aboutsummaryrefslogtreecommitdiff
path: root/find_lock/find_lock.cpp
diff options
context:
space:
mode:
Diffstat (limited to 'find_lock/find_lock.cpp')
-rwxr-xr-xfind_lock/find_lock.cpp778
1 files changed, 778 insertions, 0 deletions
diff --git a/find_lock/find_lock.cpp b/find_lock/find_lock.cpp
new file mode 100755
index 000000000..bbbba816a
--- /dev/null
+++ b/find_lock/find_lock.cpp
@@ -0,0 +1,778 @@
+/*
+ * Copyright (C) 2012 The Android Open Source Project
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+/*
+ * "find_lock.exe", for Windows only.
+ *
+ * References used:
+ *
+ * http://drdobbs.com/windows/184411099
+ * article by Sven B. Schreiber, November 01, 1999
+ *
+ * http://www.codeguru.com/Cpp/W-P/system/processesmodules/article.php/c2827/
+ * by Zoltan Csizmadia, November 14, 2000
+ *
+ * http://stackoverflow.com/questions/860656/
+ * (same technique, but written in unsafe C#)
+ *
+ * Starting with Vista, we can also use the Restart Manager API as
+ * explained here: (TODO for next version)
+ * http://msdn.microsoft.com/en-us/magazine/cc163450.aspx
+ */
+
+#ifdef _WIN32
+
+#include "utils.h"
+#include <ctype.h>
+#include <fcntl.h>
+#include <io.h>
+#include <process.h>
+
+
+// NtDll structures from the the Dr Dobbs article, adjusted for our needs:
+
+typedef void *POBJECT;
+typedef LONG KPRIORITY;
+typedef LARGE_INTEGER QWORD;
+
+typedef struct {
+ WORD Length;
+ WORD MaximumLength;
+ PWORD Buffer;
+} UNICODE_STRING;
+
+typedef struct {
+ DWORD dIdProcess;
+ BYTE bObjectType; // OB_TYPE_*
+ BYTE bFlags; // bits 0..2 HANDLE_FLAG_*
+ WORD wValue; // multiple of 4
+ POBJECT pObject;
+ ACCESS_MASK GrantedAccess;
+} SYSTEM_HANDLE;
+
+typedef struct {
+ DWORD dCount;
+ SYSTEM_HANDLE ash[1];
+} SYSTEM_HANDLE_INFORMATION;
+
+typedef struct {
+ DWORD PeakVirtualSize;
+ DWORD VirtualSize;
+ DWORD PageFaultCount;
+ DWORD PeakWorkingSetSize;
+ DWORD WorkingSetSize;
+ DWORD QuotaPeakPagedPoolUsage;
+ DWORD QuotaPagedPoolUsage;
+ DWORD QuotaPeakNonPagedPoolUsage;
+ DWORD QuotaNonPagedPoolUsage;
+ DWORD PagefileUsage;
+ DWORD PeakPagefileUsage;
+} VM_COUNTERS;
+
+typedef struct {
+ HANDLE UniqueProcess;
+ HANDLE UniqueThread;
+} CLIENT_ID;
+
+typedef enum {
+ // Ignored. We don't actually use these values.
+ Unused
+} KWAIT_REASON;
+
+typedef struct {
+ QWORD qKernelTime; // 100 nsec units
+ QWORD qUserTime; // 100 nsec units
+ QWORD qCreateTime; // relative to 01-01-1601
+ DWORD d18;
+ PVOID pStartAddress;
+ CLIENT_ID Cid; // process/thread ids
+ DWORD dPriority;
+ DWORD dBasePriority;
+ DWORD dContextSwitches;
+ DWORD dThreadState; // 2=running, 5=waiting
+ KWAIT_REASON WaitReason;
+ DWORD dReserved01;
+} SYSTEM_THREAD;
+
+typedef struct {
+ DWORD dNext; // relative offset
+ DWORD dThreadCount;
+ DWORD dReserved01;
+ DWORD dReserved02;
+ DWORD dReserved03;
+ DWORD dReserved04;
+ DWORD dReserved05;
+ DWORD dReserved06;
+ QWORD qCreateTime; // relative to 01-01-1601
+ QWORD qUserTime; // 100 nsec units
+ QWORD qKernelTime; // 100 nsec units
+ UNICODE_STRING usName;
+ KPRIORITY BasePriority;
+ DWORD dUniqueProcessId;
+ DWORD dInheritedFromUniqueProcessId;
+ DWORD dHandleCount;
+ DWORD dReserved07;
+ DWORD dReserved08;
+ VM_COUNTERS VmCounters;
+ DWORD dCommitCharge; // bytes
+ SYSTEM_THREAD ast[1];
+} SYSTEM_PROCESS_INFORMATION;
+
+// The sic opcode for NtQuerySystemInformation
+typedef enum {
+ SystemProcessInformation = 5,
+ SystemHandleInformation = 16,
+} SYSTEMINFOCLASS;
+
+
+#define STATUS_SUCCESS 0x00000000
+#define STATUS_UNSUCCESSFUL 0xC0000001
+#define STATUS_NOT_IMPLEMENTED 0xC0000002
+#define STATUS_INVALID_INFO_CLASS 0xC0000003
+#define STATUS_INFO_LENGTH_MISMATCH 0xC0000004
+#define STATUS_INVALID_PARAMETER 0xC000000D
+
+typedef DWORD (WINAPI *NtQuerySystemInformationFuncPtr)(
+ DWORD sic, VOID* pData, DWORD sSize, ULONG* pdSize);
+typedef DWORD (WINAPI *NtQueryInformationFileFuncPtr)(HANDLE, PVOID, PVOID, DWORD, DWORD);
+typedef DWORD (WINAPI *NtQueryObjectFuncPtr)(HANDLE, DWORD, VOID*, DWORD, VOID*);
+
+static NtQuerySystemInformationFuncPtr sNtQuerySystemInformationFunc;
+static NtQueryInformationFileFuncPtr sNtQueryInformationFileFunc;
+static NtQueryObjectFuncPtr sNtQueryObjectFunc;
+
+//------------
+
+// Get the NT DLL functions we need to use.
+static bool init() {
+
+ sNtQuerySystemInformationFunc =
+ (NtQuerySystemInformationFuncPtr) GetProcAddress(
+ GetModuleHandleA("ntdll.dll"), "NtQuerySystemInformation");
+
+ sNtQueryInformationFileFunc =
+ (NtQueryInformationFileFuncPtr) GetProcAddress(
+ GetModuleHandleA("ntdll.dll"), "NtQueryInformationFile");
+
+ sNtQueryObjectFunc =
+ (NtQueryObjectFuncPtr) GetProcAddress(
+ GetModuleHandleA("ntdll.dll"), "NtQueryObject");
+
+ return sNtQuerySystemInformationFunc != NULL &&
+ sNtQueryInformationFileFunc != NULL &&
+ sNtQueryObjectFunc != NULL;
+}
+
+static void terminate() {
+ sNtQuerySystemInformationFunc = NULL;
+ sNtQueryInformationFileFunc = NULL;
+ sNtQueryObjectFunc = NULL;
+}
+
+static bool adjustPrivileges() {
+ char *error = NULL;
+ HANDLE tokenH;
+
+ // Open a process token that lets us adjust privileges
+ BOOL ok = OpenProcessToken(GetCurrentProcess(), // ProcessHandle
+ TOKEN_ADJUST_PRIVILEGES | TOKEN_QUERY, // DesiredAccess
+ &tokenH); // TokenHandle
+ if (!ok) {
+ error = "OpenProcessToken failed: ";
+ goto bail_out;
+ }
+
+ // Lookup the privilege by name and get its local LUID token.
+ // What we request:
+ // SE_DEBUG_NAME, aka "SeDebugPrivilege"
+ // MSDN: Required to debug and adjust the memory of a process owned by another account.
+ // User Right: Debug programs.
+ TOKEN_PRIVILEGES priv;
+ priv.PrivilegeCount = 1;
+ priv.Privileges[0].Attributes = SE_PRIVILEGE_ENABLED;
+ ok = LookupPrivilegeValueA(NULL, // lpSystemName
+ SE_DEBUG_NAME, // lpName
+ &(priv.Privileges[0].Luid)); // lpLuid
+ if (!ok) {
+ error = "LookupPrivilegeValue failed: ";
+ goto bail_out;
+ }
+
+ ok = AdjustTokenPrivileges(tokenH, // TokenHandle
+ FALSE, // DisableAllPrivileges
+ &priv, // NewState
+ 0, // BufferLength
+ NULL, // PreviousState
+ 0); // ReturnLength
+ if (!ok) {
+ error = "AdjustTokenPrivileges failed: ";
+ goto bail_out;
+ }
+
+bail_out:
+ if (error != NULL && gIsDebug) {
+ CString err;
+ err.setLastWin32Error(error);
+ fprintf(stderr, "%s", err.cstr());
+ }
+
+ if (tokenH != NULL) {
+ CloseHandle(tokenH);
+ }
+
+ return !!ok;
+}
+
+static bool getHandleType(HANDLE h, CString *type) {
+ bool result = false;
+ ULONG size = 0;
+ // Get the size of the type string
+ int status = sNtQueryObjectFunc(h, 2, NULL, 0, &size);
+ if (status == STATUS_INFO_LENGTH_MISMATCH && size > 0) {
+ // Get the type string itself
+ char *buf = new char[size];
+ status = sNtQueryObjectFunc(h, 2, buf, size, NULL);
+ if (status == 0 && size > 96) {
+ // The type string we want is a wide unicode (UTF16)
+ // zero-terminated string located at offset 96 in the
+ // buffer. In our case we want the string to be
+ // "Directory" or "File" so we know the max useful length
+ // is 9.
+ // Since we can only deal with ansi strings in this program,
+ // we'll make a crude copy of every other byte and just check
+ // that the other bytes are zero.
+ const char *c = buf + 96;
+ const char *e = buf + 96 + size;
+ // we'll write at the beginning of our buffer
+ char *dest = buf;
+ char *dend = dest + 9;
+ for (; c < e && dest < dend && c[0] != '\0' && c[1] == '\0'; c += 2, dest++) {
+ *dest = *c;
+ }
+ *(dest++) = '\0';
+ type->set(buf, dest - buf);
+ result = true;
+ }
+
+ free(buf);
+ }
+ return result;
+}
+
+// These is the wide unicode representations of the type we want to find.
+static const char kFileW[] = "File";
+
+static char isFileHandleType(HANDLE handle) {
+ char type = 0;
+ ULONG size = 0;
+ // Get the size of the type string
+ int status = sNtQueryObjectFunc(handle, 2, NULL, 0, &size);
+ if (status == STATUS_INFO_LENGTH_MISMATCH && size > 0) {
+ // Get the type string itself
+ char *buf = new char[size];
+ status = sNtQueryObjectFunc(handle, 2, buf, size, NULL);
+ if (status == 0 && size > 96) {
+ // The type string we want is a wide unicode (UTF16-LE)
+ // zero-terminated string located at offset 96 in the
+ // buffer. In our case we want the string to be "File".
+ //
+ // Since we're reading wide unicode, we want each character
+ // to be the one from our string followed by a zero byte.
+ // e.g. c should point to F \0 i \0 l \0 e \0 \0 \0.
+ const char *c = buf + 96;
+ type = c[0];
+
+ int len = sizeof(kFileW);
+ const char *d = kFileW;
+
+ for (; type != 0 && len > 0; c+=2, d++, len--) {
+ if (c[0] != *d || c[1] != 0) {
+ type = 0;
+ break;
+ }
+ }
+ }
+
+ free(buf);
+ }
+ return type;
+}
+
+typedef struct {
+ HANDLE handle;
+ CString *outStr;
+ bool result;
+} SFileNameInfo;
+
+static unsigned __stdcall FileNameThreadFunc(void *param) {
+ SFileNameInfo *info = (SFileNameInfo *)param;
+ if (info == NULL) {
+ return 1;
+ }
+
+ char buf[MAX_PATH*2 + 4];
+ DWORD iob[2] = { 0, 0 };
+
+ DWORD status = sNtQueryInformationFileFunc(info->handle, iob, buf, sizeof(buf), 9);
+ if (status == STATUS_SUCCESS) {
+ // The result is a buffer with:
+ // - DWORD (4 bytes) for the *byte* length (so twice the character length)
+ // - Actual string in Unicode
+ // Not sure of the actual type, but it does look like a UNICODE_STRING struct.
+
+ DWORD len = ((DWORD *)buf)[0];
+ if (len <= MAX_PATH * 2) {
+ // We can't handle wide Unicode. What we do is convert it into
+ // straight ansi by just retaining the first of each couple bytes.
+ // Bytes that cannot be mapped (e.g. 2nd byte is != 0) will be
+ // simply converted to 0xFF.
+
+ unsigned char *dest = (unsigned char *)buf + 4;
+ unsigned char *src = (unsigned char *)buf + 4;
+ for (DWORD i = 0; i < len; dest++, src += 2, i += 2) {
+ if (src[1] == 0) {
+ *dest = *src;
+ } else {
+ *dest = 0xFF;
+ }
+ }
+ *dest = '\0';
+ info->outStr->set(buf + 4, len);
+ info->result = true;
+ return 0;
+ }
+ }
+ return 1;
+}
+
+static bool getFileName(HANDLE handle, CString *outStr) {
+ SFileNameInfo info;
+ info.handle = handle;
+ info.outStr = outStr;
+ info.result = false;
+
+ // sNtQueryInformationFileFunc might hang on some handles.
+ // A trick is to do it in a thread and if it takes too loog then
+ // just shutdown the thread, since it's deadlocked anyway.
+ unsigned threadId;
+ HANDLE th = (HANDLE)_beginthreadex(NULL, // security
+ 0, // stack_size
+ &FileNameThreadFunc, // address
+ &info, // arglist
+ 0, // initflag
+ &threadId); // thrdaddr
+
+ if (th == NULL) {
+ // Failed to create thread. Shouldn't really happen.
+ outStr->set("<failed to create thread>");
+ return false;
+ }
+
+ bool result = false;
+
+ // Wait for thread or kill it if it takes too long.
+ if (WaitForSingleObject(th /*handle*/, 200 /*ms*/) == WAIT_TIMEOUT) {
+ TerminateThread(th /*handle*/, 0 /*retCode*/);
+ outStr->set("<timeout>");
+ } else {
+ result = info.result;
+ }
+
+ CloseHandle(th);
+ return result;
+}
+
+// Find the name of the process (e.g. "java.exe") given its id.
+// processesPtr must be the list returned by getAllProcesses().
+// Special handling for javaw.exe: this isn't quite useful so
+// we also try to find and append the parent process name.
+static bool getProcessName(SYSTEM_PROCESS_INFORMATION *processesPtr,
+ DWORD remoteProcessId,
+ CString *outStr) {
+ SYSTEM_PROCESS_INFORMATION *ptr = processesPtr;
+ while (ptr != NULL) {
+ if (ptr->dUniqueProcessId == remoteProcessId) {
+ // This is the process we want.
+
+ UNICODE_STRING *uniStr = &(ptr->usName);
+ WORD len = uniStr->Length;
+
+ char buf[MAX_PATH];
+ if (len <= MAX_PATH * 2) {
+ // We can't handle wide Unicode. What we do is convert it into
+ // straight ansi by just retaining the first of each couple bytes.
+ // Bytes that cannot be mapped (e.g. 2nd byte is != 0) will be
+ // simply converted to 0xFF.
+
+ unsigned char *dest = (unsigned char *)buf;
+ unsigned char *src = (unsigned char *)uniStr->Buffer;
+ for (WORD i = 0; i < len; dest++, src += 2, i += 2) {
+ if (src[1] == 0) {
+ *dest = *src;
+ } else {
+ *dest = 0xFF;
+ }
+ }
+ *dest = '\0';
+ outStr->set(buf, len);
+
+ if (strcmp(buf, "javaw.exe") == 0) {
+ // Heuristic: eclipse often shows up as javaw.exe
+ // but what is useful is to report eclipse to the user
+ // instead.
+ // So in this case, look at the parent and report it too.
+ DWORD parentId = ptr->dInheritedFromUniqueProcessId;
+ if (parentId > 0) {
+ CString name2;
+ bool ok2 = getProcessName(processesPtr,
+ parentId,
+ &name2);
+ if (ok2) {
+ outStr->add(" (");
+ outStr->add(name2.cstr());
+ outStr->add(")");
+ }
+ }
+ }
+
+ return true;
+ }
+ }
+
+ // Look at the next process, if any.
+ if (ptr->dNext == NULL) {
+ break;
+ } else {
+ ptr = (SYSTEM_PROCESS_INFORMATION *)((char *)ptr + ptr->dNext);
+ }
+ }
+
+ outStr->setf("<process id %08x name not found>", remoteProcessId);
+ return false;
+}
+
+// Query system for all processes information.
+// Returns an error string in case of error.
+// Returns the virtual_alloc-allocated buffer on success or NULL on error.
+// It's up to the caller to do a VirtualFree on the returned buffer.
+static SYSTEM_PROCESS_INFORMATION *queryAllProcess(const char **error) {
+ // Allocate a buffer for the process information. We don't know the
+ // exact size. A normal system might typically have between 100-200 processes.
+ // We'll resize the buffer if not big enough.
+ DWORD infoSize = 4096;
+ SYSTEM_PROCESS_INFORMATION *infoPtr =
+ (SYSTEM_PROCESS_INFORMATION *) VirtualAlloc(NULL, infoSize, MEM_COMMIT, PAGE_READWRITE);
+
+ if (infoPtr != NULL) {
+ // Query the actual size needed (or the data if it fits in the buffer)
+ DWORD needed = 0;
+ if (sNtQuerySystemInformationFunc(
+ SystemProcessInformation, infoPtr, infoSize, &needed) != 0) {
+ if (needed == 0) {
+ // Shouldn't happen.
+ *error = "No processes found";
+ goto bail_out;
+ }
+
+ // Realloc
+ VirtualFree(infoPtr, 0, MEM_RELEASE);
+ infoSize += needed;
+ infoPtr = (SYSTEM_PROCESS_INFORMATION *) VirtualAlloc(
+ NULL, infoSize, MEM_COMMIT, PAGE_READWRITE);
+
+ // Query all the processes objects again
+ if (sNtQuerySystemInformationFunc(
+ SystemProcessInformation, infoPtr, infoSize, NULL) != 0) {
+ *error = "Failed to query system processes";
+ goto bail_out;
+ }
+ }
+ }
+
+ if (infoPtr == NULL) {
+ *error = "Failed to allocate system processes info buffer";
+ goto bail_out;
+ }
+
+bail_out:
+ if (*error != NULL) {
+ VirtualFree(infoPtr, 0, MEM_RELEASE);
+ infoPtr = NULL;
+ }
+ return infoPtr;
+}
+
+// Query system for all handle information.
+// Returns an error string in case of error.
+// Returns the virtual_alloc-allocated buffer on success or NULL on error.
+// It's up to the caller to do a VirtualFree on the returned buffer.
+static SYSTEM_HANDLE_INFORMATION *queryAllHandles(const char **error) {
+ // Allocate a buffer. It won't be large enough to get the handles
+ // (e.g. there might be 10k or 40k handles around). We'll resize
+ // it once we know the actual size.
+ DWORD infoSize = 4096;
+ SYSTEM_HANDLE_INFORMATION *infoPtr =
+ (SYSTEM_HANDLE_INFORMATION *) VirtualAlloc(NULL, infoSize, MEM_COMMIT, PAGE_READWRITE);
+
+ if (infoPtr != NULL) {
+ // Query the actual size needed
+ DWORD needed = 0;
+ if (sNtQuerySystemInformationFunc(
+ SystemHandleInformation, infoPtr, infoSize, &needed) != 0) {
+ if (needed == 0) {
+ // Shouldn't happen.
+ *error = "No handles found";
+ goto bail_out;
+ }
+
+ // Realloc
+ VirtualFree(infoPtr, 0, MEM_RELEASE);
+ infoSize += needed;
+ infoPtr = (SYSTEM_HANDLE_INFORMATION *) VirtualAlloc(
+ NULL, infoSize, MEM_COMMIT, PAGE_READWRITE);
+ }
+ }
+
+ if (infoPtr == NULL) {
+ *error = "Failed to allocate system handle info buffer";
+ goto bail_out;
+ }
+
+ // Query all the handle objects
+ if (sNtQuerySystemInformationFunc(SystemHandleInformation, infoPtr, infoSize, NULL) != 0) {
+ *error = "Failed to query system handles";
+ goto bail_out;
+ }
+
+bail_out:
+ if (*error != NULL) {
+ VirtualFree(infoPtr, 0, MEM_RELEASE);
+ infoPtr = NULL;
+ }
+ return infoPtr;
+}
+
+bool findLock(CPath &path, CString *outModule) {
+ bool result = false;
+ const char *error = NULL;
+
+ SYSTEM_PROCESS_INFORMATION *processesPtr = NULL;
+ SYSTEM_HANDLE_INFORMATION *handlesPtr = NULL;
+
+ const HANDLE currProcessH = GetCurrentProcess();
+ const DWORD currProcessId = GetCurrentProcessId();
+ HANDLE remoteProcessH = NULL;
+ DWORD remoteProcessId = 0;
+ DWORD matchProcessId = 0;
+
+ int numHandleFound = 0;
+ int numHandleChecked = 0;
+ int numHandleDirs = 0;
+ int numHandleFiles = 0;
+ int numProcessMatch = 0;
+
+ BYTE ob_type_file = 0;
+
+ // Get the path to search, without the drive letter.
+ const char *searchPath = path.cstr();
+ if (isalpha(searchPath[0]) && searchPath[1] == ':') {
+ searchPath += 2;
+ }
+ size_t searchPathLen = strlen(searchPath);
+
+ if (gIsDebug) fprintf(stderr, "Search path: '%s'\n", searchPath);
+
+ if (!init()) {
+ error = "Failed to bind to ntdll.dll";
+ goto bail_out;
+ }
+
+ if (!adjustPrivileges()) {
+ // We can still continue even if the privilege escalation failed.
+ // The apparent effect is that we'll fail to query the name of
+ // some processes, yet it will work for some of them.
+ if (gIsDebug) fprintf(stderr, "Warning: adusting privileges failed. Continuing anyway.\n");
+ } else {
+ if (gIsDebug) fprintf(stderr, "Privileges adjusted.\n"); // DEBUG remove lter
+ }
+
+ processesPtr = queryAllProcess(&error);
+ if (processesPtr == NULL) goto bail_out;
+
+ handlesPtr = queryAllHandles(&error);
+ if (handlesPtr == NULL) goto bail_out;
+
+ numHandleFound = handlesPtr->dCount;
+
+ // Check all the handles
+ for (int n = handlesPtr->dCount, i = 0; i < n; i++) {
+ SYSTEM_HANDLE sysh = handlesPtr->ash[i];
+
+ if (ob_type_file != 0 && sysh.bObjectType != ob_type_file) {
+ continue;
+ }
+
+ HANDLE handle = (HANDLE) sysh.wValue;
+ DWORD remoteId = sysh.dIdProcess;
+ HANDLE remoteH = NULL;
+
+ if (remoteId == matchProcessId) {
+ // We already matched that process, we can skip its other entries.
+ continue;
+ }
+
+ if (remoteId == currProcessId) {
+ // We don't match ourselves
+ continue;
+ }
+
+ // Open a remote process.
+ // Most entries of a given process seem to be consecutive, so we
+ // only open the remote process handle if it's a different id.
+ if (remoteProcessH == NULL && remoteId == remoteProcessId) {
+ // We already tried to open this process and it failed.
+ // It's not going to be any better the next time so skip it.
+ continue;
+ }
+ if (remoteProcessH == NULL || remoteId != remoteProcessId) {
+ if (remoteProcessH != NULL) {
+ CloseHandle(remoteProcessH);
+ }
+
+ remoteProcessId = remoteId;
+ remoteProcessH = OpenProcess(PROCESS_DUP_HANDLE,
+ FALSE /*inheritHandle*/,
+ remoteProcessId);
+ if (remoteProcessH == NULL) {
+ continue;
+ }
+ }
+
+ if (remoteProcessH != NULL) {
+ // Duplicate the remote handle
+ if (DuplicateHandle(remoteProcessH, // hSourceProcessHandle
+ handle, // hSourceHandle
+ currProcessH, // hTargetProcessHandle
+ &remoteH, // lpTargetHandle
+ 0, // dwDesiredAccess (ignored by same access)
+ FALSE, // bInheritHandle
+ DUPLICATE_SAME_ACCESS) == 0) {
+ continue;
+ }
+ }
+
+ numHandleChecked++;
+
+ char type = isFileHandleType(remoteH);
+
+ if (type != 0) {
+ if (type == 'D') numHandleDirs++;
+ else if (type == 'F') numHandleFiles++;
+
+ // TODO simplify by not keeping directory handles
+ if (ob_type_file == 0 && type == 'F') {
+ // We found the first file handle. Remember it's system_handle object type
+ // and then use it to filter the following system_handle.
+ // For some reason OB_TYPE_FILE should be 0x1A but empirically I find it
+ // to be 0x1C, so we just make this test more dynamic.
+ ob_type_file = sysh.bObjectType;
+ }
+
+ // Try to get a filename out of that file or directory handle.
+ CString name("<unknown>");
+ bool ok = getFileName(remoteH, &name);
+
+ if (gIsDebug) {
+ fprintf(stderr, "P:%08x | t:%02x | f:%02x | v:%08x | %c | %s %s\n",
+ sysh.dIdProcess, sysh.bObjectType, sysh.bFlags, sysh.wValue,
+ type,
+ ok ? "OK" : "FAIL",
+ name.cstr()
+ );
+ }
+
+ if (ok) {
+ // We got a file path. Let's check if it matches our target path.
+ if (_strnicmp(searchPath, name.cstr(), searchPathLen) == 0) {
+ // Remember this process id so that we can ignore all its following entries.
+ matchProcessId = remoteId;
+
+ // Find out its process name
+ CString procName("<unknown>");
+ ok = getProcessName(processesPtr, remoteProcessId, &procName);
+ if (ok) {
+ numProcessMatch++;
+
+ if (!outModule->isEmpty()) {
+ outModule->add(";");
+ }
+ outModule->add(procName.cstr());
+ result = true;
+ }
+
+ if (gIsDebug) {
+ fprintf(stderr, "==> MATCH FOUND: %s %s\n",
+ ok ? "OK" : "FAIL",
+ procName.cstr()
+ );
+ }
+ }
+ }
+
+ }
+
+ if (remoteH != NULL) {
+ CloseHandle(remoteH);
+ remoteH = NULL;
+ }
+ }
+
+bail_out:
+
+ if (gIsDebug) {
+ fprintf(stderr, "Processes matched: %d\n", numProcessMatch);
+ fprintf(stderr, "Handles: %d found, %d checked, %d dirs, %d files\n",
+ numHandleFound,
+ numHandleChecked,
+ numHandleDirs,
+ numHandleFiles);
+ }
+
+ if (error != NULL) {
+ CString msg;
+ msg.setLastWin32Error(NULL);
+ if (gIsDebug) fprintf(stderr, "[ERROR] %s: %s", error, msg.cstr());
+ }
+
+ if (remoteProcessH != NULL) {
+ CloseHandle(remoteProcessH);
+ }
+
+ if (currProcessH != NULL) {
+ CloseHandle(currProcessH);
+ }
+
+ if (handlesPtr != NULL) {
+ VirtualFree(handlesPtr, 0, MEM_RELEASE);
+ handlesPtr = NULL;
+ }
+
+ terminate();
+
+ return result;
+}
+
+#endif /* _WIN32 */