Partially revert change from 2006-10-22. GetSecurityInfo messes up
user information on NT4. * sec_helper.cc (security_descriptor::malloc): Drop LocalAlloc considerations. (security_descriptor::realloc): Ditto. (security_descriptor::free): Ditto. * security.cc (get_reg_security): Reinstantiate. (get_nt_object_security): Revert to using NtQuerySecurityObject. * security.h (class security_descriptor): Drop type member. Accommodate throughout. (security_descriptor::size): Constify. (security_descriptor::copy): Ditto.
This commit is contained in:
parent
24fa638dbd
commit
97b09fe1c5
@ -1,3 +1,18 @@
|
|||||||
|
2006-12-20 Corinna Vinschen <corinna@vinschen.de>
|
||||||
|
|
||||||
|
Partially revert change from 2006-10-22. GetSecurityInfo messes up
|
||||||
|
user information on NT4.
|
||||||
|
* sec_helper.cc (security_descriptor::malloc): Drop LocalAlloc
|
||||||
|
considerations.
|
||||||
|
(security_descriptor::realloc): Ditto.
|
||||||
|
(security_descriptor::free): Ditto.
|
||||||
|
* security.cc (get_reg_security): Reinstantiate.
|
||||||
|
(get_nt_object_security): Revert to using NtQuerySecurityObject.
|
||||||
|
* security.h (class security_descriptor): Drop type member.
|
||||||
|
Accommodate throughout.
|
||||||
|
(security_descriptor::size): Constify.
|
||||||
|
(security_descriptor::copy): Ditto.
|
||||||
|
|
||||||
2006-12-18 Christopher Faylor <me@cgf.cx>
|
2006-12-18 Christopher Faylor <me@cgf.cx>
|
||||||
|
|
||||||
* pinfo.cc (set_myself): Use a more foolproof method for determining if
|
* pinfo.cc (set_myself): Use a more foolproof method for determining if
|
||||||
|
@ -266,10 +266,7 @@ security_descriptor::malloc (size_t nsize)
|
|||||||
{
|
{
|
||||||
free ();
|
free ();
|
||||||
if ((psd = (PSECURITY_DESCRIPTOR) ::malloc (nsize)))
|
if ((psd = (PSECURITY_DESCRIPTOR) ::malloc (nsize)))
|
||||||
{
|
sd_size = nsize;
|
||||||
sd_size = nsize;
|
|
||||||
type = malloced;
|
|
||||||
}
|
|
||||||
return psd;
|
return psd;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -278,23 +275,9 @@ security_descriptor::realloc (size_t nsize)
|
|||||||
{
|
{
|
||||||
PSECURITY_DESCRIPTOR tmp;
|
PSECURITY_DESCRIPTOR tmp;
|
||||||
|
|
||||||
if (type == malloced)
|
if (!(tmp = (PSECURITY_DESCRIPTOR) ::realloc (psd, nsize)))
|
||||||
{
|
return NULL;
|
||||||
if (!(tmp = (PSECURITY_DESCRIPTOR) ::realloc (psd, nsize)))
|
|
||||||
return NULL;
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
if (!(tmp = (PSECURITY_DESCRIPTOR) ::malloc (nsize)))
|
|
||||||
return NULL;
|
|
||||||
if (psd)
|
|
||||||
{
|
|
||||||
memcpy (tmp, psd, LocalSize (psd));
|
|
||||||
LocalFree (psd);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
sd_size = nsize;
|
sd_size = nsize;
|
||||||
type = malloced;
|
|
||||||
return psd = tmp;
|
return psd = tmp;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -302,15 +285,9 @@ void
|
|||||||
security_descriptor::free ()
|
security_descriptor::free ()
|
||||||
{
|
{
|
||||||
if (psd)
|
if (psd)
|
||||||
{
|
::free (psd);
|
||||||
if (type == local_alloced)
|
|
||||||
LocalFree (psd);
|
|
||||||
else
|
|
||||||
::free (psd);
|
|
||||||
}
|
|
||||||
psd = NULL;
|
psd = NULL;
|
||||||
sd_size = 0;
|
sd_size = 0;
|
||||||
type = local_alloced;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
#if 0 // unused
|
#if 0 // unused
|
||||||
|
@ -1426,21 +1426,76 @@ get_info_from_sd (PSECURITY_DESCRIPTOR psd, mode_t *attribute,
|
|||||||
(!acl_exists || !acl)?"NO ":"", *attribute, uid, gid);
|
(!acl_exists || !acl)?"NO ":"", *attribute, uid, gid);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static int
|
||||||
|
get_reg_security (HANDLE handle, security_descriptor &sd_ret)
|
||||||
|
{
|
||||||
|
LONG ret;
|
||||||
|
DWORD len = 0;
|
||||||
|
|
||||||
|
ret = RegGetKeySecurity ((HKEY) handle,
|
||||||
|
DACL_SECURITY_INFORMATION
|
||||||
|
| GROUP_SECURITY_INFORMATION
|
||||||
|
| OWNER_SECURITY_INFORMATION,
|
||||||
|
sd_ret, &len);
|
||||||
|
if (ret == ERROR_INSUFFICIENT_BUFFER)
|
||||||
|
{
|
||||||
|
if (!sd_ret.malloc (len))
|
||||||
|
set_errno (ENOMEM);
|
||||||
|
else
|
||||||
|
ret = RegGetKeySecurity ((HKEY) handle,
|
||||||
|
DACL_SECURITY_INFORMATION
|
||||||
|
| GROUP_SECURITY_INFORMATION
|
||||||
|
| OWNER_SECURITY_INFORMATION,
|
||||||
|
sd_ret, &len);
|
||||||
|
}
|
||||||
|
if (ret != ERROR_SUCCESS)
|
||||||
|
{
|
||||||
|
__seterrno ();
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
int
|
int
|
||||||
get_nt_object_security (HANDLE handle, SE_OBJECT_TYPE object_type,
|
get_nt_object_security (HANDLE handle, SE_OBJECT_TYPE object_type,
|
||||||
security_descriptor &sd_ret)
|
security_descriptor &sd_ret)
|
||||||
{
|
{
|
||||||
sd_ret.free ();
|
NTSTATUS ret;
|
||||||
/* Don't use NtQuerySecurityObject. It doesn't recognize predefined
|
ULONG len = 0;
|
||||||
registry keys. */
|
|
||||||
DWORD ret = GetSecurityInfo (handle, object_type,
|
/* Do not try to use GetSecurityInfo (again), unless we drop NT4 support.
|
||||||
DACL_SECURITY_INFORMATION
|
GetSecurityInfo returns the wrong user information when running in
|
||||||
| GROUP_SECURITY_INFORMATION
|
a user session using a token created with NtCreateToken under NT4.
|
||||||
| OWNER_SECURITY_INFORMATION,
|
Works fine in 2K and above, but that doesn't help a lot. */
|
||||||
NULL, NULL, NULL, NULL, sd_ret);
|
|
||||||
if (ret != ERROR_SUCCESS)
|
/* Unfortunately, NtQuerySecurityObject doesn't work on predefined registry
|
||||||
|
keys like HKEY_LOCAL_MACHINE. It fails with "Invalid Handle". So we
|
||||||
|
have to retreat to the Win32 registry functions for registry keys.
|
||||||
|
What bugs me is that RegGetKeySecurity is obviously just a wrapper
|
||||||
|
around NtQuerySecurityObject, but there seems to be no function to
|
||||||
|
convert pseudo HKEY values to real handles. */
|
||||||
|
if (object_type == SE_REGISTRY_KEY)
|
||||||
|
return get_reg_security (handle, sd_ret);
|
||||||
|
|
||||||
|
ret = NtQuerySecurityObject (handle,
|
||||||
|
DACL_SECURITY_INFORMATION
|
||||||
|
| GROUP_SECURITY_INFORMATION
|
||||||
|
| OWNER_SECURITY_INFORMATION,
|
||||||
|
sd_ret, len, &len);
|
||||||
|
if (ret == STATUS_BUFFER_TOO_SMALL)
|
||||||
{
|
{
|
||||||
__seterrno_from_win_error (ret);
|
if (!sd_ret.malloc (len))
|
||||||
|
set_errno (ENOMEM);
|
||||||
|
else
|
||||||
|
ret = NtQuerySecurityObject (handle,
|
||||||
|
DACL_SECURITY_INFORMATION
|
||||||
|
| GROUP_SECURITY_INFORMATION
|
||||||
|
| OWNER_SECURITY_INFORMATION,
|
||||||
|
sd_ret, len, &len);
|
||||||
|
}
|
||||||
|
if (ret != STATUS_SUCCESS)
|
||||||
|
{
|
||||||
|
__seterrno_from_nt_status (ret);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
return 0;
|
return 0;
|
||||||
|
@ -216,21 +216,16 @@ class security_descriptor {
|
|||||||
protected:
|
protected:
|
||||||
PSECURITY_DESCRIPTOR psd;
|
PSECURITY_DESCRIPTOR psd;
|
||||||
DWORD sd_size;
|
DWORD sd_size;
|
||||||
enum { local_alloced, malloced } type;
|
|
||||||
public:
|
public:
|
||||||
security_descriptor () : psd (NULL), sd_size (0), type (local_alloced) {}
|
security_descriptor () : psd (NULL), sd_size (0) {}
|
||||||
~security_descriptor () { free (); }
|
~security_descriptor () { free (); }
|
||||||
|
|
||||||
PSECURITY_DESCRIPTOR malloc (size_t nsize);
|
PSECURITY_DESCRIPTOR malloc (size_t nsize);
|
||||||
PSECURITY_DESCRIPTOR realloc (size_t nsize);
|
PSECURITY_DESCRIPTOR realloc (size_t nsize);
|
||||||
void free ();
|
void free ();
|
||||||
|
|
||||||
inline DWORD size () {
|
inline DWORD size () const { return sd_size; }
|
||||||
if (!sd_size && psd && type == local_alloced)
|
inline DWORD copy (void *buf, DWORD buf_size) const {
|
||||||
sd_size = LocalSize (psd);
|
|
||||||
return sd_size;
|
|
||||||
}
|
|
||||||
inline DWORD copy (void *buf, DWORD buf_size) {
|
|
||||||
if (buf_size < size ())
|
if (buf_size < size ())
|
||||||
return sd_size;
|
return sd_size;
|
||||||
memcpy (buf, psd, sd_size);
|
memcpy (buf, psd, sd_size);
|
||||||
|
Loading…
x
Reference in New Issue
Block a user