blob: b6f8a67c0eda66610188c845410727825d4c55d4 [file] [log] [blame]
/* **********************************************************
* Copyright (c) 2014 Google, Inc. All rights reserved.
* Copyright (c) 2005-2010 VMware, Inc. All rights reserved.
* **********************************************************/
/*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions are met:
*
* * Redistributions of source code must retain the above copyright notice,
* this list of conditions and the following disclaimer.
*
* * Redistributions in binary form must reproduce the above copyright notice,
* this list of conditions and the following disclaimer in the documentation
* and/or other materials provided with the distribution.
*
* * Neither the name of VMware, Inc. nor the names of its contributors may be
* used to endorse or promote products derived from this software without
* specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
* AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL VMWARE, INC. OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
* SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
* CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
* DAMAGE.
*/
/*
*
* config.c: general configuration interface
*
*/
#include "share.h"
#include "config.h"
#include "processes.h"
#include "string.h"
#include "parser.h"
#include <stdio.h>
#ifndef UNIT_TEST
void
configpath_to_registry_path(WCHAR *path)
{
UINT i=0;
if (NULL == path)
return;
for (i = 0; i < wcslen(path); i++)
if(CONFIG_PATH_SEPARATOR == path[i])
path[i] = L'\\';
}
DWORD
get_key_handle(HKEY *key, HKEY parent, const WCHAR *path,
BOOL absolute, DWORD flags)
{
WCHAR keyname[MAX_PATH];
DO_ASSERT(key != NULL);
if (path == NULL) {
wcsncpy(keyname, CONFIGURATION_ROOT_REGISTRY_KEY, MAX_PATH);
}
else if (parent == NULL && !absolute) {
_snwprintf(keyname, MAX_PATH, L"%s\\%s",
CONFIGURATION_ROOT_REGISTRY_KEY, path);
}
else {
wcsncpy(keyname, path, MAX_PATH);
}
DO_DEBUG(DL_VERB,
printf("get_key_handle using %S as keyname\n", keyname);
);
configpath_to_registry_path(keyname);
return RegCreateKeyEx(parent == NULL ? DYNAMORIO_REGISTRY_HIVE : parent,
keyname, 0, NULL, REG_OPTION_NON_VOLATILE,
platform_key_flags() | flags,
NULL, key, NULL);
}
ConfigGroup *
get_child(const WCHAR *name, ConfigGroup *c)
{
ConfigGroup *cur = NULL;
if (c == NULL)
return NULL;
for(cur = c->children; NULL != cur; cur = cur->next) {
if (0 == wcsicmp(name, cur->name))
return cur;
}
return NULL;
}
void
remove_child(const WCHAR *child, ConfigGroup *config)
{
ConfigGroup *cur = NULL, *prev = NULL;
if (NULL == config)
return;
for(cur = config->children; NULL != cur; cur = cur->next) {
if (0 == wcsicmp(child, cur->name)) {
if (NULL == prev)
config->children = cur->next;
else
prev->next = cur->next;
if (config->lastchild == cur)
config->lastchild = prev;
free_config_group(cur);
return;
}
prev = cur;
}
}
BOOL
count_params(ConfigGroup *c)
{
int i = 0;
NameValuePairNode *cur;
for(cur = c->params; NULL != cur; cur = cur->next)
i++;
return i;
}
BOOL
is_param(const WCHAR *name, ConfigGroup *c)
{
NameValuePairNode *cur;
if (c == NULL)
return FALSE;
for(cur = c->params; NULL != cur; cur = cur->next) {
if (0 == wcsicmp(name, cur->name))
return TRUE;
}
return FALSE;
}
ConfigGroup *
new_config_group(const WCHAR *name)
{
ConfigGroup *c = (ConfigGroup *)malloc(sizeof(ConfigGroup));
c->next = NULL;
c->children = NULL;
c->lastchild = NULL;
c->params = NULL;
c->should_clear = FALSE;
c->name = (NULL == name) ? NULL : wcsdup(name);
return c;
}
ConfigGroup *
copy_config_group(ConfigGroup *config, BOOL deep)
{
NameValuePairNode *tmpnvp;
ConfigGroup *tmpcfg;
ConfigGroup *c = new_config_group(config->name);
c->should_clear = config->should_clear;
tmpnvp = config->params;
while (tmpnvp != NULL) {
set_config_group_parameter(c, tmpnvp->name, tmpnvp->value);
tmpnvp = tmpnvp->next;
}
if (deep) {
tmpcfg = config->children;
while (tmpcfg != NULL) {
add_config_group(c, copy_config_group(tmpcfg, deep));
tmpcfg = tmpcfg->next;
}
}
return c;
}
void
remove_children(ConfigGroup *config)
{
ConfigGroup *cur = config->children, *prev;
while(NULL != cur) {
prev = cur;
cur = cur->next;
free_config_group(prev);
}
config->children = NULL;
config->lastchild = NULL;
}
NameValuePairNode *
new_nvp_node(const WCHAR *name)
{
NameValuePairNode *nvp =
(NameValuePairNode *)malloc(sizeof(NameValuePairNode));
nvp->next = NULL;
nvp->name = wcsdup(name);
nvp->value = NULL;
return nvp;
}
void
free_nvp(NameValuePairNode *nvpn)
{
if (nvpn->name != NULL)
free(nvpn->name);
if (nvpn->value != NULL)
free(nvpn->value);
free(nvpn);
}
void
free_config_group(ConfigGroup *config)
{
NameValuePairNode *nvpn = config->params, *tmp;
remove_children(config);
while(nvpn != NULL) {
tmp = nvpn->next;
free_nvp(nvpn);
nvpn = tmp;
}
if (config->name != NULL)
free(config->name);
free(config);
}
NameValuePairNode *
get_nvp_node(ConfigGroup *config, const WCHAR *name)
{
NameValuePairNode *nvpn = config->params;
while (NULL != nvpn && 0 != wcsicmp(nvpn->name, name))
nvpn = nvpn->next;
return nvpn;
}
WCHAR *
get_config_group_parameter(ConfigGroup *config, const WCHAR *name)
{
NameValuePairNode *nvpn = get_nvp_node(config, name);
return (NULL == nvpn) ? NULL : nvpn->value;
}
NameValuePairNode *
add_nvp_node(ConfigGroup *config, const WCHAR *name)
{
NameValuePairNode *nvpn = new_nvp_node(name);
nvpn->next = config->params;
config->params = nvpn;
return nvpn;
}
void
set_config_group_parameter(ConfigGroup *config,
const WCHAR *name, const WCHAR *value)
{
NameValuePairNode *nvpn = get_nvp_node(config, name);
if (NULL == nvpn) {
nvpn = add_nvp_node(config, name);
}
if (NULL != nvpn->value) {
free(nvpn->value);
nvpn->value = NULL;
}
nvpn->value = (NULL == value) ? NULL : wcsdup(value);
}
void
remove_config_group_parameter(ConfigGroup *config, const WCHAR *name)
{
NameValuePairNode *cur = NULL, *prev = NULL;
if (NULL == config || NULL == name)
return;
for(cur = config->params; NULL != cur; cur = cur->next) {
if (0 == wcsicmp(cur->name, name)) {
if (NULL == prev)
config->params = cur->next;
else
prev->next = cur->next;
free_nvp(cur);
return;
}
prev = cur;
}
}
BOOL
get_config_group_parameter_bool(ConfigGroup *config, const WCHAR *name)
{
WCHAR *val = get_config_group_parameter(config, name);
return (val != NULL && 0 == wcscmp(val, L"TRUE"));
}
int
get_config_group_parameter_int(ConfigGroup *config, const WCHAR *name)
{
WCHAR *val = get_config_group_parameter(config, name);
return val == NULL ? 0 : _wtoi(val);
}
void
set_config_group_parameter_bool(ConfigGroup *config, const WCHAR *name,
BOOL value)
{
set_config_group_parameter(config, name, value ? L"TRUE" : L"FALSE");
}
void
set_config_group_parameter_int(ConfigGroup *config, const WCHAR *name,
int value)
{
WCHAR buf[MAX_PATH];
_snwprintf(buf, MAX_PATH, L"%d", value);
set_config_group_parameter(config, name, buf);
}
void
set_config_group_parameter_ascii(ConfigGroup *config, const WCHAR *name,
char *value)
{
WCHAR buf[MAX_PATH];
_snwprintf(buf, MAX_PATH, L"%S", value);
buf[MAX_PATH-1] = L'\0';
set_config_group_parameter(config, name, buf);
}
void
set_config_group_parameter_scrambled(ConfigGroup *config, const WCHAR *name,
const WCHAR *value)
{
/* this swaps high and low bytes of WCHAR. obviously not strong,
* just meant to be something other than plaintext. */
WCHAR buf[MAX_PATH];
UINT i = 0;
while (value[i] != 0 && i < MAX_PATH - 1) {
buf[i] = (WCHAR)
(((value[i] & 0x00ff) << 8) + ((value[i] & 0xff00) >> 8));
i++;
}
buf[i] = L'\0';
set_config_group_parameter(config, name, buf);
}
void
get_config_group_parameter_scrambled(ConfigGroup *config, const WCHAR *name,
WCHAR *buffer, UINT maxchars)
{
WCHAR *value = get_config_group_parameter(config, name);
UINT i = 0;
if (value == NULL) {
buffer [0] = L'\0';
return;
}
while (value[i] != 0 && i < maxchars - 1) {
buffer[i] = (WCHAR)
(((value[i] & 0x00ff) << 8) + ((value[i] & 0xff00) >> 8));
i++;
}
buffer[i] = L'\0';
}
void
add_config_group(ConfigGroup *parent, ConfigGroup *new_child)
{
if (NULL != get_child(new_child->name, parent)) {
DO_DEBUG(DL_WARN,
printf("adding multiple child: %S\n", new_child->name);
);
}
if (parent->children == NULL)
parent->children = new_child;
if (parent->lastchild != NULL)
parent->lastchild->next = new_child;
parent->lastchild = new_child;
new_child->next = NULL;
}
typedef DWORD (*custom_config_read_handler)(ConfigGroup *config,
const WCHAR *name,
const WCHAR *value);
#define CURRENT_MODES_VERSION 42000
#define MAX_MODES_FILE_SIZE (64*1024)
DWORD
custom_hotp_modes_read_handler(ConfigGroup *config,
const WCHAR *name,
const WCHAR *value)
{
char modes_file[MAX_MODES_FILE_SIZE];
WCHAR modes_path[MAX_PATH];
WCHAR parambuf[MAX_PATH];
WCHAR valbuf[MAX_PATH];
DWORD res;
SIZE_T needed = 0;
BOOL done = FALSE;
char *modes_line;
ConfigGroup *hotp_config;
if (name == NULL || value == NULL)
return ERROR_SUCCESS;
/* read in modes file */
_snwprintf(modes_path, MAX_PATH, L"%s\\%d\\%S",
value, CURRENT_MODES_VERSION, HOTP_MODES_FILENAME);
modes_path[MAX_PATH - 1] = L'\0';
res = read_file_contents(modes_path, modes_file,
MAX_MODES_FILE_SIZE, &needed);
/* if the modes file isn't there, no worries; assume no modes */
if (ERROR_FILE_NOT_FOUND == res)
return ERROR_SUCCESS;
if (ERROR_SUCCESS != res)
return res;
if (needed > MAX_MODES_FILE_SIZE - 2)
return ERROR_INSUFFICIENT_BUFFER;
/* create child config group */
hotp_config = new_config_group(L_DYNAMORIO_VAR_HOT_PATCH_MODES);
/* modes_file has contents, now sscanf and set all nvp. */
modes_line = parse_line_sep(modes_file, ':', &done,
parambuf, valbuf, MAX_PATH);
DO_DEBUG(DL_VERB,
printf("hotp modes first line %S:%S\n", parambuf, valbuf);
);
/* expect num lines first */
if (valbuf[0] != '\0')
return ERROR_PARSE_ERROR;
while (!done) {
modes_line = parse_line_sep(modes_line, ':', &done,
parambuf, valbuf, MAX_PATH);
if (done)
break;
set_config_group_parameter(hotp_config, parambuf, valbuf);
}
add_config_group(config, hotp_config);
return ERROR_SUCCESS;
}
custom_config_read_handler
get_custom_config_read_handler(const WCHAR *name)
{
if (name == NULL)
return NULL;
if (0 == wcscmp(name, L_DYNAMORIO_VAR_HOT_PATCH_MODES)) {
return (&custom_hotp_modes_read_handler);
}
return NULL;
}
static DWORD
read_config_group_from_registry(HKEY parent, ConfigGroup **configptr,
const WCHAR *name, BOOL recursive)
{
HKEY config_key = NULL;
ConfigGroup *config = NULL;
WCHAR keyname[MAX_PATH];
WCHAR keyvalue[MAX_PARAM_LEN];
DWORD idx, keySz, valSz, res = ERROR_SUCCESS;
FILETIME writetime;
custom_config_read_handler handler;
if (name == NULL) {
config_key = parent;
}
else {
WCHAR translated_name[MAX_PATH];
wcsncpy(translated_name, name, MAX_PATH);
configpath_to_registry_path(translated_name);
res = RegOpenKeyEx(parent, translated_name, 0,
platform_key_flags() | KEY_READ,
&config_key);
if (res != ERROR_SUCCESS)
goto read_config_out;
}
config = new_config_group(name);
/* first read in all values */
for (idx = 0; /* TRUE */; idx++) {
keySz = MAX_PATH;
valSz = sizeof(keyvalue);
res = RegEnumValue(config_key, idx, keyname, &keySz,
0, NULL, (LPBYTE) keyvalue, &valSz);
if (res == ERROR_NO_MORE_ITEMS) {
res = ERROR_SUCCESS;
break;
}
else if (res != ERROR_SUCCESS) {
goto read_config_out;
}
if (NULL != (handler = get_custom_config_read_handler(keyname))) {
res = handler(config, keyname, keyvalue);
if (res != ERROR_SUCCESS)
goto read_config_out;
}
else {
set_config_group_parameter(config, keyname, keyvalue);
}
}
/* and read in all children (if desired) */
for (idx = 0; recursive; idx++) {
ConfigGroup *child_config;
keySz = MAX_PATH;
res = RegEnumKeyEx(config_key, idx, keyname, &keySz,
0, NULL, NULL, &writetime);
if (res == ERROR_NO_MORE_ITEMS) {
res = ERROR_SUCCESS;
break;
}
else if (res != ERROR_SUCCESS) {
goto read_config_out;
}
res = read_config_group_from_registry(config_key, &child_config,
keyname, recursive);
if (res != ERROR_SUCCESS)
return res;
add_config_group(config, child_config);
}
*configptr = config;
read_config_out:
if (NULL != config_key && NULL != name)
RegCloseKey(config_key);
return res;
}
DWORD
read_config_group(ConfigGroup **configptr, const WCHAR *name,
BOOL read_children_recursively)
{
HKEY rootkey;
DWORD res = ERROR_SUCCESS;
DO_ASSERT(configptr != NULL);
DO_ASSERT(name != NULL);
*configptr = NULL;
res = get_key_handle(&rootkey, NULL, NULL, FALSE, KEY_READ);
if (res != ERROR_SUCCESS)
return res;
res = read_config_group_from_registry(rootkey, configptr, name,
read_children_recursively);
RegCloseKey(rootkey);
return res;
}
typedef DWORD (*custom_config_write_handler)(HKEY parent,
ConfigGroup *config,
ConfigGroup *config_parent);
DWORD
custom_hotp_modes_write_handler(HKEY parent, ConfigGroup *config,
ConfigGroup *config_parent)
{
/* need to write modes file path to key, and the modes file
* contents. */
DWORD res;
WCHAR modes_file[MAX_PATH];
WCHAR modes_key[MAX_PATH];
char modes_file_contents[MAX_MODES_FILE_SIZE];
char modes_file_line[MAX_PATH];
BOOL changed = FALSE;
NameValuePairNode *nvpn;
/* the modes file name is based on the parent ConfigGroup; if the
* parent config is the root, then the modes file goes in the
* top-level config dir, otherwise it goes in an app-specific
* config dir. */
if (0 == wcscmp(L_PRODUCT_NAME, config_parent->name)) {
_snwprintf(modes_key, MAX_PATH, L"%s\\config", get_dynamorio_home());
}
else {
_snwprintf(modes_key, MAX_PATH, L"%s\\config\\%s",
get_dynamorio_home(), config_parent->name);
}
modes_key[MAX_PATH - 1] = L'\0';
/* now write modes file content; name=patch ID, value=mode */
_snprintf(modes_file_contents, MAX_MODES_FILE_SIZE,
"%d\n", count_params(config));
modes_file_contents[MAX_MODES_FILE_SIZE - 1] = '\0';
for (nvpn = config->params; NULL != nvpn; nvpn = nvpn->next) {
_snprintf(modes_file_line, MAX_PATH, "%S:%S\n",
nvpn->name, nvpn->value);
modes_file_line[MAX_PATH - 1] = '\0';
strncat(modes_file_contents, modes_file_line,
MAX_MODES_FILE_SIZE - strlen(modes_file_contents));
modes_file_contents[MAX_MODES_FILE_SIZE - 1] = '\0';
}
if (strlen(modes_file_contents) > MAX_MODES_FILE_SIZE - 2) {
return ERROR_INSUFFICIENT_BUFFER;
}
/* first, mkdir -p */
_snwprintf(modes_file, MAX_PATH, L"%s\\%d\\%S",
modes_key, CURRENT_MODES_VERSION, HOTP_MODES_FILENAME);
modes_file[MAX_PATH - 1] = L'\0';
ensure_directory_exists_for_file(modes_file);
/* and then write file */
res = write_file_contents_if_different(modes_file,
modes_file_contents,
&changed);
if (res != ERROR_SUCCESS)
return res;
/* finally, write the filename to the modes key */
return write_reg_string(parent,
L_DYNAMORIO_VAR_HOT_PATCH_MODES,
modes_key);
}
custom_config_write_handler
get_custom_config_write_handler(ConfigGroup *config)
{
if (config == NULL || config->name == NULL)
return NULL;
if (0 == wcscmp(config->name, L_DYNAMORIO_VAR_HOT_PATCH_MODES)) {
return (&custom_hotp_modes_write_handler);
}
return NULL;
}
DWORD
write_config_group_to_registry(HKEY parent, ConfigGroup *config,
ConfigGroup *parent_config)
{
HKEY config_key = NULL;
NameValuePairNode *nvpn;
DWORD res = ERROR_SUCCESS;
custom_config_write_handler handler = NULL;
if (NULL == config->name) {
config_key = parent;
}
else if (NULL != (handler = get_custom_config_write_handler(config))) {
res = handler(parent, config, parent_config);
if (res != ERROR_SUCCESS)
goto write_config_out;
/* only continue down the chain if custom-handled */
if (NULL != config->next) {
res = write_config_group_to_registry(parent,
config->next,
parent_config);
}
goto write_config_out;
}
else {
/* open or create */
res = get_key_handle(&config_key, parent, config->name, FALSE,
KEY_WRITE|KEY_ENUMERATE_SUB_KEYS);
if (res != ERROR_SUCCESS)
goto write_config_out;
}
/* write the NVP's */
for (nvpn = config->params; NULL != nvpn; nvpn = nvpn->next) {
/* hook for forced deletion of a key */
if (0 == wcscmp(nvpn->value, L_DELETE_PARAMETER_KEY)) {
RegDeleteValue(config_key, nvpn->name);
res = ERROR_SUCCESS;
}
else {
res = write_reg_string(config_key, nvpn->name, nvpn->value);
}
if (res != ERROR_SUCCESS)
goto write_config_out;
}
/* write the children */
if (NULL != config->children) {
res = write_config_group_to_registry(config_key,
config->children,
config);
if (res != ERROR_SUCCESS)
goto write_config_out;
}
/* continue down the chain */
if (NULL != config->next) {
res = write_config_group_to_registry(parent,
config->next,
parent_config);
if (res != ERROR_SUCCESS)
goto write_config_out;
}
write_config_out:
if (NULL != config_key && NULL != config->name)
RegCloseKey(config_key);
return res;
}
/*
* this enforces that the key tree matches the config group exactly,
* e.g., all keys/values are deleted that do not appear in 'filter'
*
* this complexity is necessary in order to allow
* write_config_group_to_registry to be atomic, in the sense that
* config information is updated on a key-by-key atomic basis.
*/
DWORD
recursive_delete_key(HKEY parent, const WCHAR *keyname, ConfigGroup *filter)
{
HKEY subkey = NULL;
WCHAR subkeyname[MAX_PATH];
FILETIME writetime;
DWORD res, keySz, idx;
ConfigGroup *child;
res = get_key_handle(&subkey, parent, keyname, TRUE, KEY_WRITE|KEY_READ);
if (res != ERROR_SUCCESS)
goto recursive_delete_out;
/* and read in all children (if desired) */
for (idx = 0;;) {
/* note that since deleting, we always pass index 0 */
keySz = MAX_PATH;
res = RegEnumKeyEx(subkey, idx, subkeyname, &keySz,
0, NULL, NULL, &writetime);
if (res == ERROR_NO_MORE_ITEMS) {
res = ERROR_SUCCESS;
break;
}
else if (res != ERROR_SUCCESS) {
goto recursive_delete_out;
}
/* note that recursive_delete_key will only delete the entire
* subkey if it's not a child (eg, if the 'filter' parameter
* is NULL) */
child = get_child(subkeyname, filter);
res = recursive_delete_key(subkey, subkeyname, child);
if (res != ERROR_SUCCESS)
goto recursive_delete_out;
/* increment the index if we're not deleting the key */
if (NULL != child)
idx++;
}
if (NULL != filter) {
/* prune values too */
for (idx = 0;;) {
keySz = MAX_PATH;
res = RegEnumValue(subkey, idx, subkeyname, &keySz,
0, NULL, NULL, NULL);
if (res == ERROR_NO_MORE_ITEMS) {
res = ERROR_SUCCESS;
break;
}
else if (res != ERROR_SUCCESS) {
goto recursive_delete_out;
}
/* don't delete if the param exists, OR if this is a custom
* handled name and the child exists. */
if (is_param(subkeyname, filter) ||
(get_child(subkeyname, filter) &&
get_custom_config_read_handler(subkeyname))) {
/* if we're not deleting, increment the index */
idx++;
}
else {
res = RegDeleteValue(subkey, subkeyname);
if (res != ERROR_SUCCESS)
goto recursive_delete_out;
}
}
}
RegCloseKey(subkey);
subkey = NULL;
/* only delete the key itself if it's not being filtered out. */
if (filter == NULL) {
/* PR 244206: we assume we're only going to recursively delete keys in
* HKLM\Software\Company
*/
res = delete_product_key(parent, keyname);
}
recursive_delete_out:
if (subkey != NULL)
RegCloseKey(subkey);
return res;
}
DWORD
write_config_group(ConfigGroup *config)
{
HKEY rootkey;
DWORD res;
res = get_key_handle(&rootkey, NULL, NULL, FALSE,
KEY_WRITE|KEY_ENUMERATE_SUB_KEYS);
if (res != ERROR_SUCCESS)
return res;
res = write_config_group_to_registry(rootkey, config, NULL);
/* prune if necessary */
if (ERROR_SUCCESS == res && config->should_clear) {
res = recursive_delete_key(rootkey, config->name, config);
}
RegCloseKey(rootkey);
return res;
}
/* single parameter config functions */
DWORD
set_config_parameter(const WCHAR *path, BOOL absolute,
const WCHAR *name, const WCHAR *value)
{
HKEY rootkey;
DWORD res;
res = get_key_handle(&rootkey, NULL, path, absolute, KEY_WRITE);
if (res != ERROR_SUCCESS)
return res;
res = write_reg_string(rootkey, name, value);
RegCloseKey(rootkey);
return res;
}
DWORD
get_config_parameter(const WCHAR *path, BOOL absolute,
const WCHAR *name, WCHAR *value, int maxlen)
{
HKEY rootkey;
DWORD res;
res = get_key_handle(&rootkey, NULL, path, absolute, KEY_READ);
if (res != ERROR_SUCCESS)
return res;
res = read_reg_string(rootkey, name, value, maxlen);
RegCloseKey(rootkey);
return res;
}
DWORD
read_reg_string(HKEY subkey, const WCHAR *keyname, WCHAR *value, int valchars)
{
DWORD len = valchars*sizeof(WCHAR);
return RegQueryValueEx(subkey, keyname, 0, NULL,
(LPBYTE) value, &len);
}
/* if value is NULL, the key will be deleted */
DWORD
write_reg_string(HKEY subkey, const WCHAR *keyname, const WCHAR *value)
{
if (value)
return RegSetValueEx(subkey, keyname, 0, REG_SZ, (LPBYTE) value,
(DWORD)(wcslen(value)+1)*sizeof(WCHAR));
else
return RegDeleteValue(subkey, keyname);
}
/* process identification routines */
/* tries both with and without no_strip */
ConfigGroup *
get_qualified_config_group(ConfigGroup *config,
const WCHAR *exename, const WCHAR *cmdline)
{
WCHAR qname[MAX_PATH];
ConfigGroup *c;
/* need to try both with and without NO_STRIP! */
_snwprintf(qname, MAX_PATH, L"%s-", exename);
if (get_commandline_qualifier(cmdline,
qname + wcslen(qname),
(UINT)(MAX_PATH - wcslen(qname)), FALSE)) {
c = get_child(qname, config);
if (NULL != c)
return c;
}
_snwprintf(qname, MAX_PATH, L"%s-", exename);
if (get_commandline_qualifier(cmdline,
qname + wcslen(qname),
(UINT)(MAX_PATH - wcslen(qname)), TRUE)) {
c = get_child(qname, config);
if (NULL != c)
return c;
}
return NULL;
}
BOOL
is_parent_of_qualified_config_group(ConfigGroup *config)
{
WCHAR *run_under = NULL;
if (config == NULL)
return FALSE;
run_under = get_config_group_parameter(config, L_DYNAMORIO_VAR_RUNUNDER);
if (run_under == NULL)
return FALSE;
return TEST(RUNUNDER_COMMANDLINE_DISPATCH, _wtoi(run_under));
}
ConfigGroup *
get_process_config_group(ConfigGroup *config, process_id_t pid)
{
WCHAR buf[MAX_PATH];
DWORD res;
ConfigGroup *c;
res = get_process_name(pid, buf, MAX_PATH);
if (res != ERROR_SUCCESS)
return NULL;
wcstolower(buf);
c = get_child(buf, config);
if (c == NULL || is_parent_of_qualified_config_group(c)) {
WCHAR cmdlbuf[MAX_PATH];
ConfigGroup *qualified;
get_process_cmdline(pid, cmdlbuf, MAX_PATH);
qualified = get_qualified_config_group(config, buf, cmdlbuf);
if (NULL != qualified)
return qualified;
}
return c;
}
/******************
* list functions *
******************/
/*
* given a ;-separated list and a filename, return a pointer to
* the filename in the list, if it appears. comparisons are
* case insensitive and independent of path; eg,
* get_entry_location("c:\\foo\\bar.dll;blah;...", "D:\\Bar.DLL")
* would return a pointer to the beginning of the list.
*/
WCHAR *
get_entry_location(const WCHAR *list, const WCHAR *filename, WCHAR separator)
{
WCHAR *lowerlist, *lowername, *entry;
wcstolower(lowerlist = wcsdup(list));
wcstolower(lowername = wcsdup(get_exename_from_path(filename)));
entry = wcsstr(lowerlist, lowername);
while (NULL != entry) {
WCHAR last = *(entry + wcslen(lowername));
/* make sure it's not just a substring */
if ((last == separator || last == L'\0') &&
(entry == lowerlist || *(entry - 1) == separator ||
*(entry - 1) == L'\\' || *(entry - 1) == L'/')) {
/* everything's cool; now put the path back in and translate */
WCHAR *cur = lowerlist;
while (NULL != wcschr(cur, separator) &&
wcschr(cur, separator) < entry)
cur = wcschr(cur, separator) + 1;
entry = ((WCHAR *) list) + (cur - lowerlist);
break;
}
else {
entry = wcsstr(entry + 1, lowername);
}
}
free(lowername);
free(lowerlist);
return entry;
}
BOOL
is_in_file_list(const WCHAR *list, const WCHAR *filename, WCHAR separator)
{
return NULL != get_entry_location(list, filename, separator);
}
/* returns a new list which needs to be freed, and frees old list */
WCHAR *
add_to_file_list(WCHAR *list, const WCHAR *filename,
BOOL check_for_duplicates, BOOL add_to_front,
BOOL overwrite_existing, WCHAR separator)
{
WCHAR *new_list;
SIZE_T new_list_size;
if (NULL == list || 0 == wcslen(list))
return wcsdup(filename);
if (overwrite_existing)
remove_from_file_list(list, filename, separator);
if (check_for_duplicates && is_in_file_list(list, filename, separator))
return list;
new_list_size = wcslen(list) + wcslen(filename) + 2;
new_list = (WCHAR *)malloc(sizeof(WCHAR) * new_list_size);
if (wcslen(list) == 0) {
wcsncpy(new_list, filename, new_list_size);
}
else {
_snwprintf(new_list, new_list_size, L"%s%c%s",
add_to_front ? filename : list,
separator,
add_to_front ? list : filename);
}
free(list);
return new_list;
}
/* provide these helpers to avoid multiple libc problems */
WCHAR *
new_file_list(SIZE_T initial_chars)
{
WCHAR *list = (WCHAR *)malloc(sizeof(WCHAR) * (1+initial_chars));
*list = L'\0';
return list;
}
void
free_file_list(WCHAR *list)
{
free(list);
}
/* removes all occurrences */
void
remove_from_file_list(WCHAR *list, const WCHAR *filename, WCHAR separator)
{
WCHAR *entry, *end_of_entry;
entry = get_entry_location(list, filename, separator);
if (NULL == entry)
return;
end_of_entry = wcschr(entry, separator);
if (NULL == end_of_entry) {
if (entry == list)
*entry = L'\0';
else
*(entry - 1) = L'\0';
}
else {
/* note the whole wcslen(end_of_entry) to get the null
* terminator (since we're doing end_of_entry + 1)
*
* note that memmove handles appropriately the case
* where the src and dest regions overlap. */
memmove(entry, end_of_entry + 1,
(wcslen(end_of_entry)) * sizeof(WCHAR));
}
/* recurse for multiple occurrences */
remove_from_file_list(list, filename, separator);
}
#define BLACK 0
#define WHITE 1
BOOL
filter(WCHAR *list, const WCHAR *filter, DWORD black_or_white,
BOOL check_only, WCHAR separator)
{
WCHAR *working_list, *cur, *next;
BOOL satisfied = TRUE, remove_entry;
if (list == NULL || wcslen(list) == 0)
return TRUE;
next = cur = working_list = wcsdup(list);
do {
if (NULL != next)
next = wcschr(cur, separator);
if (NULL != next)
*next = L'\0';
cur = get_exename_from_path(cur);
remove_entry =
!(is_in_file_list(filter, cur, separator) ^ (BLACK == black_or_white));
if (remove_entry) {
if (check_only)
return FALSE;
else
remove_from_file_list(list, cur, separator);
satisfied = FALSE;
}
cur = next + 1;
} while (NULL != next);
free(working_list);
return satisfied;
}
BOOL
blacklist_filter(WCHAR *list, const WCHAR *blacklist,
BOOL check_only, WCHAR separator)
{
return filter(list, blacklist, BLACK, check_only, separator);
}
BOOL
whitelist_filter(WCHAR *list, const WCHAR *whitelist,
BOOL check_only, WCHAR separator)
{
return filter(list, whitelist, WHITE, check_only, separator);
}
/* appinit key */
DWORD
set_autoinjection_ex(BOOL inject, DWORD flags,
const WCHAR *blacklist, const WCHAR *whitelist,
/* OUT */ DWORD *list_error,
const WCHAR *custom_preinject_name,
/* OUT */ WCHAR *current_list, SIZE_T maxchars)
{
WCHAR curlist[MAX_PARAM_LEN];
WCHAR preinject_name[MAX_PATH];
WCHAR *list;
DWORD res;
BOOL list_ok_ = TRUE;
BOOL using_system32 = using_system32_for_preinject(custom_preinject_name);
res = get_config_parameter(INJECT_ALL_KEY_L, TRUE, INJECT_ALL_SUBKEY_L,
curlist, MAX_PARAM_LEN);
if (res != ERROR_SUCCESS) {
/* if it's not there, then we create it */
curlist[0] = L'\0';
}
list = new_file_list(wcslen(curlist) + 1);
wcsncpy(list, curlist, wcslen(curlist) + 1);
if (NULL != current_list)
wcsncpy(current_list, curlist, maxchars);
if (using_system32 &&
TEST(APPINIT_SYS32_CLEAR_OTHERS, flags)){
/* if we're using system32, and the clear flag is set, clear it */
curlist[0] = L'\0';
}
if (NULL == custom_preinject_name) {
res = get_preinject_name(preinject_name, MAX_PATH);
if (res != ERROR_SUCCESS)
return res;
}
else {
wcsncpy(preinject_name, custom_preinject_name, MAX_PATH);
}
/* if using system32, make sure to copy the DLL there from
* the standard place (or remove it if we're turning off) */
if (using_system32) {
WCHAR src_path[MAX_PATH], dst_path[MAX_PATH];
if (NULL == custom_preinject_name) {
res = get_preinject_path(src_path, MAX_PATH, TRUE, TRUE);
if (res != ERROR_SUCCESS)
return res;
wcsncat(src_path, L"\\" L_EXPAND_LEVEL(INJECT_DLL_NAME),
MAX_PATH - wcslen(src_path));
} else {
wcsncpy(src_path, custom_preinject_name, MAX_PATH);
}
get_preinject_path(dst_path, MAX_PATH, FALSE, TRUE);
if (res != ERROR_SUCCESS)
return res;
wcsncat(dst_path, L"\\" L_EXPAND_LEVEL(INJECT_DLL_NAME),
MAX_PATH - wcslen(dst_path));
if (inject) {
/* We used to only copy if (!file_exists(dst_path))
* but it seems that we should clobber to avoid
* upgrade issues, at risk of messing up another product
* w/ a dll of the same name.
*/
CopyFile(src_path, dst_path, FALSE/*don't fail if exists*/);
}
else {
/* FIXME: do we want to use delete_file_rename_in_use?
* this should only be called at uninstall or by
* tools users, so there shouldn't be any problem
* leaving one .tmp file around...
* alternatively, we could try renaming to a path in
* our installation directory, which would be
* wiped out on installation. however, it gets
* complicated if our installation folder is on
* a different volume.
* another option is to rename to %SYSTEM32%\..\TEMP,
* which should always exist i think...
*/
DeleteFile(dst_path);
}
/* now we want just the name, since in system32 */
if (get_exename_from_path(preinject_name) != NULL) {
wcsncpy(preinject_name, get_exename_from_path(preinject_name),
BUFFER_SIZE_ELEMENTS(preinject_name));
}
}
if (inject) {
BOOL force_overwrite;
WCHAR *old = get_entry_location(list, preinject_name,
APPINIT_SEPARATOR_CHAR);
/* first, if there's something there, make sure it exists. if
* not, remove it before proceeding (to ensure overwrite)
* cf case 4053 */
if (NULL != old) {
if (using_system32) {
/* PR 232765: we want to replace any full path w/ filename */
force_overwrite = true;
} else {
WCHAR *firstsep, tmpbuf[MAX_PATH];
wcsncpy(tmpbuf, old, MAX_PATH);
firstsep = wcschr(tmpbuf, APPINIT_SEPARATOR_CHAR);
if (NULL != firstsep)
*firstsep = L'\0';
force_overwrite = !file_exists(tmpbuf);
}
}
else {
/* force overwrite if someone cared enough to set one of these */
force_overwrite =
TEST((APPINIT_FORCE_TO_FRONT | APPINIT_FORCE_TO_BACK), flags);
}
/* always overwrite if asked to */
force_overwrite = force_overwrite | TEST(APPINIT_OVERWRITE, flags);
/* add !TEST(APPINIT_FORCE_TO_BACK, flags) so that we favor adding
* to the front if neither are set. */
list = add_to_file_list(list, preinject_name, TRUE,
TEST(APPINIT_FORCE_TO_FRONT, flags) ||
! TEST(APPINIT_FORCE_TO_BACK, flags),
force_overwrite, APPINIT_SEPARATOR_CHAR);
}
else {
remove_from_file_list(list, preinject_name, APPINIT_SEPARATOR_CHAR);
}
if (TEST(APPINIT_USE_WHITELIST, flags)) {
if (NULL == whitelist)
res = ERROR_INVALID_PARAMETER;
else
list_ok_ = whitelist_filter(list, whitelist,
TEST(APPINIT_CHECK_LISTS_ONLY, flags),
APPINIT_SEPARATOR_CHAR);
}
else if (TEST(APPINIT_USE_BLACKLIST, flags)) {
/* else if since whitelist subsumes blacklist */
if (NULL == blacklist)
res = ERROR_INVALID_PARAMETER;
else
list_ok_ = blacklist_filter(list, blacklist,
TEST(APPINIT_CHECK_LISTS_ONLY, flags),
APPINIT_SEPARATOR_CHAR);
}
if (list_error != NULL && !list_ok_)
*list_error = ERROR_LIST_VIOLATION;
if (res == ERROR_INVALID_PARAMETER)
return res;
if (!list_ok_ && TEST(APPINIT_BAIL_ON_LIST_VIOLATION, flags))
remove_from_file_list(list, preinject_name, APPINIT_SEPARATOR_CHAR);
/* now, system32 flag checks */
if (using_system32) {
/* not yet supported */
if (TEST(APPINIT_SYS32_USE_LENGTH_WORKAROUND, flags))
return ERROR_INVALID_PARAMETER;
if (wcslen(list) > APPINIT_SYSTEM32_LENGTH_LIMIT) {
if (list_error != NULL)
*list_error = ERROR_LENGTH_VIOLATION;
if (TEST(APPINIT_SYS32_FAIL_ON_LENGTH_ERROR, flags)) {
remove_from_file_list(list, preinject_name,
APPINIT_SEPARATOR_CHAR);
}
else {
/* truncate, if the flags specify it. */
if (TEST(APPINIT_SYS32_TRUNCATE, flags)) {
list[APPINIT_SYSTEM32_LENGTH_LIMIT] = L'\0';
}
}
}
}
/* only write if it's changed */
if (0 != wcscmp(list, curlist)) {
res = set_config_parameter(INJECT_ALL_KEY_L, TRUE,
INJECT_ALL_SUBKEY_L, list);
if (res != ERROR_SUCCESS)
return res;
}
free_file_list(list);
return ERROR_SUCCESS;
}
DWORD
set_custom_autoinjection(const WCHAR *preinject, DWORD flags)
{
return set_autoinjection_ex(TRUE, flags, NULL, NULL, NULL, preinject, NULL, 0);
}
DWORD
set_autoinjection()
{
return set_autoinjection_ex(TRUE, 0, NULL, NULL, NULL, NULL, NULL, 0);
}
DWORD
unset_custom_autoinjection(const WCHAR *preinject, DWORD flags)
{
return set_autoinjection_ex(FALSE, flags, NULL, NULL, NULL, preinject, NULL, 0);
}
DWORD
unset_autoinjection()
{
return set_autoinjection_ex(FALSE, 0, NULL, NULL, NULL, NULL, NULL, 0);
}
/* NOTE: that this returns the current status -- which on NT
* is not necessarily the actual status, which is cached by the
* os at boot time.
* FIXME: add a helper method for determining the status of
* appinit that is being used for the current boot session. */
BOOL
is_autoinjection_set()
{
WCHAR list[MAX_PARAM_LEN], preinject[MAX_PATH];
DWORD res;
res = get_config_parameter(INJECT_ALL_KEY_L, TRUE, INJECT_ALL_SUBKEY_L,
list, MAX_PARAM_LEN);
if (res != ERROR_SUCCESS)
return FALSE;
res = get_preinject_name(preinject, MAX_PATH);
if (res != ERROR_SUCCESS)
return FALSE;
return is_in_file_list(list, preinject, APPINIT_SEPARATOR_CHAR);
}
BOOL
is_custom_autoinjection_set(const WCHAR *preinject)
{
WCHAR list[MAX_PARAM_LEN];
DWORD res;
res = get_config_parameter(INJECT_ALL_KEY_L, TRUE, INJECT_ALL_SUBKEY_L,
list, MAX_PARAM_LEN);
if (res != ERROR_SUCCESS)
return FALSE;
return is_in_file_list(list, preinject, APPINIT_SEPARATOR_CHAR);
}
/* Returns true for Vista or later, including Windows 7 */
BOOL
is_vista()
{
DWORD platform = 0;
get_platform(&platform);
return (platform >= PLATFORM_VISTA);
}
BOOL
is_win7()
{
DWORD platform = 0;
get_platform(&platform);
return (platform >= PLATFORM_WIN_7);
}
/* Also disables reqt for signature on lib for win7+ */
DWORD
set_loadappinit_value(DWORD value)
{
HKEY rootkey;
DWORD res;
if (!is_vista())
return ERROR_UNSUPPORTED_OS;
res = get_key_handle(&rootkey, INJECT_ALL_HIVE, INJECT_ALL_KEY_L,
TRUE, KEY_WRITE);
if (res != ERROR_SUCCESS)
return res;
res = RegSetValueEx(rootkey, INJECT_ALL_LOAD_SUBKEY_L, 0, REG_DWORD,
(LPBYTE) &value, sizeof(value));
if (res != ERROR_SUCCESS)
return res;
if (is_win7()) {
/* Disable the reqt for a signature.
* FIXME i#323: better to sign drpreinject so we don't have to
* relax security!
*/
DWORD disable = 0;
res = RegSetValueEx(rootkey, INJECT_ALL_SIGN_SUBKEY_L, 0, REG_DWORD,
(LPBYTE) &disable, sizeof(disable));
}
return res;
}
DWORD
set_loadappinit()
{
return set_loadappinit_value(1);
}
DWORD
unset_loadappinit()
{
return set_loadappinit_value(0);
}
BOOL
is_loadappinit_set()
{
HKEY rootkey;
DWORD value;
DWORD size = sizeof(value);
DWORD res;
res = get_key_handle(&rootkey, INJECT_ALL_HIVE, INJECT_ALL_KEY_L,
TRUE, KEY_READ);
if (res != ERROR_SUCCESS)
return res;
res = RegQueryValueEx(rootkey, INJECT_ALL_LOAD_SUBKEY_L, NULL, NULL,
(LPBYTE) &value, &size);
return (res == ERROR_SUCCESS && value != 0);
}
/* Deletes the product eventlog. If no one else (nodemgr/pe) is using the eventlog also
* deletes the base key and the eventlog file. */
DWORD
destroy_eventlog()
{
DWORD res, res2;
/* PR 244206: we don't need the wow64 flag since not HKLM\Software
* (if we do want it, need to add on create/open as well, including
* elm.c, which requires linking w/ utils.c)
*/
res = RegDeleteKey(EVENTLOG_HIVE, L_EVENT_SOURCE_SUBKEY);
res2 = RegDeleteKey(EVENTLOG_HIVE, L_EVENT_LOG_SUBKEY);
if (res2 == ERROR_SUCCESS) {
/* we deleted the top level key (which means it had no subkeys left) which means
* no one else is using our eventlog, we go ahead and free the file. */
WCHAR *file = is_vista() ? L_EVENT_FILE_NAME_VISTA : L_EVENT_FILE_NAME_PRE_VISTA;
WCHAR *truncate_start;
WCHAR file_exp[MAX_PATH];
ExpandEnvironmentStrings(file, file_exp, BUFFER_SIZE_ELEMENTS(file_exp));
NULL_TERMINATE_BUFFER(file_exp);
if (file_exists(file_exp)) {
/* If in use by the eventlog can't delete or re-name */
if (!DeleteFile(file_exp))
delete_file_on_boot(file_exp);
}
/* It appears the generated file is usually truncated to 8.3 by the eventlog
* program (though apparently not always since some of my machines also have
* the full name). Will try to delete the truncated to 8.3 versions. */
truncate_start = wcsrchr(file_exp, L'\\');
if (truncate_start != NULL) {
WCHAR *type = wcsrchr(file_exp, L'.');
truncate_start += 8;
if (type != NULL && truncate_start < type) {
WCHAR tmp_buf[MAX_PATH];
wcsncpy(tmp_buf, type, BUFFER_SIZE_ELEMENTS(tmp_buf));
NULL_TERMINATE_BUFFER(tmp_buf);
wcsncpy(truncate_start, tmp_buf,
BUFFER_SIZE_ELEMENTS(file_exp)-(truncate_start-file_exp));
NULL_TERMINATE_BUFFER(file_exp);
/* If in use by the eventlog can't delete or re-name */
if (!DeleteFile(file_exp))
delete_file_on_boot(file_exp);
}
}
}
return res;
}
DWORD
create_eventlog(const WCHAR *dll_path)
{
HKEY eventlog_key;
HKEY eventsrc_key;
WCHAR *wvalue;
DWORD dvalue;
DWORD res;
res = get_key_handle(&eventlog_key, EVENTLOG_HIVE, L_EVENT_LOG_SUBKEY,
TRUE, KEY_WRITE);
if (res != ERROR_SUCCESS)
return res;
if (is_vista()) {
wvalue = L_EVENT_FILE_NAME_VISTA;
} else {
wvalue = L_EVENT_FILE_NAME_PRE_VISTA;
}
/* REG_EXPAND_SZ since we use %systemroot% in the path which needs
* to be expanded */
res = RegSetValueEx(eventlog_key, L_EVENT_FILE_VALUE_NAME, 0,
REG_EXPAND_SZ, (LPBYTE) wvalue,
(DWORD)(wcslen(wvalue)+1)*sizeof(WCHAR));
if (res != ERROR_SUCCESS)
return res;
dvalue = EVENT_MAX_SIZE;
res = RegSetValueEx(eventlog_key, L_EVENT_MAX_SIZE_NAME, 0, REG_DWORD,
(LPBYTE) &dvalue, sizeof(dvalue));
if (res != ERROR_SUCCESS)
return res;
dvalue = EVENT_RETENTION;
res = RegSetValueEx(eventlog_key, L_EVENT_RETENTION_NAME, 0, REG_DWORD,
(LPBYTE) &dvalue, sizeof(dvalue));
if (res != ERROR_SUCCESS)
return res;
res = get_key_handle(&eventsrc_key, EVENTLOG_HIVE, L_EVENT_SOURCE_SUBKEY,
TRUE, KEY_WRITE);
if (res != ERROR_SUCCESS)
return res;
dvalue = EVENT_TYPES_SUPPORTED;
res = RegSetValueEx(eventsrc_key, L_EVENT_TYPES_SUPPORTED_NAME, 0,
REG_DWORD, (LPBYTE) &dvalue, sizeof(dvalue));
if (res != ERROR_SUCCESS)
return res;
dvalue = EVENT_CATEGORY_COUNT;
res = RegSetValueEx(eventsrc_key, L_EVENT_CATEGORY_COUNT_NAME, 0,
REG_DWORD, (LPBYTE) &dvalue, sizeof(dvalue));
if (res != ERROR_SUCCESS)
return res;
res = RegSetValueEx(eventsrc_key, L_EVENT_CATEGORY_FILE_NAME, 0, REG_SZ,
(LPBYTE) dll_path,
(DWORD)(wcslen(dll_path)+1)*sizeof(WCHAR));
if (res != ERROR_SUCCESS)
return res;
res = RegSetValueEx(eventsrc_key, L_EVENT_MESSAGE_FILE, 0, REG_SZ,
(LPBYTE) dll_path,
(DWORD)(wcslen(dll_path)+1)*sizeof(WCHAR));
if (res != ERROR_SUCCESS)
return res;
return ERROR_SUCCESS;
}
/* Copies the two drearlyhelper?.dlls located in "dir" to system32.
* They are only needed on win2k, but it's up to the caller to check
* for that.
*/
DWORD
copy_earlyhelper_dlls(const WCHAR *dir)
{
WCHAR src_path[MAX_PATH], dst_path[MAX_PATH];
DWORD len;
/* We copy drearlyhelp2.dll first, to be on the safe side.
* drearlyhelp1.dll has a dependency on drearlyhelp2.dll, so if #1 exists
* and number 2 doesn't the loader will raise an error (and we're pre-image
* entry point so it becomes a "process failed to initialize" error).
*/
_snwprintf(src_path, BUFFER_SIZE_ELEMENTS(src_path),
L"%s\\%s", dir, L_EXPAND_LEVEL(INJECT_HELPER_DLL2_NAME));
NULL_TERMINATE_BUFFER(src_path);
/* Get system32 path */
len = GetSystemDirectory(dst_path, MAX_PATH);
if (len == 0)
return GetLastError();
wcsncat(dst_path, L"\\" L_EXPAND_LEVEL(INJECT_HELPER_DLL2_NAME),
BUFFER_SIZE_ELEMENTS(dst_path) - wcslen(dst_path));
/* We could check file_exists(dst_path) but better to just
* clobber so we can upgrade nicely (at risk of clobbering
* some other product's same-name dll)
*/
if (!CopyFile(src_path, dst_path, FALSE/*don't fail if exists*/))
return GetLastError();
_snwprintf(src_path, BUFFER_SIZE_ELEMENTS(src_path),
L"%s\\%s", dir, L_EXPAND_LEVEL(INJECT_HELPER_DLL1_NAME));
NULL_TERMINATE_BUFFER(src_path);
/* Get system32 path, again: we could cache it */
len = GetSystemDirectory(dst_path, MAX_PATH);
if (len == 0)
return GetLastError();
wcsncat(dst_path, L"\\" L_EXPAND_LEVEL(INJECT_HELPER_DLL1_NAME),
BUFFER_SIZE_ELEMENTS(dst_path) - wcslen(dst_path));
if (!CopyFile(src_path, dst_path, FALSE/*don't fail if exists*/))
return GetLastError();
/* FIXME PR 232738: add a param for removing the files */
return ERROR_SUCCESS;
}
void
dump_nvp(NameValuePairNode *nvpn)
{
printf("%S=%S", nvpn->name,
nvpn->value == NULL ? L"<null>" : nvpn->value);
}
void
dump_config_group(char *prefix, char *incr, ConfigGroup *c, BOOL traverse)
{
NameValuePairNode *nvpn = NULL;
printf("%sConfig Group: %S\n", prefix,
c->name == NULL ? L"<null>" : c->name);
printf("%sshould_clear: %d\n", prefix, c->should_clear);
printf("%sparams:\n", prefix);
for(nvpn = c->params; NULL != nvpn; nvpn = nvpn->next) {
printf("%s%s%s", prefix, incr, incr);
dump_nvp(nvpn);
printf("\n");
}
if (c->children != NULL) {
char p2[MAX_PATH];
_snprintf(p2, MAX_PATH, "%s%s", prefix, incr);
dump_config_group(p2, incr, c->children, TRUE);
}
if (traverse && c->next != NULL) {
dump_config_group(prefix, incr, c->next, TRUE);
}
}
#else // ifdef UNIT_TEST
int
main()
{
ConfigGroup *c, *c2, *c3, *c4, *cp;
DWORD res;
WCHAR sep = LIST_SEPARATOR_CHAR;
WCHAR *list1, *list2, *tmplist;
WCHAR buf[MAX_PARAM_LEN];
set_debuglevel(DL_INFO);
set_abortlevel(DL_WARN);
list1 = new_file_list(16);
/* basic list operations */
{
DO_ASSERT_WSTR_EQ(L"", list1);
list1 = add_to_file_list(list1, L"c:\\foo.dll",
TRUE, TRUE, FALSE, sep);
DO_ASSERT_WSTR_EQ(L"c:\\foo.dll", list1);
list1 = add_to_file_list(list1, L"C:\\bar.dll",
TRUE, TRUE, FALSE, sep);
DO_ASSERT_WSTR_EQ(L"C:\\bar.dll;c:\\foo.dll", list1);
list1 = add_to_file_list(list1, L"foo.dll",
TRUE, TRUE, FALSE, sep);
DO_ASSERT_WSTR_EQ(L"C:\\bar.dll;c:\\foo.dll", list1);
list1 = add_to_file_list(list1, L"C:\\shr\\Foo.dll",
TRUE, TRUE, FALSE, sep);
DO_ASSERT_WSTR_EQ(L"C:\\bar.dll;c:\\foo.dll", list1);
list1 = add_to_file_list(list1, L"C:\\shr\\Foo.dll",
FALSE, TRUE, FALSE, sep);
DO_ASSERT_WSTR_EQ(L"C:\\shr\\Foo.dll;C:\\bar.dll;c:\\foo.dll", list1);
list1 = add_to_file_list(list1, L"d:\\gee.dll",
TRUE, FALSE, FALSE, sep);
DO_ASSERT_WSTR_EQ(L"C:\\shr\\Foo.dll;C:\\bar.dll;c:\\foo.dll;d:\\gee.dll", list1);
list1 = add_to_file_list(list1, L"ar.dll",
TRUE, FALSE, FALSE, sep);
DO_ASSERT_WSTR_EQ(L"C:\\shr\\Foo.dll;C:\\bar.dll;c:\\foo.dll;d:\\gee.dll;ar.dll", list1);
}
/* used in tests below */
DO_ASSERT_WSTR_EQ(L"C:\\shr\\Foo.dll;C:\\bar.dll;c:\\foo.dll;d:\\gee.dll;ar.dll", list1);
/* remove */
{
tmplist = wcsdup(list1);
remove_from_file_list(tmplist, L"ar.dll", sep);
DO_ASSERT_WSTR_EQ(L"C:\\shr\\Foo.dll;C:\\bar.dll;c:\\foo.dll;d:\\gee.dll", tmplist);
remove_from_file_list(tmplist, L"foo.dll", sep);
DO_ASSERT_WSTR_EQ(L"C:\\bar.dll;d:\\gee.dll", tmplist);
free_file_list(tmplist);
tmplist = wcsdup(list1);
remove_from_file_list(tmplist, L"Ar.dll", sep);
DO_ASSERT_WSTR_EQ(L"C:\\shr\\Foo.dll;C:\\bar.dll;c:\\foo.dll;d:\\gee.dll", tmplist);
remove_from_file_list(tmplist, L"Foo.DLL", sep);
DO_ASSERT_WSTR_EQ(L"C:\\bar.dll;d:\\gee.dll", tmplist);
free_file_list(tmplist);
}
/* path checking */
{
tmplist = wcsdup(list1);
tmplist = add_to_file_list(tmplist,
L"C:\\Program Files\\blah\\blah\\foo.dll",
TRUE, TRUE, TRUE, sep);
DO_ASSERT_WSTR_EQ(L"C:\\Program Files\\blah\\blah\\foo.dll;C:\\bar.dll;d:\\gee.dll;ar.dll", tmplist);
free_file_list(tmplist);
}
/* list filters */
{
list2 = new_file_list(1);
list2 = add_to_file_list(list2, L"foo.dll", TRUE, TRUE, FALSE, sep);
list2 = add_to_file_list(list2, L"gee.dll", TRUE, TRUE, FALSE, sep);
tmplist = wcsdup(list1);
DO_ASSERT(!blacklist_filter(tmplist, list2, TRUE, sep));
DO_ASSERT_WSTR_EQ(L"C:\\shr\\Foo.dll;C:\\bar.dll;c:\\foo.dll;d:\\gee.dll;ar.dll", tmplist);
DO_ASSERT(!blacklist_filter(tmplist, list2, FALSE, sep));
DO_ASSERT_WSTR_EQ(L"C:\\bar.dll;ar.dll", tmplist);
DO_ASSERT(blacklist_filter(tmplist, list2, TRUE, sep));
free_file_list(tmplist);
tmplist = wcsdup(list1);
DO_ASSERT(!whitelist_filter(tmplist, list2, FALSE, sep));
DO_ASSERT_WSTR_EQ(L"C:\\shr\\Foo.dll;c:\\foo.dll;d:\\gee.dll", tmplist);
DO_ASSERT(whitelist_filter(tmplist, list2, TRUE, sep));
free_file_list(tmplist);
free_file_list(list2);
}
free_file_list(list1);
/* force to front */
{
list1 = L"home.dll;C:\\PROGRA~1\\DETERM~1\\SECURE~1\\lib\\DRPREI~1.DLL;foo.dll;bar.dll";
list2 = new_file_list(wcslen(list1) + 1);
wcsncpy(list2, list1, wcslen(list1) + 1);
list2 = add_to_file_list(list2, L"C:\\PROGRA~1\\DETERM~1\\SECURE~1\\lib\\DRPREI~1.DLL", TRUE, TRUE, TRUE, sep);
DO_ASSERT_WSTR_EQ(L"C:\\PROGRA~1\\DETERM~1\\SECURE~1\\lib\\DRPREI~1.DLL;home.dll;foo.dll;bar.dll", list2);
DO_ASSERT(wcslen(list1) == wcslen(list2));
}
/* autoinject (FIXME: needs more..) */
{
res = get_config_parameter(INJECT_ALL_KEY_L, TRUE, INJECT_ALL_SUBKEY_L,
buf, MAX_PARAM_LEN);
DO_ASSERT(res == ERROR_SUCCESS);
res = set_config_parameter(INJECT_ALL_KEY_L, TRUE,
INJECT_ALL_SUBKEY_L,
L"foo.dll;bar.dll;home.dll");
DO_ASSERT(res == ERROR_SUCCESS);
/* FIXME: should all full automated tests of all
* APPINIT_FLAGS etc. */
//res = set_autoinjection_ex(TRUE, );
//DO_ASSERT(res == ERROR_SUCCESS);
res = set_config_parameter(INJECT_ALL_KEY_L, TRUE,
INJECT_ALL_SUBKEY_L, buf);
DO_ASSERT(res == ERROR_SUCCESS);
}
/* config group */
{
c = new_config_group(L"foo");
DO_ASSERT_WSTR_EQ(c->name, L"foo");
set_config_group_parameter(c, L"bar", L"wise");
c2 = new_config_group(L"foo2");
set_config_group_parameter(c2, L"bar2", L"dumb");
set_config_group_parameter(c2, L"bar3", L"dumber");
add_config_group(c, c2);
c3 = new_config_group(L"foo4");
set_config_group_parameter(c3, L"bar4", L"eloquent");
add_config_group(c, c3);
c4 = new_config_group(L"foo5");
set_config_group_parameter(c4, L"bar5", L"dull");
add_config_group(c3,c4);
c->should_clear = TRUE;
DO_DEBUG(DL_VERB,
dump_config_group(""," ",c,FALSE);
);
res = write_config_group(c);
DO_ASSERT(res == ERROR_SUCCESS);
DO_ASSERT_WSTR_EQ(c->name, L"foo");
}
/* copy config group */
{
ConfigGroup *cc, *copy = copy_config_group(c, TRUE);
DO_ASSERT_WSTR_EQ(copy->name, L"foo");
cc = get_child(L"foo4", copy);
DO_ASSERT(NULL != cc);
DO_ASSERT_WSTR_EQ(L"eloquent", get_config_group_parameter(cc, L"bar4"));
cc = get_child(L"foo5", cc);
DO_ASSERT(NULL != cc);
DO_ASSERT_WSTR_EQ(L"dull", get_config_group_parameter(cc, L"bar5"));
free_config_group(copy);
copy = copy_config_group(c, FALSE);
DO_ASSERT_WSTR_EQ(copy->name, L"foo");
DO_ASSERT_WSTR_EQ(L"wise", get_config_group_parameter(copy, L"bar"));
cc = get_child(L"foo4", copy);
DO_ASSERT(NULL == cc);
free_config_group(copy);
}
/* remove child */
{
DO_ASSERT(c2 == get_child(L"foo2", c));
remove_child(L"foo2", c);
DO_ASSERT(NULL == get_child(L"foo2", c));
DO_ASSERT(c3 == get_child(L"foo4", c));
DO_ASSERT(c4 == get_child(L"foo5", c3));
DO_ASSERT(c3 == get_child(L"Foo4", c));
DO_ASSERT(c3 == get_child(L"FOO4", c));
/* make sure we don't die */
remove_child(L"foo2", c);
}
/* remove parameter */
{
set_config_group_parameter(c, L"testremove", L"sucks");
DO_ASSERT_WSTR_EQ(get_config_group_parameter(c, L"testremove"),
L"sucks");
DO_ASSERT_WSTR_EQ(get_config_group_parameter(c, L"bar"), L"wise");
remove_config_group_parameter(c, L"testremove");
DO_ASSERT(NULL == get_config_group_parameter(c, L"testremove"));
DO_ASSERT_WSTR_EQ(get_config_group_parameter(c, L"bar"), L"wise");
free_config_group(c);
}
/* read config */
{
res = read_config_group(&c, L"foo", TRUE);
DO_ASSERT_HANDLE(res == ERROR_SUCCESS,
printf("res=%d\n", res);
return -1;
);
DO_ASSERT_WSTR_EQ(c->name, L"foo");
DO_ASSERT(NULL != get_child(L"foo2", c));
DO_ASSERT(NULL != get_child(L"foo4", c));
DO_ASSERT(NULL != get_child(L"foo5", get_child(L"foo4", c)));
free_config_group(c);
}
/* read deep config */
{
res = read_config_group(&c, L"foo:foo2", TRUE);
DO_ASSERT(res == ERROR_SUCCESS);
DO_DEBUG(DL_VERB,
printf("c->name: >%S<\n", c->name);
);
DO_ASSERT_WSTR_EQ(c->name, L"foo:foo2");
free_config_group(c);
}
/* read deeper config */
{
res = read_config_group(&c, L"foo:foo4:foo5", TRUE);
DO_ASSERT(res == ERROR_SUCCESS);
DO_ASSERT_WSTR_EQ(c->name, L"foo:foo4:foo5");
DO_ASSERT_WSTR_EQ(get_config_group_parameter(c, L"bar5"), L"dull");
free_config_group(c);
}
/* test write */
{
res = read_config_group(&c, L"foo:foo4:foo5", TRUE);
DO_ASSERT(res == ERROR_SUCCESS);
set_config_group_parameter(c, L"testwrite", L"rocks");
DO_ASSERT(get_config_group_parameter(c, L"testwrite") != NULL);
DO_ASSERT_WSTR_EQ(get_config_group_parameter(c, L"testwrite"),
L"rocks");
res = write_config_group(c);
DO_ASSERT(res == ERROR_SUCCESS);
free_config_group(c);
res = read_config_group(&c, L"foo:foo4:foo5", TRUE);
DO_ASSERT(res == ERROR_SUCCESS);
DO_ASSERT_WSTR_EQ(get_config_group_parameter(c, L"testwrite"),
L"rocks");
DO_ASSERT_WSTR_EQ(get_config_group_parameter(c, L"bar5"), L"dull");
free_config_group(c);
}
/* test write patches */
{
ConfigGroup *hp = new_config_group(L_DYNAMORIO_VAR_HOT_PATCH_MODES);
c = new_config_group(L"testapp.exe");
DO_ASSERT(c != NULL);
set_config_group_parameter(hp, L"TEST.0001", L"0");
set_config_group_parameter(hp, L"TEST.0002", L"1");
set_config_group_parameter(hp, L"MS06.019A", L"2");
add_config_group(c, hp);
hp = get_child(L_DYNAMORIO_VAR_HOT_PATCH_MODES, c);
DO_ASSERT(hp != NULL);
DO_ASSERT(get_config_group_parameter(hp, L"TEST.0001") != NULL);
DO_ASSERT_WSTR_EQ(get_config_group_parameter(hp, L"TEST.0001"), L"0");
res = write_config_group(c);
DO_ASSERT(res == ERROR_SUCCESS);
free_config_group(c);
res = read_config_group(&c, L"testapp.exe", TRUE);
DO_ASSERT(res == ERROR_SUCCESS);
hp = get_child(L_DYNAMORIO_VAR_HOT_PATCH_MODES, c);
DO_ASSERT(hp != NULL);
DO_ASSERT(get_config_group_parameter(hp, L"TEST.0001") != NULL);
DO_ASSERT_WSTR_EQ(get_config_group_parameter(hp, L"TEST.0001"), L"0");
DO_DEBUG(DL_VERB,
dump_config_group(""," ",c,FALSE);
);
free_config_group(c);
}
/* case insensitive read */
{
res = read_config_group(&c, L"FOO:FOO4:FOO5", TRUE);
DO_ASSERT(res == ERROR_SUCCESS);
DO_ASSERT_WSTR_EQ(get_config_group_parameter(c, L"bar5"), L"dull");
free_config_group(c);
}
/* write back with foo2 removed */
{
res = read_config_group(&c, L"foo", TRUE);
DO_ASSERT(res == ERROR_SUCCESS);
DO_ASSERT_WSTR_EQ(c->name, L"foo");
c->should_clear = TRUE;
DO_ASSERT(NULL != get_child(L"foo2", c));
remove_child(L"foo2", c);
DO_ASSERT(NULL == get_child(L"foo2", c));
res = write_config_group(c);
DO_ASSERT(res == ERROR_SUCCESS);
DO_ASSERT_WSTR_EQ(c->name, L"foo");
free_config_group(c);
/* read back and make sure foo2 is still gone */
res = read_config_group(&c, L"foo", TRUE);
DO_ASSERT(res == ERROR_SUCCESS);
DO_ASSERT_WSTR_EQ(c->name, L"foo");
DO_ASSERT(NULL == get_child(L"foo2", c));
DO_ASSERT(NULL != get_child(L"foo4", c));
DO_ASSERT(NULL != get_child(L"foo5", get_child(L"foo4", c)));
free_config_group(c);
}
/* absolute config */
{
WCHAR buf[MAX_PATH];
res = set_config_parameter(L"Software\\Microsoft",
TRUE, L"foo", L"bar");
DO_ASSERT(res == ERROR_SUCCESS);
res = get_config_parameter(L"Software\\Microsoft", TRUE, L"foo",
buf, MAX_PATH);
DO_ASSERT(res == ERROR_SUCCESS);
DO_ASSERT_WSTR_EQ(buf, L"bar");
res = set_config_parameter(L"Software\\Microsoft",
TRUE, L"foo", L"rebar");
DO_ASSERT(res == ERROR_SUCCESS);
res = get_config_parameter(L"Software\\Microsoft", TRUE, L"foo",
buf, MAX_PATH);
DO_ASSERT(res == ERROR_SUCCESS);
DO_ASSERT_WSTR_EQ(buf, L"rebar");
res = set_config_parameter(L"Software\\Microsoft", TRUE, L"foo", NULL);
DO_ASSERT(res == ERROR_SUCCESS);
res = get_config_parameter(L"Software\\Microsoft", TRUE, L"foo",
buf, MAX_PATH);
DO_ASSERT(res != ERROR_SUCCESS);
}
/* qnames */
{
c = new_config_group(L"apps");
c2 = new_config_group(L"bar.exe");
c3 = new_config_group(L"bar.exe-bar");
c4 = new_config_group(L"foo.exe");
add_config_group(c, c2);
add_config_group(c, c3);
add_config_group(c, c4);
set_config_group_parameter(c2, L"DYNAMORIO_RUNUNDER", L"48");
set_config_group_parameter(c3, L"DYNAMORIO_RUNUNDER", L"49");
cp = get_qualified_config_group(c, L"bar.exe", L"bar.exe /bar");
DO_ASSERT(cp != NULL);
cp = get_qualified_config_group(c, L"bar.exe",
L"bar.exe /b /a /r");
DO_ASSERT(cp != NULL);
cp = get_qualified_config_group(c, L"bar.exe", L"bar.exe /c bar");
DO_ASSERT(cp != NULL);
cp = get_qualified_config_group(c, L"bar.exe", L"bar.exe /c Bar");
DO_ASSERT(cp != NULL);
cp = get_qualified_config_group(c, L"bar.exe", L"Bar.exe /c bar");
DO_ASSERT(cp != NULL);
DO_ASSERT(is_parent_of_qualified_config_group(c2));
DO_ASSERT(is_parent_of_qualified_config_group(c3));
DO_ASSERT(!is_parent_of_qualified_config_group(c4));
set_config_group_parameter(c4, L"DYNAMORIO_RUNUNDER", L"5");
DO_ASSERT(!is_parent_of_qualified_config_group(c4));
}
/* autoinject tests */
{
res = unset_autoinjection();
DO_ASSERT(res == ERROR_SUCCESS);
res = set_autoinjection();
DO_ASSERT(res == ERROR_SUCCESS);
res = unset_autoinjection();
DO_ASSERT(res == ERROR_SUCCESS);
}
printf("All Test Passed\n");
return 0;
}
#endif