| 1 | // Licensed to the .NET Foundation under one or more agreements. |
| 2 | // The .NET Foundation licenses this file to you under the MIT license. |
| 3 | // See the LICENSE file in the project root for more information. |
| 4 | //***************************************************************************** |
| 5 | // WinWrap.cpp |
| 6 | // |
| 7 | |
| 8 | // |
| 9 | // This file contains wrapper functions for Win32 API's that take strings. |
| 10 | // |
| 11 | // COM+ internally uses UNICODE as the internal state and string format. This |
| 12 | // file will undef the mapping macros so that one cannot mistakingly call a |
| 13 | // method that isn't going to work. Instead, you have to call the correct |
| 14 | // wrapper API. |
| 15 | // |
| 16 | //***************************************************************************** |
| 17 | |
| 18 | #include "stdafx.h" // Precompiled header key. |
| 19 | #include "winwrap.h" // Header for macros and functions. |
| 20 | #include "utilcode.h" |
| 21 | #include "holder.h" |
| 22 | #include "ndpversion.h" |
| 23 | #include "pedecoder.h" |
| 24 | |
| 25 | |
| 26 | // ====== READ BEFORE ADDING CONTRACTS ================================================== |
| 27 | // The functions in this file propagate SetLastError codes to their callers. |
| 28 | // Contracts are not guaranteed to preserve these codes (and no, we're not taking |
| 29 | // the overhead hit to make them do so. Don't bother asking.) |
| 30 | // |
| 31 | // Most of the wrappers have a contract of the form: |
| 32 | // |
| 33 | // NOTHROW; |
| 34 | // INJECT_FAULT(xxx); |
| 35 | // |
| 36 | // For such functions, use the special purpose construct: |
| 37 | // |
| 38 | // WINWRAPPER_NO_CONTRACT(xxx); |
| 39 | // |
| 40 | // For everything else, use STATIC_CONTRACT. |
| 41 | // |
| 42 | #undef CONTRACT |
| 43 | #define CONTRACT $$$$$$$$READ_COMMENT_IN_WINFIX_CPP$$$$$$$$$$ |
| 44 | |
| 45 | #undef CONTRACTL |
| 46 | #define CONTRACTL $$$$$$$$READ_COMMENT_IN_WINFIX_CPP$$$$$$$$$$ |
| 47 | |
| 48 | #ifdef ENABLE_CONTRACTS_IMPL |
| 49 | static BOOL gWinWrapperContractRecursionBreak = FALSE; |
| 50 | |
| 51 | |
| 52 | class WinWrapperContract |
| 53 | { |
| 54 | public: |
| 55 | WinWrapperContract(const char *szFunction, const char *szFile, int lineNum) |
| 56 | { |
| 57 | CANNOT_HAVE_CONTRACT; |
| 58 | |
| 59 | m_pClrDebugState = NULL; |
| 60 | |
| 61 | if (gWinWrapperContractRecursionBreak) |
| 62 | { |
| 63 | return; |
| 64 | } |
| 65 | |
| 66 | m_pClrDebugState = GetClrDebugState(); |
| 67 | |
| 68 | // Save old debug state |
| 69 | m_IncomingClrDebugState = *m_pClrDebugState; |
| 70 | |
| 71 | |
| 72 | m_pClrDebugState->ViolationMaskReset( ThrowsViolation ); |
| 73 | |
| 74 | if (m_pClrDebugState->IsFaultForbid() && !(m_pClrDebugState->ViolationMask() & (FaultViolation|FaultNotFatal|BadDebugState))) |
| 75 | { |
| 76 | gWinWrapperContractRecursionBreak = TRUE; |
| 77 | |
| 78 | CONTRACT_ASSERT("INJECT_FAULT called in a FAULTFORBID region." , |
| 79 | Contract::FAULT_Forbid, |
| 80 | Contract::FAULT_Mask, |
| 81 | szFunction, |
| 82 | szFile, |
| 83 | lineNum |
| 84 | ); |
| 85 | } |
| 86 | |
| 87 | |
| 88 | }; |
| 89 | |
| 90 | ~WinWrapperContract() |
| 91 | { |
| 92 | CANNOT_HAVE_CONTRACT; |
| 93 | |
| 94 | //!!!!!! THIS DESTRUCTOR MUST NOT CHANGE THE GETLASTERROR VALUE !!!!!! |
| 95 | |
| 96 | // Backout all changes to debug state. |
| 97 | if (m_pClrDebugState != NULL) |
| 98 | { |
| 99 | *m_pClrDebugState = m_IncomingClrDebugState; |
| 100 | } |
| 101 | } |
| 102 | private: |
| 103 | ClrDebugState *m_pClrDebugState; |
| 104 | ClrDebugState m_IncomingClrDebugState; |
| 105 | |
| 106 | }; |
| 107 | |
| 108 | |
| 109 | |
| 110 | #endif |
| 111 | |
| 112 | #ifdef ENABLE_CONTRACTS_IMPL |
| 113 | #define WINWRAPPER_NO_CONTRACT(stmt) \ |
| 114 | STATIC_CONTRACT_NOTHROW; \ |
| 115 | STATIC_CONTRACT_FAULT; \ |
| 116 | STATIC_CONTRACT_CANNOT_TAKE_LOCK; \ |
| 117 | WinWrapperContract __wcontract(__FUNCTION__, __FILE__, __LINE__); \ |
| 118 | if (0) {stmt} \ |
| 119 | |
| 120 | #define STATIC_WINWRAPPER_NO_CONTRACT(stmt) \ |
| 121 | STATIC_CONTRACT_NOTHROW; \ |
| 122 | STATIC_CONTRACT_CANNOT_TAKE_LOCK; \ |
| 123 | STATIC_CONTRACT_FAULT; \ |
| 124 | if (0) {stmt} \ |
| 125 | |
| 126 | |
| 127 | #else |
| 128 | #define WINWRAPPER_NO_CONTRACT(stmt) |
| 129 | #define STATIC_WINWRAPPER_NO_CONTRACT(stmt) |
| 130 | #endif |
| 131 | |
| 132 | ULONG g_dwMaxDBCSCharByteSize = 0; |
| 133 | |
| 134 | // The only purpose of this function is to make a local copy of lpCommandLine. |
| 135 | // Because windows implementation of CreateProcessW can actually change lpCommandLine, |
| 136 | // but we'd like to keep it const. |
| 137 | BOOL |
| 138 | WszCreateProcess( |
| 139 | LPCWSTR lpApplicationName, |
| 140 | LPCWSTR lpCommandLine, |
| 141 | LPSECURITY_ATTRIBUTES lpProcessAttributes, |
| 142 | LPSECURITY_ATTRIBUTES lpThreadAttributes, |
| 143 | BOOL bInheritHandles, |
| 144 | DWORD dwCreationFlags, |
| 145 | LPVOID lpEnvironment, |
| 146 | LPCWSTR lpCurrentDirectory, |
| 147 | LPSTARTUPINFOW lpStartupInfo, |
| 148 | LPPROCESS_INFORMATION lpProcessInformation |
| 149 | ) |
| 150 | { |
| 151 | WINWRAPPER_NO_CONTRACT(SetLastError(ERROR_OUTOFMEMORY); return 0;); |
| 152 | |
| 153 | BOOL fResult; |
| 154 | DWORD err; |
| 155 | { |
| 156 | size_t commandLineLength = wcslen(lpCommandLine) + 1; |
| 157 | NewArrayHolder<WCHAR> nonConstCommandLine(new (nothrow) WCHAR[commandLineLength]); |
| 158 | if (nonConstCommandLine == NULL) |
| 159 | { |
| 160 | SetLastError(ERROR_OUTOFMEMORY); |
| 161 | return 0; |
| 162 | } |
| 163 | |
| 164 | memcpy(nonConstCommandLine, lpCommandLine, commandLineLength * sizeof(WCHAR)); |
| 165 | |
| 166 | fResult = CreateProcessW(lpApplicationName, |
| 167 | nonConstCommandLine, |
| 168 | lpProcessAttributes, |
| 169 | lpThreadAttributes, |
| 170 | bInheritHandles, |
| 171 | dwCreationFlags, |
| 172 | lpEnvironment, |
| 173 | (LPWSTR)lpCurrentDirectory, |
| 174 | lpStartupInfo, |
| 175 | lpProcessInformation); |
| 176 | |
| 177 | // At the end of the current scope, the last error code will be overwritten by the destructor of |
| 178 | // NewArrayHolder. So we save the error code here, and restore it after the end of the current scope. |
| 179 | err = GetLastError(); |
| 180 | } |
| 181 | |
| 182 | SetLastError(err); |
| 183 | return fResult; |
| 184 | } |
| 185 | |
| 186 | #ifndef FEATURE_PAL |
| 187 | |
| 188 | |
| 189 | #include "psapi.h" |
| 190 | #include "tlhelp32.h" |
| 191 | #include "winnls.h" |
| 192 | |
| 193 | //********** Globals. ********************************************************* |
| 194 | bool g_fEnsureCharSetInfoInitialized = FALSE; // true if we've detected the platform's character set characteristics |
| 195 | |
| 196 | // Detect Unicode support of the operating system, and initialize globals |
| 197 | void EnsureCharSetInfoInitialized() |
| 198 | { |
| 199 | STATIC_CONTRACT_NOTHROW; |
| 200 | STATIC_CONTRACT_FORBID_FAULT; |
| 201 | STATIC_CONTRACT_CANNOT_TAKE_LOCK; |
| 202 | STATIC_CONTRACT_SO_TOLERANT; |
| 203 | |
| 204 | if (!g_fEnsureCharSetInfoInitialized) |
| 205 | { |
| 206 | // NOTE: Do not use any of the Wsz* wrapper functions right now. They will have |
| 207 | // problems. |
| 208 | |
| 209 | // Per Shupak, you're supposed to get the maximum size of a DBCS char |
| 210 | // dynamically to work properly on all locales (bug 2757). |
| 211 | CPINFO cpInfo; |
| 212 | if (GetCPInfo(CP_ACP, &cpInfo)) |
| 213 | g_dwMaxDBCSCharByteSize = cpInfo.MaxCharSize; |
| 214 | else |
| 215 | g_dwMaxDBCSCharByteSize = 2; |
| 216 | |
| 217 | VolatileStore(&g_fEnsureCharSetInfoInitialized, true); |
| 218 | } |
| 219 | |
| 220 | return; |
| 221 | } |
| 222 | |
| 223 | |
| 224 | // Running with an interactive workstation. |
| 225 | BOOL RunningInteractive() |
| 226 | { |
| 227 | STATIC_CONTRACT_NOTHROW; |
| 228 | STATIC_CONTRACT_FORBID_FAULT; |
| 229 | |
| 230 | static int fInteractive = -1; |
| 231 | if (fInteractive != -1) |
| 232 | return fInteractive != 0; |
| 233 | |
| 234 | #if !defined(FEATURE_CORESYSTEM) |
| 235 | HWINSTA hwinsta = NULL; |
| 236 | |
| 237 | if ((hwinsta = GetProcessWindowStation() ) != NULL) |
| 238 | { |
| 239 | DWORD lengthNeeded; |
| 240 | USEROBJECTFLAGS flags; |
| 241 | |
| 242 | if (GetUserObjectInformationW (hwinsta, UOI_FLAGS, &flags, sizeof(flags), &lengthNeeded)) |
| 243 | { |
| 244 | if ((flags.dwFlags & WSF_VISIBLE) == 0) |
| 245 | fInteractive = 0; |
| 246 | } |
| 247 | } |
| 248 | #endif // !FEATURE_CORESYSTEM |
| 249 | |
| 250 | if (fInteractive != 0) |
| 251 | fInteractive = 1; |
| 252 | |
| 253 | return fInteractive != 0; |
| 254 | } |
| 255 | |
| 256 | |
| 257 | // Wrapper function around CheckTokenMembership to determine if the token enables the SID "S-1-5-<rid>". |
| 258 | // If hToken is NULL, this function uses the thread's impersonation token. If the thread is not impersonating, the |
| 259 | // process token is used. |
| 260 | // |
| 261 | // If the function succeeds, it returns ERROR_SUCCESS, else it returns the error code returned by GetLastError() |
| 262 | static DWORD TokenEnablesSID(IN HANDLE hToken OPTIONAL, IN DWORD rid, OUT BOOL& fResult) |
| 263 | { |
| 264 | DWORD dwError; |
| 265 | SID_IDENTIFIER_AUTHORITY SIDAuthNT = SECURITY_NT_AUTHORITY; |
| 266 | PSID pSid = NULL; |
| 267 | HMODULE hAdvApi32 = NULL; |
| 268 | typedef BOOL (WINAPI *CheckTokenMembership_t)(HANDLE TokenHandle, PSID SidToCheck, PBOOL IsMember); |
| 269 | CheckTokenMembership_t pfnCheckTokenMembership = NULL; |
| 270 | |
| 271 | hAdvApi32 = WszGetModuleHandle(W("advapi32.dll" )); |
| 272 | if (hAdvApi32 == NULL) |
| 273 | { |
| 274 | dwError = ERROR_MOD_NOT_FOUND; |
| 275 | goto lExit; |
| 276 | } |
| 277 | pfnCheckTokenMembership = (CheckTokenMembership_t) GetProcAddress(hAdvApi32, "CheckTokenMembership" ); |
| 278 | if (pfnCheckTokenMembership == NULL) |
| 279 | { |
| 280 | dwError = GetLastError(); |
| 281 | goto lExit; |
| 282 | } |
| 283 | |
| 284 | fResult = FALSE; |
| 285 | if (!AllocateAndInitializeSid(&SIDAuthNT, 1, rid, 0, 0, 0, 0, 0, 0, 0, &pSid)) |
| 286 | { |
| 287 | dwError = GetLastError(); |
| 288 | goto lExit; |
| 289 | } |
| 290 | if (!pfnCheckTokenMembership(hToken, pSid, &fResult)) |
| 291 | { |
| 292 | dwError = GetLastError(); |
| 293 | goto lExit; |
| 294 | } |
| 295 | dwError = ERROR_SUCCESS; |
| 296 | |
| 297 | lExit: |
| 298 | if (pSid) FreeSid(pSid); |
| 299 | return dwError; |
| 300 | |
| 301 | } |
| 302 | |
| 303 | // Determines if the process is running as Local System or as a service. Note that |
| 304 | // the function attempts to determine the process' identity and not the thread's |
| 305 | // (if the thread is impersonating). |
| 306 | // |
| 307 | // Parameters: |
| 308 | // fIsLocalSystemOrService - TRUE if the function succeeds and the process is |
| 309 | // running as SYSTEM or as a service |
| 310 | // |
| 311 | // Return value: |
| 312 | // |
| 313 | // If the function succeeds, it returns ERROR_SUCCESS, else it returns the error |
| 314 | // code returned by GetLastError() |
| 315 | // |
| 316 | // Notes: |
| 317 | // |
| 318 | // This function will generally fail if the calling thread is impersonating at the |
| 319 | // ANONYMOUS level; see the comments in the function. |
| 320 | // |
| 321 | DWORD RunningAsLocalSystemOrService(OUT BOOL& fIsLocalSystemOrService) |
| 322 | { |
| 323 | STATIC_CONTRACT_NOTHROW; |
| 324 | STATIC_CONTRACT_FORBID_FAULT; |
| 325 | |
| 326 | static int fLocalSystemOrService = -1; |
| 327 | if (fLocalSystemOrService != -1) |
| 328 | { |
| 329 | fIsLocalSystemOrService = fLocalSystemOrService != 0; |
| 330 | return ERROR_SUCCESS; |
| 331 | } |
| 332 | |
| 333 | DWORD dwError; |
| 334 | HANDLE hThreadToken = NULL; |
| 335 | HANDLE hProcessToken = NULL; |
| 336 | HANDLE hDuplicatedProcessToken = NULL; |
| 337 | BOOL fLocalSystem = FALSE; |
| 338 | BOOL fService = FALSE; |
| 339 | BOOL bReverted = FALSE; |
| 340 | |
| 341 | if (OpenThreadToken(GetCurrentThread(), TOKEN_IMPERSONATE, TRUE, &hThreadToken)) |
| 342 | { |
| 343 | if (RevertToSelf()) |
| 344 | { |
| 345 | bReverted = TRUE; |
| 346 | } |
| 347 | #ifdef _DEBUG |
| 348 | else |
| 349 | { |
| 350 | // For debugging only, continue as the impersonated user; see comment below |
| 351 | dwError = GetLastError(); |
| 352 | } |
| 353 | #endif // #ifdef _DEBUG |
| 354 | } |
| 355 | #ifdef _DEBUG |
| 356 | else |
| 357 | { |
| 358 | dwError = GetLastError(); |
| 359 | if (dwError == ERROR_NO_IMPERSONATION_TOKEN || dwError == ERROR_NO_TOKEN) |
| 360 | { |
| 361 | // The thread is not impersonating; it's safe to continue |
| 362 | } |
| 363 | else |
| 364 | { |
| 365 | // The thread could be impersonating, but we won't be able to restore the impersonation |
| 366 | // token if we RevertToSelf(). Continue as the impersonated user. OpenProcessToken will |
| 367 | // fail (unless the impersonated user is SYSTEM or the same as the process' user). |
| 368 | // |
| 369 | // Note that this case will occur if the impersonation level is ANONYMOUS, the error |
| 370 | // code will be ERROR_CANT_OPEN_ANONYMOUS. |
| 371 | } |
| 372 | } |
| 373 | #endif // #ifdef _DEBUG |
| 374 | |
| 375 | if (!OpenProcessToken(GetCurrentProcess(), TOKEN_DUPLICATE, &hProcessToken)) |
| 376 | { |
| 377 | dwError = GetLastError(); |
| 378 | goto lExit; |
| 379 | } |
| 380 | |
| 381 | if (!DuplicateToken(hProcessToken, SecurityImpersonation, &hDuplicatedProcessToken)) |
| 382 | { |
| 383 | dwError = GetLastError(); |
| 384 | goto lExit; |
| 385 | } |
| 386 | |
| 387 | dwError = TokenEnablesSID(hDuplicatedProcessToken, SECURITY_LOCAL_SYSTEM_RID, fLocalSystem); |
| 388 | if (dwError != ERROR_SUCCESS) |
| 389 | { |
| 390 | goto lExit; |
| 391 | } |
| 392 | if (fLocalSystem) |
| 393 | { |
| 394 | goto lExit; |
| 395 | } |
| 396 | |
| 397 | dwError = TokenEnablesSID(hDuplicatedProcessToken, SECURITY_SERVICE_RID, fService); |
| 398 | |
| 399 | lExit: |
| 400 | if (bReverted) |
| 401 | { |
| 402 | if (!SetThreadToken(NULL, hThreadToken)) |
| 403 | { |
| 404 | DWORD dwLastError = GetLastError(); |
| 405 | _ASSERT("SetThreadToken failed" ); |
| 406 | |
| 407 | TerminateProcess(GetCurrentProcess(), dwLastError); |
| 408 | } |
| 409 | } |
| 410 | |
| 411 | if (hThreadToken) CloseHandle(hThreadToken); |
| 412 | if (hProcessToken) CloseHandle(hProcessToken); |
| 413 | if (hDuplicatedProcessToken) CloseHandle(hDuplicatedProcessToken); |
| 414 | |
| 415 | if (dwError != ERROR_SUCCESS) |
| 416 | { |
| 417 | fIsLocalSystemOrService = FALSE; // We don't really know |
| 418 | } |
| 419 | else |
| 420 | { |
| 421 | fLocalSystemOrService = (fLocalSystem || fService)? 1 : 0; |
| 422 | fIsLocalSystemOrService = fLocalSystemOrService != 0; |
| 423 | } |
| 424 | |
| 425 | return dwError; |
| 426 | |
| 427 | } |
| 428 | |
| 429 | typedef HRESULT(WINAPI *pfnSetThreadDescription)(HANDLE hThread, PCWSTR lpThreadDescription); |
| 430 | extern pfnSetThreadDescription g_pfnSetThreadDescription; |
| 431 | |
| 432 | // Dummy method if windows version does not support it |
| 433 | HRESULT SetThreadDescriptionDummy(HANDLE hThread, PCWSTR lpThreadDescription) |
| 434 | { |
| 435 | return NOERROR; |
| 436 | } |
| 437 | |
| 438 | HRESULT WINAPI InitializeSetThreadDescription(HANDLE hThread, PCWSTR lpThreadDescription) |
| 439 | { |
| 440 | HMODULE hKernel32 = WszLoadLibrary(W("kernel32.dll" )); |
| 441 | |
| 442 | pfnSetThreadDescription pLocal = NULL; |
| 443 | if (hKernel32 != NULL) |
| 444 | { |
| 445 | // store to thread local variable to prevent data race |
| 446 | pLocal = (pfnSetThreadDescription)GetProcAddress(hKernel32, "SetThreadDescription" ); |
| 447 | } |
| 448 | |
| 449 | if (pLocal == NULL) // method is only available with Windows 10 Creators Update or later |
| 450 | { |
| 451 | g_pfnSetThreadDescription = SetThreadDescriptionDummy; |
| 452 | } |
| 453 | else |
| 454 | { |
| 455 | g_pfnSetThreadDescription = pLocal; |
| 456 | } |
| 457 | |
| 458 | return g_pfnSetThreadDescription(hThread, lpThreadDescription); |
| 459 | } |
| 460 | |
| 461 | pfnSetThreadDescription g_pfnSetThreadDescription = &InitializeSetThreadDescription; |
| 462 | |
| 463 | // Set unmanaged thread name which will show up in ETW and Debuggers which know how to read this data. |
| 464 | HRESULT SetThreadName(HANDLE hThread, PCWSTR lpThreadDescription) |
| 465 | { |
| 466 | return g_pfnSetThreadDescription(hThread, lpThreadDescription); |
| 467 | } |
| 468 | |
| 469 | #endif //!FEATURE_PAL |
| 470 | |