You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
381 lines
12 KiB
381 lines
12 KiB
//+-----------------------------------------------------------------------
|
|
//
|
|
// Microsoft Windows
|
|
//
|
|
// Copyright (c) Microsoft Corporation 1991 - 1992
|
|
//
|
|
// File: scmsvc.cxx
|
|
//
|
|
// Contents: Initialization for win32 service controller.
|
|
//
|
|
// History: 14-Jul-92 CarlH Created.
|
|
// 31-Dec-93 ErikGav Chicago port
|
|
// 25-Aug-99 a-sergiv Fixed ScmCreatedEvent vulnerability
|
|
//
|
|
//------------------------------------------------------------------------
|
|
|
|
#include "act.hxx"
|
|
#include <sddl.h>
|
|
|
|
#ifdef DFSACTIVATION
|
|
HANDLE ghDfs = 0;
|
|
#endif
|
|
|
|
#define SCM_CREATED_EVENT TEXT("ScmCreatedEvent")
|
|
|
|
DECLARE_INFOLEVEL(Cairole);
|
|
|
|
SC_HANDLE g_hServiceController = 0;
|
|
PSID psidMySid = NULL;
|
|
HANDLE g_hVistaEvent = NULL;
|
|
|
|
//+-------------------------------------------------------------------------
|
|
//
|
|
// Function: InitializeVistaEventIfNeeded
|
|
//
|
|
// Synopsis: Checks to see if vista (vis. studio analyzer) events are
|
|
// enabled, and if so creates a named event. Somebody looks at this
|
|
// event I presume, but creating the event is the end of our
|
|
// responsibility for it. Once created we keep it around forever. Also,
|
|
// this is a non-essential operation from our perspective, hence the
|
|
// void return value.
|
|
//
|
|
// Arguments: None.
|
|
//
|
|
// Returns: void
|
|
//
|
|
//--------------------------------------------------------------------------
|
|
void InitializeVistaEventIfNeeded()
|
|
{
|
|
// Create a named event for Vista to toggle event logging
|
|
|
|
ASSERT(!g_hVistaEvent);
|
|
|
|
LONG lResult;
|
|
WCHAR wszValue[128];
|
|
LONG lBufSize = sizeof(wszValue);
|
|
|
|
ZeroMemory(wszValue, sizeof(wszValue));
|
|
|
|
lResult = RegQueryValue(
|
|
HKEY_CLASSES_ROOT,
|
|
L"CLSID\\{6C736DB0-BD94-11D0-8A23-00AA00B58E10}\\EnableEvents",
|
|
wszValue,
|
|
&lBufSize);
|
|
if ((lResult != ERROR_SUCCESS) || lstrcmp(wszValue, L"1"))
|
|
return;
|
|
|
|
//
|
|
// Create security descriptor that grants the follow privs:
|
|
//
|
|
// EVENT_QUERY_STATE|EVENT_MODIFY_STATE|SYNCHRONIZE|READ_CONTROL
|
|
//
|
|
// to Everyone. Dang me if this isn't easier than writing code! :)
|
|
//
|
|
const WCHAR wszStringSD[] =
|
|
SDDL_DACL L":" L"(" SDDL_ACCESS_ALLOWED L";;0x00120003;;;" SDDL_EVERYONE L")";
|
|
|
|
//
|
|
// Turn that into a security descriptor.
|
|
//
|
|
PSECURITY_DESCRIPTOR psd;
|
|
BOOL fRet = ConvertStringSecurityDescriptorToSecurityDescriptor(wszStringSD,
|
|
SDDL_REVISION,
|
|
&psd,
|
|
NULL);
|
|
ASSERT(fRet && "ConvertStringSecurityDescriptorToSecurityDescriptor failed!");
|
|
if (fRet)
|
|
{
|
|
SECURITY_ATTRIBUTES sa;
|
|
sa.nLength = sizeof(sa);
|
|
sa.bInheritHandle = FALSE;
|
|
sa.lpSecurityDescriptor = psd;
|
|
|
|
// The toggle event, which is signaled by LEC and checked by all.
|
|
|
|
// The handle never closes during the process
|
|
g_hVistaEvent = CreateEvent(
|
|
&sa, /* Security */
|
|
TRUE, /* Manual reset */
|
|
FALSE, /* InitialState is non-signaled */
|
|
L"MSFT.VSA.IEC.STATUS.6c736db0" /* Name */
|
|
);
|
|
// do not care if it succeeded or not
|
|
LocalFree(psd);
|
|
}
|
|
|
|
return;
|
|
}
|
|
|
|
//+-------------------------------------------------------------------------
|
|
//
|
|
// Function: InitializeSCMBeforeListen
|
|
//
|
|
// Synopsis: Initializes OLE side of rpcss. Put things in here that do
|
|
// not depend on RPC being initialized, etc.
|
|
//
|
|
// Arguments: None.
|
|
//
|
|
// Returns: Status of initialization. Note that this function is a bit
|
|
// weak on cleanup in the face of errors, but this is okay since if this
|
|
// function fails, RPCSS will not start.
|
|
//
|
|
//--------------------------------------------------------------------------
|
|
DWORD
|
|
InitializeSCMBeforeListen( void )
|
|
{
|
|
LONG Status;
|
|
SCODE sc;
|
|
RPC_STATUS rs;
|
|
|
|
SID_IDENTIFIER_AUTHORITY NtAuthority = SECURITY_NT_AUTHORITY;
|
|
|
|
UpdateState(SERVICE_START_PENDING);
|
|
|
|
Status = RtlInitializeCriticalSection(&gTokenCS);
|
|
if (!NT_SUCCESS(Status))
|
|
return Status;
|
|
|
|
// Allocate locks
|
|
Status = OR_NOMEM;
|
|
gpClientLock = new CSharedLock(Status);
|
|
if (OR_OK != Status)
|
|
return(Status);
|
|
|
|
Status = OR_NOMEM;
|
|
gpServerLock = new CSharedLock(Status);
|
|
if (OR_OK != Status)
|
|
return(Status);
|
|
|
|
Status = OR_NOMEM;
|
|
gpIPCheckLock = new CSharedLock(Status);
|
|
if (OR_OK != Status)
|
|
return(Status);
|
|
|
|
g_hServiceController = OpenSCManager(NULL, NULL, GENERIC_EXECUTE);
|
|
if (!g_hServiceController)
|
|
return GetLastError();
|
|
|
|
// Init random number generator
|
|
if (!gRNG.Initialize())
|
|
return (OR_NOMEM);
|
|
|
|
//
|
|
// Get my sid
|
|
// This is simplified under the assumption that SCM runs as LocalSystem.
|
|
// We should remove this code when we incorporate OLE service into the
|
|
// Service Control Manager since this becomes duplicated code then.
|
|
//
|
|
Status = RtlAllocateAndInitializeSid (
|
|
&NtAuthority,
|
|
1,
|
|
SECURITY_LOCAL_SYSTEM_RID,
|
|
0, 0, 0, 0, 0, 0, 0,
|
|
&psidMySid
|
|
);
|
|
if (!NT_SUCCESS(Status))
|
|
return Status;
|
|
|
|
UpdateState(SERVICE_START_PENDING);
|
|
|
|
HRESULT hr = S_OK;
|
|
|
|
hr = InitSCMRegistry();
|
|
if (FAILED(hr))
|
|
return ERROR_NOT_ENOUGH_MEMORY;
|
|
|
|
//Initialize runas cache
|
|
InitRunAsCache(); // returns void
|
|
|
|
gpClassLock = new CSharedLock(Status);
|
|
if (!gpClassLock)
|
|
return ERROR_NOT_ENOUGH_MEMORY;
|
|
|
|
gpProcessLock = new CSharedLock(Status);
|
|
if (!gpProcessLock)
|
|
return ERROR_NOT_ENOUGH_MEMORY;
|
|
|
|
gpProcessListLock = new CSharedLock(Status);
|
|
if (!gpProcessListLock)
|
|
return ERROR_NOT_ENOUGH_MEMORY;
|
|
|
|
gpClassTable = new CServerTable(Status, ENTRY_TYPE_CLASS);
|
|
if (!gpClassTable)
|
|
return ERROR_NOT_ENOUGH_MEMORY;
|
|
|
|
gpProcessTable = new CServerTable(Status, ENTRY_TYPE_PROCESS);
|
|
if (!gpProcessTable)
|
|
return ERROR_NOT_ENOUGH_MEMORY;
|
|
|
|
gpSurrogateList = new CSurrogateList();
|
|
if (!gpSurrogateList)
|
|
return ERROR_NOT_ENOUGH_MEMORY;
|
|
|
|
gpRemoteMachineLock = new CSharedLock(Status);
|
|
if (!gpRemoteMachineLock)
|
|
return ERROR_NOT_ENOUGH_MEMORY;
|
|
|
|
gpRemoteMachineList = new CRemoteMachineList();
|
|
if (!gpRemoteMachineList)
|
|
return ERROR_NOT_ENOUGH_MEMORY;
|
|
|
|
gpNamedObjectTable = new CNamedObjectTable(Status);
|
|
if (!gpNamedObjectTable || (Status != OR_OK))
|
|
return ERROR_NOT_ENOUGH_MEMORY;
|
|
|
|
UpdateState(SERVICE_START_PENDING);
|
|
|
|
#ifdef DFSACTIVATION
|
|
DfsOpen( &ghDfs );
|
|
#endif
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
//+-------------------------------------------------------------------------
|
|
//
|
|
// Function: InitializeSCM
|
|
//
|
|
// Synopsis: Initializes OLE side of rpcss.
|
|
//
|
|
// Arguments: None.
|
|
//
|
|
// Returns: ERROR_SUCCESS
|
|
//
|
|
// (REVIEW: should we be returning an error whenever any of
|
|
// the stuff in this function fails?)
|
|
//
|
|
//--------------------------------------------------------------------------
|
|
DWORD
|
|
InitializeSCM( void )
|
|
{
|
|
RPC_STATUS status;
|
|
HRESULT hr;
|
|
|
|
// start the RPC service
|
|
hr = InitScmRot();
|
|
if (FAILED(hr))
|
|
return ERROR_NOT_ENOUGH_MEMORY;
|
|
|
|
//
|
|
// Note: some of these calls specify a callback function and some
|
|
// don't. The ones that don't must be able to receive unauthenticated
|
|
// calls (ie, our remoted interfaces).
|
|
//
|
|
|
|
status = RpcServerRegisterIfEx(ISCM_ServerIfHandle,
|
|
NULL,
|
|
NULL,
|
|
0,
|
|
RPC_C_LISTEN_MAX_CALLS_DEFAULT,
|
|
LocalInterfaceOnlySecCallback); // expected to be local only
|
|
ASSERT((status == 0) && "RpcServerRegisterIfEx failed!");
|
|
|
|
status = RpcServerRegisterIfEx(ISCMActivator_ServerIfHandle,
|
|
NULL,
|
|
NULL,
|
|
0,
|
|
RPC_C_LISTEN_MAX_CALLS_DEFAULT,
|
|
LocalInterfaceOnlySecCallback); // expected to be local only
|
|
ASSERT((status == 0) && "RpcServerRegisterIfEx failed!");
|
|
|
|
status = RpcServerRegisterIfEx(IMachineActivatorControl_ServerIfHandle,
|
|
NULL,
|
|
NULL,
|
|
0,
|
|
RPC_C_LISTEN_MAX_CALLS_DEFAULT,
|
|
LocalInterfaceOnlySecCallback); // expected to be local only
|
|
ASSERT((status == 0) && "RpcServerRegisterIfEx failed!");
|
|
|
|
status = RpcServerRegisterIfEx(_IActivation_ServerIfHandle,
|
|
NULL,
|
|
NULL,
|
|
0,
|
|
RPC_C_LISTEN_MAX_CALLS_DEFAULT,
|
|
NULL); // must be able to accept unauthenticated calls
|
|
ASSERT((status == 0) && "RpcServerRegisterIf failed!");
|
|
|
|
status = RpcServerRegisterIfEx(_IRemoteSCMActivator_ServerIfHandle,
|
|
NULL,
|
|
NULL,
|
|
0,
|
|
RPC_C_LISTEN_MAX_CALLS_DEFAULT,
|
|
NULL); // must be able to accept unauthenticated calls
|
|
ASSERT((status == 0) && "RpcServerRegisterIf failed!");
|
|
|
|
UpdateState(SERVICE_START_PENDING);
|
|
|
|
return ERROR_SUCCESS;
|
|
}
|
|
|
|
|
|
void
|
|
InitializeSCMAfterListen()
|
|
{
|
|
//
|
|
// This is for the OLE apps which start during boot. They must wait for
|
|
// rpcss to start before completing OLE calls that talk to rpcss.
|
|
//
|
|
// Need to do this work to make sure the DACL for the event doesn't have
|
|
// WRITE_DAC and WRITE_OWNER on it.
|
|
//
|
|
// Rights quick reference:
|
|
// EVENT_QUERY_STATE 0x00000001
|
|
// EVENT_MODIFY_STATE 0x00000002
|
|
// READ_CONTROL 0x00020000
|
|
// WRITE_DAC 0x00040000
|
|
// WRITE_OWNER 0x00080000
|
|
// SYNCHRONIZE 0x00100000
|
|
//
|
|
// So:
|
|
// Everyone gets EVENT_QUERY_STATE | READ_CONTROL | SYNCHRONIZE
|
|
// I gets EVENT_MODIFY_STATE | WRITE_DAC | WRITE_OWNER
|
|
//
|
|
// Here we go... (this works because of C++ auto string concatenation)
|
|
const WCHAR wszStringSD[] =
|
|
SDDL_DACL L":" L"(" SDDL_ACCESS_ALLOWED L";;0x00120001;;;" SDDL_EVERYONE L")"
|
|
L"(" SDDL_ACCESS_ALLOWED L";;0x001C0002;;;" SDDL_PERSONAL_SELF L")"
|
|
;
|
|
//
|
|
// Whew. Make that into a security descriptor.
|
|
//
|
|
PSECURITY_DESCRIPTOR psd;
|
|
BOOL fRet = ConvertStringSecurityDescriptorToSecurityDescriptor(wszStringSD,
|
|
SDDL_REVISION,
|
|
&psd,
|
|
NULL);
|
|
ASSERT(fRet && "ConvertStringSecurityDescriptorToSecurityDescriptor failed!");
|
|
if (fRet)
|
|
{
|
|
SECURITY_ATTRIBUTES sa;
|
|
sa.nLength = sizeof(sa);
|
|
sa.bInheritHandle = FALSE;
|
|
sa.lpSecurityDescriptor = psd;
|
|
|
|
// We leak this handle on purpose, so that other people can still find it by
|
|
// name.
|
|
HANDLE EventHandle = CreateEventT( &sa, TRUE, FALSE, SCM_CREATED_EVENT );
|
|
if ( !EventHandle && GetLastError() == ERROR_ACCESS_DENIED )
|
|
EventHandle = OpenEvent(EVENT_MODIFY_STATE, FALSE, SCM_CREATED_EVENT);
|
|
|
|
if ( EventHandle )
|
|
SetEvent( EventHandle );
|
|
else
|
|
ASSERT(0 && "Unable to get ScmCreatedEvent");
|
|
|
|
LocalFree(psd);
|
|
}
|
|
|
|
// The vista event was originally being created inline in ServiceMain but
|
|
// there is no point in creating it until we are ready for work.
|
|
InitializeVistaEventIfNeeded();
|
|
|
|
// Tell RPC to enable cleanup of idle connections. This function only needs to be
|
|
// called one time.
|
|
RPC_STATUS rpcstatus = RpcMgmtEnableIdleCleanup();
|
|
ASSERT(rpcstatus == RPC_S_OK && "unexpected failure from RpcMgmtEnableIdleCleanup");
|
|
// don't fail in free builds, this is an non-essential optimization
|
|
|
|
return;
|
|
}
|