mirror of https://github.com/tongzx/nt5src
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
2101 lines
63 KiB
2101 lines
63 KiB
/*++
|
|
|
|
Copyright (c) 1989-2000 Microsoft Corporation
|
|
|
|
Module Name:
|
|
|
|
check.c
|
|
|
|
Abstract:
|
|
|
|
This module implements the main API that CreateProcess
|
|
calls to check if an EXE is shimmed or apphelpped.
|
|
|
|
Author:
|
|
|
|
vadimb created sometime in 2000
|
|
|
|
Revision History:
|
|
|
|
clupu cleanup 12/27/2000
|
|
andyseti added ApphelpCheckExe 03/29/2001
|
|
andyseti added ApphelpCheckInstallShieldPackage 06/28/2001
|
|
--*/
|
|
|
|
#include "apphelp.h"
|
|
|
|
|
|
extern HINSTANCE ghInstance;
|
|
|
|
//
|
|
// Prototypes of internal functions
|
|
//
|
|
void
|
|
GetExeNTVDMData(
|
|
IN HSDB hSDB, // the SDB context
|
|
IN PSDBQUERYRESULT psdbQuery, // the EXEs and LAYERs that are active
|
|
OUT WCHAR* pszCompatLayer, // The new compat layer variable. with format:
|
|
// "Alpha Bravo Charlie"
|
|
OUT PNTVDM_FLAGS pFlags // The flags
|
|
);
|
|
|
|
|
|
//
|
|
// Appcompat Infrastructure disable-via-policy-flag
|
|
//
|
|
DWORD gdwInfrastructureFlags; // initialized to 0
|
|
|
|
#define APPCOMPAT_INFRA_DISABLED 0x00000001
|
|
#define APPCOMPAT_INFRA_VALID_FLAG 0x80000000
|
|
|
|
#define IsAppcompatInfrastructureDisabled() \
|
|
(!!( (gdwInfrastructureFlags & APPCOMPAT_INFRA_VALID_FLAG) ? \
|
|
(gdwInfrastructureFlags & APPCOMPAT_INFRA_DISABLED) : \
|
|
(CheckAppcompatInfrastructureFlags() & APPCOMPAT_INFRA_DISABLED)) )
|
|
|
|
|
|
DWORD
|
|
CheckAppcompatInfrastructureFlags(
|
|
VOID
|
|
);
|
|
|
|
|
|
#if DBG
|
|
|
|
BOOL
|
|
bDebugChum(
|
|
void
|
|
)
|
|
/*++
|
|
Return: TRUE on success, FALSE otherwise.
|
|
|
|
Desc: Checks an env var. If the var is present return TRUE.
|
|
--*/
|
|
{
|
|
UNICODE_STRING ustrDebugChum;
|
|
UNICODE_STRING ustrDebugChumVal = { 0 };
|
|
NTSTATUS Status;
|
|
|
|
RtlInitUnicodeString(&ustrDebugChum, L"DEBUG_OFFLINE_CONTENT");
|
|
|
|
Status = RtlQueryEnvironmentVariable_U(NULL,
|
|
&ustrDebugChum,
|
|
&ustrDebugChumVal);
|
|
|
|
if (Status == STATUS_BUFFER_TOO_SMALL) {
|
|
return TRUE;
|
|
}
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
#else // DBG
|
|
#define bDebugChum() TRUE
|
|
#endif // DBG
|
|
|
|
BOOL
|
|
GetExeID(
|
|
IN PDB pdb, // the pointer to the database
|
|
IN TAGID tiExe, // the TAGID of the EXE for which we need the ID
|
|
OUT GUID* pGuid // will receive the EXE's ID
|
|
)
|
|
/*++
|
|
Return: TRUE on success, FALSE otherwise.
|
|
|
|
Desc: Reads the EXE's ID from the database using the EXE's tag id.
|
|
--*/
|
|
{
|
|
TAGID tiExeID;
|
|
|
|
tiExeID = SdbFindFirstTag(pdb, tiExe, TAG_EXE_ID);
|
|
|
|
if (tiExeID == TAGID_NULL) {
|
|
DBGPRINT((sdlError, "GetExeID", "EXE tag 0x%x without an ID !\n", tiExe));
|
|
return FALSE;
|
|
}
|
|
|
|
if (!SdbReadBinaryTag(pdb, tiExeID, (PBYTE)pGuid, sizeof(*pGuid))) {
|
|
DBGPRINT((sdlError, "GetExeID", "Cannot read the ID for EXE tag 0x%x.\n", tiExe));
|
|
return FALSE;
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
|
|
BOOL
|
|
GetExeIDByTagRef(
|
|
IN HSDB hSDB, // handle to the database object
|
|
IN TAGREF trExe, // EXE tag ref
|
|
OUT GUID* pGuid // will receive the EXE's ID
|
|
)
|
|
/*++
|
|
Return: TRUE on success, FALSE otherwise.
|
|
|
|
Desc: Reads the EXE's ID from the database using the EXE's tag ref.
|
|
--*/
|
|
{
|
|
PDB pdb;
|
|
TAGID tiExe;
|
|
TAGID tiExeID;
|
|
|
|
if (!SdbTagRefToTagID(hSDB, trExe, &pdb, &tiExe)) {
|
|
DBGPRINT((sdlError,
|
|
"GetExeIDByTagRef",
|
|
"Failed to get the tag id from EXE tag ref 0x%x.\n",
|
|
tiExe));
|
|
return FALSE;
|
|
}
|
|
|
|
return GetExeID(pdb, tiExe, pGuid);
|
|
}
|
|
|
|
|
|
|
|
#define APPHELP_CLSID_REG_PATH L"\\Registry\\Machine\\Software\\Classes\\CLSID\\"
|
|
#define APPHELP_INPROCSERVER32 L"\\InProcServer32"
|
|
|
|
DWORD
|
|
ResolveCOMServer(
|
|
IN REFCLSID CLSID,
|
|
OUT LPWSTR lpPath,
|
|
OUT DWORD dwBufSize)
|
|
{
|
|
DWORD dwReqBufSize = 0;
|
|
UNICODE_STRING ustrKey = { 0 };
|
|
UNICODE_STRING ustrValueName = { 0 };
|
|
UNICODE_STRING ustrGuid = { 0 };
|
|
UNICODE_STRING ustrUnexpandedValue = { 0 };
|
|
UNICODE_STRING ustrValue = { 0 };
|
|
NTSTATUS Status;
|
|
OBJECT_ATTRIBUTES ObjectAttributes;
|
|
HANDLE KeyHandle = NULL;
|
|
PKEY_VALUE_FULL_INFORMATION pKeyValueInfo = NULL;
|
|
DWORD dwKeyValueInfoSize = 0;
|
|
DWORD dwKeyValueInfoReqSize = 0;
|
|
LPWSTR wszCLSIDRegFullPath = NULL;
|
|
WCHAR wszCLSID[41] = { 0 };
|
|
|
|
wszCLSIDRegFullPath = RtlAllocateHeap(
|
|
RtlProcessHeap(),
|
|
HEAP_ZERO_MEMORY,
|
|
(wcslen(APPHELP_CLSID_REG_PATH) +
|
|
wcslen(APPHELP_INPROCSERVER32) + 64)
|
|
* sizeof(WCHAR));
|
|
// Enough for path + CLSID in string form
|
|
|
|
if (wszCLSIDRegFullPath == NULL) {
|
|
DBGPRINT((sdlInfo,
|
|
"SdbResolveCOMServer",
|
|
"Memory allocation failure\n"));
|
|
goto Done;
|
|
}
|
|
|
|
wcscpy(wszCLSIDRegFullPath, APPHELP_CLSID_REG_PATH);
|
|
|
|
Status = RtlStringFromGUID(CLSID, &ustrGuid);
|
|
if (!NT_SUCCESS(Status)) {
|
|
DBGPRINT((sdlInfo,
|
|
"SdbResolveCOMServer",
|
|
"Malformed CLSID\n"));
|
|
goto Done;
|
|
}
|
|
|
|
if (ustrGuid.Length/sizeof(WCHAR) > 40) {
|
|
DBGPRINT((sdlInfo,
|
|
"SdbResolveCOMServer",
|
|
"CLSID more than 40 characters\n"));
|
|
goto Done;
|
|
}
|
|
|
|
RtlMoveMemory(wszCLSID,
|
|
ustrGuid.Buffer,
|
|
ustrGuid.Length);
|
|
|
|
wszCLSID[ustrGuid.Length/sizeof(WCHAR)] = L'\0';
|
|
|
|
wcscat(wszCLSIDRegFullPath, wszCLSID);
|
|
wcscat(wszCLSIDRegFullPath, APPHELP_INPROCSERVER32);
|
|
|
|
RtlInitUnicodeString(&ustrKey, wszCLSIDRegFullPath);
|
|
RtlInitUnicodeString(&ustrValueName, L"");
|
|
|
|
InitializeObjectAttributes(&ObjectAttributes,
|
|
&ustrKey,
|
|
OBJ_CASE_INSENSITIVE,
|
|
NULL,
|
|
NULL);
|
|
|
|
Status = NtOpenKey(&KeyHandle,
|
|
GENERIC_READ,
|
|
&ObjectAttributes);
|
|
|
|
if (!NT_SUCCESS(Status)) {
|
|
DBGPRINT((sdlInfo,
|
|
"SdbResolveCOMServer",
|
|
"Failed to open Key \"%s\" Status 0x%x\n",
|
|
wszCLSIDRegFullPath,
|
|
Status));
|
|
goto Done;
|
|
}
|
|
|
|
if (lpPath == NULL &&
|
|
dwBufSize != 0) {
|
|
DBGPRINT((sdlInfo,
|
|
"SdbResolveCOMServer",
|
|
"Bad parameters\n"));
|
|
goto Done;
|
|
}
|
|
|
|
pKeyValueInfo = RtlAllocateHeap(RtlProcessHeap(),
|
|
HEAP_ZERO_MEMORY,
|
|
dwBufSize * 2);
|
|
|
|
if (pKeyValueInfo == NULL) {
|
|
DBGPRINT((sdlInfo,
|
|
"SdbResolveCOMServer",
|
|
"Memory allocation failure\n"));
|
|
goto Done;
|
|
}
|
|
|
|
dwKeyValueInfoSize = dwBufSize * 2;
|
|
|
|
Status = NtQueryValueKey(KeyHandle,
|
|
&ustrValueName,
|
|
KeyValueFullInformation,
|
|
pKeyValueInfo,
|
|
dwKeyValueInfoSize,
|
|
&dwKeyValueInfoReqSize);
|
|
|
|
if (!NT_SUCCESS(Status)) {
|
|
|
|
if (Status == STATUS_BUFFER_TOO_SMALL) {
|
|
|
|
RtlFreeHeap(RtlProcessHeap(), 0, pKeyValueInfo);
|
|
|
|
pKeyValueInfo = RtlAllocateHeap(RtlProcessHeap(),
|
|
HEAP_ZERO_MEMORY,
|
|
dwKeyValueInfoReqSize);
|
|
|
|
if (pKeyValueInfo == NULL) {
|
|
DBGPRINT((sdlInfo,
|
|
"SdbResolveCOMServer",
|
|
"Memory allocation failure\n"));
|
|
goto Done;
|
|
}
|
|
|
|
dwKeyValueInfoSize = dwKeyValueInfoReqSize;
|
|
|
|
Status = NtQueryValueKey(KeyHandle,
|
|
&ustrValueName,
|
|
KeyValueFullInformation,
|
|
pKeyValueInfo,
|
|
dwKeyValueInfoSize,
|
|
&dwKeyValueInfoReqSize);
|
|
|
|
if (!NT_SUCCESS(Status)) {
|
|
DBGPRINT((sdlInfo,
|
|
"SdbResolveCOMServer",
|
|
"Failed to retrieve default key value for \"%s\" Status 0x%x\n",
|
|
wszCLSIDRegFullPath,
|
|
Status));
|
|
goto Done;
|
|
}
|
|
|
|
} else {
|
|
DBGPRINT((sdlInfo,
|
|
"SdbResolveCOMServer",
|
|
"Failed to retrieve default key value for \"%s\" Status 0x%x\n",
|
|
wszCLSIDRegFullPath,
|
|
Status));
|
|
goto Done;
|
|
}
|
|
}
|
|
|
|
if (pKeyValueInfo->Type == REG_SZ) {
|
|
dwReqBufSize = pKeyValueInfo->DataLength + (1 * sizeof(WCHAR));
|
|
|
|
if (dwBufSize >= dwReqBufSize) {
|
|
RtlMoveMemory(lpPath, ((PBYTE) pKeyValueInfo) + pKeyValueInfo->DataOffset, pKeyValueInfo->DataLength);
|
|
lpPath[pKeyValueInfo->DataLength / sizeof(WCHAR)] = '\0';
|
|
}
|
|
|
|
} else if (pKeyValueInfo->Type == REG_EXPAND_SZ) {
|
|
ustrUnexpandedValue.Buffer = (PWSTR) (((PBYTE) pKeyValueInfo) + pKeyValueInfo->DataOffset);
|
|
ustrUnexpandedValue.Length = (USHORT) pKeyValueInfo->DataLength;
|
|
ustrUnexpandedValue.MaximumLength = (USHORT) pKeyValueInfo->DataLength;
|
|
ustrValue.Buffer = lpPath;
|
|
ustrValue.Length = 0;
|
|
ustrValue.MaximumLength = (USHORT) dwBufSize;
|
|
Status = RtlExpandEnvironmentStrings_U(NULL,
|
|
&ustrUnexpandedValue,
|
|
&ustrValue,
|
|
&dwReqBufSize);
|
|
|
|
if (Status == STATUS_BUFFER_TOO_SMALL) {
|
|
goto Done;
|
|
} else if (!NT_SUCCESS(Status)) {
|
|
DBGPRINT((sdlInfo,
|
|
"SdbResolveCOMServer",
|
|
"Failed to expand key value for \"%s\" Status 0x%x\n",
|
|
wszCLSIDRegFullPath,
|
|
Status));
|
|
goto Done;
|
|
}
|
|
}
|
|
|
|
DBGPRINT((sdlInfo,
|
|
"SdbResolveCOMServer",
|
|
"CLSID %s resolved to \"%s\"\n",
|
|
wszCLSID, lpPath));
|
|
|
|
Done:
|
|
|
|
if (KeyHandle != NULL) {
|
|
NtClose(KeyHandle);
|
|
}
|
|
|
|
if (wszCLSIDRegFullPath != NULL) {
|
|
RtlFreeHeap(RtlProcessHeap(), 0, wszCLSIDRegFullPath);
|
|
}
|
|
|
|
if (pKeyValueInfo != NULL) {
|
|
RtlFreeHeap(RtlProcessHeap(), 0, pKeyValueInfo);
|
|
}
|
|
|
|
if (ustrGuid.Buffer != NULL) {
|
|
RtlFreeUnicodeString(&ustrGuid);
|
|
}
|
|
|
|
return dwReqBufSize;
|
|
}
|
|
|
|
VOID
|
|
ParseSdbQueryResult(
|
|
IN HSDB hSDB,
|
|
IN PSDBQUERYRESULT pQuery,
|
|
OUT TAGREF* ptrAppHelp, // apphelp tagref, optional
|
|
OUT PAPPHELP_DATA pApphelpData, // apphelp data, optional
|
|
OUT TAGREF* ptrSxsData // fusion tagref, optional
|
|
)
|
|
{
|
|
DWORD dwIndex;
|
|
BOOL bAppHelp = FALSE;
|
|
BOOL bFusionFix = FALSE;
|
|
TAGREF trExe;
|
|
TAGREF trAppHelp = TAGREF_NULL;
|
|
TAGREF trSxsData = TAGREF_NULL;
|
|
|
|
//
|
|
// scan matching exes; we extract fusion fix (the first one we find) and apphelp data,
|
|
// also the first one we find
|
|
//
|
|
|
|
for (dwIndex = 0; dwIndex < pQuery->dwExeCount; ++dwIndex) {
|
|
trExe = pQuery->atrExes[dwIndex];
|
|
if (ptrAppHelp != NULL && !bAppHelp) {
|
|
bAppHelp = SdbReadApphelpData(hSDB, trExe, pApphelpData);
|
|
if (bAppHelp) {
|
|
trAppHelp = trExe;
|
|
if (ptrSxsData == NULL || bFusionFix) {
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
// see if we have sxs fix as well
|
|
if (ptrSxsData != NULL && !bFusionFix) {
|
|
bFusionFix = GetExeSxsData(hSDB, trExe, NULL, NULL);
|
|
if (bFusionFix) {
|
|
trSxsData = trExe;
|
|
}
|
|
if (bFusionFix && (ptrAppHelp == NULL || bAppHelp)) {
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (ptrAppHelp != NULL) {
|
|
*ptrAppHelp = trAppHelp;
|
|
}
|
|
|
|
if (ptrSxsData != NULL) {
|
|
*ptrSxsData = trSxsData;
|
|
}
|
|
}
|
|
|
|
|
|
|
|
|
|
BOOL
|
|
InternalCheckRunApp(
|
|
IN HANDLE hFile, // [Optional] Handle to an open file to check
|
|
IN LPCWSTR pwszPath, // path to the app in NT format
|
|
IN LPCWSTR pEnvironment, // pointer to the environment of the process that is
|
|
// being created or NULL.
|
|
IN DWORD dwReason, // collection of flags hinting at why we were called
|
|
OUT PVOID* ppData, // this will contain the pointer to the allocated buffer
|
|
// containing the appcompat data.
|
|
OUT PDWORD pcbData, // if appcompat data is found, the size of the buffer
|
|
// is returned here.
|
|
OUT PVOID* ppSxsData, // out: Sxs data block from the compatibility database
|
|
OUT PDWORD pcbSxsData, // out: sxs data block size
|
|
IN BOOL bNTVDMMode, // Are we doing the special NTVDM stuff?
|
|
|
|
IN LPCWSTR szModuleName, // the module name (for NTVDM only)
|
|
|
|
OUT LPWSTR pszCompatLayer, // The new compat layer variable. with format:
|
|
// "__COMPAT_LAYER=Alpha Bravo Charlie"
|
|
OUT PNTVDM_FLAGS pFlags, // The flags
|
|
OUT PAPPHELP_INFO pAHInfo // If there is apphelp to display, this will be filled
|
|
// in with non-null values
|
|
)
|
|
/*++
|
|
Return: FALSE if the app should be blocked from running, TRUE otherwise.
|
|
|
|
Desc: This is the main API of apphelp.dll. It is called from CreateProcess
|
|
to retrieve application compatibility information for the current process.
|
|
|
|
This function does not check whether the appcompat infrastructure has been
|
|
disabled, (kernel32 checks that)
|
|
|
|
--*/
|
|
{
|
|
|
|
APPHELP_DATA ApphelpData;
|
|
BOOL bSuccess;
|
|
BOOL bRunApp = TRUE; // run by default
|
|
BOOL bAppHelp = FALSE;
|
|
WCHAR* pwszDosPath = NULL;
|
|
BOOL bBypassCache = FALSE; // this is set if cache bypass occured (as opposed to entry not being found
|
|
BOOL bGetSxsData = TRUE; // indicates whether we should look for Fusion fixes
|
|
BOOL bFusionFix = FALSE; // will be set to TRUE if we have obtained fusion fix
|
|
HSDB hSDB = NULL;
|
|
SDBQUERYRESULT sdbQuery;
|
|
NTSTATUS Status;
|
|
|
|
TAGREF trAppHelp = TAGREF_NULL;
|
|
TAGREF trFusionFix = TAGREF_NULL;
|
|
|
|
UNICODE_STRING ExePath;
|
|
RTL_UNICODE_STRING_BUFFER DosPathBuffer;
|
|
UCHAR BufferPath[MAX_PATH*2];
|
|
|
|
RtlZeroMemory(&sdbQuery, sizeof(sdbQuery));
|
|
RtlInitUnicodeStringBuffer(&DosPathBuffer, BufferPath, sizeof(BufferPath));
|
|
|
|
RtlInitUnicodeString(&ExePath, pwszPath);
|
|
|
|
Status = RtlAssignUnicodeStringBuffer(&DosPathBuffer, &ExePath);
|
|
if (NT_SUCCESS(Status)) {
|
|
Status = RtlNtPathNameToDosPathName(0, &DosPathBuffer, NULL, NULL);
|
|
}
|
|
|
|
if (!NT_SUCCESS(Status)) {
|
|
DBGPRINT((sdlError, "InternalCheckRunApp", "Failed to convert path \"%S\" to DOS.\n", pwszPath));
|
|
goto Done;
|
|
}
|
|
|
|
//
|
|
// we have been successful, this is 0-terminated dos path
|
|
//
|
|
pwszDosPath = DosPathBuffer.String.Buffer;
|
|
|
|
//
|
|
// Cache lookup was bypassed by one reason or the other.
|
|
// We do not update cache after it had been bypassed.
|
|
//
|
|
bBypassCache = !!(dwReason & SHIM_CACHE_BYPASS);
|
|
|
|
hSDB = SdbInitDatabase(0, NULL);
|
|
|
|
if (hSDB == NULL) {
|
|
DBGPRINT((sdlError,
|
|
"InternalCheckRunApp",
|
|
"Failed to initialize the database.\n"));
|
|
goto Done;
|
|
}
|
|
|
|
//
|
|
// We didn't find this EXE in the cache. Query the database
|
|
// to get all the info about this EXE.
|
|
//
|
|
SdbGetMatchingExe(hSDB, pwszDosPath, szModuleName, pEnvironment, 0, &sdbQuery);
|
|
|
|
if (sdbQuery.dwFlags & SHIMREG_DISABLE_SXS) {
|
|
bGetSxsData = FALSE;
|
|
}
|
|
|
|
//
|
|
// The last EXE in the list is always the more specific one, and
|
|
// the one we want to use for checking IDs and flags and whatnot.
|
|
//
|
|
|
|
//
|
|
// find apphelp/and/or Fusion fix
|
|
//
|
|
ParseSdbQueryResult(hSDB,
|
|
&sdbQuery,
|
|
&trAppHelp,
|
|
&ApphelpData,
|
|
bGetSxsData ? &trFusionFix : NULL);
|
|
|
|
bAppHelp = (trAppHelp != TAGREF_NULL);
|
|
|
|
if (bAppHelp) {
|
|
|
|
//
|
|
// Check whether the disable bit is set (the dwFlags has been retrieved from the
|
|
// registry via the SdbReadApphelpData call)
|
|
//
|
|
if (!(sdbQuery.dwFlags & SHIMREG_DISABLE_APPHELP)) {
|
|
|
|
BOOL bNoUI;
|
|
|
|
//
|
|
// See whether the user has checked "Don't show this anymore" box before.
|
|
//
|
|
bNoUI = ((sdbQuery.dwFlags & SHIMREG_APPHELP_NOUI) != 0);
|
|
|
|
if (bNoUI) {
|
|
DBGPRINT((sdlInfo,
|
|
"InternalCheckRunApp",
|
|
"NoUI flag is set, apphelp UI disabled for this app.\n"));
|
|
}
|
|
|
|
//
|
|
// Depending on severity of the problem...
|
|
//
|
|
switch (ApphelpData.dwSeverity) {
|
|
case APPHELP_MINORPROBLEM:
|
|
case APPHELP_HARDBLOCK:
|
|
case APPHELP_NOBLOCK:
|
|
case APPHELP_REINSTALL:
|
|
if (bNoUI) {
|
|
bRunApp = (ApphelpData.dwSeverity != APPHELP_HARDBLOCK);
|
|
} else {
|
|
DWORD dwRet;
|
|
|
|
|
|
//
|
|
// We need to show apphelp -- pack up the info
|
|
// so we can hand it off to shimeng or ntvdm.
|
|
//
|
|
sdbQuery.trAppHelp = trAppHelp;
|
|
|
|
if (pAHInfo) {
|
|
PDB pdb;
|
|
TAGID tiWhich;
|
|
|
|
if (SdbTagRefToTagID(hSDB, trAppHelp, &pdb, &tiWhich)) {
|
|
if (SdbGetDatabaseGUID(hSDB, pdb, &(pAHInfo->guidDB))) {
|
|
pAHInfo->tiExe = tiWhich;
|
|
}
|
|
}
|
|
}
|
|
|
|
bRunApp = TRUE;
|
|
}
|
|
break;
|
|
|
|
default:
|
|
//
|
|
// Some other case was found (e.g. VERSIONSUB which should be replaced
|
|
// by shims in most cases).
|
|
//
|
|
DBGPRINT((sdlWarning,
|
|
"InternalCheckRunApp",
|
|
"Unhandled severity flag 0x%x.\n",
|
|
ApphelpData.dwSeverity));
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
//
|
|
// Apphelp verification is done. Check for shims if we should still run the app.
|
|
//
|
|
if (bRunApp) {
|
|
|
|
if (ppData &&
|
|
(sdbQuery.atrExes[0] != TAGREF_NULL ||
|
|
sdbQuery.atrLayers[0] != TAGREF_NULL ||
|
|
sdbQuery.trAppHelp)) {
|
|
//
|
|
// There are shims for this EXE. Pack the appcompat data
|
|
// so it can be sent to ntdll in the context of the starting EXE.
|
|
//
|
|
SdbPackAppCompatData(hSDB, &sdbQuery, ppData, pcbData);
|
|
}
|
|
|
|
if (ppSxsData && bGetSxsData && trFusionFix != TAGREF_NULL) {
|
|
//
|
|
// See if we have Fusion data to report.
|
|
//
|
|
GetExeSxsData(hSDB, trFusionFix, ppSxsData, pcbSxsData);
|
|
bFusionFix = (ppSxsData != NULL && *ppSxsData != NULL);
|
|
}
|
|
|
|
if (bNTVDMMode) {
|
|
GetExeNTVDMData(hSDB, &sdbQuery, pszCompatLayer, pFlags);
|
|
}
|
|
}
|
|
|
|
//
|
|
// Update the cache now.
|
|
//
|
|
if (!bBypassCache) {
|
|
//
|
|
// Do not update the cache if we got the EXE entry from a local database.
|
|
//
|
|
bBypassCache = (sdbQuery.atrExes[0] != TAGREF_NULL &&
|
|
!SdbIsTagrefFromMainDB(sdbQuery.atrExes[0]));
|
|
}
|
|
|
|
if (!bBypassCache) {
|
|
|
|
//
|
|
// We remove from cache only if we have some appcompat data
|
|
//
|
|
BOOL
|
|
bCleanApp = sdbQuery.atrExes[0] == TAGREF_NULL &&
|
|
sdbQuery.atrLayers[0] == TAGREF_NULL &&
|
|
!bAppHelp &&
|
|
sdbQuery.dwFlags == 0 &&
|
|
!bFusionFix;
|
|
|
|
if (hFile != INVALID_HANDLE_VALUE) {
|
|
ApphelpUpdateCacheEntry (pwszDosPath, hFile, !bCleanApp, FALSE);
|
|
}
|
|
}
|
|
|
|
Done:
|
|
|
|
RtlFreeUnicodeStringBuffer(&DosPathBuffer);
|
|
|
|
if (hSDB != NULL) {
|
|
SdbReleaseDatabase(hSDB);
|
|
}
|
|
|
|
return bRunApp;
|
|
}
|
|
|
|
|
|
BOOL
|
|
ApphelpQueryExe(
|
|
IN HSDB hSDB,
|
|
IN LPCWSTR pwszPath, // Unicode path to the executable (DOS_PATH)
|
|
IN BOOL bAppHelpIfNecessary, // Produce AppHelp dialog if necessary
|
|
IN DWORD dwGetMatchingExeFlags,
|
|
OUT SDBQUERYRESULT* pQueryResult // Shim Database Query Result
|
|
)
|
|
/*++
|
|
Return: FALSE if the app should be blocked from running, TRUE otherwise.
|
|
|
|
Desc: This function is similar with ApphelpCheckRunApp but without validating
|
|
cache and Layer flags and doesn't return application compatibility
|
|
information for given app name. It is intended to be called from
|
|
a shim / user mode to verify whether an executable is allowed to run or not.
|
|
|
|
--*/
|
|
{
|
|
BOOL bRunApp = TRUE; // run by default
|
|
DWORD dwDatabaseType = 0;
|
|
DWORD dwSeverity = 0;
|
|
TAGREF trAppHelp = TAGREF_NULL;
|
|
|
|
HAPPHELPINFOCONTEXT hApphelpInfoContext = NULL;
|
|
|
|
//
|
|
// Query the database to get all the info about this EXE.
|
|
// Note:
|
|
// This function is intended to be called from user mode.
|
|
// It doesn't require a call to ConvertToDosPath to string \??\ from the filepath.
|
|
//
|
|
DBGPRINT((sdlInfo,
|
|
"ApphelpCheckExe",
|
|
"Calling SdbGetMatchingExe for \"%s\"\n",
|
|
pwszPath));
|
|
|
|
SdbGetMatchingExe(hSDB, pwszPath, NULL, NULL, dwGetMatchingExeFlags, pQueryResult);
|
|
|
|
//
|
|
// get info out of the query
|
|
//
|
|
ParseSdbQueryResult(hSDB,
|
|
pQueryResult,
|
|
&trAppHelp,
|
|
NULL, // Apphelp Information api is used here
|
|
NULL); // no sxs fixes are needed
|
|
|
|
//
|
|
// The last EXE in the list is always the more specific one, and the one we want to
|
|
// use for checking IDs and flags and whatnot.
|
|
//
|
|
|
|
if (trAppHelp != TAGREF_NULL) {
|
|
//
|
|
// Read the apphelp data if available for this EXE.
|
|
//
|
|
if (SdbIsTagrefFromMainDB(trAppHelp)) {
|
|
dwDatabaseType |= SDB_DATABASE_MAIN;
|
|
}
|
|
|
|
hApphelpInfoContext = SdbOpenApphelpInformationByID(hSDB,
|
|
trAppHelp,
|
|
dwDatabaseType);
|
|
}
|
|
|
|
//
|
|
// Check whether the disable bit is set (the dwFlags has been retrieved from the
|
|
// registry via the SdbReadApphelpData call)
|
|
//
|
|
if (hApphelpInfoContext != NULL) {
|
|
if (!(pQueryResult->dwFlags & SHIMREG_DISABLE_APPHELP)) {
|
|
BOOL bNoUI;
|
|
|
|
//
|
|
// See whether the user has checked "Don't show this anymore" box before.
|
|
//
|
|
bNoUI = ((pQueryResult->dwFlags & SHIMREG_APPHELP_NOUI) != 0);
|
|
|
|
if (bNoUI) {
|
|
DBGPRINT((sdlInfo,
|
|
"ApphelpCheckExe",
|
|
"NoUI flag is set, apphelp UI disabled for this app.\n"));
|
|
}
|
|
|
|
|
|
SdbQueryApphelpInformation(hApphelpInfoContext,
|
|
ApphelpProblemSeverity,
|
|
&dwSeverity,
|
|
sizeof(dwSeverity));
|
|
|
|
if (!bAppHelpIfNecessary) {
|
|
bNoUI = TRUE;
|
|
}
|
|
|
|
//
|
|
// depending on severity of the problem...
|
|
//
|
|
switch (dwSeverity) {
|
|
case APPHELP_MINORPROBLEM:
|
|
case APPHELP_HARDBLOCK:
|
|
case APPHELP_NOBLOCK:
|
|
case APPHELP_REINSTALL:
|
|
bRunApp = (dwSeverity != APPHELP_HARDBLOCK);
|
|
|
|
if (!bNoUI) {
|
|
DWORD dwRet;
|
|
APPHELP_INFO AHInfo = { 0 };
|
|
|
|
SdbQueryApphelpInformation(hApphelpInfoContext,
|
|
ApphelpDatabaseGUID,
|
|
&AHInfo.guidDB,
|
|
sizeof(AHInfo.guidDB));
|
|
|
|
SdbQueryApphelpInformation(hApphelpInfoContext,
|
|
ApphelpExeTagID,
|
|
&AHInfo.tiExe,
|
|
sizeof(AHInfo.tiExe));
|
|
AHInfo.bOfflineContent = bDebugChum();
|
|
SdbShowApphelpDialog(&AHInfo,
|
|
NULL,
|
|
&bRunApp); // either we succeeded or bInstall package is treated
|
|
// the same way as No UI
|
|
}
|
|
break;
|
|
default:
|
|
//
|
|
// Some other case was found (e.g. VERSIONSUB which should be replaced
|
|
// by shims in most cases).
|
|
//
|
|
DBGPRINT((sdlWarning,
|
|
"ApphelpCheckExe",
|
|
"Unhandled severity flag 0x%x.\n",
|
|
dwSeverity));
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
//
|
|
// Apphelp verification is done.
|
|
//
|
|
|
|
if (hApphelpInfoContext != NULL) {
|
|
SdbCloseApphelpInformation(hApphelpInfoContext);
|
|
}
|
|
|
|
return bRunApp;
|
|
}
|
|
|
|
|
|
/*++
|
|
// This code was used to check for include/exclude list in the database
|
|
// to eliminate confusion entries should ALWAYS provide the list
|
|
//
|
|
// CheckIncludeExcludeList
|
|
// returns: TRUE - database provides the list
|
|
// FALSE - no list is provided in the database
|
|
//
|
|
|
|
BOOL
|
|
CheckIncludeExcludeList(
|
|
IN HSDB hSDB,
|
|
IN SDBQUERYRESULT* pQueryResult
|
|
)
|
|
{
|
|
INT i;
|
|
TAGREF trExe;
|
|
TAGREF trFix;
|
|
TAGREF trInexclude;
|
|
|
|
for (i = 0; i < SDB_MAX_EXES && pQueryResult->atrExes[i] != TAGREF_NULL; ++i) {
|
|
trExe = pQueryResult->atrExes[i];
|
|
trFix = SdbFindFirstTagRef(hSDB, trExe, TAG_SHIM_REF);
|
|
while (trFix != TAGREF_NULL) {
|
|
trInexclude = SdbFindFirstTagRef(hSDB, trFix, TAG_INEXCLUDE);
|
|
if (trInexclude != TAGREF_NULL) {
|
|
return TRUE;
|
|
}
|
|
|
|
trFix = SdbFindNextTagRef(hSDB, trExe, trFix);
|
|
}
|
|
}
|
|
|
|
//
|
|
// layers have their own inclusion/exclusion scheme
|
|
//
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
--*/
|
|
|
|
BOOL
|
|
ApphelpFixExe(
|
|
IN HSDB hSDB,
|
|
IN LPCWSTR pwszPath, // Unicode path to the executable (DOS_PATH)
|
|
IN SDBQUERYRESULT* pQueryResult, // QueryResult
|
|
IN BOOL bUseModuleName // if false, module name is not used for dynamic shimming
|
|
)
|
|
{
|
|
typedef BOOL (WINAPI *_pfn_SE_DynamicShim)(LPCWSTR , HSDB , SDBQUERYRESULT*, LPCSTR);
|
|
|
|
static const WCHAR ShimEngine_ModuleName[] = L"Shimeng.dll";
|
|
static const CHAR DynamicShimProcedureName[] = "SE_DynamicShim";
|
|
static _pfn_SE_DynamicShim pfnDynamicShim = NULL;
|
|
|
|
HMODULE hmodShimEngine = 0;
|
|
BOOL bResult = FALSE;
|
|
ANSI_STRING AnsiModuleName = { 0 };
|
|
UNICODE_STRING UnicodeModuleName;
|
|
NTSTATUS Status;
|
|
LPCSTR pszModuleName = NULL;
|
|
LPCWSTR pwszModuleName;
|
|
|
|
//
|
|
// Do we need to do anything?
|
|
//
|
|
if (pQueryResult->atrExes[0] == TAGREF_NULL &&
|
|
pQueryResult->atrLayers[0] == TAGREF_NULL) {
|
|
//
|
|
// Nothing for the shim engine to do.
|
|
//
|
|
bResult = TRUE;
|
|
goto Done;
|
|
}
|
|
|
|
//
|
|
// Load additional shims for this exe.
|
|
//
|
|
DBGPRINT((sdlInfo,"ApphelpFixExe", "Loading ShimEngine for \"%s\"\n", pwszPath));
|
|
|
|
hmodShimEngine = LoadLibraryW(ShimEngine_ModuleName);
|
|
|
|
if (hmodShimEngine == NULL) {
|
|
DBGPRINT((sdlError,"ApphelpFixExe", "Failed to get ShimEngine module handle.\n"));
|
|
goto Done;
|
|
}
|
|
|
|
pfnDynamicShim = (_pfn_SE_DynamicShim) GetProcAddress(hmodShimEngine, DynamicShimProcedureName);
|
|
|
|
if (NULL == pfnDynamicShim) {
|
|
DBGPRINT((sdlError,
|
|
"ApphelpFixExe",
|
|
"Failed to get Dynamic Shim procedure address from ShimEngine module.\n"));
|
|
goto Done;
|
|
}
|
|
|
|
//
|
|
// check inclusion/exclusion list
|
|
//
|
|
if (pwszPath != NULL && bUseModuleName) {
|
|
//
|
|
// no inclusion/exclusion in the xml -- determine module name
|
|
//
|
|
pwszModuleName = wcsrchr(pwszPath, L'\\'); // last backslash please
|
|
|
|
if (pwszModuleName == NULL) {
|
|
pwszModuleName = pwszPath;
|
|
} else {
|
|
++pwszModuleName;
|
|
}
|
|
|
|
//
|
|
// convert to ansi
|
|
//
|
|
RtlInitUnicodeString(&UnicodeModuleName, pwszModuleName);
|
|
Status = RtlUnicodeStringToAnsiString(&AnsiModuleName,
|
|
&UnicodeModuleName,
|
|
TRUE);
|
|
if (!NT_SUCCESS(Status)) {
|
|
DBGPRINT((sdlError, "ApphelpFixExe",
|
|
"Failed to convert unicode string \"%s\" to ansi, Status 0x%lx.\n",
|
|
pwszModuleName, Status));
|
|
|
|
goto Done;
|
|
}
|
|
|
|
pszModuleName = AnsiModuleName.Buffer; // this will be allocated by RtlUnicodeStringToAnsiString
|
|
|
|
}
|
|
|
|
if (FALSE == (*pfnDynamicShim)(pwszPath,
|
|
hSDB,
|
|
pQueryResult,
|
|
pszModuleName)) {
|
|
// BUGBUG: This never happens since DynamicShim never return FALSE
|
|
DBGPRINT((sdlError, "ApphelpFixExe", "Failed to call Dynamic Shim.\n"));
|
|
goto Done;
|
|
}
|
|
|
|
bResult = TRUE;
|
|
|
|
Done:
|
|
|
|
RtlFreeAnsiString(&AnsiModuleName); // this will do nothing if string is empty
|
|
return bResult;
|
|
}
|
|
|
|
BOOL
|
|
ApphelpCheckExe(
|
|
IN LPCWSTR pwszPath, // Unicode path to the executable (DOS_PATH)
|
|
IN BOOL bAppHelpIfNecessary, // Only present AppHelp this executable if TRUE
|
|
IN BOOL bShimIfNecessary, // Only load shim for this executable if TRUE
|
|
IN BOOL bUseModuleName // use module name when inclusion/exclusion list is not provided
|
|
)
|
|
{
|
|
BOOL bRunApp = TRUE;
|
|
SDBQUERYRESULT QueryResult;
|
|
HSDB hSDB;
|
|
|
|
if (IsAppcompatInfrastructureDisabled()) {
|
|
goto Done;
|
|
}
|
|
|
|
RtlZeroMemory(&QueryResult, sizeof(QueryResult));
|
|
|
|
hSDB = SdbInitDatabase(0, NULL);
|
|
if (hSDB == NULL) {
|
|
DBGPRINT((sdlError, "ApphelpCheckExe", "Failed to initialize database.\n"));
|
|
goto Done;
|
|
}
|
|
|
|
bRunApp = ApphelpQueryExe(hSDB,
|
|
pwszPath,
|
|
bAppHelpIfNecessary,
|
|
SDBGMEF_IGNORE_ENVIRONMENT,
|
|
&QueryResult);
|
|
|
|
if (TRUE == bRunApp && TRUE == bShimIfNecessary) {
|
|
ApphelpFixExe(hSDB, pwszPath, &QueryResult, bUseModuleName);
|
|
}
|
|
|
|
SdbReleaseDatabase(hSDB);
|
|
|
|
Done:
|
|
|
|
return bRunApp;
|
|
}
|
|
|
|
BOOL
|
|
ApphelpCheckIME(
|
|
IN LPCWSTR pwszPath // Unicode path to the exe
|
|
)
|
|
{
|
|
BOOL bRunApp = TRUE;
|
|
SDBQUERYRESULT QueryResult;
|
|
HSDB hSDB;
|
|
BOOL bCleanApp;
|
|
|
|
if (IsAppcompatInfrastructureDisabled()) {
|
|
return TRUE;
|
|
}
|
|
|
|
RtlZeroMemory(&QueryResult, sizeof(QueryResult));
|
|
|
|
hSDB = SdbInitDatabase(0, NULL);
|
|
if (hSDB == NULL) {
|
|
DBGPRINT((sdlError, "ApphelpCheckIME", "Failed to initialize database.\n"));
|
|
goto Done;
|
|
}
|
|
|
|
bRunApp = ApphelpQueryExe(hSDB,
|
|
pwszPath,
|
|
TRUE,
|
|
SDBGMEF_IGNORE_ENVIRONMENT,
|
|
&QueryResult);
|
|
|
|
if (TRUE == bRunApp) {
|
|
ApphelpFixExe(hSDB, pwszPath, &QueryResult, FALSE);
|
|
}
|
|
|
|
SdbReleaseDatabase(hSDB);
|
|
|
|
//
|
|
// see that it's in the cache if no fixes
|
|
//
|
|
bCleanApp = QueryResult.atrExes[0] == TAGREF_NULL &&
|
|
QueryResult.atrLayers[0] == TAGREF_NULL &&
|
|
QueryResult.trAppHelp == TAGREF_NULL &&
|
|
QueryResult.dwFlags == 0;
|
|
|
|
#ifndef WIN2K_NOCACHE
|
|
|
|
BaseUpdateAppcompatCache(pwszPath, INVALID_HANDLE_VALUE, !bCleanApp);
|
|
|
|
#endif
|
|
|
|
Done:
|
|
|
|
return bRunApp;
|
|
}
|
|
|
|
BOOL
|
|
ApphelpCheckShellObject(
|
|
IN REFCLSID ObjectCLSID,
|
|
IN BOOL bShimIfNecessary,
|
|
OUT ULONGLONG* pullFlags
|
|
)
|
|
/*++
|
|
Return: FALSE if the object should be blocked from instantiating, TRUE otherwise.
|
|
|
|
Desc: This is a helper function for Explorer and Internet Explorer that will
|
|
allow those applications to detect bad extension objects and either
|
|
block them from running or fix them.
|
|
|
|
pullFlags is filled with a 64-bit flag mask that can be used to turn
|
|
on 'hack' flags in Explorer/IE. These are pulled out of the App Compat
|
|
database.
|
|
|
|
If the database indicates that a shim should be used to fix the extension
|
|
and bShimIfNecessary is TRUE, this function will load SHIMENG.DLL and
|
|
apply the fix.
|
|
|
|
--*/
|
|
{
|
|
BOOL bGoodObject = TRUE;
|
|
LPWSTR szComServer = NULL;
|
|
LPWSTR szDLLName = NULL;
|
|
DWORD dwBufSize = 0;
|
|
DWORD dwReqBufSize = 0;
|
|
SDBQUERYRESULT QueryResult;
|
|
HSDB hSDB = NULL;
|
|
PVOID pModuleHandle = NULL;
|
|
UNICODE_STRING ustrDLLName = { 0 };
|
|
UNICODE_STRING ustrNtPath = { 0 };
|
|
NTSTATUS status;
|
|
HANDLE hDLL = INVALID_HANDLE_VALUE;
|
|
DWORD dwReason;
|
|
|
|
OBJECT_ATTRIBUTES ObjectAttributes;
|
|
IO_STATUS_BLOCK IoStatusBlock;
|
|
|
|
if (IsAppcompatInfrastructureDisabled()) {
|
|
return TRUE;
|
|
}
|
|
|
|
if (pullFlags != NULL) {
|
|
*pullFlags = 0;
|
|
}
|
|
|
|
szComServer = RtlAllocateHeap(RtlProcessHeap(), HEAP_ZERO_MEMORY, MAX_PATH);
|
|
|
|
if (szComServer == NULL) {
|
|
DBGPRINT((sdlInfo,"ApphelpCheckShellObject", "Memory allocation error\n"));
|
|
goto Done;
|
|
}
|
|
|
|
dwBufSize = MAX_PATH;
|
|
|
|
//
|
|
// Turn the CLSID into a filename (ie, the DLL that serves the object)
|
|
//
|
|
dwReqBufSize = ResolveCOMServer(ObjectCLSID, szComServer, dwBufSize);
|
|
|
|
if (dwReqBufSize == 0) {
|
|
//
|
|
// CLSID could not be resolved to a DLL.
|
|
//
|
|
goto Done;
|
|
}
|
|
|
|
if (dwReqBufSize > dwBufSize) {
|
|
|
|
RtlFreeHeap(RtlProcessHeap(), 0, szComServer);
|
|
szComServer = RtlAllocateHeap(RtlProcessHeap(), HEAP_ZERO_MEMORY, dwReqBufSize);
|
|
|
|
if (szComServer == NULL) {
|
|
DBGPRINT((sdlInfo,"ApphelpCheckShellObject", "Memory allocation error\n"));
|
|
goto Done;
|
|
}
|
|
|
|
dwBufSize = dwReqBufSize;
|
|
|
|
dwReqBufSize = ResolveCOMServer(ObjectCLSID, szComServer, dwBufSize);
|
|
|
|
if (dwReqBufSize > dwBufSize || dwReqBufSize == 0) {
|
|
//
|
|
// What? Buffer size changed. This could happen if registration of an
|
|
// object took place between the time we first queried and the next time.
|
|
// Just being paranoid...
|
|
//
|
|
DBGPRINT((sdlInfo,"ApphelpCheckShellObject", "Memory allocation error\n"));
|
|
goto Done;
|
|
}
|
|
}
|
|
|
|
//
|
|
// Determine DLL name (w/o path). Walk back to first backslash.
|
|
//
|
|
szDLLName = szComServer + dwReqBufSize/sizeof(WCHAR);
|
|
|
|
while (szDLLName >= szComServer) {
|
|
if (*szDLLName == L'\\') {
|
|
break;
|
|
}
|
|
|
|
szDLLName--;
|
|
}
|
|
|
|
szDLLName++;
|
|
|
|
//
|
|
// Check if this DLL is already loaded. If so, no need to try and do anything
|
|
// since it's really too late anyway.
|
|
//
|
|
RtlInitUnicodeString(&ustrDLLName, szDLLName);
|
|
|
|
status = LdrGetDllHandle(NULL,
|
|
NULL,
|
|
&ustrDLLName,
|
|
&pModuleHandle);
|
|
|
|
if (NT_SUCCESS(status)) {
|
|
//
|
|
// Already loaded.
|
|
//
|
|
goto Done;
|
|
}
|
|
|
|
if (!RtlDosPathNameToNtPathName_U(szComServer,
|
|
&ustrNtPath,
|
|
NULL,
|
|
NULL)) {
|
|
DBGPRINT((sdlError,
|
|
"ApphelpCheckShellObject",
|
|
"RtlDosPathNameToNtPathName_U failed, path \"%s\"\n",
|
|
szComServer));
|
|
goto Done;
|
|
}
|
|
|
|
InitializeObjectAttributes(&ObjectAttributes,
|
|
&ustrNtPath,
|
|
OBJ_CASE_INSENSITIVE,
|
|
NULL,
|
|
NULL);
|
|
|
|
status = NtCreateFile(&hDLL,
|
|
GENERIC_READ | SYNCHRONIZE | FILE_READ_ATTRIBUTES,
|
|
&ObjectAttributes,
|
|
&IoStatusBlock,
|
|
0,
|
|
FILE_ATTRIBUTE_NORMAL,
|
|
FILE_SHARE_READ,
|
|
FILE_OPEN,
|
|
FILE_NON_DIRECTORY_FILE | FILE_SYNCHRONOUS_IO_NONALERT,
|
|
NULL,
|
|
0);
|
|
|
|
if (!NT_SUCCESS(status)) {
|
|
DBGPRINT((sdlError,
|
|
"ApphelpCheckShellObject",
|
|
"SdbpOpenFile failed, path \"%s\"\n",
|
|
szComServer));
|
|
goto Done;
|
|
}
|
|
|
|
if (BaseCheckAppcompatCache(ustrNtPath.Buffer, hDLL, NULL, &dwReason)) {
|
|
//
|
|
// We have this in cache
|
|
//
|
|
goto Done;
|
|
}
|
|
|
|
RtlZeroMemory(&QueryResult, sizeof(QueryResult));
|
|
|
|
hSDB = SdbInitDatabase(0, NULL);
|
|
if (hSDB == NULL) {
|
|
DBGPRINT((sdlError, "ApphelpCheckShellObject", "Failed to initialize database.\n"));
|
|
goto Done;
|
|
}
|
|
|
|
bGoodObject = ApphelpQueryExe(hSDB,
|
|
szComServer,
|
|
FALSE,
|
|
SDBGMEF_IGNORE_ENVIRONMENT,
|
|
&QueryResult);
|
|
|
|
if (TRUE == bGoodObject && TRUE == bShimIfNecessary) {
|
|
ApphelpFixExe(hSDB, szComServer, &QueryResult, FALSE);
|
|
}
|
|
|
|
SdbQueryFlagMask(hSDB, &QueryResult, TAG_FLAG_MASK_SHELL, pullFlags, NULL);
|
|
|
|
//
|
|
// we might want to use Apphelp api for this -- but shell does pass the right
|
|
// thing to us (most likely)
|
|
//
|
|
BaseUpdateAppcompatCache(ustrNtPath.Buffer,
|
|
hDLL,
|
|
!(QueryResult.atrExes[0] == TAGREF_NULL &&
|
|
QueryResult.atrLayers[0] == TAGREF_NULL));
|
|
|
|
Done:
|
|
|
|
RtlFreeUnicodeString(&ustrNtPath);
|
|
|
|
if (hSDB != NULL) {
|
|
SdbReleaseDatabase(hSDB);
|
|
}
|
|
|
|
if (hDLL != INVALID_HANDLE_VALUE) {
|
|
NtClose(hDLL);
|
|
}
|
|
|
|
if (szComServer != NULL) {
|
|
RtlFreeHeap(RtlProcessHeap(), 0, szComServer);
|
|
}
|
|
|
|
return bGoodObject;
|
|
}
|
|
|
|
BOOL
|
|
ApphelpGetNTVDMInfo(
|
|
IN LPCWSTR pwszPath, // path to the app in NT format
|
|
IN LPCWSTR pwszModule, // module name
|
|
IN LPCWSTR pEnvironment, // pointer to the environment of the task that is
|
|
// being created or NULL if we are to use the main NTVDM
|
|
// environment block.
|
|
OUT LPWSTR pszCompatLayer, // The new compat layer variable. with format:
|
|
// "Alpha Bravo Charlie" -- allow 256 chars for this.
|
|
OUT PNTVDM_FLAGS pFlags, // The flags
|
|
OUT PAPPHELP_INFO pAHInfo // If there is apphelp to display, this will be filled
|
|
// in with non-null values
|
|
)
|
|
/*++
|
|
Return: FALSE if the app should be blocked from running, TRUE otherwise.
|
|
|
|
Desc: This is essentially the equivalent of ApphelpCheckRunApp, but specific
|
|
to NTVDM.
|
|
--*/
|
|
{
|
|
if (IsAppcompatInfrastructureDisabled()) {
|
|
return TRUE;
|
|
}
|
|
|
|
return InternalCheckRunApp(INVALID_HANDLE_VALUE, pwszPath, pEnvironment, 0,
|
|
NULL, NULL, NULL, NULL, TRUE,
|
|
pwszModule, pszCompatLayer, pFlags, pAHInfo);
|
|
}
|
|
|
|
|
|
void
|
|
GetExeNTVDMData(
|
|
IN HSDB hSDB, // the SDB context
|
|
IN PSDBQUERYRESULT psdbQuery, // the EXEs and LAYERs that are active
|
|
OUT WCHAR* pszCompatLayer, // The new compat layer variable. with format:
|
|
// "Alpha Bravo Charlie"
|
|
OUT PNTVDM_FLAGS pFlags // The flags
|
|
)
|
|
{
|
|
DWORD i;
|
|
ULARGE_INTEGER uliFlags;
|
|
LPVOID pFlagContext = NULL;
|
|
|
|
|
|
ZeroMemory(pFlags, sizeof(NTVDM_FLAGS));
|
|
|
|
//
|
|
// Build the layer variable, and look for the two "special" layers
|
|
//
|
|
if (pszCompatLayer) {
|
|
pszCompatLayer[0] = 0;
|
|
|
|
for (i = 0; i < SDB_MAX_LAYERS && psdbQuery->atrLayers[i] != TAGREF_NULL; ++i) {
|
|
WCHAR* pszEnvVar;
|
|
|
|
//
|
|
// Get the environment var and tack it onto the full string
|
|
//
|
|
pszEnvVar = SdbGetLayerName(hSDB, psdbQuery->atrLayers[i]);
|
|
|
|
//
|
|
// check for one of the two "special" layers
|
|
//
|
|
if (_wcsicmp(pszEnvVar, L"640X480") == 0) {
|
|
//
|
|
// set the 640x480 flag -- found in base\mvdm\inc\wowcmpat.h
|
|
//
|
|
// NOTE: we don't have this flag yet -- waiting on WOW guys
|
|
}
|
|
if (_wcsicmp(pszEnvVar, L"256COLOR") == 0) {
|
|
//
|
|
// set the 256 color flag -- found in base\mvdm\inc\wowcmpat.h
|
|
//
|
|
pFlags->dwWOWCompatFlagsEx |= 0x00000002;
|
|
}
|
|
|
|
if (pszEnvVar) {
|
|
wcscat(pszCompatLayer, pszEnvVar);
|
|
wcscat(pszCompatLayer, L" ");
|
|
}
|
|
}
|
|
}
|
|
|
|
//
|
|
// Look for compat flags
|
|
//
|
|
SdbQueryFlagMask(hSDB, psdbQuery, TAG_FLAGS_NTVDM1, &uliFlags.QuadPart, &pFlagContext);
|
|
pFlags->dwWOWCompatFlags |= uliFlags.LowPart;
|
|
pFlags->dwWOWCompatFlagsEx |= uliFlags.HighPart;
|
|
|
|
SdbQueryFlagMask(hSDB, psdbQuery, TAG_FLAGS_NTVDM2, &uliFlags.QuadPart, &pFlagContext);
|
|
pFlags->dwUserWOWCompatFlags |= uliFlags.LowPart;
|
|
pFlags->dwWOWCompatFlags2 |= uliFlags.HighPart;
|
|
|
|
SdbQueryFlagMask(hSDB, psdbQuery, TAG_FLAGS_NTVDM3, &uliFlags.QuadPart, &pFlagContext);
|
|
pFlags->dwWOWCompatFlagsFE |= uliFlags.LowPart;
|
|
// High Part is unused for now.
|
|
|
|
// now pack command line parameters
|
|
|
|
SdbpPackCmdLineInfo(pFlagContext, &pFlags->pFlagsInfo);
|
|
SdbpFreeFlagInfoList(pFlagContext);
|
|
}
|
|
|
|
|
|
BOOL
|
|
ApphelpCheckRunApp(
|
|
IN HANDLE hFile, // [Optional] Handle to an open file to check
|
|
IN WCHAR* pwszPath, // path to the app in NT format
|
|
IN WCHAR* pEnvironment, // pointer to the environment of the process that is
|
|
// being created or NULL.
|
|
IN DWORD dwReason, // collection of flags hinting at why we were called
|
|
OUT PVOID* ppData, // this will contain the pointer to the allocated buffer
|
|
// containing the appcompat data.
|
|
OUT PDWORD pcbData, // if appcompat data is found, the size of the buffer
|
|
// is returned here.
|
|
OUT PVOID* ppSxsData, // BUGBUG: describe
|
|
OUT PDWORD pcbSxsData // BUGBUG: describe
|
|
)
|
|
/*++
|
|
Return: FALSE if the app should be blocked from running, TRUE otherwise.
|
|
|
|
Desc: This is the main API of apphelp.dll. It is called from CreateProcess
|
|
to retrieve application compatibility information for the current process.
|
|
--*/
|
|
{
|
|
return InternalCheckRunApp(hFile, pwszPath, pEnvironment, dwReason,
|
|
ppData, pcbData, ppSxsData, pcbSxsData,
|
|
FALSE, NULL, NULL, NULL, NULL);
|
|
}
|
|
|
|
|
|
|
|
//
|
|
// =============================================================================================
|
|
// InstallShield 7 Support
|
|
// =============================================================================================
|
|
//
|
|
BOOL
|
|
ApphelpCheckInstallShieldPackage(
|
|
IN REFCLSID PackageID,
|
|
IN LPCWSTR lpszPackageFullPath
|
|
)
|
|
{
|
|
BOOL bPackageGood = TRUE; // This return value MUST TRUE otherwise InstallShield7 will cancel its processes.
|
|
|
|
TAGREF trExe = TAGREF_NULL;
|
|
|
|
DWORD dwNumExes = 0;
|
|
DWORD dwDataType = 0;
|
|
DWORD dwSize = 0;
|
|
DWORD dwReturn = 0;
|
|
|
|
BOOL bMatchFound = FALSE;
|
|
NTSTATUS Status;
|
|
|
|
BOOL bAppHelpIfNecessary = FALSE;
|
|
BOOL bResult = TRUE;
|
|
|
|
WCHAR wszCLSID[41];
|
|
WCHAR wszPackageCode[41];
|
|
|
|
GUID guidPackageID;
|
|
GUID guidPackageCode;
|
|
|
|
HSDB hSDB = NULL;
|
|
SDBQUERYRESULT QueryResult;
|
|
|
|
if (IsAppcompatInfrastructureDisabled()) {
|
|
goto Done;
|
|
}
|
|
|
|
if (NULL == lpszPackageFullPath) {
|
|
DBGPRINT((sdlInfo,
|
|
"ApphelpCheckInstallShieldPackage",
|
|
"lpszPackageFullPath is NULL\n"));
|
|
goto Done;
|
|
}
|
|
|
|
SdbGUIDToString((GUID *)&PackageID, wszCLSID);
|
|
|
|
DBGPRINT((sdlWarning,
|
|
"ApphelpCheckInstallShieldPackage",
|
|
"InstallShield package detected. CLSID: %s FullPath: %s\n",
|
|
wszCLSID, lpszPackageFullPath));
|
|
|
|
RtlZeroMemory(&QueryResult, sizeof(QueryResult));
|
|
|
|
hSDB = SdbInitDatabase(0, NULL);
|
|
if (hSDB == NULL) {
|
|
DBGPRINT((sdlError, "ApphelpCheckExe", "Failed to initialize database.\n"));
|
|
goto Done;
|
|
}
|
|
|
|
bMatchFound = ApphelpQueryExe(hSDB,
|
|
lpszPackageFullPath,
|
|
bAppHelpIfNecessary,
|
|
SDBGMEF_IGNORE_ENVIRONMENT,
|
|
&QueryResult);
|
|
|
|
if (!bMatchFound)
|
|
{
|
|
DBGPRINT((sdlError, "ApphelpCheckInstallShieldPackage", "No match found.\n"));
|
|
goto Done;
|
|
}
|
|
|
|
for (dwNumExes = 0; dwNumExes < SDB_MAX_EXES; ++dwNumExes)
|
|
{
|
|
if (TAGREF_NULL == QueryResult.atrExes[dwNumExes]) {
|
|
break;
|
|
}
|
|
trExe = QueryResult.atrExes[dwNumExes];
|
|
|
|
DBGPRINT((sdlInfo, "ApphelpCheckInstallShieldPackage", "Processing TAGREF atrExes[%d] = 0x%8x.\n", dwNumExes, trExe));
|
|
|
|
dwSize = sizeof(wszPackageCode);
|
|
*wszPackageCode = L'\0';
|
|
|
|
dwReturn = SdbQueryData(hSDB,
|
|
trExe,
|
|
L"PackageCode",
|
|
&dwDataType,
|
|
wszPackageCode,
|
|
&dwSize);
|
|
|
|
if (dwReturn == ERROR_SUCCESS)
|
|
{
|
|
DBGPRINT((sdlInfo, "ApphelpCheckInstallShieldPackage", "SdbQueryData returns dwSize = %d and dwDataType = %d.\n", dwSize, dwDataType));
|
|
|
|
if ((dwSize > 0) && (dwSize < sizeof(wszPackageCode)))
|
|
{
|
|
// we have some data
|
|
// check the type (should be string)
|
|
if (REG_SZ != dwDataType)
|
|
{
|
|
DBGPRINT((sdlError, "ApphelpCheckInstallShieldPackage", "SdbQueryData returns non STRING PackageCode data. Exiting.\n"));
|
|
goto Done;
|
|
}
|
|
|
|
DBGPRINT((sdlInfo, "ApphelpCheckInstallShieldPackage", "Comparing PackageId = %s and PackageCode = %s.\n", wszCLSID, wszPackageCode));
|
|
|
|
// convert to guid
|
|
if (FALSE == SdbGUIDFromString(wszPackageCode, &guidPackageCode))
|
|
{
|
|
DBGPRINT((sdlError, "ApphelpCheckInstallShieldPackage", "Can not convert PackageCode to GUID. Exiting.\n"));
|
|
goto Done;
|
|
}
|
|
|
|
if (RtlEqualMemory(PackageID, &guidPackageCode, sizeof(guidPackageCode) ))
|
|
{
|
|
DBGPRINT((sdlWarning, "ApphelpCheckInstallShieldPackage",
|
|
"Found InstallShield package matched with PackageCode: %s.\n",
|
|
wszPackageCode));
|
|
|
|
if (TRUE != ApphelpFixExe(hSDB, lpszPackageFullPath, &QueryResult, FALSE))
|
|
{
|
|
DBGPRINT((sdlError, "ApphelpCheckInstallShieldPackage", "Can not load additional shim dynamically for this executable.\n"));
|
|
}
|
|
goto Done;
|
|
}
|
|
}
|
|
}
|
|
} // for
|
|
|
|
DBGPRINT((sdlError, "ApphelpCheckInstallShieldPackage", "No match found.\n"));
|
|
|
|
Done:
|
|
if (hSDB != NULL) {
|
|
SdbReleaseDatabase(hSDB);
|
|
}
|
|
|
|
return bPackageGood;
|
|
}
|
|
|
|
|
|
//
|
|
// =============================================================================================
|
|
// MSI Support
|
|
// =============================================================================================
|
|
//
|
|
|
|
BOOL
|
|
SDBAPI
|
|
ApphelpCheckMsiPackage(
|
|
IN GUID* pguidDB, // database id
|
|
IN GUID* pguidID, // match id
|
|
IN DWORD dwFlags, // not used now, set to 0
|
|
IN BOOL bNoUI
|
|
)
|
|
{
|
|
WCHAR szDatabasePath[MAX_PATH];
|
|
DWORD dwDatabaseType = 0;
|
|
DWORD dwPackageFlags = 0;
|
|
DWORD dwLength;
|
|
BOOL bInstallPackage = TRUE;
|
|
HSDB hSDB = NULL;
|
|
TAGREF trPackage = TAGREF_NULL;
|
|
|
|
HAPPHELPINFOCONTEXT hApphelpInfoContext = NULL;
|
|
DWORD dwSeverity = 0;
|
|
|
|
if (IsAppcompatInfrastructureDisabled()) {
|
|
goto out;
|
|
}
|
|
|
|
hSDB = SdbInitDatabase(HID_NO_DATABASE, NULL);
|
|
if (hSDB == NULL) {
|
|
DBGPRINT((sdlError, "ApphelpCheckMsiPackage",
|
|
"Failed to initialize database\n"));
|
|
goto out;
|
|
}
|
|
|
|
//
|
|
// First, we need to resolve a db
|
|
//
|
|
dwLength = SdbResolveDatabase(pguidDB, &dwDatabaseType, szDatabasePath, CHARCOUNT(szDatabasePath));
|
|
if (dwLength == 0 || dwLength > CHARCOUNT(szDatabasePath)) {
|
|
DBGPRINT((sdlError, "ApphelpCheckMsiPackage",
|
|
"Failed to resolve database path\n"));
|
|
goto out;
|
|
}
|
|
|
|
//
|
|
// open database
|
|
//
|
|
|
|
if (!SdbOpenLocalDatabase(hSDB, szDatabasePath)) {
|
|
DBGPRINT((sdlError, "ApphelpCheckMsiPackage",
|
|
"Failed to open database \"%s\"\n", szDatabasePath));
|
|
goto out;
|
|
}
|
|
|
|
//
|
|
// find the entry
|
|
//
|
|
trPackage = SdbFindMsiPackageByID(hSDB, pguidID);
|
|
if (trPackage == TAGREF_NULL) {
|
|
DBGPRINT((sdlError, "ApphelpCheckMsiPackage",
|
|
"Failed to find msi package by guid id\n"));
|
|
goto out;
|
|
}
|
|
|
|
hApphelpInfoContext = SdbOpenApphelpInformationByID(hSDB,
|
|
trPackage,
|
|
dwDatabaseType);
|
|
if (hApphelpInfoContext == NULL) {
|
|
DBGPRINT((sdlInfo, "ApphelpCheckMsiPackage",
|
|
"Apphelp information has not been found\n"));
|
|
goto out;
|
|
}
|
|
|
|
//
|
|
// we have apphelp data, check to see if we have flags for this exe
|
|
//
|
|
|
|
if (!SdbGetEntryFlags(pguidID, &dwPackageFlags)) {
|
|
DBGPRINT((sdlWarning, "ApphelpCheckMsiPackage",
|
|
"No flags for trPackage 0x%x\n", trPackage));
|
|
dwPackageFlags = 0;
|
|
}
|
|
|
|
//
|
|
// Check whether the disable bit is set (the dwFlags has been retrieved from the
|
|
// registry via the SdbReadApphelpData call)
|
|
//
|
|
if (dwPackageFlags & SHIMREG_DISABLE_APPHELP) {
|
|
goto out;
|
|
}
|
|
|
|
|
|
bNoUI |= !!(dwPackageFlags & SHIMREG_APPHELP_NOUI);
|
|
if (bNoUI) {
|
|
DBGPRINT((sdlInfo, "ApphelpCheckMsiPackage",
|
|
"NoUI flag is set, apphelp UI disabled for this app.\n"));
|
|
}
|
|
|
|
SdbQueryApphelpInformation(hApphelpInfoContext,
|
|
ApphelpProblemSeverity,
|
|
&dwSeverity,
|
|
sizeof(dwSeverity));
|
|
|
|
//
|
|
// depending on severity of the problem...
|
|
//
|
|
switch (dwSeverity) {
|
|
case APPHELP_MINORPROBLEM:
|
|
case APPHELP_HARDBLOCK:
|
|
case APPHELP_NOBLOCK:
|
|
case APPHELP_REINSTALL:
|
|
|
|
//
|
|
//
|
|
//
|
|
bInstallPackage = (APPHELP_HARDBLOCK != dwSeverity);
|
|
if (!bNoUI) {
|
|
DWORD dwRet;
|
|
APPHELP_INFO AHInfo = { 0 };
|
|
|
|
AHInfo.guidDB = *pguidDB;
|
|
SdbQueryApphelpInformation(hApphelpInfoContext,
|
|
ApphelpExeTagID,
|
|
&AHInfo.tiExe,
|
|
sizeof(AHInfo.tiExe));
|
|
if (AHInfo.tiExe != TAGID_NULL) {
|
|
|
|
AHInfo.bOfflineContent = bDebugChum();
|
|
|
|
SdbShowApphelpDialog(&AHInfo, NULL, &bInstallPackage);
|
|
// either we succeeded or bInstall package is treated
|
|
// the same way as No UI
|
|
}
|
|
}
|
|
break;
|
|
|
|
default:
|
|
//
|
|
// Some other case was found (e.g. VERSIONSUB which should be replaced
|
|
// by shims in most cases).
|
|
//
|
|
DBGPRINT((sdlInfo, "ApphelpCheckMsiPackage",
|
|
"Unhandled severity flag 0x%x.\n", dwSeverity));
|
|
break;
|
|
}
|
|
|
|
//
|
|
// at this point we know whether we want to install the package or not
|
|
//
|
|
|
|
|
|
out:
|
|
|
|
if (hApphelpInfoContext != NULL) {
|
|
SdbCloseApphelpInformation(hApphelpInfoContext);
|
|
}
|
|
|
|
if (hSDB != NULL) {
|
|
SdbReleaseDatabase(hSDB);
|
|
}
|
|
|
|
|
|
return bInstallPackage;
|
|
}
|
|
|
|
BOOL
|
|
SDBAPI
|
|
ApphelpFixMsiPackage(
|
|
IN GUID* pguidDB,
|
|
IN GUID* pguidID,
|
|
IN LPCWSTR pszFileName,
|
|
IN LPCWSTR pszActionName,
|
|
IN DWORD dwFlags
|
|
)
|
|
{
|
|
WCHAR szDatabasePath[MAX_PATH];
|
|
DWORD dwDatabaseType = 0;
|
|
HSDB hSDB = NULL;
|
|
TAGREF trPackage = TAGREF_NULL;
|
|
TAGREF trAction = TAGREF_NULL;
|
|
SDBQUERYRESULT QueryResult;
|
|
BOOL bSuccess = FALSE;
|
|
DWORD dwLength;
|
|
TAGREF trLayer, trLayerRef;
|
|
DWORD dwLayers = 0;
|
|
|
|
if (IsAppcompatInfrastructureDisabled()) {
|
|
bSuccess = TRUE;
|
|
goto out;
|
|
}
|
|
|
|
hSDB = SdbInitDatabase(0, NULL);
|
|
if (hSDB == NULL) {
|
|
DBGPRINT((sdlError, "ApphelpCheckMsiPackage",
|
|
"Failed to initialize database\n"));
|
|
goto out;
|
|
}
|
|
|
|
//
|
|
// First, we need to resolve a db
|
|
//
|
|
dwLength = SdbResolveDatabase(pguidDB, &dwDatabaseType, szDatabasePath, CHARCOUNT(szDatabasePath));
|
|
if (dwLength == 0 || dwLength > CHARCOUNT(szDatabasePath)) {
|
|
DBGPRINT((sdlError, "ApphelpCheckMsiPackage",
|
|
"Failed to resolve database path\n"));
|
|
goto out;
|
|
}
|
|
|
|
//
|
|
// open database
|
|
//
|
|
|
|
if (!SdbOpenLocalDatabase(hSDB, szDatabasePath)) {
|
|
DBGPRINT((sdlError, "ApphelpCheckMsiPackage",
|
|
"Failed to open database \"%s\"\n", szDatabasePath));
|
|
goto out;
|
|
}
|
|
|
|
//
|
|
// find the entry
|
|
//
|
|
trPackage = SdbFindMsiPackageByID(hSDB, pguidID);
|
|
if (trPackage == TAGREF_NULL) {
|
|
DBGPRINT((sdlError, "ApphelpCheckMsiPackage",
|
|
"Failed to find msi package by guid id\n"));
|
|
goto out;
|
|
}
|
|
|
|
if (SdbGetEntryFlags(pguidID, &dwFlags) && (dwFlags & SHIMREG_DISABLE_SHIM)) {
|
|
DBGPRINT((sdlInfo, "ApphelpCheckMsiPackage",
|
|
"Shims for this package are disabled\n"));
|
|
|
|
goto out;
|
|
}
|
|
|
|
trAction = SdbFindCustomActionForPackage(hSDB, trPackage, pszActionName);
|
|
if (trAction == TAGREF_NULL) {
|
|
DBGPRINT((sdlInfo, "ApphelpCheckMsiPackage",
|
|
"Failed to find custom action \"%s\"\n", pszActionName));
|
|
goto out;
|
|
}
|
|
|
|
//
|
|
// we have custom action on our hands which appears to have fixes
|
|
// attached to it, shim it!
|
|
//
|
|
RtlZeroMemory(&QueryResult, sizeof(QueryResult));
|
|
|
|
QueryResult.guidID = *pguidID;
|
|
QueryResult.atrExes[0] = trAction;
|
|
|
|
//
|
|
// get all the layers for this entry
|
|
//
|
|
trLayerRef = SdbFindFirstTagRef(hSDB, trAction, TAG_LAYER);
|
|
while (trLayerRef != TAGREF_NULL && dwLayers < SDB_MAX_LAYERS) {
|
|
trLayer = SdbGetNamedLayer(hSDB, trLayerRef);
|
|
if (trLayer != TAGREF_NULL) {
|
|
QueryResult.atrLayers[dwLayers++] = trLayer;
|
|
}
|
|
trLayerRef = SdbFindNextTagRef(hSDB, trAction, trLayerRef);
|
|
}
|
|
|
|
|
|
//
|
|
// ready to shim
|
|
//
|
|
bSuccess = ApphelpFixExe(hSDB, pszFileName, &QueryResult, TRUE);
|
|
if (bSuccess) {
|
|
DBGPRINT((sdlInfo, "ApphelpFixMsiPackage",
|
|
"Custom action \"%s\" successfully shimmed file \"%s\"\n",
|
|
pszActionName, pszFileName));
|
|
}
|
|
|
|
out:
|
|
if (hSDB != NULL) {
|
|
SdbReleaseDatabase(hSDB);
|
|
}
|
|
|
|
|
|
return(bSuccess);
|
|
}
|
|
|
|
BOOL
|
|
SDBAPI
|
|
ApphelpFixMsiPackageExe(
|
|
IN GUID* pguidDB,
|
|
IN GUID* pguidID,
|
|
IN LPCWSTR pszActionName,
|
|
IN OUT LPWSTR pwszEnv,
|
|
IN OUT LPDWORD pdwBufferSize
|
|
)
|
|
{
|
|
|
|
WCHAR szDatabasePath[MAX_PATH];
|
|
DWORD dwDatabaseType = 0;
|
|
HSDB hSDB = NULL;
|
|
TAGREF trPackage = TAGREF_NULL;
|
|
TAGREF trAction = TAGREF_NULL;
|
|
SDBQUERYRESULT QueryResult;
|
|
DWORD dwLength;
|
|
DWORD dwBufferSize;
|
|
BOOL bSuccess = FALSE;
|
|
DWORD dwFlags;
|
|
int i;
|
|
TAGREF trLayer;
|
|
|
|
if (pwszEnv != NULL) {
|
|
*pwszEnv = TEXT('\0');
|
|
}
|
|
|
|
if (IsAppcompatInfrastructureDisabled()) {
|
|
goto out;
|
|
}
|
|
|
|
hSDB = SdbInitDatabase(HID_NO_DATABASE, NULL);
|
|
if (hSDB == NULL) {
|
|
DBGPRINT((sdlError, "ApphelpCheckMsiPackage",
|
|
"Failed to initialize database\n"));
|
|
goto out;
|
|
}
|
|
|
|
//
|
|
// First, we need to resolve a db
|
|
//
|
|
dwLength = SdbResolveDatabase(pguidDB, &dwDatabaseType, szDatabasePath, CHARCOUNT(szDatabasePath));
|
|
if (dwLength == 0 || dwLength > CHARCOUNT(szDatabasePath)) {
|
|
DBGPRINT((sdlError, "ApphelpCheckMsiPackage",
|
|
"Failed to resolve database path\n"));
|
|
goto out;
|
|
}
|
|
|
|
//
|
|
// open database
|
|
//
|
|
|
|
if (!SdbOpenLocalDatabase(hSDB, szDatabasePath)) {
|
|
DBGPRINT((sdlError, "ApphelpCheckMsiPackage",
|
|
"Failed to open database \"%s\"\n", szDatabasePath));
|
|
goto out;
|
|
}
|
|
|
|
//
|
|
// find the entry
|
|
//
|
|
trPackage = SdbFindMsiPackageByID(hSDB, pguidID);
|
|
if (trPackage == TAGREF_NULL) {
|
|
DBGPRINT((sdlError, "ApphelpCheckMsiPackage",
|
|
"Failed to find msi package by guid id\n"));
|
|
goto out;
|
|
}
|
|
|
|
if (SdbGetEntryFlags(pguidID, &dwFlags) && (dwFlags & SHIMREG_DISABLE_SHIM)) {
|
|
DBGPRINT((sdlInfo, "ApphelpCheckMsiPackage",
|
|
"Shims for this package are disabled\n"));
|
|
|
|
goto out;
|
|
}
|
|
|
|
trAction = SdbFindCustomActionForPackage(hSDB, trPackage, pszActionName);
|
|
if (trAction == TAGREF_NULL) {
|
|
DBGPRINT((sdlInfo, "ApphelpCheckMsiPackage",
|
|
"Failed to find custom action \"%s\"\n", pszActionName));
|
|
goto out;
|
|
}
|
|
|
|
//
|
|
// now -- this action is an exe, do it right for him
|
|
//
|
|
RtlZeroMemory(&QueryResult, sizeof(QueryResult));
|
|
|
|
QueryResult.guidID = *pguidID;
|
|
|
|
for (i = 0; i < SDB_MAX_LAYERS; ++i) {
|
|
//
|
|
// check to see if we are doing the first layer, if so - call
|
|
// find first to obtain the layer, else find the next applicable layer
|
|
//
|
|
|
|
if (i == 0) {
|
|
trLayer = SdbFindFirstTagRef(hSDB, trAction, TAG_LAYER);
|
|
} else {
|
|
trLayer = SdbFindNextTagRef (hSDB, trAction, trLayer);
|
|
}
|
|
|
|
if (trLayer == TAGREF_NULL) {
|
|
break;
|
|
}
|
|
|
|
QueryResult.atrLayers[i] = trLayer;
|
|
}
|
|
|
|
dwLength = 0;
|
|
if (pdwBufferSize != NULL) {
|
|
dwLength = *pdwBufferSize;
|
|
}
|
|
|
|
//
|
|
// build compat layer
|
|
//
|
|
dwBufferSize = SdbBuildCompatEnvVariables(hSDB,
|
|
&QueryResult,
|
|
0,
|
|
NULL,
|
|
pwszEnv,
|
|
dwLength,
|
|
NULL);
|
|
|
|
if (pdwBufferSize != NULL) {
|
|
*pdwBufferSize = dwBufferSize;
|
|
}
|
|
|
|
bSuccess = TRUE;
|
|
|
|
out:
|
|
|
|
if (hSDB != NULL) {
|
|
SdbReleaseDatabase(hSDB);
|
|
}
|
|
|
|
return bSuccess;
|
|
}
|
|
|
|
|
|
|
|
/*++
|
|
Function:
|
|
|
|
CheckAppcompatInfrastructureFlags
|
|
|
|
Description:
|
|
|
|
Checks various registry places for infrastructure global flags (just the disabled bit for now)
|
|
The flags are set into the global variable gdwInfrastructureFlags. Function is used via the macro
|
|
for perf reasons
|
|
|
|
Return:
|
|
global infrastructure flags
|
|
|
|
--*/
|
|
|
|
DWORD
|
|
CheckAppcompatInfrastructureFlags(
|
|
VOID
|
|
)
|
|
{
|
|
static const UNICODE_STRING KeyNameAppCompat =
|
|
RTL_CONSTANT_STRING(L"\\Registry\\MACHINE\\System\\CurrentControlSet\\Control\\Session Manager\\AppCompatibility");
|
|
static const UNICODE_STRING ValueNameDisableShims =
|
|
RTL_CONSTANT_STRING(L"DisableAppCompat");
|
|
static const OBJECT_ATTRIBUTES objaAppCompat =
|
|
RTL_CONSTANT_OBJECT_ATTRIBUTES(&KeyNameAppCompat, OBJ_CASE_INSENSITIVE);
|
|
|
|
HANDLE hKey;
|
|
BYTE ValueBuffer[sizeof(KEY_VALUE_PARTIAL_INFORMATION) + sizeof(DWORD)];
|
|
PKEY_VALUE_PARTIAL_INFORMATION pKeyValueInformation =
|
|
(PKEY_VALUE_PARTIAL_INFORMATION)ValueBuffer;
|
|
DWORD ValueLength;
|
|
NTSTATUS Status;
|
|
|
|
gdwInfrastructureFlags = 0; // initialize just in case
|
|
|
|
// for now we are just checking the disabled bit
|
|
|
|
//
|
|
// Now see if the shim infrastructure is disabled for this machine
|
|
//
|
|
Status = NtOpenKey(&hKey, KEY_QUERY_VALUE, (POBJECT_ATTRIBUTES) &objaAppCompat);
|
|
|
|
if (NT_SUCCESS(Status)) {
|
|
Status = NtQueryValueKey(hKey,
|
|
(PUNICODE_STRING) &ValueNameDisableShims,
|
|
KeyValuePartialInformation,
|
|
pKeyValueInformation,
|
|
sizeof(ValueBuffer),
|
|
&ValueLength);
|
|
|
|
NtClose(hKey);
|
|
|
|
if (NT_SUCCESS(Status) &&
|
|
pKeyValueInformation->Type == REG_DWORD &&
|
|
pKeyValueInformation->DataLength == sizeof(DWORD)) {
|
|
if (*((PDWORD) pKeyValueInformation->Data) > 0) {
|
|
gdwInfrastructureFlags |= APPCOMPAT_INFRA_DISABLED;
|
|
}
|
|
}
|
|
}
|
|
|
|
//
|
|
// make the bits valid
|
|
//
|
|
gdwInfrastructureFlags |= APPCOMPAT_INFRA_VALID_FLAG;
|
|
|
|
return gdwInfrastructureFlags;
|
|
}
|
|
|
|
/*++
|
|
Function:
|
|
|
|
SdbInitDatabaseExport
|
|
|
|
Description:
|
|
|
|
This is "exported" version of the function SdbInitDatabase
|
|
that checks for the "diabled" flag -- otherwise calls into SdbInitDatabase
|
|
|
|
Return:
|
|
|
|
see SdbInitDatabase
|
|
|
|
--*/
|
|
|
|
HSDB
|
|
SDBAPI
|
|
SdbInitDatabaseExport(
|
|
IN DWORD dwFlags, // flags that tell how the database should be
|
|
// initialized.
|
|
IN LPCWSTR pszDatabasePath // the OPTIONAL full path to the database to
|
|
// be used.
|
|
)
|
|
{
|
|
if (IsAppcompatInfrastructureDisabled()) {
|
|
return NULL;
|
|
}
|
|
|
|
return SdbInitDatabase(dwFlags, pszDatabasePath);
|
|
}
|
|
|
|
|