The SeAccessCheck routine determines whether the requested access rights can be granted to an object protected by a security descriptor and an object owner.
BOOLEAN SeAccessCheck( PSECURITY_DESCRIPTOR SecurityDescriptor, PSECURITY_SUBJECT_CONTEXT SubjectSecurityContext, BOOLEAN SubjectContextLocked, ACCESS_MASK DesiredAccess, ACCESS_MASK PreviouslyGrantedAccess, PPRIVILEGE_SET *Privileges, PGENERIC_MAPPING GenericMapping, KPROCESSOR_MODE AccessMode, PACCESS_MASK GrantedAccess, PNTSTATUS AccessStatus );
Pointer to the SECURITY_DESCRIPTOR structure that describes the security descriptor protecting the object being accessed.
Pointer to the SECURITY_SUBJECT_CONTEXT structure that specifies the subject's captured security context.
Indicates whether the user's subject context is locked, so that it does not have to be locked again.
Specifies the ACCESS_MASK bitmask for the access rights that the caller is attempting to acquire. If the caller sets the MAXIMUM_ALLOWED bit, the routine performs all DACL checks. However, the routine does not do any privilege checks, unless the caller specifically requests them by setting the ACCESS_SYSTEM_SECURITY or WRITE_OWNER bits.
Specifies the ACCESS_MASK bitmask of access rights already granted, such as access rights granted as a result of holding a privilege.
Pointer to a caller-supplied variable to be set to the address of the PRIVILEGE_SET structure that will be used as part of the access validation, or this parameter can be NULL. The returned buffer, if any, must be released by the caller with SeFreePrivileges.
Pointer to the GENERIC_MAPPING structure associated with this object type. This value specifies the specific access rights implied by each GENERIC_XXX access right.
Specifies the access mode to be used in the check, either UserMode or KernelMode.
Pointer to a returned access mask indicating the granted access. If the caller specifies MAXIMUM_ALLOWED, and the DACL in SecurityDescriptor is NULL, then the routine returns GENERIC_ALL plus any additional access the caller explicitly requests.
Pointer to the status value indicating why access was denied.
If access is allowed, SeAccessCheck returns TRUE.
SeAccessCheck might perform privilege tests for SeTakeOwnershipPrivilege and SeSecurityPrivilege, depending on the accesses being requested. It might perform additional privilege testing in future releases of the operating system.
This routine also might check whether the caller is the owner of the object in order to grant WRITE_DAC or READ_CONTROL access.
If this routine returns FALSE, the caller should use the returned AccessStatus as its return value. That is, the caller should avoid hardcoding a return value of STATUS_ACCESS_DENIED or any other specific STATUS_XXX value.
|Minimum supported client||Available in Windows 2000 and later versions of Windows.|
|Header||wdm.h (include Wdm.h, Ntddk.h, Ntifs.h)|
|DDI compliance rules||PowerIrpDDis, HwStorPortProhibitedDDIs|
We'd love to hear your thoughts. Choose the type you'd like to provide:
Our feedback system is built on GitHub Issues. Read more on our blog.