mirror of
https://github.com/reactos/reactos.git
synced 2024-11-20 06:15:26 +00:00
5da5e644bb
On ObpChargeQuotaForObject function, the kernel will either charge the default object type charges or the specified information charges obtained from ObCreateObject API call. What happens is that if a paged pool charge is specified on ObCreateObject call the kernel will charge that but when an object is about to be de-allocated, the amount of quota to return back to the system is the amounting of the paged pool charge specified previously by the ObCreateObject call plus the amounting of the security descriptor charge (see oblife.c / line 98). This will result in a fatal crash with a bugcheck of QUOTA_UNDERFLOW because we are returning quota with bits of it that was never charged and that's SecurityDescriptorCharge. A QUOTA_UNDERFLOW bugcheck occurs in two following scenarios: -- When installing Virtualbox Guest Additions and prompting the installer to reboot the system for you -- When logging off and on back to the system and then you restart the system normally This bug has been discovered whilst working on #4555 PR. |
||
---|---|---|
.. | ||
devicemap.c | ||
obdir.c | ||
obhandle.c | ||
obinit.c | ||
oblife.c | ||
oblink.c | ||
obname.c | ||
obref.c | ||
obsdcach.c | ||
obsecure.c | ||
obwait.c |