2 * COPYRIGHT: See COPYING in the top level directory
3 * PROJECT: ReactOS kernel
4 * FILE: ntoskrnl/se/acl.c
5 * PURPOSE: Security manager
7 * PROGRAMMERS: David Welch <welch@cwcom.net>
10 /* INCLUDES *******************************************************************/
16 #if defined (ALLOC_PRAGMA)
17 #pragma alloc_text(INIT, SepInitDACLs)
20 /* GLOBALS ********************************************************************/
22 PACL SePublicDefaultDacl
= NULL
;
23 PACL SeSystemDefaultDacl
= NULL
;
24 PACL SePublicDefaultUnrestrictedDacl
= NULL
;
25 PACL SePublicOpenDacl
= NULL
;
26 PACL SePublicOpenUnrestrictedDacl
= NULL
;
27 PACL SeUnrestrictedDacl
= NULL
;
29 /* FUNCTIONS ******************************************************************/
38 /* create PublicDefaultDacl */
39 AclLength
= sizeof(ACL
) +
40 (sizeof(ACE
) + RtlLengthSid(SeWorldSid
)) +
41 (sizeof(ACE
) + RtlLengthSid(SeLocalSystemSid
));
43 SePublicDefaultDacl
= ExAllocatePoolWithTag(PagedPool
,
46 if (SePublicDefaultDacl
== NULL
)
49 RtlCreateAcl(SePublicDefaultDacl
,
53 RtlAddAccessAllowedAce(SePublicDefaultDacl
,
58 RtlAddAccessAllowedAce(SePublicDefaultDacl
,
63 /* create PublicDefaultUnrestrictedDacl */
64 AclLength
= sizeof(ACL
) +
65 (sizeof(ACE
) + RtlLengthSid(SeWorldSid
)) +
66 (sizeof(ACE
) + RtlLengthSid(SeLocalSystemSid
)) +
67 (sizeof(ACE
) + RtlLengthSid(SeAliasAdminsSid
)) +
68 (sizeof(ACE
) + RtlLengthSid(SeRestrictedCodeSid
));
70 SePublicDefaultUnrestrictedDacl
= ExAllocatePoolWithTag(PagedPool
,
73 if (SePublicDefaultUnrestrictedDacl
== NULL
)
76 RtlCreateAcl(SePublicDefaultUnrestrictedDacl
,
80 RtlAddAccessAllowedAce(SePublicDefaultUnrestrictedDacl
,
85 RtlAddAccessAllowedAce(SePublicDefaultUnrestrictedDacl
,
90 RtlAddAccessAllowedAce(SePublicDefaultUnrestrictedDacl
,
95 RtlAddAccessAllowedAce(SePublicDefaultUnrestrictedDacl
,
97 GENERIC_READ
| GENERIC_EXECUTE
| READ_CONTROL
,
100 /* create PublicOpenDacl */
101 AclLength
= sizeof(ACL
) +
102 (sizeof(ACE
) + RtlLengthSid(SeWorldSid
)) +
103 (sizeof(ACE
) + RtlLengthSid(SeLocalSystemSid
)) +
104 (sizeof(ACE
) + RtlLengthSid(SeAliasAdminsSid
));
106 SePublicOpenDacl
= ExAllocatePoolWithTag(PagedPool
,
109 if (SePublicOpenDacl
== NULL
)
112 RtlCreateAcl(SePublicOpenDacl
,
116 RtlAddAccessAllowedAce(SePublicOpenDacl
,
118 GENERIC_READ
| GENERIC_WRITE
| GENERIC_EXECUTE
,
121 RtlAddAccessAllowedAce(SePublicOpenDacl
,
126 RtlAddAccessAllowedAce(SePublicOpenDacl
,
131 /* create PublicOpenUnrestrictedDacl */
132 AclLength
= sizeof(ACL
) +
133 (sizeof(ACE
) + RtlLengthSid(SeWorldSid
)) +
134 (sizeof(ACE
) + RtlLengthSid(SeLocalSystemSid
)) +
135 (sizeof(ACE
) + RtlLengthSid(SeAliasAdminsSid
)) +
136 (sizeof(ACE
) + RtlLengthSid(SeRestrictedCodeSid
));
138 SePublicOpenUnrestrictedDacl
= ExAllocatePoolWithTag(PagedPool
,
141 if (SePublicOpenUnrestrictedDacl
== NULL
)
144 RtlCreateAcl(SePublicOpenUnrestrictedDacl
,
148 RtlAddAccessAllowedAce(SePublicOpenUnrestrictedDacl
,
153 RtlAddAccessAllowedAce(SePublicOpenUnrestrictedDacl
,
158 RtlAddAccessAllowedAce(SePublicOpenUnrestrictedDacl
,
163 RtlAddAccessAllowedAce(SePublicOpenUnrestrictedDacl
,
165 GENERIC_READ
| GENERIC_EXECUTE
,
166 SeRestrictedCodeSid
);
168 /* create SystemDefaultDacl */
169 AclLength
= sizeof(ACL
) +
170 (sizeof(ACE
) + RtlLengthSid(SeLocalSystemSid
)) +
171 (sizeof(ACE
) + RtlLengthSid(SeAliasAdminsSid
));
173 SeSystemDefaultDacl
= ExAllocatePoolWithTag(PagedPool
,
176 if (SeSystemDefaultDacl
== NULL
)
179 RtlCreateAcl(SeSystemDefaultDacl
,
183 RtlAddAccessAllowedAce(SeSystemDefaultDacl
,
188 RtlAddAccessAllowedAce(SeSystemDefaultDacl
,
190 GENERIC_READ
| GENERIC_EXECUTE
| READ_CONTROL
,
193 /* create UnrestrictedDacl */
194 AclLength
= sizeof(ACL
) +
195 (sizeof(ACE
) + RtlLengthSid(SeWorldSid
)) +
196 (sizeof(ACE
) + RtlLengthSid(SeRestrictedCodeSid
));
198 SeUnrestrictedDacl
= ExAllocatePoolWithTag(PagedPool
,
201 if (SeUnrestrictedDacl
== NULL
)
204 RtlCreateAcl(SeUnrestrictedDacl
,
208 RtlAddAccessAllowedAce(SeUnrestrictedDacl
,
213 RtlAddAccessAllowedAce(SeUnrestrictedDacl
,
215 GENERIC_READ
| GENERIC_EXECUTE
,
216 SeRestrictedCodeSid
);
222 SepCreateImpersonationTokenDacl(PTOKEN Token
,
231 AclLength
= sizeof(ACL
) +
232 (sizeof(ACE
) + RtlLengthSid(SeAliasAdminsSid
)) +
233 (sizeof(ACE
) + RtlLengthSid(SeRestrictedCodeSid
)) +
234 (sizeof(ACE
) + RtlLengthSid(SeLocalSystemSid
)) +
235 (sizeof(ACE
) + RtlLengthSid(Token
->UserAndGroups
->Sid
)) +
236 (sizeof(ACE
) + RtlLengthSid(PrimaryToken
->UserAndGroups
->Sid
));
238 TokenDacl
= ExAllocatePoolWithTag(PagedPool
, AclLength
, TAG_ACL
);
239 if (TokenDacl
== NULL
)
241 return STATUS_INSUFFICIENT_RESOURCES
;
244 RtlCreateAcl(TokenDacl
, AclLength
, ACL_REVISION
);
245 RtlAddAccessAllowedAce(TokenDacl
, ACL_REVISION
, GENERIC_ALL
,
246 Token
->UserAndGroups
->Sid
);
247 RtlAddAccessAllowedAce(TokenDacl
, ACL_REVISION
, GENERIC_ALL
,
248 PrimaryToken
->UserAndGroups
->Sid
);
249 RtlAddAccessAllowedAce(TokenDacl
, ACL_REVISION
, GENERIC_ALL
,
251 RtlAddAccessAllowedAce(TokenDacl
, ACL_REVISION
, GENERIC_ALL
,
256 if (Token
->RestrictedSids
!= NULL
|| PrimaryToken
->RestrictedSids
!= NULL
)
258 RtlAddAccessAllowedAce(TokenDacl
, ACL_REVISION
, GENERIC_ALL
,
259 SeRestrictedCodeSid
);
263 return STATUS_SUCCESS
;
268 SepCaptureAcl(IN PACL InputAcl
,
269 IN KPROCESSOR_MODE AccessMode
,
270 IN POOL_TYPE PoolType
,
271 IN BOOLEAN CaptureIfKernel
,
272 OUT PACL
*CapturedAcl
)
276 NTSTATUS Status
= STATUS_SUCCESS
;
280 if (AccessMode
!= KernelMode
)
284 ProbeForRead(InputAcl
,
287 AclSize
= InputAcl
->AclSize
;
288 ProbeForRead(InputAcl
,
292 _SEH2_EXCEPT(EXCEPTION_EXECUTE_HANDLER
)
294 /* Return the exception code */
295 _SEH2_YIELD(return _SEH2_GetExceptionCode());
299 NewAcl
= ExAllocatePoolWithTag(PoolType
,
306 RtlCopyMemory(NewAcl
,
310 *CapturedAcl
= NewAcl
;
312 _SEH2_EXCEPT(EXCEPTION_EXECUTE_HANDLER
)
314 /* Free the ACL and return the exception code */
315 ExFreePoolWithTag(NewAcl
, TAG_ACL
);
316 _SEH2_YIELD(return _SEH2_GetExceptionCode());
322 Status
= STATUS_INSUFFICIENT_RESOURCES
;
325 else if (!CaptureIfKernel
)
327 *CapturedAcl
= InputAcl
;
331 AclSize
= InputAcl
->AclSize
;
333 NewAcl
= ExAllocatePoolWithTag(PoolType
,
339 RtlCopyMemory(NewAcl
,
343 *CapturedAcl
= NewAcl
;
347 Status
= STATUS_INSUFFICIENT_RESOURCES
;
356 SepReleaseAcl(IN PACL CapturedAcl
,
357 IN KPROCESSOR_MODE AccessMode
,
358 IN BOOLEAN CaptureIfKernel
)
362 if (CapturedAcl
!= NULL
&&
363 (AccessMode
!= KernelMode
||
364 (AccessMode
== KernelMode
&& CaptureIfKernel
)))
366 ExFreePoolWithTag(CapturedAcl
, TAG_ACL
);