3 #include <wine/debug.h>
4 WINE_DEFAULT_DEBUG_CHANNEL(user32
);
6 #define KEY_LENGTH 1024
8 static ULONG User32TlsIndex
;
9 HINSTANCE User32Instance
;
11 PPROCESSINFO g_ppi
= NULL
;
12 PUSER_HANDLE_TABLE gHandleTable
= NULL
;
13 PUSER_HANDLE_ENTRY gHandleEntries
= NULL
;
14 PSERVERINFO gpsi
= NULL
;
15 ULONG_PTR g_ulSharedDelta
;
16 BOOL gfServerProcess
= FALSE
;
18 WCHAR szAppInit
[KEY_LENGTH
];
24 OBJECT_ATTRIBUTES Attributes
;
29 PKEY_VALUE_PARTIAL_INFORMATION kvpInfo
= NULL
;
31 UNICODE_STRING szKeyName
= RTL_CONSTANT_STRING(L
"\\Registry\\Machine\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Windows");
32 UNICODE_STRING szLoadName
= RTL_CONSTANT_STRING(L
"LoadAppInit_DLLs");
33 UNICODE_STRING szDllsName
= RTL_CONSTANT_STRING(L
"AppInit_DLLs");
35 InitializeObjectAttributes(&Attributes
, &szKeyName
, OBJ_CASE_INSENSITIVE
, NULL
, NULL
);
36 Status
= NtOpenKey(&hKey
, KEY_READ
, &Attributes
);
37 if (NT_SUCCESS(Status
))
39 dwSize
= sizeof(KEY_VALUE_PARTIAL_INFORMATION
) + sizeof(DWORD
);
40 kvpInfo
= HeapAlloc(GetProcessHeap(), 0, dwSize
);
44 Status
= NtQueryValueKey(hKey
,
46 KeyValuePartialInformation
,
50 if (!NT_SUCCESS(Status
))
57 HeapFree(GetProcessHeap(), 0, kvpInfo
);
62 Status
= NtQueryValueKey(hKey
,
64 KeyValuePartialInformation
,
68 if (Status
!= STATUS_BUFFER_TOO_SMALL
)
71 kvpInfo
= HeapAlloc(GetProcessHeap(), 0, dwSize
);
75 Status
= NtQueryValueKey(hKey
,
77 KeyValuePartialInformation
,
81 if (NT_SUCCESS(Status
))
83 LPWSTR lpBuffer
= (LPWSTR
)kvpInfo
->Data
;
84 if (*lpBuffer
!= UNICODE_NULL
)
86 INT bytesToCopy
, nullPos
;
88 bytesToCopy
= min(kvpInfo
->DataLength
, KEY_LENGTH
* sizeof(WCHAR
));
92 RtlMoveMemory(szAppInit
,
96 nullPos
= (bytesToCopy
/ sizeof(WCHAR
)) - 1;
98 /* ensure string is terminated */
99 szAppInit
[nullPos
] = UNICODE_NULL
;
113 HeapFree(GetProcessHeap(), 0, kvpInfo
);
122 szAppInit
[0] = UNICODE_NULL
;
126 WCHAR buffer
[KEY_LENGTH
];
130 RtlCopyMemory(buffer
, szAppInit
, KEY_LENGTH
);
132 for (i
= 0; i
< KEY_LENGTH
; ++ i
)
134 if(buffer
[i
] == L
' ' || buffer
[i
] == L
',')
138 for (i
= 0; i
< KEY_LENGTH
; )
155 if (szAppInit
[0] != UNICODE_NULL
)
157 WCHAR buffer
[KEY_LENGTH
];
162 RtlCopyMemory(buffer
, szAppInit
, KEY_LENGTH
);
164 for (i
= 0; i
< KEY_LENGTH
; ++ i
)
166 if(buffer
[i
] == L
' ' || buffer
[i
] == L
',')
170 for (i
= 0; i
< KEY_LENGTH
; )
178 hModule
= GetModuleHandleW(ptr
);
179 FreeLibrary(hModule
);
200 PVOID
*KernelCallbackTable
;
202 /* Set up the kernel callbacks. */
203 KernelCallbackTable
= NtCurrentPeb()->KernelCallbackTable
;
204 KernelCallbackTable
[USER32_CALLBACK_WINDOWPROC
] =
205 (PVOID
)User32CallWindowProcFromKernel
;
206 KernelCallbackTable
[USER32_CALLBACK_SENDASYNCPROC
] =
207 (PVOID
)User32CallSendAsyncProcForKernel
;
208 KernelCallbackTable
[USER32_CALLBACK_LOADSYSMENUTEMPLATE
] =
209 (PVOID
)User32LoadSysMenuTemplateForKernel
;
210 KernelCallbackTable
[USER32_CALLBACK_LOADDEFAULTCURSORS
] =
211 (PVOID
)User32SetupDefaultCursors
;
212 KernelCallbackTable
[USER32_CALLBACK_HOOKPROC
] =
213 (PVOID
)User32CallHookProcFromKernel
;
214 KernelCallbackTable
[USER32_CALLBACK_EVENTPROC
] =
215 (PVOID
)User32CallEventProcFromKernel
;
216 KernelCallbackTable
[USER32_CALLBACK_LOADMENU
] =
217 (PVOID
)User32CallLoadMenuFromKernel
;
218 KernelCallbackTable
[USER32_CALLBACK_CLIENTTHREADSTARTUP
] =
219 (PVOID
)User32CallClientThreadSetupFromKernel
;
221 NtUserProcessConnect( NtCurrentProcess(),
223 sizeof(USERCONNECT
));
225 g_ppi
= GetWin32ClientInfo()->ppi
; // Snapshot PI, used as pointer only!
226 g_ulSharedDelta
= UserCon
.siClient
.ulSharedDelta
;
227 gpsi
= SharedPtrToUser(UserCon
.siClient
.psi
);
228 gHandleTable
= SharedPtrToUser(UserCon
.siClient
.aheList
);
229 gHandleEntries
= SharedPtrToUser(gHandleTable
->handles
);
231 RtlInitializeCriticalSection(&gcsUserApiHook
);
232 gfServerProcess
= TRUE
; // FIXME HAX! Used in CsrClientConnectToServer(,,,,&gfServerProcess);
234 //ERR("1 SI 0x%x : HT 0x%x : D 0x%x\n", UserCon.siClient.psi, UserCon.siClient.aheList, g_ulSharedDelta);
236 /* Allocate an index for user32 thread local data. */
237 User32TlsIndex
= TlsAlloc();
238 if (User32TlsIndex
!= TLS_OUT_OF_INDEXES
)
244 InitializeCriticalSection(&U32AccelCacheLock
);
245 GdiDllInitialize(NULL
, DLL_PROCESS_ATTACH
, NULL
);
253 TlsFree(User32TlsIndex
);
262 DeleteCriticalSection(&U32AccelCacheLock
);
265 DeleteFrameBrushes();
267 GdiDllInitialize(NULL
, DLL_PROCESS_DETACH
, NULL
);
268 TlsFree(User32TlsIndex
);
273 IN PVOID hInstanceDll
,
279 case DLL_PROCESS_ATTACH
:
280 User32Instance
= hInstanceDll
;
281 if (!RegisterClientPFN())
294 /* Initialize message spying */
295 if (!SPY_Init()) return FALSE
;
299 case DLL_THREAD_ATTACH
:
304 case DLL_THREAD_DETACH
:
308 case DLL_PROCESS_DETACH
:
309 if (hImmInstance
) FreeLibrary(hImmInstance
);
324 // ERR("GetConnected\n");
326 if ((PTHREADINFO
)NtCurrentTeb()->Win32ThreadInfo
== NULL
)
327 NtUserGetThreadState(THREADSTATE_GETTHREADINFO
);
329 if (gpsi
&& g_ppi
) return;
330 // FIXME HAX: Due to the "Dll Initialization Bug" we have to call this too.
331 GdiDllInitialize(NULL
, DLL_PROCESS_ATTACH
, NULL
);
333 NtUserProcessConnect( NtCurrentProcess(),
335 sizeof(USERCONNECT
));
337 g_ppi
= GetWin32ClientInfo()->ppi
;
338 g_ulSharedDelta
= UserCon
.siClient
.ulSharedDelta
;
339 gpsi
= SharedPtrToUser(UserCon
.siClient
.psi
);
340 gHandleTable
= SharedPtrToUser(UserCon
.siClient
.aheList
);
341 gHandleEntries
= SharedPtrToUser(gHandleTable
->handles
);
347 User32CallClientThreadSetupFromKernel(PVOID Arguments
, ULONG ArgumentLength
)
349 ERR("GetConnected\n");
350 return ZwCallbackReturn(NULL
, 0, STATUS_SUCCESS
);