Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

3323 lines
88 KiB

/*++
Copyright (c) 1989 Microsoft Corporation
Module Name:
obhandle.c
Abstract:
Object handle routines
Author:
Steve Wood (stevewo) 31-Mar-1989
Revision History:
--*/
#include "obp.h"
//
// Define logical sum of all generic accesses.
//
#define GENERIC_ACCESS (GENERIC_READ | GENERIC_WRITE | GENERIC_EXECUTE | GENERIC_ALL)
//
// Define the mask for the trace index. The last bit is used for
// OBJ_PROTECT_CLOSE bit
//
#define OBP_CREATOR_BACKTRACE_LIMIT 0x7fff
#define OBP_CREATOR_BACKTRACE_INDEX_MASK OBP_CREATOR_BACKTRACE_LIMIT
//
// Define local prototypes
//
NTSTATUS
ObpIncrementHandleDataBase (
IN POBJECT_HEADER ObjectHeader,
IN PEPROCESS Process,
OUT PULONG NewProcessHandleCount
);
NTSTATUS
ObpCaptureHandleInformation (
IN OUT PSYSTEM_HANDLE_TABLE_ENTRY_INFO *HandleEntryInfo,
IN HANDLE UniqueProcessId,
IN PVOID HandleTableEntry,
IN HANDLE HandleIndex,
IN ULONG Length,
IN OUT PULONG RequiredLength
);
NTSTATUS
ObpCaptureHandleInformationEx (
IN OUT PSYSTEM_HANDLE_TABLE_ENTRY_INFO_EX *HandleEntryInfo,
IN HANDLE UniqueProcessId,
IN PHANDLE_TABLE_ENTRY ObjectTableEntry,
IN HANDLE HandleIndex,
IN ULONG Length,
IN OUT PULONG RequiredLength
);
USHORT
ObpComputeGrantedAccessIndex (
ACCESS_MASK GrantedAccess
);
ACCESS_MASK
ObpTranslateGrantedAccessIndex (
USHORT GrantedAccessIndex
);
USHORT
RtlLogUmodeStackBackTrace(
VOID
);
#ifdef ALLOC_PRAGMA
#pragma alloc_text(PAGE,NtDuplicateObject)
#pragma alloc_text(PAGE,ObGetHandleInformation)
#pragma alloc_text(PAGE,ObGetHandleInformationEx)
#pragma alloc_text(PAGE,ObpCaptureHandleInformation)
#pragma alloc_text(PAGE,ObpCaptureHandleInformationEx)
#pragma alloc_text(PAGE,ObpIncrementHandleDataBase)
#pragma alloc_text(PAGE,ObpInsertHandleCount)
#pragma alloc_text(PAGE,ObpIncrementHandleCount)
#pragma alloc_text(PAGE,ObpIncrementUnnamedHandleCount)
#pragma alloc_text(PAGE,ObpChargeQuotaForObject)
#pragma alloc_text(PAGE,ObpDecrementHandleCount)
#pragma alloc_text(PAGE,ObpCreateHandle)
#pragma alloc_text(PAGE,ObpCreateUnnamedHandle)
#pragma alloc_text(PAGE,ObpValidateDesiredAccess)
#pragma alloc_text(PAGE,ObDuplicateObject)
#pragma alloc_text(PAGE,ObReferenceProcessHandleTable)
#pragma alloc_text(PAGE,ObDereferenceProcessHandleTable)
#pragma alloc_text(PAGE,ObpComputeGrantedAccessIndex)
#pragma alloc_text(PAGE,ObpTranslateGrantedAccessIndex)
#pragma alloc_text(PAGE,ObGetProcessHandleCount)
#endif
PHANDLE_TABLE
ObReferenceProcessHandleTable (
PEPROCESS SourceProcess
)
/*++
Routine Description:
This function allows safe cross process handle table references. Table deletion
at process exit waits for all outstanding references to finish. Once the table
is marked deleted further references are denied byt this funtion.
Arguments:
SourceProcesss - Process whose handle table is to be referenced
Return Value:
Referenced handle table or NULL if the processes handle table has been or is in the
process of being deleted.
--*/
{
PHANDLE_TABLE ObjectTable;
ObjectTable = NULL;
if (ExAcquireRundownProtection (&SourceProcess->RundownProtect)) {
ObjectTable = SourceProcess->ObjectTable;
if (ObjectTable == NULL) {
ExReleaseRundownProtection (&SourceProcess->RundownProtect);
}
}
return ObjectTable;
}
VOID
ObDereferenceProcessHandleTable (
PEPROCESS SourceProcess
)
/*++
Routine Description:
This function removes the outstanding reference obtained via ObReferenceProcessHandleTable.
Arguments:
ObjectTable - Handle table to dereference
Return Value:
None.
--*/
{
ExReleaseRundownProtection (&SourceProcess->RundownProtect);
}
ULONG
ObGetProcessHandleCount (
PEPROCESS Process
)
/*++
Routine Description:
This function returns the total number of open handles for a process.
Arguments:
Process - Process whose handle table is to be queried.
Return Value:
Count of open handles.
--*/
{
PHANDLE_TABLE HandleTable;
ULONG HandleCount;
HandleTable = ObReferenceProcessHandleTable (Process);
if ( HandleTable ) {
HandleCount = HandleTable->HandleCount;
ObDereferenceProcessHandleTable (Process);
} else {
HandleCount = 0;
}
return HandleCount;
}
NTSTATUS
ObDuplicateObject (
IN PEPROCESS SourceProcess,
IN HANDLE SourceHandle,
IN PEPROCESS TargetProcess OPTIONAL,
OUT PHANDLE TargetHandle OPTIONAL,
IN ACCESS_MASK DesiredAccess,
IN ULONG HandleAttributes,
IN ULONG Options,
IN KPROCESSOR_MODE PreviousMode
)
/*++
Routine Description:
This function creates a handle that is a duplicate of the specified
source handle. The source handle is evaluated in the context of the
specified source process. The calling process must have
PROCESS_DUP_HANDLE access to the source process. The duplicate
handle is created with the specified attributes and desired access.
The duplicate handle is created in the handle table of the specified
target process. The calling process must have PROCESS_DUP_HANDLE
access to the target process.
Arguments:
SourceProcess - Supplies a pointer to the source process for the
handle being duplicated
SourceHandle - Supplies the handle being duplicated
TargetProcess - Optionally supplies a pointer to the target process
that is to receive the new handle
TargetHandle - Optionally returns a the new duplicated handle
DesiredAccess - Desired access for the new handle
HandleAttributes - Desired attributes for the new handle
Options - Duplication options that control things like close source,
same access, and same attributes.
PreviousMode - Mode of caller
Return Value:
NTSTATUS - Status pf call
--*/
{
NTSTATUS Status;
PVOID SourceObject;
POBJECT_HEADER ObjectHeader;
POBJECT_TYPE ObjectType;
BOOLEAN Attached;
PHANDLE_TABLE SourceObjectTable, TargetObjectTable;
HANDLE_TABLE_ENTRY ObjectTableEntry;
OBJECT_HANDLE_INFORMATION HandleInformation;
HANDLE NewHandle;
ACCESS_STATE AccessState;
AUX_ACCESS_DATA AuxData;
ACCESS_MASK SourceAccess;
ACCESS_MASK TargetAccess;
ACCESS_MASK AuditMask = (ACCESS_MASK)0;
PACCESS_STATE PassedAccessState = NULL;
HANDLE_TABLE_ENTRY_INFO ObjectInfo;
KAPC_STATE ApcState;
if (ARGUMENT_PRESENT (TargetHandle)) {
*TargetHandle = NULL;
}
//
// If the caller is not asking for the same access then
// validate the access they are requesting doesn't contain
// any bad bits
//
if (!(Options & DUPLICATE_SAME_ACCESS)) {
Status = ObpValidateDesiredAccess( DesiredAccess );
if (!NT_SUCCESS( Status )) {
return( Status );
}
}
//
// The Attached variable indicates if we needed to
// attach to the source process because it was not the
// current process.
//
Attached = FALSE;
//
// Lock down access to the process object tables
//
SourceObjectTable = ObReferenceProcessHandleTable (SourceProcess);
//
// Make sure the source process has an object table still
//
if ( SourceObjectTable == NULL ) {
return STATUS_PROCESS_IS_TERMINATING;
}
//
// The the input source handle get a pointer to the
// source object itself, then detach from the process
// if necessary and check if we were given a good
// source handle.
//
Status = ObpReferenceProcessObjectByHandle (SourceHandle,
SourceProcess,
SourceObjectTable,
PreviousMode,
&SourceObject,
&HandleInformation,
&AuditMask);
if (NT_SUCCESS( Status )) {
if ((HandleInformation.HandleAttributes & OBJ_AUDIT_OBJECT_CLOSE) == 0) {
AuditMask = 0;
}
}
if (!NT_SUCCESS( Status )) {
ObDereferenceProcessHandleTable (SourceProcess);
return( Status );
}
//
// We are all done if no target process handle was specified.
// This is practially a noop because the only really end result
// could be that we've closed the source handle.
//
if (!ARGUMENT_PRESENT( TargetProcess )) {
//
// If no TargetProcessHandle, then only possible option is to close
// the source handle in the context of the source process.
//
if (!(Options & DUPLICATE_CLOSE_SOURCE)) {
Status = STATUS_INVALID_PARAMETER;
}
if (Options & DUPLICATE_CLOSE_SOURCE) {
KeStackAttachProcess( &SourceProcess->Pcb, &ApcState );
NtClose( SourceHandle );
KeUnstackDetachProcess (&ApcState);
}
ObDereferenceProcessHandleTable (SourceProcess);
ObDereferenceObject( SourceObject );
return( Status );
}
SourceAccess = HandleInformation.GrantedAccess;
//
// Make sure the target process has not exited
//
TargetObjectTable = ObReferenceProcessHandleTable (TargetProcess);
if ( TargetObjectTable == NULL ) {
if (Options & DUPLICATE_CLOSE_SOURCE) {
KeStackAttachProcess( &SourceProcess->Pcb, &ApcState );
NtClose( SourceHandle );
KeUnstackDetachProcess (&ApcState);
}
ObDereferenceProcessHandleTable (SourceProcess);
ObDereferenceObject( SourceObject );
return STATUS_PROCESS_IS_TERMINATING;
}
//
// If the specified target process is not the current process, attach
// to the specified target process.
//
if (PsGetCurrentProcess() != TargetProcess) {
KeStackAttachProcess( &TargetProcess->Pcb, &ApcState );
Attached = TRUE;
}
//
// Construct the proper desired access and attributes for the new handle
//
if (Options & DUPLICATE_SAME_ACCESS) {
DesiredAccess = SourceAccess;
}
if (Options & DUPLICATE_SAME_ATTRIBUTES) {
HandleAttributes = HandleInformation.HandleAttributes;
} else {
//
// Always propogate auditing information.
//
HandleAttributes |= HandleInformation.HandleAttributes & OBJ_AUDIT_OBJECT_CLOSE;
}
//
// Get the object header for the source object
//
ObjectHeader = OBJECT_TO_OBJECT_HEADER( SourceObject );
ObjectType = ObjectHeader->Type;
RtlZeroMemory( &ObjectTableEntry, sizeof( HANDLE_TABLE_ENTRY ) );
ObjectTableEntry.Object = ObjectHeader;
ObjectTableEntry.ObAttributes |= (HandleAttributes & OBJ_HANDLE_ATTRIBUTES);
//
// The following will be reset below if AVR is performed.
//
ObjectInfo.AuditMask = AuditMask;
//
// If any of the generic access bits are specified then map those to more
// specific access bits
//
if ((DesiredAccess & GENERIC_ACCESS) != 0) {
RtlMapGenericMask( &DesiredAccess,
&ObjectType->TypeInfo.GenericMapping );
}
//
// Make sure to preserve ACCESS_SYSTEM_SECURITY, which most likely is not
// found in the ValidAccessMask
//
TargetAccess = DesiredAccess &
(ObjectType->TypeInfo.ValidAccessMask | ACCESS_SYSTEM_SECURITY);
//
// If the access requested for the target is a superset of the
// access allowed in the source, perform full AVR. If it is a
// subset or equal, do not perform any access validation.
//
// Do not allow superset access if object type has a private security
// method, as there is no means to call them in this case to do the
// access check.
//
// If the AccessState is not passed to ObpIncrementHandleCount
// there will be no AVR.
//
if (TargetAccess & ~SourceAccess) {
if (ObjectType->TypeInfo.SecurityProcedure == SeDefaultObjectMethod) {
Status = SeCreateAccessState( &AccessState,
&AuxData,
TargetAccess, // DesiredAccess
&ObjectType->TypeInfo.GenericMapping );
PassedAccessState = &AccessState;
} else {
Status = STATUS_ACCESS_DENIED;
}
} else {
//
// Do not perform AVR
//
PassedAccessState = NULL;
Status = STATUS_SUCCESS;
}
//
// Increment the new handle count and get a pointer to
// the target processes object table
//
if ( NT_SUCCESS( Status )) {
Status = ObpIncrementHandleCount( ObDuplicateHandle,
PsGetCurrentProcess(), // this is already the target process
SourceObject,
ObjectType,
PassedAccessState,
PreviousMode,
HandleAttributes );
}
if (Attached) {
KeUnstackDetachProcess (&ApcState);
Attached = FALSE;
}
if (Options & DUPLICATE_CLOSE_SOURCE) {
KeStackAttachProcess( &SourceProcess->Pcb, &ApcState );
NtClose( SourceHandle );
KeUnstackDetachProcess(&ApcState);
}
if (!NT_SUCCESS( Status )) {
if (PassedAccessState != NULL) {
SeDeleteAccessState( PassedAccessState );
}
ObDereferenceProcessHandleTable (SourceProcess);
ObDereferenceProcessHandleTable (TargetProcess);
ObDereferenceObject( SourceObject );
return( Status );
}
if ((PassedAccessState != NULL) && (PassedAccessState->GenerateOnClose == TRUE)) {
//
// If we performed AVR opening the handle, then mark the handle as needing
// auditing when it's closed. Also save away the maximum audit mask
// if one was created.
//
ObjectTableEntry.ObAttributes |= OBJ_AUDIT_OBJECT_CLOSE;
ObjectInfo.AuditMask = ((PAUX_ACCESS_DATA)PassedAccessState->AuxData)->MaximumAuditMask;
}
#if i386
if (NtGlobalFlag & FLG_KERNEL_STACK_TRACE_DB) {
LONG StackTraceIndex;
ObjectTableEntry.GrantedAccessIndex = ObpComputeGrantedAccessIndex( TargetAccess );
if (PreviousMode == KernelMode) {
StackTraceIndex = RtlLogStackBackTrace();
} else {
StackTraceIndex = RtlLogUmodeStackBackTrace();
}
//
// Save the stack trace only if the index fits the CreatorBackTraceIndex
// minus the ProtectOnClose bit
//
if (StackTraceIndex < OBP_CREATOR_BACKTRACE_LIMIT) {
ObjectTableEntry.CreatorBackTraceIndex = (USHORT)StackTraceIndex;
} else {
ObjectTableEntry.CreatorBackTraceIndex = 0;
}
} else {
ObjectTableEntry.GrantedAccess = TargetAccess;
}
#else
ObjectTableEntry.GrantedAccess = TargetAccess;
#endif // i386
//
// Now that we've constructed a new object table entry for the duplicated handle
// we need to add it to the object table of the target process
//
ObpEncodeProtectClose(ObjectTableEntry);
NewHandle = ExCreateHandle( TargetObjectTable, &ObjectTableEntry );
if (NewHandle) {
if ( ObjectInfo.AuditMask != 0 ) {
//
// Make sure it's the same object before setting the handle information.
// The user may have closed it immediately after the ExCreateHandle call,
// so at this time it may either be invalid or a completely different object.
//
PHANDLE_TABLE_ENTRY HandleTableEntry;
PKTHREAD CurrentThread;
CurrentThread = KeGetCurrentThread ();
KeEnterCriticalRegionThread (CurrentThread);
HandleTableEntry = ExMapHandleToPointer ( TargetObjectTable, NewHandle );
if (HandleTableEntry != NULL) {
if (((ULONG_PTR)(HandleTableEntry->Object) & ~OBJ_HANDLE_ATTRIBUTES) == (ULONG_PTR)ObjectHeader) {
ExSetHandleInfo(TargetObjectTable, NewHandle, &ObjectInfo, TRUE);
}
ExUnlockHandleTableEntry( TargetObjectTable, HandleTableEntry );
}
KeLeaveCriticalRegionThread (CurrentThread);
}
//
// We have a new handle to audit the creation of the new handle if
// AVR was done. And set the optional output handle variable. Note
// that if we reach here the status variable is already a success
//
if (PassedAccessState != NULL) {
SeAuditHandleCreation( PassedAccessState, NewHandle );
}
if ( (ObjectTableEntry.ObAttributes & OBJ_AUDIT_OBJECT_CLOSE) &&
(SeDetailedAuditingWithToken( PassedAccessState ? SeQuerySubjectContextToken( &PassedAccessState->SubjectSecurityContext ) : NULL )) ) {
SeAuditHandleDuplication( SourceHandle,
NewHandle,
SourceProcess,
TargetProcess );
}
} else {
//
// We didn't get a new handle to decrement the handle count dereference
// the necessary objects, set the optional output variable and indicate
// why we're failing
//
ObpDecrementHandleCount( TargetProcess,
ObjectHeader,
ObjectType,
TargetAccess );
ObDereferenceObject( SourceObject );
Status = STATUS_INSUFFICIENT_RESOURCES;
}
if (ARGUMENT_PRESENT( TargetHandle )) {
*TargetHandle = NewHandle;
}
//
// Cleanup from our selfs and then return to our caller
//
if (PassedAccessState != NULL) {
SeDeleteAccessState( PassedAccessState );
}
ObDereferenceProcessHandleTable (SourceProcess);
ObDereferenceProcessHandleTable (TargetProcess);
return( Status );
}
NTSTATUS
NtDuplicateObject (
IN HANDLE SourceProcessHandle,
IN HANDLE SourceHandle,
IN HANDLE TargetProcessHandle OPTIONAL,
OUT PHANDLE TargetHandle OPTIONAL,
IN ACCESS_MASK DesiredAccess,
IN ULONG HandleAttributes,
IN ULONG Options
)
/*++
Routine Description:
This function creates a handle that is a duplicate of the specified
source handle. The source handle is evaluated in the context of the
specified source process. The calling process must have
PROCESS_DUP_HANDLE access to the source process. The duplicate
handle is created with the specified attributes and desired access.
The duplicate handle is created in the handle table of the specified
target process. The calling process must have PROCESS_DUP_HANDLE
access to the target process.
Arguments:
SourceProcessHandle - Supplies a handle to the source process for the
handle being duplicated
SourceHandle - Supplies the handle being duplicated
TargetProcessHandle - Optionally supplies a handle to the target process
that is to receive the new handle
TargetHandle - Optionally returns a the new duplicated handle
DesiredAccess - Desired access for the new handle
HandleAttributes - Desired attributes for the new handle
Options - Duplication options that control things like close source,
same access, and same attributes.
Return Value:
TBS
--*/
{
KPROCESSOR_MODE PreviousMode;
NTSTATUS Status, Status1;
PEPROCESS SourceProcess;
PEPROCESS TargetProcess;
HANDLE NewHandle = NULL;
//
// Get previous processor mode and probe output arguments if necessary.
//
PreviousMode = KeGetPreviousMode();
if (ARGUMENT_PRESENT( TargetHandle ) && (PreviousMode != KernelMode)) {
try {
ProbeForWriteHandle( TargetHandle );
*TargetHandle = NULL;
} except( EXCEPTION_EXECUTE_HANDLER ) {
return( GetExceptionCode() );
}
}
//
// Given the input source process handle get a pointer
// to the source process object
//
Status = ObReferenceObjectByHandle( SourceProcessHandle,
PROCESS_DUP_HANDLE,
PsProcessType,
PreviousMode,
(PVOID *)&SourceProcess,
NULL );
if (!NT_SUCCESS( Status )) {
return Status;
}
//
// We are all done if no target process handle was specified.
// This is practially a noop because the only really end result
// could be that we've closed the source handle.
//
if (!ARGUMENT_PRESENT( TargetProcessHandle )) {
//
// If no TargetProcessHandle, then only possible option is to close
// the source handle in the context of the source process.
//
TargetProcess = NULL;
Status1 = STATUS_SUCCESS;
} else {
//
// At this point the caller did specify for a target process
// So from the target process handle get a pointer to the
// target process object.
//
Status1 = ObReferenceObjectByHandle( TargetProcessHandle,
PROCESS_DUP_HANDLE,
PsProcessType,
PreviousMode,
(PVOID *)&TargetProcess,
NULL );
//
// The original structure of Duplicate cased us to still close the input handle if the output process handle
// was bad. We preserve that functionality.
//
if (!NT_SUCCESS (Status1)) {
TargetProcess = NULL;
}
}
Status = ObDuplicateObject (SourceProcess,
SourceHandle,
TargetProcess,
&NewHandle,
DesiredAccess,
HandleAttributes,
Options,
PreviousMode );
if (ARGUMENT_PRESENT( TargetHandle )) {
try {
*TargetHandle = NewHandle;
} except( EXCEPTION_EXECUTE_HANDLER ) {
//
// Fall through, since we cannot undo what we have done.
//
}
}
ObDereferenceObject( SourceProcess );
if ( TargetProcess != NULL) {
ObDereferenceObject( TargetProcess );
}
if (!NT_SUCCESS (Status1)) {
Status = Status1;
}
return( Status );
}
NTSTATUS
ObGetHandleInformation (
OUT PSYSTEM_HANDLE_INFORMATION HandleInformation,
IN ULONG Length,
OUT PULONG ReturnLength OPTIONAL
)
/*++
Routine Description:
This routine returns information about the specified handle.
Arguments:
HandleInformation - Supplies an array of handle information
structures to fill in
Length - Supplies the length the handle information array in bytes
ReturnLength - Receives the number of bytes used by this call
Return Value:
An appropriate status value
--*/
{
NTSTATUS Status;
ULONG RequiredLength;
PAGED_CODE();
RequiredLength = FIELD_OFFSET( SYSTEM_HANDLE_INFORMATION, Handles );
if (Length < RequiredLength) {
return( STATUS_INFO_LENGTH_MISMATCH );
}
HandleInformation->NumberOfHandles = 0;
//
// For every handle in every handle table we'll be calling
// our callback routine
//
Status = ExSnapShotHandleTables( ObpCaptureHandleInformation,
HandleInformation,
Length,
&RequiredLength );
if (ARGUMENT_PRESENT( ReturnLength )) {
*ReturnLength = RequiredLength;
}
return( Status );
}
NTSTATUS
ObGetHandleInformationEx (
OUT PSYSTEM_HANDLE_INFORMATION_EX HandleInformation,
IN ULONG Length,
OUT PULONG ReturnLength OPTIONAL
)
/*++
Routine Description:
This routine returns information about the specified handle.
Arguments:
HandleInformation - Supplies an array of handle information
structures to fill in
Length - Supplies the length the handle information array in bytes
ReturnLength - Receives the number of bytes used by this call
Return Value:
An appropriate status value
--*/
{
NTSTATUS Status;
ULONG RequiredLength;
PAGED_CODE();
RequiredLength = FIELD_OFFSET( SYSTEM_HANDLE_INFORMATION_EX, Handles );
if (Length < RequiredLength) {
return( STATUS_INFO_LENGTH_MISMATCH );
}
HandleInformation->NumberOfHandles = 0;
//
// For every handle in every handle table we'll be calling
// our callback routine
//
Status = ExSnapShotHandleTablesEx( ObpCaptureHandleInformationEx,
HandleInformation,
Length,
&RequiredLength );
if (ARGUMENT_PRESENT( ReturnLength )) {
*ReturnLength = RequiredLength;
}
return( Status );
}
NTSTATUS
ObpCaptureHandleInformation (
IN OUT PSYSTEM_HANDLE_TABLE_ENTRY_INFO *HandleEntryInfo,
IN HANDLE UniqueProcessId,
IN PHANDLE_TABLE_ENTRY ObjectTableEntry,
IN HANDLE HandleIndex,
IN ULONG Length,
IN OUT PULONG RequiredLength
)
/*++
Routine Description:
This is the callback routine of ObGetHandleInformation
Arguments:
HandleEntryInfo - Supplies a pointer to the output buffer to receive
the handle information
UniqueProcessId - Supplies the process id of the caller
ObjectTableEntry - Supplies the handle table entry that is being
captured
HandleIndex - Supplies the index for the preceding handle table entry
Length - Specifies the length, in bytes, of the original user buffer
RequiredLength - Specifies the length, in bytes, that has already been
used in the buffer to store information. On return this receives
the updated number of bytes being used.
Note that the HandleEntryInfo does not necessarily point to the
start of the original user buffer. It will have been offset by
the feed-in RequiredLength value.
Return Value:
An appropriate status value
--*/
{
NTSTATUS Status;
POBJECT_HEADER ObjectHeader;
//
// Figure out who much size we really need to contain this extra record
// and then check that it fits.
//
*RequiredLength += sizeof( SYSTEM_HANDLE_TABLE_ENTRY_INFO );
if (Length < *RequiredLength) {
Status = STATUS_INFO_LENGTH_MISMATCH;
} else {
//
// Get the object header from the table entry and then copy over the information
//
ObjectHeader = (POBJECT_HEADER)(((ULONG_PTR)(ObjectTableEntry->Object)) & ~OBJ_HANDLE_ATTRIBUTES);
(*HandleEntryInfo)->UniqueProcessId = (USHORT)((ULONG_PTR)UniqueProcessId);
(*HandleEntryInfo)->HandleAttributes = (UCHAR)ObpGetHandleAttributes(ObjectTableEntry);
(*HandleEntryInfo)->ObjectTypeIndex = (UCHAR)(ObjectHeader->Type->Index);
(*HandleEntryInfo)->HandleValue = (USHORT)((ULONG_PTR)(HandleIndex));
(*HandleEntryInfo)->Object = &ObjectHeader->Body;
(*HandleEntryInfo)->CreatorBackTraceIndex = 0;
#if i386
if (NtGlobalFlag & FLG_KERNEL_STACK_TRACE_DB) {
(*HandleEntryInfo)->CreatorBackTraceIndex = ObjectTableEntry->CreatorBackTraceIndex & OBP_CREATOR_BACKTRACE_INDEX_MASK;
(*HandleEntryInfo)->GrantedAccess = ObpTranslateGrantedAccessIndex( ObjectTableEntry->GrantedAccessIndex );
} else {
(*HandleEntryInfo)->GrantedAccess = ObpDecodeGrantedAccess(ObjectTableEntry->GrantedAccess);
}
#else
(*HandleEntryInfo)->GrantedAccess = ObpDecodeGrantedAccess(ObjectTableEntry->GrantedAccess);
#endif // i386
(*HandleEntryInfo)++;
Status = STATUS_SUCCESS;
}
return( Status );
}
NTSTATUS
ObpCaptureHandleInformationEx (
IN OUT PSYSTEM_HANDLE_TABLE_ENTRY_INFO_EX *HandleEntryInfo,
IN HANDLE UniqueProcessId,
IN PHANDLE_TABLE_ENTRY ObjectTableEntry,
IN HANDLE HandleIndex,
IN ULONG Length,
IN OUT PULONG RequiredLength
)
/*++
Routine Description:
This is the callback routine of ObGetHandleInformation
Arguments:
HandleEntryInfo - Supplies a pointer to the output buffer to receive
the handle information
UniqueProcessId - Supplies the process id of the caller
ObjectTableEntry - Supplies the handle table entry that is being
captured
HandleIndex - Supplies the index for the preceding handle table entry
Length - Specifies the length, in bytes, of the original user buffer
RequiredLength - Specifies the length, in bytes, that has already been
used in the buffer to store information. On return this receives
the updated number of bytes being used.
Note that the HandleEntryInfo does not necessarily point to the
start of the original user buffer. It will have been offset by
the feed-in RequiredLength value.
Return Value:
An appropriate status value
--*/
{
NTSTATUS Status;
POBJECT_HEADER ObjectHeader;
//
// Figure out who much size we really need to contain this extra record
// and then check that it fits.
//
*RequiredLength += sizeof( SYSTEM_HANDLE_TABLE_ENTRY_INFO_EX );
if (Length < *RequiredLength) {
Status = STATUS_INFO_LENGTH_MISMATCH;
} else {
//
// Get the object header from the table entry and then copy over the information
//
ObjectHeader = (POBJECT_HEADER)(((ULONG_PTR)(ObjectTableEntry->Object)) & ~OBJ_HANDLE_ATTRIBUTES);
(*HandleEntryInfo)->UniqueProcessId = (ULONG_PTR)UniqueProcessId;
(*HandleEntryInfo)->HandleAttributes = (UCHAR)ObpGetHandleAttributes(ObjectTableEntry);
(*HandleEntryInfo)->ObjectTypeIndex = (USHORT)(ObjectHeader->Type->Index);
(*HandleEntryInfo)->HandleValue = (ULONG_PTR)(HandleIndex);
(*HandleEntryInfo)->Object = &ObjectHeader->Body;
(*HandleEntryInfo)->CreatorBackTraceIndex = 0;
#if i386
if (NtGlobalFlag & FLG_KERNEL_STACK_TRACE_DB) {
(*HandleEntryInfo)->CreatorBackTraceIndex = ObjectTableEntry->CreatorBackTraceIndex & OBP_CREATOR_BACKTRACE_INDEX_MASK;
(*HandleEntryInfo)->GrantedAccess = ObpTranslateGrantedAccessIndex( ObjectTableEntry->GrantedAccessIndex );
} else {
(*HandleEntryInfo)->GrantedAccess = ObpDecodeGrantedAccess(ObjectTableEntry->GrantedAccess);
}
#else
(*HandleEntryInfo)->GrantedAccess = ObpDecodeGrantedAccess(ObjectTableEntry->GrantedAccess);
#endif // i386
(*HandleEntryInfo)++;
Status = STATUS_SUCCESS;
}
return( Status );
}
POBJECT_HANDLE_COUNT_ENTRY
ObpInsertHandleCount (
POBJECT_HEADER ObjectHeader
)
/*++
Routine Description:
This function will increase the size of the handle database
stored in the handle information of an object header. If
necessary it will allocate new and free old handle databases.
This routine should not be called if there is already free
space in the handle table.
Arguments:
ObjectHeader - The object whose handle count is being incremented
Return Value:
The pointer to the next free handle count entry within the
handle database.
--*/
{
POBJECT_HEADER_HANDLE_INFO HandleInfo;
POBJECT_HANDLE_COUNT_DATABASE OldHandleCountDataBase;
POBJECT_HANDLE_COUNT_DATABASE NewHandleCountDataBase;
POBJECT_HANDLE_COUNT_ENTRY FreeHandleCountEntry;
ULONG CountEntries;
ULONG OldSize;
ULONG NewSize;
OBJECT_HANDLE_COUNT_DATABASE SingleEntryDataBase;
PAGED_CODE();
//
// Check if the object has any handle information
//
HandleInfo = OBJECT_HEADER_TO_HANDLE_INFO(ObjectHeader);
if (HandleInfo == NULL) {
return NULL;
}
//
// The object does have some handle information. If it has
// a single handle entry then we'll construct a local dummy
// handle count database and come up with a new data base for
// storing two entries.
//
if (ObjectHeader->Flags & OB_FLAG_SINGLE_HANDLE_ENTRY) {
SingleEntryDataBase.CountEntries = 1;
SingleEntryDataBase.HandleCountEntries[0] = HandleInfo->SingleEntry;
OldHandleCountDataBase = &SingleEntryDataBase;
OldSize = sizeof( SingleEntryDataBase );
CountEntries = 2;
NewSize = sizeof(OBJECT_HANDLE_COUNT_DATABASE) +
((CountEntries - 1) * sizeof( OBJECT_HANDLE_COUNT_ENTRY ));
} else {
//
// The object already has multiple handles so we reference the
// current handle database, and compute a new size bumped by four
//
OldHandleCountDataBase = HandleInfo->HandleCountDataBase;
CountEntries = OldHandleCountDataBase->CountEntries;
OldSize = sizeof(OBJECT_HANDLE_COUNT_DATABASE) +
((CountEntries - 1) * sizeof( OBJECT_HANDLE_COUNT_ENTRY));
CountEntries += 4;
NewSize = sizeof(OBJECT_HANDLE_COUNT_DATABASE) +
((CountEntries - 1) * sizeof( OBJECT_HANDLE_COUNT_ENTRY));
}
//
// Now allocate pool for the new handle database.
//
NewHandleCountDataBase = ExAllocatePoolWithTag(PagedPool, NewSize,'dHbO');
if (NewHandleCountDataBase == NULL) {
return NULL;
}
//
// Copy over the old database. Note that this might just copy our
// local dummy entry for the single entry case
//
RtlCopyMemory(NewHandleCountDataBase, OldHandleCountDataBase, OldSize);
//
// If the previous mode was a single entry then remove that
// indication otherwise free up with previous handle database
//
if (ObjectHeader->Flags & OB_FLAG_SINGLE_HANDLE_ENTRY) {
ObjectHeader->Flags &= ~OB_FLAG_SINGLE_HANDLE_ENTRY;
} else {
ExFreePool( OldHandleCountDataBase );
}
//
// Find the end of the new database that is used and zero out
// the memory
//
FreeHandleCountEntry =
(POBJECT_HANDLE_COUNT_ENTRY)((PCHAR)NewHandleCountDataBase + OldSize);
RtlZeroMemory(FreeHandleCountEntry, NewSize - OldSize);
//
// Set the new database to the proper entry count and put it
// all in the object
//
NewHandleCountDataBase->CountEntries = CountEntries;
HandleInfo->HandleCountDataBase = NewHandleCountDataBase;
//
// And return to our caller
//
return FreeHandleCountEntry;
}
NTSTATUS
ObpIncrementHandleDataBase (
IN POBJECT_HEADER ObjectHeader,
IN PEPROCESS Process,
OUT PULONG NewProcessHandleCount
)
/*++
Routine Description:
This function increments the handle count database associated with the
specified object for a specified process. This function is assuming that
is called only for MaintainHandleCount == TRUE.
Arguments:
ObjectHeader - Supplies a pointer to the object.
Process - Supplies a pointer to the process whose handle count is to be
updated.
NewProcessHandleCount - Supplies a pointer to a variable that receives
the new handle count for the process.
Return Value:
An appropriate status value
--*/
{
POBJECT_HEADER_HANDLE_INFO HandleInfo;
POBJECT_HANDLE_COUNT_DATABASE HandleCountDataBase;
POBJECT_HANDLE_COUNT_ENTRY HandleCountEntry;
POBJECT_HANDLE_COUNT_ENTRY FreeHandleCountEntry;
ULONG CountEntries;
PAGED_CODE();
//
// Translate the object header to the handle information.
// The HandleInfo can't be null because this function should be
// called only if MaintainHandleCount == TRUE
//
HandleInfo = OBJECT_HEADER_TO_HANDLE_INFO(ObjectHeader);
//
// Check if the object has space for only a single handle
//
if (ObjectHeader->Flags & OB_FLAG_SINGLE_HANDLE_ENTRY) {
//
// If the single handle isn't in use then set the entry
// and tell the caller there is only one handle
//
if (HandleInfo->SingleEntry.HandleCount == 0) {
*NewProcessHandleCount = 1;
HandleInfo->SingleEntry.HandleCount = 1;
HandleInfo->SingleEntry.Process = Process;
return STATUS_SUCCESS;
//
// If the single entry is for the same process as specified
// then increment the count and we're done
//
} else if (HandleInfo->SingleEntry.Process == Process) {
*NewProcessHandleCount = ++HandleInfo->SingleEntry.HandleCount;
return STATUS_SUCCESS;
//
// Finally we have a object with a single handle entry already
// in use, so we need to grow the handle database before
// we can set this new value
//
} else {
FreeHandleCountEntry = ObpInsertHandleCount( ObjectHeader );
if (FreeHandleCountEntry == NULL) {
return STATUS_INSUFFICIENT_RESOURCES;
}
FreeHandleCountEntry->Process = Process;
FreeHandleCountEntry->HandleCount = 1;
*NewProcessHandleCount = 1;
return STATUS_SUCCESS;
}
}
//
// The object does not contain a single entry, therefore we're
// assuming it already has a handle count database
//
HandleCountDataBase = HandleInfo->HandleCountDataBase;
FreeHandleCountEntry = NULL;
if (HandleCountDataBase != NULL) {
//
// Get the number of entries and a pointer to the first one
// in the handle database
//
CountEntries = HandleCountDataBase->CountEntries;
HandleCountEntry = &HandleCountDataBase->HandleCountEntries[ 0 ];
//
// For each entry in the handle database check for a process
// match and if so then increment the handle count and return
// to our caller. Otherwise if the entry is free then remember
// it so we can store to it later
//
while (CountEntries) {
if (HandleCountEntry->Process == Process) {
*NewProcessHandleCount = ++HandleCountEntry->HandleCount;
return STATUS_SUCCESS;
} else if (HandleCountEntry->HandleCount == 0) {
FreeHandleCountEntry = HandleCountEntry;
}
++HandleCountEntry;
--CountEntries;
}
//
// If we did not find a free handle entry then we have to grow the
// handle database before we can set this new value
//
if (FreeHandleCountEntry == NULL) {
FreeHandleCountEntry = ObpInsertHandleCount( ObjectHeader );
if (FreeHandleCountEntry == NULL) {
return(STATUS_INSUFFICIENT_RESOURCES);
}
}
FreeHandleCountEntry->Process = Process;
FreeHandleCountEntry->HandleCount = 1;
*NewProcessHandleCount = 1;
}
return STATUS_SUCCESS;
}
NTSTATUS
ObpIncrementHandleCount (
OB_OPEN_REASON OpenReason,
PEPROCESS Process,
PVOID Object,
POBJECT_TYPE ObjectType,
PACCESS_STATE AccessState OPTIONAL,
KPROCESSOR_MODE AccessMode,
ULONG Attributes
)
/*++
Routine Description:
Increments the count of number of handles to the given object.
If the object is being opened or created, access validation and
auditing will be performed as appropriate.
Arguments:
OpenReason - Supplies the reason the handle count is being incremented.
Process - Pointer to the process in which the new handle will reside.
Object - Supplies a pointer to the body of the object.
ObjectType - Supplies the type of the object.
AccessState - Optional parameter supplying the current accumulated
security information describing the attempt to access the object.
AccessMode - Supplies the mode of the requestor.
Attributes - Desired attributes for the handle
Return Value:
An appropriate status value
--*/
{
NTSTATUS Status = STATUS_SUCCESS;
ULONG ProcessHandleCount;
BOOLEAN ExclusiveHandle;
POBJECT_HEADER_CREATOR_INFO CreatorInfo;
POBJECT_HEADER ObjectHeader;
BOOLEAN HasPrivilege = FALSE;
PRIVILEGE_SET Privileges;
BOOLEAN NewObject;
BOOLEAN HoldObjectTypeMutex = FALSE;
KPROCESSOR_MODE AccessCheckMode;
ULONG NewTotal;
PAGED_CODE();
ObpValidateIrql( "ObpIncrementHandleCount" );
//
// Get a pointer to the object header
//
ObjectHeader = OBJECT_TO_OBJECT_HEADER( Object );
//
// If the caller asked us to always do an access check then use user mode for previous mode
//
if (Attributes & OBJ_FORCE_ACCESS_CHECK) {
AccessCheckMode = UserMode;
} else {
AccessCheckMode = AccessMode;
}
ExclusiveHandle = FALSE;
HoldObjectTypeMutex = TRUE;
ObpLockObject( ObjectHeader );
try {
//
// Charge the user quota for the object
//
Status = ObpChargeQuotaForObject( ObjectHeader, ObjectType, &NewObject );
if (!NT_SUCCESS( Status )) {
leave;
}
//
// Check if the caller wants exlusive access and if so then
// make sure the attributes and header flags match up correctly
//
if (Attributes & OBJ_EXCLUSIVE) {
if ((Attributes & OBJ_INHERIT) ||
((ObjectHeader->Flags & OB_FLAG_EXCLUSIVE_OBJECT) == 0)) {
Status = STATUS_INVALID_PARAMETER;
leave;
}
if (((OBJECT_HEADER_TO_EXCLUSIVE_PROCESS(ObjectHeader) == NULL) &&
(ObjectHeader->HandleCount != 0))
||
((OBJECT_HEADER_TO_EXCLUSIVE_PROCESS(ObjectHeader) != NULL) &&
(OBJECT_HEADER_TO_EXCLUSIVE_PROCESS(ObjectHeader) != PsGetCurrentProcess()))) {
Status = STATUS_ACCESS_DENIED;
leave;
}
ExclusiveHandle = TRUE;
//
// The user doesn't want exclusive access so now check to make sure
// the attriutes and header flags match up correctly
//
} else if ((ObjectHeader->Flags & OB_FLAG_EXCLUSIVE_OBJECT) &&
(OBJECT_HEADER_TO_EXCLUSIVE_PROCESS(ObjectHeader) != NULL)) {
Status = STATUS_ACCESS_DENIED;
leave;
}
//
// If handle count going from zero to one for an existing object that
// maintains a handle count database, but does not have an open procedure
// just a close procedure, then fail the call as they are trying to
// reopen an object by pointer and the close procedure will not know
// that the object has been 'recreated'
//
if ((ObjectHeader->HandleCount == 0) &&
(!NewObject) &&
(ObjectType->TypeInfo.MaintainHandleCount) &&
(ObjectType->TypeInfo.OpenProcedure == NULL) &&
(ObjectType->TypeInfo.CloseProcedure != NULL)) {
Status = STATUS_UNSUCCESSFUL;
leave;
}
if ((OpenReason == ObOpenHandle) ||
((OpenReason == ObDuplicateHandle) && ARGUMENT_PRESENT(AccessState))) {
//
// Perform Access Validation to see if we can open this
// (already existing) object.
//
if (!ObCheckObjectAccess( Object,
AccessState,
TRUE,
AccessCheckMode,
&Status )) {
leave;
}
} else if ((OpenReason == ObCreateHandle)) {
//
// We are creating a new instance of this object type.
// A total of three audit messages may be generated:
//
// 1 - Audit the attempt to create an instance of this
// object type.
//
// 2 - Audit the successful creation.
//
// 3 - Audit the allocation of the handle.
//
//
// At this point, the RemainingDesiredAccess field in
// the AccessState may still contain either Generic access
// types, or MAXIMUM_ALLOWED. We will map the generics
// and substitute GenericAll for MAXIMUM_ALLOWED.
//
if ( AccessState->RemainingDesiredAccess & MAXIMUM_ALLOWED ) {
AccessState->RemainingDesiredAccess &= ~MAXIMUM_ALLOWED;
AccessState->RemainingDesiredAccess |= GENERIC_ALL;
}
if ((GENERIC_ACCESS & AccessState->RemainingDesiredAccess) != 0) {
RtlMapGenericMask( &AccessState->RemainingDesiredAccess,
&ObjectType->TypeInfo.GenericMapping );
}
//
// Since we are creating the object, we can give any access the caller
// wants. The only exception is ACCESS_SYSTEM_SECURITY, which requires
// a privilege.
//
if ( AccessState->RemainingDesiredAccess & ACCESS_SYSTEM_SECURITY ) {
//
// We could use SeSinglePrivilegeCheck here, but it
// captures the subject context again, and we don't
// want to do that in this path for performance reasons.
//
Privileges.PrivilegeCount = 1;
Privileges.Control = PRIVILEGE_SET_ALL_NECESSARY;
Privileges.Privilege[0].Luid = SeSecurityPrivilege;
Privileges.Privilege[0].Attributes = 0;
HasPrivilege = SePrivilegeCheck( &Privileges,
&AccessState->SubjectSecurityContext,
AccessCheckMode );
if (!HasPrivilege) {
SePrivilegedServiceAuditAlarm ( NULL,
&AccessState->SubjectSecurityContext,
&Privileges,
FALSE );
Status = STATUS_PRIVILEGE_NOT_HELD;
leave;
}
AccessState->RemainingDesiredAccess &= ~ACCESS_SYSTEM_SECURITY;
AccessState->PreviouslyGrantedAccess |= ACCESS_SYSTEM_SECURITY;
(VOID) SeAppendPrivileges( AccessState,
&Privileges );
}
}
if (ExclusiveHandle) {
OBJECT_HEADER_TO_QUOTA_INFO(ObjectHeader)->ExclusiveProcess = Process;
}
ObpIncrHandleCount( ObjectHeader );
ProcessHandleCount = 0;
//
// If the object type wants us to keep try of the handle counts
// then call our routine to do the work
//
if (ObjectType->TypeInfo.MaintainHandleCount) {
Status = ObpIncrementHandleDataBase( ObjectHeader,
Process,
&ProcessHandleCount );
if (!NT_SUCCESS(Status)) {
//
// The only thing we need to do is to remove the
// reference added before. The quota charge will be
// returned at object deletion
//
ObpDecrHandleCount( ObjectHeader );
leave;
}
}
ObpUnlockObject( ObjectHeader );
HoldObjectTypeMutex = FALSE;
//
// Set our preliminary status now to success because
// the call to the open procedure might change this
//
Status = STATUS_SUCCESS;
//
// If the object type has an open procedure
// then invoke that procedure
//
if (ObjectType->TypeInfo.OpenProcedure != NULL) {
#if DBG
KIRQL SaveIrql;
#endif
//
// Leave the object type mutex when call the OpenProcedure. If an exception
// while OpenProcedure the HoldObjectTypeMutex disable leaving the mutex
// on finally block
//
ObpBeginTypeSpecificCallOut( SaveIrql );
Status = (*ObjectType->TypeInfo.OpenProcedure)( OpenReason,
Process,
Object,
AccessState ?
AccessState->PreviouslyGrantedAccess :
0,
ProcessHandleCount );
ObpEndTypeSpecificCallOut( SaveIrql, "Open", ObjectType, Object );
//
// Hold back the object type mutex and set the HoldObjectTypeMutex variable
// to allow releasing the mutex while leaving this procedure
//
if (!NT_SUCCESS(Status)) {
ObpLockObject( ObjectHeader );
HoldObjectTypeMutex = TRUE;
(VOID)ObpDecrHandleCount( ObjectHeader );
leave;
}
}
//
// Get the objects creator info block and insert it on the
// global list of objects for that type
//
if (OpenReason == ObCreateHandle) {
CreatorInfo = OBJECT_HEADER_TO_CREATOR_INFO( ObjectHeader );
if (CreatorInfo != NULL) {
ObpEnterObjectTypeMutex( ObjectType );
InsertTailList( &ObjectType->TypeList, &CreatorInfo->TypeList );
ObpLeaveObjectTypeMutex( ObjectType );
}
}
//
// Do some simple bookkeeping for the handle counts
// and then return to our caller
//
NewTotal = (ULONG) InterlockedIncrement((PLONG)&ObjectType->TotalNumberOfHandles);
//
// Note: The hightwather is only for bookeeping. We can do this w/o
// lock. In the worst case next time will be updated
//
if (NewTotal > ObjectType->HighWaterNumberOfHandles) {
ObjectType->HighWaterNumberOfHandles = NewTotal;
}
} finally {
if ( HoldObjectTypeMutex ) {
ObpUnlockObject( ObjectHeader );
}
}
return( Status );
}
NTSTATUS
ObpIncrementUnnamedHandleCount (
PACCESS_MASK DesiredAccess,
PEPROCESS Process,
PVOID Object,
POBJECT_TYPE ObjectType,
KPROCESSOR_MODE AccessMode,
ULONG Attributes
)
/*++
Routine Description:
Increments the count of number of handles to the given object.
Arguments:
Desired Access - Supplies the desired access to the object and receives
the assign access mask
Process - Pointer to the process in which the new handle will reside.
Object - Supplies a pointer to the body of the object.
ObjectType - Supplies the type of the object.
AccessMode - Supplies the mode of the requestor.
Attributes - Desired attributes for the handle
Return Value:
An appropriate status value
--*/
{
NTSTATUS Status = STATUS_SUCCESS;
BOOLEAN ExclusiveHandle;
POBJECT_HEADER_CREATOR_INFO CreatorInfo;
POBJECT_HEADER ObjectHeader;
BOOLEAN NewObject;
ULONG ProcessHandleCount;
BOOLEAN HoldObjectTypeMutex = FALSE;
ULONG NewTotal;
PAGED_CODE();
UNREFERENCED_PARAMETER (AccessMode);
ObpValidateIrql( "ObpIncrementUnnamedHandleCount" );
//
// Get a pointer to the object header
//
ObjectHeader = OBJECT_TO_OBJECT_HEADER( Object );
ExclusiveHandle = FALSE;
HoldObjectTypeMutex = TRUE;
ObpLockObject( ObjectHeader );
try {
//
// Charge the user quota for the object
//
Status = ObpChargeQuotaForObject( ObjectHeader, ObjectType, &NewObject );
if (!NT_SUCCESS( Status )) {
leave;
}
//
// Check if the caller wants exlusive access and if so then
// make sure the attributes and header flags match up correctly
//
if (Attributes & OBJ_EXCLUSIVE) {
if ((Attributes & OBJ_INHERIT) ||
((ObjectHeader->Flags & OB_FLAG_EXCLUSIVE_OBJECT) == 0)) {
Status = STATUS_INVALID_PARAMETER;
leave;
}
if (((OBJECT_HEADER_TO_EXCLUSIVE_PROCESS(ObjectHeader) == NULL) &&
(ObjectHeader->HandleCount != 0))
||
((OBJECT_HEADER_TO_EXCLUSIVE_PROCESS(ObjectHeader) != NULL) &&
(OBJECT_HEADER_TO_EXCLUSIVE_PROCESS(ObjectHeader) != PsGetCurrentProcess()))) {
Status = STATUS_ACCESS_DENIED;
leave;
}
ExclusiveHandle = TRUE;
//
// The user doesn't want exclusive access so now check to make sure
// the attriutes and header flags match up correctly
//
} else if ((ObjectHeader->Flags & OB_FLAG_EXCLUSIVE_OBJECT) &&
(OBJECT_HEADER_TO_EXCLUSIVE_PROCESS(ObjectHeader) != NULL)) {
Status = STATUS_ACCESS_DENIED;
leave;
}
//
// If handle count going from zero to one for an existing object that
// maintains a handle count database, but does not have an open procedure
// just a close procedure, then fail the call as they are trying to
// reopen an object by pointer and the close procedure will not know
// that the object has been 'recreated'
//
if ((ObjectHeader->HandleCount == 0) &&
(!NewObject) &&
(ObjectType->TypeInfo.MaintainHandleCount) &&
(ObjectType->TypeInfo.OpenProcedure == NULL) &&
(ObjectType->TypeInfo.CloseProcedure != NULL)) {
Status = STATUS_UNSUCCESSFUL;
leave;
}
//
// If the user asked for the maximum allowed then remove the bit and
// or in generic all access
//
if ( *DesiredAccess & MAXIMUM_ALLOWED ) {
*DesiredAccess &= ~MAXIMUM_ALLOWED;
*DesiredAccess |= GENERIC_ALL;
}
// If the user asked for any generic bit then translate it to
// someone more appropriate for the object type
//
if ((GENERIC_ACCESS & *DesiredAccess) != 0) {
RtlMapGenericMask( DesiredAccess,
&ObjectType->TypeInfo.GenericMapping );
}
if (ExclusiveHandle) {
OBJECT_HEADER_TO_QUOTA_INFO(ObjectHeader)->ExclusiveProcess = Process;
}
ObpIncrHandleCount( ObjectHeader );
ProcessHandleCount = 0;
//
// If the object type wants us to keep try of the handle counts
// then call our routine to do the work
//
if (ObjectType->TypeInfo.MaintainHandleCount) {
Status = ObpIncrementHandleDataBase( ObjectHeader,
Process,
&ProcessHandleCount );
if (!NT_SUCCESS(Status)) {
//
// The only thing we need to do is to remove the
// reference added before. The quota charge will be
// returned at object deletion.
//
ObpDecrHandleCount( ObjectHeader );
leave;
}
}
ObpUnlockObject( ObjectHeader );
HoldObjectTypeMutex = FALSE;
//
// Set our preliminary status now to success because
// the call to the open procedure might change this
//
Status = STATUS_SUCCESS;
//
// If the object type has an open procedure
// then invoke that procedure
//
if (ObjectType->TypeInfo.OpenProcedure != NULL) {
#if DBG
KIRQL SaveIrql;
#endif
//
// Call the OpenProcedure. If an exception
// while OpenProcedure the HoldObjectTypeMutex disable leaving the mutex
// on finally block
//
ObpBeginTypeSpecificCallOut( SaveIrql );
Status = (*ObjectType->TypeInfo.OpenProcedure)( ObCreateHandle,
Process,
Object,
*DesiredAccess,
ProcessHandleCount );
ObpEndTypeSpecificCallOut( SaveIrql, "Open", ObjectType, Object );
//
// Hold back the object type mutex and set the HoldObjectTypeMutex variable
// to allow releasing the mutex while leaving this procedure
//
if (!NT_SUCCESS(Status)) {
ObpLockObject( ObjectHeader );
HoldObjectTypeMutex = TRUE;
(VOID)ObpDecrHandleCount( ObjectHeader );
leave;
}
}
//
// Get a pointer to the creator info block for the object and insert
// it on the global list of object for that type
//
CreatorInfo = OBJECT_HEADER_TO_CREATOR_INFO( ObjectHeader );
if (CreatorInfo != NULL) {
ObpEnterObjectTypeMutex( ObjectType );
InsertTailList( &ObjectType->TypeList, &CreatorInfo->TypeList );
ObpLeaveObjectTypeMutex( ObjectType );
}
//
// Do some simple bookkeeping for the handle counts
// and then return to our caller
//
NewTotal = (ULONG) InterlockedIncrement((PLONG)&ObjectType->TotalNumberOfHandles);
if (NewTotal > ObjectType->HighWaterNumberOfHandles) {
ObjectType->HighWaterNumberOfHandles = NewTotal;
}
} finally {
if ( HoldObjectTypeMutex ) {
ObpUnlockObject( ObjectHeader );
}
}
return( Status );
}
NTSTATUS
ObpChargeQuotaForObject (
IN POBJECT_HEADER ObjectHeader,
IN POBJECT_TYPE ObjectType,
OUT PBOOLEAN NewObject
)
/*++
Routine Description:
This routine charges quota against the current process for the new
object
Arguments:
ObjectHeader - Supplies a pointer to the new object being charged for
ObjectType - Supplies the type of the new object
NewObject - Returns true if the object is really new and false otherwise
Return Value:
An appropriate status value
--*/
{
POBJECT_HEADER_QUOTA_INFO QuotaInfo;
ULONG NonPagedPoolCharge;
ULONG PagedPoolCharge;
//
// Get a pointer to the quota block for this object
//
QuotaInfo = OBJECT_HEADER_TO_QUOTA_INFO( ObjectHeader );
*NewObject = FALSE;
//
// If the object is new then we have work to do otherwise
// we'll return with NewObject set to false
//
if (ObjectHeader->Flags & OB_FLAG_NEW_OBJECT) {
//
// Say the object now isn't new
//
ObjectHeader->Flags &= ~OB_FLAG_NEW_OBJECT;
//
// If there does exist a quota info structure for this
// object then calculate what our charge should be from
// the information stored in that structure
//
if (QuotaInfo != NULL) {
PagedPoolCharge = QuotaInfo->PagedPoolCharge +
QuotaInfo->SecurityDescriptorCharge;
NonPagedPoolCharge = QuotaInfo->NonPagedPoolCharge;
} else {
//
// There isn't any quota information so we're on our own
// Paged pool charge is the default for the object plus
// the security descriptor if present. Nonpaged pool charge
// is the default for the object.
//
PagedPoolCharge = ObjectType->TypeInfo.DefaultPagedPoolCharge;
if (ObjectHeader->SecurityDescriptor != NULL) {
ObjectHeader->Flags |= OB_FLAG_DEFAULT_SECURITY_QUOTA;
PagedPoolCharge += SE_DEFAULT_SECURITY_QUOTA;
}
NonPagedPoolCharge = ObjectType->TypeInfo.DefaultNonPagedPoolCharge;
}
//
// Now charge for the quota and make sure it succeeds
//
ObjectHeader->QuotaBlockCharged = (PVOID)PsChargeSharedPoolQuota( PsGetCurrentProcess(),
PagedPoolCharge,
NonPagedPoolCharge );
if (ObjectHeader->QuotaBlockCharged == NULL) {
return STATUS_QUOTA_EXCEEDED;
}
*NewObject = TRUE;
}
return STATUS_SUCCESS;
}
VOID
ObpDecrementHandleCount (
PEPROCESS Process,
POBJECT_HEADER ObjectHeader,
POBJECT_TYPE ObjectType,
ACCESS_MASK GrantedAccess
)
/*++
Routine Description:
This procedure decrements the handle count for the specified object
Arguments:
Process - Supplies the process where the handle existed
ObjectHeader - Supplies a pointer to the object header for the object
ObjectType - Supplies a type of the object
GrantedAccess - Supplies the current access mask to the object
Return Value:
None.
--*/
{
POBJECT_HEADER_HANDLE_INFO HandleInfo;
POBJECT_HANDLE_COUNT_DATABASE HandleCountDataBase;
POBJECT_HANDLE_COUNT_ENTRY HandleCountEntry;
PVOID Object;
ULONG CountEntries;
ULONG ProcessHandleCount;
ULONG_PTR SystemHandleCount;
LOGICAL HandleCountIsZero;
PAGED_CODE();
Object = (PVOID)&ObjectHeader->Body;
ProcessHandleCount = 0;
ObpLockObject( ObjectHeader );
SystemHandleCount = ObjectHeader->HandleCount;
//
// Decrement the handle count and it was one and it
// was an exclusive object then zero out the exclusive
// process
//
HandleCountIsZero = ObpDecrHandleCount( ObjectHeader );
if ( HandleCountIsZero &&
(ObjectHeader->Flags & OB_FLAG_EXCLUSIVE_OBJECT)) {
OBJECT_HEADER_TO_QUOTA_INFO( ObjectHeader )->ExclusiveProcess = NULL;
}
//
// If the object maintains a handle count database then
// search through the handle database and decrement
// the necessary information
//
if (ObjectType->TypeInfo.MaintainHandleCount) {
HandleInfo = OBJECT_HEADER_TO_HANDLE_INFO( ObjectHeader );
//
// Check if there is a single handle entry, then it better
// be ours
//
if (ObjectHeader->Flags & OB_FLAG_SINGLE_HANDLE_ENTRY) {
ASSERT(HandleInfo->SingleEntry.Process == Process);
ASSERT(HandleInfo->SingleEntry.HandleCount > 0);
ProcessHandleCount = HandleInfo->SingleEntry.HandleCount--;
HandleCountEntry = &HandleInfo->SingleEntry;
} else {
//
// Otherwise search the database for a process match
//
HandleCountDataBase = HandleInfo->HandleCountDataBase;
if (HandleCountDataBase != NULL) {
CountEntries = HandleCountDataBase->CountEntries;
HandleCountEntry = &HandleCountDataBase->HandleCountEntries[ 0 ];
while (CountEntries) {
if ((HandleCountEntry->HandleCount != 0) &&
(HandleCountEntry->Process == Process)) {
ProcessHandleCount = HandleCountEntry->HandleCount--;
break;
}
HandleCountEntry++;
CountEntries--;
}
}
else {
HandleCountEntry = NULL;
}
}
//
// Now if the process is giving up all handles to the object
// then zero out the handle count entry. For a single handle
// entry this is just the single entry in the header handle info
// structure
//
if (ProcessHandleCount == 1) {
HandleCountEntry->Process = NULL;
HandleCountEntry->HandleCount = 0;
}
}
ObpUnlockObject( ObjectHeader );
//
// If the Object Type has a Close Procedure, then release the type
// mutex before calling it, and then call ObpDeleteNameCheck without
// the mutex held.
//
if (ObjectType->TypeInfo.CloseProcedure) {
#if DBG
KIRQL SaveIrql;
#endif
ObpBeginTypeSpecificCallOut( SaveIrql );
(*ObjectType->TypeInfo.CloseProcedure)( Process,
Object,
GrantedAccess,
ProcessHandleCount,
SystemHandleCount );
ObpEndTypeSpecificCallOut( SaveIrql, "Close", ObjectType, Object );
}
ObpDeleteNameCheck( Object );
InterlockedDecrement((PLONG)&ObjectType->TotalNumberOfHandles);
return;
}
NTSTATUS
ObpCreateHandle (
IN OB_OPEN_REASON OpenReason,
IN PVOID Object,
IN POBJECT_TYPE ExpectedObjectType OPTIONAL,
IN PACCESS_STATE AccessState,
IN ULONG ObjectPointerBias OPTIONAL,
IN ULONG Attributes,
IN POBP_LOOKUP_CONTEXT LookupContext,
IN KPROCESSOR_MODE AccessMode,
OUT PVOID *ReferencedNewObject OPTIONAL,
OUT PHANDLE Handle
)
/*++
Routine Description:
This function creates a new handle to an existing object
Arguments:
OpenReason - The reason why we are doing this work
Object - A pointer to the body of the new object
ExpectedObjectType - Optionally Supplies the object type that
the caller is expecting
AccessState - Supplies the access state for the handle requested
by the caller
ObjectPointerBias - Optionally supplies a count of addition
increments we do to the pointer count for the object
Attributes - Desired attributes for the handle
DirectoryLocked - Indicates if the root directory mutex is already held
AccessMode - Supplies the mode of the requestor.
ReferencedNewObject - Optionally receives a pointer to the body
of the new object
Handle - Receives the new handle value
Return Value:
An appropriate status value
--*/
{
NTSTATUS Status;
POBJECT_HEADER ObjectHeader;
POBJECT_TYPE ObjectType;
PVOID ObjectTable;
HANDLE_TABLE_ENTRY ObjectTableEntry;
HANDLE NewHandle;
ACCESS_MASK DesiredAccess;
ACCESS_MASK GrantedAccess;
BOOLEAN AttachedToProcess = FALSE;
BOOLEAN KernelHandle = FALSE;
KAPC_STATE ApcState;
HANDLE_TABLE_ENTRY_INFO ObjectInfo;
PAGED_CODE();
ObpValidateIrql( "ObpCreateHandle" );
//
// Get a pointer to the object header and object type
//
ObjectHeader = OBJECT_TO_OBJECT_HEADER( Object );
ObjectType = ObjectHeader->Type;
//
// If the object type isn't what was expected then
// return an error to our caller, but first see if
// we should release the directory mutex
//
if ((ARGUMENT_PRESENT( ExpectedObjectType )) &&
(ObjectType != ExpectedObjectType )) {
if (LookupContext) {
ObpReleaseLookupContext( LookupContext );
}
return( STATUS_OBJECT_TYPE_MISMATCH );
}
//
// Set the first ulong of the object table entry to point
// back to the object header
//
ObjectTableEntry.Object = ObjectHeader;
//
// Now get a pointer to the object table for either the current process
// of the kernel handle table. OBJ_KERNEL_HANDLE dropped for user mode on capture.
//
if ((Attributes & OBJ_KERNEL_HANDLE) /* && (AccessMode == KernelMode) */) {
ObjectTable = ObpKernelHandleTable;
KernelHandle = TRUE;
//
// Go to the system process if we have to
//
if (PsGetCurrentProcess() != PsInitialSystemProcess) {
KeStackAttachProcess (&PsInitialSystemProcess->Pcb, &ApcState);
AttachedToProcess = TRUE;
}
} else {
ObjectTable = ObpGetObjectTable();
}
//
// ObpIncrementHandleCount will perform access checking on the
// object being opened as appropriate.
//
Status = ObpIncrementHandleCount( OpenReason,
PsGetCurrentProcess(),
Object,
ObjectType,
AccessState,
AccessMode,
Attributes );
if (AccessState->GenerateOnClose) {
Attributes |= OBJ_AUDIT_OBJECT_CLOSE;
}
//
// Or in some low order bits into the first ulong of the object
// table entry
//
ObjectTableEntry.ObAttributes |= (Attributes & OBJ_HANDLE_ATTRIBUTES);
//
// Merge both the remaining desired access and the currently
// granted access states into one mask and then compute
// the granted access
//
DesiredAccess = AccessState->RemainingDesiredAccess |
AccessState->PreviouslyGrantedAccess;
GrantedAccess = DesiredAccess &
(ObjectType->TypeInfo.ValidAccessMask | ACCESS_SYSTEM_SECURITY );
//
// AccessState->PreviouslyGrantedAccess is used for success audits in SeAuditHandleCreation() which uses it in calls
// to SepAdtPrivilegeObjectAuditAlarm() and SepAdtOpenObjectAuditAlarm(). Sanitize any bad bits from it.
//
AccessState->PreviouslyGrantedAccess = GrantedAccess;
//
// Compute and save away the audit mask for this object
// (if one exists). Note we only do this if the GenerateOnClose
// flag comes back in the access state, because this tells us
// that the audit is a result of what is in the SACL.
//
ObjectInfo.AuditMask = ((PAUX_ACCESS_DATA)AccessState->AuxData)->MaximumAuditMask;
//
// Unlock the directory if it is locked and make sure
// we've been successful so far
//
if (LookupContext) {
ObpReleaseLookupContext( LookupContext );
}
if (!NT_SUCCESS( Status )) {
//
// If we are attached to the system process then return
// back to our caller
//
if (AttachedToProcess) {
KeUnstackDetachProcess(&ApcState);
AttachedToProcess = FALSE;
}
return( Status );
}
//
// Bias the pointer count if that is what the caller wanted
//
if (ARGUMENT_PRESENT( ObjectPointerBias )) {
ObpIncrPointerCountEx (ObjectHeader, ObjectPointerBias);
}
//
// Set the granted access mask in the object table entry (second ulong)
//
#if i386
if (NtGlobalFlag & FLG_KERNEL_STACK_TRACE_DB) {
LONG StackTraceIndex;
ObjectTableEntry.GrantedAccessIndex = ObpComputeGrantedAccessIndex( GrantedAccess );
if (AccessMode == KernelMode) {
StackTraceIndex = RtlLogStackBackTrace();
} else {
StackTraceIndex = RtlLogUmodeStackBackTrace();
}
//
// Save the stack trace only if the index fits the CreatorBackTraceIndex
// minus the ProtectOnClose bit
//
if (StackTraceIndex < OBP_CREATOR_BACKTRACE_LIMIT) {
ObjectTableEntry.CreatorBackTraceIndex = (USHORT)StackTraceIndex;
} else {
ObjectTableEntry.CreatorBackTraceIndex = 0;
}
} else {
ObjectTableEntry.GrantedAccess = GrantedAccess;
}
#else
ObjectTableEntry.GrantedAccess = GrantedAccess;
#endif // i386
//
// Add this new object table entry to the object table for the process
//
ObpEncodeProtectClose(ObjectTableEntry);
NewHandle = ExCreateHandle( ObjectTable, &ObjectTableEntry );
//
// If we didn't get a handle then cleanup after ourselves and return
// the error to our caller
//
if (NewHandle == NULL) {
if (ARGUMENT_PRESENT( ObjectPointerBias )) {
ObpDecrPointerCountEx (ObjectHeader, ObjectPointerBias);
}
ObpDecrementHandleCount( PsGetCurrentProcess(),
ObjectHeader,
ObjectType,
GrantedAccess );
//
// If we are attached to the system process then return
// back to our caller
//
if (AttachedToProcess) {
KeUnstackDetachProcess(&ApcState);
AttachedToProcess = FALSE;
}
return( STATUS_INSUFFICIENT_RESOURCES );
}
if ( ObjectInfo.AuditMask != 0 ) {
PHANDLE_TABLE_ENTRY HandleTableEntry;
PKTHREAD CurrentThread;
CurrentThread = KeGetCurrentThread();
KeEnterCriticalRegionThread( CurrentThread );
//
// Make sure it's the same object before setting the handle information.
// The user may have closed it immediately after the ExCreateHandle call,
// so at this time it may either be invalid or a completely different object.
//
HandleTableEntry = ExMapHandleToPointer ( ObjectTable, NewHandle );
if (HandleTableEntry != NULL) {
if (((ULONG_PTR)(HandleTableEntry->Object) & ~OBJ_HANDLE_ATTRIBUTES) == (ULONG_PTR)ObjectHeader) {
ExSetHandleInfo(ObjectTable, NewHandle, &ObjectInfo, TRUE);
}
ExUnlockHandleTableEntry( ObjectTable, HandleTableEntry );
}
KeLeaveCriticalRegionThread( CurrentThread );
}
//
// We have a new Ex style handle now make it an ob style handle and also
// adjust for the kernel handle by setting the sign bit in the handle
// value
//
if (KernelHandle) {
NewHandle = EncodeKernelHandle( NewHandle );
}
*Handle = NewHandle;
//
// If requested, generate audit messages to indicate that a new handle
// has been allocated.
//
// This is the final security operation in the creation/opening of the
// object.
//
if ( AccessState->GenerateAudit ) {
SeAuditHandleCreation( AccessState,
*Handle );
}
if (OpenReason == ObCreateHandle) {
PAUX_ACCESS_DATA AuxData = AccessState->AuxData;
if ( ( AuxData->PrivilegesUsed != NULL) && (AuxData->PrivilegesUsed->PrivilegeCount > 0) ) {
SePrivilegeObjectAuditAlarm( *Handle,
&AccessState->SubjectSecurityContext,
GrantedAccess,
AuxData->PrivilegesUsed,
TRUE,
KeGetPreviousMode() );
}
}
//
// If the caller had a pointer bias and wanted the new reference object
// then return that value
//
if ((ARGUMENT_PRESENT( ObjectPointerBias )) &&
(ARGUMENT_PRESENT( ReferencedNewObject ))) {
*ReferencedNewObject = Object;
}
//
// If we are attached to the system process then return
// back to our caller
//
if (AttachedToProcess) {
KeUnstackDetachProcess(&ApcState);
AttachedToProcess = FALSE;
}
//
// And return to our caller
//
return( STATUS_SUCCESS );
}
NTSTATUS
ObpCreateUnnamedHandle (
IN PVOID Object,
IN ACCESS_MASK DesiredAccess,
IN ULONG ObjectPointerBias OPTIONAL,
IN ULONG Attributes,
IN KPROCESSOR_MODE AccessMode,
OUT PVOID *ReferencedNewObject OPTIONAL,
OUT PHANDLE Handle
)
/*++
Routine Description:
This function creates a new unnamed handle for an existing object
Arguments:
Object - A pointer to the body of the new object
DesiredAccess - Supplies the access mask being requsted
ObjectPointerBias - Optionally supplies a count of addition
increments we do to the pointer count for the object
Attributes - Desired attributes for the handle
AccessMode - Supplies the mode of the requestor.
ReferencedNewObject - Optionally receives a pointer to the body
of the new object
Handle - Receives the new handle value
Return Value:
An appropriate status value
--*/
{
NTSTATUS Status;
POBJECT_HEADER ObjectHeader;
POBJECT_TYPE ObjectType;
PVOID ObjectTable;
HANDLE_TABLE_ENTRY ObjectTableEntry;
HANDLE NewHandle;
ACCESS_MASK GrantedAccess;
BOOLEAN AttachedToProcess = FALSE;
BOOLEAN KernelHandle = FALSE;
KAPC_STATE ApcState;
PAGED_CODE();
ObpValidateIrql( "ObpCreateUnnamedHandle" );
//
// Get the object header and type for the new object
//
ObjectHeader = OBJECT_TO_OBJECT_HEADER( Object );
ObjectType = ObjectHeader->Type;
//
// Set the first ulong of the object table entry to point
// to the object header and then or in the low order attribute
// bits
//
ObjectTableEntry.Object = ObjectHeader;
ObjectTableEntry.ObAttributes |= (Attributes & OBJ_HANDLE_ATTRIBUTES);
//
// Now get a pointer to the object table for either the current process
// of the kernel handle table
//
if ((Attributes & OBJ_KERNEL_HANDLE) /* && (AccessMode == KernelMode) */) {
ObjectTable = ObpKernelHandleTable;
KernelHandle = TRUE;
//
// Go to the system process if we have to
//
if (PsGetCurrentProcess() != PsInitialSystemProcess) {
KeStackAttachProcess (&PsInitialSystemProcess->Pcb, &ApcState);
AttachedToProcess = TRUE;
}
} else {
ObjectTable = ObpGetObjectTable();
}
//
// Increment the handle count, this routine also does the access
// check if necessary
//
Status = ObpIncrementUnnamedHandleCount( &DesiredAccess,
PsGetCurrentProcess(),
Object,
ObjectType,
AccessMode,
Attributes );
GrantedAccess = DesiredAccess &
(ObjectType->TypeInfo.ValidAccessMask | ACCESS_SYSTEM_SECURITY );
if (!NT_SUCCESS( Status )) {
//
// If we are attached to the system process then return
// back to our caller
//
if (AttachedToProcess) {
KeUnstackDetachProcess(&ApcState);
AttachedToProcess = FALSE;
}
return( Status );
}
//
// Bias the pointer count if that is what the caller wanted
//
if (ARGUMENT_PRESENT( ObjectPointerBias )) {
ObpIncrPointerCountEx (ObjectHeader, ObjectPointerBias);
}
//
// Set the granted access mask in the object table entry (second ulong)
//
#if i386
if (NtGlobalFlag & FLG_KERNEL_STACK_TRACE_DB) {
LONG StackTraceIndex;
ObjectTableEntry.GrantedAccessIndex = ObpComputeGrantedAccessIndex( GrantedAccess );
if (AccessMode == KernelMode) {
StackTraceIndex = RtlLogStackBackTrace();
} else {
StackTraceIndex = RtlLogUmodeStackBackTrace();
}
//
// Save the stack trace only if the index fits the CreatorBackTraceIndex
// minus the ProtectOnClose bit
//
if (StackTraceIndex < OBP_CREATOR_BACKTRACE_LIMIT) {
ObjectTableEntry.CreatorBackTraceIndex = (USHORT)StackTraceIndex;
} else {
ObjectTableEntry.CreatorBackTraceIndex = 0;
}
} else {
ObjectTableEntry.GrantedAccess = GrantedAccess;
}
#else
ObjectTableEntry.GrantedAccess = GrantedAccess;
#endif // i386
//
// Add this new object table entry to the object table for the process
//
ObpEncodeProtectClose(ObjectTableEntry);
NewHandle = ExCreateHandle( ObjectTable, &ObjectTableEntry );
//
// If we didn't get a handle then cleanup after ourselves and return
// the error to our caller
//
if (NewHandle == NULL) {
if (ARGUMENT_PRESENT( ObjectPointerBias )) {
ObpDecrPointerCountEx (ObjectHeader, ObjectPointerBias);
}
ObpDecrementHandleCount( PsGetCurrentProcess(),
ObjectHeader,
ObjectType,
GrantedAccess );
//
// If we are attached to the system process then return
// back to our caller
//
if (AttachedToProcess) {
KeUnstackDetachProcess(&ApcState);
AttachedToProcess = FALSE;
}
return( STATUS_INSUFFICIENT_RESOURCES );
}
//
// We have a new Ex style handle now make it an ob style handle and also
// adjust for the kernel handle by setting the sign bit in the handle
// value
//
if (KernelHandle) {
NewHandle = EncodeKernelHandle( NewHandle );
}
*Handle = NewHandle;
//
// If the caller had a pointer bias and wanted the new reference object
// then return that value
//
if ((ARGUMENT_PRESENT( ObjectPointerBias )) &&
(ARGUMENT_PRESENT( ReferencedNewObject ))) {
*ReferencedNewObject = Object;
}
//
// If we are attached to the system process then return
// back to our caller
//
if (AttachedToProcess) {
KeUnstackDetachProcess(&ApcState);
AttachedToProcess = FALSE;
}
return( STATUS_SUCCESS );
}
NTSTATUS
ObpValidateDesiredAccess (
IN ACCESS_MASK DesiredAccess
)
/*++
Routine Description:
This routine checks the input desired access mask to see that
some invalid bits are not set. The invalid bits are the top
two reserved bits and the top three standard rights bits.
See \nt\public\sdk\inc\ntseapi.h for more details.
Arguments:
DesiredAccess - Supplies the mask being checked
Return Value:
STATUS_ACCESS_DENIED if one or more of the wrongs bits are set and
STATUS_SUCCESS otherwise
--*/
{
if (DesiredAccess & 0x0CE00000) {
return( STATUS_ACCESS_DENIED );
} else {
return( STATUS_SUCCESS );
}
}
#if i386
//
// The following three variables are just performance counters
// for the following two routines
//
ULONG ObpXXX1;
ULONG ObpXXX2;
ULONG ObpXXX3;
USHORT
ObpComputeGrantedAccessIndex (
ACCESS_MASK GrantedAccess
)
/*++
Routine Description:
This routine takes a granted access and returns and index
back to our cache of granted access masks.
Arguments:
GrantedAccess - Supplies the access mask being added to the cache
Return Value:
USHORT - returns an index in the cache for the input granted access
--*/
{
ULONG GrantedAccessIndex, n;
PACCESS_MASK p;
PKTHREAD CurrentThread;
ObpXXX1 += 1;
//
// Lock the global data structure
//
CurrentThread = KeGetCurrentThread ();
KeEnterCriticalRegionThread (CurrentThread);
ExAcquirePushLockExclusive ( &ObpLock );
n = ObpCurCachedGrantedAccessIndex;
p = ObpCachedGrantedAccesses;
//
// For each index in our cache look for a match and if found
// then unlock the data structure and return that index
//
for (GrantedAccessIndex = 0; GrantedAccessIndex < n; GrantedAccessIndex++, p++ ) {
ObpXXX2 += 1;
if (*p == GrantedAccess) {
ExReleasePushLockExclusive ( &ObpLock );
KeLeaveCriticalRegionThread (CurrentThread);
return (USHORT)GrantedAccessIndex;
}
}
//
// We didn't find a match now see if we've maxed out the cache
//
if (ObpCurCachedGrantedAccessIndex == ObpMaxCachedGrantedAccessIndex) {
DbgPrint( "OB: GrantedAccess cache limit hit.\n" );
DbgBreakPoint();
}
//
// Set the granted access to the next free slot and increment the
// number used in the cache, release the lock, and return the
// new index to our caller
//
*p = GrantedAccess;
ObpCurCachedGrantedAccessIndex += 1;
ExReleasePushLockExclusive ( &ObpLock );
KeLeaveCriticalRegionThread (CurrentThread);
return (USHORT)GrantedAccessIndex;
}
ACCESS_MASK
ObpTranslateGrantedAccessIndex (
USHORT GrantedAccessIndex
)
/*++
Routine Description:
This routine takes as input a cache index and returns
the corresponding granted access mask
Arguments:
GrantedAccessIndex - Supplies the cache index to look up
Return Value:
ACCESS_MASK - Returns the corresponding desired access mask
--*/
{
ACCESS_MASK GrantedAccess = (ACCESS_MASK)0;
PKTHREAD CurrentThread;
ObpXXX3 += 1;
//
// Lock the global data structure
//
CurrentThread = KeGetCurrentThread ();
KeEnterCriticalRegionThread (CurrentThread);
ExAcquirePushLockExclusive ( &ObpLock );
//
// If the input index is within bounds then get the granted
// access
//
if (GrantedAccessIndex < ObpCurCachedGrantedAccessIndex) {
GrantedAccess = ObpCachedGrantedAccesses[ GrantedAccessIndex ];
}
//
// Release the lock and return the granted access to our caller
//
ExReleasePushLockExclusive ( &ObpLock );
KeLeaveCriticalRegionThread (CurrentThread);
return GrantedAccess;
}
#endif // i386