summaryrefslogtreecommitdiffstats
path: root/dependencies/pkg/mod/golang.org/x/sys@v0.1.0/windows/syscall_windows_test.go
diff options
context:
space:
mode:
Diffstat (limited to 'dependencies/pkg/mod/golang.org/x/sys@v0.1.0/windows/syscall_windows_test.go')
-rw-r--r--dependencies/pkg/mod/golang.org/x/sys@v0.1.0/windows/syscall_windows_test.go1080
1 files changed, 1080 insertions, 0 deletions
diff --git a/dependencies/pkg/mod/golang.org/x/sys@v0.1.0/windows/syscall_windows_test.go b/dependencies/pkg/mod/golang.org/x/sys@v0.1.0/windows/syscall_windows_test.go
new file mode 100644
index 0000000..997396a
--- /dev/null
+++ b/dependencies/pkg/mod/golang.org/x/sys@v0.1.0/windows/syscall_windows_test.go
@@ -0,0 +1,1080 @@
+// Copyright 2012 The Go Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style
+// license that can be found in the LICENSE file.
+
+package windows_test
+
+import (
+ "bufio"
+ "bytes"
+ "debug/pe"
+ "errors"
+ "fmt"
+ "io/ioutil"
+ "math/rand"
+ "os"
+ "path/filepath"
+ "runtime"
+ "strconv"
+ "strings"
+ "syscall"
+ "testing"
+ "time"
+ "unsafe"
+
+ "golang.org/x/sys/internal/unsafeheader"
+ "golang.org/x/sys/windows"
+)
+
+func TestWin32finddata(t *testing.T) {
+ dir, err := ioutil.TempDir("", "go-build")
+ if err != nil {
+ t.Fatalf("failed to create temp directory: %v", err)
+ }
+ defer os.RemoveAll(dir)
+
+ path := filepath.Join(dir, "long_name.and_extension")
+ f, err := os.Create(path)
+ if err != nil {
+ t.Fatalf("failed to create %v: %v", path, err)
+ }
+ f.Close()
+
+ type X struct {
+ fd windows.Win32finddata
+ got byte
+ pad [10]byte // to protect ourselves
+
+ }
+ var want byte = 2 // it is unlikely to have this character in the filename
+ x := X{got: want}
+
+ pathp, _ := windows.UTF16PtrFromString(path)
+ h, err := windows.FindFirstFile(pathp, &(x.fd))
+ if err != nil {
+ t.Fatalf("FindFirstFile failed: %v", err)
+ }
+ err = windows.FindClose(h)
+ if err != nil {
+ t.Fatalf("FindClose failed: %v", err)
+ }
+
+ if x.got != want {
+ t.Fatalf("memory corruption: want=%d got=%d", want, x.got)
+ }
+}
+
+func TestFormatMessage(t *testing.T) {
+ dll := windows.MustLoadDLL("netevent.dll")
+
+ const TITLE_SC_MESSAGE_BOX uint32 = 0xC0001B75
+ const flags uint32 = syscall.FORMAT_MESSAGE_FROM_HMODULE | syscall.FORMAT_MESSAGE_ARGUMENT_ARRAY | syscall.FORMAT_MESSAGE_IGNORE_INSERTS
+ buf := make([]uint16, 300)
+ _, err := windows.FormatMessage(flags, uintptr(dll.Handle), TITLE_SC_MESSAGE_BOX, 0, buf, nil)
+ if err != nil {
+ t.Fatalf("FormatMessage for handle=%x and errno=%x failed: %v", dll.Handle, TITLE_SC_MESSAGE_BOX, err)
+ }
+}
+
+func abort(funcname string, err error) {
+ panic(funcname + " failed: " + err.Error())
+}
+
+func ExampleLoadLibrary() {
+ h, err := windows.LoadLibrary("kernel32.dll")
+ if err != nil {
+ abort("LoadLibrary", err)
+ }
+ defer windows.FreeLibrary(h)
+ proc, err := windows.GetProcAddress(h, "GetVersion")
+ if err != nil {
+ abort("GetProcAddress", err)
+ }
+ r, _, _ := syscall.Syscall(uintptr(proc), 0, 0, 0, 0)
+ major := byte(r)
+ minor := uint8(r >> 8)
+ build := uint16(r >> 16)
+ print("windows version ", major, ".", minor, " (Build ", build, ")\n")
+}
+
+func TestTOKEN_ALL_ACCESS(t *testing.T) {
+ if windows.TOKEN_ALL_ACCESS != 0xF01FF {
+ t.Errorf("TOKEN_ALL_ACCESS = %x, want 0xF01FF", windows.TOKEN_ALL_ACCESS)
+ }
+}
+
+func TestCreateWellKnownSid(t *testing.T) {
+ sid, err := windows.CreateWellKnownSid(windows.WinBuiltinAdministratorsSid)
+ if err != nil {
+ t.Fatalf("Unable to create well known sid for administrators: %v", err)
+ }
+ if got, want := sid.String(), "S-1-5-32-544"; got != want {
+ t.Fatalf("Builtin Administrators SID = %s, want %s", got, want)
+ }
+}
+
+func TestPseudoTokens(t *testing.T) {
+ version, err := windows.GetVersion()
+ if err != nil {
+ t.Fatal(err)
+ }
+ if ((version&0xffff)>>8)|((version&0xff)<<8) < 0x0602 {
+ return
+ }
+
+ realProcessToken, err := windows.OpenCurrentProcessToken()
+ if err != nil {
+ t.Fatal(err)
+ }
+ defer realProcessToken.Close()
+ realProcessUser, err := realProcessToken.GetTokenUser()
+ if err != nil {
+ t.Fatal(err)
+ }
+
+ pseudoProcessToken := windows.GetCurrentProcessToken()
+ pseudoProcessUser, err := pseudoProcessToken.GetTokenUser()
+ if err != nil {
+ t.Fatal(err)
+ }
+ if !windows.EqualSid(realProcessUser.User.Sid, pseudoProcessUser.User.Sid) {
+ t.Fatal("The real process token does not have the same as the pseudo process token")
+ }
+
+ runtime.LockOSThread()
+ defer runtime.UnlockOSThread()
+
+ err = windows.RevertToSelf()
+ if err != nil {
+ t.Fatal(err)
+ }
+
+ pseudoThreadToken := windows.GetCurrentThreadToken()
+ _, err = pseudoThreadToken.GetTokenUser()
+ if err != windows.ERROR_NO_TOKEN {
+ t.Fatal("Expected an empty thread token")
+ }
+ pseudoThreadEffectiveToken := windows.GetCurrentThreadEffectiveToken()
+ pseudoThreadEffectiveUser, err := pseudoThreadEffectiveToken.GetTokenUser()
+ if err != nil {
+ t.Fatal(nil)
+ }
+ if !windows.EqualSid(realProcessUser.User.Sid, pseudoThreadEffectiveUser.User.Sid) {
+ t.Fatal("The real process token does not have the same as the pseudo thread effective token, even though we aren't impersonating")
+ }
+
+ err = windows.ImpersonateSelf(windows.SecurityImpersonation)
+ if err != nil {
+ t.Fatal(err)
+ }
+ defer windows.RevertToSelf()
+ pseudoThreadUser, err := pseudoThreadToken.GetTokenUser()
+ if err != nil {
+ t.Fatal(err)
+ }
+ if !windows.EqualSid(realProcessUser.User.Sid, pseudoThreadUser.User.Sid) {
+ t.Fatal("The real process token does not have the same as the pseudo thread token after impersonating self")
+ }
+}
+
+func TestGUID(t *testing.T) {
+ guid, err := windows.GenerateGUID()
+ if err != nil {
+ t.Fatal(err)
+ }
+ if guid.Data1 == 0 && guid.Data2 == 0 && guid.Data3 == 0 && guid.Data4 == [8]byte{} {
+ t.Fatal("Got an all zero GUID, which is overwhelmingly unlikely")
+ }
+ want := fmt.Sprintf("{%08X-%04X-%04X-%04X-%012X}", guid.Data1, guid.Data2, guid.Data3, guid.Data4[:2], guid.Data4[2:])
+ got := guid.String()
+ if got != want {
+ t.Fatalf("String = %q; want %q", got, want)
+ }
+ guid2, err := windows.GUIDFromString(got)
+ if err != nil {
+ t.Fatal(err)
+ }
+ if guid2 != guid {
+ t.Fatalf("Did not parse string back to original GUID = %q; want %q", guid2, guid)
+ }
+ _, err = windows.GUIDFromString("not-a-real-guid")
+ if err != syscall.Errno(windows.CO_E_CLASSSTRING) {
+ t.Fatalf("Bad GUID string error = %v; want CO_E_CLASSSTRING", err)
+ }
+}
+
+func TestKnownFolderPath(t *testing.T) {
+ token, err := windows.OpenCurrentProcessToken()
+ if err != nil {
+ t.Fatal(err)
+ }
+ defer token.Close()
+ profileDir, err := token.GetUserProfileDirectory()
+ if err != nil {
+ t.Fatal(err)
+ }
+ want := filepath.Join(profileDir, "Desktop")
+ got, err := windows.KnownFolderPath(windows.FOLDERID_Desktop, windows.KF_FLAG_DEFAULT)
+ if err != nil {
+ t.Fatal(err)
+ }
+ if want != got {
+ t.Fatalf("Path = %q; want %q", got, want)
+ }
+}
+
+func TestRtlGetVersion(t *testing.T) {
+ version := windows.RtlGetVersion()
+ major, minor, build := windows.RtlGetNtVersionNumbers()
+ // Go is not explictly added to the application compatibility database, so
+ // these two functions should return the same thing.
+ if version.MajorVersion != major || version.MinorVersion != minor || version.BuildNumber != build {
+ t.Fatalf("%d.%d.%d != %d.%d.%d", version.MajorVersion, version.MinorVersion, version.BuildNumber, major, minor, build)
+ }
+}
+
+func TestGetNamedSecurityInfo(t *testing.T) {
+ path, err := windows.GetSystemDirectory()
+ if err != nil {
+ t.Fatal(err)
+ }
+ sd, err := windows.GetNamedSecurityInfo(path, windows.SE_FILE_OBJECT, windows.OWNER_SECURITY_INFORMATION)
+ if err != nil {
+ t.Fatal(err)
+ }
+ if !sd.IsValid() {
+ t.Fatal("Invalid security descriptor")
+ }
+ sdOwner, _, err := sd.Owner()
+ if err != nil {
+ t.Fatal(err)
+ }
+ if !sdOwner.IsValid() {
+ t.Fatal("Invalid security descriptor owner")
+ }
+}
+
+func TestGetSecurityInfo(t *testing.T) {
+ sd, err := windows.GetSecurityInfo(windows.CurrentProcess(), windows.SE_KERNEL_OBJECT, windows.DACL_SECURITY_INFORMATION)
+ if err != nil {
+ t.Fatal(err)
+ }
+ if !sd.IsValid() {
+ t.Fatal("Invalid security descriptor")
+ }
+ sdStr := sd.String()
+ if !strings.HasPrefix(sdStr, "D:(A;") {
+ t.Fatalf("DACL = %q; want D:(A;...", sdStr)
+ }
+}
+
+func TestSddlConversion(t *testing.T) {
+ sd, err := windows.SecurityDescriptorFromString("O:BA")
+ if err != nil {
+ t.Fatal(err)
+ }
+ if !sd.IsValid() {
+ t.Fatal("Invalid security descriptor")
+ }
+ sdOwner, _, err := sd.Owner()
+ if err != nil {
+ t.Fatal(err)
+ }
+ if !sdOwner.IsValid() {
+ t.Fatal("Invalid security descriptor owner")
+ }
+ if !sdOwner.IsWellKnown(windows.WinBuiltinAdministratorsSid) {
+ t.Fatalf("Owner = %q; want S-1-5-32-544", sdOwner)
+ }
+}
+
+func TestBuildSecurityDescriptor(t *testing.T) {
+ const want = "O:SYD:(A;;GA;;;BA)"
+
+ adminSid, err := windows.CreateWellKnownSid(windows.WinBuiltinAdministratorsSid)
+ if err != nil {
+ t.Fatal(err)
+ }
+ systemSid, err := windows.CreateWellKnownSid(windows.WinLocalSystemSid)
+ if err != nil {
+ t.Fatal(err)
+ }
+
+ access := []windows.EXPLICIT_ACCESS{{
+ AccessPermissions: windows.GENERIC_ALL,
+ AccessMode: windows.GRANT_ACCESS,
+ Trustee: windows.TRUSTEE{
+ TrusteeForm: windows.TRUSTEE_IS_SID,
+ TrusteeType: windows.TRUSTEE_IS_GROUP,
+ TrusteeValue: windows.TrusteeValueFromSID(adminSid),
+ },
+ }}
+ owner := &windows.TRUSTEE{
+ TrusteeForm: windows.TRUSTEE_IS_SID,
+ TrusteeType: windows.TRUSTEE_IS_USER,
+ TrusteeValue: windows.TrusteeValueFromSID(systemSid),
+ }
+
+ sd, err := windows.BuildSecurityDescriptor(owner, nil, access, nil, nil)
+ if err != nil {
+ t.Fatal(err)
+ }
+ sd, err = sd.ToAbsolute()
+ if err != nil {
+ t.Fatal(err)
+ }
+ err = sd.SetSACL(nil, false, false)
+ if err != nil {
+ t.Fatal(err)
+ }
+ if got := sd.String(); got != want {
+ t.Fatalf("SD = %q; want %q", got, want)
+ }
+ sd, err = sd.ToSelfRelative()
+ if err != nil {
+ t.Fatal(err)
+ }
+ if got := sd.String(); got != want {
+ t.Fatalf("SD = %q; want %q", got, want)
+ }
+
+ sd, err = windows.NewSecurityDescriptor()
+ if err != nil {
+ t.Fatal(err)
+ }
+ acl, err := windows.ACLFromEntries(access, nil)
+ if err != nil {
+ t.Fatal(err)
+ }
+ err = sd.SetDACL(acl, true, false)
+ if err != nil {
+ t.Fatal(err)
+ }
+ err = sd.SetOwner(systemSid, false)
+ if err != nil {
+ t.Fatal(err)
+ }
+ if got := sd.String(); got != want {
+ t.Fatalf("SD = %q; want %q", got, want)
+ }
+ sd, err = sd.ToSelfRelative()
+ if err != nil {
+ t.Fatal(err)
+ }
+ if got := sd.String(); got != want {
+ t.Fatalf("SD = %q; want %q", got, want)
+ }
+}
+
+func TestGetDiskFreeSpaceEx(t *testing.T) {
+ cwd, err := windows.UTF16PtrFromString(".")
+ if err != nil {
+ t.Fatalf(`failed to call UTF16PtrFromString("."): %v`, err)
+ }
+ var freeBytesAvailableToCaller, totalNumberOfBytes, totalNumberOfFreeBytes uint64
+ if err := windows.GetDiskFreeSpaceEx(cwd, &freeBytesAvailableToCaller, &totalNumberOfBytes, &totalNumberOfFreeBytes); err != nil {
+ t.Fatalf("failed to call GetDiskFreeSpaceEx: %v", err)
+ }
+
+ if freeBytesAvailableToCaller == 0 {
+ t.Errorf("freeBytesAvailableToCaller: got 0; want > 0")
+ }
+ if totalNumberOfBytes == 0 {
+ t.Errorf("totalNumberOfBytes: got 0; want > 0")
+ }
+ if totalNumberOfFreeBytes == 0 {
+ t.Errorf("totalNumberOfFreeBytes: got 0; want > 0")
+ }
+}
+
+func TestGetPreferredUILanguages(t *testing.T) {
+ tab := map[string]func(flags uint32) ([]string, error){
+ "GetProcessPreferredUILanguages": windows.GetProcessPreferredUILanguages,
+ "GetThreadPreferredUILanguages": windows.GetThreadPreferredUILanguages,
+ "GetUserPreferredUILanguages": windows.GetUserPreferredUILanguages,
+ "GetSystemPreferredUILanguages": windows.GetSystemPreferredUILanguages,
+ }
+ for fName, f := range tab {
+ lang, err := f(windows.MUI_LANGUAGE_ID)
+ if err != nil {
+ t.Errorf(`failed to call %v(MUI_LANGUAGE_ID): %v`, fName, err)
+ }
+ for _, l := range lang {
+ _, err := strconv.ParseUint(l, 16, 16)
+ if err != nil {
+ t.Errorf(`%v(MUI_LANGUAGE_ID) returned unexpected LANGID: %v`, fName, l)
+ }
+ }
+
+ lang, err = f(windows.MUI_LANGUAGE_NAME)
+ if err != nil {
+ t.Errorf(`failed to call %v(MUI_LANGUAGE_NAME): %v`, fName, err)
+ }
+ }
+}
+
+func TestProcessWorkingSetSizeEx(t *testing.T) {
+ // Grab a handle to the current process
+ hProcess := windows.CurrentProcess()
+
+ // Allocate memory to store the result of the query
+ var minimumWorkingSetSize, maximumWorkingSetSize uintptr
+
+ // Make the system-call
+ var flag uint32
+ windows.GetProcessWorkingSetSizeEx(hProcess, &minimumWorkingSetSize, &maximumWorkingSetSize, &flag)
+
+ // Set the new limits to the current ones
+ if err := windows.SetProcessWorkingSetSizeEx(hProcess, minimumWorkingSetSize, maximumWorkingSetSize, flag); err != nil {
+ t.Error(err)
+ }
+}
+
+func TestJobObjectInfo(t *testing.T) {
+ jo, err := windows.CreateJobObject(nil, nil)
+ if err != nil {
+ t.Fatalf("CreateJobObject failed: %v", err)
+ }
+ defer windows.CloseHandle(jo)
+
+ var info windows.JOBOBJECT_EXTENDED_LIMIT_INFORMATION
+
+ err = windows.QueryInformationJobObject(jo, windows.JobObjectExtendedLimitInformation,
+ uintptr(unsafe.Pointer(&info)), uint32(unsafe.Sizeof(info)), nil)
+ if err != nil {
+ t.Fatalf("QueryInformationJobObject failed: %v", err)
+ }
+
+ const wantMemLimit = 4 * 1024
+
+ info.BasicLimitInformation.LimitFlags |= windows.JOB_OBJECT_LIMIT_PROCESS_MEMORY
+ info.ProcessMemoryLimit = wantMemLimit
+ _, err = windows.SetInformationJobObject(jo, windows.JobObjectExtendedLimitInformation,
+ uintptr(unsafe.Pointer(&info)), uint32(unsafe.Sizeof(info)))
+ if err != nil {
+ t.Fatalf("SetInformationJobObject failed: %v", err)
+ }
+
+ err = windows.QueryInformationJobObject(jo, windows.JobObjectExtendedLimitInformation,
+ uintptr(unsafe.Pointer(&info)), uint32(unsafe.Sizeof(info)), nil)
+ if err != nil {
+ t.Fatalf("QueryInformationJobObject failed: %v", err)
+ }
+
+ if have := info.ProcessMemoryLimit; wantMemLimit != have {
+ t.Errorf("ProcessMemoryLimit is wrong: want %v have %v", wantMemLimit, have)
+ }
+}
+
+func TestIsWow64Process2(t *testing.T) {
+ var processMachine, nativeMachine uint16
+ err := windows.IsWow64Process2(windows.CurrentProcess(), &processMachine, &nativeMachine)
+ if errors.Is(err, windows.ERROR_PROC_NOT_FOUND) {
+ maj, min, build := windows.RtlGetNtVersionNumbers()
+ if maj < 10 || (maj == 10 && min == 0 && build < 17763) {
+ t.Skip("not available on older versions of Windows")
+ return
+ }
+ }
+ if err != nil {
+ t.Fatalf("IsWow64Process2 failed: %v", err)
+ }
+ if processMachine == pe.IMAGE_FILE_MACHINE_UNKNOWN {
+ processMachine = nativeMachine
+ }
+ switch {
+ case processMachine == pe.IMAGE_FILE_MACHINE_AMD64 && runtime.GOARCH == "amd64":
+ case processMachine == pe.IMAGE_FILE_MACHINE_I386 && runtime.GOARCH == "386":
+ case processMachine == pe.IMAGE_FILE_MACHINE_ARMNT && runtime.GOARCH == "arm":
+ case processMachine == pe.IMAGE_FILE_MACHINE_ARM64 && runtime.GOARCH == "arm64":
+ default:
+ t.Errorf("IsWow64Process2 is wrong: want %v have %v", runtime.GOARCH, processMachine)
+ }
+}
+
+func TestNTStatusString(t *testing.T) {
+ want := "The name limit for the local computer network adapter card was exceeded."
+ got := windows.STATUS_TOO_MANY_NAMES.Error()
+ if want != got {
+ t.Errorf("NTStatus.Error did not return an expected error string - want %q; got %q", want, got)
+ }
+}
+
+func TestNTStatusConversion(t *testing.T) {
+ want := windows.ERROR_TOO_MANY_NAMES
+ got := windows.STATUS_TOO_MANY_NAMES.Errno()
+ if want != got {
+ t.Errorf("NTStatus.Errno = %q (0x%x); want %q (0x%x)", got.Error(), got, want.Error(), want)
+ }
+}
+
+func TestPEBFilePath(t *testing.T) {
+ peb := windows.RtlGetCurrentPeb()
+ if peb == nil || peb.Ldr == nil {
+ t.Error("unable to retrieve PEB with valid Ldr")
+ }
+ var entry *windows.LDR_DATA_TABLE_ENTRY
+ for cur := peb.Ldr.InMemoryOrderModuleList.Flink; cur != &peb.Ldr.InMemoryOrderModuleList; cur = cur.Flink {
+ e := (*windows.LDR_DATA_TABLE_ENTRY)(unsafe.Pointer(uintptr(unsafe.Pointer(cur)) - unsafe.Offsetof(windows.LDR_DATA_TABLE_ENTRY{}.InMemoryOrderLinks)))
+ if e.DllBase == peb.ImageBaseAddress {
+ entry = e
+ break
+ }
+ }
+ if entry == nil {
+ t.Error("unable to find Ldr entry for current process")
+ }
+ osPath, err := os.Executable()
+ if err != nil {
+ t.Errorf("unable to get path to current executable: %v", err)
+ }
+ pebPath := entry.FullDllName.String()
+ if osPath != pebPath {
+ t.Errorf("peb.Ldr.{entry}.FullDllName = %#q; want %#q", pebPath, osPath)
+ }
+ paramPath := peb.ProcessParameters.ImagePathName.String()
+ if osPath != paramPath {
+ t.Errorf("peb.ProcessParameters.ImagePathName.{entry}.ImagePathName = %#q; want %#q", paramPath, osPath)
+ }
+ osCwd, err := os.Getwd()
+ if err != nil {
+ t.Errorf("unable to get working directory: %v", err)
+ }
+ osCwd = filepath.Clean(osCwd)
+ paramCwd := filepath.Clean(peb.ProcessParameters.CurrentDirectory.DosPath.String())
+ if paramCwd != osCwd {
+ t.Errorf("peb.ProcessParameters.CurrentDirectory.DosPath = %#q; want %#q", paramCwd, osCwd)
+ }
+}
+
+func TestResourceExtraction(t *testing.T) {
+ system32, err := windows.GetSystemDirectory()
+ if err != nil {
+ t.Errorf("unable to find system32 directory: %v", err)
+ }
+ cmd, err := windows.LoadLibrary(filepath.Join(system32, "cmd.exe"))
+ if err != nil {
+ t.Errorf("unable to load cmd.exe: %v", err)
+ }
+ defer windows.FreeLibrary(cmd)
+ rsrc, err := windows.FindResource(cmd, windows.CREATEPROCESS_MANIFEST_RESOURCE_ID, windows.RT_MANIFEST)
+ if err != nil {
+ t.Errorf("unable to find cmd.exe manifest resource: %v", err)
+ }
+ manifest, err := windows.LoadResourceData(cmd, rsrc)
+ if err != nil {
+ t.Errorf("unable to load cmd.exe manifest resource data: %v", err)
+ }
+ if !bytes.Contains(manifest, []byte("</assembly>")) {
+ t.Errorf("did not find </assembly> in manifest")
+ }
+}
+
+func TestCommandLineRecomposition(t *testing.T) {
+ const (
+ maxCharsPerArg = 35
+ maxArgsPerTrial = 80
+ doubleQuoteProb = 4
+ singleQuoteProb = 1
+ backSlashProb = 3
+ spaceProb = 1
+ trials = 1000
+ )
+ randString := func(l int) []rune {
+ s := make([]rune, l)
+ for i := range s {
+ s[i] = rand.Int31()
+ }
+ return s
+ }
+ mungeString := func(s []rune, char rune, timesInTen int) {
+ if timesInTen < rand.Intn(10)+1 || len(s) == 0 {
+ return
+ }
+ s[rand.Intn(len(s))] = char
+ }
+ argStorage := make([]string, maxArgsPerTrial+1)
+ for i := 0; i < trials; i++ {
+ args := argStorage[:rand.Intn(maxArgsPerTrial)+2]
+ args[0] = "valid-filename-for-arg0"
+ for j := 1; j < len(args); j++ {
+ arg := randString(rand.Intn(maxCharsPerArg + 1))
+ mungeString(arg, '"', doubleQuoteProb)
+ mungeString(arg, '\'', singleQuoteProb)
+ mungeString(arg, '\\', backSlashProb)
+ mungeString(arg, ' ', spaceProb)
+ args[j] = string(arg)
+ }
+ commandLine := windows.ComposeCommandLine(args)
+ decomposedArgs, err := windows.DecomposeCommandLine(commandLine)
+ if err != nil {
+ t.Errorf("Unable to decompose %#q made from %v: %v", commandLine, args, err)
+ continue
+ }
+ if len(decomposedArgs) != len(args) {
+ t.Errorf("Incorrect decomposition length from %v to %#q to %v", args, commandLine, decomposedArgs)
+ continue
+ }
+ badMatches := make([]int, 0, len(args))
+ for i := range args {
+ if args[i] != decomposedArgs[i] {
+ badMatches = append(badMatches, i)
+ }
+ }
+ if len(badMatches) != 0 {
+ t.Errorf("Incorrect decomposition at indices %v from %v to %#q to %v", badMatches, args, commandLine, decomposedArgs)
+ continue
+ }
+ }
+}
+
+func TestWinVerifyTrust(t *testing.T) {
+ evsignedfile := `.\testdata\ev-signed-file.exe`
+ evsignedfile16, err := windows.UTF16PtrFromString(evsignedfile)
+ if err != nil {
+ t.Fatalf("unable to get utf16 of %s: %v", evsignedfile, err)
+ }
+ data := &windows.WinTrustData{
+ Size: uint32(unsafe.Sizeof(windows.WinTrustData{})),
+ UIChoice: windows.WTD_UI_NONE,
+ RevocationChecks: windows.WTD_REVOKE_NONE, // No revocation checking, in case the tests don't have network connectivity.
+ UnionChoice: windows.WTD_CHOICE_FILE,
+ StateAction: windows.WTD_STATEACTION_VERIFY,
+ FileOrCatalogOrBlobOrSgnrOrCert: unsafe.Pointer(&windows.WinTrustFileInfo{
+ Size: uint32(unsafe.Sizeof(windows.WinTrustFileInfo{})),
+ FilePath: evsignedfile16,
+ }),
+ }
+ verifyErr := windows.WinVerifyTrustEx(windows.InvalidHWND, &windows.WINTRUST_ACTION_GENERIC_VERIFY_V2, data)
+ data.StateAction = windows.WTD_STATEACTION_CLOSE
+ closeErr := windows.WinVerifyTrustEx(windows.InvalidHWND, &windows.WINTRUST_ACTION_GENERIC_VERIFY_V2, data)
+ if verifyErr != nil {
+ t.Errorf("%s did not verify: %v", evsignedfile, verifyErr)
+ }
+ if closeErr != nil {
+ t.Errorf("unable to free verification resources: %v", closeErr)
+ }
+
+ // Now that we've verified the legitimate file verifies, let's corrupt it and see if it correctly fails.
+
+ dir, err := ioutil.TempDir("", "go-build")
+ if err != nil {
+ t.Fatalf("failed to create temp directory: %v", err)
+ }
+ defer os.RemoveAll(dir)
+ corruptedEvsignedfile := filepath.Join(dir, "corrupted-file")
+ evsignedfileBytes, err := ioutil.ReadFile(evsignedfile)
+ if err != nil {
+ t.Fatalf("unable to read %s bytes: %v", evsignedfile, err)
+ }
+ if len(evsignedfileBytes) > 0 {
+ evsignedfileBytes[len(evsignedfileBytes)/2-1]++
+ }
+ err = ioutil.WriteFile(corruptedEvsignedfile, evsignedfileBytes, 0755)
+ if err != nil {
+ t.Fatalf("unable to write corrupted ntoskrnl.exe bytes: %v", err)
+ }
+ evsignedfile16, err = windows.UTF16PtrFromString(corruptedEvsignedfile)
+ if err != nil {
+ t.Fatalf("unable to get utf16 of ntoskrnl.exe: %v", err)
+ }
+ data = &windows.WinTrustData{
+ Size: uint32(unsafe.Sizeof(windows.WinTrustData{})),
+ UIChoice: windows.WTD_UI_NONE,
+ RevocationChecks: windows.WTD_REVOKE_NONE, // No revocation checking, in case the tests don't have network connectivity.
+ UnionChoice: windows.WTD_CHOICE_FILE,
+ StateAction: windows.WTD_STATEACTION_VERIFY,
+ FileOrCatalogOrBlobOrSgnrOrCert: unsafe.Pointer(&windows.WinTrustFileInfo{
+ Size: uint32(unsafe.Sizeof(windows.WinTrustFileInfo{})),
+ FilePath: evsignedfile16,
+ }),
+ }
+ verifyErr = windows.WinVerifyTrustEx(windows.InvalidHWND, &windows.WINTRUST_ACTION_GENERIC_VERIFY_V2, data)
+ data.StateAction = windows.WTD_STATEACTION_CLOSE
+ closeErr = windows.WinVerifyTrustEx(windows.InvalidHWND, &windows.WINTRUST_ACTION_GENERIC_VERIFY_V2, data)
+ if verifyErr != windows.Errno(windows.TRUST_E_BAD_DIGEST) {
+ t.Errorf("%s did not fail to verify as expected: %v", corruptedEvsignedfile, verifyErr)
+ }
+ if closeErr != nil {
+ t.Errorf("unable to free verification resources: %v", closeErr)
+ }
+
+}
+
+func TestProcessModules(t *testing.T) {
+ process, err := windows.GetCurrentProcess()
+ if err != nil {
+ t.Fatalf("unable to get current process: %v", err)
+ }
+ // NB: Assume that we're always the first module. This technically isn't documented anywhere (that I could find), but seems to always hold.
+ var module windows.Handle
+ var cbNeeded uint32
+ err = windows.EnumProcessModules(process, &module, uint32(unsafe.Sizeof(module)), &cbNeeded)
+ if err != nil {
+ t.Fatalf("EnumProcessModules failed: %v", err)
+ }
+
+ var moduleEx windows.Handle
+ err = windows.EnumProcessModulesEx(process, &moduleEx, uint32(unsafe.Sizeof(moduleEx)), &cbNeeded, windows.LIST_MODULES_DEFAULT)
+ if err != nil {
+ t.Fatalf("EnumProcessModulesEx failed: %v", err)
+ }
+ if module != moduleEx {
+ t.Fatalf("module from EnumProcessModules does not match EnumProcessModulesEx: %v != %v", module, moduleEx)
+ }
+
+ exePath, err := os.Executable()
+ if err != nil {
+ t.Fatalf("unable to get current executable path: %v", err)
+ }
+
+ modulePathUTF16 := make([]uint16, len(exePath)+1)
+ err = windows.GetModuleFileNameEx(process, module, &modulePathUTF16[0], uint32(len(modulePathUTF16)))
+ if err != nil {
+ t.Fatalf("GetModuleFileNameEx failed: %v", err)
+ }
+
+ modulePath := windows.UTF16ToString(modulePathUTF16)
+ if modulePath != exePath {
+ t.Fatalf("module does not match executable for GetModuleFileNameEx: %s != %s", modulePath, exePath)
+ }
+
+ err = windows.GetModuleBaseName(process, module, &modulePathUTF16[0], uint32(len(modulePathUTF16)))
+ if err != nil {
+ t.Fatalf("GetModuleBaseName failed: %v", err)
+ }
+
+ modulePath = windows.UTF16ToString(modulePathUTF16)
+ baseExePath := filepath.Base(exePath)
+ if modulePath != baseExePath {
+ t.Fatalf("module does not match executable for GetModuleBaseName: %s != %s", modulePath, baseExePath)
+ }
+
+ var moduleInfo windows.ModuleInfo
+ err = windows.GetModuleInformation(process, module, &moduleInfo, uint32(unsafe.Sizeof(moduleInfo)))
+ if err != nil {
+ t.Fatalf("GetModuleInformation failed: %v", err)
+ }
+
+ peFile, err := pe.Open(exePath)
+ if err != nil {
+ t.Fatalf("unable to open current executable: %v", err)
+ }
+ defer peFile.Close()
+
+ var peSizeOfImage uint32
+ switch runtime.GOARCH {
+ case "amd64", "arm64":
+ peSizeOfImage = peFile.OptionalHeader.(*pe.OptionalHeader64).SizeOfImage
+ case "386", "arm":
+ peSizeOfImage = peFile.OptionalHeader.(*pe.OptionalHeader32).SizeOfImage
+ default:
+ t.Fatalf("unable to test GetModuleInformation on arch %v", runtime.GOARCH)
+ }
+
+ if moduleInfo.SizeOfImage != peSizeOfImage {
+ t.Fatalf("module size does not match executable: %v != %v", moduleInfo.SizeOfImage, peSizeOfImage)
+ }
+}
+
+func TestQueryWorkingSetEx(t *testing.T) {
+ var a int
+
+ process := windows.CurrentProcess()
+ information := windows.PSAPI_WORKING_SET_EX_INFORMATION{
+ VirtualAddress: windows.Pointer(unsafe.Pointer(&a)),
+ }
+ infos := []windows.PSAPI_WORKING_SET_EX_INFORMATION{information}
+
+ cb := uint32(uintptr(len(infos)) * unsafe.Sizeof(infos[0]))
+ if err := windows.QueryWorkingSetEx(process, uintptr(unsafe.Pointer(&infos[0])), cb); err != nil {
+ t.Fatalf("%+v", err)
+ }
+
+ if !infos[0].VirtualAttributes.Valid() {
+ t.Errorf("memory location not valid")
+ }
+}
+
+func TestReadWriteProcessMemory(t *testing.T) {
+ testBuffer := []byte{0xBA, 0xAD, 0xF0, 0x0D}
+
+ process, err := windows.GetCurrentProcess()
+ if err != nil {
+ t.Fatalf("unable to get current process: %v", err)
+ }
+
+ buffer := make([]byte, len(testBuffer))
+ err = windows.ReadProcessMemory(process, uintptr(unsafe.Pointer(&testBuffer[0])), &buffer[0], uintptr(len(buffer)), nil)
+ if err != nil {
+ t.Errorf("ReadProcessMemory failed: %v", err)
+ }
+ if !bytes.Equal(testBuffer, buffer) {
+ t.Errorf("bytes read does not match buffer: 0x%X != 0x%X", testBuffer, buffer)
+ }
+
+ buffer = []byte{0xDE, 0xAD, 0xBE, 0xEF}
+ err = windows.WriteProcessMemory(process, uintptr(unsafe.Pointer(&testBuffer[0])), &buffer[0], uintptr(len(buffer)), nil)
+ if err != nil {
+ t.Errorf("WriteProcessMemory failed: %v", err)
+ }
+ if !bytes.Equal(testBuffer, buffer) {
+ t.Errorf("bytes written does not match buffer: 0x%X != 0x%X", testBuffer, buffer)
+ }
+}
+
+func TestSystemModuleVersions(t *testing.T) {
+ var modules []windows.RTL_PROCESS_MODULE_INFORMATION
+ for bufferSize := uint32(128 * 1024); ; {
+ moduleBuffer := make([]byte, bufferSize)
+ err := windows.NtQuerySystemInformation(windows.SystemModuleInformation, unsafe.Pointer(&moduleBuffer[0]), bufferSize, &bufferSize)
+ switch err {
+ case windows.STATUS_INFO_LENGTH_MISMATCH:
+ continue
+ case nil:
+ break
+ default:
+ t.Error(err)
+ return
+ }
+ mods := (*windows.RTL_PROCESS_MODULES)(unsafe.Pointer(&moduleBuffer[0]))
+ hdr := (*unsafeheader.Slice)(unsafe.Pointer(&modules))
+ hdr.Data = unsafe.Pointer(&mods.Modules[0])
+ hdr.Len = int(mods.NumberOfModules)
+ hdr.Cap = int(mods.NumberOfModules)
+ break
+ }
+ for i := range modules {
+ moduleName := windows.ByteSliceToString(modules[i].FullPathName[modules[i].OffsetToFileName:])
+ driverPath := `\\?\GLOBALROOT` + windows.ByteSliceToString(modules[i].FullPathName[:])
+ var zero windows.Handle
+ infoSize, err := windows.GetFileVersionInfoSize(driverPath, &zero)
+ if err != nil {
+ if err != windows.ERROR_FILE_NOT_FOUND {
+ t.Error(err)
+ }
+ continue
+ }
+ versionInfo := make([]byte, infoSize)
+ err = windows.GetFileVersionInfo(driverPath, 0, infoSize, unsafe.Pointer(&versionInfo[0]))
+ if err != nil && err != windows.ERROR_FILE_NOT_FOUND {
+ t.Error(err)
+ continue
+ }
+ var fixedInfo *windows.VS_FIXEDFILEINFO
+ fixedInfoLen := uint32(unsafe.Sizeof(*fixedInfo))
+ err = windows.VerQueryValue(unsafe.Pointer(&versionInfo[0]), `\`, (unsafe.Pointer)(&fixedInfo), &fixedInfoLen)
+ if err != nil {
+ t.Error(err)
+ continue
+ }
+ t.Logf("%s: v%d.%d.%d.%d", moduleName,
+ (fixedInfo.FileVersionMS>>16)&0xff,
+ (fixedInfo.FileVersionMS>>0)&0xff,
+ (fixedInfo.FileVersionLS>>16)&0xff,
+ (fixedInfo.FileVersionLS>>0)&0xff)
+ }
+}
+
+type fileRenameInformation struct {
+ ReplaceIfExists uint32
+ RootDirectory windows.Handle
+ FileNameLength uint32
+ FileName [1]uint16
+}
+
+func TestNtCreateFileAndNtSetInformationFile(t *testing.T) {
+ var iosb windows.IO_STATUS_BLOCK
+ var allocSize int64 = 0
+ // Open test directory with NtCreateFile.
+ testDirPath := t.TempDir()
+ objectName, err := windows.NewNTUnicodeString("\\??\\" + testDirPath)
+ if err != nil {
+ t.Fatal(err)
+ }
+ oa := &windows.OBJECT_ATTRIBUTES{
+ ObjectName: objectName,
+ }
+ oa.Length = uint32(unsafe.Sizeof(*oa))
+ var testDirHandle windows.Handle
+ err = windows.NtCreateFile(&testDirHandle, windows.FILE_GENERIC_READ|windows.FILE_GENERIC_WRITE, oa, &iosb,
+ &allocSize, 0, windows.FILE_SHARE_READ|windows.FILE_SHARE_WRITE|windows.FILE_SHARE_DELETE, windows.FILE_OPEN,
+ windows.FILE_DIRECTORY_FILE, 0, 0)
+ if err != nil {
+ t.Fatalf("NtCreateFile(%v) failed: %v", testDirPath, err)
+ }
+ defer windows.CloseHandle(testDirHandle)
+ // Create a file in test directory with NtCreateFile.
+ fileName := "filename"
+ filePath := filepath.Join(testDirPath, fileName)
+ objectName, err = windows.NewNTUnicodeString(fileName)
+ if err != nil {
+ t.Fatal(err)
+ }
+ oa.RootDirectory = testDirHandle
+ oa.ObjectName = objectName
+ var fileHandle windows.Handle
+ err = windows.NtCreateFile(&fileHandle, windows.FILE_GENERIC_READ|windows.FILE_GENERIC_WRITE|windows.DELETE, oa, &iosb,
+ &allocSize, 0, windows.FILE_SHARE_READ|windows.FILE_SHARE_WRITE|windows.FILE_SHARE_DELETE, windows.FILE_CREATE,
+ 0, 0, 0)
+ if err != nil {
+ t.Fatalf("NtCreateFile(%v) failed: %v", filePath, err)
+ }
+ defer windows.CloseHandle(fileHandle)
+ _, err = os.Stat(filePath)
+ if err != nil {
+ t.Fatalf("cannot stat file created with NtCreatefile: %v", err)
+ }
+ // Rename file with NtSetInformationFile.
+ newName := "newname"
+ newPath := filepath.Join(testDirPath, newName)
+ newNameUTF16, err := windows.UTF16FromString(newName)
+ if err != nil {
+ t.Fatal(err)
+ }
+ fileNameLen := len(newNameUTF16)*2 - 2
+ var dummyFileRenameInfo fileRenameInformation
+ bufferSize := int(unsafe.Offsetof(dummyFileRenameInfo.FileName)) + fileNameLen
+ buffer := make([]byte, bufferSize)
+ typedBufferPtr := (*fileRenameInformation)(unsafe.Pointer(&buffer[0]))
+ typedBufferPtr.ReplaceIfExists = windows.FILE_RENAME_REPLACE_IF_EXISTS | windows.FILE_RENAME_POSIX_SEMANTICS
+ typedBufferPtr.FileNameLength = uint32(fileNameLen)
+ copy((*[windows.MAX_LONG_PATH]uint16)(unsafe.Pointer(&typedBufferPtr.FileName[0]))[:fileNameLen/2:fileNameLen/2], newNameUTF16)
+ err = windows.NtSetInformationFile(fileHandle, &iosb, &buffer[0], uint32(bufferSize), windows.FileRenameInformation)
+ if err != nil {
+ t.Fatalf("NtSetInformationFile(%v) failed: %v", newPath, err)
+ }
+ _, err = os.Stat(newPath)
+ if err != nil {
+ t.Fatalf("cannot stat rename target %v: %v", newPath, err)
+ }
+}
+
+var deviceClassNetGUID = &windows.GUID{0x4d36e972, 0xe325, 0x11ce, [8]byte{0xbf, 0xc1, 0x08, 0x00, 0x2b, 0xe1, 0x03, 0x18}}
+var deviceInterfaceNetGUID = &windows.GUID{0xcac88484, 0x7515, 0x4c03, [8]byte{0x82, 0xe6, 0x71, 0xa8, 0x7a, 0xba, 0xc3, 0x61}}
+
+func TestListLoadedNetworkDevices(t *testing.T) {
+ devInfo, err := windows.SetupDiGetClassDevsEx(deviceClassNetGUID, "", 0, windows.DIGCF_PRESENT, 0, "")
+ if err != nil {
+ t.Fatal(err)
+ }
+ defer devInfo.Close()
+ for i := 0; ; i++ {
+ devInfoData, err := devInfo.EnumDeviceInfo(i)
+ if err != nil {
+ if err == windows.ERROR_NO_MORE_ITEMS {
+ break
+ }
+ continue
+ }
+ friendlyName, err := devInfo.DeviceRegistryProperty(devInfoData, windows.SPDRP_DEVICEDESC)
+ if err != nil {
+ t.Fatal(err)
+ }
+ var status, problemCode uint32
+ err = windows.CM_Get_DevNode_Status(&status, &problemCode, devInfoData.DevInst, 0)
+ if err != nil || (status&windows.DN_DRIVER_LOADED|windows.DN_STARTED) != windows.DN_DRIVER_LOADED|windows.DN_STARTED {
+ continue
+ }
+ instanceId, err := devInfo.DeviceInstanceID(devInfoData)
+ if err != nil {
+ t.Fatal(err)
+ }
+ interfaces, err := windows.CM_Get_Device_Interface_List(instanceId, deviceInterfaceNetGUID, windows.CM_GET_DEVICE_INTERFACE_LIST_PRESENT)
+ if err != nil || len(interfaces) == 0 {
+ continue
+ }
+ t.Logf("%s - %s", friendlyName, interfaces[0])
+ }
+}
+
+func TestListWireGuardDrivers(t *testing.T) {
+ devInfo, err := windows.SetupDiCreateDeviceInfoListEx(deviceClassNetGUID, 0, "")
+ if err != nil {
+ t.Fatal(err)
+ }
+ defer devInfo.Close()
+ devInfoData, err := devInfo.CreateDeviceInfo("WireGuard", deviceClassNetGUID, "", 0, windows.DICD_GENERATE_ID)
+ if err != nil {
+ t.Fatal(err)
+ }
+ err = devInfo.SetDeviceRegistryProperty(devInfoData, windows.SPDRP_HARDWAREID, []byte("W\x00i\x00r\x00e\x00G\x00u\x00a\x00r\x00d\x00\x00\x00\x00\x00"))
+ if err != nil {
+ t.Fatal(err)
+ }
+ err = devInfo.BuildDriverInfoList(devInfoData, windows.SPDIT_COMPATDRIVER)
+ if err != nil {
+ t.Fatal(err)
+ }
+ defer devInfo.DestroyDriverInfoList(devInfoData, windows.SPDIT_COMPATDRIVER)
+ for i := 0; ; i++ {
+ drvInfoData, err := devInfo.EnumDriverInfo(devInfoData, windows.SPDIT_COMPATDRIVER, i)
+ if err != nil {
+ if err == windows.ERROR_NO_MORE_ITEMS {
+ break
+ }
+ continue
+ }
+ drvInfoDetailData, err := devInfo.DriverInfoDetail(devInfoData, drvInfoData)
+ if err != nil {
+ t.Error(err)
+ continue
+ }
+ t.Logf("%s - %s", drvInfoData.Description(), drvInfoDetailData.InfFileName())
+ }
+}
+
+func TestProcThreadAttributeHandleList(t *testing.T) {
+ const sentinel = "the gopher dance"
+ system32, err := windows.GetSystemDirectory()
+ if err != nil {
+ t.Fatal(err)
+ }
+ executable16, err := windows.UTF16PtrFromString(filepath.Join(system32, "cmd.exe"))
+ if err != nil {
+ t.Fatal(err)
+ }
+ args16, err := windows.UTF16PtrFromString(windows.ComposeCommandLine([]string{"/c", "echo " + sentinel}))
+ if err != nil {
+ t.Fatal(err)
+ }
+ attributeList, err := windows.NewProcThreadAttributeList(1)
+ if err != nil {
+ t.Fatal(err)
+ }
+ defer attributeList.Delete()
+ si := &windows.StartupInfoEx{
+ StartupInfo: windows.StartupInfo{Cb: uint32(unsafe.Sizeof(windows.StartupInfoEx{}))},
+ ProcThreadAttributeList: attributeList.List(),
+ }
+ pipeR, pipeW, err := os.Pipe()
+ if err != nil {
+ t.Fatal(err)
+ }
+ defer pipeR.Close()
+ defer pipeW.Close()
+ func() {
+ // We allocate handles in a closure to provoke a UaF in the case of attributeList.Update being buggy.
+ handles := []windows.Handle{windows.Handle(pipeW.Fd())}
+ attributeList.Update(windows.PROC_THREAD_ATTRIBUTE_HANDLE_LIST, unsafe.Pointer(&handles[0]), uintptr(len(handles))*unsafe.Sizeof(handles[0]))
+ si.Flags |= windows.STARTF_USESTDHANDLES
+ si.StdOutput = handles[0]
+ // Go 1.16's pipe handles aren't inheritable, so mark it explicitly as such here.
+ windows.SetHandleInformation(handles[0], windows.HANDLE_FLAG_INHERIT, windows.HANDLE_FLAG_INHERIT)
+ }()
+ pi := new(windows.ProcessInformation)
+ err = windows.CreateProcess(executable16, args16, nil, nil, true, windows.CREATE_DEFAULT_ERROR_MODE|windows.CREATE_UNICODE_ENVIRONMENT|windows.EXTENDED_STARTUPINFO_PRESENT, nil, nil, &si.StartupInfo, pi)
+ if err != nil {
+ t.Fatal(err)
+ }
+ defer windows.CloseHandle(pi.Thread)
+ defer windows.CloseHandle(pi.Process)
+ pipeR.SetReadDeadline(time.Now().Add(time.Minute))
+ out, _, err := bufio.NewReader(pipeR).ReadLine()
+ if err != nil {
+ t.Fatal(err)
+ }
+ if string(out) != sentinel {
+ t.Fatalf("got %q; want %q", out, sentinel)
+ }
+}