mirror of
https://github.com/winfsp/winfsp.git
synced 2025-04-23 00:43:00 -05:00
tst: winfsp-tests: backup/restore privilege testing
This commit is contained in:
parent
0dd452fac1
commit
b194a33406
@ -399,7 +399,7 @@ void create_notraverse_dotest(ULONG Flags, PWSTR Prefix)
|
|||||||
Success = CreateDirectory(FilePath, &SecurityAttributes);
|
Success = CreateDirectory(FilePath, &SecurityAttributes);
|
||||||
ASSERT(Success);
|
ASSERT(Success);
|
||||||
|
|
||||||
Success = LookupPrivilegeValue(0, SE_CHANGE_NOTIFY_NAME, &Luid);
|
Success = LookupPrivilegeValueW(0, SE_CHANGE_NOTIFY_NAME, &Luid);
|
||||||
ASSERT(Success);
|
ASSERT(Success);
|
||||||
Success = OpenProcessToken(GetCurrentProcess(), TOKEN_ADJUST_PRIVILEGES, &Token);
|
Success = OpenProcessToken(GetCurrentProcess(), TOKEN_ADJUST_PRIVILEGES, &Token);
|
||||||
ASSERT(Success);
|
ASSERT(Success);
|
||||||
@ -477,6 +477,253 @@ void create_notraverse_test(void)
|
|||||||
create_notraverse_dotest(MemfsNet, L"\\\\memfs\\share");
|
create_notraverse_dotest(MemfsNet, L"\\\\memfs\\share");
|
||||||
}
|
}
|
||||||
|
|
||||||
|
void create_backup_dotest(ULONG Flags, PWSTR Prefix)
|
||||||
|
{
|
||||||
|
void *memfs = memfs_start(Flags);
|
||||||
|
|
||||||
|
LUID Luid;
|
||||||
|
PRIVILEGE_SET RequiredPrivileges;
|
||||||
|
TOKEN_PRIVILEGES Privileges;
|
||||||
|
HANDLE Token;
|
||||||
|
BOOL Success;
|
||||||
|
|
||||||
|
Success = LookupPrivilegeValueW(0, SE_BACKUP_NAME, &Luid);
|
||||||
|
ASSERT(Success);
|
||||||
|
Success = OpenProcessToken(GetCurrentProcess(), TOKEN_ADJUST_PRIVILEGES | TOKEN_QUERY, &Token);
|
||||||
|
ASSERT(Success);
|
||||||
|
Privileges.PrivilegeCount = 1;
|
||||||
|
Privileges.Privileges[0].Attributes = SE_PRIVILEGE_ENABLED;
|
||||||
|
Privileges.Privileges[0].Luid = Luid;
|
||||||
|
Success = AdjustTokenPrivileges(Token, FALSE, &Privileges, 0, 0, 0);
|
||||||
|
ASSERT(Success);
|
||||||
|
|
||||||
|
RequiredPrivileges.PrivilegeCount = 1;
|
||||||
|
RequiredPrivileges.Control = PRIVILEGE_SET_ALL_NECESSARY;
|
||||||
|
RequiredPrivileges.Privilege[0].Attributes = 0;
|
||||||
|
RequiredPrivileges.Privilege[0].Luid = Luid;
|
||||||
|
ASSERT(PrivilegeCheck(Token, &RequiredPrivileges, &Success));
|
||||||
|
|
||||||
|
if (Success)
|
||||||
|
{
|
||||||
|
FspDebugLog(__FUNCTION__ ": HasBackupPrivilege\n");
|
||||||
|
|
||||||
|
static PWSTR Sddl = L"D:P(A;;SD;;;WD)";
|
||||||
|
PSECURITY_DESCRIPTOR SecurityDescriptor;
|
||||||
|
SECURITY_ATTRIBUTES SecurityAttributes = { 0 };
|
||||||
|
HANDLE Handle;
|
||||||
|
WCHAR FilePath[MAX_PATH];
|
||||||
|
|
||||||
|
Success = ConvertStringSecurityDescriptorToSecurityDescriptorW(Sddl, SDDL_REVISION_1, &SecurityDescriptor, 0);
|
||||||
|
ASSERT(Success);
|
||||||
|
|
||||||
|
StringCbPrintfW(FilePath, sizeof FilePath, L"%s%s\\dir1",
|
||||||
|
Prefix ? L"" : L"\\\\?\\GLOBALROOT", Prefix ? Prefix : memfs_volumename(memfs));
|
||||||
|
|
||||||
|
Success = CreateDirectoryW(FilePath, 0);
|
||||||
|
ASSERT(Success);
|
||||||
|
|
||||||
|
SecurityAttributes.nLength = sizeof SecurityAttributes;
|
||||||
|
SecurityAttributes.lpSecurityDescriptor = SecurityDescriptor;
|
||||||
|
|
||||||
|
StringCbPrintfW(FilePath, sizeof FilePath, L"%s%s\\dir1\\file0",
|
||||||
|
Prefix ? L"" : L"\\\\?\\GLOBALROOT", Prefix ? Prefix : memfs_volumename(memfs));
|
||||||
|
|
||||||
|
Handle = CreateFileW(FilePath,
|
||||||
|
GENERIC_READ | GENERIC_WRITE, FILE_SHARE_READ | FILE_SHARE_WRITE,
|
||||||
|
&SecurityAttributes, CREATE_NEW, FILE_ATTRIBUTE_NORMAL, 0);
|
||||||
|
ASSERT(INVALID_HANDLE_VALUE != Handle);
|
||||||
|
CloseHandle(Handle);
|
||||||
|
|
||||||
|
Handle = CreateFileW(FilePath,
|
||||||
|
GENERIC_READ, FILE_SHARE_READ, 0, OPEN_EXISTING, 0, 0);
|
||||||
|
ASSERT(INVALID_HANDLE_VALUE == Handle);
|
||||||
|
ASSERT(ERROR_ACCESS_DENIED == GetLastError());
|
||||||
|
|
||||||
|
Handle = CreateFileW(FilePath,
|
||||||
|
GENERIC_READ, FILE_SHARE_READ, 0, OPEN_EXISTING, FILE_FLAG_BACKUP_SEMANTICS, 0);
|
||||||
|
ASSERT(INVALID_HANDLE_VALUE != Handle);
|
||||||
|
CloseHandle(Handle);
|
||||||
|
|
||||||
|
Privileges.PrivilegeCount = 1;
|
||||||
|
Privileges.Privileges[0].Attributes = 0;
|
||||||
|
Privileges.Privileges[0].Luid = Luid;
|
||||||
|
Success = AdjustTokenPrivileges(Token, FALSE, &Privileges, 0, 0, 0);
|
||||||
|
ASSERT(Success);
|
||||||
|
|
||||||
|
Handle = CreateFileW(FilePath,
|
||||||
|
GENERIC_READ, FILE_SHARE_READ, 0, OPEN_EXISTING, 0, 0);
|
||||||
|
ASSERT(INVALID_HANDLE_VALUE == Handle);
|
||||||
|
ASSERT(ERROR_ACCESS_DENIED == GetLastError());
|
||||||
|
|
||||||
|
Handle = CreateFileW(FilePath,
|
||||||
|
GENERIC_READ, FILE_SHARE_READ, 0, OPEN_EXISTING, FILE_FLAG_BACKUP_SEMANTICS, 0);
|
||||||
|
ASSERT(INVALID_HANDLE_VALUE == Handle);
|
||||||
|
ASSERT(ERROR_ACCESS_DENIED == GetLastError());
|
||||||
|
|
||||||
|
Success = DeleteFileW(FilePath);
|
||||||
|
ASSERT(Success);
|
||||||
|
|
||||||
|
StringCbPrintfW(FilePath, sizeof FilePath, L"%s%s\\dir1",
|
||||||
|
Prefix ? L"" : L"\\\\?\\GLOBALROOT", Prefix ? Prefix : memfs_volumename(memfs));
|
||||||
|
|
||||||
|
Success = RemoveDirectoryW(FilePath);
|
||||||
|
ASSERT(Success);
|
||||||
|
|
||||||
|
LocalFree(SecurityDescriptor);
|
||||||
|
}
|
||||||
|
|
||||||
|
CloseHandle(Token);
|
||||||
|
|
||||||
|
memfs_stop(memfs);
|
||||||
|
}
|
||||||
|
|
||||||
|
void create_backup_test(void)
|
||||||
|
{
|
||||||
|
if (NtfsTests)
|
||||||
|
{
|
||||||
|
WCHAR DirBuf[MAX_PATH] = L"\\\\?\\";
|
||||||
|
GetCurrentDirectoryW(MAX_PATH - 4, DirBuf + 4);
|
||||||
|
create_backup_dotest(-1, DirBuf);
|
||||||
|
}
|
||||||
|
if (WinFspDiskTests)
|
||||||
|
create_backup_dotest(MemfsDisk, 0);
|
||||||
|
if (WinFspNetTests)
|
||||||
|
create_backup_dotest(MemfsNet, L"\\\\memfs\\share");
|
||||||
|
}
|
||||||
|
|
||||||
|
void create_restore_dotest(ULONG Flags, PWSTR Prefix)
|
||||||
|
{
|
||||||
|
void *memfs = memfs_start(Flags);
|
||||||
|
|
||||||
|
LUID Luid;
|
||||||
|
PRIVILEGE_SET RequiredPrivileges;
|
||||||
|
TOKEN_PRIVILEGES Privileges;
|
||||||
|
HANDLE Token;
|
||||||
|
BOOL Success;
|
||||||
|
|
||||||
|
Success = LookupPrivilegeValueW(0, SE_RESTORE_NAME, &Luid);
|
||||||
|
ASSERT(Success);
|
||||||
|
Success = OpenProcessToken(GetCurrentProcess(), TOKEN_ADJUST_PRIVILEGES | TOKEN_QUERY, &Token);
|
||||||
|
ASSERT(Success);
|
||||||
|
Privileges.PrivilegeCount = 1;
|
||||||
|
Privileges.Privileges[0].Attributes = SE_PRIVILEGE_ENABLED;
|
||||||
|
Privileges.Privileges[0].Luid = Luid;
|
||||||
|
Success = AdjustTokenPrivileges(Token, FALSE, &Privileges, 0, 0, 0);
|
||||||
|
ASSERT(Success);
|
||||||
|
|
||||||
|
RequiredPrivileges.PrivilegeCount = 1;
|
||||||
|
RequiredPrivileges.Control = PRIVILEGE_SET_ALL_NECESSARY;
|
||||||
|
RequiredPrivileges.Privilege[0].Attributes = 0;
|
||||||
|
RequiredPrivileges.Privilege[0].Luid = Luid;
|
||||||
|
ASSERT(PrivilegeCheck(Token, &RequiredPrivileges, &Success));
|
||||||
|
|
||||||
|
if (Success)
|
||||||
|
{
|
||||||
|
FspDebugLog(__FUNCTION__ ": HasRestorePrivilege\n");
|
||||||
|
|
||||||
|
static PWSTR Sddl = L"D:P(A;;SD;;;WD)";
|
||||||
|
PSECURITY_DESCRIPTOR SecurityDescriptor;
|
||||||
|
SECURITY_ATTRIBUTES SecurityAttributes = { 0 };
|
||||||
|
HANDLE DirHandle, Handle;
|
||||||
|
WCHAR FilePath[MAX_PATH];
|
||||||
|
|
||||||
|
Success = ConvertStringSecurityDescriptorToSecurityDescriptorW(Sddl, SDDL_REVISION_1, &SecurityDescriptor, 0);
|
||||||
|
ASSERT(Success);
|
||||||
|
|
||||||
|
StringCbPrintfW(FilePath, sizeof FilePath, L"%s%s\\dir1",
|
||||||
|
Prefix ? L"" : L"\\\\?\\GLOBALROOT", Prefix ? Prefix : memfs_volumename(memfs));
|
||||||
|
|
||||||
|
SecurityAttributes.nLength = sizeof SecurityAttributes;
|
||||||
|
SecurityAttributes.lpSecurityDescriptor = SecurityDescriptor;
|
||||||
|
|
||||||
|
Success = CreateDirectoryW(FilePath, &SecurityAttributes);
|
||||||
|
ASSERT(Success);
|
||||||
|
|
||||||
|
DirHandle = CreateFileW(FilePath,
|
||||||
|
DELETE, FILE_SHARE_READ | FILE_SHARE_WRITE | FILE_SHARE_DELETE,
|
||||||
|
0, OPEN_EXISTING, FILE_FLAG_BACKUP_SEMANTICS | FILE_FLAG_DELETE_ON_CLOSE, 0);
|
||||||
|
ASSERT(INVALID_HANDLE_VALUE != DirHandle);
|
||||||
|
|
||||||
|
StringCbPrintfW(FilePath, sizeof FilePath, L"%s%s\\dir1\\file0",
|
||||||
|
Prefix ? L"" : L"\\\\?\\GLOBALROOT", Prefix ? Prefix : memfs_volumename(memfs));
|
||||||
|
|
||||||
|
Handle = CreateFileW(FilePath,
|
||||||
|
GENERIC_READ | GENERIC_WRITE, FILE_SHARE_READ | FILE_SHARE_WRITE,
|
||||||
|
0, CREATE_NEW, FILE_ATTRIBUTE_NORMAL, 0);
|
||||||
|
ASSERT(INVALID_HANDLE_VALUE == Handle);
|
||||||
|
ASSERT(ERROR_ACCESS_DENIED == GetLastError());
|
||||||
|
|
||||||
|
if (!OptNoTraverseToken)
|
||||||
|
{
|
||||||
|
Handle = CreateFileW(FilePath,
|
||||||
|
GENERIC_READ | GENERIC_WRITE, FILE_SHARE_READ | FILE_SHARE_WRITE,
|
||||||
|
0, CREATE_NEW, FILE_ATTRIBUTE_NORMAL | FILE_FLAG_BACKUP_SEMANTICS, 0);
|
||||||
|
ASSERT(INVALID_HANDLE_VALUE != Handle);
|
||||||
|
CloseHandle(Handle);
|
||||||
|
|
||||||
|
Success = DeleteFileW(FilePath);
|
||||||
|
ASSERT(Success);
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
Handle = CreateFileW(FilePath,
|
||||||
|
GENERIC_READ | GENERIC_WRITE, FILE_SHARE_READ | FILE_SHARE_WRITE,
|
||||||
|
0, CREATE_NEW, FILE_ATTRIBUTE_NORMAL, 0);
|
||||||
|
ASSERT(INVALID_HANDLE_VALUE == Handle);
|
||||||
|
ASSERT(ERROR_ACCESS_DENIED == GetLastError());
|
||||||
|
}
|
||||||
|
|
||||||
|
Privileges.PrivilegeCount = 1;
|
||||||
|
Privileges.Privileges[0].Attributes = 0;
|
||||||
|
Privileges.Privileges[0].Luid = Luid;
|
||||||
|
Success = AdjustTokenPrivileges(Token, FALSE, &Privileges, 0, 0, 0);
|
||||||
|
ASSERT(Success);
|
||||||
|
|
||||||
|
Handle = CreateFileW(FilePath,
|
||||||
|
GENERIC_READ | GENERIC_WRITE, FILE_SHARE_READ | FILE_SHARE_WRITE,
|
||||||
|
0, CREATE_NEW, FILE_ATTRIBUTE_NORMAL, 0);
|
||||||
|
ASSERT(INVALID_HANDLE_VALUE == Handle);
|
||||||
|
ASSERT(ERROR_ACCESS_DENIED == GetLastError());
|
||||||
|
|
||||||
|
Handle = CreateFileW(FilePath,
|
||||||
|
GENERIC_READ | GENERIC_WRITE, FILE_SHARE_READ | FILE_SHARE_WRITE,
|
||||||
|
0, CREATE_NEW, FILE_ATTRIBUTE_NORMAL | FILE_FLAG_BACKUP_SEMANTICS, 0);
|
||||||
|
ASSERT(INVALID_HANDLE_VALUE == Handle);
|
||||||
|
ASSERT(ERROR_ACCESS_DENIED == GetLastError());
|
||||||
|
|
||||||
|
CloseHandle(DirHandle);
|
||||||
|
|
||||||
|
StringCbPrintfW(FilePath, sizeof FilePath, L"%s%s\\dir1",
|
||||||
|
Prefix ? L"" : L"\\\\?\\GLOBALROOT", Prefix ? Prefix : memfs_volumename(memfs));
|
||||||
|
|
||||||
|
DirHandle = CreateFileW(FilePath,
|
||||||
|
DELETE, FILE_SHARE_READ | FILE_SHARE_WRITE | FILE_SHARE_DELETE,
|
||||||
|
0, OPEN_EXISTING, FILE_FLAG_BACKUP_SEMANTICS, 0);
|
||||||
|
ASSERT(INVALID_HANDLE_VALUE == DirHandle);
|
||||||
|
ASSERT(ERROR_FILE_NOT_FOUND == GetLastError());
|
||||||
|
|
||||||
|
LocalFree(SecurityDescriptor);
|
||||||
|
}
|
||||||
|
|
||||||
|
CloseHandle(Token);
|
||||||
|
|
||||||
|
memfs_stop(memfs);
|
||||||
|
}
|
||||||
|
|
||||||
|
void create_restore_test(void)
|
||||||
|
{
|
||||||
|
if (NtfsTests)
|
||||||
|
{
|
||||||
|
WCHAR DirBuf[MAX_PATH] = L"\\\\?\\";
|
||||||
|
GetCurrentDirectoryW(MAX_PATH - 4, DirBuf + 4);
|
||||||
|
create_restore_dotest(-1, DirBuf);
|
||||||
|
}
|
||||||
|
if (WinFspDiskTests)
|
||||||
|
create_restore_dotest(MemfsDisk, 0);
|
||||||
|
if (WinFspNetTests)
|
||||||
|
create_restore_dotest(MemfsNet, L"\\\\memfs\\share");
|
||||||
|
}
|
||||||
|
|
||||||
void create_share_dotest(ULONG Flags, PWSTR Prefix)
|
void create_share_dotest(ULONG Flags, PWSTR Prefix)
|
||||||
{
|
{
|
||||||
void *memfs = memfs_start(Flags);
|
void *memfs = memfs_start(Flags);
|
||||||
@ -594,6 +841,8 @@ void create_tests(void)
|
|||||||
TEST(create_related_test);
|
TEST(create_related_test);
|
||||||
TEST(create_sd_test);
|
TEST(create_sd_test);
|
||||||
TEST(create_notraverse_test);
|
TEST(create_notraverse_test);
|
||||||
|
TEST(create_backup_test);
|
||||||
|
TEST(create_restore_test);
|
||||||
TEST(create_share_test);
|
TEST(create_share_test);
|
||||||
TEST(create_curdir_test);
|
TEST(create_curdir_test);
|
||||||
}
|
}
|
||||||
|
@ -173,6 +173,32 @@ HANDLE HookCreateFileW(
|
|||||||
return h;
|
return h;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static VOID DisableBackupRestorePrivileges(VOID)
|
||||||
|
{
|
||||||
|
union
|
||||||
|
{
|
||||||
|
TOKEN_PRIVILEGES P;
|
||||||
|
UINT B[sizeof(TOKEN_PRIVILEGES) + sizeof(LUID_AND_ATTRIBUTES)];
|
||||||
|
} Privileges;
|
||||||
|
HANDLE Token;
|
||||||
|
|
||||||
|
Privileges.P.PrivilegeCount = 2;
|
||||||
|
Privileges.P.Privileges[0].Attributes = 0;
|
||||||
|
Privileges.P.Privileges[1].Attributes = 0;
|
||||||
|
|
||||||
|
if (!LookupPrivilegeValueW(0, SE_BACKUP_NAME, &Privileges.P.Privileges[0].Luid) ||
|
||||||
|
!LookupPrivilegeValueW(0, SE_RESTORE_NAME, &Privileges.P.Privileges[1].Luid))
|
||||||
|
ABORT();
|
||||||
|
|
||||||
|
if (!OpenProcessToken(GetCurrentProcess(), TOKEN_ADJUST_PRIVILEGES, &Token))
|
||||||
|
ABORT();
|
||||||
|
|
||||||
|
if (!AdjustTokenPrivileges(Token, FALSE, &Privileges.P, 0, 0, 0))
|
||||||
|
ABORT();
|
||||||
|
|
||||||
|
CloseHandle(Token);
|
||||||
|
}
|
||||||
|
|
||||||
#define rmarg(argv, argc, argi) \
|
#define rmarg(argv, argc, argi) \
|
||||||
argc--,\
|
argc--,\
|
||||||
memmove(argv + argi, argv + argi + 1, (argc - argi) * sizeof(char *)),\
|
memmove(argv + argi, argv + argi + 1, (argc - argi) * sizeof(char *)),\
|
||||||
@ -230,7 +256,7 @@ int main(int argc, char *argv[])
|
|||||||
}
|
}
|
||||||
else if (0 == strcmp("--no-traverse", a))
|
else if (0 == strcmp("--no-traverse", a))
|
||||||
{
|
{
|
||||||
if (LookupPrivilegeValue(0, SE_CHANGE_NOTIFY_NAME, &OptNoTraverseLuid) &&
|
if (LookupPrivilegeValueW(0, SE_CHANGE_NOTIFY_NAME, &OptNoTraverseLuid) &&
|
||||||
OpenProcessToken(GetCurrentProcess(), TOKEN_ADJUST_PRIVILEGES, &OptNoTraverseToken))
|
OpenProcessToken(GetCurrentProcess(), TOKEN_ADJUST_PRIVILEGES, &OptNoTraverseToken))
|
||||||
{
|
{
|
||||||
rmarg(argv, argc, argi);
|
rmarg(argv, argc, argi);
|
||||||
@ -239,6 +265,8 @@ int main(int argc, char *argv[])
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
DisableBackupRestorePrivileges();
|
||||||
|
|
||||||
myrandseed = (unsigned)time(0);
|
myrandseed = (unsigned)time(0);
|
||||||
|
|
||||||
tlib_run_tests(argc, argv);
|
tlib_run_tests(argc, argv);
|
||||||
|
Loading…
x
Reference in New Issue
Block a user