1128 lines
28 KiB
C++
1128 lines
28 KiB
C++
/* fhandler_registry.cc: fhandler for /proc/registry virtual filesystem
|
|
|
|
Copyright 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012,
|
|
2013, 2015 Red Hat, Inc.
|
|
|
|
This file is part of Cygwin.
|
|
|
|
This software is a copyrighted work licensed under the terms of the
|
|
Cygwin license. Please consult the file "CYGWIN_LICENSE" for
|
|
details. */
|
|
|
|
/* FIXME: Access permissions are ignored at the moment. */
|
|
|
|
#include "winsup.h"
|
|
#include <stdlib.h>
|
|
#include "cygerrno.h"
|
|
#include "security.h"
|
|
#include "path.h"
|
|
#include "fhandler.h"
|
|
#include "dtable.h"
|
|
#include "cygheap.h"
|
|
#include "child_info.h"
|
|
|
|
#define _COMPILING_NEWLIB
|
|
#include <dirent.h>
|
|
|
|
/* If this bit is set in __d_position then we are enumerating values,
|
|
* else sub-keys. keeping track of where we are is horribly messy
|
|
* the bottom 16 bits are the absolute position and the top 15 bits
|
|
* make up the value index if we are enuerating values.
|
|
*/
|
|
static const __int32_t REG_ENUM_VALUES_MASK = 0x8000000;
|
|
static const __int32_t REG_POSITION_MASK = 0xffff;
|
|
|
|
/* These key paths are used below whenever we return key information.
|
|
The problem is UAC virtualization when running an admin account with
|
|
restricted rights. In that case the subkey "Classes" in the VirtualStore
|
|
points to the HKEY_CLASSES_ROOT key again. If "Classes" is handled as a
|
|
normal subdirectory, applications recursing throught the directory
|
|
hirarchy will invariably run into an infinite recursion. What we do here
|
|
is to handle the "Classes" subkey as a symlink to HKEY_CLASSES_ROOT. This
|
|
avoids the infinite recursion, unless the application blindly follows
|
|
symlinks pointing to directories, in which case it's their own fault. */
|
|
#define VIRT_CLASSES_KEY_PREFIX "/VirtualStore/MACHINE/SOFTWARE"
|
|
#define VIRT_CLASSES_KEY_SUFFIX "Classes"
|
|
#define VIRT_CLASSES_KEY VIRT_CLASSES_KEY_PREFIX "/" VIRT_CLASSES_KEY_SUFFIX
|
|
#define VIRT_CLASSES_LINKTGT "/proc/registry/HKEY_CLASSES_ROOT"
|
|
|
|
/* List of root keys in /proc/registry.
|
|
* Possibly we should filter out those not relevant to the flavour of Windows
|
|
* Cygwin is running on.
|
|
*/
|
|
static const char *registry_listing[] =
|
|
{
|
|
".",
|
|
"..",
|
|
"HKEY_CLASSES_ROOT",
|
|
"HKEY_CURRENT_CONFIG",
|
|
"HKEY_CURRENT_USER",
|
|
"HKEY_LOCAL_MACHINE",
|
|
"HKEY_USERS",
|
|
"HKEY_PERFORMANCE_DATA",
|
|
NULL
|
|
};
|
|
|
|
static const HKEY registry_keys[] =
|
|
{
|
|
(HKEY) INVALID_HANDLE_VALUE,
|
|
(HKEY) INVALID_HANDLE_VALUE,
|
|
HKEY_CLASSES_ROOT,
|
|
HKEY_CURRENT_CONFIG,
|
|
HKEY_CURRENT_USER,
|
|
HKEY_LOCAL_MACHINE,
|
|
HKEY_USERS,
|
|
HKEY_PERFORMANCE_DATA
|
|
};
|
|
|
|
static const int ROOT_KEY_COUNT = sizeof (registry_keys) / sizeof (HKEY);
|
|
|
|
/* Make sure to access the correct per-user HKCR and HKCU hives, even if
|
|
the current user is only impersonated in another user's session. */
|
|
static HKEY
|
|
fetch_hkey (int idx) /* idx *must* be valid */
|
|
{
|
|
HKEY key;
|
|
|
|
if (registry_keys[idx] == HKEY_CLASSES_ROOT)
|
|
{
|
|
if (RegOpenUserClassesRoot (cygheap->user.issetuid ()
|
|
? cygheap->user.imp_token () : hProcToken,
|
|
0, KEY_READ, &key) == ERROR_SUCCESS)
|
|
return key;
|
|
}
|
|
else if (registry_keys[idx] == HKEY_CURRENT_USER)
|
|
{
|
|
if (RegOpenCurrentUser (KEY_READ, &key) == ERROR_SUCCESS)
|
|
return key;
|
|
}
|
|
else if (registry_keys[idx] == HKEY_CURRENT_CONFIG)
|
|
{
|
|
if (RegOpenKeyExW (HKEY_LOCAL_MACHINE,
|
|
L"System\\CurrentControlSet\\Hardware Profiles\\Current",
|
|
0, KEY_READ, &key) == ERROR_SUCCESS)
|
|
return key;
|
|
}
|
|
/* Unfortunately there's no way to generate a valid OS registry key for
|
|
the other root keys. HKEY_USERS and HKEY_LOCAL_MACHINE are file
|
|
handles internally, HKEY_PERFORMANCE_DATA is just a bad hack and
|
|
no registry key at all. */
|
|
return registry_keys[idx];
|
|
}
|
|
|
|
/* These get added to each subdirectory in /proc/registry.
|
|
* If we wanted to implement writing, we could maybe add a '.writable' entry or
|
|
* suchlike.
|
|
*/
|
|
static const char *special_dot_files[] =
|
|
{
|
|
".",
|
|
"..",
|
|
NULL
|
|
};
|
|
|
|
static const int SPECIAL_DOT_FILE_COUNT =
|
|
(sizeof (special_dot_files) / sizeof (const char *)) - 1;
|
|
|
|
/* Value names for HKEY_PERFORMANCE_DATA.
|
|
*
|
|
* CAUTION: Never call RegQueryValueEx (HKEY_PERFORMANCE_DATA, "Add", ...).
|
|
* It WRITES data and may destroy the perfc009.dat file. Same applies to
|
|
* name prefixes "Ad" and "A".
|
|
*/
|
|
static const char * const perf_data_files[] =
|
|
{
|
|
"@",
|
|
"Costly",
|
|
"Global"
|
|
};
|
|
|
|
static const int PERF_DATA_FILE_COUNT =
|
|
sizeof (perf_data_files) / sizeof (perf_data_files[0]);
|
|
|
|
static HKEY open_key (const char *name, REGSAM access, DWORD wow64, bool isValue);
|
|
|
|
/* Return true if char must be encoded.
|
|
*/
|
|
static inline bool
|
|
must_encode (wchar_t c)
|
|
{
|
|
return (iswdirsep (c) || c == L':' || c == L'%');
|
|
}
|
|
|
|
/* Encode special chars in registry key or value name.
|
|
* Returns 0: success, -1: error.
|
|
*/
|
|
static int
|
|
encode_regname (char *dst, const wchar_t *src, bool add_val)
|
|
{
|
|
int di = 0;
|
|
if (!src[0])
|
|
dst[di++] = '@'; // Default value.
|
|
else
|
|
for (int si = 0; src[si]; si++)
|
|
{
|
|
wchar_t c = src[si];
|
|
if (must_encode (c) ||
|
|
(si == 0 && ((c == L'.'
|
|
&& (!src[1] || (src[1] == L'.' && !src[2])))
|
|
|| (c == L'@' && !src[1]))))
|
|
{
|
|
if (di + 3 >= NAME_MAX + 1)
|
|
return -1;
|
|
__small_sprintf (dst + di, "%%%02x", c);
|
|
di += 3;
|
|
}
|
|
else
|
|
di += sys_wcstombs (dst + di, NAME_MAX + 1 - di, &c, 1);
|
|
}
|
|
|
|
if (add_val)
|
|
{
|
|
if (di + 4 >= NAME_MAX + 1)
|
|
return -1;
|
|
memcpy (dst + di, "%val", 4);
|
|
di += 4;
|
|
}
|
|
|
|
dst[di] = 0;
|
|
return 0;
|
|
}
|
|
|
|
/* Decode special chars in registry key or value name.
|
|
* Returns 0: success, 1: "%val" detected, -1: error.
|
|
*/
|
|
static int
|
|
decode_regname (wchar_t *wdst, const char *src, int len = -1)
|
|
{
|
|
if (len < 0)
|
|
len = strlen (src);
|
|
char dst[len + 1];
|
|
int res = 0;
|
|
|
|
if (len > 4 && !memcmp (src + len - 4, "%val", 4))
|
|
{
|
|
len -= 4;
|
|
res = 1;
|
|
}
|
|
|
|
int di = 0;
|
|
if (len == 1 && src[0] == '@')
|
|
; // Default value.
|
|
else
|
|
for (int si = 0; si < len; si++)
|
|
{
|
|
char c = src[si];
|
|
if (c == '%')
|
|
{
|
|
if (si + 2 >= len)
|
|
return -1;
|
|
char s[] = {src[si+1], src[si+2], '\0'};
|
|
char *p;
|
|
c = strtoul (s, &p, 16);
|
|
if (!(must_encode ((wchar_t) c) ||
|
|
(si == 0 && ((c == '.' && (len == 3 || (src[3] == '.' && len == 4))) ||
|
|
(c == '@' && len == 3)))))
|
|
return -1;
|
|
dst[di++] = c;
|
|
si += 2;
|
|
}
|
|
else
|
|
dst[di++] = c;
|
|
}
|
|
|
|
dst[di] = 0;
|
|
sys_mbstowcs (wdst, NAME_MAX + 1, dst);
|
|
return res;
|
|
}
|
|
|
|
|
|
/* Hash table to limit calls to key_exists ().
|
|
*/
|
|
class __DIR_hash
|
|
{
|
|
public:
|
|
__DIR_hash ()
|
|
{
|
|
memset (table, 0, sizeof(table));
|
|
}
|
|
|
|
void set (unsigned h)
|
|
{
|
|
table [(h >> 3) & (HASH_SIZE - 1)] |= (1 << (h & 0x3));
|
|
}
|
|
|
|
bool is_set (unsigned h) const
|
|
{
|
|
return (table [(h >> 3) & (HASH_SIZE - 1)] & (1 << (h & 0x3))) != 0;
|
|
}
|
|
|
|
private:
|
|
enum { HASH_SIZE = 1024 };
|
|
unsigned char table[HASH_SIZE];
|
|
};
|
|
|
|
#define d_hash(d) ((__DIR_hash *) (d)->__d_internal)
|
|
|
|
|
|
/* Return true if subkey NAME exists in key PARENT.
|
|
*/
|
|
static bool
|
|
key_exists (HKEY parent, const wchar_t *name, DWORD wow64)
|
|
{
|
|
HKEY hKey = (HKEY) INVALID_HANDLE_VALUE;
|
|
LONG error = RegOpenKeyExW (parent, name, 0, KEY_READ | wow64, &hKey);
|
|
if (error == ERROR_SUCCESS)
|
|
RegCloseKey (hKey);
|
|
|
|
return (error == ERROR_SUCCESS || error == ERROR_ACCESS_DENIED);
|
|
}
|
|
|
|
static size_t
|
|
multi_wcstombs (char *dst, size_t len, const wchar_t *src, size_t nwc)
|
|
{
|
|
size_t siz, sum = 0;
|
|
const wchar_t *nsrc;
|
|
|
|
while (nwc)
|
|
{
|
|
siz = sys_wcstombs (dst, len, src, nwc);
|
|
sum += siz;
|
|
if (dst)
|
|
{
|
|
dst += siz;
|
|
len -= siz;
|
|
}
|
|
nsrc = wcschr (src, L'\0') + 1;
|
|
if ((size_t) (nsrc - src) >= nwc)
|
|
break;
|
|
nwc -= nsrc - src;
|
|
src = nsrc;
|
|
if (*src == L'\0')
|
|
{
|
|
if (dst)
|
|
*dst++ = '\0';
|
|
++sum;
|
|
break;
|
|
}
|
|
}
|
|
return sum;
|
|
}
|
|
|
|
/* Returns 0 if path doesn't exist, >0 if path is a directory,
|
|
* <0 if path is a file.
|
|
*
|
|
* We open the last key but one and then enum it's sub-keys and values to see if the
|
|
* final component is there. This gets round the problem of not having security access
|
|
* to the final key in the path.
|
|
*/
|
|
virtual_ftype_t
|
|
fhandler_registry::exists ()
|
|
{
|
|
virtual_ftype_t file_type = virt_none;
|
|
int index = 0, pathlen;
|
|
DWORD buf_size = NAME_MAX + 1;
|
|
LONG error;
|
|
wchar_t buf[buf_size];
|
|
const char *file;
|
|
HKEY hKey = (HKEY) INVALID_HANDLE_VALUE;
|
|
|
|
const char *path = get_name ();
|
|
debug_printf ("exists (%s)", path);
|
|
path += proc_len + prefix_len + 1;
|
|
if (*path)
|
|
path++;
|
|
else
|
|
{
|
|
file_type = virt_rootdir;
|
|
goto out;
|
|
}
|
|
pathlen = strlen (path);
|
|
file = path + pathlen - 1;
|
|
if (isdirsep (*file) && pathlen > 1)
|
|
file--;
|
|
while (!isdirsep (*file))
|
|
file--;
|
|
file++;
|
|
|
|
if (file == path)
|
|
{
|
|
for (int i = 0; registry_listing[i]; i++)
|
|
if (path_prefix_p (registry_listing[i], path,
|
|
strlen (registry_listing[i]), true))
|
|
{
|
|
file_type = virt_directory;
|
|
break;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
wchar_t dec_file[NAME_MAX + 1];
|
|
|
|
int val_only = decode_regname (dec_file, file);
|
|
if (val_only < 0)
|
|
goto out;
|
|
|
|
if (!val_only)
|
|
hKey = open_key (path, KEY_READ, wow64, false);
|
|
if (hKey != (HKEY) INVALID_HANDLE_VALUE)
|
|
{
|
|
if (!strcasecmp (path + strlen (path)
|
|
- sizeof (VIRT_CLASSES_KEY) + 1,
|
|
VIRT_CLASSES_KEY))
|
|
file_type = virt_symlink;
|
|
else
|
|
file_type = virt_directory;
|
|
}
|
|
else
|
|
{
|
|
/* Key does not exist or open failed with EACCES,
|
|
enumerate subkey and value names of parent key. */
|
|
hKey = open_key (path, KEY_READ, wow64, true);
|
|
if (hKey == (HKEY) INVALID_HANDLE_VALUE)
|
|
return virt_none;
|
|
|
|
if (hKey == HKEY_PERFORMANCE_DATA)
|
|
{
|
|
/* RegEnumValue () returns garbage for this key.
|
|
RegQueryValueEx () returns a PERF_DATA_BLOCK even
|
|
if a value does not contain any counter objects.
|
|
So allow access to the generic names and to
|
|
(blank separated) lists of counter numbers.
|
|
Never allow access to "Add", see above comment. */
|
|
for (int i = 0; i < PERF_DATA_FILE_COUNT
|
|
&& file_type == virt_none; i++)
|
|
{
|
|
if (strcasematch (perf_data_files[i], file))
|
|
file_type = virt_file;
|
|
}
|
|
if (file_type == virt_none && !file[strspn (file, " 0123456789")])
|
|
file_type = virt_file;
|
|
goto out;
|
|
}
|
|
|
|
if (!val_only && dec_file[0])
|
|
{
|
|
while (ERROR_SUCCESS ==
|
|
(error = RegEnumKeyExW (hKey, index++, buf, &buf_size,
|
|
NULL, NULL, NULL, NULL))
|
|
|| (error == ERROR_MORE_DATA))
|
|
{
|
|
if (!wcscasecmp (buf, dec_file))
|
|
{
|
|
file_type = virt_directory;
|
|
goto out;
|
|
}
|
|
buf_size = NAME_MAX + 1;
|
|
}
|
|
if (error != ERROR_NO_MORE_ITEMS)
|
|
{
|
|
seterrno_from_win_error (__FILE__, __LINE__, error);
|
|
goto out;
|
|
}
|
|
index = 0;
|
|
buf_size = NAME_MAX + 1;
|
|
}
|
|
|
|
while (ERROR_SUCCESS ==
|
|
(error = RegEnumValueW (hKey, index++, buf, &buf_size,
|
|
NULL, NULL, NULL, NULL))
|
|
|| (error == ERROR_MORE_DATA))
|
|
{
|
|
if (!wcscasecmp (buf, dec_file))
|
|
{
|
|
file_type = virt_file;
|
|
goto out;
|
|
}
|
|
buf_size = NAME_MAX + 1;
|
|
}
|
|
if (error != ERROR_NO_MORE_ITEMS)
|
|
{
|
|
seterrno_from_win_error (__FILE__, __LINE__, error);
|
|
goto out;
|
|
}
|
|
}
|
|
}
|
|
out:
|
|
if (hKey != (HKEY) INVALID_HANDLE_VALUE)
|
|
RegCloseKey (hKey);
|
|
return file_type;
|
|
}
|
|
|
|
void
|
|
fhandler_registry::set_name (path_conv &in_pc)
|
|
{
|
|
if (strncasematch (in_pc.get_posix (), "/proc/registry32", 16))
|
|
{
|
|
wow64 = KEY_WOW64_32KEY;
|
|
prefix_len += 2;
|
|
}
|
|
else if (strncasematch (in_pc.get_posix (), "/proc/registry64", 16))
|
|
{
|
|
wow64 = KEY_WOW64_64KEY;
|
|
prefix_len += 2;
|
|
}
|
|
fhandler_base::set_name (in_pc);
|
|
}
|
|
|
|
fhandler_registry::fhandler_registry ():
|
|
fhandler_proc ()
|
|
{
|
|
wow64 = 0;
|
|
prefix_len = sizeof ("registry") - 1;
|
|
}
|
|
|
|
int __reg2
|
|
fhandler_registry::fstat (struct stat *buf)
|
|
{
|
|
fhandler_base::fstat (buf);
|
|
buf->st_mode &= ~_IFMT & NO_W;
|
|
virtual_ftype_t file_type = exists ();
|
|
switch (file_type)
|
|
{
|
|
case virt_none:
|
|
set_errno (ENOENT);
|
|
return -1;
|
|
case virt_symlink:
|
|
buf->st_mode |= S_IFLNK | S_IRWXU | S_IRWXG | S_IRWXO;
|
|
break;
|
|
case virt_directory:
|
|
buf->st_mode |= S_IFDIR | S_IXUSR | S_IXGRP | S_IXOTH;
|
|
break;
|
|
case virt_rootdir:
|
|
buf->st_mode |= S_IFDIR | S_IXUSR | S_IXGRP | S_IXOTH;
|
|
buf->st_nlink = ROOT_KEY_COUNT;
|
|
break;
|
|
default:
|
|
case virt_file:
|
|
buf->st_mode |= S_IFREG;
|
|
buf->st_mode &= NO_X;
|
|
break;
|
|
}
|
|
if (file_type != virt_none && file_type != virt_rootdir)
|
|
{
|
|
HKEY hKey;
|
|
const char *path = get_name () + proc_len + prefix_len + 2;
|
|
hKey =
|
|
open_key (path, STANDARD_RIGHTS_READ | KEY_QUERY_VALUE, wow64,
|
|
(file_type < virt_none) ? true : false);
|
|
|
|
if (hKey == HKEY_PERFORMANCE_DATA)
|
|
/* RegQueryInfoKey () always returns write time 0,
|
|
RegQueryValueEx () does not return required buffer size. */
|
|
;
|
|
else if (hKey != (HKEY) INVALID_HANDLE_VALUE)
|
|
{
|
|
FILETIME ftLastWriteTime;
|
|
DWORD subkey_count;
|
|
if (ERROR_SUCCESS ==
|
|
RegQueryInfoKeyW (hKey, NULL, NULL, NULL, &subkey_count, NULL,
|
|
NULL, NULL, NULL, NULL, NULL, &ftLastWriteTime))
|
|
{
|
|
to_timestruc_t ((PLARGE_INTEGER) &ftLastWriteTime, &buf->st_mtim);
|
|
buf->st_ctim = buf->st_birthtim = buf->st_mtim;
|
|
time_as_timestruc_t (&buf->st_atim);
|
|
if (file_type > virt_none)
|
|
buf->st_nlink = subkey_count + 2;
|
|
else
|
|
{
|
|
int pathlen = strlen (path);
|
|
const char *value_name = path + pathlen - 1;
|
|
if (isdirsep (*value_name) && pathlen > 1)
|
|
value_name--;
|
|
while (!isdirsep (*value_name))
|
|
value_name--;
|
|
value_name++;
|
|
wchar_t dec_value_name[NAME_MAX + 1];
|
|
DWORD dwSize = 0;
|
|
DWORD type;
|
|
if (decode_regname (dec_value_name, value_name) >= 0
|
|
&& RegQueryValueExW (hKey, dec_value_name, NULL, &type,
|
|
NULL, &dwSize) == ERROR_SUCCESS
|
|
&& (type == REG_SZ || type == REG_EXPAND_SZ
|
|
|| type == REG_MULTI_SZ || type == REG_LINK))
|
|
{
|
|
PBYTE tmpbuf = (PBYTE) malloc (dwSize);
|
|
if (!tmpbuf
|
|
|| RegQueryValueExW (hKey, dec_value_name,
|
|
NULL, NULL, tmpbuf, &dwSize)
|
|
!= ERROR_SUCCESS)
|
|
buf->st_size = dwSize / sizeof (wchar_t);
|
|
else if (type == REG_MULTI_SZ)
|
|
buf->st_size = multi_wcstombs (NULL, 0,
|
|
(wchar_t *) tmpbuf,
|
|
dwSize / sizeof (wchar_t));
|
|
else
|
|
buf->st_size = sys_wcstombs (NULL, 0,
|
|
(wchar_t *) tmpbuf,
|
|
dwSize / sizeof (wchar_t));
|
|
if (tmpbuf)
|
|
free (tmpbuf);
|
|
}
|
|
else
|
|
buf->st_size = dwSize;
|
|
}
|
|
uid_t uid;
|
|
gid_t gid;
|
|
if (get_reg_attribute (hKey, &buf->st_mode, &uid, &gid) == 0)
|
|
{
|
|
buf->st_uid = uid;
|
|
buf->st_gid = gid;
|
|
buf->st_mode &= ~(S_IWUSR | S_IWGRP | S_IWOTH);
|
|
if (file_type > virt_none)
|
|
buf->st_mode |= S_IFDIR;
|
|
else
|
|
buf->st_mode &= NO_X;
|
|
}
|
|
}
|
|
RegCloseKey (hKey);
|
|
}
|
|
else
|
|
{
|
|
/* Here's the problem: If we can't open the key, we don't know
|
|
nothing at all about the key/value. It's only clear that
|
|
the current user has no read access. At this point it's
|
|
rather unlikely that the user has write or execute access
|
|
and it's also rather unlikely that the user is the owner.
|
|
Therefore it's probably most safe to assume unknown ownership
|
|
and no permissions for nobody. */
|
|
buf->st_uid = ILLEGAL_UID;
|
|
buf->st_gid = ILLEGAL_GID;
|
|
buf->st_mode &= ~0777;
|
|
}
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
DIR *
|
|
fhandler_registry::opendir (int fd)
|
|
{
|
|
/* Skip fhandler_proc::opendir, which allocates dir->_d_handle for its
|
|
own devilish purposes... */
|
|
return fhandler_virtual::opendir (fd);
|
|
}
|
|
|
|
int
|
|
fhandler_registry::readdir (DIR *dir, dirent *de)
|
|
{
|
|
DWORD buf_size = NAME_MAX + 1;
|
|
wchar_t buf[buf_size];
|
|
const char *path = dir->__d_dirname + proc_len + 1 + prefix_len;
|
|
LONG error;
|
|
int res = ENMFILE;
|
|
|
|
dir->__flags |= dirent_saw_dot | dirent_saw_dot_dot;
|
|
if (*path == 0)
|
|
{
|
|
if (dir->__d_position >= ROOT_KEY_COUNT)
|
|
goto out;
|
|
strcpy (de->d_name, registry_listing[dir->__d_position++]);
|
|
res = 0;
|
|
goto out;
|
|
}
|
|
if (dir->__handle == INVALID_HANDLE_VALUE)
|
|
{
|
|
if (dir->__d_position != 0)
|
|
goto out;
|
|
dir->__handle = open_key (path + 1, KEY_READ, wow64, false);
|
|
if (dir->__handle == INVALID_HANDLE_VALUE)
|
|
goto out;
|
|
dir->__d_internal = (uintptr_t) new __DIR_hash ();
|
|
}
|
|
if (dir->__d_position < SPECIAL_DOT_FILE_COUNT)
|
|
{
|
|
strcpy (de->d_name, special_dot_files[dir->__d_position++]);
|
|
res = 0;
|
|
goto out;
|
|
}
|
|
if ((HKEY) dir->__handle == HKEY_PERFORMANCE_DATA)
|
|
{
|
|
/* RegEnumValue () returns garbage for this key,
|
|
simulate only a minimal listing of the generic names. */
|
|
if (dir->__d_position >= SPECIAL_DOT_FILE_COUNT + PERF_DATA_FILE_COUNT)
|
|
goto out;
|
|
strcpy (de->d_name, perf_data_files[dir->__d_position - SPECIAL_DOT_FILE_COUNT]);
|
|
dir->__d_position++;
|
|
res = 0;
|
|
goto out;
|
|
}
|
|
|
|
retry:
|
|
if (dir->__d_position & REG_ENUM_VALUES_MASK)
|
|
/* For the moment, the type of key is ignored here. when write access is added,
|
|
* maybe add an extension for the type of each value?
|
|
*/
|
|
error = RegEnumValueW ((HKEY) dir->__handle,
|
|
(dir->__d_position & ~REG_ENUM_VALUES_MASK) >> 16,
|
|
buf, &buf_size, NULL, NULL, NULL, NULL);
|
|
else
|
|
error =
|
|
RegEnumKeyExW ((HKEY) dir->__handle, dir->__d_position -
|
|
SPECIAL_DOT_FILE_COUNT, buf, &buf_size,
|
|
NULL, NULL, NULL, NULL);
|
|
if (error == ERROR_NO_MORE_ITEMS
|
|
&& (dir->__d_position & REG_ENUM_VALUES_MASK) == 0)
|
|
{
|
|
/* If we're finished with sub-keys, start on values under this key. */
|
|
dir->__d_position |= REG_ENUM_VALUES_MASK;
|
|
buf_size = NAME_MAX + 1;
|
|
goto retry;
|
|
}
|
|
if (error != ERROR_SUCCESS && error != ERROR_MORE_DATA)
|
|
{
|
|
delete d_hash (dir);
|
|
RegCloseKey ((HKEY) dir->__handle);
|
|
dir->__handle = INVALID_HANDLE_VALUE;
|
|
if (error != ERROR_NO_MORE_ITEMS)
|
|
seterrno_from_win_error (__FILE__, __LINE__, error);
|
|
goto out;
|
|
}
|
|
|
|
/* We get here if `buf' contains valid data. */
|
|
dir->__d_position++;
|
|
if (dir->__d_position & REG_ENUM_VALUES_MASK)
|
|
dir->__d_position += 0x10000;
|
|
|
|
{
|
|
/* Append "%val" if value name is identical to a previous key name. */
|
|
unsigned h = hash_path_name (1, buf);
|
|
bool add_val = false;
|
|
if (! (dir->__d_position & REG_ENUM_VALUES_MASK))
|
|
d_hash (dir)->set (h);
|
|
else if (d_hash (dir)->is_set (h)
|
|
&& key_exists ((HKEY) dir->__handle, buf, wow64))
|
|
add_val = true;
|
|
|
|
if (encode_regname (de->d_name, buf, add_val))
|
|
{
|
|
buf_size = NAME_MAX + 1;
|
|
goto retry;
|
|
}
|
|
}
|
|
|
|
if (dir->__d_position & REG_ENUM_VALUES_MASK)
|
|
de->d_type = DT_REG;
|
|
else if (!strcasecmp (de->d_name, "Classes")
|
|
&& !strcasecmp (path + strlen (path)
|
|
- sizeof (VIRT_CLASSES_KEY_PREFIX) + 1,
|
|
VIRT_CLASSES_KEY_PREFIX))
|
|
de->d_type = DT_LNK;
|
|
else
|
|
de->d_type = DT_DIR;
|
|
|
|
res = 0;
|
|
out:
|
|
syscall_printf ("%d = readdir(%p, %p)", res, dir, de);
|
|
return res;
|
|
}
|
|
|
|
long
|
|
fhandler_registry::telldir (DIR * dir)
|
|
{
|
|
return dir->__d_position & REG_POSITION_MASK;
|
|
}
|
|
|
|
void
|
|
fhandler_registry::seekdir (DIR * dir, long loc)
|
|
{
|
|
/* Unfortunately cannot simply set __d_position due to transition from sub-keys to
|
|
* values.
|
|
*/
|
|
rewinddir (dir);
|
|
while (loc > (dir->__d_position & REG_POSITION_MASK))
|
|
if (readdir (dir, dir->__d_dirent))
|
|
break;
|
|
}
|
|
|
|
void
|
|
fhandler_registry::rewinddir (DIR * dir)
|
|
{
|
|
if (dir->__handle != INVALID_HANDLE_VALUE)
|
|
{
|
|
delete d_hash (dir);
|
|
RegCloseKey ((HKEY) dir->__handle);
|
|
dir->__handle = INVALID_HANDLE_VALUE;
|
|
}
|
|
dir->__d_position = 0;
|
|
dir->__flags = dirent_saw_dot | dirent_saw_dot_dot;
|
|
}
|
|
|
|
int
|
|
fhandler_registry::closedir (DIR * dir)
|
|
{
|
|
int res = 0;
|
|
if (dir->__handle != INVALID_HANDLE_VALUE)
|
|
{
|
|
delete d_hash (dir);
|
|
if (RegCloseKey ((HKEY) dir->__handle) != ERROR_SUCCESS)
|
|
{
|
|
__seterrno ();
|
|
res = -1;
|
|
}
|
|
}
|
|
syscall_printf ("%d = closedir(%p)", res, dir);
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
fhandler_registry::open (int flags, mode_t mode)
|
|
{
|
|
int pathlen;
|
|
const char *file;
|
|
HKEY handle = (HKEY) INVALID_HANDLE_VALUE;
|
|
|
|
int res = fhandler_virtual::open (flags, mode);
|
|
if (!res)
|
|
goto out;
|
|
|
|
const char *path;
|
|
path = get_name () + proc_len + 1 + prefix_len;
|
|
if (!*path)
|
|
{
|
|
if ((flags & (O_CREAT | O_EXCL)) == (O_CREAT | O_EXCL))
|
|
{
|
|
set_errno (EEXIST);
|
|
res = 0;
|
|
goto out;
|
|
}
|
|
else if (flags & O_WRONLY)
|
|
{
|
|
set_errno (EISDIR);
|
|
res = 0;
|
|
goto out;
|
|
}
|
|
else
|
|
{
|
|
flags |= O_DIROPEN;
|
|
/* Marking as nohandle allows to call dup. */
|
|
nohandle (true);
|
|
goto success;
|
|
}
|
|
}
|
|
path++;
|
|
pathlen = strlen (path);
|
|
file = path + pathlen - 1;
|
|
if (isdirsep (*file) && pathlen > 1)
|
|
file--;
|
|
while (!isdirsep (*file))
|
|
file--;
|
|
file++;
|
|
|
|
if (file == path)
|
|
{
|
|
for (int i = 0; registry_listing[i]; i++)
|
|
if (path_prefix_p (registry_listing[i], path,
|
|
strlen (registry_listing[i]), true))
|
|
{
|
|
if ((flags & (O_CREAT | O_EXCL)) == (O_CREAT | O_EXCL))
|
|
{
|
|
set_errno (EEXIST);
|
|
res = 0;
|
|
goto out;
|
|
}
|
|
else if (flags & O_WRONLY)
|
|
{
|
|
set_errno (EISDIR);
|
|
res = 0;
|
|
goto out;
|
|
}
|
|
else
|
|
{
|
|
set_io_handle (fetch_hkey (i));
|
|
/* Marking as nohandle allows to call dup on pseudo registry
|
|
handles. */
|
|
if (get_handle () >= HKEY_CLASSES_ROOT)
|
|
nohandle (true);
|
|
flags |= O_DIROPEN;
|
|
goto success;
|
|
}
|
|
}
|
|
|
|
if (flags & O_CREAT)
|
|
{
|
|
set_errno (EROFS);
|
|
res = 0;
|
|
}
|
|
else
|
|
{
|
|
set_errno (ENOENT);
|
|
res = 0;
|
|
}
|
|
goto out;
|
|
}
|
|
|
|
if (flags & O_WRONLY)
|
|
{
|
|
set_errno (EROFS);
|
|
res = 0;
|
|
goto out;
|
|
}
|
|
else
|
|
{
|
|
wchar_t dec_file[NAME_MAX + 1];
|
|
int val_only = decode_regname (dec_file, file);
|
|
if (val_only < 0)
|
|
{
|
|
set_errno (EINVAL);
|
|
res = 0;
|
|
goto out;
|
|
}
|
|
|
|
if (!val_only)
|
|
handle = open_key (path, KEY_READ, wow64, false);
|
|
if (handle == (HKEY) INVALID_HANDLE_VALUE)
|
|
{
|
|
if (val_only || get_errno () != EACCES)
|
|
handle = open_key (path, KEY_READ, wow64, true);
|
|
if (handle == (HKEY) INVALID_HANDLE_VALUE)
|
|
{
|
|
res = 0;
|
|
goto out;
|
|
}
|
|
}
|
|
else
|
|
flags |= O_DIROPEN;
|
|
|
|
set_io_handle (handle);
|
|
set_close_on_exec (!!(flags & O_CLOEXEC));
|
|
value_name = cwcsdup (dec_file);
|
|
|
|
if (!(flags & O_DIROPEN) && !fill_filebuf ())
|
|
{
|
|
RegCloseKey (handle);
|
|
res = 0;
|
|
goto out;
|
|
}
|
|
|
|
if (flags & O_APPEND)
|
|
position = filesize;
|
|
else
|
|
position = 0;
|
|
}
|
|
|
|
success:
|
|
res = 1;
|
|
set_flags ((flags & ~O_TEXT) | O_BINARY);
|
|
set_open_status ();
|
|
out:
|
|
syscall_printf ("%d = fhandler_registry::open(%p, 0%o)", res, flags, mode);
|
|
return res;
|
|
}
|
|
|
|
int
|
|
fhandler_registry::close ()
|
|
{
|
|
int res = fhandler_virtual::close ();
|
|
if (res != 0)
|
|
return res;
|
|
HKEY handle = (HKEY) get_handle ();
|
|
if (handle != (HKEY) INVALID_HANDLE_VALUE && handle < HKEY_CLASSES_ROOT)
|
|
{
|
|
if (RegCloseKey (handle) != ERROR_SUCCESS)
|
|
{
|
|
__seterrno ();
|
|
res = -1;
|
|
}
|
|
}
|
|
if (!have_execed && value_name)
|
|
{
|
|
cfree (value_name);
|
|
value_name = NULL;
|
|
}
|
|
return res;
|
|
}
|
|
|
|
bool
|
|
fhandler_registry::fill_filebuf ()
|
|
{
|
|
DWORD type, size;
|
|
LONG error;
|
|
HKEY handle = (HKEY) get_handle ();
|
|
size_t bufalloc;
|
|
|
|
if (handle != HKEY_PERFORMANCE_DATA)
|
|
{
|
|
error = RegQueryValueExW (handle, value_name, NULL, &type, NULL, &size);
|
|
if (error != ERROR_SUCCESS)
|
|
{
|
|
if (error == ERROR_INVALID_HANDLE
|
|
&& !strcasecmp (get_name () + strlen (get_name ())
|
|
- sizeof (VIRT_CLASSES_KEY) + 1,
|
|
VIRT_CLASSES_KEY))
|
|
{
|
|
filesize = sizeof (VIRT_CLASSES_LINKTGT);
|
|
filebuf = (char *) cmalloc_abort (HEAP_BUF, filesize);
|
|
strcpy (filebuf, VIRT_CLASSES_LINKTGT);
|
|
return true;
|
|
}
|
|
if (error != ERROR_FILE_NOT_FOUND)
|
|
{
|
|
seterrno_from_win_error (__FILE__, __LINE__, error);
|
|
return false;
|
|
}
|
|
goto value_not_found;
|
|
}
|
|
PBYTE tmpbuf = (PBYTE) cmalloc_abort (HEAP_BUF, size);
|
|
error =
|
|
RegQueryValueExW (handle, value_name, NULL, NULL, tmpbuf, &size);
|
|
if (error != ERROR_SUCCESS)
|
|
{
|
|
seterrno_from_win_error (__FILE__, __LINE__, error);
|
|
return true;
|
|
}
|
|
if (type == REG_SZ || type == REG_EXPAND_SZ || type == REG_LINK)
|
|
bufalloc = sys_wcstombs (NULL, 0, (wchar_t *) tmpbuf,
|
|
size / sizeof (wchar_t));
|
|
else if (type == REG_MULTI_SZ)
|
|
bufalloc = multi_wcstombs (NULL, 0, (wchar_t *) tmpbuf,
|
|
size / sizeof (wchar_t));
|
|
else
|
|
bufalloc = size;
|
|
filebuf = (char *) cmalloc_abort (HEAP_BUF, bufalloc);
|
|
if (type == REG_SZ || type == REG_EXPAND_SZ || type == REG_LINK)
|
|
sys_wcstombs (filebuf, bufalloc, (wchar_t *) tmpbuf,
|
|
size / sizeof (wchar_t));
|
|
else if (type == REG_MULTI_SZ)
|
|
multi_wcstombs (filebuf, bufalloc, (wchar_t *) tmpbuf,
|
|
size / sizeof (wchar_t));
|
|
else
|
|
memcpy (filebuf, tmpbuf, bufalloc);
|
|
filesize = bufalloc;
|
|
}
|
|
else
|
|
{
|
|
bufalloc = 0;
|
|
do
|
|
{
|
|
bufalloc += 16 * 1024;
|
|
filebuf = (char *) crealloc_abort (filebuf, bufalloc);
|
|
size = bufalloc;
|
|
error = RegQueryValueExW (handle, value_name, NULL, &type,
|
|
(PBYTE) filebuf, &size);
|
|
if (error != ERROR_SUCCESS && error != ERROR_MORE_DATA)
|
|
{
|
|
seterrno_from_win_error (__FILE__, __LINE__, error);
|
|
return false;
|
|
}
|
|
}
|
|
while (error == ERROR_MORE_DATA);
|
|
filesize = size;
|
|
/* RegQueryValueEx () opens HKEY_PERFORMANCE_DATA. */
|
|
RegCloseKey (handle);
|
|
}
|
|
return true;
|
|
value_not_found:
|
|
DWORD buf_size = NAME_MAX + 1;
|
|
wchar_t buf[buf_size];
|
|
int index = 0;
|
|
while (ERROR_SUCCESS ==
|
|
(error = RegEnumKeyExW (handle, index++, buf, &buf_size, NULL, NULL,
|
|
NULL, NULL)) || (error == ERROR_MORE_DATA))
|
|
{
|
|
if (!wcscasecmp (buf, value_name))
|
|
{
|
|
set_errno (EISDIR);
|
|
return false;
|
|
}
|
|
buf_size = NAME_MAX + 1;
|
|
}
|
|
if (error != ERROR_NO_MORE_ITEMS)
|
|
{
|
|
seterrno_from_win_error (__FILE__, __LINE__, error);
|
|
return false;
|
|
}
|
|
set_errno (ENOENT);
|
|
return false;
|
|
}
|
|
|
|
/* Auxillary member function to open registry keys. */
|
|
static HKEY
|
|
open_key (const char *name, REGSAM access, DWORD wow64, bool isValue)
|
|
{
|
|
HKEY hKey = (HKEY) INVALID_HANDLE_VALUE;
|
|
HKEY hParentKey = (HKEY) INVALID_HANDLE_VALUE;
|
|
bool parentOpened = false;
|
|
wchar_t component[NAME_MAX + 1];
|
|
|
|
while (*name)
|
|
{
|
|
const char *anchor = name;
|
|
while (*name && !isdirsep (*name))
|
|
name++;
|
|
int val_only = decode_regname (component, anchor, name - anchor);
|
|
if (val_only < 0)
|
|
{
|
|
set_errno (EINVAL);
|
|
if (parentOpened)
|
|
RegCloseKey (hParentKey);
|
|
hKey = (HKEY) INVALID_HANDLE_VALUE;
|
|
break;
|
|
}
|
|
if (*name)
|
|
name++;
|
|
if (*name == 0 && isValue == true)
|
|
break;
|
|
|
|
if (val_only || !component[0] || hKey == HKEY_PERFORMANCE_DATA)
|
|
{
|
|
set_errno (ENOENT);
|
|
if (parentOpened)
|
|
RegCloseKey (hParentKey);
|
|
hKey = (HKEY) INVALID_HANDLE_VALUE;
|
|
break;
|
|
}
|
|
|
|
if (hParentKey != (HKEY) INVALID_HANDLE_VALUE)
|
|
{
|
|
REGSAM effective_access = KEY_READ;
|
|
if ((strchr (name, '/') == NULL && isValue == true) || *name == 0)
|
|
effective_access = access;
|
|
LONG error = RegOpenKeyExW (hParentKey, component, 0,
|
|
effective_access | wow64, &hKey);
|
|
if (error == ERROR_ACCESS_DENIED) /* Try opening with backup intent */
|
|
error = RegCreateKeyExW (hParentKey, component, 0, NULL,
|
|
REG_OPTION_BACKUP_RESTORE,
|
|
effective_access | wow64, NULL,
|
|
&hKey, NULL);
|
|
if (parentOpened)
|
|
RegCloseKey (hParentKey);
|
|
if (error != ERROR_SUCCESS)
|
|
{
|
|
hKey = (HKEY) INVALID_HANDLE_VALUE;
|
|
seterrno_from_win_error (__FILE__, __LINE__, error);
|
|
return hKey;
|
|
}
|
|
hParentKey = hKey;
|
|
parentOpened = true;
|
|
}
|
|
else
|
|
{
|
|
for (int i = 0; registry_listing[i]; i++)
|
|
if (strncasematch (anchor, registry_listing[i], name - anchor - 1))
|
|
hKey = fetch_hkey (i);
|
|
if (hKey == (HKEY) INVALID_HANDLE_VALUE)
|
|
return hKey;
|
|
hParentKey = hKey;
|
|
}
|
|
}
|
|
return hKey;
|
|
}
|
|
|
|
int
|
|
fhandler_registry::dup (fhandler_base *child, int flags)
|
|
{
|
|
debug_printf ("here");
|
|
fhandler_registry *fhs = (fhandler_registry *) child;
|
|
|
|
int ret = fhandler_virtual::dup (fhs, flags);
|
|
/* Pseudo registry handles can't be duplicated using DuplicateHandle.
|
|
Therefore those fhandlers are marked with the nohandle flag. This
|
|
allows fhandler_base::dup to succeed as usual for nohandle fhandlers.
|
|
Here we just have to fix up by copying the pseudo handle value. */
|
|
if ((HKEY) get_handle () >= HKEY_CLASSES_ROOT)
|
|
fhs->set_io_handle (get_handle ());
|
|
if (value_name)
|
|
fhs->value_name = cwcsdup (value_name);
|
|
return ret;
|
|
}
|