delorie.com/archives/browse.cgi | search |
DMARC-Filter: | OpenDMARC Filter v1.4.2 delorie.com 4AJ8xTRb3039069 |
Authentication-Results: | delorie.com; dmarc=pass (p=none dis=none) header.from=cygwin.com |
Authentication-Results: | delorie.com; spf=pass smtp.mailfrom=cygwin.com |
DKIM-Filter: | OpenDKIM Filter v2.11.0 delorie.com 4AJ8xTRb3039069 |
Authentication-Results: | delorie.com; |
dkim=pass (1024-bit key, unprotected) header.d=cygwin.com header.i=@cygwin.com header.a=rsa-sha256 header.s=default header.b=TZLda01N | |
X-Recipient: | archive-cygwin AT delorie DOT com |
DKIM-Filter: | OpenDKIM Filter v2.11.0 sourceware.org F105C3858D35 |
DKIM-Signature: | v=1; a=rsa-sha256; c=relaxed/relaxed; d=cygwin.com; |
s=default; t=1732006768; | |
bh=ytzW/UEOaz3fStYXvWZGWmW+yzGBdRoOV4USCcu5LgQ=; | |
h=Date:To:Subject:In-Reply-To:References:List-Id:List-Unsubscribe: | |
List-Archive:List-Post:List-Help:List-Subscribe:From:Reply-To: | |
From; | |
b=TZLda01NRpHIy2oC/ofYeYICNCiAjm4FdMQgHOi1FmEZKp+BeVgIP/2uEDJvx7ENt | |
afStE/oKLNbfOfvvArTVD9voBHjR9yZP1k+5/jLjrtDZnCa4iWHJkA135jAO10Azm0 | |
7X6t3kjSzheMvzflTwtIwTPf1pQexiBVDqKn/Pck= | |
X-Original-To: | cygwin AT cygwin DOT com |
Delivered-To: | cygwin AT cygwin DOT com |
DMARC-Filter: | OpenDMARC Filter v1.4.2 sourceware.org 0BA503858C31 |
ARC-Filter: | OpenARC Filter v1.0.0 sourceware.org 0BA503858C31 |
ARC-Seal: | i=1; a=rsa-sha256; d=sourceware.org; s=key; t=1732006689; cv=none; |
b=oxKCz5iSCYtr1Q0MXi0LqQD2gY9+7MSPswoNOlhwRrabHEo876jMTxW9CLo03BeqZGDyyt2If9mUjaDItbfbQbEzZ1ZDQU0ClY0Bu0IKVQLfw7L0MIWILwuLW01Mautyz4Pmtpdkaqs0JGbISryOKL6XsuZnl7aOyEChw1AQzdE= | |
ARC-Message-Signature: | i=1; a=rsa-sha256; d=sourceware.org; s=key; |
t=1732006689; c=relaxed/simple; | |
bh=W59VFbwiGYTEZz8c1yRuJ2Zn/lbZBCvzWBCOC75xWLw=; | |
h=Date:From:To:Subject:Message-Id:Mime-Version:DKIM-Signature; | |
b=ozGvXyxlHwCjmAUhUcG5UMaYF9a5hR2x3b3Ul1lkcPq7UomZUNUqCRZb05dQnyVkSETdHxzVfq6aeP6o7TAhT2WWJScXMueqszNTdAzRY/oYEZzNN/3ff23wKXDaAcyOf5ios7pjctjU95TPbdLlQ4fNbsBzfm5czXFhodFJzMo= | |
ARC-Authentication-Results: | i=1; server2.sourceware.org |
DKIM-Filter: | OpenDKIM Filter v2.11.0 sourceware.org 0BA503858C31 |
Date: | Tue, 19 Nov 2024 17:58:06 +0900 |
To: | cygwin AT cygwin DOT com |
Subject: | Re: SMBFS mount's file cannot be made executable |
Message-Id: | <20241119175806.321cdb7e65a727a2eb58c8a6@nifty.ne.jp> |
In-Reply-To: | <ZztqpBESgcTXcd3d@calimero.vinschen.de> |
References: | <ZzIIO2NxmdYpox2A AT calimero DOT vinschen DOT de> |
<20241112042937 DOT 740185a42d476993b4b1e31c AT nifty DOT ne DOT jp> | |
<20241112175427 DOT 750ae77a8086594a765862c5 AT nifty DOT ne DOT jp> | |
<ZzNCXz3o9k40U9zA AT calimero DOT vinschen DOT de> | |
<20241113181755 DOT 02289e8e8d9af7e19e8f4387 AT nifty DOT ne DOT jp> | |
<CANV9t=SvYedzG-LmECwdT7kjipOyhgwsZ1yucnTm8mWMnNkJVw AT mail DOT gmail DOT com> | |
<20241114003740 DOT e573d7ec79d35da76225c9f1 AT nifty DOT ne DOT jp> | |
<CANV9t=TLh8xD7KBsF-MucZWNjP-L0KE04xUv2-2e=Z5fXTjk=w AT mail DOT gmail DOT com> | |
<20241114010807 DOT 99f46760b2240d472440c329 AT nifty DOT ne DOT jp> | |
<20241116002122 DOT 3f4fd325a497eb4261ad80f4 AT nifty DOT ne DOT jp> | |
<ZztqpBESgcTXcd3d AT calimero DOT vinschen DOT de> | |
X-Mailer: | Sylpheed 3.7.0 (GTK+ 2.24.30; i686-pc-mingw32) |
Mime-Version: | 1.0 |
X-BeenThere: | cygwin AT cygwin DOT com |
X-Mailman-Version: | 2.1.30 |
List-Id: | General Cygwin discussions and problem reports <cygwin.cygwin.com> |
List-Unsubscribe: | <https://cygwin.com/mailman/options/cygwin>, |
<mailto:cygwin-request AT cygwin DOT com?subject=unsubscribe> | |
List-Archive: | <https://cygwin.com/pipermail/cygwin/> |
List-Post: | <mailto:cygwin AT cygwin DOT com> |
List-Help: | <mailto:cygwin-request AT cygwin DOT com?subject=help> |
List-Subscribe: | <https://cygwin.com/mailman/listinfo/cygwin>, |
<mailto:cygwin-request AT cygwin DOT com?subject=subscribe> | |
From: | Takashi Yano via Cygwin <cygwin AT cygwin DOT com> |
Reply-To: | Takashi Yano <takashi DOT yano AT nifty DOT ne DOT jp> |
Errors-To: | cygwin-bounces~archive-cygwin=delorie DOT com AT cygwin DOT com |
Sender: | "Cygwin" <cygwin-bounces~archive-cygwin=delorie DOT com AT cygwin DOT com> |
This is a multi-part message in MIME format. --Multipart=_Tue__19_Nov_2024_17_58_06_+0900_zGp=gzuQXBTaG2Ke Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit On Mon, 18 Nov 2024 17:26:12 +0100 Corinna Vinschen wrote: > On Nov 16 00:21, Takashi Yano via Cygwin wrote: > > I built a test program, whose important part is: > > > > AUTHZ_RESOURCE_MANAGER_HANDLE hManager = NULL; > > AUTHZ_CLIENT_CONTEXT_HANDLE hClient = NULL; > > AUTHZ_ACCESS_REQUEST AccessRequest = {0}; > > AUTHZ_ACCESS_REPLY AccessReply = {0}; > > > > AUTHZ_RPC_INIT_INFO_CLIENT authzRpcInitInfoClient = {0}; > > > > WCHAR ObjectUuid[] = L"9a81c2bd-a525-471d-a4ed-49907c0b23da"; > > WCHAR ProtSeq[] = L"ncacn_ip_tcp"; > > WCHAR NetworkAddr[] = L"localhost"; > > WCHAR Endpoint[] = L"135"; > > > > authzRpcInitInfoClient.version = AUTHZ_INIT_INFO_VERSION_V1; > > authzRpcInitInfoClient.ObjectUuid = ObjectUuid; > > authzRpcInitInfoClient.ProtSeq = ProtSeq; > > authzRpcInitInfoClient.NetworkAddr = NetworkAddr; > > authzRpcInitInfoClient.Endpoint = Endpoint; > > > > AuthzInitializeRemoteResourceManager (&authzRpcInitInfoClient, &hManager); > > > > char buf[1024]; > > PTOKEN_USER pTokenUser = (PTOKEN_USER) buf; > > DWORD len; > > > > GetTokenInformation(hToken, TokenUser, pTokenUser, 1024, &len); > > > > LUID luid = {0,}; > > AuthzInitializeContextFromSid(0, pTokenUser->User.Sid, hManager, > > NULL, luid, NULL, &hClient); > > > > > > This test code fails at AuthzInitializeContextFromSid() with > > RPC_S_UNKNOWN_IF. If AuthzInitializeRemoteResourceManager() > > is replaced with AuthzInitializeResourceManager(), the error > > does not occur. > > > > I searched the combination of AuthzInitializeContextFromSid() > > and RPC_S_UNKNOWN_IF, however nothing was found. > > RPC_S_UNKNOWN_IF means "unknown interface". I assume this error has > nothing to do with AuthzInitializeContextFromSid(), but with the > AuthzInitializeRemoteResourceManager() call. > > What I failed, though, is to find a working example for > AuthzInitializeRemoteResourceManager(). > > > Any suggestion would be appreciated. > > As I said in my previous posting, maybe we don't really need > AuthzInitializeRemoteResourceManager(). > > We can safely assume that the current user is already authorized on the > SMB server. So... shouldn't AuthzInitializeResourceManager be > sufficient and the code from class authz_ctx already does what we want? > We may just have to use in in place of calling NtCheckAccess(), > maybe with a tweak or two... I already tried AuthzInitializeResourceManager(), but the result was the same with current implementation... BTW, I come up with another implementation. This make the things much simpler. What do you think of the patch attached? -- Takashi Yano <takashi DOT yano AT nifty DOT ne DOT jp> --Multipart=_Tue__19_Nov_2024_17_58_06_+0900_zGp=gzuQXBTaG2Ke Content-Type: text/plain; name="smb.patch" Content-Disposition: attachment; filename="smb.patch" Content-Transfer-Encoding: base64 ZGlmZiAtLWdpdCBhL3dpbnN1cC9jeWd3aW4vc2VjL2Jhc2UuY2MgYi93aW5zdXAvY3lnd2luL3Nl Yy9iYXNlLmNjDQppbmRleCBkNWUzOWQyODEuLmM0NjBmZWNjNCAxMDA2NDQNCi0tLSBhL3dpbnN1 cC9jeWd3aW4vc2VjL2Jhc2UuY2MNCisrKyBiL3dpbnN1cC9jeWd3aW4vc2VjL2Jhc2UuY2MNCkBA IC0yOCwxMCArMjgsNiBAQCBkZXRhaWxzLiAqLw0KIAkJCQkgIHwgR1JPVVBfU0VDVVJJVFlfSU5G T1JNQVRJT04gXA0KIAkJCQkgIHwgT1dORVJfU0VDVVJJVFlfSU5GT1JNQVRJT04pDQogDQotc3Rh dGljIEdFTkVSSUNfTUFQUElORyBOT19DT1BZX1JPIGZpbGVfbWFwcGluZyA9IHsgRklMRV9HRU5F UklDX1JFQUQsDQotCQkJCQkJICAgRklMRV9HRU5FUklDX1dSSVRFLA0KLQkJCQkJCSAgIEZJTEVf R0VORVJJQ19FWEVDVVRFLA0KLQkJCQkJCSAgIEZJTEVfQUxMX0FDQ0VTUyB9Ow0KIExPTkcNCiBn ZXRfZmlsZV9zZCAoSEFORExFIGZoLCBwYXRoX2NvbnYgJnBjLCBzZWN1cml0eV9kZXNjcmlwdG9y ICZzZCwNCiAJICAgICBib29sIGp1c3RjcmVhdGVkKQ0KQEAgLTYwOCw5NSArNjA0LDYgQEAgY2hl Y2tfYWNjZXNzIChzZWN1cml0eV9kZXNjcmlwdG9yICZzZCwgR0VORVJJQ19NQVBQSU5HICZtYXBw aW5nLA0KICAgcmV0dXJuIHJldDsNCiB9DQogDQotLyogU2FtYmEgb3ZlcnJpZGUuICBDaGVjayBz ZWN1cml0eSBkZXNjcmlwdG9yIGZvciBTYW1iYSBVTklYIHVzZXIgYW5kIGdyb3VwDQotICAgYWNj b3VudHMgYW5kIGNoZWNrIGlmIHdlIGhhdmUgYW4gUkZDIDIzMDcgbWFwcGluZyB0byBhIFdpbmRv d3MgYWNjb3VudC4NCi0gICBDcmVhdGUgYSBuZXcgc2VjdXJpdHkgZGVzY3JpcHRvciB3aXRoIGFs bCBvZiB0aGUgVU5JWCBhY2NvdW50cyB3aXRoDQotICAgdmFsaWQgbWFwcGluZyByZXBsYWNlZCB3 aXRoIHRoZWlyIFdpbmRvd3MgY291bnRlcnBhcnQuICovDQotc3RhdGljIHZvaWQNCi1jb252ZXJ0 X3NhbWJhX3NkIChzZWN1cml0eV9kZXNjcmlwdG9yICZzZF9yZXQpDQotew0KLSAgTlRTVEFUVVMg c3RhdHVzOw0KLSAgQk9PTEVBTiBkdW1teTsNCi0gIFBTSUQgc2lkOw0KLSAgY3lnc2lkIG93bmVy Ow0KLSAgY3lnc2lkIGdyb3VwOw0KLSAgU0VDVVJJVFlfREVTQ1JJUFRPUiBzZDsNCi0gIGN5Z19s ZGFwIGNsZGFwOw0KLSAgdG1wX3BhdGhidWYgdHA7DQotICBQQUNMIGFjbCwgb2FjbDsNCi0gIHNp emVfdCBhY2xfbGVuOw0KLSAgUEFDQ0VTU19BTExPV0VEX0FDRSBhY2U7DQotDQotICBpZiAoIU5U X1NVQ0NFU1MgKFJ0bEdldE93bmVyU2VjdXJpdHlEZXNjcmlwdG9yIChzZF9yZXQsICZzaWQsICZk dW1teSkpKQ0KLSAgICByZXR1cm47DQotICBvd25lciA9IHNpZDsNCi0gIGlmICghTlRfU1VDQ0VT UyAoUnRsR2V0R3JvdXBTZWN1cml0eURlc2NyaXB0b3IgKHNkX3JldCwgJnNpZCwgJmR1bW15KSkp DQotICAgIHJldHVybjsNCi0gIGdyb3VwID0gc2lkOw0KLQ0KLSAgaWYgKHNpZF9pZF9hdXRoIChv d25lcikgPT0gMjIpDQotICAgIHsNCi0gICAgICBzdHJ1Y3QgcGFzc3dkICpwd2Q7DQotICAgICAg dWlkX3QgdWlkID0gb3duZXIuZ2V0X3VpZCAoJmNsZGFwKTsNCi0gICAgICBpZiAodWlkIDwgVU5J WF9QT1NJWF9PRkZTRVQgJiYgKHB3ZCA9IGludGVybmFsX2dldHB3dWlkICh1aWQpKSkNCi0Jb3du ZXIuZ2V0ZnJvbXB3IChwd2QpOw0KLSAgICB9DQotICBpZiAoc2lkX2lkX2F1dGggKGdyb3VwKSA9 PSAyMikNCi0gICAgew0KLSAgICAgIHN0cnVjdCBncm91cCAqZ3JwOw0KLSAgICAgIGdpZF90IGdp ZCA9IGdyb3VwLmdldF9naWQgKCZjbGRhcCk7DQotICAgICAgaWYgKGdpZCA8IFVOSVhfUE9TSVhf T0ZGU0VUICYmIChncnAgPSBpbnRlcm5hbF9nZXRncmdpZCAoZ2lkKSkpDQotCWdyb3VwLmdldGZy b21nciAoZ3JwKTsNCi0gICAgfQ0KLQ0KLSAgaWYgKCFOVF9TVUNDRVNTIChSdGxHZXREYWNsU2Vj dXJpdHlEZXNjcmlwdG9yIChzZF9yZXQsICZkdW1teSwNCi0JCQkJCQkgJm9hY2wsICZkdW1teSkp KQ0KLSAgICByZXR1cm47DQotICBhY2wgPSAoUEFDTCkgdHAud19nZXQgKCk7DQotICBSdGxDcmVh dGVBY2wgKGFjbCwgQUNMX01BWElNVU1fU0laRSwgQUNMX1JFVklTSU9OKTsNCi0gIGFjbF9sZW4g PSBzaXplb2YgKEFDTCk7DQotDQotICBmb3IgKERXT1JEIGkgPSAwOyBpIDwgb2FjbC0+QWNlQ291 bnQ7ICsraSkNCi0gICAgaWYgKE5UX1NVQ0NFU1MgKFJ0bEdldEFjZSAob2FjbCwgaSwgKFBWT0lE ICopICZhY2UpKSkNCi0gICAgICB7DQotCWN5Z3NpZCBhY2Vfc2lkICgoUFNJRCkgJmFjZS0+U2lk U3RhcnQpOw0KLQlpZiAoc2lkX2lkX2F1dGggKGFjZV9zaWQpID09IDIyKQ0KLQkgIHsNCi0JICAg IGlmIChzaWRfc3ViX2F1dGggKGFjZV9zaWQsIDApID09IDEpIC8qIHVzZXIgKi8NCi0JICAgICAg ew0KLQkJc3RydWN0IHBhc3N3ZCAqcHdkOw0KLQkJdWlkX3QgdWlkID0gYWNlX3NpZC5nZXRfdWlk ICgmY2xkYXApOw0KLQkJaWYgKHVpZCA8IFVOSVhfUE9TSVhfT0ZGU0VUICYmIChwd2QgPSBpbnRl cm5hbF9nZXRwd3VpZCAodWlkKSkpDQotCQkgIGFjZV9zaWQuZ2V0ZnJvbXB3IChwd2QpOw0KLQkg ICAgICB9DQotCSAgICBlbHNlIGlmIChzaWRfc3ViX2F1dGggKGFjZV9zaWQsIDApID09IDIpIC8q IGdyb3VwICovDQotCSAgICAgIHsNCi0JCXN0cnVjdCBncm91cCAqZ3JwOw0KLQkJZ2lkX3QgZ2lk ID0gYWNlX3NpZC5nZXRfZ2lkICgmY2xkYXApOw0KLQkJaWYgKGdpZCA8IFVOSVhfUE9TSVhfT0ZG U0VUICYmIChncnAgPSBpbnRlcm5hbF9nZXRncmdpZCAoZ2lkKSkpDQotCQkgIGFjZV9zaWQuZ2V0 ZnJvbWdyIChncnApOw0KLQkgICAgICB9DQotCSAgfQ0KLQlpZiAoIWFkZF9hY2Nlc3NfYWxsb3dl ZF9hY2UgKGFjbCwgYWNlLT5NYXNrLCBhY2Vfc2lkLCBhY2xfbGVuLA0KLQkJCQkgICAgIGFjZS0+ SGVhZGVyLkFjZUZsYWdzKSkNCi0JICByZXR1cm47DQotICAgICAgfQ0KLSAgYWNsLT5BY2xTaXpl ID0gYWNsX2xlbjsNCi0NCi0gIFJ0bENyZWF0ZVNlY3VyaXR5RGVzY3JpcHRvciAoJnNkLCBTRUNV UklUWV9ERVNDUklQVE9SX1JFVklTSU9OKTsNCi0gIFJ0bFNldENvbnRyb2xTZWN1cml0eURlc2Ny aXB0b3IgKCZzZCwgU0VfREFDTF9QUk9URUNURUQsIFNFX0RBQ0xfUFJPVEVDVEVEKTsNCi0gIFJ0 bFNldE93bmVyU2VjdXJpdHlEZXNjcmlwdG9yICgmc2QsIG93bmVyLCBGQUxTRSk7DQotICBSdGxT ZXRHcm91cFNlY3VyaXR5RGVzY3JpcHRvciAoJnNkLCBncm91cCwgRkFMU0UpOw0KLQ0KLSAgc3Rh dHVzID0gUnRsU2V0RGFjbFNlY3VyaXR5RGVzY3JpcHRvciAoJnNkLCBUUlVFLCBhY2wsIEZBTFNF KTsNCi0gIGlmICghTlRfU1VDQ0VTUyAoc3RhdHVzKSkNCi0gICAgcmV0dXJuOw0KLSAgRFdPUkQg c2Rfc2l6ZSA9IDA7DQotICBzdGF0dXMgPSBSdGxBYnNvbHV0ZVRvU2VsZlJlbGF0aXZlU0QgKCZz ZCwgc2RfcmV0LCAmc2Rfc2l6ZSk7DQotICBpZiAoc2Rfc2l6ZSA+IDAgJiYgc2RfcmV0Lm1hbGxv YyAoc2Rfc2l6ZSkpDQotICAgIFJ0bEFic29sdXRlVG9TZWxmUmVsYXRpdmVTRCAoJnNkLCBzZF9y ZXQsICZzZF9zaXplKTsNCi19DQotDQogaW50DQogY2hlY2tfZmlsZV9hY2Nlc3MgKHBhdGhfY29u diAmcGMsIGludCBmbGFncywgYm9vbCBlZmZlY3RpdmUpDQogew0KQEAgLTcxMSwxMCArNjE4LDE0 IEBAIGNoZWNrX2ZpbGVfYWNjZXNzIChwYXRoX2NvbnYgJnBjLCBpbnQgZmxhZ3MsIGJvb2wgZWZm ZWN0aXZlKQ0KICAgICBkZXNpcmVkIHw9IEZJTEVfRVhFQ1VURTsNCiAgIGlmICghZ2V0X2ZpbGVf c2QgKHBjLmhhbmRsZSAoKSwgcGMsIHNkLCBmYWxzZSkpDQogICAgIHsNCi0gICAgICAvKiBUd2Vh ayBTYW1iYSBzZWN1cml0eSBkZXNjcmlwdG9yIGFzIG5lY2Vzc2FyeS4gKi8NCi0gICAgICBpZiAo cGMuZnNfaXNfc2FtYmEgKCkpDQotCWNvbnZlcnRfc2FtYmFfc2QgKHNkKTsNCi0gICAgICByZXQg PSBjaGVja19hY2Nlc3MgKHNkLCBmaWxlX21hcHBpbmcsIGRlc2lyZWQsIGZsYWdzLCBlZmZlY3Rp dmUpOw0KKyAgICAgIEhBTkRMRSBoID0gQ3JlYXRlRmlsZVcgKHBjLmdldF9udF9uYXRpdmVfcGF0 aCAoKS0+QnVmZmVyLCBkZXNpcmVkLA0KKwkJCSAgICAgIDAsIE5VTEwsIE9QRU5fRVhJU1RJTkcs DQorCQkJICAgICAgRklMRV9GTEFHX0JBQ0tVUF9TRU1BTlRJQ1MsIE5VTEwpOw0KKyAgICAgIGlm IChoICE9IElOVkFMSURfSEFORExFX1ZBTFVFKQ0KKwl7DQorCSAgQ2xvc2VIYW5kbGUgKGgpOw0K KwkgIHJldCA9IDA7DQorCX0NCiAgICAgfQ0KICAgZGVidWdfcHJpbnRmICgiZmxhZ3MgJXksIHJl dCAlZCIsIGZsYWdzLCByZXQpOw0KICAgcmV0dXJuIHJldDsNCg== --Multipart=_Tue__19_Nov_2024_17_58_06_+0900_zGp=gzuQXBTaG2Ke Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline -- Problem reports: https://cygwin.com/problems.html FAQ: https://cygwin.com/faq/ Documentation: https://cygwin.com/docs.html Unsubscribe info: https://cygwin.com/ml/#unsubscribe-simple --Multipart=_Tue__19_Nov_2024_17_58_06_+0900_zGp=gzuQXBTaG2Ke--
webmaster | delorie software privacy |
Copyright © 2019 by DJ Delorie | Updated Jul 2019 |