1047 lines
28 KiB
C
1047 lines
28 KiB
C
/*++
|
|
|
|
Copyright (c) 1999 Microsoft Corporation
|
|
|
|
Module Name:
|
|
|
|
cmsecache.c
|
|
|
|
Abstract:
|
|
|
|
This module implements the security cache.
|
|
|
|
Author:
|
|
|
|
Dragos C. Sambotin (dragoss) 09-Sep-1999
|
|
|
|
|
|
--*/
|
|
|
|
#include "cmp.h"
|
|
|
|
#define SECURITY_CACHE_GROW_INCREMENTS 0x10
|
|
|
|
#ifdef HIVE_SECURITY_STATS
|
|
ULONG
|
|
CmpCheckForSecurityDuplicates(
|
|
IN OUT PCMHIVE CmHive
|
|
);
|
|
#endif
|
|
|
|
BOOLEAN
|
|
CmpFindMatchingDescriptorCell(
|
|
IN PCMHIVE CmHive,
|
|
IN PSECURITY_DESCRIPTOR SecurityDescriptor,
|
|
IN ULONG Type,
|
|
OUT PHCELL_INDEX MatchingCell,
|
|
OUT OPTIONAL PCM_KEY_SECURITY_CACHE *CachedSecurityPointer
|
|
);
|
|
|
|
#ifdef ALLOC_PRAGMA
|
|
#pragma alloc_text(PAGE,CmpSecConvKey)
|
|
#pragma alloc_text(PAGE,CmpInitSecurityCache)
|
|
#pragma alloc_text(PAGE,CmpDestroySecurityCache)
|
|
#pragma alloc_text(PAGE,CmpRebuildSecurityCache)
|
|
#pragma alloc_text(PAGE,CmpAddSecurityCellToCache)
|
|
#pragma alloc_text(PAGE,CmpFindSecurityCellCacheIndex)
|
|
#pragma alloc_text(PAGE,CmpAdjustSecurityCacheSize)
|
|
#pragma alloc_text(PAGE,CmpRemoveFromSecurityCache)
|
|
#pragma alloc_text(PAGE,CmpFindMatchingDescriptorCell)
|
|
#pragma alloc_text(PAGE,CmpAssignSecurityToKcb)
|
|
|
|
#ifdef HIVE_SECURITY_STATS
|
|
#pragma alloc_text(PAGE,CmpCheckForSecurityDuplicates)
|
|
#endif
|
|
|
|
#pragma alloc_text(PAGE,CmpBuildSecurityCellMappingArray)
|
|
#endif
|
|
|
|
ULONG
|
|
CmpSecConvKey(
|
|
IN ULONG DescriptorLength,
|
|
IN PULONG Descriptor
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Computes the ConvKey for the given security descriptor.
|
|
The algorithm is stollen from the NTFS security hash.
|
|
(it was proven to be efficient there; why shouldn't do the same ?)
|
|
|
|
|
|
For speed in the hash, we consider the security descriptor as an array
|
|
of ULONGs. The fragment at the end that is ignored should not affect
|
|
the collision nature of this hash.
|
|
|
|
Arguments:
|
|
|
|
DescriptorLength - length (in bytes) of the sd
|
|
|
|
Descriptor - actual sd to cache
|
|
|
|
Return Value:
|
|
|
|
ConvKey
|
|
|
|
Note:
|
|
|
|
We may want to convert this to a macro
|
|
--*/
|
|
|
|
{
|
|
ULONG Count;
|
|
ULONG Hash = 0;
|
|
|
|
PAGED_CODE();
|
|
|
|
Count = DescriptorLength / 4;
|
|
|
|
while (Count--) {
|
|
Hash = ((Hash << 3) | (Hash >> (32-3))) + *Descriptor++;
|
|
}
|
|
|
|
return Hash;
|
|
}
|
|
|
|
VOID
|
|
CmpInitSecurityCache(
|
|
IN OUT PCMHIVE CmHive
|
|
)
|
|
{
|
|
ULONG i;
|
|
|
|
PAGED_CODE();
|
|
|
|
CmHive->SecurityCache = NULL;
|
|
CmHive->SecurityCacheSize = 0;
|
|
CmHive->SecurityCount = 0;
|
|
CmHive->SecurityHitHint = -1; // no hint
|
|
|
|
for( i=0;i<CmpSecHashTableSize;i++) {
|
|
InitializeListHead(&(CmHive->SecurityHash[i]));
|
|
}
|
|
}
|
|
|
|
NTSTATUS
|
|
CmpAddSecurityCellToCache (
|
|
IN OUT PCMHIVE CmHive,
|
|
IN HCELL_INDEX SecurityCell,
|
|
IN BOOLEAN BuildUp
|
|
)
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
This routine adds the specified security cell to the cache of the
|
|
specified hive. It takes care of cache allocation (grow) as well.
|
|
At build up time, cache size grows with a PAGE_SIZE, to avoid memory
|
|
fragmentation. After the table is builded, it's size is adjusted (most
|
|
of the hives never add new security cells). Then, at run-time, the size
|
|
grows with 16 entries at a time (same reason)
|
|
The cache is ordered by the cell's index, so we can do a binary search on
|
|
cells retrieval.
|
|
|
|
Arguments:
|
|
|
|
CmHive - the hive to which the security cell belongs
|
|
|
|
SecurityCell - the security cell to be added to the cache
|
|
|
|
BuildUp - specifies that this is build up time
|
|
|
|
Return Value:
|
|
|
|
NTSTATUS - STATUS_SUCCESS if the operation is successful and an
|
|
appropriate error status otherwise (i.e STATUS_INSUFFICIENT_RESOURCES).
|
|
|
|
Note:
|
|
|
|
If the security cell is already IN the cache; this function will return TRUE.
|
|
--*/
|
|
{
|
|
ULONG Index;
|
|
ULONG Size;
|
|
PCM_KEY_SECURITY Security;
|
|
PCM_KEY_SECURITY_CACHE SecurityCached;
|
|
|
|
PAGED_CODE();
|
|
|
|
if( CmpFindSecurityCellCacheIndex (CmHive,SecurityCell,&Index) == TRUE ) {
|
|
//
|
|
// cell already exist in the cache; return;
|
|
//
|
|
return STATUS_SUCCESS;
|
|
}
|
|
|
|
//
|
|
// if this fails, we're doomed !
|
|
//
|
|
ASSERT( (PAGE_SIZE % sizeof(CM_KEY_SECURITY_CACHE_ENTRY)) == 0 );
|
|
|
|
//
|
|
// check if the cache can accomodate a new cell
|
|
//
|
|
if( CmHive->SecurityCount == CmHive->SecurityCacheSize ) {
|
|
//
|
|
// We're at the limit with the cache; we need to extend it by a page
|
|
//
|
|
// OBS: this takes care of the first allocation too, as SecurityCount
|
|
// and SecurityCacheSize are both initialized with 0
|
|
//
|
|
PCM_KEY_SECURITY_CACHE_ENTRY Temp;
|
|
|
|
// store the actual buffer
|
|
Temp = CmHive->SecurityCache;
|
|
|
|
//
|
|
// compute the new size and allocate a new buffer
|
|
//
|
|
if( BuildUp == TRUE ) {
|
|
//
|
|
// We are building up the cache; grow the table in page increments
|
|
//
|
|
ASSERT( ((CmHive->SecurityCacheSize * sizeof(CM_KEY_SECURITY_CACHE_ENTRY)) % PAGE_SIZE) == 0 );
|
|
CmHive->SecurityCacheSize += (PAGE_SIZE / sizeof(CM_KEY_SECURITY_CACHE_ENTRY));
|
|
} else {
|
|
//
|
|
// normal case (running time); a new security cell is added; grow the
|
|
// table with a fixed number of increments (to avoid fragmentation, in
|
|
// case of an Office install :-) )
|
|
//
|
|
CmHive->SecurityCacheSize += SECURITY_CACHE_GROW_INCREMENTS;
|
|
|
|
}
|
|
CmHive->SecurityCache = ExAllocatePoolWithTag(PagedPool, CmHive->SecurityCacheSize * sizeof(CM_KEY_SECURITY_CACHE_ENTRY),CM_SECCACHE_TAG|PROTECTED_POOL);
|
|
if( CmHive->SecurityCache == NULL ) {
|
|
//
|
|
// bad luck; bail out
|
|
//
|
|
CmHive->SecurityCache = Temp;
|
|
CmHive->SecurityCacheSize = CmHive->SecurityCount;
|
|
return STATUS_INSUFFICIENT_RESOURCES;
|
|
}
|
|
//
|
|
// copy existing data in the new location and free the old buffer
|
|
//
|
|
RtlCopyMemory(CmHive->SecurityCache,Temp,CmHive->SecurityCount*sizeof(CM_KEY_SECURITY_CACHE_ENTRY));
|
|
if( Temp != NULL ) {
|
|
ExFreePoolWithTag(Temp, CM_SECCACHE_TAG|PROTECTED_POOL );
|
|
} else {
|
|
ASSERT( CmHive->SecurityCount == 0 );
|
|
}
|
|
}
|
|
|
|
//
|
|
// try first to get the security cell from the hive; if this fails, there is no point to go on
|
|
//
|
|
Security = (PCM_KEY_SECURITY)HvGetCell(&(CmHive->Hive),SecurityCell);
|
|
if( Security == NULL ){
|
|
//
|
|
// we failed to map the view containing this cell; bail out
|
|
//
|
|
return STATUS_INSUFFICIENT_RESOURCES;
|
|
}
|
|
|
|
//
|
|
// compute the size for the cached security structure
|
|
//
|
|
Size = FIELD_OFFSET(CM_KEY_SECURITY_CACHE,Descriptor) + Security->DescriptorLength;
|
|
|
|
//
|
|
// think forward: allocate and initialize a copy for the security cell, in order to store it in the cache
|
|
//
|
|
SecurityCached = (PCM_KEY_SECURITY_CACHE)ExAllocatePoolWithTag(PagedPool,Size,CM_SECCACHE_TAG|PROTECTED_POOL);
|
|
if(SecurityCached == NULL) {
|
|
//
|
|
// bad luck; bail out
|
|
//
|
|
HvReleaseCell(&(CmHive->Hive),SecurityCell);
|
|
return STATUS_INSUFFICIENT_RESOURCES;
|
|
}
|
|
//
|
|
// from now on, nothing can go wrong !
|
|
//
|
|
RtlCopyMemory(&(SecurityCached->Descriptor),&(Security->Descriptor),Security->DescriptorLength);
|
|
SecurityCached->Cell = SecurityCell;
|
|
SecurityCached->DescriptorLength = Security->DescriptorLength;
|
|
|
|
//
|
|
// now add this to the hash table
|
|
//
|
|
SecurityCached->ConvKey = CmpSecConvKey(Security->DescriptorLength,(PULONG)(&(Security->Descriptor)));
|
|
// add it to the end of the list with this conv key
|
|
InsertTailList( &(CmHive->SecurityHash[SecurityCached->ConvKey % CmpSecHashTableSize]),
|
|
&(SecurityCached->List)
|
|
);
|
|
|
|
HvReleaseCell(&(CmHive->Hive),SecurityCell);
|
|
|
|
//
|
|
// At this point we are sure we have space for at least one more entry
|
|
// Move data to make room for the new entry
|
|
//
|
|
if( Index < CmHive->SecurityCount ) {
|
|
//
|
|
// RtlMoveMemory will take care of the overlapping problem
|
|
//
|
|
RtlMoveMemory( ((PUCHAR)CmHive->SecurityCache) + (Index+1)*sizeof(CM_KEY_SECURITY_CACHE_ENTRY), // destination
|
|
((PUCHAR)CmHive->SecurityCache) + Index*sizeof(CM_KEY_SECURITY_CACHE_ENTRY), // source
|
|
(CmHive->SecurityCount - Index)*sizeof(CM_KEY_SECURITY_CACHE_ENTRY) // size
|
|
);
|
|
}
|
|
|
|
//
|
|
// setup the new entry
|
|
//
|
|
CmHive->SecurityCache[Index].Cell = SecurityCell;
|
|
CmHive->SecurityCache[Index].CachedSecurity = SecurityCached;
|
|
|
|
// update the count
|
|
CmHive->SecurityCount++;
|
|
|
|
return STATUS_SUCCESS;
|
|
}
|
|
|
|
BOOLEAN
|
|
CmpFindSecurityCellCacheIndex (
|
|
IN PCMHIVE CmHive,
|
|
IN HCELL_INDEX SecurityCell,
|
|
OUT PULONG Index
|
|
)
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Search (binary) for the specified cellindex in the security cache.
|
|
Returns the index of the cache entry where the cell is cached or
|
|
it should be added
|
|
|
|
Arguments:
|
|
|
|
CmHive - the hive to which the security cell belongs
|
|
|
|
SecurityCell - the security cell to search for
|
|
|
|
Index - out param to pass the index at which the cell is (or it should be)
|
|
|
|
Return Value:
|
|
|
|
TRUE - the cell was found (at *Index)
|
|
FALSE - the cell is not in the cache (it should be added at *Index)
|
|
|
|
--*/
|
|
{
|
|
ULONG High;
|
|
ULONG Low;
|
|
ULONG Current;
|
|
USHORT State = 0; // state of the operation: 0 - normal binary search
|
|
// 1 - last low
|
|
// 2 - last high
|
|
LONG Result;
|
|
LONG Tmp1,Tmp2;
|
|
|
|
PAGED_CODE();
|
|
|
|
if( CmHive->SecurityCount == 0 ) {
|
|
//
|
|
// there is no cell in the security cache
|
|
//
|
|
*Index = 0;
|
|
return FALSE;
|
|
}
|
|
|
|
// sanity asserts
|
|
ASSERT( CmHive->SecurityCount <= CmHive->SecurityCacheSize );
|
|
ASSERT( CmHive->SecurityCache != NULL );
|
|
|
|
|
|
High = CmHive->SecurityCount - 1;
|
|
Low = 0;
|
|
if( (CmHive->SecurityHitHint >= 0) && ( (ULONG)CmHive->SecurityHitHint <= High) ) {
|
|
//
|
|
// try the last search
|
|
//
|
|
Current = CmHive->SecurityHitHint;
|
|
} else {
|
|
Current = High/2;
|
|
}
|
|
|
|
// sign adjustment
|
|
Tmp1 = SecurityCell & ~HCELL_TYPE_MASK;
|
|
if( SecurityCell & HCELL_TYPE_MASK ) {
|
|
Tmp1 = -Tmp1;
|
|
}
|
|
|
|
while( TRUE ) {
|
|
|
|
Tmp2 = CmHive->SecurityCache[Current].Cell & ~HCELL_TYPE_MASK;
|
|
// sign adjustment
|
|
if( CmHive->SecurityCache[Current].Cell & HCELL_TYPE_MASK ) {
|
|
Tmp2 = -Tmp2;
|
|
}
|
|
|
|
Result = Tmp1 - Tmp2;
|
|
|
|
if (Result == 0) {
|
|
//
|
|
// Success, return data to caller and exit
|
|
//
|
|
|
|
*Index = Current;
|
|
//
|
|
// we have a hit! update the count and exit
|
|
//
|
|
CmHive->SecurityHitHint = Current;
|
|
return TRUE;
|
|
}
|
|
//
|
|
// compute the next index to try
|
|
//
|
|
switch(State) {
|
|
case 0:
|
|
//
|
|
// normal binary search state
|
|
//
|
|
if( Result < 0 ) {
|
|
High = Current;
|
|
} else {
|
|
Low = Current;
|
|
}
|
|
if ((High - Low) <= 1) {
|
|
//
|
|
// advance to the new state
|
|
//
|
|
Current = Low;
|
|
State = 1;
|
|
} else {
|
|
Current = Low + ( (High-Low) / 2 );
|
|
}
|
|
break;
|
|
case 1:
|
|
//
|
|
// last low state
|
|
//
|
|
|
|
// this should be true
|
|
ASSERT( Current == Low );
|
|
if (Result < 0) {
|
|
//
|
|
// does not exist, under
|
|
//
|
|
|
|
*Index = Current;
|
|
return FALSE;
|
|
} else if( Low == High ) {
|
|
//
|
|
// low and high are identical; but current is bigger than them; insert after
|
|
//
|
|
|
|
*Index = Current + 1;
|
|
return FALSE;
|
|
} else {
|
|
//
|
|
// advance to the new state; i.e. look at high
|
|
//
|
|
State = 2;
|
|
Current = High;
|
|
}
|
|
|
|
break;
|
|
case 2:
|
|
//
|
|
// last high state; if we got here, High = Low +1 and Current == High
|
|
//
|
|
ASSERT( Current == High);
|
|
ASSERT( High == (Low + 1) );
|
|
if( Result < 0 ) {
|
|
//
|
|
// under High, but above Low; we should insert it here
|
|
//
|
|
|
|
*Index = Current;
|
|
return FALSE;
|
|
} else {
|
|
//
|
|
// above High;
|
|
//
|
|
|
|
*Index = Current + 1;
|
|
return FALSE;
|
|
}
|
|
break;
|
|
default:
|
|
ASSERT( FALSE );
|
|
break;
|
|
}
|
|
}
|
|
|
|
//
|
|
// we shouldn't get here !!!
|
|
//
|
|
ASSERT( FALSE );
|
|
return FALSE;
|
|
}
|
|
|
|
BOOLEAN
|
|
CmpAdjustSecurityCacheSize (
|
|
IN PCMHIVE CmHive
|
|
)
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Adjust the scusrity cache size for the specified hive. This function
|
|
should be called after all the security cells for the hive were cached,
|
|
in order to give back extra memory used in the process.
|
|
|
|
|
|
Arguments:
|
|
|
|
CmHive - the hive to which the security cell belongs
|
|
|
|
Return Value:
|
|
|
|
TRUE - success
|
|
FALSE - failure - the size remains the same
|
|
|
|
--*/
|
|
{
|
|
PCM_KEY_SECURITY_CACHE_ENTRY Buffer;
|
|
|
|
PAGED_CODE();
|
|
|
|
if( CmHive->SecurityCount < CmHive->SecurityCacheSize ) {
|
|
//
|
|
// cache size is bigger than what we need; there is a good chance
|
|
// nobody will ever add new security cells to this hive, so go on
|
|
// and free the extra space
|
|
//
|
|
|
|
//
|
|
// allocate a new buffer with the exact size we need
|
|
//
|
|
Buffer = ExAllocatePoolWithTag(PagedPool, CmHive->SecurityCount * sizeof(CM_KEY_SECURITY_CACHE_ENTRY),CM_SECCACHE_TAG|PROTECTED_POOL);
|
|
|
|
if( Buffer == NULL ) {
|
|
//
|
|
// the system is low on resources; leave the cache as it is
|
|
//
|
|
return FALSE;
|
|
}
|
|
|
|
//
|
|
// copy significant data inot the new buffer
|
|
//
|
|
RtlCopyMemory(Buffer,CmHive->SecurityCache,CmHive->SecurityCount*sizeof(CM_KEY_SECURITY_CACHE_ENTRY));
|
|
|
|
//
|
|
// free the old buffer and update cache members
|
|
//
|
|
ExFreePoolWithTag(CmHive->SecurityCache, CM_SECCACHE_TAG|PROTECTED_POOL );
|
|
|
|
CmHive->SecurityCache = Buffer;
|
|
CmHive->SecurityCacheSize = CmHive->SecurityCount;
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
VOID
|
|
CmpRemoveFromSecurityCache (
|
|
IN OUT PCMHIVE CmHive,
|
|
IN HCELL_INDEX SecurityCell
|
|
)
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Removes the specified security cell from the security cache.
|
|
(only if present !)
|
|
For performance (and memory fragmentation) reasons, it does not
|
|
change (shrink) the cache size.
|
|
|
|
Arguments:
|
|
|
|
CmHive - the hive to which the security cell belongs
|
|
|
|
SecurityCell - the security cell to be removed from the cache
|
|
|
|
Return Value:
|
|
|
|
<none>
|
|
--*/
|
|
{
|
|
ULONG Index;
|
|
|
|
PAGED_CODE();
|
|
|
|
if( CmpFindSecurityCellCacheIndex (CmHive,SecurityCell,&Index) == FALSE ) {
|
|
//
|
|
// cell is not in the cache
|
|
//
|
|
return;
|
|
}
|
|
|
|
ASSERT( CmHive->SecurityCache[Index].Cell == SecurityCell );
|
|
ASSERT( CmHive->SecurityCache[Index].CachedSecurity->Cell == SecurityCell );
|
|
|
|
//
|
|
// remove the cached structure from the hash
|
|
//
|
|
CmpRemoveEntryList(&(CmHive->SecurityCache[Index].CachedSecurity->List));
|
|
|
|
//
|
|
// free up the cached security cell;
|
|
//
|
|
ExFreePoolWithTag(CmHive->SecurityCache[Index].CachedSecurity, CM_SECCACHE_TAG|PROTECTED_POOL );
|
|
|
|
//
|
|
// move memory to reflect the new size, and update the cache count
|
|
//
|
|
RtlMoveMemory( ((PUCHAR)CmHive->SecurityCache) + Index*sizeof(CM_KEY_SECURITY_CACHE_ENTRY), // destination
|
|
((PUCHAR)CmHive->SecurityCache) + (Index+1)*sizeof(CM_KEY_SECURITY_CACHE_ENTRY), // source
|
|
(CmHive->SecurityCount - Index - 1)*sizeof(CM_KEY_SECURITY_CACHE_ENTRY) // size
|
|
);
|
|
|
|
CmHive->SecurityCount--;
|
|
}
|
|
|
|
VOID
|
|
CmpDestroySecurityCache (
|
|
IN OUT PCMHIVE CmHive
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Frees up all the cached security cells and the cache itself
|
|
|
|
Arguments:
|
|
|
|
CmHive - the hive to which the security cell belongs
|
|
|
|
Return Value:
|
|
|
|
<none>
|
|
--*/
|
|
{
|
|
ULONG i;
|
|
|
|
PAGED_CODE();
|
|
|
|
for( i=0;i<CmHive->SecurityCount;i++) {
|
|
CmpRemoveEntryList(&(CmHive->SecurityCache[i].CachedSecurity->List));
|
|
ExFreePoolWithTag(CmHive->SecurityCache[i].CachedSecurity, CM_SECCACHE_TAG|PROTECTED_POOL );
|
|
}
|
|
|
|
if( CmHive->SecurityCount != 0 ) {
|
|
ASSERT( CmHive->SecurityCache != NULL );
|
|
ExFreePoolWithTag(CmHive->SecurityCache, CM_SECCACHE_TAG|PROTECTED_POOL );
|
|
}
|
|
|
|
CmHive->SecurityCache = NULL;
|
|
CmHive->SecurityCacheSize = CmHive->SecurityCount = 0;
|
|
}
|
|
|
|
BOOLEAN
|
|
CmpRebuildSecurityCache(
|
|
IN OUT PCMHIVE CmHive
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Rebuilds the security cache by reiterating all security cells
|
|
and adding them to the cache; this routine is intended for hive
|
|
refresh operations
|
|
|
|
Arguments:
|
|
|
|
CmHive - the hive to which the security cell belongs
|
|
|
|
Return Value:
|
|
|
|
TRUE or FALSE
|
|
--*/
|
|
{
|
|
PCM_KEY_NODE RootNode;
|
|
PCM_KEY_SECURITY SecurityCell;
|
|
HCELL_INDEX ListAnchor;
|
|
HCELL_INDEX NextCell;
|
|
HCELL_INDEX LastCell;
|
|
PHHIVE Hive;
|
|
PRELEASE_CELL_ROUTINE ReleaseCellRoutine;
|
|
BOOLEAN Result = TRUE;
|
|
|
|
PAGED_CODE();
|
|
|
|
ASSERT_CM_LOCK_OWNED_EXCLUSIVE();
|
|
//
|
|
// avoid extra work
|
|
//
|
|
Hive = &(CmHive->Hive);
|
|
ReleaseCellRoutine = Hive->ReleaseCellRoutine;
|
|
Hive->ReleaseCellRoutine = NULL;
|
|
|
|
//
|
|
// destroy existing cache and set up an empty one
|
|
//
|
|
CmpDestroySecurityCache(CmHive);
|
|
CmpInitSecurityCache(CmHive);
|
|
|
|
if (!HvIsCellAllocated(Hive,Hive->BaseBlock->RootCell)) {
|
|
//
|
|
// root cell HCELL_INDEX is bogus
|
|
//
|
|
Result = FALSE;
|
|
goto JustReturn;
|
|
}
|
|
RootNode = (PCM_KEY_NODE) HvGetCell(Hive, Hive->BaseBlock->RootCell);
|
|
if( RootNode == NULL ) {
|
|
//
|
|
// we couldn't map a view for the bin containing this cell
|
|
//
|
|
Result = FALSE;
|
|
goto JustReturn;
|
|
}
|
|
ListAnchor = NextCell = RootNode->Security;
|
|
|
|
do {
|
|
if (!HvIsCellAllocated(Hive, NextCell)) {
|
|
CmKdPrintEx((DPFLTR_CONFIG_ID,CML_SEC,"CM: CmpRebuildSecurityCache\n"));
|
|
CmKdPrintEx((DPFLTR_CONFIG_ID,CML_SEC," NextCell: %08lx is invalid HCELL_INDEX\n",NextCell));
|
|
Result = FALSE;
|
|
goto JustReturn;
|
|
}
|
|
SecurityCell = (PCM_KEY_SECURITY) HvGetCell(Hive, NextCell);
|
|
if( SecurityCell == NULL ) {
|
|
//
|
|
// we couldn't map a view for the bin containing this cell
|
|
//
|
|
Result = FALSE;
|
|
goto JustReturn;
|
|
}
|
|
if (NextCell != ListAnchor) {
|
|
//
|
|
// Check to make sure that our Blink points to where we just
|
|
// came from.
|
|
//
|
|
if (SecurityCell->Blink != LastCell) {
|
|
CmKdPrintEx((DPFLTR_CONFIG_ID,CML_SEC," Invalid Blink (%ld) on security cell %ld\n",SecurityCell->Blink, NextCell));
|
|
CmKdPrintEx((DPFLTR_CONFIG_ID,CML_SEC," should point to %ld\n", LastCell));
|
|
Result = FALSE;
|
|
goto JustReturn;
|
|
}
|
|
}
|
|
CmKdPrintEx((DPFLTR_CONFIG_ID,CML_SEC,"CmpValidSD: SD shared by %d nodes\n",SecurityCell->ReferenceCount));
|
|
if (!SeValidSecurityDescriptor(SecurityCell->DescriptorLength, &SecurityCell->Descriptor)) {
|
|
#if DBG
|
|
CmpDumpSecurityDescriptor(&SecurityCell->Descriptor,"INVALID DESCRIPTOR");
|
|
#endif
|
|
Result = FALSE;
|
|
goto JustReturn;
|
|
}
|
|
|
|
if( !NT_SUCCESS(CmpAddSecurityCellToCache ( CmHive,NextCell,TRUE) ) ) {
|
|
Result = FALSE;
|
|
goto JustReturn;
|
|
}
|
|
|
|
LastCell = NextCell;
|
|
NextCell = SecurityCell->Flink;
|
|
} while ( NextCell != ListAnchor );
|
|
|
|
//
|
|
// adjust the size of the cache in case we allocated too much
|
|
//
|
|
CmpAdjustSecurityCacheSize ( (PCMHIVE)Hive );
|
|
|
|
JustReturn:
|
|
Hive->ReleaseCellRoutine = ReleaseCellRoutine;
|
|
return Result;
|
|
}
|
|
|
|
BOOLEAN
|
|
CmpFindMatchingDescriptorCell(
|
|
IN PCMHIVE CmHive,
|
|
IN PSECURITY_DESCRIPTOR SecurityDescriptor,
|
|
IN ULONG Type,
|
|
OUT PHCELL_INDEX MatchingCell,
|
|
OUT OPTIONAL PCM_KEY_SECURITY_CACHE *CachedSecurityPointer
|
|
)
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
This routine attempts to find a security descriptor in the hive that
|
|
is identical to the one passed in. If it finds one, it returns its
|
|
cell index.
|
|
|
|
Obsolete:
|
|
Currently, this routine checks the security descriptors of the parent
|
|
and siblings of the node to find a match.
|
|
|
|
New:
|
|
It looks for the sd in the security cache for this hive. This will
|
|
eliminate duplicates and make the search process faster.
|
|
|
|
Arguments:
|
|
|
|
CmHive - Supplies a pointer to the hive control structure for the node.
|
|
Needed to get access to the cache
|
|
|
|
SecurityDescriptor - Supplies the cooked security descriptor which
|
|
should be searched for.
|
|
|
|
Type - Indicates whether the Security Descriptor that matches must
|
|
be in Stable or Volatile store
|
|
|
|
MatchingCell - Returns the cell index of a security cell whose
|
|
security descriptor is identical to SecurityDescriptor.
|
|
Valid only if TRUE is returned.
|
|
|
|
CachedSecurityPointer - pointer to the cached security (for update reasons)
|
|
|
|
Return Value:
|
|
|
|
TRUE - Matching security descriptor found. MatchingCell returns the
|
|
cell index of the matching security descriptor.
|
|
|
|
FALSE - No matching security descriptor found. MatchingCell is invalid.
|
|
|
|
--*/
|
|
|
|
{
|
|
ULONG DescriptorLength;
|
|
ULONG ConvKey;
|
|
PLIST_ENTRY ListAnchor;
|
|
PLIST_ENTRY Current;
|
|
PCM_KEY_SECURITY_CACHE CachedSecurity;
|
|
|
|
PAGED_CODE();
|
|
|
|
DescriptorLength = RtlLengthSecurityDescriptor(SecurityDescriptor);
|
|
|
|
//
|
|
// calculate the conv key
|
|
//
|
|
ConvKey = CmpSecConvKey(DescriptorLength,(PULONG)SecurityDescriptor);
|
|
|
|
ListAnchor = &(CmHive->SecurityHash[ConvKey % CmpSecHashTableSize]);
|
|
if( IsListEmpty(ListAnchor) == TRUE ) {
|
|
return FALSE;
|
|
}
|
|
|
|
//
|
|
// iterate through the list of colisions for this convkey
|
|
// start with teh first element in list
|
|
//
|
|
Current = (PLIST_ENTRY)(ListAnchor->Flink);
|
|
while( Current != ListAnchor ){
|
|
//
|
|
// get the current cached security
|
|
//
|
|
CachedSecurity = CONTAINING_RECORD(Current,
|
|
CM_KEY_SECURITY_CACHE,
|
|
List);
|
|
|
|
//
|
|
// see if it matches with the given descriptor;
|
|
//
|
|
if( (CachedSecurity->ConvKey == ConvKey) && // same convkey
|
|
(Type == HvGetCellType(CachedSecurity->Cell)) && // same cell type
|
|
(DescriptorLength == CachedSecurity->DescriptorLength) && // same length
|
|
(RtlEqualMemory(SecurityDescriptor, // and, finally, bit-wise identical
|
|
&(CachedSecurity->Descriptor),
|
|
DescriptorLength))
|
|
) {
|
|
//
|
|
// we have found a match
|
|
//
|
|
*MatchingCell = CachedSecurity->Cell;
|
|
if (ARGUMENT_PRESENT(CachedSecurityPointer)) {
|
|
*CachedSecurityPointer = CachedSecurity;
|
|
}
|
|
return TRUE;
|
|
}
|
|
|
|
//
|
|
// advance to the next element
|
|
//
|
|
Current = (PLIST_ENTRY)(Current->Flink);
|
|
}
|
|
|
|
// sorry, no match
|
|
return FALSE;
|
|
}
|
|
|
|
VOID
|
|
CmpAssignSecurityToKcb(
|
|
IN PCM_KEY_CONTROL_BLOCK Kcb,
|
|
IN HCELL_INDEX SecurityCell
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Establishes the connection between the KCB and the cached security
|
|
descriptor.
|
|
|
|
As most of the time this is called after the security cell has been
|
|
linked to the Key Node, and because the binary search starts with
|
|
the last cell looked up, we will not hit a performance impact here.
|
|
|
|
Arguments:
|
|
|
|
Kcb - the KCb to which this security cell needs to be attached
|
|
|
|
SecurityCell - Security cell for the kcb
|
|
|
|
|
|
Return Value:
|
|
|
|
NONE; bugchecks on error
|
|
|
|
--*/
|
|
{
|
|
ULONG Index;
|
|
PCMHIVE CmHive;
|
|
|
|
PAGED_CODE();
|
|
|
|
if( SecurityCell == HCELL_NIL ) {
|
|
Kcb->CachedSecurity = NULL;
|
|
return;
|
|
}
|
|
|
|
CmHive = (PCMHIVE)(Kcb->KeyHive);
|
|
|
|
//
|
|
// get the security descriptor from cache
|
|
//
|
|
if( CmpFindSecurityCellCacheIndex (CmHive,SecurityCell,&Index) == FALSE ) {
|
|
Kcb->CachedSecurity = NULL;
|
|
//
|
|
// we are doomed !!!
|
|
//
|
|
CM_BUGCHECK( REGISTRY_ERROR,BAD_SECURITY_CACHE,1,Kcb,SecurityCell);
|
|
|
|
}
|
|
|
|
//
|
|
// success; link the cached security to this KCB
|
|
//
|
|
Kcb->CachedSecurity = CmHive->SecurityCache[Index].CachedSecurity;
|
|
|
|
}
|
|
|
|
#ifdef HIVE_SECURITY_STATS
|
|
ULONG
|
|
CmpCheckForSecurityDuplicates(
|
|
IN OUT PCMHIVE CmHive
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Iterates through the security cache for the specified hive and detects
|
|
if there are any security descriptors which are duplicated
|
|
|
|
Arguments:
|
|
|
|
CmHive - the hive in question
|
|
|
|
Return Value:
|
|
|
|
number of duplicates (it should be 0)
|
|
--*/
|
|
{
|
|
ULONG i,j,Duplicates = 0;
|
|
PCM_KEY_SECURITY_CACHE CachedSecurity1,CachedSecurity2;
|
|
HCELL_INDEX Cell1,Cell2;
|
|
|
|
PAGED_CODE();
|
|
|
|
for( i=0;i<CmHive->SecurityCount - 1;i++) {
|
|
CachedSecurity1 = CmHive->SecurityCache[i].CachedSecurity;
|
|
Cell1 = CmHive->SecurityCache[i].Cell;
|
|
ASSERT( Cell1 == CachedSecurity1->Cell );
|
|
for( j=i+1;j<CmHive->SecurityCount;j++) {
|
|
CachedSecurity2 = CmHive->SecurityCache[j].CachedSecurity;
|
|
Cell2 = CmHive->SecurityCache[j].Cell;
|
|
ASSERT( Cell2 == CachedSecurity2->Cell );
|
|
if ((CachedSecurity1->DescriptorLength == CachedSecurity2->DescriptorLength) &&
|
|
(HvGetCellType(Cell1) == HvGetCellType(Cell2)) &&
|
|
(RtlEqualMemory(&(CachedSecurity1->Descriptor),
|
|
&(CachedSecurity2->Descriptor),
|
|
CachedSecurity1->DescriptorLength))) {
|
|
ASSERT( CachedSecurity1->ConvKey == CachedSecurity2->ConvKey );
|
|
//
|
|
// we've found a duplicate cell;
|
|
//
|
|
#ifndef _CM_LDR_
|
|
DbgPrintEx(DPFLTR_CONFIG_ID,DPFLTR_TRACE_LEVEL,"Duplicate security cell found in Hive %p Cell1=%8lx Cell2 = %8lx\n",(&(CmHive->Hive)),Cell1,Cell2);
|
|
#endif //_CM_LDR_
|
|
Duplicates++;
|
|
break;
|
|
}
|
|
|
|
}
|
|
}
|
|
|
|
return Duplicates;
|
|
}
|
|
#endif
|
|
|
|
BOOLEAN
|
|
CmpBuildSecurityCellMappingArray(
|
|
IN PCMHIVE CmHive
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Iterates through the security cache for the specified hive and
|
|
build the array of mappings.
|
|
|
|
Arguments:
|
|
|
|
CmHive - the hive in question
|
|
|
|
Return Value:
|
|
|
|
TRUE/FALSE
|
|
--*/
|
|
{
|
|
ULONG i;
|
|
PAGED_CODE();
|
|
|
|
ASSERT( CmHive->CellRemapArray == NULL );
|
|
CmHive->CellRemapArray = ExAllocatePool(PagedPool,sizeof(CM_CELL_REMAP_BLOCK)*CmHive->SecurityCount);
|
|
|
|
if( CmHive->CellRemapArray == NULL ) {
|
|
return FALSE;
|
|
}
|
|
|
|
for( i=0;i<CmHive->SecurityCount;i++) {
|
|
CmHive->CellRemapArray[i].OldCell = CmHive->SecurityCache[i].Cell;
|
|
if( HvGetCellType(CmHive->SecurityCache[i].Cell) == (ULONG)Volatile ) {
|
|
//
|
|
// we preserve volatile cells
|
|
//
|
|
CmHive->CellRemapArray[i].NewCell = CmHive->SecurityCache[i].Cell;
|
|
} else {
|
|
CmHive->CellRemapArray[i].NewCell = HCELL_NIL;
|
|
}
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|