summaryrefslogtreecommitdiff
path: root/TSRM/tsrm_win32.c
diff options
context:
space:
mode:
authorAnatol Belski <ab@php.net>2017-12-08 16:35:45 +0100
committerAnatol Belski <ab@php.net>2017-12-08 20:58:19 +0100
commita9a49b8250c65e72281c7a7398b0b16a226c7ebc (patch)
tree78fdc0babb038a438ec307c0557bf522f9e7d3cf /TSRM/tsrm_win32.c
parent2fbdaec03cdbda901cbd1b69898a3e3f265536bc (diff)
downloadphp-git-a9a49b8250c65e72281c7a7398b0b16a226c7ebc.tar.gz
Improve ioutil access impl and refactor tsrm_win32_access
Diffstat (limited to 'TSRM/tsrm_win32.c')
-rw-r--r--TSRM/tsrm_win32.c285
1 files changed, 135 insertions, 150 deletions
diff --git a/TSRM/tsrm_win32.c b/TSRM/tsrm_win32.c
index 039fef7cc2..43d9f8e572 100644
--- a/TSRM/tsrm_win32.c
+++ b/TSRM/tsrm_win32.c
@@ -209,190 +209,175 @@ TSRM_API int tsrm_win32_access(const char *pathname, int mode)
realpath_cache_bucket * bucket = NULL;
char * real_path = NULL;
+ if(!IS_ABSOLUTE_PATH(pathname, strlen(pathname)+1)) {
+ real_path = (char *)malloc(MAXPATHLEN);
+ if(tsrm_realpath(pathname, real_path) == NULL) {
+ SET_ERRNO_FROM_WIN32_CODE(ERROR_FILE_NOT_FOUND);
+ return -1;
+ }
+ pathname = real_path;
+ }
+
PHP_WIN32_IOUTIL_INIT_W(pathname)
if (!pathw) {
+ free(real_path);
return -1;
}
- if (mode == 1 /*X_OK*/) {
- DWORD type;
- int ret;
-
- ret = GetBinaryTypeW(pathw, &type) ? 0 : -1;
-
+ /* Either access call failed, or the mode was asking for a specific check.*/
+ int ret = php_win32_ioutil_access_w(pathw, mode);
+ if (0 > ret || X_OK == mode || F_OK == mode) {
PHP_WIN32_IOUTIL_CLEANUP_W()
-
+ free(real_path);
return ret;
- } else {
- if(!IS_ABSOLUTE_PATH(pathname, strlen(pathname)+1)) {
- real_path = (char *)malloc(MAXPATHLEN);
- if(tsrm_realpath(pathname, real_path) == NULL) {
- goto Finished;
- }
- pathname = real_path;
- PHP_WIN32_IOUTIL_REINIT_W(pathname);
- }
-
- if(php_win32_ioutil_access(pathname, mode)) {
- PHP_WIN32_IOUTIL_CLEANUP_W()
- free(real_path);
- return errno;
- }
-
- /* If only existence check is made, return now */
- if (mode == 0) {
- PHP_WIN32_IOUTIL_CLEANUP_W()
- free(real_path);
- return 0;
- }
+ }
/* Only in NTS when impersonate==1 (aka FastCGI) */
- /*
- AccessCheck() requires an impersonation token. We first get a primary
- token and then create a duplicate impersonation token. The
- impersonation token is not actually assigned to the thread, but is
- used in the call to AccessCheck. Thus, this function itself never
- impersonates, but does use the identity of the thread. If the thread
- was impersonating already, this function uses that impersonation context.
- */
- if(!OpenThreadToken(GetCurrentThread(), TOKEN_ALL_ACCESS, TRUE, &thread_token)) {
- if (GetLastError() == ERROR_NO_TOKEN) {
- if (!OpenProcessToken(GetCurrentProcess(), TOKEN_ALL_ACCESS, &thread_token)) {
- TWG(impersonation_token) = NULL;
- goto Finished;
- }
- }
+ /*
+ AccessCheck() requires an impersonation token. We first get a primary
+ token and then create a duplicate impersonation token. The
+ impersonation token is not actually assigned to the thread, but is
+ used in the call to AccessCheck. Thus, this function itself never
+ impersonates, but does use the identity of the thread. If the thread
+ was impersonating already, this function uses that impersonation context.
+ */
+ if(!OpenThreadToken(GetCurrentThread(), TOKEN_ALL_ACCESS, TRUE, &thread_token)) {
+ if (GetLastError() == ERROR_NO_TOKEN) {
+ if (!OpenProcessToken(GetCurrentProcess(), TOKEN_ALL_ACCESS, &thread_token)) {
+ TWG(impersonation_token) = NULL;
+ goto Finished;
+ }
}
+ }
- /* token_sid will be freed in tsrmwin32_dtor */
- token_sid = tsrm_win32_get_token_sid(thread_token);
- if (!token_sid) {
- if (TWG(impersonation_token_sid)) {
- free(TWG(impersonation_token_sid));
- }
- TWG(impersonation_token_sid) = NULL;
- goto Finished;
+ /* token_sid will be freed in tsrmwin32_dtor */
+ token_sid = tsrm_win32_get_token_sid(thread_token);
+ if (!token_sid) {
+ if (TWG(impersonation_token_sid)) {
+ free(TWG(impersonation_token_sid));
}
+ TWG(impersonation_token_sid) = NULL;
+ goto Finished;
+ }
- /* Different identity, we need a new impersontated token as well */
- if (!TWG(impersonation_token_sid) || !EqualSid(token_sid, TWG(impersonation_token_sid))) {
- if (TWG(impersonation_token_sid)) {
- free(TWG(impersonation_token_sid));
- }
- TWG(impersonation_token_sid) = token_sid;
-
- /* Duplicate the token as impersonated token */
- if (!DuplicateToken(thread_token, SecurityImpersonation, &TWG(impersonation_token))) {
- goto Finished;
- }
- } else {
- /* we already have it, free it then */
- free(token_sid);
+ /* Different identity, we need a new impersontated token as well */
+ if (!TWG(impersonation_token_sid) || !EqualSid(token_sid, TWG(impersonation_token_sid))) {
+ if (TWG(impersonation_token_sid)) {
+ free(TWG(impersonation_token_sid));
}
+ TWG(impersonation_token_sid) = token_sid;
- if (CWDG(realpath_cache_size_limit)) {
- t = time(0);
- bucket = realpath_cache_lookup(pathname, strlen(pathname), t);
- if(bucket == NULL && real_path == NULL) {
- /* We used the pathname directly. Call tsrm_realpath */
- /* so that entry is created in realpath cache */
- real_path = (char *)malloc(MAXPATHLEN);
- if(tsrm_realpath(pathname, real_path) != NULL) {
- pathname = real_path;
- bucket = realpath_cache_lookup(pathname, strlen(pathname), t);
- PHP_WIN32_IOUTIL_REINIT_W(pathname);
- }
- }
- }
+ /* Duplicate the token as impersonated token */
+ if (!DuplicateToken(thread_token, SecurityImpersonation, &TWG(impersonation_token))) {
+ goto Finished;
+ }
+ } else {
+ /* we already have it, free it then */
+ free(token_sid);
+ }
- /* Do a full access check because access() will only check read-only attribute */
- if(mode == 0 || mode > 6) {
- if(bucket != NULL && bucket->is_rvalid) {
- fAccess = bucket->is_readable;
- goto Finished;
- }
- desired_access = FILE_GENERIC_READ;
- } else if(mode <= 2) {
- if(bucket != NULL && bucket->is_wvalid) {
- fAccess = bucket->is_writable;
- goto Finished;
- }
- desired_access = FILE_GENERIC_WRITE;
- } else if(mode <= 4) {
- if(bucket != NULL && bucket->is_rvalid) {
- fAccess = bucket->is_readable;
- goto Finished;
- }
- desired_access = FILE_GENERIC_READ|FILE_FLAG_BACKUP_SEMANTICS;
- } else { // if(mode <= 6)
- if(bucket != NULL && bucket->is_rvalid && bucket->is_wvalid) {
- fAccess = bucket->is_readable & bucket->is_writable;
- goto Finished;
+ if (CWDG(realpath_cache_size_limit)) {
+ t = time(0);
+ bucket = realpath_cache_lookup(pathname, strlen(pathname), t);
+ if(bucket == NULL && real_path == NULL) {
+ /* We used the pathname directly. Call tsrm_realpath */
+ /* so that entry is created in realpath cache */
+ real_path = (char *)malloc(MAXPATHLEN);
+ if(tsrm_realpath(pathname, real_path) != NULL) {
+ pathname = real_path;
+ bucket = realpath_cache_lookup(pathname, strlen(pathname), t);
+ PHP_WIN32_IOUTIL_REINIT_W(pathname);
}
- desired_access = FILE_GENERIC_READ | FILE_GENERIC_WRITE;
- }
+ }
+ }
- if(TWG(impersonation_token) == NULL) {
+ /* Do a full access check because access() will only check read-only attribute */
+ if(mode == 0 || mode > 6) {
+ if(bucket != NULL && bucket->is_rvalid) {
+ fAccess = bucket->is_readable;
goto Finished;
}
-
- /* Get size of security buffer. Call is expected to fail */
- if(GetFileSecurityW(pathw, sec_info, NULL, 0, &sec_desc_length)) {
+ desired_access = FILE_GENERIC_READ;
+ } else if(mode <= 2) {
+ if(bucket != NULL && bucket->is_wvalid) {
+ fAccess = bucket->is_writable;
goto Finished;
}
-
- psec_desc = (BYTE *)malloc(sec_desc_length);
- if(psec_desc == NULL ||
- !GetFileSecurityW(pathw, sec_info, (PSECURITY_DESCRIPTOR)psec_desc, sec_desc_length, &sec_desc_length)) {
+ desired_access = FILE_GENERIC_WRITE;
+ } else if(mode <= 4) {
+ if(bucket != NULL && bucket->is_rvalid) {
+ fAccess = bucket->is_readable;
+ goto Finished;
+ }
+ desired_access = FILE_GENERIC_READ|FILE_FLAG_BACKUP_SEMANTICS;
+ } else { // if(mode <= 6)
+ if(bucket != NULL && bucket->is_rvalid && bucket->is_wvalid) {
+ fAccess = bucket->is_readable & bucket->is_writable;
goto Finished;
}
+ desired_access = FILE_GENERIC_READ | FILE_GENERIC_WRITE;
+ }
- MapGenericMask(&desired_access, &gen_map);
+ if(TWG(impersonation_token) == NULL) {
+ goto Finished;
+ }
- if(!AccessCheck((PSECURITY_DESCRIPTOR)psec_desc, TWG(impersonation_token), desired_access, &gen_map, &privilege_set, &priv_set_length, &granted_access, &fAccess)) {
- goto Finished_Impersonate;
- }
+ /* Get size of security buffer. Call is expected to fail */
+ if(GetFileSecurityW(pathw, sec_info, NULL, 0, &sec_desc_length)) {
+ goto Finished;
+ }
- /* Keep the result in realpath_cache */
- if(bucket != NULL) {
- if(desired_access == (FILE_GENERIC_READ|FILE_FLAG_BACKUP_SEMANTICS)) {
- bucket->is_rvalid = 1;
- bucket->is_readable = fAccess;
- }
- else if(desired_access == FILE_GENERIC_WRITE) {
- bucket->is_wvalid = 1;
- bucket->is_writable = fAccess;
- } else if (desired_access == (FILE_GENERIC_READ | FILE_GENERIC_WRITE)) {
- bucket->is_rvalid = 1;
- bucket->is_readable = fAccess;
- bucket->is_wvalid = 1;
- bucket->is_writable = fAccess;
- }
+ psec_desc = (BYTE *)malloc(sec_desc_length);
+ if(psec_desc == NULL ||
+ !GetFileSecurityW(pathw, sec_info, (PSECURITY_DESCRIPTOR)psec_desc, sec_desc_length, &sec_desc_length)) {
+ goto Finished;
+ }
+
+ MapGenericMask(&desired_access, &gen_map);
+
+ if(!AccessCheck((PSECURITY_DESCRIPTOR)psec_desc, TWG(impersonation_token), desired_access, &gen_map, &privilege_set, &priv_set_length, &granted_access, &fAccess)) {
+ goto Finished_Impersonate;
+ }
+
+ /* Keep the result in realpath_cache */
+ if(bucket != NULL) {
+ if(desired_access == (FILE_GENERIC_READ|FILE_FLAG_BACKUP_SEMANTICS)) {
+ bucket->is_rvalid = 1;
+ bucket->is_readable = fAccess;
}
+ else if(desired_access == FILE_GENERIC_WRITE) {
+ bucket->is_wvalid = 1;
+ bucket->is_writable = fAccess;
+ } else if (desired_access == (FILE_GENERIC_READ | FILE_GENERIC_WRITE)) {
+ bucket->is_rvalid = 1;
+ bucket->is_readable = fAccess;
+ bucket->is_wvalid = 1;
+ bucket->is_writable = fAccess;
+ }
+ }
Finished_Impersonate:
- if(psec_desc != NULL) {
- free(psec_desc);
- psec_desc = NULL;
- }
+ if(psec_desc != NULL) {
+ free(psec_desc);
+ psec_desc = NULL;
+ }
Finished:
- if(thread_token != NULL) {
- CloseHandle(thread_token);
- }
- if(real_path != NULL) {
- free(real_path);
- real_path = NULL;
- }
+ if(thread_token != NULL) {
+ CloseHandle(thread_token);
+ }
+ if(real_path != NULL) {
+ free(real_path);
+ real_path = NULL;
+ }
- PHP_WIN32_IOUTIL_CLEANUP_W()
- if(fAccess == FALSE) {
- errno = EACCES;
- return errno;
- } else {
- return 0;
- }
+ PHP_WIN32_IOUTIL_CLEANUP_W()
+ if(fAccess == FALSE) {
+ errno = EACCES;
+ return errno;
+ } else {
+ return 0;
}
}/*}}}*/