NT4/private/ntos/ps/create.c
2020-09-30 17:12:29 +02:00

2118 lines
54 KiB
C
Raw Permalink Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

/*++
Copyright (c) 1989 Microsoft Corporation
Module Name:
create.c
Abstract:
Process and Thread Creation.
Author:
Mark Lucovsky (markl) 20-Apr-1989
Revision History:
--*/
#include "psp.h"
//
// This should really be in MM.H, but it cant be there yet.
//
extern PVOID MmWorkingSetList;
#ifdef ALLOC_PRAGMA
#pragma alloc_text(PAGE, NtCreateThread)
#pragma alloc_text(PAGE, NtCreateProcess)
#pragma alloc_text(PAGE, PsCreateSystemThread)
#pragma alloc_text(PAGE, PspCreateThread)
#pragma alloc_text(PAGE, PsCreateSystemProcess)
#pragma alloc_text(PAGE, PspCreateProcess)
#pragma alloc_text(PAGE, PspUserThreadStartup)
#pragma alloc_text(PAGE, PsLockProcess)
#pragma alloc_text(PAGE, PsUnlockProcess)
#endif
extern UNICODE_STRING CmCSDVersionString;
LCID PsDefaultSystemLocaleId;
LCID PsDefaultThreadLocaleId;
//
// The following two globals are present to make it easier to change
// working set sizes when debugging.
//
ULONG PsMinimumWorkingSet = 20;
ULONG PsMaximumWorkingSet = 45;
//
// Define the local storage for the process lock fast mutex.
//
FAST_MUTEX PspProcessLockMutex;
NTSTATUS
NtCreateThread(
OUT PHANDLE ThreadHandle,
IN ACCESS_MASK DesiredAccess,
IN POBJECT_ATTRIBUTES ObjectAttributes OPTIONAL,
IN HANDLE ProcessHandle,
OUT PCLIENT_ID ClientId,
IN PCONTEXT ThreadContext,
IN PINITIAL_TEB InitialTeb,
IN BOOLEAN CreateSuspended
)
/*++
Routine Description:
This system service API creates and initializes a thread object.
Arguments:
ThreadHandle - Returns the handle for the new thread.
DesiredAccess - Supplies the desired access modes to the new thread.
ObjectAttributes - Supplies the object attributes of the new thread.
ProcessHandle - Supplies a handle to the process that the thread is being
created within.
ClientId - Returns the CLIENT_ID of the new thread.
ThreadContext - Supplies an initial context for the new thread.
InitialTeb - Supplies the initial contents for the thread's TEB.
CreateSuspended - Supplies a value that controls whether or not a
thread is created in a suspended state.
Return Value:
TBD
--*/
{
NTSTATUS st;
INITIAL_TEB CapturedInitialTeb;
PAGED_CODE();
if ( KeGetPreviousMode() != KernelMode ) {
//
// Probe all arguments
//
try {
ProbeForWriteHandle(ThreadHandle);
if ( ARGUMENT_PRESENT(ClientId) ) {
ProbeForWriteUlong((PULONG)ClientId);
ProbeForWrite(ClientId, sizeof(CLIENT_ID), sizeof(ULONG));
}
ProbeForRead(ThreadContext, sizeof(CONTEXT), CONTEXT_ALIGN);
ProbeForRead(InitialTeb, sizeof(InitialTeb->OldInitialTeb), sizeof(ULONG));
CapturedInitialTeb.OldInitialTeb = InitialTeb->OldInitialTeb;
if (CapturedInitialTeb.OldInitialTeb.OldStackBase == NULL &&
CapturedInitialTeb.OldInitialTeb.OldStackBase == NULL
) {
ProbeForRead(InitialTeb, sizeof(INITIAL_TEB), sizeof(ULONG));
CapturedInitialTeb = *InitialTeb;
}
} except(EXCEPTION_EXECUTE_HANDLER) {
return GetExceptionCode();
}
} else {
if (InitialTeb->OldInitialTeb.OldStackBase == NULL &&
InitialTeb->OldInitialTeb.OldStackLimit == NULL
) {
CapturedInitialTeb = *InitialTeb;
} else {
CapturedInitialTeb.OldInitialTeb = InitialTeb->OldInitialTeb;
}
}
st = PspCreateThread (
ThreadHandle,
DesiredAccess,
ObjectAttributes,
ProcessHandle,
NULL,
ClientId,
ThreadContext,
&CapturedInitialTeb,
CreateSuspended,
NULL,
NULL
);
return st;
}
NTSTATUS
PsCreateSystemThread(
OUT PHANDLE ThreadHandle,
IN ACCESS_MASK DesiredAccess,
IN POBJECT_ATTRIBUTES ObjectAttributes OPTIONAL,
IN HANDLE ProcessHandle OPTIONAL,
OUT PCLIENT_ID ClientId OPTIONAL,
IN PKSTART_ROUTINE StartRoutine,
IN PVOID StartContext
)
/*++
Routine Description:
This routine creates and starts a system thread.
Arguments:
ThreadHandle - Returns the handle for the new thread.
DesiredAccess - Supplies the desired access modes to the new thread.
ObjectAttributes - Supplies the object attributes of the new thread.
ProcessHandle - Supplies a handle to the process that the thread is being
created within. If this parameter is not specified, then
the initial system process is used.
ClientId - Returns the CLIENT_ID of the new thread.
StartRoutine - Supplies the address of the system thread start routine.
StartContext - Supplies context for a system thread start routine.
Return Value:
TBD
--*/
{
NTSTATUS st;
HANDLE SystemProcess;
PEPROCESS ProcessPointer;
PAGED_CODE();
ProcessPointer = NULL;
if (ARGUMENT_PRESENT(ProcessHandle)) {
SystemProcess = ProcessHandle;
} else {
SystemProcess = NULL;
ProcessPointer = PsInitialSystemProcess;
}
st = PspCreateThread (
ThreadHandle,
DesiredAccess,
ObjectAttributes,
SystemProcess,
ProcessPointer,
ClientId,
NULL,
NULL,
FALSE,
StartRoutine,
StartContext
);
return st;
}
NTSTATUS
PspCreateThread(
OUT PHANDLE ThreadHandle,
IN ACCESS_MASK DesiredAccess,
IN POBJECT_ATTRIBUTES ObjectAttributes OPTIONAL,
IN HANDLE ProcessHandle,
IN PEPROCESS ProcessPointer,
OUT PCLIENT_ID ClientId OPTIONAL,
IN PCONTEXT ThreadContext OPTIONAL,
IN PINITIAL_TEB InitialTeb OPTIONAL,
IN BOOLEAN CreateSuspended,
IN PKSTART_ROUTINE StartRoutine OPTIONAL,
IN PVOID StartContext
)
/*++
Routine Description:
This routine creates and initializes a thread object. It implements the
foundation for NtCreateThread and for PsCreateSystemThread.
Arguments:
ThreadHandle - Returns the handle for the new thread.
DesiredAccess - Supplies the desired access modes to the new thread.
ObjectAttributes - Supplies the object attributes of the new thread.
ProcessHandle - Supplies a handle to the process that the thread is being
created within.
ClientId - Returns the CLIENT_ID of the new thread.
ThreadContext - Supplies a pointer to a context frame that represents the
initial user-mode context for a user-mode thread. The absence
of this parameter indicates that a system thread is being
created.
InitialTeb - Supplies the contents of certain fields for the new threads
TEB. This parameter is only examined if both a trap and
exception frame were specified.
CreateSuspended - Supplies a value that controls whether or not a user-mode
thread is created in a suspended state.
StartRoutine - Supplies the address of the system thread start routine.
StartContext - Supplies context for a system thread start routine.
Return Value:
TBD
--*/
{
HANDLE_ENTRY CidEntry;
NTSTATUS st;
PETHREAD Thread;
PEPROCESS Process;
PVOID KernelStack;
PTEB Teb;
INITIAL_TEB ITeb;
KPROCESSOR_MODE PreviousMode;
HANDLE LocalThreadHandle;
BOOLEAN AccessCheck;
BOOLEAN MemoryAllocated;
PSECURITY_DESCRIPTOR SecurityDescriptor;
SECURITY_SUBJECT_CONTEXT SubjectContext;
NTSTATUS accesst;
LARGE_INTEGER NullTime;
PAGED_CODE();
NullTime.LowPart = 0;
NullTime.HighPart = 0;
if ( StartRoutine ) {
PreviousMode = KernelMode;
} else {
PreviousMode = KeGetPreviousMode();
}
Teb = NULL;
Thread = NULL;
Process = NULL;
KernelStack = NULL;
if ( ProcessHandle ) {
//
// Process object reference count is biased by one for each thread.
// This accounts for the pointer given to the kernel that remains
// in effect until the thread terminates (and becomes signaled)
//
st = ObReferenceObjectByHandle(
ProcessHandle,
PROCESS_CREATE_THREAD,
PsProcessType,
PreviousMode,
(PVOID *)&Process,
NULL
);
}
else {
if ( StartRoutine ) {
ObReferenceObject(ProcessPointer);
Process = ProcessPointer;
st = STATUS_SUCCESS;
}
else {
st = STATUS_INVALID_HANDLE;
}
}
if ( !NT_SUCCESS(st) ) {
return st;
}
//
// If the previous mode is user and the target process is the system
// process, then the operation cannot be performed.
//
if ((PreviousMode != KernelMode) && (Process == PsInitialSystemProcess)) {
ObDereferenceObject(Process);
return STATUS_INVALID_HANDLE;
}
st = ObCreateObject(
PreviousMode,
PsThreadType,
ObjectAttributes,
PreviousMode,
NULL,
(ULONG) sizeof(ETHREAD),
0,
0,
(PVOID *)&Thread
);
if ( !NT_SUCCESS( st ) ) {
ObDereferenceObject(Process);
return st;
}
RtlZeroMemory(Thread,sizeof(ETHREAD));
CidEntry.Object = Thread;
CidEntry.Attributes = 0;
Thread->Cid.UniqueThread = ExCreateHandle(PspCidTable,&CidEntry);
if ( !Thread->Cid.UniqueThread ) {
ObDereferenceObject(Process);
ObDereferenceObject(Thread);
return( STATUS_INSUFFICIENT_RESOURCES );
}
//
// Initialize Mm
//
Thread->ReadClusterSize = MmReadClusterSize;
//
// Initialize LPC
//
KeInitializeSemaphore(&Thread->LpcReplySemaphore,0L,1L);
InitializeListHead( &Thread->LpcReplyChain );
//
// Initialize Io
//
InitializeListHead(&Thread->IrpList);
//
// Initialize Registry
//
InitializeListHead(&Thread->PostBlockList);
//
// Initialize Security
//
PspInitializeThreadSecurity( Process, Thread );
//
InitializeListHead(&Thread->TerminationPortList);
KeInitializeSpinLock(&Thread->ActiveTimerListLock);
InitializeListHead(&Thread->ActiveTimerListHead);
//
// Allocate Kernel Stack
//
KernelStack = MmCreateKernelStack(FALSE);
if ( !KernelStack ) {
ObDereferenceObject(Process);
ObDereferenceObject(Thread);
return STATUS_UNSUCCESSFUL;
}
st = PsLockProcess(Process,KernelMode,PsLockPollOnTimeout);
if ( st != STATUS_SUCCESS ) {
MmDeleteKernelStack(KernelStack, FALSE);
ObDereferenceObject(Process);
ObDereferenceObject(Thread);
return STATUS_PROCESS_IS_TERMINATING;
}
//
// If the process does not have its part of the client id, then
// assign one
//
if ( !Process->UniqueProcessId ) {
CidEntry.Object = Process;
CidEntry.Attributes = 0;
Process->UniqueProcessId = ExCreateHandle(PspCidTable,&CidEntry);
ExSetHandleTableOwner( Process->ObjectTable, Process->UniqueProcessId );
if (!Process->UniqueProcessId) {
PsUnlockProcess(Process);
MmDeleteKernelStack(KernelStack, FALSE);
ObDereferenceObject(Process);
ObDereferenceObject(Thread);
return STATUS_UNSUCCESSFUL;
}
if (PspCreateProcessNotifyRoutineCount != 0) {
ULONG i;
for (i=0; i<PSP_MAX_CREATE_PROCESS_NOTIFY; i++) {
if (PspCreateProcessNotifyRoutine[i] != NULL) {
(*PspCreateProcessNotifyRoutine[i])( Process->InheritedFromUniqueProcessId,
Process->UniqueProcessId,
TRUE
);
}
}
}
}
Thread->Cid.UniqueProcess = Process->UniqueProcessId;
Thread->ThreadsProcess = Process;
if (ARGUMENT_PRESENT(ThreadContext)) {
//
// FIX. Handle exception on bad context
//
//
// User-mode thread
//
try {
ITeb = *InitialTeb;
Teb = MmCreateTeb ( Process, &ITeb, &Thread->Cid );
//
// Initialize kernel thread object for user mode thread.
//
Thread->StartAddress = (PVOID)CONTEXT_TO_PROGRAM_COUNTER(ThreadContext);
#if defined(_X86_)
Thread->Win32StartAddress = (PVOID)ThreadContext->Eax;
#endif // _X86_
#if defined(_MIPS_)
Thread->Win32StartAddress = (PVOID)ThreadContext->XIntA0;
#endif // _MIPS_
#if defined(_ALPHA_)
Thread->Win32StartAddress = (PVOID)ThreadContext->IntA0;
#endif // _ALPHA_
#if defined(_PPC_)
Thread->Win32StartAddress = (PVOID)ThreadContext->Gpr3;
#endif // _PPC_
(VOID)
KeInitializeThread(
&Thread->Tcb,
KernelStack,
PspUserThreadStartup,
(PKSTART_ROUTINE)NULL,
(PVOID)CONTEXT_TO_PROGRAM_COUNTER(ThreadContext),
ThreadContext,
Teb,
&Process->Pcb
);
} except(EXCEPTION_EXECUTE_HANDLER) {
if ( Teb ) {
MmDeleteTeb(Process, Teb);
}
PsUnlockProcess(Process);
MmDeleteKernelStack(KernelStack, FALSE);
ObDereferenceObject(Thread);
return GetExceptionCode();
}
} else {
//
// Initialize kernel thread object for kernel mode thread.
//
Thread->StartAddress = (PVOID)StartRoutine;
KeInitializeThread(
&Thread->Tcb,
KernelStack,
PspSystemThreadStartup,
StartRoutine,
StartContext,
NULL,
NULL,
&Process->Pcb
);
}
//
// Notify registered callout routines of thread creation.
//
if (PspCreateThreadNotifyRoutineCount != 0) {
ULONG i;
for (i=0; i<PSP_MAX_CREATE_THREAD_NOTIFY; i++) {
if (PspCreateThreadNotifyRoutine[i] != NULL) {
(*PspCreateThreadNotifyRoutine[i])( Thread->Cid.UniqueProcess,
Thread->Cid.UniqueThread,
TRUE
);
}
}
}
PsUnlockProcess(Process);
//
// Failures that occur after this point cause the thread to
// go through PspExitThread
//
//
// Reference count of thread is biased once for itself, and
// once to account for its Cid Handle
//
// Note:
// if this fails we should do punt so we only have one
// cleanup path that really goes through PspExitThread ?
// Remember to free spin locks, cid...
//
(VOID) KeEnableApcQueuingThread(&Thread->Tcb);
if (CreateSuspended) {
(VOID) KeSuspendThread(&Thread->Tcb);
}
ObReferenceObject(Thread);
ObReferenceObject(Thread);
st = ObInsertObject(
Thread,
NULL,
DesiredAccess,
0,
(PVOID *)NULL,
&LocalThreadHandle
);
if ( !NT_SUCCESS(st) ) {
//
// The insert failed. Terminate the thread.
//
//
// This trick us used so that Dbgk doesn't report
// events for dead threads
//
Thread->DeadThread = TRUE;
Thread->HasTerminated = TRUE;
//PspTerminateThreadByPointer(Thread,st);
if (CreateSuspended) {
(VOID) KeResumeThread(&Thread->Tcb);
}
} else {
try {
*ThreadHandle = LocalThreadHandle;
if (ARGUMENT_PRESENT(ClientId)) {
*ClientId = Thread->Cid;
}
} except(EXCEPTION_EXECUTE_HANDLER) {
if ( GetExceptionCode() == STATUS_QUOTA_EXCEEDED ) {
//
// This trick us used so that Dbgk doesn't report
// events for dead threads
//
Thread->DeadThread = TRUE;
Thread->HasTerminated = TRUE;
//PspTerminateThreadByPointer(Thread,STATUS_QUOTA_EXCEEDED);
if (CreateSuspended) {
(VOID) KeResumeThread(&Thread->Tcb);
}
KeReadyThread(&Thread->Tcb);
ZwClose(LocalThreadHandle);
return GetExceptionCode();
}
}
}
KeQuerySystemTime(&Thread->CreateTime);
if ( !Thread->DeadThread ) {
st = ObGetObjectSecurity(
Thread,
&SecurityDescriptor,
&MemoryAllocated
);
if ( !NT_SUCCESS(st) ) {
//
// This trick us used so that Dbgk doesn't report
// events for dead threads
//
Thread->DeadThread = TRUE;
Thread->HasTerminated = TRUE;
//PspTerminateThreadByPointer(Thread,STATUS_QUOTA_EXCEEDED);
if (CreateSuspended) {
(VOID) KeResumeThread(&Thread->Tcb);
}
KeReadyThread(&Thread->Tcb);
ZwClose(LocalThreadHandle);
return st;
}
//
// Compute the subject security context
//
SubjectContext.ProcessAuditId = Process;
SubjectContext.PrimaryToken = PsReferencePrimaryToken(Process);
SubjectContext.ClientToken = NULL;
AccessCheck = SeAccessCheck(
SecurityDescriptor,
&SubjectContext,
FALSE,
MAXIMUM_ALLOWED,
0,
NULL,
&PsThreadType->TypeInfo.GenericMapping,
PreviousMode,
&Thread->GrantedAccess,
&accesst
);
PsDereferencePrimaryToken(SubjectContext.PrimaryToken);
ObReleaseObjectSecurity(
SecurityDescriptor,
MemoryAllocated
);
if ( !AccessCheck ) {
Thread->GrantedAccess = 0;
}
Thread->GrantedAccess |= (THREAD_TERMINATE | THREAD_SET_INFORMATION | THREAD_QUERY_INFORMATION);
}
else {
Thread->GrantedAccess = THREAD_ALL_ACCESS;
}
KeReadyThread(&Thread->Tcb);
return st;
}
NTSTATUS
NtCreateProcess(
OUT PHANDLE ProcessHandle,
IN ACCESS_MASK DesiredAccess,
IN POBJECT_ATTRIBUTES ObjectAttributes OPTIONAL,
IN HANDLE ParentProcess,
IN BOOLEAN InheritObjectTable,
IN HANDLE SectionHandle OPTIONAL,
IN HANDLE DebugPort OPTIONAL,
IN HANDLE ExceptionPort OPTIONAL
)
/*++
Routine Description:
This routine creates a process object.
Arguments:
ProcessHandle - Returns the handle for the new process.
DesiredAccess - Supplies the desired access modes to the new process.
ObjectAttributes - Supplies the object attributes of the new process.
.
.
.
Return Value:
TBD
--*/
{
NTSTATUS st;
PAGED_CODE();
if ( KeGetPreviousMode() != KernelMode ) {
//
// Probe all arguments
//
try {
ProbeForWriteHandle(ProcessHandle);
} except(EXCEPTION_EXECUTE_HANDLER) {
return GetExceptionCode();
}
}
if ( ARGUMENT_PRESENT(ParentProcess) ) {
st = PspCreateProcess(
ProcessHandle,
DesiredAccess,
ObjectAttributes,
ParentProcess,
InheritObjectTable,
SectionHandle,
DebugPort,
ExceptionPort
);
} else {
st = STATUS_INVALID_PARAMETER;
}
return st;
}
NTSTATUS
PsCreateSystemProcess(
OUT PHANDLE ProcessHandle,
IN ACCESS_MASK DesiredAccess,
IN POBJECT_ATTRIBUTES ObjectAttributes OPTIONAL
)
/*++
Routine Description:
This routine creates a system process object. A system process
has an address space that is initialized to an empty address space
that maps the system.
The process inherits its access token and other attributes from the
initial system process. The process is created with an empty handle table.
Arguments:
ProcessHandle - Returns the handle for the new process.
DesiredAccess - Supplies the desired access modes to the new process.
ObjectAttributes - Supplies the object attributes of the new process.
Return Value:
TBD
--*/
{
NTSTATUS st;
PAGED_CODE();
st = PspCreateProcess(
ProcessHandle,
DesiredAccess,
ObjectAttributes,
PspInitialSystemProcessHandle,
FALSE,
(HANDLE) NULL,
(HANDLE) NULL,
(HANDLE) NULL
);
return st;
}
NTSTATUS
PspCreateProcess(
OUT PHANDLE ProcessHandle,
IN ACCESS_MASK DesiredAccess,
IN POBJECT_ATTRIBUTES ObjectAttributes OPTIONAL,
IN HANDLE ParentProcess OPTIONAL,
IN BOOLEAN InheritObjectTable,
IN HANDLE SectionHandle OPTIONAL,
IN HANDLE DebugPort OPTIONAL,
IN HANDLE ExceptionPort OPTIONAL
)
/*++
Routine Description:
This routine creates and initializes a process object. It implements the
foundation for NtCreateProcess and for system initialization process
creation.
Arguments:
ProcessHandle - Returns the handle for the new process.
DesiredAccess - Supplies the desired access modes to the new process.
ObjectAttributes - Supplies the object attributes of the new process.
ParentProcess - Supplies a handle to the process' parent process. If this
parameter is not specified, then the process has no parent
and is created using the system address space.
SectionHandle - Supplies a handle to a section object to be used to create
the process' address space. If this parameter is not
specified, then the address space is simply a clone of the
parent process' address space.
DebugPort - Supplies a handle to a port object that will be used as the
process' debug port.
ExceptionPort - Supplies a handle to a port object that will be used as the
process' exception port.
Return Value:
TBD
--*/
{
NTSTATUS st;
PEPROCESS Process;
PEPROCESS Parent;
KAFFINITY Affinity;
KPRIORITY BasePriority;
PVOID SectionToMap;
PVOID ExceptionPortObject;
PVOID DebugPortObject;
ULONG WorkingSetMinimum, WorkingSetMaximum;
HANDLE LocalProcessHandle;
KPROCESSOR_MODE PreviousMode;
HANDLE NewSection;
NTSTATUS DuplicateStatus;
INITIAL_PEB InitialPeb;
BOOLEAN CreatePeb;
ULONG DirectoryTableBase[2];
BOOLEAN AccessCheck;
BOOLEAN MemoryAllocated;
PSECURITY_DESCRIPTOR SecurityDescriptor;
SECURITY_SUBJECT_CONTEXT SubjectContext;
NTSTATUS accesst;
PAGED_CODE();
CreatePeb = FALSE;
DirectoryTableBase[0] = 0;
DirectoryTableBase[1] = 0;
PreviousMode = KeGetPreviousMode();
//
// Parent
//
if (ARGUMENT_PRESENT(ParentProcess) ) {
st = ObReferenceObjectByHandle(
ParentProcess,
PROCESS_CREATE_PROCESS,
PsProcessType,
PreviousMode,
(PVOID *)&Parent,
NULL
);
if ( !NT_SUCCESS(st) ) {
return st;
}
//
// Until CSR understands priority class, don't
// inherit base priority. This just makes things
// worse !
//
BasePriority = (KPRIORITY) NORMAL_BASE_PRIORITY;
//
//BasePriority = Parent->Pcb.BasePriority;
//
Affinity = Parent->Pcb.Affinity;
WorkingSetMinimum = PsMinimumWorkingSet; // FIXFIX
WorkingSetMaximum = PsMaximumWorkingSet;
} else {
Parent = NULL;
Affinity = KeActiveProcessors;
BasePriority = (KPRIORITY) NORMAL_BASE_PRIORITY;
WorkingSetMinimum = PsMinimumWorkingSet; // FIXFIX
WorkingSetMaximum = PsMaximumWorkingSet;
}
//
// Section
//
if (ARGUMENT_PRESENT(SectionHandle) ) {
st = ObReferenceObjectByHandle(
SectionHandle,
SECTION_MAP_EXECUTE,
MmSectionObjectType,
PreviousMode,
(PVOID *)&SectionToMap,
NULL
);
if ( !NT_SUCCESS(st) ) {
if (Parent) {
ObDereferenceObject(Parent);
}
return st;
}
} else {
SectionToMap = NULL;
}
//
// DebugPort
//
if (ARGUMENT_PRESENT(DebugPort) ) {
st = ObReferenceObjectByHandle (
DebugPort,
0,
LpcPortObjectType,
KeGetPreviousMode(),
(PVOID *)&DebugPortObject,
NULL
);
if ( !NT_SUCCESS(st) ) {
if (Parent) {
ObDereferenceObject(Parent);
}
if (SectionToMap) {
ObDereferenceObject(SectionToMap);
}
return st;
}
} else {
DebugPortObject = NULL;
}
//
// ExceptionPort
//
if (ARGUMENT_PRESENT(ExceptionPort) ) {
st = ObReferenceObjectByHandle (
ExceptionPort,
0,
LpcPortObjectType,
KeGetPreviousMode(),
(PVOID *)&ExceptionPortObject,
NULL
);
if ( !NT_SUCCESS(st) ) {
if (Parent) {
ObDereferenceObject(Parent);
}
if (SectionToMap) {
ObDereferenceObject(SectionToMap);
}
if (DebugPortObject) {
ObDereferenceObject(DebugPortObject);
}
return st;
}
} else {
ExceptionPortObject = NULL;
}
st = ObCreateObject(
KeGetPreviousMode(),
PsProcessType,
ObjectAttributes,
KeGetPreviousMode(),
NULL,
(ULONG) sizeof(EPROCESS),
0,
0,
(PVOID *)&Process
);
if ( !NT_SUCCESS( st ) ) {
if (Parent) {
ObDereferenceObject(Parent);
}
if (SectionToMap) {
ObDereferenceObject(SectionToMap);
}
if (DebugPortObject) {
ObDereferenceObject(DebugPortObject);
}
if (ExceptionPortObject) {
ObDereferenceObject(ExceptionPortObject);
}
return st;
}
//
// The process object is created set to NULL. Errors
// That occur after this step cause the process delete
// routine to be entered.
//
// Teardown actions that occur in the process delete routine
// do not need to be performed inline.
//
RtlZeroMemory(Process,sizeof(EPROCESS));
Process->CreateProcessReported = FALSE;
Process->DebugPort = DebugPortObject;
Process->ExceptionPort = ExceptionPortObject;
PspInheritQuota(Process,Parent);
if ( Parent ) {
Process->DefaultHardErrorProcessing = Parent->DefaultHardErrorProcessing;
Process->InheritedFromUniqueProcessId = Parent->UniqueProcessId;
} else {
Process->DefaultHardErrorProcessing = 1;
Process->InheritedFromUniqueProcessId = NULL;
}
Process->ExitStatus = STATUS_PENDING;
Process->LockCount = 1;
Process->LockOwner = NULL;
KeInitializeEvent(&Process->LockEvent, SynchronizationEvent, FALSE);
//
// Initialize the security fields of the process
// The parent may be null exactly once (during system init).
// Thereafter, a parent is always required so that we have a
// security context to duplicate for the new process.
//
st = PspInitializeProcessSecurity( Parent, Process );
if (!NT_SUCCESS(st)) {
if ( Parent ) {
ObDereferenceObject(Parent);
}
if (SectionToMap) {
ObDereferenceObject(SectionToMap);
}
ObDereferenceObject(Process);
return st;
}
//
// Clone parent's object table.
// If no parent (booting) then use the current object table created in
// ObInitSystem.
//
if (Parent) {
//
// Calculate address space
//
// If Parent == PspInitialSystem
//
if (!MmCreateProcessAddressSpace(WorkingSetMinimum,
Process,
&DirectoryTableBase[0])) {
ObDereferenceObject(Parent);
if (SectionToMap) {
ObDereferenceObject(SectionToMap);
}
PspDeleteProcessSecurity( Process );
ObDereferenceObject(Process);
return STATUS_INSUFFICIENT_RESOURCES;
}
} else {
Process->ObjectTable = PsGetCurrentProcess()->ObjectTable;
DirectoryTableBase[0] = PsGetCurrentProcess()->Pcb.DirectoryTableBase[0];
DirectoryTableBase[1] = PsGetCurrentProcess()->Pcb.DirectoryTableBase[1];
//
// Initialize the Working Set Mutex and address creation mutex
// for this "hand built" process.
// Normally, the call the MmInitializeAddressSpace initializes the
// working set mutex, however, in this case, we have already initailzed
// the address space and we are now creating a second process using
// the address space of the idle thread.
//
//KeInitializeMutant(&Process->WorkingSetLock, FALSE);
ExInitializeFastMutex(&Process->WorkingSetLock);
ExInitializeFastMutex(&Process->AddressCreationLock);
KeInitializeSpinLock (&Process->HyperSpaceLock);
//
// Initialize virtual address descriptor root.
//
ASSERT (Process->VadRoot == NULL);
Process->Vm.WorkingSetSize = PsGetCurrentProcess()->Vm.WorkingSetSize;
KeQuerySystemTime(&Process->Vm.LastTrimTime);
Process->Vm.VmWorkingSetList = MmWorkingSetList;
}
Process->Vm.MinimumWorkingSetSize = (USHORT)WorkingSetMinimum;
Process->Vm.MaximumWorkingSetSize = (USHORT)WorkingSetMaximum;
KeInitializeProcess(
&Process->Pcb,
BasePriority,
Affinity,
&DirectoryTableBase[0],
(BOOLEAN)(Process->DefaultHardErrorProcessing & PROCESS_HARDERROR_ALIGNMENT_BIT)
);
Process->Pcb.ThreadQuantum = PspForegroundQuantum[0];
if (Parent) {
//
// if address space creation worked, then when going through
// delete, we will attach. Of course, attaching means that the kprocess
// must be initialize, so we delay the object stuff till here
st = ObInitProcess(InheritObjectTable ? Parent : (PEPROCESS)NULL,Process);
if (!NT_SUCCESS(st)) {
ObDereferenceObject(Parent);
if (SectionToMap) {
ObDereferenceObject(SectionToMap);
}
PspDeleteProcessSecurity( Process );
ObDereferenceObject(Process);
return st;
}
}
st = STATUS_SUCCESS;
//
// Initialize the process address space
// The address space has four possibilities
//
// 1 - Boot Process. Address space is initialized during
// MmInit. Parent is not specified.
//
// 2 - System Process. Address space is a virgin address
// space that only maps system space. Process is same
// as PspInitialSystemProcess.
//
// 3 - User Process (Cloned Address Space). Address space
// is cloned from the specified process.
//
// 4 - User Process (New Image Address Space). Address space
// is initialized so that it maps the specified section.
//
if ( SectionToMap ) {
//
// User Process (New Image Address Space). Dont specify Process to
// clone, just SectionToMap.
//
st = MmInitializeProcessAddressSpace(
Process,
NULL,
SectionToMap
);
ObDereferenceObject(SectionToMap);
ObInitProcess2(Process);
if ( NT_SUCCESS(st) ) {
st = PspMapSystemDll(Process,NULL);
}
CreatePeb = TRUE;
goto insert_process;
}
if ( Parent ) {
if ( Parent != PsInitialSystemProcess ) {
Process->SectionBaseAddress = Parent->SectionBaseAddress;
//
// User Process ( Cloned Address Space ). Dont specify section to
// map, just Process to clone.
//
st = MmInitializeProcessAddressSpace(
Process,
Parent,
NULL
);
CreatePeb = TRUE;
} else {
//
// System Process. Dont specify Process to clone or section to map
//
st = MmInitializeProcessAddressSpace(
Process,
NULL,
NULL
);
}
}
insert_process:
//
// If MmInitializeProcessAddressSpace was NOT successful, then
// dereference and exit.
//
if ( !NT_SUCCESS(st) ) {
if (Parent) {
ObDereferenceObject(Parent);
}
KeAttachProcess(&Process->Pcb);
ObKillProcess(FALSE, Process);
KeDetachProcess();
PspDeleteProcessSecurity( Process );
ObDereferenceObject(Process);
return st;
}
//
// Reference count of process is not biased here. Each thread in the
// process bias the reference count when they are created.
//
st = ObInsertObject(
Process,
NULL,
DesiredAccess,
0,
(PVOID *)NULL,
&LocalProcessHandle
);
if ( !NT_SUCCESS(st) ) {
if (Parent) {
ObDereferenceObject(Parent);
}
return st;
}
ExAcquireFastMutex(&PspActiveProcessMutex);
InsertTailList(&PsActiveProcessHead,&Process->ActiveProcessLinks);
ExReleaseFastMutex(&PspActiveProcessMutex);
KeInitializeMutant(&Process->ProcessMutant,FALSE);
if (Parent && CreatePeb ) {
//
// For processes created w/ a section,
// a new "virgin" PEB is created. Otherwise,
// for forked processes, uses inhereted PEB
// with an updated mutant.
RtlZeroMemory(&InitialPeb, FIELD_OFFSET(INITIAL_PEB, Mutant));
InitialPeb.Mutant = (HANDLE)0xffffffff;
if ( SectionToMap ) {
try {
Process->Peb = MmCreatePeb(Process,&InitialPeb);
} except(EXCEPTION_EXECUTE_HANDLER) {
ObDereferenceObject(Parent);
return GetExceptionCode();
}
if (Parent->Peb != NULL &&
Parent->Peb->EventLogSection != NULL
) {
ZwWriteVirtualMemory(
LocalProcessHandle,
&Process->Peb->EventLogSection,
&Parent->Peb->EventLogSection,
sizeof(HANDLE),
NULL
);
}
} else {
InitialPeb.InheritedAddressSpace = TRUE;
Process->Peb = Parent->Peb;
ZwWriteVirtualMemory(
LocalProcessHandle,
Process->Peb,
&InitialPeb,
sizeof(INITIAL_PEB),
NULL
);
}
//
// The new process should have a handle to its
// section. The section is either from the specified
// section, or the section of its parent.
//
if ( ARGUMENT_PRESENT(SectionHandle) ) {
DuplicateStatus = ZwDuplicateObject(
NtCurrentProcess(),
SectionHandle,
LocalProcessHandle,
&NewSection,
0L,
0L,
DUPLICATE_SAME_ACCESS
);
} else {
DuplicateStatus = ZwDuplicateObject(
ParentProcess,
Parent->SectionHandle,
LocalProcessHandle,
&NewSection,
0L,
0L,
DUPLICATE_SAME_ACCESS
);
}
if ( NT_SUCCESS(DuplicateStatus) ) {
Process->SectionHandle = NewSection;
}
ObDereferenceObject(Parent);
}
if ( Parent && ParentProcess != PspInitialSystemProcessHandle ) {
st = ObGetObjectSecurity(
Process,
&SecurityDescriptor,
&MemoryAllocated
);
if ( !NT_SUCCESS(st) ) {
ZwClose(LocalProcessHandle);
return st;
}
//
// Compute the subject security context
//
SubjectContext.ProcessAuditId = Process;
SubjectContext.PrimaryToken = PsReferencePrimaryToken(Process);
SubjectContext.ClientToken = NULL;
AccessCheck = SeAccessCheck(
SecurityDescriptor,
&SubjectContext,
FALSE,
MAXIMUM_ALLOWED,
0,
NULL,
&PsProcessType->TypeInfo.GenericMapping,
PreviousMode,
&Process->GrantedAccess,
&accesst
);
PsDereferencePrimaryToken(SubjectContext.PrimaryToken);
ObReleaseObjectSecurity(
SecurityDescriptor,
MemoryAllocated
);
if ( !AccessCheck ) {
Process->GrantedAccess = 0;
}
//
// It does not make any sense to create a process that can not
// do anything to itself
//
Process->GrantedAccess |= (PROCESS_VM_OPERATION | PROCESS_VM_READ | PROCESS_VM_WRITE | PROCESS_QUERY_INFORMATION | PROCESS_TERMINATE | PROCESS_CREATE_THREAD | PROCESS_DUP_HANDLE | PROCESS_CREATE_PROCESS | PROCESS_SET_INFORMATION);
} else {
Process->GrantedAccess = PROCESS_ALL_ACCESS;
}
if ( SeDetailedAuditing ) {
SeAuditProcessCreation( Process, Parent );
}
KeQuerySystemTime(&Process->CreateTime);
try {
*ProcessHandle = LocalProcessHandle;
} except(EXCEPTION_EXECUTE_HANDLER) {
return st;
}
return st;
}
NTSTATUS
PsSetCreateProcessNotifyRoutine(
IN PCREATE_PROCESS_NOTIFY_ROUTINE NotifyRoutine,
IN BOOLEAN Remove
)
/*++
Routine Description:
This function allows an installable file system to hook into process
creation and deletion to track those events against their own internal
data structures.
Arguments:
NotifyRoutine - Supplies the address of a routine which is called at
process creation and deletion. The routine is passed the unique Id
of the created or deleted process and the parent process if it was
created with the inherit handles option. If it was created without
the inherit handle options, then the parent process Id will be NULL.
The third parameter passed to the notify routine is TRUE if the process
is being created and FALSE if it is being deleted.
The callout for creation happens just after the first thread in the
process has been created. The callout for deletion happens after the
last thread in a process has terminated and the address space is about
to be deleted. It is possible to get a deletion call without a creation
call if the pathological case where a process is created and deleted
without a thread ever being created.
Remove - FALSE specifies to install the callout and TRUE specifies to
remove the callout that mat
Return Value:
STATUS_SUCCESS if successful, and STATUS_INVALID_PARAMETER if not.
--*/
{
ULONG i;
for (i=0; i < PSP_MAX_CREATE_PROCESS_NOTIFY; i++) {
if (Remove) {
if (PspCreateProcessNotifyRoutine[i] == NotifyRoutine) {
PspCreateProcessNotifyRoutine[i] = NULL;
PspCreateProcessNotifyRoutineCount -= 1;
return STATUS_SUCCESS;
}
} else {
if (PspCreateProcessNotifyRoutine[i] == NULL) {
PspCreateProcessNotifyRoutine[i] = NotifyRoutine;
PspCreateProcessNotifyRoutineCount += 1;
return STATUS_SUCCESS;
}
}
}
return Remove ? STATUS_PROCEDURE_NOT_FOUND : STATUS_INVALID_PARAMETER;
}
NTSTATUS
PsSetCreateThreadNotifyRoutine(
IN PCREATE_THREAD_NOTIFY_ROUTINE NotifyRoutine
)
/*++
Routine Description:
This function allows an installable file system to hook into thread
creation and deletion to track those events against their own internal
data structures.
Arguments:
NotifyRoutine - Supplies the address of the routine which is called at
thread creation and deletion. The routine is passed the unique Id
of the created or deleted thread and the unique Id of the containing
process. The third parameter passed to the notify routine is TRUE if
the thread is being created and FALSE if it is being deleted.
Return Value:
STATUS_SUCCESS if successful, and STATUS_INSUFFICIENT_RESOURCES if not.
--*/
{
ULONG i;
NTSTATUS Status;
Status = STATUS_INSUFFICIENT_RESOURCES;
for (i = 0; i < PSP_MAX_CREATE_THREAD_NOTIFY; i += 1) {
if (PspCreateThreadNotifyRoutine[i] == NULL) {
PspCreateThreadNotifyRoutine[i] = NotifyRoutine;
PspCreateThreadNotifyRoutineCount += 1;
Status = STATUS_SUCCESS;
break;
}
}
return Status;
}
VOID
PspUserThreadStartup(
IN PKSTART_ROUTINE StartRoutine,
IN PVOID StartContext
)
/*++
Routine Description:
This function is called by the kernel to start a user-mode thread.
Arguments:
StartRoutine - Ignored.
StartContext - Supplies the initial pc value for the thread.
Return Value:
None.
--*/
{
PETHREAD Thread;
PKAPC StartApc;
PEPROCESS Process;
PAGED_CODE();
UNREFERENCED_PARAMETER(StartRoutine);
Process = PsGetCurrentProcess();
//
// All threads start with an APC at LdrInitializeThunk
//
MmAllowWorkingSetExpansion();
Thread = PsGetCurrentThread();
if ( !Thread->DeadThread && !Thread->HasTerminated ) {
StartApc = ExAllocatePool(NonPagedPoolMustSucceed,(ULONG)sizeof(KAPC));
((PTEB)PsGetCurrentThread()->Tcb.Teb)->CurrentLocale = PsDefaultThreadLocaleId;
KeInitializeApc(
StartApc,
&Thread->Tcb,
OriginalApcEnvironment,
PspNullSpecialApc,
NULL,
PspSystemDll.LoaderInitRoutine,
UserMode,
NULL
);
if ( !KeInsertQueueApc(StartApc,(PVOID) PspSystemDll.DllBase,NULL,0) ) {
ExFreePool(StartApc);
} else {
Thread->Tcb.ApcState.UserApcPending = TRUE;
}
} else {
if ( !Thread->DeadThread ) {
//
// If DeadThread is not set, then it means the thread was terminated before
// it started, but creation was ok. Need to let debuggers see these threads
// for an instant because if they are the last to exit, the exitprocess
// message gets nuked
//
KeLowerIrql(0);
DbgkCreateThread(StartContext);
}
PspExitThread(STATUS_THREAD_IS_TERMINATING);
}
KeLowerIrql(0);
DbgkCreateThread(StartContext);
if ( Process->Pcb.UserTime == 0 ) {
Process->Pcb.UserTime = 1;
}
}
ULONG
PspUnhandledExceptionInSystemThread(
IN PEXCEPTION_POINTERS ExceptionPointers
)
{
KdPrint(("PS: Unhandled Kernel Mode Exception Pointers = %x\n",ExceptionPointers));
KdPrint(("Code %x Addr %lx Info0 %x Info1 %x Info2 %x Info3 %x\n",
ExceptionPointers->ExceptionRecord->ExceptionCode,
(ULONG)ExceptionPointers->ExceptionRecord->ExceptionAddress,
ExceptionPointers->ExceptionRecord->ExceptionInformation[0],
ExceptionPointers->ExceptionRecord->ExceptionInformation[1],
ExceptionPointers->ExceptionRecord->ExceptionInformation[2],
ExceptionPointers->ExceptionRecord->ExceptionInformation[3]
));
KeBugCheckEx(
KMODE_EXCEPTION_NOT_HANDLED,
ExceptionPointers->ExceptionRecord->ExceptionCode,
(ULONG)ExceptionPointers->ExceptionRecord->ExceptionAddress,
ExceptionPointers->ExceptionRecord->ExceptionInformation[0],
ExceptionPointers->ExceptionRecord->ExceptionInformation[1]
);
return EXCEPTION_EXECUTE_HANDLER;
}
VOID
PspSystemThreadStartup(
IN PKSTART_ROUTINE StartRoutine,
IN PVOID StartContext
)
/*++
Routine Description:
This function is called by the kernel to start a system thread.
Arguments:
StartRoutine - Supplies the address of the system threads entry point.
StartContext - Supplies a context value for the system thread.
Return Value:
None.
--*/
{
PETHREAD Thread;
MmAllowWorkingSetExpansion();
KeLowerIrql(0);
Thread = PsGetCurrentThread();
try {
if ( !Thread->DeadThread && !Thread->HasTerminated ) {
(StartRoutine)(StartContext);
}
}
except (PspUnhandledExceptionInSystemThread(GetExceptionInformation())) {
KeBugCheck(KMODE_EXCEPTION_NOT_HANDLED);
}
PspExitThread(STATUS_SUCCESS);
}
NTSTATUS
PsLockProcess(
IN PEPROCESS Process,
IN KPROCESSOR_MODE WaitMode,
IN PSLOCKPROCESSMODE LockMode
)
/*++
Routine Description:
This function is used to lock the process from create/delete and to
freeze threads from entering/exiting the process.
Arguments:
Process - Pointer to the process to lock
WaitMode - Supplies the processor mode to issue the wait under
LockMode - The type of lock to attempt
PsLockPollOnTimeout - Use a timeout and poll for the lock
bailing if the process exits.
PsLockReturnTimeout - Do not poll, just timeout wait and
return if you can not get the lock.
PsLockWaitForever - Wait without a timeout
Return Value:
STATUS_SUCCESS - You got the lock, you must call PsUnlocProcess later on
STATUS_TIMEOUT - You requested PsLockReturnTimeout, and the lock was not available
STATUS_PROCESS_IS_TERMINATING - The process you are trying to lock is terminating
--*/
{
LARGE_INTEGER DueTime;
NTSTATUS Status;
PLARGE_INTEGER Timeout;
PETHREAD Thread;
PAGED_CODE();
Thread = PsGetCurrentThread();
retry:
//
// Acquire process lock fast mutex to synchronize access to the ownership,
// lock count, and synchronization event of the specified process.
//
KeEnterCriticalRegion();
ExAcquireFastMutexUnsafe(&PspProcessLockMutex);
//
// Check if the process lock can be acquired.
//
if (Process->LockCount != 1) {
//
// The process lock is currently owned.
//
// If the lock mode is return timeout, then release the process lock
// fast mutex and return timeout. Otherwise, set the timout value,
// decrement the lock count, release the process lock fast mutex, and
// wait for the process event.
//
if (LockMode == PsLockReturnTimeout) {
ExReleaseFastMutexUnsafe(&PspProcessLockMutex);
KeLeaveCriticalRegion();
return STATUS_TIMEOUT;
} else {
//
// If the lock mode is not wait forever, then set the timeout
// value to one second. Otherwise set the timeout to forever.
//
if (LockMode != PsLockWaitForever) {
DueTime.QuadPart = - 10 * 1000 * 1000;
Timeout = &DueTime;
} else {
Timeout = NULL;
}
//
// Decrement the lock count and loop waiting for the process to
// terminate or the lock to be granted.
//
Process->LockCount -= 1;
do {
//
// If the specified process has exited, then set the
// completion status and exit the loop.
//
if (Process->ExitTime.QuadPart != 0 && LockMode != PsLockWaitForever) {
Status = STATUS_PROCESS_IS_TERMINATING;
break;
}
//
// Release the process lock fast mutex and wait for the
// lock to be granted or time out to occur.
//
ExReleaseFastMutexUnsafe(&PspProcessLockMutex);
Status = KeWaitForSingleObject(&Process->LockEvent,
Executive,
WaitMode,
FALSE,
Timeout);
//
// Reacquire the process lock fast mutex and continue the
// loop if timeout has occured.
//
//
ExAcquireFastMutexUnsafe(&PspProcessLockMutex);
//
// If the specified process has exited, then set the
// completion status and exit the loop. This test needs
// to be repeated so we catch the non-timed out wait
// case where the process terminated and the lock was released
// during the wait period
//
if ( Process->ExitTime.QuadPart != 0 && LockMode != PsLockWaitForever ) {
Status = STATUS_PROCESS_IS_TERMINATING;
break;
}
} while (Status == STATUS_TIMEOUT);
//
// If the completion status is success, then the lock has been
// granted and the owner is set. Otherwise, a user APC is pending
// or the process has terminated and the lock request should be
// dropped.
//
if (Status != STATUS_SUCCESS) {
Status = STATUS_PROCESS_IS_TERMINATING;
Process->LockCount += 1;
if ((Process->LockCount == 1) &&
(KeReadStateEvent(&Process->LockEvent) != FALSE)) {
KeClearEvent(&Process->LockEvent);
}
} else {
Process->LockOwner = KeGetCurrentThread();
}
}
} else {
//
// The process lock is not currently owned.
//
// If the lock mode is not wait forever and the process has already
// terminated, then set the completion status to process terminating.
// Otherwise, decrement the lock count, set the lock owner, and set
// the completion status to success.
//
if ((LockMode != PsLockWaitForever) &&
( (Process->ExitTime.QuadPart != 0 || KeReadStateProcess(&Process->Pcb) != FALSE) )
) {
Status = STATUS_PROCESS_IS_TERMINATING;
} else {
Process->LockCount -= 1;
Process->LockOwner = KeGetCurrentThread();
Status = STATUS_SUCCESS;
}
}
//
// Release the process lock fast mutex and return the completion
// status.
//
ExReleaseFastMutexUnsafe(&PspProcessLockMutex);
if (Status != STATUS_SUCCESS) {
KeLeaveCriticalRegion();
} else {
//
// We don't want to be "frozen" with the process lock held, so now
// that we own the lock, check to see if we have a pending freeze count,
// and if we do and dropping the lock will help, then drop it
//
if (Thread->Tcb.FreezeCount != 0 &&
Thread->Tcb.KernelApcDisable == (ULONG) -1 ) {
PsUnlockProcess(Process);
goto retry;
}
}
return Status;
}
VOID
PsUnlockProcess(
IN PEPROCESS Process
)
/*++
Routine Description:
This function is the opposite of a successful call to PsLockProcess. It
simply releases the createdelete lock for a process.
Arguments:
Process - Supplies the address of the process whose create/delete
lock is to be released.
Return Value:
None.
--*/
{
PAGED_CODE();
//
// Acquire process lock fast mutex to synchronize access to the ownership,
// lock count, and synchronization event of the specified process.
//
ExAcquireFastMutexUnsafe(&PspProcessLockMutex);
//
// Increment the lock count and clear the lock owner. If the lock count
// is less than one, then set the lock event.
//
Process->LockCount += 1;
Process->LockOwner = NULL;
if (Process->LockCount != 1) {
KeSetEvent(&Process->LockEvent, 0, FALSE);
}
//
// Release the process lock fast mutex and return.
//
ExReleaseFastMutexUnsafe(&PspProcessLockMutex);
KeLeaveCriticalRegion();
return;
}
HANDLE
PsGetCurrentProcessId( VOID )
{
return PsGetCurrentThread()->Cid.UniqueProcess;
}
HANDLE
PsGetCurrentThreadId( VOID )
{
return PsGetCurrentThread()->Cid.UniqueThread;
}
BOOLEAN
PsGetVersion(
PULONG MajorVersion OPTIONAL,
PULONG MinorVersion OPTIONAL,
PULONG BuildNumber OPTIONAL,
PUNICODE_STRING CSDVersion OPTIONAL
)
{
if (ARGUMENT_PRESENT(MajorVersion)) {
*MajorVersion = NtMajorVersion;
}
if (ARGUMENT_PRESENT(MinorVersion)) {
*MinorVersion = NtMinorVersion;
}
if (ARGUMENT_PRESENT(BuildNumber)) {
*BuildNumber = NtBuildNumber & 0x3FFF;
}
if (ARGUMENT_PRESENT(CSDVersion)) {
*CSDVersion = CmCSDVersionString;
}
return (NtBuildNumber >> 28) == 0xC;
}