Fix other _SEH2_YIELD() issues, spotted for most of them by Pigglesworth, the other by myself.

I'm wondering how much remaining ones are in our code. Only the Lord knows...

svn path=/trunk/; revision=60053
This commit is contained in:
Hermès Bélusca-Maïto 2013-09-12 00:41:24 +00:00
parent 7af0cfc398
commit e1e93ee7dd
8 changed files with 32 additions and 32 deletions

View file

@ -96,14 +96,14 @@ DetectVMware(int *Version)
} }
#elif defined(_MSC_VER) && defined(_M_AMD64) #elif defined(_MSC_VER) && defined(_M_AMD64)
DPRINT1("DetectVMware stub\n"); DPRINT1("DetectVMware stub\n");
return FALSE; _SEH2_YIELD(return FALSE);
#else #else
#error TODO #error TODO
#endif #endif
} }
_SEH2_EXCEPT(_SEH2_GetExceptionCode() == EXCEPTION_PRIV_INSTRUCTION ? EXCEPTION_EXECUTE_HANDLER : EXCEPTION_CONTINUE_SEARCH) _SEH2_EXCEPT(_SEH2_GetExceptionCode() == EXCEPTION_PRIV_INSTRUCTION ? EXCEPTION_EXECUTE_HANDLER : EXCEPTION_CONTINUE_SEARCH)
{ {
return FALSE; _SEH2_YIELD(return FALSE);
} }
_SEH2_END; _SEH2_END;

View file

@ -2838,7 +2838,7 @@ retry:
DebugPrint((1, "ClassSendSrbSynchronous: Exception %lx " DebugPrint((1, "ClassSendSrbSynchronous: Exception %lx "
"locking buffer\n", status)); "locking buffer\n", status));
return status; _SEH2_YIELD(return status);
} _SEH2_END; } _SEH2_END;
} }

View file

@ -846,21 +846,21 @@ RtlValidAcl(IN PACL Acl)
(Acl->AclRevision > MAX_ACL_REVISION)) (Acl->AclRevision > MAX_ACL_REVISION))
{ {
DPRINT1("Invalid ACL revision\n"); DPRINT1("Invalid ACL revision\n");
return FALSE; _SEH2_YIELD(return FALSE);
} }
/* Next, validate that the ACL is USHORT-aligned */ /* Next, validate that the ACL is USHORT-aligned */
if (ROUND_DOWN(Acl->AclSize, sizeof(USHORT)) != Acl->AclSize) if (ROUND_DOWN(Acl->AclSize, sizeof(USHORT)) != Acl->AclSize)
{ {
DPRINT1("Invalid ACL size\n"); DPRINT1("Invalid ACL size\n");
return FALSE; _SEH2_YIELD(return FALSE);
} }
/* And that it's big enough */ /* And that it's big enough */
if (Acl->AclSize < sizeof(ACL)) if (Acl->AclSize < sizeof(ACL))
{ {
DPRINT1("Invalid ACL size\n"); DPRINT1("Invalid ACL size\n");
return FALSE; _SEH2_YIELD(return FALSE);
} }
/* Loop each ACE */ /* Loop each ACE */
@ -871,21 +871,21 @@ RtlValidAcl(IN PACL Acl)
if (((ULONG_PTR)Ace + sizeof(ACE_HEADER)) >= ((ULONG_PTR)Acl + Acl->AclSize)) if (((ULONG_PTR)Ace + sizeof(ACE_HEADER)) >= ((ULONG_PTR)Acl + Acl->AclSize))
{ {
DPRINT1("Invalid ACE size\n"); DPRINT1("Invalid ACE size\n");
return FALSE; _SEH2_YIELD(return FALSE);
} }
/* Validate the length of this ACE */ /* Validate the length of this ACE */
if (ROUND_DOWN(Ace->AceSize, sizeof(USHORT)) != Ace->AceSize) if (ROUND_DOWN(Ace->AceSize, sizeof(USHORT)) != Ace->AceSize)
{ {
DPRINT1("Invalid ACE size: %lx\n", Ace->AceSize); DPRINT1("Invalid ACE size: %lx\n", Ace->AceSize);
return FALSE; _SEH2_YIELD(return FALSE);
} }
/* Validate we have space for the entire ACE */ /* Validate we have space for the entire ACE */
if (((ULONG_PTR)Ace + Ace->AceSize) > ((ULONG_PTR)Acl + Acl->AclSize)) if (((ULONG_PTR)Ace + Ace->AceSize) > ((ULONG_PTR)Acl + Acl->AclSize))
{ {
DPRINT1("Invalid ACE size %lx %lx\n", Ace->AceSize, Acl->AclSize); DPRINT1("Invalid ACE size %lx %lx\n", Ace->AceSize, Acl->AclSize);
return FALSE; _SEH2_YIELD(return FALSE);
} }
/* Check what kind of ACE this is */ /* Check what kind of ACE this is */
@ -895,14 +895,14 @@ RtlValidAcl(IN PACL Acl)
if (ROUND_DOWN(Ace->AceSize, sizeof(ULONG)) != Ace->AceSize) if (ROUND_DOWN(Ace->AceSize, sizeof(ULONG)) != Ace->AceSize)
{ {
DPRINT1("Invalid ACE size\n"); DPRINT1("Invalid ACE size\n");
return FALSE; _SEH2_YIELD(return FALSE);
} }
/* The ACE size should at least have enough for the header */ /* The ACE size should at least have enough for the header */
if (Ace->AceSize < sizeof(ACE_HEADER)) if (Ace->AceSize < sizeof(ACE_HEADER))
{ {
DPRINT1("Invalid ACE size: %lx %lx\n", Ace->AceSize, sizeof(ACE_HEADER)); DPRINT1("Invalid ACE size: %lx %lx\n", Ace->AceSize, sizeof(ACE_HEADER));
return FALSE; _SEH2_YIELD(return FALSE);
} }
/* Check if the SID revision is valid */ /* Check if the SID revision is valid */
@ -910,21 +910,21 @@ RtlValidAcl(IN PACL Acl)
if (Sid->Revision != SID_REVISION) if (Sid->Revision != SID_REVISION)
{ {
DPRINT1("Invalid SID\n"); DPRINT1("Invalid SID\n");
return FALSE; _SEH2_YIELD(return FALSE);
} }
/* Check if the SID is out of bounds */ /* Check if the SID is out of bounds */
if (Sid->SubAuthorityCount > SID_MAX_SUB_AUTHORITIES) if (Sid->SubAuthorityCount > SID_MAX_SUB_AUTHORITIES)
{ {
DPRINT1("Invalid SID\n"); DPRINT1("Invalid SID\n");
return FALSE; _SEH2_YIELD(return FALSE);
} }
/* The ACE size should at least have enough for the header and SID */ /* The ACE size should at least have enough for the header and SID */
if (Ace->AceSize < (sizeof(ACE_HEADER) + RtlLengthSid(Sid))) if (Ace->AceSize < (sizeof(ACE_HEADER) + RtlLengthSid(Sid)))
{ {
DPRINT1("Invalid ACE size\n"); DPRINT1("Invalid ACE size\n");
return FALSE; _SEH2_YIELD(return FALSE);
} }
} }
else if (Ace->AceType == ACCESS_ALLOWED_COMPOUND_ACE_TYPE) else if (Ace->AceType == ACCESS_ALLOWED_COMPOUND_ACE_TYPE)
@ -942,7 +942,7 @@ RtlValidAcl(IN PACL Acl)
if (Ace->AceSize < sizeof(ACE_HEADER)) if (Ace->AceSize < sizeof(ACE_HEADER))
{ {
DPRINT1("Unknown ACE\n"); DPRINT1("Unknown ACE\n");
return FALSE; _SEH2_YIELD(return FALSE);
} }
} }
@ -953,7 +953,7 @@ RtlValidAcl(IN PACL Acl)
_SEH2_EXCEPT(EXCEPTION_EXECUTE_HANDLER) _SEH2_EXCEPT(EXCEPTION_EXECUTE_HANDLER)
{ {
/* Something was invalid, fail */ /* Something was invalid, fail */
return FALSE; _SEH2_YIELD(return FALSE);
} }
_SEH2_END; _SEH2_END;

View file

@ -1587,7 +1587,7 @@ static NTSTATUS parse_manifest( struct actctx_loader* acl, struct assembly_ident
_SEH2_EXCEPT(EXCEPTION_EXECUTE_HANDLER) _SEH2_EXCEPT(EXCEPTION_EXECUTE_HANDLER)
{ {
DPRINT1("Exception accessing buffer\n"); DPRINT1("Exception accessing buffer\n");
return STATUS_SXS_CANT_GEN_ACTCTX; _SEH2_YIELD(return STATUS_SXS_CANT_GEN_ACTCTX);
} }
_SEH2_END; _SEH2_END;

View file

@ -1062,28 +1062,28 @@ RtlValidSecurityDescriptor(IN PSECURITY_DESCRIPTOR SecurityDescriptor)
_SEH2_TRY _SEH2_TRY
{ {
/* Fail on bad revisions */ /* Fail on bad revisions */
if (Sd->Revision != SECURITY_DESCRIPTOR_REVISION) return FALSE; if (Sd->Revision != SECURITY_DESCRIPTOR_REVISION) _SEH2_YIELD(return FALSE);
/* Owner SID must be valid if present */ /* Owner SID must be valid if present */
Owner = SepGetOwnerFromDescriptor(Sd); Owner = SepGetOwnerFromDescriptor(Sd);
if ((Owner) && (!RtlValidSid(Owner))) return FALSE; if ((Owner) && (!RtlValidSid(Owner))) _SEH2_YIELD(return FALSE);
/* Group SID must be valid if present */ /* Group SID must be valid if present */
Group = SepGetGroupFromDescriptor(Sd); Group = SepGetGroupFromDescriptor(Sd);
if ((Owner) && (!RtlValidSid(Group))) return FALSE; if ((Owner) && (!RtlValidSid(Group))) _SEH2_YIELD(return FALSE);
/* DACL must be valid if present */ /* DACL must be valid if present */
Dacl = SepGetDaclFromDescriptor(Sd); Dacl = SepGetDaclFromDescriptor(Sd);
if ((Dacl) && (!RtlValidAcl(Dacl))) return FALSE; if ((Dacl) && (!RtlValidAcl(Dacl))) _SEH2_YIELD(return FALSE);
/* SACL must be valid if present */ /* SACL must be valid if present */
Sacl = SepGetSaclFromDescriptor(Sd); Sacl = SepGetSaclFromDescriptor(Sd);
if ((Sacl) && (!RtlValidAcl(Sacl))) return FALSE; if ((Sacl) && (!RtlValidAcl(Sacl))) _SEH2_YIELD(return FALSE);
} }
_SEH2_EXCEPT(EXCEPTION_EXECUTE_HANDLER) _SEH2_EXCEPT(EXCEPTION_EXECUTE_HANDLER)
{ {
/* Access fault, bail out */ /* Access fault, bail out */
return FALSE; _SEH2_YIELD(return FALSE);
} }
_SEH2_END; _SEH2_END;

View file

@ -32,13 +32,13 @@ RtlValidSid(IN PSID Sid_)
(Sid->SubAuthorityCount > SID_MAX_SUB_AUTHORITIES))) (Sid->SubAuthorityCount > SID_MAX_SUB_AUTHORITIES)))
{ {
/* It's not, fail */ /* It's not, fail */
return FALSE; _SEH2_YIELD(return FALSE);
} }
} }
_SEH2_EXCEPT(EXCEPTION_EXECUTE_HANDLER) _SEH2_EXCEPT(EXCEPTION_EXECUTE_HANDLER)
{ {
/* Access violation, SID is not valid */ /* Access violation, SID is not valid */
return FALSE; _SEH2_YIELD(return FALSE);
} }
_SEH2_END; _SEH2_END;

View file

@ -883,7 +883,7 @@ MiDoMappedCopy(IN PEPROCESS SourceProcess,
// //
// Return the error // Return the error
// //
return STATUS_WORKING_SET_QUOTA; _SEH2_YIELD(return STATUS_WORKING_SET_QUOTA);
} }
// //
@ -3343,7 +3343,7 @@ NtGetWriteWatch(IN HANDLE ProcessHandle,
// //
// Catch illegal base address // Catch illegal base address
// //
if (BaseAddress > MM_HIGHEST_USER_ADDRESS) return STATUS_INVALID_PARAMETER_2; if (BaseAddress > MM_HIGHEST_USER_ADDRESS) _SEH2_YIELD(return STATUS_INVALID_PARAMETER_2);
// //
// Catch illegal region size // Catch illegal region size
@ -3353,7 +3353,7 @@ NtGetWriteWatch(IN HANDLE ProcessHandle,
// //
// Fail // Fail
// //
return STATUS_INVALID_PARAMETER_3; _SEH2_YIELD(return STATUS_INVALID_PARAMETER_3);
} }
// //
@ -3370,7 +3370,7 @@ NtGetWriteWatch(IN HANDLE ProcessHandle,
// //
// Must have a count // Must have a count
// //
if (CapturedEntryCount == 0) return STATUS_INVALID_PARAMETER_5; if (CapturedEntryCount == 0) _SEH2_YIELD(return STATUS_INVALID_PARAMETER_5);
// //
// Can't be larger than the maximum // Can't be larger than the maximum
@ -3380,7 +3380,7 @@ NtGetWriteWatch(IN HANDLE ProcessHandle,
// //
// Fail // Fail
// //
return STATUS_INVALID_PARAMETER_5; _SEH2_YIELD(return STATUS_INVALID_PARAMETER_5);
} }
// //

View file

@ -67,7 +67,7 @@ CharLowerA(LPSTR str)
_SEH2_EXCEPT(EXCEPTION_EXECUTE_HANDLER) _SEH2_EXCEPT(EXCEPTION_EXECUTE_HANDLER)
{ {
SetLastError( ERROR_INVALID_PARAMETER ); SetLastError( ERROR_INVALID_PARAMETER );
return NULL; _SEH2_YIELD(return NULL);
} }
_SEH2_END; _SEH2_END;
@ -267,7 +267,7 @@ LPSTR WINAPI CharUpperA(LPSTR str)
_SEH2_EXCEPT(EXCEPTION_EXECUTE_HANDLER) _SEH2_EXCEPT(EXCEPTION_EXECUTE_HANDLER)
{ {
SetLastError( ERROR_INVALID_PARAMETER ); SetLastError( ERROR_INVALID_PARAMETER );
return NULL; _SEH2_YIELD(return NULL);
} }
_SEH2_END; _SEH2_END;