mirror of
https://github.com/reactos/wine.git
synced 2024-12-14 23:29:44 +00:00
389 lines
12 KiB
C
389 lines
12 KiB
C
/*
|
|
* Object management functions
|
|
*
|
|
* Copyright 1999, 2000 Juergen Schmied
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this library; if not, write to the Free Software
|
|
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
|
*/
|
|
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <unistd.h>
|
|
#include "wine/debug.h"
|
|
|
|
#include "ntddk.h"
|
|
#include "ntdll_misc.h"
|
|
#include "wine/server.h"
|
|
|
|
WINE_DEFAULT_DEBUG_CHANNEL(ntdll);
|
|
|
|
/* move to somewhere */
|
|
typedef void * POBJDIR_INFORMATION;
|
|
|
|
/*
|
|
* Generic object functions
|
|
*/
|
|
|
|
/******************************************************************************
|
|
* NtQueryObject [NTDLL.@]
|
|
* ZwQueryObject [NTDLL.@]
|
|
*/
|
|
NTSTATUS WINAPI NtQueryObject(
|
|
IN HANDLE ObjectHandle,
|
|
IN OBJECT_INFORMATION_CLASS ObjectInformationClass,
|
|
OUT PVOID ObjectInformation,
|
|
IN ULONG Length,
|
|
OUT PULONG ResultLength)
|
|
{
|
|
FIXME("(0x%08x,0x%08x,%p,0x%08lx,%p): stub\n",
|
|
ObjectHandle, ObjectInformationClass, ObjectInformation, Length, ResultLength);
|
|
return 0;
|
|
}
|
|
|
|
/******************************************************************************
|
|
* NtQuerySecurityObject [NTDLL.@]
|
|
*
|
|
* analogue to GetKernelObjectSecurity
|
|
*
|
|
* NOTES
|
|
* only the lowest 4 bit of SecurityObjectInformationClass are used
|
|
* 0x7-0xf returns STATUS_ACCESS_DENIED (even running with system privileges)
|
|
*
|
|
* FIXME: we are constructing a fake sid
|
|
* (Administrators:Full, System:Full, Everyone:Read)
|
|
*/
|
|
NTSTATUS WINAPI
|
|
NtQuerySecurityObject(
|
|
IN HANDLE Object,
|
|
IN SECURITY_INFORMATION RequestedInformation,
|
|
OUT PSECURITY_DESCRIPTOR pSecurityDesriptor,
|
|
IN ULONG Length,
|
|
OUT PULONG ResultLength)
|
|
{
|
|
static SID_IDENTIFIER_AUTHORITY localSidAuthority = {SECURITY_NT_AUTHORITY};
|
|
static SID_IDENTIFIER_AUTHORITY worldSidAuthority = {SECURITY_WORLD_SID_AUTHORITY};
|
|
BYTE Buffer[256];
|
|
PISECURITY_DESCRIPTOR_RELATIVE psd = (PISECURITY_DESCRIPTOR_RELATIVE)Buffer;
|
|
UINT BufferIndex = sizeof(SECURITY_DESCRIPTOR_RELATIVE);
|
|
|
|
FIXME("(0x%08x,0x%08lx,%p,0x%08lx,%p) stub!\n",
|
|
Object, RequestedInformation, pSecurityDesriptor, Length, ResultLength);
|
|
|
|
RequestedInformation &= 0x0000000f;
|
|
|
|
if (RequestedInformation & SACL_SECURITY_INFORMATION) return STATUS_ACCESS_DENIED;
|
|
|
|
ZeroMemory(Buffer, 256);
|
|
RtlCreateSecurityDescriptor((PSECURITY_DESCRIPTOR)psd, SECURITY_DESCRIPTOR_REVISION);
|
|
psd->Control = SE_SELF_RELATIVE |
|
|
((RequestedInformation & DACL_SECURITY_INFORMATION) ? SE_DACL_PRESENT:0);
|
|
|
|
/* owner: administrator S-1-5-20-220*/
|
|
if (OWNER_SECURITY_INFORMATION & RequestedInformation)
|
|
{
|
|
PSID psid = (PSID)&(Buffer[BufferIndex]);
|
|
|
|
psd->Owner = BufferIndex;
|
|
BufferIndex += RtlLengthRequiredSid(2);
|
|
|
|
psid->Revision = SID_REVISION;
|
|
psid->SubAuthorityCount = 2;
|
|
psid->IdentifierAuthority = localSidAuthority;
|
|
psid->SubAuthority[0] = SECURITY_BUILTIN_DOMAIN_RID;
|
|
psid->SubAuthority[1] = DOMAIN_ALIAS_RID_ADMINS;
|
|
}
|
|
|
|
/* group: built in domain S-1-5-12 */
|
|
if (GROUP_SECURITY_INFORMATION & RequestedInformation)
|
|
{
|
|
PSID psid = (PSID) &(Buffer[BufferIndex]);
|
|
|
|
psd->Group = BufferIndex;
|
|
BufferIndex += RtlLengthRequiredSid(1);
|
|
|
|
psid->Revision = SID_REVISION;
|
|
psid->SubAuthorityCount = 1;
|
|
psid->IdentifierAuthority = localSidAuthority;
|
|
psid->SubAuthority[0] = SECURITY_LOCAL_SYSTEM_RID;
|
|
}
|
|
|
|
/* discretionary ACL */
|
|
if (DACL_SECURITY_INFORMATION & RequestedInformation)
|
|
{
|
|
/* acl header */
|
|
PACL pacl = (PACL)&(Buffer[BufferIndex]);
|
|
PACCESS_ALLOWED_ACE pace;
|
|
PSID psid;
|
|
|
|
psd->Dacl = BufferIndex;
|
|
|
|
pacl->AclRevision = MIN_ACL_REVISION;
|
|
pacl->AceCount = 3;
|
|
pacl->AclSize = BufferIndex; /* storing the start index temporary */
|
|
|
|
BufferIndex += sizeof(ACL);
|
|
|
|
/* ACE System - full access */
|
|
pace = (PACCESS_ALLOWED_ACE)&(Buffer[BufferIndex]);
|
|
BufferIndex += sizeof(ACCESS_ALLOWED_ACE)-sizeof(DWORD);
|
|
|
|
pace->Header.AceType = ACCESS_ALLOWED_ACE_TYPE;
|
|
pace->Header.AceFlags = CONTAINER_INHERIT_ACE;
|
|
pace->Header.AceSize = sizeof(ACCESS_ALLOWED_ACE)-sizeof(DWORD) + RtlLengthRequiredSid(1);
|
|
pace->Mask = DELETE | READ_CONTROL | WRITE_DAC | WRITE_OWNER | 0x3f;
|
|
pace->SidStart = BufferIndex;
|
|
|
|
/* SID S-1-5-12 (System) */
|
|
psid = (PSID)&(Buffer[BufferIndex]);
|
|
|
|
BufferIndex += RtlLengthRequiredSid(1);
|
|
|
|
psid->Revision = SID_REVISION;
|
|
psid->SubAuthorityCount = 1;
|
|
psid->IdentifierAuthority = localSidAuthority;
|
|
psid->SubAuthority[0] = SECURITY_LOCAL_SYSTEM_RID;
|
|
|
|
/* ACE Administrators - full access*/
|
|
pace = (PACCESS_ALLOWED_ACE) &(Buffer[BufferIndex]);
|
|
BufferIndex += sizeof(ACCESS_ALLOWED_ACE)-sizeof(DWORD);
|
|
|
|
pace->Header.AceType = ACCESS_ALLOWED_ACE_TYPE;
|
|
pace->Header.AceFlags = CONTAINER_INHERIT_ACE;
|
|
pace->Header.AceSize = sizeof(ACCESS_ALLOWED_ACE)-sizeof(DWORD) + RtlLengthRequiredSid(2);
|
|
pace->Mask = DELETE | READ_CONTROL | WRITE_DAC | WRITE_OWNER | 0x3f;
|
|
pace->SidStart = BufferIndex;
|
|
|
|
/* S-1-5-12 (Administrators) */
|
|
psid = (PSID)&(Buffer[BufferIndex]);
|
|
|
|
BufferIndex += RtlLengthRequiredSid(2);
|
|
|
|
psid->Revision = SID_REVISION;
|
|
psid->SubAuthorityCount = 2;
|
|
psid->IdentifierAuthority = localSidAuthority;
|
|
psid->SubAuthority[0] = SECURITY_BUILTIN_DOMAIN_RID;
|
|
psid->SubAuthority[1] = DOMAIN_ALIAS_RID_ADMINS;
|
|
|
|
/* ACE Everyone - read access */
|
|
pace = (PACCESS_ALLOWED_ACE)&(Buffer[BufferIndex]);
|
|
BufferIndex += sizeof(ACCESS_ALLOWED_ACE)-sizeof(DWORD);
|
|
|
|
pace->Header.AceType = ACCESS_ALLOWED_ACE_TYPE;
|
|
pace->Header.AceFlags = CONTAINER_INHERIT_ACE;
|
|
pace->Header.AceSize = sizeof(ACCESS_ALLOWED_ACE)-sizeof(DWORD) + RtlLengthRequiredSid(1);
|
|
pace->Mask = READ_CONTROL| 0x19;
|
|
pace->SidStart = BufferIndex;
|
|
|
|
/* SID S-1-1-0 (Everyone) */
|
|
psid = (PSID)&(Buffer[BufferIndex]);
|
|
|
|
BufferIndex += RtlLengthRequiredSid(1);
|
|
|
|
psid->Revision = SID_REVISION;
|
|
psid->SubAuthorityCount = 1;
|
|
psid->IdentifierAuthority = worldSidAuthority;
|
|
psid->SubAuthority[0] = 0;
|
|
|
|
/* calculate used bytes */
|
|
pacl->AclSize = BufferIndex - pacl->AclSize;
|
|
}
|
|
*ResultLength = BufferIndex;
|
|
TRACE("len=%lu\n", *ResultLength);
|
|
if (Length < *ResultLength) return STATUS_BUFFER_TOO_SMALL;
|
|
memcpy(pSecurityDesriptor, Buffer, *ResultLength);
|
|
|
|
return STATUS_SUCCESS;
|
|
}
|
|
/******************************************************************************
|
|
* NtDuplicateObject [NTDLL.@]
|
|
* ZwDuplicateObject [NTDLL.@]
|
|
*/
|
|
NTSTATUS WINAPI NtDuplicateObject(
|
|
IN HANDLE SourceProcessHandle,
|
|
IN PHANDLE SourceHandle,
|
|
IN HANDLE TargetProcessHandle,
|
|
OUT PHANDLE TargetHandle,
|
|
IN ACCESS_MASK DesiredAccess,
|
|
IN BOOLEAN InheritHandle,
|
|
ULONG Options)
|
|
{
|
|
FIXME("(0x%08x,%p,0x%08x,%p,0x%08lx,0x%08x,0x%08lx) stub!\n",
|
|
SourceProcessHandle,SourceHandle,TargetProcessHandle,TargetHandle,
|
|
DesiredAccess,InheritHandle,Options);
|
|
*TargetHandle = 0;
|
|
return 0;
|
|
}
|
|
|
|
/**************************************************************************
|
|
* NtClose [NTDLL.@]
|
|
* FUNCTION: Closes a handle reference to an object
|
|
* ARGUMENTS:
|
|
* Handle handle to close
|
|
*/
|
|
NTSTATUS WINAPI NtClose( HANDLE Handle )
|
|
{
|
|
NTSTATUS ret;
|
|
SERVER_START_REQ( close_handle )
|
|
{
|
|
req->handle = Handle;
|
|
ret = wine_server_call( req );
|
|
if (!ret && reply->fd != -1) close( reply->fd );
|
|
}
|
|
SERVER_END_REQ;
|
|
return ret;
|
|
}
|
|
|
|
/******************************************************************************
|
|
* NtWaitForSingleObject [NTDLL.@]
|
|
* ZwWaitForSingleObject [NTDLL.@]
|
|
*/
|
|
NTSTATUS WINAPI NtWaitForSingleObject(
|
|
IN PHANDLE Object,
|
|
IN BOOLEAN Alertable,
|
|
IN PLARGE_INTEGER Time)
|
|
{
|
|
FIXME("(%p,0x%08x,%p),stub!\n",Object,Alertable,Time);
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* Directory functions
|
|
*/
|
|
|
|
/**************************************************************************
|
|
* NtOpenDirectoryObject [NTDLL.@]
|
|
* ZwOpenDirectoryObject [NTDLL.@]
|
|
* FUNCTION: Opens a namespace directory object
|
|
* ARGUMENTS:
|
|
* DirectoryHandle Variable which receives the directory handle
|
|
* DesiredAccess Desired access to the directory
|
|
* ObjectAttributes Structure describing the directory
|
|
* RETURNS: Status
|
|
*/
|
|
NTSTATUS WINAPI NtOpenDirectoryObject(
|
|
PHANDLE DirectoryHandle,
|
|
ACCESS_MASK DesiredAccess,
|
|
POBJECT_ATTRIBUTES ObjectAttributes)
|
|
{
|
|
FIXME("(%p,0x%08lx,%p): stub\n",
|
|
DirectoryHandle, DesiredAccess, ObjectAttributes);
|
|
dump_ObjectAttributes(ObjectAttributes);
|
|
return 0;
|
|
}
|
|
|
|
/******************************************************************************
|
|
* NtCreateDirectoryObject [NTDLL.@]
|
|
* ZwCreateDirectoryObject [NTDLL.@]
|
|
*/
|
|
NTSTATUS WINAPI NtCreateDirectoryObject(
|
|
PHANDLE DirectoryHandle,
|
|
ACCESS_MASK DesiredAccess,
|
|
POBJECT_ATTRIBUTES ObjectAttributes)
|
|
{
|
|
FIXME("(%p,0x%08lx,%p),stub!\n",
|
|
DirectoryHandle,DesiredAccess,ObjectAttributes);
|
|
dump_ObjectAttributes(ObjectAttributes);
|
|
return 0;
|
|
}
|
|
|
|
/******************************************************************************
|
|
* NtQueryDirectoryObject [NTDLL.@]
|
|
* ZwQueryDirectoryObject [NTDLL.@]
|
|
* FUNCTION: Reads information from a namespace directory
|
|
* ARGUMENTS:
|
|
* DirObjInformation Buffer to hold the data read
|
|
* BufferLength Size of the buffer in bytes
|
|
* GetNextIndex If TRUE then set ObjectIndex to the index of the next object
|
|
* If FALSE then set ObjectIndex to the number of objects in the directory
|
|
* IgnoreInputIndex If TRUE start reading at index 0
|
|
* If FALSE start reading at the index specified by object index
|
|
* ObjectIndex Zero based index into the directory, interpretation depends on IgnoreInputIndex and GetNextIndex
|
|
* DataWritten Caller supplied storage for the number of bytes written (or NULL)
|
|
*/
|
|
NTSTATUS WINAPI NtQueryDirectoryObject(
|
|
IN HANDLE DirObjHandle,
|
|
OUT POBJDIR_INFORMATION DirObjInformation,
|
|
IN ULONG BufferLength,
|
|
IN BOOLEAN GetNextIndex,
|
|
IN BOOLEAN IgnoreInputIndex,
|
|
IN OUT PULONG ObjectIndex,
|
|
OUT PULONG DataWritten OPTIONAL)
|
|
{
|
|
FIXME("(0x%08x,%p,0x%08lx,0x%08x,0x%08x,%p,%p) stub\n",
|
|
DirObjHandle, DirObjInformation, BufferLength, GetNextIndex,
|
|
IgnoreInputIndex, ObjectIndex, DataWritten);
|
|
return 0xc0000000; /* We don't have any. Whatever. (Yet.) */
|
|
}
|
|
|
|
/*
|
|
* Link objects
|
|
*/
|
|
|
|
/******************************************************************************
|
|
* NtOpenSymbolicLinkObject [NTDLL.@]
|
|
*/
|
|
NTSTATUS WINAPI NtOpenSymbolicLinkObject(
|
|
OUT PHANDLE LinkHandle,
|
|
IN ACCESS_MASK DesiredAccess,
|
|
IN POBJECT_ATTRIBUTES ObjectAttributes)
|
|
{
|
|
FIXME("(%p,0x%08lx,%p) stub\n",
|
|
LinkHandle, DesiredAccess, ObjectAttributes);
|
|
dump_ObjectAttributes(ObjectAttributes);
|
|
return 0;
|
|
}
|
|
|
|
/******************************************************************************
|
|
* NtCreateSymbolicLinkObject [NTDLL.@]
|
|
*/
|
|
NTSTATUS WINAPI NtCreateSymbolicLinkObject(
|
|
OUT PHANDLE SymbolicLinkHandle,
|
|
IN ACCESS_MASK DesiredAccess,
|
|
IN POBJECT_ATTRIBUTES ObjectAttributes,
|
|
IN PUNICODE_STRING Name)
|
|
{
|
|
FIXME("(%p,0x%08lx,%p, %p) stub\n",
|
|
SymbolicLinkHandle, DesiredAccess, ObjectAttributes, debugstr_us(Name));
|
|
dump_ObjectAttributes(ObjectAttributes);
|
|
return 0;
|
|
}
|
|
|
|
/******************************************************************************
|
|
* NtQuerySymbolicLinkObject [NTDLL.@]
|
|
*/
|
|
NTSTATUS WINAPI NtQuerySymbolicLinkObject(
|
|
IN HANDLE LinkHandle,
|
|
IN OUT PUNICODE_STRING LinkTarget,
|
|
OUT PULONG ReturnedLength OPTIONAL)
|
|
{
|
|
FIXME("(0x%08x,%p,%p) stub\n",
|
|
LinkHandle, debugstr_us(LinkTarget), ReturnedLength);
|
|
|
|
return 0;
|
|
}
|
|
|
|
/******************************************************************************
|
|
* NtAllocateUuids [NTDLL.@]
|
|
*
|
|
* I have seen lpdwCount pointing to a pointer once...
|
|
*/
|
|
NTSTATUS WINAPI NtAllocateUuids(LPDWORD lpdwCount, LPDWORD *p2, LPDWORD *p3)
|
|
{
|
|
FIXME("(%p[%ld],%p,%p), stub.\n", lpdwCount,
|
|
lpdwCount ? *lpdwCount : 0,
|
|
p2, p3);
|
|
return 0;
|
|
}
|