mirror of
https://github.com/winfsp/winfsp.git
synced 2025-04-22 16:33:02 -05:00
340 lines
12 KiB
C
340 lines
12 KiB
C
/**
|
|
* @file security-test.c
|
|
*
|
|
* @copyright 2015-2021 Bill Zissimopoulos
|
|
*/
|
|
/*
|
|
* This file is part of WinFsp.
|
|
*
|
|
* You can redistribute it and/or modify it under the terms of the GNU
|
|
* General Public License version 3 as published by the Free Software
|
|
* Foundation.
|
|
*
|
|
* Licensees holding a valid commercial license may use this software
|
|
* in accordance with the commercial license agreement provided in
|
|
* conjunction with the software. The terms and conditions of any such
|
|
* commercial license agreement shall govern, supersede, and render
|
|
* ineffective any application of the GPLv3 license to this software,
|
|
* notwithstanding of any reference thereto in the software or
|
|
* associated repository.
|
|
*/
|
|
|
|
#include <winfsp/winfsp.h>
|
|
#include <tlib/testsuite.h>
|
|
#include <sddl.h>
|
|
#include <strsafe.h>
|
|
#include "memfs.h"
|
|
|
|
#include "winfsp-tests.h"
|
|
|
|
void getsecurity_dotest(ULONG Flags, PWSTR Prefix, ULONG FileInfoTimeout)
|
|
{
|
|
void *memfs = memfs_start_ex(Flags, FileInfoTimeout);
|
|
|
|
static PWSTR Sddl = L"D:P(A;;GA;;;SY)(A;;GA;;;BA)(A;;GA;;;WD)";
|
|
PSECURITY_DESCRIPTOR SecurityDescriptor, FileSecurityDescriptor;
|
|
SECURITY_ATTRIBUTES SecurityAttributes = { 0 };
|
|
PSID Owner, Group;
|
|
PACL Dacl, Sacl;
|
|
BOOL OwnerDefaulted, GroupDefaulted, DaclDefaulted, DaclPresent, SaclDefaulted, SaclPresent;
|
|
DWORD Length;
|
|
HANDLE Handle;
|
|
BOOLEAN Success;
|
|
WCHAR FilePath[MAX_PATH];
|
|
|
|
Success = ConvertStringSecurityDescriptorToSecurityDescriptorW(Sddl, SDDL_REVISION_1, &SecurityDescriptor, 0);
|
|
ASSERT(Success);
|
|
|
|
SecurityAttributes.nLength = sizeof SecurityAttributes;
|
|
SecurityAttributes.lpSecurityDescriptor = SecurityDescriptor;
|
|
|
|
StringCbPrintfW(FilePath, sizeof FilePath, L"%s%s\\file0",
|
|
Prefix ? L"" : L"\\\\?\\GLOBALROOT", Prefix ? Prefix : memfs_volumename(memfs));
|
|
|
|
Handle = CreateFileW(FilePath,
|
|
GENERIC_READ | GENERIC_WRITE, FILE_SHARE_READ | FILE_SHARE_WRITE, &SecurityAttributes,
|
|
CREATE_NEW, FILE_ATTRIBUTE_NORMAL, 0);
|
|
ASSERT(INVALID_HANDLE_VALUE != Handle);
|
|
CloseHandle(Handle);
|
|
|
|
Handle = CreateFileW(FilePath,
|
|
GENERIC_READ | GENERIC_WRITE, FILE_SHARE_READ | FILE_SHARE_WRITE, 0, OPEN_EXISTING, FILE_FLAG_DELETE_ON_CLOSE, 0);
|
|
ASSERT(INVALID_HANDLE_VALUE != Handle);
|
|
|
|
Success = GetKernelObjectSecurity(Handle, OWNER_SECURITY_INFORMATION | GROUP_SECURITY_INFORMATION,
|
|
0, 0, &Length);
|
|
ASSERT(!Success);
|
|
ASSERT(ERROR_INSUFFICIENT_BUFFER == GetLastError());
|
|
FileSecurityDescriptor = malloc(Length);
|
|
Success = GetKernelObjectSecurity(Handle, OWNER_SECURITY_INFORMATION | GROUP_SECURITY_INFORMATION,
|
|
FileSecurityDescriptor, Length, &Length);
|
|
ASSERT(Success);
|
|
Success = GetSecurityDescriptorOwner(FileSecurityDescriptor, &Owner, &OwnerDefaulted);
|
|
ASSERT(Success);
|
|
ASSERT(0 != Owner);
|
|
Success = GetSecurityDescriptorGroup(FileSecurityDescriptor, &Group, &GroupDefaulted);
|
|
ASSERT(Success);
|
|
ASSERT(0 != Group);
|
|
Success = GetSecurityDescriptorDacl(FileSecurityDescriptor, &DaclPresent, &Dacl, &DaclDefaulted);
|
|
ASSERT(Success);
|
|
ASSERT(!DaclPresent);
|
|
Success = GetSecurityDescriptorSacl(FileSecurityDescriptor, &SaclPresent, &Sacl, &SaclDefaulted);
|
|
ASSERT(Success);
|
|
ASSERT(!SaclPresent);
|
|
free(FileSecurityDescriptor);
|
|
|
|
Success = GetKernelObjectSecurity(Handle, DACL_SECURITY_INFORMATION,
|
|
0, 0, &Length);
|
|
ASSERT(!Success);
|
|
ASSERT(ERROR_INSUFFICIENT_BUFFER == GetLastError());
|
|
FileSecurityDescriptor = malloc(Length);
|
|
Success = GetKernelObjectSecurity(Handle, DACL_SECURITY_INFORMATION,
|
|
FileSecurityDescriptor, Length, &Length);
|
|
ASSERT(Success);
|
|
Success = GetSecurityDescriptorOwner(FileSecurityDescriptor, &Owner, &OwnerDefaulted);
|
|
ASSERT(Success);
|
|
ASSERT(0 == Owner);
|
|
Success = GetSecurityDescriptorGroup(FileSecurityDescriptor, &Group, &GroupDefaulted);
|
|
ASSERT(Success);
|
|
ASSERT(0 == Group);
|
|
Success = GetSecurityDescriptorDacl(FileSecurityDescriptor, &DaclPresent, &Dacl, &DaclDefaulted);
|
|
ASSERT(Success);
|
|
ASSERT(DaclPresent);
|
|
ASSERT(0 != Dacl);
|
|
Success = GetSecurityDescriptorSacl(FileSecurityDescriptor, &SaclPresent, &Sacl, &SaclDefaulted);
|
|
ASSERT(Success);
|
|
ASSERT(!SaclPresent);
|
|
free(FileSecurityDescriptor);
|
|
|
|
CloseHandle(Handle);
|
|
|
|
LocalFree(SecurityDescriptor);
|
|
|
|
memfs_stop(memfs);
|
|
}
|
|
|
|
void getsecurity_test(void)
|
|
{
|
|
if (NtfsTests)
|
|
{
|
|
WCHAR DirBuf[MAX_PATH];
|
|
GetTestDirectory(DirBuf);
|
|
getsecurity_dotest(-1, DirBuf, 0);
|
|
}
|
|
if (WinFspDiskTests)
|
|
{
|
|
getsecurity_dotest(MemfsDisk, 0, 0);
|
|
getsecurity_dotest(MemfsDisk, 0, 1000);
|
|
}
|
|
if (WinFspNetTests)
|
|
{
|
|
getsecurity_dotest(MemfsNet, L"\\\\memfs\\share", 0);
|
|
getsecurity_dotest(MemfsNet, L"\\\\memfs\\share", 1000);
|
|
}
|
|
}
|
|
|
|
void setsecurity_dotest(ULONG Flags, PWSTR Prefix, ULONG FileInfoTimeout)
|
|
{
|
|
void *memfs = memfs_start_ex(Flags, FileInfoTimeout);
|
|
|
|
static PWSTR Sddl = L"D:P(A;;GA;;;SY)(A;;GA;;;BA)(A;;GA;;;WD)";
|
|
static PWSTR Sddl2 = L"D:P(A;;GA;;;SY)(A;;GA;;;BA)";
|
|
PWSTR ConvertedSddl;
|
|
PSECURITY_DESCRIPTOR SecurityDescriptor, FileSecurityDescriptor, FileSecurityDescriptor2;
|
|
SECURITY_ATTRIBUTES SecurityAttributes = { 0 };
|
|
PSID Owner, Owner2, Group, Group2;
|
|
PACL Dacl, Dacl2, Sacl, Sacl2;
|
|
BOOL OwnerDefaulted, GroupDefaulted, DaclDefaulted, DaclPresent, SaclDefaulted, SaclPresent;
|
|
DWORD Length;
|
|
HANDLE Handle;
|
|
BOOLEAN Success;
|
|
WCHAR FilePath[MAX_PATH];
|
|
|
|
Success = ConvertStringSecurityDescriptorToSecurityDescriptorW(Sddl, SDDL_REVISION_1, &SecurityDescriptor, 0);
|
|
ASSERT(Success);
|
|
|
|
SecurityAttributes.nLength = sizeof SecurityAttributes;
|
|
SecurityAttributes.lpSecurityDescriptor = SecurityDescriptor;
|
|
|
|
StringCbPrintfW(FilePath, sizeof FilePath, L"%s%s\\file0",
|
|
Prefix ? L"" : L"\\\\?\\GLOBALROOT", Prefix ? Prefix : memfs_volumename(memfs));
|
|
|
|
Handle = CreateFileW(FilePath,
|
|
GENERIC_READ | GENERIC_WRITE, FILE_SHARE_READ | FILE_SHARE_WRITE, &SecurityAttributes,
|
|
CREATE_NEW, FILE_ATTRIBUTE_NORMAL, 0);
|
|
ASSERT(INVALID_HANDLE_VALUE != Handle);
|
|
CloseHandle(Handle);
|
|
|
|
Handle = CreateFileW(FilePath,
|
|
GENERIC_READ | GENERIC_WRITE | WRITE_DAC, FILE_SHARE_READ | FILE_SHARE_WRITE, 0, OPEN_EXISTING, FILE_FLAG_DELETE_ON_CLOSE, 0);
|
|
ASSERT(INVALID_HANDLE_VALUE != Handle);
|
|
|
|
Success = GetKernelObjectSecurity(Handle,
|
|
OWNER_SECURITY_INFORMATION | GROUP_SECURITY_INFORMATION | DACL_SECURITY_INFORMATION,
|
|
0, 0, &Length);
|
|
ASSERT(!Success);
|
|
ASSERT(ERROR_INSUFFICIENT_BUFFER == GetLastError());
|
|
FileSecurityDescriptor = malloc(Length);
|
|
Success = GetKernelObjectSecurity(Handle,
|
|
OWNER_SECURITY_INFORMATION | GROUP_SECURITY_INFORMATION | DACL_SECURITY_INFORMATION,
|
|
FileSecurityDescriptor, Length, &Length);
|
|
ASSERT(Success);
|
|
Success = GetSecurityDescriptorOwner(FileSecurityDescriptor, &Owner, &OwnerDefaulted);
|
|
ASSERT(Success);
|
|
ASSERT(0 != Owner);
|
|
Success = GetSecurityDescriptorGroup(FileSecurityDescriptor, &Group, &GroupDefaulted);
|
|
ASSERT(Success);
|
|
ASSERT(0 != Group);
|
|
Success = GetSecurityDescriptorDacl(FileSecurityDescriptor, &DaclPresent, &Dacl, &DaclDefaulted);
|
|
ASSERT(Success);
|
|
ASSERT(DaclPresent);
|
|
ASSERT(0 != Dacl);
|
|
Success = GetSecurityDescriptorSacl(FileSecurityDescriptor, &SaclPresent, &Sacl, &SaclDefaulted);
|
|
ASSERT(Success);
|
|
ASSERT(!SaclPresent);
|
|
|
|
LocalFree(SecurityDescriptor);
|
|
Success = ConvertStringSecurityDescriptorToSecurityDescriptorW(Sddl2, SDDL_REVISION_1, &SecurityDescriptor, 0);
|
|
ASSERT(Success);
|
|
|
|
Success = SetKernelObjectSecurity(Handle, DACL_SECURITY_INFORMATION, SecurityDescriptor);
|
|
ASSERT(Success);
|
|
|
|
Success = GetKernelObjectSecurity(Handle,
|
|
OWNER_SECURITY_INFORMATION | GROUP_SECURITY_INFORMATION | DACL_SECURITY_INFORMATION,
|
|
0, 0, &Length);
|
|
ASSERT(!Success);
|
|
ASSERT(ERROR_INSUFFICIENT_BUFFER == GetLastError());
|
|
FileSecurityDescriptor2 = malloc(Length);
|
|
Success = GetKernelObjectSecurity(Handle,
|
|
OWNER_SECURITY_INFORMATION | GROUP_SECURITY_INFORMATION | DACL_SECURITY_INFORMATION,
|
|
FileSecurityDescriptor2, Length, &Length);
|
|
ASSERT(Success);
|
|
Success = GetSecurityDescriptorOwner(FileSecurityDescriptor2, &Owner2, &OwnerDefaulted);
|
|
ASSERT(Success);
|
|
ASSERT(0 != Owner2);
|
|
Success = GetSecurityDescriptorGroup(FileSecurityDescriptor2, &Group2, &GroupDefaulted);
|
|
ASSERT(Success);
|
|
ASSERT(0 != Group2);
|
|
Success = GetSecurityDescriptorDacl(FileSecurityDescriptor2, &DaclPresent, &Dacl2, &DaclDefaulted);
|
|
ASSERT(Success);
|
|
ASSERT(DaclPresent);
|
|
ASSERT(0 != Dacl2);
|
|
Success = GetSecurityDescriptorSacl(FileSecurityDescriptor2, &SaclPresent, &Sacl2, &SaclDefaulted);
|
|
ASSERT(Success);
|
|
ASSERT(!SaclPresent);
|
|
|
|
ASSERT(EqualSid(Owner, Owner2));
|
|
ASSERT(EqualSid(Group, Group2));
|
|
ASSERT(ConvertSecurityDescriptorToStringSecurityDescriptorW(FileSecurityDescriptor2, SDDL_REVISION_1,
|
|
DACL_SECURITY_INFORMATION, &ConvertedSddl, 0));
|
|
ASSERT(0 == wcscmp(L"D:P(A;;FA;;;SY)(A;;FA;;;BA)", ConvertedSddl));
|
|
LocalFree(ConvertedSddl);
|
|
|
|
free(FileSecurityDescriptor);
|
|
free(FileSecurityDescriptor2);
|
|
|
|
CloseHandle(Handle);
|
|
|
|
LocalFree(SecurityDescriptor);
|
|
|
|
memfs_stop(memfs);
|
|
}
|
|
|
|
void setsecurity_test(void)
|
|
{
|
|
if (NtfsTests)
|
|
{
|
|
WCHAR DirBuf[MAX_PATH];
|
|
GetTestDirectory(DirBuf);
|
|
setsecurity_dotest(-1, DirBuf, 0);
|
|
}
|
|
if (WinFspDiskTests)
|
|
{
|
|
setsecurity_dotest(MemfsDisk, 0, 0);
|
|
setsecurity_dotest(MemfsDisk, 0, 1000);
|
|
}
|
|
if (WinFspNetTests)
|
|
{
|
|
setsecurity_dotest(MemfsNet, L"\\\\memfs\\share", 0);
|
|
setsecurity_dotest(MemfsNet, L"\\\\memfs\\share", 1000);
|
|
}
|
|
}
|
|
|
|
void security_stress_meta_dotest(ULONG Flags, PWSTR Prefix, ULONG FileInfoTimeout)
|
|
{
|
|
#define NumFiles 200/* 2*FspFsvolDeviceSecurityCacheCapacity */
|
|
|
|
void *memfs = memfs_start_ex(Flags, FileInfoTimeout);
|
|
|
|
HANDLE Handles[NumFiles];
|
|
WCHAR FilePath[MAX_PATH];
|
|
BOOL Success;
|
|
DWORD Length;
|
|
|
|
StringCbPrintfW(FilePath, sizeof FilePath, L"%s%s\\dir1",
|
|
Prefix ? L"" : L"\\\\?\\GLOBALROOT", Prefix ? Prefix : memfs_volumename(memfs));
|
|
Success = CreateDirectoryW(FilePath, 0);
|
|
ASSERT(Success);
|
|
|
|
for (int j = 0; NumFiles > j; j++)
|
|
{
|
|
StringCbPrintfW(FilePath, sizeof FilePath, L"%s%s\\dir1\\file%d",
|
|
Prefix ? L"" : L"\\\\?\\GLOBALROOT", Prefix ? Prefix : memfs_volumename(memfs), j + 1);
|
|
Handles[j] = CreateFileW(FilePath, GENERIC_ALL, 0, 0, CREATE_ALWAYS, FILE_ATTRIBUTE_NORMAL | FILE_FLAG_DELETE_ON_CLOSE, 0);
|
|
ASSERT(INVALID_HANDLE_VALUE != Handles[j]);
|
|
}
|
|
|
|
for (int j = 0; NumFiles > j; j++)
|
|
{
|
|
Success = GetKernelObjectSecurity(Handles[j],
|
|
OWNER_SECURITY_INFORMATION | GROUP_SECURITY_INFORMATION | DACL_SECURITY_INFORMATION,
|
|
0, 0, &Length);
|
|
ASSERT(!Success);
|
|
ASSERT(ERROR_INSUFFICIENT_BUFFER == GetLastError());
|
|
}
|
|
|
|
for (int j = 0; NumFiles > j; j++)
|
|
{
|
|
Success = CloseHandle(Handles[j]);
|
|
ASSERT(Success);
|
|
}
|
|
|
|
StringCbPrintfW(FilePath, sizeof FilePath, L"%s%s\\dir1",
|
|
Prefix ? L"" : L"\\\\?\\GLOBALROOT", Prefix ? Prefix : memfs_volumename(memfs));
|
|
Success = RemoveDirectoryW(FilePath);
|
|
ASSERT(Success);
|
|
|
|
memfs_stop(memfs);
|
|
|
|
#undef NumFiles
|
|
}
|
|
|
|
void security_stress_meta_test(void)
|
|
{
|
|
if (NtfsTests)
|
|
{
|
|
WCHAR DirBuf[MAX_PATH];
|
|
GetTestDirectory(DirBuf);
|
|
security_stress_meta_dotest(-1, DirBuf, 0);
|
|
}
|
|
if (WinFspDiskTests)
|
|
{
|
|
security_stress_meta_dotest(MemfsDisk, 0, 0);
|
|
security_stress_meta_dotest(MemfsDisk, 0, 1000);
|
|
}
|
|
if (WinFspNetTests)
|
|
{
|
|
security_stress_meta_dotest(MemfsNet, L"\\\\memfs\\share", 0);
|
|
security_stress_meta_dotest(MemfsNet, L"\\\\memfs\\share", 1000);
|
|
}
|
|
}
|
|
|
|
void security_tests(void)
|
|
{
|
|
TEST(getsecurity_test);
|
|
if (!OptFuseExternal)
|
|
TEST(setsecurity_test);
|
|
TEST_OPT(security_stress_meta_test);
|
|
}
|