ObjectAttributes->ObjectName, ObjectAttributes->RootDirectory,
DesiredAccess, CreateOptions);
+ /* Ignore the WOW64 flag, it's not valid in the kernel */
+ DesiredAccess &= ~KEY_WOW64_RES;
+
/* Check for user-mode caller */
if (PreviousMode != KernelMode)
{
DPRINT("NtOpenKey(Path: %wZ, Root %x, Access: %x)\n",
ObjectAttributes->ObjectName, ObjectAttributes->RootDirectory, DesiredAccess);
+ /* Ignore the WOW64 flag, it's not valid in the kernel */
+ DesiredAccess &= ~KEY_WOW64_RES;
+
/* Check for user-mode caller */
if (PreviousMode != KernelMode)
{
/* Just let the object manager handle this */
Status = ObOpenObjectByName(ObjectAttributes,
CmpKeyObjectType,
- ExGetPreviousMode(),
+ PreviousMode,
NULL,
DesiredAccess,
&ParseContext,
Status = ObReferenceObjectByHandle(KeyHandle,
KEY_ENUMERATE_SUB_KEYS,
CmpKeyObjectType,
- ExGetPreviousMode(),
+ PreviousMode,
(PVOID*)&KeyObject,
NULL);
if (!NT_SUCCESS(Status)) return Status;
Status = ObReferenceObjectByHandle(KeyHandle,
KEY_QUERY_VALUE,
CmpKeyObjectType,
- ExGetPreviousMode(),
+ PreviousMode,
(PVOID*)&KeyObject,
NULL);
if (!NT_SUCCESS(Status)) return Status;
Status = ObReferenceObjectByHandle(KeyHandle,
0,
CmpKeyObjectType,
- ExGetPreviousMode(),
+ PreviousMode,
(PVOID*)&KeyObject,
&HandleInfo);
if (NT_SUCCESS(Status))
Status = ObReferenceObjectByHandle(KeyHandle,
KEY_QUERY_VALUE,
CmpKeyObjectType,
- ExGetPreviousMode(),
+ PreviousMode,
(PVOID*)&KeyObject,
NULL);
}
Status = ObReferenceObjectByHandle(KeyHandle,
KEY_QUERY_VALUE,
CmpKeyObjectType,
- ExGetPreviousMode(),
+ PreviousMode,
(PVOID*)&KeyObject,
NULL);
if (!NT_SUCCESS(Status)) return Status;
Data = NULL;
/* Probe and copy the data */
- if ((PreviousMode != KernelMode) && Data)
+ if ((PreviousMode != KernelMode) && (DataSize != 0))
{
PVOID DataCopy = ExAllocatePoolWithTag(PagedPool, DataSize, TAG_CM);
if (!DataCopy)
- return STATUS_NO_MEMORY;
+ return STATUS_INSUFFICIENT_RESOURCES;
_SEH2_TRY
{
ProbeForRead(Data, DataSize, 1);
Status = ObReferenceObjectByHandle(KeyHandle,
KEY_SET_VALUE,
CmpKeyObjectType,
- ExGetPreviousMode(),
+ PreviousMode,
(PVOID*)&KeyObject,
NULL);
if (!NT_SUCCESS(Status))
KEY_SET_VALUE,
CmpKeyObjectType,
PreviousMode,
- (PVOID *)&KeyObject,
+ (PVOID*)&KeyObject,
NULL);
if (!NT_SUCCESS(Status)) return Status;
/* Validate privilege */
if (!SeSinglePrivilegeCheck(SeRestorePrivilege, PreviousMode))
{
- /* Fail */
DPRINT1("Restore Privilege missing!\n");
return STATUS_PRIVILEGE_NOT_HELD;
}
0,
CmpKeyObjectType,
PreviousMode,
- (PVOID *)&KeyBody,
+ (PVOID*)&KeyBody,
NULL);
}
}
_SEH2_EXCEPT(EXCEPTION_EXECUTE_HANDLER)
{
- return _SEH2_GetExceptionCode();
+ _SEH2_YIELD(return _SEH2_GetExceptionCode());
}
_SEH2_END;
IN ULONG Length,
IN BOOLEAN Asynchronous)
{
- UNIMPLEMENTED;
+ UNIMPLEMENTED_ONCE;
return STATUS_NOT_IMPLEMENTED;
}
/* Get the processor mode */
PreviousMode = KeGetPreviousMode();
+ /* Check for user-mode caller */
if (PreviousMode != KernelMode)
{
/* Prepare to probe parameters */
KEY_READ,
CmpKeyObjectType,
PreviousMode,
- (PVOID *)&KeyBody,
+ (PVOID*)&KeyBody,
NULL);
/* Close the handle */
return STATUS_INVALID_PARAMETER;
}
- /* Check for the SeBackupPrivilege */
+ /* Validate privilege */
if (!SeSinglePrivilegeCheck(SeBackupPrivilege, PreviousMode))
{
return STATUS_PRIVILEGE_NOT_HELD;
PreviousMode = ExGetPreviousMode();
- /* Check for the SeBackupPrivilege */
+ /* Validate privilege */
if (!SeSinglePrivilegeCheck(SeBackupPrivilege, PreviousMode))
{
return STATUS_PRIVILEGE_NOT_HELD;
/* Validate privilege */
if (!SeSinglePrivilegeCheck(SeRestorePrivilege, PreviousMode))
{
- /* Fail */
DPRINT1("Restore Privilege missing!\n");
return STATUS_PRIVILEGE_NOT_HELD;
}
goto Quickie;
}
- /* Check if it's a readonly key */
+ /* Check if it's a read-only key */
if (KeyBody->KeyControlBlock->ExtFlags & CM_KCB_READ_ONLY_KEY)
{
/* Return appropriate status */
{
if (Flags != REG_FORCE_UNLOAD)
{
- /* Release two KCBs lock */
+ /* Release the KCB locks */
CmpReleaseTwoKcbLockByKey(ChildConv, ParentConv);
/* Release the hive loading lock */