mirror of https://github.com/tongzx/nt5src
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
522 lines
16 KiB
522 lines
16 KiB
/*
|
|
|
|
Copyright (c) 2000 Microsoft Corporation
|
|
|
|
Module Name:
|
|
|
|
RegQueryValueEx.cpp
|
|
|
|
Abstract:
|
|
|
|
This DLL hooks RegQueryValueExA so that we can return the "all-users" location
|
|
for the StartMenu, Desktop and Startup folders instead of the per-user location.
|
|
|
|
We also hook RegCreateKeyA/RegCreateKeyExA to make people who add entries to the
|
|
HKCU "run" and "Uninstall" keys really add them to HKLM.
|
|
|
|
Notes:
|
|
|
|
History:
|
|
|
|
08/07/2000 reinerf Created
|
|
02/27/2001 robkenny Converted to use CString
|
|
|
|
*/
|
|
|
|
#include "precomp.h"
|
|
|
|
// This module has been given an official blessing to use the str routines.
|
|
#include "LegalStr.h"
|
|
|
|
IMPLEMENT_SHIM_BEGIN(ProfilesRegQueryValueEx)
|
|
#include "ShimHookMacro.h"
|
|
|
|
#include <shlwapi.h> // for StrRStrIA
|
|
|
|
APIHOOK_ENUM_BEGIN
|
|
APIHOOK_ENUM_ENTRY(RegQueryValueExA)
|
|
APIHOOK_ENUM_ENTRY(RegCreateKeyA)
|
|
APIHOOK_ENUM_ENTRY(RegCreateKeyExA)
|
|
APIHOOK_ENUM_ENTRY(RegOpenKeyA)
|
|
APIHOOK_ENUM_ENTRY(RegOpenKeyExA)
|
|
APIHOOK_ENUM_END
|
|
|
|
|
|
#ifndef MAX
|
|
#define MAX(x,y) (((x) > (y)) ? (x) : (y))
|
|
#endif
|
|
|
|
#ifndef ARRAYSIZE
|
|
#define ARRAYSIZE(x) (sizeof(x)/sizeof(x[0]))
|
|
#endif
|
|
|
|
LPCSTR g_aBadKeys[] =
|
|
{
|
|
{"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run"},
|
|
{"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Uninstall"},
|
|
};
|
|
|
|
LPCSTR g_aBadShellFolderKeys[] =
|
|
{
|
|
{"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Shell Folders"},
|
|
{"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Explorer\\User Shell Folders"},
|
|
};
|
|
|
|
|
|
// given an hkey, call NtQueryObject to lookup its name.
|
|
// returns strings in the format: "\REGISTRY\USER\S-1-5-xxxxx\Software\Microsoft\Windows\CurrentVersion"
|
|
BOOL GetKeyName(HKEY hk, LPSTR pszName, DWORD cchName)
|
|
{
|
|
BOOL bRet = FALSE;
|
|
ULONG cbSize = 0;
|
|
|
|
// get the size needed for the name buffer
|
|
NtQueryObject(hk, ObjectNameInformation, NULL, 0, &cbSize);
|
|
|
|
if (cbSize)
|
|
{
|
|
POBJECT_NAME_INFORMATION pNameInfo = (POBJECT_NAME_INFORMATION)LocalAlloc(LPTR, cbSize);
|
|
|
|
if (pNameInfo)
|
|
{
|
|
NTSTATUS status = NtQueryObject(hk, ObjectNameInformation, (void*)pNameInfo, cbSize, NULL);
|
|
|
|
if (NT_SUCCESS(status) && WideCharToMultiByte(CP_ACP, 0, pNameInfo->Name.Buffer, -1, pszName, cchName, NULL, NULL))
|
|
{
|
|
bRet = TRUE;
|
|
}
|
|
|
|
LocalFree(pNameInfo);
|
|
}
|
|
}
|
|
|
|
return bRet;
|
|
}
|
|
|
|
|
|
// If hk points underneath HKCU and matches pszSearchName, then return TRUE
|
|
BOOL DoesKeyMatch(HKEY hk, LPCSTR pszSearchName)
|
|
{
|
|
BOOL bRet = FALSE;
|
|
|
|
// make sure it is not one of the pre-defined keys (eg HKEY_LOCAL_MACHINE)
|
|
if (!((LONG)((ULONG_PTR)hk) & 0x80000000))
|
|
{
|
|
CHAR szKeyName[MAX_PATH * 2]; // should be big enought to hold any registry key path
|
|
|
|
if (GetKeyName(hk, szKeyName, ARRAYSIZE(szKeyName)))
|
|
{
|
|
// is the key under HKCU ?
|
|
if (StrCmpNIA(szKeyName, "\\REGISTRY\\USER\\", ARRAYSIZE("\\REGISTRY\\USER\\")-1) == 0)
|
|
{
|
|
LPSTR psz = StrRStrIA(szKeyName, NULL, pszSearchName);
|
|
|
|
if (psz && (lstrlenA(psz) == lstrlenA(pszSearchName)))
|
|
{
|
|
// we found a substring and its the same length, so our hkey matches the search!
|
|
bRet = TRUE;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
return bRet;
|
|
}
|
|
|
|
|
|
BOOL IsBadHKCUKey(HKEY hk, LPCSTR* ppszNewKey)
|
|
{
|
|
BOOL bRet = FALSE;
|
|
int i;
|
|
|
|
for (i=0; i < ARRAYSIZE(g_aBadKeys); i++)
|
|
{
|
|
if (DoesKeyMatch(hk, g_aBadKeys[i]))
|
|
{
|
|
*ppszNewKey = g_aBadKeys[i];
|
|
bRet = TRUE;
|
|
break;
|
|
}
|
|
}
|
|
|
|
return bRet;
|
|
}
|
|
|
|
|
|
BOOL IsBadShellFolderKey(HKEY hk, LPCSTR* ppszNewKey)
|
|
{
|
|
BOOL bRet = FALSE;
|
|
int i;
|
|
|
|
for (i=0; i < ARRAYSIZE(g_aBadShellFolderKeys); i++)
|
|
{
|
|
if (DoesKeyMatch(hk, g_aBadShellFolderKeys[i]))
|
|
{
|
|
*ppszNewKey = g_aBadShellFolderKeys[i];
|
|
bRet = TRUE;
|
|
break;
|
|
}
|
|
}
|
|
|
|
return bRet;
|
|
}
|
|
|
|
|
|
LONG
|
|
APIHOOK(RegCreateKeyA)(
|
|
HKEY hKey,
|
|
LPCSTR pszSubKey,
|
|
PHKEY phkResult
|
|
)
|
|
{
|
|
LPCSTR pszNewHKLMKey;
|
|
LONG lRet = ORIGINAL_API(RegCreateKeyA)(hKey, pszSubKey, phkResult);
|
|
|
|
if ((lRet == ERROR_SUCCESS) &&
|
|
IsBadHKCUKey(*phkResult, &pszNewHKLMKey))
|
|
{
|
|
// its a bad HKCU key-- redirect to HKLM
|
|
RegCloseKey(*phkResult);
|
|
|
|
lRet = ORIGINAL_API(RegCreateKeyA)(HKEY_LOCAL_MACHINE, pszNewHKLMKey, phkResult);
|
|
|
|
LOGN(eDbgLevelInfo, "[RegCreateKeyA] overriding \"%s\" create key request w/ HKLM value (return = %d)", pszSubKey, lRet);
|
|
}
|
|
|
|
return lRet;
|
|
}
|
|
|
|
|
|
LONG
|
|
APIHOOK(RegCreateKeyExA)(
|
|
HKEY hKey,
|
|
LPCSTR pszSubKey,
|
|
DWORD Reserved,
|
|
LPSTR lpClass,
|
|
DWORD dwOptions,
|
|
REGSAM samDesired,
|
|
LPSECURITY_ATTRIBUTES lpSecurityAttributes,
|
|
PHKEY phkResult,
|
|
LPDWORD lpdwDisposition
|
|
)
|
|
{
|
|
LPCSTR pszNewHKLMKey;
|
|
LONG lRet = ORIGINAL_API(RegCreateKeyExA)(hKey,
|
|
pszSubKey,
|
|
Reserved,
|
|
lpClass,
|
|
dwOptions,
|
|
samDesired,
|
|
lpSecurityAttributes,
|
|
phkResult,
|
|
lpdwDisposition);
|
|
|
|
if ((lRet == ERROR_SUCCESS) &&
|
|
IsBadHKCUKey(*phkResult, &pszNewHKLMKey))
|
|
{
|
|
// its a bad HCKU key-- redirect to HKLM
|
|
RegCloseKey(*phkResult);
|
|
|
|
lRet = ORIGINAL_API(RegCreateKeyExA)(HKEY_LOCAL_MACHINE,
|
|
pszNewHKLMKey,
|
|
Reserved,
|
|
lpClass,
|
|
dwOptions,
|
|
samDesired,
|
|
lpSecurityAttributes,
|
|
phkResult,
|
|
lpdwDisposition);
|
|
|
|
LOGN(eDbgLevelInfo, "[RegCreateKeyExA] overriding \"%s\" create key request w/ HKLM value (return = %d)", pszSubKey, lRet);
|
|
}
|
|
|
|
return lRet;
|
|
}
|
|
|
|
|
|
LONG
|
|
APIHOOK(RegOpenKeyA)(
|
|
HKEY hKey,
|
|
LPCSTR pszSubKey,
|
|
PHKEY phkResult
|
|
)
|
|
{
|
|
LPCSTR pszNewHKLMKey;
|
|
LONG lRet = ORIGINAL_API(RegOpenKeyA)(hKey, pszSubKey, phkResult);
|
|
|
|
if ((lRet == ERROR_SUCCESS) &&
|
|
IsBadHKCUKey(*phkResult, &pszNewHKLMKey))
|
|
{
|
|
// its a bad HCKU key-- redirect to HKLM
|
|
RegCloseKey(*phkResult);
|
|
|
|
lRet = ORIGINAL_API(RegOpenKeyA)(HKEY_LOCAL_MACHINE, pszNewHKLMKey, phkResult);
|
|
|
|
LOGN(eDbgLevelInfo, "[RegOpenKeyA] overriding \"%s\" create key request w/ HKLM value (return = %d)", pszSubKey, lRet);
|
|
}
|
|
|
|
return lRet;
|
|
}
|
|
|
|
|
|
LONG
|
|
APIHOOK(RegOpenKeyExA)(
|
|
HKEY hKey,
|
|
LPCSTR pszSubKey,
|
|
DWORD ulOptions,
|
|
REGSAM samDesired,
|
|
PHKEY phkResult
|
|
)
|
|
{
|
|
LPCSTR pszNewHKLMKey;
|
|
LONG lRet = ORIGINAL_API(RegOpenKeyExA)(hKey, pszSubKey, ulOptions, samDesired, phkResult);
|
|
|
|
if ((lRet == ERROR_SUCCESS) &&
|
|
IsBadHKCUKey(*phkResult, &pszNewHKLMKey))
|
|
{
|
|
// its a bad HCKU key-- redirect to HKLM
|
|
RegCloseKey(*phkResult);
|
|
|
|
lRet = ORIGINAL_API(RegOpenKeyExA)(HKEY_LOCAL_MACHINE, pszNewHKLMKey, ulOptions, samDesired, phkResult);
|
|
|
|
LOGN(eDbgLevelInfo, "[RegOpenKeyExA] overriding \"%s\" create key request w/ HKLM value (return = %d)", pszSubKey, lRet);
|
|
}
|
|
|
|
return lRet;
|
|
}
|
|
|
|
|
|
LONG
|
|
GetAllUsersRegValueA(
|
|
LPSTR szRegValue,
|
|
DWORD cbOriginal,
|
|
DWORD* pcbData,
|
|
int nFolder,
|
|
int nFolderCommon
|
|
)
|
|
{
|
|
LONG lRet = ERROR_SUCCESS;
|
|
|
|
if (!szRegValue)
|
|
{
|
|
// if the caller is querying for the necessary size, return the "worst case" since we don't know if
|
|
// we are going to have to lie or not
|
|
*pcbData = MAX_PATH;
|
|
}
|
|
else if (szRegValue[0] != '\0')
|
|
{
|
|
CHAR szPath[MAX_PATH];
|
|
|
|
if (SUCCEEDED(SHGetFolderPathA(NULL, nFolder, NULL, SHGFP_TYPE_CURRENT, szPath))) {
|
|
CHAR szShortRegPath[MAX_PATH];
|
|
CHAR szShortGSFPath[MAX_PATH];
|
|
BOOL bUseLFN;
|
|
BOOL bSame = FALSE;
|
|
|
|
if (lstrcmpiA(szPath, szRegValue) == 0) {
|
|
bSame = TRUE;
|
|
bUseLFN = TRUE;
|
|
} else if (GetShortPathNameA(szPath, szShortGSFPath, ARRAYSIZE(szShortGSFPath)) &&
|
|
GetShortPathNameA(szRegValue, szShortRegPath, ARRAYSIZE(szShortRegPath)) &&
|
|
(lstrcmpiA(szShortGSFPath, szShortRegPath) == 0)) {
|
|
bSame = TRUE;
|
|
|
|
//
|
|
// Since the sfn was returned, use that to copy over the output buffer.
|
|
//
|
|
bUseLFN = FALSE;
|
|
}
|
|
|
|
if (bSame && SUCCEEDED(SHGetFolderPathA(NULL, nFolderCommon, NULL, SHGFP_TYPE_CURRENT, szPath))) {
|
|
if (bUseLFN) {
|
|
if ((lstrlenA(szPath) + 1) <= (int)cbOriginal) {
|
|
LOGN(
|
|
eDbgLevelInfo,
|
|
"[GetAllUsersRegValueA] overriding per-user reg value w/ common value");
|
|
lstrcpyA(szRegValue, szPath);
|
|
} else {
|
|
LOGN(
|
|
eDbgLevelInfo,
|
|
"[GetAllUsersRegValueA] returning ERROR_MORE_DATA for special folder value");
|
|
lRet = ERROR_MORE_DATA;
|
|
}
|
|
|
|
//
|
|
// Either we used this much room, or this is how much we need to have.
|
|
//
|
|
*pcbData = lstrlenA(szPath) + 1;
|
|
|
|
} else if (GetShortPathNameA(szPath, szShortGSFPath, ARRAYSIZE(szShortGSFPath))) {
|
|
|
|
if ((lstrlenA(szShortGSFPath) + 1) <= (int)cbOriginal) {
|
|
LOGN(
|
|
eDbgLevelInfo,
|
|
"[GetAllUsersRegValueA] overriding per-user reg value w/ common value");
|
|
|
|
lstrcpyA(szRegValue, szShortGSFPath);
|
|
} else {
|
|
LOGN(
|
|
eDbgLevelInfo,
|
|
"[GetAllUsersRegValueA] returning ERROR_MORE_DATA for special folder value");
|
|
lRet = ERROR_MORE_DATA;
|
|
}
|
|
|
|
//
|
|
// Either we used this much room, or this is how much we need to have.
|
|
//
|
|
*pcbData = lstrlenA(szShortGSFPath) + 1;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
return lRet;
|
|
}
|
|
|
|
|
|
//
|
|
// If the app is asking for the per-user "Desktop", "Start Menu" or "Startup" values by
|
|
// groveling the registry, then redirect it to the proper per-machine values.
|
|
//
|
|
LONG
|
|
APIHOOK(RegQueryValueExA)(
|
|
HKEY hKey, // handle to key
|
|
LPCSTR lpValueName, // value name
|
|
LPDWORD lpReserved, // reserved
|
|
LPDWORD lpType, // type buffer
|
|
LPBYTE lpData, // data buffer
|
|
LPDWORD lpcbData // size of data buffer
|
|
)
|
|
{
|
|
DWORD cbOriginal = (lpcbData ? *lpcbData : 0); // save off the original buffer size
|
|
LPCSTR pszNewHKLMKey;
|
|
LONG lRet = ORIGINAL_API(RegQueryValueExA)(hKey,
|
|
lpValueName,
|
|
lpReserved,
|
|
lpType,
|
|
lpData,
|
|
lpcbData);
|
|
|
|
if ((lpValueName && lpcbData) && // (not simply checking for existance of the value...)
|
|
IsBadShellFolderKey(hKey, &pszNewHKLMKey))
|
|
{
|
|
CHAR szTemp[MAX_PATH];
|
|
|
|
if (lstrcmpiA(lpValueName, "Desktop") == 0) {
|
|
|
|
DPFN(
|
|
eDbgLevelInfo,
|
|
"[RegQueryValueExA] querying for 'Desktop' value\n");
|
|
|
|
if (lRet == ERROR_SUCCESS) {
|
|
lRet = GetAllUsersRegValueA((LPSTR)lpData,
|
|
cbOriginal,
|
|
lpcbData,
|
|
CSIDL_DESKTOP,
|
|
CSIDL_COMMON_DESKTOPDIRECTORY);
|
|
|
|
} else if (lRet == ERROR_MORE_DATA) {
|
|
|
|
if (SUCCEEDED(SHGetFolderPathA(NULL, CSIDL_COMMON_DESKTOPDIRECTORY, NULL, SHGFP_TYPE_CURRENT, szTemp))) {
|
|
*lpcbData = MAX(*lpcbData, (DWORD)((lstrlenA(szTemp) + 1) * sizeof(CHAR)));
|
|
}
|
|
}
|
|
} else if (lstrcmpiA(lpValueName, "Start Menu") == 0) {
|
|
|
|
DPFN(
|
|
eDbgLevelInfo,
|
|
"[RegQueryValueExA] querying for 'Start Menu' value\n");
|
|
|
|
if (lRet == ERROR_SUCCESS) {
|
|
lRet = GetAllUsersRegValueA((LPSTR)lpData,
|
|
cbOriginal,
|
|
lpcbData,
|
|
CSIDL_STARTMENU,
|
|
CSIDL_COMMON_STARTMENU);
|
|
|
|
} else if (lRet == ERROR_MORE_DATA) {
|
|
|
|
if (SUCCEEDED(SHGetFolderPathA(NULL, CSIDL_COMMON_STARTMENU, NULL, SHGFP_TYPE_CURRENT, szTemp))) {
|
|
*lpcbData = MAX(*lpcbData, (DWORD)((lstrlenA(szTemp) + 1) * sizeof(CHAR)));
|
|
}
|
|
}
|
|
|
|
} else if (lstrcmpiA(lpValueName, "Startup") == 0) {
|
|
|
|
DPFN(
|
|
eDbgLevelInfo,
|
|
"[RegQueryValueExA] querying for 'Startup' value\n");
|
|
|
|
if (lRet == ERROR_SUCCESS) {
|
|
lRet = GetAllUsersRegValueA((LPSTR)lpData, cbOriginal, lpcbData, CSIDL_STARTUP, CSIDL_COMMON_STARTUP);
|
|
|
|
} else if (lRet == ERROR_MORE_DATA) {
|
|
|
|
if (SUCCEEDED(SHGetFolderPathA(NULL, CSIDL_COMMON_STARTUP, NULL, SHGFP_TYPE_CURRENT, szTemp))) {
|
|
*lpcbData = MAX(*lpcbData, (DWORD)((lstrlenA(szTemp) + 1) * sizeof(CHAR)));
|
|
}
|
|
}
|
|
|
|
} else if (lstrcmpiA(lpValueName, "Programs") == 0) {
|
|
|
|
DPFN(
|
|
eDbgLevelInfo,
|
|
"[RegQueryValueExA] querying for 'Programs' value\n");
|
|
|
|
if (lRet == ERROR_SUCCESS) {
|
|
lRet = GetAllUsersRegValueA((LPSTR)lpData, cbOriginal, lpcbData, CSIDL_PROGRAMS, CSIDL_COMMON_PROGRAMS);
|
|
|
|
} else if (lRet == ERROR_MORE_DATA) {
|
|
|
|
if (SUCCEEDED(SHGetFolderPathA(NULL, CSIDL_COMMON_PROGRAMS, NULL, SHGFP_TYPE_CURRENT, szTemp))) {
|
|
*lpcbData = MAX(*lpcbData, (DWORD)((lstrlenA(szTemp) + 1) * sizeof(CHAR)));
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
return lRet;
|
|
}
|
|
|
|
|
|
BOOL
|
|
NOTIFY_FUNCTION(
|
|
DWORD fdwReason
|
|
)
|
|
{
|
|
if (fdwReason == DLL_PROCESS_ATTACH) {
|
|
OSVERSIONINFOEX osvi = {0};
|
|
|
|
osvi.dwOSVersionInfoSize = sizeof(OSVERSIONINFOEX);
|
|
|
|
if (GetVersionEx((OSVERSIONINFO*)&osvi)) {
|
|
|
|
if (!((VER_SUITE_TERMINAL & osvi.wSuiteMask) &&
|
|
!(VER_SUITE_SINGLEUSERTS & osvi.wSuiteMask))) {
|
|
//
|
|
// Only install hooks if we are not on a "Terminal Server"
|
|
// (aka "Application Server") machine.
|
|
//
|
|
APIHOOK_ENTRY(ADVAPI32.DLL, RegQueryValueExA);
|
|
APIHOOK_ENTRY(ADVAPI32.DLL, RegCreateKeyA);
|
|
APIHOOK_ENTRY(ADVAPI32.DLL, RegCreateKeyExA);
|
|
APIHOOK_ENTRY(ADVAPI32.DLL, RegOpenKeyA);
|
|
APIHOOK_ENTRY(ADVAPI32.DLL, RegOpenKeyExA);
|
|
}
|
|
}
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
|
|
HOOK_BEGIN
|
|
|
|
CALL_NOTIFY_FUNCTION
|
|
|
|
HOOK_END
|
|
|
|
|
|
IMPLEMENT_SHIM_END
|
|
|
|
|