1 /* 2 * RPC Manager 3 * 4 * Copyright 2001 Ove Kåven, TransGaming Technologies 5 * Copyright 2002 Marcus Meissner 6 * Copyright 2005 Mike Hearn, Rob Shearman for CodeWeavers 7 * 8 * This library is free software; you can redistribute it and/or 9 * modify it under the terms of the GNU Lesser General Public 10 * License as published by the Free Software Foundation; either 11 * version 2.1 of the License, or (at your option) any later version. 12 * 13 * This library is distributed in the hope that it will be useful, 14 * but WITHOUT ANY WARRANTY; without even the implied warranty of 15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU 16 * Lesser General Public License for more details. 17 * 18 * You should have received a copy of the GNU Lesser General Public 19 * License along with this library; if not, write to the Free Software 20 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA 21 */ 22 23 #include "config.h" 24 #include "wine/port.h" 25 26 #include <stdarg.h> 27 #include <string.h> 28 29 #define COBJMACROS 30 #define NONAMELESSUNION 31 32 #include "windef.h" 33 #include "winbase.h" 34 #include "winuser.h" 35 #include "winsvc.h" 36 #include "objbase.h" 37 #include "ole2.h" 38 #include "rpc.h" 39 #include "winerror.h" 40 #include "winreg.h" 41 #include "servprov.h" 42 #include "wine/unicode.h" 43 44 #include "compobj_private.h" 45 46 #include "wine/debug.h" 47 48 WINE_DEFAULT_DEBUG_CHANNEL(ole); 49 50 static void __RPC_STUB dispatch_rpc(RPC_MESSAGE *msg); 51 52 /* we only use one function to dispatch calls for all methods - we use the 53 * RPC_IF_OLE flag to tell the RPC runtime that this is the case */ 54 static RPC_DISPATCH_FUNCTION rpc_dispatch_table[1] = { dispatch_rpc }; /* (RO) */ 55 static RPC_DISPATCH_TABLE rpc_dispatch = { 1, rpc_dispatch_table }; /* (RO) */ 56 57 static struct list registered_interfaces = LIST_INIT(registered_interfaces); /* (CS csRegIf) */ 58 static CRITICAL_SECTION csRegIf; 59 static CRITICAL_SECTION_DEBUG csRegIf_debug = 60 { 61 0, 0, &csRegIf, 62 { &csRegIf_debug.ProcessLocksList, &csRegIf_debug.ProcessLocksList }, 63 0, 0, { (DWORD_PTR)(__FILE__ ": dcom registered server interfaces") } 64 }; 65 static CRITICAL_SECTION csRegIf = { &csRegIf_debug, -1, 0, 0, 0, 0 }; 66 67 static struct list channel_hooks = LIST_INIT(channel_hooks); /* (CS csChannelHook) */ 68 static CRITICAL_SECTION csChannelHook; 69 static CRITICAL_SECTION_DEBUG csChannelHook_debug = 70 { 71 0, 0, &csChannelHook, 72 { &csChannelHook_debug.ProcessLocksList, &csChannelHook_debug.ProcessLocksList }, 73 0, 0, { (DWORD_PTR)(__FILE__ ": channel hooks") } 74 }; 75 static CRITICAL_SECTION csChannelHook = { &csChannelHook_debug, -1, 0, 0, 0, 0 }; 76 77 static WCHAR wszRpcTransport[] = {'n','c','a','l','r','p','c',0}; 78 79 80 struct registered_if 81 { 82 struct list entry; 83 DWORD refs; /* ref count */ 84 RPC_SERVER_INTERFACE If; /* interface registered with the RPC runtime */ 85 }; 86 87 /* get the pipe endpoint specified of the specified apartment */ 88 static inline void get_rpc_endpoint(LPWSTR endpoint, const OXID *oxid) 89 { 90 /* FIXME: should get endpoint from rpcss */ 91 static const WCHAR wszEndpointFormat[] = {'\\','p','i','p','e','\\','O','L','E','_','%','0','8','l','x','%','0','8','l','x',0}; 92 wsprintfW(endpoint, wszEndpointFormat, (DWORD)(*oxid >> 32),(DWORD)*oxid); 93 } 94 95 typedef struct 96 { 97 IRpcChannelBuffer IRpcChannelBuffer_iface; 98 LONG refs; 99 100 DWORD dest_context; /* returned from GetDestCtx */ 101 void *dest_context_data; /* returned from GetDestCtx */ 102 } RpcChannelBuffer; 103 104 typedef struct 105 { 106 RpcChannelBuffer super; /* superclass */ 107 108 RPC_BINDING_HANDLE bind; /* handle to the remote server */ 109 OXID oxid; /* apartment in which the channel is valid */ 110 DWORD server_pid; /* id of server process */ 111 HANDLE event; /* cached event handle */ 112 IID iid; /* IID of the proxy this belongs to */ 113 } ClientRpcChannelBuffer; 114 115 struct dispatch_params 116 { 117 RPCOLEMESSAGE *msg; /* message */ 118 IRpcStubBuffer *stub; /* stub buffer, if applicable */ 119 IRpcChannelBuffer *chan; /* server channel buffer, if applicable */ 120 IID iid; /* ID of interface being called */ 121 IUnknown *iface; /* interface being called */ 122 HANDLE handle; /* handle that will become signaled when call finishes */ 123 BOOL bypass_rpcrt; /* bypass RPC runtime? */ 124 RPC_STATUS status; /* status (out) */ 125 HRESULT hr; /* hresult (out) */ 126 }; 127 128 struct message_state 129 { 130 RPC_BINDING_HANDLE binding_handle; 131 ULONG prefix_data_len; 132 SChannelHookCallInfo channel_hook_info; 133 BOOL bypass_rpcrt; 134 135 /* client only */ 136 HWND target_hwnd; 137 DWORD target_tid; 138 struct dispatch_params params; 139 }; 140 141 typedef struct 142 { 143 ULONG conformance; /* NDR */ 144 GUID id; 145 ULONG size; 146 /* [size_is((size+7)&~7)] */ unsigned char data[1]; 147 } WIRE_ORPC_EXTENT; 148 149 typedef struct 150 { 151 ULONG size; 152 ULONG reserved; 153 unsigned char extent[1]; 154 } WIRE_ORPC_EXTENT_ARRAY; 155 156 typedef struct 157 { 158 ULONG version; 159 ULONG flags; 160 ULONG reserved1; 161 GUID cid; 162 unsigned char extensions[1]; 163 } WIRE_ORPCTHIS; 164 165 typedef struct 166 { 167 ULONG flags; 168 unsigned char extensions[1]; 169 } WIRE_ORPCTHAT; 170 171 struct channel_hook_entry 172 { 173 struct list entry; 174 GUID id; 175 IChannelHook *hook; 176 }; 177 178 struct channel_hook_buffer_data 179 { 180 GUID id; 181 ULONG extension_size; 182 }; 183 184 185 static HRESULT unmarshal_ORPCTHAT(RPC_MESSAGE *msg, ORPCTHAT *orpcthat, 186 ORPC_EXTENT_ARRAY *orpc_ext_array, WIRE_ORPC_EXTENT **first_wire_orpc_extent); 187 188 /* Channel Hook Functions */ 189 190 static ULONG ChannelHooks_ClientGetSize(SChannelHookCallInfo *info, 191 struct channel_hook_buffer_data **data, unsigned int *hook_count, 192 ULONG *extension_count) 193 { 194 struct channel_hook_entry *entry; 195 ULONG total_size = 0; 196 unsigned int hook_index = 0; 197 198 *hook_count = 0; 199 *extension_count = 0; 200 201 EnterCriticalSection(&csChannelHook); 202 203 LIST_FOR_EACH_ENTRY(entry, &channel_hooks, struct channel_hook_entry, entry) 204 (*hook_count)++; 205 206 if (*hook_count) 207 *data = HeapAlloc(GetProcessHeap(), 0, *hook_count * sizeof(struct channel_hook_buffer_data)); 208 else 209 *data = NULL; 210 211 LIST_FOR_EACH_ENTRY(entry, &channel_hooks, struct channel_hook_entry, entry) 212 { 213 ULONG extension_size = 0; 214 215 IChannelHook_ClientGetSize(entry->hook, &entry->id, &info->iid, &extension_size); 216 217 TRACE("%s: extension_size = %u\n", debugstr_guid(&entry->id), extension_size); 218 219 extension_size = (extension_size+7)&~7; 220 (*data)[hook_index].id = entry->id; 221 (*data)[hook_index].extension_size = extension_size; 222 223 /* an extension is only put onto the wire if it has data to write */ 224 if (extension_size) 225 { 226 total_size += FIELD_OFFSET(WIRE_ORPC_EXTENT, data[extension_size]); 227 (*extension_count)++; 228 } 229 230 hook_index++; 231 } 232 233 LeaveCriticalSection(&csChannelHook); 234 235 return total_size; 236 } 237 238 static unsigned char * ChannelHooks_ClientFillBuffer(SChannelHookCallInfo *info, 239 unsigned char *buffer, struct channel_hook_buffer_data *data, 240 unsigned int hook_count) 241 { 242 struct channel_hook_entry *entry; 243 244 EnterCriticalSection(&csChannelHook); 245 246 LIST_FOR_EACH_ENTRY(entry, &channel_hooks, struct channel_hook_entry, entry) 247 { 248 unsigned int i; 249 ULONG extension_size = 0; 250 WIRE_ORPC_EXTENT *wire_orpc_extent = (WIRE_ORPC_EXTENT *)buffer; 251 252 for (i = 0; i < hook_count; i++) 253 if (IsEqualGUID(&entry->id, &data[i].id)) 254 extension_size = data[i].extension_size; 255 256 /* an extension is only put onto the wire if it has data to write */ 257 if (!extension_size) 258 continue; 259 260 IChannelHook_ClientFillBuffer(entry->hook, &entry->id, &info->iid, 261 &extension_size, buffer + FIELD_OFFSET(WIRE_ORPC_EXTENT, data[0])); 262 263 TRACE("%s: extension_size = %u\n", debugstr_guid(&entry->id), extension_size); 264 265 /* FIXME: set unused portion of wire_orpc_extent->data to 0? */ 266 267 wire_orpc_extent->conformance = (extension_size+7)&~7; 268 wire_orpc_extent->size = extension_size; 269 wire_orpc_extent->id = entry->id; 270 buffer += FIELD_OFFSET(WIRE_ORPC_EXTENT, data[wire_orpc_extent->conformance]); 271 } 272 273 LeaveCriticalSection(&csChannelHook); 274 275 return buffer; 276 } 277 278 static void ChannelHooks_ServerNotify(SChannelHookCallInfo *info, 279 DWORD lDataRep, WIRE_ORPC_EXTENT *first_wire_orpc_extent, 280 ULONG extension_count) 281 { 282 struct channel_hook_entry *entry; 283 ULONG i; 284 285 EnterCriticalSection(&csChannelHook); 286 287 LIST_FOR_EACH_ENTRY(entry, &channel_hooks, struct channel_hook_entry, entry) 288 { 289 WIRE_ORPC_EXTENT *wire_orpc_extent; 290 for (i = 0, wire_orpc_extent = first_wire_orpc_extent; 291 i < extension_count; 292 i++, wire_orpc_extent = (WIRE_ORPC_EXTENT *)&wire_orpc_extent->data[wire_orpc_extent->conformance]) 293 { 294 if (IsEqualGUID(&entry->id, &wire_orpc_extent->id)) 295 break; 296 } 297 if (i == extension_count) wire_orpc_extent = NULL; 298 299 IChannelHook_ServerNotify(entry->hook, &entry->id, &info->iid, 300 wire_orpc_extent ? wire_orpc_extent->size : 0, 301 wire_orpc_extent ? wire_orpc_extent->data : NULL, 302 lDataRep); 303 } 304 305 LeaveCriticalSection(&csChannelHook); 306 } 307 308 static ULONG ChannelHooks_ServerGetSize(SChannelHookCallInfo *info, 309 struct channel_hook_buffer_data **data, unsigned int *hook_count, 310 ULONG *extension_count) 311 { 312 struct channel_hook_entry *entry; 313 ULONG total_size = 0; 314 unsigned int hook_index = 0; 315 316 *hook_count = 0; 317 *extension_count = 0; 318 319 EnterCriticalSection(&csChannelHook); 320 321 LIST_FOR_EACH_ENTRY(entry, &channel_hooks, struct channel_hook_entry, entry) 322 (*hook_count)++; 323 324 if (*hook_count) 325 *data = HeapAlloc(GetProcessHeap(), 0, *hook_count * sizeof(struct channel_hook_buffer_data)); 326 else 327 *data = NULL; 328 329 LIST_FOR_EACH_ENTRY(entry, &channel_hooks, struct channel_hook_entry, entry) 330 { 331 ULONG extension_size = 0; 332 333 IChannelHook_ServerGetSize(entry->hook, &entry->id, &info->iid, S_OK, 334 &extension_size); 335 336 TRACE("%s: extension_size = %u\n", debugstr_guid(&entry->id), extension_size); 337 338 extension_size = (extension_size+7)&~7; 339 (*data)[hook_index].id = entry->id; 340 (*data)[hook_index].extension_size = extension_size; 341 342 /* an extension is only put onto the wire if it has data to write */ 343 if (extension_size) 344 { 345 total_size += FIELD_OFFSET(WIRE_ORPC_EXTENT, data[extension_size]); 346 (*extension_count)++; 347 } 348 349 hook_index++; 350 } 351 352 LeaveCriticalSection(&csChannelHook); 353 354 return total_size; 355 } 356 357 static unsigned char * ChannelHooks_ServerFillBuffer(SChannelHookCallInfo *info, 358 unsigned char *buffer, struct channel_hook_buffer_data *data, 359 unsigned int hook_count) 360 { 361 struct channel_hook_entry *entry; 362 363 EnterCriticalSection(&csChannelHook); 364 365 LIST_FOR_EACH_ENTRY(entry, &channel_hooks, struct channel_hook_entry, entry) 366 { 367 unsigned int i; 368 ULONG extension_size = 0; 369 WIRE_ORPC_EXTENT *wire_orpc_extent = (WIRE_ORPC_EXTENT *)buffer; 370 371 for (i = 0; i < hook_count; i++) 372 if (IsEqualGUID(&entry->id, &data[i].id)) 373 extension_size = data[i].extension_size; 374 375 /* an extension is only put onto the wire if it has data to write */ 376 if (!extension_size) 377 continue; 378 379 IChannelHook_ServerFillBuffer(entry->hook, &entry->id, &info->iid, 380 &extension_size, buffer + FIELD_OFFSET(WIRE_ORPC_EXTENT, data[0]), 381 S_OK); 382 383 TRACE("%s: extension_size = %u\n", debugstr_guid(&entry->id), extension_size); 384 385 /* FIXME: set unused portion of wire_orpc_extent->data to 0? */ 386 387 wire_orpc_extent->conformance = (extension_size+7)&~7; 388 wire_orpc_extent->size = extension_size; 389 wire_orpc_extent->id = entry->id; 390 buffer += FIELD_OFFSET(WIRE_ORPC_EXTENT, data[wire_orpc_extent->conformance]); 391 } 392 393 LeaveCriticalSection(&csChannelHook); 394 395 return buffer; 396 } 397 398 static void ChannelHooks_ClientNotify(SChannelHookCallInfo *info, 399 DWORD lDataRep, WIRE_ORPC_EXTENT *first_wire_orpc_extent, 400 ULONG extension_count, HRESULT hrFault) 401 { 402 struct channel_hook_entry *entry; 403 ULONG i; 404 405 EnterCriticalSection(&csChannelHook); 406 407 LIST_FOR_EACH_ENTRY(entry, &channel_hooks, struct channel_hook_entry, entry) 408 { 409 WIRE_ORPC_EXTENT *wire_orpc_extent; 410 for (i = 0, wire_orpc_extent = first_wire_orpc_extent; 411 i < extension_count; 412 i++, wire_orpc_extent = (WIRE_ORPC_EXTENT *)&wire_orpc_extent->data[wire_orpc_extent->conformance]) 413 { 414 if (IsEqualGUID(&entry->id, &wire_orpc_extent->id)) 415 break; 416 } 417 if (i == extension_count) wire_orpc_extent = NULL; 418 419 IChannelHook_ClientNotify(entry->hook, &entry->id, &info->iid, 420 wire_orpc_extent ? wire_orpc_extent->size : 0, 421 wire_orpc_extent ? wire_orpc_extent->data : NULL, 422 lDataRep, hrFault); 423 } 424 425 LeaveCriticalSection(&csChannelHook); 426 } 427 428 HRESULT RPC_RegisterChannelHook(REFGUID rguid, IChannelHook *hook) 429 { 430 struct channel_hook_entry *entry; 431 432 TRACE("(%s, %p)\n", debugstr_guid(rguid), hook); 433 434 entry = HeapAlloc(GetProcessHeap(), 0, sizeof(*entry)); 435 if (!entry) 436 return E_OUTOFMEMORY; 437 438 entry->id = *rguid; 439 entry->hook = hook; 440 IChannelHook_AddRef(hook); 441 442 EnterCriticalSection(&csChannelHook); 443 list_add_tail(&channel_hooks, &entry->entry); 444 LeaveCriticalSection(&csChannelHook); 445 446 return S_OK; 447 } 448 449 void RPC_UnregisterAllChannelHooks(void) 450 { 451 struct channel_hook_entry *cursor; 452 struct channel_hook_entry *cursor2; 453 454 EnterCriticalSection(&csChannelHook); 455 LIST_FOR_EACH_ENTRY_SAFE(cursor, cursor2, &channel_hooks, struct channel_hook_entry, entry) 456 HeapFree(GetProcessHeap(), 0, cursor); 457 LeaveCriticalSection(&csChannelHook); 458 DeleteCriticalSection(&csChannelHook); 459 DeleteCriticalSection(&csRegIf); 460 } 461 462 /* RPC Channel Buffer Functions */ 463 464 static HRESULT WINAPI RpcChannelBuffer_QueryInterface(IRpcChannelBuffer *iface, REFIID riid, LPVOID *ppv) 465 { 466 *ppv = NULL; 467 if (IsEqualIID(riid,&IID_IRpcChannelBuffer) || IsEqualIID(riid,&IID_IUnknown)) 468 { 469 *ppv = iface; 470 IRpcChannelBuffer_AddRef(iface); 471 return S_OK; 472 } 473 return E_NOINTERFACE; 474 } 475 476 static ULONG WINAPI RpcChannelBuffer_AddRef(LPRPCCHANNELBUFFER iface) 477 { 478 RpcChannelBuffer *This = (RpcChannelBuffer *)iface; 479 return InterlockedIncrement(&This->refs); 480 } 481 482 static ULONG WINAPI ServerRpcChannelBuffer_Release(LPRPCCHANNELBUFFER iface) 483 { 484 RpcChannelBuffer *This = (RpcChannelBuffer *)iface; 485 ULONG ref; 486 487 ref = InterlockedDecrement(&This->refs); 488 if (ref) 489 return ref; 490 491 HeapFree(GetProcessHeap(), 0, This); 492 return 0; 493 } 494 495 static ULONG WINAPI ClientRpcChannelBuffer_Release(LPRPCCHANNELBUFFER iface) 496 { 497 ClientRpcChannelBuffer *This = (ClientRpcChannelBuffer *)iface; 498 ULONG ref; 499 500 ref = InterlockedDecrement(&This->super.refs); 501 if (ref) 502 return ref; 503 504 if (This->event) CloseHandle(This->event); 505 RpcBindingFree(&This->bind); 506 HeapFree(GetProcessHeap(), 0, This); 507 return 0; 508 } 509 510 static HRESULT WINAPI ServerRpcChannelBuffer_GetBuffer(LPRPCCHANNELBUFFER iface, RPCOLEMESSAGE* olemsg, REFIID riid) 511 { 512 RpcChannelBuffer *This = (RpcChannelBuffer *)iface; 513 RPC_MESSAGE *msg = (RPC_MESSAGE *)olemsg; 514 RPC_STATUS status; 515 ORPCTHAT *orpcthat; 516 struct message_state *message_state; 517 ULONG extensions_size; 518 struct channel_hook_buffer_data *channel_hook_data; 519 unsigned int channel_hook_count; 520 ULONG extension_count; 521 522 TRACE("(%p)->(%p,%s)\n", This, olemsg, debugstr_guid(riid)); 523 524 message_state = msg->Handle; 525 /* restore the binding handle and the real start of data */ 526 msg->Handle = message_state->binding_handle; 527 msg->Buffer = (char *)msg->Buffer - message_state->prefix_data_len; 528 529 extensions_size = ChannelHooks_ServerGetSize(&message_state->channel_hook_info, 530 &channel_hook_data, &channel_hook_count, &extension_count); 531 532 msg->BufferLength += FIELD_OFFSET(WIRE_ORPCTHAT, extensions) + sizeof(DWORD); 533 if (extensions_size) 534 { 535 msg->BufferLength += FIELD_OFFSET(WIRE_ORPC_EXTENT_ARRAY, extent[2*sizeof(DWORD) + extensions_size]); 536 if (extension_count & 1) 537 msg->BufferLength += FIELD_OFFSET(WIRE_ORPC_EXTENT, data[0]); 538 } 539 540 if (message_state->bypass_rpcrt) 541 { 542 msg->Buffer = HeapAlloc(GetProcessHeap(), 0, msg->BufferLength); 543 if (msg->Buffer) 544 status = RPC_S_OK; 545 else 546 { 547 HeapFree(GetProcessHeap(), 0, channel_hook_data); 548 return E_OUTOFMEMORY; 549 } 550 } 551 else 552 status = I_RpcGetBuffer(msg); 553 554 orpcthat = msg->Buffer; 555 msg->Buffer = (char *)msg->Buffer + FIELD_OFFSET(WIRE_ORPCTHAT, extensions); 556 557 orpcthat->flags = ORPCF_NULL /* FIXME? */; 558 559 /* NDR representation of orpcthat->extensions */ 560 *(DWORD *)msg->Buffer = extensions_size ? 1 : 0; 561 msg->Buffer = (char *)msg->Buffer + sizeof(DWORD); 562 563 if (extensions_size) 564 { 565 WIRE_ORPC_EXTENT_ARRAY *orpc_extent_array = msg->Buffer; 566 orpc_extent_array->size = extension_count; 567 orpc_extent_array->reserved = 0; 568 msg->Buffer = (char *)msg->Buffer + FIELD_OFFSET(WIRE_ORPC_EXTENT_ARRAY, extent); 569 /* NDR representation of orpc_extent_array->extent */ 570 *(DWORD *)msg->Buffer = 1; 571 msg->Buffer = (char *)msg->Buffer + sizeof(DWORD); 572 /* NDR representation of [size_is] attribute of orpc_extent_array->extent */ 573 *(DWORD *)msg->Buffer = (extension_count + 1) & ~1; 574 msg->Buffer = (char *)msg->Buffer + sizeof(DWORD); 575 576 msg->Buffer = ChannelHooks_ServerFillBuffer(&message_state->channel_hook_info, 577 msg->Buffer, channel_hook_data, channel_hook_count); 578 579 /* we must add a dummy extension if there is an odd extension 580 * count to meet the contract specified by the size_is attribute */ 581 if (extension_count & 1) 582 { 583 WIRE_ORPC_EXTENT *wire_orpc_extent = msg->Buffer; 584 wire_orpc_extent->conformance = 0; 585 wire_orpc_extent->id = GUID_NULL; 586 wire_orpc_extent->size = 0; 587 msg->Buffer = (char *)msg->Buffer + FIELD_OFFSET(WIRE_ORPC_EXTENT, data[0]); 588 } 589 } 590 591 HeapFree(GetProcessHeap(), 0, channel_hook_data); 592 593 /* store the prefixed data length so that we can restore the real buffer 594 * later */ 595 message_state->prefix_data_len = (char *)msg->Buffer - (char *)orpcthat; 596 msg->BufferLength -= message_state->prefix_data_len; 597 /* save away the message state again */ 598 msg->Handle = message_state; 599 600 TRACE("-- %d\n", status); 601 602 return HRESULT_FROM_WIN32(status); 603 } 604 605 static HANDLE ClientRpcChannelBuffer_GetEventHandle(ClientRpcChannelBuffer *This) 606 { 607 HANDLE event = InterlockedExchangePointer(&This->event, NULL); 608 609 /* Note: must be auto-reset event so we can reuse it without a call 610 * to ResetEvent */ 611 if (!event) event = CreateEventW(NULL, FALSE, FALSE, NULL); 612 613 return event; 614 } 615 616 static void ClientRpcChannelBuffer_ReleaseEventHandle(ClientRpcChannelBuffer *This, HANDLE event) 617 { 618 if (InterlockedCompareExchangePointer(&This->event, event, NULL)) 619 /* already a handle cached in This */ 620 CloseHandle(event); 621 } 622 623 static HRESULT WINAPI ClientRpcChannelBuffer_GetBuffer(LPRPCCHANNELBUFFER iface, RPCOLEMESSAGE* olemsg, REFIID riid) 624 { 625 ClientRpcChannelBuffer *This = (ClientRpcChannelBuffer *)iface; 626 RPC_MESSAGE *msg = (RPC_MESSAGE *)olemsg; 627 RPC_CLIENT_INTERFACE *cif; 628 RPC_STATUS status; 629 ORPCTHIS *orpcthis; 630 struct message_state *message_state; 631 ULONG extensions_size; 632 struct channel_hook_buffer_data *channel_hook_data; 633 unsigned int channel_hook_count; 634 ULONG extension_count; 635 IPID ipid; 636 HRESULT hr; 637 APARTMENT *apt = NULL; 638 639 TRACE("(%p)->(%p,%s)\n", This, olemsg, debugstr_guid(riid)); 640 641 cif = HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, sizeof(RPC_CLIENT_INTERFACE)); 642 if (!cif) 643 return E_OUTOFMEMORY; 644 645 message_state = HeapAlloc(GetProcessHeap(), 0, sizeof(*message_state)); 646 if (!message_state) 647 { 648 HeapFree(GetProcessHeap(), 0, cif); 649 return E_OUTOFMEMORY; 650 } 651 652 cif->Length = sizeof(RPC_CLIENT_INTERFACE); 653 /* RPC interface ID = COM interface ID */ 654 cif->InterfaceId.SyntaxGUID = This->iid; 655 /* COM objects always have a version of 0.0 */ 656 cif->InterfaceId.SyntaxVersion.MajorVersion = 0; 657 cif->InterfaceId.SyntaxVersion.MinorVersion = 0; 658 msg->Handle = This->bind; 659 msg->RpcInterfaceInformation = cif; 660 661 message_state->prefix_data_len = 0; 662 message_state->binding_handle = This->bind; 663 664 message_state->channel_hook_info.iid = *riid; 665 message_state->channel_hook_info.cbSize = sizeof(message_state->channel_hook_info); 666 message_state->channel_hook_info.uCausality = COM_CurrentCausalityId(); 667 message_state->channel_hook_info.dwServerPid = This->server_pid; 668 message_state->channel_hook_info.iMethod = msg->ProcNum & ~RPC_FLAGS_VALID_BIT; 669 message_state->channel_hook_info.pObject = NULL; /* only present on server-side */ 670 message_state->target_hwnd = NULL; 671 message_state->target_tid = 0; 672 memset(&message_state->params, 0, sizeof(message_state->params)); 673 674 extensions_size = ChannelHooks_ClientGetSize(&message_state->channel_hook_info, 675 &channel_hook_data, &channel_hook_count, &extension_count); 676 677 msg->BufferLength += FIELD_OFFSET(WIRE_ORPCTHIS, extensions) + sizeof(DWORD); 678 if (extensions_size) 679 { 680 msg->BufferLength += FIELD_OFFSET(WIRE_ORPC_EXTENT_ARRAY, extent[2*sizeof(DWORD) + extensions_size]); 681 if (extension_count & 1) 682 msg->BufferLength += FIELD_OFFSET(WIRE_ORPC_EXTENT, data[0]); 683 } 684 685 RpcBindingInqObject(message_state->binding_handle, &ipid); 686 hr = ipid_get_dispatch_params(&ipid, &apt, NULL, &message_state->params.stub, 687 &message_state->params.chan, 688 &message_state->params.iid, 689 &message_state->params.iface); 690 if (hr == S_OK) 691 { 692 /* stub, chan, iface and iid are unneeded in multi-threaded case as we go 693 * via the RPC runtime */ 694 if (apt->multi_threaded) 695 { 696 IRpcStubBuffer_Release(message_state->params.stub); 697 message_state->params.stub = NULL; 698 IRpcChannelBuffer_Release(message_state->params.chan); 699 message_state->params.chan = NULL; 700 message_state->params.iface = NULL; 701 } 702 else 703 { 704 message_state->params.bypass_rpcrt = TRUE; 705 message_state->target_hwnd = apartment_getwindow(apt); 706 message_state->target_tid = apt->tid; 707 /* we assume later on that this being non-NULL is the indicator that 708 * means call directly instead of going through RPC runtime */ 709 if (!message_state->target_hwnd) 710 ERR("window for apartment %s is NULL\n", wine_dbgstr_longlong(apt->oxid)); 711 } 712 } 713 if (apt) apartment_release(apt); 714 message_state->params.handle = ClientRpcChannelBuffer_GetEventHandle(This); 715 /* Note: message_state->params.msg is initialised in 716 * ClientRpcChannelBuffer_SendReceive */ 717 718 /* shortcut the RPC runtime */ 719 if (message_state->target_hwnd) 720 { 721 msg->Buffer = HeapAlloc(GetProcessHeap(), 0, msg->BufferLength); 722 if (msg->Buffer) 723 status = RPC_S_OK; 724 else 725 status = ERROR_OUTOFMEMORY; 726 } 727 else 728 status = I_RpcGetBuffer(msg); 729 730 msg->Handle = message_state; 731 732 if (status == RPC_S_OK) 733 { 734 orpcthis = msg->Buffer; 735 msg->Buffer = (char *)msg->Buffer + FIELD_OFFSET(WIRE_ORPCTHIS, extensions); 736 737 orpcthis->version.MajorVersion = COM_MAJOR_VERSION; 738 orpcthis->version.MinorVersion = COM_MINOR_VERSION; 739 orpcthis->flags = message_state->channel_hook_info.dwServerPid ? ORPCF_LOCAL : ORPCF_NULL; 740 orpcthis->reserved1 = 0; 741 orpcthis->cid = message_state->channel_hook_info.uCausality; 742 743 /* NDR representation of orpcthis->extensions */ 744 *(DWORD *)msg->Buffer = extensions_size ? 1 : 0; 745 msg->Buffer = (char *)msg->Buffer + sizeof(DWORD); 746 747 if (extensions_size) 748 { 749 ORPC_EXTENT_ARRAY *orpc_extent_array = msg->Buffer; 750 orpc_extent_array->size = extension_count; 751 orpc_extent_array->reserved = 0; 752 msg->Buffer = (char *)msg->Buffer + FIELD_OFFSET(WIRE_ORPC_EXTENT_ARRAY, extent); 753 /* NDR representation of orpc_extent_array->extent */ 754 *(DWORD *)msg->Buffer = 1; 755 msg->Buffer = (char *)msg->Buffer + sizeof(DWORD); 756 /* NDR representation of [size_is] attribute of orpc_extent_array->extent */ 757 *(DWORD *)msg->Buffer = (extension_count + 1) & ~1; 758 msg->Buffer = (char *)msg->Buffer + sizeof(DWORD); 759 760 msg->Buffer = ChannelHooks_ClientFillBuffer(&message_state->channel_hook_info, 761 msg->Buffer, channel_hook_data, channel_hook_count); 762 763 /* we must add a dummy extension if there is an odd extension 764 * count to meet the contract specified by the size_is attribute */ 765 if (extension_count & 1) 766 { 767 WIRE_ORPC_EXTENT *wire_orpc_extent = msg->Buffer; 768 wire_orpc_extent->conformance = 0; 769 wire_orpc_extent->id = GUID_NULL; 770 wire_orpc_extent->size = 0; 771 msg->Buffer = (char *)msg->Buffer + FIELD_OFFSET(WIRE_ORPC_EXTENT, data[0]); 772 } 773 } 774 775 /* store the prefixed data length so that we can restore the real buffer 776 * pointer in ClientRpcChannelBuffer_SendReceive. */ 777 message_state->prefix_data_len = (char *)msg->Buffer - (char *)orpcthis; 778 msg->BufferLength -= message_state->prefix_data_len; 779 } 780 781 HeapFree(GetProcessHeap(), 0, channel_hook_data); 782 783 TRACE("-- %d\n", status); 784 785 return HRESULT_FROM_WIN32(status); 786 } 787 788 static HRESULT WINAPI ServerRpcChannelBuffer_SendReceive(LPRPCCHANNELBUFFER iface, RPCOLEMESSAGE *olemsg, ULONG *pstatus) 789 { 790 FIXME("stub\n"); 791 return E_NOTIMPL; 792 } 793 794 /* this thread runs an outgoing RPC */ 795 static DWORD WINAPI rpc_sendreceive_thread(LPVOID param) 796 { 797 struct dispatch_params *data = param; 798 799 /* Note: I_RpcSendReceive doesn't raise exceptions like the higher-level 800 * RPC functions do */ 801 data->status = I_RpcSendReceive((RPC_MESSAGE *)data->msg); 802 803 TRACE("completed with status 0x%x\n", data->status); 804 805 SetEvent(data->handle); 806 807 return 0; 808 } 809 810 static inline HRESULT ClientRpcChannelBuffer_IsCorrectApartment(ClientRpcChannelBuffer *This, APARTMENT *apt) 811 { 812 OXID oxid; 813 if (!apt) 814 return S_FALSE; 815 if (apartment_getoxid(apt, &oxid) != S_OK) 816 return S_FALSE; 817 if (This->oxid != oxid) 818 return S_FALSE; 819 return S_OK; 820 } 821 822 static HRESULT WINAPI ClientRpcChannelBuffer_SendReceive(LPRPCCHANNELBUFFER iface, RPCOLEMESSAGE *olemsg, ULONG *pstatus) 823 { 824 ClientRpcChannelBuffer *This = (ClientRpcChannelBuffer *)iface; 825 HRESULT hr; 826 RPC_MESSAGE *msg = (RPC_MESSAGE *)olemsg; 827 RPC_STATUS status; 828 DWORD index; 829 struct message_state *message_state; 830 ORPCTHAT orpcthat; 831 ORPC_EXTENT_ARRAY orpc_ext_array; 832 WIRE_ORPC_EXTENT *first_wire_orpc_extent = NULL; 833 HRESULT hrFault = S_OK; 834 APARTMENT *apt = apartment_get_current_or_mta(); 835 836 TRACE("(%p) iMethod=%d\n", olemsg, olemsg->iMethod); 837 838 hr = ClientRpcChannelBuffer_IsCorrectApartment(This, apt); 839 if (hr != S_OK) 840 { 841 ERR("called from wrong apartment, should have been 0x%s\n", 842 wine_dbgstr_longlong(This->oxid)); 843 if (apt) apartment_release(apt); 844 return RPC_E_WRONG_THREAD; 845 } 846 /* This situation should be impossible in multi-threaded apartments, 847 * because the calling thread isn't re-enterable. 848 * Note: doing a COM call during the processing of a sent message is 849 * only disallowed if a client call is already being waited for 850 * completion */ 851 if (!apt->multi_threaded && 852 COM_CurrentInfo()->pending_call_count_client && 853 InSendMessage()) 854 { 855 ERR("can't make an outgoing COM call in response to a sent message\n"); 856 apartment_release(apt); 857 return RPC_E_CANTCALLOUT_ININPUTSYNCCALL; 858 } 859 860 message_state = msg->Handle; 861 /* restore the binding handle and the real start of data */ 862 msg->Handle = message_state->binding_handle; 863 msg->Buffer = (char *)msg->Buffer - message_state->prefix_data_len; 864 msg->BufferLength += message_state->prefix_data_len; 865 866 /* Note: this is an optimization in the Microsoft OLE runtime that we need 867 * to copy, as shown by the test_no_couninitialize_client test. without 868 * short-circuiting the RPC runtime in the case below, the test will 869 * deadlock on the loader lock due to the RPC runtime needing to create 870 * a thread to process the RPC when this function is called indirectly 871 * from DllMain */ 872 873 message_state->params.msg = olemsg; 874 if (message_state->params.bypass_rpcrt) 875 { 876 TRACE("Calling apartment thread 0x%08x...\n", message_state->target_tid); 877 878 msg->ProcNum &= ~RPC_FLAGS_VALID_BIT; 879 880 if (!PostMessageW(message_state->target_hwnd, DM_EXECUTERPC, 0, 881 (LPARAM)&message_state->params)) 882 { 883 ERR("PostMessage failed with error %u\n", GetLastError()); 884 885 /* Note: message_state->params.iface doesn't have a reference and 886 * so doesn't need to be released */ 887 888 hr = HRESULT_FROM_WIN32(GetLastError()); 889 } 890 } 891 else 892 { 893 /* we use a separate thread here because we need to be able to 894 * pump the message loop in the application thread: if we do not, 895 * any windows created by this thread will hang and RPCs that try 896 * and re-enter this STA from an incoming server thread will 897 * deadlock. InstallShield is an example of that. 898 */ 899 if (!QueueUserWorkItem(rpc_sendreceive_thread, &message_state->params, WT_EXECUTEDEFAULT)) 900 { 901 ERR("QueueUserWorkItem failed with error %u\n", GetLastError()); 902 hr = E_UNEXPECTED; 903 } 904 else 905 hr = S_OK; 906 } 907 908 if (hr == S_OK) 909 { 910 if (WaitForSingleObject(message_state->params.handle, 0)) 911 { 912 COM_CurrentInfo()->pending_call_count_client++; 913 hr = CoWaitForMultipleHandles(0, INFINITE, 1, &message_state->params.handle, &index); 914 COM_CurrentInfo()->pending_call_count_client--; 915 } 916 } 917 ClientRpcChannelBuffer_ReleaseEventHandle(This, message_state->params.handle); 918 919 /* for WM shortcut, faults are returned in params->hr */ 920 if (hr == S_OK) 921 hrFault = message_state->params.hr; 922 923 status = message_state->params.status; 924 925 orpcthat.flags = ORPCF_NULL; 926 orpcthat.extensions = NULL; 927 928 TRACE("RPC call status: 0x%x\n", status); 929 if (status != RPC_S_OK) 930 hr = HRESULT_FROM_WIN32(status); 931 932 TRACE("hrFault = 0x%08x\n", hrFault); 933 934 /* FIXME: this condition should be 935 * "hr == S_OK && (!hrFault || msg->BufferLength > FIELD_OFFSET(ORPCTHAT, extensions) + 4)" 936 * but we don't currently reset the message length for PostMessage 937 * dispatched calls */ 938 if (hr == S_OK && hrFault == S_OK) 939 { 940 HRESULT hr2; 941 char *original_buffer = msg->Buffer; 942 943 /* handle ORPCTHAT and client extensions */ 944 945 hr2 = unmarshal_ORPCTHAT(msg, &orpcthat, &orpc_ext_array, &first_wire_orpc_extent); 946 if (FAILED(hr2)) 947 hr = hr2; 948 949 message_state->prefix_data_len = (char *)msg->Buffer - original_buffer; 950 msg->BufferLength -= message_state->prefix_data_len; 951 } 952 else 953 message_state->prefix_data_len = 0; 954 955 if (hr == S_OK) 956 { 957 ChannelHooks_ClientNotify(&message_state->channel_hook_info, 958 msg->DataRepresentation, 959 first_wire_orpc_extent, 960 orpcthat.extensions && first_wire_orpc_extent ? orpcthat.extensions->size : 0, 961 hrFault); 962 } 963 964 /* save away the message state again */ 965 msg->Handle = message_state; 966 967 if (pstatus) *pstatus = status; 968 969 if (hr == S_OK) 970 hr = hrFault; 971 972 TRACE("-- 0x%08x\n", hr); 973 974 apartment_release(apt); 975 return hr; 976 } 977 978 static HRESULT WINAPI ServerRpcChannelBuffer_FreeBuffer(LPRPCCHANNELBUFFER iface, RPCOLEMESSAGE* olemsg) 979 { 980 RPC_MESSAGE *msg = (RPC_MESSAGE *)olemsg; 981 RPC_STATUS status; 982 struct message_state *message_state; 983 984 TRACE("(%p)\n", msg); 985 986 message_state = msg->Handle; 987 /* restore the binding handle and the real start of data */ 988 msg->Handle = message_state->binding_handle; 989 msg->Buffer = (char *)msg->Buffer - message_state->prefix_data_len; 990 msg->BufferLength += message_state->prefix_data_len; 991 message_state->prefix_data_len = 0; 992 993 if (message_state->bypass_rpcrt) 994 { 995 HeapFree(GetProcessHeap(), 0, msg->Buffer); 996 status = RPC_S_OK; 997 } 998 else 999 status = I_RpcFreeBuffer(msg); 1000 1001 msg->Handle = message_state; 1002 1003 TRACE("-- %d\n", status); 1004 1005 return HRESULT_FROM_WIN32(status); 1006 } 1007 1008 static HRESULT WINAPI ClientRpcChannelBuffer_FreeBuffer(LPRPCCHANNELBUFFER iface, RPCOLEMESSAGE* olemsg) 1009 { 1010 RPC_MESSAGE *msg = (RPC_MESSAGE *)olemsg; 1011 RPC_STATUS status; 1012 struct message_state *message_state; 1013 1014 TRACE("(%p)\n", msg); 1015 1016 message_state = msg->Handle; 1017 /* restore the binding handle and the real start of data */ 1018 msg->Handle = message_state->binding_handle; 1019 msg->Buffer = (char *)msg->Buffer - message_state->prefix_data_len; 1020 msg->BufferLength += message_state->prefix_data_len; 1021 1022 if (message_state->params.bypass_rpcrt) 1023 { 1024 HeapFree(GetProcessHeap(), 0, msg->Buffer); 1025 status = RPC_S_OK; 1026 } 1027 else 1028 status = I_RpcFreeBuffer(msg); 1029 1030 HeapFree(GetProcessHeap(), 0, msg->RpcInterfaceInformation); 1031 msg->RpcInterfaceInformation = NULL; 1032 1033 if (message_state->params.stub) 1034 IRpcStubBuffer_Release(message_state->params.stub); 1035 if (message_state->params.chan) 1036 IRpcChannelBuffer_Release(message_state->params.chan); 1037 HeapFree(GetProcessHeap(), 0, message_state); 1038 1039 TRACE("-- %d\n", status); 1040 1041 return HRESULT_FROM_WIN32(status); 1042 } 1043 1044 static HRESULT WINAPI ClientRpcChannelBuffer_GetDestCtx(LPRPCCHANNELBUFFER iface, DWORD* pdwDestContext, void** ppvDestContext) 1045 { 1046 ClientRpcChannelBuffer *This = (ClientRpcChannelBuffer *)iface; 1047 1048 TRACE("(%p,%p)\n", pdwDestContext, ppvDestContext); 1049 1050 *pdwDestContext = This->super.dest_context; 1051 *ppvDestContext = This->super.dest_context_data; 1052 1053 return S_OK; 1054 } 1055 1056 static HRESULT WINAPI ServerRpcChannelBuffer_GetDestCtx(LPRPCCHANNELBUFFER iface, DWORD* dest_context, void** dest_context_data) 1057 { 1058 RpcChannelBuffer *This = (RpcChannelBuffer *)iface; 1059 1060 TRACE("(%p,%p)\n", dest_context, dest_context_data); 1061 1062 *dest_context = This->dest_context; 1063 *dest_context_data = This->dest_context_data; 1064 return S_OK; 1065 } 1066 1067 static HRESULT WINAPI RpcChannelBuffer_IsConnected(LPRPCCHANNELBUFFER iface) 1068 { 1069 TRACE("()\n"); 1070 /* native does nothing too */ 1071 return S_OK; 1072 } 1073 1074 static const IRpcChannelBufferVtbl ClientRpcChannelBufferVtbl = 1075 { 1076 RpcChannelBuffer_QueryInterface, 1077 RpcChannelBuffer_AddRef, 1078 ClientRpcChannelBuffer_Release, 1079 ClientRpcChannelBuffer_GetBuffer, 1080 ClientRpcChannelBuffer_SendReceive, 1081 ClientRpcChannelBuffer_FreeBuffer, 1082 ClientRpcChannelBuffer_GetDestCtx, 1083 RpcChannelBuffer_IsConnected 1084 }; 1085 1086 static const IRpcChannelBufferVtbl ServerRpcChannelBufferVtbl = 1087 { 1088 RpcChannelBuffer_QueryInterface, 1089 RpcChannelBuffer_AddRef, 1090 ServerRpcChannelBuffer_Release, 1091 ServerRpcChannelBuffer_GetBuffer, 1092 ServerRpcChannelBuffer_SendReceive, 1093 ServerRpcChannelBuffer_FreeBuffer, 1094 ServerRpcChannelBuffer_GetDestCtx, 1095 RpcChannelBuffer_IsConnected 1096 }; 1097 1098 /* returns a channel buffer for proxies */ 1099 HRESULT RPC_CreateClientChannel(const OXID *oxid, const IPID *ipid, 1100 const OXID_INFO *oxid_info, const IID *iid, 1101 DWORD dest_context, void *dest_context_data, 1102 IRpcChannelBuffer **chan, APARTMENT *apt) 1103 { 1104 ClientRpcChannelBuffer *This; 1105 WCHAR endpoint[200]; 1106 RPC_BINDING_HANDLE bind; 1107 RPC_STATUS status; 1108 LPWSTR string_binding; 1109 1110 /* FIXME: get the endpoint from oxid_info->psa instead */ 1111 get_rpc_endpoint(endpoint, oxid); 1112 1113 TRACE("proxy pipe: connecting to endpoint: %s\n", debugstr_w(endpoint)); 1114 1115 status = RpcStringBindingComposeW( 1116 NULL, 1117 wszRpcTransport, 1118 NULL, 1119 endpoint, 1120 NULL, 1121 &string_binding); 1122 1123 if (status == RPC_S_OK) 1124 { 1125 status = RpcBindingFromStringBindingW(string_binding, &bind); 1126 1127 if (status == RPC_S_OK) 1128 { 1129 IPID ipid2 = *ipid; /* why can't RpcBindingSetObject take a const? */ 1130 status = RpcBindingSetObject(bind, &ipid2); 1131 if (status != RPC_S_OK) 1132 RpcBindingFree(&bind); 1133 } 1134 1135 RpcStringFreeW(&string_binding); 1136 } 1137 1138 if (status != RPC_S_OK) 1139 { 1140 ERR("Couldn't get binding for endpoint %s, status = %d\n", debugstr_w(endpoint), status); 1141 return HRESULT_FROM_WIN32(status); 1142 } 1143 1144 This = HeapAlloc(GetProcessHeap(), 0, sizeof(*This)); 1145 if (!This) 1146 { 1147 RpcBindingFree(&bind); 1148 return E_OUTOFMEMORY; 1149 } 1150 1151 This->super.IRpcChannelBuffer_iface.lpVtbl = &ClientRpcChannelBufferVtbl; 1152 This->super.refs = 1; 1153 This->super.dest_context = dest_context; 1154 This->super.dest_context_data = dest_context_data; 1155 This->bind = bind; 1156 apartment_getoxid(apt, &This->oxid); 1157 This->server_pid = oxid_info->dwPid; 1158 This->event = NULL; 1159 This->iid = *iid; 1160 1161 *chan = &This->super.IRpcChannelBuffer_iface; 1162 1163 return S_OK; 1164 } 1165 1166 HRESULT RPC_CreateServerChannel(DWORD dest_context, void *dest_context_data, IRpcChannelBuffer **chan) 1167 { 1168 RpcChannelBuffer *This = HeapAlloc(GetProcessHeap(), 0, sizeof(*This)); 1169 if (!This) 1170 return E_OUTOFMEMORY; 1171 1172 This->IRpcChannelBuffer_iface.lpVtbl = &ServerRpcChannelBufferVtbl; 1173 This->refs = 1; 1174 This->dest_context = dest_context; 1175 This->dest_context_data = dest_context_data; 1176 1177 *chan = &This->IRpcChannelBuffer_iface; 1178 1179 return S_OK; 1180 } 1181 1182 /* unmarshals ORPC_EXTENT_ARRAY according to NDR rules, but doesn't allocate 1183 * any memory */ 1184 static HRESULT unmarshal_ORPC_EXTENT_ARRAY(RPC_MESSAGE *msg, const char *end, 1185 ORPC_EXTENT_ARRAY *extensions, 1186 WIRE_ORPC_EXTENT **first_wire_orpc_extent) 1187 { 1188 DWORD pointer_id; 1189 DWORD i; 1190 1191 memcpy(extensions, msg->Buffer, FIELD_OFFSET(WIRE_ORPC_EXTENT_ARRAY, extent)); 1192 msg->Buffer = (char *)msg->Buffer + FIELD_OFFSET(WIRE_ORPC_EXTENT_ARRAY, extent); 1193 1194 if ((const char *)msg->Buffer + 2 * sizeof(DWORD) > end) 1195 return RPC_E_INVALID_HEADER; 1196 1197 pointer_id = *(DWORD *)msg->Buffer; 1198 msg->Buffer = (char *)msg->Buffer + sizeof(DWORD); 1199 extensions->extent = NULL; 1200 1201 if (pointer_id) 1202 { 1203 WIRE_ORPC_EXTENT *wire_orpc_extent; 1204 1205 /* conformance */ 1206 if (*(DWORD *)msg->Buffer != ((extensions->size+1)&~1)) 1207 return RPC_S_INVALID_BOUND; 1208 1209 msg->Buffer = (char *)msg->Buffer + sizeof(DWORD); 1210 1211 /* arbitrary limit for security (don't know what native does) */ 1212 if (extensions->size > 256) 1213 { 1214 ERR("too many extensions: %d\n", extensions->size); 1215 return RPC_S_INVALID_BOUND; 1216 } 1217 1218 *first_wire_orpc_extent = wire_orpc_extent = msg->Buffer; 1219 for (i = 0; i < ((extensions->size+1)&~1); i++) 1220 { 1221 if ((const char *)&wire_orpc_extent->data[0] > end) 1222 return RPC_S_INVALID_BOUND; 1223 if (wire_orpc_extent->conformance != ((wire_orpc_extent->size+7)&~7)) 1224 return RPC_S_INVALID_BOUND; 1225 if ((const char *)&wire_orpc_extent->data[wire_orpc_extent->conformance] > end) 1226 return RPC_S_INVALID_BOUND; 1227 TRACE("size %u, guid %s\n", wire_orpc_extent->size, debugstr_guid(&wire_orpc_extent->id)); 1228 wire_orpc_extent = (WIRE_ORPC_EXTENT *)&wire_orpc_extent->data[wire_orpc_extent->conformance]; 1229 } 1230 msg->Buffer = wire_orpc_extent; 1231 } 1232 1233 return S_OK; 1234 } 1235 1236 /* unmarshals ORPCTHIS according to NDR rules, but doesn't allocate any memory */ 1237 static HRESULT unmarshal_ORPCTHIS(RPC_MESSAGE *msg, ORPCTHIS *orpcthis, 1238 ORPC_EXTENT_ARRAY *orpc_ext_array, WIRE_ORPC_EXTENT **first_wire_orpc_extent) 1239 { 1240 const char *end = (char *)msg->Buffer + msg->BufferLength; 1241 1242 *first_wire_orpc_extent = NULL; 1243 1244 if (msg->BufferLength < FIELD_OFFSET(WIRE_ORPCTHIS, extensions) + sizeof(DWORD)) 1245 { 1246 ERR("invalid buffer length\n"); 1247 return RPC_E_INVALID_HEADER; 1248 } 1249 1250 memcpy(orpcthis, msg->Buffer, FIELD_OFFSET(WIRE_ORPCTHIS, extensions)); 1251 msg->Buffer = (char *)msg->Buffer + FIELD_OFFSET(WIRE_ORPCTHIS, extensions); 1252 1253 if ((const char *)msg->Buffer + sizeof(DWORD) > end) 1254 return RPC_E_INVALID_HEADER; 1255 1256 if (*(DWORD *)msg->Buffer) 1257 orpcthis->extensions = orpc_ext_array; 1258 else 1259 orpcthis->extensions = NULL; 1260 1261 msg->Buffer = (char *)msg->Buffer + sizeof(DWORD); 1262 1263 if (orpcthis->extensions) 1264 { 1265 HRESULT hr = unmarshal_ORPC_EXTENT_ARRAY(msg, end, orpc_ext_array, 1266 first_wire_orpc_extent); 1267 if (FAILED(hr)) 1268 return hr; 1269 } 1270 1271 if ((orpcthis->version.MajorVersion != COM_MAJOR_VERSION) || 1272 (orpcthis->version.MinorVersion > COM_MINOR_VERSION)) 1273 { 1274 ERR("COM version {%d, %d} not supported\n", 1275 orpcthis->version.MajorVersion, orpcthis->version.MinorVersion); 1276 return RPC_E_VERSION_MISMATCH; 1277 } 1278 1279 if (orpcthis->flags & ~(ORPCF_LOCAL|ORPCF_RESERVED1|ORPCF_RESERVED2|ORPCF_RESERVED3|ORPCF_RESERVED4)) 1280 { 1281 ERR("invalid flags 0x%x\n", orpcthis->flags & ~(ORPCF_LOCAL|ORPCF_RESERVED1|ORPCF_RESERVED2|ORPCF_RESERVED3|ORPCF_RESERVED4)); 1282 return RPC_E_INVALID_HEADER; 1283 } 1284 1285 return S_OK; 1286 } 1287 1288 static HRESULT unmarshal_ORPCTHAT(RPC_MESSAGE *msg, ORPCTHAT *orpcthat, 1289 ORPC_EXTENT_ARRAY *orpc_ext_array, WIRE_ORPC_EXTENT **first_wire_orpc_extent) 1290 { 1291 const char *end = (char *)msg->Buffer + msg->BufferLength; 1292 1293 *first_wire_orpc_extent = NULL; 1294 1295 if (msg->BufferLength < FIELD_OFFSET(WIRE_ORPCTHAT, extensions) + sizeof(DWORD)) 1296 { 1297 ERR("invalid buffer length\n"); 1298 return RPC_E_INVALID_HEADER; 1299 } 1300 1301 memcpy(orpcthat, msg->Buffer, FIELD_OFFSET(WIRE_ORPCTHAT, extensions)); 1302 msg->Buffer = (char *)msg->Buffer + FIELD_OFFSET(WIRE_ORPCTHAT, extensions); 1303 1304 if ((const char *)msg->Buffer + sizeof(DWORD) > end) 1305 return RPC_E_INVALID_HEADER; 1306 1307 if (*(DWORD *)msg->Buffer) 1308 orpcthat->extensions = orpc_ext_array; 1309 else 1310 orpcthat->extensions = NULL; 1311 1312 msg->Buffer = (char *)msg->Buffer + sizeof(DWORD); 1313 1314 if (orpcthat->extensions) 1315 { 1316 HRESULT hr = unmarshal_ORPC_EXTENT_ARRAY(msg, end, orpc_ext_array, 1317 first_wire_orpc_extent); 1318 if (FAILED(hr)) 1319 return hr; 1320 } 1321 1322 if (orpcthat->flags & ~(ORPCF_LOCAL|ORPCF_RESERVED1|ORPCF_RESERVED2|ORPCF_RESERVED3|ORPCF_RESERVED4)) 1323 { 1324 ERR("invalid flags 0x%x\n", orpcthat->flags & ~(ORPCF_LOCAL|ORPCF_RESERVED1|ORPCF_RESERVED2|ORPCF_RESERVED3|ORPCF_RESERVED4)); 1325 return RPC_E_INVALID_HEADER; 1326 } 1327 1328 return S_OK; 1329 } 1330 1331 void RPC_ExecuteCall(struct dispatch_params *params) 1332 { 1333 struct message_state *message_state = NULL; 1334 RPC_MESSAGE *msg = (RPC_MESSAGE *)params->msg; 1335 char *original_buffer = msg->Buffer; 1336 ORPCTHIS orpcthis; 1337 ORPC_EXTENT_ARRAY orpc_ext_array; 1338 WIRE_ORPC_EXTENT *first_wire_orpc_extent; 1339 GUID old_causality_id; 1340 1341 /* handle ORPCTHIS and server extensions */ 1342 1343 params->hr = unmarshal_ORPCTHIS(msg, &orpcthis, &orpc_ext_array, &first_wire_orpc_extent); 1344 if (params->hr != S_OK) 1345 { 1346 msg->Buffer = original_buffer; 1347 goto exit; 1348 } 1349 1350 message_state = HeapAlloc(GetProcessHeap(), 0, sizeof(*message_state)); 1351 if (!message_state) 1352 { 1353 params->hr = E_OUTOFMEMORY; 1354 msg->Buffer = original_buffer; 1355 goto exit; 1356 } 1357 1358 message_state->prefix_data_len = (char *)msg->Buffer - original_buffer; 1359 message_state->binding_handle = msg->Handle; 1360 message_state->bypass_rpcrt = params->bypass_rpcrt; 1361 1362 message_state->channel_hook_info.iid = params->iid; 1363 message_state->channel_hook_info.cbSize = sizeof(message_state->channel_hook_info); 1364 message_state->channel_hook_info.uCausality = orpcthis.cid; 1365 message_state->channel_hook_info.dwServerPid = GetCurrentProcessId(); 1366 message_state->channel_hook_info.iMethod = msg->ProcNum; 1367 message_state->channel_hook_info.pObject = params->iface; 1368 1369 if (orpcthis.extensions && first_wire_orpc_extent && 1370 orpcthis.extensions->size) 1371 ChannelHooks_ServerNotify(&message_state->channel_hook_info, msg->DataRepresentation, first_wire_orpc_extent, orpcthis.extensions->size); 1372 1373 msg->Handle = message_state; 1374 msg->BufferLength -= message_state->prefix_data_len; 1375 1376 /* call message filter */ 1377 1378 if (COM_CurrentApt()->filter) 1379 { 1380 DWORD handlecall; 1381 INTERFACEINFO interface_info; 1382 CALLTYPE calltype; 1383 1384 interface_info.pUnk = params->iface; 1385 interface_info.iid = params->iid; 1386 interface_info.wMethod = msg->ProcNum; 1387 1388 if (IsEqualGUID(&orpcthis.cid, &COM_CurrentInfo()->causality_id)) 1389 calltype = CALLTYPE_NESTED; 1390 else if (COM_CurrentInfo()->pending_call_count_server == 0) 1391 calltype = CALLTYPE_TOPLEVEL; 1392 else 1393 calltype = CALLTYPE_TOPLEVEL_CALLPENDING; 1394 1395 handlecall = IMessageFilter_HandleInComingCall(COM_CurrentApt()->filter, 1396 calltype, 1397 UlongToHandle(GetCurrentProcessId()), 1398 0 /* FIXME */, 1399 &interface_info); 1400 TRACE("IMessageFilter_HandleInComingCall returned %d\n", handlecall); 1401 switch (handlecall) 1402 { 1403 case SERVERCALL_REJECTED: 1404 params->hr = RPC_E_CALL_REJECTED; 1405 goto exit_reset_state; 1406 case SERVERCALL_RETRYLATER: 1407 #if 0 /* FIXME: handle retries on the client side before enabling this code */ 1408 params->hr = RPC_E_RETRY; 1409 goto exit_reset_state; 1410 #else 1411 FIXME("retry call later not implemented\n"); 1412 break; 1413 #endif 1414 case SERVERCALL_ISHANDLED: 1415 default: 1416 break; 1417 } 1418 } 1419 1420 /* invoke the method */ 1421 1422 /* save the old causality ID - note: any calls executed while processing 1423 * messages received during the SendReceive will appear to originate from 1424 * this call - this should be checked with what Windows does */ 1425 old_causality_id = COM_CurrentInfo()->causality_id; 1426 COM_CurrentInfo()->causality_id = orpcthis.cid; 1427 COM_CurrentInfo()->pending_call_count_server++; 1428 params->hr = IRpcStubBuffer_Invoke(params->stub, params->msg, params->chan); 1429 COM_CurrentInfo()->pending_call_count_server--; 1430 COM_CurrentInfo()->causality_id = old_causality_id; 1431 1432 /* the invoke allocated a new buffer, so free the old one */ 1433 if (message_state->bypass_rpcrt && original_buffer != msg->Buffer) 1434 HeapFree(GetProcessHeap(), 0, original_buffer); 1435 1436 exit_reset_state: 1437 message_state = msg->Handle; 1438 msg->Handle = message_state->binding_handle; 1439 msg->Buffer = (char *)msg->Buffer - message_state->prefix_data_len; 1440 msg->BufferLength += message_state->prefix_data_len; 1441 1442 exit: 1443 HeapFree(GetProcessHeap(), 0, message_state); 1444 if (params->handle) SetEvent(params->handle); 1445 } 1446 1447 static void __RPC_STUB dispatch_rpc(RPC_MESSAGE *msg) 1448 { 1449 struct dispatch_params *params; 1450 struct stub_manager *stub_manager; 1451 APARTMENT *apt; 1452 IPID ipid; 1453 HRESULT hr; 1454 1455 RpcBindingInqObject(msg->Handle, &ipid); 1456 1457 TRACE("ipid = %s, iMethod = %d\n", debugstr_guid(&ipid), msg->ProcNum); 1458 1459 params = HeapAlloc(GetProcessHeap(), 0, sizeof(*params)); 1460 if (!params) 1461 { 1462 RpcRaiseException(E_OUTOFMEMORY); 1463 return; 1464 } 1465 1466 hr = ipid_get_dispatch_params(&ipid, &apt, &stub_manager, ¶ms->stub, ¶ms->chan, 1467 ¶ms->iid, ¶ms->iface); 1468 if (hr != S_OK) 1469 { 1470 ERR("no apartment found for ipid %s\n", debugstr_guid(&ipid)); 1471 HeapFree(GetProcessHeap(), 0, params); 1472 RpcRaiseException(hr); 1473 return; 1474 } 1475 1476 params->msg = (RPCOLEMESSAGE *)msg; 1477 params->status = RPC_S_OK; 1478 params->hr = S_OK; 1479 params->handle = NULL; 1480 params->bypass_rpcrt = FALSE; 1481 1482 /* Note: this is the important difference between STAs and MTAs - we 1483 * always execute RPCs to STAs in the thread that originally created the 1484 * apartment (i.e. the one that pumps messages to the window) */ 1485 if (!apt->multi_threaded) 1486 { 1487 params->handle = CreateEventW(NULL, FALSE, FALSE, NULL); 1488 1489 TRACE("Calling apartment thread 0x%08x...\n", apt->tid); 1490 1491 if (PostMessageW(apartment_getwindow(apt), DM_EXECUTERPC, 0, (LPARAM)params)) 1492 WaitForSingleObject(params->handle, INFINITE); 1493 else 1494 { 1495 ERR("PostMessage failed with error %u\n", GetLastError()); 1496 IRpcChannelBuffer_Release(params->chan); 1497 IRpcStubBuffer_Release(params->stub); 1498 } 1499 CloseHandle(params->handle); 1500 } 1501 else 1502 { 1503 BOOL joined = FALSE; 1504 struct oletls *info = COM_CurrentInfo(); 1505 1506 if (!info->apt) 1507 { 1508 enter_apartment(info, COINIT_MULTITHREADED); 1509 joined = TRUE; 1510 } 1511 RPC_ExecuteCall(params); 1512 if (joined) 1513 { 1514 leave_apartment(info); 1515 } 1516 } 1517 1518 hr = params->hr; 1519 if (params->chan) 1520 IRpcChannelBuffer_Release(params->chan); 1521 if (params->stub) 1522 IRpcStubBuffer_Release(params->stub); 1523 HeapFree(GetProcessHeap(), 0, params); 1524 1525 stub_manager_int_release(stub_manager); 1526 apartment_release(apt); 1527 1528 /* if IRpcStubBuffer_Invoke fails, we should raise an exception to tell 1529 * the RPC runtime that the call failed */ 1530 if (hr != S_OK) RpcRaiseException(hr); 1531 } 1532 1533 /* stub registration */ 1534 HRESULT RPC_RegisterInterface(REFIID riid) 1535 { 1536 struct registered_if *rif; 1537 BOOL found = FALSE; 1538 HRESULT hr = S_OK; 1539 1540 TRACE("(%s)\n", debugstr_guid(riid)); 1541 1542 EnterCriticalSection(&csRegIf); 1543 LIST_FOR_EACH_ENTRY(rif, ®istered_interfaces, struct registered_if, entry) 1544 { 1545 if (IsEqualGUID(&rif->If.InterfaceId.SyntaxGUID, riid)) 1546 { 1547 rif->refs++; 1548 found = TRUE; 1549 break; 1550 } 1551 } 1552 if (!found) 1553 { 1554 TRACE("Creating new interface\n"); 1555 1556 rif = HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, sizeof(*rif)); 1557 if (rif) 1558 { 1559 RPC_STATUS status; 1560 1561 rif->refs = 1; 1562 rif->If.Length = sizeof(RPC_SERVER_INTERFACE); 1563 /* RPC interface ID = COM interface ID */ 1564 rif->If.InterfaceId.SyntaxGUID = *riid; 1565 rif->If.DispatchTable = &rpc_dispatch; 1566 /* all other fields are 0, including the version asCOM objects 1567 * always have a version of 0.0 */ 1568 status = RpcServerRegisterIfEx( 1569 (RPC_IF_HANDLE)&rif->If, 1570 NULL, NULL, 1571 RPC_IF_OLE | RPC_IF_AUTOLISTEN, 1572 RPC_C_LISTEN_MAX_CALLS_DEFAULT, 1573 NULL); 1574 if (status == RPC_S_OK) 1575 list_add_tail(®istered_interfaces, &rif->entry); 1576 else 1577 { 1578 ERR("RpcServerRegisterIfEx failed with error %d\n", status); 1579 HeapFree(GetProcessHeap(), 0, rif); 1580 hr = HRESULT_FROM_WIN32(status); 1581 } 1582 } 1583 else 1584 hr = E_OUTOFMEMORY; 1585 } 1586 LeaveCriticalSection(&csRegIf); 1587 return hr; 1588 } 1589 1590 /* stub unregistration */ 1591 void RPC_UnregisterInterface(REFIID riid, BOOL wait) 1592 { 1593 struct registered_if *rif; 1594 EnterCriticalSection(&csRegIf); 1595 LIST_FOR_EACH_ENTRY(rif, ®istered_interfaces, struct registered_if, entry) 1596 { 1597 if (IsEqualGUID(&rif->If.InterfaceId.SyntaxGUID, riid)) 1598 { 1599 if (!--rif->refs) 1600 { 1601 RpcServerUnregisterIf((RPC_IF_HANDLE)&rif->If, NULL, wait); 1602 list_remove(&rif->entry); 1603 HeapFree(GetProcessHeap(), 0, rif); 1604 } 1605 break; 1606 } 1607 } 1608 LeaveCriticalSection(&csRegIf); 1609 } 1610 1611 /* get the info for an OXID, including the IPID for the rem unknown interface 1612 * and the string binding */ 1613 HRESULT RPC_ResolveOxid(OXID oxid, OXID_INFO *oxid_info) 1614 { 1615 TRACE("%s\n", wine_dbgstr_longlong(oxid)); 1616 1617 oxid_info->dwTid = 0; 1618 oxid_info->dwPid = 0; 1619 oxid_info->dwAuthnHint = RPC_C_AUTHN_LEVEL_NONE; 1620 /* FIXME: this is a hack around not having an OXID resolver yet - 1621 * this function should contact the machine's OXID resolver and then it 1622 * should give us the IPID of the IRemUnknown interface */ 1623 oxid_info->ipidRemUnknown.Data1 = 0xffffffff; 1624 oxid_info->ipidRemUnknown.Data2 = 0xffff; 1625 oxid_info->ipidRemUnknown.Data3 = 0xffff; 1626 memcpy(oxid_info->ipidRemUnknown.Data4, &oxid, sizeof(OXID)); 1627 oxid_info->psa = NULL /* FIXME */; 1628 1629 return S_OK; 1630 } 1631 1632 /* make the apartment reachable by other threads and processes and create the 1633 * IRemUnknown object */ 1634 void RPC_StartRemoting(struct apartment *apt) 1635 { 1636 if (!InterlockedExchange(&apt->remoting_started, TRUE)) 1637 { 1638 WCHAR endpoint[200]; 1639 RPC_STATUS status; 1640 1641 get_rpc_endpoint(endpoint, &apt->oxid); 1642 1643 status = RpcServerUseProtseqEpW( 1644 wszRpcTransport, 1645 RPC_C_PROTSEQ_MAX_REQS_DEFAULT, 1646 endpoint, 1647 NULL); 1648 if (status != RPC_S_OK) 1649 ERR("Couldn't register endpoint %s\n", debugstr_w(endpoint)); 1650 1651 /* FIXME: move remote unknown exporting into this function */ 1652 } 1653 start_apartment_remote_unknown(apt); 1654 } 1655 1656 1657 static HRESULT create_server(REFCLSID rclsid, HANDLE *process) 1658 { 1659 static const WCHAR wszLocalServer32[] = { 'L','o','c','a','l','S','e','r','v','e','r','3','2',0 }; 1660 static const WCHAR embedding[] = { ' ', '-','E','m','b','e','d','d','i','n','g',0 }; 1661 HKEY key; 1662 HRESULT hres; 1663 WCHAR command[MAX_PATH+ARRAY_SIZE(embedding)]; 1664 DWORD size = (MAX_PATH+1) * sizeof(WCHAR); 1665 STARTUPINFOW sinfo; 1666 PROCESS_INFORMATION pinfo; 1667 LONG ret; 1668 1669 hres = COM_OpenKeyForCLSID(rclsid, wszLocalServer32, KEY_READ, &key); 1670 if (FAILED(hres)) { 1671 ERR("class %s not registered\n", debugstr_guid(rclsid)); 1672 return hres; 1673 } 1674 1675 ret = RegQueryValueExW(key, NULL, NULL, NULL, (LPBYTE)command, &size); 1676 RegCloseKey(key); 1677 if (ret) { 1678 WARN("No default value for LocalServer32 key\n"); 1679 return REGDB_E_CLASSNOTREG; /* FIXME: check retval */ 1680 } 1681 1682 memset(&sinfo,0,sizeof(sinfo)); 1683 sinfo.cb = sizeof(sinfo); 1684 1685 /* EXE servers are started with the -Embedding switch. */ 1686 1687 strcatW(command, embedding); 1688 1689 TRACE("activating local server %s for %s\n", debugstr_w(command), debugstr_guid(rclsid)); 1690 1691 /* FIXME: Win2003 supports a ServerExecutable value that is passed into 1692 * CreateProcess */ 1693 if (!CreateProcessW(NULL, command, NULL, NULL, FALSE, DETACHED_PROCESS, NULL, NULL, &sinfo, &pinfo)) { 1694 WARN("failed to run local server %s\n", debugstr_w(command)); 1695 return HRESULT_FROM_WIN32(GetLastError()); 1696 } 1697 *process = pinfo.hProcess; 1698 CloseHandle(pinfo.hThread); 1699 1700 return S_OK; 1701 } 1702 1703 /* 1704 * start_local_service() - start a service given its name and parameters 1705 */ 1706 static DWORD start_local_service(LPCWSTR name, DWORD num, LPCWSTR *params) 1707 { 1708 SC_HANDLE handle, hsvc; 1709 DWORD r = ERROR_FUNCTION_FAILED; 1710 1711 TRACE("Starting service %s %d params\n", debugstr_w(name), num); 1712 1713 handle = OpenSCManagerW(NULL, NULL, SC_MANAGER_CONNECT); 1714 if (!handle) 1715 return r; 1716 hsvc = OpenServiceW(handle, name, SERVICE_START); 1717 if (hsvc) 1718 { 1719 if(StartServiceW(hsvc, num, params)) 1720 r = ERROR_SUCCESS; 1721 else 1722 r = GetLastError(); 1723 if (r == ERROR_SERVICE_ALREADY_RUNNING) 1724 r = ERROR_SUCCESS; 1725 CloseServiceHandle(hsvc); 1726 } 1727 else 1728 r = GetLastError(); 1729 CloseServiceHandle(handle); 1730 1731 TRACE("StartService returned error %u (%s)\n", r, (r == ERROR_SUCCESS) ? "ok":"failed"); 1732 1733 return r; 1734 } 1735 1736 /* 1737 * create_local_service() - start a COM server in a service 1738 * 1739 * To start a Local Service, we read the AppID value under 1740 * the class's CLSID key, then open the HKCR\\AppId key specified 1741 * there and check for a LocalService value. 1742 * 1743 * Note: Local Services are not supported under Windows 9x 1744 */ 1745 static HRESULT create_local_service(REFCLSID rclsid) 1746 { 1747 HRESULT hres; 1748 WCHAR buf[CHARS_IN_GUID]; 1749 static const WCHAR szLocalService[] = { 'L','o','c','a','l','S','e','r','v','i','c','e',0 }; 1750 static const WCHAR szServiceParams[] = {'S','e','r','v','i','c','e','P','a','r','a','m','s',0}; 1751 HKEY hkey; 1752 LONG r; 1753 DWORD type, sz; 1754 1755 TRACE("Attempting to start Local service for %s\n", debugstr_guid(rclsid)); 1756 1757 hres = COM_OpenKeyForAppIdFromCLSID(rclsid, KEY_READ, &hkey); 1758 if (FAILED(hres)) 1759 return hres; 1760 1761 /* read the LocalService and ServiceParameters values from the AppID key */ 1762 sz = sizeof buf; 1763 r = RegQueryValueExW(hkey, szLocalService, NULL, &type, (LPBYTE)buf, &sz); 1764 if (r==ERROR_SUCCESS && type==REG_SZ) 1765 { 1766 DWORD num_args = 0; 1767 LPWSTR args[1] = { NULL }; 1768 1769 /* 1770 * FIXME: I'm not really sure how to deal with the service parameters. 1771 * I suspect that the string returned from RegQueryValueExW 1772 * should be split into a number of arguments by spaces. 1773 * It would make more sense if ServiceParams contained a 1774 * REG_MULTI_SZ here, but it's a REG_SZ for the services 1775 * that I'm interested in for the moment. 1776 */ 1777 r = RegQueryValueExW(hkey, szServiceParams, NULL, &type, NULL, &sz); 1778 if (r == ERROR_SUCCESS && type == REG_SZ && sz) 1779 { 1780 args[0] = HeapAlloc(GetProcessHeap(),HEAP_ZERO_MEMORY,sz); 1781 num_args++; 1782 RegQueryValueExW(hkey, szServiceParams, NULL, &type, (LPBYTE)args[0], &sz); 1783 } 1784 r = start_local_service(buf, num_args, (LPCWSTR *)args); 1785 if (r != ERROR_SUCCESS) 1786 hres = REGDB_E_CLASSNOTREG; /* FIXME: check retval */ 1787 HeapFree(GetProcessHeap(),0,args[0]); 1788 } 1789 else 1790 { 1791 WARN("No LocalService value\n"); 1792 hres = REGDB_E_CLASSNOTREG; /* FIXME: check retval */ 1793 } 1794 RegCloseKey(hkey); 1795 1796 return hres; 1797 } 1798 1799 1800 static void get_localserver_pipe_name(WCHAR *pipefn, REFCLSID rclsid) 1801 { 1802 static const WCHAR wszPipeRef[] = {'\\','\\','.','\\','p','i','p','e','\\',0}; 1803 strcpyW(pipefn, wszPipeRef); 1804 StringFromGUID2(rclsid, pipefn + ARRAY_SIZE(wszPipeRef) - 1, CHARS_IN_GUID); 1805 } 1806 1807 /* FIXME: should call to rpcss instead */ 1808 HRESULT RPC_GetLocalClassObject(REFCLSID rclsid, REFIID iid, LPVOID *ppv) 1809 { 1810 HRESULT hres; 1811 HANDLE hPipe; 1812 WCHAR pipefn[100]; 1813 DWORD res, bufferlen; 1814 char marshalbuffer[200]; 1815 IStream *pStm; 1816 LARGE_INTEGER seekto; 1817 ULARGE_INTEGER newpos; 1818 int tries = 0; 1819 IServiceProvider *local_server; 1820 1821 static const int MAXTRIES = 30; /* 30 seconds */ 1822 1823 TRACE("rclsid=%s, iid=%s\n", debugstr_guid(rclsid), debugstr_guid(iid)); 1824 1825 get_localserver_pipe_name(pipefn, rclsid); 1826 1827 while (tries++ < MAXTRIES) { 1828 TRACE("waiting for %s\n", debugstr_w(pipefn)); 1829 1830 WaitNamedPipeW( pipefn, NMPWAIT_WAIT_FOREVER ); 1831 hPipe = CreateFileW(pipefn, GENERIC_READ | GENERIC_WRITE, 0, NULL, OPEN_EXISTING, 0, 0); 1832 if (hPipe == INVALID_HANDLE_VALUE) { 1833 DWORD index; 1834 DWORD start_ticks; 1835 HANDLE process = 0; 1836 if (tries == 1) { 1837 if ( (hres = create_local_service(rclsid)) && 1838 (hres = create_server(rclsid, &process)) ) 1839 return hres; 1840 } else { 1841 WARN("Connecting to %s, no response yet, retrying: le is %u\n", debugstr_w(pipefn), GetLastError()); 1842 } 1843 /* wait for one second, even if messages arrive */ 1844 start_ticks = GetTickCount(); 1845 do { 1846 if (SUCCEEDED(CoWaitForMultipleHandles(0, 1000, (process != 0), 1847 &process, &index)) && process && !index) 1848 { 1849 WARN( "server for %s failed to start\n", debugstr_guid(rclsid) ); 1850 CloseHandle( hPipe ); 1851 CloseHandle( process ); 1852 return E_NOINTERFACE; 1853 } 1854 } while (GetTickCount() - start_ticks < 1000); 1855 if (process) CloseHandle( process ); 1856 continue; 1857 } 1858 bufferlen = 0; 1859 if (!ReadFile(hPipe,marshalbuffer,sizeof(marshalbuffer),&bufferlen,NULL)) { 1860 FIXME("Failed to read marshal id from classfactory of %s.\n",debugstr_guid(rclsid)); 1861 CloseHandle(hPipe); 1862 Sleep(1000); 1863 continue; 1864 } 1865 TRACE("read marshal id from pipe\n"); 1866 CloseHandle(hPipe); 1867 break; 1868 } 1869 1870 if (tries >= MAXTRIES) 1871 return E_NOINTERFACE; 1872 1873 hres = CreateStreamOnHGlobal(0,TRUE,&pStm); 1874 if (hres != S_OK) return hres; 1875 hres = IStream_Write(pStm,marshalbuffer,bufferlen,&res); 1876 if (hres != S_OK) goto out; 1877 seekto.u.LowPart = 0;seekto.u.HighPart = 0; 1878 hres = IStream_Seek(pStm,seekto,STREAM_SEEK_SET,&newpos); 1879 1880 TRACE("unmarshalling local server\n"); 1881 hres = CoUnmarshalInterface(pStm, &IID_IServiceProvider, (void**)&local_server); 1882 if(SUCCEEDED(hres)) 1883 hres = IServiceProvider_QueryService(local_server, rclsid, iid, ppv); 1884 IServiceProvider_Release(local_server); 1885 out: 1886 IStream_Release(pStm); 1887 return hres; 1888 } 1889 1890 1891 struct local_server_params 1892 { 1893 CLSID clsid; 1894 IStream *stream; 1895 HANDLE pipe; 1896 HANDLE stop_event; 1897 HANDLE thread; 1898 BOOL multi_use; 1899 }; 1900 1901 /* FIXME: should call to rpcss instead */ 1902 static DWORD WINAPI local_server_thread(LPVOID param) 1903 { 1904 struct local_server_params * lsp = param; 1905 WCHAR pipefn[100]; 1906 HRESULT hres; 1907 IStream *pStm = lsp->stream; 1908 STATSTG ststg; 1909 unsigned char *buffer; 1910 int buflen; 1911 LARGE_INTEGER seekto; 1912 ULARGE_INTEGER newpos; 1913 ULONG res; 1914 BOOL multi_use = lsp->multi_use; 1915 OVERLAPPED ovl; 1916 HANDLE pipe_event, hPipe = lsp->pipe, new_pipe; 1917 DWORD bytes; 1918 1919 TRACE("Starting threader for %s.\n",debugstr_guid(&lsp->clsid)); 1920 1921 memset(&ovl, 0, sizeof(ovl)); 1922 get_localserver_pipe_name(pipefn, &lsp->clsid); 1923 ovl.hEvent = pipe_event = CreateEventW(NULL, FALSE, FALSE, NULL); 1924 1925 while (1) { 1926 if (!ConnectNamedPipe(hPipe, &ovl)) 1927 { 1928 DWORD error = GetLastError(); 1929 if (error == ERROR_IO_PENDING) 1930 { 1931 HANDLE handles[2] = { pipe_event, lsp->stop_event }; 1932 DWORD ret; 1933 ret = WaitForMultipleObjects(2, handles, FALSE, INFINITE); 1934 if (ret != WAIT_OBJECT_0) 1935 break; 1936 } 1937 /* client already connected isn't an error */ 1938 else if (error != ERROR_PIPE_CONNECTED) 1939 { 1940 ERR("ConnectNamedPipe failed with error %d\n", GetLastError()); 1941 break; 1942 } 1943 } 1944 1945 TRACE("marshalling LocalServer to client\n"); 1946 1947 hres = IStream_Stat(pStm,&ststg,STATFLAG_NONAME); 1948 if (hres != S_OK) 1949 break; 1950 1951 seekto.u.LowPart = 0; 1952 seekto.u.HighPart = 0; 1953 hres = IStream_Seek(pStm,seekto,STREAM_SEEK_SET,&newpos); 1954 if (hres != S_OK) { 1955 FIXME("IStream_Seek failed, %x\n",hres); 1956 break; 1957 } 1958 1959 buflen = ststg.cbSize.u.LowPart; 1960 buffer = HeapAlloc(GetProcessHeap(),0,buflen); 1961 1962 hres = IStream_Read(pStm,buffer,buflen,&res); 1963 if (hres != S_OK) { 1964 FIXME("Stream Read failed, %x\n",hres); 1965 HeapFree(GetProcessHeap(),0,buffer); 1966 break; 1967 } 1968 1969 WriteFile(hPipe,buffer,buflen,&res,&ovl); 1970 GetOverlappedResult(hPipe, &ovl, &bytes, TRUE); 1971 HeapFree(GetProcessHeap(),0,buffer); 1972 1973 FlushFileBuffers(hPipe); 1974 DisconnectNamedPipe(hPipe); 1975 TRACE("done marshalling LocalServer\n"); 1976 1977 if (!multi_use) 1978 { 1979 TRACE("single use object, shutting down pipe %s\n", debugstr_w(pipefn)); 1980 break; 1981 } 1982 new_pipe = CreateNamedPipeW( pipefn, PIPE_ACCESS_DUPLEX | FILE_FLAG_OVERLAPPED, 1983 PIPE_TYPE_BYTE|PIPE_WAIT, PIPE_UNLIMITED_INSTANCES, 1984 4096, 4096, 500 /* 0.5 second timeout */, NULL ); 1985 if (new_pipe == INVALID_HANDLE_VALUE) 1986 { 1987 FIXME("pipe creation failed for %s, le is %u\n", debugstr_w(pipefn), GetLastError()); 1988 break; 1989 } 1990 CloseHandle(hPipe); 1991 hPipe = new_pipe; 1992 } 1993 1994 CloseHandle(pipe_event); 1995 CloseHandle(hPipe); 1996 return 0; 1997 } 1998 1999 /* starts listening for a local server */ 2000 HRESULT RPC_StartLocalServer(REFCLSID clsid, IStream *stream, BOOL multi_use, void **registration) 2001 { 2002 DWORD tid, err; 2003 struct local_server_params *lsp; 2004 WCHAR pipefn[100]; 2005 2006 lsp = HeapAlloc(GetProcessHeap(), 0, sizeof(*lsp)); 2007 if (!lsp) 2008 return E_OUTOFMEMORY; 2009 2010 lsp->clsid = *clsid; 2011 lsp->stream = stream; 2012 IStream_AddRef(stream); 2013 lsp->stop_event = CreateEventW(NULL, FALSE, FALSE, NULL); 2014 if (!lsp->stop_event) 2015 { 2016 HeapFree(GetProcessHeap(), 0, lsp); 2017 return HRESULT_FROM_WIN32(GetLastError()); 2018 } 2019 lsp->multi_use = multi_use; 2020 2021 get_localserver_pipe_name(pipefn, &lsp->clsid); 2022 lsp->pipe = CreateNamedPipeW(pipefn, PIPE_ACCESS_DUPLEX | FILE_FLAG_OVERLAPPED, 2023 PIPE_TYPE_BYTE|PIPE_WAIT, PIPE_UNLIMITED_INSTANCES, 2024 4096, 4096, 500 /* 0.5 second timeout */, NULL); 2025 if (lsp->pipe == INVALID_HANDLE_VALUE) 2026 { 2027 err = GetLastError(); 2028 FIXME("pipe creation failed for %s, le is %u\n", debugstr_w(pipefn), GetLastError()); 2029 CloseHandle(lsp->stop_event); 2030 HeapFree(GetProcessHeap(), 0, lsp); 2031 return HRESULT_FROM_WIN32(err); 2032 } 2033 2034 lsp->thread = CreateThread(NULL, 0, local_server_thread, lsp, 0, &tid); 2035 if (!lsp->thread) 2036 { 2037 CloseHandle(lsp->pipe); 2038 CloseHandle(lsp->stop_event); 2039 HeapFree(GetProcessHeap(), 0, lsp); 2040 return HRESULT_FROM_WIN32(GetLastError()); 2041 } 2042 2043 *registration = lsp; 2044 return S_OK; 2045 } 2046 2047 /* stops listening for a local server */ 2048 void RPC_StopLocalServer(void *registration) 2049 { 2050 struct local_server_params *lsp = registration; 2051 2052 /* signal local_server_thread to stop */ 2053 SetEvent(lsp->stop_event); 2054 /* wait for it to exit */ 2055 WaitForSingleObject(lsp->thread, INFINITE); 2056 2057 IStream_Release(lsp->stream); 2058 CloseHandle(lsp->stop_event); 2059 CloseHandle(lsp->thread); 2060 HeapFree(GetProcessHeap(), 0, lsp); 2061 } 2062