mirror of
https://github.com/winfsp/winfsp.git
synced 2025-04-23 00:43:00 -05:00
sys: IRP_MJ_CREATE
This commit is contained in:
parent
e56f3ac151
commit
9538eea1f1
@ -70,7 +70,6 @@ static NTSTATUS FspFsvolCreate(
|
|||||||
PSECURITY_DESCRIPTOR SecurityDescriptor = AccessState->SecurityDescriptor;
|
PSECURITY_DESCRIPTOR SecurityDescriptor = AccessState->SecurityDescriptor;
|
||||||
ULONG SecurityDescriptorSize = 0;
|
ULONG SecurityDescriptorSize = 0;
|
||||||
LARGE_INTEGER AllocationSize = Irp->Overlay.AllocationSize;
|
LARGE_INTEGER AllocationSize = Irp->Overlay.AllocationSize;
|
||||||
HANDLE AccessToken;
|
|
||||||
ACCESS_MASK DesiredAccess = IrpSp->Parameters.Create.SecurityContext->DesiredAccess;
|
ACCESS_MASK DesiredAccess = IrpSp->Parameters.Create.SecurityContext->DesiredAccess;
|
||||||
USHORT ShareAccess = IrpSp->Parameters.Create.ShareAccess;
|
USHORT ShareAccess = IrpSp->Parameters.Create.ShareAccess;
|
||||||
PFILE_FULL_EA_INFORMATION EaBuffer = Irp->AssociatedIrp.SystemBuffer;
|
PFILE_FULL_EA_INFORMATION EaBuffer = Irp->AssociatedIrp.SystemBuffer;
|
||||||
@ -272,22 +271,6 @@ static NTSTATUS FspFsvolCreate(
|
|||||||
RtlCopyMemory(Request->Buffer + Request->Req.Create.SecurityDescriptor,
|
RtlCopyMemory(Request->Buffer + Request->Req.Create.SecurityDescriptor,
|
||||||
SecurityDescriptor, SecurityDescriptorSize);
|
SecurityDescriptor, SecurityDescriptorSize);
|
||||||
|
|
||||||
/* open a kernel-mode access token handle for later access checks */
|
|
||||||
Result = ObOpenObjectByPointer(
|
|
||||||
SeQuerySubjectContextToken(&AccessState->SubjectSecurityContext),
|
|
||||||
OBJ_KERNEL_HANDLE, 0, 0, *SeTokenObjectType, KernelMode, &AccessToken);
|
|
||||||
if (!NT_SUCCESS(Result))
|
|
||||||
{
|
|
||||||
FspFileContextDelete(FsContext);
|
|
||||||
goto exit;
|
|
||||||
}
|
|
||||||
Irp->Tail.Overlay.DriverContext[1] = AccessToken;
|
|
||||||
|
|
||||||
/* if the user-mode file system is doing access checks, send it the access token */
|
|
||||||
if (FsvrtDeviceExtension->VolumeParams.NoSystemAccessCheck)
|
|
||||||
/* send the kernel-mode handle and change it into a user-mode handle at prepare time */
|
|
||||||
Request->Req.Create.AccessToken = (UINT_PTR)AccessToken;
|
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Post the IRP to our Ioq; we do this here instead of at FSP_LEAVE_MJ time,
|
* Post the IRP to our Ioq; we do this here instead of at FSP_LEAVE_MJ time,
|
||||||
* so that we can FspFileContextDelete() on failure.
|
* so that we can FspFileContextDelete() on failure.
|
||||||
@ -301,6 +284,8 @@ static NTSTATUS FspFsvolCreate(
|
|||||||
goto exit;
|
goto exit;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Result = STATUS_PENDING;
|
||||||
|
|
||||||
exit:;
|
exit:;
|
||||||
}
|
}
|
||||||
finally
|
finally
|
||||||
@ -308,7 +293,7 @@ static NTSTATUS FspFsvolCreate(
|
|||||||
FspDeviceRelease(FsvrtDeviceObject);
|
FspDeviceRelease(FsvrtDeviceObject);
|
||||||
}
|
}
|
||||||
|
|
||||||
return STATUS_PENDING;
|
return Result;
|
||||||
}
|
}
|
||||||
|
|
||||||
NTSTATUS FspFsvolCreatePrepare(
|
NTSTATUS FspFsvolCreatePrepare(
|
||||||
@ -316,36 +301,26 @@ NTSTATUS FspFsvolCreatePrepare(
|
|||||||
{
|
{
|
||||||
FSP_ENTER_IOP(PAGED_CODE());
|
FSP_ENTER_IOP(PAGED_CODE());
|
||||||
|
|
||||||
HANDLE KernelModeAccessToken = (HANDLE)Request->Req.Create.AccessToken;
|
|
||||||
HANDLE UserModeAccessToken;
|
|
||||||
PACCESS_TOKEN AccessToken;
|
|
||||||
|
|
||||||
/* if we are doing access checks, there is nothing to prepare */
|
|
||||||
if (0 == KernelModeAccessToken)
|
|
||||||
FSP_RETURN(Result = STATUS_SUCCESS);
|
|
||||||
|
|
||||||
/*
|
|
||||||
* The user-mode file system is doing access checks. We must convert the kernel-mode
|
|
||||||
* access token handle to user-mode and send it to them.
|
|
||||||
*/
|
|
||||||
|
|
||||||
FSP_FSVOL_DEVICE_EXTENSION *FsvolDeviceExtension = FspFsvolDeviceExtension(IrpSp->DeviceObject);
|
FSP_FSVOL_DEVICE_EXTENSION *FsvolDeviceExtension = FspFsvolDeviceExtension(IrpSp->DeviceObject);
|
||||||
ASSERT(FspFsvolDeviceExtensionKind == FsvolDeviceExtension->Base.Kind);
|
ASSERT(FspFsvolDeviceExtensionKind == FsvolDeviceExtension->Base.Kind);
|
||||||
|
|
||||||
Request->Req.Create.AccessToken = 0;
|
/* it is not necessary to retain the FsvrtDeviceObject; our callers have already done so */
|
||||||
Irp->Tail.Overlay.DriverContext[1] = 0;
|
PDEVICE_OBJECT FsvrtDeviceObject = FsvolDeviceExtension->FsvrtDeviceObject;
|
||||||
|
FSP_FSVRT_DEVICE_EXTENSION *FsvrtDeviceExtension = FspFsvrtDeviceExtension(FsvrtDeviceObject);
|
||||||
|
|
||||||
/* get a pointer to the access token */
|
/* if we are doing access checks, nothing to do */
|
||||||
Result = ObReferenceObjectByHandle(KernelModeAccessToken,
|
if (!FsvrtDeviceExtension->VolumeParams.NoSystemAccessCheck)
|
||||||
0, *SeTokenObjectType, KernelMode, &AccessToken, 0);
|
{
|
||||||
ObCloseHandle(KernelModeAccessToken, KernelMode);
|
ASSERT(0 == Request->Req.Create.AccessToken);
|
||||||
if (!NT_SUCCESS(Result))
|
FSP_RETURN(Result = STATUS_SUCCESS);
|
||||||
FSP_RETURN();
|
}
|
||||||
|
|
||||||
|
PACCESS_STATE AccessState = IrpSp->Parameters.Create.SecurityContext->AccessState;
|
||||||
|
HANDLE UserModeAccessToken;
|
||||||
|
|
||||||
/* get a user-mode handle to the access token */
|
/* get a user-mode handle to the access token */
|
||||||
Result = ObOpenObjectByPointer(AccessToken,
|
Result = ObOpenObjectByPointer(SeQuerySubjectContextToken(&AccessState->SubjectSecurityContext),
|
||||||
0, 0, TOKEN_QUERY, *SeTokenObjectType, UserMode, &UserModeAccessToken);
|
0, 0, TOKEN_QUERY, *SeTokenObjectType, UserMode, &UserModeAccessToken);
|
||||||
ObDereferenceObject(AccessToken);
|
|
||||||
if (!NT_SUCCESS(Result))
|
if (!NT_SUCCESS(Result))
|
||||||
FSP_RETURN();
|
FSP_RETURN();
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user