/* * ntoskrnl.exe testing framework * * Copyright 2015 Sebastian Lackner * Copyright 2015 Michael Müller * Copyright 2015 Christian Costa * * This library is free software; you can redistribute it and/or * modify it under the terms of the GNU Lesser General Public * License as published by the Free Software Foundation; either * version 2.1 of the License, or (at your option) any later version. * * This library is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public * License along with this library; if not, write to the Free Software * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA */ #include #include "ntstatus.h" #define WIN32_NO_STATUS #include "windows.h" #include "winsvc.h" #include "winioctl.h" #include "winternl.h" #include "winsock2.h" #include "wincrypt.h" #include "ntsecapi.h" #include "mscat.h" #include "mssip.h" #include "setupapi.h" #include "newdev.h" #include "initguid.h" #include "devguid.h" #include "wine/test.h" #include "wine/heap.h" #include "wine/mssign.h" #include "driver.h" static const GUID GUID_NULL; static HANDLE device; static BOOL (WINAPI *pRtlDosPathNameToNtPathName_U)(const WCHAR *, UNICODE_STRING *, WCHAR **, CURDIR *); static BOOL (WINAPI *pRtlFreeUnicodeString)(UNICODE_STRING *); static BOOL (WINAPI *pCancelIoEx)(HANDLE, OVERLAPPED *); static BOOL (WINAPI *pIsWow64Process)(HANDLE, BOOL *); static BOOL (WINAPI *pSetFileCompletionNotificationModes)(HANDLE, UCHAR); static HRESULT (WINAPI *pSignerSign)(SIGNER_SUBJECT_INFO *subject, SIGNER_CERT *cert, SIGNER_SIGNATURE_INFO *signature, SIGNER_PROVIDER_INFO *provider, const WCHAR *timestamp, CRYPT_ATTRIBUTES *attr, void *sip_data); static void load_resource(const WCHAR *name, WCHAR *filename) { static WCHAR path[MAX_PATH]; DWORD written; HANDLE file; HRSRC res; void *ptr; GetTempPathW(ARRAY_SIZE(path), path); GetTempFileNameW(path, name, 0, filename); file = CreateFileW(filename, GENERIC_READ|GENERIC_WRITE, 0, NULL, CREATE_ALWAYS, 0, 0); ok(file != INVALID_HANDLE_VALUE, "failed to create %s, error %u\n", debugstr_w(filename), GetLastError()); res = FindResourceW(NULL, name, L"TESTDLL"); ok( res != 0, "couldn't find resource\n" ); ptr = LockResource( LoadResource( GetModuleHandleA(NULL), res )); WriteFile( file, ptr, SizeofResource( GetModuleHandleA(NULL), res ), &written, NULL ); ok( written == SizeofResource( GetModuleHandleA(NULL), res ), "couldn't write resource\n" ); CloseHandle( file ); } struct testsign_context { HCRYPTPROV provider; const CERT_CONTEXT *cert, *root_cert, *publisher_cert; HCERTSTORE root_store, publisher_store; }; static BOOL testsign_create_cert(struct testsign_context *ctx) { BYTE encoded_name[100], encoded_key_id[200], public_key_info_buffer[1000]; WCHAR container_name[26]; BYTE hash_buffer[16], cert_buffer[1000], provider_nameA[100], serial[16]; CERT_PUBLIC_KEY_INFO *public_key_info = (CERT_PUBLIC_KEY_INFO *)public_key_info_buffer; CRYPT_KEY_PROV_INFO provider_info = {0}; CRYPT_ALGORITHM_IDENTIFIER algid = {0}; CERT_AUTHORITY_KEY_ID_INFO key_info; CERT_INFO cert_info = {0}; WCHAR provider_nameW[100]; CERT_EXTENSION extension; HCRYPTKEY key; DWORD size; BOOL ret; memset(ctx, 0, sizeof(*ctx)); srand(time(NULL)); swprintf(container_name, ARRAY_SIZE(container_name), L"wine_testsign%u", rand()); ret = CryptAcquireContextW(&ctx->provider, container_name, NULL, PROV_RSA_FULL, CRYPT_NEWKEYSET); ok(ret, "Failed to create container, error %#x\n", GetLastError()); ret = CryptGenKey(ctx->provider, AT_SIGNATURE, CRYPT_EXPORTABLE, &key); ok(ret, "Failed to create key, error %#x\n", GetLastError()); ret = CryptDestroyKey(key); ok(ret, "Failed to destroy key, error %#x\n", GetLastError()); ret = CryptGetUserKey(ctx->provider, AT_SIGNATURE, &key); ok(ret, "Failed to get user key, error %#x\n", GetLastError()); ret = CryptDestroyKey(key); ok(ret, "Failed to destroy key, error %#x\n", GetLastError()); size = sizeof(encoded_name); ret = CertStrToNameA(X509_ASN_ENCODING, "CN=winetest_cert", CERT_X500_NAME_STR, NULL, encoded_name, &size, NULL); ok(ret, "Failed to convert name, error %#x\n", GetLastError()); key_info.CertIssuer.cbData = size; key_info.CertIssuer.pbData = encoded_name; size = sizeof(public_key_info_buffer); ret = CryptExportPublicKeyInfo(ctx->provider, AT_SIGNATURE, X509_ASN_ENCODING, public_key_info, &size); ok(ret, "Failed to export public key, error %#x\n", GetLastError()); cert_info.SubjectPublicKeyInfo = *public_key_info; size = sizeof(hash_buffer); ret = CryptHashPublicKeyInfo(ctx->provider, CALG_MD5, 0, X509_ASN_ENCODING, public_key_info, hash_buffer, &size); ok(ret, "Failed to hash public key, error %#x\n", GetLastError()); key_info.KeyId.cbData = size; key_info.KeyId.pbData = hash_buffer; RtlGenRandom(serial, sizeof(serial)); key_info.CertSerialNumber.cbData = sizeof(serial); key_info.CertSerialNumber.pbData = serial; size = sizeof(encoded_key_id); ret = CryptEncodeObject(X509_ASN_ENCODING, X509_AUTHORITY_KEY_ID, &key_info, encoded_key_id, &size); ok(ret, "Failed to convert name, error %#x\n", GetLastError()); extension.pszObjId = (char *)szOID_AUTHORITY_KEY_IDENTIFIER; extension.fCritical = TRUE; extension.Value.cbData = size; extension.Value.pbData = encoded_key_id; cert_info.dwVersion = CERT_V3; cert_info.SerialNumber = key_info.CertSerialNumber; cert_info.SignatureAlgorithm.pszObjId = (char *)szOID_RSA_SHA1RSA; cert_info.Issuer = key_info.CertIssuer; GetSystemTimeAsFileTime(&cert_info.NotBefore); GetSystemTimeAsFileTime(&cert_info.NotAfter); cert_info.NotAfter.dwHighDateTime += 1; cert_info.Subject = key_info.CertIssuer; cert_info.cExtension = 1; cert_info.rgExtension = &extension; algid.pszObjId = (char *)szOID_RSA_SHA1RSA; size = sizeof(cert_buffer); ret = CryptSignAndEncodeCertificate(ctx->provider, AT_SIGNATURE, X509_ASN_ENCODING, X509_CERT_TO_BE_SIGNED, &cert_info, &algid, NULL, cert_buffer, &size); ok(ret, "Failed to create certificate, error %#x\n", GetLastError()); ctx->cert = CertCreateCertificateContext(X509_ASN_ENCODING, cert_buffer, size); ok(!!ctx->cert, "Failed to create context, error %#x\n", GetLastError()); size = sizeof(provider_nameA); ret = CryptGetProvParam(ctx->provider, PP_NAME, provider_nameA, &size, 0); ok(ret, "Failed to get prov param, error %#x\n", GetLastError()); MultiByteToWideChar(CP_ACP, 0, (char *)provider_nameA, -1, provider_nameW, ARRAY_SIZE(provider_nameW)); provider_info.pwszContainerName = (WCHAR *)container_name; provider_info.pwszProvName = provider_nameW; provider_info.dwProvType = PROV_RSA_FULL; provider_info.dwKeySpec = AT_SIGNATURE; ret = CertSetCertificateContextProperty(ctx->cert, CERT_KEY_PROV_INFO_PROP_ID, 0, &provider_info); ok(ret, "Failed to set provider info, error %#x\n", GetLastError()); ctx->root_store = CertOpenStore(CERT_STORE_PROV_SYSTEM_REGISTRY_A, 0, 0, CERT_SYSTEM_STORE_LOCAL_MACHINE, "root"); if (!ctx->root_store && GetLastError() == ERROR_ACCESS_DENIED) { skip("Failed to open root store.\n"); ret = CertFreeCertificateContext(ctx->cert); ok(ret, "Failed to free certificate, error %u\n", GetLastError()); ret = CryptReleaseContext(ctx->provider, 0); ok(ret, "failed to release context, error %u\n", GetLastError()); return FALSE; } ok(!!ctx->root_store, "Failed to open store, error %u\n", GetLastError()); ret = CertAddCertificateContextToStore(ctx->root_store, ctx->cert, CERT_STORE_ADD_ALWAYS, &ctx->root_cert); if (!ret && GetLastError() == ERROR_ACCESS_DENIED) { skip("Failed to add self-signed certificate to store.\n"); ret = CertFreeCertificateContext(ctx->cert); ok(ret, "Failed to free certificate, error %u\n", GetLastError()); ret = CertCloseStore(ctx->root_store, CERT_CLOSE_STORE_CHECK_FLAG); ok(ret, "Failed to close store, error %u\n", GetLastError()); ret = CryptReleaseContext(ctx->provider, 0); ok(ret, "failed to release context, error %u\n", GetLastError()); return FALSE; } ok(ret, "Failed to add certificate, error %u\n", GetLastError()); ctx->publisher_store = CertOpenStore(CERT_STORE_PROV_SYSTEM_REGISTRY_A, 0, 0, CERT_SYSTEM_STORE_LOCAL_MACHINE, "trustedpublisher"); ok(!!ctx->publisher_store, "Failed to open store, error %u\n", GetLastError()); ret = CertAddCertificateContextToStore(ctx->publisher_store, ctx->cert, CERT_STORE_ADD_ALWAYS, &ctx->publisher_cert); ok(ret, "Failed to add certificate, error %u\n", GetLastError()); return TRUE; } static void testsign_cleanup(struct testsign_context *ctx) { BOOL ret; ret = CertFreeCertificateContext(ctx->cert); ok(ret, "Failed to free certificate, error %u\n", GetLastError()); ret = CertDeleteCertificateFromStore(ctx->root_cert); ok(ret, "Failed to remove certificate, error %u\n", GetLastError()); ret = CertFreeCertificateContext(ctx->root_cert); ok(ret, "Failed to free certificate, error %u\n", GetLastError()); ret = CertCloseStore(ctx->root_store, CERT_CLOSE_STORE_CHECK_FLAG); ok(ret, "Failed to close store, error %u\n", GetLastError()); ret = CertDeleteCertificateFromStore(ctx->publisher_cert); ok(ret, "Failed to remove certificate, error %u\n", GetLastError()); ret = CertFreeCertificateContext(ctx->publisher_cert); ok(ret, "Failed to free certificate, error %u\n", GetLastError()); ret = CertCloseStore(ctx->publisher_store, CERT_CLOSE_STORE_CHECK_FLAG); ok(ret, "Failed to close store, error %u\n", GetLastError()); ret = CryptReleaseContext(ctx->provider, 0); ok(ret, "failed to release context, error %u\n", GetLastError()); } static void testsign_sign(struct testsign_context *ctx, const WCHAR *filename) { SIGNER_ATTR_AUTHCODE authcode = {sizeof(authcode)}; SIGNER_SIGNATURE_INFO signature = {sizeof(signature)}; SIGNER_SUBJECT_INFO subject = {sizeof(subject)}; SIGNER_CERT_STORE_INFO store = {sizeof(store)}; SIGNER_CERT cert_info = {sizeof(cert_info)}; SIGNER_FILE_INFO file = {sizeof(file)}; DWORD index = 0; HRESULT hr; subject.dwSubjectChoice = 1; subject.pdwIndex = &index; subject.pSignerFileInfo = &file; file.pwszFileName = (WCHAR *)filename; cert_info.dwCertChoice = 2; cert_info.pCertStoreInfo = &store; store.pSigningCert = ctx->cert; store.dwCertPolicy = 0; signature.algidHash = CALG_SHA_256; signature.dwAttrChoice = SIGNER_AUTHCODE_ATTR; signature.pAttrAuthcode = &authcode; authcode.pwszName = L""; authcode.pwszInfo = L""; hr = pSignerSign(&subject, &cert_info, &signature, NULL, NULL, NULL, NULL); todo_wine ok(hr == S_OK || broken(hr == NTE_BAD_ALGID) /* < 7 */, "Failed to sign, hr %#x\n", hr); } static void unload_driver(SC_HANDLE service) { SERVICE_STATUS status; ControlService(service, SERVICE_CONTROL_STOP, &status); while (status.dwCurrentState == SERVICE_STOP_PENDING) { BOOL ret; Sleep(100); ret = QueryServiceStatus(service, &status); ok(ret, "QueryServiceStatus failed: %u\n", GetLastError()); } ok(status.dwCurrentState == SERVICE_STOPPED, "expected SERVICE_STOPPED, got %d\n", status.dwCurrentState); DeleteService(service); CloseServiceHandle(service); } static SC_HANDLE load_driver(struct testsign_context *ctx, WCHAR *filename, const WCHAR *resname, const WCHAR *driver_name) { SC_HANDLE manager, service; manager = OpenSCManagerA(NULL, NULL, SC_MANAGER_ALL_ACCESS); if (!manager && GetLastError() == ERROR_ACCESS_DENIED) { skip("Failed to open SC manager, not enough permissions\n"); return FALSE; } ok(!!manager, "OpenSCManager failed\n"); /* stop any old drivers running under this name */ service = OpenServiceW(manager, driver_name, SERVICE_ALL_ACCESS); if (service) unload_driver(service); load_resource(resname, filename); testsign_sign(ctx, filename); trace("Trying to load driver %s\n", debugstr_w(filename)); service = CreateServiceW(manager, driver_name, driver_name, SERVICE_ALL_ACCESS, SERVICE_KERNEL_DRIVER, SERVICE_DEMAND_START, SERVICE_ERROR_NORMAL, filename, NULL, NULL, NULL, NULL, NULL); ok(!!service, "CreateService failed: %u\n", GetLastError()); CloseServiceHandle(manager); return service; } static BOOL start_driver(HANDLE service, BOOL vista_plus) { SERVICE_STATUS status; BOOL ret; SetLastError(0xdeadbeef); ret = StartServiceA(service, 0, NULL); if (!ret && (GetLastError() == ERROR_DRIVER_BLOCKED || GetLastError() == ERROR_INVALID_IMAGE_HASH || (vista_plus && GetLastError() == ERROR_FILE_NOT_FOUND))) { if (vista_plus && GetLastError() == ERROR_FILE_NOT_FOUND) { skip("Windows Vista or newer is required to run this service.\n"); } else { /* If Secure Boot is enabled or the machine is 64-bit, it will reject an unsigned driver. */ skip("Failed to start service; probably your machine doesn't accept unsigned drivers.\n"); } DeleteService(service); CloseServiceHandle(service); return FALSE; } ok(ret, "StartService failed: %u\n", GetLastError()); /* wait for the service to start up properly */ ret = QueryServiceStatus(service, &status); ok(ret, "QueryServiceStatus failed: %u\n", GetLastError()); while (status.dwCurrentState == SERVICE_START_PENDING) { Sleep(100); ret = QueryServiceStatus(service, &status); ok(ret, "QueryServiceStatus failed: %u\n", GetLastError()); } ok(status.dwCurrentState == SERVICE_RUNNING, "expected SERVICE_RUNNING, got %d\n", status.dwCurrentState); ok(status.dwServiceType == SERVICE_KERNEL_DRIVER, "expected SERVICE_KERNEL_DRIVER, got %#x\n", status.dwServiceType); return TRUE; } static ULONG64 modified_value; static void main_test(void) { struct test_input *test_input; DWORD written, read; LONG new_failures; char buffer[512]; HANDLE okfile; BOOL res; /* Create a temporary file that the driver will write ok/trace output to. */ okfile = CreateFileA("C:\\windows\\winetest_ntoskrnl_okfile", GENERIC_READ, FILE_SHARE_READ | FILE_SHARE_WRITE, NULL, CREATE_ALWAYS, 0, NULL); ok(okfile != INVALID_HANDLE_VALUE, "failed to create file, error %u\n", GetLastError()); test_input = heap_alloc( sizeof(*test_input) ); test_input->running_under_wine = !strcmp(winetest_platform, "wine"); test_input->winetest_report_success = winetest_report_success; test_input->winetest_debug = winetest_debug; test_input->process_id = GetCurrentProcessId(); test_input->teststr_offset = (SIZE_T)((BYTE *)&teststr - (BYTE *)NtCurrentTeb()->Peb->ImageBaseAddress); test_input->modified_value = &modified_value; modified_value = 0; res = DeviceIoControl(device, IOCTL_WINETEST_MAIN_TEST, test_input, sizeof(*test_input), &new_failures, sizeof(new_failures), &written, NULL); ok(res, "DeviceIoControl failed: %u\n", GetLastError()); ok(written == sizeof(new_failures), "got size %x\n", written); /* Print the ok/trace output and then add to our failure count. */ do { ReadFile(okfile, buffer, sizeof(buffer), &read, NULL); printf("%.*s", read, buffer); } while (read == sizeof(buffer)); winetest_add_failures(new_failures); heap_free(test_input); CloseHandle(okfile); DeleteFileA("C:\\windows\\winetest_ntoskrnl_okfile"); } static void test_basic_ioctl(void) { char inbuf[64], buf[32]; DWORD written; BOOL res; res = DeviceIoControl(device, IOCTL_WINETEST_BASIC_IOCTL, NULL, 0, buf, sizeof(buf), &written, NULL); ok(res, "DeviceIoControl failed: %u\n", GetLastError()); ok(written == sizeof(teststr), "got size %d\n", written); ok(!strcmp(buf, teststr), "got '%s'\n", buf); memset(buf, 0, sizeof(buf)); res = DeviceIoControl(device, IOCTL_WINETEST_BASIC_IOCTL, inbuf, sizeof(inbuf), buf, 10, &written, NULL); ok(res, "DeviceIoControl failed: %u\n", GetLastError()); ok(written == 10, "got size %d\n", written); ok(!strcmp(buf, "Wine is no"), "got '%s'\n", buf); } static void test_mismatched_status_ioctl(void) { DWORD written; char buf[32]; BOOL res; res = DeviceIoControl(device, IOCTL_WINETEST_MISMATCHED_STATUS, NULL, 0, buf, sizeof(buf), &written, NULL); todo_wine ok(res, "DeviceIoControl failed: %u\n", GetLastError()); todo_wine ok(!strcmp(buf, teststr), "got '%s'\n", buf); } static void test_overlapped(void) { OVERLAPPED overlapped, overlapped2, *o; DWORD cancel_cnt, size; HANDLE file, port; ULONG_PTR key; BOOL res; overlapped.hEvent = CreateEventW(NULL, TRUE, FALSE, NULL); overlapped2.hEvent = CreateEventW(NULL, TRUE, FALSE, NULL); file = CreateFileA("\\\\.\\WineTestDriver", FILE_READ_ATTRIBUTES | FILE_WRITE_ATTRIBUTES, 0, NULL, OPEN_EXISTING, FILE_FLAG_OVERLAPPED, NULL); ok(file != INVALID_HANDLE_VALUE, "failed to open device: %u\n", GetLastError()); /* test cancelling all device requests */ res = DeviceIoControl(file, IOCTL_WINETEST_RESET_CANCEL, NULL, 0, NULL, 0, NULL, &overlapped); ok(res, "DeviceIoControl failed: %u\n", GetLastError()); res = DeviceIoControl(file, IOCTL_WINETEST_TEST_CANCEL, NULL, 0, NULL, 0, NULL, &overlapped); ok(!res && GetLastError() == ERROR_IO_PENDING, "DeviceIoControl failed: %u\n", GetLastError()); res = DeviceIoControl(file, IOCTL_WINETEST_TEST_CANCEL, NULL, 0, NULL, 0, NULL, &overlapped2); ok(!res && GetLastError() == ERROR_IO_PENDING, "DeviceIoControl failed: %u\n", GetLastError()); cancel_cnt = 0xdeadbeef; res = DeviceIoControl(file, IOCTL_WINETEST_GET_CANCEL_COUNT, NULL, 0, &cancel_cnt, sizeof(cancel_cnt), NULL, &overlapped); ok(res, "DeviceIoControl failed: %u\n", GetLastError()); ok(cancel_cnt == 0, "cancel_cnt = %u\n", cancel_cnt); CancelIo(file); cancel_cnt = 0xdeadbeef; res = DeviceIoControl(file, IOCTL_WINETEST_GET_CANCEL_COUNT, NULL, 0, &cancel_cnt, sizeof(cancel_cnt), NULL, &overlapped); ok(res, "DeviceIoControl failed: %u\n", GetLastError()); ok(cancel_cnt == 2, "cancel_cnt = %u\n", cancel_cnt); /* test cancelling selected overlapped event */ if (pCancelIoEx) { res = DeviceIoControl(file, IOCTL_WINETEST_RESET_CANCEL, NULL, 0, NULL, 0, NULL, &overlapped); ok(res, "DeviceIoControl failed: %u\n", GetLastError()); res = DeviceIoControl(file, IOCTL_WINETEST_TEST_CANCEL, NULL, 0, NULL, 0, NULL, &overlapped); ok(!res && GetLastError() == ERROR_IO_PENDING, "DeviceIoControl failed: %u\n", GetLastError()); res = DeviceIoControl(file, IOCTL_WINETEST_TEST_CANCEL, NULL, 0, NULL, 0, NULL, &overlapped2); ok(!res && GetLastError() == ERROR_IO_PENDING, "DeviceIoControl failed: %u\n", GetLastError()); pCancelIoEx(file, &overlapped); cancel_cnt = 0xdeadbeef; res = DeviceIoControl(file, IOCTL_WINETEST_GET_CANCEL_COUNT, NULL, 0, &cancel_cnt, sizeof(cancel_cnt), NULL, &overlapped); ok(res, "DeviceIoControl failed: %u\n", GetLastError()); ok(cancel_cnt == 1, "cancel_cnt = %u\n", cancel_cnt); pCancelIoEx(file, &overlapped2); cancel_cnt = 0xdeadbeef; res = DeviceIoControl(file, IOCTL_WINETEST_GET_CANCEL_COUNT, NULL, 0, &cancel_cnt, sizeof(cancel_cnt), NULL, &overlapped); ok(res, "DeviceIoControl failed: %u\n", GetLastError()); ok(cancel_cnt == 2, "cancel_cnt = %u\n", cancel_cnt); } port = CreateIoCompletionPort(file, NULL, 0xdeadbeef, 0); ok(port != NULL, "CreateIoCompletionPort failed, error %u\n", GetLastError()); res = GetQueuedCompletionStatus(port, &size, &key, &o, 0); ok(!res && GetLastError() == WAIT_TIMEOUT, "GetQueuedCompletionStatus returned %x(%u)\n", res, GetLastError()); res = DeviceIoControl(file, IOCTL_WINETEST_RESET_CANCEL, NULL, 0, NULL, 0, NULL, &overlapped); ok(res, "DeviceIoControl failed: %u\n", GetLastError()); res = GetQueuedCompletionStatus(port, &size, &key, &o, 0); ok(res, "GetQueuedCompletionStatus failed: %u\n", GetLastError()); ok(o == &overlapped, "o != overlapped\n"); if (pSetFileCompletionNotificationModes) { res = pSetFileCompletionNotificationModes(file, FILE_SKIP_COMPLETION_PORT_ON_SUCCESS); ok(res, "SetFileCompletionNotificationModes failed: %u\n", GetLastError()); res = DeviceIoControl(file, IOCTL_WINETEST_RESET_CANCEL, NULL, 0, NULL, 0, NULL, &overlapped); ok(res, "DeviceIoControl failed: %u\n", GetLastError()); res = GetQueuedCompletionStatus(port, &size, &key, &o, 0); ok(!res && GetLastError() == WAIT_TIMEOUT, "GetQueuedCompletionStatus returned %x(%u)\n", res, GetLastError()); } CloseHandle(port); CloseHandle(overlapped.hEvent); CloseHandle(overlapped2.hEvent); CloseHandle(file); } static void test_load_driver(SC_HANDLE service) { SERVICE_STATUS status; BOOL load, res; DWORD sz; res = QueryServiceStatus(service, &status); ok(res, "QueryServiceStatusEx failed: %u\n", GetLastError()); ok(status.dwCurrentState == SERVICE_STOPPED, "got state %#x\n", status.dwCurrentState); load = TRUE; res = DeviceIoControl(device, IOCTL_WINETEST_LOAD_DRIVER, &load, sizeof(load), NULL, 0, &sz, NULL); ok(res, "DeviceIoControl failed: %u\n", GetLastError()); res = QueryServiceStatus(service, &status); ok(res, "QueryServiceStatusEx failed: %u\n", GetLastError()); ok(status.dwCurrentState == SERVICE_RUNNING, "got state %#x\n", status.dwCurrentState); load = FALSE; res = DeviceIoControl(device, IOCTL_WINETEST_LOAD_DRIVER, &load, sizeof(load), NULL, 0, &sz, NULL); ok(res, "DeviceIoControl failed: %u\n", GetLastError()); res = QueryServiceStatus(service, &status); ok(res, "QueryServiceStatusEx failed: %u\n", GetLastError()); ok(status.dwCurrentState == SERVICE_STOPPED, "got state %#x\n", status.dwCurrentState); } static void test_file_handles(void) { DWORD count, ret_size; HANDLE file, dup, file2; BOOL ret; ret = DeviceIoControl(device, IOCTL_WINETEST_GET_CREATE_COUNT, NULL, 0, &count, sizeof(count), &ret_size, NULL); ok(ret, "ioctl failed: %u\n", GetLastError()); ok(count == 2, "got %u\n", count); ret = DeviceIoControl(device, IOCTL_WINETEST_GET_CLOSE_COUNT, NULL, 0, &count, sizeof(count), &ret_size, NULL); ok(ret, "ioctl failed: %u\n", GetLastError()); ok(count == 1, "got %u\n", count); file = CreateFileA("\\\\.\\WineTestDriver", 0, 0, NULL, OPEN_EXISTING, 0, NULL); ok(file != INVALID_HANDLE_VALUE, "failed to open device: %u\n", GetLastError()); ret = DeviceIoControl(device, IOCTL_WINETEST_GET_CREATE_COUNT, NULL, 0, &count, sizeof(count), &ret_size, NULL); ok(ret, "ioctl failed: %u\n", GetLastError()); ok(count == 3, "got %u\n", count); file2 = CreateFileA("\\\\.\\WineTestDriver", 0, 0, NULL, OPEN_EXISTING, 0, NULL); ok(file2 != INVALID_HANDLE_VALUE, "failed to open device: %u\n", GetLastError()); ret = DeviceIoControl(device, IOCTL_WINETEST_GET_CREATE_COUNT, NULL, 0, &count, sizeof(count), &ret_size, NULL); ok(ret, "ioctl failed: %u\n", GetLastError()); ok(count == 4, "got %u\n", count); ret = DuplicateHandle(GetCurrentProcess(), file, GetCurrentProcess(), &dup, 0, FALSE, DUPLICATE_SAME_ACCESS); ok(ret, "failed to duplicate handle: %u\n", GetLastError()); ret = DeviceIoControl(device, IOCTL_WINETEST_GET_CREATE_COUNT, NULL, 0, &count, sizeof(count), &ret_size, NULL); ok(ret, "ioctl failed: %u\n", GetLastError()); ok(count == 4, "got %u\n", count); ret = DeviceIoControl(device, IOCTL_WINETEST_GET_FSCONTEXT, NULL, 0, &count, sizeof(count), &ret_size, NULL); ok(ret, "ioctl failed: %u\n", GetLastError()); ok(count == 1, "got %u\n", count); ret = DeviceIoControl(file, IOCTL_WINETEST_GET_FSCONTEXT, NULL, 0, &count, sizeof(count), &ret_size, NULL); ok(ret, "ioctl failed: %u\n", GetLastError()); ok(count == 3, "got %u\n", count); ret = DeviceIoControl(file2, IOCTL_WINETEST_GET_FSCONTEXT, NULL, 0, &count, sizeof(count), &ret_size, NULL); ok(ret, "ioctl failed: %u\n", GetLastError()); ok(count == 4, "got %u\n", count); ret = DeviceIoControl(dup, IOCTL_WINETEST_GET_FSCONTEXT, NULL, 0, &count, sizeof(count), &ret_size, NULL); ok(ret, "ioctl failed: %u\n", GetLastError()); ok(count == 3, "got %u\n", count); CloseHandle(dup); ret = DeviceIoControl(device, IOCTL_WINETEST_GET_CLOSE_COUNT, NULL, 0, &count, sizeof(count), &ret_size, NULL); ok(ret, "ioctl failed: %u\n", GetLastError()); ok(count == 1, "got %u\n", count); CloseHandle(file2); ret = DeviceIoControl(device, IOCTL_WINETEST_GET_CLOSE_COUNT, NULL, 0, &count, sizeof(count), &ret_size, NULL); ok(ret, "ioctl failed: %u\n", GetLastError()); ok(count == 2, "got %u\n", count); CloseHandle(file); ret = DeviceIoControl(device, IOCTL_WINETEST_GET_CLOSE_COUNT, NULL, 0, &count, sizeof(count), &ret_size, NULL); ok(ret, "ioctl failed: %u\n", GetLastError()); ok(count == 3, "got %u\n", count); } static void test_return_status(void) { NTSTATUS status; char buffer[7]; DWORD ret_size; BOOL ret; strcpy(buffer, "abcdef"); status = STATUS_SUCCESS; SetLastError(0xdeadbeef); ret = DeviceIoControl(device, IOCTL_WINETEST_RETURN_STATUS, &status, sizeof(status), buffer, sizeof(buffer), &ret_size, NULL); ok(ret, "ioctl failed\n"); ok(GetLastError() == 0xdeadbeef, "got error %u\n", GetLastError()); ok(!strcmp(buffer, "ghidef"), "got buffer %s\n", buffer); ok(ret_size == 3, "got size %u\n", ret_size); strcpy(buffer, "abcdef"); status = STATUS_TIMEOUT; SetLastError(0xdeadbeef); ret = DeviceIoControl(device, IOCTL_WINETEST_RETURN_STATUS, &status, sizeof(status), buffer, sizeof(buffer), &ret_size, NULL); todo_wine ok(ret, "ioctl failed\n"); todo_wine ok(GetLastError() == 0xdeadbeef, "got error %u\n", GetLastError()); ok(!strcmp(buffer, "ghidef"), "got buffer %s\n", buffer); ok(ret_size == 3, "got size %u\n", ret_size); strcpy(buffer, "abcdef"); status = 0x0eadbeef; SetLastError(0xdeadbeef); ret = DeviceIoControl(device, IOCTL_WINETEST_RETURN_STATUS, &status, sizeof(status), buffer, sizeof(buffer), &ret_size, NULL); todo_wine ok(ret, "ioctl failed\n"); todo_wine ok(GetLastError() == 0xdeadbeef, "got error %u\n", GetLastError()); ok(!strcmp(buffer, "ghidef"), "got buffer %s\n", buffer); ok(ret_size == 3, "got size %u\n", ret_size); strcpy(buffer, "abcdef"); status = 0x4eadbeef; SetLastError(0xdeadbeef); ret = DeviceIoControl(device, IOCTL_WINETEST_RETURN_STATUS, &status, sizeof(status), buffer, sizeof(buffer), &ret_size, NULL); todo_wine ok(ret, "ioctl failed\n"); todo_wine ok(GetLastError() == 0xdeadbeef, "got error %u\n", GetLastError()); ok(!strcmp(buffer, "ghidef"), "got buffer %s\n", buffer); ok(ret_size == 3, "got size %u\n", ret_size); strcpy(buffer, "abcdef"); status = 0x8eadbeef; SetLastError(0xdeadbeef); ret = DeviceIoControl(device, IOCTL_WINETEST_RETURN_STATUS, &status, sizeof(status), buffer, sizeof(buffer), &ret_size, NULL); ok(!ret, "ioctl succeeded\n"); ok(GetLastError() == ERROR_MR_MID_NOT_FOUND, "got error %u\n", GetLastError()); ok(!strcmp(buffer, "ghidef"), "got buffer %s\n", buffer); ok(ret_size == 3, "got size %u\n", ret_size); strcpy(buffer, "abcdef"); status = 0xceadbeef; SetLastError(0xdeadbeef); ret = DeviceIoControl(device, IOCTL_WINETEST_RETURN_STATUS, &status, sizeof(status), buffer, sizeof(buffer), &ret_size, NULL); ok(!ret, "ioctl succeeded\n"); ok(GetLastError() == ERROR_MR_MID_NOT_FOUND, "got error %u\n", GetLastError()); ok(!strcmp(buffer, "abcdef"), "got buffer %s\n", buffer); ok(ret_size == 3, "got size %u\n", ret_size); } static BOOL compare_unicode_string(const WCHAR *buffer, ULONG len, const WCHAR *expect) { return len == wcslen(expect) * sizeof(WCHAR) && !memcmp(buffer, expect, len); } static void test_object_info(void) { char buffer[200]; OBJECT_NAME_INFORMATION *name_info = (OBJECT_NAME_INFORMATION *)buffer; OBJECT_TYPE_INFORMATION *type_info = (OBJECT_TYPE_INFORMATION *)buffer; FILE_FS_VOLUME_INFORMATION *volume_info = (FILE_FS_VOLUME_INFORMATION *)buffer; FILE_NAME_INFORMATION *file_info = (FILE_NAME_INFORMATION *)buffer; HANDLE file; NTSTATUS status; IO_STATUS_BLOCK io; ULONG size; status = NtQueryObject(device, ObjectNameInformation, buffer, sizeof(buffer), NULL); ok(!status, "got %#x\n", status); ok(compare_unicode_string(name_info->Name.Buffer, name_info->Name.Length, L"\\Device\\WineTestDriver"), "wrong name %s\n", debugstr_w(name_info->Name.Buffer)); status = NtQueryObject(device, ObjectTypeInformation, buffer, sizeof(buffer), NULL); ok(!status, "got %#x\n", status); ok(compare_unicode_string(type_info->TypeName.Buffer, type_info->TypeName.Length, L"File"), "wrong name %s\n", debugstr_wn(type_info->TypeName.Buffer, type_info->TypeName.Length / sizeof(WCHAR))); status = NtQueryInformationFile(device, &io, buffer, sizeof(buffer), FileNameInformation); todo_wine ok(status == STATUS_INVALID_DEVICE_REQUEST, "got %#x\n", status); status = NtQueryVolumeInformationFile(device, &io, buffer, sizeof(buffer), FileFsVolumeInformation); todo_wine ok(status == STATUS_INVALID_DEVICE_REQUEST, "got %#x\n", status); file = CreateFileA("\\\\.\\WineTestDriver\\subfile", 0, 0, NULL, OPEN_EXISTING, 0, NULL); todo_wine ok(file != INVALID_HANDLE_VALUE, "got error %u\n", GetLastError()); if (file == INVALID_HANDLE_VALUE) return; memset(buffer, 0xcc, sizeof(buffer)); status = NtQueryObject(file, ObjectNameInformation, buffer, sizeof(buffer), &size); ok(!status, "got %#x\n", status); ok(size == sizeof(*name_info) + sizeof(L"\\Device\\WineTestDriver\\subfile"), "wrong size %u\n", size); ok(compare_unicode_string(name_info->Name.Buffer, name_info->Name.Length, L"\\Device\\WineTestDriver\\subfile"), "wrong name %s\n", debugstr_w(name_info->Name.Buffer)); memset(buffer, 0xcc, sizeof(buffer)); status = NtQueryObject(file, ObjectNameInformation, buffer, size - 2, &size); ok(status == STATUS_BUFFER_OVERFLOW, "got %#x\n", status); ok(size == sizeof(*name_info) + sizeof(L"\\Device\\WineTestDriver\\subfile"), "wrong size %u\n", size); ok(compare_unicode_string(name_info->Name.Buffer, name_info->Name.Length, L"\\Device\\WineTestDriver\\subfil"), "wrong name %s\n", debugstr_w(name_info->Name.Buffer)); memset(buffer, 0xcc, sizeof(buffer)); status = NtQueryObject(file, ObjectNameInformation, buffer, sizeof(*name_info), &size); ok(status == STATUS_BUFFER_OVERFLOW, "got %#x\n", status); ok(size == sizeof(*name_info) + sizeof(L"\\Device\\WineTestDriver\\subfile"), "wrong size %u\n", size); status = NtQueryObject(file, ObjectTypeInformation, buffer, sizeof(buffer), NULL); ok(!status, "got %#x\n", status); ok(compare_unicode_string(type_info->TypeName.Buffer, type_info->TypeName.Length, L"File"), "wrong name %s\n", debugstr_wn(type_info->TypeName.Buffer, type_info->TypeName.Length / sizeof(WCHAR))); status = NtQueryInformationFile(file, &io, buffer, sizeof(buffer), FileNameInformation); ok(!status, "got %#x\n", status); ok(compare_unicode_string(file_info->FileName, file_info->FileNameLength, L"\\subfile"), "wrong name %s\n", debugstr_wn(file_info->FileName, file_info->FileNameLength / sizeof(WCHAR))); status = NtQueryVolumeInformationFile(file, &io, buffer, sizeof(buffer), FileFsVolumeInformation); ok(!status, "got %#x\n", status); ok(volume_info->VolumeSerialNumber == 0xdeadbeef, "wrong serial number 0x%08x\n", volume_info->VolumeSerialNumber); ok(compare_unicode_string(volume_info->VolumeLabel, volume_info->VolumeLabelLength, L"WineTestDriver"), "wrong name %s\n", debugstr_wn(volume_info->VolumeLabel, volume_info->VolumeLabelLength / sizeof(WCHAR))); CloseHandle(file); file = CreateFileA("\\\\.\\WineTestDriver\\notimpl", 0, 0, NULL, OPEN_EXISTING, 0, NULL); ok(file != INVALID_HANDLE_VALUE, "got error %u\n", GetLastError()); status = NtQueryObject(file, ObjectNameInformation, buffer, sizeof(buffer), NULL); ok(!status, "got %#x\n", status); ok(compare_unicode_string(name_info->Name.Buffer, name_info->Name.Length, L"\\Device\\WineTestDriver"), "wrong name %s\n", debugstr_w(name_info->Name.Buffer)); status = NtQueryInformationFile(file, &io, buffer, sizeof(buffer), FileNameInformation); ok(status == STATUS_NOT_IMPLEMENTED, "got %#x\n", status); CloseHandle(file); file = CreateFileA("\\\\.\\WineTestDriver\\badparam", 0, 0, NULL, OPEN_EXISTING, 0, NULL); ok(file != INVALID_HANDLE_VALUE, "got error %u\n", GetLastError()); status = NtQueryObject(file, ObjectNameInformation, buffer, sizeof(buffer), NULL); ok(!status, "got %#x\n", status); ok(compare_unicode_string(name_info->Name.Buffer, name_info->Name.Length, L"\\Device\\WineTestDriver"), "wrong name %s\n", debugstr_w(name_info->Name.Buffer)); status = NtQueryInformationFile(file, &io, buffer, sizeof(buffer), FileNameInformation); ok(status == STATUS_INVALID_PARAMETER, "got %#x\n", status); CloseHandle(file); file = CreateFileA("\\\\.\\WineTestDriver\\genfail", 0, 0, NULL, OPEN_EXISTING, 0, NULL); ok(file != INVALID_HANDLE_VALUE, "got error %u\n", GetLastError()); status = NtQueryObject(file, ObjectNameInformation, buffer, sizeof(buffer), NULL); ok(status == STATUS_UNSUCCESSFUL, "got %#x\n", status); status = NtQueryInformationFile(file, &io, buffer, sizeof(buffer), FileNameInformation); ok(status == STATUS_UNSUCCESSFUL, "got %#x\n", status); CloseHandle(file); file = CreateFileA("\\\\.\\WineTestDriver\\badtype", 0, 0, NULL, OPEN_EXISTING, 0, NULL); ok(file != INVALID_HANDLE_VALUE, "got error %u\n", GetLastError()); status = NtQueryObject(file, ObjectNameInformation, buffer, sizeof(buffer), NULL); ok(status == STATUS_OBJECT_TYPE_MISMATCH, "got %#x\n", status); status = NtQueryInformationFile(file, &io, buffer, sizeof(buffer), FileNameInformation); ok(status == STATUS_OBJECT_TYPE_MISMATCH, "got %#x\n", status); CloseHandle(file); } static void test_driver3(struct testsign_context *ctx) { WCHAR filename[MAX_PATH]; SC_HANDLE service; BOOL ret; service = load_driver(ctx, filename, L"driver3.dll", L"WineTestDriver3"); ok(service != NULL, "driver3 failed to load\n"); ret = StartServiceA(service, 0, NULL); ok(!ret, "driver3 should fail to start\n"); ok(GetLastError() == ERROR_CALL_NOT_IMPLEMENTED || GetLastError() == ERROR_INVALID_FUNCTION || GetLastError() == ERROR_PROC_NOT_FOUND /* XP */ || GetLastError() == ERROR_FILE_NOT_FOUND /* Win7 */, "got %u\n", GetLastError()); DeleteService(service); CloseServiceHandle(service); DeleteFileW(filename); } static DWORD WINAPI wsk_test_thread(void *parameter) { static const char test_send_string[] = "Client test string 1."; static const WORD version = MAKEWORD(2, 2); SOCKET s_listen, s_accept, s_connect; struct sockaddr_in addr; char buffer[256]; int ret, err; WSADATA data; int opt_val; ret = WSAStartup(version, &data); ok(!ret, "WSAStartup() failed, ret %u.\n", ret); s_connect = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); ok(s_connect != INVALID_SOCKET, "Error creating socket, WSAGetLastError() %u.\n", WSAGetLastError()); s_listen = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); ok(s_listen != INVALID_SOCKET, "Error creating socket, WSAGetLastError() %u.\n", WSAGetLastError()); opt_val = 1; setsockopt(s_listen, SOL_SOCKET, SO_REUSEADDR, (const char *)&opt_val, sizeof(opt_val)); memset(&addr, 0, sizeof(addr)); addr.sin_family = AF_INET; addr.sin_port = htons(CLIENT_LISTEN_PORT); addr.sin_addr.s_addr = htonl(0x7f000001); ret = bind(s_listen, (struct sockaddr *)&addr, sizeof(addr)); ok(!ret, "Got unexpected ret %d, WSAGetLastError() %u.\n", ret, WSAGetLastError()); ret = listen(s_listen, SOMAXCONN); ok(!ret, "Got unexpected ret %d, WSAGetLastError() %u.\n", ret, WSAGetLastError()); addr.sin_port = htons(SERVER_LISTEN_PORT); ret = connect(s_connect, (struct sockaddr *)&addr, sizeof(addr)); while (ret && ((err = WSAGetLastError()) == WSAECONNREFUSED || err == WSAECONNABORTED)) { SwitchToThread(); ret = connect(s_connect, (struct sockaddr *)&addr, sizeof(addr)); } ok(!ret, "Error connecting, WSAGetLastError() %u.\n", WSAGetLastError()); ret = send(s_connect, test_send_string, sizeof(test_send_string), 0); ok(ret == sizeof(test_send_string), "Got unexpected ret %d.\n", ret); ret = recv(s_connect, buffer, sizeof(buffer), 0); ok(ret == sizeof(buffer), "Got unexpected ret %d.\n", ret); ok(!strcmp(buffer, "Server test string 1."), "Received unexpected data.\n"); s_accept = accept(s_listen, NULL, NULL); ok(s_accept != INVALID_SOCKET, "Error creating socket, WSAGetLastError() %u.\n", WSAGetLastError()); closesocket(s_accept); closesocket(s_connect); closesocket(s_listen); return TRUE; } static void test_driver4(struct testsign_context *ctx) { WCHAR filename[MAX_PATH]; SC_HANDLE service; HANDLE hthread; BOOL ret; if (!(service = load_driver(ctx, filename, L"driver4.dll", L"WineTestDriver4"))) return; if (!start_driver(service, TRUE)) { DeleteFileW(filename); return; } device = CreateFileA("\\\\.\\WineTestDriver4", 0, 0, NULL, OPEN_EXISTING, 0, NULL); ok(device != INVALID_HANDLE_VALUE, "failed to open device: %u\n", GetLastError()); hthread = CreateThread(NULL, 0, wsk_test_thread, NULL, 0, NULL); main_test(); WaitForSingleObject(hthread, INFINITE); CloseHandle(device); unload_driver(service); ret = DeleteFileW(filename); ok(ret, "DeleteFile failed: %u\n", GetLastError()); } static void add_file_to_catalog(HANDLE catalog, const WCHAR *file) { SIP_SUBJECTINFO subject_info = {sizeof(SIP_SUBJECTINFO)}; SIP_INDIRECT_DATA *indirect_data; const WCHAR *filepart = file; CRYPTCATMEMBER *member; WCHAR hash_buffer[100]; GUID subject_guid; unsigned int i; DWORD size; BOOL ret; ret = CryptSIPRetrieveSubjectGuidForCatalogFile(file, NULL, &subject_guid); todo_wine ok(ret, "Failed to get subject guid, error %u\n", GetLastError()); size = 0; subject_info.pgSubjectType = &subject_guid; subject_info.pwsFileName = file; subject_info.DigestAlgorithm.pszObjId = (char *)szOID_OIWSEC_sha1; subject_info.dwFlags = SPC_INC_PE_RESOURCES_FLAG | SPC_INC_PE_IMPORT_ADDR_TABLE_FLAG | SPC_EXC_PE_PAGE_HASHES_FLAG | 0x10000; ret = CryptSIPCreateIndirectData(&subject_info, &size, NULL); todo_wine ok(ret, "Failed to get indirect data size, error %u\n", GetLastError()); indirect_data = malloc(size); ret = CryptSIPCreateIndirectData(&subject_info, &size, indirect_data); todo_wine ok(ret, "Failed to get indirect data, error %u\n", GetLastError()); if (ret) { memset(hash_buffer, 0, sizeof(hash_buffer)); for (i = 0; i < indirect_data->Digest.cbData; ++i) swprintf(&hash_buffer[i * 2], 2, L"%02X", indirect_data->Digest.pbData[i]); member = CryptCATPutMemberInfo(catalog, (WCHAR *)file, hash_buffer, &subject_guid, 0, size, (BYTE *)indirect_data); ok(!!member, "Failed to write member, error %u\n", GetLastError()); if (wcsrchr(file, '\\')) filepart = wcsrchr(file, '\\') + 1; ret = !!CryptCATPutAttrInfo(catalog, member, (WCHAR *)L"File", CRYPTCAT_ATTR_NAMEASCII | CRYPTCAT_ATTR_DATAASCII | CRYPTCAT_ATTR_AUTHENTICATED, (wcslen(filepart) + 1) * 2, (BYTE *)filepart); ok(ret, "Failed to write attr, error %u\n", GetLastError()); ret = !!CryptCATPutAttrInfo(catalog, member, (WCHAR *)L"OSAttr", CRYPTCAT_ATTR_NAMEASCII | CRYPTCAT_ATTR_DATAASCII | CRYPTCAT_ATTR_AUTHENTICATED, sizeof(L"2:6.0"), (BYTE *)L"2:6.0"); ok(ret, "Failed to write attr, error %u\n", GetLastError()); } } static void test_pnp_devices(void) { static const GUID control_class = {0xdeadbeef, 0x29ef, 0x4538, {0xa5, 0xfd, 0xb6, 0x95, 0x73, 0xa3, 0x62, 0xc0}}; char buffer[200]; SP_DEVICE_INTERFACE_DETAIL_DATA_A *iface_detail = (void *)buffer; SP_DEVICE_INTERFACE_DATA iface = {sizeof(iface)}; SP_DEVINFO_DATA device = {sizeof(device)}; HDEVINFO set; HANDLE bus; BOOL ret; set = SetupDiGetClassDevsA(&control_class, NULL, NULL, DIGCF_PRESENT | DIGCF_DEVICEINTERFACE); ok(set != INVALID_HANDLE_VALUE, "failed to get device list, error %#x\n", GetLastError()); ret = SetupDiEnumDeviceInfo(set, 0, &device); ok(ret, "failed to get device, error %#x\n", GetLastError()); ok(IsEqualGUID(&device.ClassGuid, &GUID_DEVCLASS_SYSTEM), "wrong class %s\n", debugstr_guid(&device.ClassGuid)); ret = SetupDiGetDeviceInstanceIdA(set, &device, buffer, sizeof(buffer), NULL); ok(ret, "failed to get device ID, error %#x\n", GetLastError()); ok(!strcasecmp(buffer, "root\\winetest\\0"), "got ID %s\n", debugstr_a(buffer)); ret = SetupDiEnumDeviceInterfaces(set, NULL, &control_class, 0, &iface); ok(ret, "failed to get interface, error %#x\n", GetLastError()); ok(IsEqualGUID(&iface.InterfaceClassGuid, &control_class), "wrong class %s\n", debugstr_guid(&iface.InterfaceClassGuid)); ok(iface.Flags == SPINT_ACTIVE, "got flags %#x\n", iface.Flags); iface_detail->cbSize = sizeof(*iface_detail); ret = SetupDiGetDeviceInterfaceDetailA(set, &iface, iface_detail, sizeof(buffer), NULL, NULL); ok(ret, "failed to get interface path, error %#x\n", GetLastError()); ok(!strcasecmp(iface_detail->DevicePath, "\\\\?\\root#winetest#0#{deadbeef-29ef-4538-a5fd-b69573a362c0}"), "wrong path %s\n", debugstr_a(iface_detail->DevicePath)); SetupDiDestroyDeviceInfoList(set); bus = CreateFileA(iface_detail->DevicePath, 0, 0, NULL, OPEN_EXISTING, 0, NULL); ok(bus != INVALID_HANDLE_VALUE, "got error %u\n", GetLastError()); CloseHandle(bus); } static void test_pnp_driver(struct testsign_context *ctx) { static const char hardware_id[] = "test_hardware_id\0"; char path[MAX_PATH], dest[MAX_PATH], *filepart; SP_DEVINFO_DATA device = {sizeof(device)}; char cwd[MAX_PATH], tempdir[MAX_PATH]; WCHAR driver_filename[MAX_PATH]; SC_HANDLE manager, service; BOOL ret, need_reboot; HANDLE catalog, file; HDEVINFO set; FILE *f; #ifdef __i386__ #define EXT "x86" #elif defined(__x86_64__) #define EXT "amd64" #elif defined(__arm__) #define EXT "arm" #elif defined(__aarch64__) #define EXT "arm64" #else #define EXT #endif static const char inf_text[] = "[Version]\n" "Signature=$Chicago$\n" "ClassGuid={4d36e97d-e325-11ce-bfc1-08002be10318}\n" "CatalogFile=winetest.cat\n" "DriverVer=09/21/2006,6.0.5736.1\n" "[Manufacturer]\n" "Wine=mfg_section,NT" EXT "\n" "[mfg_section.NT" EXT "]\n" "Wine test root driver=device_section,test_hardware_id\n" "[device_section.NT" EXT "]\n" "CopyFiles=file_section\n" "[device_section.NT" EXT ".Services]\n" "AddService=winetest,0x2,svc_section\n" "[file_section]\n" "winetest.sys\n" "[SourceDisksFiles]\n" "winetest.sys=1\n" "[SourceDisksNames]\n" "1=,winetest.sys\n" "[DestinationDirs]\n" "DefaultDestDir=12\n" "[svc_section]\n" "ServiceBinary=%12%\\winetest.sys\n" "ServiceType=1\n" "StartType=3\n" "ErrorControl=1\n" "LoadOrderGroup=Extended Base\n" "DisplayName=\"winetest bus driver\"\n" "; they don't sleep anymore, on the beach\n"; GetCurrentDirectoryA(ARRAY_SIZE(cwd), cwd); GetTempPathA(ARRAY_SIZE(tempdir), tempdir); SetCurrentDirectoryA(tempdir); load_resource(L"driver_pnp.dll", driver_filename); ret = MoveFileExW(driver_filename, L"winetest.sys", MOVEFILE_COPY_ALLOWED | MOVEFILE_REPLACE_EXISTING); ok(ret, "failed to move file, error %u\n", GetLastError()); f = fopen("winetest.inf", "w"); ok(!!f, "failed to open winetest.inf: %s\n", strerror(errno)); fputs(inf_text, f); fclose(f); /* Create the catalog file. */ catalog = CryptCATOpen((WCHAR *)L"winetest.cat", CRYPTCAT_OPEN_CREATENEW, 0, CRYPTCAT_VERSION_1, 0); ok(catalog != INVALID_HANDLE_VALUE, "Failed to create catalog, error %#x\n", GetLastError()); ret = !!CryptCATPutCatAttrInfo(catalog, (WCHAR *)L"HWID1", CRYPTCAT_ATTR_NAMEASCII | CRYPTCAT_ATTR_DATAASCII | CRYPTCAT_ATTR_AUTHENTICATED, sizeof(L"test_hardware_id"), (BYTE *)L"test_hardware_id"); todo_wine ok(ret, "failed to add attribute, error %#x\n", GetLastError()); ret = !!CryptCATPutCatAttrInfo(catalog, (WCHAR *)L"OS", CRYPTCAT_ATTR_NAMEASCII | CRYPTCAT_ATTR_DATAASCII | CRYPTCAT_ATTR_AUTHENTICATED, sizeof(L"VistaX64"), (BYTE *)L"VistaX64"); todo_wine ok(ret, "failed to add attribute, error %#x\n", GetLastError()); add_file_to_catalog(catalog, L"winetest.sys"); add_file_to_catalog(catalog, L"winetest.inf"); ret = CryptCATPersistStore(catalog); todo_wine ok(ret, "Failed to write catalog, error %u\n", GetLastError()); ret = CryptCATClose(catalog); ok(ret, "Failed to close catalog, error %u\n", GetLastError()); testsign_sign(ctx, L"winetest.cat"); /* Install the driver. */ set = SetupDiCreateDeviceInfoList(NULL, NULL); ok(set != INVALID_HANDLE_VALUE, "failed to create device list, error %#x\n", GetLastError()); ret = SetupDiCreateDeviceInfoA(set, "root\\winetest\\0", &GUID_NULL, NULL, NULL, 0, &device); ok(ret, "failed to create device, error %#x\n", GetLastError()); ret = SetupDiSetDeviceRegistryPropertyA( set, &device, SPDRP_HARDWAREID, (const BYTE *)hardware_id, sizeof(hardware_id) ); ok(ret, "failed to create set hardware ID, error %#x\n", GetLastError()); ret = SetupDiCallClassInstaller(DIF_REGISTERDEVICE, set, &device); ok(ret, "failed to register device, error %#x\n", GetLastError()); GetFullPathNameA("winetest.inf", sizeof(path), path, NULL); ret = UpdateDriverForPlugAndPlayDevicesA(NULL, hardware_id, path, INSTALLFLAG_FORCE, &need_reboot); ok(ret, "failed to install device, error %#x\n", GetLastError()); ok(!need_reboot, "expected no reboot necessary\n"); /* Tests. */ test_pnp_devices(); /* Clean up. */ ret = SetupDiCallClassInstaller(DIF_REMOVE, set, &device); ok(ret, "failed to remove device, error %#x\n", GetLastError()); file = CreateFileA("\\\\?\\root#winetest#0#{deadbeef-29ef-4538-a5fd-b69573a362c0}", 0, 0, NULL, OPEN_EXISTING, 0, NULL); ok(file == INVALID_HANDLE_VALUE, "expected failure\n"); ok(GetLastError() == ERROR_FILE_NOT_FOUND, "got error %u\n", GetLastError()); ret = SetupDiDestroyDeviceInfoList(set); ok(ret, "failed to destroy set, error %#x\n", GetLastError()); /* Windows stops the service but does not delete it. */ manager = OpenSCManagerA(NULL, NULL, SC_MANAGER_CONNECT); ok(!!manager, "failed to open service manager, error %u\n", GetLastError()); service = OpenServiceA(manager, "winetest", SERVICE_STOP | DELETE); ok(!!service, "failed to open service, error %u\n", GetLastError()); unload_driver(service); CloseServiceHandle(manager); GetFullPathNameA("winetest.inf", sizeof(path), path, NULL); ret = SetupCopyOEMInfA(path, NULL, 0, 0, dest, sizeof(dest), NULL, &filepart); ok(ret, "Failed to copy INF, error %#x\n", GetLastError()); ret = SetupUninstallOEMInfA(filepart, 0, NULL); ok(ret, "Failed to uninstall INF, error %u\n", GetLastError()); ret = DeleteFileA("winetest.cat"); ok(ret, "Failed to delete file, error %u\n", GetLastError()); ret = DeleteFileA("winetest.inf"); ok(ret, "Failed to delete file, error %u\n", GetLastError()); ret = DeleteFileA("winetest.sys"); ok(ret, "Failed to delete file, error %u\n", GetLastError()); /* Windows 10 apparently deletes the image in SetupUninstallOEMInf(). */ ret = DeleteFileA("C:/windows/system32/drivers/winetest.sys"); ok(ret || GetLastError() == ERROR_FILE_NOT_FOUND, "Failed to delete file, error %u\n", GetLastError()); SetCurrentDirectoryA(cwd); } START_TEST(ntoskrnl) { WCHAR filename[MAX_PATH], filename2[MAX_PATH]; struct testsign_context ctx; SC_HANDLE service, service2; BOOL ret, is_wow64; DWORD written; pRtlDosPathNameToNtPathName_U = (void *)GetProcAddress(GetModuleHandleA("ntdll"), "RtlDosPathNameToNtPathName_U"); pRtlFreeUnicodeString = (void *)GetProcAddress(GetModuleHandleA("ntdll"), "RtlFreeUnicodeString"); pCancelIoEx = (void *)GetProcAddress(GetModuleHandleA("kernel32.dll"), "CancelIoEx"); pIsWow64Process = (void *)GetProcAddress(GetModuleHandleA("kernel32.dll"), "IsWow64Process"); pSetFileCompletionNotificationModes = (void *)GetProcAddress(GetModuleHandleA("kernel32.dll"), "SetFileCompletionNotificationModes"); pSignerSign = (void *)GetProcAddress(LoadLibraryA("mssign32"), "SignerSign"); if (IsWow64Process(GetCurrentProcess(), &is_wow64) && is_wow64) { skip("Running in WoW64.\n"); return; } if (!testsign_create_cert(&ctx)) return; subtest("driver"); if (!(service = load_driver(&ctx, filename, L"driver.dll", L"WineTestDriver"))) { testsign_cleanup(&ctx); return; } if (!start_driver(service, FALSE)) { DeleteFileW(filename); testsign_cleanup(&ctx); return; } service2 = load_driver(&ctx, filename2, L"driver2.dll", L"WineTestDriver2"); device = CreateFileA("\\\\.\\WineTestDriver", 0, 0, NULL, OPEN_EXISTING, 0, NULL); ok(device != INVALID_HANDLE_VALUE, "failed to open device: %u\n", GetLastError()); test_basic_ioctl(); test_mismatched_status_ioctl(); main_test(); todo_wine ok(modified_value == 0xdeadbeeffeedcafe, "Got unexpected value %#I64x.\n", modified_value); test_overlapped(); test_load_driver(service2); test_file_handles(); test_return_status(); test_object_info(); /* We need a separate ioctl to call IoDetachDevice(); calling it in the * driver unload routine causes a live-lock. */ ret = DeviceIoControl(device, IOCTL_WINETEST_DETACH, NULL, 0, NULL, 0, &written, NULL); ok(ret, "DeviceIoControl failed: %u\n", GetLastError()); CloseHandle(device); unload_driver(service2); unload_driver(service); ret = DeleteFileW(filename); ok(ret, "DeleteFile failed: %u\n", GetLastError()); ret = DeleteFileW(filename2); ok(ret, "DeleteFile failed: %u\n", GetLastError()); test_driver3(&ctx); subtest("driver4"); test_driver4(&ctx); test_pnp_driver(&ctx); testsign_cleanup(&ctx); }