From b099a8ca899d1a3051555bcc2fdbffee8ca6b406 Mon Sep 17 00:00:00 2001
From: Raphael <raphael@google.com>
Date: Wed, 1 Feb 2012 15:06:44 -0800
Subject: Win SDK: find_lock.exe

This small win32 app takes a path as
argument and outputs the names of the
processes that are holding handles
that overlap that path.

The goal is to use this in the SDK Manager
to identify which apps are locking the
SDK folder and preventing updates.

Change-Id: I4fbf66a53410fba0c5f9ab51dac10d267a7c21a7
---
 find_lock/find_lock.cpp | 778 ++++++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 778 insertions(+)
 create mode 100755 find_lock/find_lock.cpp

(limited to 'find_lock/find_lock.cpp')

diff --git a/find_lock/find_lock.cpp b/find_lock/find_lock.cpp
new file mode 100755
index 0000000..c7e206f
--- /dev/null
+++ b/find_lock/find_lock.cpp
@@ -0,0 +1,778 @@
+/*
+ * Copyright (C) 2012 The Android Open Source Project
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ *      http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+/*
+ * "find_lock.exe", for Windows only.
+ *
+ * References used:
+ *
+ * http://drdobbs.com/windows/184411099
+ * article by Sven B. Schreiber, November 01, 1999
+ *
+ * http://www.codeguru.com/Cpp/W-P/system/processesmodules/article.php/c2827/
+ * by Zoltan Csizmadia, November 14, 2000
+ *
+ * http://stackoverflow.com/questions/860656/
+ * (same technique, but written in unsafe C#)
+ *
+ * Starting with Vista, we can also use the Restart Manager API as
+ * explained here: (TODO for next version)
+ * http://msdn.microsoft.com/en-us/magazine/cc163450.aspx
+ */
+
+#ifdef _WIN32
+
+#include "utils.h"
+#include <ctype.h>
+#include <fcntl.h>
+#include <io.h>
+#include <process.h>
+
+
+// NtDll structures from the the Dr Dobbs article, adjusted for our needs:
+
+typedef void *POBJECT;
+typedef LONG KPRIORITY;
+typedef LARGE_INTEGER QWORD;
+
+typedef struct {
+    WORD  Length;
+    WORD  MaximumLength;
+    PWORD Buffer;
+} UNICODE_STRING;
+
+typedef struct {
+    DWORD       dIdProcess;
+    BYTE        bObjectType;    // OB_TYPE_*
+    BYTE        bFlags;         // bits 0..2 HANDLE_FLAG_*
+    WORD        wValue;         // multiple of 4
+    POBJECT     pObject;
+    ACCESS_MASK GrantedAccess;
+} SYSTEM_HANDLE;
+
+typedef struct {
+    DWORD         dCount;
+    SYSTEM_HANDLE ash[1];
+} SYSTEM_HANDLE_INFORMATION;
+
+typedef struct {
+    DWORD PeakVirtualSize;
+    DWORD VirtualSize;
+    DWORD PageFaultCount;
+    DWORD PeakWorkingSetSize;
+    DWORD WorkingSetSize;
+    DWORD QuotaPeakPagedPoolUsage;
+    DWORD QuotaPagedPoolUsage;
+    DWORD QuotaPeakNonPagedPoolUsage;
+    DWORD QuotaNonPagedPoolUsage;
+    DWORD PagefileUsage;
+    DWORD PeakPagefileUsage;
+} VM_COUNTERS;
+
+typedef struct {
+    HANDLE UniqueProcess;
+    HANDLE UniqueThread;
+} CLIENT_ID;
+
+typedef enum {
+    // Ignored. We don't actually use these values.
+    Unused
+} KWAIT_REASON;
+
+typedef struct {
+    QWORD        qKernelTime;       // 100 nsec units
+    QWORD        qUserTime;         // 100 nsec units
+    QWORD        qCreateTime;       // relative to 01-01-1601
+    DWORD        d18;
+    PVOID        pStartAddress;
+    CLIENT_ID    Cid;               // process/thread ids
+    DWORD        dPriority;
+    DWORD        dBasePriority;
+    DWORD        dContextSwitches;
+    DWORD        dThreadState;      // 2=running, 5=waiting
+    KWAIT_REASON WaitReason;
+    DWORD        dReserved01;
+} SYSTEM_THREAD;
+
+typedef struct {
+    DWORD          dNext;           // relative offset
+    DWORD          dThreadCount;
+    DWORD          dReserved01;
+    DWORD          dReserved02;
+    DWORD          dReserved03;
+    DWORD          dReserved04;
+    DWORD          dReserved05;
+    DWORD          dReserved06;
+    QWORD          qCreateTime;     // relative to 01-01-1601
+    QWORD          qUserTime;       // 100 nsec units
+    QWORD          qKernelTime;     // 100 nsec units
+    UNICODE_STRING usName;
+    KPRIORITY      BasePriority;
+    DWORD          dUniqueProcessId;
+    DWORD          dInheritedFromUniqueProcessId;
+    DWORD          dHandleCount;
+    DWORD          dReserved07;
+    DWORD          dReserved08;
+    VM_COUNTERS    VmCounters;
+    DWORD          dCommitCharge;   // bytes
+    SYSTEM_THREAD  ast[1];
+} SYSTEM_PROCESS_INFORMATION;
+
+// The sic opcode for NtQuerySystemInformation
+typedef enum {
+    SystemProcessInformation = 5,
+    SystemHandleInformation = 16,
+} SYSTEMINFOCLASS;
+
+
+#define STATUS_SUCCESS               0x00000000
+#define STATUS_UNSUCCESSFUL          0xC0000001
+#define STATUS_NOT_IMPLEMENTED       0xC0000002
+#define STATUS_INVALID_INFO_CLASS    0xC0000003
+#define STATUS_INFO_LENGTH_MISMATCH  0xC0000004
+#define STATUS_INVALID_PARAMETER     0xC000000D
+
+typedef DWORD (WINAPI *NtQuerySystemInformationFuncPtr)(
+                                      DWORD sic, VOID* pData, DWORD sSize, ULONG* pdSize);
+typedef DWORD (WINAPI *NtQueryInformationFileFuncPtr)(HANDLE, PVOID, PVOID, DWORD, DWORD);
+typedef DWORD (WINAPI *NtQueryObjectFuncPtr)(HANDLE, DWORD, VOID*, DWORD, VOID*);
+
+static NtQuerySystemInformationFuncPtr sNtQuerySystemInformationFunc;
+static NtQueryInformationFileFuncPtr   sNtQueryInformationFileFunc;
+static NtQueryObjectFuncPtr            sNtQueryObjectFunc;
+
+//------------
+
+// Get the NT DLL functions we need to use.
+static bool init() {
+
+    sNtQuerySystemInformationFunc =
+        (NtQuerySystemInformationFuncPtr) GetProcAddress(
+            GetModuleHandleA("ntdll.dll"), "NtQuerySystemInformation");
+
+    sNtQueryInformationFileFunc =
+        (NtQueryInformationFileFuncPtr) GetProcAddress(
+            GetModuleHandleA("ntdll.dll"), "NtQueryInformationFile");
+
+    sNtQueryObjectFunc =
+        (NtQueryObjectFuncPtr) GetProcAddress(
+            GetModuleHandleA("ntdll.dll"), "NtQueryObject");
+
+    return sNtQuerySystemInformationFunc != NULL &&
+           sNtQueryInformationFileFunc   != NULL &&
+           sNtQueryObjectFunc            != NULL;
+}
+
+static void terminate() {
+    sNtQuerySystemInformationFunc = NULL;
+    sNtQueryInformationFileFunc = NULL;
+    sNtQueryObjectFunc = NULL;
+}
+
+static bool adjustPrivileges() {
+    char *error = NULL;
+    HANDLE tokenH;
+
+    // Open a process token that lets us adjust privileges
+    BOOL ok = OpenProcessToken(GetCurrentProcess(),   // ProcessHandle
+                               TOKEN_ADJUST_PRIVILEGES | TOKEN_QUERY, // DesiredAccess
+                               &tokenH);              // TokenHandle
+    if (!ok) {
+        error = "OpenProcessToken failed: ";
+        goto bail_out;
+    }
+
+    // Lookup the privilege by name and get its local LUID token.
+    // What we request:
+    // SE_DEBUG_NAME, aka "SeDebugPrivilege"
+    // MSDN: Required to debug and adjust the memory of a process owned by another account.
+    //       User Right: Debug programs.
+    TOKEN_PRIVILEGES priv;
+    priv.PrivilegeCount = 1;
+    priv.Privileges[0].Attributes = SE_PRIVILEGE_ENABLED;
+    ok = LookupPrivilegeValueA(NULL,                        // lpSystemName
+                               SE_DEBUG_NAME,               // lpName
+                               &(priv.Privileges[0].Luid)); // lpLuid
+    if (!ok) {
+        error = "LookupPrivilegeValue failed: ";
+        goto bail_out;
+    }
+
+    ok = AdjustTokenPrivileges(tokenH,  // TokenHandle
+                               FALSE,   // DisableAllPrivileges
+                               &priv,   // NewState
+                               0,       // BufferLength
+                               NULL,    // PreviousState
+                               0);      // ReturnLength
+    if (!ok) {
+        error = "AdjustTokenPrivileges failed: ";
+        goto bail_out;
+    }
+
+bail_out:
+    if (error != NULL && gIsDebug) {
+        CString err;
+        err.setLastWin32Error(error);
+        fprintf(stderr, "%s", err.cstr());
+    }
+
+    if (tokenH != NULL) {
+        CloseHandle(tokenH);
+    }
+
+    return !!ok;
+}
+
+static bool getHandleType(HANDLE h, CString *type) {
+    bool result = false;
+    ULONG size = 0;
+    // Get the size of the type string
+    int status = sNtQueryObjectFunc(h, 2, NULL, 0, &size);
+    if (status == STATUS_INFO_LENGTH_MISMATCH && size > 0) {
+        // Get the type string itself
+        char *buf = new char[size];
+        status = sNtQueryObjectFunc(h, 2, buf, size, NULL);
+        if (status == 0 && size > 96) {
+            // The type string we want is a wide unicode (UTF16)
+            // zero-terminated string located at offset 96 in the
+            // buffer. In our case we want the string to be
+            // "Directory" or "File" so we know the max useful length
+            // is 9.
+            // Since we can only deal with ansi strings in this program,
+            // we'll make a crude copy of every other byte and just check
+            // that the other bytes are zero.
+            const char *c = buf + 96;
+            const char *e = buf + 96 + size;
+            // we'll write at the beginning of our buffer
+            char *dest = buf;
+            char *dend = dest + 9;
+            for (; c < e && dest < dend && c[0] != '\0' && c[1] == '\0'; c += 2, dest++) {
+                *dest = *c;
+            }
+            *(dest++) = '\0';
+            type->set(buf, dest - buf);
+            result = true;
+        }
+
+        free(buf);
+    }
+    return result;
+}
+
+// These is the wide unicode representations of the type we want to find.
+static const char kFileW[] = "File";
+
+static char isFileHandleType(HANDLE handle) {
+    char type = 0;
+    ULONG size = 0;
+    // Get the size of the type string
+    int status = sNtQueryObjectFunc(handle, 2, NULL, 0, &size);
+    if (status == STATUS_INFO_LENGTH_MISMATCH && size > 0) {
+        // Get the type string itself
+        char *buf = new char[size];
+        status = sNtQueryObjectFunc(handle, 2, buf, size, NULL);
+        if (status == 0 && size > 96) {
+            // The type string we want is a wide unicode (UTF16-LE)
+            // zero-terminated string located at offset 96 in the
+            // buffer. In our case we want the string to be "File".
+            //
+            // Since we're reading wide unicode, we want each character
+            // to be the one from our string followed by a zero byte.
+            // e.g. c should point to F \0 i \0 l \0 e \0 \0 \0.
+            const char *c = buf + 96;
+            type = c[0];
+
+            int len = sizeof(kFileW);
+            const char *d = kFileW;
+
+            for (; type != 0 && len > 0; c+=2, d++, len--) {
+                if (c[0] != *d || c[1] != 0) {
+                    type = 0;
+                    break;
+                }
+            }
+        }
+
+        free(buf);
+    }
+    return type;
+}
+
+typedef struct {
+    HANDLE handle;
+    CString *outStr;
+    bool result;
+} SFileNameInfo;
+
+static unsigned __stdcall FileNameThreadFunc(void *param) {
+    SFileNameInfo *info = (SFileNameInfo *)param;
+    if (info == NULL) {
+        return 1;
+    }
+
+    char buf[MAX_PATH*2 + 4];
+    DWORD iob[2] = { 0, 0 };
+
+    DWORD status = sNtQueryInformationFileFunc(info->handle, iob, buf, sizeof(buf), 9);
+    if (status == STATUS_SUCCESS) {
+        // The result is a buffer with:
+        // - DWORD (4 bytes) for the *byte* length (so twice the character length)
+        // - Actual string in Unicode
+        // Not sure of the actual type, but it does look like a UNICODE_STRING struct.
+
+        DWORD len = ((DWORD *)buf)[0];
+        if (len <= MAX_PATH * 2) {
+            // We can't handle wide Unicode. What we do is convert it into
+            // straight ansi by just retaining the first of each couple bytes.
+            // Bytes that cannot be mapped (e.g. 2nd byte is != 0) will be
+            // simply converted to 0xFF.
+
+            unsigned char *dest = (unsigned char *)buf + 4;
+            unsigned char *src  = (unsigned char *)buf + 4;
+            for (DWORD i = 0; i < len; dest++, src += 2, i += 2) {
+                if (src[1] == 0) {
+                    *dest = *src;
+                } else {
+                    *dest = 0xFF;
+                }
+            }
+            *dest = '\0';
+            info->outStr->set(buf + 4, len);
+            info->result = true;
+            return 0;
+        }
+    }
+    return 1;
+}
+
+static bool getFileName(HANDLE handle, CString *outStr) {
+    SFileNameInfo info;
+    info.handle = handle;
+    info.outStr = outStr;
+    info.result = false;
+
+    // sNtQueryInformationFileFunc might hang on some handles.
+    // A trick is to do it in a thread and if it takes too loog then
+    // just shutdown the thread, since it's deadlocked anyway.
+    unsigned threadId;
+    HANDLE th = (HANDLE)_beginthreadex(NULL,                    // security
+                                       0,                       // stack_size
+                                       &FileNameThreadFunc,     // address
+                                       &info,                   // arglist
+                                       0,                       // initflag
+                                       &threadId);              // thrdaddr
+
+    if (th == NULL) {
+        // Failed to create thread. Shouldn't really happen.
+        outStr->set("<failed to create thread>");
+        return false;
+    }
+
+    bool result = false;
+
+    // Wait for thread or kill it if it takes too long.
+    if (WaitForSingleObject(th /*handle*/, 200 /*ms*/) == WAIT_TIMEOUT) {
+        TerminateThread(th /*handle*/, 0 /*retCode*/);
+        outStr->set("<timeout>");
+    } else {
+        result = info.result;
+    }
+
+    CloseHandle(th);
+    return result;
+}
+
+// Find the name of the process (e.g. "java.exe") given its id.
+// processesPtr must be the list returned by getAllProcesses().
+// Special handling for javaw.exe: this isn't quite useful so
+// we also try to find and append the parent process name.
+static bool getProcessName(SYSTEM_PROCESS_INFORMATION *processesPtr,
+                           DWORD remoteProcessId,
+                           CString *outStr) {
+    SYSTEM_PROCESS_INFORMATION *ptr = processesPtr;
+    while (ptr != NULL) {
+        if (ptr->dUniqueProcessId == remoteProcessId) {
+            // This is the process we want.
+
+            UNICODE_STRING *uniStr = &(ptr->usName);
+            WORD len = uniStr->Length;
+
+            char buf[MAX_PATH];
+            if (len <= MAX_PATH * 2) {
+                // We can't handle wide Unicode. What we do is convert it into
+                // straight ansi by just retaining the first of each couple bytes.
+                // Bytes that cannot be mapped (e.g. 2nd byte is != 0) will be
+                // simply converted to 0xFF.
+
+                unsigned char *dest = (unsigned char *)buf;
+                unsigned char *src  = (unsigned char *)uniStr->Buffer;
+                for (WORD i = 0; i < len; dest++, src += 2, i += 2) {
+                    if (src[1] == 0) {
+                        *dest = *src;
+                    } else {
+                        *dest = 0xFF;
+                    }
+                }
+                *dest = '\0';
+                outStr->set(buf, len);
+
+                if (strcmp(buf, "javaw.exe") == 0) {
+                    // Heuristic: eclipse often shows up as javaw.exe
+                    // but what is useful is to report eclipse to the user
+                    // instead.
+                    // So in this case, look at the parent and report it too.
+                    DWORD parentId = ptr->dInheritedFromUniqueProcessId;
+                    if (parentId > 0) {
+                        CString name2;
+                        bool ok2 = getProcessName(processesPtr,
+                                                  parentId,
+                                                  &name2);
+                        if (ok2) {
+                            outStr->add(" (");
+                            outStr->add(name2.cstr());
+                            outStr->add(")");
+                        }
+                    }
+                }
+
+                return true;
+            }
+        }
+
+        // Look at the next process, if any.
+        if (ptr->dNext == NULL) {
+            break;
+        } else {
+            ptr = (SYSTEM_PROCESS_INFORMATION *)((char *)ptr + ptr->dNext);
+        }
+    }
+
+    outStr->setf("<process id %08x name not found>", remoteProcessId);
+    return false;
+}
+
+// Query system for all processes information.
+// Returns an error string in case of error.
+// Returns the virtual_alloc-allocated buffer on success or NULL on error.
+// It's up to the caller to do a VirtualFree on the returned buffer.
+static SYSTEM_PROCESS_INFORMATION *queryAllProcess(const char **error) {
+    // Allocate a buffer for the process information. We don't know the
+    // exact size. A normal system might typically have between 100-200 processes.
+    // We'll resize the buffer if not big enough.
+    DWORD infoSize = 4096;
+    SYSTEM_PROCESS_INFORMATION *infoPtr =
+        (SYSTEM_PROCESS_INFORMATION *) VirtualAlloc(NULL, infoSize, MEM_COMMIT, PAGE_READWRITE);
+
+    if (infoPtr != NULL) {
+        // Query the actual size needed (or the data if it fits in the buffer)
+        DWORD needed = 0;
+        if (sNtQuerySystemInformationFunc(
+                SystemProcessInformation, infoPtr, infoSize, &needed) != 0) {
+            if (needed == 0) {
+                // Shouldn't happen.
+                *error = "No processes found";
+                goto bail_out;
+            }
+
+            // Realloc
+            VirtualFree(infoPtr, 0, MEM_RELEASE);
+            infoSize += needed;
+            infoPtr = (SYSTEM_PROCESS_INFORMATION *) VirtualAlloc(
+                            NULL, infoSize, MEM_COMMIT, PAGE_READWRITE);
+
+            // Query all the processes objects again
+            if (sNtQuerySystemInformationFunc(
+                    SystemProcessInformation, infoPtr, infoSize, NULL) != 0) {
+                *error = "Failed to query system processes";
+                goto bail_out;
+            }
+        }
+    }
+
+    if (infoPtr == NULL) {
+        *error = "Failed to allocate system processes info buffer";
+        goto bail_out;
+    }
+
+bail_out:
+    if (*error != NULL) {
+        VirtualFree(infoPtr, 0, MEM_RELEASE);
+        infoPtr = NULL;
+    }
+    return infoPtr;
+}
+
+// Query system for all handle information.
+// Returns an error string in case of error.
+// Returns the virtual_alloc-allocated buffer on success or NULL on error.
+// It's up to the caller to do a VirtualFree on the returned buffer.
+static SYSTEM_HANDLE_INFORMATION *queryAllHandles(const char **error) {
+    // Allocate a buffer. It won't be large enough to get the handles
+    // (e.g. there might be 10k or 40k handles around). We'll resize
+    // it once we know the actual size.
+    DWORD infoSize = 4096;
+    SYSTEM_HANDLE_INFORMATION *infoPtr =
+        (SYSTEM_HANDLE_INFORMATION *) VirtualAlloc(NULL, infoSize, MEM_COMMIT, PAGE_READWRITE);
+
+    if (infoPtr != NULL) {
+        // Query the actual size needed
+        DWORD needed = 0;
+        if (sNtQuerySystemInformationFunc(
+                SystemHandleInformation, infoPtr, infoSize, &needed) != 0) {
+            if (needed == 0) {
+                // Shouldn't happen.
+                *error = "No handles found";
+                goto bail_out;
+            }
+
+            // Realloc
+            VirtualFree(infoPtr, 0, MEM_RELEASE);
+            infoSize += needed;
+            infoPtr = (SYSTEM_HANDLE_INFORMATION *) VirtualAlloc(
+                            NULL, infoSize, MEM_COMMIT, PAGE_READWRITE);
+        }
+    }
+
+    if (infoPtr == NULL) {
+        *error = "Failed to allocate system handle info buffer";
+        goto bail_out;
+    }
+
+    // Query all the handle objects
+    if (sNtQuerySystemInformationFunc(SystemHandleInformation, infoPtr, infoSize, NULL) != 0) {
+        *error = "Failed to query system handles";
+        goto bail_out;
+    }
+
+bail_out:
+    if (*error != NULL) {
+        VirtualFree(infoPtr, 0, MEM_RELEASE);
+        infoPtr = NULL;
+    }
+    return infoPtr;
+}
+
+bool findLock(CPath &path, CString *outModule) {
+    bool result = false;
+    const char *error = NULL;
+
+    SYSTEM_PROCESS_INFORMATION *processesPtr = NULL;
+    SYSTEM_HANDLE_INFORMATION  *handlesPtr   = NULL;
+
+    const HANDLE currProcessH = GetCurrentProcess();
+    const DWORD currProcessId = GetCurrentProcessId();
+    HANDLE remoteProcessH = NULL;
+    DWORD remoteProcessId = 0;
+    DWORD matchProcessId = 0;
+
+    int numHandleFound = 0;
+    int numHandleChecked = 0;
+    int numHandleDirs = 0;
+    int numHandleFiles = 0;
+    int numProcessMatch = 0;
+
+    BYTE ob_type_file = 0;
+
+    // Get the path to search, without the drive letter.
+    const char *searchPath = path.cstr();
+    if (isalpha(searchPath[0]) && searchPath[1] == ':') {
+        searchPath += 2;
+    }
+    int searchPathLen = strlen(searchPath);
+
+    if (gIsDebug) fprintf(stderr, "Search path: '%s'\n", searchPath);
+
+    if (!init()) {
+        error = "Failed to bind to ntdll.dll";
+        goto bail_out;
+    }
+
+    if (!adjustPrivileges()) {
+        // We can still continue even if the privilege escalation failed.
+        // The apparent effect is that we'll fail to query the name of
+        // some processes, yet it will work for some of them.
+        if (gIsDebug) fprintf(stderr, "Warning: adusting privileges failed. Continuing anyway.\n");
+    } else {
+        if (gIsDebug) fprintf(stderr, "Privileges adjusted.\n"); // DEBUG remove lter
+    }
+
+    processesPtr = queryAllProcess(&error);
+    if (processesPtr == NULL) goto bail_out;
+
+    handlesPtr = queryAllHandles(&error);
+    if (handlesPtr == NULL) goto bail_out;
+
+    numHandleFound = handlesPtr->dCount;
+
+    // Check all the handles
+    for (int n = handlesPtr->dCount, i = 0; i < n; i++) {
+        SYSTEM_HANDLE sysh = handlesPtr->ash[i];
+
+        if (ob_type_file != 0 && sysh.bObjectType != ob_type_file) {
+            continue;
+        }
+
+        HANDLE handle = (HANDLE) sysh.wValue;
+        DWORD remoteId = sysh.dIdProcess;
+        HANDLE remoteH = NULL;
+
+        if (remoteId == matchProcessId) {
+            // We already matched that process, we can skip its other entries.
+            continue;
+        }
+
+        if (remoteId == currProcessId) {
+            // We don't match ourselves
+            continue;
+        }
+
+        // Open a remote process.
+        // Most entries of a given process seem to be consecutive, so we
+        // only open the remote process handle if it's a different id.
+        if (remoteProcessH == NULL && remoteId == remoteProcessId) {
+            // We already tried to open this process and it failed.
+            // It's not going to be any better the next time so skip it.
+            continue;
+        }
+        if (remoteProcessH == NULL || remoteId != remoteProcessId) {
+            if (remoteProcessH != NULL) {
+                CloseHandle(remoteProcessH);
+            }
+
+            remoteProcessId = remoteId;
+            remoteProcessH = OpenProcess(PROCESS_DUP_HANDLE,
+                                         FALSE /*inheritHandle*/,
+                                         remoteProcessId);
+            if (remoteProcessH == NULL) {
+                continue;
+            }
+        }
+
+        if (remoteProcessH != NULL) {
+            // Duplicate the remote handle
+            if (DuplicateHandle(remoteProcessH,     // hSourceProcessHandle
+                                handle,             // hSourceHandle
+                                currProcessH,       // hTargetProcessHandle
+                                &remoteH,           // lpTargetHandle
+                                0,                  // dwDesiredAccess (ignored by same access)
+                                FALSE,              // bInheritHandle
+                                DUPLICATE_SAME_ACCESS) == 0) {
+                continue;
+            }
+        }
+
+        numHandleChecked++;
+
+        char type = isFileHandleType(remoteH);
+
+        if (type != 0) {
+            if (type == 'D') numHandleDirs++;
+            else if (type == 'F') numHandleFiles++;
+
+            // TODO simplify by not keeping directory handles
+            if (ob_type_file == 0 && type == 'F') {
+                // We found the first file handle. Remember it's system_handle object type
+                // and then use it to filter the following system_handle.
+                // For some reason OB_TYPE_FILE should be 0x1A but empirically I find it
+                // to be 0x1C, so we just make this test more dynamic.
+                ob_type_file = sysh.bObjectType;
+            }
+
+            // Try to get a filename out of that file or directory handle.
+            CString name("<unknown>");
+            bool ok = getFileName(remoteH, &name);
+
+            if (gIsDebug) {
+                fprintf(stderr, "P:%08x | t:%02x | f:%02x | v:%08x | %c | %s %s\n",
+                    sysh.dIdProcess, sysh.bObjectType, sysh.bFlags, sysh.wValue,
+                    type,
+                    ok ? "OK" : "FAIL",
+                    name.cstr()
+                    );
+            }
+
+            if (ok) {
+                // We got a file path. Let's check if it matches our target path.
+                if (_strnicmp(searchPath, name.cstr(), searchPathLen) == 0) {
+                    // Remember this process id so that we can ignore all its following entries.
+                    matchProcessId = remoteId;
+
+                    // Find out its process name
+                    CString procName("<unknown>");
+                    ok = getProcessName(processesPtr, remoteProcessId, &procName);
+                    if (ok) {
+                        numProcessMatch++;
+
+                        if (!outModule->isEmpty()) {
+                            outModule->add(";");
+                        }
+                        outModule->add(procName.cstr());
+                        result = true;
+                    }
+
+                    if (gIsDebug) {
+                        fprintf(stderr, "==> MATCH FOUND: %s  %s\n",
+                            ok ? "OK" : "FAIL",
+                            procName.cstr()
+                            );
+                    }
+                }
+            }
+
+        }
+
+        if (remoteH != NULL) {
+            CloseHandle(remoteH);
+            remoteH = NULL;
+        }
+    }
+
+bail_out:
+
+    if (gIsDebug) {
+        fprintf(stderr, "Processes matched: %d\n", numProcessMatch);
+        fprintf(stderr, "Handles: %d found, %d checked, %d dirs, %d files\n",
+               numHandleFound,
+               numHandleChecked,
+               numHandleDirs,
+               numHandleFiles);
+    }
+
+    if (error != NULL) {
+        CString msg;
+        msg.setLastWin32Error(NULL);
+        if (gIsDebug) fprintf(stderr, "[ERROR] %s: %s", error, msg.cstr());
+    }
+
+    if (remoteProcessH != NULL) {
+        CloseHandle(remoteProcessH);
+    }
+
+    if (currProcessH != NULL) {
+        CloseHandle(currProcessH);
+    }
+
+    if (handlesPtr != NULL) {
+        VirtualFree(handlesPtr, 0, MEM_RELEASE);
+        handlesPtr = NULL;
+    }
+
+    terminate();
+
+    return result;
+}
+
+#endif /* _WIN32 */
-- 
cgit v1.1