# The Object Manager Namespace: The Hierarchical Filesystem Underneath Every Windows Security Boundary

> A bottom-up tour of the Windows Object Manager namespace, the 1993 Cutler-era kernel data structure that every Windows security boundary quietly assumes.

*Published: 2026-05-11*
*Canonical: https://paragmali.com/blog/the-object-manager-namespace-the-hierarchical-filesystem-und*
*License: CC BY 4.0 - https://creativecommons.org/licenses/by/4.0/*

---
<TLDR>
**The Windows Object Manager namespace is the kernel-resident, filesystem-shaped tree that every Windows security boundary quietly assumes.** Every named kernel object -- processes, threads, sections, files, registry keys, tokens, mutants, semaphores, ALPC ports, devices, drivers, jobs, silos -- lives somewhere under `\`. Six generations of isolation primitives (Session 0 isolation, AppContainer lowbox, integrity levels, VBS trustlets, Server Silos, and the `ObRegisterCallbacks` EDR sensor surface) are all path rewrites, per-directory ACLs, or kernel callbacks layered on the same 1993 Cutler-era four-piece structure. This article builds the namespace bottom-up -- `OBJECT_HEADER`, `OBJECT_TYPE`, `ParseProcedure`, `OBJECT_DIRECTORY` -- walks the 2026 top-level directory atlas on Windows 11 25H2, surveys the exploit tradition (symbolic-link redirection, namespace squatting, bait-and-switch on `\??` and `\Device`, arbitrary directory creation), and closes on the EDR pivot in `ObRegisterCallbacks`.
</TLDR>

## 1. The path that isn't a path

Open `WinObj.exe` as administrator on any Windows 11 25H2 machine ([Windows 11 version history](https://en.wikipedia.org/wiki/Windows_11_version_history)). For about ten seconds the screen looks like a filesystem. The root is named `\`. Below it sit folders called `\Device`, `\BaseNamedObjects`, `\Sessions`, `\RPC Control`, `\KnownDlls`, and `\ObjectTypes`. Double-click any of them and you see children. Right-click any node and you can read a security descriptor. This is essentially the same UI a 1996 SysAdmin would have recognised; the tool first shipped that year as part of Mark Russinovich and Bryce Cogswell's Winternals [@en-wikipedia-mark-russinovich], and the current build is a Microsoft-signed Sysinternals binary whose navigation surface has not been redesigned in three decades [@ms-winobj].

Navigate to `\Sessions\1\AppContainerNamedObjects` and the picture starts to fracture. Inside that directory you will find one subdirectory per running AppContainer-sandboxed app, each named after a long Security Identifier of the form `S-1-15-2-...`. Pick the one belonging to the Microsoft Edge renderer process you are reading this article in. Every named mutant, event, section, semaphore, and ALPC port the renderer can ever name lives inside that one subdirectory. The renderer cannot escape it. Not because of a permission check that comes second, but because the kernel rewrites every name the renderer asks for, transparently, before path resolution begins. Microsoft's AppContainer Isolation documentation [@ms-appcontainer-isolation] calls this "sandboxing the application kernel objects."

This tree is not a filesystem. There is no disk persistence; nothing under `\` survives a reboot. It is not the Windows registry either; the registry is a separate subsystem with its own hive format that hangs off the namespace only through a parse procedure on the `Key` object type. What this tree is, instead, is the Object Manager namespace: the in-memory, kernel-resident, hierarchical name service that the Windows kernel uses to locate every nameable kernel object [@ms-managing-kernel-objects]. Its top-level directories are catalogued in the driver kit's Object Directories reference [@ms-object-directories].

<Definition term="Object Manager">
The Windows Object Manager, internally called `Ob`, is a kernel-mode subsystem of the Windows Executive that manages the lifetime, naming, security, and accounting of every resource the kernel exposes to user mode as a named object. Wikipedia summarises it as a "subsystem implemented as part of the Windows Executive which manages Windows resources... each [resource] reside[s] in a namespace for categorization" [@en-wikipedia-object-manager].
</Definition>

Here is the thesis the rest of this article spends nine thousand words unpacking. Every Windows security boundary you have read about -- Session 0 isolation, Mandatory Integrity Control, AppContainer, the Virtualization-Based Security trustlets, Server Silos and Windows containers, the EDR sensor surface that fires when something opens a handle to `lsass.exe` -- is *physically realised* in this tree. Each boundary is either a path rewrite at lookup time, a per-directory ACL, a token-keyed name substitution, or a kernel callback registered against an `OBJECT_TYPE`. The boundaries you read about elsewhere are the *policies*; this tree is the *mechanism*.

The Object Manager has shipped without architectural change for thirty-three years. Whose decision was that? And why did a 1993 data structure survive untouched while the GUI, the driver model, the security subsystem, and the boot path around it were rewritten more than once?

## 2. Where the namespace came from

The decision belongs to Dave Cutler. In 1988 Microsoft hired Cutler away from Digital Equipment Corporation. The Wikipedia biography records the line of operating systems Cutler had developed at DEC: "RSX-11M, VAXELN, VMS, and MICA" [@en-wikipedia-dave-cutler]. Three of those shipped commercially; the fourth, MICA, was cancelled with the Prism RISC program. Cutler walked out, and Microsoft signed him with a charter from Bill Gates to build a portable next-generation kernel that could host the existing Windows API on top of a 32-bit, multi-architecture base [@en-wikipedia-architecture-of-windows-nt]. Cutler brought a small team of DEC veterans with him.

The Object Manager is one of that team's earliest design decisions. The architectural bet was to *unify every named kernel object* under one filesystem-shaped tree, with each type carrying a parse procedure so a single family of syscalls (`NtCreateFile`, `NtOpenSection`, `NtOpenProcess`, and so on) could address files, registry keys, processes, ports, sections, drivers, devices, jobs, and synchronization primitives using the same path-walk algorithm. That was an unusual choice in 1989. VMS had a more typed, less unified resource broker. Mach treated kernel objects as capability-style port rights and never gave them a hierarchical name. Cutler's choice was, at heart, a Plan-9-style "every named resource is a filesystem path" idea, imported into a Windows shell.

<Sidenote>Plan 9 from Bell Labs (Pike, Thompson, et al.) was the academic articulation of the "everything is a path" property: every kernel-named resource, including processes and network connections, surfaced as a file under a 9P-served namespace. Plan 9 never reached commercial scale, but its design idea reached production through NT, and through Linux's /proc, /sys, and FUSE.</Sidenote>

Windows NT 3.1 shipped on July 27, 1993. It was "Microsoft's first 32-bit operating system," supported on IA-32, DEC Alpha, and MIPS [@en-wikipedia-windows-nt-3-1]. The Object Manager was already one of its executive subsystems, sitting alongside the I/O Manager, the Memory Manager, the Process Manager, the Security Reference Monitor, and the Local Procedure Call subsystem [@en-wikipedia-architecture-of-windows-nt]. The four pieces this article will rebuild from scratch -- the `OBJECT_HEADER` that prefixes every object in memory, the `OBJECT_TYPE` singleton that owns each type's method table, the `ParseProcedure` that delegates path resolution to the owning subsystem, and the `OBJECT_DIRECTORY` hash table that maps names to objects -- were all in the NT 3.1 kernel. None of them has been rearchitected since.

That same year, Microsoft Press published *Inside Windows NT*, written by technical writer Helen Custer with a Foreword by Cutler himself. The book's Object Manager chapter is the canonical pre-2000 description of the namespace, cited on the Sysinternals WinObj page [@ms-winobj] as "Helen Custer's *Inside Windows NT* provides a good overview of the Object Manager namespace." Custer's book has been out of print for two decades, but the citation chain through Russinovich's tool is durable.

Three years later, in 1996, Russinovich and Cogswell co-founded Winternals and released WinObj 1.0 [@en-wikipedia-mark-russinovich]. WinObj was the first publicly distributed tool to walk `\` from user mode, using the native `NtOpenDirectoryObject` and `NtQueryDirectoryObject` syscalls that the Object Manager exposed through NTDLL [@ms-winobj]. The following year, Russinovich's October 1997 *Windows IT Pro* column "Inside the Object Manager" gave the namespace its first treatment in the trade press. The original URL did not survive changes to TechTarget's web property portfolio in 2025 (TechTarget was acquired by Informa PLC in 2025), but the WinObj page still cites the column by name as "Mark's October 1997 [WindowsITPro Magazine] column, 'Inside the Object Manager'."

<Sidenote>The Russinovich 1997 column has no surviving direct URL because the URL did not survive changes to TechTarget's web property portfolio in 2025. The most accessible surviving citation is through the WinObj page itself. The same archive failure also explains why Helen Custer's 1993 biography returns HTTP 404 on Wikipedia in 2026; the book (ISBN 1-55615-481-X) survives in used-book channels only.</Sidenote>

The line of book-length internals references that began with Custer continued through *Inside Windows 2000* (third edition) and the *Windows Internals* series that succeeded it. The 7th edition Part 1 was published by Microsoft Press in May 2017, authored by Russinovich, Alex Ionescu, and David A. Solomon [@microsoftpressstore-wininternals7-part1]; its Chapter 8 is the current canonical reference for the Object Manager. James Forshaw's April 2024 *Windows Security Internals* [@nostarch-windows-security-internals] is the contemporary companion that ties the namespace into the access-check pipeline.

The 1993 design assumed a single global namespace. One process tree, one `\BaseNamedObjects`, one `\Windows\WindowStations\WinSta0`, one `\??` view of DOS device letters. Everyone shared everything. Did that assumption survive the Internet?

## 3. The pre-Vista namespace and how it broke

It did not. By the late 1990s every interactive Windows user was sharing a name service with every running service. The single-global-namespace assumption produced three distinct exploit classes, each rediscovered repeatedly between 1996 and 2007, and each ultimately closed only by architectural change.

The most public failure was the *shatter attack*. In August 2002 a researcher named Chris Paget published a paper titled "Exploiting design flaws in the Win32 API for privilege escalation." Wikipedia's article on the disclosure preserves the chronology: "Shatter attacks became a topic of intense conversation in the security community in August 2002 after the publication of Chris Paget's paper" [@en-wikipedia-shatter-attack]. The proof-of-concept was about thirty lines. As an unprivileged interactive user, Paget sent a `WM_TIMER` window message to a service's hidden window in the same `\Windows\WindowStations\WinSta0` (which all services and all interactive users shared in pre-Vista Windows), with a callback parameter pointing to attacker-placed shellcode. The shellcode ran as SYSTEM.

Microsoft's initial response, preserved in the Wikipedia article, was that "the flaw lies in the specific, highly privileged service": a per-service bug, patch the services. That stance did not survive the structural-class argument. The exploit was not a bug in one service. It was a *property of the namespace*: as long as services and users shared a window station and a `\BaseNamedObjects`, any service that ever called a Windows API processing a message from its message queue was reachable from any logged-in user.

> **Note:** A second class of pre-Vista failure was *named-object squatting*. A low-privilege user pre-creates `\BaseNamedObjects\Some_Global_Event` with a permissive DACL. A privileged service later calls `CreateEvent("Some_Global_Event")` with default open-or-create semantics and ends up inheriting the squatter's object, security descriptor and all. This is not one service-author's bug; it is the consequence of every service-author trusting that names in a shared namespace would resolve to objects they themselves created. The pattern has been rediscovered approximately once a year for two decades. James Forshaw documents the contemporary named-pipe analog in his 2017 "Named Pipe Secure Prefixes" post [@tiraniddo-named-pipe-secure-prefixes], where the SMSS-created prefixes `\Device\NamedPipe\ProtectedPrefix\Administrators`, `\Device\NamedPipe\ProtectedPrefix\LocalService`, and `\Device\NamedPipe\ProtectedPrefix\NetworkService` are TCB-privilege-gated -- only `smss.exe` can create sibling protected prefixes, so a service that publishes its pipe below one of these prefixes inherits a DACL that low-privilege squatters cannot reach.

The third class was *symbolic-link redirection*. The pre-Vista Object Manager exposed two kinds of user-creatable symbolic link: object-manager symbolic links inside `\??` (the per-session DOS-devices view) and NTFS mount points on disk. The attack pattern was the same in both. A privileged process is asked to open a path the user controls part of. The user has pre-planted a symbolic link partway through the path that redirects the residual walk into a target the user could not otherwise write. The privileged process opens the redirected file and treats it as if it were the original.

Forshaw's 2015 Project Zero post on the symbolic-link hardening generation is the canonical taxonomy: "There are three types of symbolic links you can access from a low privileged user, Object Manager Symbolic Links, Registry Key Symbolic Links and NTFS Mount Points" [@p0-symlink-mitigations]. His worked example for the Internet Explorer 11 EPM sandbox is CVE-2015-0055 [@nvd-cve-2015-0055], described in the post as "an information disclosure issue in the IE EPM sandbox which abused symbolic links to bypass a security check."

The aha moment from this section is the one Microsoft eventually conceded. The pre-Vista failure mode was not three independent bug families. It was *one* structural problem -- a single global namespace shared by every principal -- with three faces. No amount of per-service patching could close it. The fix had to be architectural: the namespace itself had to be partitioned.

<Sidenote>The Interactive Services Detection Service (ISDS) was Vista's backward-compatibility hack for legacy services that drew GUIs into Session 0. ISDS displayed a "An interactive service has requested attention" prompt that let the user switch to Session 0 long enough to dismiss the dialog. It was deprecated in Windows 10 1803 and is the historical artifact of just how much pre-Vista code assumed services and users would share a window station.</Sidenote>

That fix took five years to ship. Windows Vista RTM was released on November 8, 2006 and General Availability arrived on January 30, 2007 [@en-wikipedia-windows-vista]. Vista did not ship one fix; it shipped three independent partition mechanisms in the same release window, because the structural failure had three faces and each face needed its own mechanism. The next section catalogues those mechanisms and the four additional generations of additive isolation that have built on them since.

## 4. Six generations of namespace isolation

The namespace itself has not been rearchitected since 1993. What has evolved, in six discrete generations between 1993 and 2026, is the set of *partition primitives* layered on top: the mechanisms that let the kernel hide subtrees from particular callers, rewrite paths transparently for particular tokens, or invoke a registered watcher when a particular handle is created. Each generation closes a structural class. None has rendered its predecessor obsolete. On 2026 Windows 11 25H2 all six are simultaneously load-bearing.

<Mermaid caption="Six generations of Windows Object Manager namespace partition primitives, 1993 to 2026">
flowchart LR
    G1["Gen 1<br/>NT 3.1, Jul 1993<br/>Single global namespace"] --> G2
    G2["Gen 2<br/>Vista, Jan 2007 / SP1, Feb 2008<br/>Session 0 + MIC + ObRegisterCallbacks"] --> G3
    G3["Gen 3<br/>Windows 8, Oct 2012<br/>AppContainer / Lowbox / per-package directory"] --> G4
    G4["Gen 4<br/>Windows 10 RTM, Jul 2015<br/>VBS / IUM secure-kernel namespace"] --> G5
    G5["Gen 5<br/>Windows Server 2016, Oct 2016<br/>Server Silos / silo-scoped views"] --> G6
    G6["Gen 6<br/>MS15-090, Aug 2015 -><br/>symbolic-link class hardening"]
</Mermaid>

<Sidenote>Generation numbering is thematic (by isolation capability introduced) rather than strictly chronological. Gen 6 (MS15-090, August 11, 2015) predates Gen 5 (Windows Server 2016, October 12, 2016) by 14 months; the numbering reflects the logical layering of isolation mechanisms, not their calendar sequence.</Sidenote>

### 4.1 Generation 2 -- Session 0 isolation, integrity levels, ObRegisterCallbacks

Vista shipped three mechanisms in one release window because the structural failure had three faces.

The first was *Session 0 isolation*. From Vista forward, services run in Session 0 alone; the first interactive logon starts at Session 1. Each session gets its own subtree at `\Sessions\<n>\BaseNamedObjects`, `\Sessions\<n>\Windows\WindowStations`, and `\Sessions\<n>\DosDevices`. The Win32 `Local\` prefix routes through `kernel32!BaseGetNamedObjectDirectory` into the per-session BNO; `Global\` routes into the shared `\BaseNamedObjects` [@ms-termserv-kernel-object-namespaces]. The Wikipedia Shatter article preserves the architectural fix verbatim: "Local user logins were moved from Session 0 to Session 1, thus separating the user's processes from system services that could be vulnerable" [@en-wikipedia-shatter-attack]. After Vista an interactive user could no longer `SendMessage(WM_TIMER)` into a service's hidden window because the user and the service no longer shared a window station.

The second mechanism was *Mandatory Integrity Control*. Vista introduced a new ACE type, `SYSTEM_MANDATORY_LABEL_ACE`, attached to every object's security descriptor. Each token carries one of four integrity levels (Low S-1-16-4096, Medium S-1-16-8192, High S-1-16-12288, or System S-1-16-16384), and the Security Reference Monitor compares the requester's level against the object's level *after* path resolution succeeds [@en-wikipedia-mandatory-integrity-control]. MIC is not a namespace partition. A Low-IL process and a Medium-IL process resolve the same `\BaseNamedObjects` directory; only the open is denied at the leaf. The structural property MIC adds is that the leaf check is *unbypassable from user mode*; the check fires regardless of which DACL the object carries.

The third mechanism was `ObRegisterCallbacks`. Microsoft's wdm.h documentation records the API's first ship date verbatim: "Available starting with Windows Vista with Service Pack 1 (SP1) and Windows Server 2008" [@ms-obregistercallbacks]. The API lets a KMCS-signed driver intercept handle creation and handle duplication on `PsProcessType`, `PsThreadType`, and the desktop object type. The registration carries an Altitude (a FltMgr-style collision key) and an array of `OB_OPERATION_REGISTRATION` records [@ms-ob-callback-registration]. Pre-operation callbacks can strip access-mask bits before the handle is granted; post-operation callbacks fire for logging. The parallel API `PsSetCreateProcessNotifyRoutineEx` [@ms-pssetcreateprocessnotifyroutineex] covers process creation. Together, these are the kernel-mode primitives every modern EDR product depends on; they ship inside the Object Manager itself and they are the reason an EDR knows when something opens a handle to `lsass.exe`.

### 4.2 Generation 3 -- AppContainer and the lowbox token

Windows 8 shipped on October 26, 2012 [@en-wikipedia-windows-8]. Modern / UWP apps downloaded from the Microsoft Store needed a sandbox finer-grained than per-session BNO. The Vista path rewriting in `kernel32!BaseGetNamedObjectDirectory` happened in user mode, which made it the wrong layer for a sandbox: a hostile renderer could in principle bypass the user-mode rewrite. The new layer moved into the kernel.

Each UWP / MSIX process runs under a special token type, the *AppContainer / LowBox token* (referred to in kernel code as the *lowbox token*), created by `NtCreateLowBoxToken`. The token carries a `TOKEN_APPCONTAINER_INFORMATION` block that names the process's package SID (`S-1-15-2-...`) and an `AppContainerNumber`. Inside `ObpLookupObjectName`, *before* the path is walked, the kernel checks whether the caller's token is a lowbox token; if it is, lookups of `\BaseNamedObjects\X`, `\RPC Control\X`, and other rewriteable paths get redirected into `\Sessions\<n>\AppContainerNamedObjects\<package-sid>\X`. The user-mode caller never sees the rewrite. The package-SID directory is created by SYSTEM at process-creation time with a security descriptor that grants the package SID, and only the package SID, full access. Microsoft's wording is precise: AppContainer works by "sandboxing the application kernel objects, the AppContainer environment prevents the application from influencing, or being influenced by, other application processes" [@ms-appcontainer-isolation].

<PullQuote>
"The AppInfo service, which is responsible for creating the new application, calls the undocumented API CreateAppContainerToken to do some internal housekeeping. Unfortunately this API creates object directories under the user's AppContainerNamedObjects object directory to support redirecting BaseNamedObjects and RPC endpoints by the OS." -- James Forshaw, Project Zero Issue 1550 [@p0-issue1550]
</PullQuote>

The residual class the AppContainer model has not closed is the one Forshaw's August 30, 2018 Project Zero post [@p0-issue1550] documents: because the SYSTEM-side AppInfo service has to write into the user's AppContainerNamedObjects subtree to set up redirection, an unprivileged caller can race the directory creation and end up planting a symbolic link the SYSTEM service then follows. The class -- "SYSTEM-privileged directory creation in user-controllable territory" -- is the worked example of why "the kernel rewrites the name" is an isolation property only when the SYSTEM helpers also use the rewrite.

### 4.3 Generation 4 -- VBS trustlets and the IUM secure-kernel namespace

Windows 10 RTM shipped on July 29, 2015 [@en-wikipedia-windows-10-version-history]. The Virtualization-Based Security (VBS) feature set introduced a parallel object-manager-shaped namespace that lives in Virtual Trust Level 1 (VTL1) and is inaccessible to the VTL0 NT kernel. Inside VTL1 the Secure Kernel (`securekernel.exe`) maintains its own root, its own type registry, and its own handle-table machinery. The VTL0 NT kernel can see *trustlet processes* -- the per-trustlet user-mode containers running in Isolated User Mode (IUM) -- but it cannot reach into their secure-side state.

Alex Ionescu's Black Hat USA 2015 talk Battle of SKM and IUM [@ionescu-bh2015-pdf] is the canonical inventory of the inbox Trustlet IDs at ship: Trustlet 0 is the Secure Kernel Process hosting Device Guard; Trustlet 1 is LSAISO.EXE for Credential Guard; Trustlet 2 is VMSP.EXE hosting the virtual TPM; Trustlet 3 is the vTPM provisioning trustlet. Each is identified by a Trustlet ID and reachable only through narrow Secure Kernel ALPC ports. The VBS Trustlets piece in this series unpacks the threat model.

### 4.4 Generation 5 -- Server Silos and the silo-scoped namespace

Windows Server 2016 shipped on October 12, 2016 [@en-wikipedia-windows-server-2016]. Microsoft needed a Linux-namespaces equivalent so that container runtimes -- Docker, containerd, and the Azure Kubernetes Service Windows-node pods that followed -- could host adjacent workloads on one kernel. The answer was *Server Silo*: a new `OBJECT_TYPE` registered alongside `Job`, `Process`, and `Thread`, that carries its own `RootDirectory`, `DosDevicesDirectory`, and `ServerSiloGlobals`. A process attached to a silo via `PsAttachSiloToCurrentThread` sees the silo's namespace as its root; the silo's `\GLOBAL??\C:` resolves to the silo's `\Device\HarddiskVolume*`, which is a different `Device` object from the host's. Job objects [@ms-job-objects] provide the cgroups-equivalent resource-accounting dimension; the Silo type builds on top.

The canonical reverse-engineering reference is Daniel Prizmant's July 2020 Unit 42 writeup, which spells out the architecture: "job objects are used in a similar way control groups (cgroups) are used in Linux, and... server silo objects were used as a replacement for namespaces support in the kernel" [@unit42-rev-eng-windows-containers].

The companion piece, Prizmant's June 2021 *Siloscape* [@unit42-siloscape], is the first known malware family that escapes the silo boundary: Prizmant named the malware "Siloscape (sounds like silo escape) because its primary goal is to escape the container, and in Windows this is implemented mainly by a server silo." James Forshaw's April 2021 Project Zero post *Who Contains the Containers?* [@p0-who-contains-containers] is the four-LPE companion disclosure. Microsoft's standing position is that Server Silo is not a security boundary; the Hyper-V Container, which adds a Hyper-V VM around the container's silo, is the security-boundary product.

### 4.5 Generation 6 -- the symbolic-link hardening continuum

The cross-cutting hardening generation closes the symlink subclass that recurred in Generations 1, 3, and 5. MS15-090 shipped on August 11, 2015 [@ms-ms15-090] and "corrects how Windows Object Manager handles object symbolic links created by a sandbox process, by preventing improper interaction with the registry by sandboxed applications, and by preventing improper interaction with the filesystem by sandboxed applications." The bulletin's canonical Object Manager CVE is CVE-2015-2428 [@nvd-cve-2015-2428], described verbatim as the case where the "Object Manager in Microsoft Windows... does not properly constrain impersonation levels during interaction with object symbolic links that originated in a sandboxed process." Subsequent Windows 10 builds added `OBJ_DONT_REPARSE`, an open-time flag that disables symbolic-link substitution for callers willing to opt in, and post-Siloscape patches in 2021 closed `NtSetInformationSymbolicLink` retargeting from inside a silo.

<MarginNote>The scope document for this article originally attributed MS15-090 to CVE-2015-2528 and CVE-2015-1463. Independent NVD verification confirmed neither is correct: CVE-2015-2528 [@nvd-cve-2015-2528] is the MS15-102 Task Management EoP, and CVE-2015-1463 [@nvd-cve-2015-1463] is a ClamAV denial-of-service crash. The canonical MS15-090 OM-symlink CVE is CVE-2015-2428. Separately, CVE-2018-0824 [@nvd-cve-2018-0824] is a CWE-502 COM deserialization issue that joined the CISA KEV catalog on 2024-08-05, not a namespace-squatting CVE.</MarginNote>

The residual subclass MS15-090 did not close was the per-session `\??` DosDevices remapping path under impersonation. A low-privileged process whose token is impersonated by a SYSTEM service can plant a `DefineDosDevice` remapping that survives into the impersonation-time `\??` view, and the SYSTEM-side activation-context resolver then opens the redirected path while running with elevated privileges. The canonical 2023 worked example is HackSys's *Activation Context Hell -- DosDevices Remapping Attack under Impersonation* [@hacksys-activation-context-hell], which targets the CSRSS / SxS activation-context resolver and shipped as CVE-2023-35359 [@nvd-cve-2023-35359], with the closely-related CVE-2022-22047 [@nvd-cve-2022-22047] covering the underlying CSRSS surface. The mitigation has to live inside the impersonation-aware `\??` resolver in the SYSTEM caller, not at the symlink-creation gate.

> **Note:** Every generation since Generation 1 has *layered* a new isolation primitive on top of the prior generation. None has rendered its predecessor obsolete. On 2026 Windows 11 25H2 all six generations coexist simultaneously: a UWP / MSIX app inside a Server Silo on a VBS-enabled host is session-partitioned, lowbox-rewritten, silo-scoped, VTL0-confined, integrity-gated, and watched by every loaded EDR's `ObRegisterCallbacks` filter. Each layer adds an independent enforcement point at `ObpLookupObjectName` time.

Six generations of isolation primitives is a tidy story, but it has glossed the most important question. What is the actual kernel data structure all six generations parameterize? What does the path-walk algorithm look like, what is the type registry, and where does the hash table live?

## 5. The four load-bearing primitives

If you remember one paragraph from this article, make it this one. The Object Manager namespace is built out of four kernel data structures: an `OBJECT_HEADER` that prefixes every named object in memory, an `OBJECT_TYPE` singleton that owns each type's method table, a `ParseProcedure` that delegates path resolution to the owning subsystem when needed, and an `OBJECT_DIRECTORY` hash table that maps names to objects. Every Windows security boundary you have read about is a parameter to one of these four pieces. The next eight subsections rebuild them one at a time.

<Mermaid caption="The four-piece kernel data structure underneath every named Windows kernel object">
flowchart TB
    OD["OBJECT_DIRECTORY<br/>(37-bucket hash table)"] -->|"hash(name) % 37"| OH
    OH["OBJECT_HEADER<br/>(PointerCount, HandleCount,<br/>TypeIndex, InfoMask,<br/>SecurityDescriptor, Body offset)"] -->|"TypeIndex XOR<br/>ObHeaderCookie"| OT
    OT["OBJECT_TYPE singleton<br/>(in nt!ObTypeIndexTable)"] -->|"TypeInfo"| TI
    TI["TYPE_INFO method table<br/>(Dump, Open, Close, Delete,<br/>ParseProcedure,<br/>Security, QueryName, ...)"]
    OH -->|"Body[]"| BODY["Type-specific body<br/>(EPROCESS, FILE_OBJECT,<br/>SECTION_OBJECT, ...)"]
</Mermaid>

### 5.1 OBJECT_HEADER

Every named kernel object lives in non-paged pool. Immediately *before* each object's typed body sits an `OBJECT_HEADER`, a 0x30-byte (48-byte on x64) structure that the Object Manager owns. `PointerCount` and `HandleCount` are the two reference counts: the former tracks raw kernel-mode pointer references, the latter tracks user-mode handles. `TypeIndex` is a single byte that indexes into the `nt!ObTypeIndexTable` to find the object's type singleton; since Windows 10 1709, the byte is XOR-obfuscated against the per-boot `nt!ObHeaderCookie` so that simple type confusion is non-trivial.

`InfoMask` is a bitmap of optional sub-headers that may precede the main header: `OBJECT_HEADER_NAME_INFO` for named objects, `OBJECT_HEADER_QUOTA_INFO` for objects that charge a quota block, `OBJECT_HEADER_HANDLE_INFO` for objects that need per-process handle accounting. `SecurityDescriptor` is a tagged pointer to the object's DACL/SACL. `Body[]` is the offset at which the type-specific payload begins; for a process object that payload is an `EPROCESS`, for a file it is a `FILE_OBJECT`, and so on. The canonical reference is Chapter 8 of *Windows Internals 7th Edition Part 1* [@microsoftpressstore-wininternals7-part1].

<Definition term="OBJECT_HEADER">
The per-object header (`nt!_OBJECT_HEADER`) that precedes every named kernel object in non-paged pool. Carries reference counts (`PointerCount`, `HandleCount`), a `TypeIndex` byte that points into `nt!ObTypeIndexTable` (XOR-obfuscated against `nt!ObHeaderCookie` since Windows 10 1709), an `InfoMask` describing optional sub-headers, a `SecurityDescriptor` pointer, and the offset to the typed `Body[]`.
</Definition>

<Sidenote>The `TypeIndex` XOR-with-cookie is one of the smallest kernel hardening changes Microsoft has shipped: a single byte that prevents a poisoned `OBJECT_HEADER` from naming an arbitrary type after a heap-corruption primitive. The cookie is per-boot and lives in `nt!ObHeaderCookie`. The hardening is documented in *Windows Internals 7th Edition* Chapter 8 [@microsoftpressstore-wininternals7-part1] and in Geoff Chappell's reverse-engineering studies; Microsoft has not, as of 2026, published a Learn-hosted reference for the cookie itself.</Sidenote>

### 5.2 OBJECT_TYPE

`OBJECT_TYPE` is the per-type singleton. There is exactly one `OBJECT_TYPE` per registered kernel type, and they live in `\ObjectTypes`. On Windows 11 25H2 the count sits at roughly seventy-five: `Type`, `Directory`, `SymbolicLink`, `Token`, `Job`, `Process`, `Thread`, `Section`, `Key`, `File`, `Event`, `Mutant`, `Semaphore`, `Timer`, `WindowStation`, `Desktop`, `Device`, `Driver`, `IoCompletion`, `ALPC Port`, `EtwRegistration`, `Silo`, and dozens more.

<Definition term="OBJECT_TYPE">
The per-type singleton (`nt!_OBJECT_TYPE`) that owns each kernel type's method table. The `TypeInfo` field carries eight procedure pointers and one offset field (WaitObjectFlagOffset): `DumpProcedure`, `OpenProcedure`, `CloseProcedure`, `DeleteProcedure`, `ParseProcedure` (the path-resolution callback), `SecurityProcedure`, `QueryNameProcedure`, `OkayToCloseProcedure`, and a `WaitObjectFlagOffset` offset for waitable types. Every `OBJECT_TYPE` instance is reachable through `\ObjectTypes`.
</Definition>

The `TypeInfo` field on each `OBJECT_TYPE` carries eight procedure pointers and one offset field (WaitObjectFlagOffset). The most consequential is the `ParseProcedure`. When `ObpLookupObjectName` is walking a path component-by-component, and a step lands on an object whose `OBJECT_TYPE` defines a `ParseProcedure`, the OM hands the *residual* path and the desired access to that procedure, which becomes the namespace authority below that point. That is how the registry's `Key` type, the I/O Manager's `Device` type, and the various WMI / Volume-Manager subsystems insert themselves into the namespace without the Object Manager having to know any of their internal structure [@en-wikipedia-object-manager].

### 5.3 The parse procedure

`ObpLookupObjectName` walks `\Foo\Bar\Baz\...\Leaf` left-to-right. At each component the walker does one of three things. The common case is a hash-table lookup in the current `OBJECT_DIRECTORY`'s 37 buckets to find the child object by name. The second case is `SymbolicLink` substitution: if the child object's type is `SymbolicLink`, the walker substitutes the link target and re-enters the walk at the substitution. The third and most consequential case is *parse-procedure handoff*. If the child object's `OBJECT_TYPE` has a non-null `ParseProcedure`, the walker stops, hands the residual path string to that procedure, and lets it decide what to do.

<Definition term="ParseProcedure">
The load-bearing method pointer on each `OBJECT_TYPE`'s `TypeInfo` field. When `ObpLookupObjectName` encounters an object whose type defines a `ParseProcedure`, the residual path is handed to that procedure for resolution. The two canonical parse procedures are `IopParseDevice` (for the `Device` type, which delegates further resolution to the device's owning driver via `IRP_MJ_CREATE`) and `CmpParseKey` (for the `Key` type, which walks the registry hive).
</Definition>

`IopParseDevice` is the parse procedure for the `Device` type. When the walker reaches `\Device\HarddiskVolume1` and is asked to continue with `\Users\me\file.txt`, the I/O Manager builds an `IRP_MJ_CREATE` packet, dispatches it to the filesystem driver that owns the volume (NTFS, ReFS, ExFAT, FAT32, or one of several others), and lets that driver walk the rest of the path inside its own on-disk structures. The driver returns a `FILE_OBJECT`, which the Object Manager packages into a handle.

`CmpParseKey` is the parse procedure for the `Key` type. When the walker reaches `\REGISTRY` and is asked to continue with `\MACHINE\Software\Microsoft\Windows`, the Configuration Manager takes over and walks the in-memory hive structures.

The structural consequence is profound. Every named file in Windows is, technically, a leaf in the Object Manager namespace. NTFS, ReFS, ExFAT, and the registry are not separate naming systems; they are parse-procedure callbacks that hand `FILE_OBJECT` or `KEY` bodies back to the OM.

<Mermaid caption="ObpLookupObjectName walking C:\Users\me\file.txt through the Device parse procedure">
sequenceDiagram
    participant User as User Process
    participant OM as ObpLookupObjectName
    participant Dir as \GLOBAL?? OBJECT_DIRECTORY
    participant Dev as \Device\HarddiskVolume1 (Device type)
    participant Drv as NTFS Driver
    User->>OM: NtCreateFile("\??\C:\Users\me\file.txt")
    OM->>OM: rewrite \??\ -> \Sessions\<n>\DosDevices\
    OM->>Dir: lookup "C:"
    Dir-->>OM: SymbolicLink -> \Device\HarddiskVolume1
    OM->>OM: substitute, re-enter walk
    OM->>Dev: lookup \Device\HarddiskVolume1
    Dev-->>OM: type=Device, has ParseProcedure
    OM->>Drv: IopParseDevice with "\Users\me\file.txt"
    Drv->>Drv: IRP_MJ_CREATE: walk MFT, find file
    Drv-->>OM: FILE_OBJECT
    OM-->>User: HANDLE
</Mermaid>

### 5.4 The 37-bucket directory hash

`OBJECT_DIRECTORY` is a 37-bucket open-hash table. The hash function is `RtlHashUnicodeString`, applied to each component name. Thirty-seven was the prime Cutler picked in 1993; the constant has not changed in thirty-three years. The folk-knowledge corroboration is in Chapter 8 of *Windows Internals 7th Edition Part 1* and in Forshaw's *Windows Security Internals* Chapter 8; Microsoft has never published a Learn-hosted spec for the constant [@nostarch-windows-security-internals].

<Definition term="OBJECT_DIRECTORY">
The 37-bucket open-hash table (`nt!_OBJECT_DIRECTORY`) that lives at every interior node of the Object Manager tree. Keys are `UNICODE_STRING` component names; the hash is `RtlHashUnicodeString` modulo 37. Each bucket is a linked list of `OBJECT_DIRECTORY_ENTRY` records that point at the next-level `OBJECT_HEADER`. Reading the tree requires `Directory`-`TRAVERSE` rights on the parent.
</Definition>

<Sidenote>The 37-bucket constant from 1993 has not changed in thirty-three years. On a 2026 Windows 11 25H2 box with several hundred MSIX packages each owning an `\AppContainerNamedObjects\<package-sid>\` subtree, average bucket chains run several entries deep. Collision pressure on the constant is the open problem returned to in Section 9.</Sidenote>

### 5.5 The lowbox redirect inside ObpLookupObjectName

This is the subsection that earns the second aha moment of the article.

When the calling thread's primary token is a lowbox token, `ObpLookupObjectName` consults the token's `AppContainerNumber` and package SID *before* it begins the walk. Lookups that would otherwise resolve into `\BaseNamedObjects` or `\RPC Control` are rewritten into `\Sessions\<n>\AppContainerNamedObjects\<package-sid>\`. The rewrite happens transparently to the user-mode Win32 caller, which still thinks it asked for `\BaseNamedObjects\X`.

<Definition term="Lowbox token">
A specialised token type produced by `NtCreateLowBoxToken` that carries a `TOKEN_APPCONTAINER_INFORMATION` block (with a package SID `S-1-15-2-...` and an `AppContainerNumber`). When a process runs under a lowbox token, `ObpLookupObjectName` rewrites every named-object lookup into the per-package directory `\Sessions\<n>\AppContainerNamedObjects\<package-sid>\` before path walking begins.
</Definition>

<Definition term="AppContainer">
The user-facing brand for the lowbox-token mechanism. Every UWP / MSIX / Windows Store app runs in an AppContainer. The Windows API surface is unchanged for the app; the Object Manager rewrites every named-object name into a per-package subtree, gating cross-package coordination at the namespace layer. The Microsoft Learn page describes this as "Sandboxing the application kernel objects, the AppContainer environment prevents the application from influencing, or being influenced by, other application processes" [@ms-appcontainer-isolation].
</Definition>

The aha moment is structural. AppContainer is not a *containment* mechanism the way you might first picture it. It is a *name-translation* mechanism. The lowbox token tells the kernel which directory to rewrite every name into; the sandbox is, at root, a hash-table indirection inside the kernel's path-walk function. The Edge renderer process cannot name `\BaseNamedObjects\GlobalEvent_Foo` because the kernel rewrites that name into `\Sessions\1\AppContainerNamedObjects\S-1-15-2-...\Global\GlobalEvent_Foo` before lookup even begins. The "sandbox" is a hash-table redirect.

### 5.6 The Silo OBJECT_TYPE and silo-scoped views

`Silo` is itself a registered `OBJECT_TYPE`. Each silo instance carries a silo-scoped `RootDirectory`, `DosDevicesDirectory`, and `ServerSiloGlobals` (with the silo's own registry-hive root and per-silo `BaseNamedObjects` root). `PsAttachSiloToCurrentThread` switches the thread's namespace view; once attached, every Object Manager lookup runs through the silo's roots instead of the host's. Job objects, which provide the cgroups-equivalent resource-accounting substrate, are the underlying primitive the Silo type extends [@ms-job-objects]. The structural design history is in Prizmant's reverse-engineering writeup [@unit42-rev-eng-windows-containers].

<Definition term="Server Silo">
A specialised `Job`-derived kernel object (`OBJECT_TYPE` Silo) introduced in Windows Server 2016 that carries silo-scoped `RootDirectory`, `DosDevicesDirectory`, and `ServerSiloGlobals` fields. A thread attached to a silo via `PsAttachSiloToCurrentThread` sees the silo's namespace as its root; the silo's `\GLOBAL??\C:` resolves to the silo's `\Device\HarddiskVolume*`, which is a different `Device` object from the host's. Server Silo is the substrate underneath Windows Server Containers and WSL1.
</Definition>

### 5.7 The Secure Kernel's parallel namespace

Inside VTL1, the Secure Kernel maintains a separate Object Manager tree with its own root, its own type registry, and its own handle-table machinery. The VTL0 NT kernel cannot enumerate this tree; the only cross-VTL traffic is the narrow ALPC interface each trustlet publishes. Ionescu's BH2015 inventory (Trustlet IDs 0 through 3 at ship, growing in subsequent releases) is the canonical primary [@ionescu-bh2015-pdf].

<Definition term="Trustlet / IUM">
A user-mode process running in Isolated User Mode under the VTL1 Secure Kernel. Each trustlet is signed with both the Windows System Component Verification EKU (1.3.6.1.4.1.311.10.3.6) and the IUM EKU (1.3.6.1.4.1.311.10.3.37), runs at Signature Level 12, and is reachable from VTL0 only through narrow ALPC ports. LSAISO.EXE (Credential Guard), VMSP.EXE (virtual TPM host), and the vTPM provisioning trustlet are the inbox examples.
</Definition>

### 5.8 The handle table

The namespace is the *name* side; the per-process `HANDLE_TABLE` is the *access* side. Once a handle exists in a process, no name lookup happens on subsequent use; the kernel dereferences the handle through a three-level radix tree indexed by the 32-bit handle value, lands on an `OBJECT_HEADER`, and operates on the body. This is why `ObRegisterCallbacks` fires on handle *creation* and *duplication* rather than on every use, and why an inherited handle bypasses the callback entirely. The structural consequence -- that the Object Manager is the gate at name resolution but not at every operation -- comes back in Section 8.

Now you know the data structure. But what does the actual tree look like in 2026? What does `\` contain on a Windows 11 25H2 box, and which security boundary lives in each top-level directory?

## 6. The 2026 top-level directory atlas

Open `WinObj.exe` as administrator on a Windows 11 25H2 machine and the root directory at `\` carries roughly twenty entries. The table below catalogues the load-bearing ones. Each row names the directory, the security boundary it physically realises, and a representative exploit class that has been thrown at it. The driver kit's Object Directories reference [@ms-object-directories] is Microsoft's canonical inventory.

| Top-level directory | What it contains | Which boundary it enforces | Exploit class |
|---|---|---|---|
| `\ObjectTypes` | The ~75 `OBJECT_TYPE` singletons (`Process`, `Thread`, `Section`, `Key`, `File`, `Token`, `Job`, `Silo`, etc.) | Meta -- the type registry the rest of the namespace depends on | Type confusion (mitigated by `ObHeaderCookie` since Windows 10 1709) |
| `\Device` | Driver-published device objects (`\Device\HarddiskVolume*`, `\Device\Tcp`, `\Device\Tpm`, `\Device\NamedPipe`, `\Device\Mailslot`, `\Device\Vmbus`, `\Device\KsecDD`, `\Device\CNG`) | The I/O Manager's surface; each driver's parse procedure consumes residual paths | Bait-and-switch on `\Device` (a low-privilege user redirects a privileged opener through a planted symbolic link) |
| `\Driver`, `\FileSystem` | Loaded `DRIVER_OBJECT` registries | KMCS / HVCI driver-load gate | Vulnerable signed-driver class (BYOVD) |
| `\GLOBAL??` | The machine-wide DosDevices view -- where `C:` and `D:` are symlinks to `\Device\HarddiskVolume*` | Cross-session drive-letter map | Symlink redirect across session boundary |
| `\??` | The per-session DosDevices alias, falling through to `\GLOBAL??` | Session-scoped drive-letter map | The HackSys / CVE-2023-35359 worked example: a low-privilege caller plants a `DefineDosDevice` remapping that survives into the impersonation-time `\??` view, and the SYSTEM-side activation-context resolver opens the redirected path |
| `\BaseNamedObjects` | The global / `Global\`-prefixed-only BNO | Cross-session named-object visibility | Pre-Vista squatting class (closed by Generation 2) |
| `\Sessions\<n>\` | Per-session subtrees (BNO, DosDevices, WindowStations, AppContainerNamedObjects) | Session boundary (Generation 2) | Shatter attacks (closed by Generation 2) |
| `\Sessions\<n>\AppContainerNamedObjects\<package-sid>\` | Per-package UWP / MSIX lowbox namespace | AppContainer / lowbox boundary (Generation 3) | Forshaw P0 Issue 1550 arbitrary-directory creation race |
| `\RPC Control` | Every named LRPC ALPC port (every COM call lands here) | RPC endpoint visibility | Endpoint squatting against named LRPC ports |
| `\KnownDlls`, `\KnownDlls32` | Pre-mapped `Section` objects for system DLLs | Loader supply-chain | `DefineDosDevice` + `\??` symlink-plant trick (closed in NTDLL July 2022, build 19044.1826) |
| `\KernelObjects` | System-defined events (`LowMemoryCondition`, `HighMemoryCondition`, etc.) | Kernel-internal visibility | None public |
| `\Callback` | System-defined `Callback` objects (`ExCallback` slots drivers register against) | Kernel API extension surface | Driver-callback abuse |
| `\Security` | LSA-private endpoints | LSA / authentication isolation | Credential-theft (the LSAISO trustlet via Generation 4) |
| `\Windows` | BNO-redirect surface and `SharedSection` | Win32 subsystem shared state | Cross-session Win32 state leakage |
| `\Silos\<id>` | Per-container silo subroots on Server SKUs | Server Silo boundary (Generation 5) | Siloscape -- symlink retarget out of the silo |
| `\BNOLINKS` | The boundary-keyed private-namespace index | `CreatePrivateNamespace` cross-session/cross-package IPC | None public; the directory itself is RE-derived |

<Mermaid caption="The lowbox redirect inside ObpLookupObjectName for a Microsoft Edge renderer process">
flowchart LR
    subgraph EdgeRenderer["Microsoft Edge Renderer (lowbox token)"]
        K32["CreateMutexW(L'Global\\Foo')"]
    end
    K32 -->|"NtCreateMutant, OBJECT_ATTRIBUTES"| OB
    subgraph KernelOb["ObpLookupObjectName"]
        OB["Read caller token<br/>token.AppContainerNumber<br/>token.PackageSid"]
        OB -->|"rewrite name"| RW["Rewrite '\\BaseNamedObjects\\Global\\Foo'<br/>to<br/>'\\Sessions\\1\\AppContainerNamedObjects\\<br/>S-1-15-2-...\\Global\\Foo'"]
        RW --> WALK["walk the rewritten path"]
    end
    WALK --> Dir["\\Sessions\\1\\AppContainerNamedObjects\\<br/>S-1-15-2-...\\Global\\<br/>(per-package OBJECT_DIRECTORY,<br/>DACL allows only package SID)"]
</Mermaid>

The `\BNOLINKS` directory deserves a separate paragraph because it is not on Microsoft Learn. `NtCreatePrivateNamespace` is the kernel-side syscall behind the Win32 `CreatePrivateNamespace` API [@ms-createprivatenamespacew]; the caller passes a boundary descriptor built by `CreateBoundaryDescriptor` [@ms-createboundarydescriptorw] plus one or more SIDs added via `AddSIDToBoundaryDescriptor` [@ms-addsidtoboundarydescriptor]. The kernel materialises one `\BNOLINKS` entry per `(alias_prefix, boundary_descriptor_hash)` tuple; two callers that pass the same `lpAliasPrefix` but different boundary descriptors land on different directories. The native signature is documented in the PHNT-derived NtDoc mirror [@ntdoc-ntcreateprivatenamespace], and the `OBJECT_BOUNDARY_DESCRIPTOR` structure layout is at ntdoc.m417z.com/object_boundary_descriptor [@ntdoc-object-boundary-descriptor]. The Win32 Object Namespaces overview [@ms-object-namespaces] is Microsoft's only published user-mode reference; the `\BNOLINKS` directory name itself is reverse-engineering-derived.

<Sidenote>The `\BNOLINKS` directory is documented only through reverse engineering of `ntoskrnl.exe` -- via Forshaw's NtObjectManager and System Informer's PHNT headers -- not on Microsoft Learn. The user-mode API surface (`CreatePrivateNamespace`, `CreateBoundaryDescriptor`, `AddSIDToBoundaryDescriptor`) is fully documented. The provenance gap is worth flagging when you cite the directory by name.</Sidenote>

<Sidenote>The `\KnownDlls` LPE class was, for a decade, the canonical example of how a DACL plus loader-side validation could lock down a supply-chain anchor. Forshaw's August 2018 P0 post first sketched a `DefineDosDevice` + `\??` symlink-plant chain that could land a forged `Section` object into `\KnownDlls`; Clement Labro (itm4n) implemented the attack as the PPLdump tool [@github-itm4n-PPLdump] and wrote companion posts on both itm4n.github.io [@itm4n-lsass-runasppl] and the SCRT team blog [@blog-scrt-bypassing-lsa-protection-in-userland]. The class was closed in NTDLL by Windows 10 21H2 build 19044.1826; itm4n confirms the patch in *The End of PPLdump* [@itm4n-the-end-of-ppldump]: "A patch in NTDLL now prevents PPLs from loading Known DLLs."</Sidenote>

<RunnableCode lang="js" title="A hand-rolled hash-walk through a synthetic Object Manager directory">{`
const MAX_DIRECTORY_BUCKETS = 37;

function rtlHashUnicodeString(name) {
  let h = 0;
  for (const ch of name.toUpperCase()) {
    h = (h * 31 + ch.charCodeAt(0)) >>> 0;
  }
  return h % MAX_DIRECTORY_BUCKETS;
}

function makeDir() {
  return { buckets: Array(MAX_DIRECTORY_BUCKETS).fill(null).map(() => []) };
}

function addChild(dir, name, child) {
  dir.buckets[rtlHashUnicodeString(name)].push({ name, child });
}

function lookupObjectName(path, root) {
  const components = path.split('\\\\').filter(Boolean);
  let cursor = root;
  for (const comp of components) {
    const bucket = rtlHashUnicodeString(comp);
    const chain = cursor.buckets[bucket];
    const hit = chain.find(e => e.name.toUpperCase() === comp.toUpperCase());
    console.log(\`lookup '\${comp}' -> bucket \${bucket}, chain length \${chain.length}, \${hit ? 'HIT' : 'MISS'}\`);
    if (!hit) return null;
    if (hit.child.parseProcedure) {
      const rest = '\\\\' + components.slice(components.indexOf(comp) + 1).join('\\\\');
      console.log(\`  parse-procedure handoff for type '\${hit.child.type}', residual='\${rest}'\`);
      return { handedOff: hit.child, residual: rest };
    }
    cursor = hit.child;
  }
  return cursor;
}

const root = makeDir();
const device = makeDir();
device.parseProcedure = true; device.type = 'Device';
const sessions = makeDir();
addChild(root, 'Device', device);
addChild(root, 'Sessions', sessions);
addChild(root, 'BaseNamedObjects', makeDir());

lookupObjectName('\\\\Device\\\\HarddiskVolume1\\\\Users\\\\me\\\\file.txt', root);
`}</RunnableCode>

The walk is the algorithm. The 37 is the bucket count Cutler picked in 1993. The parse-procedure handoff is where the I/O Manager and the Configuration Manager and dozens of other subsystems insert themselves into the tree. Now turn the question around: Windows bet on one tree. What did the kernels that did not bet on one tree do, and why?

## 7. How other kernels name kernel objects

Three kernels, three different bets. Linux took the namespace and *split it into per-resource-class clones* -- one for mounts, one for PIDs, one for IPC, one for the network stack, one for users, one for hostnames, one for cgroups, one for time -- and never built a unified tree. macOS / Darwin gave each task its own *Mach port-right namespace* and let `launchd` broker named-service lookups. Plan 9 from Bell Labs was the academic ancestor of "every named OS resource is a filesystem path," and the design Cutler imported into NT.

### 7.1 Linux: per-resource namespaces

Linux ships eight namespace types, each governed by a `CLONE_NEW*` flag passed to `clone()`, `unshare()`, or `setns()`: mount, PID, network, IPC, user, UTS, cgroup, and time. The `namespaces(7)` man page is precise: "A namespace wraps a global system resource in an abstraction that makes it appear to the processes within the namespace that they have their own isolated instance of the global resource" [@man7-namespaces]. Docker, containerd, runc, Kubernetes pods, LXC, and systemd-nspawn all compose these eight flags into a Linux container.

The strength of the Linux design is per-class composability. A process can be in a fresh mount namespace, a fresh PID namespace, and the host's network namespace, all at once. The weakness is the absence of a unified type registry: Linux has no equivalent of `\ObjectTypes`, no equivalent of the `OBJECT_HEADER` reference counting that the kernel applies uniformly to every named object. Each resource class has its own lookup function, its own permission model, and its own ownership story. A bug in any one of them is bounded to that one resource class but is also not shared mitigation across the others.

### 7.2 macOS / Darwin: Mach ports and the bootstrap server

Darwin's kernel-object naming is capability-style. Apple's archive documentation describes the model directly: "each task consists of a virtual address space, a port right namespace, and one or more threads" [@apple-mach-kernel]. Tasks send messages by holding a *port right* -- a per-task index into a kernel-managed table of Mach ports. There is no single hierarchical namespace; ports are sent over Mach messages, and `launchd` operates as the bootstrap-server name broker for services that need a stable rendezvous. A separate I/O Registry tree carries device objects.

The strength of the Mach design is that capabilities cannot be forged; you cannot synthesise a port right out of a string the way you can synthesise a path string under Windows. The weakness is the split namespace: device objects live in the I/O Registry, services live behind `launchd`, and the kernel itself has no equivalent of `\BaseNamedObjects` as a one-stop shop.

### 7.3 Plan 9 from Bell Labs

Plan 9 is the design lineage Cutler imported. In Plan 9, every named operating-system resource -- including processes, network connections, devices, and the window system -- surfaces as a path served over 9P. The single hierarchical namespace was the central claim. Plan 9 never reached commercial scale, but its design idea reached production in three places: NT (1993, via Cutler), Linux's /proc, /sys, and FUSE (the 1990s onward), and the various capability-OS research projects (KeyKOS, EROS, seL4) that took the lessons in a different direction.

| Primitive | Granularity | Enforcement point | Structural / opt-in | Bypass by privilege | Inheritance gap |
|---|---|---|---|---|---|
| Per-Session (NT) | Logon session | `ObpLookupObjectName` + DACL | Structural | `SeDebugPrivilege` short-circuit | Inherited handles cross sessions |
| AppContainer Lowbox (NT) | Package SID | `ObpLookupObjectName` rewrite | Structural | TCB privileges only | Brokered handles enter |
| Server Silo (NT) | Container | Process->Silo indirection | Structural | KMCS-signed driver | Host handles cross silos |
| VBS / IUM Trustlet (NT) | Trust level (VTL) | Hypervisor | Structural | Hypervisor compromise | Cross-VTL ALPC only |
| Mandatory Integrity Control (NT) | IL band | `SeAccessCheckByType` | Opt-in (per-object SACL) | `SeRelabelPrivilege` | Inherited handles bypass |
| `ObRegisterCallbacks` (NT) | Per-type, per-driver | Object Manager pre-op callback | Mediation, not partition | KMCS-signed driver | Inheritance bypasses callback |
| Private Namespace (NT) | Boundary SID-list | `NtCreatePrivateNamespace` | Structural | All SIDs in caller's token | Boundary-keyed |
| Linux Namespace | Per-resource clone | `setns`/`unshare`/`clone` | Structural | `CAP_SYS_ADMIN` | Fork inherits namespace set |
| Mach Port Right | Per-task | Capability check on send | Structural (capabilities) | `host_priv` / kernel | Inherited rights on fork |

<Aside label="Why 'filesystem-shaped' is a metaphor">
The Object Manager namespace is not a filesystem. There is no disk persistence, no journal, no FAT or MFT, no inode allocator, no per-file DACL in the filesystem sense. Nothing under `\` survives a reboot. Files-on-disk, registry-keys-in-a-hive, and named pipes are leaves in the OM tree, but the actual filesystem implementation lives in NTFS / ReFS / ExFAT drivers reached through the `Device` type's parse procedure.

What the OM namespace *shares* with filesystems is exactly three things: the path-walk algorithm (left-to-right, component-by-component, with one hash-table lookup per component), the per-directory hash table (analogous to the directory-entry hash filesystems use), and the per-object security descriptor (which the SRM enforces at the same point a filesystem would enforce its DACL).

When you read or write the phrase "Object Manager namespace," the metaphor that is doing real work is "in-memory directory tree the kernel uses to find named objects," not "filesystem in the disk-format sense."
</Aside>

<Aside label="Restricted tokens and the Chromium four-layer composition">
The Windows 2000-era `CreateRestrictedToken` primitive was the wrong layer in 2000 as a standalone sandboxing mechanism -- it could not partition the namespace; it only filtered the caller's SID set against per-object DACLs. Chromium revived it in 2008 as one of four cooperating layers, and that pattern is the canonical 2026 production sandbox shape. The Chromium design document captures the constraints: "The Windows sandbox is a user-mode only sandbox. There are no special kernel mode drivers... The sandbox is provided as a static library that must be linked to both the broker and the target executables" (Chromium Sandbox Design [@chromium-sandbox-md], FAQ [@chromium-sandbox-faq]).

The four layers compose pairwise-orthogonally. The token gates *which DACLs* the renderer can satisfy at `SeAccessCheck` time; the job object gates *which kernel API surface* the renderer can call (UI exceptions, process creation, etc.); the integrity level gates *which writes* the renderer can perform across MIC label boundaries; the AppContainer lowbox-rewrites *every named-object lookup* into the per-package directory inside `ObpLookupObjectName`. A handle that survives all four checks is the only object the renderer can usefully touch. The load-bearing header is `sandbox_policy.h`, which declares `TargetConfig::SetTokenLevel(TokenLevel initial, TokenLevel lockdown)`, `SetJobLevel`, `SetIntegrityLevel`, `SetDelayedIntegrityLevel`, and `SetAppContainerSid`, with one verbatim mutual-exclusion note: "Using an initial token is not compatible with AppContainer" [@chromium-sandbox-policy-h].

This is the 2026 production sandbox shape every Chromium-based browser inherits (Edge, Chrome, Brave, Vivaldi, Opera), as do Electron-based apps like Visual Studio Code's renderer processes.
</Aside>

<Aside label="The Pass-the-Challenge limit">
The cross-VTL ALPC ports through which a VTL0 process talks to a VTL1 trustlet are still located in VTL0's `\RPC Control`. An attacker who controls VTL0 can *send* messages to LsaIso even though they cannot *read* LsaIso's internal state. Oliver Lyak's December 2022 *Pass-the-Challenge* result is the canonical worked example ([GitHub: ly4k/PassTheChallenge](https://github.com/ly4k/PassTheChallenge)): the trustlet's pages are never read, but the trustlet's RPC output exfiltrates the secret. The lesson is that VTL1 isolation is a *page-level* read barrier, not a *protocol-level* containment property. The VBS Trustlets piece in this corpus carries the deeper walkthrough.
</Aside>

Windows bet on one tree; Linux bet on eight clone-flag dimensions; Darwin bet on capability-style port-right tables. Each bet has theoretical limits. What are they?

## 8. What the namespace cannot do

The frame for this section comes from James P. Anderson's 1972 USAF technical report *Computer Security Technology Planning Study* (ESD-TR-73-51), Section 4.1.1. Anderson is the named originator of the reference-monitor concept and of the four properties such a monitor must satisfy. Wikipedia preserves the modern acronym verbatim: the reference-validation mechanism must be "**N**on-bypassable... **E**valuable... **A**lways invoked... **T**amper-proof," and "according to Ross Anderson, the reference monitor concept was introduced by James Anderson in an influential 1972 paper" [@wikipedia-reference-monitor]. The NIST CSRC mirror hosts the original PDF [@csrc-nist-ande72].

Saltzer and Schroeder's 1975 paper *The Protection of Information in Computer Systems* [@cs-virginia-saltzer-schroeder] added the *complete-mediation principle* -- "every access to every object must be checked for authority" -- and seven other design principles the reference-validation mechanism must satisfy (economy of mechanism, fail-safe defaults, open design, separation of privilege, least privilege, least common mechanism, psychological acceptability).

Map the Windows Object Manager against the four NEAT properties and the answer is uncomfortable. The namespace partially achieves two (Always-invoked and Tamper-proof), fails Non-bypassable outright, and falls one to two orders of magnitude short of Evaluable.

### 8.1 Always-invoked: provably gapped

The namespace achieves always-invoked for *name-based opens*. Every `Nt*OpenObject*` syscall walks `ObpLookupObjectName`; there is no path that returns a handle to a named object without going through the lookup. But the namespace cannot achieve always-invoked for *handle inheritance*. A child process inherits handles from `CreateProcess(bInheritHandles=TRUE)` without going through the OM at all. The handles already exist in the parent's `HANDLE_TABLE`; the kernel walks the parent's table, duplicates the entries into the child's table, and the child has live access. No name-lookup, no `ObRegisterCallbacks` callback, no SRM check. As long as the OS API exposes handle inheritance -- and it is too deeply embedded in 33 years of shipping Windows code to remove -- the Object Manager cannot be the *sole* reference monitor.

### 8.2 Tamper-proof: bounded, not absolute

The Object Manager runs in ring 0, under Kernel-Mode Code Signing (KMCS), and -- on machines with Virtualization-Based Security and Hypervisor-protected Code Integrity (HVCI) enabled -- inside a Hyper-V-enforced code-integrity policy. Any kernel-mode adversary who can load a driver bypasses the OM. KMCS and HVCI raise the cost; they do not eliminate the surface. The Bring-Your-Own-Vulnerable-Driver class of attacks (signed but exploitable drivers) is the running residual class, and the historical pattern is that one or two new vulnerable signed drivers surface every quarter.

### 8.3 Evaluable: provably above threshold

A small enough TCB can be machine-verified. The seL4 microkernel is the canonical demonstration: roughly 9,000 lines of C verified end-to-end against a formal specification (~11 person-years for initial functional correctness per Klein et al. SOSP 2009, and approximately 25 person-years for the full suite of subsequent proofs including information-flow and binary verification) [@sel4-project]. The Object Manager subsystem, the Security Reference Monitor, and the parse procedures the Object Manager delegates to (file-system drivers via `IopParseDevice`; the registry via `CmpParseKey`; ALPC; the I/O manager itself) collectively comprise tens of thousands of lines of C, putting the TCB for "open a named object" at one to two orders of magnitude above the verification threshold any current proof system can handle. The Object Manager is *not* evaluable in the formal sense Anderson required.

### 8.4 Non-bypassable: the privilege short-circuit

A process holding `SeDebugPrivilege` (or any privilege that grants `PROCESS_VM_*` rights) can short-circuit per-directory ACLs. The privilege evaluation happens at `SeAccessCheck` time, *after* `ObpLookupObjectName` has resolved the name. The Object Manager will resolve any path the privileged caller asks for; the gate fires, but it lets the call through. The namespace cannot defend against the holder of `SeDebugPrivilege`. This is by design -- you want a debugger to be able to attach to anything -- but it is also the structural reason why "lock down the namespace" is not by itself a containment story.

### 8.5 What else the namespace cannot do

It cannot prevent in-process memory disclosure -- the Pass-the-Challenge limit covered in the Section 7 aside. It cannot defend against a malicious driver -- KMCS, HVCI, and WDAC gate driver load; the namespace itself trusts already-loaded drivers. It cannot eliminate time-of-check / time-of-use racing during a path walk; the walker walks components one at a time, and any reentrant call into the walker is a TOCTOU surface. The mitigation is per-call -- callers pass `OBJ_DONT_REPARSE` on object-attributes, `FILE_FLAG_OPEN_REPARSE_POINT` on file opens, or otherwise instruct the path-walker to refuse symbolic-link substitution -- not a structural property of the namespace.

### 8.6 The honest accounting

The Object Manager namespace is a *coordination* mechanism, not a *containment* mechanism. Containment is in the layers above: the session ID, the package SID, the integrity level, the silo ID, the VTL split. The namespace's job is to make those layers *enforceable* by partitioning the path space so the bad open *cannot resolve to the privileged object's name*. The layers above decide which partition the caller is in; the namespace's only job is "given a path and a caller, find the object." Anderson 1972 names the *kernel mechanism* (the reference-validation mechanism with NEAT properties); Saltzer-Schroeder 1975 names the *design principles* the mechanism must satisfy. The Object Manager is the Windows realisation; it inherits both the strengths and the limits.

<PullQuote>
The namespace is a coordination mechanism, not a containment mechanism. The containment is in the layers above.
</PullQuote>

> **Key idea:** The Object Manager is the coordination layer; the containment is in the partition primitives stacked on top (session ID, package SID, integrity level, silo ID, VTL). The namespace's only job is "given a path and a caller, find the object." Every Windows security boundary is a parameter to that one job: a per-directory ACL, a token-keyed name rewrite, or a kernel callback registered against an `OBJECT_TYPE`.

The provable gaps are real. What is the active research direction in 2026 -- where do attackers and defenders actually meet inside the namespace today?

## 9. Open problems in 2026

Five open problems sit in active research as of 2026.

### 9.1 Hash-bucket collision pressure

The 37-bucket constant has not changed since 1993. On a 2026 Windows 11 25H2 machine with several hundred MSIX packages, each owning an `\AppContainerNamedObjects\<package-sid>\` subtree, average chain lengths inside `\Sessions\1\AppContainerNamedObjects` exceed two and routinely run higher under load. The structural impact is small per-lookup (O(chain length) at each component), but it compounds across deep path walks and across the per-VM hot loops in `ObpLookupObjectName`. Microsoft has not committed to a larger table or a different structure; the constant remains.

### 9.2 Cross-AppContainer object-directory privacy

Per-AppContainer isolation is the AppContainer model's promise; residual cross-package reads erode it. Forshaw's Project Zero work between 2017 and 2020 documents specific classes; Windows 11 25H2 DACLs are tighter than Windows 10 RTM, but the impersonation-mediated cases survive. The HackSys / CVE-2023-35359 family covered in Section 4.5 is the current realisation of the cross-AppContainer-plus-impersonation surface, and the same broader resource-planting taxonomy Forshaw described in the 2017 Named Pipe Secure Prefixes post [@tiraniddo-named-pipe-secure-prefixes] is still rediscovered every year.

### 9.3 Silo-escape via routines that ignore silo attachment

*Siloscape* (June 7, 2021) showed that `NtSetInformationSymbolicLink` could retarget a silo-scoped symbolic link at a host-scoped path. Microsoft patched the specific function; the *class* -- kernel routines whose path resolution does not honour `Process->Silo->RootDirectory` -- remains open. Microsoft's long-standing position is that Server Silo is not a security boundary; Hyper-V Container is the security-boundary product. Container runtimes that depend on Server Silo for tenant isolation are knowingly running outside the supported boundary.

### 9.4 ObRegisterCallbacks erosion under HVCI

`ObRegisterCallbacks` requires a KMCS-signed driver, and on HVCI-enabled machines the binary must additionally be HVCI-compatible. Microsoft has progressively raised the compatibility bar -- preventing unsigned drivers, banning common runtime-patching idioms, and tightening the W^X policy. EDR vendors depend on the surface staying open; if HVCI's compatibility bar ever excludes the EDR kernel driver pattern, the in-kernel callback layer is at risk. The CrowdStrike Falcon Sensor outage of July 2024 made the brittleness of in-kernel EDR a public conversation. Microsoft's *Defender for Endpoint* and *EDR-on-Linux eBPF* projects point at alternative-mediation futures, but in-kernel `ObRegisterCallbacks` is still the primary credential-theft sensor.

> **Note:** As attackers ship Hell's Gate / Halo's Gate / direct-syscall stubs to bypass userland EDR hooks, the kernel callback fires regardless. The arms race accordingly shifts to the *access-mask-strip vs. impersonate-trusted-parent-PID* layer inside the kernel callback itself, with both sides racing to define the right pre-operation policy for `lsass.exe` handle opens. Watch the Microsoft Security Response Center advisories and the EDR-vendor incident postmortems for the bleeding edge.

### 9.5 Public benchmark vacuum

No peer-reviewed benchmark compares per-call namespace-lookup cost across the Windows Object Manager, Linux namespaces, and Mach ports. Choice of namespace design at the OS level is a multi-decade commitment; the absence of an empirical comparison forces architecture decisions on theoretical-only grounds. The Linux Kernel Test Robot, the Phoronix Test Suite, and various academic systems-conference benchmarks measure adjacent properties (filesystem-call latency, system-call vector cost), but none publishes head-to-head numbers on the named-object-lookup hot path. This is an open invitation to systems researchers.

Five open problems is a research agenda, not a how-to. How do you actually look at this thing on your own machine?

## 10. Reading the namespace from a live system

Three tools cover the operational practice: Sysinternals WinObj, Forshaw's NtObjectManager PowerShell module, and WinDbg in kernel mode.

### 10.1 WinObj on a live system

Download `winobj.exe` from Sysinternals [@ms-winobj] and run it as administrator. The left pane is the directory tree; the right pane shows the children of the selected directory with their object types. Navigate to `\Sessions\1\BaseNamedObjects` and read off the named events and mutants every Win32 app in your interactive session has created. Navigate to `\Sessions\1\AppContainerNamedObjects` and pick an `S-1-15-2-...` directory; right-click, choose Properties, and read the security descriptor. You will see a single allow-ACE granting full access only to the package SID itself. That ACE is the entire AppContainer sandbox at the namespace layer.

> **Note:** WinObj cannot traverse `\ObjectTypes`, `\Security`, or `\Sessions\0\` without administrator rights. Without traversal, the enumerate fails silently and the tree looks empty. Always run elevated, and accept that the tool will show the kernel view, not a per-process view.

### 10.2 NtObjectManager PowerShell

`NtObjectManager` is Forshaw's PowerShell module that exposes the Object Manager namespace through cmdlets (PowerShell Gallery [@powershellgallery-ntobjectmanager]; GitHub [@p0-sandbox-attacksurface-analysis-tools]). Install with `Install-Module NtObjectManager`. Useful commands: `Get-ChildItem NtObject:\` walks the root; `Get-NtType` lists the registered `OBJECT_TYPE` singletons; `Get-NtObject \BaseNamedObjects` enumerates the global BNO; `Get-NtAlpcPort '\RPC Control'` lists every LRPC endpoint on the machine. The module wraps the same NTDLL syscalls WinObj uses, but in a scripting surface that composes into automation.

### 10.3 WinDbg kernel session

In a kernel-mode WinDbg session attached to a target machine (or to a live local kernel via Microsoft's local-kernel debug mode), `!object \` dumps the root directory and its children. `dt nt!_OBJECT_HEADER <addr>-30` reads the header preceding any object's body (the offset 0x30 is the size of `OBJECT_HEADER` on x64; subtract that from the body pointer to land on the header -- the field layout is documented in *Windows Internals 7th Edition* Chapter 8, Microsoft Press Store [@microsoftpressstore-wininternals7-part1]). `dx -r1 ((nt!_OBJECT_TYPE*)nt!PsProcessType[0]).TypeInfo` walks the Process type's method table and lists all eight procedure pointers and the WaitObjectFlagOffset, including the parse procedure.

### 10.4 The EDR primitive: an ObRegisterCallbacks driver template

The minimal sketch of an in-kernel EDR sensor is four steps. Register an `OB_CALLBACK_REGISTRATION` for `PsProcessType` with `OB_OPERATION_HANDLE_CREATE | OB_OPERATION_HANDLE_DUPLICATE` [@ms-obregistercallbacks]. In the pre-operation callback, examine `OperationInformation->Object`, derive the target process's PID, and compare it against `lsass.exe`. If it matches, strip credential-relevant access bits from `OperationInformation->Parameters->CreateHandleInformation.DesiredAccess` (or duplicate-handle equivalent). The kernel grants the handle with the reduced rights, the attacker's `PROCESS_VM_READ` is gone before the call returns, and the post-operation callback logs the attempt. The parallel API `PsSetCreateProcessNotifyRoutineEx` [@ms-pssetcreateprocessnotifyroutineex] covers process creation, which is the other half of the EDR sensor surface.

<Mermaid caption="An ObRegisterCallbacks pre-operation access-mask strip on PsProcessType when the target is lsass.exe">
sequenceDiagram
    participant A as Attacker process
    participant NT as nt!NtOpenProcess
    participant OM as Object Manager
    participant EDR as EDR Pre-Op Callback
    participant LSASS as lsass.exe (target)
    A->>NT: NtOpenProcess(lsass PID, PROCESS_VM_READ | PROCESS_QUERY_INFORMATION)
    NT->>OM: lookup PsProcessType, target by PID
    OM->>EDR: fire pre-op callback (handle create)
    EDR->>EDR: target == lsass.exe?
    EDR->>EDR: strip PROCESS_VM_READ from DesiredAccess
    EDR-->>OM: granted = PROCESS_QUERY_LIMITED_INFORMATION
    OM-->>NT: HANDLE with reduced access
    NT-->>A: open succeeded (but useless rights)
</Mermaid>

<RunnableCode lang="js" title="A toy access-mask strip on an attacker's NtOpenProcess against lsass">{`
const PROCESS_VM_READ                   = 0x0010;
const PROCESS_VM_WRITE                  = 0x0020;
const PROCESS_VM_OPERATION              = 0x0008;
const PROCESS_QUERY_INFORMATION         = 0x0400;
const PROCESS_QUERY_LIMITED_INFORMATION = 0x1000;
const PROCESS_CREATE_THREAD             = 0x0002;
const PROCESS_DUP_HANDLE                = 0x0040;

function stripForLsass(desired) {
  const STRIPPED =
      PROCESS_VM_READ |
      PROCESS_VM_WRITE |
      PROCESS_VM_OPERATION |
      PROCESS_CREATE_THREAD |
      PROCESS_DUP_HANDLE |
      PROCESS_QUERY_INFORMATION;
  return desired & ~STRIPPED;
}

const desired = PROCESS_VM_READ | PROCESS_QUERY_INFORMATION | PROCESS_DUP_HANDLE;
console.log('attacker asked for:', '0x' + desired.toString(16));
const granted = stripForLsass(desired) | PROCESS_QUERY_LIMITED_INFORMATION;
console.log('EDR pre-op granted:', '0x' + granted.toString(16));
`}</RunnableCode>

<Spoiler label="What this looks like in real driver code (skeleton)">
```c
OB_OPERATION_REGISTRATION op = {
    .ObjectType = PsProcessType,
    .Operations = OB_OPERATION_HANDLE_CREATE | OB_OPERATION_HANDLE_DUPLICATE,
    .PreOperation = MyPreOp,
    .PostOperation = MyPostOp,
};
OB_CALLBACK_REGISTRATION reg = {
    .Version = OB_FLT_REGISTRATION_VERSION,
    .OperationRegistrationCount = 1,
    .Altitude = RTL_CONSTANT_STRING(L"123456"),
    .OperationRegistration = &op,
};
ObRegisterCallbacks(&reg, &g_handle);
```
The driver must be KMCS-signed (`IMAGE_DLLCHARACTERISTICS_FORCE_INTEGRITY`) per the wdm.h documentation; an unsigned image returns `STATUS_ACCESS_DENIED` from `ObRegisterCallbacks`. Two drivers cannot pick the same Altitude; collisions return `STATUS_FLT_INSTANCE_ALTITUDE_COLLISION`.
</Spoiler>

You can now read the namespace, register an EDR-style callback, and dump the type registry. What are the questions readers ask after they finish reading?

## 11. Frequently asked questions

<FAQ title="Frequently asked questions">
<FAQItem question="Is the Object Manager namespace the same as the registry?">
No. The registry is a separate Windows Executive subsystem implemented in `nt!Cm*`, with its own hive on-disk format and its own in-memory hive structures. It hooks into the Object Manager namespace through one and only one mechanism: the `Key` `OBJECT_TYPE` registers a `ParseProcedure` (`CmpParseKey`) that takes over path walking when the namespace walker reaches `\REGISTRY`. The registry is therefore a *consumer* of the Object Manager, but not part of the Object Manager.
</FAQItem>

<FAQItem question="Why is \BaseNamedObjects not just \Sessions\1\BaseNamedObjects on Windows 11?">
Because `\BaseNamedObjects` is the *global* / `Global\`-prefixed-only view, distinct from the per-session BNO at `\Sessions\<n>\BaseNamedObjects`. The Win32 `Local\` prefix routes through `kernel32!BaseGetNamedObjectDirectory` into the per-session BNO; `Global\` routes into the global one [@ms-termserv-kernel-object-namespaces]. Cross-session named-object coordination still needs the global view; per-session isolation lives in the per-session subtree.
</FAQItem>

<FAQItem question="Why can a UWP app call CreateMutex('Global\\Foo') and not collide with another app?">
Because the lowbox token attached to the UWP app's process tells `ObpLookupObjectName` to rewrite the path to `\Sessions\<n>\AppContainerNamedObjects\<package-sid>\Global\Foo` before path walking. Two different UWP apps have two different package SIDs and therefore land on two different directories. The Win32 names look the same; the kernel resolves them to different objects.
</FAQItem>

<FAQItem question="What is the difference between \??\C: and \GLOBAL??\C:?">
`\??\C:` is the per-session DosDevices alias; if `C:` is not defined in the current session's `\??`, the walker falls through to `\GLOBAL??\C:`. `\GLOBAL??\C:` is the machine-wide DosDevices symbolic link to `\Device\HarddiskVolume*` -- the real on-disk volume object. The split matters because the per-session `\??` is where per-session drive-letter remappings (`net use X: \\server\share`, `subst Z: C:\foo`, `DefineDosDevice`) live, and the activation-context resolver class covered in Section 4.5 is the exploit family that lives at this boundary.
</FAQItem>

<FAQItem question="Why does WinObj need administrator rights?">
Several top-level directories have `Directory`-`TRAVERSE` ACLs that restrict to SYSTEM and the local Administrators group. Without traversal, the directory enumeration silently fails. `\ObjectTypes`, `\Security`, and `\Sessions\0\` are the directories users most often notice as "missing" when running unelevated.
</FAQItem>

<FAQItem question="How is \KnownDlls enforced?">
By DACL plus loader-side validation. The directory grants `Directory`-`READ` to everyone but `Directory`-`WRITE` only to SYSTEM and TrustedInstaller. The `Section` objects inside are Authenticode-signed by Microsoft and validated at boot by `smss.exe`. The historical `DefineDosDevice` + `\??` symlink-plant bypass class survived until Windows 10 21H2 build 19044.1826 (July 2022), when an NTDLL patch closed it [@itm4n-the-end-of-ppldump].
</FAQItem>

<FAQItem question="Are the EDR kernel callbacks documented?">
`ObRegisterCallbacks` [@ms-obregistercallbacks] and `PsSetCreateProcessNotifyRoutineEx` [@ms-pssetcreateprocessnotifyroutineex] are both fully documented. The HVCI compatibility requirements, the KMCS attestation flow, and the exact policy interactions with Defender for Endpoint's tamper-protection layer are partly implementation-defined; EDR vendor engineering teams maintain private regression suites against successive Windows feature updates.
</FAQItem>

<FAQItem question="When should I use CreatePrivateNamespace instead of \Global\ BNO plus a DACL?">
When two or more processes that don't share a session or package must coordinate over a securable directory keyed by a SID-list they agree on at design time. The boundary descriptor is the *agreement primitive*: the kernel requires every SID in the boundary to be in the caller's token. The namespace's `OBJECT_DIRECTORY` lives in `\BNOLINKS`, keyed by the alias-prefix string plus a hash of the boundary descriptor's SID-list (CreatePrivateNamespaceW [@ms-createprivatenamespacew]; Object Namespaces overview [@ms-object-namespaces]; native NtCreatePrivateNamespace [@ntdoc-ntcreateprivatenamespace] and OBJECT_BOUNDARY_DESCRIPTOR [@ntdoc-object-boundary-descriptor] signatures). From inside an AppContainer process the lookup is rewritten into the per-package subtree, so private namespaces are not a substitute for the `windows.applicationModel.*` brokered APIs when cross-package coordination is the goal.
</FAQItem>
</FAQ>

<Definition term="Boundary descriptor">
A user-mode structure produced by `CreateBoundaryDescriptor` and populated with `AddSIDToBoundaryDescriptor` (plus the optional `CREATE_BOUNDARY_DESCRIPTOR_ADD_APPCONTAINER_SID` flag). Conceptually the descriptor is a SID-list that the caller and every other participant must share via their tokens. Kernel-side the structure is `OBJECT_BOUNDARY_DESCRIPTOR` (Version, Items, TotalSize, Flags). `NtCreatePrivateNamespace` materialises a directory in `\BNOLINKS` keyed by the `lpAliasPrefix` plus a hash of the boundary descriptor's SIDs.
</Definition>

## 12. Coming back to the WinObj screen

Open WinObj one more time. Navigate back to `\Sessions\1\AppContainerNamedObjects` and pick the Edge renderer's `S-1-15-2-...` directory. You can now name everything you are looking at. The directory is an `_OBJECT_DIRECTORY` instance with 37 hash buckets. You reach it through a token-keyed rewrite that the kernel applies inside `ObpLookupObjectName` before path walking begins. Its security descriptor grants `GenericAll` only to the package SID. Every EDR loaded on this machine has registered an `ObRegisterCallbacks` filter on `PsProcessType`, watching for handle creations against `lsass.exe`. If you are running on a Server SKU with Windows Server Containers, the directory might also be silo-scoped, with `Process->Silo->RootDirectory` indirecting your view of the rest of `\`.

The four pieces of the 1993 Cutler design have shipped without architectural change for thirty-three years. The six generations of partition primitives stacked on top are all simultaneously load-bearing on Windows 11 25H2. The namespace itself is a coordination mechanism, in Anderson 1972's sense of the reference-validation mechanism, with Saltzer-Schroeder 1975's complete-mediation principle as the design constraint it must satisfy. Containment lives in the partition layers above it: the session, the package, the integrity level, the silo, and the VTL split. Every other article in this corpus -- the Credential Guard piece, the AppContainer piece, the VBS Trustlets piece, the Hyper-V piece, the App Identity piece, the TPM piece -- quietly assumes this tree underneath them.

> **Key idea:** Every Windows security boundary is a path rewrite, a per-directory ACL, a token-keyed name substitution, or a kernel callback against an `OBJECT_TYPE`. The Object Manager is the data structure underneath them all.

<StudyGuide>
**Key terms.** Object Manager (`Ob`), `OBJECT_HEADER`, `OBJECT_TYPE`, `ParseProcedure`, `OBJECT_DIRECTORY`, Lowbox token, AppContainer, Server Silo, Trustlet / IUM, Boundary descriptor, Session 0 isolation, Mandatory Integrity Control, `ObRegisterCallbacks`, KMCS, HVCI, `\BaseNamedObjects`, `\Sessions\<n>\AppContainerNamedObjects`, `\RPC Control`, `\KnownDlls`, `\BNOLINKS`, `\GLOBAL??`, `\??`.

**Review questions.**
1. Why does AppContainer isolation work even when the calling UWP app explicitly asks for `Global\X`?
2. What is the relationship between `IopParseDevice`, `\Device\HarddiskVolume1`, and `IRP_MJ_CREATE`?
3. Which of Anderson 1972's four NEAT properties does the Object Manager achieve cleanly, and which does it provably fail?
4. Why is `ObRegisterCallbacks` an enforcement gate only against handle creation and duplication, not against handle use?
5. Why does the canonical MS15-090 OM-symlink CVE point at CVE-2015-2428 [@nvd-cve-2015-2428] rather than CVE-2015-2528 or CVE-2015-1463?
6. What is the structural difference between `\??\C:` and `\GLOBAL??\C:`, and which one does the HackSys / CVE-2023-35359 worked example abuse?

**Recommended reading.** Russinovich, Ionescu, and Solomon, *Windows Internals, Part 1* (7th edition, Microsoft Press, 2017), Chapter 8 [@microsoftpressstore-wininternals7-part1]. James Forshaw, *Windows Security Internals* (No Starch Press, 2024), Chapter 8 [@nostarch-windows-security-internals]. Alex Ionescu, *Battle of SKM and IUM*, Black Hat USA 2015 [@ionescu-bh2015-pdf]. The Google Project Zero blog's symlink mitigations [@p0-symlink-mitigations], arbitrary directory creation [@p0-issue1550], and who contains the containers [@p0-who-contains-containers] posts. James P. Anderson, *Computer Security Technology Planning Study* [@csrc-nist-ande72].
</StudyGuide>
