// Copyright (c) 2012 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "base/win/win_util.h" #include #include #include #include #include // Must be before propkey. #include #include #include #include #include #include #include #include #include #include #include #include #include // Must be before tpcshrd.h or for any use of _T macro #include #include #include #include #include #include #include #include "base/base_switches.h" #include "base/command_line.h" #include "base/files/file_path.h" #include "base/logging.h" #include "base/macros.h" #include "base/scoped_native_library.h" #include "base/strings/string_util.h" #include "base/strings/stringprintf.h" #include "base/strings/utf_string_conversions.h" #include "base/threading/thread_restrictions.h" #include "base/win/core_winrt_util.h" #include "base/win/propvarutil.h" #include "base/win/registry.h" #include "base/win/scoped_co_mem.h" #include "base/win/scoped_handle.h" #include "base/win/scoped_hstring.h" #include "base/win/scoped_propvariant.h" #include "base/win/shlwapi.h" #include "base/win/win_client_metrics.h" #include "base/win/windows_version.h" namespace base { namespace win { namespace { // Sets the value of |property_key| to |property_value| in |property_store|. bool SetPropVariantValueForPropertyStore( IPropertyStore* property_store, const PROPERTYKEY& property_key, const ScopedPropVariant& property_value) { DCHECK(property_store); HRESULT result = property_store->SetValue(property_key, property_value.get()); if (result == S_OK) result = property_store->Commit(); if (SUCCEEDED(result)) return true; #if DCHECK_IS_ON() ScopedCoMem guidString; ::StringFromCLSID(property_key.fmtid, &guidString); if (HRESULT_FACILITY(result) == FACILITY_WIN32) ::SetLastError(HRESULT_CODE(result)); // See third_party/perl/c/i686-w64-mingw32/include/propkey.h for GUID and // PID definitions. DPLOG(ERROR) << "Failed to set property with GUID " << guidString << " PID " << property_key.pid; #endif return false; } void __cdecl ForceCrashOnSigAbort(int) { *((volatile int*)0) = 0x1337; } // Returns the current platform role. We use the PowerDeterminePlatformRoleEx // API for that. POWER_PLATFORM_ROLE GetPlatformRole() { return PowerDeterminePlatformRoleEx(POWER_PLATFORM_ROLE_V2); } // Method used for Windows 8.1 and later. // Since we support versions earlier than 8.1, we must dynamically load this // function from user32.dll, so it won't fail to load in runtime. For earlier // Windows versions GetProcAddress will return null and report failure so that // callers can fall back on the deprecated SetProcessDPIAware. bool SetProcessDpiAwarenessWrapper(PROCESS_DPI_AWARENESS value) { decltype(&::SetProcessDpiAwareness) set_process_dpi_awareness_func = reinterpret_cast(GetProcAddress( GetModuleHandle(L"user32.dll"), "SetProcessDpiAwarenessInternal")); if (set_process_dpi_awareness_func) { HRESULT hr = set_process_dpi_awareness_func(value); if (SUCCEEDED(hr)) return true; DLOG_IF(ERROR, hr == E_ACCESSDENIED) << "Access denied error from SetProcessDpiAwarenessInternal. Function " "called twice, or manifest was used."; NOTREACHED() << "SetProcessDpiAwarenessInternal failed with unexpected error: " << hr; return false; } DCHECK_LT(GetVersion(), VERSION_WIN8_1) << "SetProcessDpiAwarenessInternal " "should be available on all " "platforms >= Windows 8.1"; return false; } } // namespace // Uses the Windows 10 WRL API's to query the current system state. The API's // we are using in the function below are supported in Win32 apps as per msdn. // It looks like the API implementation is buggy at least on Surface 4 causing // it to always return UserInteractionMode_Touch which as per documentation // indicates tablet mode. bool IsWindows10TabletMode(HWND hwnd) { if (GetVersion() < VERSION_WIN10) return false; if (!ResolveCoreWinRTDelayload() || !ScopedHString::ResolveCoreWinRTStringDelayload()) { return false; } ScopedHString view_settings_guid = ScopedHString::Create( RuntimeClass_Windows_UI_ViewManagement_UIViewSettings); Microsoft::WRL::ComPtr view_settings_interop; HRESULT hr = base::win::RoGetActivationFactory( view_settings_guid.get(), IID_PPV_ARGS(&view_settings_interop)); if (FAILED(hr)) return false; Microsoft::WRL::ComPtr view_settings; hr = view_settings_interop->GetForWindow(hwnd, IID_PPV_ARGS(&view_settings)); if (FAILED(hr)) return false; ABI::Windows::UI::ViewManagement::UserInteractionMode mode = ABI::Windows::UI::ViewManagement::UserInteractionMode_Mouse; view_settings->get_UserInteractionMode(&mode); return mode == ABI::Windows::UI::ViewManagement::UserInteractionMode_Touch; } // Returns true if a physical keyboard is detected on Windows 8 and up. // Uses the Setup APIs to enumerate the attached keyboards and returns true // if the keyboard count is 1 or more.. While this will work in most cases // it won't work if there are devices which expose keyboard interfaces which // are attached to the machine. bool IsKeyboardPresentOnSlate(std::string* reason, HWND hwnd) { bool result = false; if (GetVersion() < VERSION_WIN8) { if (reason) *reason = "Detection not supported"; return false; } // This function is only supported for Windows 8 and up. if (CommandLine::ForCurrentProcess()->HasSwitch( switches::kDisableUsbKeyboardDetect)) { if (reason) *reason = "Detection disabled"; return false; } // This function should be only invoked for machines with touch screens. if ((GetSystemMetrics(SM_DIGITIZER) & NID_INTEGRATED_TOUCH) != NID_INTEGRATED_TOUCH) { if (reason) { *reason += "NID_INTEGRATED_TOUCH\n"; result = true; } else { return true; } } // If it is a tablet device we assume that there is no keyboard attached. if (IsTabletDevice(reason, hwnd)) { if (reason) *reason += "Tablet device.\n"; return false; } else { if (reason) { *reason += "Not a tablet device"; result = true; } else { return true; } } // To determine whether a keyboard is present on the device, we do the // following:- // 1. Check whether the device supports auto rotation. If it does then // it possibly supports flipping from laptop to slate mode. If it // does not support auto rotation, then we assume it is a desktop // or a normal laptop and assume that there is a keyboard. // 2. If the device supports auto rotation, then we get its platform role // and check the system metric SM_CONVERTIBLESLATEMODE to see if it is // being used in slate mode. If yes then we return false here to ensure // that the OSK is displayed. // 3. If step 1 and 2 fail then we check attached keyboards and return true // if we find ACPI\* or HID\VID* keyboards. typedef BOOL (WINAPI* GetAutoRotationState)(PAR_STATE state); GetAutoRotationState get_rotation_state = reinterpret_cast(::GetProcAddress( GetModuleHandle(L"user32.dll"), "GetAutoRotationState")); if (get_rotation_state) { AR_STATE auto_rotation_state = AR_ENABLED; get_rotation_state(&auto_rotation_state); if ((auto_rotation_state & AR_NOSENSOR) || (auto_rotation_state & AR_NOT_SUPPORTED)) { // If there is no auto rotation sensor or rotation is not supported in // the current configuration, then we can assume that this is a desktop // or a traditional laptop. if (reason) { *reason += (auto_rotation_state & AR_NOSENSOR) ? "AR_NOSENSOR\n" : "AR_NOT_SUPPORTED\n"; result = true; } else { return true; } } } const GUID KEYBOARD_CLASS_GUID = { 0x4D36E96B, 0xE325, 0x11CE, { 0xBF, 0xC1, 0x08, 0x00, 0x2B, 0xE1, 0x03, 0x18 } }; // Query for all the keyboard devices. HDEVINFO device_info = SetupDiGetClassDevs(&KEYBOARD_CLASS_GUID, NULL, NULL, DIGCF_PRESENT); if (device_info == INVALID_HANDLE_VALUE) { if (reason) *reason += "No keyboard info\n"; return result; } // Enumerate all keyboards and look for ACPI\PNP and HID\VID devices. If // the count is more than 1 we assume that a keyboard is present. This is // under the assumption that there will always be one keyboard device. for (DWORD i = 0;; ++i) { SP_DEVINFO_DATA device_info_data = { 0 }; device_info_data.cbSize = sizeof(device_info_data); if (!SetupDiEnumDeviceInfo(device_info, i, &device_info_data)) break; // Get the device ID. wchar_t device_id[MAX_DEVICE_ID_LEN]; CONFIGRET status = CM_Get_Device_ID(device_info_data.DevInst, device_id, MAX_DEVICE_ID_LEN, 0); if (status == CR_SUCCESS) { // To reduce the scope of the hack we only look for ACPI and HID\\VID // prefixes in the keyboard device ids. if (StartsWith(device_id, L"ACPI", CompareCase::INSENSITIVE_ASCII) || StartsWith(device_id, L"HID\\VID", CompareCase::INSENSITIVE_ASCII)) { if (reason) { *reason += "device: "; *reason += WideToUTF8(device_id); *reason += '\n'; } // The heuristic we are using is to check the count of keyboards and // return true if the API's report one or more keyboards. Please note // that this will break for non keyboard devices which expose a // keyboard PDO. result = true; } } } return result; } static bool g_crash_on_process_detach = false; void GetNonClientMetrics(NONCLIENTMETRICS_XP* metrics) { DCHECK(metrics); metrics->cbSize = sizeof(*metrics); const bool success = !!SystemParametersInfo( SPI_GETNONCLIENTMETRICS, metrics->cbSize, reinterpret_cast(metrics), 0); DCHECK(success); } bool GetUserSidString(std::wstring* user_sid) { // Get the current token. HANDLE token = NULL; if (!::OpenProcessToken(::GetCurrentProcess(), TOKEN_QUERY, &token)) return false; ScopedHandle token_scoped(token); DWORD size = sizeof(TOKEN_USER) + SECURITY_MAX_SID_SIZE; std::unique_ptr user_bytes(new BYTE[size]); TOKEN_USER* user = reinterpret_cast(user_bytes.get()); if (!::GetTokenInformation(token, TokenUser, user, size, &size)) return false; if (!user->User.Sid) return false; // Convert the data to a string. wchar_t* sid_string; if (!::ConvertSidToStringSid(user->User.Sid, &sid_string)) return false; *user_sid = sid_string; ::LocalFree(sid_string); return true; } bool UserAccountControlIsEnabled() { // This can be slow if Windows ends up going to disk. Should watch this key // for changes and only read it once, preferably on the file thread. // http://code.google.com/p/chromium/issues/detail?id=61644 ThreadRestrictions::ScopedAllowIO allow_io; RegKey key(HKEY_LOCAL_MACHINE, L"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\System", KEY_READ); DWORD uac_enabled; if (key.ReadValueDW(L"EnableLUA", &uac_enabled) != ERROR_SUCCESS) return true; // Users can set the EnableLUA value to something arbitrary, like 2, which // Vista will treat as UAC enabled, so we make sure it is not set to 0. return (uac_enabled != 0); } bool SetBooleanValueForPropertyStore(IPropertyStore* property_store, const PROPERTYKEY& property_key, bool property_bool_value) { ScopedPropVariant property_value; if (FAILED(InitPropVariantFromBoolean(property_bool_value, property_value.Receive()))) { return false; } return SetPropVariantValueForPropertyStore(property_store, property_key, property_value); } bool SetStringValueForPropertyStore(IPropertyStore* property_store, const PROPERTYKEY& property_key, const wchar_t* property_string_value) { ScopedPropVariant property_value; if (FAILED(InitPropVariantFromString(property_string_value, property_value.Receive()))) { return false; } return SetPropVariantValueForPropertyStore(property_store, property_key, property_value); } bool SetClsidForPropertyStore(IPropertyStore* property_store, const PROPERTYKEY& property_key, const CLSID& property_clsid_value) { ScopedPropVariant property_value; if (FAILED(InitPropVariantFromCLSID(property_clsid_value, property_value.Receive()))) { return false; } return SetPropVariantValueForPropertyStore(property_store, property_key, property_value); } bool SetAppIdForPropertyStore(IPropertyStore* property_store, const wchar_t* app_id) { // App id should be less than 64 chars and contain no space. And recommended // format is CompanyName.ProductName[.SubProduct.ProductNumber]. // See http://msdn.microsoft.com/en-us/library/dd378459%28VS.85%29.aspx DCHECK(lstrlen(app_id) < 64 && wcschr(app_id, L' ') == NULL); return SetStringValueForPropertyStore(property_store, PKEY_AppUserModel_ID, app_id); } static const char16 kAutoRunKeyPath[] = L"Software\\Microsoft\\Windows\\CurrentVersion\\Run"; bool AddCommandToAutoRun(HKEY root_key, const string16& name, const string16& command) { RegKey autorun_key(root_key, kAutoRunKeyPath, KEY_SET_VALUE); return (autorun_key.WriteValue(name.c_str(), command.c_str()) == ERROR_SUCCESS); } bool RemoveCommandFromAutoRun(HKEY root_key, const string16& name) { RegKey autorun_key(root_key, kAutoRunKeyPath, KEY_SET_VALUE); return (autorun_key.DeleteValue(name.c_str()) == ERROR_SUCCESS); } bool ReadCommandFromAutoRun(HKEY root_key, const string16& name, string16* command) { RegKey autorun_key(root_key, kAutoRunKeyPath, KEY_QUERY_VALUE); return (autorun_key.ReadValue(name.c_str(), command) == ERROR_SUCCESS); } void SetShouldCrashOnProcessDetach(bool crash) { g_crash_on_process_detach = crash; } bool ShouldCrashOnProcessDetach() { return g_crash_on_process_detach; } void SetAbortBehaviorForCrashReporting() { // Prevent CRT's abort code from prompting a dialog or trying to "report" it. // Disabling the _CALL_REPORTFAULT behavior is important since otherwise it // has the sideffect of clearing our exception filter, which means we // don't get any crash. _set_abort_behavior(0, _WRITE_ABORT_MSG | _CALL_REPORTFAULT); // Set a SIGABRT handler for good measure. We will crash even if the default // is left in place, however this allows us to crash earlier. And it also // lets us crash in response to code which might directly call raise(SIGABRT) signal(SIGABRT, ForceCrashOnSigAbort); } bool IsTabletDevice(std::string* reason, HWND hwnd) { if (GetVersion() < VERSION_WIN8) { if (reason) *reason = "Tablet device detection not supported below Windows 8\n"; return false; } if (IsWindows10TabletMode(hwnd)) return true; return IsDeviceUsedAsATablet(reason); } // This method is used to set the right interactions media queries, // see https://drafts.csswg.org/mediaqueries-4/#mf-interaction. It doesn't // check the Windows 10 tablet mode because it doesn't reflect the actual // input configuration of the device and can be manually triggered by the user // independently from the hardware state. bool IsDeviceUsedAsATablet(std::string* reason) { if (GetVersion() < VERSION_WIN8) { if (reason) *reason = "Tablet device detection not supported below Windows 8\n"; return false; } if (GetSystemMetrics(SM_MAXIMUMTOUCHES) == 0) { if (reason) { *reason += "Device does not support touch.\n"; } else { return false; } } // If the device is docked, the user is treating the device as a PC. if (GetSystemMetrics(SM_SYSTEMDOCKED) != 0) { if (reason) { *reason += "SM_SYSTEMDOCKED\n"; } else { return false; } } // If the device is not supporting rotation, it's unlikely to be a tablet, // a convertible or a detachable. // See // https://msdn.microsoft.com/en-us/library/windows/desktop/dn629263(v=vs.85).aspx typedef decltype(GetAutoRotationState)* GetAutoRotationStateType; GetAutoRotationStateType get_auto_rotation_state_func = reinterpret_cast(GetProcAddress( GetModuleHandle(L"user32.dll"), "GetAutoRotationState")); if (get_auto_rotation_state_func) { AR_STATE rotation_state = AR_ENABLED; if (get_auto_rotation_state_func(&rotation_state) && (rotation_state & (AR_NOT_SUPPORTED | AR_LAPTOP | AR_NOSENSOR)) != 0) return false; } // PlatformRoleSlate was added in Windows 8+. POWER_PLATFORM_ROLE role = GetPlatformRole(); bool is_tablet = false; if (role == PlatformRoleMobile || role == PlatformRoleSlate) { is_tablet = !GetSystemMetrics(SM_CONVERTIBLESLATEMODE); if (!is_tablet) { if (reason) { *reason += "Not in slate mode.\n"; } else { return false; } } else { if (reason) { *reason += (role == PlatformRoleMobile) ? "PlatformRoleMobile\n" : "PlatformRoleSlate\n"; } } } else { if (reason) *reason += "Device role is not mobile or slate.\n"; } return is_tablet; } enum DomainEnrollmentState {UNKNOWN = -1, NOT_ENROLLED, ENROLLED}; static volatile long int g_domain_state = UNKNOWN; bool IsEnrolledToDomain() { // Doesn't make any sense to retry inside a user session because joining a // domain will only kick in on a restart. if (g_domain_state == UNKNOWN) { ::InterlockedCompareExchange(&g_domain_state, IsOS(OS_DOMAINMEMBER) ? ENROLLED : NOT_ENROLLED, UNKNOWN); } return g_domain_state == ENROLLED; } bool IsDeviceRegisteredWithManagement() { static bool is_device_registered_with_management = []() { ScopedNativeLibrary library( FilePath(FILE_PATH_LITERAL("MDMRegistration.dll"))); if (!library.is_valid()) return false; using IsDeviceRegisteredWithManagementFunction = decltype(&::IsDeviceRegisteredWithManagement); IsDeviceRegisteredWithManagementFunction is_device_registered_with_management_function = reinterpret_cast( library.GetFunctionPointer("IsDeviceRegisteredWithManagement")); if (!is_device_registered_with_management_function) return false; BOOL is_managed = false; HRESULT hr = is_device_registered_with_management_function(&is_managed, 0, nullptr); return SUCCEEDED(hr) && is_managed; }(); return is_device_registered_with_management; } bool IsEnterpriseManaged() { // TODO(rogerta): this function should really be: // // return IsEnrolledToDomain() || IsDeviceRegisteredWithManagement(); // // However, for now it is decided to collect some UMA metrics about // IsDeviceRegisteredWithMdm() before changing chrome's behavior. return IsEnrolledToDomain(); } void SetDomainStateForTesting(bool state) { g_domain_state = state ? ENROLLED : NOT_ENROLLED; } bool IsUser32AndGdi32Available() { static auto is_user32_and_gdi32_available = []() { // If win32k syscalls aren't disabled, then user32 and gdi32 are available. // Can't disable win32k prior to windows 8. if (GetVersion() < VERSION_WIN8) return true; typedef decltype( GetProcessMitigationPolicy)* GetProcessMitigationPolicyType; GetProcessMitigationPolicyType get_process_mitigation_policy_func = reinterpret_cast(GetProcAddress( GetModuleHandle(L"kernel32.dll"), "GetProcessMitigationPolicy")); if (!get_process_mitigation_policy_func) return true; PROCESS_MITIGATION_SYSTEM_CALL_DISABLE_POLICY policy = {}; if (get_process_mitigation_policy_func(GetCurrentProcess(), ProcessSystemCallDisablePolicy, &policy, sizeof(policy))) { return policy.DisallowWin32kSystemCalls == 0; } return true; }(); return is_user32_and_gdi32_available; } bool GetLoadedModulesSnapshot(HANDLE process, std::vector* snapshot) { DCHECK(snapshot); DCHECK_EQ(0u, snapshot->size()); snapshot->resize(128); // We will retry at least once after first determining |bytes_required|. If // the list of modules changes after we receive |bytes_required| we may retry // more than once. int retries_remaining = 5; do { DWORD bytes_required = 0; // EnumProcessModules returns 'success' even if the buffer size is too // small. DCHECK_GE(std::numeric_limits::max(), snapshot->size() * sizeof(HMODULE)); if (!::EnumProcessModules( process, &(*snapshot)[0], static_cast(snapshot->size() * sizeof(HMODULE)), &bytes_required)) { DPLOG(ERROR) << "::EnumProcessModules failed."; return false; } DCHECK_EQ(0u, bytes_required % sizeof(HMODULE)); size_t num_modules = bytes_required / sizeof(HMODULE); if (num_modules <= snapshot->size()) { // Buffer size was too big, presumably because a module was unloaded. snapshot->erase(snapshot->begin() + num_modules, snapshot->end()); return true; } else if (num_modules == 0) { DLOG(ERROR) << "Can't determine the module list size."; return false; } else { // Buffer size was too small. Try again with a larger buffer. A little // more room is given to avoid multiple expensive calls to // ::EnumProcessModules() just because one module has been added. snapshot->resize(num_modules + 8, NULL); } } while (--retries_remaining); DLOG(ERROR) << "Failed to enumerate modules."; return false; } void EnableFlicks(HWND hwnd) { ::RemoveProp(hwnd, MICROSOFT_TABLETPENSERVICE_PROPERTY); } void DisableFlicks(HWND hwnd) { ::SetProp(hwnd, MICROSOFT_TABLETPENSERVICE_PROPERTY, reinterpret_cast(TABLET_DISABLE_FLICKS | TABLET_DISABLE_FLICKFALLBACKKEYS)); } bool IsProcessPerMonitorDpiAware() { enum class PerMonitorDpiAware { UNKNOWN = 0, PER_MONITOR_DPI_UNAWARE, PER_MONITOR_DPI_AWARE, }; static PerMonitorDpiAware per_monitor_dpi_aware = PerMonitorDpiAware::UNKNOWN; if (per_monitor_dpi_aware == PerMonitorDpiAware::UNKNOWN) { per_monitor_dpi_aware = PerMonitorDpiAware::PER_MONITOR_DPI_UNAWARE; HMODULE shcore_dll = ::LoadLibrary(L"shcore.dll"); if (shcore_dll) { auto get_process_dpi_awareness_func = reinterpret_cast( ::GetProcAddress(shcore_dll, "GetProcessDpiAwareness")); if (get_process_dpi_awareness_func) { PROCESS_DPI_AWARENESS awareness; if (SUCCEEDED(get_process_dpi_awareness_func(nullptr, &awareness)) && awareness == PROCESS_PER_MONITOR_DPI_AWARE) per_monitor_dpi_aware = PerMonitorDpiAware::PER_MONITOR_DPI_AWARE; } } } return per_monitor_dpi_aware == PerMonitorDpiAware::PER_MONITOR_DPI_AWARE; } void EnableHighDPISupport() { // Enable per-monitor DPI for Win10 or above instead of Win8.1 since Win8.1 // does not have EnableChildWindowDpiMessage, necessary for correct non-client // area scaling across monitors. PROCESS_DPI_AWARENESS process_dpi_awareness = GetVersion() >= VERSION_WIN10 ? PROCESS_PER_MONITOR_DPI_AWARE : PROCESS_SYSTEM_DPI_AWARE; if (!SetProcessDpiAwarenessWrapper(process_dpi_awareness)) { // For windows versions where SetProcessDpiAwareness is not available or // failed, try its predecessor. BOOL result = ::SetProcessDPIAware(); DCHECK(result) << "SetProcessDPIAware failed."; } } } // namespace win } // namespace base