|
|
/*++
Copyright (c) 1989 Microsoft Corporation
Module Name:
srvhandl.c
Abstract:
This module implements all file descriptor oriented APIs.
Author:
Mark Lucovsky (markl) 30-Mar-1989 Ellen Aycock-Wright (ellena) Nov-1990
Revision History:
--*/
#include <sys/stat.h>
#include "psxsrv.h"
#define NTPSX_ONLY
#include "sesport.h"
void FindOwnerModeFile( IN HANDLE FileHandle, OUT struct stat *StatBuf );
PSID GetLoginGroupSid( IN PPSX_PROCESS p );
static PVOID pvInitSDMem[10];
ULONG OflagToDesiredAccess[8] = { FILE_READ_DATA, FILE_WRITE_DATA, FILE_READ_DATA | FILE_WRITE_DATA, 0, 0, 0, 0, 0 };
PSID MakeSid(); static BOOLEAN IsUserInGroup( PPSX_PROCESS p, PSID Group );
BOOLEAN Open( PPSX_PROCESS p, PPSX_API_MSG m, PUNICODE_STRING Path, ULONG, mode_t, PULONG pRetVal, PULONG Error );
BOOLEAN PsxOpen( IN PPSX_PROCESS p, IN OUT PPSX_API_MSG m )
/*++
Routine Description:
This procedure implements POSIX Open.
Arguments:
p - Supplies the address of the process making the call.
m - Supplies the address of the message associated with the open request.
Return Value:
TRUE - The contents of *m should be used to generate a reply.
--*/
{ PPSX_OPEN_MSG args; NTSTATUS Status; BOOLEAN r;
args = &m->u.Open;
//
// Check validity of pathname pointer
//
if (!ISPOINTERVALID_CLIENT(p, args->Path_U.Buffer, args->Path_U.Length)) {
KdPrint(("Invalid pointer to open: 0x%x\n", args->Path_U.Buffer)); m->Error = EINVAL; return TRUE; }
Status = NtImpersonateClientOfPort(p->ClientPort, (PPORT_MESSAGE)m);
if (!NT_SUCCESS(Status)) { m->Error = PsxStatusToErrno(Status); return TRUE; }
r = Open(p, m, &args->Path_U, args->Flags, args->Mode, &m->ReturnValue, &m->Error);
EndImpersonation();
return r; }
//
// Internal support routine
//
BOOLEAN Open( IN PPSX_PROCESS p, IN PPSX_API_MSG m, IN PUNICODE_STRING Path, IN ULONG Flags, IN mode_t Mode, OUT PULONG pRetVal, OUT PULONG pError ) { HANDLE FileHandle; NTSTATUS Status; PFILEDESCRIPTOR Fd; ULONG FdIndex; ULONG DesiredAccess; IO_STATUS_BLOCK Iosb; ULONG Options; FILE_INTERNAL_INFORMATION SerialNumber; OBJECT_ATTRIBUTES ObjA; ULONG FileClass; FILE_ALLOCATION_INFORMATION AllocationInfo; FILE_BASIC_INFORMATION BasicInfo; struct stat StatBuf; ULONG PosixTime; ULONG len;
Fd = AllocateFd(p, 0, &FdIndex); if (NULL == Fd) { // No file descriptors are available.
*pError = EMFILE; return TRUE; }
DesiredAccess = OflagToDesiredAccess[Flags & O_ACCMODE];
//
// Whenever a file is opened, its ownership, protection, file type
// information is available. This implies that to view a file from
// posix, the following access rights are required:
//
// READ_CONTROL - to derive owner and mode
// FILE_READ_ATTRIBUTES - to read control bit to see if what we
// got was a pipe
// FILE_READ_EA - to read EA's that determine object type
// SYNCHRONIZE - to do syncronous IO
//
DesiredAccess |= (SYNCHRONIZE | READ_CONTROL | FILE_READ_ATTRIBUTES | FILE_READ_EA);
Options = FILE_SYNCHRONOUS_IO_NONALERT;
//
// If the pathname is /dev/tty, make the fd be open
// on the process console.
//
{ UNICODE_STRING U;
PSX_GET_STRLEN(DOSDEVICE_X2_A,len);
PSX_GET_SESSION_OBJECT_NAME(&U, DEV_TTY);
if (Path->Length == U.Length && 0 == wcsncmp(&Path->Buffer[len], &U.Buffer[len], 8)) {
*pRetVal = FdIndex; *pError = OpenTty(p, Fd, DesiredAccess, Flags, TRUE); return TRUE; } }
//
// If the pathname is /dev/null, make the fd be open
// on the corresponding special device.
//
{ UNICODE_STRING U;
PSX_GET_STRLEN(DOSDEVICE_X2_A,len);
PSX_GET_SESSION_OBJECT_NAME(&U, DEV_NULL);
if (Path->Length == U.Length && 0 == wcsncmp(&Path->Buffer[len], &U.Buffer[len], 8)) {
*pRetVal = FdIndex; *pError = OpenDevNull(p, Fd, DesiredAccess, Flags); return TRUE; } }
//
// We ask for delete access when we open the file, and if we
// can't get it we try without. If the file is unlinked while
// it's open, it gets moved to the junkyard, and when the last
// close occurs we use the delete access to remove it.
//
DesiredAccess |= DELETE;
if (Flags & O_CREAT) { CHAR buf[SECURITY_DESCRIPTOR_MIN_LENGTH]; PSECURITY_DESCRIPTOR pSD = (PVOID)buf;
Status = InitSecurityDescriptor(pSD, Path, p->Process, (Mode & _S_PROT) & ~p->FileModeCreationMask, pvInitSDMem); if (!NT_SUCCESS(Status)) { *pError = PsxStatusToErrno(Status); return TRUE; }
InitializeObjectAttributes(&ObjA, Path, 0, NULL, pSD);
Status = NtCreateFile(&FileHandle, DesiredAccess, &ObjA, &Iosb, NULL, FILE_ATTRIBUTE_NORMAL, SHARE_ALL, (Flags & O_EXCL) ? FILE_CREATE : FILE_OPEN_IF, Options, NULL, 0);
if (STATUS_ACCESS_DENIED == Status || STATUS_SHARING_VIOLATION == Status) { DesiredAccess &= ~DELETE;
Status = NtCreateFile(&FileHandle, DesiredAccess, &ObjA, &Iosb, NULL, FILE_ATTRIBUTE_NORMAL, SHARE_ALL, (Flags & O_EXCL) ? FILE_CREATE : FILE_OPEN_IF, Options, NULL, 0); }
DeInitSecurityDescriptor(pSD, pvInitSDMem);
} else { InitializeObjectAttributes(&ObjA, Path, 0, NULL, NULL);
Status = NtOpenFile(&FileHandle, DesiredAccess, &ObjA, &Iosb, SHARE_ALL, Options);
if (STATUS_ACCESS_DENIED == Status || STATUS_SHARING_VIOLATION == Status) { DesiredAccess &= ~DELETE;
Status = NtOpenFile(&FileHandle, DesiredAccess, &ObjA, &Iosb, SHARE_ALL, Options); } }
if (!NT_SUCCESS(Status)) { if (Status == STATUS_OBJECT_PATH_NOT_FOUND) { *pError = PsxStatusToErrnoPath(Path); return TRUE; } *pError = PsxStatusToErrno(Status); return TRUE; }
//
// Determine what type of file we have here.
//
FileClass = PsxDetermineFileClass(FileHandle);
if (S_IFDIR == FileClass && (DesiredAccess & FILE_WRITE_DATA)) { //
// 1003.1-90 (5.3.1.4): the open() function shall return
// -1 and set errno...
// [EISDIR] The named file is a directory, and
// the oflag argument specifies write
// or read/write access.
NtClose(FileHandle); *pError = EISDIR; return TRUE; }
if ((Flags & O_TRUNC) && FileClass != S_IFIFO && (DesiredAccess & (FILE_WRITE_DATA | FILE_APPEND_DATA))) {
AllocationInfo.AllocationSize = RtlConvertLongToLargeInteger(0); Status = NtSetInformationFile(FileHandle, &Iosb, &AllocationInfo, sizeof(AllocationInfo), FileAllocationInformation); if (!NT_SUCCESS(Status)) { NtClose(FileHandle); *pError = PsxStatusToErrno(Status); return TRUE; } }
Fd->SystemOpenFileDesc = AllocateSystemOpenFile(); if (! Fd->SystemOpenFileDesc) { NtClose(FileHandle); *pError = ENOMEM; return TRUE; }
Fd->SystemOpenFileDesc->NtIoHandle = FileHandle;
if (DesiredAccess & FILE_READ_DATA) { Fd->SystemOpenFileDesc->Flags |= PSX_FD_READ; } if (DesiredAccess & (FILE_WRITE_DATA | FILE_APPEND_DATA)) { Fd->SystemOpenFileDesc->Flags |= PSX_FD_WRITE; } if (Flags & O_NONBLOCK) { Fd->SystemOpenFileDesc->Flags |= PSX_FD_NOBLOCK; } if (Flags & O_APPEND) { Fd->SystemOpenFileDesc->Flags |= PSX_FD_APPEND; }
//
// Get serial numbers.
//
Status = NtQueryInformationFile(FileHandle, &Iosb, &SerialNumber, sizeof(SerialNumber), FileInternalInformation);
if (!NT_SUCCESS(Status)) { NtClose(FileHandle); *pError = PsxStatusToErrno(Status); return TRUE; }
if (ReferenceOrCreateIoNode(GetFileDeviceNumber(Path), (ino_t)SerialNumber.IndexNumber.LowPart, FALSE, &Fd->SystemOpenFileDesc->IoNode)) {
//
// Existing Node Minimal Init
//
RtlLeaveCriticalSection( &Fd->SystemOpenFileDesc->IoNode->IoNodeLock); *pRetVal = FdIndex; return IoOpenNewHandle(p, Fd, m); }
if (! Fd->SystemOpenFileDesc->IoNode) { NtClose(FileHandle); *pError = ENOMEM; return TRUE; }
//
// New IoNode; lots of initialization
//
if (FileClass == S_IFIFO) { Fd->SystemOpenFileDesc->IoNode->IoVectors = &NamedPipeVectors; Fd->SystemOpenFileDesc->IoNode->Context = RtlAllocateHeap(PsxHeap, 0, sizeof(LOCAL_PIPE)); InitializeLocalPipe( (PLOCAL_PIPE)Fd->SystemOpenFileDesc->IoNode->Context); } else { Fd->SystemOpenFileDesc->IoNode->IoVectors = &FileVectors; }
PSX_GET_STRLEN("/DosDevices/X:",len); Fd->SystemOpenFileDesc->IoNode->PathLength = Path->Length/2 - len;
StatBuf.st_mode = FileClass; FindOwnerModeFile(FileHandle, &StatBuf); Fd->SystemOpenFileDesc->IoNode->Mode = StatBuf.st_mode & ~(p->FileModeCreationMask);
Fd->SystemOpenFileDesc->IoNode->OwnerId = StatBuf.st_uid; Fd->SystemOpenFileDesc->IoNode->GroupId = StatBuf.st_gid;
//
// Get the file timestamps, convert to Posix format, and stash
// them away in the IoNode.
//
Status = NtQueryInformationFile(FileHandle, &Iosb, (PVOID)&BasicInfo, sizeof(BasicInfo), FileBasicInformation);
if (!NT_SUCCESS(Status)) { *pError = PsxStatusToErrno(Status); return TRUE; }
if (!RtlTimeToSecondsSince1970(&BasicInfo.LastAccessTime, &PosixTime)) { PosixTime = 0; } Fd->SystemOpenFileDesc->IoNode->AccessDataTime = PosixTime;
if (!RtlTimeToSecondsSince1970(&BasicInfo.LastWriteTime, &PosixTime)) { PosixTime = 0; } Fd->SystemOpenFileDesc->IoNode->ModifyDataTime = PosixTime;
if (!RtlTimeToSecondsSince1970(&BasicInfo.ChangeTime, &PosixTime)) { PosixTime = 0; } Fd->SystemOpenFileDesc->IoNode->ModifyIoNodeTime = PosixTime;
RtlLeaveCriticalSection(&Fd->SystemOpenFileDesc->IoNode->IoNodeLock);
*pRetVal = FdIndex;
return IoOpenNewHandle(p, Fd, m); }
BOOLEAN PsxClose ( IN PPSX_PROCESS p, IN OUT PPSX_API_MSG m )
/*++
Routine Description:
This procedure implements POSIX Close.
Arguments:
p - Supplies the address of the process making the call.
m - Supplies the address of the message associated with the close request.
Return Value:
TRUE - The contents of *m should be used to generate a reply.
--*/
{ PPSX_CLOSE_MSG args; ULONG FdIndex;
args = &m->u.Close;
FdIndex = args->FileDes;
if (!ISFILEDESINRANGE(FdIndex)) { m->Error = EBADF; return TRUE; }
if (!DeallocateFd(p, FdIndex)) {
//
// Bad File Descriptor
//
m->Error = EBADF; return TRUE; }
m->ReturnValue = 0; return TRUE; }
BOOLEAN PsxPipe ( IN PPSX_PROCESS p, IN OUT PPSX_API_MSG m )
/*++
Routine Description:
This procedure implements POSIX Pipe.
Arguments:
p - Supplies the address of the process making the call.
m - Supplies the address of the message associated with the pipe request.
Return Value:
TRUE - The contents of *m should be used to generate a reply.
--*/
{ PPSX_PIPE_MSG args; PFILEDESCRIPTOR ReadFd,WriteFd; ULONG ReadFdIndex,WriteFdIndex; PLOCAL_PIPE Pipe; PIONODE IoNode; LARGE_INTEGER Time; ULONG PosixTime;
args = &m->u.Pipe;
//
// Allocate two file descriptors. One for read, and one
// for write.
//
ReadFd = AllocateFd(p, 0, &ReadFdIndex); if (NULL == ReadFd) {
//
// No file descriptors available
//
m->Error = EMFILE; return TRUE; }
//
// Set FileDesc field so next allocate wont bump in to it
//
ReadFd->SystemOpenFileDesc = (PSYSTEMOPENFILE)1;
WriteFd = AllocateFd(p, 0, &WriteFdIndex); if (NULL == WriteFd) {
//
// No file descriptors available
//
ReadFd->SystemOpenFileDesc = (PSYSTEMOPENFILE)NULL; m->Error = EMFILE; return TRUE; }
Pipe = RtlAllocateHeap(PsxHeap, 0, sizeof(LOCAL_PIPE)); if (NULL == Pipe) { DeallocateFd(p, ReadFdIndex); DeallocateFd(p, WriteFdIndex); m->Error = ENOMEM; return TRUE; }
ReadFd->SystemOpenFileDesc = AllocateSystemOpenFile(); if (! ReadFd->SystemOpenFileDesc) { DeallocateFd(p, ReadFdIndex); DeallocateFd(p, WriteFdIndex); RtlFreeHeap(PsxHeap, 0, Pipe); m->Error = ENOMEM; return TRUE; } ReadFd->SystemOpenFileDesc->Flags = PSX_FD_READ; ReadFd->SystemOpenFileDesc->NtIoHandle = (HANDLE)NULL;
WriteFd->SystemOpenFileDesc = AllocateSystemOpenFile(); if (! WriteFd->SystemOpenFileDesc) { DeallocateSystemOpenFile(p, ReadFd->SystemOpenFileDesc); DeallocateFd(p, ReadFdIndex); DeallocateFd(p, WriteFdIndex); RtlFreeHeap(PsxHeap, 0, Pipe); m->Error = ENOMEM; return TRUE; } WriteFd->SystemOpenFileDesc->Flags = PSX_FD_WRITE; WriteFd->SystemOpenFileDesc->NtIoHandle = (HANDLE)NULL;
if (ReferenceOrCreateIoNode((dev_t)PSX_LOCAL_PIPE, (ULONG_PTR)Pipe, FALSE, &ReadFd->SystemOpenFileDesc->IoNode)) { Panic("PsxPipe: Existing IONODE ?\n"); } else { DeallocateSystemOpenFile(p, ReadFd->SystemOpenFileDesc); DeallocateSystemOpenFile(p, WriteFd->SystemOpenFileDesc); DeallocateFd(p, ReadFdIndex); DeallocateFd(p, WriteFdIndex); RtlFreeHeap(PsxHeap, 0, Pipe); m->Error = ENOMEM; return TRUE; }
WriteFd->SystemOpenFileDesc->IoNode = ReadFd->SystemOpenFileDesc->IoNode; WriteFd->SystemOpenFileDesc->IoNode->ReferenceCount++;
if (! ReferenceOrCreateIoNode((dev_t)PSX_LOCAL_PIPE, (ULONG_PTR)Pipe, FALSE, &WriteFd->SystemOpenFileDesc->IoNode)) { // We don't bother to leave the ReadFd critsec because
// DereferenceIoNode will just destroy it anyway, and it's not
// like this code really cares about leaving the IoNode
// critsec properly anyway,, since it only releases it once
// later (which *does* work, but...).
DereferenceIoNode(ReadFd->SystemOpenFileDesc->IoNode); DeallocateSystemOpenFile(p, ReadFd->SystemOpenFileDesc); DeallocateSystemOpenFile(p, WriteFd->SystemOpenFileDesc); DeallocateFd(p, ReadFdIndex); DeallocateFd(p, WriteFdIndex); RtlFreeHeap(PsxHeap, 0, Pipe); m->Error = ENOMEM; return TRUE; }
IoNode = ReadFd->SystemOpenFileDesc->IoNode; IoNode->Context = (PVOID)Pipe; IoNode->IoVectors = &LocalPipeVectors; IoNode->PathLength = 0;
//
// Note that all the following fields are 'implementation dependent' for
// local pipes except the times fields.
//
IoNode->Mode = (mode_t)0; IoNode->OwnerId = p->EffectiveUid; IoNode->GroupId = p->EffectiveGid;
NtQuerySystemTime(&Time); if (!RtlTimeToSecondsSince1970(&Time, &PosixTime)) { PosixTime = 0L; // Time not within range of 1970 - 2105
}
IoNode->AccessDataTime = IoNode->ModifyDataTime = IoNode->ModifyIoNodeTime = PosixTime; InitializeLocalPipe(Pipe);
RtlLeaveCriticalSection(&IoNode->IoNodeLock);
//
// call new handle routines
//
IoNewHandle(p, ReadFd); IoNewHandle(p, WriteFd);
args->FileDes0 = ReadFdIndex; args->FileDes1 = WriteFdIndex;
m->ReturnValue = 0; return TRUE; }
BOOLEAN PsxWrite( IN PPSX_PROCESS p, IN PPSX_API_MSG m )
/*++
Routine Description:
This procedure implements POSIX write()
Arguments:
p - Supplies the address of the process making the call.
m - Supplies the address of the message associated with the write request.
Return Value:
TRUE - The contents of *m should be used to generate a reply.
--*/
{ PPSX_WRITE_MSG args; PFILEDESCRIPTOR Fd;
args = &m->u.Write; args->Command = IO_COMMAND_DONE;
Fd = FdIndexToFd(p,args->FileDes);
if (NULL == Fd) { m->Error = EBADF; return TRUE; }
if (!(Fd->SystemOpenFileDesc->Flags & PSX_FD_WRITE)) { m->Error = EBADF; return TRUE; } if (0 == args->Nbytes) { m->ReturnValue = 0; return TRUE; }
args->Scratch1 = args->Scratch2 = 0; return (Fd->SystemOpenFileDesc->IoNode->IoVectors->WriteRoutine)(p, m, Fd); }
BOOLEAN PsxRead( IN PPSX_PROCESS p, IN PPSX_API_MSG m )
/*++
Routine Description:
This procedure implements POSIX read()
Arguments:
p - Supplies the address of the process making the call.
m - Supplies the address of the message associated with the read request.
Return Value:
TRUE - The contents of *m should be used to generate a reply.
--*/
{ PPSX_READ_MSG args; PFILEDESCRIPTOR Fd;
args = &m->u.Read; args->Command = IO_COMMAND_DONE;
Fd = FdIndexToFd(p, args->FileDes); if (NULL == Fd) { m->Error = EBADF; return TRUE; }
if (!(Fd->SystemOpenFileDesc->Flags & PSX_FD_READ)) { m->Error = EBADF; return TRUE; } if (0 == args->Nbytes) { m->ReturnValue = 0; return TRUE; }
args->Scratch1 = args->Scratch2 = 0; return (Fd->SystemOpenFileDesc->IoNode->IoVectors->ReadRoutine)(p, m, Fd); }
BOOLEAN PsxReadDir( IN PPSX_PROCESS p, IN PPSX_API_MSG m )
/*++
Routine Description:
This procedure implements POSIX read()
Arguments:
p - Supplies the address of the process making the call.
m - Supplies the address of the message associated with the read request.
Return Value:
TRUE - The contents of *m should be used to generate a reply.
--*/
{ PPSX_READDIR_MSG args; PFILEDESCRIPTOR Fd;
args = &m->u.ReadDir;
Fd = FdIndexToFd(p, args->FileDes); if (NULL == Fd) { m->Error = EBADF; return TRUE; }
if (!(Fd->SystemOpenFileDesc->Flags & PSX_FD_READ)) { m->Error = EBADF; return TRUE; } if (0 == args->Nbytes) { m->ReturnValue = 0; return TRUE; }
return (Fd->SystemOpenFileDesc->IoNode->IoVectors->ReadRoutine)(p, m, Fd); }
BOOLEAN PsxDup( IN PPSX_PROCESS p, IN PPSX_API_MSG m )
/*++
Routine Description:
This procedure implements POSIX dup()
Arguments:
p - Supplies the address of the process making the call.
m - Supplies the address of the message associated with the request.
Return Value:
TRUE - The contents of *m should be used to generate a reply.
--*/
{ PPSX_DUP_MSG args; PFILEDESCRIPTOR Fd, FdDup; ULONG FdIndex; BOOLEAN RetVal;
args = &m->u.Dup;
Fd = FdIndexToFd(p, args->FileDes); if (!Fd) { m->Error = EBADF; return TRUE; }
FdDup = AllocateFd(p, 0, &FdIndex); if (!Fd) {
//
// No file descriptors available
//
m->Error = EMFILE; return TRUE;
} RetVal = (Fd->SystemOpenFileDesc->IoNode->IoVectors->DupRoutine) (p, m, Fd, FdDup); m->ReturnValue = FdIndex; return RetVal; }
BOOLEAN PsxDup2( IN PPSX_PROCESS p, IN PPSX_API_MSG m )
/*++
Routine Description:
This procedure implements POSIX dup2()
Arguments:
p - Supplies the address of the process making the call.
m - Supplies the address of the message associated with the request.
Return Value:
TRUE - The contents of *m should be used to generate a reply.
--*/
{ PPSX_DUP2_MSG args; PFILEDESCRIPTOR Fd, Fd2; ULONG FdIndex, FdIndex2; BOOLEAN RetVal;
args = &m->u.Dup2;
//
// If FileDes is not valid, or FileDes2 is out of range, return EBADF
//
Fd = FdIndexToFd(p, args->FileDes);
FdIndex = args->FileDes; FdIndex2 = args->FileDes2;
if (!Fd || !ISFILEDESINRANGE(FdIndex2)) {
m->Error = EBADF; return TRUE; }
//
// If FileDes is valid and == FileDes2, just return FileDes2
//
if (FdIndex == FdIndex2) {
m->ReturnValue = FdIndex2; return TRUE; }
//
// Close FileDes2 (FdIndex2)
//
DeallocateFd(p, FdIndex2);
//
// Set Fd2 to file table entry just deallocated
//
Fd2 = &p->ProcessFileTable[FdIndex2];
// Call Dup Routine to do the work
RetVal = (Fd->SystemOpenFileDesc->IoNode->IoVectors->DupRoutine) (p, m, Fd, Fd2); m->ReturnValue = FdIndex2; return RetVal; }
BOOLEAN PsxLseek( IN PPSX_PROCESS p, IN PPSX_API_MSG m )
/*++
Routine Description:
This procedure implements POSIX lseek()
Arguments:
p - Supplies the address of the process making the call.
m - Supplies the address of the message associated with the request.
Return Value:
TRUE - The contents of *m should be used to generate a reply.
--*/
{ PPSX_LSEEK_MSG args; PFILEDESCRIPTOR Fd;
args = &m->u.Lseek;
Fd = FdIndexToFd(p, args->FileDes);
if (!Fd) { m->Error = EBADF; return TRUE; }
//
// Lseek is not allowed on FIFOs or local pipes
//
if (S_ISFIFO(Fd->SystemOpenFileDesc->IoNode->Mode) || Fd->SystemOpenFileDesc->IoNode->DeviceSerialNumber == PSX_LOCAL_PIPE) { m->Error = ESPIPE; return TRUE; }
switch (args->Whence) { case SEEK_SET: case SEEK_CUR: case SEEK_END: break; default: m->Error = EINVAL; return TRUE; }
return (Fd->SystemOpenFileDesc->IoNode->IoVectors->LseekRoutine)(p, m, Fd); }
BOOLEAN PsxUmask( IN PPSX_PROCESS p, IN PPSX_API_MSG m ) /*++
Routine Description:
This procedure implements POSIX umask.
Arguments:
p - Supplies the address of the process making the call.
m - Supplies the address of the message associated with the umask request.
Return Value:
TRUE - The contents of *m should be used to generate a reply.
--*/ { PPSX_UMASK_MSG args; mode_t NewMask;
args = &m->u.Umask;
// Save old creation mode mask to return
m->ReturnValue = (mode_t) (p->FileModeCreationMask);
// Mask off all but the permission bits in Cmask
NewMask = args->Cmask & _S_PROT;
// Zero old permission bits in Mode mask
p->FileModeCreationMask &= (!_S_PROT);
// Or in new permission bits
p->FileModeCreationMask |= NewMask;
return TRUE; }
BOOLEAN PsxMkDir( IN PPSX_PROCESS p, IN OUT PPSX_API_MSG m )
/*++
Routine Description:
This procedure implements POSIX mkdir.
Arguments:
p - Supplies the address of the process making the call.
m - Supplies the address of the message associated with the mkdir request.
Return Value:
TRUE - The contents of *m should be used to generate a reply.
--*/
{ PPSX_MKDIR_MSG args; HANDLE FileHandle; NTSTATUS Status; IO_STATUS_BLOCK Iosb; OBJECT_ATTRIBUTES ObjA; UNICODE_STRING Path_U; ULONG DesiredAccess; CHAR buf[SECURITY_DESCRIPTOR_MIN_LENGTH]; PSECURITY_DESCRIPTOR pSD = (PVOID)buf;
args = &m->u.MkDir;
//
// Check validity of pathname pointer
//
if (!ISPOINTERVALID_CLIENT(p,args->Path_U.Buffer,args->Path_U.Length)) { KdPrint(("Invalid pointer to mkdir %lx \n", args->Path_U.Buffer)); m->Error = EINVAL; return TRUE; }
Path_U = args->Path_U;
Status = NtImpersonateClientOfPort(p->ClientPort, (PPORT_MESSAGE)m);
if (!NT_SUCCESS(Status)) { m->Error = PsxStatusToErrno(Status); return TRUE; }
Status = InitSecurityDescriptor(pSD, &args->Path_U, p->Process, (args->Mode & _S_PROT) & ~p->FileModeCreationMask, pvInitSDMem);
if (!NT_SUCCESS(Status)) {
EndImpersonation();
m->Error = PsxStatusToErrno(Status); return TRUE; }
InitializeObjectAttributes(&ObjA, &Path_U, 0, NULL, pSD);
DesiredAccess = WRITE_OWNER | WRITE_DAC;
Status = NtCreateFile(&FileHandle, DesiredAccess, &ObjA, &Iosb, NULL, FILE_ATTRIBUTE_NORMAL, 0, FILE_CREATE, FILE_DIRECTORY_FILE, NULL, 0);
EndImpersonation();
DeInitSecurityDescriptor(pSD, pvInitSDMem);
if (!NT_SUCCESS(Status)) { (void)NtClose(FileHandle); if (STATUS_OBJECT_PATH_NOT_FOUND == Status) { m->Error = PsxStatusToErrnoPath(&Path_U); return TRUE; } m->Error = PsxStatusToErrno(Status); return TRUE; }
Status = NtClose(FileHandle); ASSERT(NT_SUCCESS(Status));
return TRUE; }
BOOLEAN PsxMkFifo( IN PPSX_PROCESS p, IN OUT PPSX_API_MSG m )
/*++
Routine Description:
This procedure implements POSIX mkfifo.
Arguments:
p - Supplies the address of the process making the call.
m - Supplies the address of the message associated with the mkfifo request.
Return Value:
TRUE - The contents of *m should be used to generate a reply.
--*/
{ PPSX_MKFIFO_MSG args; HANDLE FileHandle; NTSTATUS Status; IO_STATUS_BLOCK Iosb; OBJECT_ATTRIBUTES ObjA; UNICODE_STRING Path_U; ULONG DesiredAccess; CHAR buf[SECURITY_DESCRIPTOR_MIN_LENGTH]; PSECURITY_DESCRIPTOR pSD = (PVOID)buf;
args = &m->u.MkFifo;
//
// Check validity of pathname pointer
//
if (!ISPOINTERVALID_CLIENT(p,args->Path_U.Buffer,args->Path_U.Length)) { KdPrint(("Invalid pointer to mkfifo %lx\n", args->Path_U.Buffer)); m->Error = EINVAL; return TRUE; }
Path_U = args->Path_U;
Status = NtImpersonateClientOfPort(p->ClientPort, (PPORT_MESSAGE)m);
if (!NT_SUCCESS(Status)) { m->Error = PsxStatusToErrno(Status); return TRUE; }
Status = InitSecurityDescriptor(pSD, &args->Path_U, p->Process, (args->Mode & _S_PROT) & ~p->FileModeCreationMask, pvInitSDMem);
if (!NT_SUCCESS(Status)) {
EndImpersonation();
m->Error = PsxStatusToErrno(Status); return TRUE; }
InitializeObjectAttributes(&ObjA, &Path_U, 0, NULL, pSD);
DesiredAccess = FILE_READ_DATA | WRITE_DAC | WRITE_OWNER;
Status = NtCreateFile(&FileHandle, DesiredAccess, &ObjA, &Iosb, NULL, FILE_ATTRIBUTE_SYSTEM, 0, FILE_CREATE, 0L, NULL, 0);
EndImpersonation();
DeInitSecurityDescriptor(pSD, pvInitSDMem);
if (!NT_SUCCESS(Status)) { if (STATUS_OBJECT_PATH_NOT_FOUND == Status) { m->Error = PsxStatusToErrnoPath(&Path_U); return TRUE; } m->Error = PsxStatusToErrno(Status); return TRUE; }
Status = NtClose(FileHandle); ASSERT(NT_SUCCESS(Status));
return TRUE; }
BOOLEAN PsxStat( IN PPSX_PROCESS p, IN OUT PPSX_API_MSG m )
/*++
Routine Description:
This procedure implements POSIX stat.
Arguments:
p - Supplies the address of the process making the call.
m - Supplies the address of the message associated with the stat request.
Return Value:
TRUE - The contents of *m should be used to generate a reply.
--*/ { PPSX_STAT_MSG args; HANDLE FileHandle; NTSTATUS Status; IO_STATUS_BLOCK Iosb; OBJECT_ATTRIBUTES ObjA; UNICODE_STRING Path_U; PIONODE IoNode; FILE_INTERNAL_INFORMATION SerialNumber; BOOLEAN RetVal;
args = &m->u.Stat;
//
// Check validity of pathname
//
if (!ISPOINTERVALID_CLIENT(p, args->Path_U.Buffer, args->Path_U.Length)) { KdPrint(("Invalid pointer to stat %lx \n", args->Path_U.Buffer)); m->Error = EINVAL; return TRUE; } if (!ISPOINTERVALID_CLIENT(p, args->StatBuf, sizeof(struct stat))) { m->Error = EINVAL; return TRUE; }
Path_U = args->Path_U; InitializeObjectAttributes(&ObjA, &Path_U, 0, NULL, NULL);
Status = NtImpersonateClientOfPort(p->ClientPort, (PPORT_MESSAGE)m);
if (NT_SUCCESS(Status)) { // Open the file to obtain file handle.
Status = NtOpenFile(&FileHandle, SYNCHRONIZE | READ_CONTROL | FILE_READ_ATTRIBUTES | FILE_READ_EA, &ObjA, &Iosb, SHARE_ALL, FILE_SYNCHRONOUS_IO_NONALERT);
EndImpersonation(); }
//
// Convert error code if open was not successful
//
if (!NT_SUCCESS(Status)) { if (STATUS_OBJECT_PATH_NOT_FOUND == Status) { m->Error = PsxStatusToErrnoPath(&Path_U); return TRUE; } m->Error = PsxStatusToErrno(Status); return TRUE; }
//
// Get file serial numbers...
//
Status = NtQueryInformationFile(FileHandle, &Iosb, &SerialNumber, sizeof(SerialNumber), FileInternalInformation); if (!NT_SUCCESS(Status)) { KdPrint(("PSXSS: NtQueryInfoFile failed: 0x%x\n", Status)); } ASSERT(NT_SUCCESS(Status));
//
// Find the Ionode associated with this file.
//
if (ReferenceOrCreateIoNode(GetFileDeviceNumber(&Path_U), (ino_t)SerialNumber.IndexNumber.LowPart, TRUE, &IoNode)) {
RetVal = (IoNode->IoVectors->StatRoutine)(IoNode, FileHandle, args->StatBuf, &Status); RtlLeaveCriticalSection(&IoNode->IoNodeLock); } else { //
// Ionode doesn't exist. Not currently open or NonPosix file.
//
RetVal = (FileVectors.StatRoutine)(NULL, FileHandle, args->StatBuf, &Status); args->StatBuf->st_dev = GetFileDeviceNumber(&Path_U); }
EndImpersonation(); NtClose(FileHandle);
if (!NT_SUCCESS(Status)) { m->Error = PsxStatusToErrno(Status); return TRUE; }
return RetVal; }
BOOLEAN PsxFStat( IN PPSX_PROCESS p, IN OUT PPSX_API_MSG m ) /*++
Routine Description:
This procedure implements POSIX fstat.
Arguments:
p - Supplies the address of the process making the call.
m - Supplies the address of the message associated with the fstat request.
Return Value:
TRUE - The contents of *m should be used to generate a reply.
--*/ { PPSX_FSTAT_MSG args; PFILEDESCRIPTOR Fd; NTSTATUS Status; BOOLEAN RetVal;
args = &m->u.FStat;
if (!ISPOINTERVALID_CLIENT(p, args->StatBuf, sizeof(struct stat))) { m->Error = EINVAL; return TRUE; }
Fd = FdIndexToFd(p, args->FileDes); if (!Fd) { m->Error = EBADF; return TRUE; }
RtlEnterCriticalSection(&Fd->SystemOpenFileDesc->IoNode->IoNodeLock); RetVal = (Fd->SystemOpenFileDesc->IoNode->IoVectors->StatRoutine) (Fd->SystemOpenFileDesc->IoNode, Fd->SystemOpenFileDesc->NtIoHandle, args->StatBuf, &Status);
RtlLeaveCriticalSection(&Fd->SystemOpenFileDesc->IoNode->IoNodeLock);
if (!NT_SUCCESS(Status)) { m->Error = PsxStatusToErrno(Status); }
return RetVal; }
BOOLEAN PsxPathConf( IN PPSX_PROCESS p, IN OUT PPSX_API_MSG m ) /*++
Routine Description:
This procedure implements POSIX pathconf.
Arguments:
p - Supplies the address of the process making the call.
m - Supplies the address of the message associated with the pathconf request.
Return Value:
TRUE - The contents of *m should be used to generate a reply.
--*/ { PPSX_PATHCONF_MSG args; HANDLE FileHandle; NTSTATUS Status; IO_STATUS_BLOCK IoStatusBlock; OBJECT_ATTRIBUTES ObjA; UNICODE_STRING Path; ULONG Length; PFILE_FS_ATTRIBUTE_INFORMATION pFSInfo; unsigned char buf[sizeof(FILE_FS_ATTRIBUTE_INFORMATION)+ 128*sizeof(WCHAR)];
args = &m->u.PathConf; pFSInfo = (PFILE_FS_ATTRIBUTE_INFORMATION)buf;
//
// Check validity of pathname
//
if (!ISPOINTERVALID_CLIENT(p, args->Path.Buffer, args->Path.Length)) { KdPrint(("Invalid pointer to pathconf: %lx \n", args->Path.Buffer)); m->Error = EINVAL; return TRUE; }
Path = args->Path; InitializeObjectAttributes(&ObjA, &Path, 0, NULL, NULL);
Status = NtImpersonateClientOfPort(p->ClientPort, (PPORT_MESSAGE)m);
if (NT_SUCCESS(Status)) { //
// Open the file to obtain file handle.
//
Status = NtOpenFile(&FileHandle, SYNCHRONIZE | READ_CONTROL | FILE_READ_ATTRIBUTES | FILE_READ_EA, &ObjA, &IoStatusBlock, SHARE_ALL, FILE_SYNCHRONOUS_IO_NONALERT);
EndImpersonation(); }
//
// Convert error code if open was not successful
//
if (!NT_SUCCESS(Status)) { if (STATUS_OBJECT_PATH_NOT_FOUND == Status) { m->Error = PsxStatusToErrnoPath(&Path); return TRUE; } m->Error = PsxStatusToErrno(Status); return TRUE; }
//
// Figure out pathconf return value.
//
switch(args->Name) { case _PC_LINK_MAX: Status = NtQueryVolumeInformationFile(FileHandle, &IoStatusBlock, buf, sizeof(buf), FileFsAttributeInformation); ASSERT(NT_SUCCESS(Status)); if (pFSInfo->FileSystemNameLength > (sizeof(buf)-sizeof(WCHAR))) { KdPrint(("PSXSS: File System Name too long in PsxPathConf\n")); m->Error = EINVAL; return TRUE; } pFSInfo->FileSystemName[pFSInfo->FileSystemNameLength/2] = L'\0'; if (0 == wcscmp(L"NTFS", pFSInfo->FileSystemName) || 0 == wcscmp(L"OFS", pFSInfo->FileSystemName)) { m->ReturnValue = (ULONG)LINK_MAX; } else { m->ReturnValue = 1; } break;
case _PC_NAME_MAX: Status = NtQueryVolumeInformationFile(FileHandle, &IoStatusBlock, buf, sizeof(buf), FileFsAttributeInformation); ASSERT(NT_SUCCESS(Status));
m->ReturnValue = pFSInfo->MaximumComponentNameLength; break;
case _PC_PIPE_BUF: m->ReturnValue = _POSIX_PIPE_BUF; break;
case _PC_CHOWN_RESTRICTED: m->ReturnValue = _POSIX_CHOWN_RESTRICTED; break;
case _PC_NO_TRUNC: m->ReturnValue = _POSIX_NO_TRUNC; break;
case _PC_PATH_MAX: m->ReturnValue = PATH_MAX; break;
case _PC_MAX_CANON: case _PC_MAX_INPUT: case _PC_VDISABLE: //
// No limit associated with file descriptor for these variables
//
m->Error = EINVAL; break;
default: m->Error = EINVAL; }
Status = NtClose(FileHandle); return TRUE; }
BOOLEAN PsxFPathConf( IN PPSX_PROCESS p, IN OUT PPSX_API_MSG m ) /*++
Routine Description:
This procedure implements POSIX fpathconf.
Arguments:
p - Supplies the address of the process making the call.
m - Supplies the address of the message associated with the fpathconf request.
Return Value:
TRUE - The contents of *m should be used to generate a reply.
--*/ { PPSX_FPATHCONF_MSG args; PFILEDESCRIPTOR Fd; NTSTATUS Status; IO_STATUS_BLOCK IoStatusBlock; ULONG Length; PFILE_FS_ATTRIBUTE_INFORMATION pFSInfo; unsigned char buf[sizeof(FILE_FS_ATTRIBUTE_INFORMATION)+ 128*sizeof(WCHAR)];
args = &m->u.FPathConf; pFSInfo = (PFILE_FS_ATTRIBUTE_INFORMATION)buf;
Fd = FdIndexToFd(p, args->FileDes); if (!Fd) { m->Error = EBADF; return TRUE; }
switch(args->Name) { case _PC_LINK_MAX:
if (&FileVectors != Fd->SystemOpenFileDesc->IoNode->IoVectors) { //
// The file descriptor is not open on a file.
//
m->Error = EINVAL; return TRUE; }
Status = NtQueryVolumeInformationFile( Fd->SystemOpenFileDesc->NtIoHandle, &IoStatusBlock, buf, sizeof(buf), FileFsAttributeInformation); if (!NT_SUCCESS(Status)) { KdPrint(("PSXSS: NtqueryVolumeInformationFile failed: 0x%x\n", Status)); m->Error = PsxStatusToErrno(Status); return TRUE; }
if (pFSInfo->FileSystemNameLength > (sizeof(buf)-sizeof(WCHAR))) { KdPrint(("PSXSS: File System Name too long in PsxPathConf\n")); m->Error = EINVAL; return TRUE; } pFSInfo->FileSystemName[pFSInfo->FileSystemNameLength/2] = L'\0'; if (0 == wcscmp(L"NTFS", pFSInfo->FileSystemName) || 0 == wcscmp(L"OFS", pFSInfo->FileSystemName)) { m->ReturnValue = (ULONG)(LINK_MAX); //
} else { m->ReturnValue = 1; } break;
case _PC_NAME_MAX: if (&FileVectors != Fd->SystemOpenFileDesc->IoNode->IoVectors) { //
// The file descriptor is not open on a file.
//
m->Error = EINVAL; return TRUE; }
Status = NtQueryVolumeInformationFile( Fd->SystemOpenFileDesc->NtIoHandle, &IoStatusBlock, buf, sizeof(buf), FileFsAttributeInformation);
if (!NT_SUCCESS(Status)) { KdPrint(("PSXSS: NtqueryVolumeInformationFile failed: 0x%x\n", Status)); m->Error = PsxStatusToErrno(Status); return TRUE; }
m->ReturnValue = pFSInfo->MaximumComponentNameLength; break;
case _PC_PIPE_BUF: m->ReturnValue = _POSIX_PIPE_BUF; break;
case _PC_CHOWN_RESTRICTED: m->ReturnValue = _POSIX_CHOWN_RESTRICTED; break;
case _PC_NO_TRUNC: m->ReturnValue = _POSIX_NO_TRUNC; break;
case _PC_PATH_MAX: m->ReturnValue = PATH_MAX; break;
case _PC_MAX_CANON: case _PC_MAX_INPUT: case _PC_VDISABLE: //
// No limit associated with file descriptor for these variables
//
m->Error = EINVAL; break;
default: m->Error = EINVAL; }
return TRUE; }
BOOLEAN PsxChmod( IN PPSX_PROCESS p, IN PPSX_API_MSG m ) /*++
Routine Description:
This procedure implements POSIX chmod.
Arguments:
p - Supplies the address of the process making the call.
m - Supplies the address of the message associated with the chmod request.
Return Value:
TRUE - The contents of *m should be used to generate a reply.
--*/ { PPSX_CHMOD_MSG args; HANDLE FileHandle; NTSTATUS Status; IO_STATUS_BLOCK Iosb; OBJECT_ATTRIBUTES ObjA; UNICODE_STRING Path_U; SECURITY_INFORMATION SecurityInformation; PSECURITY_DESCRIPTOR SecurityDescriptor = NULL; PACL pDacl = NULL; ULONG DaclSize; // the size of the Dacl
PSID NtOwner, NtGroup; BOOLEAN OwnerDefaulted, GroupDefaulted; BOOLEAN DaclPresent, DaclDefaulted; ACCESS_MASK UserAccess, GroupAccess, OtherAccess; ULONG LengthNeeded, Revision, // Security Desc revision
SdSize; // Size for Security Desc
SECURITY_DESCRIPTOR_CONTROL Control;
// Pointers for a manufactured absolute-format security descriptor.
PACL pAbsDacl = NULL, pAbsSacl = NULL; PSID pAbsOwner = NULL, pAbsGroup = NULL;
args = &m->u.Chmod;
if (!ISPOINTERVALID_CLIENT(p, args->Path_U.Buffer, args->Path_U.Length)) { KdPrint(("Invalid pointer to chmod: %lx\n", args->Path_U.Buffer)); m->Error = EINVAL; return TRUE; }
Path_U = args->Path_U; InitializeObjectAttributes(&ObjA, &Path_U, 0, NULL, NULL);
Status = NtImpersonateClientOfPort(p->ClientPort, (PPORT_MESSAGE)m);
if (!NT_SUCCESS(Status)) { m->Error = PsxStatusToErrno(Status); return TRUE; }
Status = NtOpenFile(&FileHandle, SYNCHRONIZE | WRITE_DAC | READ_CONTROL, &ObjA, &Iosb, SHARE_ALL, FILE_SYNCHRONOUS_IO_NONALERT);
if (!NT_SUCCESS(Status)) { NTSTATUS st;
//
// 1003.1-90: EPERM when the euid does not match the
// owner of the file. We try to open the file with null
// access, if we can't do that then search permission is
// denied or somesuch. Otherwise, we give EPERM.
//
st = NtOpenFile(&FileHandle, SYNCHRONIZE | READ_CONTROL, &ObjA, &Iosb, SHARE_ALL, FILE_SYNCHRONOUS_IO_NONALERT); EndImpersonation(); if (STATUS_OBJECT_PATH_NOT_FOUND == Status) { m->Error = PsxStatusToErrnoPath(&Path_U); return TRUE; } if (!NT_SUCCESS(st)) { m->Error = PsxStatusToErrno(st); return TRUE; }
NtClose(FileHandle); m->Error = EPERM; return TRUE; } EndImpersonation();
//
// Get the security descriptor for the file.
//
SecurityInformation = OWNER_SECURITY_INFORMATION | GROUP_SECURITY_INFORMATION | DACL_SECURITY_INFORMATION;
Status = NtQuerySecurityObject(FileHandle, SecurityInformation, NULL, 0, &SdSize); ASSERT(STATUS_BUFFER_TOO_SMALL == Status);
SecurityDescriptor = RtlAllocateHeap(PsxHeap, 0, SdSize); if (NULL == SecurityDescriptor) { m->Error = ENOMEM; goto out; }
Status = NtQuerySecurityObject(FileHandle, SecurityInformation, SecurityDescriptor, SdSize, &SdSize); ASSERT(NT_SUCCESS(Status));
Status = RtlGetControlSecurityDescriptor(SecurityDescriptor, &Control, &Revision); ASSERT(NT_SUCCESS(Status)); ASSERT(SECURITY_DESCRIPTOR_REVISION == Revision);
if (Control & SE_SELF_RELATIVE) { PSECURITY_DESCRIPTOR AbsSD; // SD in absolute format.
ULONG AbsSdSize = 0, DaclSize = 0, SaclSize = 0, OwnerSize = 0, GroupSize = 0;
//
// This security descriptor needs to be converted to absolute
// format.
//
Status = RtlSelfRelativeToAbsoluteSD(SecurityDescriptor, NULL, &AbsSdSize, NULL, &DaclSize, NULL, &SaclSize, NULL, &OwnerSize, NULL, &GroupSize); ASSERT(STATUS_BUFFER_TOO_SMALL == Status);
AbsSD = RtlAllocateHeap(PsxHeap, 0, AbsSdSize); pAbsDacl = RtlAllocateHeap(PsxHeap, 0, DaclSize); pAbsSacl = RtlAllocateHeap(PsxHeap, 0, SaclSize); pAbsOwner = RtlAllocateHeap(PsxHeap, 0, OwnerSize); pAbsGroup = RtlAllocateHeap(PsxHeap, 0, GroupSize);
if (NULL == AbsSD || NULL == pAbsDacl || NULL == pAbsSacl || NULL == pAbsOwner || NULL == pAbsGroup) { m->Error = ENOMEM; goto out; }
Status = RtlSelfRelativeToAbsoluteSD(SecurityDescriptor, AbsSD, &AbsSdSize, pAbsDacl, &DaclSize, pAbsSacl, &SaclSize, pAbsOwner, &OwnerSize, pAbsGroup, &GroupSize); ASSERT(NT_SUCCESS(Status));
// RtlFreeHeap(PsxHeap, 0, SecurityDescriptor);
SecurityDescriptor = AbsSD; AbsSD = NULL; // so it won't be freed later
}
//
// Get the owner and group from the security descriptor
//
Status = RtlGetOwnerSecurityDescriptor(SecurityDescriptor, &NtOwner, &OwnerDefaulted); ASSERT(NT_SUCCESS(Status));
Status = RtlGetGroupSecurityDescriptor(SecurityDescriptor, &NtGroup, &GroupDefaulted); ASSERT(NT_SUCCESS(Status));
if (NULL == NtOwner || NULL == NtGroup) { //
// We need an owner and group to change the modes; fail.
//
KdPrint(("PsxChmod: No owner or no group\n")); m->Error = EPERM; goto out; }
Status = RtlGetDaclSecurityDescriptor(SecurityDescriptor, &DaclPresent, &pDacl, &DaclDefaulted); ASSERT(NT_SUCCESS(Status));
ModeToAccessMask(args->Mode, &UserAccess, &GroupAccess, &OtherAccess);
Status = RtlMakePosixAcl(ACL_REVISION2, NtOwner, NtGroup, UserAccess, GroupAccess, OtherAccess, 0, NULL, &LengthNeeded); ASSERT(STATUS_BUFFER_TOO_SMALL == Status);
pDacl = RtlAllocateHeap(PsxHeap, 0, LengthNeeded); if (NULL == pDacl) { m->Error = ENOMEM; return TRUE; }
Status = RtlMakePosixAcl(ACL_REVISION2, NtOwner, NtGroup, UserAccess, GroupAccess, OtherAccess, LengthNeeded, pDacl, &DaclSize); ASSERT(NT_SUCCESS(Status));
Status = RtlSetDaclSecurityDescriptor(SecurityDescriptor, TRUE, pDacl, FALSE); if (!NT_SUCCESS(Status)) { KdPrint(("PSXSS: RtlSetDacl: 0x%x\n", Status)); m->Error = EPERM; return TRUE; }
SecurityInformation = DACL_SECURITY_INFORMATION;
Status = NtImpersonateClientOfPort(p->ClientPort, (PPORT_MESSAGE)m);
if (NT_SUCCESS(Status)) { Status = NtSetSecurityObject(FileHandle, SecurityInformation, SecurityDescriptor); EndImpersonation(); }
if (!NT_SUCCESS(Status)) { m->Error = PsxStatusToErrno(Status); }
out: NtClose(FileHandle);
if (NULL != pAbsDacl) { RtlFreeHeap(PsxHeap, 0, pAbsDacl); } if (NULL != pAbsSacl) { RtlFreeHeap(PsxHeap, 0, pAbsSacl); } if (NULL != pAbsOwner) { RtlFreeHeap(PsxHeap, 0, pAbsOwner); } if (NULL != pAbsGroup) { RtlFreeHeap(PsxHeap, 0, pAbsGroup); } if (NULL != SecurityDescriptor) { RtlFreeHeap(PsxHeap, 0, SecurityDescriptor); } if (NULL != pDacl) { RtlFreeHeap(PsxHeap, 0, pDacl); }
return TRUE; }
BOOLEAN PsxChown( IN PPSX_PROCESS p, IN PPSX_API_MSG m ) /*++
Routine Description:
This procedure implements POSIX chown.
Arguments:
p - Supplies the address of the process making the call.
m - Supplies the address of the message associated with the chown request.
Return Value:
TRUE - The contents of *m should be used to generate a reply.
--*/ { PPSX_CHOWN_MSG args; HANDLE FileHandle; NTSTATUS Status; IO_STATUS_BLOCK Iosb; OBJECT_ATTRIBUTES ObjA; UNICODE_STRING Path_U; PIONODE IoNode; SECURITY_INFORMATION SecurityInformation; PSECURITY_DESCRIPTOR SecurityDescriptor = NULL, pFreeSD = NULL; ACCESS_MASK UserAccess, GroupAccess, OtherAccess; ULONG LengthNeeded; PSID NtOwner, // owner from existing SD
NtGroup, // group from existing SD
DomainSid, // domain goes with new gid
NewGroup = NULL, // new group from DomainSid+gid
NewUser = NULL; // new user
BOOLEAN OwnerDefaulted, GroupDefaulted, DaclPresent, DaclDefaulted; PACL pDacl = NULL, pDacl2 = NULL; ULONG Revision; // Security Desc revision
SECURITY_DESCRIPTOR_CONTROL Control; FILE_INTERNAL_INFORMATION SerialNumber;
// Pointers for a manufactured absolute-format security descriptor.
PACL pAbsDacl = NULL, pAbsSacl = NULL; PSID pAbsOwner = NULL, pAbsGroup = NULL;
args = &m->u.Chown;
if (!ISPOINTERVALID_CLIENT(p, args->Path_U.Buffer, args->Path_U.Length)) { KdPrint(("Invalid pointer to chown: %lx\n", args->Path_U.Buffer)); m->Error = EINVAL; return TRUE; }
Path_U = args->Path_U; InitializeObjectAttributes(&ObjA, &Path_U, 0, NULL, NULL);
Status = NtImpersonateClientOfPort(p->ClientPort, (PPORT_MESSAGE)m);
if (!NT_SUCCESS(Status)) { m->Error = PsxStatusToErrno(Status); return TRUE; }
Status = NtOpenFile(&FileHandle, SYNCHRONIZE | READ_CONTROL | WRITE_OWNER | WRITE_DAC, &ObjA, &Iosb, SHARE_ALL, FILE_SYNCHRONOUS_IO_NONALERT);
EndImpersonation();
if (!NT_SUCCESS(Status)) { //
// 1003.1-90 (5.6.5.4): EPERM when the caller does not have
// permission to change the owner. We check this by opening
// the file with the same mode, except without WRITE_OWNER.
//
if (STATUS_OBJECT_PATH_NOT_FOUND == Status) { m->Error = PsxStatusToErrnoPath(&Path_U); } else { m->Error = PsxStatusToErrno(Status); }
Status = NtImpersonateClientOfPort(p->ClientPort, (PPORT_MESSAGE)m);
if (!NT_SUCCESS(Status)) { m->Error = PsxStatusToErrno(Status); return TRUE; }
Status = NtOpenFile(&FileHandle, SYNCHRONIZE | READ_CONTROL, &ObjA, &Iosb, SHARE_ALL, FILE_SYNCHRONOUS_IO_NONALERT);
EndImpersonation(); if (NT_SUCCESS(Status)) { m->Error = EPERM; NtClose(FileHandle); } return TRUE; }
//
// Get serial numbers.
//
Status = NtQueryInformationFile(FileHandle, &Iosb, &SerialNumber, sizeof(SerialNumber), FileInternalInformation); ASSERT(NT_SUCCESS(Status));
if (ReferenceOrCreateIoNode(GetFileDeviceNumber(&Path_U), (ino_t)SerialNumber.IndexNumber.LowPart, TRUE, &IoNode)) { // File already is open.
} else { IoNode = NULL; }
//
// Get SecurityInformation for the file.
//
SecurityInformation = OWNER_SECURITY_INFORMATION | GROUP_SECURITY_INFORMATION | DACL_SECURITY_INFORMATION;
Status = NtQuerySecurityObject(FileHandle, SecurityInformation, NULL, 0, &LengthNeeded); ASSERT(STATUS_BUFFER_TOO_SMALL == Status);
SecurityDescriptor = RtlAllocateHeap(PsxHeap, 0, LengthNeeded); if (NULL == SecurityDescriptor) { m->Error = ENOMEM; goto out; }
Status = NtQuerySecurityObject(FileHandle, SecurityInformation, SecurityDescriptor, LengthNeeded, &LengthNeeded); ASSERT(NT_SUCCESS(Status));
Status = RtlGetControlSecurityDescriptor(SecurityDescriptor, &Control, &Revision); ASSERT(NT_SUCCESS(Status)); ASSERT(SECURITY_DESCRIPTOR_REVISION == Revision);
if (Control & SE_SELF_RELATIVE) { PSECURITY_DESCRIPTOR AbsSD; // SD in absolute format.
ULONG AbsSdSize = 0, DaclSize = 0, SaclSize = 0, OwnerSize = 0, GroupSize = 0;
//
// This security descriptor needs to be converted to absolute
// format.
//
Status = RtlSelfRelativeToAbsoluteSD(SecurityDescriptor, NULL, &AbsSdSize, NULL, &DaclSize, NULL, &SaclSize, NULL, &OwnerSize, NULL, &GroupSize); ASSERT(STATUS_BUFFER_TOO_SMALL == Status);
AbsSD = RtlAllocateHeap(PsxHeap, 0, AbsSdSize); pAbsSacl = RtlAllocateHeap(PsxHeap, 0, SaclSize); pAbsOwner = RtlAllocateHeap(PsxHeap, 0, OwnerSize); pAbsGroup = RtlAllocateHeap(PsxHeap, 0, GroupSize); pAbsDacl = RtlAllocateHeap(PsxHeap, 0, DaclSize);
if (NULL == AbsSD || NULL == pAbsDacl || NULL == pAbsSacl || NULL == pAbsOwner || NULL == pAbsGroup) { m->Error = ENOMEM; goto out; }
Status = RtlSelfRelativeToAbsoluteSD(SecurityDescriptor, AbsSD, &AbsSdSize, pAbsDacl, &DaclSize, pAbsSacl, &SaclSize, pAbsOwner, &OwnerSize, pAbsGroup, &GroupSize); ASSERT(NT_SUCCESS(Status));
pFreeSD = SecurityDescriptor; SecurityDescriptor = AbsSD; }
//
// Get the owner and group from the security descriptor
//
Status = RtlGetOwnerSecurityDescriptor(SecurityDescriptor, &NtOwner, &OwnerDefaulted); ASSERT(NT_SUCCESS(Status));
Status = RtlGetGroupSecurityDescriptor(SecurityDescriptor, &NtGroup, &GroupDefaulted); ASSERT(NT_SUCCESS(Status));
if (NULL == NtOwner || NULL == NtGroup) { //
// Seems like this file doesn't have an owner or a
// group, which means that we can't change it's group.
//
// XXX.mjb: ideally, would make the file owned by us if
// possible.
//
KdPrint(("PSXSS: PsxChown: no owner or no group\n")); m->Error = EPERM; goto out; }
Status = RtlGetDaclSecurityDescriptor(SecurityDescriptor, &DaclPresent, &pDacl, &DaclDefaulted); ASSERT(NT_SUCCESS(Status));
if (!DaclPresent || (DaclPresent && NULL == pDacl)) {
//
// All access is allowed to this file. We attach a Posix-
// type acl that allows all access.
//
ModeToAccessMask(0777, &UserAccess, &GroupAccess, &OtherAccess);
} else { Status = RtlInterpretPosixAcl(ACL_REVISION2, NtOwner, NtGroup, pDacl, &UserAccess, &GroupAccess, &OtherAccess); if (STATUS_COULD_NOT_INTERPRET == Status) { //
// There is an acl, but it is not in the Posix form.
// Ideally, we'd like to leave the resulting file
// with an ACL approximating the one we've foud there,
// but that's hard so we'll just do the easy thing.
//
ModeToAccessMask(0777, &UserAccess, &GroupAccess, &OtherAccess); } else if (!NT_SUCCESS(Status)) { KdPrint(("PSXSS: RtlInterpretPosixAcl: 0x%x\n", Status)); m->Error = EPERM; goto out; } }
if (0xFFF == args->Group) { //
// The login group is treated specially here.
//
NewGroup = GetLoginGroupSid(p); if (NULL == NewGroup) { m->Error = ENOMEM; goto out; } } else {
DomainSid = GetSidByOffset(args->Group & 0xFFFF0000); if (NULL == DomainSid) {
//
// Either we can't get to the domain, or the user
// specified an invalid group. Bad.
//
m->Error = EINVAL; goto out; }
NewGroup = MakeSid(DomainSid, args->Group & 0xFFFF); if (NULL == NewGroup) { m->Error = ENOMEM; goto out; } }
DomainSid = GetSidByOffset(args->Owner & 0xFFFF0000); if (NULL == DomainSid) { m->Error = EINVAL; goto out; }
NewUser = MakeSid(DomainSid, args->Owner & 0xFFFF); if (NULL == NewUser) { m->Error = ENOMEM; goto out; }
Status = RtlMakePosixAcl(ACL_REVISION2, NewUser, NewGroup, UserAccess, GroupAccess, OtherAccess, 0, NULL, &LengthNeeded); ASSERT(STATUS_BUFFER_TOO_SMALL == Status);
pDacl2 = RtlAllocateHeap(PsxHeap, 0, LengthNeeded); if (NULL == pDacl2) { m->Error = ENOMEM; goto out; }
Status = RtlMakePosixAcl(ACL_REVISION2, NewUser, NewGroup, UserAccess, GroupAccess, OtherAccess, LengthNeeded, pDacl2, &LengthNeeded); ASSERT(NT_SUCCESS(Status));
Status = RtlSetDaclSecurityDescriptor(SecurityDescriptor, TRUE, pDacl2, FALSE); if (!NT_SUCCESS(Status)) { KdPrint(("PSXSS: PsxChown: RtlSetDacl: 0x%x\n", Status)); m->Error = EPERM; goto out; }
Status = RtlSetGroupSecurityDescriptor(SecurityDescriptor, NewGroup, FALSE); ASSERT(NT_SUCCESS(Status));
Status = RtlSetOwnerSecurityDescriptor(SecurityDescriptor, NewUser, FALSE);
Status = NtImpersonateClientOfPort(p->ClientPort, (PPORT_MESSAGE)m);
if (NT_SUCCESS(Status)) { Status = NtSetSecurityObject(FileHandle, SecurityInformation, SecurityDescriptor); EndImpersonation(); }
if (!NT_SUCCESS(Status)) { m->Error = PsxStatusToErrno(Status); goto out; }
if (NULL != IoNode) { IoNode->GroupId = args->Group; }
out: NtClose(FileHandle);
if (NULL != SecurityDescriptor) { RtlFreeHeap(PsxHeap, 0, SecurityDescriptor); } if (NULL != NewGroup) { RtlFreeHeap(PsxHeap, 0, NewGroup); } if (NULL != NewUser) { RtlFreeHeap(PsxHeap, 0, NewUser); } if (NULL != pDacl2) { RtlFreeHeap(PsxHeap, 0, pDacl2); } if (NULL != pAbsDacl) { RtlFreeHeap(PsxHeap, 0, pAbsDacl); } if (NULL != pAbsSacl) { RtlFreeHeap(PsxHeap, 0, pAbsSacl); } if (NULL != pAbsOwner) { RtlFreeHeap(PsxHeap, 0, pAbsOwner); } if (NULL != pAbsGroup) { RtlFreeHeap(PsxHeap, 0, pAbsGroup); } if (NULL != pFreeSD) { RtlFreeHeap(PsxHeap, 0, pFreeSD); }
return TRUE; }
BOOLEAN PsxUtime( IN PPSX_PROCESS p, IN PPSX_API_MSG m ) /*++
Routine Description:
This procedure implements POSIX utime.
Arguments:
p - Supplies the address of the process making the call.
m - Supplies the address of the message associated with the utime request.
Return Value:
TRUE - The contents of *m should be used to generate a reply.
--*/ { PPSX_UTIME_MSG args; HANDLE FileHandle; NTSTATUS Status; IO_STATUS_BLOCK Iosb; OBJECT_ATTRIBUTES ObjA; UNICODE_STRING Path_U; FILE_BASIC_INFORMATION BasicInfo; LARGE_INTEGER Time;
args = &m->u.Utime;
if (!ISPOINTERVALID_CLIENT(p,args->Path_U.Buffer,args->Path_U.Length)) { KdPrint(("Invalid pointer to utime %lx\n", args->Path_U.Buffer)); m->Error = EINVAL; return TRUE; }
Path_U = args->Path_U;
InitializeObjectAttributes(&ObjA, &Path_U, 0, NULL, NULL);
Status = NtImpersonateClientOfPort(p->ClientPort, (PPORT_MESSAGE)m);
if (NT_SUCCESS(Status)) { Status = NtOpenFile(&FileHandle, SYNCHRONIZE | READ_CONTROL | FILE_WRITE_ATTRIBUTES, &ObjA, &Iosb, SHARE_ALL, FILE_SYNCHRONOUS_IO_NONALERT);
if (!NT_SUCCESS(Status)) { EndImpersonation(); } }
if (!NT_SUCCESS(Status)) { if (STATUS_OBJECT_PATH_NOT_FOUND == Status) { m->Error = PsxStatusToErrnoPath(&Path_U); return TRUE; } m->Error = PsxStatusToErrno(Status); return TRUE; }
//
// 1003.1-1990: EPERM when the /times/ argument is not
// NULL, the calling process has write access to the file,
// but is not the owner of the file. Here we're denying
// access to the file that NT would grant.
//
if (NULL != args->TimesSpecified) { struct stat StatBuf;
StatBuf.st_uid = 0; // in case FindOwnerModeFile fails
FindOwnerModeFile(FileHandle, &StatBuf);
if (StatBuf.st_uid != p->EffectiveUid) { UCHAR buf[sizeof(FILE_FS_ATTRIBUTE_INFORMATION) + 128 * sizeof(WCHAR)]; PFILE_FS_ATTRIBUTE_INFORMATION pFSInfo = (PVOID)buf;
// We ignore this test for all but NTFS
Status = NtQueryVolumeInformationFile(FileHandle, &Iosb, buf, sizeof(buf), FileFsAttributeInformation); ASSERT(NT_SUCCESS(Status));
pFSInfo->FileSystemName[pFSInfo->FileSystemNameLength/2] = 0; if (0 == wcscmp(L"NTFS", pFSInfo->FileSystemName) || 0 == wcscmp(L"OFS", pFSInfo->FileSystemName)) {
NtClose(FileHandle); m->Error = EPERM; EndImpersonation(); return TRUE; } } }
EndImpersonation();
RtlZeroMemory(&Time, sizeof(Time)); BasicInfo.CreationTime = Time; BasicInfo.ChangeTime = Time; BasicInfo.FileAttributes = 0;
//
// If the utimbuf is NULL, we're to set the file times to the current
// time. The owner and anyone else with write permission on the file
// should be able to perform this operation. If times are specified
// via a utimbuf, only the owner should be able to perform the
// operation.
//
if (args->TimesSpecified == NULL) { NtQuerySystemTime(&Time);
BasicInfo.LastAccessTime = Time; BasicInfo.LastWriteTime = Time; } else { RtlSecondsSince1970ToTime((ULONG)(args->Times.actime), &Time); BasicInfo.LastAccessTime = Time;
RtlSecondsSince1970ToTime((ULONG)(args->Times.modtime), &Time); BasicInfo.LastWriteTime = Time; }
Status = NtImpersonateClientOfPort(p->ClientPort, (PPORT_MESSAGE)m);
if (NT_SUCCESS(Status)) { Status = NtSetInformationFile(FileHandle, &Iosb, &BasicInfo, sizeof(BasicInfo), FileBasicInformation);
EndImpersonation(); }
if (!NT_SUCCESS(Status)) { m->Error = PsxStatusToErrno(Status); //FALL OUT
}
NtClose(FileHandle);
return TRUE; }
BOOLEAN PsxFcntl( IN PPSX_PROCESS p, IN PPSX_API_MSG m )
/*++
Routine Description:
This procedure implements POSIX fcntl().
Arguments:
p - Supplies the address of the process making the call.
m - Supplies the address of the message associated with the request.
Return Value:
TRUE - The contents of *m should be used to generate a reply. FALSE - No reply should be sent, for the case in which the process was blocked (as in F_SETLKW).
--*/
{ PPSX_FCNTL_MSG args; PFILEDESCRIPTOR pFd, pFdDup; NTSTATUS Status; BOOLEAN b; int error;
args = &m->u.Fcntl;
pFd = FdIndexToFd(p, args->FileDes); if (NULL == pFd) { m->Error = EBADF; return TRUE; }
switch (args->Command) { case F_DUPFD: if (!ISFILEDESINRANGE(args->u.i)) { m->Error = EINVAL; return TRUE; } pFdDup = AllocateFd(p, args->u.i, &m->ReturnValue); if (NULL == pFdDup) { // no descriptors are available
m->Error = EMFILE; return TRUE; } ASSERT(NULL != pFd->SystemOpenFileDesc->IoNode->IoVectors->DupRoutine); return (pFd->SystemOpenFileDesc->IoNode->IoVectors->DupRoutine) (p, m, pFd, pFdDup); case F_GETFD: //
// File descriptor flags
//
m->ReturnValue = 0; if (pFd->Flags & PSX_FD_CLOSE_ON_EXEC) { m->ReturnValue |= FD_CLOEXEC; } return TRUE; case F_SETFD: pFd->Flags = 0; if (args->u.i & FD_CLOEXEC) { pFd->Flags |= PSX_FD_CLOSE_ON_EXEC; } m->ReturnValue = 0; return TRUE;
case F_GETFL: //
// Get file description flags
//
if ((pFd->SystemOpenFileDesc->Flags & (PSX_FD_READ | PSX_FD_WRITE)) == (PSX_FD_READ | PSX_FD_WRITE)) { m->ReturnValue |= O_RDWR; } else if (pFd->SystemOpenFileDesc->Flags & PSX_FD_READ) { m->ReturnValue |= O_RDONLY; } else if (pFd->SystemOpenFileDesc->Flags & PSX_FD_WRITE) { m->ReturnValue |= O_WRONLY; } if (pFd->SystemOpenFileDesc->Flags & PSX_FD_NOBLOCK) { m->ReturnValue |= O_NONBLOCK; } if (pFd->SystemOpenFileDesc->Flags & PSX_FD_APPEND) { m->ReturnValue |= O_APPEND; } return TRUE; case F_SETFL: pFd->SystemOpenFileDesc->Flags &= ~(PSX_FD_APPEND | PSX_FD_NOBLOCK); if (args->u.i & O_APPEND) { pFd->SystemOpenFileDesc->Flags |= PSX_FD_APPEND; } if (args->u.i & O_NONBLOCK) { pFd->SystemOpenFileDesc->Flags |= PSX_FD_NOBLOCK; } m->ReturnValue = 0; return TRUE;
case F_SETLK: case F_SETLKW: //
// 1003.1-90 (6.5.2.4): EBADF if F_SETLK or F_SETLKW and
// l_type is F_RDLCK and fildes is not ... open for reading.
//
if (F_RDLCK == args->u.pf->l_type && !(pFd->SystemOpenFileDesc->Flags & PSX_FD_READ)) { m->Error = EBADF; m->ReturnValue = (ULONG)(-1); return TRUE; }
//
// ... EBADF if F_SETLK or F_SETLKW and l_type is F_WRLCK
// and fildes is not ... open for writing.
//
if (F_WRLCK == args->u.pf->l_type && !(pFd->SystemOpenFileDesc->Flags & PSX_FD_WRITE)) { m->Error = EBADF; m->ReturnValue = (ULONG)(-1); return TRUE; }
//FALLTHROUGH
case F_GETLK:
if (!(pFd->SystemOpenFileDesc->IoNode->Mode & S_IFREG)) { //
// flocks only work on regular files
//
m->Error = EINVAL; m->ReturnValue = (ULONG)(-1); }
RtlEnterCriticalSection(&pFd->SystemOpenFileDesc->IoNode->IoNodeLock);
b = DoFlockStuff(p, m, args->Command, pFd, args->u.pf, &error);
if (b) { RtlLeaveCriticalSection(&pFd->SystemOpenFileDesc->IoNode->IoNodeLock); }
m->Error = error; if (error == 0) { m->ReturnValue = 0; } else { m->ReturnValue = (ULONG)(-1); } //
// DoFlockStuff returns FALSE if the process was
// blocked and no reply should be sent.
//
return b; #if DBG
case 99: DumpFlockList(pFd->SystemOpenFileDesc->IoNode); break; #endif
default: // This shouldn't happen; the client checks for valid
// command arguments.
ASSERT(0); } return TRUE; }
BOOLEAN PsxIsatty( IN PPSX_PROCESS p, IN OUT PPSX_API_MSG m ) { PPSX_ISATTY_MSG args; NTSTATUS Status; PFILEDESCRIPTOR Fd;
args = &m->u.Isatty;
Fd = FdIndexToFd(p, args->FileDes); if (!Fd) { m->Error = EBADF; return TRUE; }
if (&ConVectors == Fd->SystemOpenFileDesc->IoNode->IoVectors) { //
// If the fd is open on the console, it's not
// necessarily a tty, since the console session manager
// could have redirected the output. The dll will send
// a message to posix.exe, asking whether it's redirected
// or not.
//
args->Command = IO_COMMAND_DO_CONSIO; args->FileDes = HandleToUlong(Fd->SystemOpenFileDesc->NtIoHandle); return TRUE; } args->Command = IO_COMMAND_DONE;
m->ReturnValue = FALSE; // not a tty
return TRUE; }
BOOLEAN PsxFtruncate( IN PPSX_PROCESS p, IN PPSX_API_MSG m )
/*++
Routine Description:
This procedure implements POSIX ftruncate().
Arguments:
p - Supplies the address of the process making the call.
m - Supplies the address of the message associated with the request.
Return Value:
TRUE - The contents of *m should be used to generate a reply.
--*/
{ PPSX_FTRUNCATE_MSG args; PFILEDESCRIPTOR Fd; FILE_END_OF_FILE_INFORMATION EofInfo; NTSTATUS Status; IO_STATUS_BLOCK iosb;
args = &m->u.Ftruncate;
Fd = FdIndexToFd(p, args->FileDes);
if (!Fd) { m->Error = EBADF; return TRUE; }
//
// Ftruncate is only allowed on regular files.
//
if (S_ISFIFO(Fd->SystemOpenFileDesc->IoNode->Mode) || Fd->SystemOpenFileDesc->IoNode->DeviceSerialNumber == PSX_LOCAL_PIPE) { m->Error = ESPIPE; return TRUE; }
if (&FileVectors != Fd->SystemOpenFileDesc->IoNode->IoVectors) { m->Error = EBADF; return TRUE; }
EofInfo.EndOfFile.QuadPart = args->Length;
Status = NtSetInformationFile( Fd->SystemOpenFileDesc->NtIoHandle, &iosb, (PVOID)&EofInfo, sizeof(EofInfo), FileEndOfFileInformation );
if (!NT_SUCCESS(Status)) { m->Error = PsxStatusToErrno(Status); }
return TRUE; }
//
// Internal support routine
//
// InitSecurityDescriptor -- to be called when a new file is created. Sets
// up the security descriptor appropriately.
//
// The filename is used only to get the name of the parent direcotory,
// which we use to set the group in the security descriptor.
//
NTSTATUS InitSecurityDescriptor( PSECURITY_DESCRIPTOR pSD, PUNICODE_STRING pFileName, IN HANDLE Process, IN mode_t Mode, OUT PVOID *pvMem ) { PSID_AND_ATTRIBUTES pSA; HANDLE TokenHandle; ULONG Length, LengthNeeded; NTSTATUS Status; PACL pDacl; ACCESS_MASK UserAccess, GroupAccess, OtherAccess; ANSI_STRING File_A; UNICODE_STRING ParentDir_U; OBJECT_ATTRIBUTES Obj; HANDLE DirHandle; PSID DirGroup; PCHAR pch; IO_STATUS_BLOCK Iosb; SECURITY_INFORMATION SecurityInformation; PSECURITY_DESCRIPTOR pDirSD = NULL; PTOKEN_PRIMARY_GROUP pGroup = NULL; BOOLEAN Defaulted; int i;
Status = RtlUnicodeStringToAnsiString(&File_A, pFileName, TRUE); if (!NT_SUCCESS(Status)) { return STATUS_NO_MEMORY; }
//
// Open the parent directory and get its group owner.
//
pch = strrchr(File_A.Buffer, '\\') + 1; if (pch == NULL) return STATUS_OBJECT_PATH_SYNTAX_BAD; *pch = '\0'; File_A.Length = (USHORT)strlen(File_A.Buffer);
Status = RtlAnsiStringToUnicodeString(&ParentDir_U, &File_A, TRUE); RtlFreeAnsiString(&File_A); if (!NT_SUCCESS(Status)) { return STATUS_NO_MEMORY; }
InitializeObjectAttributes(&Obj, &ParentDir_U, 0, NULL, NULL); Status = NtOpenFile(&DirHandle, SYNCHRONIZE | READ_CONTROL | FILE_READ_ATTRIBUTES | FILE_READ_EA, &Obj, &Iosb, SHARE_ALL, FILE_SYNCHRONOUS_IO_NONALERT | FILE_DIRECTORY_FILE);
RtlFreeUnicodeString(&ParentDir_U); if (!NT_SUCCESS(Status)) { return Status; }
Status = NtOpenProcessToken(Process, GENERIC_READ, &TokenHandle); if (!NT_SUCCESS(Status)) { NtClose(DirHandle); return Status; }
SecurityInformation = GROUP_SECURITY_INFORMATION;
Status = NtQuerySecurityObject(DirHandle, SecurityInformation, NULL, 0, &LengthNeeded);
if (STATUS_INVALID_PARAMETER == Status) { //
// Can't get the group from parent dir, use primary group
// instead.
//
Status = NtQueryInformationToken(TokenHandle, TokenPrimaryGroup, NULL, 0, &LengthNeeded); ASSERT(STATUS_BUFFER_TOO_SMALL == Status);
pGroup = RtlAllocateHeap(PsxHeap, 0, LengthNeeded); if (NULL == pGroup) { NtClose(TokenHandle); return STATUS_NO_MEMORY; }
Status = NtQueryInformationToken(TokenHandle, TokenPrimaryGroup, pGroup, LengthNeeded, &LengthNeeded); ASSERT(NT_SUCCESS(Status));
DirGroup = pGroup->PrimaryGroup;
} else if (!NT_SUCCESS(Status)) {
static int _status;
_status = Status;
if (STATUS_BUFFER_TOO_SMALL != _status || 0 == LengthNeeded) { KdPrint(("PSXSS: NtQSObject returned unexpected %x, %x\n", _status, LengthNeeded)); return _status; }
ASSERT(STATUS_BUFFER_TOO_SMALL == _status);
pDirSD = RtlAllocateHeap(PsxHeap, 0, LengthNeeded); if (NULL == pDirSD) { NtClose(DirHandle); return STATUS_NO_MEMORY; }
Status = NtQuerySecurityObject(DirHandle, SecurityInformation, pDirSD, LengthNeeded, &Length); if (!NT_SUCCESS(Status)) { KdPrint(("PSXSS: NtQSD: 0x%x\n", Status)); KdPrint(("PSXSS: NtQSD: %d vs. %d\n", LengthNeeded, Length)); return Status; }
NtClose(DirHandle);
Status = RtlGetGroupSecurityDescriptor(pDirSD, &DirGroup, &Defaulted); ASSERT(NT_SUCCESS(Status)); }
Status = RtlCreateSecurityDescriptor(pSD, SECURITY_DESCRIPTOR_REVISION); ASSERT(NT_SUCCESS(Status));
Status = NtQueryInformationToken(TokenHandle, TokenUser, NULL, 0, &LengthNeeded); ASSERT(STATUS_BUFFER_TOO_SMALL == Status);
pSA = RtlAllocateHeap(PsxHeap, 0, LengthNeeded); if (NULL == pSA) { NtClose(TokenHandle); return STATUS_NO_MEMORY; }
Status = NtQueryInformationToken(TokenHandle, TokenUser, pSA, LengthNeeded, &LengthNeeded); if (!NT_SUCCESS(Status)) { KdPrint(("PSXSS: NtQueryInfoToken: 0x%x\n", Status)); } ASSERT(NT_SUCCESS(Status));
Status = RtlSetOwnerSecurityDescriptor(pSD, pSA->Sid, FALSE); ASSERT(NT_SUCCESS(Status));
Status = RtlSetGroupSecurityDescriptor(pSD, DirGroup, FALSE); ASSERT(NT_SUCCESS(Status));
ModeToAccessMask(Mode, &UserAccess, &GroupAccess, &OtherAccess);
Status = RtlMakePosixAcl(ACL_REVISION2, pSA->Sid, DirGroup, UserAccess, GroupAccess, OtherAccess, 0, NULL, &LengthNeeded); ASSERT(STATUS_BUFFER_TOO_SMALL == Status);
pDacl = RtlAllocateHeap(PsxHeap, 0, LengthNeeded); if (NULL == pDacl) { // XXX.mjb: better cleanup needed
NtClose(TokenHandle); return STATUS_NO_MEMORY; }
Status = RtlMakePosixAcl(ACL_REVISION2, pSA->Sid, DirGroup, UserAccess, GroupAccess, OtherAccess, LengthNeeded, pDacl, &LengthNeeded); ASSERT(NT_SUCCESS(Status));
Status = RtlSetDaclSecurityDescriptor(pSD, TRUE, pDacl, FALSE); ASSERT(NT_SUCCESS(Status));
//
// The pointers we stick into pvMem will be freed in DeInitSD.
//
i = 0;
pvMem[i++] = pDacl; pvMem[i++] = pSA; if (NULL != pDirSD) { pvMem[i++] = pDirSD; } if (NULL != pGroup) { pvMem[i++] = pGroup; } pvMem[i++] = NULL;
NtClose(TokenHandle);
ASSERT(RtlValidSecurityDescriptor(pSD));
return STATUS_SUCCESS; }
//
// Internal support routine
//
// This routine should only be called on SD's initialized with
// InitSecurityDescriptor(). It frees memory that was allocated
// there.
//
VOID DeInitSecurityDescriptor( PSECURITY_DESCRIPTOR pSD, PVOID *pvMem ) { PACL pDacl; NTSTATUS Status; BOOLEAN b; int i;
for (i = 0; NULL != pvMem[i]; ++i) RtlFreeHeap(PsxHeap, 0, pvMem[i]);
#if 0
Status = RtlGetDaclSecurityDescriptor(pSD, &b, &pDacl, &b); ASSERT(NT_SUCCESS(Status)); ASSERT(NULL != pDacl);
RtlFreeHeap(PsxHeap, 0, pDacl); #endif
}
//
// Internal support routine
//
// See if the given group is one that the owner of this process belongs
// to.
//
static BOOLEAN IsUserInGroup( PPSX_PROCESS p, PSID Group ) { HANDLE TokenHandle; TOKEN_GROUPS *pGroups; ULONG LengthNeeded; NTSTATUS Status; BOOLEAN RetVal = FALSE; ULONG i;
Status = NtOpenProcessToken(p->Process, GENERIC_READ, &TokenHandle); ASSERT(NT_SUCCESS(Status));
Status = NtQueryInformationToken(TokenHandle, TokenGroups, NULL, 0, &LengthNeeded); ASSERT(STATUS_BUFFER_TOO_SMALL == Status);
pGroups = RtlAllocateHeap(PsxHeap, 0, LengthNeeded); if (NULL == pGroups) { NtClose(TokenHandle); return FALSE; }
Status = NtQueryInformationToken(TokenHandle, TokenGroups, pGroups, LengthNeeded, &LengthNeeded); ASSERT(NT_SUCCESS(Status));
for (i = 0; i < pGroups->GroupCount; ++i) { if (RtlEqualSid(pGroups->Groups[i].Sid, Group)) { RetVal = TRUE; break; } }
RtlFreeHeap(PsxHeap, 0, pGroups); NtClose(TokenHandle); return RetVal; }
//
// Internal support routine
//
PSID GetLoginGroupSid( IN PPSX_PROCESS p ) /*++
Get the logon group Sid from the supplementary group list. The returned Sid is allocated from PsxHeap, and should be freed by the caller when he's done with it.
Returns NULL upon failure.
--*/ { HANDLE TokenHandle; NTSTATUS Status; PSID NewSid; ULONG outlen, i; TOKEN_GROUPS *pGroups;
Status = NtOpenProcessToken(p->Process, GENERIC_READ, &TokenHandle); if (!NT_SUCCESS(Status)) { return NULL; }
Status = NtQueryInformationToken(TokenHandle, TokenGroups, NULL, 0, &outlen); ASSERT(STATUS_BUFFER_TOO_SMALL == Status);
pGroups = RtlAllocateHeap(PsxHeap, 0, outlen); if (NULL == pGroups) { NtClose(TokenHandle); return NULL; }
Status = NtQueryInformationToken(TokenHandle, TokenGroups, pGroups, outlen, &outlen); if (!NT_SUCCESS(Status)) { RtlFreeHeap(PsxHeap, 0, pGroups); NtClose(TokenHandle); return NULL; }
for (i = 0; i < pGroups->GroupCount; ++i) { PSID Sid = pGroups->Groups[i].Sid;
if (0xFFF == MakePosixId(Sid)) { // This is the login group sid, copy it and return.
NewSid = RtlAllocateHeap(PsxHeap, 0, RtlLengthSid(Sid)); if (NULL == NewSid) return NULL;
Status = RtlCopySid(RtlLengthSid(Sid), NewSid, Sid); ASSERT(NT_SUCCESS(Status));
RtlFreeHeap(PsxHeap, 0, pGroups); NtClose(TokenHandle); return NewSid; } } RtlFreeHeap(PsxHeap, 0, pGroups); NtClose(TokenHandle); return NULL; }
//
// Internal support routine
//
ULONG OpenTty( PPSX_PROCESS p, PFILEDESCRIPTOR Fd, ULONG DesiredAccess, ULONG Flags, BOOLEAN NewOpen ) /*++
Routine Description:
This routine is called to implement an open on the file /dev/tty.
Arguments:
p - The process on whose behalf the open is performed. Fd - The file descriptor to receive the handle. DesiredAccess - The access requested on the file. Flags - NewOpen - FALSE if the file is already open in the console session manager. This will be the case for stdin, stdout, and stderr. If NewOepn is TRUE, we're opening /dev/tty an additional time, and we want the console sess mgr to open con: again, to go along.
Return Value:
A posix error status, or 0 if successful.
--*/ { SCREQUESTMSG Request; NTSTATUS Status;
Fd->SystemOpenFileDesc = AllocateSystemOpenFile(); if (NULL == Fd->SystemOpenFileDesc) { return ENOMEM; }
if (DesiredAccess & FILE_READ_DATA) { Fd->SystemOpenFileDesc->Flags |= PSX_FD_READ; } if (DesiredAccess & (FILE_WRITE_DATA | FILE_APPEND_DATA)) { Fd->SystemOpenFileDesc->Flags |= PSX_FD_WRITE; }
if (Flags & O_NONBLOCK) { Fd->SystemOpenFileDesc->Flags |= PSX_FD_NOBLOCK; } if (Flags & O_APPEND) { Fd->SystemOpenFileDesc->Flags |= PSX_FD_APPEND; }
if (ReferenceOrCreateIoNode(PSX_CONSOLE_DEV, (ULONG_PTR)p->PsxSession->Terminal->ConsolePort, FALSE, &Fd->SystemOpenFileDesc->IoNode)) { // null
} else { if (! Fd->SystemOpenFileDesc->IoNode) { DeallocateSystemOpenFile(p, Fd->SystemOpenFileDesc); return ENOMEM; } Fd->SystemOpenFileDesc->IoNode->IoVectors = &ConVectors; Fd->SystemOpenFileDesc->IoNode->Mode = S_IFCHR | 0700; Fd->SystemOpenFileDesc->IoNode->OwnerId = p->EffectiveUid; Fd->SystemOpenFileDesc->IoNode->GroupId = p->EffectiveGid; } RtlLeaveCriticalSection(&Fd->SystemOpenFileDesc->IoNode->IoNodeLock);
(void)IoOpenNewHandle(p, Fd, NULL);
Fd->SystemOpenFileDesc->Terminal = p->PsxSession->Terminal;
//
// Add a reference to the terminal (there is an additional
// file descriptor open on it).
//
++Fd->SystemOpenFileDesc->Terminal->ReferenceCount;
if (!NewOpen) { return 0; }
//
// Send a message to posix.exe, asking him to open the
// console again.
//
Request.Request = ConRequest; Request.d.Con.Request = ScOpenFile;
if (DesiredAccess & FILE_WRITE_DATA) { Request.d.Con.d.IoBuf.Flags = O_WRONLY; } else { Request.d.Con.d.IoBuf.Flags = O_RDONLY; }
PORT_MSG_TOTAL_LENGTH(Request) = sizeof(SCREQUESTMSG); PORT_MSG_DATA_LENGTH(Request) = sizeof(SCREQUESTMSG) - sizeof(PORT_MESSAGE); PORT_MSG_ZERO_INIT(Request) = 0;
// XXX.mjb: hold session mgr lock
Status = NtRequestWaitReplyPort(p->PsxSession->Terminal->ConsolePort, (PPORT_MESSAGE)&Request, (PPORT_MESSAGE)&Request); if (!NT_SUCCESS(Status)) { KdPrint(("PSXSS: NtRequest: 0x%x\n", Status)); } ASSERT(NT_SUCCESS(Status));
// XXX.mjb: release session mgr lock
Fd->SystemOpenFileDesc->NtIoHandle = Request.d.Con.d.IoBuf.Handle;
return 0; }
//
// Internal support routine
//
ULONG OpenDevNull( PPSX_PROCESS p, PFILEDESCRIPTOR Fd, ULONG DesiredAccess, ULONG Flags ) /*++
Routine Description:
This routine is called to implement an open on the file /dev/null.
Arguments:
p - The process on whose behalf the open is performed. Fd - The file descriptor to receive the handle. DesiredAccess - The access requested on the file. Flags - NewOpen - FALSE if the file is already open in the console session manager. This will be the case for stdin, stdout, and stderr. If NewOepn is TRUE, we're opening /dev/tty an additional time, and we want the console sess mgr to open con: again, to go along.
Return Value:
A posix error status, or 0 if successful.
--*/ { NTSTATUS Status;
Fd->SystemOpenFileDesc = AllocateSystemOpenFile(); if (NULL == Fd->SystemOpenFileDesc) { return ENOMEM; }
if (DesiredAccess & FILE_READ_DATA) { Fd->SystemOpenFileDesc->Flags |= PSX_FD_READ; } if (DesiredAccess & (FILE_WRITE_DATA | FILE_APPEND_DATA)) { Fd->SystemOpenFileDesc->Flags |= PSX_FD_WRITE; }
if (Flags & O_NONBLOCK) { Fd->SystemOpenFileDesc->Flags |= PSX_FD_NOBLOCK; } if (Flags & O_APPEND) { Fd->SystemOpenFileDesc->Flags |= PSX_FD_APPEND; }
if (ReferenceOrCreateIoNode(PSX_NULL_DEV, (ino_t)0, FALSE, &Fd->SystemOpenFileDesc->IoNode)) { // null
} else { if (! Fd->SystemOpenFileDesc->IoNode) { DeallocateSystemOpenFile(p, Fd->SystemOpenFileDesc); return ENOMEM; } Fd->SystemOpenFileDesc->IoNode->IoVectors = &NullVectors; Fd->SystemOpenFileDesc->IoNode->Mode = S_IFCHR | 0666; Fd->SystemOpenFileDesc->IoNode->OwnerId = p->EffectiveUid; Fd->SystemOpenFileDesc->IoNode->GroupId = p->EffectiveGid; } RtlLeaveCriticalSection(&Fd->SystemOpenFileDesc->IoNode->IoNodeLock);
(void)IoOpenNewHandle(p, Fd, NULL);
Fd->SystemOpenFileDesc->Terminal = NULL;
return 0; }
//
// Internal support routine
//
dev_t GetFileDeviceNumber( PUNICODE_STRING Path ) /*++
Routine Description:
Takes a path, like \DosDevices\X:\foo\bar, and returns the device number, which in this case is 'X'.
Arguments:
Path - the path.
Return Value:
The device number. --*/ { wchar_t ch; if (NtCurrentPeb()->SessionId) { ULONG len; PSX_GET_STRLEN(DOSDEVICE_X_A,len); ch = Path->Buffer[len-3]; }else{ ch = Path->Buffer[12]; } return (dev_t)ch; }
|