reactos/base/system/smss/sminit.c

2568 lines
92 KiB
C

/*
* PROJECT: ReactOS Windows-Compatible Session Manager
* LICENSE: BSD 2-Clause License
* FILE: base/system/smss/sminit.c
* PURPOSE: Main SMSS Code
* PROGRAMMERS: Alex Ionescu
*/
/* INCLUDES *******************************************************************/
#include "smss.h"
#define NDEBUG
#include <debug.h>
/* GLOBALS ********************************************************************/
UNICODE_STRING SmpSubsystemName, PosixName, Os2Name;
LIST_ENTRY SmpBootExecuteList, SmpSetupExecuteList;
LIST_ENTRY SmpPagingFileList, SmpDosDevicesList, SmpFileRenameList;
LIST_ENTRY SmpKnownDllsList, SmpExcludeKnownDllsList;
LIST_ENTRY SmpSubSystemList, SmpSubSystemsToLoad, SmpSubSystemsToDefer;
LIST_ENTRY SmpExecuteList, NativeProcessList;
PVOID SmpHeap;
ULONG SmBaseTag;
HANDLE SmpDebugPort, SmpDosDevicesObjectDirectory;
PWCHAR SmpDefaultEnvironment, SmpDefaultLibPathBuffer;
UNICODE_STRING SmpKnownDllPath, SmpDefaultLibPath;
ULONG SmpCalledConfigEnv;
ULONG SmpInitProgressByLine;
NTSTATUS SmpInitReturnStatus;
PVOID SmpInitLastCall;
SECURITY_DESCRIPTOR SmpPrimarySDBody, SmpLiberalSDBody, SmpKnownDllsSDBody;
SECURITY_DESCRIPTOR SmpApiPortSDBody;
PISECURITY_DESCRIPTOR SmpPrimarySecurityDescriptor, SmpLiberalSecurityDescriptor;
PISECURITY_DESCRIPTOR SmpKnownDllsSecurityDescriptor, SmpApiPortSecurityDescriptor;
ULONG SmpAllowProtectedRenames, SmpProtectionMode = 1;
BOOLEAN MiniNTBoot = FALSE;
#define SMSS_CHECKPOINT(x, y) \
{ \
SmpInitProgressByLine = __LINE__; \
SmpInitReturnStatus = (y); \
SmpInitLastCall = (x); \
}
/* REGISTRY CONFIGURATION *****************************************************/
NTSTATUS
NTAPI
SmpSaveRegistryValue(IN PLIST_ENTRY ListAddress,
IN PWSTR Name,
IN PWCHAR Value,
IN BOOLEAN Flags)
{
PSMP_REGISTRY_VALUE RegEntry;
UNICODE_STRING NameString, ValueString;
ANSI_STRING AnsiValueString;
PLIST_ENTRY NextEntry;
/* Convert to unicode strings */
RtlInitUnicodeString(&NameString, Name);
RtlInitUnicodeString(&ValueString, Value);
/* In case this is the first value, initialize a new list/structure */
RegEntry = NULL;
/* Check if we should do a duplicate check */
if (Flags)
{
/* Loop the current list */
NextEntry = ListAddress->Flink;
while (NextEntry != ListAddress)
{
/* Get each entry */
RegEntry = CONTAINING_RECORD(NextEntry, SMP_REGISTRY_VALUE, Entry);
/* Check if the value name matches */
if (!RtlCompareUnicodeString(&RegEntry->Name, &NameString, TRUE))
{
/* Check if the value is the exact same thing */
if (!RtlCompareUnicodeString(&RegEntry->Value, &ValueString, TRUE))
{
/* Fail -- the same setting is being set twice */
return STATUS_OBJECT_NAME_EXISTS;
}
/* We found the list, and this isn't a duplicate value */
break;
}
/* This wasn't a match, keep going */
NextEntry = NextEntry->Flink;
RegEntry = NULL;
}
}
/* Are we adding on, or creating a new entry */
if (!RegEntry)
{
/* A new entry -- allocate it */
RegEntry = RtlAllocateHeap(RtlGetProcessHeap(),
SmBaseTag,
sizeof(SMP_REGISTRY_VALUE) +
NameString.MaximumLength);
if (!RegEntry) return STATUS_NO_MEMORY;
/* Initialize the list and set all values to NULL */
InitializeListHead(&RegEntry->Entry);
RegEntry->AnsiValue = NULL;
RegEntry->Value.Buffer = NULL;
/* Copy and initialize the value name */
RegEntry->Name.Buffer = (PWCHAR)(RegEntry + 1);
RegEntry->Name.Length = NameString.Length;
RegEntry->Name.MaximumLength = NameString.MaximumLength;
RtlCopyMemory(RegEntry->Name.Buffer,
NameString.Buffer,
NameString.MaximumLength);
/* Add this entry into the list */
InsertTailList(ListAddress, &RegEntry->Entry);
}
/* Did we have an old value buffer? */
if (RegEntry->Value.Buffer)
{
/* Free it */
ASSERT(RegEntry->Value.Length != 0);
RtlFreeHeap(RtlGetProcessHeap(), 0, RegEntry->Value.Buffer);
}
/* Is there no value associated? */
if (!Value)
{
/* We're done here */
RtlInitUnicodeString(&RegEntry->Value, NULL);
return STATUS_SUCCESS;
}
/* There is a value, so allocate a buffer for it */
RegEntry->Value.Buffer = RtlAllocateHeap(RtlGetProcessHeap(),
SmBaseTag,
ValueString.MaximumLength);
if (!RegEntry->Value.Buffer)
{
/* Out of memory, undo */
RemoveEntryList(&RegEntry->Entry);
RtlFreeHeap(RtlGetProcessHeap(), 0, RegEntry);
return STATUS_NO_MEMORY;
}
/* Copy the value into the entry */
RegEntry->Value.Length = ValueString.Length;
RegEntry->Value.MaximumLength = ValueString.MaximumLength;
RtlCopyMemory(RegEntry->Value.Buffer,
ValueString.Buffer,
ValueString.MaximumLength);
/* Now allocate memory for an ANSI copy of it */
RegEntry->AnsiValue = RtlAllocateHeap(RtlGetProcessHeap(),
SmBaseTag,
(ValueString.Length / sizeof(WCHAR)) +
sizeof(ANSI_NULL));
if (!RegEntry->AnsiValue)
{
/* Out of memory, undo */
RtlFreeHeap(RtlGetProcessHeap(), 0, RegEntry->Value.Buffer);
RemoveEntryList(&RegEntry->Entry);
RtlFreeHeap(RtlGetProcessHeap(), 0, RegEntry);
return STATUS_NO_MEMORY;
}
/* Convert the Unicode value string and return success */
RtlInitEmptyAnsiString(&AnsiValueString,
RegEntry->AnsiValue,
(ValueString.Length / sizeof(WCHAR)) +
sizeof(ANSI_NULL));
RtlUnicodeStringToAnsiString(&AnsiValueString, &ValueString, FALSE);
return STATUS_SUCCESS;
}
PSMP_REGISTRY_VALUE
NTAPI
SmpFindRegistryValue(IN PLIST_ENTRY List,
IN PWSTR ValueName)
{
PSMP_REGISTRY_VALUE RegEntry;
UNICODE_STRING ValueString;
PLIST_ENTRY NextEntry;
/* Initialize the value name sting */
RtlInitUnicodeString(&ValueString, ValueName);
/* Loop the list */
NextEntry = List->Flink;
while (NextEntry != List)
{
/* Get each entry */
RegEntry = CONTAINING_RECORD(NextEntry, SMP_REGISTRY_VALUE, Entry);
/* Check if the value name matches */
if (!RtlCompareUnicodeString(&RegEntry->Name, &ValueString, TRUE)) break;
/* It doesn't, move on */
NextEntry = NextEntry->Flink;
}
/* If we looped back, return NULL, otherwise return the entry we found */
if (NextEntry == List) RegEntry = NULL;
return RegEntry;
}
NTSTATUS
NTAPI
SmpConfigureProtectionMode(IN PWSTR ValueName,
IN ULONG ValueType,
IN PVOID ValueData,
IN ULONG ValueLength,
IN PVOID Context,
IN PVOID EntryContext)
{
/* Make sure the value is valid */
if (ValueLength == sizeof(ULONG))
{
/* Read it */
SmpProtectionMode = *(PULONG)ValueData;
}
else
{
/* Default is to protect stuff */
SmpProtectionMode = 1;
}
/* Recreate the security descriptors to take into account security mode */
SmpCreateSecurityDescriptors(FALSE);
DPRINT("SmpProtectionMode: %lu\n", SmpProtectionMode);
return STATUS_SUCCESS;
}
NTSTATUS
NTAPI
SmpConfigureAllowProtectedRenames(IN PWSTR ValueName,
IN ULONG ValueType,
IN PVOID ValueData,
IN ULONG ValueLength,
IN PVOID Context,
IN PVOID EntryContext)
{
/* Make sure the value is valid */
if (ValueLength == sizeof(ULONG))
{
/* Read it */
SmpAllowProtectedRenames = *(PULONG)ValueData;
}
else
{
/* Default is to not allow protected renames */
SmpAllowProtectedRenames = 0;
}
DPRINT("SmpAllowProtectedRenames: %lu\n", SmpAllowProtectedRenames);
return STATUS_SUCCESS;
}
NTSTATUS
NTAPI
SmpConfigureObjectDirectories(IN PWSTR ValueName,
IN ULONG ValueType,
IN PVOID ValueData,
IN ULONG ValueLength,
IN PVOID Context,
IN PVOID EntryContext)
{
PISECURITY_DESCRIPTOR SecDescriptor;
NTSTATUS Status;
OBJECT_ATTRIBUTES ObjectAttributes;
HANDLE DirHandle;
UNICODE_STRING RpcString, WindowsString, SearchString;
PWCHAR SourceString = ValueData;
/* Initialize the two strings we will be looking for */
RtlInitUnicodeString(&RpcString, L"\\RPC Control");
RtlInitUnicodeString(&WindowsString, L"\\Windows");
/* Loop the registry data we received */
while (*SourceString)
{
/* Assume primary SD for most objects */
RtlInitUnicodeString(&SearchString, SourceString);
SecDescriptor = SmpPrimarySecurityDescriptor;
/* But for these two always set the liberal descriptor */
if ((RtlEqualUnicodeString(&SearchString, &RpcString, TRUE)) ||
(RtlEqualUnicodeString(&SearchString, &WindowsString, TRUE)))
{
SecDescriptor = SmpLiberalSecurityDescriptor;
}
/* Create the requested directory with the requested descriptor */
InitializeObjectAttributes(&ObjectAttributes,
&SearchString,
OBJ_CASE_INSENSITIVE |
OBJ_OPENIF |
OBJ_PERMANENT,
NULL,
SecDescriptor);
DPRINT("Creating: %wZ directory\n", &SearchString);
Status = NtCreateDirectoryObject(&DirHandle,
DIRECTORY_ALL_ACCESS,
&ObjectAttributes);
if (!NT_SUCCESS(Status))
{
/* Failure case */
DPRINT1("SMSS: Unable to create %wZ object directory - Status == %lx\n",
&SearchString, Status);
}
else
{
/* It worked, now close the handle */
NtClose(DirHandle);
}
/* Move to the next requested object */
SourceString += wcslen(SourceString) + 1;
}
/* All done */
return STATUS_SUCCESS;
}
NTSTATUS
NTAPI
SmpConfigureMemoryMgmt(IN PWSTR ValueName,
IN ULONG ValueType,
IN PVOID ValueData,
IN ULONG ValueLength,
IN PVOID Context,
IN PVOID EntryContext)
{
/* Save this is into a list */
return SmpSaveRegistryValue(EntryContext, ValueData, NULL, TRUE);
}
NTSTATUS
NTAPI
SmpConfigureFileRenames(IN PWSTR ValueName,
IN ULONG ValueType,
IN PVOID ValueData,
IN ULONG ValueLength,
IN PVOID Context,
IN PVOID EntryContext)
{
NTSTATUS Status;
static PWCHAR Canary = NULL;
/* Check if this is the second call */
if (Canary)
{
/* Save the data into the list */
DPRINT("Renamed file: '%S' - '%S'\n", Canary, ValueData);
Status = SmpSaveRegistryValue(EntryContext, Canary, ValueData, FALSE);
Canary = NULL;
}
else
{
/* This it the first call, do nothing until we get the second call */
Canary = ValueData;
Status = STATUS_SUCCESS;
}
/* Return the status */
return Status;
}
NTSTATUS
NTAPI
SmpConfigureExcludeKnownDlls(IN PWSTR ValueName,
IN ULONG ValueType,
IN PVOID ValueData,
IN ULONG ValueLength,
IN PVOID Context,
IN PVOID EntryContext)
{
PWCHAR DllName;
NTSTATUS Status;
/* Make sure the value type is valid */
if ((ValueType == REG_MULTI_SZ) || (ValueType == REG_SZ))
{
/* Keep going for each DLL in the list */
DllName = ValueData;
while (*DllName)
{
/* Add this to the linked list */
DPRINT("Excluded DLL: %S\n", DllName);
Status = SmpSaveRegistryValue(EntryContext, DllName, NULL, TRUE);
/* Bail out on failure or if only one DLL name was present */
if (!(NT_SUCCESS(Status)) || (ValueType == REG_SZ)) return Status;
/* Otherwise, move to the next DLL name */
DllName += wcslen(DllName) + 1;
}
}
/* All done */
return STATUS_SUCCESS;
}
NTSTATUS
NTAPI
SmpConfigureDosDevices(IN PWSTR ValueName,
IN ULONG ValueType,
IN PVOID ValueData,
IN ULONG ValueLength,
IN PVOID Context,
IN PVOID EntryContext)
{
/* Save into linked list */
return SmpSaveRegistryValue(EntryContext, ValueName, ValueData, TRUE);
}
NTSTATUS
NTAPI
SmpInitializeKnownDllPath(IN PUNICODE_STRING DllPath,
IN PWCHAR Buffer,
IN ULONG Length)
{
NTSTATUS Status;
/* Allocate the buffer */
DllPath->Buffer = RtlAllocateHeap(RtlGetProcessHeap(), SmBaseTag, Length);
if (DllPath->Buffer)
{
/* Fill out the rest of the string */
DllPath->MaximumLength = (USHORT)Length;
DllPath->Length = (USHORT)Length - sizeof(UNICODE_NULL);
/* Copy the actual path and return success */
RtlCopyMemory(DllPath->Buffer, Buffer, Length);
Status = STATUS_SUCCESS;
}
else
{
/* Fail with out of memory code */
Status = STATUS_NO_MEMORY;
}
/* Return result */
return Status;
}
NTSTATUS
NTAPI
SmpConfigureKnownDlls(IN PWSTR ValueName,
IN ULONG ValueType,
IN PVOID ValueData,
IN ULONG ValueLength,
IN PVOID Context,
IN PVOID EntryContext)
{
/* Check which value is being set */
if (_wcsicmp(ValueName, L"DllDirectory") == 0)
{
/* This is the directory, initialize it */
DPRINT("KnownDll Path: %S\n", ValueData);
return SmpInitializeKnownDllPath(&SmpKnownDllPath, ValueData, ValueLength);
}
else
{
/* Add to the linked list -- this is a file */
return SmpSaveRegistryValue(EntryContext, ValueName, ValueData, TRUE);
}
}
/**
* @remark
* SmpConfigureEnvironment() should be called twice in order to resolve
* forward references to environment variables.
* See the two L"Environment" entries in SmpRegistryConfigurationTable[].
**/
NTSTATUS
NTAPI
SmpConfigureEnvironment(IN PWSTR ValueName,
IN ULONG ValueType,
IN PVOID ValueData,
IN ULONG ValueLength,
IN PVOID Context,
IN PVOID EntryContext)
{
NTSTATUS Status;
UNICODE_STRING ValueString, DataString;
/* Convert the strings into UNICODE_STRING and set the variable defined */
RtlInitUnicodeString(&ValueString, ValueName);
RtlInitUnicodeString(&DataString, ValueData);
DPRINT("Setting %wZ = %wZ\n", &ValueString, &DataString);
Status = RtlSetEnvironmentVariable(NULL, &ValueString, &DataString);
if (!NT_SUCCESS(Status))
{
DPRINT1("SMSS: 'SET %wZ = %wZ' failed - Status == %lx\n",
&ValueString, &DataString, Status);
return Status;
}
/* Check if the path is being set, and wait for the second instantiation */
if ((_wcsicmp(ValueName, L"Path") == 0) && (++SmpCalledConfigEnv == 2))
{
/* Allocate the path buffer */
SmpDefaultLibPathBuffer = RtlAllocateHeap(RtlGetProcessHeap(),
SmBaseTag,
ValueLength);
if (!SmpDefaultLibPathBuffer) return STATUS_NO_MEMORY;
/* Copy the data into it and create the UNICODE_STRING to hold it */
RtlCopyMemory(SmpDefaultLibPathBuffer, ValueData, ValueLength);
RtlInitUnicodeString(&SmpDefaultLibPath, SmpDefaultLibPathBuffer);
}
/* All good */
return STATUS_SUCCESS;
}
NTSTATUS
NTAPI
SmpConfigureSubSystems(IN PWSTR ValueName,
IN ULONG ValueType,
IN PVOID ValueData,
IN ULONG ValueLength,
IN PVOID Context,
IN PVOID EntryContext)
{
PSMP_REGISTRY_VALUE RegEntry;
PWCHAR SubsystemName;
/* Is this a required or optional subsystem? */
if ((_wcsicmp(ValueName, L"Required") != 0) &&
(_wcsicmp(ValueName, L"Optional") != 0))
{
/* It isn't, is this the PSI flag? */
if ((_wcsicmp(ValueName, L"PosixSingleInstance") != 0) ||
(ValueType != REG_DWORD))
{
/* It isn't, must be a subsystem entry, add it to the list */
DPRINT("Subsystem entry: %S-%S\n", ValueName, ValueData);
return SmpSaveRegistryValue(EntryContext, ValueName, ValueData, TRUE);
}
/* This was the PSI flag, save it and exit */
RegPosixSingleInstance = TRUE;
return STATUS_SUCCESS;
}
/* This should be one of the required/optional lists. Is the type valid? */
if (ValueType == REG_MULTI_SZ)
{
/* It is, get the first subsystem */
SubsystemName = ValueData;
while (*SubsystemName)
{
/* We should have already put it into the list when we found it */
DPRINT("Found subsystem: %S\n", SubsystemName);
RegEntry = SmpFindRegistryValue(EntryContext, SubsystemName);
if (!RegEntry)
{
/* This subsystem doesn't exist, so skip it */
DPRINT1("SMSS: Invalid subsystem name - %ws\n", SubsystemName);
}
else
{
/* Found it -- remove it from the main list */
RemoveEntryList(&RegEntry->Entry);
/* Figure out which list to put it in */
if (_wcsicmp(ValueName, L"Required") == 0)
{
/* Put it into the required list */
DPRINT("Required\n");
InsertTailList(&SmpSubSystemsToLoad, &RegEntry->Entry);
}
else
{
/* Put it into the optional list */
DPRINT("Optional\n");
InsertTailList(&SmpSubSystemsToDefer, &RegEntry->Entry);
}
}
/* Move to the next name */
SubsystemName += wcslen(SubsystemName) + 1;
}
}
/* All done! */
return STATUS_SUCCESS;
}
RTL_QUERY_REGISTRY_TABLE
SmpRegistryConfigurationTable[] =
{
{
SmpConfigureProtectionMode,
0,
L"ProtectionMode",
NULL,
REG_DWORD,
NULL,
0
},
{
SmpConfigureAllowProtectedRenames,
RTL_QUERY_REGISTRY_DELETE,
L"AllowProtectedRenames",
NULL,
REG_DWORD,
NULL,
0
},
{
SmpConfigureObjectDirectories,
0,
L"ObjectDirectories",
NULL,
REG_MULTI_SZ,
L"\\Windows\0\\RPC Control\0",
0
},
{
SmpConfigureMemoryMgmt,
0,
L"BootExecute",
&SmpBootExecuteList,
REG_MULTI_SZ,
L"autocheck AutoChk.exe *\0",
0
},
{
SmpConfigureMemoryMgmt,
RTL_QUERY_REGISTRY_TOPKEY,
L"SetupExecute",
&SmpSetupExecuteList,
REG_NONE,
NULL,
0
},
{
SmpConfigureFileRenames,
RTL_QUERY_REGISTRY_DELETE,
L"PendingFileRenameOperations",
&SmpFileRenameList,
REG_NONE,
NULL,
0
},
{
SmpConfigureFileRenames,
RTL_QUERY_REGISTRY_DELETE,
L"PendingFileRenameOperations2",
&SmpFileRenameList,
REG_NONE,
NULL,
0
},
{
SmpConfigureExcludeKnownDlls,
0,
L"ExcludeFromKnownDlls",
&SmpExcludeKnownDllsList,
REG_MULTI_SZ,
L"\0",
0
},
{
NULL,
RTL_QUERY_REGISTRY_SUBKEY,
L"Memory Management",
NULL,
REG_NONE,
NULL,
0
},
{
SmpConfigureMemoryMgmt,
0,
L"PagingFiles",
&SmpPagingFileList,
REG_MULTI_SZ,
L"?:\\pagefile.sys\0",
0
},
{
SmpConfigureDosDevices,
RTL_QUERY_REGISTRY_SUBKEY,
L"DOS Devices",
&SmpDosDevicesList,
REG_NONE,
NULL,
0
},
{
SmpConfigureKnownDlls,
RTL_QUERY_REGISTRY_SUBKEY,
L"KnownDlls",
&SmpKnownDllsList,
REG_NONE,
NULL,
0
},
/**
* @remark
* SmpConfigureEnvironment() is expected to be called twice
* (see SmpCalledConfigEnv) in order to resolve forward references
* to environment variables (e.g. EnvVar1 referring to EnvVar2,
* before EnvVar2 is defined).
**/
{
SmpConfigureEnvironment,
RTL_QUERY_REGISTRY_SUBKEY,
L"Environment",
NULL,
REG_NONE,
NULL,
0
},
{
SmpConfigureEnvironment,
RTL_QUERY_REGISTRY_SUBKEY,
L"Environment",
NULL,
REG_NONE,
NULL,
0
},
/****/
{
SmpConfigureSubSystems,
RTL_QUERY_REGISTRY_SUBKEY,
L"SubSystems",
&SmpSubSystemList,
REG_NONE,
NULL,
0
},
{
SmpConfigureSubSystems,
RTL_QUERY_REGISTRY_NOEXPAND,
L"Required",
&SmpSubSystemList,
REG_MULTI_SZ,
L"Debug\0Windows\0",
0
},
{
SmpConfigureSubSystems,
RTL_QUERY_REGISTRY_NOEXPAND,
L"Optional",
&SmpSubSystemList,
REG_NONE,
NULL,
0
},
{
SmpConfigureSubSystems,
0,
L"Kmode",
&SmpSubSystemList,
REG_NONE,
NULL,
0
},
{
SmpConfigureMemoryMgmt,
RTL_QUERY_REGISTRY_TOPKEY,
L"Execute",
&SmpExecuteList,
REG_NONE,
NULL,
0
},
{0},
};
/* FUNCTIONS ******************************************************************/
VOID
NTAPI
SmpTranslateSystemPartitionInformation(VOID)
{
NTSTATUS Status;
UNICODE_STRING UnicodeString, LinkTarget, SearchString, SystemPartition;
OBJECT_ATTRIBUTES ObjectAttributes;
HANDLE KeyHandle, LinkHandle;
ULONG Length, Context;
size_t StrLength;
WCHAR LinkBuffer[MAX_PATH];
CHAR ValueBuffer[sizeof(KEY_VALUE_PARTIAL_INFORMATION) + 512];
PKEY_VALUE_PARTIAL_INFORMATION PartialInfo = (PVOID)ValueBuffer;
CHAR DirInfoBuffer[sizeof(OBJECT_DIRECTORY_INFORMATION) + 512];
POBJECT_DIRECTORY_INFORMATION DirInfo = (PVOID)DirInfoBuffer;
/* Open the setup key */
RtlInitUnicodeString(&UnicodeString, L"\\Registry\\Machine\\System\\Setup");
InitializeObjectAttributes(&ObjectAttributes,
&UnicodeString,
OBJ_CASE_INSENSITIVE,
NULL,
NULL);
Status = NtOpenKey(&KeyHandle, KEY_READ, &ObjectAttributes);
if (!NT_SUCCESS(Status))
{
DPRINT1("SMSS: Cannot open system setup key for reading: 0x%x\n", Status);
return;
}
/* Query the system partition */
RtlInitUnicodeString(&UnicodeString, L"SystemPartition");
Status = NtQueryValueKey(KeyHandle,
&UnicodeString,
KeyValuePartialInformation,
PartialInfo,
sizeof(ValueBuffer),
&Length);
NtClose(KeyHandle);
if (!NT_SUCCESS(Status) ||
((PartialInfo->Type != REG_SZ) && (PartialInfo->Type != REG_EXPAND_SZ)))
{
DPRINT1("SMSS: Cannot query SystemPartition value (Type %lu, Status 0x%x)\n",
PartialInfo->Type, Status);
return;
}
/* Initialize the system partition string */
RtlInitEmptyUnicodeString(&SystemPartition,
(PWCHAR)PartialInfo->Data,
PartialInfo->DataLength);
RtlStringCbLengthW(SystemPartition.Buffer,
SystemPartition.MaximumLength,
&StrLength);
SystemPartition.Length = (USHORT)StrLength;
/* Enumerate the directory looking for the symbolic link string */
RtlInitUnicodeString(&SearchString, L"SymbolicLink");
RtlInitEmptyUnicodeString(&LinkTarget, LinkBuffer, sizeof(LinkBuffer));
Status = NtQueryDirectoryObject(SmpDosDevicesObjectDirectory,
DirInfo,
sizeof(DirInfoBuffer),
TRUE,
TRUE,
&Context,
NULL);
if (!NT_SUCCESS(Status))
{
DPRINT1("SMSS: Cannot find drive letter for system partition\n");
return;
}
/* Keep searching until we find it */
do
{
/* Is this it? */
if ((RtlEqualUnicodeString(&DirInfo->TypeName, &SearchString, TRUE)) &&
(DirInfo->Name.Length == 2 * sizeof(WCHAR)) &&
(DirInfo->Name.Buffer[1] == L':'))
{
/* Looks like we found it, open the link to get its target */
InitializeObjectAttributes(&ObjectAttributes,
&DirInfo->Name,
OBJ_CASE_INSENSITIVE,
SmpDosDevicesObjectDirectory,
NULL);
Status = NtOpenSymbolicLinkObject(&LinkHandle,
SYMBOLIC_LINK_ALL_ACCESS,
&ObjectAttributes);
if (NT_SUCCESS(Status))
{
/* Open worked, query the target now */
Status = NtQuerySymbolicLinkObject(LinkHandle,
&LinkTarget,
NULL);
NtClose(LinkHandle);
/* Check if it matches the string we had found earlier */
if ((NT_SUCCESS(Status)) &&
((RtlEqualUnicodeString(&SystemPartition,
&LinkTarget,
TRUE)) ||
((RtlPrefixUnicodeString(&SystemPartition,
&LinkTarget,
TRUE)) &&
(LinkTarget.Buffer[SystemPartition.Length / sizeof(WCHAR)] == L'\\'))))
{
/* All done */
break;
}
}
}
/* Couldn't find it, try again */
Status = NtQueryDirectoryObject(SmpDosDevicesObjectDirectory,
DirInfo,
sizeof(DirInfoBuffer),
TRUE,
FALSE,
&Context,
NULL);
} while (NT_SUCCESS(Status));
if (!NT_SUCCESS(Status))
{
DPRINT1("SMSS: Cannot find drive letter for system partition\n");
return;
}
/* Open the setup key again, for full access this time */
RtlInitUnicodeString(&UnicodeString,
L"\\Registry\\Machine\\Software\\Microsoft\\Windows\\CurrentVersion\\Setup");
InitializeObjectAttributes(&ObjectAttributes,
&UnicodeString,
OBJ_CASE_INSENSITIVE,
NULL,
NULL);
Status = NtOpenKey(&KeyHandle, KEY_ALL_ACCESS, &ObjectAttributes);
if (!NT_SUCCESS(Status))
{
DPRINT1("SMSS: Cannot open software setup key for writing: 0x%x\n",
Status);
return;
}
/* Wrap up the end of the link buffer */
wcsncpy(LinkBuffer, DirInfo->Name.Buffer, 2);
LinkBuffer[2] = L'\\';
LinkBuffer[3] = L'\0';
/* Now set this as the "BootDir" */
RtlInitUnicodeString(&UnicodeString, L"BootDir");
Status = NtSetValueKey(KeyHandle,
&UnicodeString,
0,
REG_SZ,
LinkBuffer,
4 * sizeof(WCHAR));
if (!NT_SUCCESS(Status))
{
DPRINT1("SMSS: couldn't write BootDir value: 0x%x\n", Status);
}
NtClose(KeyHandle);
}
NTSTATUS
NTAPI
SmpCreateSecurityDescriptors(IN BOOLEAN InitialCall)
{
NTSTATUS Status;
PSID WorldSid = NULL, AdminSid = NULL, SystemSid = NULL;
PSID RestrictedSid = NULL, OwnerSid = NULL;
SID_IDENTIFIER_AUTHORITY WorldAuthority = {SECURITY_WORLD_SID_AUTHORITY};
SID_IDENTIFIER_AUTHORITY NtAuthority = {SECURITY_NT_AUTHORITY};
SID_IDENTIFIER_AUTHORITY CreatorAuthority = {SECURITY_CREATOR_SID_AUTHORITY};
ULONG AclLength, SidLength;
PACL Acl;
PACE_HEADER Ace;
BOOLEAN ProtectionRequired = FALSE;
/* Check if this is the first call */
if (InitialCall)
{
/* Create and set the primary descriptor */
SmpPrimarySecurityDescriptor = &SmpPrimarySDBody;
Status = RtlCreateSecurityDescriptor(SmpPrimarySecurityDescriptor,
SECURITY_DESCRIPTOR_REVISION);
ASSERT(NT_SUCCESS(Status));
Status = RtlSetDaclSecurityDescriptor(SmpPrimarySecurityDescriptor,
TRUE,
NULL,
FALSE);
ASSERT(NT_SUCCESS(Status));
/* Create and set the liberal descriptor */
SmpLiberalSecurityDescriptor = &SmpLiberalSDBody;
Status = RtlCreateSecurityDescriptor(SmpLiberalSecurityDescriptor,
SECURITY_DESCRIPTOR_REVISION);
ASSERT(NT_SUCCESS(Status));
Status = RtlSetDaclSecurityDescriptor(SmpLiberalSecurityDescriptor,
TRUE,
NULL,
FALSE);
ASSERT(NT_SUCCESS(Status));
/* Create and set the \KnownDlls descriptor */
SmpKnownDllsSecurityDescriptor = &SmpKnownDllsSDBody;
Status = RtlCreateSecurityDescriptor(SmpKnownDllsSecurityDescriptor,
SECURITY_DESCRIPTOR_REVISION);
ASSERT(NT_SUCCESS(Status));
Status = RtlSetDaclSecurityDescriptor(SmpKnownDllsSecurityDescriptor,
TRUE,
NULL,
FALSE);
ASSERT(NT_SUCCESS(Status));
/* Create and Set the \ApiPort descriptor */
SmpApiPortSecurityDescriptor = &SmpApiPortSDBody;
Status = RtlCreateSecurityDescriptor(SmpApiPortSecurityDescriptor,
SECURITY_DESCRIPTOR_REVISION);
ASSERT(NT_SUCCESS(Status));
Status = RtlSetDaclSecurityDescriptor(SmpApiPortSecurityDescriptor,
TRUE,
NULL,
FALSE);
ASSERT(NT_SUCCESS(Status));
}
/* Check if protection was requested in the registry (on by default) */
if (SmpProtectionMode & 1) ProtectionRequired = TRUE;
/* Exit if there's nothing to do */
if (!(InitialCall || ProtectionRequired)) return STATUS_SUCCESS;
/* Build the world SID */
Status = RtlAllocateAndInitializeSid(&WorldAuthority, 1,
SECURITY_WORLD_RID,
0, 0, 0, 0, 0, 0, 0,
&WorldSid);
if (!NT_SUCCESS(Status))
{
WorldSid = NULL;
goto Quickie;
}
/* Build the admin SID */
Status = RtlAllocateAndInitializeSid(&NtAuthority, 2,
SECURITY_BUILTIN_DOMAIN_RID,
DOMAIN_ALIAS_RID_ADMINS,
0, 0, 0, 0, 0, 0,
&AdminSid);
if (!NT_SUCCESS(Status))
{
AdminSid = NULL;
goto Quickie;
}
/* Build the owner SID */
Status = RtlAllocateAndInitializeSid(&CreatorAuthority, 1,
SECURITY_CREATOR_OWNER_RID,
0, 0, 0, 0, 0, 0, 0,
&OwnerSid);
if (!NT_SUCCESS(Status))
{
OwnerSid = NULL;
goto Quickie;
}
/* Build the restricted SID */
Status = RtlAllocateAndInitializeSid(&NtAuthority, 1,
SECURITY_RESTRICTED_CODE_RID,
0, 0, 0, 0, 0, 0, 0,
&RestrictedSid);
if (!NT_SUCCESS(Status))
{
RestrictedSid = NULL;
goto Quickie;
}
/* Build the system SID */
Status = RtlAllocateAndInitializeSid(&NtAuthority, 1,
SECURITY_LOCAL_SYSTEM_RID,
0, 0, 0, 0, 0, 0, 0,
&SystemSid);
if (!NT_SUCCESS(Status))
{
SystemSid = NULL;
goto Quickie;
}
/* Now check if we're creating the core descriptors */
if (!InitialCall)
{
/* We're skipping NextAcl so we have to do this here */
SidLength = RtlLengthSid(WorldSid) + RtlLengthSid(RestrictedSid) + RtlLengthSid(AdminSid);
SidLength *= 2;
goto NotInitial;
}
/* Allocate an ACL with two ACEs with two SIDs each */
SidLength = RtlLengthSid(SystemSid) + RtlLengthSid(AdminSid);
AclLength = sizeof(ACL) + 2 * sizeof(ACCESS_ALLOWED_ACE) + SidLength;
Acl = RtlAllocateHeap(RtlGetProcessHeap(), 0, AclLength);
if (!Acl) Status = STATUS_NO_MEMORY;
if (!NT_SUCCESS(Status)) goto NextAcl;
/* Now build the ACL and add the two ACEs */
Status = RtlCreateAcl(Acl, AclLength, ACL_REVISION2);
ASSERT(NT_SUCCESS(Status));
Status = RtlAddAccessAllowedAce(Acl, ACL_REVISION2, GENERIC_ALL, AdminSid);
ASSERT(NT_SUCCESS(Status));
Status = RtlAddAccessAllowedAce(Acl, ACL_REVISION2, GENERIC_ALL, SystemSid);
ASSERT(NT_SUCCESS(Status));
/* Set this as the DACL */
Status = RtlSetDaclSecurityDescriptor(SmpApiPortSecurityDescriptor,
TRUE,
Acl,
FALSE);
ASSERT(NT_SUCCESS(Status));
NextAcl:
/* Allocate an ACL with 6 ACEs, two ACEs per SID */
SidLength = RtlLengthSid(WorldSid) + RtlLengthSid(RestrictedSid) + RtlLengthSid(AdminSid);
SidLength *= 2;
AclLength = sizeof(ACL) + 6 * sizeof(ACCESS_ALLOWED_ACE) + SidLength;
Acl = RtlAllocateHeap(RtlGetProcessHeap(), 0, AclLength);
if (!Acl) Status = STATUS_NO_MEMORY;
if (!NT_SUCCESS(Status)) goto NotInitial;
/* Now build the ACL and add the six ACEs */
Status = RtlCreateAcl(Acl, AclLength, ACL_REVISION2);
ASSERT(NT_SUCCESS(Status));
Status = RtlAddAccessAllowedAce(Acl, ACL_REVISION2, GENERIC_EXECUTE, WorldSid);
ASSERT(NT_SUCCESS(Status));
Status = RtlAddAccessAllowedAce(Acl, ACL_REVISION2, GENERIC_EXECUTE, RestrictedSid);
ASSERT(NT_SUCCESS(Status));
Status = RtlAddAccessAllowedAce(Acl, ACL_REVISION2, GENERIC_ALL, AdminSid);
ASSERT(NT_SUCCESS(Status));
Status = RtlAddAccessAllowedAce(Acl, ACL_REVISION2, GENERIC_EXECUTE | GENERIC_READ | GENERIC_WRITE, WorldSid);
ASSERT(NT_SUCCESS(Status));
Status = RtlAddAccessAllowedAce(Acl, ACL_REVISION2, GENERIC_EXECUTE | GENERIC_READ | GENERIC_WRITE, RestrictedSid);
ASSERT(NT_SUCCESS(Status));
Status = RtlAddAccessAllowedAce(Acl, ACL_REVISION2, GENERIC_ALL, AdminSid);
ASSERT(NT_SUCCESS(Status));
/* Now edit the last three ACEs and make them inheritable */
Status = RtlGetAce(Acl, 3, (PVOID)&Ace);
ASSERT(NT_SUCCESS(Status));
Ace->AceFlags = OBJECT_INHERIT_ACE | CONTAINER_INHERIT_ACE | INHERIT_ONLY_ACE;
Status = RtlGetAce(Acl, 4, (PVOID)&Ace);
ASSERT(NT_SUCCESS(Status));
Ace->AceFlags = OBJECT_INHERIT_ACE | CONTAINER_INHERIT_ACE | INHERIT_ONLY_ACE;
Status = RtlGetAce(Acl, 5, (PVOID)&Ace);
ASSERT(NT_SUCCESS(Status));
Ace->AceFlags = OBJECT_INHERIT_ACE | CONTAINER_INHERIT_ACE | INHERIT_ONLY_ACE;
/* Set this as the DACL */
Status = RtlSetDaclSecurityDescriptor(SmpKnownDllsSecurityDescriptor,
TRUE,
Acl,
FALSE);
ASSERT(NT_SUCCESS(Status));
NotInitial:
/* The initial ACLs have been created, are we also protecting objects? */
if (!ProtectionRequired) goto Quickie;
/* Allocate an ACL with 7 ACEs, two ACEs per SID, and one final owner ACE */
SidLength += RtlLengthSid(OwnerSid);
AclLength = sizeof(ACL) + 7 * sizeof (ACCESS_ALLOWED_ACE) + 2 * SidLength;
Acl = RtlAllocateHeap(RtlGetProcessHeap(), 0, AclLength);
if (!Acl) Status = STATUS_NO_MEMORY;
if (!NT_SUCCESS(Status)) goto Quickie;
/* Build the ACL and add the seven ACEs */
Status = RtlCreateAcl(Acl, AclLength, ACL_REVISION2);
ASSERT(NT_SUCCESS(Status));
Status = RtlAddAccessAllowedAce(Acl, ACL_REVISION2, GENERIC_EXECUTE | GENERIC_READ, WorldSid);
ASSERT(NT_SUCCESS(Status));
Status = RtlAddAccessAllowedAce(Acl, ACL_REVISION2, GENERIC_EXECUTE | GENERIC_READ, RestrictedSid);
ASSERT(NT_SUCCESS(Status));
Status = RtlAddAccessAllowedAce(Acl, ACL_REVISION2, GENERIC_ALL, AdminSid);
ASSERT(NT_SUCCESS(Status));
Status = RtlAddAccessAllowedAce(Acl, ACL_REVISION2, GENERIC_EXECUTE | GENERIC_READ, WorldSid);
ASSERT(NT_SUCCESS(Status));
Status = RtlAddAccessAllowedAce(Acl, ACL_REVISION2, GENERIC_EXECUTE | GENERIC_READ, RestrictedSid);
ASSERT(NT_SUCCESS(Status));
Status = RtlAddAccessAllowedAce(Acl, ACL_REVISION2, GENERIC_ALL, AdminSid);
ASSERT(NT_SUCCESS(Status));
Status = RtlAddAccessAllowedAce(Acl, ACL_REVISION2, GENERIC_ALL, OwnerSid);
ASSERT(NT_SUCCESS(Status));
/* Edit the last 4 ACEs to make then inheritable */
Status = RtlGetAce(Acl, 3, (PVOID)&Ace);
ASSERT(NT_SUCCESS(Status));
Ace->AceFlags = OBJECT_INHERIT_ACE | CONTAINER_INHERIT_ACE | INHERIT_ONLY_ACE;
Status = RtlGetAce(Acl, 4, (PVOID)&Ace);
ASSERT(NT_SUCCESS(Status));
Ace->AceFlags = OBJECT_INHERIT_ACE | CONTAINER_INHERIT_ACE | INHERIT_ONLY_ACE;
Status = RtlGetAce(Acl, 5, (PVOID)&Ace);
ASSERT(NT_SUCCESS(Status));
Ace->AceFlags = OBJECT_INHERIT_ACE | CONTAINER_INHERIT_ACE | INHERIT_ONLY_ACE;
Status = RtlGetAce(Acl, 6, (PVOID)&Ace);
ASSERT(NT_SUCCESS(Status));
Ace->AceFlags = OBJECT_INHERIT_ACE | CONTAINER_INHERIT_ACE | INHERIT_ONLY_ACE;
/* Set this as the DACL for the primary SD */
Status = RtlSetDaclSecurityDescriptor(SmpPrimarySecurityDescriptor,
TRUE,
Acl,
FALSE);
ASSERT(NT_SUCCESS(Status));
/* Allocate an ACL with 7 ACEs, two ACEs per SID, and one final owner ACE */
AclLength = sizeof(ACL) + 7 * sizeof (ACCESS_ALLOWED_ACE) + 2 * SidLength;
Acl = RtlAllocateHeap(RtlGetProcessHeap(), 0, AclLength);
if (!Acl) Status = STATUS_NO_MEMORY;
if (!NT_SUCCESS(Status)) goto Quickie;
/* Build the ACL and add the seven ACEs */
Status = RtlCreateAcl(Acl, AclLength, ACL_REVISION2);
ASSERT(NT_SUCCESS(Status));
Status = RtlAddAccessAllowedAce(Acl, ACL_REVISION2, GENERIC_EXECUTE | GENERIC_READ | GENERIC_WRITE, WorldSid);
ASSERT(NT_SUCCESS(Status));
Status = RtlAddAccessAllowedAce(Acl, ACL_REVISION2, GENERIC_EXECUTE | GENERIC_READ | GENERIC_WRITE, RestrictedSid);
ASSERT(NT_SUCCESS(Status));
Status = RtlAddAccessAllowedAce(Acl, ACL_REVISION2, GENERIC_ALL, AdminSid);
ASSERT(NT_SUCCESS(Status));
Status = RtlAddAccessAllowedAce(Acl, ACL_REVISION2, GENERIC_EXECUTE | GENERIC_READ | GENERIC_WRITE, WorldSid);
ASSERT(NT_SUCCESS(Status));
Status = RtlAddAccessAllowedAce(Acl, ACL_REVISION2, GENERIC_EXECUTE | GENERIC_READ | GENERIC_WRITE, RestrictedSid);
ASSERT(NT_SUCCESS(Status));
Status = RtlAddAccessAllowedAce(Acl, ACL_REVISION2, GENERIC_ALL, AdminSid);
ASSERT(NT_SUCCESS(Status));
Status = RtlAddAccessAllowedAce(Acl, ACL_REVISION2, GENERIC_ALL, OwnerSid);
ASSERT(NT_SUCCESS(Status));
/* Edit the last 4 ACEs to make then inheritable */
Status = RtlGetAce(Acl, 3, (PVOID)&Ace);
ASSERT(NT_SUCCESS(Status));
Ace->AceFlags = OBJECT_INHERIT_ACE | CONTAINER_INHERIT_ACE | INHERIT_ONLY_ACE;
Status = RtlGetAce(Acl, 4, (PVOID)&Ace);
ASSERT(NT_SUCCESS(Status));
Ace->AceFlags = OBJECT_INHERIT_ACE | CONTAINER_INHERIT_ACE | INHERIT_ONLY_ACE;
Status = RtlGetAce(Acl, 5, (PVOID)&Ace);
ASSERT(NT_SUCCESS(Status));
Ace->AceFlags = OBJECT_INHERIT_ACE | CONTAINER_INHERIT_ACE | INHERIT_ONLY_ACE;
Status = RtlGetAce(Acl, 6, (PVOID)&Ace);
ASSERT(NT_SUCCESS(Status));
Ace->AceFlags = OBJECT_INHERIT_ACE | CONTAINER_INHERIT_ACE | INHERIT_ONLY_ACE;
/* Now set this as the DACL for the liberal SD */
Status = RtlSetDaclSecurityDescriptor(SmpLiberalSecurityDescriptor,
TRUE,
Acl,
FALSE);
ASSERT(NT_SUCCESS(Status));
Quickie:
/* Cleanup the SIDs */
if (OwnerSid) RtlFreeHeap(RtlGetProcessHeap(), 0, OwnerSid);
if (AdminSid) RtlFreeHeap(RtlGetProcessHeap(), 0, AdminSid);
if (WorldSid) RtlFreeHeap(RtlGetProcessHeap(), 0, WorldSid);
if (SystemSid) RtlFreeHeap(RtlGetProcessHeap(), 0, SystemSid);
if (RestrictedSid) RtlFreeHeap(RtlGetProcessHeap(), 0, RestrictedSid);
return Status;
}
NTSTATUS
NTAPI
SmpInitializeDosDevices(VOID)
{
NTSTATUS Status;
PSMP_REGISTRY_VALUE RegEntry;
SECURITY_DESCRIPTOR_CONTROL OldFlag = 0;
OBJECT_ATTRIBUTES ObjectAttributes;
UNICODE_STRING GlobalName;
HANDLE DirHandle;
PLIST_ENTRY NextEntry, Head;
/* Open the \GLOBAL?? directory */
RtlInitUnicodeString(&GlobalName, L"\\??");
InitializeObjectAttributes(&ObjectAttributes,
&GlobalName,
OBJ_CASE_INSENSITIVE | OBJ_OPENIF | OBJ_PERMANENT,
NULL,
NULL);
Status = NtOpenDirectoryObject(&SmpDosDevicesObjectDirectory,
DIRECTORY_ALL_ACCESS,
&ObjectAttributes);
if (!NT_SUCCESS(Status))
{
DPRINT1("SMSS: Unable to open %wZ directory - Status == %lx\n",
&GlobalName, Status);
return Status;
}
/* Loop the DOS devices */
Head = &SmpDosDevicesList;
while (!IsListEmpty(Head))
{
/* Get the entry and remove it */
NextEntry = RemoveHeadList(Head);
RegEntry = CONTAINING_RECORD(NextEntry, SMP_REGISTRY_VALUE, Entry);
/* Initialize the attributes, and see which descriptor is being used */
InitializeObjectAttributes(&ObjectAttributes,
&RegEntry->Name,
OBJ_CASE_INSENSITIVE | OBJ_OPENIF | OBJ_PERMANENT,
SmpDosDevicesObjectDirectory,
SmpPrimarySecurityDescriptor);
if (SmpPrimarySecurityDescriptor)
{
/* Save the old flag and set it while we create this link */
OldFlag = SmpPrimarySecurityDescriptor->Control;
SmpPrimarySecurityDescriptor->Control |= SE_DACL_DEFAULTED;
}
/* Create the symbolic link */
DPRINT("Creating symlink for %wZ to %wZ\n", &RegEntry->Name, &RegEntry->Value);
Status = NtCreateSymbolicLinkObject(&DirHandle,
SYMBOLIC_LINK_ALL_ACCESS,
&ObjectAttributes,
&RegEntry->Value);
if (Status == STATUS_OBJECT_NAME_EXISTS)
{
/* Make it temporary and get rid of the handle */
NtMakeTemporaryObject(DirHandle);
NtClose(DirHandle);
/* Treat this as success, and see if we got a name back */
Status = STATUS_SUCCESS;
if (RegEntry->Value.Length)
{
/* Create it now with this name */
ObjectAttributes.Attributes &= ~OBJ_OPENIF;
Status = NtCreateSymbolicLinkObject(&DirHandle,
SYMBOLIC_LINK_ALL_ACCESS,
&ObjectAttributes,
&RegEntry->Value);
}
}
/* If we were using a security descriptor, restore the non-defaulted flag */
if (ObjectAttributes.SecurityDescriptor)
{
SmpPrimarySecurityDescriptor->Control = OldFlag;
}
/* Print a failure if we failed to create the symbolic link */
if (!NT_SUCCESS(Status))
{
DPRINT1("SMSS: Unable to create %wZ => %wZ symbolic link object - Status == 0x%lx\n",
&RegEntry->Name,
&RegEntry->Value,
Status);
break;
}
/* Close the handle */
NtClose(DirHandle);
/* Free this entry */
if (RegEntry->AnsiValue) RtlFreeHeap(RtlGetProcessHeap(), 0, RegEntry->AnsiValue);
if (RegEntry->Value.Buffer) RtlFreeHeap(RtlGetProcessHeap(), 0, RegEntry->Value.Buffer);
RtlFreeHeap(RtlGetProcessHeap(), 0, RegEntry);
}
/* Return the status */
return Status;
}
VOID
NTAPI
SmpProcessModuleImports(IN PVOID Unused,
IN PCHAR ImportName)
{
ULONG Length = 0;
WCHAR Buffer[MAX_PATH];
PWCHAR DllName, DllValue;
ANSI_STRING ImportString;
UNICODE_STRING ImportUnicodeString;
NTSTATUS Status;
/* Skip NTDLL since it's already always mapped */
if (!_stricmp(ImportName, "ntdll.dll")) return;
/* Initialize our strings */
RtlInitAnsiString(&ImportString, ImportName);
RtlInitEmptyUnicodeString(&ImportUnicodeString, Buffer, sizeof(Buffer));
Status = RtlAnsiStringToUnicodeString(&ImportUnicodeString, &ImportString, FALSE);
if (!NT_SUCCESS(Status)) return;
/* Loop to find the DLL file extension */
while (Length < ImportUnicodeString.Length)
{
if (ImportUnicodeString.Buffer[Length / sizeof(WCHAR)] == L'.') break;
Length += sizeof(WCHAR);
}
/*
* Break up the values as needed; the buffer acquires the form:
* "dll_name.dll\0dll_name\0"
*/
DllValue = ImportUnicodeString.Buffer;
DllName = &ImportUnicodeString.Buffer[(ImportUnicodeString.Length + sizeof(UNICODE_NULL)) / sizeof(WCHAR)];
RtlStringCbCopyNW(DllName,
ImportUnicodeString.MaximumLength - (ImportUnicodeString.Length + sizeof(UNICODE_NULL)),
ImportUnicodeString.Buffer, Length);
/* Add the DLL to the list */
SmpSaveRegistryValue(&SmpKnownDllsList, DllName, DllValue, TRUE);
}
NTSTATUS
NTAPI
SmpInitializeKnownDllsInternal(IN PUNICODE_STRING Directory,
IN PUNICODE_STRING Path)
{
HANDLE DirFileHandle, DirHandle, SectionHandle, FileHandle, LinkHandle;
UNICODE_STRING NtPath, SymLinkName;
OBJECT_ATTRIBUTES ObjectAttributes;
NTSTATUS Status, Status1;
PLIST_ENTRY NextEntry;
PSMP_REGISTRY_VALUE RegEntry;
ULONG_PTR ErrorParameters[3];
UNICODE_STRING ErrorResponse;
IO_STATUS_BLOCK IoStatusBlock;
SECURITY_DESCRIPTOR_CONTROL OldFlag = 0;
USHORT ImageCharacteristics;
/* Initialize to NULL */
DirFileHandle = NULL;
DirHandle = NULL;
NtPath.Buffer = NULL;
/* Create the \KnownDLLs directory */
InitializeObjectAttributes(&ObjectAttributes,
Directory,
OBJ_CASE_INSENSITIVE | OBJ_OPENIF | OBJ_PERMANENT,
NULL,
SmpKnownDllsSecurityDescriptor);
Status = NtCreateDirectoryObject(&DirHandle,
DIRECTORY_ALL_ACCESS,
&ObjectAttributes);
if (!NT_SUCCESS(Status))
{
/* Handle failure */
DPRINT1("SMSS: Unable to create %wZ directory - Status == %lx\n",
Directory, Status);
return Status;
}
/* Convert the path to native format */
if (!RtlDosPathNameToNtPathName_U(Path->Buffer, &NtPath, NULL, NULL))
{
/* Fail if this didn't work */
DPRINT1("SMSS: Unable to to convert %wZ to an Nt path\n", Path);
Status = STATUS_OBJECT_NAME_INVALID;
goto Quickie;
}
/* Open the path that was specified, which should be a directory */
InitializeObjectAttributes(&ObjectAttributes,
&NtPath,
OBJ_CASE_INSENSITIVE,
NULL,
NULL);
Status = NtOpenFile(&DirFileHandle,
FILE_LIST_DIRECTORY | SYNCHRONIZE,
&ObjectAttributes,
&IoStatusBlock,
FILE_SHARE_READ | FILE_SHARE_WRITE,
FILE_DIRECTORY_FILE | FILE_SYNCHRONOUS_IO_NONALERT);
if (!NT_SUCCESS(Status))
{
/* Fail if we couldn't open it */
DPRINT1("SMSS: Unable to open a handle to the KnownDll directory (%wZ)"
"- Status == %lx\n",
Path,
Status);
FileHandle = NULL;
goto Quickie;
}
/* Temporarily hack the SD to use a default DACL for this symbolic link */
if (SmpPrimarySecurityDescriptor)
{
OldFlag = SmpPrimarySecurityDescriptor->Control;
SmpPrimarySecurityDescriptor->Control |= SE_DACL_DEFAULTED;
}
/* Create a symbolic link to the directory in the object manager */
RtlInitUnicodeString(&SymLinkName, L"KnownDllPath");
InitializeObjectAttributes(&ObjectAttributes,
&SymLinkName,
OBJ_CASE_INSENSITIVE | OBJ_OPENIF | OBJ_PERMANENT,
DirHandle,
SmpPrimarySecurityDescriptor);
Status = NtCreateSymbolicLinkObject(&LinkHandle,
SYMBOLIC_LINK_ALL_ACCESS,
&ObjectAttributes,
Path);
/* Undo the hack */
if (SmpPrimarySecurityDescriptor) SmpPrimarySecurityDescriptor->Control = OldFlag;
/* Check if the symlink was created */
if (!NT_SUCCESS(Status))
{
/* It wasn't, so bail out since the OS needs it to exist */
DPRINT1("SMSS: Unable to create %wZ symbolic link - Status == %lx\n",
&SymLinkName, Status);
LinkHandle = NULL;
goto Quickie;
}
/* We created it permanent, we can go ahead and close the handle now */
Status1 = NtClose(LinkHandle);
ASSERT(NT_SUCCESS(Status1));
/* Now loop the known DLLs */
NextEntry = SmpKnownDllsList.Flink;
while (NextEntry != &SmpKnownDllsList)
{
/* Get the entry and move on */
RegEntry = CONTAINING_RECORD(NextEntry, SMP_REGISTRY_VALUE, Entry);
NextEntry = NextEntry->Flink;
DPRINT("Processing known DLL: %wZ-%wZ\n", &RegEntry->Name, &RegEntry->Value);
/* Skip the entry if it's in the excluded list */
if ((SmpFindRegistryValue(&SmpExcludeKnownDllsList,
RegEntry->Name.Buffer)) ||
(SmpFindRegistryValue(&SmpExcludeKnownDllsList,
RegEntry->Value.Buffer)))
{
continue;
}
/* Open the actual file */
InitializeObjectAttributes(&ObjectAttributes,
&RegEntry->Value,
OBJ_CASE_INSENSITIVE,
DirFileHandle,
NULL);
Status1 = NtOpenFile(&FileHandle,
SYNCHRONIZE | FILE_EXECUTE,
&ObjectAttributes,
&IoStatusBlock,
FILE_SHARE_READ | FILE_SHARE_DELETE,
FILE_NON_DIRECTORY_FILE |
FILE_SYNCHRONOUS_IO_NONALERT);
/* If we failed, skip it */
if (!NT_SUCCESS(Status1)) continue;
/* Checksum it */
Status = LdrVerifyImageMatchesChecksum((HANDLE)((ULONG_PTR)FileHandle | 1),
SmpProcessModuleImports,
RegEntry,
&ImageCharacteristics);
if (!NT_SUCCESS(Status))
{
/* Checksum failed, so don't even try going further -- kill SMSS */
RtlInitUnicodeString(&ErrorResponse,
L"Verification of a KnownDLL failed.");
ErrorParameters[0] = (ULONG_PTR)&ErrorResponse;
ErrorParameters[1] = Status;
ErrorParameters[2] = (ULONG_PTR)&RegEntry->Value;
SmpTerminate(ErrorParameters, 5, RTL_NUMBER_OF(ErrorParameters));
}
else if (!(ImageCharacteristics & IMAGE_FILE_DLL))
{
/* An invalid known DLL entry will also kill SMSS */
RtlInitUnicodeString(&ErrorResponse,
L"Non-DLL file included in KnownDLL list.");
ErrorParameters[0] = (ULONG_PTR)&ErrorResponse;
ErrorParameters[1] = STATUS_INVALID_IMPORT_OF_NON_DLL;
ErrorParameters[2] = (ULONG_PTR)&RegEntry->Value;
SmpTerminate(ErrorParameters, 5, RTL_NUMBER_OF(ErrorParameters));
}
/* Temporarily hack the SD to use a default DACL for this section */
if (SmpLiberalSecurityDescriptor)
{
OldFlag = SmpLiberalSecurityDescriptor->Control;
SmpLiberalSecurityDescriptor->Control |= SE_DACL_DEFAULTED;
}
/* Create the section for this known DLL */
InitializeObjectAttributes(&ObjectAttributes,
&RegEntry->Value,
OBJ_PERMANENT,
DirHandle,
SmpLiberalSecurityDescriptor)
Status = NtCreateSection(&SectionHandle,
SECTION_ALL_ACCESS,
&ObjectAttributes,
0,
PAGE_EXECUTE,
SEC_IMAGE,
FileHandle);
/* Undo the hack */
if (SmpLiberalSecurityDescriptor) SmpLiberalSecurityDescriptor->Control = OldFlag;
/* Check if we created the section okay */
if (NT_SUCCESS(Status))
{
/* We can close it now, since it's marked permanent */
Status1 = NtClose(SectionHandle);
ASSERT(NT_SUCCESS(Status1));
}
else
{
/* If we couldn't make it "known", that's fine and keep going */
DPRINT1("SMSS: CreateSection for KnownDll %wZ failed - Status == %lx\n",
&RegEntry->Value, Status);
}
/* Close the file since we can move on to the next one */
Status1 = NtClose(FileHandle);
ASSERT(NT_SUCCESS(Status1));
}
Quickie:
/* Close both handles and free the NT path buffer */
if (DirHandle)
{
Status1 = NtClose(DirHandle);
ASSERT(NT_SUCCESS(Status1));
}
if (DirFileHandle)
{
Status1 = NtClose(DirFileHandle);
ASSERT(NT_SUCCESS(Status1));
}
if (NtPath.Buffer) RtlFreeHeap(RtlGetProcessHeap(), 0, NtPath.Buffer);
return Status;
}
NTSTATUS
NTAPI
SmpInitializeKnownDlls(VOID)
{
NTSTATUS Status;
PSMP_REGISTRY_VALUE RegEntry;
UNICODE_STRING KnownDllsName;
PLIST_ENTRY Head, NextEntry;
/* Call the internal function */
RtlInitUnicodeString(&KnownDllsName, L"\\KnownDlls");
Status = SmpInitializeKnownDllsInternal(&KnownDllsName, &SmpKnownDllPath);
/* Wipe out the list regardless of success */
Head = &SmpKnownDllsList;
while (!IsListEmpty(Head))
{
/* Remove this entry */
NextEntry = RemoveHeadList(Head);
/* Free it */
RegEntry = CONTAINING_RECORD(NextEntry, SMP_REGISTRY_VALUE, Entry);
RtlFreeHeap(RtlGetProcessHeap(), 0, RegEntry->AnsiValue);
RtlFreeHeap(RtlGetProcessHeap(), 0, RegEntry->Value.Buffer);
RtlFreeHeap(RtlGetProcessHeap(), 0, RegEntry);
}
/* All done */
return Status;
}
NTSTATUS
NTAPI
SmpCreateDynamicEnvironmentVariables(VOID)
{
NTSTATUS Status;
SYSTEM_BASIC_INFORMATION BasicInfo;
SYSTEM_PROCESSOR_INFORMATION ProcessorInfo;
OBJECT_ATTRIBUTES ObjectAttributes;
UNICODE_STRING ValueName, DestinationString;
HANDLE KeyHandle, KeyHandle2;
PWCHAR ValueData;
ULONG ResultLength;
size_t StrLength;
WCHAR ValueBuffer[sizeof(KEY_VALUE_PARTIAL_INFORMATION) + 512];
WCHAR ValueBuffer2[sizeof(KEY_VALUE_PARTIAL_INFORMATION) + 512];
PKEY_VALUE_PARTIAL_INFORMATION PartialInfo = (PVOID)ValueBuffer;
PKEY_VALUE_PARTIAL_INFORMATION PartialInfo2 = (PVOID)ValueBuffer2;
/* Get system basic information -- we'll need the CPU count */
Status = NtQuerySystemInformation(SystemBasicInformation,
&BasicInfo,
sizeof(BasicInfo),
NULL);
if (!NT_SUCCESS(Status))
{
/* Bail out on failure */
DPRINT1("SMSS: Unable to query system basic information - %x\n", Status);
return Status;
}
/* Get the processor information, we'll query a bunch of revision info */
Status = NtQuerySystemInformation(SystemProcessorInformation,
&ProcessorInfo,
sizeof(ProcessorInfo),
NULL);
if (!NT_SUCCESS(Status))
{
/* Bail out on failure */
DPRINT1("SMSS: Unable to query system processor information - %x\n", Status);
return Status;
}
/* We'll be writing all these environment variables over here */
RtlInitUnicodeString(&DestinationString,
L"\\Registry\\Machine\\System\\CurrentControlSet\\"
L"Control\\Session Manager\\Environment");
InitializeObjectAttributes(&ObjectAttributes,
&DestinationString,
OBJ_CASE_INSENSITIVE,
NULL,
NULL);
Status = NtOpenKey(&KeyHandle, GENERIC_WRITE, &ObjectAttributes);
if (!NT_SUCCESS(Status))
{
/* Bail out on failure */
DPRINT1("SMSS: Unable to open %wZ - %x\n", &DestinationString, Status);
return Status;
}
/* First let's write the OS variable */
RtlInitUnicodeString(&ValueName, L"OS");
ValueData = L"Windows_NT";
DPRINT("Setting %wZ to %S\n", &ValueName, ValueData);
Status = NtSetValueKey(KeyHandle,
&ValueName,
0,
REG_SZ,
ValueData,
(ULONG)(wcslen(ValueData) + 1) * sizeof(WCHAR));
if (!NT_SUCCESS(Status))
{
DPRINT1("SMSS: Failed writing %wZ environment variable - %x\n",
&ValueName, Status);
NtClose(KeyHandle);
return Status;
}
/* Next, let's write the CPU architecture variable */
RtlInitUnicodeString(&ValueName, L"PROCESSOR_ARCHITECTURE");
switch (ProcessorInfo.ProcessorArchitecture)
{
/* Pick the correct string that matches the architecture */
case PROCESSOR_ARCHITECTURE_INTEL:
ValueData = L"x86";
break;
case PROCESSOR_ARCHITECTURE_AMD64:
ValueData = L"AMD64";
break;
case PROCESSOR_ARCHITECTURE_IA64:
ValueData = L"IA64";
break;
default:
ValueData = L"Unknown";
break;
}
/* Set it */
DPRINT("Setting %wZ to %S\n", &ValueName, ValueData);
Status = NtSetValueKey(KeyHandle,
&ValueName,
0,
REG_SZ,
ValueData,
(ULONG)(wcslen(ValueData) + 1) * sizeof(WCHAR));
if (!NT_SUCCESS(Status))
{
DPRINT1("SMSS: Failed writing %wZ environment variable - %x\n",
&ValueName, Status);
NtClose(KeyHandle);
return Status;
}
/* And now let's write the processor level */
RtlInitUnicodeString(&ValueName, L"PROCESSOR_LEVEL");
swprintf(ValueBuffer, L"%u", ProcessorInfo.ProcessorLevel);
DPRINT("Setting %wZ to %S\n", &ValueName, ValueBuffer);
Status = NtSetValueKey(KeyHandle,
&ValueName,
0,
REG_SZ,
ValueBuffer,
(ULONG)(wcslen(ValueBuffer) + 1) * sizeof(WCHAR));
if (!NT_SUCCESS(Status))
{
DPRINT1("SMSS: Failed writing %wZ environment variable - %x\n",
&ValueName, Status);
NtClose(KeyHandle);
return Status;
}
/* Now open the hardware CPU key */
RtlInitUnicodeString(&DestinationString,
L"\\Registry\\Machine\\Hardware\\Description\\System\\"
L"CentralProcessor\\0");
InitializeObjectAttributes(&ObjectAttributes,
&DestinationString,
OBJ_CASE_INSENSITIVE,
NULL,
NULL);
Status = NtOpenKey(&KeyHandle2, KEY_READ, &ObjectAttributes);
if (!NT_SUCCESS(Status))
{
DPRINT1("SMSS: Unable to open %wZ - %x\n", &DestinationString, Status);
NtClose(KeyHandle);
return Status;
}
/* So that we can read the identifier out of it... */
RtlInitUnicodeString(&ValueName, L"Identifier");
Status = NtQueryValueKey(KeyHandle2,
&ValueName,
KeyValuePartialInformation,
PartialInfo,
sizeof(ValueBuffer),
&ResultLength);
if (!NT_SUCCESS(Status) ||
((PartialInfo->Type != REG_SZ) && (PartialInfo->Type != REG_EXPAND_SZ)))
{
NtClose(KeyHandle2);
NtClose(KeyHandle);
DPRINT1("SMSS: Unable to read %wZ\\%wZ (Type %lu, Status 0x%x)\n",
&DestinationString, &ValueName, PartialInfo->Type, Status);
return Status;
}
/* Initialize the string so that it can be large enough
* to contain both the identifier and the vendor strings. */
RtlInitEmptyUnicodeString(&DestinationString,
(PWCHAR)PartialInfo->Data,
sizeof(ValueBuffer) -
FIELD_OFFSET(KEY_VALUE_PARTIAL_INFORMATION, Data));
RtlStringCbLengthW(DestinationString.Buffer,
PartialInfo->DataLength,
&StrLength);
DestinationString.Length = (USHORT)StrLength;
/* As well as the vendor... */
RtlInitUnicodeString(&ValueName, L"VendorIdentifier");
Status = NtQueryValueKey(KeyHandle2,
&ValueName,
KeyValuePartialInformation,
PartialInfo2,
sizeof(ValueBuffer2),
&ResultLength);
NtClose(KeyHandle2);
if (NT_SUCCESS(Status) &&
((PartialInfo2->Type == REG_SZ) || (PartialInfo2->Type == REG_EXPAND_SZ)))
{
/* To combine it into a single string */
RtlStringCbPrintfW(DestinationString.Buffer + DestinationString.Length / sizeof(WCHAR),
DestinationString.MaximumLength - DestinationString.Length,
L", %.*s",
PartialInfo2->DataLength / sizeof(WCHAR),
(PWCHAR)PartialInfo2->Data);
DestinationString.Length = (USHORT)(wcslen(DestinationString.Buffer) * sizeof(WCHAR));
}
/* So that we can set this as the PROCESSOR_IDENTIFIER variable */
RtlInitUnicodeString(&ValueName, L"PROCESSOR_IDENTIFIER");
DPRINT("Setting %wZ to %wZ\n", &ValueName, &DestinationString);
Status = NtSetValueKey(KeyHandle,
&ValueName,
0,
REG_SZ,
DestinationString.Buffer,
DestinationString.Length + sizeof(UNICODE_NULL));
if (!NT_SUCCESS(Status))
{
DPRINT1("SMSS: Failed writing %wZ environment variable - %x\n",
&ValueName, Status);
NtClose(KeyHandle);
return Status;
}
/* Now let's get the processor architecture */
RtlInitUnicodeString(&ValueName, L"PROCESSOR_REVISION");
switch (ProcessorInfo.ProcessorArchitecture)
{
/* Check if this is an older Intel CPU */
case PROCESSOR_ARCHITECTURE_INTEL:
if ((ProcessorInfo.ProcessorRevision >> 8) == 0xFF)
{
/* These guys used a revision + stepping, so get the rev only */
swprintf(ValueBuffer, L"%02x", ProcessorInfo.ProcessorRevision & 0xFF);
_wcsupr(ValueBuffer);
break;
}
/* Modern Intel, as well as 64-bit CPUs use a revision without stepping */
case PROCESSOR_ARCHITECTURE_IA64:
case PROCESSOR_ARCHITECTURE_AMD64:
swprintf(ValueBuffer, L"%04x", ProcessorInfo.ProcessorRevision);
break;
/* And anything else we'll just read the whole revision identifier */
default:
swprintf(ValueBuffer, L"%u", ProcessorInfo.ProcessorRevision);
break;
}
/* Write the revision to the registry */
DPRINT("Setting %wZ to %S\n", &ValueName, ValueBuffer);
Status = NtSetValueKey(KeyHandle,
&ValueName,
0,
REG_SZ,
ValueBuffer,
(ULONG)(wcslen(ValueBuffer) + 1) * sizeof(WCHAR));
if (!NT_SUCCESS(Status))
{
DPRINT1("SMSS: Failed writing %wZ environment variable - %x\n",
&ValueName, Status);
NtClose(KeyHandle);
return Status;
}
/* And finally, write the number of CPUs */
RtlInitUnicodeString(&ValueName, L"NUMBER_OF_PROCESSORS");
swprintf(ValueBuffer, L"%d", BasicInfo.NumberOfProcessors);
DPRINT("Setting %wZ to %S\n", &ValueName, ValueBuffer);
Status = NtSetValueKey(KeyHandle,
&ValueName,
0,
REG_SZ,
ValueBuffer,
(ULONG)(wcslen(ValueBuffer) + 1) * sizeof(WCHAR));
if (!NT_SUCCESS(Status))
{
DPRINT1("SMSS: Failed writing %wZ environment variable - %x\n",
&ValueName, Status);
NtClose(KeyHandle);
return Status;
}
/* Now we need to write the safeboot option key in a different format */
RtlInitUnicodeString(&DestinationString,
L"\\Registry\\Machine\\System\\CurrentControlSet\\"
L"Control\\Safeboot\\Option");
InitializeObjectAttributes(&ObjectAttributes,
&DestinationString,
OBJ_CASE_INSENSITIVE,
NULL,
NULL);
Status = NtOpenKey(&KeyHandle2, KEY_ALL_ACCESS, &ObjectAttributes);
if (NT_SUCCESS(Status))
{
/* This was indeed a safeboot, so check what kind of safeboot it was */
RtlInitUnicodeString(&ValueName, L"OptionValue");
Status = NtQueryValueKey(KeyHandle2,
&ValueName,
KeyValuePartialInformation,
PartialInfo,
sizeof(ValueBuffer),
&ResultLength);
NtClose(KeyHandle2);
if (NT_SUCCESS(Status) &&
(PartialInfo->Type == REG_DWORD) &&
(PartialInfo->DataLength >= sizeof(ULONG)))
{
/* Convert from the integer value to the correct specifier */
RtlInitUnicodeString(&ValueName, L"SAFEBOOT_OPTION");
switch (*(PULONG)PartialInfo->Data)
{
case 1:
wcscpy(ValueBuffer, L"MINIMAL");
break;
case 2:
wcscpy(ValueBuffer, L"NETWORK");
break;
case 3:
wcscpy(ValueBuffer, L"DSREPAIR");
break;
}
/* And write it in the environment! */
DPRINT("Setting %wZ to %S\n", &ValueName, ValueBuffer);
Status = NtSetValueKey(KeyHandle,
&ValueName,
0,
REG_SZ,
ValueBuffer,
(ULONG)(wcslen(ValueBuffer) + 1) * sizeof(WCHAR));
if (!NT_SUCCESS(Status))
{
DPRINT1("SMSS: Failed writing %wZ environment variable - %x\n",
&ValueName, Status);
NtClose(KeyHandle);
return Status;
}
}
else
{
DPRINT1("SMSS: Failed to query SAFEBOOT option (Type %lu, Status 0x%x)\n",
PartialInfo->Type, Status);
}
}
/* We are all done now */
NtClose(KeyHandle);
return STATUS_SUCCESS;
}
NTSTATUS
NTAPI
SmpProcessFileRenames(VOID)
{
BOOLEAN OldState, HavePrivilege = FALSE;
NTSTATUS Status;
HANDLE FileHandle, OtherFileHandle;
FILE_INFORMATION_CLASS InformationClass;
OBJECT_ATTRIBUTES ObjectAttributes;
IO_STATUS_BLOCK IoStatusBlock;
UNICODE_STRING FileString;
FILE_BASIC_INFORMATION BasicInfo;
FILE_DISPOSITION_INFORMATION DeleteInformation;
PFILE_RENAME_INFORMATION Buffer;
PLIST_ENTRY Head, NextEntry;
PSMP_REGISTRY_VALUE RegEntry;
PWCHAR FileName;
ULONG ValueLength, Length;
/* Give us access to restore any files we want */
Status = RtlAdjustPrivilege(SE_RESTORE_PRIVILEGE, TRUE, FALSE, &OldState);
if (NT_SUCCESS(Status)) HavePrivilege = TRUE;
// FIXME: Handle SFC-protected file renames!
if (SmpAllowProtectedRenames)
DPRINT1("SMSS: FIXME: Handle SFC-protected file renames!\n");
/* Process pending files to rename */
Head = &SmpFileRenameList;
while (!IsListEmpty(Head))
{
/* Get this entry */
NextEntry = RemoveHeadList(Head);
RegEntry = CONTAINING_RECORD(NextEntry, SMP_REGISTRY_VALUE, Entry);
DPRINT("Processing PFRO: '%wZ' / '%wZ'\n", &RegEntry->Value, &RegEntry->Name);
/* Skip past the '@' marker */
if (!(RegEntry->Value.Length) && (*RegEntry->Name.Buffer == L'@'))
{
RegEntry->Name.Length -= sizeof(UNICODE_NULL);
RegEntry->Name.Buffer++;
}
/* Open the file for delete access */
InitializeObjectAttributes(&ObjectAttributes,
&RegEntry->Name,
OBJ_CASE_INSENSITIVE,
NULL,
NULL);
Status = NtOpenFile(&OtherFileHandle,
DELETE | SYNCHRONIZE,
&ObjectAttributes,
&IoStatusBlock,
FILE_SHARE_READ | FILE_SHARE_WRITE,
FILE_SYNCHRONOUS_IO_NONALERT);
if (!NT_SUCCESS(Status)) goto Quickie;
/* Check if it's a rename or just a delete */
ValueLength = RegEntry->Value.Length;
if (!ValueLength)
{
/* Just a delete, set up the class, length and buffer */
InformationClass = FileDispositionInformation;
Length = sizeof(DeleteInformation);
Buffer = (PFILE_RENAME_INFORMATION)&DeleteInformation;
/* Set the delete disposition */
DeleteInformation.DeleteFile = TRUE;
}
else
{
/* This is a rename, setup the class and length */
InformationClass = FileRenameInformation;
Length = ValueLength + sizeof(FILE_RENAME_INFORMATION);
/* Skip past the special markers */
FileName = RegEntry->Value.Buffer;
if ((*FileName == L'!') || (*FileName == L'@'))
{
FileName++;
Length -= sizeof(UNICODE_NULL);
}
/* Now allocate the buffer for the rename information */
Buffer = RtlAllocateHeap(RtlGetProcessHeap(), SmBaseTag, Length);
if (Buffer)
{
/* Setup the buffer to point to the filename, and copy it */
Buffer->RootDirectory = NULL;
Buffer->FileNameLength = Length - sizeof(FILE_RENAME_INFORMATION);
Buffer->ReplaceIfExists = FileName != RegEntry->Value.Buffer;
RtlCopyMemory(Buffer->FileName, FileName, Buffer->FileNameLength);
}
else
{
/* Fail */
Status = STATUS_NO_MEMORY;
}
}
/* Check if everything is okay till here */
if (NT_SUCCESS(Status))
{
/* Now either rename or delete the file as requested */
Status = NtSetInformationFile(OtherFileHandle,
&IoStatusBlock,
Buffer,
Length,
InformationClass);
/* Check if we seem to have failed because the file was readonly */
if (!NT_SUCCESS(Status) &&
(InformationClass == FileRenameInformation) &&
(Status == STATUS_OBJECT_NAME_COLLISION) &&
Buffer->ReplaceIfExists)
{
/* Open the file for write attribute access this time... */
DPRINT("\nSMSS: '%wZ' => '%wZ' failed - Status == %x, Possible readonly target\n",
&RegEntry->Name,
&RegEntry->Value,
STATUS_OBJECT_NAME_COLLISION);
FileString.Length = RegEntry->Value.Length - sizeof(WCHAR);
FileString.MaximumLength = RegEntry->Value.MaximumLength - sizeof(WCHAR);
FileString.Buffer = FileName;
InitializeObjectAttributes(&ObjectAttributes,
&FileString,
OBJ_CASE_INSENSITIVE,
NULL,
NULL);
Status = NtOpenFile(&FileHandle,
FILE_WRITE_ATTRIBUTES | SYNCHRONIZE,
&ObjectAttributes,
&IoStatusBlock,
FILE_SHARE_READ | FILE_SHARE_WRITE,
FILE_SYNCHRONOUS_IO_NONALERT);
if (!NT_SUCCESS(Status))
{
/* That didn't work, so bail out */
DPRINT1(" SMSS: Open Existing file Failed - Status == %x\n",
Status);
}
else
{
/* Now remove the read-only attribute from the file */
DPRINT(" SMSS: Open Existing Success\n");
RtlZeroMemory(&BasicInfo, sizeof(BasicInfo));
BasicInfo.FileAttributes = FILE_ATTRIBUTE_NORMAL;
Status = NtSetInformationFile(FileHandle,
&IoStatusBlock,
&BasicInfo,
sizeof(BasicInfo),
FileBasicInformation);
NtClose(FileHandle);
if (!NT_SUCCESS(Status))
{
/* That didn't work, bail out */
DPRINT1(" SMSS: Set To NORMAL Failed - Status == %x\n",
Status);
}
else
{
/* Now that the file is no longer read-only, delete! */
DPRINT(" SMSS: Set To NORMAL OK\n");
Status = NtSetInformationFile(OtherFileHandle,
&IoStatusBlock,
Buffer,
Length,
FileRenameInformation);
if (!NT_SUCCESS(Status))
{
/* That failed too! */
DPRINT1(" SMSS: Re-Rename Failed - Status == %x\n",
Status);
}
else
{
/* Everything ok */
DPRINT(" SMSS: Re-Rename Worked OK\n");
}
}
}
}
}
/* Close the file handle and check the operation result */
NtClose(OtherFileHandle);
Quickie:
if (!NT_SUCCESS(Status))
{
/* We totally failed */
DPRINT1("SMSS: '%wZ' => '%wZ' failed - Status == %x\n",
&RegEntry->Name, &RegEntry->Value, Status);
}
else if (RegEntry->Value.Length)
{
/* We succeed with a rename */
DPRINT("SMSS: '%wZ' (renamed to) '%wZ'\n", &RegEntry->Name, &RegEntry->Value);
}
else
{
/* We succeeded with a delete */
DPRINT("SMSS: '%wZ' (deleted)\n", &RegEntry->Name);
}
/* Now free this entry and keep going */
if (RegEntry->AnsiValue) RtlFreeHeap(RtlGetProcessHeap(), 0, RegEntry->AnsiValue);
if (RegEntry->Value.Buffer) RtlFreeHeap(RtlGetProcessHeap(), 0, RegEntry->Value.Buffer);
RtlFreeHeap(RtlGetProcessHeap(), 0, RegEntry);
}
/* Put back the restore privilege if we had requested it, and return */
if (HavePrivilege) RtlAdjustPrivilege(SE_RESTORE_PRIVILEGE, FALSE, FALSE, &OldState);
return Status;
}
NTSTATUS
NTAPI
SmpLoadDataFromRegistry(OUT PUNICODE_STRING InitialCommand)
{
NTSTATUS Status;
PLIST_ENTRY Head, NextEntry;
PSMP_REGISTRY_VALUE RegEntry;
PVOID OriginalEnvironment;
ULONG MuSessionId = 0;
OBJECT_ATTRIBUTES ObjectAttributes;
HANDLE KeyHandle;
UNICODE_STRING DestinationString;
/* Initialize the keywords we'll be looking for */
RtlInitUnicodeString(&SmpDebugKeyword, L"debug");
RtlInitUnicodeString(&SmpASyncKeyword, L"async");
RtlInitUnicodeString(&SmpAutoChkKeyword, L"autocheck");
/* Initialize all the registry-associated list heads */
InitializeListHead(&SmpBootExecuteList);
InitializeListHead(&SmpSetupExecuteList);
InitializeListHead(&SmpPagingFileList);
InitializeListHead(&SmpDosDevicesList);
InitializeListHead(&SmpFileRenameList);
InitializeListHead(&SmpKnownDllsList);
InitializeListHead(&SmpExcludeKnownDllsList);
InitializeListHead(&SmpSubSystemList);
InitializeListHead(&SmpSubSystemsToLoad);
InitializeListHead(&SmpSubSystemsToDefer);
InitializeListHead(&SmpExecuteList);
SmpPagingFileInitialize();
/* Initialize the SMSS environment */
Status = RtlCreateEnvironment(TRUE, &SmpDefaultEnvironment);
if (!NT_SUCCESS(Status))
{
/* Fail if there was a problem */
DPRINT1("SMSS: Unable to allocate default environment - Status == %X\n",
Status);
SMSS_CHECKPOINT(RtlCreateEnvironment, Status);
return Status;
}
/* Check if we were booted in PE mode (LiveCD should have this) */
RtlInitUnicodeString(&DestinationString,
L"\\Registry\\Machine\\System\\CurrentControlSet\\"
L"Control\\MiniNT");
InitializeObjectAttributes(&ObjectAttributes,
&DestinationString,
OBJ_CASE_INSENSITIVE,
NULL,
NULL);
Status = NtOpenKey(&KeyHandle, KEY_ALL_ACCESS, &ObjectAttributes);
if (NT_SUCCESS(Status))
{
/* If the key exists, we were */
NtClose(KeyHandle);
MiniNTBoot = TRUE;
}
/* Print out if this is the case */
if (MiniNTBoot) DPRINT("SMSS: !!! MiniNT Boot !!!\n");
/* Open the environment key to see if we are booted in safe mode */
RtlInitUnicodeString(&DestinationString,
L"\\Registry\\Machine\\System\\CurrentControlSet\\"
L"Control\\Session Manager\\Environment");
InitializeObjectAttributes(&ObjectAttributes,
&DestinationString,
OBJ_CASE_INSENSITIVE,
NULL,
NULL);
Status = NtOpenKey(&KeyHandle, KEY_ALL_ACCESS, &ObjectAttributes);
if (NT_SUCCESS(Status))
{
/* Delete the value if we found it */
RtlInitUnicodeString(&DestinationString, L"SAFEBOOT_OPTION");
NtDeleteValueKey(KeyHandle, &DestinationString);
NtClose(KeyHandle);
}
/* Switch environments, then query the registry for all needed settings */
OriginalEnvironment = NtCurrentPeb()->ProcessParameters->Environment;
NtCurrentPeb()->ProcessParameters->Environment = SmpDefaultEnvironment;
Status = RtlQueryRegistryValues(RTL_REGISTRY_CONTROL,
L"Session Manager",
SmpRegistryConfigurationTable,
NULL,
NULL);
SmpDefaultEnvironment = NtCurrentPeb()->ProcessParameters->Environment;
NtCurrentPeb()->ProcessParameters->Environment = OriginalEnvironment;
if (!NT_SUCCESS(Status))
{
/* We failed somewhere in registry initialization, which is bad... */
DPRINT1("SMSS: RtlQueryRegistryValues failed - Status == %lx\n", Status);
SMSS_CHECKPOINT(RtlQueryRegistryValues, Status);
return Status;
}
/* Now we can start acting on the registry settings. First to DOS devices */
Status = SmpInitializeDosDevices();
if (!NT_SUCCESS(Status))
{
/* Failed */
DPRINT1("SMSS: Unable to initialize DosDevices configuration - Status == %lx\n",
Status);
SMSS_CHECKPOINT(SmpInitializeDosDevices, Status);
return Status;
}
/* Next create the session directory... */
RtlInitUnicodeString(&DestinationString, L"\\Sessions");
InitializeObjectAttributes(&ObjectAttributes,
&DestinationString,
OBJ_CASE_INSENSITIVE | OBJ_OPENIF | OBJ_PERMANENT,
NULL,
SmpPrimarySecurityDescriptor);
Status = NtCreateDirectoryObject(&SmpSessionsObjectDirectory,
DIRECTORY_ALL_ACCESS,
&ObjectAttributes);
if (!NT_SUCCESS(Status))
{
/* Fail */
DPRINT1("SMSS: Unable to create %wZ object directory - Status == %lx\n",
&DestinationString, Status);
SMSS_CHECKPOINT(NtCreateDirectoryObject, Status);
return Status;
}
/* Next loop all the boot execute binaries */
Head = &SmpBootExecuteList;
while (!IsListEmpty(Head))
{
/* Remove each one from the list */
NextEntry = RemoveHeadList(Head);
/* Execute it */
RegEntry = CONTAINING_RECORD(NextEntry, SMP_REGISTRY_VALUE, Entry);
SmpExecuteCommand(&RegEntry->Name, 0, NULL, 0);
/* And free it */
if (RegEntry->AnsiValue) RtlFreeHeap(RtlGetProcessHeap(), 0, RegEntry->AnsiValue);
if (RegEntry->Value.Buffer) RtlFreeHeap(RtlGetProcessHeap(), 0, RegEntry->Value.Buffer);
RtlFreeHeap(RtlGetProcessHeap(), 0, RegEntry);
}
/* Now do any pending file rename operations... */
if (!MiniNTBoot) SmpProcessFileRenames();
/* And initialize known DLLs... */
Status = SmpInitializeKnownDlls();
if (!NT_SUCCESS(Status))
{
/* Fail if that didn't work */
DPRINT1("SMSS: Unable to initialize KnownDll configuration - Status == %lx\n",
Status);
SMSS_CHECKPOINT(SmpInitializeKnownDlls, Status);
return Status;
}
/* Create the needed page files */
if (!MiniNTBoot)
{
/* Loop every page file */
Head = &SmpPagingFileList;
while (!IsListEmpty(Head))
{
/* Remove each one from the list */
NextEntry = RemoveHeadList(Head);
/* Create the descriptor for it */
RegEntry = CONTAINING_RECORD(NextEntry, SMP_REGISTRY_VALUE, Entry);
SmpCreatePagingFileDescriptor(&RegEntry->Name);
/* And free it */
if (RegEntry->AnsiValue) RtlFreeHeap(RtlGetProcessHeap(), 0, RegEntry->AnsiValue);
if (RegEntry->Value.Buffer) RtlFreeHeap(RtlGetProcessHeap(), 0, RegEntry->Value.Buffer);
RtlFreeHeap(RtlGetProcessHeap(), 0, RegEntry);
}
/* Now create all the paging files for the descriptors that we have */
SmpCreatePagingFiles();
}
/* Tell Cm it's now safe to fully enable write access to the registry */
NtInitializeRegistry(CM_BOOT_FLAG_SMSS);
/* Create all the system-based environment variables for later inheriting */
Status = SmpCreateDynamicEnvironmentVariables();
if (!NT_SUCCESS(Status))
{
/* Handle failure */
SMSS_CHECKPOINT(SmpCreateDynamicEnvironmentVariables, Status);
return Status;
}
/* And finally load all the subsystems for our first session! */
Status = SmpLoadSubSystemsForMuSession(&MuSessionId,
&SmpWindowsSubSysProcessId,
InitialCommand);
ASSERT(MuSessionId == 0);
if (!NT_SUCCESS(Status)) SMSS_CHECKPOINT(SmpLoadSubSystemsForMuSession, Status);
return Status;
}
NTSTATUS
NTAPI
SmpInit(IN PUNICODE_STRING InitialCommand,
OUT PHANDLE ProcessHandle)
{
NTSTATUS Status, Status2;
OBJECT_ATTRIBUTES ObjectAttributes;
UNICODE_STRING PortName, EventName;
HANDLE EventHandle, PortHandle;
ULONG HardErrorMode;
/* Create the SMSS Heap */
SmBaseTag = RtlCreateTagHeap(RtlGetProcessHeap(),
0,
L"SMSS!",
L"INIT");
SmpHeap = RtlGetProcessHeap();
/* Enable hard errors */
HardErrorMode = TRUE;
NtSetInformationProcess(NtCurrentProcess(),
ProcessDefaultHardErrorMode,
&HardErrorMode,
sizeof(HardErrorMode));
/* Initialize the subsystem list and the session list, plus their locks */
RtlInitializeCriticalSection(&SmpKnownSubSysLock);
InitializeListHead(&SmpKnownSubSysHead);
RtlInitializeCriticalSection(&SmpSessionListLock);
InitializeListHead(&SmpSessionListHead);
/* Initialize the process list */
InitializeListHead(&NativeProcessList);
/* Initialize session parameters */
SmpNextSessionId = 1;
SmpNextSessionIdScanMode = FALSE;
SmpDbgSsLoaded = FALSE;
/* Create the initial security descriptors */
Status = SmpCreateSecurityDescriptors(TRUE);
if (!NT_SUCCESS(Status))
{
/* Fail */
SMSS_CHECKPOINT(SmpCreateSecurityDescriptors, Status);
return Status;
}
/* Initialize subsystem names */
RtlInitUnicodeString(&SmpSubsystemName, L"NT-Session Manager");
RtlInitUnicodeString(&PosixName, L"POSIX");
RtlInitUnicodeString(&Os2Name, L"OS2");
/* Create the SM API Port */
RtlInitUnicodeString(&PortName, L"\\SmApiPort");
InitializeObjectAttributes(&ObjectAttributes, &PortName, 0, NULL, SmpApiPortSecurityDescriptor);
Status = NtCreatePort(&PortHandle,
&ObjectAttributes,
sizeof(SB_CONNECTION_INFO),
sizeof(SM_API_MSG),
sizeof(SB_API_MSG) * 32);
ASSERT(NT_SUCCESS(Status));
SmpDebugPort = PortHandle;
/* Create two SM API threads */
Status = RtlCreateUserThread(NtCurrentProcess(),
NULL,
FALSE,
0,
0,
0,
SmpApiLoop,
PortHandle,
NULL,
NULL);
ASSERT(NT_SUCCESS(Status));
Status = RtlCreateUserThread(NtCurrentProcess(),
NULL,
FALSE,
0,
0,
0,
SmpApiLoop,
PortHandle,
NULL,
NULL);
ASSERT(NT_SUCCESS(Status));
/* Create the write event that autochk can set after running */
RtlInitUnicodeString(&EventName, L"\\Device\\VolumesSafeForWriteAccess");
InitializeObjectAttributes(&ObjectAttributes,
&EventName,
OBJ_PERMANENT,
NULL,
NULL);
Status2 = NtCreateEvent(&EventHandle,
EVENT_ALL_ACCESS,
&ObjectAttributes,
0,
0);
if (!NT_SUCCESS(Status2))
{
/* Should never really fail */
DPRINT1("SMSS: Unable to create %wZ event - Status == %lx\n",
&EventName, Status2);
ASSERT(NT_SUCCESS(Status2));
}
/* Now initialize everything else based on the registry parameters */
Status = SmpLoadDataFromRegistry(InitialCommand);
if (NT_SUCCESS(Status))
{
/* Autochk should've run now. Set the event and save the CSRSS handle */
*ProcessHandle = SmpWindowsSubSysProcess;
NtSetEvent(EventHandle, NULL);
NtClose(EventHandle);
}
/* All done */
return Status;
}