mirror of https://github.com/tongzx/nt5src
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
1112 lines
26 KiB
1112 lines
26 KiB
/* dbg.cpp */
|
|
|
|
#include "precomp.h"
|
|
#include <oprahcom.h>
|
|
#include <cstring.hpp>
|
|
#include <regentry.h>
|
|
#include <confreg.h>
|
|
#include <confdbg.h>
|
|
|
|
#include <avUtil.h>
|
|
|
|
|
|
PSECURITY_DESCRIPTOR CreateSd( VOID);
|
|
BOOL CreateSids( PSID *BuiltInAdministrators, PSID *PowerUsers, PSID *AuthenticatedUsers);
|
|
|
|
#ifdef NM_DEBUG /* Almost the whole file */
|
|
|
|
// Special Debugbreak macro
|
|
#if defined (_M_IX86)
|
|
#define _DbgBreak() __asm { int 3 }
|
|
#else
|
|
#define _DbgBreak() DebugBreak()
|
|
#endif
|
|
|
|
// Special Mutex Macros
|
|
#define ACQMUTEX(hMutex) WaitForSingleObject(hMutex, INFINITE)
|
|
#define RELMUTEX(hMutex) ReleaseMutex(hMutex)
|
|
|
|
// Constant for GlobalAddAtom
|
|
const int CCHMAX_ATOM = 255;
|
|
|
|
// Local Variables
|
|
static PNMDBG _gpDbg = NULL; // Shared data in mmf after zone info
|
|
static HANDLE _ghMutexFile = NULL; // Mutex for writing to file
|
|
static PZONEINFO _gprgZoneInfo = NULL; // the address in which the zone is mapped,points to an array of zones
|
|
static HANDLE _ghDbgZoneMap = NULL; // the handle of the memory mapped file for zones
|
|
static HANDLE _ghDbgZoneMutex = NULL; // Mutex for accessing Zone information
|
|
static long _gLockCount = 0;
|
|
|
|
VOID DbgCurrentTime(PCHAR psz);
|
|
|
|
|
|
/* _ D B G P R I N T F */
|
|
/*-------------------------------------------------------------------------
|
|
%%Function: _DbgPrintf
|
|
|
|
The main, low level, debug output routine.
|
|
-------------------------------------------------------------------------*/
|
|
static VOID WINAPI _DbgPrintf(LPCSTR pszFile, PCSTR pszPrefix, PCSTR pszFormat, va_list ap)
|
|
{
|
|
CHAR szOutput[1024];
|
|
PCHAR pszOutput = szOutput;
|
|
UINT cch;
|
|
|
|
if (NULL == _gprgZoneInfo)
|
|
return;
|
|
|
|
if (DBG_FMTTIME_NONE != _gpDbg->uShowTime)
|
|
{
|
|
DbgCurrentTime(pszOutput);
|
|
pszOutput += lstrlenA(pszOutput);
|
|
}
|
|
|
|
if (_gpDbg->fShowThreadId)
|
|
{
|
|
wsprintfA(pszOutput, "[%04X] ", GetCurrentThreadId());
|
|
pszOutput += lstrlenA(pszOutput);
|
|
}
|
|
|
|
if (_gpDbg->fShowModule)
|
|
{
|
|
CHAR szFile[MAX_PATH];
|
|
|
|
if ((NULL == pszPrefix) || ('\0' == *pszPrefix))
|
|
{
|
|
GetModuleFileNameA(NULL, szFile, sizeof(szFile));
|
|
pszPrefix = ExtractFileNameA(szFile);
|
|
}
|
|
|
|
lstrcpyA(pszOutput, pszPrefix);
|
|
pszOutput += lstrlenA(pszOutput);
|
|
lstrcpyA(pszOutput, " ");
|
|
pszOutput += 1;
|
|
}
|
|
|
|
wvsprintfA(pszOutput, pszFormat, ap);
|
|
|
|
|
|
// Append carriage return, if necessary
|
|
// WARNING: This code is not DBCS-safe.
|
|
cch = lstrlenA(szOutput);
|
|
if (szOutput[cch-1] == '\n')
|
|
{
|
|
if (szOutput[cch-2] != '\r')
|
|
{
|
|
lstrcpyA(&szOutput[cch-1], "\r\n");
|
|
cch++;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
lstrcpyA(&szOutput[cch], "\r\n");
|
|
cch += 2;
|
|
}
|
|
|
|
|
|
// Output to debug handler
|
|
if (_gpDbg->fOutputDebugString)
|
|
{
|
|
OutputDebugStringA(szOutput);
|
|
}
|
|
|
|
|
|
// Output to File
|
|
if (_gpDbg->fFileOutput || (NULL != pszFile))
|
|
{
|
|
HANDLE hFile;
|
|
DWORD dw;
|
|
|
|
// Lock access to file
|
|
ACQMUTEX(_ghMutexFile);
|
|
|
|
if (NULL == pszFile)
|
|
pszFile = _gpDbg->szFile;
|
|
|
|
// open a log file for appending. create if does not exist
|
|
hFile = CreateFileA(pszFile, GENERIC_WRITE, 0, NULL,
|
|
OPEN_ALWAYS, FILE_ATTRIBUTE_NORMAL, (HANDLE)NULL);
|
|
if (hFile != INVALID_HANDLE_VALUE)
|
|
{
|
|
// seek to end of file
|
|
dw = SetFilePointer(hFile, 0, NULL, FILE_END);
|
|
|
|
#ifdef TEST /* Test/Retail version truncates at 40K */
|
|
if (dw > 0x040000)
|
|
{
|
|
CloseHandle(hFile);
|
|
hFile = CreateFileA(pszFile, GENERIC_WRITE, 0, NULL,
|
|
TRUNCATE_EXISTING, FILE_ATTRIBUTE_NORMAL, (HANDLE)NULL);
|
|
}
|
|
if (INVALID_HANDLE_VALUE != hFile)
|
|
#endif
|
|
{
|
|
WriteFile(hFile, szOutput, lstrlenA(szOutput), &dw, NULL);
|
|
CloseHandle(hFile);
|
|
}
|
|
}
|
|
|
|
// Unlock access to file
|
|
RELMUTEX(_ghMutexFile);
|
|
}
|
|
|
|
// Output to viewer. This is at the end of the function because
|
|
// we potentially truncate szOutput.
|
|
if ((_gpDbg->fWinOutput) && (NULL != _gpDbg->hwndCtrl))
|
|
{
|
|
// Make sure that the string doesn't exceed the maximum atom size.
|
|
// WARNING: This code is not DBCS-safe.
|
|
static const CHAR szTruncatedSuffix[] = "...\r\n";
|
|
static const int cchTruncatedSuffix = ARRAY_ELEMENTS(szTruncatedSuffix) - 1;
|
|
|
|
if (CCHMAX_ATOM < cch)
|
|
{
|
|
lstrcpyA(&szOutput[CCHMAX_ATOM - cchTruncatedSuffix], szTruncatedSuffix);
|
|
}
|
|
|
|
ATOM aDbgAtom = GlobalAddAtomA(szOutput);
|
|
|
|
if (aDbgAtom)
|
|
{
|
|
if (!PostMessage(_gpDbg->hwndCtrl, _gpDbg->msgDisplay, (WPARAM)aDbgAtom, 0L))
|
|
{
|
|
// Unable to post Message, so free the atom
|
|
GlobalDeleteAtom(aDbgAtom);
|
|
}
|
|
}
|
|
}
|
|
|
|
}
|
|
|
|
|
|
PSTR WINAPI DbgZPrintf(HDBGZONE hZone, UINT iZone, PSTR pszFormat,...)
|
|
{
|
|
CHAR sz[MAXSIZE_OF_MODULENAME+MAXSIZE_OF_ZONENAME+1];
|
|
PCHAR psz;
|
|
va_list v1;
|
|
va_start(v1, pszFormat);
|
|
|
|
if ((NULL != hZone) && (iZone < MAXNUM_OF_ZONES))
|
|
{
|
|
wsprintfA(sz, "%hs:%hs", ((PZONEINFO) hZone)->pszModule, ((PZONEINFO) hZone)->szZoneNames[iZone]);
|
|
psz = sz;
|
|
}
|
|
else
|
|
{
|
|
psz = NULL;
|
|
}
|
|
|
|
|
|
if ((NULL != hZone) && ('\0' != ((PZONEINFO) hZone)->szFile[0]))
|
|
{
|
|
// Use the private module output filename, if specified
|
|
_DbgPrintf(((PZONEINFO) hZone)->szFile, psz, pszFormat, v1);
|
|
}
|
|
else
|
|
{
|
|
_DbgPrintf(NULL, psz, pszFormat, v1);
|
|
}
|
|
|
|
va_end(v1);
|
|
return pszFormat;
|
|
}
|
|
|
|
|
|
PSTR WINAPI DbgZVPrintf(HDBGZONE hZone, UINT iZone, PSTR pszFormat, va_list ap)
|
|
{
|
|
CHAR sz[MAXSIZE_OF_MODULENAME+MAXSIZE_OF_ZONENAME+1];
|
|
PCHAR psz;
|
|
|
|
if ((NULL != hZone) && (iZone < MAXNUM_OF_ZONES))
|
|
{
|
|
wsprintfA(sz, "%hs:%hs", ((PZONEINFO) hZone)->pszModule, ((PZONEINFO) hZone)->szZoneNames[iZone]);
|
|
psz = sz;
|
|
}
|
|
else
|
|
{
|
|
psz = NULL;
|
|
}
|
|
|
|
|
|
if ((NULL != hZone) && ('\0' != ((PZONEINFO) hZone)->szFile[0]))
|
|
{
|
|
// Use the private module output filename, if specified
|
|
_DbgPrintf(((PZONEINFO) hZone)->szFile, psz, pszFormat, ap);
|
|
}
|
|
else
|
|
{
|
|
_DbgPrintf(NULL, psz, pszFormat, ap);
|
|
}
|
|
|
|
return pszFormat;
|
|
}
|
|
|
|
|
|
VOID WINAPI DbgPrintf(PCSTR pszPrefix, PCSTR pszFormat, va_list ap)
|
|
{
|
|
_DbgPrintf(NULL, pszPrefix, pszFormat, ap);
|
|
}
|
|
|
|
|
|
VOID NMINTERNAL DbgInitEx(HDBGZONE * phDbgZone, PCHAR * psz, UINT cZones, long ulZoneDefault)
|
|
{
|
|
UINT i;
|
|
HDBGZONE hDbgZone;
|
|
DBGZONEINFO dbgZoneParm;
|
|
|
|
//DbgMsg("Module %s (%d zones)", *psz, cZones);
|
|
|
|
InterlockedIncrement( &_gLockCount );
|
|
|
|
InitDbgZone();
|
|
|
|
if (cZones > MAXNUM_OF_ZONES)
|
|
cZones = MAXNUM_OF_ZONES;
|
|
|
|
|
|
ZeroMemory(&dbgZoneParm, sizeof(dbgZoneParm));
|
|
|
|
// First string is the module name
|
|
lstrcpynA(dbgZoneParm.pszModule, *psz, CCHMAX(dbgZoneParm.pszModule));
|
|
|
|
// Copy the zone names
|
|
for (i = 0; i < cZones; i++)
|
|
{
|
|
lstrcpynA(dbgZoneParm.szZoneNames[i], psz[1+i], CCHMAX(dbgZoneParm.szZoneNames[0]));
|
|
}
|
|
|
|
// Get the detault zone settings
|
|
{
|
|
RegEntry reZones(ZONES_KEY, HKEY_LOCAL_MACHINE);
|
|
dbgZoneParm.ulZoneMask = reZones.GetNumber(CUSTRING(dbgZoneParm.pszModule), ulZoneDefault);
|
|
}
|
|
|
|
hDbgZone = NmDbgCreateZone(dbgZoneParm.pszModule);
|
|
if (NULL == hDbgZone)
|
|
{
|
|
OutputDebugStringA("DbgInit: Failed to create zones!\r\n");
|
|
return;
|
|
}
|
|
|
|
NmDbgSetZone(hDbgZone, &dbgZoneParm);
|
|
*phDbgZone = hDbgZone;
|
|
}
|
|
|
|
|
|
VOID NMINTERNAL DbgDeInit(HDBGZONE * phDbgZone)
|
|
{
|
|
if (NULL == phDbgZone)
|
|
return;
|
|
|
|
if (NULL == *phDbgZone)
|
|
return;
|
|
|
|
//DbgMsg("Freeing Zone [%s]",((PZONEINFO)(*phDbgZone))->pszModule);
|
|
|
|
NmDbgDeleteZone("", *phDbgZone);
|
|
*phDbgZone = NULL;
|
|
|
|
if( 0 == InterlockedDecrement( &_gLockCount ) )
|
|
{
|
|
UnMapDebugZoneArea();
|
|
|
|
if( _ghMutexFile )
|
|
{
|
|
CloseHandle( _ghMutexFile );
|
|
_ghMutexFile = NULL;
|
|
}
|
|
|
|
if( _ghDbgZoneMutex )
|
|
{
|
|
CloseHandle( _ghDbgZoneMutex );
|
|
_ghDbgZoneMutex = NULL;
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
|
|
|
|
//////////////////////////////////////////////////////////////////////////////////
|
|
// from dbgzone.cpp
|
|
|
|
|
|
|
|
/***************************************************************************
|
|
|
|
Name : NmDbgCreateZones
|
|
|
|
Purpose : A module calls this to allocate/initialize the zone area for debugging
|
|
purposes.
|
|
|
|
Parameters: pszName - the name of the module
|
|
|
|
Returns :
|
|
|
|
Comment :
|
|
|
|
***************************************************************************/
|
|
HDBGZONE WINAPI NmDbgCreateZone(LPSTR pszName)
|
|
{
|
|
|
|
PZONEINFO pZoneInfo=NULL;
|
|
|
|
if (!(pZoneInfo = FindZoneForModule(pszName)))
|
|
pZoneInfo = AllocZoneForModule(pszName);
|
|
return ((HDBGZONE)pZoneInfo);
|
|
}
|
|
|
|
|
|
/***************************************************************************
|
|
|
|
Name : NmDbgDeleteZones
|
|
|
|
Purpose :
|
|
|
|
Parameters:
|
|
|
|
Returns :
|
|
|
|
Comment :
|
|
|
|
***************************************************************************/
|
|
void WINAPI NmDbgDeleteZone(LPSTR pszName, HDBGZONE hDbgZone)
|
|
{
|
|
//decrement reference count
|
|
PZONEINFO pZoneInfo = (PZONEINFO)hDbgZone;
|
|
|
|
ASSERT( _ghDbgZoneMutex );
|
|
|
|
ACQMUTEX(_ghDbgZoneMutex);
|
|
|
|
if (pZoneInfo)
|
|
{
|
|
pZoneInfo->ulRefCnt--;
|
|
if (pZoneInfo->ulRefCnt == 0)
|
|
{
|
|
pZoneInfo->bInUse = FALSE;
|
|
pZoneInfo->ulSignature = 0;
|
|
}
|
|
}
|
|
|
|
RELMUTEX(_ghDbgZoneMutex);
|
|
}
|
|
|
|
|
|
|
|
/***************************************************************************
|
|
|
|
Name : NmDbgSetZones
|
|
|
|
Purpose :
|
|
|
|
Parameters:
|
|
|
|
Returns :
|
|
|
|
Comment :
|
|
|
|
***************************************************************************/
|
|
BOOL WINAPI NmDbgSetZone(HDBGZONE hDbgZone, PDBGZONEINFO pZoneParam)
|
|
{
|
|
PZONEINFO pZoneInfo = (PZONEINFO)hDbgZone;
|
|
|
|
if (!pZoneInfo)
|
|
return FALSE;
|
|
|
|
if (lstrcmpA(pZoneInfo->pszModule,pZoneParam->pszModule))
|
|
return FALSE;
|
|
|
|
pZoneInfo->ulZoneMask = pZoneParam->ulZoneMask;
|
|
CopyMemory(pZoneInfo->szZoneNames, pZoneParam->szZoneNames,
|
|
(sizeof(CHAR) * MAXNUM_OF_ZONES * MAXSIZE_OF_ZONENAME));
|
|
return(TRUE);
|
|
}
|
|
|
|
|
|
|
|
/***************************************************************************
|
|
|
|
Name : NmDbgGetZoneParams
|
|
|
|
Purpose :
|
|
|
|
Parameters:
|
|
|
|
Returns :
|
|
|
|
Comment :
|
|
|
|
***************************************************************************/
|
|
BOOL WINAPI NmDbgGetAllZoneParams(PDBGZONEINFO *plpZoneParam,LPUINT puCnt)
|
|
{
|
|
UINT ui;
|
|
PZONEINFO pCurZone;
|
|
|
|
if ((NULL == plpZoneParam) || (NULL == puCnt))
|
|
return FALSE;
|
|
|
|
ACQMUTEX(_ghDbgZoneMutex);
|
|
|
|
*puCnt = 0;
|
|
for (pCurZone = _gprgZoneInfo, ui=0;
|
|
ui<MAXNUM_OF_MODULES && pCurZone!=NULL;
|
|
ui++,pCurZone++)
|
|
{
|
|
if ((pCurZone->bInUse) && (pCurZone->ulSignature == ZONEINFO_SIGN))
|
|
{
|
|
(*puCnt)++;
|
|
}
|
|
}
|
|
|
|
*plpZoneParam = _gprgZoneInfo;
|
|
|
|
RELMUTEX(_ghDbgZoneMutex);
|
|
return TRUE;
|
|
}
|
|
|
|
|
|
BOOL WINAPI NmDbgFreeZoneParams(PDBGZONEINFO pZoneParam)
|
|
{
|
|
return TRUE;
|
|
}
|
|
|
|
|
|
PZONEINFO NMINTERNAL FindZoneForModule(LPCSTR pszModule)
|
|
{
|
|
int i;
|
|
PZONEINFO pCurZone;
|
|
|
|
for (pCurZone = _gprgZoneInfo,i=0;i<MAXNUM_OF_MODULES && pCurZone!=NULL;i++,pCurZone++)
|
|
{
|
|
if ((pCurZone->bInUse) && (pCurZone->ulSignature == ZONEINFO_SIGN)
|
|
&& (!lstrcmpA(pCurZone->pszModule,pszModule)))
|
|
{
|
|
ACQMUTEX(_ghDbgZoneMutex);
|
|
pCurZone->ulRefCnt++;
|
|
RELMUTEX(_ghDbgZoneMutex);
|
|
return pCurZone;
|
|
}
|
|
}
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/***************************************************************************
|
|
|
|
Name : AllocZoneForModule
|
|
|
|
Purpose : Allocates the
|
|
|
|
Parameters:
|
|
|
|
Returns :
|
|
|
|
Comment :
|
|
|
|
***************************************************************************/
|
|
PZONEINFO NMINTERNAL AllocZoneForModule(LPCSTR pszModule)
|
|
{
|
|
int i;
|
|
PZONEINFO pCurZone;
|
|
PZONEINFO pZoneForMod=NULL;
|
|
|
|
ACQMUTEX(_ghDbgZoneMutex);
|
|
for (pCurZone = _gprgZoneInfo,i=0;
|
|
(i<MAXNUM_OF_MODULES && pCurZone!=NULL);
|
|
i++,pCurZone++)
|
|
{
|
|
if (!(pCurZone->bInUse))
|
|
{
|
|
pCurZone->bInUse = TRUE;
|
|
pCurZone->ulSignature = ZONEINFO_SIGN;
|
|
pCurZone->ulRefCnt = 1;
|
|
lstrcpyA(pCurZone->pszModule, pszModule);
|
|
pZoneForMod = pCurZone;
|
|
break;
|
|
}
|
|
}
|
|
|
|
RELMUTEX(_ghDbgZoneMutex);
|
|
return(pZoneForMod);
|
|
|
|
}
|
|
|
|
|
|
VOID NMINTERNAL SetDbgFlags(void)
|
|
{
|
|
PTSTR psz;
|
|
RegEntry reDebug(DEBUG_KEY, HKEY_LOCAL_MACHINE);
|
|
|
|
_gpDbg->fOutputDebugString = reDebug.GetNumber(REGVAL_DBG_OUTPUT, DEFAULT_DBG_OUTPUT);
|
|
_gpDbg->fWinOutput = reDebug.GetNumber(REGVAL_DBG_WIN_OUTPUT, DEFAULT_DBG_NO_WIN);
|
|
_gpDbg->fFileOutput = reDebug.GetNumber(REGVAL_DBG_FILE_OUTPUT, DEFAULT_DBG_NO_FILE);
|
|
|
|
_gpDbg->uShowTime = reDebug.GetNumber(REGVAL_DBG_SHOW_TIME, DBG_FMTTIME_NONE);
|
|
_gpDbg->fShowThreadId = reDebug.GetNumber(REGVAL_DBG_SHOW_THREADID, 0);
|
|
_gpDbg->fShowModule = reDebug.GetNumber(REGVAL_DBG_SHOW_MODULE, 0);
|
|
|
|
psz = reDebug.GetString(REGVAL_DBG_FILE);
|
|
if (0 != lstrlen(psz))
|
|
{
|
|
lstrcpyA(_gpDbg->szFile, CUSTRING(psz));
|
|
}
|
|
else
|
|
{
|
|
UINT cchFile;
|
|
|
|
cchFile = GetWindowsDirectoryA(_gpDbg->szFile, CCHMAX(_gpDbg->szFile));
|
|
_gpDbg->szFile[cchFile++] = '\\';
|
|
lstrcpyA(_gpDbg->szFile + cchFile, CUSTRING(DEFAULT_DBG_FILENAME));
|
|
}
|
|
}
|
|
|
|
|
|
VOID InitZoneMmf(PZONEINFO prgZoneInfo)
|
|
{
|
|
ZeroMemory(prgZoneInfo, CBMMFDBG);
|
|
|
|
SetDbgFlags();
|
|
}
|
|
|
|
|
|
PZONEINFO NMINTERNAL MapDebugZoneArea(void)
|
|
{
|
|
PZONEINFO prgZoneInfo = NULL;
|
|
BOOL fCreated;
|
|
PSECURITY_DESCRIPTOR sd = NULL;
|
|
SECURITY_ATTRIBUTES sa;
|
|
|
|
// Obtain a true NULL security descriptor (so if running as a service, user processes can access it)
|
|
|
|
// InitializeSecurityDescriptor(&sd, SECURITY_DESCRIPTOR_REVISION);
|
|
// SetSecurityDescriptorDacl(&sd, TRUE, NULL, FALSE); // NULL DACL = wide open
|
|
|
|
sd = CreateSd();
|
|
|
|
FillMemory(&sa, sizeof(sa), 0);
|
|
sa.nLength = sizeof(sa);
|
|
sa.lpSecurityDescriptor = sd;
|
|
|
|
//create a memory mapped object that is backed by paging file
|
|
_ghDbgZoneMap = CreateFileMapping(INVALID_HANDLE_VALUE, &sa, PAGE_READWRITE,
|
|
0, CBMMFDBG, SZ_DBG_MAPPED_ZONE);
|
|
|
|
if (_ghDbgZoneMap)
|
|
{
|
|
|
|
fCreated = (0 == GetLastError());
|
|
prgZoneInfo = (PZONEINFO) MapViewOfFile(_ghDbgZoneMap, FILE_MAP_READ|FILE_MAP_WRITE, 0,0,0);
|
|
if (NULL != prgZoneInfo)
|
|
{
|
|
// Grab pointer to shared data area
|
|
_gpDbg = (PNMDBG) (((PBYTE) prgZoneInfo) + (MAXNUM_OF_MODULES * sizeof(ZONEINFO)));
|
|
if (fCreated)
|
|
InitZoneMmf(prgZoneInfo);
|
|
}
|
|
|
|
}
|
|
|
|
if(sd)
|
|
{
|
|
HeapFree(GetProcessHeap(), 0, sd);
|
|
}
|
|
|
|
return prgZoneInfo;
|
|
}
|
|
|
|
|
|
VOID NMINTERNAL UnMapDebugZoneArea(void)
|
|
{
|
|
if (_gprgZoneInfo)
|
|
{
|
|
UnmapViewOfFile(_gprgZoneInfo);
|
|
_gprgZoneInfo = NULL;
|
|
}
|
|
|
|
ClosePh(&_ghDbgZoneMap);
|
|
}
|
|
|
|
|
|
VOID NMINTERNAL InitDbgZone(void)
|
|
{
|
|
if (NULL != _gprgZoneInfo)
|
|
return; // already initialized
|
|
|
|
_gprgZoneInfo = MapDebugZoneArea();
|
|
|
|
// Create log file data
|
|
PSECURITY_DESCRIPTOR sd = NULL;
|
|
SECURITY_ATTRIBUTES sa;
|
|
|
|
// Obtain a true NULL security descriptor (so if running as a service, user processes can access it)
|
|
|
|
// InitializeSecurityDescriptor(&sd, SECURITY_DESCRIPTOR_REVISION);
|
|
// SetSecurityDescriptorDacl(&sd, TRUE, NULL, FALSE); // NULL DACL = wide open
|
|
sd = CreateSd();
|
|
|
|
FillMemory(&sa, sizeof(sa), 0);
|
|
sa.nLength = sizeof(sa);
|
|
sa.lpSecurityDescriptor = sd;
|
|
|
|
_ghMutexFile = CreateMutex(&sa, FALSE, SZ_DBG_FILE_MUTEX);
|
|
_ghDbgZoneMutex = CreateMutex(&sa, FALSE, SZ_DBG_ZONE_MUTEX);
|
|
|
|
if (_gpDbg->fFileOutput)
|
|
{
|
|
HANDLE hFile;
|
|
DWORD dw;
|
|
CHAR sz[MAX_PATH];
|
|
SYSTEMTIME systime;
|
|
|
|
|
|
hFile = CreateFileA(_gpDbg->szFile,
|
|
GENERIC_WRITE | GENERIC_WRITE, 0, &sa,
|
|
CREATE_ALWAYS, FILE_ATTRIBUTE_NORMAL, NULL);
|
|
|
|
if (INVALID_HANDLE_VALUE == hFile)
|
|
{
|
|
_gpDbg->fFileOutput = FALSE;
|
|
goto cleanup;
|
|
}
|
|
|
|
GetLocalTime(&systime);
|
|
|
|
wsprintfA(sz,
|
|
"\r\n======== TRACE Started: %hu/%hu/%hu (%hu:%hu)\r\n",
|
|
systime.wMonth, systime.wDay, systime.wYear, systime.wHour, systime.wMinute);
|
|
|
|
SetFilePointer(hFile, 0, NULL, FILE_END);
|
|
WriteFile(hFile, sz, lstrlenA(sz), &dw, NULL);
|
|
|
|
CloseHandle(hFile);
|
|
}
|
|
|
|
cleanup:
|
|
if (sd)
|
|
{
|
|
HeapFree(GetProcessHeap(), 0, sd);
|
|
}
|
|
|
|
}
|
|
|
|
|
|
///////////////////////////////////////
|
|
// Routines for controlling debug output
|
|
|
|
BOOL WINAPI NmDbgRegisterCtl(HWND hwnd, UINT uDisplayMsg)
|
|
{
|
|
if ((NULL == _gpDbg) || (NULL != _gpDbg->hwndCtrl))
|
|
return FALSE;
|
|
|
|
_gpDbg->msgDisplay = uDisplayMsg;
|
|
_gpDbg->hwndCtrl = hwnd;
|
|
return TRUE;
|
|
}
|
|
|
|
BOOL WINAPI NmDbgDeregisterCtl(HWND hwnd)
|
|
{
|
|
if ((NULL == _gpDbg) || (hwnd != _gpDbg->hwndCtrl))
|
|
return FALSE;
|
|
|
|
_gpDbg->hwndCtrl = NULL;
|
|
_gpDbg->msgDisplay = 0;
|
|
return TRUE;
|
|
}
|
|
|
|
BOOL WINAPI NmDbgSetLoggingOptions(HWND hwnd, UINT uOptions)
|
|
{
|
|
return FALSE;
|
|
}
|
|
|
|
PNMDBG WINAPI GetPNmDbg(void)
|
|
{
|
|
return _gpDbg;
|
|
}
|
|
|
|
VOID WINAPI NmDbgSetZoneFileName(HDBGZONE hZone, LPCSTR pszFile)
|
|
{
|
|
PSTR pszZoneFile;
|
|
|
|
if (IsBadWritePtr((PVOID) hZone, sizeof(ZONEINFO)))
|
|
return;
|
|
|
|
if (((PZONEINFO) hZone)->ulSignature != ZONEINFO_SIGN)
|
|
return;
|
|
|
|
pszZoneFile = &(((PZONEINFO) hZone)->szFile[0]);
|
|
|
|
if (NULL == pszFile)
|
|
{
|
|
*pszZoneFile = '\0';
|
|
}
|
|
else
|
|
{
|
|
lstrcpynA(pszZoneFile, pszFile, CCHMAX(((PZONEINFO) hZone)->szFile));
|
|
}
|
|
}
|
|
|
|
/* D B G C U R R E N T T I M E */
|
|
/*-------------------------------------------------------------------------
|
|
%%Function: DbgCurrentTime
|
|
|
|
Format the current time
|
|
-------------------------------------------------------------------------*/
|
|
VOID DbgCurrentTime(PCHAR psz)
|
|
{
|
|
if (DBG_FMTTIME_TICK == _gpDbg->uShowTime)
|
|
{
|
|
wsprintfA(psz, "[%04X] ", GetTickCount());
|
|
}
|
|
else
|
|
{
|
|
SYSTEMTIME sysTime;
|
|
GetLocalTime(&sysTime);
|
|
|
|
switch (_gpDbg->uShowTime)
|
|
{
|
|
default:
|
|
case DBG_FMTTIME_FULL:
|
|
wsprintfA(psz, "[%04d/%02d/%02d %02d:%02d:%02d.%03d] ",
|
|
sysTime.wYear, sysTime.wMonth, sysTime.wDay,
|
|
sysTime.wHour, sysTime.wMinute, sysTime.wSecond, sysTime.wMilliseconds);
|
|
break;
|
|
case DBG_FMTTIME_DAY:
|
|
wsprintfA(psz, "[%02d:%02d:%02d.%03d] ",
|
|
sysTime.wHour, sysTime.wMinute, sysTime.wSecond, sysTime.wMilliseconds);
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
|
|
|
|
/* P S Z P R I N T F */
|
|
/*-------------------------------------------------------------------------
|
|
%%Function: PszPrintf
|
|
|
|
Utility function to wsprintf a string for debug.
|
|
-------------------------------------------------------------------------*/
|
|
PSTR PszPrintf(PCSTR pszFormat,...)
|
|
{
|
|
PSTR psz = (PSTR) LocalAlloc(LMEM_FIXED, MAX_PATH);
|
|
if (NULL != psz)
|
|
{
|
|
va_list v1;
|
|
va_start(v1, pszFormat);
|
|
wvsprintfA(psz, pszFormat, v1);
|
|
va_end(v1);
|
|
}
|
|
return psz;
|
|
}
|
|
|
|
|
|
/* D E B U G T R A P F N */
|
|
/*-------------------------------------------------------------------------
|
|
%%Function: DebugTrapFn
|
|
-------------------------------------------------------------------------*/
|
|
VOID NMINTERNAL DebugTrapFn(VOID)
|
|
{
|
|
_DbgBreak();
|
|
}
|
|
|
|
|
|
VOID DebugPrintfTraceMem(LPCSTR pszFormat,...)
|
|
{
|
|
// DO NOTHING
|
|
va_list arglist;
|
|
|
|
va_start(arglist, pszFormat);
|
|
va_end(arglist);
|
|
}
|
|
|
|
|
|
|
|
#endif /* NM_DEBUG - almost the whole file */
|
|
/*************************************************************************/
|
|
|
|
|
|
const int RPF_UNKNOWN = 0;
|
|
const int RPF_ENABLED = 1;
|
|
const int RPF_DISABLED = 2;
|
|
|
|
static int gRpf = RPF_UNKNOWN;
|
|
static TCHAR gszRetailOutputFilename[MAX_PATH]; // retail trace filename
|
|
|
|
|
|
/* F E N A B L E D R E T A I L P R I N T F */
|
|
/*-------------------------------------------------------------------------
|
|
%%Function: FEnabledRetailPrintf
|
|
|
|
Return TRUE if retail output is enabled.
|
|
-------------------------------------------------------------------------*/
|
|
BOOL FEnabledRetailPrintf(VOID)
|
|
{
|
|
if (RPF_UNKNOWN == gRpf)
|
|
{
|
|
RegEntry reDebug(DEBUG_KEY, HKEY_LOCAL_MACHINE);
|
|
gRpf = reDebug.GetNumber(REGVAL_RETAIL_LOG, RPF_DISABLED);
|
|
if ((RPF_ENABLED != gRpf) ||
|
|
(!GetInstallDirectory(gszRetailOutputFilename)) )
|
|
{
|
|
gRpf = RPF_DISABLED;
|
|
}
|
|
else
|
|
{
|
|
lstrcat(gszRetailOutputFilename, RETAIL_LOG_FILENAME);
|
|
}
|
|
|
|
}
|
|
|
|
return (RPF_ENABLED == gRpf);
|
|
}
|
|
|
|
|
|
/* R E T A I L P R I N T F T R A C E */
|
|
/*-------------------------------------------------------------------------
|
|
%%Function: RetailPrintfTrace
|
|
|
|
Print retail information to a file
|
|
-------------------------------------------------------------------------*/
|
|
VOID WINAPI RetailPrintfTrace(LPCSTR pszFormat,...)
|
|
{
|
|
HANDLE hFile;
|
|
va_list v1;
|
|
CHAR szOutput[1024];
|
|
|
|
if (!FEnabledRetailPrintf())
|
|
return; // Retail output is disabled
|
|
|
|
va_start(v1, pszFormat);
|
|
|
|
|
|
#ifdef DEBUG
|
|
// Also use normal output mechanism for debug builds
|
|
_DbgPrintf(NULL, "Retail:PrintfTrace", pszFormat, v1);
|
|
#endif
|
|
|
|
wvsprintfA(szOutput, pszFormat, v1);
|
|
|
|
// Always append the CRLF
|
|
ASSERT(lstrlenA(szOutput) < (CCHMAX(szOutput)-2));
|
|
lstrcatA(szOutput, "\r\n");
|
|
|
|
|
|
// open a log file for appending. create if does not exist
|
|
hFile = CreateFile(gszRetailOutputFilename, GENERIC_WRITE,
|
|
0, NULL, OPEN_ALWAYS, FILE_ATTRIBUTE_NORMAL, (HANDLE)NULL);
|
|
if (hFile != INVALID_HANDLE_VALUE)
|
|
{
|
|
// seek to end of file
|
|
DWORD dw = SetFilePointer(hFile, 0, NULL, FILE_END);
|
|
WriteFile(hFile, szOutput, lstrlenA(szOutput), &dw, NULL);
|
|
CloseHandle(hFile);
|
|
}
|
|
|
|
va_end(v1);
|
|
}
|
|
|
|
|
|
|
|
//
|
|
// CreateSids
|
|
//
|
|
// Create 3 Security IDs
|
|
//
|
|
// Caller must free memory allocated to SIDs on success.
|
|
//
|
|
// Returns: TRUE if successfull, FALSE if not.
|
|
//
|
|
|
|
|
|
BOOL
|
|
CreateSids(
|
|
PSID *BuiltInAdministrators,
|
|
PSID *PowerUsers,
|
|
PSID *AuthenticatedUsers
|
|
)
|
|
{
|
|
//
|
|
// An SID is built from an Identifier Authority and a set of Relative IDs
|
|
// (RIDs). The Authority of interest to us SECURITY_NT_AUTHORITY.
|
|
//
|
|
|
|
SID_IDENTIFIER_AUTHORITY NtAuthority = SECURITY_NT_AUTHORITY;
|
|
|
|
//
|
|
// Each RID represents a sub-unit of the authority. Two of the SIDs we
|
|
// want to build, Local Administrators, and Power Users, are in the "built
|
|
// in" domain. The other SID, for Authenticated users, is based directly
|
|
// off of the authority.
|
|
//
|
|
// For examples of other useful SIDs consult the list in
|
|
// \nt\public\sdk\inc\ntseapi.h.
|
|
//
|
|
|
|
if (!AllocateAndInitializeSid(&NtAuthority,
|
|
2, // 2 sub-authorities
|
|
SECURITY_BUILTIN_DOMAIN_RID,
|
|
DOMAIN_ALIAS_RID_ADMINS,
|
|
0,0,0,0,0,0,
|
|
BuiltInAdministrators)) {
|
|
|
|
// error
|
|
|
|
} else if (!AllocateAndInitializeSid(&NtAuthority,
|
|
2, // 2 sub-authorities
|
|
SECURITY_BUILTIN_DOMAIN_RID,
|
|
DOMAIN_ALIAS_RID_POWER_USERS,
|
|
0,0,0,0,0,0,
|
|
PowerUsers)) {
|
|
|
|
// error
|
|
|
|
FreeSid(*BuiltInAdministrators);
|
|
*BuiltInAdministrators = NULL;
|
|
|
|
} else if (!AllocateAndInitializeSid(&NtAuthority,
|
|
1, // 1 sub-authority
|
|
SECURITY_AUTHENTICATED_USER_RID,
|
|
0,0,0,0,0,0,0,
|
|
AuthenticatedUsers)) {
|
|
|
|
// error
|
|
|
|
FreeSid(*BuiltInAdministrators);
|
|
*BuiltInAdministrators = NULL;
|
|
|
|
FreeSid(*PowerUsers);
|
|
*PowerUsers = NULL;
|
|
|
|
} else {
|
|
return TRUE;
|
|
}
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
|
|
//
|
|
// CreateSd
|
|
//
|
|
// Creates a SECURITY_DESCRIPTOR with specific DACLs. Modify the code to
|
|
// change.
|
|
//
|
|
// Caller must free the returned buffer if not NULL.
|
|
//
|
|
|
|
PSECURITY_DESCRIPTOR
|
|
CreateSd(
|
|
VOID
|
|
)
|
|
{
|
|
PSID AuthenticatedUsers;
|
|
PSID BuiltInAdministrators;
|
|
PSID PowerUsers;
|
|
|
|
if (!CreateSids(&BuiltInAdministrators,
|
|
&PowerUsers,
|
|
&AuthenticatedUsers)) {
|
|
|
|
// error
|
|
|
|
} else {
|
|
|
|
//
|
|
// Calculate the size of and allocate a buffer for the DACL, we need
|
|
// this value independently of the total alloc size for ACL init.
|
|
//
|
|
|
|
PSECURITY_DESCRIPTOR Sd = NULL;
|
|
ULONG AclSize;
|
|
|
|
//
|
|
// "- sizeof (ULONG)" represents the SidStart field of the
|
|
// ACCESS_ALLOWED_ACE. Since we're adding the entire length of the
|
|
// SID, this field is counted twice.
|
|
//
|
|
|
|
AclSize = sizeof (ACL) +
|
|
(3 * (sizeof (ACCESS_ALLOWED_ACE) - sizeof (ULONG))) +
|
|
GetLengthSid(AuthenticatedUsers) +
|
|
GetLengthSid(BuiltInAdministrators) +
|
|
GetLengthSid(PowerUsers);
|
|
|
|
Sd = (PSECURITY_DESCRIPTOR) HeapAlloc(GetProcessHeap(), 0, SECURITY_DESCRIPTOR_MIN_LENGTH + AclSize);
|
|
|
|
if (!Sd) {
|
|
|
|
// error
|
|
|
|
} else {
|
|
|
|
ACL *Acl;
|
|
|
|
Acl = (ACL *)((BYTE *)Sd + SECURITY_DESCRIPTOR_MIN_LENGTH);
|
|
|
|
if (!InitializeAcl(Acl,
|
|
AclSize,
|
|
ACL_REVISION)) {
|
|
|
|
// error
|
|
|
|
} else if (!AddAccessAllowedAce(Acl,
|
|
ACL_REVISION,
|
|
SYNCHRONIZE | GENERIC_READ,
|
|
AuthenticatedUsers)) {
|
|
|
|
// Failed to build the ACE granting "Authenticated users"
|
|
// (SYNCHRONIZE | GENERIC_READ) access.
|
|
|
|
} else if (!AddAccessAllowedAce(Acl,
|
|
ACL_REVISION,
|
|
SYNCHRONIZE | GENERIC_READ | GENERIC_WRITE,
|
|
PowerUsers)) {
|
|
|
|
// Failed to build the ACE granting "Power users"
|
|
// (SYNCHRONIZE | GENERIC_READ | GENERIC_WRITE) access.
|
|
|
|
} else if (!AddAccessAllowedAce(Acl,
|
|
ACL_REVISION,
|
|
GENERIC_ALL,
|
|
BuiltInAdministrators)) {
|
|
|
|
// Failed to build the ACE granting "Built-in Administrators"
|
|
// GENERIC_ALL access.
|
|
|
|
} else if (!InitializeSecurityDescriptor(Sd,
|
|
SECURITY_DESCRIPTOR_REVISION)) {
|
|
|
|
// error
|
|
|
|
} else if (!SetSecurityDescriptorDacl(Sd,
|
|
TRUE,
|
|
Acl,
|
|
FALSE)) {
|
|
|
|
// error
|
|
|
|
} else {
|
|
FreeSid(AuthenticatedUsers);
|
|
FreeSid(BuiltInAdministrators);
|
|
FreeSid(PowerUsers);
|
|
|
|
return Sd;
|
|
}
|
|
|
|
HeapFree(GetProcessHeap(), 0, Sd);
|
|
}
|
|
|
|
FreeSid(AuthenticatedUsers);
|
|
FreeSid(BuiltInAdministrators);
|
|
FreeSid(PowerUsers);
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
|