token.c 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363
  1. /*
  2. * Tokens
  3. *
  4. * Copyright (C) 1998 Alexandre Julliard
  5. * Copyright (C) 2003 Mike McCormack
  6. *
  7. * This library is free software; you can redistribute it and/or
  8. * modify it under the terms of the GNU Lesser General Public
  9. * License as published by the Free Software Foundation; either
  10. * version 2.1 of the License, or (at your option) any later version.
  11. *
  12. * This library is distributed in the hope that it will be useful,
  13. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  14. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  15. * Lesser General Public License for more details.
  16. *
  17. * You should have received a copy of the GNU Lesser General Public
  18. * License along with this library; if not, write to the Free Software
  19. * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
  20. */
  21. #include "config.h"
  22. #include <assert.h>
  23. #include <stdio.h>
  24. #include <stdlib.h>
  25. #include "windef.h"
  26. #include "handle.h"
  27. #include "thread.h"
  28. #include "process.h"
  29. #include "request.h"
  30. struct token
  31. {
  32. struct object obj; /* object header */
  33. struct list privileges; /* privileges available to the token */
  34. };
  35. struct privilege
  36. {
  37. struct list entry;
  38. LUID luid;
  39. int enabled : 1; /* is the privilege currently enabled? */
  40. int def : 1; /* is the privilege enabled by default? */
  41. };
  42. static void token_dump( struct object *obj, int verbose );
  43. static void token_destroy( struct object *obj );
  44. static const struct object_ops token_ops =
  45. {
  46. sizeof(struct token), /* size */
  47. token_dump, /* dump */
  48. no_add_queue, /* add_queue */
  49. NULL, /* remove_queue */
  50. NULL, /* signaled */
  51. NULL, /* satified */
  52. no_get_fd, /* get_fd */
  53. token_destroy /* destroy */
  54. };
  55. static void token_dump( struct object *obj, int verbose )
  56. {
  57. fprintf( stderr, "Security token\n" );
  58. }
  59. static inline int is_equal_luid( const LUID *luid1, const LUID *luid2 )
  60. {
  61. return (luid1->LowPart == luid2->LowPart && luid1->HighPart == luid2->HighPart);
  62. }
  63. static inline void luid_and_attr_from_privilege( LUID_AND_ATTRIBUTES *out, const struct privilege *in)
  64. {
  65. out->Luid = in->luid;
  66. out->Attributes =
  67. (in->enabled ? SE_PRIVILEGE_ENABLED : 0) |
  68. (in->def ? SE_PRIVILEGE_ENABLED_BY_DEFAULT : 0);
  69. }
  70. static struct privilege *privilege_add( struct token *token, const LUID *luid, int enabled )
  71. {
  72. struct privilege *privilege = mem_alloc( sizeof(*privilege) );
  73. if (privilege)
  74. {
  75. privilege->luid = *luid;
  76. privilege->def = privilege->enabled = (enabled != 0);
  77. list_add_tail( &token->privileges, &privilege->entry );
  78. }
  79. return privilege;
  80. }
  81. static void privilege_remove( struct privilege *privilege )
  82. {
  83. list_remove( &privilege->entry );
  84. free( privilege );
  85. }
  86. static void token_destroy( struct object *obj )
  87. {
  88. struct token* token;
  89. struct list *cursor, *cursor_next;
  90. assert( obj->ops == &token_ops );
  91. token = (struct token *)obj;
  92. LIST_FOR_EACH_SAFE( cursor, cursor_next, &token->privileges )
  93. {
  94. struct privilege *privilege = LIST_ENTRY( cursor, struct privilege, entry );
  95. privilege_remove( privilege );
  96. }
  97. }
  98. static struct token *create_token( const LUID_AND_ATTRIBUTES *privs, unsigned int priv_count )
  99. {
  100. struct token *token = alloc_object( &token_ops );
  101. if (token)
  102. {
  103. int i;
  104. list_init( &token->privileges );
  105. for (i = 0; i < priv_count; i++)
  106. {
  107. /* note: we don't check uniqueness: the caller must make sure
  108. * privs doesn't contain any duplicate luids */
  109. if (!privilege_add( token, &privs[i].Luid,
  110. privs[i].Attributes & SE_PRIVILEGE_ENABLED ))
  111. {
  112. release_object( token );
  113. return NULL;
  114. }
  115. }
  116. }
  117. return token;
  118. }
  119. struct token *create_admin_token( void )
  120. {
  121. static const LUID_AND_ATTRIBUTES admin_privs[] =
  122. {
  123. { { 23, 0 }, SE_PRIVILEGE_ENABLED }, /* SeChangeNotifyPrivilege */
  124. { { 8, 0 }, 0 }, /* SeSecurityPrivilege */
  125. { { 17, 0 }, 0 }, /* SeBackupPrivilege */
  126. { { 18, 0 }, 0 }, /* SeRestorePrivilege */
  127. { { 12, 0 }, 0 }, /* SeSystemtimePrivilege */
  128. { { 19, 0 }, 0 }, /* SeShutdownPrivilege */
  129. { { 24, 0 }, 0 }, /* SeRemoteShutdownPrivilege */
  130. { { 9, 0 }, 0 }, /* SeTakeOwnershipPrivilege */
  131. { { 20, 0 }, 0 }, /* SeDebugPrivilege */
  132. { { 22, 0 }, 0 }, /* SeSystemEnvironmentPrivilege */
  133. { { 11, 0 }, 0 }, /* SeSystemProfilePrivilege */
  134. { { 13, 0 }, 0 }, /* SeProfileSingleProcessPrivilege */
  135. { { 14, 0 }, 0 }, /* SeIncreaseBasePriorityPrivilege */
  136. { { 10, 0 }, 0 }, /* SeLoadDriverPrivilege */
  137. { { 15, 0 }, 0 }, /* SeCreatePagefilePrivilege */
  138. { { 5, 0 }, 0 }, /* SeIncreaseQuotaPrivilege */
  139. { { 25, 0 }, 0 }, /* SeUndockPrivilege */
  140. { { 28, 0 }, 0 }, /* SeManageVolumePrivilege */
  141. { { 29, 0 }, SE_PRIVILEGE_ENABLED }, /* SeImpersonatePrivilege */
  142. { { 30, 0 }, SE_PRIVILEGE_ENABLED }, /* SeCreateGlobalPrivilege */
  143. };
  144. return create_token( admin_privs, sizeof(admin_privs)/sizeof(admin_privs[0]) );
  145. }
  146. static struct privilege *token_find_privilege( struct token *token, const LUID *luid, int enabled_only)
  147. {
  148. struct privilege *privilege;
  149. LIST_FOR_EACH_ENTRY( privilege, &token->privileges, struct privilege, entry )
  150. {
  151. if (is_equal_luid( luid, &privilege->luid ))
  152. {
  153. if (enabled_only && !privilege->enabled)
  154. return NULL;
  155. return privilege;
  156. }
  157. }
  158. return NULL;
  159. }
  160. static unsigned int token_adjust_privileges( struct token *token, const LUID_AND_ATTRIBUTES *privs,
  161. unsigned int count, LUID_AND_ATTRIBUTES *mod_privs,
  162. unsigned int mod_privs_count)
  163. {
  164. int i;
  165. unsigned int modified_count = 0;
  166. for (i = 0; i < count; i++)
  167. {
  168. struct privilege *privilege =
  169. token_find_privilege( token, &privs[i].Luid, FALSE );
  170. if (!privilege)
  171. {
  172. set_error( STATUS_NOT_ALL_ASSIGNED );
  173. continue;
  174. }
  175. if (privs[i].Attributes & SE_PRIVILEGE_REMOVE)
  176. privilege_remove( privilege );
  177. else
  178. {
  179. /* save previous state for caller */
  180. if (mod_privs_count)
  181. {
  182. luid_and_attr_from_privilege(mod_privs, privilege);
  183. mod_privs++;
  184. mod_privs_count--;
  185. modified_count++;
  186. }
  187. if (privs[i].Attributes & SE_PRIVILEGE_ENABLED)
  188. privilege->enabled = TRUE;
  189. else
  190. privilege->enabled = FALSE;
  191. }
  192. }
  193. return modified_count;
  194. }
  195. static void token_disable_privileges( struct token *token )
  196. {
  197. struct privilege *privilege;
  198. LIST_FOR_EACH_ENTRY( privilege, &token->privileges, struct privilege, entry )
  199. privilege->enabled = FALSE;
  200. }
  201. /* open a security token */
  202. DECL_HANDLER(open_token)
  203. {
  204. if( req->flags & OPEN_TOKEN_THREAD )
  205. {
  206. struct thread *thread = get_thread_from_handle( req->handle, 0 );
  207. if (thread)
  208. {
  209. if (thread->token)
  210. reply->token = alloc_handle( current->process, thread->token, TOKEN_ALL_ACCESS, 0);
  211. else
  212. set_error(STATUS_NO_TOKEN);
  213. release_object( thread );
  214. }
  215. }
  216. else
  217. {
  218. struct process *process = get_process_from_handle( req->handle, 0 );
  219. if (process)
  220. {
  221. if (process->token)
  222. reply->token = alloc_handle( current->process, process->token, TOKEN_ALL_ACCESS, 0);
  223. else
  224. set_error(STATUS_NO_TOKEN);
  225. release_object( process );
  226. }
  227. }
  228. }
  229. /* adjust the privileges held by a token */
  230. DECL_HANDLER(adjust_token_privileges)
  231. {
  232. struct token *token;
  233. unsigned int access = TOKEN_ADJUST_PRIVILEGES;
  234. if (req->get_modified_state) access |= TOKEN_QUERY;
  235. if ((token = (struct token *)get_handle_obj( current->process, req->handle,
  236. access, &token_ops )))
  237. {
  238. const LUID_AND_ATTRIBUTES *privs = get_req_data();
  239. LUID_AND_ATTRIBUTES *modified_privs = NULL;
  240. unsigned int priv_count = get_req_data_size() / sizeof(LUID_AND_ATTRIBUTES);
  241. unsigned int modified_priv_count = 0;
  242. if (req->get_modified_state && !req->disable_all)
  243. {
  244. int i;
  245. /* count modified privs */
  246. for (i = 0; i < priv_count; i++)
  247. {
  248. struct privilege *privilege =
  249. token_find_privilege( token, &privs[i].Luid, FALSE );
  250. if (privilege && req->get_modified_state)
  251. modified_priv_count++;
  252. }
  253. reply->len = modified_priv_count;
  254. modified_priv_count = min( modified_priv_count, get_reply_max_size() / sizeof(*modified_privs) );
  255. if (modified_priv_count)
  256. modified_privs = set_reply_data_size( modified_priv_count * sizeof(*modified_privs) );
  257. }
  258. reply->len = modified_priv_count * sizeof(*modified_privs);
  259. if (req->disable_all)
  260. token_disable_privileges( token );
  261. else
  262. modified_priv_count = token_adjust_privileges( token, privs,
  263. priv_count, modified_privs, modified_priv_count );
  264. release_object( token );
  265. }
  266. }
  267. /* retrieves the list of privileges that may be held be the token */
  268. DECL_HANDLER(get_token_privileges)
  269. {
  270. struct token *token;
  271. if ((token = (struct token *)get_handle_obj( current->process, req->handle,
  272. TOKEN_QUERY,
  273. &token_ops )))
  274. {
  275. int priv_count = 0;
  276. LUID_AND_ATTRIBUTES *privs;
  277. struct privilege *privilege;
  278. LIST_FOR_EACH_ENTRY( privilege, &token->privileges, struct privilege, entry )
  279. priv_count++;
  280. reply->len = priv_count * sizeof(*privs);
  281. if (reply->len <= get_reply_max_size())
  282. {
  283. privs = set_reply_data_size( priv_count * sizeof(*privs) );
  284. if (privs)
  285. {
  286. int i = 0;
  287. LIST_FOR_EACH_ENTRY( privilege, &token->privileges, struct privilege, entry )
  288. {
  289. luid_and_attr_from_privilege( &privs[i], privilege );
  290. i++;
  291. }
  292. }
  293. }
  294. else
  295. set_error(STATUS_BUFFER_TOO_SMALL);
  296. release_object( token );
  297. }
  298. }
  299. /* creates a duplicate of the token */
  300. DECL_HANDLER(duplicate_token)
  301. {
  302. struct token *src_token;
  303. if ((src_token = (struct token *)get_handle_obj( current->process, req->handle,
  304. TOKEN_DUPLICATE,
  305. &token_ops )))
  306. {
  307. /* FIXME: use req->primary and req->impersonation_level */
  308. struct token *token = create_token( NULL, 0 );
  309. if (token)
  310. {
  311. struct privilege *privilege;
  312. unsigned int access;
  313. LIST_FOR_EACH_ENTRY( privilege, &src_token->privileges, struct privilege, entry )
  314. privilege_add( token, &privilege->luid, privilege->enabled );
  315. access = req->access;
  316. if (access & MAXIMUM_ALLOWED) access = TOKEN_ALL_ACCESS; /* FIXME: needs general solution */
  317. reply->new_handle = alloc_handle( current->process, token, access, req->inherit);
  318. release_object( token );
  319. }
  320. release_object( src_token );
  321. }
  322. }