windows-nt/Source/XPSP1/NT/enduser/netmeeting/nmutil/dbg.cpp

1113 lines
26 KiB
C++
Raw Normal View History

2020-09-26 03:20:57 -05:00
/* dbg.cpp */
#include "precomp.h"
#include <oprahcom.h>
#include <cstring.hpp>
#include <regentry.h>
#include <confreg.h>
#include <confdbg.h>
#include <avUtil.h>
PSECURITY_DESCRIPTOR CreateSd( VOID);
BOOL CreateSids( PSID *BuiltInAdministrators, PSID *PowerUsers, PSID *AuthenticatedUsers);
#ifdef NM_DEBUG /* Almost the whole file */
// Special Debugbreak macro
#if defined (_M_IX86)
#define _DbgBreak() __asm { int 3 }
#else
#define _DbgBreak() DebugBreak()
#endif
// Special Mutex Macros
#define ACQMUTEX(hMutex) WaitForSingleObject(hMutex, INFINITE)
#define RELMUTEX(hMutex) ReleaseMutex(hMutex)
// Constant for GlobalAddAtom
const int CCHMAX_ATOM = 255;
// Local Variables
static PNMDBG _gpDbg = NULL; // Shared data in mmf after zone info
static HANDLE _ghMutexFile = NULL; // Mutex for writing to file
static PZONEINFO _gprgZoneInfo = NULL; // the address in which the zone is mapped,points to an array of zones
static HANDLE _ghDbgZoneMap = NULL; // the handle of the memory mapped file for zones
static HANDLE _ghDbgZoneMutex = NULL; // Mutex for accessing Zone information
static long _gLockCount = 0;
VOID DbgCurrentTime(PCHAR psz);
/* _ D B G P R I N T F */
/*-------------------------------------------------------------------------
%%Function: _DbgPrintf
The main, low level, debug output routine.
-------------------------------------------------------------------------*/
static VOID WINAPI _DbgPrintf(LPCSTR pszFile, PCSTR pszPrefix, PCSTR pszFormat, va_list ap)
{
CHAR szOutput[1024];
PCHAR pszOutput = szOutput;
UINT cch;
if (NULL == _gprgZoneInfo)
return;
if (DBG_FMTTIME_NONE != _gpDbg->uShowTime)
{
DbgCurrentTime(pszOutput);
pszOutput += lstrlenA(pszOutput);
}
if (_gpDbg->fShowThreadId)
{
wsprintfA(pszOutput, "[%04X] ", GetCurrentThreadId());
pszOutput += lstrlenA(pszOutput);
}
if (_gpDbg->fShowModule)
{
CHAR szFile[MAX_PATH];
if ((NULL == pszPrefix) || ('\0' == *pszPrefix))
{
GetModuleFileNameA(NULL, szFile, sizeof(szFile));
pszPrefix = ExtractFileNameA(szFile);
}
lstrcpyA(pszOutput, pszPrefix);
pszOutput += lstrlenA(pszOutput);
lstrcpyA(pszOutput, " ");
pszOutput += 1;
}
wvsprintfA(pszOutput, pszFormat, ap);
// Append carriage return, if necessary
// WARNING: This code is not DBCS-safe.
cch = lstrlenA(szOutput);
if (szOutput[cch-1] == '\n')
{
if (szOutput[cch-2] != '\r')
{
lstrcpyA(&szOutput[cch-1], "\r\n");
cch++;
}
}
else
{
lstrcpyA(&szOutput[cch], "\r\n");
cch += 2;
}
// Output to debug handler
if (_gpDbg->fOutputDebugString)
{
OutputDebugStringA(szOutput);
}
// Output to File
if (_gpDbg->fFileOutput || (NULL != pszFile))
{
HANDLE hFile;
DWORD dw;
// Lock access to file
ACQMUTEX(_ghMutexFile);
if (NULL == pszFile)
pszFile = _gpDbg->szFile;
// open a log file for appending. create if does not exist
hFile = CreateFileA(pszFile, GENERIC_WRITE, 0, NULL,
OPEN_ALWAYS, FILE_ATTRIBUTE_NORMAL, (HANDLE)NULL);
if (hFile != INVALID_HANDLE_VALUE)
{
// seek to end of file
dw = SetFilePointer(hFile, 0, NULL, FILE_END);
#ifdef TEST /* Test/Retail version truncates at 40K */
if (dw > 0x040000)
{
CloseHandle(hFile);
hFile = CreateFileA(pszFile, GENERIC_WRITE, 0, NULL,
TRUNCATE_EXISTING, FILE_ATTRIBUTE_NORMAL, (HANDLE)NULL);
}
if (INVALID_HANDLE_VALUE != hFile)
#endif
{
WriteFile(hFile, szOutput, lstrlenA(szOutput), &dw, NULL);
CloseHandle(hFile);
}
}
// Unlock access to file
RELMUTEX(_ghMutexFile);
}
// Output to viewer. This is at the end of the function because
// we potentially truncate szOutput.
if ((_gpDbg->fWinOutput) && (NULL != _gpDbg->hwndCtrl))
{
// Make sure that the string doesn't exceed the maximum atom size.
// WARNING: This code is not DBCS-safe.
static const CHAR szTruncatedSuffix[] = "...\r\n";
static const int cchTruncatedSuffix = ARRAY_ELEMENTS(szTruncatedSuffix) - 1;
if (CCHMAX_ATOM < cch)
{
lstrcpyA(&szOutput[CCHMAX_ATOM - cchTruncatedSuffix], szTruncatedSuffix);
}
ATOM aDbgAtom = GlobalAddAtomA(szOutput);
if (aDbgAtom)
{
if (!PostMessage(_gpDbg->hwndCtrl, _gpDbg->msgDisplay, (WPARAM)aDbgAtom, 0L))
{
// Unable to post Message, so free the atom
GlobalDeleteAtom(aDbgAtom);
}
}
}
}
PSTR WINAPI DbgZPrintf(HDBGZONE hZone, UINT iZone, PSTR pszFormat,...)
{
CHAR sz[MAXSIZE_OF_MODULENAME+MAXSIZE_OF_ZONENAME+1];
PCHAR psz;
va_list v1;
va_start(v1, pszFormat);
if ((NULL != hZone) && (iZone < MAXNUM_OF_ZONES))
{
wsprintfA(sz, "%hs:%hs", ((PZONEINFO) hZone)->pszModule, ((PZONEINFO) hZone)->szZoneNames[iZone]);
psz = sz;
}
else
{
psz = NULL;
}
if ((NULL != hZone) && ('\0' != ((PZONEINFO) hZone)->szFile[0]))
{
// Use the private module output filename, if specified
_DbgPrintf(((PZONEINFO) hZone)->szFile, psz, pszFormat, v1);
}
else
{
_DbgPrintf(NULL, psz, pszFormat, v1);
}
va_end(v1);
return pszFormat;
}
PSTR WINAPI DbgZVPrintf(HDBGZONE hZone, UINT iZone, PSTR pszFormat, va_list ap)
{
CHAR sz[MAXSIZE_OF_MODULENAME+MAXSIZE_OF_ZONENAME+1];
PCHAR psz;
if ((NULL != hZone) && (iZone < MAXNUM_OF_ZONES))
{
wsprintfA(sz, "%hs:%hs", ((PZONEINFO) hZone)->pszModule, ((PZONEINFO) hZone)->szZoneNames[iZone]);
psz = sz;
}
else
{
psz = NULL;
}
if ((NULL != hZone) && ('\0' != ((PZONEINFO) hZone)->szFile[0]))
{
// Use the private module output filename, if specified
_DbgPrintf(((PZONEINFO) hZone)->szFile, psz, pszFormat, ap);
}
else
{
_DbgPrintf(NULL, psz, pszFormat, ap);
}
return pszFormat;
}
VOID WINAPI DbgPrintf(PCSTR pszPrefix, PCSTR pszFormat, va_list ap)
{
_DbgPrintf(NULL, pszPrefix, pszFormat, ap);
}
VOID NMINTERNAL DbgInitEx(HDBGZONE * phDbgZone, PCHAR * psz, UINT cZones, long ulZoneDefault)
{
UINT i;
HDBGZONE hDbgZone;
DBGZONEINFO dbgZoneParm;
//DbgMsg("Module %s (%d zones)", *psz, cZones);
InterlockedIncrement( &_gLockCount );
InitDbgZone();
if (cZones > MAXNUM_OF_ZONES)
cZones = MAXNUM_OF_ZONES;
ZeroMemory(&dbgZoneParm, sizeof(dbgZoneParm));
// First string is the module name
lstrcpynA(dbgZoneParm.pszModule, *psz, CCHMAX(dbgZoneParm.pszModule));
// Copy the zone names
for (i = 0; i < cZones; i++)
{
lstrcpynA(dbgZoneParm.szZoneNames[i], psz[1+i], CCHMAX(dbgZoneParm.szZoneNames[0]));
}
// Get the detault zone settings
{
RegEntry reZones(ZONES_KEY, HKEY_LOCAL_MACHINE);
dbgZoneParm.ulZoneMask = reZones.GetNumber(CUSTRING(dbgZoneParm.pszModule), ulZoneDefault);
}
hDbgZone = NmDbgCreateZone(dbgZoneParm.pszModule);
if (NULL == hDbgZone)
{
OutputDebugStringA("DbgInit: Failed to create zones!\r\n");
return;
}
NmDbgSetZone(hDbgZone, &dbgZoneParm);
*phDbgZone = hDbgZone;
}
VOID NMINTERNAL DbgDeInit(HDBGZONE * phDbgZone)
{
if (NULL == phDbgZone)
return;
if (NULL == *phDbgZone)
return;
//DbgMsg("Freeing Zone [%s]",((PZONEINFO)(*phDbgZone))->pszModule);
NmDbgDeleteZone("", *phDbgZone);
*phDbgZone = NULL;
if( 0 == InterlockedDecrement( &_gLockCount ) )
{
UnMapDebugZoneArea();
if( _ghMutexFile )
{
CloseHandle( _ghMutexFile );
_ghMutexFile = NULL;
}
if( _ghDbgZoneMutex )
{
CloseHandle( _ghDbgZoneMutex );
_ghDbgZoneMutex = NULL;
}
}
}
//////////////////////////////////////////////////////////////////////////////////
// from dbgzone.cpp
/***************************************************************************
Name : NmDbgCreateZones
Purpose : A module calls this to allocate/initialize the zone area for debugging
purposes.
Parameters: pszName - the name of the module
Returns :
Comment :
***************************************************************************/
HDBGZONE WINAPI NmDbgCreateZone(LPSTR pszName)
{
PZONEINFO pZoneInfo=NULL;
if (!(pZoneInfo = FindZoneForModule(pszName)))
pZoneInfo = AllocZoneForModule(pszName);
return ((HDBGZONE)pZoneInfo);
}
/***************************************************************************
Name : NmDbgDeleteZones
Purpose :
Parameters:
Returns :
Comment :
***************************************************************************/
void WINAPI NmDbgDeleteZone(LPSTR pszName, HDBGZONE hDbgZone)
{
//decrement reference count
PZONEINFO pZoneInfo = (PZONEINFO)hDbgZone;
ASSERT( _ghDbgZoneMutex );
ACQMUTEX(_ghDbgZoneMutex);
if (pZoneInfo)
{
pZoneInfo->ulRefCnt--;
if (pZoneInfo->ulRefCnt == 0)
{
pZoneInfo->bInUse = FALSE;
pZoneInfo->ulSignature = 0;
}
}
RELMUTEX(_ghDbgZoneMutex);
}
/***************************************************************************
Name : NmDbgSetZones
Purpose :
Parameters:
Returns :
Comment :
***************************************************************************/
BOOL WINAPI NmDbgSetZone(HDBGZONE hDbgZone, PDBGZONEINFO pZoneParam)
{
PZONEINFO pZoneInfo = (PZONEINFO)hDbgZone;
if (!pZoneInfo)
return FALSE;
if (lstrcmpA(pZoneInfo->pszModule,pZoneParam->pszModule))
return FALSE;
pZoneInfo->ulZoneMask = pZoneParam->ulZoneMask;
CopyMemory(pZoneInfo->szZoneNames, pZoneParam->szZoneNames,
(sizeof(CHAR) * MAXNUM_OF_ZONES * MAXSIZE_OF_ZONENAME));
return(TRUE);
}
/***************************************************************************
Name : NmDbgGetZoneParams
Purpose :
Parameters:
Returns :
Comment :
***************************************************************************/
BOOL WINAPI NmDbgGetAllZoneParams(PDBGZONEINFO *plpZoneParam,LPUINT puCnt)
{
UINT ui;
PZONEINFO pCurZone;
if ((NULL == plpZoneParam) || (NULL == puCnt))
return FALSE;
ACQMUTEX(_ghDbgZoneMutex);
*puCnt = 0;
for (pCurZone = _gprgZoneInfo, ui=0;
ui<MAXNUM_OF_MODULES && pCurZone!=NULL;
ui++,pCurZone++)
{
if ((pCurZone->bInUse) && (pCurZone->ulSignature == ZONEINFO_SIGN))
{
(*puCnt)++;
}
}
*plpZoneParam = _gprgZoneInfo;
RELMUTEX(_ghDbgZoneMutex);
return TRUE;
}
BOOL WINAPI NmDbgFreeZoneParams(PDBGZONEINFO pZoneParam)
{
return TRUE;
}
PZONEINFO NMINTERNAL FindZoneForModule(LPCSTR pszModule)
{
int i;
PZONEINFO pCurZone;
for (pCurZone = _gprgZoneInfo,i=0;i<MAXNUM_OF_MODULES && pCurZone!=NULL;i++,pCurZone++)
{
if ((pCurZone->bInUse) && (pCurZone->ulSignature == ZONEINFO_SIGN)
&& (!lstrcmpA(pCurZone->pszModule,pszModule)))
{
ACQMUTEX(_ghDbgZoneMutex);
pCurZone->ulRefCnt++;
RELMUTEX(_ghDbgZoneMutex);
return pCurZone;
}
}
return NULL;
}
/***************************************************************************
Name : AllocZoneForModule
Purpose : Allocates the
Parameters:
Returns :
Comment :
***************************************************************************/
PZONEINFO NMINTERNAL AllocZoneForModule(LPCSTR pszModule)
{
int i;
PZONEINFO pCurZone;
PZONEINFO pZoneForMod=NULL;
ACQMUTEX(_ghDbgZoneMutex);
for (pCurZone = _gprgZoneInfo,i=0;
(i<MAXNUM_OF_MODULES && pCurZone!=NULL);
i++,pCurZone++)
{
if (!(pCurZone->bInUse))
{
pCurZone->bInUse = TRUE;
pCurZone->ulSignature = ZONEINFO_SIGN;
pCurZone->ulRefCnt = 1;
lstrcpyA(pCurZone->pszModule, pszModule);
pZoneForMod = pCurZone;
break;
}
}
RELMUTEX(_ghDbgZoneMutex);
return(pZoneForMod);
}
VOID NMINTERNAL SetDbgFlags(void)
{
PTSTR psz;
RegEntry reDebug(DEBUG_KEY, HKEY_LOCAL_MACHINE);
_gpDbg->fOutputDebugString = reDebug.GetNumber(REGVAL_DBG_OUTPUT, DEFAULT_DBG_OUTPUT);
_gpDbg->fWinOutput = reDebug.GetNumber(REGVAL_DBG_WIN_OUTPUT, DEFAULT_DBG_NO_WIN);
_gpDbg->fFileOutput = reDebug.GetNumber(REGVAL_DBG_FILE_OUTPUT, DEFAULT_DBG_NO_FILE);
_gpDbg->uShowTime = reDebug.GetNumber(REGVAL_DBG_SHOW_TIME, DBG_FMTTIME_NONE);
_gpDbg->fShowThreadId = reDebug.GetNumber(REGVAL_DBG_SHOW_THREADID, 0);
_gpDbg->fShowModule = reDebug.GetNumber(REGVAL_DBG_SHOW_MODULE, 0);
psz = reDebug.GetString(REGVAL_DBG_FILE);
if (0 != lstrlen(psz))
{
lstrcpyA(_gpDbg->szFile, CUSTRING(psz));
}
else
{
UINT cchFile;
cchFile = GetWindowsDirectoryA(_gpDbg->szFile, CCHMAX(_gpDbg->szFile));
_gpDbg->szFile[cchFile++] = '\\';
lstrcpyA(_gpDbg->szFile + cchFile, CUSTRING(DEFAULT_DBG_FILENAME));
}
}
VOID InitZoneMmf(PZONEINFO prgZoneInfo)
{
ZeroMemory(prgZoneInfo, CBMMFDBG);
SetDbgFlags();
}
PZONEINFO NMINTERNAL MapDebugZoneArea(void)
{
PZONEINFO prgZoneInfo = NULL;
BOOL fCreated;
PSECURITY_DESCRIPTOR sd = NULL;
SECURITY_ATTRIBUTES sa;
// Obtain a true NULL security descriptor (so if running as a service, user processes can access it)
// InitializeSecurityDescriptor(&sd, SECURITY_DESCRIPTOR_REVISION);
// SetSecurityDescriptorDacl(&sd, TRUE, NULL, FALSE); // NULL DACL = wide open
sd = CreateSd();
FillMemory(&sa, sizeof(sa), 0);
sa.nLength = sizeof(sa);
sa.lpSecurityDescriptor = sd;
//create a memory mapped object that is backed by paging file
_ghDbgZoneMap = CreateFileMapping(INVALID_HANDLE_VALUE, &sa, PAGE_READWRITE,
0, CBMMFDBG, SZ_DBG_MAPPED_ZONE);
if (_ghDbgZoneMap)
{
fCreated = (0 == GetLastError());
prgZoneInfo = (PZONEINFO) MapViewOfFile(_ghDbgZoneMap, FILE_MAP_READ|FILE_MAP_WRITE, 0,0,0);
if (NULL != prgZoneInfo)
{
// Grab pointer to shared data area
_gpDbg = (PNMDBG) (((PBYTE) prgZoneInfo) + (MAXNUM_OF_MODULES * sizeof(ZONEINFO)));
if (fCreated)
InitZoneMmf(prgZoneInfo);
}
}
if(sd)
{
HeapFree(GetProcessHeap(), 0, sd);
}
return prgZoneInfo;
}
VOID NMINTERNAL UnMapDebugZoneArea(void)
{
if (_gprgZoneInfo)
{
UnmapViewOfFile(_gprgZoneInfo);
_gprgZoneInfo = NULL;
}
ClosePh(&_ghDbgZoneMap);
}
VOID NMINTERNAL InitDbgZone(void)
{
if (NULL != _gprgZoneInfo)
return; // already initialized
_gprgZoneInfo = MapDebugZoneArea();
// Create log file data
PSECURITY_DESCRIPTOR sd = NULL;
SECURITY_ATTRIBUTES sa;
// Obtain a true NULL security descriptor (so if running as a service, user processes can access it)
// InitializeSecurityDescriptor(&sd, SECURITY_DESCRIPTOR_REVISION);
// SetSecurityDescriptorDacl(&sd, TRUE, NULL, FALSE); // NULL DACL = wide open
sd = CreateSd();
FillMemory(&sa, sizeof(sa), 0);
sa.nLength = sizeof(sa);
sa.lpSecurityDescriptor = sd;
_ghMutexFile = CreateMutex(&sa, FALSE, SZ_DBG_FILE_MUTEX);
_ghDbgZoneMutex = CreateMutex(&sa, FALSE, SZ_DBG_ZONE_MUTEX);
if (_gpDbg->fFileOutput)
{
HANDLE hFile;
DWORD dw;
CHAR sz[MAX_PATH];
SYSTEMTIME systime;
hFile = CreateFileA(_gpDbg->szFile,
GENERIC_WRITE | GENERIC_WRITE, 0, &sa,
CREATE_ALWAYS, FILE_ATTRIBUTE_NORMAL, NULL);
if (INVALID_HANDLE_VALUE == hFile)
{
_gpDbg->fFileOutput = FALSE;
goto cleanup;
}
GetLocalTime(&systime);
wsprintfA(sz,
"\r\n======== TRACE Started: %hu/%hu/%hu (%hu:%hu)\r\n",
systime.wMonth, systime.wDay, systime.wYear, systime.wHour, systime.wMinute);
SetFilePointer(hFile, 0, NULL, FILE_END);
WriteFile(hFile, sz, lstrlenA(sz), &dw, NULL);
CloseHandle(hFile);
}
cleanup:
if (sd)
{
HeapFree(GetProcessHeap(), 0, sd);
}
}
///////////////////////////////////////
// Routines for controlling debug output
BOOL WINAPI NmDbgRegisterCtl(HWND hwnd, UINT uDisplayMsg)
{
if ((NULL == _gpDbg) || (NULL != _gpDbg->hwndCtrl))
return FALSE;
_gpDbg->msgDisplay = uDisplayMsg;
_gpDbg->hwndCtrl = hwnd;
return TRUE;
}
BOOL WINAPI NmDbgDeregisterCtl(HWND hwnd)
{
if ((NULL == _gpDbg) || (hwnd != _gpDbg->hwndCtrl))
return FALSE;
_gpDbg->hwndCtrl = NULL;
_gpDbg->msgDisplay = 0;
return TRUE;
}
BOOL WINAPI NmDbgSetLoggingOptions(HWND hwnd, UINT uOptions)
{
return FALSE;
}
PNMDBG WINAPI GetPNmDbg(void)
{
return _gpDbg;
}
VOID WINAPI NmDbgSetZoneFileName(HDBGZONE hZone, LPCSTR pszFile)
{
PSTR pszZoneFile;
if (IsBadWritePtr((PVOID) hZone, sizeof(ZONEINFO)))
return;
if (((PZONEINFO) hZone)->ulSignature != ZONEINFO_SIGN)
return;
pszZoneFile = &(((PZONEINFO) hZone)->szFile[0]);
if (NULL == pszFile)
{
*pszZoneFile = '\0';
}
else
{
lstrcpynA(pszZoneFile, pszFile, CCHMAX(((PZONEINFO) hZone)->szFile));
}
}
/* D B G C U R R E N T T I M E */
/*-------------------------------------------------------------------------
%%Function: DbgCurrentTime
Format the current time
-------------------------------------------------------------------------*/
VOID DbgCurrentTime(PCHAR psz)
{
if (DBG_FMTTIME_TICK == _gpDbg->uShowTime)
{
wsprintfA(psz, "[%04X] ", GetTickCount());
}
else
{
SYSTEMTIME sysTime;
GetLocalTime(&sysTime);
switch (_gpDbg->uShowTime)
{
default:
case DBG_FMTTIME_FULL:
wsprintfA(psz, "[%04d/%02d/%02d %02d:%02d:%02d.%03d] ",
sysTime.wYear, sysTime.wMonth, sysTime.wDay,
sysTime.wHour, sysTime.wMinute, sysTime.wSecond, sysTime.wMilliseconds);
break;
case DBG_FMTTIME_DAY:
wsprintfA(psz, "[%02d:%02d:%02d.%03d] ",
sysTime.wHour, sysTime.wMinute, sysTime.wSecond, sysTime.wMilliseconds);
break;
}
}
}
/* P S Z P R I N T F */
/*-------------------------------------------------------------------------
%%Function: PszPrintf
Utility function to wsprintf a string for debug.
-------------------------------------------------------------------------*/
PSTR PszPrintf(PCSTR pszFormat,...)
{
PSTR psz = (PSTR) LocalAlloc(LMEM_FIXED, MAX_PATH);
if (NULL != psz)
{
va_list v1;
va_start(v1, pszFormat);
wvsprintfA(psz, pszFormat, v1);
va_end(v1);
}
return psz;
}
/* D E B U G T R A P F N */
/*-------------------------------------------------------------------------
%%Function: DebugTrapFn
-------------------------------------------------------------------------*/
VOID NMINTERNAL DebugTrapFn(VOID)
{
_DbgBreak();
}
VOID DebugPrintfTraceMem(LPCSTR pszFormat,...)
{
// DO NOTHING
va_list arglist;
va_start(arglist, pszFormat);
va_end(arglist);
}
#endif /* NM_DEBUG - almost the whole file */
/*************************************************************************/
const int RPF_UNKNOWN = 0;
const int RPF_ENABLED = 1;
const int RPF_DISABLED = 2;
static int gRpf = RPF_UNKNOWN;
static TCHAR gszRetailOutputFilename[MAX_PATH]; // retail trace filename
/* F E N A B L E D R E T A I L P R I N T F */
/*-------------------------------------------------------------------------
%%Function: FEnabledRetailPrintf
Return TRUE if retail output is enabled.
-------------------------------------------------------------------------*/
BOOL FEnabledRetailPrintf(VOID)
{
if (RPF_UNKNOWN == gRpf)
{
RegEntry reDebug(DEBUG_KEY, HKEY_LOCAL_MACHINE);
gRpf = reDebug.GetNumber(REGVAL_RETAIL_LOG, RPF_DISABLED);
if ((RPF_ENABLED != gRpf) ||
(!GetInstallDirectory(gszRetailOutputFilename)) )
{
gRpf = RPF_DISABLED;
}
else
{
lstrcat(gszRetailOutputFilename, RETAIL_LOG_FILENAME);
}
}
return (RPF_ENABLED == gRpf);
}
/* R E T A I L P R I N T F T R A C E */
/*-------------------------------------------------------------------------
%%Function: RetailPrintfTrace
Print retail information to a file
-------------------------------------------------------------------------*/
VOID WINAPI RetailPrintfTrace(LPCSTR pszFormat,...)
{
HANDLE hFile;
va_list v1;
CHAR szOutput[1024];
if (!FEnabledRetailPrintf())
return; // Retail output is disabled
va_start(v1, pszFormat);
#ifdef DEBUG
// Also use normal output mechanism for debug builds
_DbgPrintf(NULL, "Retail:PrintfTrace", pszFormat, v1);
#endif
wvsprintfA(szOutput, pszFormat, v1);
// Always append the CRLF
ASSERT(lstrlenA(szOutput) < (CCHMAX(szOutput)-2));
lstrcatA(szOutput, "\r\n");
// open a log file for appending. create if does not exist
hFile = CreateFile(gszRetailOutputFilename, GENERIC_WRITE,
0, NULL, OPEN_ALWAYS, FILE_ATTRIBUTE_NORMAL, (HANDLE)NULL);
if (hFile != INVALID_HANDLE_VALUE)
{
// seek to end of file
DWORD dw = SetFilePointer(hFile, 0, NULL, FILE_END);
WriteFile(hFile, szOutput, lstrlenA(szOutput), &dw, NULL);
CloseHandle(hFile);
}
va_end(v1);
}
//
// CreateSids
//
// Create 3 Security IDs
//
// Caller must free memory allocated to SIDs on success.
//
// Returns: TRUE if successfull, FALSE if not.
//
BOOL
CreateSids(
PSID *BuiltInAdministrators,
PSID *PowerUsers,
PSID *AuthenticatedUsers
)
{
//
// An SID is built from an Identifier Authority and a set of Relative IDs
// (RIDs). The Authority of interest to us SECURITY_NT_AUTHORITY.
//
SID_IDENTIFIER_AUTHORITY NtAuthority = SECURITY_NT_AUTHORITY;
//
// Each RID represents a sub-unit of the authority. Two of the SIDs we
// want to build, Local Administrators, and Power Users, are in the "built
// in" domain. The other SID, for Authenticated users, is based directly
// off of the authority.
//
// For examples of other useful SIDs consult the list in
// \nt\public\sdk\inc\ntseapi.h.
//
if (!AllocateAndInitializeSid(&NtAuthority,
2, // 2 sub-authorities
SECURITY_BUILTIN_DOMAIN_RID,
DOMAIN_ALIAS_RID_ADMINS,
0,0,0,0,0,0,
BuiltInAdministrators)) {
// error
} else if (!AllocateAndInitializeSid(&NtAuthority,
2, // 2 sub-authorities
SECURITY_BUILTIN_DOMAIN_RID,
DOMAIN_ALIAS_RID_POWER_USERS,
0,0,0,0,0,0,
PowerUsers)) {
// error
FreeSid(*BuiltInAdministrators);
*BuiltInAdministrators = NULL;
} else if (!AllocateAndInitializeSid(&NtAuthority,
1, // 1 sub-authority
SECURITY_AUTHENTICATED_USER_RID,
0,0,0,0,0,0,0,
AuthenticatedUsers)) {
// error
FreeSid(*BuiltInAdministrators);
*BuiltInAdministrators = NULL;
FreeSid(*PowerUsers);
*PowerUsers = NULL;
} else {
return TRUE;
}
return FALSE;
}
//
// CreateSd
//
// Creates a SECURITY_DESCRIPTOR with specific DACLs. Modify the code to
// change.
//
// Caller must free the returned buffer if not NULL.
//
PSECURITY_DESCRIPTOR
CreateSd(
VOID
)
{
PSID AuthenticatedUsers;
PSID BuiltInAdministrators;
PSID PowerUsers;
if (!CreateSids(&BuiltInAdministrators,
&PowerUsers,
&AuthenticatedUsers)) {
// error
} else {
//
// Calculate the size of and allocate a buffer for the DACL, we need
// this value independently of the total alloc size for ACL init.
//
PSECURITY_DESCRIPTOR Sd = NULL;
ULONG AclSize;
//
// "- sizeof (ULONG)" represents the SidStart field of the
// ACCESS_ALLOWED_ACE. Since we're adding the entire length of the
// SID, this field is counted twice.
//
AclSize = sizeof (ACL) +
(3 * (sizeof (ACCESS_ALLOWED_ACE) - sizeof (ULONG))) +
GetLengthSid(AuthenticatedUsers) +
GetLengthSid(BuiltInAdministrators) +
GetLengthSid(PowerUsers);
Sd = (PSECURITY_DESCRIPTOR) HeapAlloc(GetProcessHeap(), 0, SECURITY_DESCRIPTOR_MIN_LENGTH + AclSize);
if (!Sd) {
// error
} else {
ACL *Acl;
Acl = (ACL *)((BYTE *)Sd + SECURITY_DESCRIPTOR_MIN_LENGTH);
if (!InitializeAcl(Acl,
AclSize,
ACL_REVISION)) {
// error
} else if (!AddAccessAllowedAce(Acl,
ACL_REVISION,
SYNCHRONIZE | GENERIC_READ,
AuthenticatedUsers)) {
// Failed to build the ACE granting "Authenticated users"
// (SYNCHRONIZE | GENERIC_READ) access.
} else if (!AddAccessAllowedAce(Acl,
ACL_REVISION,
SYNCHRONIZE | GENERIC_READ | GENERIC_WRITE,
PowerUsers)) {
// Failed to build the ACE granting "Power users"
// (SYNCHRONIZE | GENERIC_READ | GENERIC_WRITE) access.
} else if (!AddAccessAllowedAce(Acl,
ACL_REVISION,
GENERIC_ALL,
BuiltInAdministrators)) {
// Failed to build the ACE granting "Built-in Administrators"
// GENERIC_ALL access.
} else if (!InitializeSecurityDescriptor(Sd,
SECURITY_DESCRIPTOR_REVISION)) {
// error
} else if (!SetSecurityDescriptorDacl(Sd,
TRUE,
Acl,
FALSE)) {
// error
} else {
FreeSid(AuthenticatedUsers);
FreeSid(BuiltInAdministrators);
FreeSid(PowerUsers);
return Sd;
}
HeapFree(GetProcessHeap(), 0, Sd);
}
FreeSid(AuthenticatedUsers);
FreeSid(BuiltInAdministrators);
FreeSid(PowerUsers);
}
return NULL;
}