* PROJECT: ReactOS kernel-mode tests
* LICENSE: GPLv2+ - See COPYING in the top level directory
* PURPOSE: Kernel-Mode Test Suite Exception test
- * PROGRAMMER: Thomas Faber <thfabba@gmx.de>
+ * PROGRAMMER: Thomas Faber <thomas.faber@reactos.org>
*/
#include <kmt_test.h>
START_TEST(RtlException)
{
- NTSTATUS ExceptionStatus;
PCHAR Buffer[128];
- CHAR Value;
/* Access a valid pointer - must not trigger SEH */
KmtStartSeh()
/* Read from a NULL pointer - must cause an access violation */
KmtStartSeh()
- Value = *(volatile CHAR *)NULL;
+ (void)*(volatile CHAR *)NULL;
KmtEndSeh(STATUS_ACCESS_VIOLATION);
/* Write to a NULL pointer - must cause an access violation */
#if 0 //def KMT_KERNEL_MODE
/* Read from MmBadPointer - must cause an access violation */
KmtStartSeh()
- Value = *(volatile CHAR *)MmBadPointer;
+ (void)*(volatile CHAR *)MmBadPointer;
KmtEndSeh(STATUS_ACCESS_VIOLATION);
/* Write to MmBadPointer - must cause an access violation */
/* We cannot test this in kernel mode easily - the stack is just "somewhere"
* in system space, and there's no guard page below it */
+#if CORE_6640_IS_FIXED
#ifdef KMT_USER_MODE
/* Overflow the stack - must cause a special exception */
KmtStartSeh()
}
KmtEndSeh(STATUS_STACK_OVERFLOW);
#endif
+#endif /* CORE_6640_IS_FIXED */
}