00001
00002
00003
00004
00005
00006
00007
00008
00009
00010
00011
00012
00013
00014
00015
00016
00017
00018
00019
00020
00021
00022
00023
00024
00025
00026
#include "tokenp.h"
00027
00028
#ifdef ALLOC_PRAGMA
00029
#pragma alloc_text(PAGE,SeCreateAccessState)
00030
#pragma alloc_text(PAGE,SeDeleteAccessState)
00031
#pragma alloc_text(PAGE,SeAppendPrivileges)
00032
#pragma alloc_text(PAGE,SepConcatenatePrivileges)
00033
#endif
00034
00035
00036
00037
00038
00039
00040 #define GENERIC_ACCESS (GENERIC_READ | GENERIC_WRITE | GENERIC_EXECUTE | GENERIC_ALL)
00041
00042
00043
00044
00045
00046
00047
00048
00049 #define SEP_PRIVILEGE_SET_HEADER_SIZE \
00050
((ULONG)sizeof(PRIVILEGE_SET) - \
00051
(ANYSIZE_ARRAY * (ULONG)sizeof(LUID_AND_ATTRIBUTES)))
00052
00053
00054
00055
00056
00057
#if 0
00058
NTSTATUS
00059
SeCreateAccessState(
00060 IN
PACCESS_STATE AccessState,
00061 IN ACCESS_MASK DesiredAccess,
00062 IN PGENERIC_MAPPING GenericMapping OPTIONAL
00063 )
00064
00065
00066
00067
00068
00069
00070
00071
00072
00073
00074
00075
00076
00077
00078
00079
00080
00081
00082
00083
00084
00085
00086
00087
00088
00089
00090
00091
00092
00093
00094
00095
00096
00097
00098
00099
00100
00101
00102
00103
00104
00105
00106 {
00107
00108 ACCESS_MASK MappedAccessMask;
00109 PSECURITY_DESCRIPTOR InputSecurityDescriptor =
NULL;
00110
PAUX_ACCESS_DATA AuxData;
00111
00112
PAGED_CODE();
00113
00114
00115
00116
00117
00118 MappedAccessMask = DesiredAccess;
00119
00120
00121
00122
00123
00124
00125
if ( ((DesiredAccess &
GENERIC_ACCESS) != 0) &&
00126 ARGUMENT_PRESENT(GenericMapping) ) {
00127
00128
RtlMapGenericMask(
00129 &MappedAccessMask,
00130 GenericMapping
00131 );
00132 }
00133
00134 RtlZeroMemory(AccessState,
sizeof(
ACCESS_STATE));
00135
00136
00137
00138
00139
00140
ASSERT( AccessState->SecurityDescriptor ==
NULL );
00141
ASSERT( AccessState->PrivilegesAllocated ==
FALSE );
00142
00143 AccessState->AuxData =
ExAllocatePool(
PagedPool,
sizeof(
AUX_ACCESS_DATA ));
00144
00145
if (AccessState->AuxData ==
NULL) {
00146
return( STATUS_NO_MEMORY );
00147 }
00148
00149 AuxData = (
PAUX_ACCESS_DATA)AccessState->AuxData;
00150
00151
SeCaptureSubjectContext(&AccessState->SubjectSecurityContext);
00152
00153
if (((
PTOKEN)
EffectiveToken( &AccessState->SubjectSecurityContext ))->TokenFlags &
TOKEN_HAS_TRAVERSE_PRIVILEGE ) {
00154 AccessState->Flags =
TOKEN_HAS_TRAVERSE_PRIVILEGE;
00155 }
00156
00157
if (
SeTokenIsRestricted(
EffectiveToken( &AccessState-SubjectSecurityContext))) {
00158 AccessState->Flags |=
TOKEN_IS_RESTRICTED;
00159 }
00160
00161 AccessState->RemainingDesiredAccess = MappedAccessMask;
00162 AccessState->OriginalDesiredAccess = DesiredAccess;
00163 AuxData->
PrivilegesUsed = (PPRIVILEGE_SET)((PUCHAR)AccessState +
00164 (FIELD_OFFSET(
ACCESS_STATE, Privileges)));
00165
00166
ExAllocateLocallyUniqueId(&AccessState->OperationID);
00167
00168
if (ARGUMENT_PRESENT(GenericMapping)) {
00169 AuxData->
GenericMapping = *GenericMapping;
00170 }
00171
00172
return( STATUS_SUCCESS );
00173
00174 }
00175
00176
#endif
00177
00178
00179
NTSTATUS
00180 SeCreateAccessState(
00181 IN
PACCESS_STATE AccessState,
00182 IN
PAUX_ACCESS_DATA AuxData,
00183 IN ACCESS_MASK DesiredAccess,
00184 IN PGENERIC_MAPPING GenericMapping OPTIONAL
00185 )
00186
00187
00188
00189
00190
00191
00192
00193
00194
00195
00196
00197
00198
00199
00200
00201
00202
00203
00204
00205
00206
00207
00208
00209
00210
00211
00212
00213
00214
00215
00216
00217
00218
00219
00220
00221
00222
00223
00224
00225
00226
00227
00228
00229
00230
00231 {
00232
00233 ACCESS_MASK MappedAccessMask;
00234 PSECURITY_DESCRIPTOR InputSecurityDescriptor =
NULL;
00235
00236
PAGED_CODE();
00237
00238
00239
00240
00241
00242 MappedAccessMask = DesiredAccess;
00243
00244
00245
00246
00247
00248
00249
if ( ((DesiredAccess &
GENERIC_ACCESS) != 0) &&
00250 ARGUMENT_PRESENT(GenericMapping) ) {
00251
00252
RtlMapGenericMask(
00253 &MappedAccessMask,
00254 GenericMapping
00255 );
00256 }
00257
00258 RtlZeroMemory(AccessState,
sizeof(
ACCESS_STATE));
00259
00260
00261
00262
00263
00264
ASSERT( AccessState->SecurityDescriptor ==
NULL );
00265
ASSERT( AccessState->PrivilegesAllocated ==
FALSE );
00266
00267 AccessState->AuxData = AuxData;
00268
00269
SeCaptureSubjectContext(&AccessState->SubjectSecurityContext);
00270
00271
if (((
PTOKEN)
EffectiveToken( &AccessState->SubjectSecurityContext ))->TokenFlags &
TOKEN_HAS_TRAVERSE_PRIVILEGE ) {
00272 AccessState->Flags =
TOKEN_HAS_TRAVERSE_PRIVILEGE;
00273 }
00274
00275 AccessState->RemainingDesiredAccess = MappedAccessMask;
00276 AccessState->OriginalDesiredAccess = MappedAccessMask;
00277 AuxData->PrivilegesUsed = (PPRIVILEGE_SET)((ULONG_PTR)AccessState +
00278 (FIELD_OFFSET(
ACCESS_STATE, Privileges)));
00279
00280
ExAllocateLocallyUniqueId(&AccessState->OperationID);
00281
00282
if (ARGUMENT_PRESENT(GenericMapping)) {
00283 AuxData->GenericMapping = *GenericMapping;
00284 }
00285
00286
return( STATUS_SUCCESS );
00287
00288 }
00289
00290
00291
#if 0
00292
00293
00294
VOID
00295
SeDeleteAccessState(
00296
PACCESS_STATE AccessState
00297 )
00298
00299
00300
00301
00302
00303
00304
00305
00306
00307
00308
00309
00310
00311
00312
00313
00314
00315
00316
00317
00318 {
00319
PAUX_ACCESS_DATA AuxData;
00320
00321
PAGED_CODE();
00322
00323 AuxData = (
PAUX_ACCESS_DATA)AccessState->
AuxData;
00324
00325
if (AccessState->
PrivilegesAllocated) {
00326
ExFreePool( (PVOID)AuxData->
PrivilegesUsed );
00327 }
00328
00329
if (AccessState->
ObjectName.Buffer !=
NULL) {
00330
ExFreePool(AccessState->
ObjectName.Buffer);
00331 }
00332
00333
if (AccessState->
ObjectTypeName.Buffer !=
NULL) {
00334
ExFreePool(AccessState->
ObjectTypeName.Buffer);
00335 }
00336
00337
ExFreePool( AuxData );
00338
00339
SeReleaseSubjectContext(&AccessState->
SubjectSecurityContext);
00340
00341
return;
00342 }
00343
00344
00345
#endif
00346
00347
VOID
00348 SeDeleteAccessState(
00349
PACCESS_STATE AccessState
00350 )
00351
00352
00353
00354
00355
00356
00357
00358
00359
00360
00361
00362
00363
00364
00365
00366
00367
00368
00369
00370
00371 {
00372
PAUX_ACCESS_DATA AuxData;
00373
00374
PAGED_CODE();
00375
00376 AuxData = (
PAUX_ACCESS_DATA)AccessState->
AuxData;
00377
00378
if (AccessState->
PrivilegesAllocated) {
00379
ExFreePool( (PVOID)AuxData->
PrivilegesUsed );
00380 }
00381
00382
if (AccessState->
ObjectName.Buffer !=
NULL) {
00383
ExFreePool(AccessState->
ObjectName.Buffer);
00384 }
00385
00386
if (AccessState->
ObjectTypeName.Buffer !=
NULL) {
00387
ExFreePool(AccessState->
ObjectTypeName.Buffer);
00388 }
00389
00390
SeReleaseSubjectContext(&AccessState->
SubjectSecurityContext);
00391
00392
return;
00393 }
00394
00395
VOID
00396 SeSetAccessStateGenericMapping (
00397
PACCESS_STATE AccessState,
00398 PGENERIC_MAPPING GenericMapping
00399 )
00400
00401
00402
00403
00404
00405
00406
00407
00408
00409
00410
00411
00412
00413
00414
00415
00416
00417
00418
00419 {
00420
PAUX_ACCESS_DATA AuxData;
00421
00422
PAGED_CODE();
00423
00424 AuxData = (
PAUX_ACCESS_DATA)AccessState->
AuxData;
00425
00426 AuxData->
GenericMapping = *GenericMapping;
00427
00428
return;
00429 }
00430
00431
00432
00433
NTSTATUS
00434 SeAppendPrivileges(
00435
PACCESS_STATE AccessState,
00436 PPRIVILEGE_SET Privileges
00437 )
00438
00439
00440
00441
00442
00443
00444
00445
00446
00447
00448
00449
00450
00451
00452
00453
00454
00455
00456
00457
00458
00459
00460
00461
00462
00463
00464
00465
00466 {
00467 ULONG NewPrivilegeSetSize;
00468 PPRIVILEGE_SET NewPrivilegeSet;
00469
PAUX_ACCESS_DATA AuxData;
00470
00471
PAGED_CODE();
00472
00473 AuxData = (
PAUX_ACCESS_DATA)AccessState->
AuxData;
00474
00475
if (Privileges->PrivilegeCount + AuxData->
PrivilegesUsed->PrivilegeCount >
00476
INITIAL_PRIVILEGE_COUNT) {
00477
00478
00479
00480
00481
00482 NewPrivilegeSetSize =
SepPrivilegeSetSize( Privileges ) +
00483
SepPrivilegeSetSize( AuxData->
PrivilegesUsed );
00484
00485 NewPrivilegeSet =
ExAllocatePoolWithTag(
PagedPool, NewPrivilegeSetSize, 'rPeS' );
00486
00487
if (NewPrivilegeSet ==
NULL) {
00488
return( STATUS_INSUFFICIENT_RESOURCES );
00489 }
00490
00491
00492 RtlCopyMemory(
00493 NewPrivilegeSet,
00494 AuxData->
PrivilegesUsed,
00495
SepPrivilegeSetSize( AuxData->
PrivilegesUsed )
00496 );
00497
00498
00499
00500
00501
00502
00503
SepConcatenatePrivileges(
00504 NewPrivilegeSet,
00505 NewPrivilegeSetSize,
00506 Privileges
00507 );
00508
00509
if (AccessState->
PrivilegesAllocated) {
00510
ExFreePool( AuxData->
PrivilegesUsed );
00511 }
00512
00513 AuxData->
PrivilegesUsed = NewPrivilegeSet;
00514
00515
00516
00517
00518
00519
00520 AccessState->
PrivilegesAllocated =
TRUE;
00521
00522 }
else {
00523
00524
00525
00526
00527
00528
00529
SepConcatenatePrivileges(
00530 AuxData->
PrivilegesUsed,
00531
sizeof(
INITIAL_PRIVILEGE_SET),
00532 Privileges
00533 );
00534
00535 }
00536
00537
return( STATUS_SUCCESS );
00538
00539 }
00540
00541
00542
VOID
00543 SepConcatenatePrivileges(
00544 IN PPRIVILEGE_SET TargetPrivilegeSet,
00545 IN ULONG TargetBufferSize,
00546 IN PPRIVILEGE_SET SourcePrivilegeSet
00547 )
00548
00549
00550
00551
00552
00553
00554
00555
00556
00557
00558
00559
00560
00561
00562
00563
00564
00565
00566
00567
00568
00569
00570
00571
00572
00573
00574
00575
00576 {
00577 PVOID Base;
00578 PVOID Source;
00579 ULONG Length;
00580
00581
PAGED_CODE();
00582
00583
ASSERT( ((ULONG)
SepPrivilegeSetSize( TargetPrivilegeSet ) +
00584 (ULONG)
SepPrivilegeSetSize( SourcePrivilegeSet ) -
00585
SEP_PRIVILEGE_SET_HEADER_SIZE ) <=
00586 TargetBufferSize
00587 );
00588
00589 Base = (PVOID)((ULONG_PTR)TargetPrivilegeSet +
SepPrivilegeSetSize( TargetPrivilegeSet ));
00590
00591 Source = (PVOID) ((ULONG_PTR)SourcePrivilegeSet +
SEP_PRIVILEGE_SET_HEADER_SIZE);
00592
00593 Length = SourcePrivilegeSet->PrivilegeCount *
sizeof(LUID_AND_ATTRIBUTES);
00594
00595 RtlMoveMemory(
00596 Base,
00597 Source,
00598 Length
00599 );
00600
00601 TargetPrivilegeSet->PrivilegeCount += SourcePrivilegeSet->PrivilegeCount;
00602
00603 }