Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

667 lines
18 KiB

/*++
Copyright (c) 2000 Microsoft Corporation
Module Name:
vfgeneric.c
Abstract:
This module handles generic Irp verification.
Author:
Adrian J. Oney (adriao) 20-Apr-1998
Environment:
Kernel mode
Revision History:
AdriaO 06/15/2000 - Seperated out from ntos\io\flunkirp.c
--*/
#include "vfdef.h"
#include "vigeneric.h"
#ifdef ALLOC_PRAGMA
#pragma alloc_text(INIT, VfGenericInit)
#pragma alloc_text(PAGEVRFY, ViGenericDumpIrpStack)
#pragma alloc_text(PAGEVRFY, ViGenericVerifyNewRequest)
#pragma alloc_text(PAGEVRFY, ViGenericVerifyIrpStackDownward)
#pragma alloc_text(PAGEVRFY, ViGenericVerifyIrpStackUpward)
#pragma alloc_text(PAGEVRFY, ViGenericIsValidIrpStatus)
#pragma alloc_text(PAGEVRFY, ViGenericIsNewRequest)
#pragma alloc_text(PAGEVRFY, ViGenericVerifyNewIrp)
#pragma alloc_text(PAGEVRFY, ViGenericVerifyFinalIrpStack)
#pragma alloc_text(PAGEVRFY, ViGenericBuildIrpLogEntry)
#endif
#ifdef ALLOC_DATA_PRAGMA
#pragma const_seg("PAGEVRFC")
#endif
const PCHAR IrpMajorNames[] = {
"IRP_MJ_CREATE", // 0x00
"IRP_MJ_CREATE_NAMED_PIPE", // 0x01
"IRP_MJ_CLOSE", // 0x02
"IRP_MJ_READ", // 0x03
"IRP_MJ_WRITE", // 0x04
"IRP_MJ_QUERY_INFORMATION", // 0x05
"IRP_MJ_SET_INFORMATION", // 0x06
"IRP_MJ_QUERY_EA", // 0x07
"IRP_MJ_SET_EA", // 0x08
"IRP_MJ_FLUSH_BUFFERS", // 0x09
"IRP_MJ_QUERY_VOLUME_INFORMATION", // 0x0a
"IRP_MJ_SET_VOLUME_INFORMATION", // 0x0b
"IRP_MJ_DIRECTORY_CONTROL", // 0x0c
"IRP_MJ_FILE_SYSTEM_CONTROL", // 0x0d
"IRP_MJ_DEVICE_CONTROL", // 0x0e
"IRP_MJ_INTERNAL_DEVICE_CONTROL", // 0x0f
"IRP_MJ_SHUTDOWN", // 0x10
"IRP_MJ_LOCK_CONTROL", // 0x11
"IRP_MJ_CLEANUP", // 0x12
"IRP_MJ_CREATE_MAILSLOT", // 0x13
"IRP_MJ_QUERY_SECURITY", // 0x14
"IRP_MJ_SET_SECURITY", // 0x15
"IRP_MJ_POWER", // 0x16
"IRP_MJ_SYSTEM_CONTROL", // 0x17
"IRP_MJ_DEVICE_CHANGE", // 0x18
"IRP_MJ_QUERY_QUOTA", // 0x19
"IRP_MJ_SET_QUOTA", // 0x1a
"IRP_MJ_PNP", // 0x1b
NULL
};
#define MAX_NAMED_MAJOR_IRPS 0x1b
#ifdef ALLOC_DATA_PRAGMA
#pragma const_seg()
#endif // ALLOC_DATA_PRAGMA
VOID
VfGenericInit(
VOID
)
{
VfMajorRegisterHandlers(
IRP_MJ_ALL_MAJORS,
ViGenericDumpIrpStack,
ViGenericVerifyNewRequest,
ViGenericVerifyIrpStackDownward,
ViGenericVerifyIrpStackUpward,
NULL,
NULL,
ViGenericIsValidIrpStatus,
ViGenericIsNewRequest,
ViGenericVerifyNewIrp,
ViGenericVerifyFinalIrpStack,
NULL,
ViGenericBuildIrpLogEntry
);
}
VOID
FASTCALL
ViGenericDumpIrpStack(
IN PIO_STACK_LOCATION IrpSp
)
{
if ((IrpSp->MajorFunction==IRP_MJ_INTERNAL_DEVICE_CONTROL)&&(IrpSp->MinorFunction == IRP_MN_SCSI_CLASS)) {
DbgPrint("IRP_MJ_SCSI");
} else if (IrpSp->MajorFunction<=MAX_NAMED_MAJOR_IRPS) {
DbgPrint(IrpMajorNames[IrpSp->MajorFunction]);
} else if (IrpSp->MajorFunction==0xFF) {
DbgPrint("IRP_MJ_BOGUS");
} else {
DbgPrint("IRP_MJ_??");
}
}
VOID
FASTCALL
ViGenericVerifyNewRequest(
IN PIOV_REQUEST_PACKET IovPacket,
IN PDEVICE_OBJECT DeviceObject,
IN PIO_STACK_LOCATION IrpLastSp OPTIONAL,
IN PIO_STACK_LOCATION IrpSp,
IN PIOV_STACK_LOCATION StackLocationData,
IN PVOID CallerAddress OPTIONAL
)
{
UNREFERENCED_PARAMETER (DeviceObject);
UNREFERENCED_PARAMETER (IrpLastSp);
UNREFERENCED_PARAMETER (StackLocationData);
if (!VfSettingsIsOptionEnabled(IovPacket->VerifierSettings, VERIFIER_OPTION_PROTECT_RESERVED_IRPS)) {
return;
}
if ((IovPacket->Flags&TRACKFLAG_IO_ALLOCATED)&&
(!(IovPacket->Flags&TRACKFLAG_WATERMARKED))) {
if (VfMajorIsSystemRestrictedIrp(IrpSp)) {
//
// We've caught somebody initiating an IRP they shouldn't be sending!
//
WDM_FAIL_ROUTINE((
DCERROR_RESTRICTED_IRP,
DCPARAM_IRP + DCPARAM_ROUTINE,
CallerAddress,
IovPacket->TrackedIrp
));
}
}
}
VOID
FASTCALL
ViGenericVerifyIrpStackDownward(
IN PIOV_REQUEST_PACKET IovPacket,
IN PDEVICE_OBJECT DeviceObject,
IN PIO_STACK_LOCATION IrpLastSp OPTIONAL,
IN PIO_STACK_LOCATION IrpSp,
IN PIOV_STACK_LOCATION RequestHeadLocationData,
IN PIOV_STACK_LOCATION StackLocationData,
IN PVOID CallerAddress OPTIONAL
)
{
PIRP irp = IovPacket->TrackedIrp;
NTSTATUS currentStatus, lastStatus;
BOOLEAN newRequest, statusChanged, infoChanged, firstRequest;
PIOV_SESSION_DATA iovSessionData;
UNREFERENCED_PARAMETER (DeviceObject);
UNREFERENCED_PARAMETER (StackLocationData);
currentStatus = irp->IoStatus.Status;
lastStatus = RequestHeadLocationData->LastStatusBlock.Status;
statusChanged = (BOOLEAN)(currentStatus != lastStatus);
infoChanged = (BOOLEAN)(irp->IoStatus.Information != RequestHeadLocationData->LastStatusBlock.Information);
firstRequest = (BOOLEAN)((RequestHeadLocationData->Flags&STACKFLAG_FIRST_REQUEST) != 0);
iovSessionData = VfPacketGetCurrentSessionData(IovPacket);
//
// Do we have a "new" function to process?
//
newRequest = VfMajorIsNewRequest(IrpLastSp, IrpSp);
//
// Verify IRQL's are legal
//
switch(IrpSp->MajorFunction) {
case IRP_MJ_POWER:
case IRP_MJ_READ:
case IRP_MJ_WRITE:
case IRP_MJ_DEVICE_CONTROL:
case IRP_MJ_INTERNAL_DEVICE_CONTROL:
break;
default:
if (iovSessionData->ForwardMethod != FORWARDED_TO_NEXT_DO) {
break;
}
if ((IovPacket->DepartureIrql >= DISPATCH_LEVEL) &&
(!(IovPacket->Flags & TRACKFLAG_PASSED_AT_BAD_IRQL))) {
WDM_FAIL_ROUTINE((
DCERROR_DISPATCH_CALLED_AT_BAD_IRQL,
DCPARAM_IRP + DCPARAM_ROUTINE,
CallerAddress,
irp
));
IovPacket->Flags |= TRACKFLAG_PASSED_AT_BAD_IRQL;
}
}
//
// The following is only executed if we are not a new IRP...
//
if (IrpLastSp == NULL) {
return;
}
//
// Let's verify bogus IRPs haven't been touched...
//
if ((IovPacket->Flags&TRACKFLAG_BOGUS) &&
(!(RequestHeadLocationData->Flags&STACKFLAG_BOGUS_IRP_TOUCHED))) {
if (newRequest && (!firstRequest)) {
RequestHeadLocationData->Flags |= STACKFLAG_BOGUS_IRP_TOUCHED;
WDM_FAIL_ROUTINE((
DCERROR_BOGUS_FUNC_TRASHED,
DCPARAM_IRP + DCPARAM_ROUTINE,
CallerAddress,
irp
));
}
if (statusChanged) {
RequestHeadLocationData->Flags |= STACKFLAG_BOGUS_IRP_TOUCHED;
if (IrpSp->MinorFunction == 0xFF) {
WDM_FAIL_ROUTINE((
DCERROR_BOGUS_MINOR_STATUS_TRASHED,
DCPARAM_IRP + DCPARAM_ROUTINE,
CallerAddress,
irp
));
} else {
WDM_FAIL_ROUTINE((
DCERROR_BOGUS_STATUS_TRASHED,
DCPARAM_IRP + DCPARAM_ROUTINE,
CallerAddress,
irp
));
}
}
if (infoChanged) {
RequestHeadLocationData->Flags |= STACKFLAG_BOGUS_IRP_TOUCHED;
WDM_FAIL_ROUTINE((
DCERROR_BOGUS_INFO_TRASHED,
DCPARAM_IRP + DCPARAM_ROUTINE,
CallerAddress,
irp
));
}
}
if (!VfMajorIsValidIrpStatus(IrpSp, currentStatus)) {
WDM_FAIL_ROUTINE((
DCERROR_INVALID_STATUS,
DCPARAM_IRP + DCPARAM_ROUTINE,
CallerAddress,
irp
));
}
}
VOID
FASTCALL
ViGenericVerifyIrpStackUpward(
IN PIOV_REQUEST_PACKET IovPacket,
IN PIO_STACK_LOCATION IrpSp,
IN PIOV_STACK_LOCATION RequestHeadLocationData,
IN PIOV_STACK_LOCATION StackLocationData,
IN BOOLEAN IsNewlyCompleted,
IN BOOLEAN RequestFinalized
)
{
PIRP irp;
NTSTATUS currentStatus;
BOOLEAN statusChanged, infoChanged;
PVOID routine;
UNREFERENCED_PARAMETER (IsNewlyCompleted);
UNREFERENCED_PARAMETER (RequestFinalized);
irp = IovPacket->TrackedIrp;
currentStatus = irp->IoStatus.Status;
//
// Who'd we call for this one?
//
routine = StackLocationData->LastDispatch;
ASSERT(routine) ;
//
// Did they touch something stupid?
//
if ((IovPacket->Flags&TRACKFLAG_BOGUS) &&
(!(RequestHeadLocationData->Flags&STACKFLAG_BOGUS_IRP_TOUCHED))) {
statusChanged = (BOOLEAN)(currentStatus != RequestHeadLocationData->LastStatusBlock.Status);
if (statusChanged) {
RequestHeadLocationData->Flags |= STACKFLAG_BOGUS_IRP_TOUCHED;
if (IrpSp->MinorFunction == 0xFF) {
WDM_FAIL_ROUTINE((
DCERROR_BOGUS_MINOR_STATUS_TRASHED,
DCPARAM_IRP + DCPARAM_ROUTINE,
routine,
irp
));
} else {
WDM_FAIL_ROUTINE((
DCERROR_BOGUS_STATUS_TRASHED,
DCPARAM_IRP + DCPARAM_ROUTINE,
routine,
irp
));
}
}
infoChanged = (BOOLEAN)(irp->IoStatus.Information != RequestHeadLocationData->LastStatusBlock.Information);
if (infoChanged) {
RequestHeadLocationData->Flags |= STACKFLAG_BOGUS_IRP_TOUCHED;
WDM_FAIL_ROUTINE((
DCERROR_BOGUS_INFO_TRASHED,
DCPARAM_IRP + DCPARAM_ROUTINE,
routine,
irp
));
}
}
if (!VfMajorIsValidIrpStatus(IrpSp, currentStatus)) {
WDM_FAIL_ROUTINE(
(DCERROR_INVALID_STATUS, DCPARAM_IRP + DCPARAM_ROUTINE, routine, irp)
);
}
//
// Check for leaked Cancel routines.
//
if (irp->CancelRoutine) {
if (VfSettingsIsOptionEnabled(IovPacket->VerifierSettings, VERIFIER_OPTION_VERIFY_CANCEL_LOGIC)) {
WDM_FAIL_ROUTINE((
DCERROR_CANCELROUTINE_AFTER_COMPLETION,
DCPARAM_IRP + DCPARAM_ROUTINE,
routine,
irp
));
}
}
}
BOOLEAN
FASTCALL
ViGenericIsValidIrpStatus(
IN PIO_STACK_LOCATION IrpSp,
IN NTSTATUS Status
)
/*++
Description:
As per the title, this function determines whether an IRP status is
valid or probably random trash. See NTStatus.h for info on how status
codes break down...
Returns:
TRUE iff IRP status looks to be valid. FALSE otherwise.
--*/
{
ULONG severity;
ULONG customer;
ULONG reserved;
ULONG facility;
ULONG code;
ULONG lanManClass;
UNREFERENCED_PARAMETER (IrpSp);
severity = (((ULONG)Status) >> 30)&3;
customer = (((ULONG)Status) >> 29)&1;
reserved = (((ULONG)Status) >> 28)&1;
facility = (((ULONG)Status) >> 16)&0xFFF;
code = (((ULONG)Status) & 0xFFFF);
//
// If reserved set, definitely bogus...
//
if (reserved) {
return FALSE;
}
//
// Is this a microsoft defined return code? If not, do no checking.
//
if (customer) {
return TRUE;
}
//
// ADRIAO N.B. 10/04/1999 -
// The current methodology for doling out error codes appears to be
// fairly chaotic. The primary kernel mode status codes are defined in
// ntstatus.h. However, rtl\generr.c should also be consulted to see which
// error codes can bubble up to user mode. Many OLE error codes from
// winerror.h are now being used within the kernel itself.
//
if (facility < 0x20) {
//
// Facilities under 20 are currently legal.
//
switch(severity) {
case STATUS_SEVERITY_SUCCESS:
return (BOOLEAN)(code < 0x200);
case STATUS_SEVERITY_INFORMATIONAL:
//
// ADRIAO N.B. 06/27/2000
// This test could be tighter (a little over 0x50)
//
return (BOOLEAN)(code < 0x400);
case STATUS_SEVERITY_WARNING:
//
// FACILITY_WIN32 is 7. All Win32 codes are valid.
//
return (BOOLEAN) ((facility == 7) || (code < 0x400));
case STATUS_SEVERITY_ERROR:
break;
}
//
// Why the heck does WOW use such an odd error code?
//
return (BOOLEAN)((code < 0x500)||(code == 0x9898));
} else if (facility == 0x98) {
//
// This is the lan manager service. In the case on Lan Man, the code
// field is further subdivided into a class field.
//
lanManClass = code >> 12;
code &= 0xFFF;
//
// Do no testing here.
//
return TRUE;
} else {
//
// Not known, probably bogus.
//
return FALSE;
}
}
BOOLEAN
FASTCALL
ViGenericIsNewRequest(
IN PIO_STACK_LOCATION IrpLastSp OPTIONAL,
IN PIO_STACK_LOCATION IrpSp
)
/*++
Description:
Determines whether the two Irp stacks refer to the same "request",
ie starting the same device, etc. This is used to detect whether an IRP
has been simply forwarded or rather the IRP has been reused to initiate
a new request.
Arguments:
The two IRP stacks to compare.
N.B. - the device object is not currently part of those IRP stacks.
Return Value:
TRUE if the stacks represent the same request, FALSE otherwise.
--*/
{
return (BOOLEAN)((IrpLastSp==NULL)||
(IrpSp->MajorFunction != IrpLastSp->MajorFunction) ||
(IrpSp->MinorFunction != IrpLastSp->MinorFunction));
}
VOID
FASTCALL
ViGenericVerifyNewIrp(
IN PIOV_REQUEST_PACKET IovPacket,
IN PIRP Irp,
IN PIO_STACK_LOCATION IrpSp,
IN PIOV_STACK_LOCATION StackLocationData,
IN PVOID CallerAddress OPTIONAL
)
{
LONG index;
PIO_STACK_LOCATION irpSp;
BOOLEAN queuesApc;
UNREFERENCED_PARAMETER (IrpSp);
UNREFERENCED_PARAMETER (StackLocationData);
if (Irp->UserIosb || Irp->UserEvent) {
//
// We have an IRP with user buffer data. This kind of IRP must be
// initiated at PASSIVE_LEVEL lest the APC that signals the event gets
// held up by fast mutex.
//
queuesApc = (BOOLEAN)
(!((Irp->Flags & (IRP_PAGING_IO | IRP_CLOSE_OPERATION)) &&
(Irp->Flags & (IRP_SYNCHRONOUS_PAGING_IO | IRP_CLOSE_OPERATION))));
if (queuesApc) {
//
// The caller may be using the UserIosb for storage, and may really
// free the IRP in a completion routine. Look for one now.
//
irpSp = IoGetNextIrpStackLocation(Irp);
for(index = Irp->CurrentLocation-1;
index <= Irp->StackCount;
index++) {
if (irpSp->CompletionRoutine != NULL) {
queuesApc = FALSE;
break;
}
irpSp++;
}
}
if (queuesApc && (IovPacket->DepartureIrql > PASSIVE_LEVEL)) {
WDM_FAIL_ROUTINE((
DCERROR_DISPATCH_CALLED_AT_BAD_IRQL,
DCPARAM_IRP + DCPARAM_ROUTINE,
CallerAddress,
Irp
));
}
}
}
VOID
FASTCALL
ViGenericVerifyFinalIrpStack(
IN PIOV_REQUEST_PACKET IovPacket,
IN PIO_STACK_LOCATION IrpSp
)
{
UNREFERENCED_PARAMETER(IovPacket);
UNREFERENCED_PARAMETER(IrpSp);
ASSERT(!IovPacket->RefTrackingCount);
}
LOGICAL
FASTCALL
ViGenericBuildIrpLogEntry(
IN PIRP Irp,
IN ULONG CurrentCount,
IN PIRPLOG_SNAPSHOT CurrentEntryArray,
OUT PIRPLOG_SNAPSHOT IrpSnapshot
)
{
PIO_STACK_LOCATION irpSp;
UNREFERENCED_PARAMETER(CurrentCount);
UNREFERENCED_PARAMETER(CurrentEntryArray);
irpSp = IoGetNextIrpStackLocation(Irp);
switch(irpSp->MajorFunction) {
case IRP_MJ_DEVICE_CONTROL:
IrpSnapshot->Count = 1;
IrpSnapshot->MajorFunction = irpSp->MajorFunction;
IrpSnapshot->MinorFunction = irpSp->MinorFunction;
IrpSnapshot->Flags = irpSp->Flags;
IrpSnapshot->Control = irpSp->Control;
IrpSnapshot->ArgArray[0] = (ULONGLONG) irpSp->Parameters.Others.Argument1;
IrpSnapshot->ArgArray[1] = (ULONGLONG) irpSp->Parameters.Others.Argument2;
IrpSnapshot->ArgArray[2] = (ULONGLONG) irpSp->Parameters.Others.Argument3;
IrpSnapshot->ArgArray[3] = (ULONGLONG) irpSp->Parameters.Others.Argument4;
return TRUE;
default:
return FALSE;
}
}