server: Make create_mapping use struct object_attributes and set the security descriptor of file mapping objects.
diff --git a/dlls/ntdll/ntdll_misc.h b/dlls/ntdll/ntdll_misc.h
index fa08491..405f348 100644
--- a/dlls/ntdll/ntdll_misc.h
+++ b/dlls/ntdll/ntdll_misc.h
@@ -78,6 +78,11 @@
extern int server_get_unix_fd( obj_handle_t handle, unsigned int access, int *unix_fd,
int *needs_close, enum server_fd_type *type, unsigned int *options );
+/* security descriptors */
+NTSTATUS NTDLL_create_struct_sd(PSECURITY_DESCRIPTOR nt_sd, struct security_descriptor **server_sd,
+ data_size_t *server_sd_len);
+void NTDLL_free_struct_sd(struct security_descriptor *server_sd);
+
/* module handling */
extern NTSTATUS MODULE_DllThreadAttach( LPVOID lpReserved );
extern FARPROC RELAY_GetProcAddress( HMODULE module, const IMAGE_EXPORT_DIRECTORY *exports,
diff --git a/dlls/ntdll/sync.c b/dlls/ntdll/sync.c
index 6fbcca8..191cd07 100644
--- a/dlls/ntdll/sync.c
+++ b/dlls/ntdll/sync.c
@@ -60,9 +60,9 @@
WINE_DEFAULT_DEBUG_CHANNEL(ntdll);
-
-static NTSTATUS create_struct_sd(PSECURITY_DESCRIPTOR nt_sd, struct security_descriptor **server_sd,
- data_size_t *server_sd_len)
+/* creates a struct security_descriptor and contained information in one contiguous piece of memory */
+NTSTATUS NTDLL_create_struct_sd(PSECURITY_DESCRIPTOR nt_sd, struct security_descriptor **server_sd,
+ data_size_t *server_sd_len)
{
unsigned int len;
PSID owner, group;
@@ -124,7 +124,8 @@
return STATUS_SUCCESS;
}
-static void free_struct_sd(struct security_descriptor *server_sd)
+/* frees a struct security_descriptor allocated by NTDLL_create_struct_sd */
+void NTDLL_free_struct_sd(struct security_descriptor *server_sd)
{
RtlFreeHeap(GetProcessHeap(), 0, server_sd);
}
@@ -155,7 +156,7 @@
objattr.sd_len = 0;
if (attr)
{
- ret = create_struct_sd( attr->SecurityDescriptor, &sd, &objattr.sd_len );
+ ret = NTDLL_create_struct_sd( attr->SecurityDescriptor, &sd, &objattr.sd_len );
if (ret != STATUS_SUCCESS) return ret;
}
@@ -173,7 +174,7 @@
}
SERVER_END_REQ;
- free_struct_sd( sd );
+ NTDLL_free_struct_sd( sd );
return ret;
}
@@ -263,7 +264,7 @@
objattr.sd_len = 0;
if (attr)
{
- ret = create_struct_sd( attr->SecurityDescriptor, &sd, &objattr.sd_len );
+ ret = NTDLL_create_struct_sd( attr->SecurityDescriptor, &sd, &objattr.sd_len );
if (ret != STATUS_SUCCESS) return ret;
}
@@ -281,7 +282,7 @@
}
SERVER_END_REQ;
- free_struct_sd( sd );
+ NTDLL_free_struct_sd( sd );
return ret;
}
@@ -426,7 +427,7 @@
objattr.sd_len = 0;
if (attr)
{
- status = create_struct_sd( attr->SecurityDescriptor, &sd, &objattr.sd_len );
+ status = NTDLL_create_struct_sd( attr->SecurityDescriptor, &sd, &objattr.sd_len );
if (status != STATUS_SUCCESS) return status;
}
@@ -443,7 +444,7 @@
}
SERVER_END_REQ;
- free_struct_sd( sd );
+ NTDLL_free_struct_sd( sd );
return status;
}
diff --git a/dlls/ntdll/virtual.c b/dlls/ntdll/virtual.c
index 39d81ed..2c08a16 100644
--- a/dlls/ntdll/virtual.c
+++ b/dlls/ntdll/virtual.c
@@ -1855,11 +1855,21 @@
NTSTATUS ret;
BYTE vprot;
DWORD len = (attr && attr->ObjectName) ? attr->ObjectName->Length : 0;
+ struct security_descriptor *sd = NULL;
+ struct object_attributes objattr;
/* Check parameters */
if (len > MAX_PATH*sizeof(WCHAR)) return STATUS_NAME_TOO_LONG;
+ objattr.rootdir = attr ? attr->RootDirectory : 0;
+ objattr.sd_len = 0;
+ if (attr)
+ {
+ ret = NTDLL_create_struct_sd( attr->SecurityDescriptor, &sd, &objattr.sd_len );
+ if (ret != STATUS_SUCCESS) return ret;
+ }
+
vprot = VIRTUAL_GetProt( protect );
if (sec_flags & SEC_RESERVE)
{
@@ -1875,15 +1885,19 @@
{
req->access = access;
req->attributes = (attr) ? attr->Attributes : 0;
- req->rootdir = attr ? attr->RootDirectory : 0;
req->file_handle = file;
req->size = size ? size->QuadPart : 0;
req->protect = vprot;
+ wine_server_add_data( req, &objattr, sizeof(objattr) );
+ if (objattr.sd_len) wine_server_add_data( req, sd, objattr.sd_len );
if (len) wine_server_add_data( req, attr->ObjectName->Buffer, len );
ret = wine_server_call( req );
*handle = reply->handle;
}
SERVER_END_REQ;
+
+ NTDLL_free_struct_sd( sd );
+
return ret;
}
diff --git a/include/wine/server_protocol.h b/include/wine/server_protocol.h
index 8235948..e7ce2cb 100644
--- a/include/wine/server_protocol.h
+++ b/include/wine/server_protocol.h
@@ -1665,11 +1665,10 @@
struct request_header __header;
unsigned int access;
unsigned int attributes;
- obj_handle_t rootdir;
file_pos_t size;
int protect;
obj_handle_t file_handle;
- /* VARARG(name,unicode_str); */
+ /* VARARG(objattr,object_attributes); */
};
struct create_mapping_reply
{
@@ -4878,6 +4877,6 @@
struct set_completion_info_reply set_completion_info_reply;
};
-#define SERVER_PROTOCOL_VERSION 320
+#define SERVER_PROTOCOL_VERSION 321
#endif /* __WINE_WINE_SERVER_PROTOCOL_H */
diff --git a/server/mapping.c b/server/mapping.c
index 33e4204..8f1bf5c 100644
--- a/server/mapping.c
+++ b/server/mapping.c
@@ -37,6 +37,7 @@
#include "handle.h"
#include "thread.h"
#include "request.h"
+#include "security.h"
struct mapping
{
@@ -281,7 +282,7 @@
static struct object *create_mapping( struct directory *root, const struct unicode_str *name,
unsigned int attr, file_pos_t size, int protect,
- obj_handle_t handle )
+ obj_handle_t handle, const struct security_descriptor *sd )
{
struct mapping *mapping;
int access = 0;
@@ -293,6 +294,10 @@
if (get_error() == STATUS_OBJECT_NAME_EXISTS)
return &mapping->obj; /* Nothing else to do */
+ if (sd) default_set_sd( &mapping->obj, sd, OWNER_SECURITY_INFORMATION|
+ GROUP_SECURITY_INFORMATION|
+ DACL_SECURITY_INFORMATION|
+ SACL_SECURITY_INFORMATION );
mapping->header_size = 0;
mapping->base = NULL;
mapping->shared_file = NULL;
@@ -394,13 +399,24 @@
struct object *obj;
struct unicode_str name;
struct directory *root = NULL;
+ const struct object_attributes *objattr = get_req_data();
+ const struct security_descriptor *sd;
reply->handle = 0;
- get_req_unicode_str( &name );
- if (req->rootdir && !(root = get_directory_obj( current->process, req->rootdir, 0 )))
+
+ if (!objattr_is_valid( objattr, get_req_data_size() ))
return;
- if ((obj = create_mapping( root, &name, req->attributes, req->size, req->protect, req->file_handle )))
+ sd = objattr->sd_len ? (const struct security_descriptor *)(objattr + 1) : NULL;
+
+ /* get unicode string */
+ name.len = ((get_req_data_size() - sizeof(*objattr) - objattr->sd_len) / sizeof(WCHAR)) * sizeof(WCHAR);
+ name.str = (const WCHAR *)get_req_data() + (sizeof(*objattr) + objattr->sd_len) / sizeof(WCHAR);
+
+ if (objattr->rootdir && !(root = get_directory_obj( current->process, objattr->rootdir, 0 )))
+ return;
+
+ if ((obj = create_mapping( root, &name, req->attributes, req->size, req->protect, req->file_handle, sd )))
{
reply->handle = alloc_handle( current->process, obj, req->access, req->attributes );
release_object( obj );
diff --git a/server/protocol.def b/server/protocol.def
index e486367..d336af6 100644
--- a/server/protocol.def
+++ b/server/protocol.def
@@ -1310,11 +1310,10 @@
@REQ(create_mapping)
unsigned int access; /* wanted access rights */
unsigned int attributes; /* object attributes */
- obj_handle_t rootdir; /* root directory */
file_pos_t size; /* mapping size */
int protect; /* protection flags (see below) */
obj_handle_t file_handle; /* file handle */
- VARARG(name,unicode_str); /* object name */
+ VARARG(objattr,object_attributes); /* object attributes */
@REPLY
obj_handle_t handle; /* handle to the mapping */
@END
diff --git a/server/trace.c b/server/trace.c
index 377d9de..30d6efd 100644
--- a/server/trace.c
+++ b/server/trace.c
@@ -1721,14 +1721,13 @@
{
fprintf( stderr, " access=%08x,", req->access );
fprintf( stderr, " attributes=%08x,", req->attributes );
- fprintf( stderr, " rootdir=%p,", req->rootdir );
fprintf( stderr, " size=" );
dump_file_pos( &req->size );
fprintf( stderr, "," );
fprintf( stderr, " protect=%d,", req->protect );
fprintf( stderr, " file_handle=%p,", req->file_handle );
- fprintf( stderr, " name=" );
- dump_varargs_unicode_str( cur_size );
+ fprintf( stderr, " objattr=" );
+ dump_varargs_object_attributes( cur_size );
}
static void dump_create_mapping_reply( const struct create_mapping_reply *req )