2020-07-03 12:26:06 +02:00
|
|
|
/* SPDX-License-Identifier: GPL-2.0
|
|
|
|
*
|
2021-01-30 16:45:26 +01:00
|
|
|
* Copyright (C) 2018-2021 WireGuard LLC. All Rights Reserved.
|
2020-07-03 12:26:06 +02:00
|
|
|
*/
|
|
|
|
|
2020-10-31 11:55:26 +01:00
|
|
|
#include "adapter.h"
|
|
|
|
#include "entry.h"
|
|
|
|
#include "logger.h"
|
|
|
|
#include "registry.h"
|
|
|
|
#include "namespace.h"
|
|
|
|
#include "wintun.h"
|
|
|
|
|
|
|
|
#include <Windows.h>
|
|
|
|
#pragma warning(push)
|
|
|
|
#pragma warning(disable : 4201)
|
|
|
|
/* nonstandard extension used: nameless struct/union */
|
|
|
|
#include <delayimp.h>
|
|
|
|
#pragma warning(pop)
|
|
|
|
#include <sddl.h>
|
2021-07-23 18:19:00 +02:00
|
|
|
#include <winefs.h>
|
|
|
|
#include <stdlib.h>
|
2020-07-03 12:26:06 +02:00
|
|
|
|
|
|
|
HINSTANCE ResourceModule;
|
2020-10-24 22:12:47 +02:00
|
|
|
HANDLE ModuleHeap;
|
2020-10-30 13:26:36 +01:00
|
|
|
SECURITY_ATTRIBUTES SecurityAttributes = { .nLength = sizeof(SECURITY_ATTRIBUTES) };
|
2021-06-24 12:12:13 +02:00
|
|
|
BOOL IsLocalSystem;
|
2020-07-03 12:26:06 +02:00
|
|
|
|
2020-11-03 12:29:34 +01:00
|
|
|
static FARPROC WINAPI
|
|
|
|
DelayedLoadLibraryHook(unsigned dliNotify, PDelayLoadInfo pdli)
|
2020-10-30 11:43:47 +01:00
|
|
|
{
|
|
|
|
if (dliNotify != dliNotePreLoadLibrary)
|
|
|
|
return NULL;
|
|
|
|
HMODULE Library = LoadLibraryExA(pdli->szDll, NULL, LOAD_LIBRARY_SEARCH_SYSTEM32);
|
|
|
|
if (!Library)
|
|
|
|
abort();
|
|
|
|
return (FARPROC)Library;
|
|
|
|
}
|
|
|
|
|
|
|
|
const PfnDliHook __pfnDliNotifyHook2 = DelayedLoadLibraryHook;
|
2020-11-16 20:53:07 +01:00
|
|
|
|
2021-06-24 12:12:13 +02:00
|
|
|
static BOOL
|
|
|
|
InitializeSecurityObjects(void)
|
|
|
|
{
|
|
|
|
BYTE LocalSystemSid[MAX_SID_SIZE];
|
|
|
|
DWORD RequiredBytes = sizeof(LocalSystemSid);
|
|
|
|
HANDLE CurrentProcessToken;
|
|
|
|
struct
|
|
|
|
{
|
|
|
|
TOKEN_USER MaybeLocalSystem;
|
|
|
|
CHAR LargeEnoughForLocalSystem[MAX_SID_SIZE];
|
|
|
|
} TokenUserBuffer;
|
|
|
|
BOOL Ret = FALSE;
|
|
|
|
|
|
|
|
if (!CreateWellKnownSid(WinLocalSystemSid, NULL, LocalSystemSid, &RequiredBytes))
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
if (!OpenProcessToken(GetCurrentProcess(), TOKEN_QUERY, &CurrentProcessToken))
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
if (!GetTokenInformation(CurrentProcessToken, TokenUser, &TokenUserBuffer, sizeof(TokenUserBuffer), &RequiredBytes))
|
|
|
|
goto cleanupProcessToken;
|
|
|
|
|
|
|
|
IsLocalSystem = EqualSid(TokenUserBuffer.MaybeLocalSystem.User.Sid, LocalSystemSid);
|
|
|
|
Ret = ConvertStringSecurityDescriptorToSecurityDescriptorW(
|
|
|
|
IsLocalSystem ? L"O:SYD:P(A;;GA;;;SY)(A;;GA;;;BA)S:(ML;;NWNRNX;;;HI)"
|
|
|
|
: L"O:BAD:P(A;;GA;;;SY)(A;;GA;;;BA)S:(ML;;NWNRNX;;;HI)",
|
|
|
|
SDDL_REVISION_1,
|
|
|
|
&SecurityAttributes.lpSecurityDescriptor,
|
|
|
|
NULL);
|
|
|
|
|
|
|
|
cleanupProcessToken:
|
|
|
|
CloseHandle(CurrentProcessToken);
|
|
|
|
return Ret;
|
|
|
|
}
|
|
|
|
|
2020-07-03 12:26:06 +02:00
|
|
|
BOOL APIENTRY
|
|
|
|
DllMain(_In_ HINSTANCE hinstDLL, _In_ DWORD fdwReason, _In_ LPVOID lpvReserved)
|
|
|
|
{
|
|
|
|
UNREFERENCED_PARAMETER(lpvReserved);
|
|
|
|
|
|
|
|
switch (fdwReason)
|
|
|
|
{
|
|
|
|
case DLL_PROCESS_ATTACH:
|
|
|
|
ResourceModule = hinstDLL;
|
2020-10-24 22:12:47 +02:00
|
|
|
ModuleHeap = HeapCreate(0, 0, 0);
|
2020-10-31 08:15:52 +01:00
|
|
|
if (!ModuleHeap)
|
|
|
|
return FALSE;
|
2021-06-24 12:12:13 +02:00
|
|
|
if (!InitializeSecurityObjects())
|
|
|
|
{
|
|
|
|
HeapDestroy(ModuleHeap);
|
|
|
|
return FALSE;
|
|
|
|
}
|
2020-10-15 11:32:06 +02:00
|
|
|
AdapterInit();
|
2020-07-03 16:49:47 +02:00
|
|
|
NamespaceInit();
|
|
|
|
break;
|
|
|
|
|
2020-07-03 12:26:06 +02:00
|
|
|
case DLL_PROCESS_DETACH:
|
2020-11-03 12:29:34 +01:00
|
|
|
NamespaceDone();
|
2020-10-30 13:26:36 +01:00
|
|
|
LocalFree(SecurityAttributes.lpSecurityDescriptor);
|
2020-10-24 22:12:47 +02:00
|
|
|
HeapDestroy(ModuleHeap);
|
2020-07-03 12:26:06 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
return TRUE;
|
|
|
|
}
|