel->SizeOfBlock)
|
|
|
|
rel = LdrProcessRelocationBlock( (char *)module + rel->VirtualAddress,
|
|
|
|
(rel->SizeOfBlock - sizeof(*rel)) / sizeof(USHORT),
|
|
|
|
(USHORT *)(rel + 1), delta );
|
|
|
|
for (i = 0; i < nt->FileHeader.NumberOfSections; i++)
|
|
|
|
{
|
|
|
|
void *addr = (char *)module + sec[i].VirtualAddress;
|
|
|
|
SIZE_T size = sec[i].SizeOfRawData;
|
|
|
|
NtProtectVirtualMemory( NtCurrentProcess(), &addr,
|
|
|
|
&size, protect_old[i], &protect_old[i] );
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void test_syscalls(void)
|
|
|
|
{
|
|
|
|
HMODULE module = GetModuleHandleW( L"ntdll.dll" );
|
|
|
|
HANDLE handle;
|
|
|
|
NTSTATUS status;
|
|
|
|
NTSTATUS (WINAPI *pNtClose)(HANDLE);
|
|
|
|
WCHAR path[MAX_PATH];
|
|
|
|
HANDLE file, mapping;
|
|
|
|
INT_PTR delta;
|
|
|
|
void *ptr;
|
|
|
|
|
|
|
|
/* initial image */
|
|
|
|
pNtClose = (void *)GetProcAddress( module, "NtClose" );
|
|
|
|
handle = CreateEventW( NULL, FALSE, FALSE, NULL );
|
|
|
|
ok( handle != 0, "CreateEventWfailed %u\n", GetLastError() );
|
|
|
|
status = pNtClose( handle );
|
|
|
|
ok( !status, "NtClose failed %x\n", status );
|
|
|
|
status = pNtClose( handle );
|
|
|
|
ok( status == STATUS_INVALID_HANDLE, "NtClose failed %x\n", status );
|
|
|
|
|
|
|
|
/* syscall thunk copy */
|
|
|
|
ptr = VirtualAlloc( NULL, 0x1000, MEM_COMMIT, PAGE_EXECUTE_READWRITE );
|
|
|
|
ok( ptr != NULL, "VirtualAlloc failed\n" );
|
|
|
|
memcpy( ptr, pNtClose, 32 );
|
|
|
|
pNtClose = ptr;
|
|
|
|
handle = CreateEventW( NULL, FALSE, FALSE, NULL );
|
|
|
|
ok( handle != 0, "CreateEventWfailed %u\n", GetLastError() );
|
|
|
|
status = pNtClose( handle );
|
|
|
|
ok( !status, "NtClose failed %x\n", status );
|
|
|
|
status = pNtClose( handle );
|
|
|
|
ok( status == STATUS_INVALID_HANDLE, "NtClose failed %x\n", status );
|
|
|
|
VirtualFree( ptr, 0, MEM_FREE );
|
|
|
|
|
|
|
|
/* new mapping */
|
|
|
|
GetModuleFileNameW( module, path, MAX_PATH );
|
|
|
|
file = CreateFileW( path, GENERIC_READ, FILE_SHARE_READ, NULL, OPEN_EXISTING, 0, 0 );
|
|
|
|
ok( file != INVALID_HANDLE_VALUE, "can't open %s: %u\n", wine_dbgstr_w(path), GetLastError() );
|
|
|
|
mapping = CreateFileMappingW( file, NULL, SEC_IMAGE | PAGE_READONLY, 0, 0, NULL );
|
|
|
|
ok( mapping != NULL, "CreateFileMappingW failed err %u\n", GetLastError() );
|
|
|
|
ptr = MapViewOfFile( mapping, FILE_MAP_READ, 0, 0, 0 );
|
|
|
|
ok( ptr != NULL, "MapViewOfFile failed err %u\n", GetLastError() );
|
|
|
|
CloseHandle( mapping );
|
|
|
|
CloseHandle( file );
|
|
|
|
delta = (char *)ptr - (char *)module;
|
|
|
|
|
|
|
|
if (memcmp( ptr, module, 0x1000 ))
|
|
|
|
{
|
|
|
|
skip( "modules are not identical (non-PE build?)\n" );
|
|
|
|
UnmapViewOfFile( ptr );
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
perform_relocations( ptr, delta );
|
|
|
|
pNtClose = (void *)GetProcAddress( module, "NtClose" );
|
|
|
|
if (!memcmp( pNtClose, (char *)pNtClose + delta, 32 ))
|
|
|
|
{
|
|
|
|
pNtClose = (void *)((char *)pNtClose + delta);
|
|
|
|
handle = CreateEventW( NULL, FALSE, FALSE, NULL );
|
|
|
|
ok( handle != 0, "CreateEventWfailed %u\n", GetLastError() );
|
|
|
|
status = pNtClose( handle );
|
|
|
|
ok( !status, "NtClose failed %x\n", status );
|
|
|
|
status = pNtClose( handle );
|
|
|
|
ok( status == STATUS_INVALID_HANDLE, "NtClose failed %x\n", status );
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
#ifdef __x86_64__
|
|
|
|
ok( 0, "syscall thunk relocated\n" );
|
|
|
|
#else
|
|
|
|
skip( "syscall thunk relocated\n" );
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
UnmapViewOfFile( ptr );
|
|
|
|
}
|
|
|
|
|
2019-06-11 12:22:45 +02:00
|
|
|
START_TEST(virtual)
|
|
|
|
{
|
2019-06-14 17:32:45 +02:00
|
|
|
HMODULE mod;
|
|
|
|
|
2019-06-20 16:05:36 +02:00
|
|
|
int argc;
|
|
|
|
char **argv;
|
|
|
|
argc = winetest_get_mainargs(&argv);
|
|
|
|
|
|
|
|
if (argc >= 3)
|
|
|
|
{
|
|
|
|
if (!strcmp(argv[2], "sleep"))
|
|
|
|
{
|
|
|
|
Sleep(5000); /* spawned process runs for at most 5 seconds */
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-06-14 17:32:45 +02:00
|
|
|
mod = GetModuleHandleA("kernel32.dll");
|
|
|
|
pIsWow64Process = (void *)GetProcAddress(mod, "IsWow64Process");
|
2020-08-19 23:23:00 +02:00
|
|
|
pGetEnabledXStateFeatures = (void *)GetProcAddress(mod, "GetEnabledXStateFeatures");
|
2019-06-14 17:32:45 +02:00
|
|
|
mod = GetModuleHandleA("ntdll.dll");
|
|
|
|
pRtlCreateUserStack = (void *)GetProcAddress(mod, "RtlCreateUserStack");
|
|
|
|
pRtlFreeUserStack = (void *)GetProcAddress(mod, "RtlFreeUserStack");
|
2020-08-19 23:23:00 +02:00
|
|
|
pRtlGetEnabledExtendedFeatures = (void *)GetProcAddress(mod, "RtlGetEnabledExtendedFeatures");
|
2020-10-17 03:44:17 +02:00
|
|
|
pNtAllocateVirtualMemoryEx = (void *)GetProcAddress(mod, "NtAllocateVirtualMemoryEx");
|
2019-06-11 12:22:45 +02:00
|
|
|
|
|
|
|
NtQuerySystemInformation(SystemBasicInformation, &sbi, sizeof(sbi), NULL);
|
|
|
|
trace("system page size %#x\n", sbi.PageSize);
|
2019-06-14 17:32:45 +02:00
|
|
|
page_size = sbi.PageSize;
|
2019-06-11 12:22:45 +02:00
|
|
|
|
2019-06-20 16:05:34 +02:00
|
|
|
test_NtAllocateVirtualMemory();
|
2019-06-14 17:32:45 +02:00
|
|
|
test_RtlCreateUserStack();
|
2019-06-20 16:05:36 +02:00
|
|
|
test_NtMapViewOfSection();
|
2020-02-13 12:11:24 +01:00
|
|
|
test_user_shared_data();
|
2020-11-25 20:19:43 +01:00
|
|
|
test_syscalls();
|
2019-06-11 12:22:45 +02:00
|
|
|
}
|