3857 lines
176 KiB
C
3857 lines
176 KiB
C
/*
|
|
* Unit test suite for Virtual* family of APIs.
|
|
*
|
|
* Copyright 2004 Dmitry Timoshkov
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this library; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
|
|
*/
|
|
|
|
#include <stdarg.h>
|
|
#include <stdio.h>
|
|
|
|
#include "ntstatus.h"
|
|
#define WIN32_NO_STATUS
|
|
#include "windef.h"
|
|
#include "winbase.h"
|
|
#include "winnt.h"
|
|
#include "winternl.h"
|
|
#include "winerror.h"
|
|
#include "winuser.h"
|
|
#include "excpt.h"
|
|
#include "wine/test.h"
|
|
|
|
#define NUM_THREADS 4
|
|
#define MAPPING_SIZE 0x100000
|
|
|
|
static HINSTANCE hkernel32, hntdll;
|
|
static LPVOID (WINAPI *pVirtualAllocEx)(HANDLE, LPVOID, SIZE_T, DWORD, DWORD);
|
|
static BOOL (WINAPI *pVirtualFreeEx)(HANDLE, LPVOID, SIZE_T, DWORD);
|
|
static UINT (WINAPI *pGetWriteWatch)(DWORD,LPVOID,SIZE_T,LPVOID*,ULONG_PTR*,ULONG*);
|
|
static UINT (WINAPI *pResetWriteWatch)(LPVOID,SIZE_T);
|
|
static NTSTATUS (WINAPI *pNtAreMappedFilesTheSame)(PVOID,PVOID);
|
|
static NTSTATUS (WINAPI *pNtMapViewOfSection)(HANDLE, HANDLE, PVOID *, ULONG, SIZE_T, const LARGE_INTEGER *, SIZE_T *, ULONG, ULONG, ULONG);
|
|
static DWORD (WINAPI *pNtUnmapViewOfSection)(HANDLE, PVOID);
|
|
static PVOID (WINAPI *pRtlAddVectoredExceptionHandler)(ULONG, PVECTORED_EXCEPTION_HANDLER);
|
|
static ULONG (WINAPI *pRtlRemoveVectoredExceptionHandler)(PVOID);
|
|
static BOOL (WINAPI *pGetProcessDEPPolicy)(HANDLE, LPDWORD, PBOOL);
|
|
static BOOL (WINAPI *pIsWow64Process)(HANDLE, PBOOL);
|
|
static NTSTATUS (WINAPI *pNtProtectVirtualMemory)(HANDLE, PVOID *, SIZE_T *, ULONG, ULONG *);
|
|
static NTSTATUS (WINAPI *pNtAllocateVirtualMemory)(HANDLE, PVOID *, ULONG, SIZE_T *, ULONG, ULONG);
|
|
static NTSTATUS (WINAPI *pNtFreeVirtualMemory)(HANDLE, PVOID *, SIZE_T *, ULONG);
|
|
|
|
/* ############################### */
|
|
|
|
static HANDLE create_target_process(const char *arg)
|
|
{
|
|
char **argv;
|
|
char cmdline[MAX_PATH];
|
|
PROCESS_INFORMATION pi;
|
|
BOOL ret;
|
|
STARTUPINFOA si = { 0 };
|
|
si.cb = sizeof(si);
|
|
|
|
winetest_get_mainargs( &argv );
|
|
sprintf(cmdline, "%s %s %s", argv[0], argv[1], arg);
|
|
ret = CreateProcessA(NULL, cmdline, NULL, NULL, FALSE, 0, NULL, NULL, &si, &pi);
|
|
ok(ret, "error: %u\n", GetLastError());
|
|
ret = CloseHandle(pi.hThread);
|
|
ok(ret, "error %u\n", GetLastError());
|
|
return pi.hProcess;
|
|
}
|
|
|
|
static void test_VirtualAllocEx(void)
|
|
{
|
|
const unsigned int alloc_size = 1<<15;
|
|
char *src, *dst;
|
|
SIZE_T bytes_written = 0, bytes_read = 0, i;
|
|
void *addr1, *addr2;
|
|
BOOL b;
|
|
DWORD old_prot;
|
|
MEMORY_BASIC_INFORMATION info;
|
|
HANDLE hProcess;
|
|
|
|
/* not exported in all windows-versions */
|
|
if ((!pVirtualAllocEx) || (!pVirtualFreeEx)) {
|
|
win_skip("Virtual{Alloc,Free}Ex not available\n");
|
|
return;
|
|
}
|
|
|
|
hProcess = create_target_process("sleep");
|
|
ok(hProcess != NULL, "Can't start process\n");
|
|
|
|
SetLastError(0xdeadbeef);
|
|
addr1 = pVirtualAllocEx(hProcess, NULL, alloc_size, MEM_COMMIT,
|
|
PAGE_EXECUTE_READWRITE);
|
|
if (!addr1 && GetLastError() == ERROR_CALL_NOT_IMPLEMENTED)
|
|
{ /* Win9x */
|
|
win_skip("VirtualAllocEx not implemented\n");
|
|
TerminateProcess(hProcess, 0);
|
|
CloseHandle(hProcess);
|
|
return;
|
|
}
|
|
|
|
src = VirtualAlloc( NULL, alloc_size, MEM_COMMIT, PAGE_READWRITE );
|
|
dst = VirtualAlloc( NULL, alloc_size, MEM_COMMIT, PAGE_READWRITE );
|
|
for (i = 0; i < alloc_size; i++)
|
|
src[i] = i & 0xff;
|
|
|
|
ok(addr1 != NULL, "VirtualAllocEx error %u\n", GetLastError());
|
|
b = WriteProcessMemory(hProcess, addr1, src, alloc_size, &bytes_written);
|
|
ok(b && (bytes_written == alloc_size), "%lu bytes written\n",
|
|
bytes_written);
|
|
b = ReadProcessMemory(hProcess, addr1, dst, alloc_size, &bytes_read);
|
|
ok(b && (bytes_read == alloc_size), "%lu bytes read\n", bytes_read);
|
|
ok(!memcmp(src, dst, alloc_size), "Data from remote process differs\n");
|
|
|
|
/* test invalid source buffers */
|
|
|
|
b = VirtualProtect( src + 0x2000, 0x2000, PAGE_NOACCESS, &old_prot );
|
|
ok( b, "VirtualProtect failed error %u\n", GetLastError() );
|
|
b = WriteProcessMemory(hProcess, addr1, src, alloc_size, &bytes_written);
|
|
ok( !b, "WriteProcessMemory succeeded\n" );
|
|
ok( GetLastError() == ERROR_NOACCESS ||
|
|
GetLastError() == ERROR_PARTIAL_COPY, /* vista */
|
|
"wrong error %u\n", GetLastError() );
|
|
ok( bytes_written == 0, "%lu bytes written\n", bytes_written );
|
|
b = ReadProcessMemory(hProcess, addr1, src, alloc_size, &bytes_read);
|
|
ok( !b, "ReadProcessMemory succeeded\n" );
|
|
ok( GetLastError() == ERROR_NOACCESS, "wrong error %u\n", GetLastError() );
|
|
ok( bytes_read == 0, "%lu bytes written\n", bytes_read );
|
|
|
|
b = VirtualProtect( src, 0x2000, PAGE_NOACCESS, &old_prot );
|
|
ok( b, "VirtualProtect failed error %u\n", GetLastError() );
|
|
b = WriteProcessMemory(hProcess, addr1, src, alloc_size, &bytes_written);
|
|
ok( !b, "WriteProcessMemory succeeded\n" );
|
|
ok( GetLastError() == ERROR_NOACCESS ||
|
|
GetLastError() == ERROR_PARTIAL_COPY, /* vista */
|
|
"wrong error %u\n", GetLastError() );
|
|
ok( bytes_written == 0, "%lu bytes written\n", bytes_written );
|
|
b = ReadProcessMemory(hProcess, addr1, src, alloc_size, &bytes_read);
|
|
ok( !b, "ReadProcessMemory succeeded\n" );
|
|
ok( GetLastError() == ERROR_NOACCESS, "wrong error %u\n", GetLastError() );
|
|
ok( bytes_read == 0, "%lu bytes written\n", bytes_read );
|
|
|
|
b = pVirtualFreeEx(hProcess, addr1, 0, MEM_RELEASE);
|
|
ok(b != 0, "VirtualFreeEx, error %u\n", GetLastError());
|
|
|
|
VirtualFree( src, 0, MEM_RELEASE );
|
|
VirtualFree( dst, 0, MEM_RELEASE );
|
|
|
|
/*
|
|
* The following tests parallel those in test_VirtualAlloc()
|
|
*/
|
|
|
|
SetLastError(0xdeadbeef);
|
|
addr1 = pVirtualAllocEx(hProcess, 0, 0, MEM_RESERVE, PAGE_NOACCESS);
|
|
ok(addr1 == NULL, "VirtualAllocEx should fail on zero-sized allocation\n");
|
|
ok(GetLastError() == ERROR_INVALID_PARAMETER /* NT */ ||
|
|
GetLastError() == ERROR_NOT_ENOUGH_MEMORY, /* Win9x */
|
|
"got %u, expected ERROR_INVALID_PARAMETER\n", GetLastError());
|
|
|
|
addr1 = pVirtualAllocEx(hProcess, 0, 0xFFFC, MEM_RESERVE, PAGE_NOACCESS);
|
|
ok(addr1 != NULL, "VirtualAllocEx failed\n");
|
|
|
|
/* test a not committed memory */
|
|
memset(&info, 'q', sizeof(info));
|
|
ok(VirtualQueryEx(hProcess, addr1, &info, sizeof(info)) == sizeof(info), "VirtualQueryEx failed\n");
|
|
ok(info.BaseAddress == addr1, "%p != %p\n", info.BaseAddress, addr1);
|
|
ok(info.AllocationBase == addr1, "%p != %p\n", info.AllocationBase, addr1);
|
|
ok(info.AllocationProtect == PAGE_NOACCESS, "%x != PAGE_NOACCESS\n", info.AllocationProtect);
|
|
ok(info.RegionSize == 0x10000, "%lx != 0x10000\n", info.RegionSize);
|
|
ok(info.State == MEM_RESERVE, "%x != MEM_RESERVE\n", info.State);
|
|
/* NT reports Protect == 0 for a not committed memory block */
|
|
ok(info.Protect == 0 /* NT */ ||
|
|
info.Protect == PAGE_NOACCESS, /* Win9x */
|
|
"%x != PAGE_NOACCESS\n", info.Protect);
|
|
ok(info.Type == MEM_PRIVATE, "%x != MEM_PRIVATE\n", info.Type);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ok(!VirtualProtectEx(hProcess, addr1, 0xFFFC, PAGE_READONLY, &old_prot),
|
|
"VirtualProtectEx should fail on a not committed memory\n");
|
|
ok(GetLastError() == ERROR_INVALID_ADDRESS /* NT */ ||
|
|
GetLastError() == ERROR_INVALID_PARAMETER, /* Win9x */
|
|
"got %u, expected ERROR_INVALID_ADDRESS\n", GetLastError());
|
|
|
|
addr2 = pVirtualAllocEx(hProcess, addr1, 0x1000, MEM_COMMIT, PAGE_NOACCESS);
|
|
ok(addr1 == addr2, "VirtualAllocEx failed\n");
|
|
|
|
/* test a committed memory */
|
|
ok(VirtualQueryEx(hProcess, addr1, &info, sizeof(info)) == sizeof(info),
|
|
"VirtualQueryEx failed\n");
|
|
ok(info.BaseAddress == addr1, "%p != %p\n", info.BaseAddress, addr1);
|
|
ok(info.AllocationBase == addr1, "%p != %p\n", info.AllocationBase, addr1);
|
|
ok(info.AllocationProtect == PAGE_NOACCESS, "%x != PAGE_NOACCESS\n", info.AllocationProtect);
|
|
ok(info.RegionSize == 0x1000, "%lx != 0x1000\n", info.RegionSize);
|
|
ok(info.State == MEM_COMMIT, "%x != MEM_COMMIT\n", info.State);
|
|
/* this time NT reports PAGE_NOACCESS as well */
|
|
ok(info.Protect == PAGE_NOACCESS, "%x != PAGE_NOACCESS\n", info.Protect);
|
|
ok(info.Type == MEM_PRIVATE, "%x != MEM_PRIVATE\n", info.Type);
|
|
|
|
/* this should fail, since not the whole range is committed yet */
|
|
SetLastError(0xdeadbeef);
|
|
ok(!VirtualProtectEx(hProcess, addr1, 0xFFFC, PAGE_READONLY, &old_prot),
|
|
"VirtualProtectEx should fail on a not committed memory\n");
|
|
ok(GetLastError() == ERROR_INVALID_ADDRESS /* NT */ ||
|
|
GetLastError() == ERROR_INVALID_PARAMETER, /* Win9x */
|
|
"got %u, expected ERROR_INVALID_ADDRESS\n", GetLastError());
|
|
|
|
old_prot = 0;
|
|
ok(VirtualProtectEx(hProcess, addr1, 0x1000, PAGE_READONLY, &old_prot), "VirtualProtectEx failed\n");
|
|
ok(old_prot == PAGE_NOACCESS, "wrong old protection: got %04x instead of PAGE_NOACCESS\n", old_prot);
|
|
|
|
old_prot = 0;
|
|
ok(VirtualProtectEx(hProcess, addr1, 0x1000, PAGE_READWRITE, &old_prot), "VirtualProtectEx failed\n");
|
|
ok(old_prot == PAGE_READONLY, "wrong old protection: got %04x instead of PAGE_READONLY\n", old_prot);
|
|
|
|
ok(!pVirtualFreeEx(hProcess, addr1, 0x10000, 0),
|
|
"VirtualFreeEx should fail with type 0\n");
|
|
ok(GetLastError() == ERROR_INVALID_PARAMETER,
|
|
"got %u, expected ERROR_INVALID_PARAMETER\n", GetLastError());
|
|
|
|
ok(pVirtualFreeEx(hProcess, addr1, 0x10000, MEM_DECOMMIT), "VirtualFreeEx failed\n");
|
|
|
|
/* if the type is MEM_RELEASE, size must be 0 */
|
|
ok(!pVirtualFreeEx(hProcess, addr1, 1, MEM_RELEASE),
|
|
"VirtualFreeEx should fail\n");
|
|
ok(GetLastError() == ERROR_INVALID_PARAMETER,
|
|
"got %u, expected ERROR_INVALID_PARAMETER\n", GetLastError());
|
|
|
|
ok(pVirtualFreeEx(hProcess, addr1, 0, MEM_RELEASE), "VirtualFreeEx failed\n");
|
|
|
|
TerminateProcess(hProcess, 0);
|
|
CloseHandle(hProcess);
|
|
}
|
|
|
|
static void test_VirtualAlloc(void)
|
|
{
|
|
void *addr1, *addr2;
|
|
DWORD old_prot;
|
|
MEMORY_BASIC_INFORMATION info;
|
|
NTSTATUS status;
|
|
SIZE_T size;
|
|
|
|
SetLastError(0xdeadbeef);
|
|
addr1 = VirtualAlloc(0, 0, MEM_RESERVE, PAGE_NOACCESS);
|
|
ok(addr1 == NULL, "VirtualAlloc should fail on zero-sized allocation\n");
|
|
ok(GetLastError() == ERROR_INVALID_PARAMETER /* NT */ ||
|
|
GetLastError() == ERROR_NOT_ENOUGH_MEMORY, /* Win9x */
|
|
"got %d, expected ERROR_INVALID_PARAMETER\n", GetLastError());
|
|
|
|
addr1 = VirtualAlloc(0, 0xFFFC, MEM_RESERVE, PAGE_NOACCESS);
|
|
ok(addr1 != NULL, "VirtualAlloc failed\n");
|
|
|
|
/* test a not committed memory */
|
|
ok(VirtualQuery(addr1, &info, sizeof(info)) == sizeof(info),
|
|
"VirtualQuery failed\n");
|
|
ok(info.BaseAddress == addr1, "%p != %p\n", info.BaseAddress, addr1);
|
|
ok(info.AllocationBase == addr1, "%p != %p\n", info.AllocationBase, addr1);
|
|
ok(info.AllocationProtect == PAGE_NOACCESS, "%x != PAGE_NOACCESS\n", info.AllocationProtect);
|
|
ok(info.RegionSize == 0x10000, "%lx != 0x10000\n", info.RegionSize);
|
|
ok(info.State == MEM_RESERVE, "%x != MEM_RESERVE\n", info.State);
|
|
/* NT reports Protect == 0 for a not committed memory block */
|
|
ok(info.Protect == 0 /* NT */ ||
|
|
info.Protect == PAGE_NOACCESS, /* Win9x */
|
|
"%x != PAGE_NOACCESS\n", info.Protect);
|
|
ok(info.Type == MEM_PRIVATE, "%x != MEM_PRIVATE\n", info.Type);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ok(!VirtualProtect(addr1, 0xFFFC, PAGE_READONLY, &old_prot),
|
|
"VirtualProtect should fail on a not committed memory\n");
|
|
ok(GetLastError() == ERROR_INVALID_ADDRESS /* NT */ ||
|
|
GetLastError() == ERROR_INVALID_PARAMETER, /* Win9x */
|
|
"got %d, expected ERROR_INVALID_ADDRESS\n", GetLastError());
|
|
|
|
addr2 = VirtualAlloc(addr1, 0x1000, MEM_COMMIT, PAGE_NOACCESS);
|
|
ok(addr1 == addr2, "VirtualAlloc failed\n");
|
|
|
|
/* test a committed memory */
|
|
ok(VirtualQuery(addr1, &info, sizeof(info)) == sizeof(info),
|
|
"VirtualQuery failed\n");
|
|
ok(info.BaseAddress == addr1, "%p != %p\n", info.BaseAddress, addr1);
|
|
ok(info.AllocationBase == addr1, "%p != %p\n", info.AllocationBase, addr1);
|
|
ok(info.AllocationProtect == PAGE_NOACCESS, "%x != PAGE_NOACCESS\n", info.AllocationProtect);
|
|
ok(info.RegionSize == 0x1000, "%lx != 0x1000\n", info.RegionSize);
|
|
ok(info.State == MEM_COMMIT, "%x != MEM_COMMIT\n", info.State);
|
|
/* this time NT reports PAGE_NOACCESS as well */
|
|
ok(info.Protect == PAGE_NOACCESS, "%x != PAGE_NOACCESS\n", info.Protect);
|
|
ok(info.Type == MEM_PRIVATE, "%x != MEM_PRIVATE\n", info.Type);
|
|
|
|
/* this should fail, since not the whole range is committed yet */
|
|
SetLastError(0xdeadbeef);
|
|
ok(!VirtualProtect(addr1, 0xFFFC, PAGE_READONLY, &old_prot),
|
|
"VirtualProtect should fail on a not committed memory\n");
|
|
ok(GetLastError() == ERROR_INVALID_ADDRESS /* NT */ ||
|
|
GetLastError() == ERROR_INVALID_PARAMETER, /* Win9x */
|
|
"got %d, expected ERROR_INVALID_ADDRESS\n", GetLastError());
|
|
|
|
ok(VirtualProtect(addr1, 0x1000, PAGE_READONLY, &old_prot), "VirtualProtect failed\n");
|
|
ok(old_prot == PAGE_NOACCESS,
|
|
"wrong old protection: got %04x instead of PAGE_NOACCESS\n", old_prot);
|
|
|
|
ok(VirtualProtect(addr1, 0x1000, PAGE_READWRITE, &old_prot), "VirtualProtect failed\n");
|
|
ok(old_prot == PAGE_READONLY,
|
|
"wrong old protection: got %04x instead of PAGE_READONLY\n", old_prot);
|
|
|
|
ok(VirtualQuery(addr1, &info, sizeof(info)) == sizeof(info),
|
|
"VirtualQuery failed\n");
|
|
ok(info.RegionSize == 0x1000, "%lx != 0x1000\n", info.RegionSize);
|
|
ok(info.State == MEM_COMMIT, "%x != MEM_COMMIT\n", info.State);
|
|
ok(info.Protect == PAGE_READWRITE, "%x != PAGE_READWRITE\n", info.Protect);
|
|
memset( addr1, 0x55, 20 );
|
|
ok( *(DWORD *)addr1 == 0x55555555, "wrong data %x\n", *(DWORD *)addr1 );
|
|
|
|
addr2 = VirtualAlloc( addr1, 0x1000, MEM_RESET, PAGE_NOACCESS );
|
|
ok( addr2 == addr1 || broken( !addr2 && GetLastError() == ERROR_INVALID_PARAMETER), /* win9x */
|
|
"VirtualAlloc failed err %u\n", GetLastError() );
|
|
ok( *(DWORD *)addr1 == 0x55555555 || *(DWORD *)addr1 == 0, "wrong data %x\n", *(DWORD *)addr1 );
|
|
if (addr2)
|
|
{
|
|
ok(VirtualQuery(addr1, &info, sizeof(info)) == sizeof(info),
|
|
"VirtualQuery failed\n");
|
|
ok(info.RegionSize == 0x1000, "%lx != 0x1000\n", info.RegionSize);
|
|
ok(info.State == MEM_COMMIT, "%x != MEM_COMMIT\n", info.State);
|
|
ok(info.Protect == PAGE_READWRITE, "%x != PAGE_READWRITE\n", info.Protect);
|
|
|
|
addr2 = VirtualAlloc( (char *)addr1 + 0x1000, 0x1000, MEM_RESET, PAGE_NOACCESS );
|
|
ok( (char *)addr2 == (char *)addr1 + 0x1000, "VirtualAlloc failed\n" );
|
|
|
|
ok(VirtualQuery(addr2, &info, sizeof(info)) == sizeof(info),
|
|
"VirtualQuery failed\n");
|
|
ok(info.RegionSize == 0xf000, "%lx != 0xf000\n", info.RegionSize);
|
|
ok(info.State == MEM_RESERVE, "%x != MEM_RESERVE\n", info.State);
|
|
ok(info.Protect == 0, "%x != 0\n", info.Protect);
|
|
|
|
addr2 = VirtualAlloc( (char *)addr1 + 0xf000, 0x2000, MEM_RESET, PAGE_NOACCESS );
|
|
ok( !addr2, "VirtualAlloc failed\n" );
|
|
ok( GetLastError() == ERROR_INVALID_ADDRESS, "wrong error %u\n", GetLastError() );
|
|
}
|
|
|
|
/* invalid protection values */
|
|
SetLastError(0xdeadbeef);
|
|
addr2 = VirtualAlloc(NULL, 0x1000, MEM_RESERVE, 0);
|
|
ok(!addr2, "VirtualAlloc succeeded\n");
|
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "wrong error %u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
addr2 = VirtualAlloc(NULL, 0x1000, MEM_COMMIT, 0);
|
|
ok(!addr2, "VirtualAlloc succeeded\n");
|
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "wrong error %u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
addr2 = VirtualAlloc(addr1, 0x1000, MEM_COMMIT, PAGE_READONLY | PAGE_EXECUTE);
|
|
ok(!addr2, "VirtualAlloc succeeded\n");
|
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "wrong error %u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ok(!VirtualProtect(addr1, 0x1000, PAGE_READWRITE | PAGE_EXECUTE_WRITECOPY, &old_prot),
|
|
"VirtualProtect succeeded\n");
|
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "wrong error %u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ok(!VirtualProtect(addr1, 0x1000, 0, &old_prot), "VirtualProtect succeeded\n");
|
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "wrong error %u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ok(!VirtualFree(addr1, 0x10000, 0), "VirtualFree should fail with type 0\n");
|
|
ok(GetLastError() == ERROR_INVALID_PARAMETER,
|
|
"got %d, expected ERROR_INVALID_PARAMETER\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ok(!VirtualFree(addr1, 0, MEM_FREE), "VirtualFree should fail with type MEM_FREE\n");
|
|
ok(GetLastError() == ERROR_INVALID_PARAMETER,
|
|
"got %d, expected ERROR_INVALID_PARAMETER\n", GetLastError());
|
|
|
|
ok(VirtualFree(addr1, 0x10000, MEM_DECOMMIT), "VirtualFree failed\n");
|
|
|
|
/* if the type is MEM_RELEASE, size must be 0 */
|
|
ok(!VirtualFree(addr1, 1, MEM_RELEASE), "VirtualFree should fail\n");
|
|
ok(GetLastError() == ERROR_INVALID_PARAMETER,
|
|
"got %d, expected ERROR_INVALID_PARAMETER\n", GetLastError());
|
|
|
|
ok(VirtualFree(addr1, 0, MEM_RELEASE), "VirtualFree failed\n");
|
|
|
|
/* memory returned by VirtualAlloc should be aligned to 64k */
|
|
addr1 = VirtualAlloc(0, 0x2000, MEM_RESERVE | MEM_COMMIT, PAGE_EXECUTE_READWRITE);
|
|
ok(addr1 != NULL, "VirtualAlloc failed\n");
|
|
ok(!((ULONG_PTR)addr1 & 0xffff), "returned memory %p is not aligned to 64k\n", addr1);
|
|
ok(VirtualFree(addr1, 0, MEM_RELEASE), "VirtualFree failed\n");
|
|
addr2 = VirtualAlloc(addr1, 0x1000, MEM_RESERVE | MEM_COMMIT, PAGE_EXECUTE_READWRITE);
|
|
ok(addr2 == addr1, "VirtualAlloc returned %p, expected %p\n", addr2, addr1);
|
|
|
|
/* allocation conflicts because of 64k align */
|
|
size = 0x1000;
|
|
addr2 = (char *)addr1 + 0x1000;
|
|
status = pNtAllocateVirtualMemory(GetCurrentProcess(), &addr2, 0, &size,
|
|
MEM_RESERVE | MEM_COMMIT, PAGE_EXECUTE_READWRITE);
|
|
ok(status == STATUS_CONFLICTING_ADDRESSES, "NtAllocateVirtualMemory returned %08x\n", status);
|
|
|
|
/* it should conflict, even when zero_bits is explicitly set */
|
|
size = 0x1000;
|
|
addr2 = (char *)addr1 + 0x1000;
|
|
status = pNtAllocateVirtualMemory(GetCurrentProcess(), &addr2, 12, &size,
|
|
MEM_RESERVE | MEM_COMMIT, PAGE_EXECUTE_READWRITE);
|
|
todo_wine
|
|
ok(status == STATUS_CONFLICTING_ADDRESSES, "NtAllocateVirtualMemory returned %08x\n", status);
|
|
if (status == STATUS_SUCCESS) ok(VirtualFree(addr2, 0, MEM_RELEASE), "VirtualFree failed\n");
|
|
|
|
/* AT_ROUND_TO_PAGE flag is not supported for VirtualAlloc */
|
|
SetLastError(0xdeadbeef);
|
|
addr2 = VirtualAlloc(addr1, 0x1000, MEM_RESERVE | MEM_COMMIT | AT_ROUND_TO_PAGE, PAGE_EXECUTE_READWRITE);
|
|
ok(!addr2, "VirtualAlloc unexpectedly succeeded\n");
|
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "got %d, expected ERROR_INVALID_PARAMETER\n", GetLastError());
|
|
|
|
/* AT_ROUND_TO_PAGE flag is not supported for NtAllocateVirtualMemory */
|
|
size = 0x1000;
|
|
addr2 = (char *)addr1 + 0x1000;
|
|
status = pNtAllocateVirtualMemory(GetCurrentProcess(), &addr2, 0, &size, MEM_RESERVE |
|
|
MEM_COMMIT | AT_ROUND_TO_PAGE, PAGE_EXECUTE_READWRITE);
|
|
todo_wine
|
|
ok(status == STATUS_INVALID_PARAMETER_5, "NtAllocateVirtualMemory returned %08x\n", status);
|
|
|
|
ok(VirtualFree(addr1, 0, MEM_RELEASE), "VirtualFree failed\n");
|
|
}
|
|
|
|
static void test_MapViewOfFile(void)
|
|
{
|
|
static const char testfile[] = "testfile.xxx";
|
|
const char *name;
|
|
HANDLE file, mapping, map2;
|
|
void *ptr, *ptr2, *addr;
|
|
MEMORY_BASIC_INFORMATION info;
|
|
BOOL ret;
|
|
|
|
SetLastError(0xdeadbeef);
|
|
file = CreateFileA( testfile, GENERIC_READ|GENERIC_WRITE, 0, NULL, CREATE_ALWAYS, 0, 0 );
|
|
ok( file != INVALID_HANDLE_VALUE, "CreateFile error %u\n", GetLastError() );
|
|
SetFilePointer( file, 4096, NULL, FILE_BEGIN );
|
|
SetEndOfFile( file );
|
|
|
|
/* read/write mapping */
|
|
|
|
SetLastError(0xdeadbeef);
|
|
mapping = CreateFileMappingA( file, NULL, PAGE_READWRITE, 0, 4096, NULL );
|
|
ok( mapping != 0, "CreateFileMapping error %u\n", GetLastError() );
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ptr = MapViewOfFile( mapping, FILE_MAP_READ, 0, 0, 4096 );
|
|
ok( ptr != NULL, "MapViewOfFile FILE_MAPE_READ error %u\n", GetLastError() );
|
|
UnmapViewOfFile( ptr );
|
|
|
|
/* this fails on win9x but succeeds on NT */
|
|
SetLastError(0xdeadbeef);
|
|
ptr = MapViewOfFile( mapping, FILE_MAP_COPY, 0, 0, 4096 );
|
|
if (ptr) UnmapViewOfFile( ptr );
|
|
else ok( GetLastError() == ERROR_INVALID_PARAMETER, "Wrong error %d\n", GetLastError() );
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ptr = MapViewOfFile( mapping, 0, 0, 0, 4096 );
|
|
ok( ptr != NULL, "MapViewOfFile 0 error %u\n", GetLastError() );
|
|
UnmapViewOfFile( ptr );
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ptr = MapViewOfFile( mapping, FILE_MAP_WRITE, 0, 0, 4096 );
|
|
ok( ptr != NULL, "MapViewOfFile FILE_MAP_WRITE error %u\n", GetLastError() );
|
|
UnmapViewOfFile( ptr );
|
|
|
|
ret = DuplicateHandle( GetCurrentProcess(), mapping, GetCurrentProcess(), &map2,
|
|
FILE_MAP_READ|FILE_MAP_WRITE, FALSE, 0 );
|
|
ok( ret, "DuplicateHandle failed error %u\n", GetLastError());
|
|
ptr = MapViewOfFile( map2, FILE_MAP_WRITE, 0, 0, 4096 );
|
|
ok( ptr != NULL, "MapViewOfFile FILE_MAP_WRITE error %u\n", GetLastError() );
|
|
UnmapViewOfFile( ptr );
|
|
CloseHandle( map2 );
|
|
|
|
ret = DuplicateHandle( GetCurrentProcess(), mapping, GetCurrentProcess(), &map2,
|
|
FILE_MAP_READ, FALSE, 0 );
|
|
ok( ret, "DuplicateHandle failed error %u\n", GetLastError());
|
|
SetLastError(0xdeadbeef);
|
|
ptr = MapViewOfFile( map2, FILE_MAP_WRITE, 0, 0, 4096 );
|
|
if (!ptr)
|
|
{
|
|
ok( GetLastError() == ERROR_ACCESS_DENIED, "Wrong error %d\n", GetLastError() );
|
|
CloseHandle( map2 );
|
|
ret = DuplicateHandle( GetCurrentProcess(), mapping, GetCurrentProcess(), &map2, 0, FALSE, 0 );
|
|
ok( ret, "DuplicateHandle failed error %u\n", GetLastError());
|
|
SetLastError(0xdeadbeef);
|
|
ptr = MapViewOfFile( map2, 0, 0, 0, 4096 );
|
|
ok( !ptr, "MapViewOfFile succeeded\n" );
|
|
ok( GetLastError() == ERROR_ACCESS_DENIED, "Wrong error %d\n", GetLastError() );
|
|
CloseHandle( map2 );
|
|
ret = DuplicateHandle( GetCurrentProcess(), mapping, GetCurrentProcess(), &map2,
|
|
FILE_MAP_READ, FALSE, 0 );
|
|
ok( ret, "DuplicateHandle failed error %u\n", GetLastError());
|
|
ptr = MapViewOfFile( map2, 0, 0, 0, 4096 );
|
|
ok( ptr != NULL, "MapViewOfFile NO_ACCESS error %u\n", GetLastError() );
|
|
}
|
|
else win_skip( "no access checks on win9x\n" );
|
|
|
|
UnmapViewOfFile( ptr );
|
|
CloseHandle( map2 );
|
|
CloseHandle( mapping );
|
|
|
|
/* read-only mapping */
|
|
|
|
SetLastError(0xdeadbeef);
|
|
mapping = CreateFileMappingA( file, NULL, PAGE_READONLY, 0, 4096, NULL );
|
|
ok( mapping != 0, "CreateFileMapping error %u\n", GetLastError() );
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ptr = MapViewOfFile( mapping, FILE_MAP_READ, 0, 0, 4096 );
|
|
ok( ptr != NULL, "MapViewOfFile FILE_MAP_READ error %u\n", GetLastError() );
|
|
UnmapViewOfFile( ptr );
|
|
|
|
/* this fails on win9x but succeeds on NT */
|
|
SetLastError(0xdeadbeef);
|
|
ptr = MapViewOfFile( mapping, FILE_MAP_COPY, 0, 0, 4096 );
|
|
if (ptr) UnmapViewOfFile( ptr );
|
|
else ok( GetLastError() == ERROR_INVALID_PARAMETER, "Wrong error %d\n", GetLastError() );
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ptr = MapViewOfFile( mapping, 0, 0, 0, 4096 );
|
|
ok( ptr != NULL, "MapViewOfFile 0 error %u\n", GetLastError() );
|
|
UnmapViewOfFile( ptr );
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ptr = MapViewOfFile( mapping, FILE_MAP_WRITE, 0, 0, 4096 );
|
|
ok( !ptr, "MapViewOfFile FILE_MAP_WRITE succeeded\n" );
|
|
ok( GetLastError() == ERROR_INVALID_PARAMETER ||
|
|
GetLastError() == ERROR_ACCESS_DENIED, "Wrong error %d\n", GetLastError() );
|
|
CloseHandle( mapping );
|
|
|
|
/* copy-on-write mapping */
|
|
|
|
SetLastError(0xdeadbeef);
|
|
mapping = CreateFileMappingA( file, NULL, PAGE_WRITECOPY, 0, 4096, NULL );
|
|
ok( mapping != 0, "CreateFileMapping error %u\n", GetLastError() );
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ptr = MapViewOfFile( mapping, FILE_MAP_READ, 0, 0, 4096 );
|
|
ok( ptr != NULL, "MapViewOfFile FILE_MAP_READ error %u\n", GetLastError() );
|
|
UnmapViewOfFile( ptr );
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ptr = MapViewOfFile( mapping, FILE_MAP_COPY, 0, 0, 4096 );
|
|
ok( ptr != NULL, "MapViewOfFile FILE_MAP_COPY error %u\n", GetLastError() );
|
|
UnmapViewOfFile( ptr );
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ptr = MapViewOfFile( mapping, 0, 0, 0, 4096 );
|
|
ok( ptr != NULL, "MapViewOfFile 0 error %u\n", GetLastError() );
|
|
UnmapViewOfFile( ptr );
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ptr = MapViewOfFile( mapping, FILE_MAP_WRITE, 0, 0, 4096 );
|
|
ok( !ptr, "MapViewOfFile FILE_MAP_WRITE succeeded\n" );
|
|
ok( GetLastError() == ERROR_INVALID_PARAMETER ||
|
|
GetLastError() == ERROR_ACCESS_DENIED, "Wrong error %d\n", GetLastError() );
|
|
CloseHandle( mapping );
|
|
|
|
/* no access mapping */
|
|
|
|
SetLastError(0xdeadbeef);
|
|
mapping = CreateFileMappingA( file, NULL, PAGE_NOACCESS, 0, 4096, NULL );
|
|
/* fails on NT but succeeds on win9x */
|
|
if (!mapping) ok( GetLastError() == ERROR_INVALID_PARAMETER, "Wrong error %d\n", GetLastError() );
|
|
else
|
|
{
|
|
SetLastError(0xdeadbeef);
|
|
ptr = MapViewOfFile( mapping, FILE_MAP_READ, 0, 0, 4096 );
|
|
ok( ptr != NULL, "MapViewOfFile FILE_MAP_READ error %u\n", GetLastError() );
|
|
UnmapViewOfFile( ptr );
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ptr = MapViewOfFile( mapping, FILE_MAP_COPY, 0, 0, 4096 );
|
|
ok( !ptr, "MapViewOfFile FILE_MAP_COPY succeeded\n" );
|
|
ok( GetLastError() == ERROR_INVALID_PARAMETER, "Wrong error %d\n", GetLastError() );
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ptr = MapViewOfFile( mapping, 0, 0, 0, 4096 );
|
|
ok( ptr != NULL, "MapViewOfFile 0 error %u\n", GetLastError() );
|
|
UnmapViewOfFile( ptr );
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ptr = MapViewOfFile( mapping, FILE_MAP_WRITE, 0, 0, 4096 );
|
|
ok( !ptr, "MapViewOfFile FILE_MAP_WRITE succeeded\n" );
|
|
ok( GetLastError() == ERROR_INVALID_PARAMETER, "Wrong error %d\n", GetLastError() );
|
|
|
|
CloseHandle( mapping );
|
|
}
|
|
|
|
CloseHandle( file );
|
|
|
|
/* now try read-only file */
|
|
|
|
SetLastError(0xdeadbeef);
|
|
file = CreateFileA( testfile, GENERIC_READ, 0, NULL, OPEN_EXISTING, 0, 0 );
|
|
ok( file != INVALID_HANDLE_VALUE, "CreateFile error %u\n", GetLastError() );
|
|
|
|
SetLastError(0xdeadbeef);
|
|
mapping = CreateFileMappingA( file, NULL, PAGE_READWRITE, 0, 4096, NULL );
|
|
ok( !mapping, "CreateFileMapping PAGE_READWRITE succeeded\n" );
|
|
ok( GetLastError() == ERROR_INVALID_PARAMETER ||
|
|
GetLastError() == ERROR_ACCESS_DENIED, "Wrong error %d\n", GetLastError() );
|
|
|
|
SetLastError(0xdeadbeef);
|
|
mapping = CreateFileMappingA( file, NULL, PAGE_WRITECOPY, 0, 4096, NULL );
|
|
ok( mapping != 0, "CreateFileMapping PAGE_WRITECOPY error %u\n", GetLastError() );
|
|
CloseHandle( mapping );
|
|
|
|
SetLastError(0xdeadbeef);
|
|
mapping = CreateFileMappingA( file, NULL, PAGE_READONLY, 0, 4096, NULL );
|
|
ok( mapping != 0, "CreateFileMapping PAGE_READONLY error %u\n", GetLastError() );
|
|
CloseHandle( mapping );
|
|
CloseHandle( file );
|
|
|
|
/* now try no access file */
|
|
|
|
SetLastError(0xdeadbeef);
|
|
file = CreateFileA( testfile, 0, 0, NULL, OPEN_EXISTING, 0, 0 );
|
|
ok( file != INVALID_HANDLE_VALUE, "CreateFile error %u\n", GetLastError() );
|
|
|
|
SetLastError(0xdeadbeef);
|
|
mapping = CreateFileMappingA( file, NULL, PAGE_READWRITE, 0, 4096, NULL );
|
|
ok( !mapping, "CreateFileMapping PAGE_READWRITE succeeded\n" );
|
|
ok( GetLastError() == ERROR_INVALID_PARAMETER ||
|
|
GetLastError() == ERROR_ACCESS_DENIED, "Wrong error %d\n", GetLastError() );
|
|
|
|
SetLastError(0xdeadbeef);
|
|
mapping = CreateFileMappingA( file, NULL, PAGE_WRITECOPY, 0, 4096, NULL );
|
|
ok( !mapping, "CreateFileMapping PAGE_WRITECOPY succeeded\n" );
|
|
ok( GetLastError() == ERROR_INVALID_PARAMETER ||
|
|
GetLastError() == ERROR_ACCESS_DENIED, "Wrong error %d\n", GetLastError() );
|
|
|
|
SetLastError(0xdeadbeef);
|
|
mapping = CreateFileMappingA( file, NULL, PAGE_READONLY, 0, 4096, NULL );
|
|
ok( !mapping, "CreateFileMapping PAGE_READONLY succeeded\n" );
|
|
ok( GetLastError() == ERROR_INVALID_PARAMETER ||
|
|
GetLastError() == ERROR_ACCESS_DENIED, "Wrong error %d\n", GetLastError() );
|
|
|
|
CloseHandle( file );
|
|
DeleteFileA( testfile );
|
|
|
|
SetLastError(0xdeadbeef);
|
|
name = "Local\\Foo";
|
|
file = CreateFileMappingA( INVALID_HANDLE_VALUE, NULL, PAGE_READWRITE, 0, 4096, name );
|
|
/* nt4 doesn't have Local\\ */
|
|
if (!file && GetLastError() == ERROR_PATH_NOT_FOUND)
|
|
{
|
|
name = "Foo";
|
|
file = CreateFileMappingA( INVALID_HANDLE_VALUE, NULL, PAGE_READWRITE, 0, 4096, name );
|
|
}
|
|
ok( file != 0, "CreateFileMapping PAGE_READWRITE error %u\n", GetLastError() );
|
|
|
|
SetLastError(0xdeadbeef);
|
|
mapping = OpenFileMappingA( FILE_MAP_READ, FALSE, name );
|
|
ok( mapping != 0, "OpenFileMapping FILE_MAP_READ error %u\n", GetLastError() );
|
|
SetLastError(0xdeadbeef);
|
|
ptr = MapViewOfFile( mapping, FILE_MAP_WRITE, 0, 0, 0 );
|
|
if (!ptr)
|
|
{
|
|
SIZE_T size;
|
|
ok( GetLastError() == ERROR_ACCESS_DENIED, "Wrong error %d\n", GetLastError() );
|
|
SetLastError(0xdeadbeef);
|
|
ptr = MapViewOfFile( mapping, FILE_MAP_READ, 0, 0, 0 );
|
|
ok( ptr != NULL, "MapViewOfFile FILE_MAP_READ error %u\n", GetLastError() );
|
|
SetLastError(0xdeadbeef);
|
|
size = VirtualQuery( ptr, &info, sizeof(info) );
|
|
ok( size == sizeof(info),
|
|
"VirtualQuery error %u\n", GetLastError() );
|
|
ok( info.BaseAddress == ptr, "%p != %p\n", info.BaseAddress, ptr );
|
|
ok( info.AllocationBase == ptr, "%p != %p\n", info.AllocationBase, ptr );
|
|
ok( info.AllocationProtect == PAGE_READONLY, "%x != PAGE_READONLY\n", info.AllocationProtect );
|
|
ok( info.RegionSize == 4096, "%lx != 4096\n", info.RegionSize );
|
|
ok( info.State == MEM_COMMIT, "%x != MEM_COMMIT\n", info.State );
|
|
ok( info.Protect == PAGE_READONLY, "%x != PAGE_READONLY\n", info.Protect );
|
|
}
|
|
else win_skip( "no access checks on win9x\n" );
|
|
UnmapViewOfFile( ptr );
|
|
CloseHandle( mapping );
|
|
|
|
SetLastError(0xdeadbeef);
|
|
mapping = OpenFileMappingA( FILE_MAP_WRITE, FALSE, name );
|
|
ok( mapping != 0, "OpenFileMapping FILE_MAP_WRITE error %u\n", GetLastError() );
|
|
SetLastError(0xdeadbeef);
|
|
ptr = MapViewOfFile( mapping, FILE_MAP_READ, 0, 0, 0 );
|
|
if (!ptr)
|
|
{
|
|
SIZE_T size;
|
|
ok( GetLastError() == ERROR_ACCESS_DENIED, "Wrong error %d\n", GetLastError() );
|
|
SetLastError(0xdeadbeef);
|
|
ptr = MapViewOfFile( mapping, FILE_MAP_WRITE, 0, 0, 0 );
|
|
ok( ptr != NULL, "MapViewOfFile FILE_MAP_WRITE error %u\n", GetLastError() );
|
|
SetLastError(0xdeadbeef);
|
|
size = VirtualQuery( ptr, &info, sizeof(info) );
|
|
ok( size == sizeof(info),
|
|
"VirtualQuery error %u\n", GetLastError() );
|
|
ok( info.BaseAddress == ptr, "%p != %p\n", info.BaseAddress, ptr );
|
|
ok( info.AllocationBase == ptr, "%p != %p\n", info.AllocationBase, ptr );
|
|
ok( info.AllocationProtect == PAGE_READWRITE, "%x != PAGE_READWRITE\n", info.AllocationProtect );
|
|
ok( info.RegionSize == 4096, "%lx != 4096\n", info.RegionSize );
|
|
ok( info.State == MEM_COMMIT, "%x != MEM_COMMIT\n", info.State );
|
|
ok( info.Protect == PAGE_READWRITE, "%x != PAGE_READWRITE\n", info.Protect );
|
|
}
|
|
else win_skip( "no access checks on win9x\n" );
|
|
UnmapViewOfFile( ptr );
|
|
CloseHandle( mapping );
|
|
|
|
CloseHandle( file );
|
|
|
|
/* read/write mapping with SEC_RESERVE */
|
|
mapping = CreateFileMappingA(INVALID_HANDLE_VALUE, NULL, PAGE_READWRITE | SEC_RESERVE, 0, MAPPING_SIZE, NULL);
|
|
ok(mapping != INVALID_HANDLE_VALUE, "CreateFileMappingA failed with error %d\n", GetLastError());
|
|
|
|
ptr = MapViewOfFile(mapping, FILE_MAP_WRITE, 0, 0, 0);
|
|
ok(ptr != NULL, "MapViewOfFile failed with error %d\n", GetLastError());
|
|
|
|
ptr2 = MapViewOfFile(mapping, FILE_MAP_WRITE, 0, 0, 0);
|
|
/* on NT ptr != ptr2 but on Win9x ptr == ptr2 */
|
|
ok(ptr2 != NULL, "MapViewOfFile failed with error %d\n", GetLastError());
|
|
trace("mapping same section resulted in views %p and %p\n", ptr, ptr2);
|
|
|
|
ret = VirtualQuery(ptr, &info, sizeof(info));
|
|
ok(ret, "VirtualQuery failed with error %d\n", GetLastError());
|
|
ok(info.BaseAddress == ptr, "BaseAddress should have been %p but was %p instead\n", ptr, info.BaseAddress);
|
|
ok(info.AllocationBase == ptr, "AllocationBase should have been %p but was %p instead\n", ptr, info.AllocationBase);
|
|
ok(info.RegionSize == MAPPING_SIZE, "RegionSize should have been 0x%x but was 0x%lx\n", MAPPING_SIZE, info.RegionSize);
|
|
ok(info.State == MEM_RESERVE, "State should have been MEM_RESERVE instead of 0x%x\n", info.State);
|
|
if (info.Type == MEM_PRIVATE) /* win9x is different for uncommitted mappings */
|
|
{
|
|
ok(info.AllocationProtect == PAGE_NOACCESS,
|
|
"AllocationProtect should have been PAGE_NOACCESS but was 0x%x\n", info.AllocationProtect);
|
|
ok(info.Protect == PAGE_NOACCESS,
|
|
"Protect should have been PAGE_NOACCESS instead of 0x%x\n", info.Protect);
|
|
}
|
|
else
|
|
{
|
|
ok(info.AllocationProtect == PAGE_READWRITE,
|
|
"AllocationProtect should have been PAGE_READWRITE but was 0x%x\n", info.AllocationProtect);
|
|
ok(info.Protect == 0, "Protect should have been 0 instead of 0x%x\n", info.Protect);
|
|
ok(info.Type == MEM_MAPPED, "Type should have been MEM_MAPPED instead of 0x%x\n", info.Type);
|
|
}
|
|
|
|
if (ptr != ptr2)
|
|
{
|
|
ret = VirtualQuery(ptr2, &info, sizeof(info));
|
|
ok(ret, "VirtualQuery failed with error %d\n", GetLastError());
|
|
ok(info.BaseAddress == ptr2,
|
|
"BaseAddress should have been %p but was %p instead\n", ptr2, info.BaseAddress);
|
|
ok(info.AllocationBase == ptr2,
|
|
"AllocationBase should have been %p but was %p instead\n", ptr2, info.AllocationBase);
|
|
ok(info.AllocationProtect == PAGE_READWRITE,
|
|
"AllocationProtect should have been PAGE_READWRITE but was 0x%x\n", info.AllocationProtect);
|
|
ok(info.RegionSize == MAPPING_SIZE,
|
|
"RegionSize should have been 0x%x but was 0x%lx\n", MAPPING_SIZE, info.RegionSize);
|
|
ok(info.State == MEM_RESERVE,
|
|
"State should have been MEM_RESERVE instead of 0x%x\n", info.State);
|
|
ok(info.Protect == 0,
|
|
"Protect should have been 0 instead of 0x%x\n", info.Protect);
|
|
ok(info.Type == MEM_MAPPED,
|
|
"Type should have been MEM_MAPPED instead of 0x%x\n", info.Type);
|
|
}
|
|
|
|
ptr = VirtualAlloc(ptr, 0x10000, MEM_COMMIT, PAGE_READONLY);
|
|
ok(ptr != NULL, "VirtualAlloc failed with error %d\n", GetLastError());
|
|
|
|
ret = VirtualQuery(ptr, &info, sizeof(info));
|
|
ok(ret, "VirtualQuery failed with error %d\n", GetLastError());
|
|
ok(info.BaseAddress == ptr, "BaseAddress should have been %p but was %p instead\n", ptr, info.BaseAddress);
|
|
ok(info.AllocationBase == ptr, "AllocationBase should have been %p but was %p instead\n", ptr, info.AllocationBase);
|
|
ok(info.RegionSize == 0x10000, "RegionSize should have been 0x10000 but was 0x%lx\n", info.RegionSize);
|
|
ok(info.State == MEM_COMMIT, "State should have been MEM_COMMIT instead of 0x%x\n", info.State);
|
|
ok(info.Protect == PAGE_READONLY, "Protect should have been PAGE_READONLY instead of 0x%x\n", info.Protect);
|
|
if (info.Type == MEM_PRIVATE) /* win9x is different for uncommitted mappings */
|
|
{
|
|
ok(info.AllocationProtect == PAGE_NOACCESS,
|
|
"AllocationProtect should have been PAGE_NOACCESS but was 0x%x\n", info.AllocationProtect);
|
|
}
|
|
else
|
|
{
|
|
ok(info.AllocationProtect == PAGE_READWRITE,
|
|
"AllocationProtect should have been PAGE_READWRITE but was 0x%x\n", info.AllocationProtect);
|
|
ok(info.Type == MEM_MAPPED, "Type should have been MEM_MAPPED instead of 0x%x\n", info.Type);
|
|
}
|
|
|
|
/* shows that the VirtualAlloc above affects the mapping, not just the
|
|
* virtual memory in this process - it also affects all other processes
|
|
* with a view of the mapping, but that isn't tested here */
|
|
if (ptr != ptr2)
|
|
{
|
|
ret = VirtualQuery(ptr2, &info, sizeof(info));
|
|
ok(ret, "VirtualQuery failed with error %d\n", GetLastError());
|
|
ok(info.BaseAddress == ptr2,
|
|
"BaseAddress should have been %p but was %p instead\n", ptr2, info.BaseAddress);
|
|
ok(info.AllocationBase == ptr2,
|
|
"AllocationBase should have been %p but was %p instead\n", ptr2, info.AllocationBase);
|
|
ok(info.AllocationProtect == PAGE_READWRITE,
|
|
"AllocationProtect should have been PAGE_READWRITE but was 0x%x\n", info.AllocationProtect);
|
|
ok(info.RegionSize == 0x10000,
|
|
"RegionSize should have been 0x10000 but was 0x%lx\n", info.RegionSize);
|
|
ok(info.State == MEM_COMMIT,
|
|
"State should have been MEM_COMMIT instead of 0x%x\n", info.State);
|
|
ok(info.Protect == PAGE_READWRITE,
|
|
"Protect should have been PAGE_READWRITE instead of 0x%x\n", info.Protect);
|
|
ok(info.Type == MEM_MAPPED, "Type should have been MEM_MAPPED instead of 0x%x\n", info.Type);
|
|
}
|
|
|
|
addr = VirtualAlloc( ptr, MAPPING_SIZE, MEM_RESET, PAGE_READONLY );
|
|
ok( addr == ptr || broken(!addr && GetLastError() == ERROR_INVALID_PARAMETER), /* win9x */
|
|
"VirtualAlloc failed with error %u\n", GetLastError() );
|
|
|
|
ret = VirtualFree( ptr, 0x10000, MEM_DECOMMIT );
|
|
ok( !ret || broken(ret) /* win9x */, "VirtualFree succeeded\n" );
|
|
if (!ret)
|
|
ok( GetLastError() == ERROR_INVALID_PARAMETER, "VirtualFree failed with %u\n", GetLastError() );
|
|
|
|
ret = UnmapViewOfFile(ptr2);
|
|
ok(ret, "UnmapViewOfFile failed with error %d\n", GetLastError());
|
|
ret = UnmapViewOfFile(ptr);
|
|
ok(ret, "UnmapViewOfFile failed with error %d\n", GetLastError());
|
|
CloseHandle(mapping);
|
|
|
|
addr = VirtualAlloc(NULL, 0x10000, MEM_COMMIT, PAGE_READONLY );
|
|
ok( addr != NULL, "VirtualAlloc failed with error %u\n", GetLastError() );
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ok( !UnmapViewOfFile(addr), "UnmapViewOfFile should fail on VirtualAlloc mem\n" );
|
|
ok( GetLastError() == ERROR_INVALID_ADDRESS,
|
|
"got %u, expected ERROR_INVALID_ADDRESS\n", GetLastError());
|
|
SetLastError(0xdeadbeef);
|
|
ok( !UnmapViewOfFile((char *)addr + 0x3000), "UnmapViewOfFile should fail on VirtualAlloc mem\n" );
|
|
ok( GetLastError() == ERROR_INVALID_ADDRESS,
|
|
"got %u, expected ERROR_INVALID_ADDRESS\n", GetLastError());
|
|
SetLastError(0xdeadbeef);
|
|
ok( !UnmapViewOfFile((void *)0xdeadbeef), "UnmapViewOfFile should fail on VirtualAlloc mem\n" );
|
|
ok( GetLastError() == ERROR_INVALID_ADDRESS,
|
|
"got %u, expected ERROR_INVALID_ADDRESS\n", GetLastError());
|
|
|
|
ok( VirtualFree(addr, 0, MEM_RELEASE), "VirtualFree failed\n" );
|
|
|
|
/* close named mapping handle without unmapping */
|
|
name = "Foo";
|
|
SetLastError(0xdeadbeef);
|
|
mapping = CreateFileMappingA(INVALID_HANDLE_VALUE, NULL, PAGE_READWRITE, 0, MAPPING_SIZE, name);
|
|
ok( mapping != 0, "CreateFileMappingA failed with error %d\n", GetLastError() );
|
|
SetLastError(0xdeadbeef);
|
|
ptr = MapViewOfFile(mapping, FILE_MAP_WRITE, 0, 0, 0);
|
|
ok( ptr != NULL, "MapViewOfFile failed with error %d\n", GetLastError() );
|
|
SetLastError(0xdeadbeef);
|
|
map2 = OpenFileMappingA(FILE_MAP_READ, FALSE, name);
|
|
ok( map2 != 0, "OpenFileMappingA failed with error %d\n", GetLastError() );
|
|
SetLastError(0xdeadbeef);
|
|
ret = CloseHandle(map2);
|
|
ok(ret, "CloseHandle error %d\n", GetLastError());
|
|
SetLastError(0xdeadbeef);
|
|
ret = CloseHandle(mapping);
|
|
ok(ret, "CloseHandle error %d\n", GetLastError());
|
|
|
|
ret = IsBadReadPtr(ptr, MAPPING_SIZE);
|
|
ok( !ret, "memory is not accessible\n" );
|
|
|
|
ret = VirtualQuery(ptr, &info, sizeof(info));
|
|
ok(ret, "VirtualQuery error %d\n", GetLastError());
|
|
ok(info.BaseAddress == ptr, "got %p != expected %p\n", info.BaseAddress, ptr);
|
|
ok(info.RegionSize == MAPPING_SIZE, "got %#lx != expected %#x\n", info.RegionSize, MAPPING_SIZE);
|
|
ok(info.Protect == PAGE_READWRITE, "got %#x != expected PAGE_READWRITE\n", info.Protect);
|
|
ok(info.AllocationBase == ptr, "%p != %p\n", info.AllocationBase, ptr);
|
|
ok(info.AllocationProtect == PAGE_READWRITE, "%#x != PAGE_READWRITE\n", info.AllocationProtect);
|
|
ok(info.State == MEM_COMMIT, "%#x != MEM_COMMIT\n", info.State);
|
|
ok(info.Type == MEM_MAPPED, "%#x != MEM_MAPPED\n", info.Type);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
map2 = OpenFileMappingA(FILE_MAP_READ, FALSE, name);
|
|
todo_wine
|
|
ok( map2 == 0, "OpenFileMappingA succeeded\n" );
|
|
todo_wine
|
|
ok( GetLastError() == ERROR_FILE_NOT_FOUND, "OpenFileMappingA set error %d\n", GetLastError() );
|
|
if (map2) CloseHandle(map2); /* FIXME: remove once Wine is fixed */
|
|
SetLastError(0xdeadbeef);
|
|
mapping = CreateFileMappingA(INVALID_HANDLE_VALUE, NULL, PAGE_READWRITE, 0, MAPPING_SIZE, name);
|
|
ok( mapping != 0, "CreateFileMappingA failed\n" );
|
|
todo_wine
|
|
ok( GetLastError() == ERROR_SUCCESS, "CreateFileMappingA set error %d\n", GetLastError() );
|
|
SetLastError(0xdeadbeef);
|
|
ret = CloseHandle(mapping);
|
|
ok(ret, "CloseHandle error %d\n", GetLastError());
|
|
|
|
ret = IsBadReadPtr(ptr, MAPPING_SIZE);
|
|
ok( !ret, "memory is not accessible\n" );
|
|
|
|
ret = VirtualQuery(ptr, &info, sizeof(info));
|
|
ok(ret, "VirtualQuery error %d\n", GetLastError());
|
|
ok(info.BaseAddress == ptr, "got %p != expected %p\n", info.BaseAddress, ptr);
|
|
ok(info.RegionSize == MAPPING_SIZE, "got %#lx != expected %#x\n", info.RegionSize, MAPPING_SIZE);
|
|
ok(info.Protect == PAGE_READWRITE, "got %#x != expected PAGE_READWRITE\n", info.Protect);
|
|
ok(info.AllocationBase == ptr, "%p != %p\n", info.AllocationBase, ptr);
|
|
ok(info.AllocationProtect == PAGE_READWRITE, "%#x != PAGE_READWRITE\n", info.AllocationProtect);
|
|
ok(info.State == MEM_COMMIT, "%#x != MEM_COMMIT\n", info.State);
|
|
ok(info.Type == MEM_MAPPED, "%#x != MEM_MAPPED\n", info.Type);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ret = UnmapViewOfFile(ptr);
|
|
ok( ret, "UnmapViewOfFile failed with error %d\n", GetLastError() );
|
|
|
|
ret = IsBadReadPtr(ptr, MAPPING_SIZE);
|
|
ok( ret, "memory is accessible\n" );
|
|
|
|
ret = VirtualQuery(ptr, &info, sizeof(info));
|
|
ok(ret, "VirtualQuery error %d\n", GetLastError());
|
|
ok(info.BaseAddress == ptr, "got %p != expected %p\n", info.BaseAddress, ptr);
|
|
ok(info.Protect == PAGE_NOACCESS, "got %#x != expected PAGE_NOACCESS\n", info.Protect);
|
|
ok(info.AllocationBase == NULL, "%p != NULL\n", info.AllocationBase);
|
|
ok(info.AllocationProtect == 0, "%#x != 0\n", info.AllocationProtect);
|
|
ok(info.State == MEM_FREE, "%#x != MEM_FREE\n", info.State);
|
|
ok(info.Type == 0, "%#x != 0\n", info.Type);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
file = CreateFileA(testfile, GENERIC_READ|GENERIC_WRITE, 0, NULL, CREATE_ALWAYS, 0, 0);
|
|
ok( file != INVALID_HANDLE_VALUE, "CreateFile error %u\n", GetLastError() );
|
|
SetFilePointer(file, 4096, NULL, FILE_BEGIN);
|
|
SetEndOfFile(file);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
mapping = CreateFileMappingA(file, NULL, PAGE_READWRITE, 0, MAPPING_SIZE, name);
|
|
ok( mapping != 0, "CreateFileMappingA failed with error %d\n", GetLastError() );
|
|
SetLastError(0xdeadbeef);
|
|
ptr = MapViewOfFile(mapping, FILE_MAP_WRITE, 0, 0, 0);
|
|
ok( ptr != NULL, "MapViewOfFile failed with error %d\n", GetLastError() );
|
|
SetLastError(0xdeadbeef);
|
|
map2 = OpenFileMappingA(FILE_MAP_READ, FALSE, name);
|
|
ok( map2 != 0, "OpenFileMappingA failed with error %d\n", GetLastError() );
|
|
SetLastError(0xdeadbeef);
|
|
ret = CloseHandle(map2);
|
|
ok(ret, "CloseHandle error %d\n", GetLastError());
|
|
SetLastError(0xdeadbeef);
|
|
ret = CloseHandle(mapping);
|
|
ok(ret, "CloseHandle error %d\n", GetLastError());
|
|
|
|
ret = IsBadReadPtr(ptr, MAPPING_SIZE);
|
|
ok( !ret, "memory is not accessible\n" );
|
|
|
|
ret = VirtualQuery(ptr, &info, sizeof(info));
|
|
ok(ret, "VirtualQuery error %d\n", GetLastError());
|
|
ok(info.BaseAddress == ptr, "got %p != expected %p\n", info.BaseAddress, ptr);
|
|
ok(info.RegionSize == MAPPING_SIZE, "got %#lx != expected %#x\n", info.RegionSize, MAPPING_SIZE);
|
|
ok(info.Protect == PAGE_READWRITE, "got %#x != expected PAGE_READWRITE\n", info.Protect);
|
|
ok(info.AllocationBase == ptr, "%p != %p\n", info.AllocationBase, ptr);
|
|
ok(info.AllocationProtect == PAGE_READWRITE, "%#x != PAGE_READWRITE\n", info.AllocationProtect);
|
|
ok(info.State == MEM_COMMIT, "%#x != MEM_COMMIT\n", info.State);
|
|
ok(info.Type == MEM_MAPPED, "%#x != MEM_MAPPED\n", info.Type);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
map2 = OpenFileMappingA(FILE_MAP_READ, FALSE, name);
|
|
todo_wine
|
|
ok( map2 == 0, "OpenFileMappingA succeeded\n" );
|
|
todo_wine
|
|
ok( GetLastError() == ERROR_FILE_NOT_FOUND, "OpenFileMappingA set error %d\n", GetLastError() );
|
|
CloseHandle(map2);
|
|
SetLastError(0xdeadbeef);
|
|
mapping = CreateFileMappingA(file, NULL, PAGE_READWRITE, 0, MAPPING_SIZE, name);
|
|
ok( mapping != 0, "CreateFileMappingA failed\n" );
|
|
todo_wine
|
|
ok( GetLastError() == ERROR_SUCCESS, "CreateFileMappingA set error %d\n", GetLastError() );
|
|
SetLastError(0xdeadbeef);
|
|
ret = CloseHandle(mapping);
|
|
ok(ret, "CloseHandle error %d\n", GetLastError());
|
|
|
|
ret = IsBadReadPtr(ptr, MAPPING_SIZE);
|
|
ok( !ret, "memory is not accessible\n" );
|
|
|
|
ret = VirtualQuery(ptr, &info, sizeof(info));
|
|
ok(ret, "VirtualQuery error %d\n", GetLastError());
|
|
ok(info.BaseAddress == ptr, "got %p != expected %p\n", info.BaseAddress, ptr);
|
|
ok(info.RegionSize == MAPPING_SIZE, "got %#lx != expected %#x\n", info.RegionSize, MAPPING_SIZE);
|
|
ok(info.Protect == PAGE_READWRITE, "got %#x != expected PAGE_READWRITE\n", info.Protect);
|
|
ok(info.AllocationBase == ptr, "%p != %p\n", info.AllocationBase, ptr);
|
|
ok(info.AllocationProtect == PAGE_READWRITE, "%#x != PAGE_READWRITE\n", info.AllocationProtect);
|
|
ok(info.State == MEM_COMMIT, "%#x != MEM_COMMIT\n", info.State);
|
|
ok(info.Type == MEM_MAPPED, "%#x != MEM_MAPPED\n", info.Type);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ret = UnmapViewOfFile(ptr);
|
|
ok( ret, "UnmapViewOfFile failed with error %d\n", GetLastError() );
|
|
|
|
ret = IsBadReadPtr(ptr, MAPPING_SIZE);
|
|
ok( ret, "memory is accessible\n" );
|
|
|
|
ret = VirtualQuery(ptr, &info, sizeof(info));
|
|
ok(ret, "VirtualQuery error %d\n", GetLastError());
|
|
ok(info.BaseAddress == ptr, "got %p != expected %p\n", info.BaseAddress, ptr);
|
|
ok(info.Protect == PAGE_NOACCESS, "got %#x != expected PAGE_NOACCESS\n", info.Protect);
|
|
ok(info.AllocationBase == NULL, "%p != NULL\n", info.AllocationBase);
|
|
ok(info.AllocationProtect == 0, "%#x != 0\n", info.AllocationProtect);
|
|
ok(info.State == MEM_FREE, "%#x != MEM_FREE\n", info.State);
|
|
ok(info.Type == 0, "%#x != 0\n", info.Type);
|
|
|
|
CloseHandle(file);
|
|
DeleteFileA(testfile);
|
|
}
|
|
|
|
static void test_NtMapViewOfSection(void)
|
|
{
|
|
HANDLE hProcess;
|
|
|
|
static const char testfile[] = "testfile.xxx";
|
|
static const char data[] = "test data for NtMapViewOfSection";
|
|
char buffer[sizeof(data)];
|
|
HANDLE file, mapping;
|
|
void *ptr, *ptr2;
|
|
BOOL is_wow64, ret;
|
|
DWORD status, written;
|
|
SIZE_T size, result;
|
|
LARGE_INTEGER offset;
|
|
|
|
if (!pNtMapViewOfSection || !pNtUnmapViewOfSection)
|
|
{
|
|
win_skip( "NtMapViewOfSection not available\n" );
|
|
return;
|
|
}
|
|
|
|
file = CreateFileA( testfile, GENERIC_READ|GENERIC_WRITE, 0, NULL, CREATE_ALWAYS, 0, 0 );
|
|
ok( file != INVALID_HANDLE_VALUE, "Failed to create test file\n" );
|
|
WriteFile( file, data, sizeof(data), &written, NULL );
|
|
SetFilePointer( file, 4096, NULL, FILE_BEGIN );
|
|
SetEndOfFile( file );
|
|
|
|
/* read/write mapping */
|
|
|
|
mapping = CreateFileMappingA( file, NULL, PAGE_READWRITE, 0, 4096, NULL );
|
|
ok( mapping != 0, "CreateFileMapping failed\n" );
|
|
|
|
hProcess = create_target_process("sleep");
|
|
ok(hProcess != NULL, "Can't start process\n");
|
|
|
|
ptr = NULL;
|
|
size = 0;
|
|
offset.QuadPart = 0;
|
|
status = pNtMapViewOfSection( mapping, hProcess, &ptr, 0, 0, &offset, &size, 1, 0, PAGE_READWRITE );
|
|
ok( !status, "NtMapViewOfSection failed status %x\n", status );
|
|
ok( !((ULONG_PTR)ptr & 0xffff), "returned memory %p is not aligned to 64k\n", ptr );
|
|
|
|
ret = ReadProcessMemory( hProcess, ptr, buffer, sizeof(buffer), &result );
|
|
ok( ret, "ReadProcessMemory failed\n" );
|
|
ok( result == sizeof(buffer), "ReadProcessMemory didn't read all data (%lx)\n", result );
|
|
ok( !memcmp( buffer, data, sizeof(buffer) ), "Wrong data read\n" );
|
|
|
|
/* for some unknown reason NtMapViewOfSection fails with STATUS_NO_MEMORY when zero_bits != 0 ? */
|
|
ptr2 = NULL;
|
|
size = 0;
|
|
offset.QuadPart = 0;
|
|
status = pNtMapViewOfSection( mapping, hProcess, &ptr2, 12, 0, &offset, &size, 1, 0, PAGE_READWRITE );
|
|
todo_wine
|
|
ok( status == STATUS_NO_MEMORY, "NtMapViewOfSection returned %x\n", status );
|
|
if (status == STATUS_SUCCESS)
|
|
{
|
|
status = pNtUnmapViewOfSection( hProcess, ptr2 );
|
|
ok( !status, "NtUnmapViewOfSection failed status %x\n", status );
|
|
}
|
|
|
|
ptr2 = NULL;
|
|
size = 0;
|
|
status = pNtMapViewOfSection( mapping, hProcess, &ptr2, 16, 0, &offset, &size, 1, 0, PAGE_READWRITE );
|
|
todo_wine
|
|
ok( status == STATUS_NO_MEMORY, "NtMapViewOfSection returned %x\n", status );
|
|
if (status == STATUS_SUCCESS)
|
|
{
|
|
status = pNtUnmapViewOfSection( hProcess, ptr2 );
|
|
ok( !status, "NtUnmapViewOfSection failed status %x\n", status );
|
|
}
|
|
|
|
/* mapping at the same page conflicts */
|
|
ptr2 = ptr;
|
|
size = 0;
|
|
offset.QuadPart = 0;
|
|
status = pNtMapViewOfSection( mapping, hProcess, &ptr2, 0, 0, &offset, &size, 1, 0, PAGE_READWRITE );
|
|
ok( status == STATUS_CONFLICTING_ADDRESSES, "NtMapViewOfSection returned %x\n", status );
|
|
|
|
/* offset has to be aligned */
|
|
ptr2 = ptr;
|
|
size = 0;
|
|
offset.QuadPart = 1;
|
|
status = pNtMapViewOfSection( mapping, hProcess, &ptr2, 0, 0, &offset, &size, 1, 0, PAGE_READWRITE );
|
|
ok( status == STATUS_MAPPED_ALIGNMENT, "NtMapViewOfSection returned %x\n", status );
|
|
|
|
/* ptr has to be aligned */
|
|
ptr2 = (char *)ptr + 42;
|
|
size = 0;
|
|
offset.QuadPart = 0;
|
|
status = pNtMapViewOfSection( mapping, hProcess, &ptr2, 0, 0, &offset, &size, 1, 0, PAGE_READWRITE );
|
|
ok( status == STATUS_MAPPED_ALIGNMENT, "NtMapViewOfSection returned %x\n", status );
|
|
|
|
/* still not 64k aligned */
|
|
ptr2 = (char *)ptr + 0x1000;
|
|
size = 0;
|
|
offset.QuadPart = 0;
|
|
status = pNtMapViewOfSection( mapping, hProcess, &ptr2, 0, 0, &offset, &size, 1, 0, PAGE_READWRITE );
|
|
ok( status == STATUS_MAPPED_ALIGNMENT, "NtMapViewOfSection returned %x\n", status );
|
|
|
|
/* zero_bits != 0 is not allowed when an address is set */
|
|
ptr2 = (char *)ptr + 0x1000;
|
|
size = 0;
|
|
offset.QuadPart = 0;
|
|
status = pNtMapViewOfSection( mapping, hProcess, &ptr2, 12, 0, &offset, &size, 1, 0, PAGE_READWRITE );
|
|
ok( status == STATUS_INVALID_PARAMETER_4, "NtMapViewOfSection returned %x\n", status );
|
|
|
|
ptr2 = (char *)ptr + 0x1000;
|
|
size = 0;
|
|
offset.QuadPart = 0;
|
|
status = pNtMapViewOfSection( mapping, hProcess, &ptr2, 16, 0, &offset, &size, 1, 0, PAGE_READWRITE );
|
|
ok( status == STATUS_INVALID_PARAMETER_4, "NtMapViewOfSection returned %x\n", status );
|
|
|
|
ptr2 = (char *)ptr + 0x1001;
|
|
size = 0;
|
|
offset.QuadPart = 0;
|
|
status = pNtMapViewOfSection( mapping, hProcess, &ptr2, 16, 0, &offset, &size, 1, 0, PAGE_READWRITE );
|
|
ok( status == STATUS_INVALID_PARAMETER_4, "NtMapViewOfSection returned %x\n", status );
|
|
|
|
ptr2 = (char *)ptr + 0x1000;
|
|
size = 0;
|
|
offset.QuadPart = 1;
|
|
status = pNtMapViewOfSection( mapping, hProcess, &ptr2, 16, 0, &offset, &size, 1, 0, PAGE_READWRITE );
|
|
ok( status == STATUS_INVALID_PARAMETER_4, "NtMapViewOfSection returned %x\n", status );
|
|
|
|
if (sizeof(void *) == sizeof(int) && (!pIsWow64Process ||
|
|
!pIsWow64Process( GetCurrentProcess(), &is_wow64 ) || !is_wow64))
|
|
{
|
|
/* new memory region conflicts with previous mapping */
|
|
ptr2 = ptr;
|
|
size = 0;
|
|
offset.QuadPart = 0;
|
|
status = pNtMapViewOfSection( mapping, hProcess, &ptr2, 0, 0, &offset,
|
|
&size, 1, AT_ROUND_TO_PAGE, PAGE_READWRITE );
|
|
ok( status == STATUS_CONFLICTING_ADDRESSES, "NtMapViewOfSection returned %x\n", status );
|
|
|
|
ptr2 = (char *)ptr + 42;
|
|
size = 0;
|
|
offset.QuadPart = 0;
|
|
status = pNtMapViewOfSection( mapping, hProcess, &ptr2, 0, 0, &offset,
|
|
&size, 1, AT_ROUND_TO_PAGE, PAGE_READWRITE );
|
|
ok( status == STATUS_CONFLICTING_ADDRESSES, "NtMapViewOfSection returned %x\n", status );
|
|
|
|
/* in contrary to regular NtMapViewOfSection, only 4kb align is enforced */
|
|
ptr2 = (char *)ptr + 0x1000;
|
|
size = 0;
|
|
offset.QuadPart = 0;
|
|
status = pNtMapViewOfSection( mapping, hProcess, &ptr2, 0, 0, &offset,
|
|
&size, 1, AT_ROUND_TO_PAGE, PAGE_READWRITE );
|
|
ok( status == STATUS_SUCCESS, "NtMapViewOfSection returned %x\n", status );
|
|
ok( (char *)ptr2 == (char *)ptr + 0x1000,
|
|
"expected address %p, got %p\n", (char *)ptr + 0x1000, ptr2 );
|
|
status = pNtUnmapViewOfSection( hProcess, ptr2 );
|
|
ok( !status, "NtUnmapViewOfSection failed status %x\n", status );
|
|
|
|
/* the address is rounded down if not on a page boundary */
|
|
ptr2 = (char *)ptr + 0x1001;
|
|
size = 0;
|
|
offset.QuadPart = 0;
|
|
status = pNtMapViewOfSection( mapping, hProcess, &ptr2, 0, 0, &offset,
|
|
&size, 1, AT_ROUND_TO_PAGE, PAGE_READWRITE );
|
|
ok( status == STATUS_SUCCESS, "NtMapViewOfSection returned %x\n", status );
|
|
ok( (char *)ptr2 == (char *)ptr + 0x1000,
|
|
"expected address %p, got %p\n", (char *)ptr + 0x1000, ptr2 );
|
|
status = pNtUnmapViewOfSection( hProcess, ptr2 );
|
|
ok( !status, "NtUnmapViewOfSection failed status %x\n", status );
|
|
|
|
ptr2 = (char *)ptr + 0x2000;
|
|
size = 0;
|
|
offset.QuadPart = 0;
|
|
status = pNtMapViewOfSection( mapping, hProcess, &ptr2, 0, 0, &offset,
|
|
&size, 1, AT_ROUND_TO_PAGE, PAGE_READWRITE );
|
|
ok( status == STATUS_SUCCESS, "NtMapViewOfSection returned %x\n", status );
|
|
ok( (char *)ptr2 == (char *)ptr + 0x2000,
|
|
"expected address %p, got %p\n", (char *)ptr + 0x2000, ptr2 );
|
|
status = pNtUnmapViewOfSection( hProcess, ptr2 );
|
|
ok( !status, "NtUnmapViewOfSection failed status %x\n", status );
|
|
}
|
|
else
|
|
{
|
|
ptr2 = (char *)ptr + 0x1000;
|
|
size = 0;
|
|
offset.QuadPart = 0;
|
|
status = pNtMapViewOfSection( mapping, hProcess, &ptr2, 0, 0, &offset,
|
|
&size, 1, AT_ROUND_TO_PAGE, PAGE_READWRITE );
|
|
todo_wine
|
|
ok( status == STATUS_INVALID_PARAMETER_9, "NtMapViewOfSection returned %x\n", status );
|
|
}
|
|
|
|
status = pNtUnmapViewOfSection( hProcess, ptr );
|
|
ok( !status, "NtUnmapViewOfSection failed status %x\n", status );
|
|
|
|
CloseHandle( mapping );
|
|
CloseHandle( file );
|
|
DeleteFileA( testfile );
|
|
|
|
TerminateProcess(hProcess, 0);
|
|
CloseHandle(hProcess);
|
|
}
|
|
|
|
static void test_NtAreMappedFilesTheSame(void)
|
|
{
|
|
static const char testfile[] = "testfile.xxx";
|
|
HANDLE file, file2, mapping, map2;
|
|
void *ptr, *ptr2;
|
|
NTSTATUS status;
|
|
char path[MAX_PATH];
|
|
|
|
if (!pNtAreMappedFilesTheSame)
|
|
{
|
|
win_skip( "NtAreMappedFilesTheSame not available\n" );
|
|
return;
|
|
}
|
|
|
|
file = CreateFileA( testfile, GENERIC_READ|GENERIC_WRITE, FILE_SHARE_READ|FILE_SHARE_WRITE,
|
|
NULL, CREATE_ALWAYS, 0, 0 );
|
|
ok( file != INVALID_HANDLE_VALUE, "CreateFile error %u\n", GetLastError() );
|
|
SetFilePointer( file, 4096, NULL, FILE_BEGIN );
|
|
SetEndOfFile( file );
|
|
|
|
mapping = CreateFileMappingA( file, NULL, PAGE_READWRITE, 0, 4096, NULL );
|
|
ok( mapping != 0, "CreateFileMapping error %u\n", GetLastError() );
|
|
|
|
ptr = MapViewOfFile( mapping, FILE_MAP_READ, 0, 0, 4096 );
|
|
ok( ptr != NULL, "MapViewOfFile FILE_MAP_READ error %u\n", GetLastError() );
|
|
|
|
file2 = CreateFileA( testfile, GENERIC_READ, FILE_SHARE_READ|FILE_SHARE_WRITE,
|
|
NULL, OPEN_EXISTING, 0, 0 );
|
|
ok( file2 != INVALID_HANDLE_VALUE, "CreateFile error %u\n", GetLastError() );
|
|
|
|
map2 = CreateFileMappingA( file2, NULL, PAGE_READONLY, 0, 4096, NULL );
|
|
ok( map2 != 0, "CreateFileMapping error %u\n", GetLastError() );
|
|
ptr2 = MapViewOfFile( map2, FILE_MAP_READ, 0, 0, 4096 );
|
|
ok( ptr2 != NULL, "MapViewOfFile FILE_MAP_READ error %u\n", GetLastError() );
|
|
status = pNtAreMappedFilesTheSame( ptr, ptr2 );
|
|
ok( status == STATUS_NOT_SAME_DEVICE, "NtAreMappedFilesTheSame returned %x\n", status );
|
|
UnmapViewOfFile( ptr2 );
|
|
|
|
ptr2 = MapViewOfFile( mapping, FILE_MAP_READ, 0, 0, 4096 );
|
|
ok( ptr2 != NULL, "MapViewOfFile FILE_MAP_READ error %u\n", GetLastError() );
|
|
status = pNtAreMappedFilesTheSame( ptr, ptr2 );
|
|
ok( status == STATUS_NOT_SAME_DEVICE, "NtAreMappedFilesTheSame returned %x\n", status );
|
|
UnmapViewOfFile( ptr2 );
|
|
CloseHandle( map2 );
|
|
|
|
map2 = CreateFileMappingA( file, NULL, PAGE_READONLY, 0, 4096, NULL );
|
|
ok( map2 != 0, "CreateFileMapping error %u\n", GetLastError() );
|
|
ptr2 = MapViewOfFile( map2, FILE_MAP_READ, 0, 0, 4096 );
|
|
ok( ptr2 != NULL, "MapViewOfFile FILE_MAP_READ error %u\n", GetLastError() );
|
|
status = pNtAreMappedFilesTheSame( ptr, ptr2 );
|
|
ok( status == STATUS_NOT_SAME_DEVICE, "NtAreMappedFilesTheSame returned %x\n", status );
|
|
UnmapViewOfFile( ptr2 );
|
|
CloseHandle( map2 );
|
|
CloseHandle( file2 );
|
|
|
|
status = pNtAreMappedFilesTheSame( ptr, ptr );
|
|
ok( status == STATUS_SUCCESS || broken(status == STATUS_NOT_SAME_DEVICE),
|
|
"NtAreMappedFilesTheSame returned %x\n", status );
|
|
|
|
status = pNtAreMappedFilesTheSame( ptr, (char *)ptr + 30 );
|
|
ok( status == STATUS_SUCCESS || broken(status == STATUS_NOT_SAME_DEVICE),
|
|
"NtAreMappedFilesTheSame returned %x\n", status );
|
|
|
|
status = pNtAreMappedFilesTheSame( ptr, GetModuleHandleA("kernel32.dll") );
|
|
ok( status == STATUS_NOT_SAME_DEVICE, "NtAreMappedFilesTheSame returned %x\n", status );
|
|
|
|
status = pNtAreMappedFilesTheSame( ptr, (void *)0xdeadbeef );
|
|
ok( status == STATUS_CONFLICTING_ADDRESSES || status == STATUS_INVALID_ADDRESS,
|
|
"NtAreMappedFilesTheSame returned %x\n", status );
|
|
|
|
status = pNtAreMappedFilesTheSame( ptr, NULL );
|
|
ok( status == STATUS_INVALID_ADDRESS, "NtAreMappedFilesTheSame returned %x\n", status );
|
|
|
|
status = pNtAreMappedFilesTheSame( ptr, (void *)GetProcessHeap() );
|
|
ok( status == STATUS_CONFLICTING_ADDRESSES, "NtAreMappedFilesTheSame returned %x\n", status );
|
|
|
|
status = pNtAreMappedFilesTheSame( NULL, NULL );
|
|
ok( status == STATUS_INVALID_ADDRESS, "NtAreMappedFilesTheSame returned %x\n", status );
|
|
|
|
ptr2 = VirtualAlloc( NULL, 0x10000, MEM_COMMIT, PAGE_READWRITE );
|
|
ok( ptr2 != NULL, "VirtualAlloc error %u\n", GetLastError() );
|
|
status = pNtAreMappedFilesTheSame( ptr, ptr2 );
|
|
ok( status == STATUS_CONFLICTING_ADDRESSES, "NtAreMappedFilesTheSame returned %x\n", status );
|
|
VirtualFree( ptr2, 0, MEM_RELEASE );
|
|
|
|
UnmapViewOfFile( ptr );
|
|
CloseHandle( mapping );
|
|
CloseHandle( file );
|
|
|
|
status = pNtAreMappedFilesTheSame( GetModuleHandleA("ntdll.dll"),
|
|
GetModuleHandleA("kernel32.dll") );
|
|
ok( status == STATUS_NOT_SAME_DEVICE, "NtAreMappedFilesTheSame returned %x\n", status );
|
|
status = pNtAreMappedFilesTheSame( GetModuleHandleA("kernel32.dll"),
|
|
GetModuleHandleA("kernel32.dll") );
|
|
ok( status == STATUS_SUCCESS, "NtAreMappedFilesTheSame returned %x\n", status );
|
|
status = pNtAreMappedFilesTheSame( GetModuleHandleA("kernel32.dll"),
|
|
(char *)GetModuleHandleA("kernel32.dll") + 4096 );
|
|
ok( status == STATUS_SUCCESS, "NtAreMappedFilesTheSame returned %x\n", status );
|
|
|
|
GetSystemDirectoryA( path, MAX_PATH );
|
|
strcat( path, "\\kernel32.dll" );
|
|
file = CreateFileA( path, GENERIC_READ, FILE_SHARE_READ|FILE_SHARE_WRITE, NULL, OPEN_EXISTING, 0, 0 );
|
|
ok( file != INVALID_HANDLE_VALUE, "CreateFile error %u\n", GetLastError() );
|
|
|
|
mapping = CreateFileMappingA( file, NULL, PAGE_READONLY, 0, 4096, NULL );
|
|
ok( mapping != 0, "CreateFileMapping error %u\n", GetLastError() );
|
|
ptr = MapViewOfFile( mapping, FILE_MAP_READ, 0, 0, 4096 );
|
|
ok( ptr != NULL, "MapViewOfFile FILE_MAP_READ error %u\n", GetLastError() );
|
|
status = pNtAreMappedFilesTheSame( ptr, GetModuleHandleA("kernel32.dll") );
|
|
ok( status == STATUS_NOT_SAME_DEVICE, "NtAreMappedFilesTheSame returned %x\n", status );
|
|
UnmapViewOfFile( ptr );
|
|
CloseHandle( mapping );
|
|
|
|
mapping = CreateFileMappingA( file, NULL, PAGE_READONLY | SEC_IMAGE, 0, 0, NULL );
|
|
ok( mapping != 0, "CreateFileMapping error %u\n", GetLastError() );
|
|
ptr = MapViewOfFile( mapping, FILE_MAP_READ, 0, 0, 0 );
|
|
ok( ptr != NULL, "MapViewOfFile FILE_MAP_READ error %u\n", GetLastError() );
|
|
status = pNtAreMappedFilesTheSame( ptr, GetModuleHandleA("kernel32.dll") );
|
|
todo_wine
|
|
ok( status == STATUS_SUCCESS, "NtAreMappedFilesTheSame returned %x\n", status );
|
|
|
|
file2 = CreateFileA( path, GENERIC_READ, FILE_SHARE_READ|FILE_SHARE_WRITE, NULL, OPEN_EXISTING, 0, 0 );
|
|
ok( file2 != INVALID_HANDLE_VALUE, "CreateFile error %u\n", GetLastError() );
|
|
map2 = CreateFileMappingA( file2, NULL, PAGE_READONLY | SEC_IMAGE, 0, 0, NULL );
|
|
ok( map2 != 0, "CreateFileMapping error %u\n", GetLastError() );
|
|
ptr2 = MapViewOfFile( map2, FILE_MAP_READ, 0, 0, 0 );
|
|
ok( ptr2 != NULL, "MapViewOfFile FILE_MAP_READ error %u\n", GetLastError() );
|
|
status = pNtAreMappedFilesTheSame( ptr, ptr2 );
|
|
ok( status == STATUS_SUCCESS, "NtAreMappedFilesTheSame returned %x\n", status );
|
|
UnmapViewOfFile( ptr2 );
|
|
CloseHandle( map2 );
|
|
CloseHandle( file2 );
|
|
|
|
UnmapViewOfFile( ptr );
|
|
CloseHandle( mapping );
|
|
|
|
CloseHandle( file );
|
|
DeleteFileA( testfile );
|
|
}
|
|
|
|
static void test_CreateFileMapping(void)
|
|
{
|
|
HANDLE handle, handle2;
|
|
|
|
/* test case sensitivity */
|
|
|
|
SetLastError(0xdeadbeef);
|
|
handle = CreateFileMappingA( INVALID_HANDLE_VALUE, NULL, SEC_COMMIT | PAGE_READWRITE, 0, 0x1000,
|
|
"Wine Test Mapping");
|
|
ok( handle != NULL, "CreateFileMapping failed with error %u\n", GetLastError());
|
|
ok( GetLastError() == 0, "wrong error %u\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
handle2 = CreateFileMappingA( INVALID_HANDLE_VALUE, NULL, SEC_COMMIT | PAGE_READWRITE, 0, 0x1000,
|
|
"Wine Test Mapping");
|
|
ok( handle2 != NULL, "CreateFileMapping failed with error %d\n", GetLastError());
|
|
ok( GetLastError() == ERROR_ALREADY_EXISTS, "wrong error %u\n", GetLastError());
|
|
CloseHandle( handle2 );
|
|
|
|
SetLastError(0xdeadbeef);
|
|
handle2 = CreateFileMappingA( INVALID_HANDLE_VALUE, NULL, SEC_COMMIT | PAGE_READWRITE, 0, 0x1000,
|
|
"WINE TEST MAPPING");
|
|
ok( handle2 != NULL, "CreateFileMapping failed with error %d\n", GetLastError());
|
|
ok( GetLastError() == 0, "wrong error %u\n", GetLastError());
|
|
CloseHandle( handle2 );
|
|
|
|
SetLastError(0xdeadbeef);
|
|
handle2 = OpenFileMappingA( FILE_MAP_ALL_ACCESS, FALSE, "Wine Test Mapping");
|
|
ok( handle2 != NULL, "OpenFileMapping failed with error %d\n", GetLastError());
|
|
CloseHandle( handle2 );
|
|
|
|
SetLastError(0xdeadbeef);
|
|
handle2 = OpenFileMappingA( FILE_MAP_ALL_ACCESS, FALSE, "WINE TEST MAPPING");
|
|
ok( !handle2, "OpenFileMapping succeeded\n");
|
|
ok( GetLastError() == ERROR_FILE_NOT_FOUND || GetLastError() == ERROR_INVALID_NAME /* win9x */,
|
|
"wrong error %u\n", GetLastError());
|
|
|
|
CloseHandle( handle );
|
|
}
|
|
|
|
static void test_IsBadReadPtr(void)
|
|
{
|
|
BOOL ret;
|
|
void *ptr = (void *)0xdeadbeef;
|
|
char stackvar;
|
|
|
|
ret = IsBadReadPtr(NULL, 0);
|
|
ok(ret == FALSE, "Expected IsBadReadPtr to return FALSE, got %d\n", ret);
|
|
|
|
ret = IsBadReadPtr(NULL, 1);
|
|
ok(ret == TRUE, "Expected IsBadReadPtr to return TRUE, got %d\n", ret);
|
|
|
|
ret = IsBadReadPtr(ptr, 0);
|
|
ok(ret == FALSE, "Expected IsBadReadPtr to return FALSE, got %d\n", ret);
|
|
|
|
ret = IsBadReadPtr(ptr, 1);
|
|
ok(ret == TRUE, "Expected IsBadReadPtr to return TRUE, got %d\n", ret);
|
|
|
|
ret = IsBadReadPtr(&stackvar, 0);
|
|
ok(ret == FALSE, "Expected IsBadReadPtr to return FALSE, got %d\n", ret);
|
|
|
|
ret = IsBadReadPtr(&stackvar, sizeof(char));
|
|
ok(ret == FALSE, "Expected IsBadReadPtr to return FALSE, got %d\n", ret);
|
|
}
|
|
|
|
static void test_IsBadWritePtr(void)
|
|
{
|
|
BOOL ret;
|
|
void *ptr = (void *)0xdeadbeef;
|
|
char stackval;
|
|
|
|
ret = IsBadWritePtr(NULL, 0);
|
|
ok(ret == FALSE, "Expected IsBadWritePtr to return FALSE, got %d\n", ret);
|
|
|
|
ret = IsBadWritePtr(NULL, 1);
|
|
ok(ret == TRUE, "Expected IsBadWritePtr to return TRUE, got %d\n", ret);
|
|
|
|
ret = IsBadWritePtr(ptr, 0);
|
|
ok(ret == FALSE, "Expected IsBadWritePtr to return FALSE, got %d\n", ret);
|
|
|
|
ret = IsBadWritePtr(ptr, 1);
|
|
ok(ret == TRUE, "Expected IsBadWritePtr to return TRUE, got %d\n", ret);
|
|
|
|
ret = IsBadWritePtr(&stackval, 0);
|
|
ok(ret == FALSE, "Expected IsBadWritePtr to return FALSE, got %d\n", ret);
|
|
|
|
ret = IsBadWritePtr(&stackval, sizeof(char));
|
|
ok(ret == FALSE, "Expected IsBadWritePtr to return FALSE, got %d\n", ret);
|
|
}
|
|
|
|
static void test_IsBadCodePtr(void)
|
|
{
|
|
BOOL ret;
|
|
void *ptr = (void *)0xdeadbeef;
|
|
char stackval;
|
|
|
|
ret = IsBadCodePtr(NULL);
|
|
ok(ret == TRUE, "Expected IsBadCodePtr to return TRUE, got %d\n", ret);
|
|
|
|
ret = IsBadCodePtr(ptr);
|
|
ok(ret == TRUE, "Expected IsBadCodePtr to return TRUE, got %d\n", ret);
|
|
|
|
ret = IsBadCodePtr((void *)&stackval);
|
|
ok(ret == FALSE, "Expected IsBadCodePtr to return FALSE, got %d\n", ret);
|
|
}
|
|
|
|
static void test_write_watch(void)
|
|
{
|
|
static const char pipename[] = "\\\\.\\pipe\\test_write_watch_pipe";
|
|
static const char testdata[] = "Hello World";
|
|
DWORD ret, size, old_prot, num_bytes;
|
|
MEMORY_BASIC_INFORMATION info;
|
|
HANDLE readpipe, writepipe;
|
|
OVERLAPPED overlapped;
|
|
void *results[64];
|
|
ULONG_PTR count;
|
|
ULONG pagesize;
|
|
BOOL success;
|
|
char *base;
|
|
|
|
if (!pGetWriteWatch || !pResetWriteWatch)
|
|
{
|
|
win_skip( "GetWriteWatch not supported\n" );
|
|
return;
|
|
}
|
|
|
|
size = 0x10000;
|
|
base = VirtualAlloc( 0, size, MEM_RESERVE | MEM_COMMIT | MEM_WRITE_WATCH, PAGE_READWRITE );
|
|
if (!base &&
|
|
(GetLastError() == ERROR_INVALID_PARAMETER || GetLastError() == ERROR_NOT_SUPPORTED))
|
|
{
|
|
win_skip( "MEM_WRITE_WATCH not supported\n" );
|
|
return;
|
|
}
|
|
ok( base != NULL, "VirtualAlloc failed %u\n", GetLastError() );
|
|
ret = VirtualQuery( base, &info, sizeof(info) );
|
|
ok(ret, "VirtualQuery failed %u\n", GetLastError());
|
|
ok( info.BaseAddress == base, "BaseAddress %p instead of %p\n", info.BaseAddress, base );
|
|
ok( info.AllocationProtect == PAGE_READWRITE, "wrong AllocationProtect %x\n", info.AllocationProtect );
|
|
ok( info.RegionSize == size, "wrong RegionSize 0x%lx\n", info.RegionSize );
|
|
ok( info.State == MEM_COMMIT, "wrong State 0x%x\n", info.State );
|
|
ok( info.Protect == PAGE_READWRITE, "wrong Protect 0x%x\n", info.Protect );
|
|
ok( info.Type == MEM_PRIVATE, "wrong Type 0x%x\n", info.Type );
|
|
|
|
count = 64;
|
|
SetLastError( 0xdeadbeef );
|
|
ret = pGetWriteWatch( 0, NULL, size, results, &count, &pagesize );
|
|
ok( ret == ~0u, "GetWriteWatch succeeded %u\n", ret );
|
|
ok( GetLastError() == ERROR_INVALID_PARAMETER ||
|
|
broken( GetLastError() == 0xdeadbeef ), /* win98 */
|
|
"wrong error %u\n", GetLastError() );
|
|
|
|
SetLastError( 0xdeadbeef );
|
|
ret = pGetWriteWatch( 0, GetModuleHandleW(NULL), size, results, &count, &pagesize );
|
|
if (ret)
|
|
{
|
|
ok( ret == ~0u, "GetWriteWatch succeeded %u\n", ret );
|
|
ok( GetLastError() == ERROR_INVALID_PARAMETER, "wrong error %u\n", GetLastError() );
|
|
}
|
|
else /* win98 */
|
|
{
|
|
ok( count == 0, "wrong count %lu\n", count );
|
|
}
|
|
|
|
ret = pGetWriteWatch( 0, base, size, results, &count, &pagesize );
|
|
ok( !ret, "GetWriteWatch failed %u\n", GetLastError() );
|
|
ok( count == 0, "wrong count %lu\n", count );
|
|
|
|
base[pagesize + 1] = 0x44;
|
|
|
|
count = 64;
|
|
ret = pGetWriteWatch( 0, base, size, results, &count, &pagesize );
|
|
ok( !ret, "GetWriteWatch failed %u\n", GetLastError() );
|
|
ok( count == 1, "wrong count %lu\n", count );
|
|
ok( results[0] == base + pagesize, "wrong result %p\n", results[0] );
|
|
|
|
count = 64;
|
|
ret = pGetWriteWatch( WRITE_WATCH_FLAG_RESET, base, size, results, &count, &pagesize );
|
|
ok( !ret, "GetWriteWatch failed %u\n", GetLastError() );
|
|
ok( count == 1, "wrong count %lu\n", count );
|
|
ok( results[0] == base + pagesize, "wrong result %p\n", results[0] );
|
|
|
|
count = 64;
|
|
ret = pGetWriteWatch( 0, base, size, results, &count, &pagesize );
|
|
ok( !ret, "GetWriteWatch failed %u\n", GetLastError() );
|
|
ok( count == 0, "wrong count %lu\n", count );
|
|
|
|
base[2*pagesize + 3] = 0x11;
|
|
base[4*pagesize + 8] = 0x11;
|
|
|
|
count = 64;
|
|
ret = pGetWriteWatch( 0, base, size, results, &count, &pagesize );
|
|
ok( !ret, "GetWriteWatch failed %u\n", GetLastError() );
|
|
ok( count == 2, "wrong count %lu\n", count );
|
|
ok( results[0] == base + 2*pagesize, "wrong result %p\n", results[0] );
|
|
ok( results[1] == base + 4*pagesize, "wrong result %p\n", results[1] );
|
|
|
|
count = 64;
|
|
ret = pGetWriteWatch( 0, base + 3*pagesize, 2*pagesize, results, &count, &pagesize );
|
|
ok( !ret, "GetWriteWatch failed %u\n", GetLastError() );
|
|
ok( count == 1, "wrong count %lu\n", count );
|
|
ok( results[0] == base + 4*pagesize, "wrong result %p\n", results[0] );
|
|
|
|
ret = pResetWriteWatch( base, 3*pagesize );
|
|
ok( !ret, "pResetWriteWatch failed %u\n", GetLastError() );
|
|
|
|
count = 64;
|
|
ret = pGetWriteWatch( 0, base, size, results, &count, &pagesize );
|
|
ok( !ret, "GetWriteWatch failed %u\n", GetLastError() );
|
|
ok( count == 1, "wrong count %lu\n", count );
|
|
ok( results[0] == base + 4*pagesize, "wrong result %p\n", results[0] );
|
|
|
|
*(DWORD *)(base + 2*pagesize - 2) = 0xdeadbeef;
|
|
|
|
count = 64;
|
|
ret = pGetWriteWatch( 0, base, size, results, &count, &pagesize );
|
|
ok( !ret, "GetWriteWatch failed %u\n", GetLastError() );
|
|
ok( count == 3, "wrong count %lu\n", count );
|
|
ok( results[0] == base + pagesize, "wrong result %p\n", results[0] );
|
|
ok( results[1] == base + 2*pagesize, "wrong result %p\n", results[1] );
|
|
ok( results[2] == base + 4*pagesize, "wrong result %p\n", results[2] );
|
|
|
|
count = 1;
|
|
ret = pGetWriteWatch( WRITE_WATCH_FLAG_RESET, base, size, results, &count, &pagesize );
|
|
ok( !ret, "GetWriteWatch failed %u\n", GetLastError() );
|
|
ok( count == 1, "wrong count %lu\n", count );
|
|
ok( results[0] == base + pagesize, "wrong result %p\n", results[0] );
|
|
|
|
count = 64;
|
|
ret = pGetWriteWatch( 0, base, size, results, &count, &pagesize );
|
|
ok( !ret, "GetWriteWatch failed %u\n", GetLastError() );
|
|
ok( count == 2, "wrong count %lu\n", count );
|
|
ok( results[0] == base + 2*pagesize, "wrong result %p\n", results[0] );
|
|
ok( results[1] == base + 4*pagesize, "wrong result %p\n", results[1] );
|
|
|
|
/* changing protections doesn't affect watches */
|
|
|
|
ret = VirtualProtect( base, 3*pagesize, PAGE_READONLY, &old_prot );
|
|
ok( ret, "VirtualProtect failed error %u\n", GetLastError() );
|
|
ok( old_prot == PAGE_READWRITE, "wrong old prot %x\n", old_prot );
|
|
|
|
ret = VirtualQuery( base, &info, sizeof(info) );
|
|
ok(ret, "VirtualQuery failed %u\n", GetLastError());
|
|
ok( info.BaseAddress == base, "BaseAddress %p instead of %p\n", info.BaseAddress, base );
|
|
ok( info.RegionSize == 3*pagesize, "wrong RegionSize 0x%lx\n", info.RegionSize );
|
|
ok( info.State == MEM_COMMIT, "wrong State 0x%x\n", info.State );
|
|
ok( info.Protect == PAGE_READONLY, "wrong Protect 0x%x\n", info.Protect );
|
|
|
|
ret = VirtualProtect( base, 3*pagesize, PAGE_READWRITE, &old_prot );
|
|
ok( ret, "VirtualProtect failed error %u\n", GetLastError() );
|
|
ok( old_prot == PAGE_READONLY, "wrong old prot %x\n", old_prot );
|
|
|
|
count = 64;
|
|
ret = pGetWriteWatch( 0, base, size, results, &count, &pagesize );
|
|
ok( !ret, "GetWriteWatch failed %u\n", GetLastError() );
|
|
ok( count == 2, "wrong count %lu\n", count );
|
|
ok( results[0] == base + 2*pagesize, "wrong result %p\n", results[0] );
|
|
ok( results[1] == base + 4*pagesize, "wrong result %p\n", results[1] );
|
|
|
|
ret = VirtualQuery( base, &info, sizeof(info) );
|
|
ok(ret, "VirtualQuery failed %u\n", GetLastError());
|
|
ok( info.BaseAddress == base, "BaseAddress %p instead of %p\n", info.BaseAddress, base );
|
|
ok( info.RegionSize == size, "wrong RegionSize 0x%lx\n", info.RegionSize );
|
|
ok( info.State == MEM_COMMIT, "wrong State 0x%x\n", info.State );
|
|
ok( info.Protect == PAGE_READWRITE, "wrong Protect 0x%x\n", info.Protect );
|
|
|
|
/* ReadFile should trigger write watches */
|
|
|
|
memset( &overlapped, 0, sizeof(overlapped) );
|
|
overlapped.hEvent = CreateEventA( NULL, TRUE, FALSE, NULL );
|
|
|
|
readpipe = CreateNamedPipeA( pipename, FILE_FLAG_OVERLAPPED | PIPE_ACCESS_INBOUND,
|
|
PIPE_TYPE_BYTE | PIPE_WAIT, 1, 1024, 1024,
|
|
NMPWAIT_USE_DEFAULT_WAIT, NULL );
|
|
ok( readpipe != INVALID_HANDLE_VALUE, "CreateNamedPipeA failed %u\n", GetLastError() );
|
|
|
|
success = ConnectNamedPipe( readpipe, &overlapped );
|
|
ok( !success, "ConnectNamedPipe unexpectedly succeeded\n" );
|
|
ok( GetLastError() == ERROR_IO_PENDING, "expected ERROR_IO_PENDING, got %u\n", GetLastError() );
|
|
|
|
writepipe = CreateFileA( pipename, GENERIC_WRITE, 0, NULL, OPEN_EXISTING, 0, NULL );
|
|
ok( writepipe != INVALID_HANDLE_VALUE, "CreateFileA failed %u\n", GetLastError() );
|
|
|
|
ret = WaitForSingleObject( overlapped.hEvent, 1000 );
|
|
ok( ret == WAIT_OBJECT_0, "expected WAIT_OBJECT_0, got %u\n", ret );
|
|
|
|
memset( base, 0, size );
|
|
|
|
count = 64;
|
|
ret = pGetWriteWatch( WRITE_WATCH_FLAG_RESET, base, size, results, &count, &pagesize );
|
|
ok( !ret, "GetWriteWatch failed %u\n", GetLastError() );
|
|
ok( count == 16, "wrong count %lu\n", count );
|
|
|
|
success = ReadFile( readpipe, base, size, NULL, &overlapped );
|
|
ok( !success, "ReadFile unexpectedly succeeded\n" );
|
|
ok( GetLastError() == ERROR_IO_PENDING, "expected ERROR_IO_PENDING, got %u\n", GetLastError() );
|
|
|
|
count = 64;
|
|
ret = pGetWriteWatch( WRITE_WATCH_FLAG_RESET, base, size, results, &count, &pagesize );
|
|
ok( !ret, "GetWriteWatch failed %u\n", GetLastError() );
|
|
ok( count == 16, "wrong count %lu\n", count );
|
|
|
|
num_bytes = 0;
|
|
success = WriteFile( writepipe, testdata, sizeof(testdata), &num_bytes, NULL );
|
|
ok( success, "WriteFile failed %u\n", GetLastError() );
|
|
ok( num_bytes == sizeof(testdata), "wrong number of bytes written\n" );
|
|
|
|
num_bytes = 0;
|
|
success = GetOverlappedResult( readpipe, &overlapped, &num_bytes, TRUE );
|
|
todo_wine ok( success, "GetOverlappedResult failed %u\n", GetLastError() );
|
|
todo_wine ok( num_bytes == sizeof(testdata), "wrong number of bytes read\n" );
|
|
todo_wine ok( !memcmp( base, testdata, sizeof(testdata)), "didn't receive expected data\n" );
|
|
|
|
count = 64;
|
|
memset( results, 0, sizeof(results) );
|
|
ret = pGetWriteWatch( WRITE_WATCH_FLAG_RESET, base, size, results, &count, &pagesize );
|
|
ok( !ret, "GetWriteWatch failed %u\n", GetLastError() );
|
|
todo_wine ok( count == 1, "wrong count %lu\n", count );
|
|
todo_wine ok( results[0] == base, "wrong result %p\n", results[0] );
|
|
|
|
CloseHandle( readpipe );
|
|
CloseHandle( writepipe );
|
|
CloseHandle( overlapped.hEvent );
|
|
|
|
/* some invalid parameter tests */
|
|
|
|
SetLastError( 0xdeadbeef );
|
|
count = 0;
|
|
ret = pGetWriteWatch( 0, base, size, results, &count, &pagesize );
|
|
if (ret)
|
|
{
|
|
ok( ret == ~0u, "GetWriteWatch succeeded %u\n", ret );
|
|
ok( GetLastError() == ERROR_INVALID_PARAMETER, "wrong error %u\n", GetLastError() );
|
|
|
|
SetLastError( 0xdeadbeef );
|
|
ret = pGetWriteWatch( 0, base, size, results, NULL, &pagesize );
|
|
ok( ret == ~0u, "GetWriteWatch succeeded %u\n", ret );
|
|
ok( GetLastError() == ERROR_NOACCESS, "wrong error %u\n", GetLastError() );
|
|
|
|
SetLastError( 0xdeadbeef );
|
|
count = 64;
|
|
ret = pGetWriteWatch( 0, base, size, results, &count, NULL );
|
|
ok( ret == ~0u, "GetWriteWatch succeeded %u\n", ret );
|
|
ok( GetLastError() == ERROR_NOACCESS, "wrong error %u\n", GetLastError() );
|
|
|
|
SetLastError( 0xdeadbeef );
|
|
count = 64;
|
|
ret = pGetWriteWatch( 0, base, size, NULL, &count, &pagesize );
|
|
ok( ret == ~0u, "GetWriteWatch succeeded %u\n", ret );
|
|
ok( GetLastError() == ERROR_NOACCESS, "wrong error %u\n", GetLastError() );
|
|
|
|
SetLastError( 0xdeadbeef );
|
|
count = 0;
|
|
ret = pGetWriteWatch( 0, base, size, NULL, &count, &pagesize );
|
|
ok( ret == ~0u, "GetWriteWatch succeeded %u\n", ret );
|
|
ok( GetLastError() == ERROR_INVALID_PARAMETER, "wrong error %u\n", GetLastError() );
|
|
|
|
SetLastError( 0xdeadbeef );
|
|
count = 64;
|
|
ret = pGetWriteWatch( 0xdeadbeef, base, size, results, &count, &pagesize );
|
|
ok( ret == ~0u, "GetWriteWatch succeeded %u\n", ret );
|
|
ok( GetLastError() == ERROR_INVALID_PARAMETER, "wrong error %u\n", GetLastError() );
|
|
|
|
SetLastError( 0xdeadbeef );
|
|
count = 64;
|
|
ret = pGetWriteWatch( 0, base, 0, results, &count, &pagesize );
|
|
ok( ret == ~0u, "GetWriteWatch succeeded %u\n", ret );
|
|
ok( GetLastError() == ERROR_INVALID_PARAMETER, "wrong error %u\n", GetLastError() );
|
|
|
|
SetLastError( 0xdeadbeef );
|
|
count = 64;
|
|
ret = pGetWriteWatch( 0, base, size * 2, results, &count, &pagesize );
|
|
ok( ret == ~0u, "GetWriteWatch succeeded %u\n", ret );
|
|
ok( GetLastError() == ERROR_INVALID_PARAMETER, "wrong error %u\n", GetLastError() );
|
|
|
|
SetLastError( 0xdeadbeef );
|
|
count = 64;
|
|
ret = pGetWriteWatch( 0, base + size - pagesize, pagesize + 1, results, &count, &pagesize );
|
|
ok( ret == ~0u, "GetWriteWatch succeeded %u\n", ret );
|
|
ok( GetLastError() == ERROR_INVALID_PARAMETER, "wrong error %u\n", GetLastError() );
|
|
|
|
SetLastError( 0xdeadbeef );
|
|
ret = pResetWriteWatch( base, 0 );
|
|
ok( ret == ~0u, "ResetWriteWatch succeeded %u\n", ret );
|
|
ok( GetLastError() == ERROR_INVALID_PARAMETER, "wrong error %u\n", GetLastError() );
|
|
|
|
SetLastError( 0xdeadbeef );
|
|
ret = pResetWriteWatch( GetModuleHandleW(NULL), size );
|
|
ok( ret == ~0u, "ResetWriteWatch succeeded %u\n", ret );
|
|
ok( GetLastError() == ERROR_INVALID_PARAMETER, "wrong error %u\n", GetLastError() );
|
|
}
|
|
else /* win98 is completely different */
|
|
{
|
|
SetLastError( 0xdeadbeef );
|
|
count = 64;
|
|
ret = pGetWriteWatch( 0, base, size, NULL, &count, &pagesize );
|
|
ok( ret == ERROR_INVALID_PARAMETER, "GetWriteWatch succeeded %u\n", ret );
|
|
ok( GetLastError() == 0xdeadbeef, "wrong error %u\n", GetLastError() );
|
|
|
|
count = 0;
|
|
ret = pGetWriteWatch( 0, base, size, NULL, &count, &pagesize );
|
|
ok( !ret, "GetWriteWatch failed %u\n", ret );
|
|
|
|
count = 64;
|
|
ret = pGetWriteWatch( 0xdeadbeef, base, size, results, &count, &pagesize );
|
|
ok( !ret, "GetWriteWatch failed %u\n", ret );
|
|
|
|
count = 64;
|
|
ret = pGetWriteWatch( 0, base, 0, results, &count, &pagesize );
|
|
ok( !ret, "GetWriteWatch failed %u\n", ret );
|
|
|
|
ret = pResetWriteWatch( base, 0 );
|
|
ok( !ret, "ResetWriteWatch failed %u\n", ret );
|
|
|
|
ret = pResetWriteWatch( GetModuleHandleW(NULL), size );
|
|
ok( !ret, "ResetWriteWatch failed %u\n", ret );
|
|
}
|
|
|
|
VirtualFree( base, 0, MEM_RELEASE );
|
|
|
|
base = VirtualAlloc( 0, size, MEM_RESERVE | MEM_WRITE_WATCH, PAGE_READWRITE );
|
|
ok( base != NULL, "VirtualAlloc failed %u\n", GetLastError() );
|
|
VirtualFree( base, 0, MEM_RELEASE );
|
|
|
|
base = VirtualAlloc( 0, size, MEM_WRITE_WATCH, PAGE_READWRITE );
|
|
ok( !base, "VirtualAlloc succeeded\n" );
|
|
ok( GetLastError() == ERROR_INVALID_PARAMETER, "wrong error %u\n", GetLastError() );
|
|
|
|
/* initial protect doesn't matter */
|
|
|
|
base = VirtualAlloc( 0, size, MEM_RESERVE | MEM_WRITE_WATCH, PAGE_NOACCESS );
|
|
ok( base != NULL, "VirtualAlloc failed %u\n", GetLastError() );
|
|
base = VirtualAlloc( base, size, MEM_COMMIT, PAGE_NOACCESS );
|
|
ok( base != NULL, "VirtualAlloc failed %u\n", GetLastError() );
|
|
|
|
count = 64;
|
|
ret = pGetWriteWatch( 0, base, size, results, &count, &pagesize );
|
|
ok( !ret, "GetWriteWatch failed %u\n", GetLastError() );
|
|
ok( count == 0, "wrong count %lu\n", count );
|
|
|
|
ret = VirtualProtect( base, 6*pagesize, PAGE_READWRITE, &old_prot );
|
|
ok( ret, "VirtualProtect failed error %u\n", GetLastError() );
|
|
ok( old_prot == PAGE_NOACCESS, "wrong old prot %x\n", old_prot );
|
|
|
|
base[5*pagesize + 200] = 3;
|
|
|
|
ret = VirtualProtect( base, 6*pagesize, PAGE_NOACCESS, &old_prot );
|
|
ok( ret, "VirtualProtect failed error %u\n", GetLastError() );
|
|
ok( old_prot == PAGE_READWRITE, "wrong old prot %x\n", old_prot );
|
|
|
|
count = 64;
|
|
ret = pGetWriteWatch( 0, base, size, results, &count, &pagesize );
|
|
ok( !ret, "GetWriteWatch failed %u\n", GetLastError() );
|
|
ok( count == 1, "wrong count %lu\n", count );
|
|
ok( results[0] == base + 5*pagesize, "wrong result %p\n", results[0] );
|
|
|
|
ret = VirtualFree( base, size, MEM_DECOMMIT );
|
|
ok( ret, "VirtualFree failed %u\n", GetLastError() );
|
|
|
|
count = 64;
|
|
ret = pGetWriteWatch( 0, base, size, results, &count, &pagesize );
|
|
ok( !ret, "GetWriteWatch failed %u\n", GetLastError() );
|
|
ok( count == 1 || broken(count == 0), /* win98 */
|
|
"wrong count %lu\n", count );
|
|
if (count) ok( results[0] == base + 5*pagesize, "wrong result %p\n", results[0] );
|
|
|
|
VirtualFree( base, 0, MEM_RELEASE );
|
|
}
|
|
|
|
#if defined(__i386__) || defined(__x86_64__)
|
|
|
|
static DWORD WINAPI stack_commit_func( void *arg )
|
|
{
|
|
volatile char *p = (char *)&p;
|
|
|
|
/* trigger all guard pages, to ensure that the pages are committed */
|
|
while (p >= (char *)NtCurrentTeb()->DeallocationStack + 4 * 0x1000)
|
|
{
|
|
p[0] |= 0;
|
|
p -= 0x1000;
|
|
}
|
|
|
|
ok( arg == (void *)0xdeadbeef, "expected 0xdeadbeef, got %p\n", arg );
|
|
return 42;
|
|
}
|
|
|
|
static void test_stack_commit(void)
|
|
{
|
|
#ifdef __i386__
|
|
static const char code_call_on_stack[] = {
|
|
0x55, /* pushl %ebp */
|
|
0x56, /* pushl %esi */
|
|
0x89, 0xe6, /* movl %esp,%esi */
|
|
0x8b, 0x4c, 0x24, 0x0c, /* movl 12(%esp),%ecx - func */
|
|
0x8b, 0x54, 0x24, 0x10, /* movl 16(%esp),%edx - arg */
|
|
0x8b, 0x44, 0x24, 0x14, /* movl 20(%esp),%eax - stack */
|
|
0x83, 0xe0, 0xf0, /* andl $~15,%eax */
|
|
0x83, 0xe8, 0x0c, /* subl $12,%eax */
|
|
0x89, 0xc4, /* movl %eax,%esp */
|
|
0x52, /* pushl %edx */
|
|
0x31, 0xed, /* xorl %ebp,%ebp */
|
|
0xff, 0xd1, /* call *%ecx */
|
|
0x89, 0xf4, /* movl %esi,%esp */
|
|
0x5e, /* popl %esi */
|
|
0x5d, /* popl %ebp */
|
|
0xc2, 0x0c, 0x00 }; /* ret $12 */
|
|
#else
|
|
static const char code_call_on_stack[] = {
|
|
0x55, /* pushq %rbp */
|
|
0x48, 0x89, 0xe5, /* movq %rsp,%rbp */
|
|
/* %rcx - func, %rdx - arg, %r8 - stack */
|
|
0x48, 0x87, 0xca, /* xchgq %rcx,%rdx */
|
|
0x49, 0x83, 0xe0, 0xf0, /* andq $~15,%r8 */
|
|
0x49, 0x83, 0xe8, 0x20, /* subq $0x20,%r8 */
|
|
0x4c, 0x89, 0xc4, /* movq %r8,%rsp */
|
|
0xff, 0xd2, /* callq *%rdx */
|
|
0x48, 0x89, 0xec, /* movq %rbp,%rsp */
|
|
0x5d, /* popq %rbp */
|
|
0xc3 }; /* ret */
|
|
#endif
|
|
DWORD (WINAPI *call_on_stack)( DWORD (WINAPI *func)(void *), void *arg, void *stack );
|
|
void *old_stack, *old_stack_base, *old_stack_limit;
|
|
void *new_stack, *new_stack_base;
|
|
DWORD result;
|
|
|
|
call_on_stack = VirtualAlloc( 0, 0x1000, MEM_RESERVE | MEM_COMMIT, PAGE_EXECUTE_READWRITE );
|
|
ok( call_on_stack != NULL, "VirtualAlloc failed %u\n", GetLastError() );
|
|
memcpy( call_on_stack, code_call_on_stack, sizeof(code_call_on_stack) );
|
|
|
|
/* allocate a new stack, only the first guard page is committed */
|
|
new_stack = VirtualAlloc( 0, 0x400000, MEM_RESERVE, PAGE_READWRITE );
|
|
ok( new_stack != NULL, "VirtualAlloc failed %u\n", GetLastError() );
|
|
new_stack_base = (char *)new_stack + 0x400000;
|
|
VirtualAlloc( (char *)new_stack_base - 0x1000, 0x1000, MEM_COMMIT, PAGE_READWRITE | PAGE_GUARD );
|
|
|
|
old_stack = NtCurrentTeb()->DeallocationStack;
|
|
old_stack_base = NtCurrentTeb()->Tib.StackBase;
|
|
old_stack_limit = NtCurrentTeb()->Tib.StackLimit;
|
|
|
|
NtCurrentTeb()->DeallocationStack = new_stack;
|
|
NtCurrentTeb()->Tib.StackBase = new_stack_base;
|
|
NtCurrentTeb()->Tib.StackLimit = new_stack_base;
|
|
|
|
result = call_on_stack( stack_commit_func, (void *)0xdeadbeef, new_stack_base );
|
|
|
|
NtCurrentTeb()->DeallocationStack = old_stack;
|
|
NtCurrentTeb()->Tib.StackBase = old_stack_base;
|
|
NtCurrentTeb()->Tib.StackLimit = old_stack_limit;
|
|
|
|
ok( result == 42, "expected 42, got %u\n", result );
|
|
|
|
VirtualFree( new_stack, 0, MEM_RELEASE );
|
|
VirtualFree( call_on_stack, 0, MEM_RELEASE );
|
|
}
|
|
|
|
#endif /* defined(__i386__) || defined(__x86_64__) */
|
|
#ifdef __i386__
|
|
|
|
static LONG num_guard_page_calls;
|
|
|
|
static DWORD guard_page_handler( EXCEPTION_RECORD *rec, EXCEPTION_REGISTRATION_RECORD *frame,
|
|
CONTEXT *context, EXCEPTION_REGISTRATION_RECORD **dispatcher )
|
|
{
|
|
trace( "exception: %08x flags:%x addr:%p\n",
|
|
rec->ExceptionCode, rec->ExceptionFlags, rec->ExceptionAddress );
|
|
|
|
ok( rec->NumberParameters == 2, "NumberParameters is %d instead of 2\n", rec->NumberParameters );
|
|
ok( rec->ExceptionCode == STATUS_GUARD_PAGE_VIOLATION, "ExceptionCode is %08x instead of %08x\n",
|
|
rec->ExceptionCode, STATUS_GUARD_PAGE_VIOLATION );
|
|
|
|
InterlockedIncrement( &num_guard_page_calls );
|
|
*(int *)rec->ExceptionInformation[1] += 0x100;
|
|
|
|
return ExceptionContinueExecution;
|
|
}
|
|
|
|
static void test_guard_page(void)
|
|
{
|
|
EXCEPTION_REGISTRATION_RECORD frame;
|
|
MEMORY_BASIC_INFORMATION info;
|
|
DWORD ret, size, old_prot;
|
|
int *value, old_value;
|
|
void *results[64];
|
|
ULONG_PTR count;
|
|
ULONG pagesize;
|
|
BOOL success;
|
|
char *base;
|
|
|
|
size = 0x1000;
|
|
base = VirtualAlloc( 0, size, MEM_RESERVE | MEM_COMMIT, PAGE_READWRITE | PAGE_GUARD );
|
|
ok( base != NULL, "VirtualAlloc failed %u\n", GetLastError() );
|
|
value = (int *)base;
|
|
|
|
/* verify info structure */
|
|
ret = VirtualQuery( base, &info, sizeof(info) );
|
|
ok( ret, "VirtualQuery failed %u\n", GetLastError());
|
|
ok( info.BaseAddress == base, "BaseAddress %p instead of %p\n", info.BaseAddress, base );
|
|
ok( info.AllocationProtect == (PAGE_READWRITE | PAGE_GUARD), "wrong AllocationProtect %x\n", info.AllocationProtect );
|
|
ok( info.RegionSize == size, "wrong RegionSize 0x%lx\n", info.RegionSize );
|
|
ok( info.State == MEM_COMMIT, "wrong State 0x%x\n", info.State );
|
|
ok( info.Protect == (PAGE_READWRITE | PAGE_GUARD), "wrong Protect 0x%x\n", info.Protect );
|
|
ok( info.Type == MEM_PRIVATE, "wrong Type 0x%x\n", info.Type );
|
|
|
|
/* put some initial value into the memory */
|
|
success = VirtualProtect( base, size, PAGE_READWRITE, &old_prot );
|
|
ok( success, "VirtualProtect failed %u\n", GetLastError() );
|
|
ok( old_prot == (PAGE_READWRITE | PAGE_GUARD), "wrong old prot %x\n", old_prot );
|
|
|
|
*value = 1;
|
|
*(value + 1) = 2;
|
|
|
|
success = VirtualProtect( base, size, PAGE_READWRITE | PAGE_GUARD, &old_prot );
|
|
ok( success, "VirtualProtect failed %u\n", GetLastError() );
|
|
ok( old_prot == PAGE_READWRITE, "wrong old prot %x\n", old_prot );
|
|
|
|
/* test behaviour of VirtualLock - first attempt should fail */
|
|
SetLastError( 0xdeadbeef );
|
|
success = VirtualLock( base, size );
|
|
ok( !success, "VirtualLock unexpectedly succeeded\n" );
|
|
todo_wine
|
|
ok( GetLastError() == STATUS_GUARD_PAGE_VIOLATION, "wrong error %u\n", GetLastError() );
|
|
|
|
success = VirtualLock( base, size );
|
|
todo_wine
|
|
ok( success, "VirtualLock failed %u\n", GetLastError() );
|
|
if (success)
|
|
{
|
|
ok( *value == 1, "memory block contains wrong value, expected 1, got 0x%x\n", *value );
|
|
success = VirtualUnlock( base, size );
|
|
ok( success, "VirtualUnlock failed %u\n", GetLastError() );
|
|
}
|
|
|
|
/* check info structure again, PAGE_GUARD should be removed now */
|
|
ret = VirtualQuery( base, &info, sizeof(info) );
|
|
ok( ret, "VirtualQuery failed %u\n", GetLastError());
|
|
ok( info.BaseAddress == base, "BaseAddress %p instead of %p\n", info.BaseAddress, base );
|
|
ok( info.AllocationProtect == (PAGE_READWRITE | PAGE_GUARD), "wrong AllocationProtect %x\n", info.AllocationProtect );
|
|
ok( info.RegionSize == size, "wrong RegionSize 0x%lx\n", info.RegionSize );
|
|
ok( info.State == MEM_COMMIT, "wrong State 0x%x\n", info.State );
|
|
todo_wine
|
|
ok( info.Protect == PAGE_READWRITE, "wrong Protect 0x%x\n", info.Protect );
|
|
ok( info.Type == MEM_PRIVATE, "wrong Type 0x%x\n", info.Type );
|
|
|
|
success = VirtualProtect( base, size, PAGE_READWRITE | PAGE_GUARD, &old_prot );
|
|
ok( success, "VirtualProtect failed %u\n", GetLastError() );
|
|
todo_wine
|
|
ok( old_prot == PAGE_READWRITE, "wrong old prot %x\n", old_prot );
|
|
|
|
/* test directly accessing the memory - we need to setup an exception handler first */
|
|
frame.Handler = guard_page_handler;
|
|
frame.Prev = NtCurrentTeb()->Tib.ExceptionList;
|
|
NtCurrentTeb()->Tib.ExceptionList = &frame;
|
|
|
|
InterlockedExchange( &num_guard_page_calls, 0 );
|
|
InterlockedExchange( &old_value, *value ); /* exception handler increments value by 0x100 */
|
|
*value = 2;
|
|
ok( old_value == 0x101, "memory block contains wrong value, expected 0x101, got 0x%x\n", old_value );
|
|
ok( num_guard_page_calls == 1, "expected one callback of guard page handler, got %d calls\n", num_guard_page_calls );
|
|
|
|
NtCurrentTeb()->Tib.ExceptionList = frame.Prev;
|
|
|
|
/* check info structure again, PAGE_GUARD should be removed now */
|
|
ret = VirtualQuery( base, &info, sizeof(info) );
|
|
ok( ret, "VirtualQuery failed %u\n", GetLastError());
|
|
ok( info.Protect == PAGE_READWRITE, "wrong Protect 0x%x\n", info.Protect );
|
|
|
|
success = VirtualProtect( base, size, PAGE_READWRITE | PAGE_GUARD, &old_prot );
|
|
ok( success, "VirtualProtect failed %u\n", GetLastError() );
|
|
ok( old_prot == PAGE_READWRITE, "wrong old prot %x\n", old_prot );
|
|
|
|
/* test accessing second integer in memory */
|
|
frame.Handler = guard_page_handler;
|
|
frame.Prev = NtCurrentTeb()->Tib.ExceptionList;
|
|
NtCurrentTeb()->Tib.ExceptionList = &frame;
|
|
|
|
InterlockedExchange( &num_guard_page_calls, 0 );
|
|
old_value = *(value + 1);
|
|
ok( old_value == 0x102, "memory block contains wrong value, expected 0x102, got 0x%x\n", old_value );
|
|
ok( *value == 2, "memory block contains wrong value, expected 2, got 0x%x\n", *value );
|
|
ok( num_guard_page_calls == 1, "expected one callback of guard page handler, got %d calls\n", num_guard_page_calls );
|
|
|
|
NtCurrentTeb()->Tib.ExceptionList = frame.Prev;
|
|
|
|
success = VirtualLock( base, size );
|
|
ok( success, "VirtualLock failed %u\n", GetLastError() );
|
|
if (success)
|
|
{
|
|
ok( *value == 2, "memory block contains wrong value, expected 2, got 0x%x\n", *value );
|
|
success = VirtualUnlock( base, size );
|
|
ok( success, "VirtualUnlock failed %u\n", GetLastError() );
|
|
}
|
|
|
|
VirtualFree( base, 0, MEM_RELEASE );
|
|
|
|
/* combined guard page / write watch tests */
|
|
if (!pGetWriteWatch || !pResetWriteWatch)
|
|
{
|
|
win_skip( "GetWriteWatch not supported, skipping combined guard page / write watch tests\n" );
|
|
return;
|
|
}
|
|
|
|
base = VirtualAlloc( 0, size, MEM_RESERVE | MEM_COMMIT | MEM_WRITE_WATCH, PAGE_READWRITE | PAGE_GUARD );
|
|
if (!base && (GetLastError() == ERROR_INVALID_PARAMETER || GetLastError() == ERROR_NOT_SUPPORTED))
|
|
{
|
|
win_skip( "MEM_WRITE_WATCH not supported\n" );
|
|
return;
|
|
}
|
|
ok( base != NULL, "VirtualAlloc failed %u\n", GetLastError() );
|
|
value = (int *)base;
|
|
|
|
ret = VirtualQuery( base, &info, sizeof(info) );
|
|
ok( ret, "VirtualQuery failed %u\n", GetLastError() );
|
|
ok( info.BaseAddress == base, "BaseAddress %p instead of %p\n", info.BaseAddress, base );
|
|
ok( info.AllocationProtect == (PAGE_READWRITE | PAGE_GUARD), "wrong AllocationProtect %x\n", info.AllocationProtect );
|
|
ok( info.RegionSize == size, "wrong RegionSize 0x%lx\n", info.RegionSize );
|
|
ok( info.State == MEM_COMMIT, "wrong State 0x%x\n", info.State );
|
|
ok( info.Protect == (PAGE_READWRITE | PAGE_GUARD), "wrong Protect 0x%x\n", info.Protect );
|
|
ok( info.Type == MEM_PRIVATE, "wrong Type 0x%x\n", info.Type );
|
|
|
|
count = 64;
|
|
ret = pGetWriteWatch( 0, base, size, results, &count, &pagesize );
|
|
ok( !ret, "GetWriteWatch failed %u\n", GetLastError() );
|
|
ok( count == 0, "wrong count %lu\n", count );
|
|
|
|
/* writing to a page should trigger should trigger guard page, even if write watch is set */
|
|
frame.Handler = guard_page_handler;
|
|
frame.Prev = NtCurrentTeb()->Tib.ExceptionList;
|
|
NtCurrentTeb()->Tib.ExceptionList = &frame;
|
|
|
|
InterlockedExchange( &num_guard_page_calls, 0 );
|
|
*value = 1;
|
|
*(value + 1) = 2;
|
|
ok( num_guard_page_calls == 1, "expected one callback of guard page handler, got %d calls\n", num_guard_page_calls );
|
|
|
|
NtCurrentTeb()->Tib.ExceptionList = frame.Prev;
|
|
|
|
count = 64;
|
|
ret = pGetWriteWatch( WRITE_WATCH_FLAG_RESET, base, size, results, &count, &pagesize );
|
|
ok( !ret, "GetWriteWatch failed %u\n", GetLastError() );
|
|
ok( count == 1, "wrong count %lu\n", count );
|
|
ok( results[0] == base, "wrong result %p\n", results[0] );
|
|
|
|
success = VirtualProtect( base, size, PAGE_READWRITE | PAGE_GUARD, &old_prot );
|
|
ok( success, "VirtualProtect failed %u\n", GetLastError() );
|
|
|
|
/* write watch is triggered from inside of the guard page handler */
|
|
frame.Handler = guard_page_handler;
|
|
frame.Prev = NtCurrentTeb()->Tib.ExceptionList;
|
|
NtCurrentTeb()->Tib.ExceptionList = &frame;
|
|
|
|
InterlockedExchange( &num_guard_page_calls, 0 );
|
|
old_value = *(value + 1); /* doesn't trigger write watch */
|
|
ok( old_value == 0x102, "memory block contains wrong value, expected 0x102, got 0x%x\n", old_value );
|
|
ok( *value == 1, "memory block contains wrong value, expected 1, got 0x%x\n", *value );
|
|
ok( num_guard_page_calls == 1, "expected one callback of guard page handler, got %d calls\n", num_guard_page_calls );
|
|
|
|
NtCurrentTeb()->Tib.ExceptionList = frame.Prev;
|
|
|
|
count = 64;
|
|
ret = pGetWriteWatch( WRITE_WATCH_FLAG_RESET, base, size, results, &count, &pagesize );
|
|
ok( !ret, "GetWriteWatch failed %u\n", GetLastError() );
|
|
ok( count == 1, "wrong count %lu\n", count );
|
|
ok( results[0] == base, "wrong result %p\n", results[0] );
|
|
|
|
success = VirtualProtect( base, size, PAGE_READWRITE | PAGE_GUARD, &old_prot );
|
|
ok( success, "VirtualProtect failed %u\n", GetLastError() );
|
|
|
|
/* test behaviour of VirtualLock - first attempt should fail without triggering write watches */
|
|
SetLastError( 0xdeadbeef );
|
|
success = VirtualLock( base, size );
|
|
ok( !success, "VirtualLock unexpectedly succeeded\n" );
|
|
todo_wine
|
|
ok( GetLastError() == STATUS_GUARD_PAGE_VIOLATION, "wrong error %u\n", GetLastError() );
|
|
|
|
count = 64;
|
|
ret = pGetWriteWatch( 0, base, size, results, &count, &pagesize );
|
|
ok( !ret, "GetWriteWatch failed %u\n", GetLastError() );
|
|
ok( count == 0, "wrong count %lu\n", count );
|
|
|
|
success = VirtualLock( base, size );
|
|
todo_wine
|
|
ok( success, "VirtualLock failed %u\n", GetLastError() );
|
|
if (success)
|
|
{
|
|
ok( *value == 1, "memory block contains wrong value, expected 1, got 0x%x\n", *value );
|
|
success = VirtualUnlock( base, size );
|
|
ok( success, "VirtualUnlock failed %u\n", GetLastError() );
|
|
}
|
|
|
|
count = 64;
|
|
results[0] = (void *)0xdeadbeef;
|
|
ret = pGetWriteWatch( WRITE_WATCH_FLAG_RESET, base, size, results, &count, &pagesize );
|
|
ok( !ret, "GetWriteWatch failed %u\n", GetLastError() );
|
|
todo_wine
|
|
ok( count == 1 || broken(count == 0) /* Windows 8 */, "wrong count %lu\n", count );
|
|
todo_wine
|
|
ok( results[0] == base || broken(results[0] == (void *)0xdeadbeef) /* Windows 8 */, "wrong result %p\n", results[0] );
|
|
|
|
VirtualFree( base, 0, MEM_RELEASE );
|
|
}
|
|
|
|
static LONG num_execute_fault_calls;
|
|
|
|
static DWORD execute_fault_seh_handler( EXCEPTION_RECORD *rec, EXCEPTION_REGISTRATION_RECORD *frame,
|
|
CONTEXT *context, EXCEPTION_REGISTRATION_RECORD **dispatcher )
|
|
{
|
|
ULONG flags = MEM_EXECUTE_OPTION_ENABLE;
|
|
DWORD err;
|
|
|
|
trace( "exception: %08x flags:%x addr:%p info[0]:%ld info[1]:%p\n",
|
|
rec->ExceptionCode, rec->ExceptionFlags, rec->ExceptionAddress,
|
|
rec->ExceptionInformation[0], (void *)rec->ExceptionInformation[1] );
|
|
|
|
ok( rec->NumberParameters == 2, "NumberParameters is %d instead of 2\n", rec->NumberParameters );
|
|
ok( rec->ExceptionCode == STATUS_ACCESS_VIOLATION || rec->ExceptionCode == STATUS_GUARD_PAGE_VIOLATION,
|
|
"ExceptionCode is %08x instead of STATUS_ACCESS_VIOLATION or STATUS_GUARD_PAGE_VIOLATION\n", rec->ExceptionCode );
|
|
|
|
NtQueryInformationProcess( GetCurrentProcess(), ProcessExecuteFlags, &flags, sizeof(flags), NULL );
|
|
|
|
if (rec->ExceptionCode == STATUS_GUARD_PAGE_VIOLATION)
|
|
{
|
|
|
|
err = IsProcessorFeaturePresent( PF_NX_ENABLED ) ? EXCEPTION_EXECUTE_FAULT : EXCEPTION_READ_FAULT;
|
|
ok( rec->ExceptionInformation[0] == err, "ExceptionInformation[0] is %d instead of %d\n",
|
|
(DWORD)rec->ExceptionInformation[0], err );
|
|
|
|
InterlockedIncrement( &num_guard_page_calls );
|
|
}
|
|
else if (rec->ExceptionCode == STATUS_ACCESS_VIOLATION)
|
|
{
|
|
DWORD old_prot;
|
|
BOOL success;
|
|
|
|
err = (flags & MEM_EXECUTE_OPTION_DISABLE) ? EXCEPTION_EXECUTE_FAULT : EXCEPTION_READ_FAULT;
|
|
ok( rec->ExceptionInformation[0] == err, "ExceptionInformation[0] is %d instead of %d\n",
|
|
(DWORD)rec->ExceptionInformation[0], err );
|
|
|
|
success = VirtualProtect( (void *)rec->ExceptionInformation[1], 16, PAGE_EXECUTE_READWRITE, &old_prot );
|
|
ok( success, "VirtualProtect failed %u\n", GetLastError() );
|
|
ok( old_prot == PAGE_READWRITE, "wrong old prot %x\n", old_prot );
|
|
|
|
InterlockedIncrement( &num_execute_fault_calls );
|
|
}
|
|
|
|
return ExceptionContinueExecution;
|
|
}
|
|
|
|
static LONG CALLBACK execute_fault_vec_handler( EXCEPTION_POINTERS *ExceptionInfo )
|
|
{
|
|
PEXCEPTION_RECORD rec = ExceptionInfo->ExceptionRecord;
|
|
DWORD old_prot;
|
|
BOOL success;
|
|
|
|
trace( "exception: %08x flags:%x addr:%p info[0]:%ld info[1]:%p\n",
|
|
rec->ExceptionCode, rec->ExceptionFlags, rec->ExceptionAddress,
|
|
rec->ExceptionInformation[0], (void *)rec->ExceptionInformation[1] );
|
|
|
|
ok( rec->NumberParameters == 2, "NumberParameters is %d instead of 2\n", rec->NumberParameters );
|
|
ok( rec->ExceptionCode == STATUS_ACCESS_VIOLATION,
|
|
"ExceptionCode is %08x instead of STATUS_ACCESS_VIOLATION\n", rec->ExceptionCode );
|
|
|
|
if (rec->ExceptionCode == STATUS_ACCESS_VIOLATION)
|
|
InterlockedIncrement( &num_execute_fault_calls );
|
|
|
|
if (rec->ExceptionInformation[0] == EXCEPTION_READ_FAULT)
|
|
return EXCEPTION_CONTINUE_SEARCH;
|
|
|
|
success = VirtualProtect( (void *)rec->ExceptionInformation[1], 16, PAGE_EXECUTE_READWRITE, &old_prot );
|
|
ok( success, "VirtualProtect failed %u\n", GetLastError() );
|
|
ok( old_prot == PAGE_NOACCESS, "wrong old prot %x\n", old_prot );
|
|
|
|
return EXCEPTION_CONTINUE_EXECUTION;
|
|
}
|
|
|
|
static inline DWORD send_message_excpt( HWND hWnd, UINT uMsg, WPARAM wParam, LPARAM lParam )
|
|
{
|
|
EXCEPTION_REGISTRATION_RECORD frame;
|
|
DWORD ret;
|
|
|
|
frame.Handler = execute_fault_seh_handler;
|
|
frame.Prev = NtCurrentTeb()->Tib.ExceptionList;
|
|
NtCurrentTeb()->Tib.ExceptionList = &frame;
|
|
|
|
InterlockedExchange( &num_guard_page_calls, 0 );
|
|
InterlockedExchange( &num_execute_fault_calls, 0 );
|
|
ret = SendMessageA( hWnd, uMsg, wParam, lParam );
|
|
|
|
NtCurrentTeb()->Tib.ExceptionList = frame.Prev;
|
|
|
|
return ret;
|
|
}
|
|
|
|
static inline DWORD call_proc_excpt( DWORD (CALLBACK *code)(void *), void *arg )
|
|
{
|
|
EXCEPTION_REGISTRATION_RECORD frame;
|
|
DWORD ret;
|
|
|
|
frame.Handler = execute_fault_seh_handler;
|
|
frame.Prev = NtCurrentTeb()->Tib.ExceptionList;
|
|
NtCurrentTeb()->Tib.ExceptionList = &frame;
|
|
|
|
InterlockedExchange( &num_guard_page_calls, 0 );
|
|
InterlockedExchange( &num_execute_fault_calls, 0 );
|
|
ret = code( arg );
|
|
|
|
NtCurrentTeb()->Tib.ExceptionList = frame.Prev;
|
|
|
|
return ret;
|
|
}
|
|
|
|
static LRESULT CALLBACK jmp_test_func( HWND hWnd, UINT uMsg, WPARAM wParam, LPARAM lParam )
|
|
{
|
|
if (uMsg == WM_USER)
|
|
return 42;
|
|
|
|
return DefWindowProcA( hWnd, uMsg, wParam, lParam );
|
|
}
|
|
|
|
static LRESULT CALLBACK atl_test_func( HWND hWnd, UINT uMsg, WPARAM wParam, LPARAM lParam )
|
|
{
|
|
DWORD arg = (DWORD)hWnd;
|
|
if (uMsg == WM_USER)
|
|
ok( arg == 0x11223344, "arg is 0x%08x instead of 0x11223344\n", arg );
|
|
else
|
|
ok( arg != 0x11223344, "arg is unexpectedly 0x11223344\n" );
|
|
return 43;
|
|
}
|
|
|
|
static DWORD CALLBACK atl5_test_func( void )
|
|
{
|
|
return 44;
|
|
}
|
|
|
|
static void test_atl_thunk_emulation( ULONG dep_flags )
|
|
{
|
|
static const char code_jmp[] = {0xE9, 0x00, 0x00, 0x00, 0x00};
|
|
static const char code_atl1[] = {0xC7, 0x44, 0x24, 0x04, 0x44, 0x33, 0x22, 0x11, 0xE9, 0x00, 0x00, 0x00, 0x00};
|
|
static const char code_atl2[] = {0xB9, 0x44, 0x33, 0x22, 0x11, 0xE9, 0x00, 0x00, 0x00, 0x00};
|
|
static const char code_atl3[] = {0xBA, 0x44, 0x33, 0x22, 0x11, 0xB9, 0x00, 0x00, 0x00, 0x00, 0xFF, 0xE1};
|
|
static const char code_atl4[] = {0xB9, 0x44, 0x33, 0x22, 0x11, 0xB8, 0x00, 0x00, 0x00, 0x00, 0xFF, 0xE0};
|
|
static const char code_atl5[] = {0x59, 0x58, 0x51, 0xFF, 0x60, 0x04};
|
|
static const char cls_name[] = "atl_thunk_class";
|
|
DWORD ret, size, old_prot;
|
|
ULONG old_flags = MEM_EXECUTE_OPTION_ENABLE;
|
|
BOOL success, restore_flags = FALSE;
|
|
void *results[64];
|
|
ULONG_PTR count;
|
|
ULONG pagesize;
|
|
WNDCLASSEXA wc;
|
|
char *base;
|
|
HWND hWnd;
|
|
|
|
trace( "Running DEP tests with ProcessExecuteFlags = %d\n", dep_flags );
|
|
|
|
NtQueryInformationProcess( GetCurrentProcess(), ProcessExecuteFlags, &old_flags, sizeof(old_flags), NULL );
|
|
if (old_flags != dep_flags)
|
|
{
|
|
ret = NtSetInformationProcess( GetCurrentProcess(), ProcessExecuteFlags, &dep_flags, sizeof(dep_flags) );
|
|
if (ret == STATUS_INVALID_INFO_CLASS) /* Windows 2000 */
|
|
{
|
|
win_skip( "Skipping DEP tests with ProcessExecuteFlags = %d\n", dep_flags );
|
|
return;
|
|
}
|
|
ok( !ret, "NtSetInformationProcess failed with status %08x\n", ret );
|
|
restore_flags = TRUE;
|
|
}
|
|
|
|
size = 0x1000;
|
|
base = VirtualAlloc( 0, size, MEM_RESERVE | MEM_COMMIT, PAGE_READWRITE );
|
|
ok( base != NULL, "VirtualAlloc failed %u\n", GetLastError() );
|
|
|
|
/* Check result of GetProcessDEPPolicy */
|
|
if (!pGetProcessDEPPolicy)
|
|
win_skip( "GetProcessDEPPolicy not supported\n" );
|
|
else
|
|
{
|
|
BOOL (WINAPI *get_dep_policy)(HANDLE, LPDWORD, PBOOL) = (void *)base;
|
|
BOOL policy_permanent = 0xdeadbeef;
|
|
DWORD policy_flags = 0xdeadbeef;
|
|
|
|
/* GetProcessDEPPolicy crashes on Windows when a NULL pointer is passed.
|
|
* Moreover this function has a bug on Windows 8, which has the effect that
|
|
* policy_permanent is set to the content of the CL register instead of 0,
|
|
* when the policy is not permanent. To detect that we use an assembler
|
|
* wrapper to call the function. */
|
|
|
|
memcpy( base, code_atl2, sizeof(code_atl2) );
|
|
*(DWORD *)(base + 6) = (DWORD_PTR)pGetProcessDEPPolicy - (DWORD_PTR)(base + 10);
|
|
|
|
success = VirtualProtect( base, size, PAGE_EXECUTE_READWRITE, &old_prot );
|
|
ok( success, "VirtualProtect failed %u\n", GetLastError() );
|
|
|
|
success = get_dep_policy( GetCurrentProcess(), &policy_flags, &policy_permanent );
|
|
ok( success, "GetProcessDEPPolicy failed %u\n", GetLastError() );
|
|
|
|
ret = 0;
|
|
if (dep_flags & MEM_EXECUTE_OPTION_DISABLE)
|
|
ret |= PROCESS_DEP_ENABLE;
|
|
if (dep_flags & MEM_EXECUTE_OPTION_DISABLE_THUNK_EMULATION)
|
|
ret |= PROCESS_DEP_DISABLE_ATL_THUNK_EMULATION;
|
|
|
|
ok( policy_flags == ret, "expected policy flags %d, got %d\n", ret, policy_flags );
|
|
ok( !policy_permanent || broken(policy_permanent == 0x44),
|
|
"expected policy permanent FALSE, got %d\n", policy_permanent );
|
|
}
|
|
|
|
memcpy( base, code_jmp, sizeof(code_jmp) );
|
|
*(DWORD *)(base + 1) = (DWORD_PTR)jmp_test_func - (DWORD_PTR)(base + 5);
|
|
|
|
/* On Windows, the ATL Thunk emulation is only enabled while running WndProc functions,
|
|
* whereas in Wine such a limitation doesn't exist yet. We want to test in a scenario
|
|
* where it is active, so that application which depend on that still work properly.
|
|
* We have no exception handler enabled yet, so give proper EXECUTE permissions to
|
|
* prevent crashes while creating the window. */
|
|
|
|
success = VirtualProtect( base, size, PAGE_EXECUTE_READWRITE, &old_prot );
|
|
ok( success, "VirtualProtect failed %u\n", GetLastError() );
|
|
|
|
memset( &wc, 0, sizeof(wc) );
|
|
wc.cbSize = sizeof(wc);
|
|
wc.style = CS_VREDRAW | CS_HREDRAW;
|
|
wc.hInstance = GetModuleHandleA( 0 );
|
|
wc.hCursor = LoadCursorA( NULL, (LPCSTR)IDC_ARROW );
|
|
wc.hbrBackground = NULL;
|
|
wc.lpszClassName = cls_name;
|
|
wc.lpfnWndProc = (WNDPROC)base;
|
|
success = RegisterClassExA(&wc) != 0;
|
|
ok( success, "RegisterClassExA failed %u\n", GetLastError() );
|
|
|
|
hWnd = CreateWindowExA(0, cls_name, "Test", WS_TILEDWINDOW, 0, 0, 640, 480, 0, 0, 0, 0);
|
|
ok( hWnd != 0, "CreateWindowExA failed %u\n", GetLastError() );
|
|
|
|
ret = SendMessageA(hWnd, WM_USER, 0, 0);
|
|
ok( ret == 42, "SendMessage returned unexpected result %d\n", ret );
|
|
|
|
/* At first try with an instruction which is not recognized as proper ATL thunk
|
|
* by the Windows ATL Thunk Emulator. Removing execute permissions will lead to
|
|
* STATUS_ACCESS_VIOLATION exceptions when DEP is enabled. */
|
|
|
|
success = VirtualProtect( base, size, PAGE_READWRITE, &old_prot );
|
|
ok( success, "VirtualProtect failed %u\n", GetLastError() );
|
|
|
|
ret = send_message_excpt( hWnd, WM_USER, 0, 0 );
|
|
ok( ret == 42, "call returned wrong result, expected 42, got %d\n", ret );
|
|
ok( num_guard_page_calls == 0, "expected no STATUS_GUARD_PAGE_VIOLATION exception, got %d exceptions\n", num_guard_page_calls );
|
|
if ((dep_flags & MEM_EXECUTE_OPTION_DISABLE) && !IsProcessorFeaturePresent( PF_NX_ENABLED ))
|
|
{
|
|
trace( "DEP hardware support is not available\n" );
|
|
ok( num_execute_fault_calls == 0, "expected no STATUS_ACCESS_VIOLATION exception, got %d exceptions\n", num_execute_fault_calls );
|
|
dep_flags = MEM_EXECUTE_OPTION_ENABLE;
|
|
}
|
|
else if (dep_flags & MEM_EXECUTE_OPTION_DISABLE)
|
|
{
|
|
trace( "DEP hardware support is available\n" );
|
|
ok( num_execute_fault_calls == 1, "expected one STATUS_ACCESS_VIOLATION exception, got %d exceptions\n", num_execute_fault_calls );
|
|
}
|
|
else
|
|
ok( num_execute_fault_calls == 0, "expected no STATUS_ACCESS_VIOLATION exception, got %d exceptions\n", num_execute_fault_calls );
|
|
|
|
/* Now a bit more complicated, the page containing the code is protected with
|
|
* PAGE_GUARD memory protection. */
|
|
|
|
success = VirtualProtect( base, size, PAGE_READWRITE | PAGE_GUARD, &old_prot );
|
|
ok( success, "VirtualProtect failed %u\n", GetLastError() );
|
|
|
|
ret = send_message_excpt( hWnd, WM_USER, 0, 0 );
|
|
ok( ret == 42, "call returned wrong result, expected 42, got %d\n", ret );
|
|
ok( num_guard_page_calls == 1, "expected one STATUS_GUARD_PAGE_VIOLATION exception, got %d exceptions\n", num_guard_page_calls );
|
|
if (dep_flags & MEM_EXECUTE_OPTION_DISABLE)
|
|
ok( num_execute_fault_calls == 1, "expected one STATUS_ACCESS_VIOLATION exception, got %d exceptions\n", num_execute_fault_calls );
|
|
else
|
|
ok( num_execute_fault_calls == 0, "expected no STATUS_ACCESS_VIOLATION exception, got %d exceptions\n", num_execute_fault_calls );
|
|
|
|
ret = send_message_excpt( hWnd, WM_USER, 0, 0 );
|
|
ok( ret == 42, "call returned wrong result, expected 42, got %d\n", ret );
|
|
ok( num_guard_page_calls == 0, "expected no STATUS_GUARD_PAGE_VIOLATION exception, got %d exceptions\n", num_guard_page_calls );
|
|
ok( num_execute_fault_calls == 0, "expected no STATUS_ACCESS_VIOLATION exception, got %d exceptions\n", num_execute_fault_calls );
|
|
|
|
/* Now test with a proper ATL thunk instruction. */
|
|
|
|
memcpy( base, code_atl1, sizeof(code_atl1) );
|
|
*(DWORD *)(base + 9) = (DWORD_PTR)atl_test_func - (DWORD_PTR)(base + 13);
|
|
|
|
success = VirtualProtect( base, size, PAGE_EXECUTE_READWRITE, &old_prot );
|
|
ok( success, "VirtualProtect failed %u\n", GetLastError() );
|
|
|
|
ret = SendMessageA(hWnd, WM_USER, 0, 0);
|
|
ok( ret == 43, "SendMessage returned unexpected result %d\n", ret );
|
|
|
|
/* Try executing with PAGE_READWRITE protection. */
|
|
|
|
success = VirtualProtect( base, size, PAGE_READWRITE, &old_prot );
|
|
ok( success, "VirtualProtect failed %u\n", GetLastError() );
|
|
|
|
ret = send_message_excpt( hWnd, WM_USER, 0, 0 );
|
|
ok( ret == 43, "call returned wrong result, expected 43, got %d\n", ret );
|
|
ok( num_guard_page_calls == 0, "expected no STATUS_GUARD_PAGE_VIOLATION exception, got %d exceptions\n", num_guard_page_calls );
|
|
if ((dep_flags & MEM_EXECUTE_OPTION_DISABLE) && (dep_flags & MEM_EXECUTE_OPTION_DISABLE_THUNK_EMULATION))
|
|
ok( num_execute_fault_calls == 1, "expected one STATUS_ACCESS_VIOLATION exception, got %d exceptions\n", num_execute_fault_calls );
|
|
else
|
|
ok( num_execute_fault_calls == 0, "expected no STATUS_ACCESS_VIOLATION exception, got %d exceptions\n", num_execute_fault_calls );
|
|
|
|
/* Now a bit more complicated, the page containing the code is protected with
|
|
* PAGE_GUARD memory protection. */
|
|
|
|
success = VirtualProtect( base, size, PAGE_READWRITE | PAGE_GUARD, &old_prot );
|
|
ok( success, "VirtualProtect failed %u\n", GetLastError() );
|
|
|
|
/* the same, but with PAGE_GUARD set */
|
|
ret = send_message_excpt( hWnd, WM_USER, 0, 0 );
|
|
ok( ret == 43, "call returned wrong result, expected 43, got %d\n", ret );
|
|
ok( num_guard_page_calls == 1, "expected one STATUS_GUARD_PAGE_VIOLATION exception, got %d exceptions\n", num_guard_page_calls );
|
|
if ((dep_flags & MEM_EXECUTE_OPTION_DISABLE) && (dep_flags & MEM_EXECUTE_OPTION_DISABLE_THUNK_EMULATION))
|
|
ok( num_execute_fault_calls == 1, "expected one STATUS_ACCESS_VIOLATION exception, got %d exceptions\n", num_execute_fault_calls );
|
|
else
|
|
ok( num_execute_fault_calls == 0, "expected no STATUS_ACCESS_VIOLATION exception, got %d exceptions\n", num_execute_fault_calls );
|
|
|
|
ret = send_message_excpt( hWnd, WM_USER, 0, 0 );
|
|
ok( ret == 43, "call returned wrong result, expected 43, got %d\n", ret );
|
|
ok( num_guard_page_calls == 0, "expected no STATUS_GUARD_PAGE_VIOLATION exception, got %d exceptions\n", num_guard_page_calls );
|
|
ok( num_execute_fault_calls == 0, "expected no STATUS_ACCESS_VIOLATION exception, got %d exceptions\n", num_execute_fault_calls );
|
|
|
|
/* The following test shows that on Windows, even a vectored exception handler
|
|
* cannot intercept internal exceptions thrown by the ATL thunk emulation layer. */
|
|
|
|
if ((dep_flags & MEM_EXECUTE_OPTION_DISABLE) && !(dep_flags & MEM_EXECUTE_OPTION_DISABLE_THUNK_EMULATION))
|
|
{
|
|
if (pRtlAddVectoredExceptionHandler && pRtlRemoveVectoredExceptionHandler)
|
|
{
|
|
PVOID vectored_handler;
|
|
|
|
success = VirtualProtect( base, size, PAGE_NOACCESS, &old_prot );
|
|
ok( success, "VirtualProtect failed %u\n", GetLastError() );
|
|
|
|
vectored_handler = pRtlAddVectoredExceptionHandler( TRUE, &execute_fault_vec_handler );
|
|
ok( vectored_handler != 0, "RtlAddVectoredExceptionHandler failed\n" );
|
|
|
|
ret = send_message_excpt( hWnd, WM_USER, 0, 0 );
|
|
|
|
pRtlRemoveVectoredExceptionHandler( vectored_handler );
|
|
|
|
ok( ret == 43, "call returned wrong result, expected 43, got %d\n", ret );
|
|
ok( num_execute_fault_calls == 1, "expected one STATUS_ACCESS_VIOLATION exception, got %d exceptions\n", num_execute_fault_calls );
|
|
}
|
|
else
|
|
win_skip( "RtlAddVectoredExceptionHandler or RtlRemoveVectoredExceptionHandler not found\n" );
|
|
}
|
|
|
|
/* Test alternative ATL thunk instructions. */
|
|
|
|
memcpy( base, code_atl2, sizeof(code_atl2) );
|
|
*(DWORD *)(base + 6) = (DWORD_PTR)atl_test_func - (DWORD_PTR)(base + 10);
|
|
|
|
success = VirtualProtect( base, size, PAGE_READWRITE, &old_prot );
|
|
ok( success, "VirtualProtect failed %u\n", GetLastError() );
|
|
|
|
ret = send_message_excpt( hWnd, WM_USER + 1, 0, 0 );
|
|
/* FIXME: we don't check the content of the register ECX yet */
|
|
ok( ret == 43, "call returned wrong result, expected 43, got %d\n", ret );
|
|
ok( num_guard_page_calls == 0, "expected no STATUS_GUARD_PAGE_VIOLATION exception, got %d exceptions\n", num_guard_page_calls );
|
|
if ((dep_flags & MEM_EXECUTE_OPTION_DISABLE) && (dep_flags & MEM_EXECUTE_OPTION_DISABLE_THUNK_EMULATION))
|
|
ok( num_execute_fault_calls == 1, "expected one STATUS_ACCESS_VIOLATION exception, got %d exceptions\n", num_execute_fault_calls );
|
|
else
|
|
ok( num_execute_fault_calls == 0, "expected no STATUS_ACCESS_VIOLATION exception, got %d exceptions\n", num_execute_fault_calls );
|
|
|
|
memcpy( base, code_atl3, sizeof(code_atl3) );
|
|
*(DWORD *)(base + 6) = (DWORD_PTR)atl_test_func;
|
|
|
|
success = VirtualProtect( base, size, PAGE_READWRITE, &old_prot );
|
|
ok( success, "VirtualProtect failed %u\n", GetLastError() );
|
|
|
|
ret = send_message_excpt( hWnd, WM_USER + 1, 0, 0 );
|
|
/* FIXME: we don't check the content of the registers ECX/EDX yet */
|
|
ok( ret == 43, "call returned wrong result, expected 43, got %d\n", ret );
|
|
ok( num_guard_page_calls == 0, "expected no STATUS_GUARD_PAGE_VIOLATION exception, got %d exceptions\n", num_guard_page_calls );
|
|
if ((dep_flags & MEM_EXECUTE_OPTION_DISABLE) && (dep_flags & MEM_EXECUTE_OPTION_DISABLE_THUNK_EMULATION))
|
|
ok( num_execute_fault_calls == 1, "expected one STATUS_ACCESS_VIOLATION exception, got %d exceptions\n", num_execute_fault_calls );
|
|
else
|
|
ok( num_execute_fault_calls == 0, "expected no STATUS_ACCESS_VIOLATION exception, got %d exceptions\n", num_execute_fault_calls );
|
|
|
|
memcpy( base, code_atl4, sizeof(code_atl4) );
|
|
*(DWORD *)(base + 6) = (DWORD_PTR)atl_test_func;
|
|
|
|
success = VirtualProtect( base, size, PAGE_READWRITE, &old_prot );
|
|
ok( success, "VirtualProtect failed %u\n", GetLastError() );
|
|
|
|
ret = send_message_excpt( hWnd, WM_USER + 1, 0, 0 );
|
|
/* FIXME: We don't check the content of the registers EAX/ECX yet */
|
|
ok( ret == 43, "call returned wrong result, expected 43, got %d\n", ret );
|
|
ok( num_guard_page_calls == 0, "expected no STATUS_GUARD_PAGE_VIOLATION exception, got %d exceptions\n", num_guard_page_calls );
|
|
if ((dep_flags & MEM_EXECUTE_OPTION_DISABLE) && (dep_flags & MEM_EXECUTE_OPTION_DISABLE_THUNK_EMULATION))
|
|
ok( num_execute_fault_calls == 1, "expected one STATUS_ACCESS_VIOLATION exception, got %d exceptions\n", num_execute_fault_calls );
|
|
else if (dep_flags & MEM_EXECUTE_OPTION_DISABLE)
|
|
ok( num_execute_fault_calls == 0 || broken(num_execute_fault_calls == 1) /* Windows XP */,
|
|
"expected no STATUS_ACCESS_VIOLATION exception, got %d exceptions\n", num_execute_fault_calls );
|
|
else
|
|
ok( num_execute_fault_calls == 0, "expected no STATUS_ACCESS_VIOLATION exception, got %d exceptions\n", num_execute_fault_calls );
|
|
|
|
memcpy( base, code_atl5, sizeof(code_atl5) );
|
|
|
|
success = VirtualProtect( base, size, PAGE_READWRITE, &old_prot );
|
|
ok( success, "VirtualProtect failed %u\n", GetLastError() );
|
|
|
|
ret = (DWORD_PTR)atl5_test_func;
|
|
ret = call_proc_excpt( (void *)base, &ret - 1 );
|
|
/* FIXME: We don't check the content of the registers EAX/ECX yet */
|
|
ok( ret == 44, "call returned wrong result, expected 44, got %d\n", ret );
|
|
ok( num_guard_page_calls == 0, "expected no STATUS_GUARD_PAGE_VIOLATION exception, got %d exceptions\n", num_guard_page_calls );
|
|
if ((dep_flags & MEM_EXECUTE_OPTION_DISABLE) && (dep_flags & MEM_EXECUTE_OPTION_DISABLE_THUNK_EMULATION))
|
|
ok( num_execute_fault_calls == 1, "expected one STATUS_ACCESS_VIOLATION exception, got %d exceptions\n", num_execute_fault_calls );
|
|
else if (dep_flags & MEM_EXECUTE_OPTION_DISABLE)
|
|
ok( num_execute_fault_calls == 0 || broken(num_execute_fault_calls == 1) /* Windows XP */,
|
|
"expected no STATUS_ACCESS_VIOLATION exception, got %d exceptions\n", num_execute_fault_calls );
|
|
else
|
|
ok( num_execute_fault_calls == 0, "expected no STATUS_ACCESS_VIOLATION exception, got %d exceptions\n", num_execute_fault_calls );
|
|
|
|
/* Restore the JMP instruction, set to executable, and then destroy the Window */
|
|
|
|
memcpy( base, code_jmp, sizeof(code_jmp) );
|
|
*(DWORD *)(base + 1) = (DWORD_PTR)jmp_test_func - (DWORD_PTR)(base + 5);
|
|
|
|
success = VirtualProtect( base, size, PAGE_EXECUTE_READWRITE, &old_prot );
|
|
ok( success, "VirtualProtect failed %u\n", GetLastError() );
|
|
|
|
DestroyWindow( hWnd );
|
|
|
|
success = UnregisterClassA( cls_name, GetModuleHandleA(0) );
|
|
ok( success, "UnregisterClass failed %u\n", GetLastError() );
|
|
|
|
VirtualFree( base, 0, MEM_RELEASE );
|
|
|
|
/* Repeat the tests from above with MEM_WRITE_WATCH protected memory. */
|
|
|
|
base = VirtualAlloc( 0, size, MEM_RESERVE | MEM_COMMIT | MEM_WRITE_WATCH, PAGE_READWRITE );
|
|
if (!base && (GetLastError() == ERROR_INVALID_PARAMETER || GetLastError() == ERROR_NOT_SUPPORTED))
|
|
{
|
|
win_skip( "MEM_WRITE_WATCH not supported\n" );
|
|
goto out;
|
|
}
|
|
ok( base != NULL, "VirtualAlloc failed %u\n", GetLastError() );
|
|
|
|
count = 64;
|
|
ret = pGetWriteWatch( WRITE_WATCH_FLAG_RESET, base, size, results, &count, &pagesize );
|
|
ok( !ret, "GetWriteWatch failed %u\n", GetLastError() );
|
|
ok( count == 0, "wrong count %lu\n", count );
|
|
|
|
memcpy( base, code_jmp, sizeof(code_jmp) );
|
|
*(DWORD *)(base + 1) = (DWORD_PTR)jmp_test_func - (DWORD_PTR)(base + 5);
|
|
|
|
count = 64;
|
|
ret = pGetWriteWatch( WRITE_WATCH_FLAG_RESET, base, size, results, &count, &pagesize );
|
|
ok( !ret, "GetWriteWatch failed %u\n", GetLastError() );
|
|
ok( count == 1, "wrong count %lu\n", count );
|
|
ok( results[0] == base, "wrong result %p\n", results[0] );
|
|
|
|
/* Create a new window class and associated Window (see above) */
|
|
|
|
success = VirtualProtect( base, size, PAGE_EXECUTE_READWRITE, &old_prot );
|
|
ok( success, "VirtualProtect failed %u\n", GetLastError() );
|
|
|
|
memset( &wc, 0, sizeof(wc) );
|
|
wc.cbSize = sizeof(wc);
|
|
wc.style = CS_VREDRAW | CS_HREDRAW;
|
|
wc.hInstance = GetModuleHandleA( 0 );
|
|
wc.hCursor = LoadCursorA( NULL, (LPCSTR)IDC_ARROW );
|
|
wc.hbrBackground = NULL;
|
|
wc.lpszClassName = cls_name;
|
|
wc.lpfnWndProc = (WNDPROC)base;
|
|
success = RegisterClassExA(&wc) != 0;
|
|
ok( success, "RegisterClassExA failed %u\n", GetLastError() );
|
|
|
|
hWnd = CreateWindowExA(0, cls_name, "Test", WS_TILEDWINDOW, 0, 0, 640, 480, 0, 0, 0, 0);
|
|
ok( hWnd != 0, "CreateWindowExA failed %u\n", GetLastError() );
|
|
|
|
ret = SendMessageA(hWnd, WM_USER, 0, 0);
|
|
ok( ret == 42, "SendMessage returned unexpected result %d\n", ret );
|
|
|
|
count = 64;
|
|
ret = pGetWriteWatch( WRITE_WATCH_FLAG_RESET, base, size, results, &count, &pagesize );
|
|
ok( !ret, "GetWriteWatch failed %u\n", GetLastError() );
|
|
ok( count == 0, "wrong count %lu\n", count );
|
|
|
|
/* At first try with an instruction which is not recognized as proper ATL thunk
|
|
* by the Windows ATL Thunk Emulator. Removing execute permissions will lead to
|
|
* STATUS_ACCESS_VIOLATION exceptions when DEP is enabled. */
|
|
|
|
success = VirtualProtect( base, size, PAGE_READWRITE, &old_prot );
|
|
ok( success, "VirtualProtect failed %u\n", GetLastError() );
|
|
|
|
ret = send_message_excpt( hWnd, WM_USER, 0, 0 );
|
|
ok( ret == 42, "call returned wrong result, expected 42, got %d\n", ret );
|
|
ok( num_guard_page_calls == 0, "expected no STATUS_GUARD_PAGE_VIOLATION exception, got %d exceptions\n", num_guard_page_calls );
|
|
if (dep_flags & MEM_EXECUTE_OPTION_DISABLE)
|
|
ok( num_execute_fault_calls == 1, "expected one STATUS_ACCESS_VIOLATION exception, got %d exceptions\n", num_execute_fault_calls );
|
|
else
|
|
ok( num_execute_fault_calls == 0, "expected no STATUS_ACCESS_VIOLATION exception, got %d exceptions\n", num_execute_fault_calls );
|
|
|
|
count = 64;
|
|
ret = pGetWriteWatch( WRITE_WATCH_FLAG_RESET, base, size, results, &count, &pagesize );
|
|
ok( !ret, "GetWriteWatch failed %u\n", GetLastError() );
|
|
ok( count == 0, "wrong count %lu\n", count );
|
|
|
|
ret = send_message_excpt( hWnd, WM_USER, 0, 0 );
|
|
ok( ret == 42, "call returned wrong result, expected 42, got %d\n", ret );
|
|
ok( num_guard_page_calls == 0, "expected no STATUS_GUARD_PAGE_VIOLATION exception, got %d exceptions\n", num_guard_page_calls );
|
|
ok( num_execute_fault_calls == 0, "expected no STATUS_ACCESS_VIOLATION exception, got %d exceptions\n", num_execute_fault_calls );
|
|
|
|
/* Now a bit more complicated, the page containing the code is protected with
|
|
* PAGE_GUARD memory protection. */
|
|
|
|
success = VirtualProtect( base, size, PAGE_READWRITE | PAGE_GUARD, &old_prot );
|
|
ok( success, "VirtualProtect failed %u\n", GetLastError() );
|
|
|
|
ret = send_message_excpt( hWnd, WM_USER, 0, 0 );
|
|
ok( ret == 42, "call returned wrong result, expected 42, got %d\n", ret );
|
|
ok( num_guard_page_calls == 1, "expected one STATUS_GUARD_PAGE_VIOLATION exception, got %d exceptions\n", num_guard_page_calls );
|
|
if (dep_flags & MEM_EXECUTE_OPTION_DISABLE)
|
|
ok( num_execute_fault_calls == 1, "expected one STATUS_ACCESS_VIOLATION exception, got %d exceptions\n", num_execute_fault_calls );
|
|
else
|
|
ok( num_execute_fault_calls == 0, "expected no STATUS_ACCESS_VIOLATION exception, got %d exceptions\n", num_execute_fault_calls );
|
|
|
|
ret = send_message_excpt( hWnd, WM_USER, 0, 0 );
|
|
ok( ret == 42, "call returned wrong result, expected 42, got %d\n", ret );
|
|
ok( num_guard_page_calls == 0, "expected no STATUS_GUARD_PAGE_VIOLATION exception, got %d exceptions\n", num_guard_page_calls );
|
|
ok( num_execute_fault_calls == 0, "expected no STATUS_ACCESS_VIOLATION exception, got %d exceptions\n", num_execute_fault_calls );
|
|
|
|
count = 64;
|
|
ret = pGetWriteWatch( WRITE_WATCH_FLAG_RESET, base, size, results, &count, &pagesize );
|
|
ok( !ret, "GetWriteWatch failed %u\n", GetLastError() );
|
|
ok( count == 0 || broken(count == 1) /* Windows 8 */, "wrong count %lu\n", count );
|
|
|
|
/* Now test with a proper ATL thunk instruction. */
|
|
|
|
memcpy( base, code_atl1, sizeof(code_atl1) );
|
|
*(DWORD *)(base + 9) = (DWORD_PTR)atl_test_func - (DWORD_PTR)(base + 13);
|
|
|
|
count = 64;
|
|
ret = pGetWriteWatch( WRITE_WATCH_FLAG_RESET, base, size, results, &count, &pagesize );
|
|
ok( !ret, "GetWriteWatch failed %u\n", GetLastError() );
|
|
ok( count == 1, "wrong count %lu\n", count );
|
|
ok( results[0] == base, "wrong result %p\n", results[0] );
|
|
|
|
success = VirtualProtect( base, size, PAGE_EXECUTE_READWRITE, &old_prot );
|
|
ok( success, "VirtualProtect failed %u\n", GetLastError() );
|
|
|
|
ret = SendMessageA(hWnd, WM_USER, 0, 0);
|
|
ok( ret == 43, "SendMessage returned unexpected result %d\n", ret );
|
|
|
|
/* Try executing with PAGE_READWRITE protection. */
|
|
|
|
success = VirtualProtect( base, size, PAGE_READWRITE, &old_prot );
|
|
ok( success, "VirtualProtect failed %u\n", GetLastError() );
|
|
|
|
ret = send_message_excpt( hWnd, WM_USER, 0, 0 );
|
|
ok( ret == 43, "call returned wrong result, expected 43, got %d\n", ret );
|
|
ok( num_guard_page_calls == 0, "expected no STATUS_GUARD_PAGE_VIOLATION exception, got %d exceptions\n", num_guard_page_calls );
|
|
if ((dep_flags & MEM_EXECUTE_OPTION_DISABLE) && (dep_flags & MEM_EXECUTE_OPTION_DISABLE_THUNK_EMULATION))
|
|
ok( num_execute_fault_calls == 1, "expected one STATUS_ACCESS_VIOLATION exception, got %d exceptions\n", num_execute_fault_calls );
|
|
else
|
|
ok( num_execute_fault_calls == 0, "expected no STATUS_ACCESS_VIOLATION exception, got %d exceptions\n", num_execute_fault_calls );
|
|
|
|
count = 64;
|
|
ret = pGetWriteWatch( WRITE_WATCH_FLAG_RESET, base, size, results, &count, &pagesize );
|
|
ok( !ret, "GetWriteWatch failed %u\n", GetLastError() );
|
|
ok( count == 0, "wrong count %lu\n", count );
|
|
|
|
ret = send_message_excpt( hWnd, WM_USER, 0, 0 );
|
|
ok( ret == 43, "call returned wrong result, expected 43, got %d\n", ret );
|
|
ok( num_guard_page_calls == 0, "expected no STATUS_GUARD_PAGE_VIOLATION exception, got %d exceptions\n", num_guard_page_calls );
|
|
if ((dep_flags & MEM_EXECUTE_OPTION_DISABLE) && (dep_flags & MEM_EXECUTE_OPTION_DISABLE_THUNK_EMULATION))
|
|
ok( num_execute_fault_calls == 0, "expected no STATUS_ACCESS_VIOLATION exception, got %d exceptions\n", num_execute_fault_calls );
|
|
else
|
|
ok( num_execute_fault_calls == 0, "expected no STATUS_ACCESS_VIOLATION exception, got %d exceptions\n", num_execute_fault_calls );
|
|
|
|
/* Now a bit more complicated, the page containing the code is protected with
|
|
* PAGE_GUARD memory protection. */
|
|
|
|
success = VirtualProtect( base, size, PAGE_READWRITE | PAGE_GUARD, &old_prot );
|
|
ok( success, "VirtualProtect failed %u\n", GetLastError() );
|
|
|
|
/* the same, but with PAGE_GUARD set */
|
|
ret = send_message_excpt( hWnd, WM_USER, 0, 0 );
|
|
ok( ret == 43, "call returned wrong result, expected 43, got %d\n", ret );
|
|
ok( num_guard_page_calls == 1, "expected one STATUS_GUARD_PAGE_VIOLATION exception, got %d exceptions\n", num_guard_page_calls );
|
|
if ((dep_flags & MEM_EXECUTE_OPTION_DISABLE) && (dep_flags & MEM_EXECUTE_OPTION_DISABLE_THUNK_EMULATION))
|
|
ok( num_execute_fault_calls == 1, "expected one STATUS_ACCESS_VIOLATION exception, got %d exceptions\n", num_execute_fault_calls );
|
|
else
|
|
ok( num_execute_fault_calls == 0, "expected no STATUS_ACCESS_VIOLATION exception, got %d exceptions\n", num_execute_fault_calls );
|
|
|
|
ret = send_message_excpt( hWnd, WM_USER, 0, 0 );
|
|
ok( ret == 43, "call returned wrong result, expected 43, got %d\n", ret );
|
|
ok( num_guard_page_calls == 0, "expected no STATUS_GUARD_PAGE_VIOLATION exception, got %d exceptions\n", num_guard_page_calls );
|
|
ok( num_execute_fault_calls == 0, "expected no STATUS_ACCESS_VIOLATION exception, got %d exceptions\n", num_execute_fault_calls );
|
|
|
|
count = 64;
|
|
ret = pGetWriteWatch( WRITE_WATCH_FLAG_RESET, base, size, results, &count, &pagesize );
|
|
ok( !ret, "GetWriteWatch failed %u\n", GetLastError() );
|
|
ok( count == 0 || broken(count == 1) /* Windows 8 */, "wrong count %lu\n", count );
|
|
|
|
/* Restore the JMP instruction, set to executable, and then destroy the Window */
|
|
|
|
memcpy( base, code_jmp, sizeof(code_jmp) );
|
|
*(DWORD *)(base + 1) = (DWORD_PTR)jmp_test_func - (DWORD_PTR)(base + 5);
|
|
|
|
count = 64;
|
|
ret = pGetWriteWatch( WRITE_WATCH_FLAG_RESET, base, size, results, &count, &pagesize );
|
|
ok( !ret, "GetWriteWatch failed %u\n", GetLastError() );
|
|
ok( count == 1, "wrong count %lu\n", count );
|
|
ok( results[0] == base, "wrong result %p\n", results[0] );
|
|
|
|
success = VirtualProtect( base, size, PAGE_EXECUTE_READWRITE, &old_prot );
|
|
ok( success, "VirtualProtect failed %u\n", GetLastError() );
|
|
|
|
DestroyWindow( hWnd );
|
|
|
|
success = UnregisterClassA( cls_name, GetModuleHandleA(0) );
|
|
ok( success, "UnregisterClass failed %u\n", GetLastError() );
|
|
|
|
VirtualFree( base, 0, MEM_RELEASE );
|
|
|
|
out:
|
|
if (restore_flags)
|
|
{
|
|
ret = NtSetInformationProcess( GetCurrentProcess(), ProcessExecuteFlags, &old_flags, sizeof(old_flags) );
|
|
ok( !ret, "NtSetInformationProcess failed with status %08x\n", ret );
|
|
}
|
|
}
|
|
|
|
#endif /* __i386__ */
|
|
|
|
static void test_VirtualProtect(void)
|
|
{
|
|
static const struct test_data
|
|
{
|
|
DWORD prot_set, prot_get;
|
|
} td[] =
|
|
{
|
|
{ 0, 0 }, /* 0x00 */
|
|
{ PAGE_NOACCESS, PAGE_NOACCESS }, /* 0x01 */
|
|
{ PAGE_READONLY, PAGE_READONLY }, /* 0x02 */
|
|
{ PAGE_READONLY | PAGE_NOACCESS, 0 }, /* 0x03 */
|
|
{ PAGE_READWRITE, PAGE_READWRITE }, /* 0x04 */
|
|
{ PAGE_READWRITE | PAGE_NOACCESS, 0 }, /* 0x05 */
|
|
{ PAGE_READWRITE | PAGE_READONLY, 0 }, /* 0x06 */
|
|
{ PAGE_READWRITE | PAGE_READONLY | PAGE_NOACCESS, 0 }, /* 0x07 */
|
|
{ PAGE_WRITECOPY, 0 }, /* 0x08 */
|
|
{ PAGE_WRITECOPY | PAGE_NOACCESS, 0 }, /* 0x09 */
|
|
{ PAGE_WRITECOPY | PAGE_READONLY, 0 }, /* 0x0a */
|
|
{ PAGE_WRITECOPY | PAGE_NOACCESS | PAGE_READONLY, 0 }, /* 0x0b */
|
|
{ PAGE_WRITECOPY | PAGE_READWRITE, 0 }, /* 0x0c */
|
|
{ PAGE_WRITECOPY | PAGE_READWRITE | PAGE_NOACCESS, 0 }, /* 0x0d */
|
|
{ PAGE_WRITECOPY | PAGE_READWRITE | PAGE_READONLY, 0 }, /* 0x0e */
|
|
{ PAGE_WRITECOPY | PAGE_READWRITE | PAGE_READONLY | PAGE_NOACCESS, 0 }, /* 0x0f */
|
|
|
|
{ PAGE_EXECUTE, PAGE_EXECUTE }, /* 0x10 */
|
|
{ PAGE_EXECUTE_READ, PAGE_EXECUTE_READ }, /* 0x20 */
|
|
{ PAGE_EXECUTE_READ | PAGE_EXECUTE, 0 }, /* 0x30 */
|
|
{ PAGE_EXECUTE_READWRITE, PAGE_EXECUTE_READWRITE }, /* 0x40 */
|
|
{ PAGE_EXECUTE_READWRITE | PAGE_EXECUTE, 0 }, /* 0x50 */
|
|
{ PAGE_EXECUTE_READWRITE | PAGE_EXECUTE_READ, 0 }, /* 0x60 */
|
|
{ PAGE_EXECUTE_READWRITE | PAGE_EXECUTE_READ | PAGE_EXECUTE, 0 }, /* 0x70 */
|
|
{ PAGE_EXECUTE_WRITECOPY, 0 }, /* 0x80 */
|
|
{ PAGE_EXECUTE_WRITECOPY | PAGE_EXECUTE, 0 }, /* 0x90 */
|
|
{ PAGE_EXECUTE_WRITECOPY | PAGE_EXECUTE_READ, 0 }, /* 0xa0 */
|
|
{ PAGE_EXECUTE_WRITECOPY | PAGE_EXECUTE_READ | PAGE_EXECUTE, 0 }, /* 0xb0 */
|
|
{ PAGE_EXECUTE_WRITECOPY | PAGE_EXECUTE_READWRITE, 0 }, /* 0xc0 */
|
|
{ PAGE_EXECUTE_WRITECOPY | PAGE_EXECUTE_READWRITE | PAGE_EXECUTE, 0 }, /* 0xd0 */
|
|
{ PAGE_EXECUTE_WRITECOPY | PAGE_EXECUTE_READWRITE | PAGE_EXECUTE_READ, 0 }, /* 0xe0 */
|
|
{ PAGE_EXECUTE_WRITECOPY | PAGE_EXECUTE_READWRITE | PAGE_EXECUTE_READ | PAGE_EXECUTE, 0 } /* 0xf0 */
|
|
};
|
|
char *base, *ptr;
|
|
DWORD ret, old_prot, rw_prot, exec_prot, i, j;
|
|
MEMORY_BASIC_INFORMATION info;
|
|
SYSTEM_INFO si;
|
|
void *addr;
|
|
SIZE_T size;
|
|
NTSTATUS status;
|
|
|
|
GetSystemInfo(&si);
|
|
trace("system page size %#x\n", si.dwPageSize);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
base = VirtualAlloc(0, si.dwPageSize, MEM_RESERVE | MEM_COMMIT, PAGE_NOACCESS);
|
|
ok(base != NULL, "VirtualAlloc failed %d\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ret = VirtualProtect(base, si.dwPageSize, PAGE_READONLY, NULL);
|
|
ok(!ret, "VirtualProtect should fail\n");
|
|
ok(GetLastError() == ERROR_NOACCESS, "expected ERROR_NOACCESS, got %d\n", GetLastError());
|
|
old_prot = 0xdeadbeef;
|
|
ret = VirtualProtect(base, si.dwPageSize, PAGE_NOACCESS, &old_prot);
|
|
ok(ret, "VirtualProtect failed %d\n", GetLastError());
|
|
ok(old_prot == PAGE_NOACCESS, "got %#x != expected PAGE_NOACCESS\n", old_prot);
|
|
|
|
addr = base;
|
|
size = si.dwPageSize;
|
|
status = pNtProtectVirtualMemory(GetCurrentProcess(), &addr, &size, PAGE_READONLY, NULL);
|
|
ok(status == STATUS_ACCESS_VIOLATION, "NtProtectVirtualMemory should fail, got %08x\n", status);
|
|
addr = base;
|
|
size = si.dwPageSize;
|
|
old_prot = 0xdeadbeef;
|
|
status = pNtProtectVirtualMemory(GetCurrentProcess(), &addr, &size, PAGE_NOACCESS, &old_prot);
|
|
ok(status == STATUS_SUCCESS, "NtProtectVirtualMemory should succeed, got %08x\n", status);
|
|
ok(old_prot == PAGE_NOACCESS, "got %#x != expected PAGE_NOACCESS\n", old_prot);
|
|
|
|
for (i = 0; i < sizeof(td)/sizeof(td[0]); i++)
|
|
{
|
|
SetLastError(0xdeadbeef);
|
|
ret = VirtualQuery(base, &info, sizeof(info));
|
|
ok(ret, "VirtualQuery failed %d\n", GetLastError());
|
|
ok(info.BaseAddress == base, "%d: got %p != expected %p\n", i, info.BaseAddress, base);
|
|
ok(info.RegionSize == si.dwPageSize, "%d: got %#lx != expected %#x\n", i, info.RegionSize, si.dwPageSize);
|
|
ok(info.Protect == PAGE_NOACCESS, "%d: got %#x != expected PAGE_NOACCESS\n", i, info.Protect);
|
|
ok(info.AllocationBase == base, "%d: %p != %p\n", i, info.AllocationBase, base);
|
|
ok(info.AllocationProtect == PAGE_NOACCESS, "%d: %#x != PAGE_NOACCESS\n", i, info.AllocationProtect);
|
|
ok(info.State == MEM_COMMIT, "%d: %#x != MEM_COMMIT\n", i, info.State);
|
|
ok(info.Type == MEM_PRIVATE, "%d: %#x != MEM_PRIVATE\n", i, info.Type);
|
|
|
|
old_prot = 0xdeadbeef;
|
|
SetLastError(0xdeadbeef);
|
|
ret = VirtualProtect(base, si.dwPageSize, td[i].prot_set, &old_prot);
|
|
if (td[i].prot_get)
|
|
{
|
|
ok(ret, "%d: VirtualProtect error %d\n", i, GetLastError());
|
|
ok(old_prot == PAGE_NOACCESS, "%d: got %#x != expected PAGE_NOACCESS\n", i, old_prot);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ret = VirtualQuery(base, &info, sizeof(info));
|
|
ok(ret, "VirtualQuery failed %d\n", GetLastError());
|
|
ok(info.BaseAddress == base, "%d: got %p != expected %p\n", i, info.BaseAddress, base);
|
|
ok(info.RegionSize == si.dwPageSize, "%d: got %#lx != expected %#x\n", i, info.RegionSize, si.dwPageSize);
|
|
ok(info.Protect == td[i].prot_get, "%d: got %#x != expected %#x\n", i, info.Protect, td[i].prot_get);
|
|
ok(info.AllocationBase == base, "%d: %p != %p\n", i, info.AllocationBase, base);
|
|
ok(info.AllocationProtect == PAGE_NOACCESS, "%d: %#x != PAGE_NOACCESS\n", i, info.AllocationProtect);
|
|
ok(info.State == MEM_COMMIT, "%d: %#x != MEM_COMMIT\n", i, info.State);
|
|
ok(info.Type == MEM_PRIVATE, "%d: %#x != MEM_PRIVATE\n", i, info.Type);
|
|
}
|
|
else
|
|
{
|
|
ok(!ret, "%d: VirtualProtect should fail\n", i);
|
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "%d: expected ERROR_INVALID_PARAMETER, got %d\n", i, GetLastError());
|
|
}
|
|
|
|
old_prot = 0xdeadbeef;
|
|
SetLastError(0xdeadbeef);
|
|
ret = VirtualProtect(base, si.dwPageSize, PAGE_NOACCESS, &old_prot);
|
|
ok(ret, "%d: VirtualProtect error %d\n", i, GetLastError());
|
|
if (td[i].prot_get)
|
|
ok(old_prot == td[i].prot_get, "%d: got %#x != expected %#x\n", i, old_prot, td[i].prot_get);
|
|
else
|
|
ok(old_prot == PAGE_NOACCESS, "%d: got %#x != expected PAGE_NOACCESS\n", i, old_prot);
|
|
}
|
|
|
|
exec_prot = 0;
|
|
|
|
for (i = 0; i <= 4; i++)
|
|
{
|
|
rw_prot = 0;
|
|
|
|
for (j = 0; j <= 4; j++)
|
|
{
|
|
DWORD prot = exec_prot | rw_prot;
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ptr = VirtualAlloc(base, si.dwPageSize, MEM_COMMIT, prot);
|
|
if ((rw_prot && exec_prot) || (!rw_prot && !exec_prot))
|
|
{
|
|
ok(!ptr, "VirtualAlloc(%02x) should fail\n", prot);
|
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError());
|
|
}
|
|
else
|
|
{
|
|
if (prot & (PAGE_WRITECOPY | PAGE_EXECUTE_WRITECOPY))
|
|
{
|
|
ok(!ptr, "VirtualAlloc(%02x) should fail\n", prot);
|
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError());
|
|
}
|
|
else
|
|
{
|
|
ok(ptr != NULL, "VirtualAlloc(%02x) error %d\n", prot, GetLastError());
|
|
ok(ptr == base, "expected %p, got %p\n", base, ptr);
|
|
}
|
|
}
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ret = VirtualProtect(base, si.dwPageSize, prot, &old_prot);
|
|
if ((rw_prot && exec_prot) || (!rw_prot && !exec_prot))
|
|
{
|
|
ok(!ret, "VirtualProtect(%02x) should fail\n", prot);
|
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError());
|
|
}
|
|
else
|
|
{
|
|
if (prot & (PAGE_WRITECOPY | PAGE_EXECUTE_WRITECOPY))
|
|
{
|
|
ok(!ret, "VirtualProtect(%02x) should fail\n", prot);
|
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError());
|
|
}
|
|
else
|
|
ok(ret, "VirtualProtect(%02x) error %d\n", prot, GetLastError());
|
|
}
|
|
|
|
rw_prot = 1 << j;
|
|
}
|
|
|
|
exec_prot = 1 << (i + 4);
|
|
}
|
|
|
|
VirtualFree(base, 0, MEM_RELEASE);
|
|
}
|
|
|
|
static BOOL is_mem_writable(DWORD prot)
|
|
{
|
|
switch (prot & 0xff)
|
|
{
|
|
case PAGE_READWRITE:
|
|
case PAGE_WRITECOPY:
|
|
case PAGE_EXECUTE_READWRITE:
|
|
case PAGE_EXECUTE_WRITECOPY:
|
|
return TRUE;
|
|
|
|
default:
|
|
return FALSE;
|
|
}
|
|
}
|
|
|
|
static void test_VirtualAlloc_protection(void)
|
|
{
|
|
static const struct test_data
|
|
{
|
|
DWORD prot;
|
|
BOOL success;
|
|
} td[] =
|
|
{
|
|
{ 0, FALSE }, /* 0x00 */
|
|
{ PAGE_NOACCESS, TRUE }, /* 0x01 */
|
|
{ PAGE_READONLY, TRUE }, /* 0x02 */
|
|
{ PAGE_READONLY | PAGE_NOACCESS, FALSE }, /* 0x03 */
|
|
{ PAGE_READWRITE, TRUE }, /* 0x04 */
|
|
{ PAGE_READWRITE | PAGE_NOACCESS, FALSE }, /* 0x05 */
|
|
{ PAGE_READWRITE | PAGE_READONLY, FALSE }, /* 0x06 */
|
|
{ PAGE_READWRITE | PAGE_READONLY | PAGE_NOACCESS, FALSE }, /* 0x07 */
|
|
{ PAGE_WRITECOPY, FALSE }, /* 0x08 */
|
|
{ PAGE_WRITECOPY | PAGE_NOACCESS, FALSE }, /* 0x09 */
|
|
{ PAGE_WRITECOPY | PAGE_READONLY, FALSE }, /* 0x0a */
|
|
{ PAGE_WRITECOPY | PAGE_NOACCESS | PAGE_READONLY, FALSE }, /* 0x0b */
|
|
{ PAGE_WRITECOPY | PAGE_READWRITE, FALSE }, /* 0x0c */
|
|
{ PAGE_WRITECOPY | PAGE_READWRITE | PAGE_NOACCESS, FALSE }, /* 0x0d */
|
|
{ PAGE_WRITECOPY | PAGE_READWRITE | PAGE_READONLY, FALSE }, /* 0x0e */
|
|
{ PAGE_WRITECOPY | PAGE_READWRITE | PAGE_READONLY | PAGE_NOACCESS, FALSE }, /* 0x0f */
|
|
|
|
{ PAGE_EXECUTE, TRUE }, /* 0x10 */
|
|
{ PAGE_EXECUTE_READ, TRUE }, /* 0x20 */
|
|
{ PAGE_EXECUTE_READ | PAGE_EXECUTE, FALSE }, /* 0x30 */
|
|
{ PAGE_EXECUTE_READWRITE, TRUE }, /* 0x40 */
|
|
{ PAGE_EXECUTE_READWRITE | PAGE_EXECUTE, FALSE }, /* 0x50 */
|
|
{ PAGE_EXECUTE_READWRITE | PAGE_EXECUTE_READ, FALSE }, /* 0x60 */
|
|
{ PAGE_EXECUTE_READWRITE | PAGE_EXECUTE_READ | PAGE_EXECUTE, FALSE }, /* 0x70 */
|
|
{ PAGE_EXECUTE_WRITECOPY, FALSE }, /* 0x80 */
|
|
{ PAGE_EXECUTE_WRITECOPY | PAGE_EXECUTE, FALSE }, /* 0x90 */
|
|
{ PAGE_EXECUTE_WRITECOPY | PAGE_EXECUTE_READ, FALSE }, /* 0xa0 */
|
|
{ PAGE_EXECUTE_WRITECOPY | PAGE_EXECUTE_READ | PAGE_EXECUTE, FALSE }, /* 0xb0 */
|
|
{ PAGE_EXECUTE_WRITECOPY | PAGE_EXECUTE_READWRITE, FALSE }, /* 0xc0 */
|
|
{ PAGE_EXECUTE_WRITECOPY | PAGE_EXECUTE_READWRITE | PAGE_EXECUTE, FALSE }, /* 0xd0 */
|
|
{ PAGE_EXECUTE_WRITECOPY | PAGE_EXECUTE_READWRITE | PAGE_EXECUTE_READ, FALSE }, /* 0xe0 */
|
|
{ PAGE_EXECUTE_WRITECOPY | PAGE_EXECUTE_READWRITE | PAGE_EXECUTE_READ | PAGE_EXECUTE, FALSE } /* 0xf0 */
|
|
};
|
|
char *base, *ptr;
|
|
DWORD ret, i;
|
|
MEMORY_BASIC_INFORMATION info;
|
|
SYSTEM_INFO si;
|
|
|
|
GetSystemInfo(&si);
|
|
trace("system page size %#x\n", si.dwPageSize);
|
|
|
|
for (i = 0; i < sizeof(td)/sizeof(td[0]); i++)
|
|
{
|
|
SetLastError(0xdeadbeef);
|
|
base = VirtualAlloc(0, si.dwPageSize, MEM_COMMIT, td[i].prot);
|
|
|
|
if (td[i].success)
|
|
{
|
|
ok(base != NULL, "%d: VirtualAlloc failed %d\n", i, GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ret = VirtualQuery(base, &info, sizeof(info));
|
|
ok(ret, "VirtualQuery failed %d\n", GetLastError());
|
|
ok(info.BaseAddress == base, "%d: got %p != expected %p\n", i, info.BaseAddress, base);
|
|
ok(info.RegionSize == si.dwPageSize, "%d: got %#lx != expected %#x\n", i, info.RegionSize, si.dwPageSize);
|
|
ok(info.Protect == td[i].prot, "%d: got %#x != expected %#x\n", i, info.Protect, td[i].prot);
|
|
ok(info.AllocationBase == base, "%d: %p != %p\n", i, info.AllocationBase, base);
|
|
ok(info.AllocationProtect == td[i].prot, "%d: %#x != %#x\n", i, info.AllocationProtect, td[i].prot);
|
|
ok(info.State == MEM_COMMIT, "%d: %#x != MEM_COMMIT\n", i, info.State);
|
|
ok(info.Type == MEM_PRIVATE, "%d: %#x != MEM_PRIVATE\n", i, info.Type);
|
|
|
|
if (is_mem_writable(info.Protect))
|
|
{
|
|
base[0] = 0xfe;
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ret = VirtualQuery(base, &info, sizeof(info));
|
|
ok(ret, "VirtualQuery failed %d\n", GetLastError());
|
|
ok(info.Protect == td[i].prot, "%d: got %#x != expected %#x\n", i, info.Protect, td[i].prot);
|
|
}
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ptr = VirtualAlloc(base, si.dwPageSize, MEM_COMMIT, td[i].prot);
|
|
ok(ptr == base, "%d: VirtualAlloc failed %d\n", i, GetLastError());
|
|
|
|
VirtualFree(base, 0, MEM_RELEASE);
|
|
}
|
|
else
|
|
{
|
|
ok(!base, "%d: VirtualAlloc should fail\n", i);
|
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "%d: expected ERROR_INVALID_PARAMETER, got %d\n", i, GetLastError());
|
|
}
|
|
}
|
|
}
|
|
|
|
static void test_CreateFileMapping_protection(void)
|
|
{
|
|
static const struct test_data
|
|
{
|
|
DWORD prot;
|
|
BOOL success;
|
|
DWORD prot_after_write;
|
|
} td[] =
|
|
{
|
|
{ 0, FALSE, 0 }, /* 0x00 */
|
|
{ PAGE_NOACCESS, FALSE, PAGE_NOACCESS }, /* 0x01 */
|
|
{ PAGE_READONLY, TRUE, PAGE_READONLY }, /* 0x02 */
|
|
{ PAGE_READONLY | PAGE_NOACCESS, FALSE, PAGE_NOACCESS }, /* 0x03 */
|
|
{ PAGE_READWRITE, TRUE, PAGE_READWRITE }, /* 0x04 */
|
|
{ PAGE_READWRITE | PAGE_NOACCESS, FALSE, PAGE_NOACCESS }, /* 0x05 */
|
|
{ PAGE_READWRITE | PAGE_READONLY, FALSE, PAGE_NOACCESS }, /* 0x06 */
|
|
{ PAGE_READWRITE | PAGE_READONLY | PAGE_NOACCESS, FALSE, PAGE_NOACCESS }, /* 0x07 */
|
|
{ PAGE_WRITECOPY, TRUE, PAGE_READWRITE }, /* 0x08 */
|
|
{ PAGE_WRITECOPY | PAGE_NOACCESS, FALSE, PAGE_NOACCESS }, /* 0x09 */
|
|
{ PAGE_WRITECOPY | PAGE_READONLY, FALSE, PAGE_NOACCESS }, /* 0x0a */
|
|
{ PAGE_WRITECOPY | PAGE_NOACCESS | PAGE_READONLY, FALSE, PAGE_NOACCESS }, /* 0x0b */
|
|
{ PAGE_WRITECOPY | PAGE_READWRITE, FALSE, PAGE_NOACCESS }, /* 0x0c */
|
|
{ PAGE_WRITECOPY | PAGE_READWRITE | PAGE_NOACCESS, FALSE, PAGE_NOACCESS }, /* 0x0d */
|
|
{ PAGE_WRITECOPY | PAGE_READWRITE | PAGE_READONLY, FALSE, PAGE_NOACCESS }, /* 0x0e */
|
|
{ PAGE_WRITECOPY | PAGE_READWRITE | PAGE_READONLY | PAGE_NOACCESS, FALSE, PAGE_NOACCESS }, /* 0x0f */
|
|
|
|
{ PAGE_EXECUTE, FALSE, PAGE_EXECUTE }, /* 0x10 */
|
|
{ PAGE_EXECUTE_READ, TRUE, PAGE_EXECUTE_READ }, /* 0x20 */
|
|
{ PAGE_EXECUTE_READ | PAGE_EXECUTE, FALSE, PAGE_EXECUTE_READ }, /* 0x30 */
|
|
{ PAGE_EXECUTE_READWRITE, TRUE, PAGE_EXECUTE_READWRITE }, /* 0x40 */
|
|
{ PAGE_EXECUTE_READWRITE | PAGE_EXECUTE, FALSE, PAGE_NOACCESS }, /* 0x50 */
|
|
{ PAGE_EXECUTE_READWRITE | PAGE_EXECUTE_READ, FALSE, PAGE_NOACCESS }, /* 0x60 */
|
|
{ PAGE_EXECUTE_READWRITE | PAGE_EXECUTE_READ | PAGE_EXECUTE, FALSE, PAGE_NOACCESS }, /* 0x70 */
|
|
{ PAGE_EXECUTE_WRITECOPY, TRUE, PAGE_EXECUTE_READWRITE }, /* 0x80 */
|
|
{ PAGE_EXECUTE_WRITECOPY | PAGE_EXECUTE, FALSE, PAGE_NOACCESS }, /* 0x90 */
|
|
{ PAGE_EXECUTE_WRITECOPY | PAGE_EXECUTE_READ, FALSE, PAGE_NOACCESS }, /* 0xa0 */
|
|
{ PAGE_EXECUTE_WRITECOPY | PAGE_EXECUTE_READ | PAGE_EXECUTE, FALSE, PAGE_NOACCESS }, /* 0xb0 */
|
|
{ PAGE_EXECUTE_WRITECOPY | PAGE_EXECUTE_READWRITE, FALSE, PAGE_NOACCESS }, /* 0xc0 */
|
|
{ PAGE_EXECUTE_WRITECOPY | PAGE_EXECUTE_READWRITE | PAGE_EXECUTE, FALSE, PAGE_NOACCESS }, /* 0xd0 */
|
|
{ PAGE_EXECUTE_WRITECOPY | PAGE_EXECUTE_READWRITE | PAGE_EXECUTE_READ, FALSE, PAGE_NOACCESS }, /* 0xe0 */
|
|
{ PAGE_EXECUTE_WRITECOPY | PAGE_EXECUTE_READWRITE | PAGE_EXECUTE_READ | PAGE_EXECUTE, FALSE, PAGE_NOACCESS } /* 0xf0 */
|
|
};
|
|
char *base, *ptr;
|
|
DWORD ret, i, alloc_prot, prot, old_prot;
|
|
MEMORY_BASIC_INFORMATION info;
|
|
SYSTEM_INFO si;
|
|
char temp_path[MAX_PATH];
|
|
char file_name[MAX_PATH];
|
|
HANDLE hfile, hmap;
|
|
BOOL page_exec_supported = TRUE;
|
|
|
|
GetSystemInfo(&si);
|
|
trace("system page size %#x\n", si.dwPageSize);
|
|
|
|
GetTempPathA(MAX_PATH, temp_path);
|
|
GetTempFileNameA(temp_path, "map", 0, file_name);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
hfile = CreateFileA(file_name, GENERIC_READ|GENERIC_WRITE|GENERIC_EXECUTE, 0, NULL, CREATE_ALWAYS, 0, 0);
|
|
ok(hfile != INVALID_HANDLE_VALUE, "CreateFile(%s) error %d\n", file_name, GetLastError());
|
|
SetFilePointer(hfile, si.dwPageSize, NULL, FILE_BEGIN);
|
|
SetEndOfFile(hfile);
|
|
|
|
for (i = 0; i < sizeof(td)/sizeof(td[0]); i++)
|
|
{
|
|
SetLastError(0xdeadbeef);
|
|
hmap = CreateFileMappingW(hfile, NULL, td[i].prot | SEC_COMMIT, 0, si.dwPageSize, NULL);
|
|
|
|
if (td[i].success)
|
|
{
|
|
if (!hmap)
|
|
{
|
|
trace("%d: CreateFileMapping(%04x) failed: %d\n", i, td[i].prot, GetLastError());
|
|
/* NT4 and win2k don't support EXEC on file mappings */
|
|
if (td[i].prot == PAGE_EXECUTE_READ || td[i].prot == PAGE_EXECUTE_READWRITE)
|
|
{
|
|
page_exec_supported = FALSE;
|
|
ok(broken(!hmap), "%d: CreateFileMapping doesn't support PAGE_EXECUTE\n", i);
|
|
continue;
|
|
}
|
|
/* Vista+ supports PAGE_EXECUTE_WRITECOPY, earlier versions don't */
|
|
if (td[i].prot == PAGE_EXECUTE_WRITECOPY)
|
|
{
|
|
page_exec_supported = FALSE;
|
|
ok(broken(!hmap), "%d: CreateFileMapping doesn't support PAGE_EXECUTE_WRITECOPY\n", i);
|
|
continue;
|
|
}
|
|
}
|
|
ok(hmap != 0, "%d: CreateFileMapping(%04x) error %d\n", i, td[i].prot, GetLastError());
|
|
|
|
base = MapViewOfFile(hmap, FILE_MAP_READ, 0, 0, 0);
|
|
ok(base != NULL, "%d: MapViewOfFile failed %d\n", i, GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ret = VirtualQuery(base, &info, sizeof(info));
|
|
ok(ret, "VirtualQuery failed %d\n", GetLastError());
|
|
ok(info.BaseAddress == base, "%d: got %p != expected %p\n", i, info.BaseAddress, base);
|
|
ok(info.RegionSize == si.dwPageSize, "%d: got %#lx != expected %#x\n", i, info.RegionSize, si.dwPageSize);
|
|
ok(info.Protect == PAGE_READONLY, "%d: got %#x != expected PAGE_READONLY\n", i, info.Protect);
|
|
ok(info.AllocationBase == base, "%d: %p != %p\n", i, info.AllocationBase, base);
|
|
ok(info.AllocationProtect == PAGE_READONLY, "%d: %#x != PAGE_READONLY\n", i, info.AllocationProtect);
|
|
ok(info.State == MEM_COMMIT, "%d: %#x != MEM_COMMIT\n", i, info.State);
|
|
ok(info.Type == MEM_MAPPED, "%d: %#x != MEM_MAPPED\n", i, info.Type);
|
|
|
|
if (is_mem_writable(info.Protect))
|
|
{
|
|
base[0] = 0xfe;
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ret = VirtualQuery(base, &info, sizeof(info));
|
|
ok(ret, "VirtualQuery failed %d\n", GetLastError());
|
|
ok(info.Protect == td[i].prot, "%d: got %#x != expected %#x\n", i, info.Protect, td[i].prot);
|
|
}
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ptr = VirtualAlloc(base, si.dwPageSize, MEM_COMMIT, td[i].prot);
|
|
ok(!ptr, "%d: VirtualAlloc(%02x) should fail\n", i, td[i].prot);
|
|
/* FIXME: remove once Wine is fixed */
|
|
todo_wine_if (td[i].prot == PAGE_WRITECOPY || td[i].prot == PAGE_EXECUTE_WRITECOPY)
|
|
ok(GetLastError() == ERROR_ACCESS_DENIED, "%d: expected ERROR_ACCESS_DENIED, got %d\n", i, GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ret = VirtualProtect(base, si.dwPageSize, td[i].prot, &old_prot);
|
|
if (td[i].prot == PAGE_READONLY || td[i].prot == PAGE_WRITECOPY)
|
|
ok(ret, "%d: VirtualProtect(%02x) error %d\n", i, td[i].prot, GetLastError());
|
|
else
|
|
{
|
|
ok(!ret, "%d: VirtualProtect(%02x) should fail\n", i, td[i].prot);
|
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "%d: expected ERROR_INVALID_PARAMETER, got %d\n", i, GetLastError());
|
|
}
|
|
|
|
UnmapViewOfFile(base);
|
|
CloseHandle(hmap);
|
|
}
|
|
else
|
|
{
|
|
ok(!hmap, "%d: CreateFileMapping should fail\n", i);
|
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "%d: expected ERROR_INVALID_PARAMETER, got %d\n", i, GetLastError());
|
|
}
|
|
}
|
|
|
|
if (page_exec_supported) alloc_prot = PAGE_EXECUTE_READWRITE;
|
|
else alloc_prot = PAGE_READWRITE;
|
|
SetLastError(0xdeadbeef);
|
|
hmap = CreateFileMappingW(hfile, NULL, alloc_prot, 0, si.dwPageSize, NULL);
|
|
ok(hmap != 0, "%d: CreateFileMapping error %d\n", i, GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
base = MapViewOfFile(hmap, FILE_MAP_READ | FILE_MAP_WRITE | (page_exec_supported ? FILE_MAP_EXECUTE : 0), 0, 0, 0);
|
|
ok(base != NULL, "MapViewOfFile failed %d\n", GetLastError());
|
|
|
|
old_prot = 0xdeadbeef;
|
|
SetLastError(0xdeadbeef);
|
|
ret = VirtualProtect(base, si.dwPageSize, PAGE_NOACCESS, &old_prot);
|
|
ok(ret, "VirtualProtect error %d\n", GetLastError());
|
|
ok(old_prot == alloc_prot, "got %#x != expected %#x\n", old_prot, alloc_prot);
|
|
|
|
for (i = 0; i < sizeof(td)/sizeof(td[0]); i++)
|
|
{
|
|
SetLastError(0xdeadbeef);
|
|
ret = VirtualQuery(base, &info, sizeof(info));
|
|
ok(ret, "VirtualQuery failed %d\n", GetLastError());
|
|
ok(info.BaseAddress == base, "%d: got %p != expected %p\n", i, info.BaseAddress, base);
|
|
ok(info.RegionSize == si.dwPageSize, "%d: got %#lx != expected %#x\n", i, info.RegionSize, si.dwPageSize);
|
|
ok(info.Protect == PAGE_NOACCESS, "%d: got %#x != expected PAGE_NOACCESS\n", i, info.Protect);
|
|
ok(info.AllocationBase == base, "%d: %p != %p\n", i, info.AllocationBase, base);
|
|
ok(info.AllocationProtect == alloc_prot, "%d: %#x != %#x\n", i, info.AllocationProtect, alloc_prot);
|
|
ok(info.State == MEM_COMMIT, "%d: %#x != MEM_COMMIT\n", i, info.State);
|
|
ok(info.Type == MEM_MAPPED, "%d: %#x != MEM_MAPPED\n", i, info.Type);
|
|
|
|
old_prot = 0xdeadbeef;
|
|
SetLastError(0xdeadbeef);
|
|
ret = VirtualProtect(base, si.dwPageSize, td[i].prot, &old_prot);
|
|
if (td[i].success || td[i].prot == PAGE_NOACCESS || td[i].prot == PAGE_EXECUTE)
|
|
{
|
|
if (!ret)
|
|
{
|
|
/* win2k and XP don't support EXEC on file mappings */
|
|
if (td[i].prot == PAGE_EXECUTE)
|
|
{
|
|
ok(broken(!ret), "%d: VirtualProtect doesn't support PAGE_EXECUTE\n", i);
|
|
continue;
|
|
}
|
|
/* NT4 and win2k don't support EXEC on file mappings */
|
|
if (td[i].prot == PAGE_EXECUTE_READ || td[i].prot == PAGE_EXECUTE_READWRITE)
|
|
{
|
|
ok(broken(!ret), "%d: VirtualProtect doesn't support PAGE_EXECUTE\n", i);
|
|
continue;
|
|
}
|
|
/* Vista+ supports PAGE_EXECUTE_WRITECOPY, earlier versions don't */
|
|
if (td[i].prot == PAGE_EXECUTE_WRITECOPY)
|
|
{
|
|
ok(broken(!ret), "%d: VirtualProtect doesn't support PAGE_EXECUTE_WRITECOPY\n", i);
|
|
continue;
|
|
}
|
|
}
|
|
|
|
ok(ret, "%d: VirtualProtect error %d\n", i, GetLastError());
|
|
ok(old_prot == PAGE_NOACCESS, "%d: got %#x != expected PAGE_NOACCESS\n", i, old_prot);
|
|
|
|
prot = td[i].prot;
|
|
/* looks strange but Windows doesn't do this for PAGE_WRITECOPY */
|
|
if (prot == PAGE_EXECUTE_WRITECOPY) prot = PAGE_EXECUTE_READWRITE;
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ret = VirtualQuery(base, &info, sizeof(info));
|
|
ok(ret, "VirtualQuery failed %d\n", GetLastError());
|
|
ok(info.BaseAddress == base, "%d: got %p != expected %p\n", i, info.BaseAddress, base);
|
|
ok(info.RegionSize == si.dwPageSize, "%d: got %#lx != expected %#x\n", i, info.RegionSize, si.dwPageSize);
|
|
/* FIXME: remove the condition below once Wine is fixed */
|
|
todo_wine_if (td[i].prot == PAGE_EXECUTE_WRITECOPY)
|
|
ok(info.Protect == prot, "%d: got %#x != expected %#x\n", i, info.Protect, prot);
|
|
ok(info.AllocationBase == base, "%d: %p != %p\n", i, info.AllocationBase, base);
|
|
ok(info.AllocationProtect == alloc_prot, "%d: %#x != %#x\n", i, info.AllocationProtect, alloc_prot);
|
|
ok(info.State == MEM_COMMIT, "%d: %#x != MEM_COMMIT\n", i, info.State);
|
|
ok(info.Type == MEM_MAPPED, "%d: %#x != MEM_MAPPED\n", i, info.Type);
|
|
|
|
if (is_mem_writable(info.Protect))
|
|
{
|
|
base[0] = 0xfe;
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ret = VirtualQuery(base, &info, sizeof(info));
|
|
ok(ret, "VirtualQuery failed %d\n", GetLastError());
|
|
/* FIXME: remove the condition below once Wine is fixed */
|
|
todo_wine_if (td[i].prot == PAGE_WRITECOPY || td[i].prot == PAGE_EXECUTE_WRITECOPY)
|
|
ok(info.Protect == td[i].prot_after_write, "%d: got %#x != expected %#x\n", i, info.Protect, td[i].prot_after_write);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
ok(!ret, "%d: VirtualProtect should fail\n", i);
|
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "%d: expected ERROR_INVALID_PARAMETER, got %d\n", i, GetLastError());
|
|
continue;
|
|
}
|
|
|
|
old_prot = 0xdeadbeef;
|
|
SetLastError(0xdeadbeef);
|
|
ret = VirtualProtect(base, si.dwPageSize, PAGE_NOACCESS, &old_prot);
|
|
ok(ret, "%d: VirtualProtect error %d\n", i, GetLastError());
|
|
/* FIXME: remove the condition below once Wine is fixed */
|
|
todo_wine_if (td[i].prot == PAGE_WRITECOPY || td[i].prot == PAGE_EXECUTE_WRITECOPY)
|
|
ok(old_prot == td[i].prot_after_write, "%d: got %#x != expected %#x\n", i, old_prot, td[i].prot_after_write);
|
|
}
|
|
|
|
UnmapViewOfFile(base);
|
|
CloseHandle(hmap);
|
|
|
|
CloseHandle(hfile);
|
|
DeleteFileA(file_name);
|
|
}
|
|
|
|
#define ACCESS_READ 0x01
|
|
#define ACCESS_WRITE 0x02
|
|
#define ACCESS_EXECUTE 0x04
|
|
#define ACCESS_WRITECOPY 0x08
|
|
|
|
static DWORD page_prot_to_access(DWORD prot)
|
|
{
|
|
switch (prot)
|
|
{
|
|
case PAGE_READWRITE:
|
|
return ACCESS_READ | ACCESS_WRITE;
|
|
|
|
case PAGE_EXECUTE:
|
|
case PAGE_EXECUTE_READ:
|
|
return ACCESS_READ | ACCESS_EXECUTE;
|
|
|
|
case PAGE_EXECUTE_READWRITE:
|
|
return ACCESS_READ | ACCESS_WRITE | ACCESS_WRITECOPY | ACCESS_EXECUTE;
|
|
|
|
case PAGE_EXECUTE_WRITECOPY:
|
|
return ACCESS_READ | ACCESS_WRITECOPY | ACCESS_EXECUTE;
|
|
|
|
case PAGE_READONLY:
|
|
return ACCESS_READ;
|
|
|
|
case PAGE_WRITECOPY:
|
|
return ACCESS_READ;
|
|
|
|
default:
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
static BOOL is_compatible_protection(DWORD map_prot, DWORD view_prot, DWORD prot)
|
|
{
|
|
DWORD map_access, view_access, prot_access;
|
|
|
|
map_access = page_prot_to_access(map_prot);
|
|
view_access = page_prot_to_access(view_prot);
|
|
prot_access = page_prot_to_access(prot);
|
|
|
|
if (view_access == prot_access) return TRUE;
|
|
if (!view_access) return FALSE;
|
|
|
|
if ((view_access & prot_access) != prot_access) return FALSE;
|
|
if ((map_access & prot_access) == prot_access) return TRUE;
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
static DWORD map_prot_to_access(DWORD prot)
|
|
{
|
|
switch (prot)
|
|
{
|
|
case PAGE_READWRITE:
|
|
case PAGE_EXECUTE_READWRITE:
|
|
return SECTION_MAP_READ | SECTION_MAP_WRITE | SECTION_MAP_EXECUTE | SECTION_MAP_EXECUTE_EXPLICIT | SECTION_QUERY;
|
|
case PAGE_READONLY:
|
|
case PAGE_WRITECOPY:
|
|
case PAGE_EXECUTE:
|
|
case PAGE_EXECUTE_READ:
|
|
case PAGE_EXECUTE_WRITECOPY:
|
|
return SECTION_MAP_READ | SECTION_MAP_EXECUTE | SECTION_MAP_EXECUTE_EXPLICIT | SECTION_QUERY;
|
|
default:
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
static BOOL is_compatible_access(DWORD map_prot, DWORD view_prot)
|
|
{
|
|
DWORD access = map_prot_to_access(map_prot);
|
|
if (!view_prot) view_prot = SECTION_MAP_READ;
|
|
return (view_prot & access) == view_prot;
|
|
}
|
|
|
|
static void *map_view_of_file(HANDLE handle, DWORD access)
|
|
{
|
|
NTSTATUS status;
|
|
LARGE_INTEGER offset;
|
|
SIZE_T count;
|
|
ULONG protect;
|
|
BOOL exec;
|
|
void *addr;
|
|
|
|
if (!pNtMapViewOfSection) return NULL;
|
|
|
|
count = 0;
|
|
offset.u.LowPart = 0;
|
|
offset.u.HighPart = 0;
|
|
|
|
exec = access & FILE_MAP_EXECUTE;
|
|
access &= ~FILE_MAP_EXECUTE;
|
|
|
|
if (access == FILE_MAP_COPY)
|
|
{
|
|
if (exec)
|
|
protect = PAGE_EXECUTE_WRITECOPY;
|
|
else
|
|
protect = PAGE_WRITECOPY;
|
|
}
|
|
else if (access & FILE_MAP_WRITE)
|
|
{
|
|
if (exec)
|
|
protect = PAGE_EXECUTE_READWRITE;
|
|
else
|
|
protect = PAGE_READWRITE;
|
|
}
|
|
else if (access & FILE_MAP_READ)
|
|
{
|
|
if (exec)
|
|
protect = PAGE_EXECUTE_READ;
|
|
else
|
|
protect = PAGE_READONLY;
|
|
}
|
|
else protect = PAGE_NOACCESS;
|
|
|
|
addr = NULL;
|
|
status = pNtMapViewOfSection(handle, GetCurrentProcess(), &addr, 0, 0, &offset,
|
|
&count, 1 /* ViewShare */, 0, protect);
|
|
if (status)
|
|
{
|
|
/* for simplicity */
|
|
SetLastError(ERROR_ACCESS_DENIED);
|
|
addr = NULL;
|
|
}
|
|
return addr;
|
|
}
|
|
|
|
static void test_mapping(void)
|
|
{
|
|
static const DWORD page_prot[] =
|
|
{
|
|
PAGE_NOACCESS, PAGE_READONLY, PAGE_READWRITE, PAGE_WRITECOPY,
|
|
PAGE_EXECUTE_READ, PAGE_EXECUTE_READWRITE, PAGE_EXECUTE_WRITECOPY
|
|
};
|
|
static const struct
|
|
{
|
|
DWORD access, prot;
|
|
} view[] =
|
|
{
|
|
{ 0, PAGE_NOACCESS }, /* 0x00 */
|
|
{ FILE_MAP_COPY, PAGE_WRITECOPY }, /* 0x01 */
|
|
{ FILE_MAP_WRITE, PAGE_READWRITE }, /* 0x02 */
|
|
{ FILE_MAP_WRITE | FILE_MAP_COPY, PAGE_READWRITE }, /* 0x03 */
|
|
{ FILE_MAP_READ, PAGE_READONLY }, /* 0x04 */
|
|
{ FILE_MAP_READ | FILE_MAP_COPY, PAGE_READONLY }, /* 0x05 */
|
|
{ FILE_MAP_READ | FILE_MAP_WRITE, PAGE_READWRITE }, /* 0x06 */
|
|
{ FILE_MAP_READ | FILE_MAP_WRITE | FILE_MAP_COPY, PAGE_READWRITE }, /* 0x07 */
|
|
{ SECTION_MAP_EXECUTE, PAGE_NOACCESS }, /* 0x08 */
|
|
{ SECTION_MAP_EXECUTE | FILE_MAP_COPY, PAGE_NOACCESS }, /* 0x09 */
|
|
{ SECTION_MAP_EXECUTE | FILE_MAP_WRITE, PAGE_READWRITE }, /* 0x0a */
|
|
{ SECTION_MAP_EXECUTE | FILE_MAP_WRITE | FILE_MAP_COPY, PAGE_READWRITE }, /* 0x0b */
|
|
{ SECTION_MAP_EXECUTE | FILE_MAP_READ, PAGE_READONLY }, /* 0x0c */
|
|
{ SECTION_MAP_EXECUTE | FILE_MAP_READ | FILE_MAP_COPY, PAGE_READONLY }, /* 0x0d */
|
|
{ SECTION_MAP_EXECUTE | FILE_MAP_READ | FILE_MAP_WRITE, PAGE_READWRITE }, /* 0x0e */
|
|
{ SECTION_MAP_EXECUTE | FILE_MAP_READ | FILE_MAP_WRITE | FILE_MAP_COPY, PAGE_READWRITE }, /* 0x0f */
|
|
{ FILE_MAP_EXECUTE, PAGE_NOACCESS }, /* 0x20 */
|
|
{ FILE_MAP_EXECUTE | FILE_MAP_COPY, PAGE_EXECUTE_WRITECOPY }, /* 0x21 */
|
|
{ FILE_MAP_EXECUTE | FILE_MAP_WRITE, PAGE_EXECUTE_READWRITE }, /* 0x22 */
|
|
{ FILE_MAP_EXECUTE | FILE_MAP_WRITE | FILE_MAP_COPY, PAGE_EXECUTE_READWRITE }, /* 0x23 */
|
|
{ FILE_MAP_EXECUTE | FILE_MAP_READ, PAGE_EXECUTE_READ }, /* 0x24 */
|
|
{ FILE_MAP_EXECUTE | FILE_MAP_READ | FILE_MAP_COPY, PAGE_EXECUTE_READ }, /* 0x25 */
|
|
{ FILE_MAP_EXECUTE | FILE_MAP_READ | FILE_MAP_WRITE, PAGE_EXECUTE_READWRITE }, /* 0x26 */
|
|
{ FILE_MAP_EXECUTE | FILE_MAP_READ | FILE_MAP_WRITE | FILE_MAP_COPY, PAGE_EXECUTE_READWRITE }, /* 0x27 */
|
|
{ FILE_MAP_EXECUTE | SECTION_MAP_EXECUTE, PAGE_NOACCESS }, /* 0x28 */
|
|
{ FILE_MAP_EXECUTE | SECTION_MAP_EXECUTE | FILE_MAP_COPY, PAGE_NOACCESS }, /* 0x29 */
|
|
{ FILE_MAP_EXECUTE | SECTION_MAP_EXECUTE | FILE_MAP_WRITE, PAGE_EXECUTE_READWRITE }, /* 0x2a */
|
|
{ FILE_MAP_EXECUTE | SECTION_MAP_EXECUTE | FILE_MAP_WRITE | FILE_MAP_COPY, PAGE_EXECUTE_READWRITE }, /* 0x2b */
|
|
{ FILE_MAP_EXECUTE | SECTION_MAP_EXECUTE | FILE_MAP_READ, PAGE_EXECUTE_READ }, /* 0x2c */
|
|
{ FILE_MAP_EXECUTE | SECTION_MAP_EXECUTE | FILE_MAP_READ | FILE_MAP_COPY, PAGE_EXECUTE_READ }, /* 0x2d */
|
|
{ FILE_MAP_EXECUTE | SECTION_MAP_EXECUTE | FILE_MAP_READ | FILE_MAP_WRITE, PAGE_EXECUTE_READWRITE }, /* 0x2e */
|
|
{ FILE_MAP_EXECUTE | SECTION_MAP_EXECUTE | FILE_MAP_READ | FILE_MAP_WRITE | FILE_MAP_COPY, PAGE_EXECUTE_READWRITE } /* 0x2f */
|
|
};
|
|
void *base, *nt_base, *ptr;
|
|
DWORD i, j, k, ret, old_prot, prev_prot;
|
|
SYSTEM_INFO si;
|
|
char temp_path[MAX_PATH];
|
|
char file_name[MAX_PATH];
|
|
HANDLE hfile, hmap;
|
|
MEMORY_BASIC_INFORMATION info, nt_info;
|
|
|
|
GetSystemInfo(&si);
|
|
trace("system page size %#x\n", si.dwPageSize);
|
|
|
|
GetTempPathA(MAX_PATH, temp_path);
|
|
GetTempFileNameA(temp_path, "map", 0, file_name);
|
|
|
|
SetLastError(0xdeadbeef);
|
|
hfile = CreateFileA(file_name, GENERIC_READ|GENERIC_WRITE|GENERIC_EXECUTE, 0, NULL, CREATE_ALWAYS, 0, 0);
|
|
ok(hfile != INVALID_HANDLE_VALUE, "CreateFile(%s) error %d\n", file_name, GetLastError());
|
|
SetFilePointer(hfile, si.dwPageSize, NULL, FILE_BEGIN);
|
|
SetEndOfFile(hfile);
|
|
|
|
for (i = 0; i < sizeof(page_prot)/sizeof(page_prot[0]); i++)
|
|
{
|
|
SetLastError(0xdeadbeef);
|
|
hmap = CreateFileMappingW(hfile, NULL, page_prot[i] | SEC_COMMIT, 0, si.dwPageSize, NULL);
|
|
|
|
if (page_prot[i] == PAGE_NOACCESS)
|
|
{
|
|
HANDLE hmap2;
|
|
|
|
ok(!hmap, "CreateFileMapping(PAGE_NOACCESS) should fail\n");
|
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError());
|
|
|
|
/* A trick to create a not accessible mapping */
|
|
SetLastError(0xdeadbeef);
|
|
hmap = CreateFileMappingW(hfile, NULL, PAGE_READWRITE | SEC_COMMIT, 0, si.dwPageSize, NULL);
|
|
ok(hmap != 0, "CreateFileMapping(PAGE_READWRITE) error %d\n", GetLastError());
|
|
SetLastError(0xdeadbeef);
|
|
ret = DuplicateHandle(GetCurrentProcess(), hmap, GetCurrentProcess(), &hmap2, 0, FALSE, 0);
|
|
ok(ret, "DuplicateHandle error %d\n", GetLastError());
|
|
CloseHandle(hmap);
|
|
hmap = hmap2;
|
|
}
|
|
|
|
if (!hmap)
|
|
{
|
|
trace("%d: CreateFileMapping(%04x) failed: %d\n", i, page_prot[i], GetLastError());
|
|
|
|
/* NT4 and win2k don't support EXEC on file mappings */
|
|
if (page_prot[i] == PAGE_EXECUTE_READ || page_prot[i] == PAGE_EXECUTE_READWRITE)
|
|
{
|
|
ok(broken(!hmap), "%d: CreateFileMapping doesn't support PAGE_EXECUTE\n", i);
|
|
continue;
|
|
}
|
|
/* Vista+ supports PAGE_EXECUTE_WRITECOPY, earlier versions don't */
|
|
if (page_prot[i] == PAGE_EXECUTE_WRITECOPY)
|
|
{
|
|
ok(broken(!hmap), "%d: CreateFileMapping doesn't support PAGE_EXECUTE_WRITECOPY\n", i);
|
|
continue;
|
|
}
|
|
}
|
|
|
|
ok(hmap != 0, "%d: CreateFileMapping(%04x) error %d\n", i, page_prot[i], GetLastError());
|
|
|
|
for (j = 0; j < sizeof(view)/sizeof(view[0]); j++)
|
|
{
|
|
nt_base = map_view_of_file(hmap, view[j].access);
|
|
if (nt_base)
|
|
{
|
|
SetLastError(0xdeadbeef);
|
|
ret = VirtualQuery(nt_base, &nt_info, sizeof(nt_info));
|
|
ok(ret, "%d: VirtualQuery failed %d\n", j, GetLastError());
|
|
UnmapViewOfFile(nt_base);
|
|
}
|
|
|
|
SetLastError(0xdeadbeef);
|
|
base = MapViewOfFile(hmap, view[j].access, 0, 0, 0);
|
|
|
|
/* Vista+ supports FILE_MAP_EXECUTE properly, earlier versions don't */
|
|
ok(!nt_base == !base ||
|
|
broken((view[j].access & FILE_MAP_EXECUTE) && !nt_base != !base),
|
|
"%d: (%04x/%04x) NT %p kernel %p\n", j, page_prot[i], view[j].access, nt_base, base);
|
|
|
|
if (!is_compatible_access(page_prot[i], view[j].access))
|
|
{
|
|
ok(!base, "%d: MapViewOfFile(%04x/%04x) should fail\n", j, page_prot[i], view[j].access);
|
|
ok(GetLastError() == ERROR_ACCESS_DENIED, "wrong error %d\n", GetLastError());
|
|
continue;
|
|
}
|
|
|
|
/* Vista+ properly supports FILE_MAP_EXECUTE, earlier versions don't */
|
|
if (!base && (view[j].access & FILE_MAP_EXECUTE))
|
|
{
|
|
ok(broken(!base), "%d: MapViewOfFile(%04x/%04x) failed %d\n", j, page_prot[i], view[j].access, GetLastError());
|
|
continue;
|
|
}
|
|
|
|
ok(base != NULL, "%d: MapViewOfFile(%04x/%04x) failed %d\n", j, page_prot[i], view[j].access, GetLastError());
|
|
|
|
SetLastError(0xdeadbeef);
|
|
ret = VirtualQuery(base, &info, sizeof(info));
|
|
ok(ret, "%d: VirtualQuery failed %d\n", j, GetLastError());
|
|
ok(info.BaseAddress == base, "%d: (%04x) got %p, expected %p\n", j, view[j].access, info.BaseAddress, base);
|
|
ok(info.RegionSize == si.dwPageSize, "%d: (%04x) got %#lx != expected %#x\n", j, view[j].access, info.RegionSize, si.dwPageSize);
|
|
ok(info.Protect == view[j].prot ||
|
|
broken(view[j].prot == PAGE_EXECUTE_READ && info.Protect == PAGE_READONLY) || /* win2k */
|
|
broken(view[j].prot == PAGE_EXECUTE_READWRITE && info.Protect == PAGE_READWRITE) || /* win2k */
|
|
broken(view[j].prot == PAGE_EXECUTE_WRITECOPY && info.Protect == PAGE_NOACCESS), /* XP */
|
|
"%d: (%04x) got %#x, expected %#x\n", j, view[j].access, info.Protect, view[j].prot);
|
|
ok(info.AllocationBase == base, "%d: (%04x) got %p, expected %p\n", j, view[j].access, info.AllocationBase, base);
|
|
ok(info.AllocationProtect == info.Protect, "%d: (%04x) got %#x, expected %#x\n", j, view[j].access, info.AllocationProtect, info.Protect);
|
|
ok(info.State == MEM_COMMIT, "%d: (%04x) got %#x, expected MEM_COMMIT\n", j, view[j].access, info.State);
|
|
ok(info.Type == MEM_MAPPED, "%d: (%04x) got %#x, expected MEM_MAPPED\n", j, view[j].access, info.Type);
|
|
|
|
if (nt_base && base)
|
|
{
|
|
ok(nt_info.RegionSize == info.RegionSize, "%d: (%04x) got %#lx != expected %#lx\n", j, view[j].access, nt_info.RegionSize, info.RegionSize);
|
|
ok(nt_info.Protect == info.Protect /* Vista+ */ ||
|
|
broken(nt_info.AllocationProtect == PAGE_EXECUTE_WRITECOPY && info.Protect == PAGE_NOACCESS), /* XP */
|
|
"%d: (%04x) got %#x, expected %#x\n", j, view[j].access, nt_info.Protect, info.Protect);
|
|
ok(nt_info.AllocationProtect == info.AllocationProtect /* Vista+ */ ||
|
|
broken(nt_info.AllocationProtect == PAGE_EXECUTE_WRITECOPY && info.Protect == PAGE_NOACCESS), /* XP */
|
|
"%d: (%04x) got %#x, expected %#x\n", j, view[j].access, nt_info.AllocationProtect, info.AllocationProtect);
|
|
ok(nt_info.State == info.State, "%d: (%04x) got %#x, expected %#x\n", j, view[j].access, nt_info.State, info.State);
|
|
ok(nt_info.Type == info.Type, "%d: (%04x) got %#x, expected %#x\n", j, view[j].access, nt_info.Type, info.Type);
|
|
}
|
|
|
|
prev_prot = info.Protect;
|
|
|
|
for (k = 0; k < sizeof(page_prot)/sizeof(page_prot[0]); k++)
|
|
{
|
|
/*trace("map %#x, view %#x, requested prot %#x\n", page_prot[i], view[j].prot, page_prot[k]);*/
|
|
SetLastError(0xdeadbeef);
|
|
old_prot = 0xdeadbeef;
|
|
ret = VirtualProtect(base, si.dwPageSize, page_prot[k], &old_prot);
|
|
if (is_compatible_protection(page_prot[i], view[j].prot, page_prot[k]))
|
|
{
|
|
/* win2k and XP don't support EXEC on file mappings */
|
|
if (!ret && page_prot[k] == PAGE_EXECUTE)
|
|
{
|
|
ok(broken(!ret), "VirtualProtect doesn't support PAGE_EXECUTE\n");
|
|
continue;
|
|
}
|
|
/* NT4 and win2k don't support EXEC on file mappings */
|
|
if (!ret && (page_prot[k] == PAGE_EXECUTE_READ || page_prot[k] == PAGE_EXECUTE_READWRITE))
|
|
{
|
|
ok(broken(!ret), "VirtualProtect doesn't support PAGE_EXECUTE\n");
|
|
continue;
|
|
}
|
|
/* Vista+ supports PAGE_EXECUTE_WRITECOPY, earlier versions don't */
|
|
if (!ret && page_prot[k] == PAGE_EXECUTE_WRITECOPY)
|
|
{
|
|
ok(broken(!ret), "VirtualProtect doesn't support PAGE_EXECUTE_WRITECOPY\n");
|
|
continue;
|
|
}
|
|
/* win2k and XP don't support PAGE_EXECUTE_WRITECOPY views properly */
|
|
if (!ret && view[j].prot == PAGE_EXECUTE_WRITECOPY)
|
|
{
|
|
ok(broken(!ret), "VirtualProtect doesn't support PAGE_EXECUTE_WRITECOPY view properly\n");
|
|
continue;
|
|
}
|
|
|
|
ok(ret, "VirtualProtect error %d, map %#x, view %#x, requested prot %#x\n", GetLastError(), page_prot[i], view[j].prot, page_prot[k]);
|
|
ok(old_prot == prev_prot, "got %#x, expected %#x\n", old_prot, prev_prot);
|
|
prev_prot = page_prot[k];
|
|
}
|
|
else
|
|
{
|
|
/* NT4 doesn't fail on incompatible map and view */
|
|
if (ret)
|
|
{
|
|
ok(broken(ret), "VirtualProtect should fail, map %#x, view %#x, requested prot %#x\n", page_prot[i], view[j].prot, page_prot[k]);
|
|
skip("Incompatible map and view are not properly handled on this platform\n");
|
|
break; /* NT4 won't pass remaining tests */
|
|
}
|
|
|
|
ok(!ret, "VirtualProtect should fail, map %#x, view %#x, requested prot %#x\n", page_prot[i], view[j].prot, page_prot[k]);
|
|
ok(GetLastError() == ERROR_INVALID_PARAMETER, "expected ERROR_INVALID_PARAMETER, got %d\n", GetLastError());
|
|
}
|
|
}
|
|
|
|
for (k = 0; k < sizeof(page_prot)/sizeof(page_prot[0]); k++)
|
|
{
|
|
/*trace("map %#x, view %#x, requested prot %#x\n", page_prot[i], view[j].prot, page_prot[k]);*/
|
|
SetLastError(0xdeadbeef);
|
|
ptr = VirtualAlloc(base, si.dwPageSize, MEM_COMMIT, page_prot[k]);
|
|
ok(!ptr, "VirtualAlloc(%02x) should fail\n", page_prot[k]);
|
|
/* FIXME: remove once Wine is fixed */
|
|
todo_wine_if (page_prot[k] == PAGE_WRITECOPY || page_prot[k] == PAGE_EXECUTE_WRITECOPY)
|
|
ok(GetLastError() == ERROR_ACCESS_DENIED, "expected ERROR_ACCESS_DENIED, got %d\n", GetLastError());
|
|
}
|
|
|
|
UnmapViewOfFile(base);
|
|
}
|
|
|
|
CloseHandle(hmap);
|
|
}
|
|
|
|
CloseHandle(hfile);
|
|
DeleteFileA(file_name);
|
|
}
|
|
|
|
static void test_shared_memory(BOOL is_child)
|
|
{
|
|
HANDLE mapping;
|
|
LONG *p;
|
|
|
|
SetLastError(0xdeadbef);
|
|
mapping = CreateFileMappingA(INVALID_HANDLE_VALUE, NULL, PAGE_READWRITE, 0, 4096, "winetest_virtual.c");
|
|
ok(mapping != 0, "CreateFileMapping error %d\n", GetLastError());
|
|
if (is_child)
|
|
ok(GetLastError() == ERROR_ALREADY_EXISTS, "expected ERROR_ALREADY_EXISTS, got %d\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbef);
|
|
p = MapViewOfFile(mapping, FILE_MAP_READ|FILE_MAP_WRITE, 0, 0, 4096);
|
|
ok(p != NULL, "MapViewOfFile error %d\n", GetLastError());
|
|
|
|
if (is_child)
|
|
{
|
|
ok(*p == 0x1a2b3c4d, "expected 0x1a2b3c4d in child, got %#x\n", *p);
|
|
}
|
|
else
|
|
{
|
|
char **argv;
|
|
char cmdline[MAX_PATH];
|
|
PROCESS_INFORMATION pi;
|
|
STARTUPINFOA si = { sizeof(si) };
|
|
DWORD ret;
|
|
|
|
*p = 0x1a2b3c4d;
|
|
|
|
winetest_get_mainargs(&argv);
|
|
sprintf(cmdline, "\"%s\" virtual sharedmem", argv[0]);
|
|
ret = CreateProcessA(argv[0], cmdline, NULL, NULL, FALSE, 0, NULL, NULL, &si, &pi);
|
|
ok(ret, "CreateProcess(%s) error %d\n", cmdline, GetLastError());
|
|
winetest_wait_child_process(pi.hProcess);
|
|
CloseHandle(pi.hThread);
|
|
CloseHandle(pi.hProcess);
|
|
}
|
|
|
|
UnmapViewOfFile(p);
|
|
CloseHandle(mapping);
|
|
}
|
|
|
|
static void test_shared_memory_ro(BOOL is_child, DWORD child_access)
|
|
{
|
|
HANDLE mapping;
|
|
LONG *p;
|
|
|
|
SetLastError(0xdeadbef);
|
|
mapping = CreateFileMappingA(INVALID_HANDLE_VALUE, NULL, PAGE_READWRITE, 0, 4096, "winetest_virtual.c_ro");
|
|
ok(mapping != 0, "CreateFileMapping error %d\n", GetLastError());
|
|
if (is_child)
|
|
ok(GetLastError() == ERROR_ALREADY_EXISTS, "expected ERROR_ALREADY_EXISTS, got %d\n", GetLastError());
|
|
|
|
SetLastError(0xdeadbef);
|
|
p = MapViewOfFile(mapping, is_child ? child_access : FILE_MAP_READ, 0, 0, 4096);
|
|
ok(p != NULL, "MapViewOfFile error %d\n", GetLastError());
|
|
|
|
if (is_child)
|
|
{
|
|
*p = 0xdeadbeef;
|
|
}
|
|
else
|
|
{
|
|
char **argv;
|
|
char cmdline[MAX_PATH];
|
|
PROCESS_INFORMATION pi;
|
|
STARTUPINFOA si = { sizeof(si) };
|
|
DWORD ret;
|
|
|
|
winetest_get_mainargs(&argv);
|
|
sprintf(cmdline, "\"%s\" virtual sharedmemro %x", argv[0], child_access);
|
|
ret = CreateProcessA(argv[0], cmdline, NULL, NULL, FALSE, 0, NULL, NULL, &si, &pi);
|
|
ok(ret, "CreateProcess(%s) error %d\n", cmdline, GetLastError());
|
|
winetest_wait_child_process(pi.hProcess);
|
|
CloseHandle(pi.hThread);
|
|
CloseHandle(pi.hProcess);
|
|
|
|
if(child_access & FILE_MAP_WRITE)
|
|
ok(*p == 0xdeadbeef, "*p = %x, expected 0xdeadbeef\n", *p);
|
|
else
|
|
ok(!*p, "*p = %x, expected 0\n", *p);
|
|
}
|
|
|
|
UnmapViewOfFile(p);
|
|
CloseHandle(mapping);
|
|
}
|
|
|
|
START_TEST(virtual)
|
|
{
|
|
int argc;
|
|
char **argv;
|
|
argc = winetest_get_mainargs( &argv );
|
|
|
|
if (argc >= 3)
|
|
{
|
|
if (!strcmp(argv[2], "sleep"))
|
|
{
|
|
Sleep(5000); /* spawned process runs for at most 5 seconds */
|
|
return;
|
|
}
|
|
if (!strcmp(argv[2], "sharedmem"))
|
|
{
|
|
test_shared_memory(TRUE);
|
|
return;
|
|
}
|
|
if (!strcmp(argv[2], "sharedmemro"))
|
|
{
|
|
test_shared_memory_ro(TRUE, strtol(argv[3], NULL, 16));
|
|
return;
|
|
}
|
|
while (1)
|
|
{
|
|
void *mem;
|
|
BOOL ret;
|
|
mem = VirtualAlloc(NULL, 1<<20, MEM_COMMIT|MEM_RESERVE,
|
|
PAGE_EXECUTE_READWRITE);
|
|
ok(mem != NULL, "VirtualAlloc failed %u\n", GetLastError());
|
|
if (mem == NULL) break;
|
|
ret = VirtualFree(mem, 0, MEM_RELEASE);
|
|
ok(ret, "VirtualFree failed %u\n", GetLastError());
|
|
if (!ret) break;
|
|
}
|
|
return;
|
|
}
|
|
|
|
hkernel32 = GetModuleHandleA("kernel32.dll");
|
|
hntdll = GetModuleHandleA("ntdll.dll");
|
|
|
|
pVirtualAllocEx = (void *) GetProcAddress(hkernel32, "VirtualAllocEx");
|
|
pVirtualFreeEx = (void *) GetProcAddress(hkernel32, "VirtualFreeEx");
|
|
pGetWriteWatch = (void *) GetProcAddress(hkernel32, "GetWriteWatch");
|
|
pResetWriteWatch = (void *) GetProcAddress(hkernel32, "ResetWriteWatch");
|
|
pGetProcessDEPPolicy = (void *)GetProcAddress( hkernel32, "GetProcessDEPPolicy" );
|
|
pIsWow64Process = (void *)GetProcAddress( hkernel32, "IsWow64Process" );
|
|
pNtAreMappedFilesTheSame = (void *)GetProcAddress( hntdll, "NtAreMappedFilesTheSame" );
|
|
pNtMapViewOfSection = (void *)GetProcAddress( hntdll, "NtMapViewOfSection" );
|
|
pNtUnmapViewOfSection = (void *)GetProcAddress( hntdll, "NtUnmapViewOfSection" );
|
|
pRtlAddVectoredExceptionHandler = (void *)GetProcAddress( hntdll, "RtlAddVectoredExceptionHandler" );
|
|
pRtlRemoveVectoredExceptionHandler = (void *)GetProcAddress( hntdll, "RtlRemoveVectoredExceptionHandler" );
|
|
pNtProtectVirtualMemory = (void *)GetProcAddress( hntdll, "NtProtectVirtualMemory" );
|
|
pNtAllocateVirtualMemory = (void *)GetProcAddress( hntdll, "NtAllocateVirtualMemory" );
|
|
pNtFreeVirtualMemory = (void *)GetProcAddress( hntdll, "NtFreeVirtualMemory" );
|
|
|
|
test_shared_memory(FALSE);
|
|
test_shared_memory_ro(FALSE, FILE_MAP_READ|FILE_MAP_WRITE);
|
|
test_shared_memory_ro(FALSE, FILE_MAP_COPY);
|
|
test_shared_memory_ro(FALSE, FILE_MAP_COPY|FILE_MAP_WRITE);
|
|
test_mapping();
|
|
test_CreateFileMapping_protection();
|
|
test_VirtualAlloc_protection();
|
|
test_VirtualProtect();
|
|
test_VirtualAllocEx();
|
|
test_VirtualAlloc();
|
|
test_MapViewOfFile();
|
|
test_NtMapViewOfSection();
|
|
test_NtAreMappedFilesTheSame();
|
|
test_CreateFileMapping();
|
|
test_IsBadReadPtr();
|
|
test_IsBadWritePtr();
|
|
test_IsBadCodePtr();
|
|
test_write_watch();
|
|
#if defined(__i386__) || defined(__x86_64__)
|
|
test_stack_commit();
|
|
#endif
|
|
#ifdef __i386__
|
|
test_guard_page();
|
|
/* The following tests should be executed as a last step, and in exactly this
|
|
* order, since ATL thunk emulation cannot be enabled anymore on Windows. */
|
|
test_atl_thunk_emulation( MEM_EXECUTE_OPTION_ENABLE );
|
|
test_atl_thunk_emulation( MEM_EXECUTE_OPTION_DISABLE );
|
|
test_atl_thunk_emulation( MEM_EXECUTE_OPTION_DISABLE | MEM_EXECUTE_OPTION_DISABLE_THUNK_EMULATION );
|
|
#endif
|
|
}
|