Windows System Software -- Consulting, Training, Development -- Unique Expertise, Guaranteed Results
The free OSR Learning Library has more than 50 articles on a wide variety of topics about writing and debugging device drivers and Minifilters. From introductory level to advanced. All the articles have been recently reviewed and updated, and are written using the clear and definitive style you've come to expect from OSR over the years.
Check out The OSR Learning Library at: https://www.osr.com/osr-learning-library/
Upcoming OSR Seminars | ||
---|---|---|
OSR has suspended in-person seminars due to the Covid-19 outbreak. But, don't miss your training! Attend via the internet instead! | ||
Kernel Debugging | 13-17 May 2024 | Live, Online |
Developing Minifilters | 1-5 Apr 2024 | Live, Online |
Internals & Software Drivers | 11-15 Mar 2024 | Live, Online |
Writing WDF Drivers | 26 Feb - 1 Mar 2024 | Live, Online |
Comments
the PlatformSdk and the MSDN documentation you should find enough
information to understand what is in this structure.
Replacing the input PSECURITY_DESCRIPTOR is possible but would seem offhand
to be the wrong thing to do. You might want to build your own irp with your
own PSECURITY_DESCRIPTOR rather than messing with the one handed to you.
Mark Roddy
Windows 2000/NT Consultant
Hollis Technology Solutions
www.hollistech.com
-----Original Message-----
From: [email protected]
[mailto:[email protected]]On Behalf Of Sudhir_Sambrani
Sent: Thursday, May 25, 2000 1:09 AM
To: NT Developers Interest List
Subject: [ntdev] Reg. IRP_MJ_SET_SECURTIY
Hi all,
The IRP_MJ_SET_SECURTIY has a PSECURITY_DESCRIPTOR in its
IoStackLocation' parameters.
Can anybody tell me what is the data in the buffer at which the pointer is
pointing??
Is there in way in which we can extract the data stored at the buffer at
which this pointer is pointing?
Also is it possible if we can create our own security descriptor, fill in
the buffer & pass it to the lower level driver?
Thanks