2000-10-28 02:53:56 +08:00
|
|
|
/* autoload.cc: all dynamic load stuff.
|
|
|
|
|
2001-01-08 12:02:02 +08:00
|
|
|
Copyright 2000, 2001 Red Hat, Inc.
|
2000-10-28 02:53:56 +08:00
|
|
|
|
|
|
|
This file is part of Cygwin.
|
|
|
|
|
|
|
|
This software is a copyrighted work licensed under the terms of the
|
|
|
|
Cygwin license. Please consult the file "CYGWIN_LICENSE" for
|
|
|
|
details. */
|
|
|
|
|
|
|
|
#include "winsup.h"
|
2001-05-16 13:07:51 +08:00
|
|
|
#define USE_SYS_TYPES_FD_SET
|
|
|
|
#include <winsock2.h>
|
|
|
|
|
|
|
|
/* Macro for defining "auto-load" functions.
|
|
|
|
* Note that this is self-modifying code *gasp*.
|
|
|
|
* The first invocation of a routine will trigger the loading of
|
|
|
|
* the DLL. This will then be followed by the discovery of
|
|
|
|
* the procedure's entry point, which is placed into the location
|
|
|
|
* pointed to by the stack pointer. This code then changes
|
|
|
|
* the "call" operand which invoked it to a "jmp" which will
|
|
|
|
* transfer directly to the DLL function on the next invocation.
|
|
|
|
*
|
|
|
|
* Subsequent calls to routines whose transfer address has not been
|
|
|
|
* determined will skip the "load the dll" step, starting at the
|
|
|
|
* "discovery of the entry point" step.
|
|
|
|
*
|
|
|
|
* So, immediately following the the call to one of the above routines
|
|
|
|
* we have:
|
|
|
|
* DLL info (4 bytes) Pointer to a block of information concerning
|
|
|
|
* the DLL (see below).
|
|
|
|
* DLL args (4 bytes) The number of arguments pushed on the stack by
|
|
|
|
* the call. If this is an odd value then this
|
|
|
|
* is a flag that non-existence of this function
|
|
|
|
* is not a fatal error
|
|
|
|
* func name (n bytes) asciz string containing the name of the function
|
|
|
|
* to be loaded.
|
|
|
|
*
|
|
|
|
* The DLL info block consists of the following
|
|
|
|
* load_state (4 bytes) Pointer to a word containing the routine used
|
|
|
|
* to eventually invoke the function. Initially
|
|
|
|
* points to an init function which loads the
|
|
|
|
* DLL, gets the process's load address,
|
|
|
|
* changes the contents here to point to the
|
|
|
|
* function address, and changes the call *(%eax)
|
|
|
|
* to a jmp func. If the initialization has been
|
|
|
|
* done, only the load part is done.
|
|
|
|
* DLL handle (4 bytes) The handle to use when loading the DLL.
|
|
|
|
* DLL locker (4 bytes) Word to use to avoid multi-thread access during
|
|
|
|
* initialization.
|
|
|
|
* extra init (4 bytes) Extra initialization function.
|
|
|
|
* DLL name (n bytes) asciz string containing the name of the DLL.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/* LoadDLLprime is used to prime the DLL info information, providing an
|
|
|
|
additional initialization routine to call prior to calling the first
|
|
|
|
function. */
|
|
|
|
#define LoadDLLprime(dllname, init_also) __asm__ (" \n\
|
|
|
|
.section ." #dllname "_info,\"w\" \n\
|
|
|
|
.linkonce \n\
|
|
|
|
.long std_dll_init \n\
|
|
|
|
.long 0 \n\
|
|
|
|
.long -1 \n\
|
|
|
|
.long " #init_also " \n\
|
|
|
|
.asciz \"" #dllname "\" \n\
|
|
|
|
.text \n\
|
|
|
|
");
|
|
|
|
|
|
|
|
/* Create a "decorated" name */
|
|
|
|
#define mangle(name, n) #name "@" #n
|
|
|
|
|
|
|
|
/* Standard DLL load macro. Invokes a fatal warning if the function isn't
|
|
|
|
found. */
|
|
|
|
#define LoadDLLfunc(name, n, dllname) LoadDLLfuncEx (name, n, dllname, 0)
|
|
|
|
|
|
|
|
/* Main DLL setup stuff. */
|
2001-05-19 13:29:00 +08:00
|
|
|
#define LoadDLLfuncEx(name, n, dllname, notimp) \
|
|
|
|
LoadDLLprime (dllname, dll_func_load) \
|
|
|
|
__asm__ (" \n\
|
2001-05-16 13:07:51 +08:00
|
|
|
.section ." #dllname "_text,\"wx\" \n\
|
|
|
|
.global _" mangle (name, n) " \n\
|
|
|
|
.global _win32_" mangle (name, n) " \n\
|
|
|
|
.align 8 \n\
|
|
|
|
_" mangle (name, n) ": \n\
|
|
|
|
_win32_" mangle (name, n) ": \n\
|
|
|
|
movl (1f),%eax \n\
|
|
|
|
call *(%eax) \n\
|
|
|
|
1:.long ." #dllname "_info \n\
|
|
|
|
.long " #n "+" #notimp " \n\
|
|
|
|
.asciz \"" #name "\" \n\
|
|
|
|
.text \n\
|
|
|
|
");
|
|
|
|
|
|
|
|
/* DLL loader helper functions used during initialization. */
|
|
|
|
|
|
|
|
/* The function which finds the address, given the name and overwrites
|
|
|
|
the call so that future invocations go straight to the function in
|
|
|
|
the DLL. */
|
|
|
|
extern "C" void dll_func_load () __asm__ ("dll_func_load");
|
|
|
|
|
|
|
|
/* Called by the primary initialization function "init_std_dll" to
|
|
|
|
setup the stack and eliminate future calls to init_std_dll for other
|
|
|
|
functions from this DLL. */
|
|
|
|
extern "C" void dll_chain () __asm__ ("dll_chain");
|
|
|
|
|
|
|
|
/* called by the secondary initialization function to call dll_func_load. */
|
|
|
|
extern "C" void dll_chain1 () __asm__ ("dll_chain1");
|
2000-10-28 02:53:56 +08:00
|
|
|
|
|
|
|
extern "C" {
|
|
|
|
|
2001-05-16 13:07:51 +08:00
|
|
|
/* FIXME: This is not thread-safe? */
|
|
|
|
__asm__ (" \n\
|
|
|
|
msg1: \n\
|
|
|
|
.ascii \"couldn't dynamically determine load address for '%s' (handle %p), %E\\0\"\n\
|
|
|
|
\n\
|
|
|
|
.align 32 \n\
|
|
|
|
noload: \n\
|
|
|
|
popl %edx # Get the address of the information block\n\
|
|
|
|
movl 4(%edx),%eax # Should we 'ignore' the lack \n\
|
|
|
|
test $1,%eax # of this function? \n\
|
|
|
|
jz 1f # Nope. \n\
|
|
|
|
decl %eax # Yes. This is the # of bytes + 1 \n\
|
|
|
|
popl %edx # Caller's caller \n\
|
|
|
|
addl %eax,%esp # Pop off bytes \n\
|
|
|
|
movl $127,%eax # ERROR_PROC_NOT_FOUND \n\
|
|
|
|
pushl %eax # First argument \n\
|
|
|
|
call _SetLastError@4 # Set it \n\
|
|
|
|
xor %eax,%eax # Zero functional return \n\
|
|
|
|
jmp *%edx # Return \n\
|
|
|
|
1: \n\
|
|
|
|
movl (%edx),%eax # Handle value \n\
|
|
|
|
pushl 4(%eax) \n\
|
|
|
|
leal 8(%edx),%eax # Location of name of function \n\
|
|
|
|
push %eax \n\
|
|
|
|
push $msg1 # The message \n\
|
|
|
|
call ___api_fatal # Print message. Never returns \n\
|
|
|
|
\n\
|
|
|
|
.globl dll_func_load \n\
|
|
|
|
dll_func_load: \n\
|
|
|
|
movl (%esp),%eax # 'Return address' contains load info \n\
|
|
|
|
addl $8,%eax # Address of name of function to load \n\
|
|
|
|
pushl %eax # Second argument \n\
|
|
|
|
movl -8(%eax),%eax # Where handle lives \n\
|
|
|
|
movl 4(%eax),%eax # Address of Handle to DLL \n\
|
|
|
|
pushl %eax # Handle to DLL \n\
|
|
|
|
call _GetProcAddress@8# Load it \n\
|
|
|
|
test %eax,%eax # Success? \n\
|
|
|
|
jne gotit # Yes \n\
|
|
|
|
jmp noload # Issue an error or return \n\
|
|
|
|
gotit: \n\
|
|
|
|
popl %ecx # Pointer to 'return address' \n\
|
|
|
|
movb $0xe9,-7(%ecx) # Turn preceding call to a jmp *%eax \n\
|
|
|
|
movl %eax,%edx # Save \n\
|
|
|
|
subl %ecx,%eax # Make it relative \n\
|
|
|
|
addl $2,%eax # Tweak \n\
|
|
|
|
movl %eax,-6(%ecx) # Move relative address after jump \n\
|
|
|
|
jmp *%edx # Jump to actual function \n\
|
|
|
|
\n\
|
|
|
|
.global dll_chain \n\
|
|
|
|
dll_chain: \n\
|
|
|
|
pushl %eax # Restore 'return address' \n\
|
|
|
|
movl (%eax),%eax # Get address of DLL info block \n\
|
|
|
|
movl $dll_func_load,(%eax) # Just load func now \n\
|
|
|
|
jmp *%edx # Jump to next init function \n\
|
|
|
|
\n\
|
|
|
|
dll_chain1: \n\
|
|
|
|
pushl %eax # Restore 'return address' \n\
|
|
|
|
jmp *%edx # Jump to next init function \n\
|
|
|
|
");
|
|
|
|
|
|
|
|
/* C representations of the two info blocks described above.
|
|
|
|
FIXME: These structures confuse gdb for some reason. GDB can print
|
|
|
|
the whole structure but has problems with the name field? */
|
|
|
|
struct dll_info
|
2000-10-28 02:53:56 +08:00
|
|
|
{
|
2001-05-16 13:07:51 +08:00
|
|
|
DWORD load_state;
|
|
|
|
HANDLE handle;
|
|
|
|
LONG here;
|
|
|
|
void (*init) ();
|
|
|
|
char name[];
|
2000-10-28 02:53:56 +08:00
|
|
|
};
|
|
|
|
|
2001-05-16 13:07:51 +08:00
|
|
|
struct func_info
|
|
|
|
{
|
|
|
|
struct dll_info *dll;
|
|
|
|
LONG decoration;
|
|
|
|
char name[];
|
|
|
|
};
|
2000-10-28 02:53:56 +08:00
|
|
|
|
2001-05-16 13:07:51 +08:00
|
|
|
/* Mechanism for setting up info for passing to dll_chain routines. */
|
|
|
|
union retchain
|
|
|
|
{
|
|
|
|
struct {long high; long low;};
|
|
|
|
long long ll;
|
|
|
|
};
|
|
|
|
|
|
|
|
/* The standard DLL initialization routine. */
|
|
|
|
static long long std_dll_init () __asm__ ("std_dll_init") __attribute__ ((unused));
|
|
|
|
static long long
|
|
|
|
std_dll_init ()
|
2000-10-28 02:53:56 +08:00
|
|
|
{
|
|
|
|
HANDLE h;
|
2001-05-16 13:07:51 +08:00
|
|
|
struct func_info *func = (struct func_info *) __builtin_return_address (0);
|
|
|
|
struct dll_info *dll = func->dll;
|
|
|
|
retchain ret;
|
|
|
|
|
|
|
|
if (InterlockedIncrement (&dll->here))
|
|
|
|
do
|
|
|
|
{
|
|
|
|
InterlockedDecrement (&dll->here);
|
|
|
|
Sleep (0);
|
|
|
|
}
|
|
|
|
while (InterlockedIncrement (&dll->here));
|
|
|
|
else if (!dll->handle)
|
|
|
|
{
|
|
|
|
if ((h = LoadLibrary (dll->name)) != NULL)
|
|
|
|
dll->handle = h;
|
|
|
|
else if (!(func->decoration & 1))
|
|
|
|
api_fatal ("could not load %s, %E", dll->name);
|
|
|
|
else
|
|
|
|
dll->handle = INVALID_HANDLE_VALUE;
|
|
|
|
}
|
|
|
|
|
|
|
|
InterlockedDecrement (&dll->here);
|
|
|
|
|
|
|
|
/* Kludge alert. Redirects the return address to dll_chain. */
|
|
|
|
__asm__ __volatile__ (" \n\
|
|
|
|
movl $dll_chain,4(%ebp) \n\
|
|
|
|
");
|
|
|
|
|
|
|
|
/* Set "arguments for dll_chain. */
|
|
|
|
ret.low = (long) dll->init;
|
|
|
|
ret.high = (long) func;
|
|
|
|
return ret.ll;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Initialization function for winsock stuff. */
|
|
|
|
static long long wsock_init () __asm__ ("wsock_init") __attribute__ ((unused, regparm(1)));
|
2001-09-01 02:16:16 +08:00
|
|
|
bool NO_COPY wsock_started = 0;
|
2001-05-16 13:07:51 +08:00
|
|
|
static long long
|
|
|
|
wsock_init ()
|
|
|
|
{
|
|
|
|
static LONG NO_COPY here = -1L;
|
|
|
|
struct func_info *func = (struct func_info *) __builtin_return_address (0);
|
|
|
|
struct dll_info *dll = func->dll;
|
|
|
|
|
|
|
|
__asm__ (" \n\
|
|
|
|
.section .ws2_32_info \n\
|
|
|
|
.equ _ws2_32_handle,.ws2_32_info + 4 \n\
|
|
|
|
.global _ws2_32_handle \n\
|
|
|
|
.section .wsock32_info \n\
|
|
|
|
.equ _wsock32_handle,.wsock32_info + 4 \n\
|
|
|
|
.global _wsock32_handle \n\
|
|
|
|
.text \n\
|
|
|
|
");
|
2000-10-28 02:53:56 +08:00
|
|
|
|
2001-05-05 05:02:15 +08:00
|
|
|
while (InterlockedIncrement (&here))
|
2000-10-28 02:53:56 +08:00
|
|
|
{
|
2001-05-05 05:02:15 +08:00
|
|
|
InterlockedDecrement (&here);
|
2000-10-28 02:53:56 +08:00
|
|
|
Sleep (0);
|
|
|
|
}
|
|
|
|
|
2001-10-14 01:23:35 +08:00
|
|
|
if (!wsock_started && (winsock_active || winsock2_active))
|
2001-05-16 13:07:51 +08:00
|
|
|
{
|
|
|
|
/* Don't use autoload to load WSAStartup to eliminate recursion. */
|
|
|
|
int (*wsastartup) (int, WSADATA *);
|
2000-10-28 02:53:56 +08:00
|
|
|
|
2001-05-16 13:07:51 +08:00
|
|
|
wsastartup = (int (*)(int, WSADATA *))
|
2001-09-08 05:32:07 +08:00
|
|
|
GetProcAddress ((HMODULE) (dll->handle), "WSAStartup");
|
2001-05-16 13:07:51 +08:00
|
|
|
if (wsastartup)
|
2001-09-08 05:32:07 +08:00
|
|
|
{
|
2001-05-16 13:07:51 +08:00
|
|
|
int res = wsastartup ((2<<8) | 2, &wsadata);
|
2000-10-28 02:53:56 +08:00
|
|
|
|
2001-05-16 13:07:51 +08:00
|
|
|
debug_printf ("res %d", res);
|
|
|
|
debug_printf ("wVersion %d", wsadata.wVersion);
|
|
|
|
debug_printf ("wHighVersion %d", wsadata.wHighVersion);
|
|
|
|
debug_printf ("szDescription %s", wsadata.szDescription);
|
|
|
|
debug_printf ("szSystemStatus %s", wsadata.szSystemStatus);
|
|
|
|
debug_printf ("iMaxSockets %d", wsadata.iMaxSockets);
|
|
|
|
debug_printf ("iMaxUdpDg %d", wsadata.iMaxUdpDg);
|
|
|
|
debug_printf ("lpVendorInfo %d", wsadata.lpVendorInfo);
|
2001-03-22 11:42:08 +08:00
|
|
|
|
2001-05-16 13:07:51 +08:00
|
|
|
wsock_started = 1;
|
2001-09-08 05:32:07 +08:00
|
|
|
}
|
2001-05-16 13:07:51 +08:00
|
|
|
}
|
2001-03-22 11:42:08 +08:00
|
|
|
|
2001-05-16 13:07:51 +08:00
|
|
|
InterlockedDecrement (&here);
|
2001-03-22 11:42:08 +08:00
|
|
|
|
2001-05-16 13:07:51 +08:00
|
|
|
/* Kludge alert. Redirects the return address to dll_chain1. */
|
|
|
|
__asm__ __volatile__ (" \n\
|
|
|
|
movl $dll_chain1,4(%ebp) \n\
|
|
|
|
");
|
|
|
|
|
2001-10-13 09:35:15 +08:00
|
|
|
volatile retchain ret;
|
2001-05-16 13:07:51 +08:00
|
|
|
/* Set "arguments for dll_chain1. */
|
|
|
|
ret.low = (long) dll_func_load;
|
|
|
|
ret.high = (long) func;
|
|
|
|
return ret.ll;
|
2001-04-16 11:27:16 +08:00
|
|
|
}
|
|
|
|
|
2001-05-16 13:07:51 +08:00
|
|
|
LoadDLLprime (wsock32, wsock_init)
|
|
|
|
LoadDLLprime (ws2_32, wsock_init)
|
|
|
|
|
2000-10-28 02:53:56 +08:00
|
|
|
LoadDLLfunc (AddAccessAllowedAce, 16, advapi32)
|
|
|
|
LoadDLLfunc (AddAccessDeniedAce, 16, advapi32)
|
|
|
|
LoadDLLfunc (AddAce, 20, advapi32)
|
|
|
|
LoadDLLfunc (AdjustTokenPrivileges, 24, advapi32)
|
2001-05-01 05:19:42 +08:00
|
|
|
LoadDLLfuncEx (AllocateLocallyUniqueId, 4, advapi32, 1)
|
2000-10-28 02:53:56 +08:00
|
|
|
LoadDLLfunc (CopySid, 12, advapi32)
|
|
|
|
LoadDLLfunc (CreateProcessAsUserA, 44, advapi32)
|
|
|
|
LoadDLLfuncEx (CryptAcquireContextA, 20, advapi32, 1)
|
|
|
|
LoadDLLfuncEx (CryptGenRandom, 12, advapi32, 1)
|
|
|
|
LoadDLLfuncEx (CryptReleaseContext, 8, advapi32, 1)
|
|
|
|
LoadDLLfunc (DeregisterEventSource, 4, advapi32)
|
2001-05-01 05:19:42 +08:00
|
|
|
LoadDLLfuncEx (DuplicateTokenEx, 24, advapi32, 1)
|
2000-10-28 02:53:56 +08:00
|
|
|
LoadDLLfunc (EqualSid, 8, advapi32)
|
|
|
|
LoadDLLfunc (GetAce, 12, advapi32)
|
|
|
|
LoadDLLfunc (GetFileSecurityA, 20, advapi32)
|
|
|
|
LoadDLLfunc (GetLengthSid, 4, advapi32)
|
|
|
|
LoadDLLfunc (GetSecurityDescriptorDacl, 16, advapi32)
|
|
|
|
LoadDLLfunc (GetSecurityDescriptorGroup, 12, advapi32)
|
|
|
|
LoadDLLfunc (GetSecurityDescriptorOwner, 12, advapi32)
|
|
|
|
LoadDLLfunc (GetSidIdentifierAuthority, 4, advapi32)
|
|
|
|
LoadDLLfunc (GetSidSubAuthority, 8, advapi32)
|
|
|
|
LoadDLLfunc (GetSidSubAuthorityCount, 4, advapi32)
|
|
|
|
LoadDLLfunc (GetTokenInformation, 20, advapi32)
|
|
|
|
LoadDLLfunc (GetUserNameA, 8, advapi32)
|
|
|
|
LoadDLLfunc (ImpersonateLoggedOnUser, 4, advapi32)
|
2002-02-28 22:30:38 +08:00
|
|
|
LoadDLLfunc (ImpersonateNamedPipeClient, 4, advapi32)
|
2000-10-28 02:53:56 +08:00
|
|
|
LoadDLLfunc (InitializeAcl, 12, advapi32)
|
|
|
|
LoadDLLfunc (InitializeSecurityDescriptor, 8, advapi32)
|
|
|
|
LoadDLLfunc (InitializeSid, 12, advapi32)
|
|
|
|
LoadDLLfunc (IsValidSid, 4, advapi32)
|
|
|
|
LoadDLLfunc (LogonUserA, 24, advapi32)
|
|
|
|
LoadDLLfunc (LookupAccountNameA, 28, advapi32)
|
* autoload.cc: Add load statements for `LookupAccountNameW',
`LsaClose', `LsaEnumerateAccountRights', `LsaFreeMemory',
`LsaOpenPolicy', `LsaQueryInformationPolicy', `NetLocalGroupEnum',
`NetLocalGroupGetMembers', `NetServerEnum', `NetUserGetGroups' and
`NtCreateToken'.
* ntdll.h: Add declaration for `NtCreateToken'.
* sec_helper.cc: Add `well_known_local_sid', `well_known_dialup_sid',
`well_known_network_sid', `well_known_batch_sid',
`well_known_interactive_sid', `well_known_service_sid' and
`well_known_authenticated_users_sid'.
(cygsid::string): Define as const method.
(cygsid::get_sid): Set psid to NO_SID on error.
(cygsid::getfromstr): Ditto.
(cygsid::getfrompw): Simplify.
(cygsid::getfromgr): Check for gr == NULL.
(legal_sid_type): Move to security.h.
(set_process_privilege): Return -1 on error, otherwise 0 or 1 related
to previous privilege setting.
* security.cc (extract_nt_dom_user): Remove `static'.
(lsa2wchar): New function.
(open_local_policy): Ditto.
(close_local_policy): Ditto.
(get_lsa_srv_inf): Ditto.
(get_logon_server): Ditto.
(get_logon_server_and_user_domain): Ditto.
(get_user_groups): Ditto.
(is_group_member): Ditto.
(get_user_local_groups): Ditto.
(sid_in_token_groups): Ditto.
(get_user_primary_group): Ditto.
(get_group_sidlist): Ditto.
(get_system_priv_list): Ditto.
(get_priv_list): Ditto.
(get_dacl): Ditto.
(create_token): Ditto.
(subauth): Return immediately if SE_TCB_NAME can't be assigned.
Change all return statements in case of error to jumps to `out'
label. Add `out' label to support cleanup.
* security.h: Add extern declarations for `well_known_local_sid',
`well_known_dialup_sid', `well_known_network_sid',
`well_known_batch_sid', `well_known_interactive_sid',
`well_known_service_sid' and `well_known_authenticated_users_sid'.
Add extern declarations for functions `create_token',
`extract_nt_dom_user' and `get_logon_server_and_user_domain'.
(class cygsid): Add method `assign'. Change operator= to call new
`assign' method. Add `debug_print' method.
(class cygsidlist): New class.
(legal_sid_type): Moved from sec_helper.cc to here.
* spawn.cc (spawn_guts) Revert reversion of previous patch.
Call `RevertToSelf' and `ImpersonateLoggedOnUser' instead of `seteuid'
again.
* syscalls.cc (seteuid): Rearranged. Call `create_token' now when
needed. Call `subauth' if `create_token' fails. Try setting token
owner and primary group only if token was not explicitely created
by `create_token'.
* uinfo.cc (internal_getlogin): Try harder to generate correct user
information. Especially don't trust return value of `GetUserName'.
2001-05-20 16:10:47 +08:00
|
|
|
LoadDLLfunc (LookupAccountNameW, 28, advapi32)
|
2000-10-28 02:53:56 +08:00
|
|
|
LoadDLLfunc (LookupAccountSidA, 28, advapi32)
|
|
|
|
LoadDLLfunc (LookupPrivilegeValueA, 12, advapi32)
|
* autoload.cc: Add load statements for `LookupAccountNameW',
`LsaClose', `LsaEnumerateAccountRights', `LsaFreeMemory',
`LsaOpenPolicy', `LsaQueryInformationPolicy', `NetLocalGroupEnum',
`NetLocalGroupGetMembers', `NetServerEnum', `NetUserGetGroups' and
`NtCreateToken'.
* ntdll.h: Add declaration for `NtCreateToken'.
* sec_helper.cc: Add `well_known_local_sid', `well_known_dialup_sid',
`well_known_network_sid', `well_known_batch_sid',
`well_known_interactive_sid', `well_known_service_sid' and
`well_known_authenticated_users_sid'.
(cygsid::string): Define as const method.
(cygsid::get_sid): Set psid to NO_SID on error.
(cygsid::getfromstr): Ditto.
(cygsid::getfrompw): Simplify.
(cygsid::getfromgr): Check for gr == NULL.
(legal_sid_type): Move to security.h.
(set_process_privilege): Return -1 on error, otherwise 0 or 1 related
to previous privilege setting.
* security.cc (extract_nt_dom_user): Remove `static'.
(lsa2wchar): New function.
(open_local_policy): Ditto.
(close_local_policy): Ditto.
(get_lsa_srv_inf): Ditto.
(get_logon_server): Ditto.
(get_logon_server_and_user_domain): Ditto.
(get_user_groups): Ditto.
(is_group_member): Ditto.
(get_user_local_groups): Ditto.
(sid_in_token_groups): Ditto.
(get_user_primary_group): Ditto.
(get_group_sidlist): Ditto.
(get_system_priv_list): Ditto.
(get_priv_list): Ditto.
(get_dacl): Ditto.
(create_token): Ditto.
(subauth): Return immediately if SE_TCB_NAME can't be assigned.
Change all return statements in case of error to jumps to `out'
label. Add `out' label to support cleanup.
* security.h: Add extern declarations for `well_known_local_sid',
`well_known_dialup_sid', `well_known_network_sid',
`well_known_batch_sid', `well_known_interactive_sid',
`well_known_service_sid' and `well_known_authenticated_users_sid'.
Add extern declarations for functions `create_token',
`extract_nt_dom_user' and `get_logon_server_and_user_domain'.
(class cygsid): Add method `assign'. Change operator= to call new
`assign' method. Add `debug_print' method.
(class cygsidlist): New class.
(legal_sid_type): Moved from sec_helper.cc to here.
* spawn.cc (spawn_guts) Revert reversion of previous patch.
Call `RevertToSelf' and `ImpersonateLoggedOnUser' instead of `seteuid'
again.
* syscalls.cc (seteuid): Rearranged. Call `create_token' now when
needed. Call `subauth' if `create_token' fails. Try setting token
owner and primary group only if token was not explicitely created
by `create_token'.
* uinfo.cc (internal_getlogin): Try harder to generate correct user
information. Especially don't trust return value of `GetUserName'.
2001-05-20 16:10:47 +08:00
|
|
|
LoadDLLfunc (LsaClose, 4, advapi32)
|
|
|
|
LoadDLLfunc (LsaEnumerateAccountRights, 16, advapi32)
|
|
|
|
LoadDLLfunc (LsaFreeMemory, 4, advapi32)
|
|
|
|
LoadDLLfunc (LsaNtStatusToWinError, 4, advapi32)
|
|
|
|
LoadDLLfunc (LsaOpenPolicy, 16, advapi32)
|
|
|
|
LoadDLLfunc (LsaQueryInformationPolicy, 12, advapi32)
|
2000-10-28 02:53:56 +08:00
|
|
|
LoadDLLfunc (MakeSelfRelativeSD, 12, advapi32)
|
|
|
|
LoadDLLfunc (OpenProcessToken, 12, advapi32)
|
|
|
|
LoadDLLfunc (RegCloseKey, 4, advapi32)
|
|
|
|
LoadDLLfunc (RegCreateKeyExA, 36, advapi32)
|
|
|
|
LoadDLLfunc (RegDeleteKeyA, 8, advapi32)
|
|
|
|
LoadDLLfunc (RegDeleteValueA, 8, advapi32)
|
|
|
|
LoadDLLfunc (RegLoadKeyA, 12, advapi32)
|
|
|
|
LoadDLLfunc (RegEnumKeyExA, 32, advapi32)
|
|
|
|
LoadDLLfunc (RegEnumValueA, 32, advapi32)
|
|
|
|
LoadDLLfunc (RegOpenKeyExA, 20, advapi32)
|
|
|
|
LoadDLLfunc (RegQueryValueExA, 24, advapi32)
|
|
|
|
LoadDLLfunc (RegSetValueExA, 24, advapi32)
|
|
|
|
LoadDLLfunc (RegisterEventSourceA, 8, advapi32)
|
|
|
|
LoadDLLfunc (ReportEventA, 36, advapi32)
|
|
|
|
LoadDLLfunc (RevertToSelf, 0, advapi32)
|
|
|
|
LoadDLLfunc (SetKernelObjectSecurity, 12, advapi32)
|
2000-12-20 20:42:43 +08:00
|
|
|
LoadDLLfunc (SetSecurityDescriptorControl, 12, advapi32)
|
2000-10-28 02:53:56 +08:00
|
|
|
LoadDLLfunc (SetSecurityDescriptorDacl, 16, advapi32)
|
|
|
|
LoadDLLfunc (SetSecurityDescriptorGroup, 12, advapi32)
|
|
|
|
LoadDLLfunc (SetSecurityDescriptorOwner, 12, advapi32)
|
2001-04-25 17:43:25 +08:00
|
|
|
LoadDLLfunc (SetTokenInformation, 16, advapi32)
|
2000-10-28 02:53:56 +08:00
|
|
|
|
|
|
|
LoadDLLfunc (NetApiBufferFree, 4, netapi32)
|
2002-03-07 22:32:53 +08:00
|
|
|
LoadDLLfunc (NetGetDCName, 12, netapi32)
|
* autoload.cc: Add load statements for `LookupAccountNameW',
`LsaClose', `LsaEnumerateAccountRights', `LsaFreeMemory',
`LsaOpenPolicy', `LsaQueryInformationPolicy', `NetLocalGroupEnum',
`NetLocalGroupGetMembers', `NetServerEnum', `NetUserGetGroups' and
`NtCreateToken'.
* ntdll.h: Add declaration for `NtCreateToken'.
* sec_helper.cc: Add `well_known_local_sid', `well_known_dialup_sid',
`well_known_network_sid', `well_known_batch_sid',
`well_known_interactive_sid', `well_known_service_sid' and
`well_known_authenticated_users_sid'.
(cygsid::string): Define as const method.
(cygsid::get_sid): Set psid to NO_SID on error.
(cygsid::getfromstr): Ditto.
(cygsid::getfrompw): Simplify.
(cygsid::getfromgr): Check for gr == NULL.
(legal_sid_type): Move to security.h.
(set_process_privilege): Return -1 on error, otherwise 0 or 1 related
to previous privilege setting.
* security.cc (extract_nt_dom_user): Remove `static'.
(lsa2wchar): New function.
(open_local_policy): Ditto.
(close_local_policy): Ditto.
(get_lsa_srv_inf): Ditto.
(get_logon_server): Ditto.
(get_logon_server_and_user_domain): Ditto.
(get_user_groups): Ditto.
(is_group_member): Ditto.
(get_user_local_groups): Ditto.
(sid_in_token_groups): Ditto.
(get_user_primary_group): Ditto.
(get_group_sidlist): Ditto.
(get_system_priv_list): Ditto.
(get_priv_list): Ditto.
(get_dacl): Ditto.
(create_token): Ditto.
(subauth): Return immediately if SE_TCB_NAME can't be assigned.
Change all return statements in case of error to jumps to `out'
label. Add `out' label to support cleanup.
* security.h: Add extern declarations for `well_known_local_sid',
`well_known_dialup_sid', `well_known_network_sid',
`well_known_batch_sid', `well_known_interactive_sid',
`well_known_service_sid' and `well_known_authenticated_users_sid'.
Add extern declarations for functions `create_token',
`extract_nt_dom_user' and `get_logon_server_and_user_domain'.
(class cygsid): Add method `assign'. Change operator= to call new
`assign' method. Add `debug_print' method.
(class cygsidlist): New class.
(legal_sid_type): Moved from sec_helper.cc to here.
* spawn.cc (spawn_guts) Revert reversion of previous patch.
Call `RevertToSelf' and `ImpersonateLoggedOnUser' instead of `seteuid'
again.
* syscalls.cc (seteuid): Rearranged. Call `create_token' now when
needed. Call `subauth' if `create_token' fails. Try setting token
owner and primary group only if token was not explicitely created
by `create_token'.
* uinfo.cc (internal_getlogin): Try harder to generate correct user
information. Especially don't trust return value of `GetUserName'.
2001-05-20 16:10:47 +08:00
|
|
|
LoadDLLfunc (NetLocalGroupEnum, 28, netapi32)
|
|
|
|
LoadDLLfunc (NetLocalGroupGetMembers, 32, netapi32)
|
|
|
|
LoadDLLfunc (NetUserGetGroups, 28, netapi32)
|
|
|
|
LoadDLLfunc (NetUserGetInfo, 16, netapi32)
|
|
|
|
LoadDLLfunc (NetWkstaUserGetInfo, 12, netapi32)
|
2000-10-28 02:53:56 +08:00
|
|
|
|
* autoload.cc: Add load statements for `LookupAccountNameW',
`LsaClose', `LsaEnumerateAccountRights', `LsaFreeMemory',
`LsaOpenPolicy', `LsaQueryInformationPolicy', `NetLocalGroupEnum',
`NetLocalGroupGetMembers', `NetServerEnum', `NetUserGetGroups' and
`NtCreateToken'.
* ntdll.h: Add declaration for `NtCreateToken'.
* sec_helper.cc: Add `well_known_local_sid', `well_known_dialup_sid',
`well_known_network_sid', `well_known_batch_sid',
`well_known_interactive_sid', `well_known_service_sid' and
`well_known_authenticated_users_sid'.
(cygsid::string): Define as const method.
(cygsid::get_sid): Set psid to NO_SID on error.
(cygsid::getfromstr): Ditto.
(cygsid::getfrompw): Simplify.
(cygsid::getfromgr): Check for gr == NULL.
(legal_sid_type): Move to security.h.
(set_process_privilege): Return -1 on error, otherwise 0 or 1 related
to previous privilege setting.
* security.cc (extract_nt_dom_user): Remove `static'.
(lsa2wchar): New function.
(open_local_policy): Ditto.
(close_local_policy): Ditto.
(get_lsa_srv_inf): Ditto.
(get_logon_server): Ditto.
(get_logon_server_and_user_domain): Ditto.
(get_user_groups): Ditto.
(is_group_member): Ditto.
(get_user_local_groups): Ditto.
(sid_in_token_groups): Ditto.
(get_user_primary_group): Ditto.
(get_group_sidlist): Ditto.
(get_system_priv_list): Ditto.
(get_priv_list): Ditto.
(get_dacl): Ditto.
(create_token): Ditto.
(subauth): Return immediately if SE_TCB_NAME can't be assigned.
Change all return statements in case of error to jumps to `out'
label. Add `out' label to support cleanup.
* security.h: Add extern declarations for `well_known_local_sid',
`well_known_dialup_sid', `well_known_network_sid',
`well_known_batch_sid', `well_known_interactive_sid',
`well_known_service_sid' and `well_known_authenticated_users_sid'.
Add extern declarations for functions `create_token',
`extract_nt_dom_user' and `get_logon_server_and_user_domain'.
(class cygsid): Add method `assign'. Change operator= to call new
`assign' method. Add `debug_print' method.
(class cygsidlist): New class.
(legal_sid_type): Moved from sec_helper.cc to here.
* spawn.cc (spawn_guts) Revert reversion of previous patch.
Call `RevertToSelf' and `ImpersonateLoggedOnUser' instead of `seteuid'
again.
* syscalls.cc (seteuid): Rearranged. Call `create_token' now when
needed. Call `subauth' if `create_token' fails. Try setting token
owner and primary group only if token was not explicitely created
by `create_token'.
* uinfo.cc (internal_getlogin): Try harder to generate correct user
information. Especially don't trust return value of `GetUserName'.
2001-05-20 16:10:47 +08:00
|
|
|
LoadDLLfuncEx (NtCreateToken, 52, ntdll, 1)
|
2000-10-28 02:53:56 +08:00
|
|
|
LoadDLLfuncEx (NtMapViewOfSection, 40, ntdll, 1)
|
2001-10-16 22:53:26 +08:00
|
|
|
LoadDLLfuncEx (NtOpenFile, 24, ntdll, 1)
|
2000-10-28 02:53:56 +08:00
|
|
|
LoadDLLfuncEx (NtOpenSection, 12, ntdll, 1)
|
|
|
|
LoadDLLfuncEx (NtQuerySystemInformation, 16, ntdll, 1)
|
|
|
|
LoadDLLfuncEx (NtUnmapViewOfSection, 8, ntdll, 1)
|
|
|
|
LoadDLLfuncEx (RtlInitUnicodeString, 8, ntdll, 1)
|
|
|
|
LoadDLLfuncEx (RtlNtStatusToDosError, 4, ntdll, 1)
|
2000-11-02 13:25:56 +08:00
|
|
|
LoadDLLfuncEx (ZwQuerySystemInformation, 16, ntdll, 1)
|
2000-10-28 02:53:56 +08:00
|
|
|
|
2001-10-22 07:44:43 +08:00
|
|
|
LoadDLLfuncEx (GetProcessMemoryInfo, 12, psapi, 1)
|
|
|
|
|
2001-05-01 05:19:42 +08:00
|
|
|
LoadDLLfuncEx (LsaDeregisterLogonProcess, 4, secur32, 1)
|
|
|
|
LoadDLLfuncEx (LsaFreeReturnBuffer, 4, secur32, 1)
|
|
|
|
LoadDLLfuncEx (LsaLogonUser, 56, secur32, 1)
|
|
|
|
LoadDLLfuncEx (LsaLookupAuthenticationPackage, 12, secur32, 1)
|
|
|
|
LoadDLLfuncEx (LsaRegisterLogonProcess, 12, secur32, 1)
|
|
|
|
|
2000-12-10 08:45:12 +08:00
|
|
|
LoadDLLfunc (CharToOemA, 8, user32)
|
2000-10-28 02:53:56 +08:00
|
|
|
LoadDLLfunc (CharToOemBuffA, 12, user32)
|
|
|
|
LoadDLLfunc (CloseClipboard, 0, user32)
|
|
|
|
LoadDLLfunc (CreateWindowExA, 48, user32)
|
|
|
|
LoadDLLfunc (DefWindowProcA, 16, user32)
|
|
|
|
LoadDLLfunc (DispatchMessageA, 4, user32)
|
2001-03-23 06:11:34 +08:00
|
|
|
LoadDLLfunc (EmptyClipboard, 0, user32)
|
2000-10-28 02:53:56 +08:00
|
|
|
LoadDLLfunc (FindWindowA, 8, user32)
|
|
|
|
LoadDLLfunc (GetClipboardData, 4, user32)
|
2001-03-06 20:05:45 +08:00
|
|
|
LoadDLLfunc (GetKeyboardLayout, 4, user32)
|
2000-10-28 02:53:56 +08:00
|
|
|
LoadDLLfunc (GetMessageA, 16, user32)
|
2001-03-23 06:11:34 +08:00
|
|
|
LoadDLLfunc (GetPriorityClipboardFormat, 8, user32)
|
2000-10-28 02:53:56 +08:00
|
|
|
LoadDLLfunc (GetProcessWindowStation, 0, user32)
|
|
|
|
LoadDLLfunc (GetThreadDesktop, 4, user32)
|
|
|
|
LoadDLLfunc (GetUserObjectInformationA, 20, user32)
|
|
|
|
LoadDLLfunc (KillTimer, 8, user32)
|
|
|
|
LoadDLLfunc (MessageBoxA, 16, user32)
|
|
|
|
LoadDLLfunc (MsgWaitForMultipleObjects, 20, user32)
|
|
|
|
LoadDLLfunc (OemToCharBuffA, 12, user32)
|
|
|
|
LoadDLLfunc (OpenClipboard, 4, user32)
|
|
|
|
LoadDLLfunc (PeekMessageA, 20, user32)
|
|
|
|
LoadDLLfunc (PostMessageA, 16, user32)
|
|
|
|
LoadDLLfunc (PostQuitMessage, 4, user32)
|
|
|
|
LoadDLLfunc (RegisterClassA, 4, user32)
|
2001-03-23 06:11:34 +08:00
|
|
|
LoadDLLfunc (RegisterClipboardFormatA, 4, user32)
|
2000-10-28 02:53:56 +08:00
|
|
|
LoadDLLfunc (SendMessageA, 16, user32)
|
2001-03-23 06:11:34 +08:00
|
|
|
LoadDLLfunc (SetClipboardData, 8, user32)
|
2000-10-28 02:53:56 +08:00
|
|
|
LoadDLLfunc (SetTimer, 16, user32)
|
|
|
|
LoadDLLfunc (SetUserObjectSecurity, 12, user32)
|
|
|
|
|
2001-10-14 12:14:24 +08:00
|
|
|
LoadDLLfuncEx (load_wsock32, 0, wsock32, 1) // non-existent function forces wsock32 load
|
2000-10-28 02:53:56 +08:00
|
|
|
LoadDLLfunc (WSAAsyncSelect, 16, wsock32)
|
|
|
|
LoadDLLfunc (WSACleanup, 0, wsock32)
|
|
|
|
LoadDLLfunc (WSAGetLastError, 0, wsock32)
|
2000-11-08 04:01:09 +08:00
|
|
|
LoadDLLfunc (WSASetLastError, 4, wsock32)
|
2001-10-14 01:23:35 +08:00
|
|
|
// LoadDLLfunc (WSAStartup, 8, wsock32)
|
2000-10-28 02:53:56 +08:00
|
|
|
LoadDLLfunc (__WSAFDIsSet, 8, wsock32)
|
|
|
|
LoadDLLfunc (accept, 12, wsock32)
|
|
|
|
LoadDLLfunc (bind, 12, wsock32)
|
|
|
|
LoadDLLfunc (closesocket, 4, wsock32)
|
|
|
|
LoadDLLfunc (connect, 12, wsock32)
|
|
|
|
LoadDLLfunc (gethostbyaddr, 12, wsock32)
|
|
|
|
LoadDLLfunc (gethostbyname, 4, wsock32)
|
|
|
|
LoadDLLfunc (gethostname, 8, wsock32)
|
|
|
|
LoadDLLfunc (getpeername, 12, wsock32)
|
|
|
|
LoadDLLfunc (getprotobyname, 4, wsock32)
|
|
|
|
LoadDLLfunc (getprotobynumber, 4, wsock32)
|
|
|
|
LoadDLLfunc (getservbyname, 8, wsock32)
|
|
|
|
LoadDLLfunc (getservbyport, 8, wsock32)
|
|
|
|
LoadDLLfunc (getsockname, 12, wsock32)
|
|
|
|
LoadDLLfunc (getsockopt, 20, wsock32)
|
|
|
|
LoadDLLfunc (inet_addr, 4, wsock32)
|
|
|
|
LoadDLLfunc (inet_network, 4, wsock32)
|
|
|
|
LoadDLLfunc (inet_ntoa, 4, wsock32)
|
|
|
|
LoadDLLfunc (ioctlsocket, 12, wsock32)
|
|
|
|
LoadDLLfunc (listen, 8, wsock32)
|
|
|
|
LoadDLLfunc (rcmd, 24, wsock32)
|
|
|
|
LoadDLLfunc (recv, 16, wsock32)
|
|
|
|
LoadDLLfunc (recvfrom, 24, wsock32)
|
|
|
|
LoadDLLfunc (rexec, 24, wsock32)
|
|
|
|
LoadDLLfunc (rresvport, 4, wsock32)
|
|
|
|
LoadDLLfunc (select, 20, wsock32)
|
|
|
|
LoadDLLfunc (send, 16, wsock32)
|
|
|
|
LoadDLLfunc (sendto, 24, wsock32)
|
|
|
|
LoadDLLfunc (setsockopt, 20, wsock32)
|
|
|
|
LoadDLLfunc (shutdown, 8, wsock32)
|
|
|
|
LoadDLLfunc (socket, 12, wsock32)
|
|
|
|
|
2001-05-15 16:15:54 +08:00
|
|
|
LoadDLLfuncEx (WSACloseEvent, 4, ws2_32, 1)
|
|
|
|
LoadDLLfuncEx (WSACreateEvent, 0, ws2_32, 1)
|
2000-10-28 02:53:56 +08:00
|
|
|
LoadDLLfuncEx (WSADuplicateSocketA, 12, ws2_32, 1)
|
2001-05-15 16:15:54 +08:00
|
|
|
LoadDLLfuncEx (WSAGetOverlappedResult, 20, ws2_32, 1)
|
|
|
|
LoadDLLfuncEx (WSARecv, 28, ws2_32, 1)
|
|
|
|
LoadDLLfuncEx (WSARecvFrom, 36, ws2_32, 1)
|
|
|
|
LoadDLLfuncEx (WSASend, 28, ws2_32, 1)
|
|
|
|
LoadDLLfuncEx (WSASendTo, 36, ws2_32, 1)
|
|
|
|
LoadDLLfuncEx (WSASetEvent, 4, ws2_32, 1)
|
2000-10-28 02:53:56 +08:00
|
|
|
LoadDLLfuncEx (WSASocketA, 24, ws2_32, 1)
|
2001-05-15 16:15:54 +08:00
|
|
|
LoadDLLfuncEx (WSAWaitForMultipleEvents, 20, ws2_32, 1)
|
2001-02-08 06:50:50 +08:00
|
|
|
|
|
|
|
LoadDLLfuncEx (GetIfTable, 12, iphlpapi, 1)
|
|
|
|
LoadDLLfuncEx (GetIpAddrTable, 12, iphlpapi, 1)
|
2001-02-22 05:49:37 +08:00
|
|
|
|
|
|
|
LoadDLLfunc (CoInitialize, 4, ole32)
|
|
|
|
LoadDLLfunc (CoUninitialize, 0, ole32)
|
|
|
|
LoadDLLfunc (CoCreateInstance, 20, ole32)
|
2001-03-22 11:42:08 +08:00
|
|
|
|
2001-05-20 00:36:58 +08:00
|
|
|
LoadDLLfuncEx (CancelIo, 4, kernel32, 1)
|
2001-11-25 04:57:19 +08:00
|
|
|
LoadDLLfuncEx (CreateHardLinkA, 12, kernel32, 1)
|
|
|
|
LoadDLLfuncEx (CreateToolhelp32Snapshot, 8, kernel32, 1)
|
|
|
|
LoadDLLfuncEx (IsDebuggerPresent, 0, kernel32, 1)
|
2001-06-12 01:57:10 +08:00
|
|
|
LoadDLLfuncEx (Process32First, 8, kernel32, 1)
|
|
|
|
LoadDLLfuncEx (Process32Next, 8, kernel32, 1)
|
2001-11-25 04:57:19 +08:00
|
|
|
LoadDLLfuncEx (SignalObjectAndWait, 16, kernel32, 1)
|
2001-09-12 11:18:05 +08:00
|
|
|
LoadDLLfunc (TryEnterCriticalSection, 4, kernel32)
|
2001-04-16 11:27:16 +08:00
|
|
|
|
|
|
|
LoadDLLfuncEx (waveOutGetNumDevs, 0, winmm, 1)
|
|
|
|
LoadDLLfuncEx (waveOutOpen, 24, winmm, 1)
|
|
|
|
LoadDLLfuncEx (waveOutReset, 4, winmm, 1)
|
|
|
|
LoadDLLfuncEx (waveOutClose, 4, winmm, 1)
|
|
|
|
LoadDLLfuncEx (waveOutGetVolume, 8, winmm, 1)
|
|
|
|
LoadDLLfuncEx (waveOutSetVolume, 8, winmm, 1)
|
|
|
|
LoadDLLfuncEx (waveOutUnprepareHeader, 12, winmm, 1)
|
|
|
|
LoadDLLfuncEx (waveOutPrepareHeader, 12, winmm, 1)
|
|
|
|
LoadDLLfuncEx (waveOutWrite, 12, winmm, 1)
|
2000-10-28 02:53:56 +08:00
|
|
|
}
|