2 * Copyright 2001 Ove Kåven, TransGaming Technologies
3 * Copyright 2002 Marcus Meissner
4 * Copyright 2005 Mike Hearn, Rob Shearman for CodeWeavers
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2.1 of the License, or (at your option) any later version.
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
30 #include "wine/debug.h"
31 #include "wine/exception.h"
33 #include "combase_private.h"
37 WINE_DEFAULT_DEBUG_CHANNEL(ole
);
39 static void __RPC_STUB
dispatch_rpc(RPC_MESSAGE
*msg
);
41 /* we only use one function to dispatch calls for all methods - we use the
42 * RPC_IF_OLE flag to tell the RPC runtime that this is the case */
43 static RPC_DISPATCH_FUNCTION rpc_dispatch_table
[1] = { dispatch_rpc
}; /* (RO) */
44 static RPC_DISPATCH_TABLE rpc_dispatch
= { 1, rpc_dispatch_table
}; /* (RO) */
46 static struct list registered_interfaces
= LIST_INIT(registered_interfaces
); /* (CS csRegIf) */
47 static CRITICAL_SECTION csRegIf
;
48 static CRITICAL_SECTION_DEBUG csRegIf_debug
=
51 { &csRegIf_debug
.ProcessLocksList
, &csRegIf_debug
.ProcessLocksList
},
52 0, 0, { (DWORD_PTR
)(__FILE__
": dcom registered server interfaces") }
54 static CRITICAL_SECTION csRegIf
= { &csRegIf_debug
, -1, 0, 0, 0, 0 };
56 static struct list channel_hooks
= LIST_INIT(channel_hooks
); /* (CS csChannelHook) */
57 static CRITICAL_SECTION csChannelHook
;
58 static CRITICAL_SECTION_DEBUG csChannelHook_debug
=
61 { &csChannelHook_debug
.ProcessLocksList
, &csChannelHook_debug
.ProcessLocksList
},
62 0, 0, { (DWORD_PTR
)(__FILE__
": channel hooks") }
64 static CRITICAL_SECTION csChannelHook
= { &csChannelHook_debug
, -1, 0, 0, 0, 0 };
66 static WCHAR rpctransportW
[] = L
"ncalrpc";
71 DWORD refs
; /* ref count */
72 RPC_SERVER_INTERFACE If
; /* interface registered with the RPC runtime */
75 /* get the pipe endpoint specified of the specified apartment */
76 static inline void get_rpc_endpoint(LPWSTR endpoint
, const OXID
*oxid
)
78 /* FIXME: should get endpoint from rpcss */
79 wsprintfW(endpoint
, L
"\\pipe\\OLE_%016I64x", *oxid
);
84 IRpcChannelBuffer IRpcChannelBuffer_iface
;
87 DWORD dest_context
; /* returned from GetDestCtx */
88 void *dest_context_data
; /* returned from GetDestCtx */
93 RpcChannelBuffer super
; /* superclass */
95 RPC_BINDING_HANDLE bind
; /* handle to the remote server */
96 OXID oxid
; /* apartment in which the channel is valid */
97 DWORD server_pid
; /* id of server process */
98 HANDLE event
; /* cached event handle */
99 IID iid
; /* IID of the proxy this belongs to */
100 } ClientRpcChannelBuffer
;
102 struct dispatch_params
104 RPCOLEMESSAGE
*msg
; /* message */
105 IRpcStubBuffer
*stub
; /* stub buffer, if applicable */
106 IRpcChannelBuffer
*chan
; /* server channel buffer, if applicable */
107 IID iid
; /* ID of interface being called */
108 IUnknown
*iface
; /* interface being called */
109 HANDLE handle
; /* handle that will become signaled when call finishes */
110 BOOL bypass_rpcrt
; /* bypass RPC runtime? */
111 RPC_STATUS status
; /* status (out) */
112 HRESULT hr
; /* hresult (out) */
117 RPC_BINDING_HANDLE binding_handle
;
118 ULONG prefix_data_len
;
119 SChannelHookCallInfo channel_hook_info
;
125 struct dispatch_params params
;
130 ULONG conformance
; /* NDR */
133 /* [size_is((size+7)&~7)] */ unsigned char data
[1];
140 unsigned char extent
[1];
141 } WIRE_ORPC_EXTENT_ARRAY
;
149 unsigned char extensions
[1];
155 unsigned char extensions
[1];
158 struct channel_hook_entry
165 struct channel_hook_buffer_data
168 ULONG extension_size
;
170 void * __RPC_USER
MIDL_user_allocate(SIZE_T size
)
175 void __RPC_USER
MIDL_user_free(void *p
)
180 static LONG WINAPI
rpc_filter(EXCEPTION_POINTERS
*eptr
)
182 return I_RpcExceptionFilter(eptr
->ExceptionRecord
->ExceptionCode
);
185 static BOOL
start_rpcss(void)
187 SERVICE_STATUS_PROCESS status
;
188 SC_HANDLE scm
, service
;
193 if (!(scm
= OpenSCManagerW(NULL
, NULL
, 0)))
195 ERR("Failed to open service manager\n");
199 if (!(service
= OpenServiceW(scm
, L
"RpcSs", SERVICE_START
| SERVICE_QUERY_STATUS
)))
201 ERR("Failed to open RpcSs service\n");
202 CloseServiceHandle( scm
);
206 if (StartServiceW(service
, 0, NULL
) || GetLastError() == ERROR_SERVICE_ALREADY_RUNNING
)
208 ULONGLONG start_time
= GetTickCount64();
213 if (!QueryServiceStatusEx(service
, SC_STATUS_PROCESS_INFO
, (BYTE
*)&status
, sizeof(status
), &dummy
))
215 if (status
.dwCurrentState
== SERVICE_RUNNING
)
220 if (GetTickCount64() - start_time
> 30000) break;
223 } while (status
.dwCurrentState
== SERVICE_START_PENDING
);
225 if (status
.dwCurrentState
!= SERVICE_RUNNING
)
226 WARN("RpcSs failed to start %lu\n", status
.dwCurrentState
);
229 ERR("Failed to start RpcSs service\n");
231 CloseServiceHandle(service
);
232 CloseServiceHandle(scm
);
236 static RPC_BINDING_HANDLE
get_rpc_handle(unsigned short *protseq
, unsigned short *endpoint
)
238 RPC_BINDING_HANDLE handle
= NULL
;
242 status
= RpcStringBindingComposeW(NULL
, protseq
, NULL
, endpoint
, NULL
, &binding
);
243 if (status
== RPC_S_OK
)
245 status
= RpcBindingFromStringBindingW(binding
, &handle
);
246 RpcStringFreeW(&binding
);
252 static RPC_BINDING_HANDLE
get_irpcss_handle(void)
254 static RPC_BINDING_HANDLE irpcss_handle
;
258 unsigned short protseq
[] = IRPCSS_PROTSEQ
;
259 unsigned short endpoint
[] = IRPCSS_ENDPOINT
;
261 RPC_BINDING_HANDLE new_handle
= get_rpc_handle(protseq
, endpoint
);
262 if (InterlockedCompareExchangePointer(&irpcss_handle
, new_handle
, NULL
))
263 /* another thread beat us to it */
264 RpcBindingFree(&new_handle
);
266 return irpcss_handle
;
269 static RPC_BINDING_HANDLE
get_irot_handle(void)
271 static RPC_BINDING_HANDLE irot_handle
;
275 unsigned short protseq
[] = IROT_PROTSEQ
;
276 unsigned short endpoint
[] = IROT_ENDPOINT
;
278 RPC_BINDING_HANDLE new_handle
= get_rpc_handle(protseq
, endpoint
);
279 if (InterlockedCompareExchangePointer(&irot_handle
, new_handle
, NULL
))
280 /* another thread beat us to it */
281 RpcBindingFree(&new_handle
);
286 #define RPCSS_CALL_START \
291 #define RPCSS_CALL_END \
292 } __EXCEPT(rpc_filter) { \
293 hr = HRESULT_FROM_WIN32(GetExceptionCode()); \
296 if (hr == HRESULT_FROM_WIN32(RPC_S_SERVER_UNAVAILABLE)) { \
304 HRESULT
rpcss_get_next_seqid(DWORD
*id
)
307 hr
= irpcss_get_thread_seq_id(get_irpcss_handle(), id
);
311 HRESULT WINAPI
InternalIrotRegister(const MonikerComparisonData
*moniker_data
,
312 const InterfaceData
*object
, const InterfaceData
*moniker
,
313 const FILETIME
*time
, DWORD flags
, IrotCookie
*cookie
, IrotContextHandle
*ctxt_handle
)
316 hr
= IrotRegister(get_irot_handle(), moniker_data
, object
, moniker
, time
, flags
, cookie
, ctxt_handle
);
320 HRESULT WINAPI
InternalIrotIsRunning(const MonikerComparisonData
*moniker_data
)
323 hr
= IrotIsRunning(get_irot_handle(), moniker_data
);
327 HRESULT WINAPI
InternalIrotGetObject(const MonikerComparisonData
*moniker_data
, PInterfaceData
*obj
,
331 hr
= IrotGetObject(get_irot_handle(), moniker_data
, obj
, cookie
);
335 HRESULT WINAPI
InternalIrotNoteChangeTime(IrotCookie cookie
, const FILETIME
*time
)
338 hr
= IrotNoteChangeTime(get_irot_handle(), cookie
, time
);
342 HRESULT WINAPI
InternalIrotGetTimeOfLastChange(const MonikerComparisonData
*moniker_data
, FILETIME
*time
)
345 hr
= IrotGetTimeOfLastChange(get_irot_handle(), moniker_data
, time
);
349 HRESULT WINAPI
InternalIrotEnumRunning(PInterfaceList
*list
)
352 hr
= IrotEnumRunning(get_irot_handle(), list
);
356 HRESULT WINAPI
InternalIrotRevoke(IrotCookie cookie
, IrotContextHandle
*ctxt_handle
, PInterfaceData
*object
,
357 PInterfaceData
*moniker
)
360 hr
= IrotRevoke(get_irot_handle(), cookie
, ctxt_handle
, object
, moniker
);
364 static HRESULT
rpcss_server_register(REFCLSID clsid
, DWORD flags
, MInterfacePointer
*obj
, unsigned int *cookie
)
367 hr
= irpcss_server_register(get_irpcss_handle(), clsid
, flags
, obj
, cookie
);
371 HRESULT
rpc_revoke_local_server(unsigned int cookie
)
374 hr
= irpcss_server_revoke(get_irpcss_handle(), cookie
);
378 static HRESULT
rpcss_get_class_object(REFCLSID rclsid
, PMInterfacePointer
*objref
)
381 hr
= irpcss_get_class_object(get_irpcss_handle(), rclsid
, objref
);
385 static DWORD
start_local_service(const WCHAR
*name
, DWORD num
, LPCWSTR
*params
)
387 SC_HANDLE handle
, hsvc
;
388 DWORD r
= ERROR_FUNCTION_FAILED
;
390 TRACE("Starting service %s %ld params\n", debugstr_w(name
), num
);
392 handle
= OpenSCManagerW(NULL
, NULL
, SC_MANAGER_CONNECT
);
395 hsvc
= OpenServiceW(handle
, name
, SERVICE_START
);
398 if(StartServiceW(hsvc
, num
, params
))
402 if (r
== ERROR_SERVICE_ALREADY_RUNNING
)
404 CloseServiceHandle(hsvc
);
408 CloseServiceHandle(handle
);
410 TRACE("StartService returned error %lu (%s)\n", r
, (r
== ERROR_SUCCESS
) ? "ok":"failed");
416 * create_local_service() - start a COM server in a service
418 * To start a Local Service, we read the AppID value under
419 * the class's CLSID key, then open the HKCR\\AppId key specified
420 * there and check for a LocalService value.
422 * Note: Local Services are not supported under Windows 9x
424 static HRESULT
create_local_service(REFCLSID rclsid
)
427 WCHAR buf
[CHARS_IN_GUID
];
432 TRACE("Attempting to start Local service for %s\n", debugstr_guid(rclsid
));
434 hr
= open_appidkey_from_clsid(rclsid
, KEY_READ
, &hkey
);
438 /* read the LocalService and ServiceParameters values from the AppID key */
440 r
= RegQueryValueExW(hkey
, L
"LocalService", NULL
, &type
, (LPBYTE
)buf
, &sz
);
441 if (r
== ERROR_SUCCESS
&& type
== REG_SZ
)
444 LPWSTR args
[1] = { NULL
};
447 * FIXME: I'm not really sure how to deal with the service parameters.
448 * I suspect that the string returned from RegQueryValueExW
449 * should be split into a number of arguments by spaces.
450 * It would make more sense if ServiceParams contained a
451 * REG_MULTI_SZ here, but it's a REG_SZ for the services
452 * that I'm interested in for the moment.
454 r
= RegQueryValueExW(hkey
, L
"ServiceParams", NULL
, &type
, NULL
, &sz
);
455 if (r
== ERROR_SUCCESS
&& type
== REG_SZ
&& sz
)
457 args
[0] = calloc(1, sz
);
459 RegQueryValueExW(hkey
, L
"ServiceParams", NULL
, &type
, (LPBYTE
)args
[0], &sz
);
461 r
= start_local_service(buf
, num_args
, (LPCWSTR
*)args
);
462 if (r
!= ERROR_SUCCESS
)
463 hr
= REGDB_E_CLASSNOTREG
; /* FIXME: check retval */
468 WARN("No LocalService value\n");
469 hr
= REGDB_E_CLASSNOTREG
; /* FIXME: check retval */
476 static HRESULT
create_server(REFCLSID rclsid
, HANDLE
*process
)
478 static const WCHAR embeddingW
[] = L
" -Embedding";
480 int arch
= (sizeof(void *) > sizeof(int)) ? 64 : 32;
481 REGSAM opposite
= (arch
== 64) ? KEY_WOW64_32KEY
: KEY_WOW64_64KEY
;
482 BOOL is_wow64
= FALSE
, is_opposite
= FALSE
;
484 WCHAR command
[MAX_PATH
+ ARRAY_SIZE(embeddingW
)];
485 DWORD size
= (MAX_PATH
+1) * sizeof(WCHAR
);
487 PROCESS_INFORMATION pinfo
;
490 TRACE("Attempting to start server for %s\n", debugstr_guid(rclsid
));
492 hr
= open_key_for_clsid(rclsid
, L
"LocalServer32", KEY_READ
, &key
);
493 if (FAILED(hr
) && (arch
== 64 || (IsWow64Process(GetCurrentProcess(), &is_wow64
) && is_wow64
)))
495 hr
= open_key_for_clsid(rclsid
, L
"LocalServer32", opposite
| KEY_READ
, &key
);
500 ERR("class %s not registered\n", debugstr_guid(rclsid
));
504 ret
= RegQueryValueExW(key
, NULL
, NULL
, NULL
, (LPBYTE
)command
, &size
);
508 WARN("No default value for LocalServer32 key\n");
509 return REGDB_E_CLASSNOTREG
; /* FIXME: check retval */
512 memset(&sinfo
, 0, sizeof(sinfo
));
513 sinfo
.cb
= sizeof(sinfo
);
515 /* EXE servers are started with the -Embedding switch. */
517 lstrcatW(command
, embeddingW
);
519 TRACE("activating local server %s for %s\n", debugstr_w(command
), debugstr_guid(rclsid
));
521 /* FIXME: Win2003 supports a ServerExecutable value that is passed into
526 Wow64DisableWow64FsRedirection(&cookie
);
527 if (!CreateProcessW(NULL
, command
, NULL
, NULL
, FALSE
, DETACHED_PROCESS
, NULL
, NULL
, &sinfo
, &pinfo
))
529 WARN("failed to run local server %s\n", debugstr_w(command
));
530 hr
= HRESULT_FROM_WIN32(GetLastError());
532 Wow64RevertWow64FsRedirection(cookie
);
533 if (FAILED(hr
)) return hr
;
535 else if (!CreateProcessW(NULL
, command
, NULL
, NULL
, FALSE
, DETACHED_PROCESS
, NULL
, NULL
, &sinfo
, &pinfo
))
537 WARN("failed to run local server %s\n", debugstr_w(command
));
538 return HRESULT_FROM_WIN32(GetLastError());
540 *process
= pinfo
.hProcess
;
541 CloseHandle(pinfo
.hThread
);
546 static HRESULT
create_surrogate_server(REFCLSID rclsid
, HANDLE
*process
)
548 static const WCHAR processidW
[] = L
" /PROCESSID:";
550 int arch
= (sizeof(void *) > sizeof(int)) ? 64 : 32;
551 REGSAM opposite
= (arch
== 64) ? KEY_WOW64_32KEY
: KEY_WOW64_64KEY
;
552 BOOL is_wow64
= FALSE
, is_opposite
= FALSE
;
554 WCHAR command
[MAX_PATH
+ ARRAY_SIZE(processidW
) + CHARS_IN_GUID
];
557 PROCESS_INFORMATION pi
;
560 TRACE("Attempting to start surrogate server for %s\n", debugstr_guid(rclsid
));
562 hr
= open_key_for_clsid(rclsid
, NULL
, KEY_READ
, &key
);
563 if (FAILED(hr
) && (arch
== 64 || (IsWow64Process(GetCurrentProcess(), &is_wow64
) && is_wow64
)))
564 hr
= open_key_for_clsid(rclsid
, NULL
, opposite
| KEY_READ
, &key
);
565 if (FAILED(hr
)) return hr
;
568 hr
= open_appidkey_from_clsid(rclsid
, KEY_READ
, &key
);
569 if (FAILED(hr
) && (arch
== 64 || (IsWow64Process(GetCurrentProcess(), &is_wow64
) && is_wow64
)))
571 hr
= open_appidkey_from_clsid(rclsid
, opposite
| KEY_READ
, &key
);
572 if (FAILED(hr
)) return hr
;
576 size
= (MAX_PATH
+ 1) * sizeof(WCHAR
);
577 ret
= RegQueryValueExW(key
, L
"DllSurrogate", NULL
, NULL
, (LPBYTE
)command
, &size
);
579 if (ret
|| !size
|| !command
[0])
581 TRACE("No value for DllSurrogate key\n");
583 if ((sizeof(void *) == 8 || is_wow64
) && opposite
== KEY_WOW64_32KEY
)
584 GetSystemWow64DirectoryW(command
, MAX_PATH
- ARRAY_SIZE(L
"\\dllhost.exe"));
586 GetSystemDirectoryW(command
, MAX_PATH
- ARRAY_SIZE(L
"\\dllhost.exe"));
588 wcscat(command
, L
"\\dllhost.exe");
591 /* Surrogate EXE servers are started with the /PROCESSID:{GUID} switch. */
592 wcscat(command
, processidW
);
593 StringFromGUID2(rclsid
, command
+ wcslen(command
), CHARS_IN_GUID
);
595 memset(&si
, 0, sizeof(si
));
598 TRACE("Activating surrogate local server %s\n", debugstr_w(command
));
603 Wow64DisableWow64FsRedirection(&cookie
);
604 if (!CreateProcessW(NULL
, command
, NULL
, NULL
, FALSE
, DETACHED_PROCESS
, NULL
, NULL
, &si
, &pi
))
606 WARN("failed to run surrogate local server %s\n", debugstr_w(command
));
607 hr
= HRESULT_FROM_WIN32(GetLastError());
609 Wow64RevertWow64FsRedirection(cookie
);
611 else if (!CreateProcessW(NULL
, command
, NULL
, NULL
, FALSE
, DETACHED_PROCESS
, NULL
, NULL
, &si
, &pi
))
613 WARN("failed to run surrogate local server %s\n", debugstr_w(command
));
614 hr
= HRESULT_FROM_WIN32(GetLastError());
617 if (FAILED(hr
)) return hr
;
619 *process
= pi
.hProcess
;
620 CloseHandle(pi
.hThread
);
625 HRESULT
rpc_get_local_class_object(REFCLSID rclsid
, REFIID riid
, void **obj
)
627 PMInterfacePointer objref
= NULL
;
628 IServiceProvider
*local_server
;
629 IStream
*stream
= NULL
;
630 ULARGE_INTEGER newpos
;
631 LARGE_INTEGER seekto
;
635 static const int MAXTRIES
= 30; /* 30 seconds */
637 TRACE("clsid %s, riid %s\n", debugstr_guid(rclsid
), debugstr_guid(riid
));
639 while (tries
++ < MAXTRIES
)
641 DWORD index
, start_ticks
;
644 if (SUCCEEDED(hr
= rpcss_get_class_object(rclsid
, &objref
)))
649 if ((hr
= create_local_service(rclsid
)) && (hr
= create_server(rclsid
, &process
)) &&
650 (hr
= create_surrogate_server(rclsid
, &process
)) )
654 /* Wait for one second, even if messages arrive. */
655 start_ticks
= GetTickCount();
658 if (SUCCEEDED(CoWaitForMultipleHandles(0, 1000, (process
!= 0), &process
, &index
)) && process
&& !index
)
660 WARN("Server for %s failed to start.\n", debugstr_guid(rclsid
));
661 CloseHandle(process
);
662 return E_NOINTERFACE
;
664 } while (GetTickCount() - start_ticks
< 1000);
666 if (process
) CloseHandle(process
);
669 if (!objref
|| tries
>= MAXTRIES
)
670 return E_NOINTERFACE
;
672 if (SUCCEEDED(hr
= CreateStreamOnHGlobal(0, TRUE
, &stream
)))
673 hr
= IStream_Write(stream
, objref
->abData
, objref
->ulCntData
, &length
);
675 MIDL_user_free(objref
);
680 IStream_Seek(stream
, seekto
, STREAM_SEEK_SET
, &newpos
);
682 TRACE("Unmarshalling local server.\n");
683 hr
= CoUnmarshalInterface(stream
, &IID_IServiceProvider
, (void **)&local_server
);
686 hr
= IServiceProvider_QueryService(local_server
, rclsid
, riid
, obj
);
687 IServiceProvider_Release(local_server
);
692 IStream_Release(stream
);
697 HRESULT
rpc_register_local_server(REFCLSID clsid
, IStream
*stream
, DWORD flags
, unsigned int *cookie
)
699 MInterfacePointer
*obj
;
705 TRACE("%s, %#lx\n", debugstr_guid(clsid
), flags
);
707 hr
= GetHGlobalFromStream(stream
, &hmem
);
708 if (FAILED(hr
)) return hr
;
710 size
= GlobalSize(hmem
);
711 if (!(obj
= malloc(FIELD_OFFSET(MInterfacePointer
, abData
[size
]))))
712 return E_OUTOFMEMORY
;
713 obj
->ulCntData
= size
;
714 ptr
= GlobalLock(hmem
);
715 memcpy(obj
->abData
, ptr
, size
);
718 hr
= rpcss_server_register(clsid
, flags
, obj
, cookie
);
725 static HRESULT
unmarshal_ORPCTHAT(RPC_MESSAGE
*msg
, ORPCTHAT
*orpcthat
, ORPC_EXTENT_ARRAY
*orpc_ext_array
,
726 WIRE_ORPC_EXTENT
**first_wire_orpc_extent
);
728 /* Channel Hook Functions */
730 static ULONG
ChannelHooks_ClientGetSize(SChannelHookCallInfo
*info
, struct channel_hook_buffer_data
**data
,
731 unsigned int *hook_count
, ULONG
*extension_count
)
733 struct channel_hook_entry
*entry
;
734 ULONG total_size
= 0;
735 unsigned int hook_index
= 0;
738 *extension_count
= 0;
740 EnterCriticalSection(&csChannelHook
);
742 LIST_FOR_EACH_ENTRY(entry
, &channel_hooks
, struct channel_hook_entry
, entry
)
746 *data
= malloc(*hook_count
* sizeof(struct channel_hook_buffer_data
));
750 LIST_FOR_EACH_ENTRY(entry
, &channel_hooks
, struct channel_hook_entry
, entry
)
752 ULONG extension_size
= 0;
754 IChannelHook_ClientGetSize(entry
->hook
, &entry
->id
, &info
->iid
, &extension_size
);
756 TRACE("%s: extension_size = %lu\n", debugstr_guid(&entry
->id
), extension_size
);
758 extension_size
= (extension_size
+7)&~7;
759 (*data
)[hook_index
].id
= entry
->id
;
760 (*data
)[hook_index
].extension_size
= extension_size
;
762 /* an extension is only put onto the wire if it has data to write */
765 total_size
+= FIELD_OFFSET(WIRE_ORPC_EXTENT
, data
[extension_size
]);
766 (*extension_count
)++;
772 LeaveCriticalSection(&csChannelHook
);
777 static unsigned char * ChannelHooks_ClientFillBuffer(SChannelHookCallInfo
*info
,
778 unsigned char *buffer
, struct channel_hook_buffer_data
*data
,
779 unsigned int hook_count
)
781 struct channel_hook_entry
*entry
;
783 EnterCriticalSection(&csChannelHook
);
785 LIST_FOR_EACH_ENTRY(entry
, &channel_hooks
, struct channel_hook_entry
, entry
)
788 ULONG extension_size
= 0;
789 WIRE_ORPC_EXTENT
*wire_orpc_extent
= (WIRE_ORPC_EXTENT
*)buffer
;
791 for (i
= 0; i
< hook_count
; i
++)
792 if (IsEqualGUID(&entry
->id
, &data
[i
].id
))
793 extension_size
= data
[i
].extension_size
;
795 /* an extension is only put onto the wire if it has data to write */
799 IChannelHook_ClientFillBuffer(entry
->hook
, &entry
->id
, &info
->iid
,
800 &extension_size
, buffer
+ FIELD_OFFSET(WIRE_ORPC_EXTENT
, data
[0]));
802 TRACE("%s: extension_size = %lu\n", debugstr_guid(&entry
->id
), extension_size
);
804 /* FIXME: set unused portion of wire_orpc_extent->data to 0? */
806 wire_orpc_extent
->conformance
= (extension_size
+7)&~7;
807 wire_orpc_extent
->size
= extension_size
;
808 wire_orpc_extent
->id
= entry
->id
;
809 buffer
+= FIELD_OFFSET(WIRE_ORPC_EXTENT
, data
[wire_orpc_extent
->conformance
]);
812 LeaveCriticalSection(&csChannelHook
);
817 static void ChannelHooks_ServerNotify(SChannelHookCallInfo
*info
,
818 DWORD lDataRep
, WIRE_ORPC_EXTENT
*first_wire_orpc_extent
,
819 ULONG extension_count
)
821 struct channel_hook_entry
*entry
;
824 EnterCriticalSection(&csChannelHook
);
826 LIST_FOR_EACH_ENTRY(entry
, &channel_hooks
, struct channel_hook_entry
, entry
)
828 WIRE_ORPC_EXTENT
*wire_orpc_extent
;
829 for (i
= 0, wire_orpc_extent
= first_wire_orpc_extent
;
831 i
++, wire_orpc_extent
= (WIRE_ORPC_EXTENT
*)&wire_orpc_extent
->data
[wire_orpc_extent
->conformance
])
833 if (IsEqualGUID(&entry
->id
, &wire_orpc_extent
->id
))
836 if (i
== extension_count
) wire_orpc_extent
= NULL
;
838 IChannelHook_ServerNotify(entry
->hook
, &entry
->id
, &info
->iid
,
839 wire_orpc_extent
? wire_orpc_extent
->size
: 0,
840 wire_orpc_extent
? wire_orpc_extent
->data
: NULL
,
844 LeaveCriticalSection(&csChannelHook
);
847 static ULONG
ChannelHooks_ServerGetSize(SChannelHookCallInfo
*info
,
848 struct channel_hook_buffer_data
**data
, unsigned int *hook_count
,
849 ULONG
*extension_count
)
851 struct channel_hook_entry
*entry
;
852 ULONG total_size
= 0;
853 unsigned int hook_index
= 0;
856 *extension_count
= 0;
858 EnterCriticalSection(&csChannelHook
);
860 LIST_FOR_EACH_ENTRY(entry
, &channel_hooks
, struct channel_hook_entry
, entry
)
864 *data
= malloc(*hook_count
* sizeof(struct channel_hook_buffer_data
));
868 LIST_FOR_EACH_ENTRY(entry
, &channel_hooks
, struct channel_hook_entry
, entry
)
870 ULONG extension_size
= 0;
872 IChannelHook_ServerGetSize(entry
->hook
, &entry
->id
, &info
->iid
, S_OK
,
875 TRACE("%s: extension_size = %lu\n", debugstr_guid(&entry
->id
), extension_size
);
877 extension_size
= (extension_size
+7)&~7;
878 (*data
)[hook_index
].id
= entry
->id
;
879 (*data
)[hook_index
].extension_size
= extension_size
;
881 /* an extension is only put onto the wire if it has data to write */
884 total_size
+= FIELD_OFFSET(WIRE_ORPC_EXTENT
, data
[extension_size
]);
885 (*extension_count
)++;
891 LeaveCriticalSection(&csChannelHook
);
896 static unsigned char * ChannelHooks_ServerFillBuffer(SChannelHookCallInfo
*info
,
897 unsigned char *buffer
, struct channel_hook_buffer_data
*data
,
898 unsigned int hook_count
)
900 struct channel_hook_entry
*entry
;
902 EnterCriticalSection(&csChannelHook
);
904 LIST_FOR_EACH_ENTRY(entry
, &channel_hooks
, struct channel_hook_entry
, entry
)
907 ULONG extension_size
= 0;
908 WIRE_ORPC_EXTENT
*wire_orpc_extent
= (WIRE_ORPC_EXTENT
*)buffer
;
910 for (i
= 0; i
< hook_count
; i
++)
911 if (IsEqualGUID(&entry
->id
, &data
[i
].id
))
912 extension_size
= data
[i
].extension_size
;
914 /* an extension is only put onto the wire if it has data to write */
918 IChannelHook_ServerFillBuffer(entry
->hook
, &entry
->id
, &info
->iid
,
919 &extension_size
, buffer
+ FIELD_OFFSET(WIRE_ORPC_EXTENT
, data
[0]),
922 TRACE("%s: extension_size = %lu\n", debugstr_guid(&entry
->id
), extension_size
);
924 /* FIXME: set unused portion of wire_orpc_extent->data to 0? */
926 wire_orpc_extent
->conformance
= (extension_size
+7)&~7;
927 wire_orpc_extent
->size
= extension_size
;
928 wire_orpc_extent
->id
= entry
->id
;
929 buffer
+= FIELD_OFFSET(WIRE_ORPC_EXTENT
, data
[wire_orpc_extent
->conformance
]);
932 LeaveCriticalSection(&csChannelHook
);
937 static void ChannelHooks_ClientNotify(SChannelHookCallInfo
*info
,
938 DWORD lDataRep
, WIRE_ORPC_EXTENT
*first_wire_orpc_extent
,
939 ULONG extension_count
, HRESULT hrFault
)
941 struct channel_hook_entry
*entry
;
944 EnterCriticalSection(&csChannelHook
);
946 LIST_FOR_EACH_ENTRY(entry
, &channel_hooks
, struct channel_hook_entry
, entry
)
948 WIRE_ORPC_EXTENT
*wire_orpc_extent
;
949 for (i
= 0, wire_orpc_extent
= first_wire_orpc_extent
;
951 i
++, wire_orpc_extent
= (WIRE_ORPC_EXTENT
*)&wire_orpc_extent
->data
[wire_orpc_extent
->conformance
])
953 if (IsEqualGUID(&entry
->id
, &wire_orpc_extent
->id
))
956 if (i
== extension_count
) wire_orpc_extent
= NULL
;
958 IChannelHook_ClientNotify(entry
->hook
, &entry
->id
, &info
->iid
,
959 wire_orpc_extent
? wire_orpc_extent
->size
: 0,
960 wire_orpc_extent
? wire_orpc_extent
->data
: NULL
,
964 LeaveCriticalSection(&csChannelHook
);
967 HRESULT
rpc_register_channel_hook(REFGUID rguid
, IChannelHook
*hook
)
969 struct channel_hook_entry
*entry
;
971 entry
= malloc(sizeof(*entry
));
973 return E_OUTOFMEMORY
;
977 IChannelHook_AddRef(hook
);
979 EnterCriticalSection(&csChannelHook
);
980 list_add_tail(&channel_hooks
, &entry
->entry
);
981 LeaveCriticalSection(&csChannelHook
);
986 void rpc_unregister_channel_hooks(void)
988 struct channel_hook_entry
*cursor
;
989 struct channel_hook_entry
*cursor2
;
991 EnterCriticalSection(&csChannelHook
);
992 LIST_FOR_EACH_ENTRY_SAFE(cursor
, cursor2
, &channel_hooks
, struct channel_hook_entry
, entry
)
994 LeaveCriticalSection(&csChannelHook
);
995 DeleteCriticalSection(&csChannelHook
);
996 DeleteCriticalSection(&csRegIf
);
999 /* RPC Channel Buffer Functions */
1001 static HRESULT WINAPI
RpcChannelBuffer_QueryInterface(IRpcChannelBuffer
*iface
, REFIID riid
, LPVOID
*ppv
)
1004 if (IsEqualIID(riid
,&IID_IRpcChannelBuffer
) || IsEqualIID(riid
,&IID_IUnknown
))
1007 IRpcChannelBuffer_AddRef(iface
);
1010 return E_NOINTERFACE
;
1013 static ULONG WINAPI
RpcChannelBuffer_AddRef(LPRPCCHANNELBUFFER iface
)
1015 RpcChannelBuffer
*This
= (RpcChannelBuffer
*)iface
;
1016 return InterlockedIncrement(&This
->refs
);
1019 static ULONG WINAPI
ServerRpcChannelBuffer_Release(LPRPCCHANNELBUFFER iface
)
1021 RpcChannelBuffer
*This
= (RpcChannelBuffer
*)iface
;
1024 ref
= InterlockedDecrement(&This
->refs
);
1032 static ULONG WINAPI
ClientRpcChannelBuffer_Release(LPRPCCHANNELBUFFER iface
)
1034 ClientRpcChannelBuffer
*This
= (ClientRpcChannelBuffer
*)iface
;
1037 ref
= InterlockedDecrement(&This
->super
.refs
);
1041 if (This
->event
) CloseHandle(This
->event
);
1042 RpcBindingFree(&This
->bind
);
1047 static HRESULT WINAPI
ServerRpcChannelBuffer_GetBuffer(LPRPCCHANNELBUFFER iface
, RPCOLEMESSAGE
* olemsg
, REFIID riid
)
1049 RpcChannelBuffer
*This
= (RpcChannelBuffer
*)iface
;
1050 RPC_MESSAGE
*msg
= (RPC_MESSAGE
*)olemsg
;
1053 struct message_state
*message_state
;
1054 ULONG extensions_size
;
1055 struct channel_hook_buffer_data
*channel_hook_data
;
1056 unsigned int channel_hook_count
;
1057 ULONG extension_count
;
1059 TRACE("(%p)->(%p,%s)\n", This
, olemsg
, debugstr_guid(riid
));
1061 message_state
= msg
->Handle
;
1062 /* restore the binding handle and the real start of data */
1063 msg
->Handle
= message_state
->binding_handle
;
1064 msg
->Buffer
= (char *)msg
->Buffer
- message_state
->prefix_data_len
;
1066 extensions_size
= ChannelHooks_ServerGetSize(&message_state
->channel_hook_info
,
1067 &channel_hook_data
, &channel_hook_count
, &extension_count
);
1069 msg
->BufferLength
+= FIELD_OFFSET(WIRE_ORPCTHAT
, extensions
) + sizeof(DWORD
);
1070 if (extensions_size
)
1072 msg
->BufferLength
+= FIELD_OFFSET(WIRE_ORPC_EXTENT_ARRAY
, extent
[2*sizeof(DWORD
) + extensions_size
]);
1073 if (extension_count
& 1)
1074 msg
->BufferLength
+= FIELD_OFFSET(WIRE_ORPC_EXTENT
, data
[0]);
1077 if (message_state
->bypass_rpcrt
)
1079 msg
->Buffer
= malloc(msg
->BufferLength
);
1084 free(channel_hook_data
);
1085 return E_OUTOFMEMORY
;
1089 status
= I_RpcGetBuffer(msg
);
1091 orpcthat
= msg
->Buffer
;
1092 msg
->Buffer
= (char *)msg
->Buffer
+ FIELD_OFFSET(WIRE_ORPCTHAT
, extensions
);
1094 orpcthat
->flags
= ORPCF_NULL
/* FIXME? */;
1096 /* NDR representation of orpcthat->extensions */
1097 *(DWORD
*)msg
->Buffer
= extensions_size
? 1 : 0;
1098 msg
->Buffer
= (char *)msg
->Buffer
+ sizeof(DWORD
);
1100 if (extensions_size
)
1102 WIRE_ORPC_EXTENT_ARRAY
*orpc_extent_array
= msg
->Buffer
;
1103 orpc_extent_array
->size
= extension_count
;
1104 orpc_extent_array
->reserved
= 0;
1105 msg
->Buffer
= (char *)msg
->Buffer
+ FIELD_OFFSET(WIRE_ORPC_EXTENT_ARRAY
, extent
);
1106 /* NDR representation of orpc_extent_array->extent */
1107 *(DWORD
*)msg
->Buffer
= 1;
1108 msg
->Buffer
= (char *)msg
->Buffer
+ sizeof(DWORD
);
1109 /* NDR representation of [size_is] attribute of orpc_extent_array->extent */
1110 *(DWORD
*)msg
->Buffer
= (extension_count
+ 1) & ~1;
1111 msg
->Buffer
= (char *)msg
->Buffer
+ sizeof(DWORD
);
1113 msg
->Buffer
= ChannelHooks_ServerFillBuffer(&message_state
->channel_hook_info
,
1114 msg
->Buffer
, channel_hook_data
, channel_hook_count
);
1116 /* we must add a dummy extension if there is an odd extension
1117 * count to meet the contract specified by the size_is attribute */
1118 if (extension_count
& 1)
1120 WIRE_ORPC_EXTENT
*wire_orpc_extent
= msg
->Buffer
;
1121 wire_orpc_extent
->conformance
= 0;
1122 wire_orpc_extent
->id
= GUID_NULL
;
1123 wire_orpc_extent
->size
= 0;
1124 msg
->Buffer
= (char *)msg
->Buffer
+ FIELD_OFFSET(WIRE_ORPC_EXTENT
, data
[0]);
1128 free(channel_hook_data
);
1130 /* store the prefixed data length so that we can restore the real buffer
1132 message_state
->prefix_data_len
= (char *)msg
->Buffer
- (char *)orpcthat
;
1133 msg
->BufferLength
-= message_state
->prefix_data_len
;
1134 /* save away the message state again */
1135 msg
->Handle
= message_state
;
1137 TRACE("-- %ld\n", status
);
1139 return HRESULT_FROM_WIN32(status
);
1142 static HANDLE
ClientRpcChannelBuffer_GetEventHandle(ClientRpcChannelBuffer
*This
)
1144 HANDLE event
= InterlockedExchangePointer(&This
->event
, NULL
);
1146 /* Note: must be auto-reset event so we can reuse it without a call
1148 if (!event
) event
= CreateEventW(NULL
, FALSE
, FALSE
, NULL
);
1153 static void ClientRpcChannelBuffer_ReleaseEventHandle(ClientRpcChannelBuffer
*This
, HANDLE event
)
1155 if (InterlockedCompareExchangePointer(&This
->event
, event
, NULL
))
1156 /* already a handle cached in This */
1160 static HRESULT WINAPI
ClientRpcChannelBuffer_GetBuffer(LPRPCCHANNELBUFFER iface
, RPCOLEMESSAGE
* olemsg
, REFIID riid
)
1162 ClientRpcChannelBuffer
*This
= (ClientRpcChannelBuffer
*)iface
;
1163 RPC_MESSAGE
*msg
= (RPC_MESSAGE
*)olemsg
;
1164 RPC_CLIENT_INTERFACE
*cif
;
1167 struct message_state
*message_state
;
1168 ULONG extensions_size
;
1169 struct channel_hook_buffer_data
*channel_hook_data
;
1170 unsigned int channel_hook_count
;
1171 ULONG extension_count
;
1174 struct apartment
*apt
= NULL
;
1176 TRACE("(%p)->(%p,%s)\n", This
, olemsg
, debugstr_guid(riid
));
1178 cif
= calloc(1, sizeof(RPC_CLIENT_INTERFACE
));
1180 return E_OUTOFMEMORY
;
1182 message_state
= malloc(sizeof(*message_state
));
1186 return E_OUTOFMEMORY
;
1189 cif
->Length
= sizeof(RPC_CLIENT_INTERFACE
);
1190 /* RPC interface ID = COM interface ID */
1191 cif
->InterfaceId
.SyntaxGUID
= This
->iid
;
1192 /* COM objects always have a version of 0.0 */
1193 cif
->InterfaceId
.SyntaxVersion
.MajorVersion
= 0;
1194 cif
->InterfaceId
.SyntaxVersion
.MinorVersion
= 0;
1195 msg
->Handle
= This
->bind
;
1196 msg
->RpcInterfaceInformation
= cif
;
1198 message_state
->prefix_data_len
= 0;
1199 message_state
->binding_handle
= This
->bind
;
1201 message_state
->channel_hook_info
.iid
= *riid
;
1202 message_state
->channel_hook_info
.cbSize
= sizeof(message_state
->channel_hook_info
);
1203 CoGetCurrentLogicalThreadId(&message_state
->channel_hook_info
.uCausality
);
1204 message_state
->channel_hook_info
.dwServerPid
= This
->server_pid
;
1205 message_state
->channel_hook_info
.iMethod
= msg
->ProcNum
& ~RPC_FLAGS_VALID_BIT
;
1206 message_state
->channel_hook_info
.pObject
= NULL
; /* only present on server-side */
1207 message_state
->target_hwnd
= NULL
;
1208 message_state
->target_tid
= 0;
1209 memset(&message_state
->params
, 0, sizeof(message_state
->params
));
1211 extensions_size
= ChannelHooks_ClientGetSize(&message_state
->channel_hook_info
,
1212 &channel_hook_data
, &channel_hook_count
, &extension_count
);
1214 msg
->BufferLength
+= FIELD_OFFSET(WIRE_ORPCTHIS
, extensions
) + sizeof(DWORD
);
1215 if (extensions_size
)
1217 msg
->BufferLength
+= FIELD_OFFSET(WIRE_ORPC_EXTENT_ARRAY
, extent
[2*sizeof(DWORD
) + extensions_size
]);
1218 if (extension_count
& 1)
1219 msg
->BufferLength
+= FIELD_OFFSET(WIRE_ORPC_EXTENT
, data
[0]);
1222 RpcBindingInqObject(message_state
->binding_handle
, &ipid
);
1223 hr
= ipid_get_dispatch_params(&ipid
, &apt
, NULL
, &message_state
->params
.stub
,
1224 &message_state
->params
.chan
,
1225 &message_state
->params
.iid
,
1226 &message_state
->params
.iface
);
1229 /* stub, chan, iface and iid are unneeded in multi-threaded case as we go
1230 * via the RPC runtime */
1231 if (apt
->multi_threaded
)
1233 IRpcStubBuffer_Release(message_state
->params
.stub
);
1234 message_state
->params
.stub
= NULL
;
1235 IRpcChannelBuffer_Release(message_state
->params
.chan
);
1236 message_state
->params
.chan
= NULL
;
1237 message_state
->params
.iface
= NULL
;
1241 message_state
->params
.bypass_rpcrt
= TRUE
;
1242 message_state
->target_hwnd
= apartment_getwindow(apt
);
1243 message_state
->target_tid
= apt
->tid
;
1244 /* we assume later on that this being non-NULL is the indicator that
1245 * means call directly instead of going through RPC runtime */
1246 if (!message_state
->target_hwnd
)
1247 ERR("window for apartment %s is NULL\n", wine_dbgstr_longlong(apt
->oxid
));
1250 if (apt
) apartment_release(apt
);
1251 message_state
->params
.handle
= ClientRpcChannelBuffer_GetEventHandle(This
);
1252 /* Note: message_state->params.msg is initialised in
1253 * ClientRpcChannelBuffer_SendReceive */
1255 /* shortcut the RPC runtime */
1256 if (message_state
->target_hwnd
)
1258 msg
->Buffer
= malloc(msg
->BufferLength
);
1262 status
= ERROR_OUTOFMEMORY
;
1265 status
= I_RpcGetBuffer(msg
);
1267 msg
->Handle
= message_state
;
1269 if (status
== RPC_S_OK
)
1271 orpcthis
= msg
->Buffer
;
1272 msg
->Buffer
= (char *)msg
->Buffer
+ FIELD_OFFSET(WIRE_ORPCTHIS
, extensions
);
1274 orpcthis
->version
.MajorVersion
= COM_MAJOR_VERSION
;
1275 orpcthis
->version
.MinorVersion
= COM_MINOR_VERSION
;
1276 orpcthis
->flags
= message_state
->channel_hook_info
.dwServerPid
? ORPCF_LOCAL
: ORPCF_NULL
;
1277 orpcthis
->reserved1
= 0;
1278 orpcthis
->cid
= message_state
->channel_hook_info
.uCausality
;
1280 /* NDR representation of orpcthis->extensions */
1281 *(DWORD
*)msg
->Buffer
= extensions_size
? 1 : 0;
1282 msg
->Buffer
= (char *)msg
->Buffer
+ sizeof(DWORD
);
1284 if (extensions_size
)
1286 ORPC_EXTENT_ARRAY
*orpc_extent_array
= msg
->Buffer
;
1287 orpc_extent_array
->size
= extension_count
;
1288 orpc_extent_array
->reserved
= 0;
1289 msg
->Buffer
= (char *)msg
->Buffer
+ FIELD_OFFSET(WIRE_ORPC_EXTENT_ARRAY
, extent
);
1290 /* NDR representation of orpc_extent_array->extent */
1291 *(DWORD
*)msg
->Buffer
= 1;
1292 msg
->Buffer
= (char *)msg
->Buffer
+ sizeof(DWORD
);
1293 /* NDR representation of [size_is] attribute of orpc_extent_array->extent */
1294 *(DWORD
*)msg
->Buffer
= (extension_count
+ 1) & ~1;
1295 msg
->Buffer
= (char *)msg
->Buffer
+ sizeof(DWORD
);
1297 msg
->Buffer
= ChannelHooks_ClientFillBuffer(&message_state
->channel_hook_info
,
1298 msg
->Buffer
, channel_hook_data
, channel_hook_count
);
1300 /* we must add a dummy extension if there is an odd extension
1301 * count to meet the contract specified by the size_is attribute */
1302 if (extension_count
& 1)
1304 WIRE_ORPC_EXTENT
*wire_orpc_extent
= msg
->Buffer
;
1305 wire_orpc_extent
->conformance
= 0;
1306 wire_orpc_extent
->id
= GUID_NULL
;
1307 wire_orpc_extent
->size
= 0;
1308 msg
->Buffer
= (char *)msg
->Buffer
+ FIELD_OFFSET(WIRE_ORPC_EXTENT
, data
[0]);
1312 /* store the prefixed data length so that we can restore the real buffer
1313 * pointer in ClientRpcChannelBuffer_SendReceive. */
1314 message_state
->prefix_data_len
= (char *)msg
->Buffer
- (char *)orpcthis
;
1315 msg
->BufferLength
-= message_state
->prefix_data_len
;
1318 free(channel_hook_data
);
1320 TRACE("-- %ld\n", status
);
1322 return HRESULT_FROM_WIN32(status
);
1325 static HRESULT WINAPI
ServerRpcChannelBuffer_SendReceive(LPRPCCHANNELBUFFER iface
, RPCOLEMESSAGE
*olemsg
, ULONG
*pstatus
)
1331 /* this thread runs an outgoing RPC */
1332 static DWORD WINAPI
rpc_sendreceive_thread(LPVOID param
)
1334 struct dispatch_params
*data
= param
;
1336 /* Note: I_RpcSendReceive doesn't raise exceptions like the higher-level
1337 * RPC functions do */
1338 data
->status
= I_RpcSendReceive((RPC_MESSAGE
*)data
->msg
);
1340 TRACE("completed with status %#lx\n", data
->status
);
1342 SetEvent(data
->handle
);
1347 static inline HRESULT
ClientRpcChannelBuffer_IsCorrectApartment(ClientRpcChannelBuffer
*This
, const struct apartment
*apt
)
1351 if (This
->oxid
!= apartment_getoxid(apt
))
1356 static HRESULT WINAPI
ClientRpcChannelBuffer_SendReceive(LPRPCCHANNELBUFFER iface
, RPCOLEMESSAGE
*olemsg
, ULONG
*pstatus
)
1358 ClientRpcChannelBuffer
*This
= (ClientRpcChannelBuffer
*)iface
;
1360 RPC_MESSAGE
*msg
= (RPC_MESSAGE
*)olemsg
;
1363 struct message_state
*message_state
;
1365 ORPC_EXTENT_ARRAY orpc_ext_array
;
1366 WIRE_ORPC_EXTENT
*first_wire_orpc_extent
= NULL
;
1367 HRESULT hrFault
= S_OK
;
1368 struct apartment
*apt
= apartment_get_current_or_mta();
1369 struct tlsdata
*tlsdata
;
1371 TRACE("%p, iMethod %ld\n", olemsg
, olemsg
->iMethod
);
1373 hr
= ClientRpcChannelBuffer_IsCorrectApartment(This
, apt
);
1376 ERR("called from wrong apartment, should have been 0x%s\n",
1377 wine_dbgstr_longlong(This
->oxid
));
1378 if (apt
) apartment_release(apt
);
1379 return RPC_E_WRONG_THREAD
;
1382 if (FAILED(hr
= com_get_tlsdata(&tlsdata
)))
1385 /* This situation should be impossible in multi-threaded apartments,
1386 * because the calling thread isn't re-enterable.
1387 * Note: doing a COM call during the processing of a sent message is
1388 * only disallowed if a client call is already being waited for
1390 if (!apt
->multi_threaded
&&
1391 tlsdata
->pending_call_count_client
&&
1394 ERR("can't make an outgoing COM call in response to a sent message\n");
1395 apartment_release(apt
);
1396 return RPC_E_CANTCALLOUT_ININPUTSYNCCALL
;
1399 message_state
= msg
->Handle
;
1400 /* restore the binding handle and the real start of data */
1401 msg
->Handle
= message_state
->binding_handle
;
1402 msg
->Buffer
= (char *)msg
->Buffer
- message_state
->prefix_data_len
;
1403 msg
->BufferLength
+= message_state
->prefix_data_len
;
1405 /* Note: this is an optimization in the Microsoft OLE runtime that we need
1406 * to copy, as shown by the test_no_couninitialize_client test. without
1407 * short-circuiting the RPC runtime in the case below, the test will
1408 * deadlock on the loader lock due to the RPC runtime needing to create
1409 * a thread to process the RPC when this function is called indirectly
1412 message_state
->params
.msg
= olemsg
;
1413 if (message_state
->params
.bypass_rpcrt
)
1415 TRACE("Calling apartment thread %#lx...\n", message_state
->target_tid
);
1417 msg
->ProcNum
&= ~RPC_FLAGS_VALID_BIT
;
1419 if (!PostMessageW(message_state
->target_hwnd
, DM_EXECUTERPC
, 0,
1420 (LPARAM
)&message_state
->params
))
1422 ERR("PostMessage failed with error %lu\n", GetLastError());
1424 /* Note: message_state->params.iface doesn't have a reference and
1425 * so doesn't need to be released */
1427 hr
= HRESULT_FROM_WIN32(GetLastError());
1432 /* we use a separate thread here because we need to be able to
1433 * pump the message loop in the application thread: if we do not,
1434 * any windows created by this thread will hang and RPCs that try
1435 * and re-enter this STA from an incoming server thread will
1436 * deadlock. InstallShield is an example of that.
1438 if (!QueueUserWorkItem(rpc_sendreceive_thread
, &message_state
->params
, WT_EXECUTEDEFAULT
))
1440 ERR("QueueUserWorkItem failed with error %lu\n", GetLastError());
1449 if (WaitForSingleObject(message_state
->params
.handle
, 0))
1451 tlsdata
->pending_call_count_client
++;
1452 hr
= CoWaitForMultipleHandles(0, INFINITE
, 1, &message_state
->params
.handle
, &index
);
1453 tlsdata
->pending_call_count_client
--;
1456 ClientRpcChannelBuffer_ReleaseEventHandle(This
, message_state
->params
.handle
);
1458 /* for WM shortcut, faults are returned in params->hr */
1460 hrFault
= message_state
->params
.hr
;
1462 status
= message_state
->params
.status
;
1464 orpcthat
.flags
= ORPCF_NULL
;
1465 orpcthat
.extensions
= NULL
;
1467 TRACE("RPC call status: %#lx\n", status
);
1468 if (status
!= RPC_S_OK
)
1469 hr
= HRESULT_FROM_WIN32(status
);
1471 TRACE("hrFault = %#lx\n", hrFault
);
1473 /* FIXME: this condition should be
1474 * "hr == S_OK && (!hrFault || msg->BufferLength > FIELD_OFFSET(ORPCTHAT, extensions) + 4)"
1475 * but we don't currently reset the message length for PostMessage
1476 * dispatched calls */
1477 if (hr
== S_OK
&& hrFault
== S_OK
)
1480 char *original_buffer
= msg
->Buffer
;
1482 /* handle ORPCTHAT and client extensions */
1484 hr2
= unmarshal_ORPCTHAT(msg
, &orpcthat
, &orpc_ext_array
, &first_wire_orpc_extent
);
1488 message_state
->prefix_data_len
= (char *)msg
->Buffer
- original_buffer
;
1489 msg
->BufferLength
-= message_state
->prefix_data_len
;
1492 message_state
->prefix_data_len
= 0;
1496 ChannelHooks_ClientNotify(&message_state
->channel_hook_info
,
1497 msg
->DataRepresentation
,
1498 first_wire_orpc_extent
,
1499 orpcthat
.extensions
&& first_wire_orpc_extent
? orpcthat
.extensions
->size
: 0,
1503 /* save away the message state again */
1504 msg
->Handle
= message_state
;
1506 if (pstatus
) *pstatus
= status
;
1511 TRACE("-- %#lx\n", hr
);
1513 apartment_release(apt
);
1517 static HRESULT WINAPI
ServerRpcChannelBuffer_FreeBuffer(LPRPCCHANNELBUFFER iface
, RPCOLEMESSAGE
* olemsg
)
1519 RPC_MESSAGE
*msg
= (RPC_MESSAGE
*)olemsg
;
1521 struct message_state
*message_state
;
1523 TRACE("(%p)\n", msg
);
1525 message_state
= msg
->Handle
;
1526 /* restore the binding handle and the real start of data */
1527 msg
->Handle
= message_state
->binding_handle
;
1528 msg
->Buffer
= (char *)msg
->Buffer
- message_state
->prefix_data_len
;
1529 msg
->BufferLength
+= message_state
->prefix_data_len
;
1530 message_state
->prefix_data_len
= 0;
1532 if (message_state
->bypass_rpcrt
)
1538 status
= I_RpcFreeBuffer(msg
);
1540 msg
->Handle
= message_state
;
1542 TRACE("-- %ld\n", status
);
1544 return HRESULT_FROM_WIN32(status
);
1547 static HRESULT WINAPI
ClientRpcChannelBuffer_FreeBuffer(LPRPCCHANNELBUFFER iface
, RPCOLEMESSAGE
* olemsg
)
1549 RPC_MESSAGE
*msg
= (RPC_MESSAGE
*)olemsg
;
1551 struct message_state
*message_state
;
1553 TRACE("(%p)\n", msg
);
1555 message_state
= msg
->Handle
;
1556 /* restore the binding handle and the real start of data */
1557 msg
->Handle
= message_state
->binding_handle
;
1558 msg
->Buffer
= (char *)msg
->Buffer
- message_state
->prefix_data_len
;
1559 msg
->BufferLength
+= message_state
->prefix_data_len
;
1561 if (message_state
->params
.bypass_rpcrt
)
1567 status
= I_RpcFreeBuffer(msg
);
1569 free(msg
->RpcInterfaceInformation
);
1570 msg
->RpcInterfaceInformation
= NULL
;
1572 if (message_state
->params
.stub
)
1573 IRpcStubBuffer_Release(message_state
->params
.stub
);
1574 if (message_state
->params
.chan
)
1575 IRpcChannelBuffer_Release(message_state
->params
.chan
);
1576 free(message_state
);
1578 TRACE("-- %ld\n", status
);
1580 return HRESULT_FROM_WIN32(status
);
1583 static HRESULT WINAPI
ClientRpcChannelBuffer_GetDestCtx(LPRPCCHANNELBUFFER iface
, DWORD
* pdwDestContext
, void** ppvDestContext
)
1585 ClientRpcChannelBuffer
*This
= (ClientRpcChannelBuffer
*)iface
;
1587 TRACE("(%p,%p)\n", pdwDestContext
, ppvDestContext
);
1589 *pdwDestContext
= This
->super
.dest_context
;
1590 *ppvDestContext
= This
->super
.dest_context_data
;
1595 static HRESULT WINAPI
ServerRpcChannelBuffer_GetDestCtx(LPRPCCHANNELBUFFER iface
, DWORD
* dest_context
, void** dest_context_data
)
1597 RpcChannelBuffer
*This
= (RpcChannelBuffer
*)iface
;
1599 TRACE("(%p,%p)\n", dest_context
, dest_context_data
);
1601 *dest_context
= This
->dest_context
;
1602 *dest_context_data
= This
->dest_context_data
;
1606 static HRESULT WINAPI
RpcChannelBuffer_IsConnected(LPRPCCHANNELBUFFER iface
)
1609 /* native does nothing too */
1613 static const IRpcChannelBufferVtbl ClientRpcChannelBufferVtbl
=
1615 RpcChannelBuffer_QueryInterface
,
1616 RpcChannelBuffer_AddRef
,
1617 ClientRpcChannelBuffer_Release
,
1618 ClientRpcChannelBuffer_GetBuffer
,
1619 ClientRpcChannelBuffer_SendReceive
,
1620 ClientRpcChannelBuffer_FreeBuffer
,
1621 ClientRpcChannelBuffer_GetDestCtx
,
1622 RpcChannelBuffer_IsConnected
1625 static const IRpcChannelBufferVtbl ServerRpcChannelBufferVtbl
=
1627 RpcChannelBuffer_QueryInterface
,
1628 RpcChannelBuffer_AddRef
,
1629 ServerRpcChannelBuffer_Release
,
1630 ServerRpcChannelBuffer_GetBuffer
,
1631 ServerRpcChannelBuffer_SendReceive
,
1632 ServerRpcChannelBuffer_FreeBuffer
,
1633 ServerRpcChannelBuffer_GetDestCtx
,
1634 RpcChannelBuffer_IsConnected
1637 /* returns a channel buffer for proxies */
1638 HRESULT
rpc_create_clientchannel(const OXID
*oxid
, const IPID
*ipid
,
1639 const OXID_INFO
*oxid_info
, const IID
*iid
,
1640 DWORD dest_context
, void *dest_context_data
,
1641 IRpcChannelBuffer
**chan
, struct apartment
*apt
)
1643 ClientRpcChannelBuffer
*This
;
1644 WCHAR endpoint
[200];
1645 RPC_BINDING_HANDLE bind
;
1647 LPWSTR string_binding
;
1649 /* FIXME: get the endpoint from oxid_info->psa instead */
1650 get_rpc_endpoint(endpoint
, oxid
);
1652 TRACE("proxy pipe: connecting to endpoint: %s\n", debugstr_w(endpoint
));
1654 status
= RpcStringBindingComposeW(
1662 if (status
== RPC_S_OK
)
1664 status
= RpcBindingFromStringBindingW(string_binding
, &bind
);
1666 if (status
== RPC_S_OK
)
1668 IPID ipid2
= *ipid
; /* why can't RpcBindingSetObject take a const? */
1669 status
= RpcBindingSetObject(bind
, &ipid2
);
1670 if (status
!= RPC_S_OK
)
1671 RpcBindingFree(&bind
);
1674 RpcStringFreeW(&string_binding
);
1677 if (status
!= RPC_S_OK
)
1679 ERR("Couldn't get binding for endpoint %s, status = %ld\n", debugstr_w(endpoint
), status
);
1680 return HRESULT_FROM_WIN32(status
);
1683 This
= malloc(sizeof(*This
));
1686 RpcBindingFree(&bind
);
1687 return E_OUTOFMEMORY
;
1690 This
->super
.IRpcChannelBuffer_iface
.lpVtbl
= &ClientRpcChannelBufferVtbl
;
1691 This
->super
.refs
= 1;
1692 This
->super
.dest_context
= dest_context
;
1693 This
->super
.dest_context_data
= dest_context_data
;
1695 This
->oxid
= apartment_getoxid(apt
);
1696 This
->server_pid
= oxid_info
->dwPid
;
1700 *chan
= &This
->super
.IRpcChannelBuffer_iface
;
1705 HRESULT
rpc_create_serverchannel(DWORD dest_context
, void *dest_context_data
, IRpcChannelBuffer
**chan
)
1707 RpcChannelBuffer
*This
= malloc(sizeof(*This
));
1709 return E_OUTOFMEMORY
;
1711 This
->IRpcChannelBuffer_iface
.lpVtbl
= &ServerRpcChannelBufferVtbl
;
1713 This
->dest_context
= dest_context
;
1714 This
->dest_context_data
= dest_context_data
;
1716 *chan
= &This
->IRpcChannelBuffer_iface
;
1721 /* unmarshals ORPC_EXTENT_ARRAY according to NDR rules, but doesn't allocate
1723 static HRESULT
unmarshal_ORPC_EXTENT_ARRAY(RPC_MESSAGE
*msg
, const char *end
,
1724 ORPC_EXTENT_ARRAY
*extensions
,
1725 WIRE_ORPC_EXTENT
**first_wire_orpc_extent
)
1730 memcpy(extensions
, msg
->Buffer
, FIELD_OFFSET(WIRE_ORPC_EXTENT_ARRAY
, extent
));
1731 msg
->Buffer
= (char *)msg
->Buffer
+ FIELD_OFFSET(WIRE_ORPC_EXTENT_ARRAY
, extent
);
1733 if ((const char *)msg
->Buffer
+ 2 * sizeof(DWORD
) > end
)
1734 return RPC_E_INVALID_HEADER
;
1736 pointer_id
= *(DWORD
*)msg
->Buffer
;
1737 msg
->Buffer
= (char *)msg
->Buffer
+ sizeof(DWORD
);
1738 extensions
->extent
= NULL
;
1742 WIRE_ORPC_EXTENT
*wire_orpc_extent
;
1745 if (*(DWORD
*)msg
->Buffer
!= ((extensions
->size
+1)&~1))
1746 return RPC_S_INVALID_BOUND
;
1748 msg
->Buffer
= (char *)msg
->Buffer
+ sizeof(DWORD
);
1750 /* arbitrary limit for security (don't know what native does) */
1751 if (extensions
->size
> 256)
1753 ERR("too many extensions: %ld\n", extensions
->size
);
1754 return RPC_S_INVALID_BOUND
;
1757 *first_wire_orpc_extent
= wire_orpc_extent
= msg
->Buffer
;
1758 for (i
= 0; i
< ((extensions
->size
+1)&~1); i
++)
1760 if ((const char *)&wire_orpc_extent
->data
[0] > end
)
1761 return RPC_S_INVALID_BOUND
;
1762 if (wire_orpc_extent
->conformance
!= ((wire_orpc_extent
->size
+7)&~7))
1763 return RPC_S_INVALID_BOUND
;
1764 if ((const char *)&wire_orpc_extent
->data
[wire_orpc_extent
->conformance
] > end
)
1765 return RPC_S_INVALID_BOUND
;
1766 TRACE("size %lu, guid %s\n", wire_orpc_extent
->size
, debugstr_guid(&wire_orpc_extent
->id
));
1767 wire_orpc_extent
= (WIRE_ORPC_EXTENT
*)&wire_orpc_extent
->data
[wire_orpc_extent
->conformance
];
1769 msg
->Buffer
= wire_orpc_extent
;
1775 /* unmarshals ORPCTHIS according to NDR rules, but doesn't allocate any memory */
1776 static HRESULT
unmarshal_ORPCTHIS(RPC_MESSAGE
*msg
, ORPCTHIS
*orpcthis
,
1777 ORPC_EXTENT_ARRAY
*orpc_ext_array
, WIRE_ORPC_EXTENT
**first_wire_orpc_extent
)
1779 const char *end
= (char *)msg
->Buffer
+ msg
->BufferLength
;
1781 *first_wire_orpc_extent
= NULL
;
1783 if (msg
->BufferLength
< FIELD_OFFSET(WIRE_ORPCTHIS
, extensions
) + sizeof(DWORD
))
1785 ERR("invalid buffer length\n");
1786 return RPC_E_INVALID_HEADER
;
1789 memcpy(orpcthis
, msg
->Buffer
, FIELD_OFFSET(WIRE_ORPCTHIS
, extensions
));
1790 msg
->Buffer
= (char *)msg
->Buffer
+ FIELD_OFFSET(WIRE_ORPCTHIS
, extensions
);
1792 if ((const char *)msg
->Buffer
+ sizeof(DWORD
) > end
)
1793 return RPC_E_INVALID_HEADER
;
1795 if (*(DWORD
*)msg
->Buffer
)
1796 orpcthis
->extensions
= orpc_ext_array
;
1798 orpcthis
->extensions
= NULL
;
1800 msg
->Buffer
= (char *)msg
->Buffer
+ sizeof(DWORD
);
1802 if (orpcthis
->extensions
)
1804 HRESULT hr
= unmarshal_ORPC_EXTENT_ARRAY(msg
, end
, orpc_ext_array
,
1805 first_wire_orpc_extent
);
1810 if ((orpcthis
->version
.MajorVersion
!= COM_MAJOR_VERSION
) ||
1811 (orpcthis
->version
.MinorVersion
> COM_MINOR_VERSION
))
1813 ERR("COM version {%d, %d} not supported\n",
1814 orpcthis
->version
.MajorVersion
, orpcthis
->version
.MinorVersion
);
1815 return RPC_E_VERSION_MISMATCH
;
1818 if (orpcthis
->flags
& ~(ORPCF_LOCAL
|ORPCF_RESERVED1
|ORPCF_RESERVED2
|ORPCF_RESERVED3
|ORPCF_RESERVED4
))
1820 ERR("invalid flags %#lx\n", orpcthis
->flags
& ~(ORPCF_LOCAL
|ORPCF_RESERVED1
|ORPCF_RESERVED2
|ORPCF_RESERVED3
|ORPCF_RESERVED4
));
1821 return RPC_E_INVALID_HEADER
;
1827 static HRESULT
unmarshal_ORPCTHAT(RPC_MESSAGE
*msg
, ORPCTHAT
*orpcthat
,
1828 ORPC_EXTENT_ARRAY
*orpc_ext_array
, WIRE_ORPC_EXTENT
**first_wire_orpc_extent
)
1830 const char *end
= (char *)msg
->Buffer
+ msg
->BufferLength
;
1832 *first_wire_orpc_extent
= NULL
;
1834 if (msg
->BufferLength
< FIELD_OFFSET(WIRE_ORPCTHAT
, extensions
) + sizeof(DWORD
))
1836 ERR("invalid buffer length\n");
1837 return RPC_E_INVALID_HEADER
;
1840 memcpy(orpcthat
, msg
->Buffer
, FIELD_OFFSET(WIRE_ORPCTHAT
, extensions
));
1841 msg
->Buffer
= (char *)msg
->Buffer
+ FIELD_OFFSET(WIRE_ORPCTHAT
, extensions
);
1843 if ((const char *)msg
->Buffer
+ sizeof(DWORD
) > end
)
1844 return RPC_E_INVALID_HEADER
;
1846 if (*(DWORD
*)msg
->Buffer
)
1847 orpcthat
->extensions
= orpc_ext_array
;
1849 orpcthat
->extensions
= NULL
;
1851 msg
->Buffer
= (char *)msg
->Buffer
+ sizeof(DWORD
);
1853 if (orpcthat
->extensions
)
1855 HRESULT hr
= unmarshal_ORPC_EXTENT_ARRAY(msg
, end
, orpc_ext_array
,
1856 first_wire_orpc_extent
);
1861 if (orpcthat
->flags
& ~(ORPCF_LOCAL
|ORPCF_RESERVED1
|ORPCF_RESERVED2
|ORPCF_RESERVED3
|ORPCF_RESERVED4
))
1863 ERR("invalid flags %#lx\n", orpcthat
->flags
& ~(ORPCF_LOCAL
|ORPCF_RESERVED1
|ORPCF_RESERVED2
|ORPCF_RESERVED3
|ORPCF_RESERVED4
));
1864 return RPC_E_INVALID_HEADER
;
1870 void rpc_execute_call(struct dispatch_params
*params
)
1872 struct message_state
*message_state
= NULL
;
1873 RPC_MESSAGE
*msg
= (RPC_MESSAGE
*)params
->msg
;
1874 char *original_buffer
= msg
->Buffer
;
1876 ORPC_EXTENT_ARRAY orpc_ext_array
;
1877 WIRE_ORPC_EXTENT
*first_wire_orpc_extent
;
1878 GUID old_causality_id
;
1879 struct tlsdata
*tlsdata
;
1880 struct apartment
*apt
;
1882 if (FAILED(com_get_tlsdata(&tlsdata
)))
1885 apt
= com_get_current_apt();
1887 /* handle ORPCTHIS and server extensions */
1889 params
->hr
= unmarshal_ORPCTHIS(msg
, &orpcthis
, &orpc_ext_array
, &first_wire_orpc_extent
);
1890 if (params
->hr
!= S_OK
)
1892 msg
->Buffer
= original_buffer
;
1896 message_state
= malloc(sizeof(*message_state
));
1899 params
->hr
= E_OUTOFMEMORY
;
1900 msg
->Buffer
= original_buffer
;
1904 message_state
->prefix_data_len
= (char *)msg
->Buffer
- original_buffer
;
1905 message_state
->binding_handle
= msg
->Handle
;
1906 message_state
->bypass_rpcrt
= params
->bypass_rpcrt
;
1908 message_state
->channel_hook_info
.iid
= params
->iid
;
1909 message_state
->channel_hook_info
.cbSize
= sizeof(message_state
->channel_hook_info
);
1910 message_state
->channel_hook_info
.uCausality
= orpcthis
.cid
;
1911 message_state
->channel_hook_info
.dwServerPid
= GetCurrentProcessId();
1912 message_state
->channel_hook_info
.iMethod
= msg
->ProcNum
;
1913 message_state
->channel_hook_info
.pObject
= params
->iface
;
1915 if (orpcthis
.extensions
&& first_wire_orpc_extent
&&
1916 orpcthis
.extensions
->size
)
1917 ChannelHooks_ServerNotify(&message_state
->channel_hook_info
, msg
->DataRepresentation
, first_wire_orpc_extent
, orpcthis
.extensions
->size
);
1919 msg
->Handle
= message_state
;
1920 msg
->BufferLength
-= message_state
->prefix_data_len
;
1922 /* call message filter */
1927 INTERFACEINFO interface_info
;
1930 interface_info
.pUnk
= params
->iface
;
1931 interface_info
.iid
= params
->iid
;
1932 interface_info
.wMethod
= msg
->ProcNum
;
1934 if (IsEqualGUID(&orpcthis
.cid
, &tlsdata
->causality_id
))
1935 calltype
= CALLTYPE_NESTED
;
1936 else if (tlsdata
->pending_call_count_server
== 0)
1937 calltype
= CALLTYPE_TOPLEVEL
;
1939 calltype
= CALLTYPE_TOPLEVEL_CALLPENDING
;
1941 handlecall
= IMessageFilter_HandleInComingCall(apt
->filter
,
1943 UlongToHandle(GetCurrentProcessId()),
1946 TRACE("IMessageFilter_HandleInComingCall returned %ld\n", handlecall
);
1949 case SERVERCALL_REJECTED
:
1950 params
->hr
= RPC_E_CALL_REJECTED
;
1951 goto exit_reset_state
;
1952 case SERVERCALL_RETRYLATER
:
1953 #if 0 /* FIXME: handle retries on the client side before enabling this code */
1954 params
->hr
= RPC_E_RETRY
;
1955 goto exit_reset_state
;
1957 FIXME("retry call later not implemented\n");
1960 case SERVERCALL_ISHANDLED
:
1966 /* invoke the method */
1968 /* save the old causality ID - note: any calls executed while processing
1969 * messages received during the SendReceive will appear to originate from
1970 * this call - this should be checked with what Windows does */
1971 old_causality_id
= tlsdata
->causality_id
;
1972 tlsdata
->causality_id
= orpcthis
.cid
;
1973 tlsdata
->pending_call_count_server
++;
1974 params
->hr
= IRpcStubBuffer_Invoke(params
->stub
, params
->msg
, params
->chan
);
1975 tlsdata
->pending_call_count_server
--;
1976 tlsdata
->causality_id
= old_causality_id
;
1978 /* the invoke allocated a new buffer, so free the old one */
1979 if (message_state
->bypass_rpcrt
&& original_buffer
!= msg
->Buffer
)
1980 free(original_buffer
);
1983 message_state
= msg
->Handle
;
1984 msg
->Handle
= message_state
->binding_handle
;
1985 msg
->Buffer
= (char *)msg
->Buffer
- message_state
->prefix_data_len
;
1986 msg
->BufferLength
+= message_state
->prefix_data_len
;
1989 free(message_state
);
1990 if (params
->handle
) SetEvent(params
->handle
);
1993 static void __RPC_STUB
dispatch_rpc(RPC_MESSAGE
*msg
)
1995 struct dispatch_params
*params
;
1996 struct stub_manager
*stub_manager
;
1997 struct apartment
*apt
;
2001 RpcBindingInqObject(msg
->Handle
, &ipid
);
2003 TRACE("ipid = %s, iMethod = %d\n", debugstr_guid(&ipid
), msg
->ProcNum
);
2005 params
= malloc(sizeof(*params
));
2008 RpcRaiseException(E_OUTOFMEMORY
);
2012 hr
= ipid_get_dispatch_params(&ipid
, &apt
, &stub_manager
, ¶ms
->stub
, ¶ms
->chan
,
2013 ¶ms
->iid
, ¶ms
->iface
);
2016 ERR("no apartment found for ipid %s\n", debugstr_guid(&ipid
));
2018 RpcRaiseException(hr
);
2022 params
->msg
= (RPCOLEMESSAGE
*)msg
;
2023 params
->status
= RPC_S_OK
;
2025 params
->handle
= NULL
;
2026 params
->bypass_rpcrt
= FALSE
;
2028 /* Note: this is the important difference between STAs and MTAs - we
2029 * always execute RPCs to STAs in the thread that originally created the
2030 * apartment (i.e. the one that pumps messages to the window) */
2031 if (!apt
->multi_threaded
)
2033 params
->handle
= CreateEventW(NULL
, FALSE
, FALSE
, NULL
);
2035 TRACE("Calling apartment thread %#lx...\n", apt
->tid
);
2037 if (PostMessageW(apartment_getwindow(apt
), DM_EXECUTERPC
, 0, (LPARAM
)params
))
2038 WaitForSingleObject(params
->handle
, INFINITE
);
2041 ERR("PostMessage failed with error %lu\n", GetLastError());
2042 IRpcChannelBuffer_Release(params
->chan
);
2043 IRpcStubBuffer_Release(params
->stub
);
2045 CloseHandle(params
->handle
);
2049 BOOL joined
= FALSE
;
2050 struct tlsdata
*tlsdata
;
2052 com_get_tlsdata(&tlsdata
);
2056 enter_apartment(tlsdata
, COINIT_MULTITHREADED
);
2059 rpc_execute_call(params
);
2062 leave_apartment(tlsdata
);
2068 IRpcChannelBuffer_Release(params
->chan
);
2070 IRpcStubBuffer_Release(params
->stub
);
2073 stub_manager_int_release(stub_manager
);
2074 apartment_release(apt
);
2076 /* if IRpcStubBuffer_Invoke fails, we should raise an exception to tell
2077 * the RPC runtime that the call failed */
2078 if (hr
!= S_OK
) RpcRaiseException(hr
);
2081 /* stub registration */
2082 HRESULT
rpc_register_interface(REFIID riid
)
2084 struct registered_if
*rif
;
2088 TRACE("(%s)\n", debugstr_guid(riid
));
2090 EnterCriticalSection(&csRegIf
);
2091 LIST_FOR_EACH_ENTRY(rif
, ®istered_interfaces
, struct registered_if
, entry
)
2093 if (IsEqualGUID(&rif
->If
.InterfaceId
.SyntaxGUID
, riid
))
2102 TRACE("Creating new interface\n");
2104 rif
= calloc(1, sizeof(*rif
));
2110 rif
->If
.Length
= sizeof(RPC_SERVER_INTERFACE
);
2111 /* RPC interface ID = COM interface ID */
2112 rif
->If
.InterfaceId
.SyntaxGUID
= *riid
;
2113 rif
->If
.DispatchTable
= &rpc_dispatch
;
2114 /* all other fields are 0, including the version asCOM objects
2115 * always have a version of 0.0 */
2116 status
= RpcServerRegisterIfEx(
2117 (RPC_IF_HANDLE
)&rif
->If
,
2119 RPC_IF_OLE
| RPC_IF_AUTOLISTEN
,
2120 RPC_C_LISTEN_MAX_CALLS_DEFAULT
,
2122 if (status
== RPC_S_OK
)
2123 list_add_tail(®istered_interfaces
, &rif
->entry
);
2126 ERR("RpcServerRegisterIfEx failed with error %ld\n", status
);
2128 hr
= HRESULT_FROM_WIN32(status
);
2134 LeaveCriticalSection(&csRegIf
);
2138 /* stub unregistration */
2139 void rpc_unregister_interface(REFIID riid
, BOOL wait
)
2141 struct registered_if
*rif
;
2142 EnterCriticalSection(&csRegIf
);
2143 LIST_FOR_EACH_ENTRY(rif
, ®istered_interfaces
, struct registered_if
, entry
)
2145 if (IsEqualGUID(&rif
->If
.InterfaceId
.SyntaxGUID
, riid
))
2149 RpcServerUnregisterIf((RPC_IF_HANDLE
)&rif
->If
, NULL
, wait
);
2150 list_remove(&rif
->entry
);
2156 LeaveCriticalSection(&csRegIf
);
2159 /* get the info for an OXID, including the IPID for the rem unknown interface
2160 * and the string binding */
2161 HRESULT
rpc_resolve_oxid(OXID oxid
, OXID_INFO
*oxid_info
)
2163 TRACE("%s\n", wine_dbgstr_longlong(oxid
));
2165 oxid_info
->dwTid
= 0;
2166 oxid_info
->dwPid
= 0;
2167 oxid_info
->dwAuthnHint
= RPC_C_AUTHN_LEVEL_NONE
;
2168 /* FIXME: this is a hack around not having an OXID resolver yet -
2169 * this function should contact the machine's OXID resolver and then it
2170 * should give us the IPID of the IRemUnknown interface */
2171 oxid_info
->ipidRemUnknown
.Data1
= 0xffffffff;
2172 oxid_info
->ipidRemUnknown
.Data2
= 0xffff;
2173 oxid_info
->ipidRemUnknown
.Data3
= 0xffff;
2174 memcpy(oxid_info
->ipidRemUnknown
.Data4
, &oxid
, sizeof(OXID
));
2175 oxid_info
->psa
= NULL
/* FIXME */;
2180 /* make the apartment reachable by other threads and processes and create the
2181 * IRemUnknown object */
2182 void rpc_start_remoting(struct apartment
*apt
)
2184 if (!InterlockedExchange(&apt
->remoting_started
, TRUE
))
2186 WCHAR endpoint
[200];
2189 get_rpc_endpoint(endpoint
, &apt
->oxid
);
2191 status
= RpcServerUseProtseqEpW(
2193 RPC_C_PROTSEQ_MAX_REQS_DEFAULT
,
2196 if (status
!= RPC_S_OK
)
2197 ERR("Couldn't register endpoint %s\n", debugstr_w(endpoint
));
2199 /* FIXME: move remote unknown exporting into this function */
2201 start_apartment_remote_unknown(apt
);
2204 /******************************************************************************
2205 * DllDebugObjectRPCHook (combase.@)
2207 BOOL WINAPI
DllDebugObjectRPCHook(BOOL trace
, /* ORPC_INIT_ARGS * */ void *args
)
2209 FIXME("%d, %p: stub\n", trace
, args
);
2214 /******************************************************************************
2215 * CoDecodeProxy (combase.@)
2217 HRESULT WINAPI
CoDecodeProxy(DWORD client_pid
, UINT64 proxy_addr
, ServerInformation
*server_info
)
2219 FIXME("%lx, %s, %p.\n", client_pid
, wine_dbgstr_longlong(proxy_addr
), server_info
);