Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
W
wine-winehq
Project
Project
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Registry
Registry
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
wine
wine-winehq
Commits
7aa1f6c3
Commit
7aa1f6c3
authored
Aug 18, 2009
by
Michael Karcher
Committed by
Alexandre Julliard
Aug 18, 2009
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
ntdll: Add ProcessExecuteFlags handling to NtQueryInformationProcess.
parent
a0509811
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
with
18 additions
and
3 deletions
+18
-3
process.c
dlls/ntdll/process.c
+11
-0
exception.c
dlls/ntdll/tests/exception.c
+7
-3
No files found.
dlls/ntdll/process.c
View file @
7aa1f6c3
...
...
@@ -37,6 +37,8 @@
WINE_DEFAULT_DEBUG_CHANNEL
(
ntdll
);
static
ULONG
execute_flags
=
MEM_EXECUTE_OPTION_ENABLE
;
/*
* Process object
*/
...
...
@@ -347,6 +349,14 @@ NTSTATUS WINAPI NtQueryInformationProcess(
}
SERVER_END_REQ
;
break
;
case
ProcessExecuteFlags
:
if
(
ProcessInformationLength
==
sizeof
(
ULONG
))
{
*
(
ULONG
*
)
ProcessInformation
=
execute_flags
;
len
=
sizeof
(
ULONG
);
}
else
ret
=
STATUS_INFO_LENGTH_MISMATCH
;
break
;
default:
FIXME
(
"(%p,info_class=%d,%p,0x%08x,%p) Unknown information class
\n
"
,
ProcessHandle
,
ProcessInformationClass
,
...
...
@@ -424,6 +434,7 @@ NTSTATUS WINAPI NtSetInformationProcess(
default:
return
STATUS_INVALID_PARAMETER
;
}
execute_flags
=
*
(
ULONG
*
)
ProcessInformation
;
VIRTUAL_SetForceExec
(
enable
);
}
break
;
...
...
dlls/ntdll/tests/exception.c
View file @
7aa1f6c3
...
...
@@ -1053,7 +1053,11 @@ static void test_dpe_exceptions(void)
info
.
exception_caught
=
FALSE
;
run_exception_test
(
dpe_exception_handler
,
&
info
,
single_ret
,
sizeof
(
single_ret
),
PAGE_NOACCESS
);
ok
(
info
.
exception_caught
==
TRUE
,
"Execution of disabled memory suceeded
\n
"
);
ok
(
info
.
exception_info
==
EXCEPTION_READ_FAULT
,
if
(
has_hw_support
)
todo_wine
ok
(
info
.
exception_info
==
EXCEPTION_READ_FAULT
,
"Access violation type: %08x
\n
"
,
(
unsigned
)
info
.
exception_info
);
else
ok
(
info
.
exception_info
==
EXCEPTION_READ_FAULT
,
"Access violation type: %08x
\n
"
,
(
unsigned
)
info
.
exception_info
);
}
else
...
...
@@ -1070,12 +1074,12 @@ static void test_dpe_exceptions(void)
/* Try to turn off DEP */
val
=
MEM_EXECUTE_OPTION_ENABLE
;
stat
=
pNtSetInformationProcess
(
GetCurrentProcess
(),
ProcessExecuteFlags
,
&
val
,
sizeof
val
);
ok
(
stat
==
STATUS_ACCESS_DENIED
,
"disabling DEP while permanent: status %08x
\n
"
,
stat
);
todo_wine
ok
(
stat
==
STATUS_ACCESS_DENIED
,
"disabling DEP while permanent: status %08x
\n
"
,
stat
);
/* Try to turn on DEP */
val
=
MEM_EXECUTE_OPTION_DISABLE
;
stat
=
pNtSetInformationProcess
(
GetCurrentProcess
(),
ProcessExecuteFlags
,
&
val
,
sizeof
val
);
ok
(
stat
==
STATUS_ACCESS_DENIED
,
"enabling DEP while permanent: status %08x
\n
"
,
stat
);
todo_wine
ok
(
stat
==
STATUS_ACCESS_DENIED
,
"enabling DEP while permanent: status %08x
\n
"
,
stat
);
}
#elif defined(__x86_64__)
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment