ntdll: Set correct protection flags on sections in builtin DLLs.
This commit is contained in:
parent
8c50936d30
commit
2ca5513a62
@ -1404,9 +1404,8 @@ static void load_builtin_callback( void *module, const char *filename )
|
||||
builtin_load_info->status = STATUS_INVALID_IMAGE_FORMAT;
|
||||
return;
|
||||
}
|
||||
virtual_create_system_view( module, nt->OptionalHeader.SizeOfImage,
|
||||
VPROT_SYSTEM | VPROT_IMAGE | VPROT_COMMITTED |
|
||||
VPROT_READ | VPROT_WRITECOPY | VPROT_EXEC );
|
||||
|
||||
virtual_create_builtin_view( module );
|
||||
|
||||
/* create the MODREF */
|
||||
|
||||
|
@ -155,7 +155,7 @@ extern NTSTATUS nt_to_unix_file_name_attr( const OBJECT_ATTRIBUTES *attr, ANSI_S
|
||||
|
||||
/* virtual memory */
|
||||
extern void virtual_get_system_info( SYSTEM_BASIC_INFORMATION *info );
|
||||
extern NTSTATUS virtual_create_system_view( void *base, SIZE_T size, DWORD vprot );
|
||||
extern NTSTATUS virtual_create_builtin_view( void *base );
|
||||
extern NTSTATUS virtual_alloc_thread_stack( TEB *teb, SIZE_T reserve_size, SIZE_T commit_size );
|
||||
extern void virtual_clear_thread_stack(void);
|
||||
extern BOOL virtual_handle_stack_fault( void *addr );
|
||||
|
@ -1077,15 +1077,15 @@ static void test_queryvirtualmemory(void)
|
||||
MEMORY_BASIC_INFORMATION mbi;
|
||||
char stackbuf[42];
|
||||
|
||||
trace("Check flags of a function entry in NTDLL.DLL\n");
|
||||
trace("Check flags of a function entry in NTDLL.DLL at %p\n", pNtQueryVirtualMemory);
|
||||
status = pNtQueryVirtualMemory(NtCurrentProcess(), pNtQueryVirtualMemory, MemoryBasicInformation, &mbi, sizeof(MEMORY_BASIC_INFORMATION), &readcount);
|
||||
ok( status == STATUS_SUCCESS, "Expected STATUS_SUCCESS, got %08x\n", status);
|
||||
ok( readcount == sizeof(MEMORY_BASIC_INFORMATION), "Expected to read %d bytes, got %ld\n",(int)sizeof(MEMORY_BASIC_INFORMATION),readcount);
|
||||
ok (mbi.AllocationProtect == PAGE_EXECUTE_WRITECOPY, "mbi.AllocationProtect is 0x%x, expected 0x%x\n", mbi.AllocationProtect, PAGE_EXECUTE_WRITECOPY);
|
||||
ok (mbi.State == MEM_COMMIT, "mbi.State is 0x%x, expected 0x%x\n", mbi.State, MEM_COMMIT);
|
||||
todo_wine ok (mbi.Protect == PAGE_EXECUTE_READ, "mbi.Protect is 0x%x, expected 0x%x\n", mbi.Protect, PAGE_EXECUTE_READ);
|
||||
ok (mbi.Protect == PAGE_EXECUTE_READ, "mbi.Protect is 0x%x, expected 0x%x\n", mbi.Protect, PAGE_EXECUTE_READ);
|
||||
|
||||
trace("Check flags of heap\n");
|
||||
trace("Check flags of heap at %p\n", GetProcessHeap());
|
||||
status = pNtQueryVirtualMemory(NtCurrentProcess(), GetProcessHeap(), MemoryBasicInformation, &mbi, sizeof(MEMORY_BASIC_INFORMATION), &readcount);
|
||||
ok( status == STATUS_SUCCESS, "Expected STATUS_SUCCESS, got %08x\n", status);
|
||||
ok( readcount == sizeof(MEMORY_BASIC_INFORMATION), "Expected to read %d bytes, got %ld\n",(int)sizeof(MEMORY_BASIC_INFORMATION),readcount);
|
||||
@ -1095,7 +1095,7 @@ static void test_queryvirtualmemory(void)
|
||||
ok (mbi.Protect == PAGE_READWRITE || mbi.Protect == PAGE_EXECUTE_READWRITE,
|
||||
"mbi.Protect is 0x%x\n", mbi.Protect);
|
||||
|
||||
trace("Check flags of stack\n");
|
||||
trace("Check flags of stack at %p\n", stackbuf);
|
||||
status = pNtQueryVirtualMemory(NtCurrentProcess(), stackbuf, MemoryBasicInformation, &mbi, sizeof(MEMORY_BASIC_INFORMATION), &readcount);
|
||||
ok( status == STATUS_SUCCESS, "Expected STATUS_SUCCESS, got %08x\n", status);
|
||||
ok( readcount == sizeof(MEMORY_BASIC_INFORMATION), "Expected to read %d bytes, got %ld\n",(int)sizeof(MEMORY_BASIC_INFORMATION),readcount);
|
||||
@ -1103,7 +1103,7 @@ static void test_queryvirtualmemory(void)
|
||||
ok (mbi.State == MEM_COMMIT, "mbi.State is 0x%x, expected 0x%x\n", mbi.State, MEM_COMMIT);
|
||||
ok (mbi.Protect == PAGE_READWRITE, "mbi.Protect is 0x%x, expected 0x%x\n", mbi.Protect, PAGE_READWRITE);
|
||||
|
||||
trace("Check flags of read-only data\n");
|
||||
trace("Check flags of read-only data at %p\n", teststring);
|
||||
status = pNtQueryVirtualMemory(NtCurrentProcess(), teststring, MemoryBasicInformation, &mbi, sizeof(MEMORY_BASIC_INFORMATION), &readcount);
|
||||
ok( status == STATUS_SUCCESS, "Expected STATUS_SUCCESS, got %08x\n", status);
|
||||
ok( readcount == sizeof(MEMORY_BASIC_INFORMATION), "Expected to read %d bytes, got %ld\n",(int)sizeof(MEMORY_BASIC_INFORMATION),readcount);
|
||||
@ -1112,13 +1112,13 @@ static void test_queryvirtualmemory(void)
|
||||
if (mbi.Protect != PAGE_READONLY)
|
||||
todo_wine ok( mbi.Protect == PAGE_READONLY, "mbi.Protect is 0x%x, expected 0x%X\n", mbi.Protect, PAGE_READONLY);
|
||||
|
||||
trace("Check flags of read-write global data (.bss)\n");
|
||||
trace("Check flags of read-write global data (.bss) at %p\n", rwtestbuf);
|
||||
status = pNtQueryVirtualMemory(NtCurrentProcess(), rwtestbuf, MemoryBasicInformation, &mbi, sizeof(MEMORY_BASIC_INFORMATION), &readcount);
|
||||
ok( status == STATUS_SUCCESS, "Expected STATUS_SUCCESS, got %08x\n", status);
|
||||
ok( readcount == sizeof(MEMORY_BASIC_INFORMATION), "Expected to read %d bytes, got %ld\n",(int)sizeof(MEMORY_BASIC_INFORMATION),readcount);
|
||||
ok (mbi.AllocationProtect == PAGE_EXECUTE_WRITECOPY, "mbi.AllocationProtect is 0x%x, expected 0x%x\n", mbi.AllocationProtect, PAGE_EXECUTE_WRITECOPY);
|
||||
ok (mbi.State == MEM_COMMIT, "mbi.State is 0x%x, expected 0x%X\n", mbi.State, MEM_COMMIT);
|
||||
todo_wine ok (mbi.Protect == PAGE_READWRITE, "mbi.Protect is 0x%x, expected 0x%X\n", mbi.Protect, PAGE_READWRITE);
|
||||
ok (mbi.Protect == PAGE_READWRITE, "mbi.Protect is 0x%x, expected 0x%X\n", mbi.Protect, PAGE_READWRITE);
|
||||
}
|
||||
|
||||
static void test_affinity(void)
|
||||
|
@ -1396,18 +1396,39 @@ void virtual_get_system_info( SYSTEM_BASIC_INFORMATION *info )
|
||||
/***********************************************************************
|
||||
* virtual_create_system_view
|
||||
*/
|
||||
NTSTATUS virtual_create_system_view( void *base, SIZE_T size, DWORD vprot )
|
||||
NTSTATUS virtual_create_builtin_view( void *module )
|
||||
{
|
||||
FILE_VIEW *view;
|
||||
NTSTATUS status;
|
||||
sigset_t sigset;
|
||||
IMAGE_NT_HEADERS *nt = RtlImageNtHeader( module );
|
||||
SIZE_T size = nt->OptionalHeader.SizeOfImage;
|
||||
IMAGE_SECTION_HEADER *sec;
|
||||
FILE_VIEW *view;
|
||||
void *base;
|
||||
int i;
|
||||
|
||||
size = ROUND_SIZE( base, size );
|
||||
base = ROUND_ADDR( base, page_mask );
|
||||
size = ROUND_SIZE( module, size );
|
||||
base = ROUND_ADDR( module, page_mask );
|
||||
server_enter_uninterrupted_section( &csVirtual, &sigset );
|
||||
status = create_view( &view, base, size, vprot );
|
||||
status = create_view( &view, base, size, VPROT_SYSTEM | VPROT_IMAGE |
|
||||
VPROT_COMMITTED | VPROT_READ | VPROT_WRITECOPY | VPROT_EXEC );
|
||||
if (!status) TRACE( "created %p-%p\n", base, (char *)base + size );
|
||||
server_leave_uninterrupted_section( &csVirtual, &sigset );
|
||||
|
||||
if (status) return status;
|
||||
|
||||
sec = (IMAGE_SECTION_HEADER *)((char *)&nt->OptionalHeader + nt->FileHeader.SizeOfOptionalHeader);
|
||||
for (i = 0; i < nt->FileHeader.NumberOfSections; i++)
|
||||
{
|
||||
DWORD flags = VPROT_SYSTEM | VPROT_IMAGE | VPROT_COMMITTED;
|
||||
|
||||
if (sec[i].Characteristics & IMAGE_SCN_MEM_EXECUTE) flags |= VPROT_EXEC;
|
||||
if (sec[i].Characteristics & IMAGE_SCN_MEM_READ) flags |= VPROT_READ;
|
||||
if (sec[i].Characteristics & IMAGE_SCN_MEM_WRITE) flags |= VPROT_WRITE;
|
||||
memset (view->prot + (sec[i].VirtualAddress >> page_shift), flags,
|
||||
ROUND_SIZE( sec[i].VirtualAddress, sec[i].Misc.VirtualSize ) >> page_shift );
|
||||
}
|
||||
|
||||
return status;
|
||||
}
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user