| // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 
 | // Use of this source code is governed by a BSD-style license that can be | 
 | // found in the LICENSE file. | 
 |  | 
 | #include "base/win/win_util.h" | 
 |  | 
 | #include <aclapi.h> | 
 | #include <cfgmgr32.h> | 
 | #include <initguid.h> | 
 | #include <powrprof.h> | 
 | #include <shobjidl.h>  // Must be before propkey. | 
 |  | 
 | #include <inspectable.h> | 
 | #include <mdmregistration.h> | 
 | #include <objbase.h> | 
 | #include <propkey.h> | 
 | #include <propvarutil.h> | 
 | #include <psapi.h> | 
 | #include <roapi.h> | 
 | #include <sddl.h> | 
 | #include <setupapi.h> | 
 | #include <shellscalingapi.h> | 
 | #include <shlwapi.h> | 
 | #include <signal.h> | 
 | #include <stddef.h> | 
 | #include <stdlib.h> | 
 | #include <tchar.h>  // Must be before tpcshrd.h or for any use of _T macro | 
 | #include <tpcshrd.h> | 
 | #include <uiviewsettingsinterop.h> | 
 | #include <windows.ui.viewmanagement.h> | 
 | #include <winstring.h> | 
 | #include <wrl/client.h> | 
 | #include <wrl/wrappers/corewrappers.h> | 
 |  | 
 | #include <memory> | 
 |  | 
 | #include "base/base_switches.h" | 
 | #include "base/command_line.h" | 
 | #include "base/files/file_path.h" | 
 | #include "base/logging.h" | 
 | #include "base/macros.h" | 
 | #include "base/scoped_native_library.h" | 
 | #include "base/strings/string_util.h" | 
 | #include "base/strings/stringprintf.h" | 
 | #include "base/strings/utf_string_conversions.h" | 
 | #include "base/threading/thread_restrictions.h" | 
 | #include "base/win/core_winrt_util.h" | 
 | #include "base/win/registry.h" | 
 | #include "base/win/scoped_co_mem.h" | 
 | #include "base/win/scoped_handle.h" | 
 | #include "base/win/scoped_hstring.h" | 
 | #include "base/win/scoped_propvariant.h" | 
 | #include "base/win/win_client_metrics.h" | 
 | #include "base/win/windows_version.h" | 
 |  | 
 | namespace base { | 
 | namespace win { | 
 |  | 
 | namespace { | 
 |  | 
 | // Sets the value of |property_key| to |property_value| in |property_store|. | 
 | bool SetPropVariantValueForPropertyStore( | 
 |     IPropertyStore* property_store, | 
 |     const PROPERTYKEY& property_key, | 
 |     const ScopedPropVariant& property_value) { | 
 |   DCHECK(property_store); | 
 |  | 
 |   HRESULT result = property_store->SetValue(property_key, property_value.get()); | 
 |   if (result == S_OK) | 
 |     result = property_store->Commit(); | 
 |   if (SUCCEEDED(result)) | 
 |     return true; | 
 | #if DCHECK_IS_ON() | 
 |   ScopedCoMem<OLECHAR> guidString; | 
 |   ::StringFromCLSID(property_key.fmtid, &guidString); | 
 |   if (HRESULT_FACILITY(result) == FACILITY_WIN32) | 
 |     ::SetLastError(HRESULT_CODE(result)); | 
 |   // See third_party/perl/c/i686-w64-mingw32/include/propkey.h for GUID and | 
 |   // PID definitions. | 
 |   DPLOG(ERROR) << "Failed to set property with GUID " << guidString << " PID " | 
 |                << property_key.pid; | 
 | #endif | 
 |   return false; | 
 | } | 
 |  | 
 | void __cdecl ForceCrashOnSigAbort(int) { | 
 |   *((volatile int*)0) = 0x1337; | 
 | } | 
 |  | 
 | // Returns the current platform role. We use the PowerDeterminePlatformRoleEx | 
 | // API for that. | 
 | POWER_PLATFORM_ROLE GetPlatformRole() { | 
 |   return PowerDeterminePlatformRoleEx(POWER_PLATFORM_ROLE_V2); | 
 | } | 
 |  | 
 | // Method used for Windows 8.1 and later. | 
 | // Since we support versions earlier than 8.1, we must dynamically load this | 
 | // function from user32.dll, so it won't fail to load in runtime. For earlier | 
 | // Windows versions GetProcAddress will return null and report failure so that | 
 | // callers can fall back on the deprecated SetProcessDPIAware. | 
 | bool SetProcessDpiAwarenessWrapper(PROCESS_DPI_AWARENESS value) { | 
 |   decltype(&::SetProcessDpiAwareness) set_process_dpi_awareness_func = | 
 |       reinterpret_cast<decltype(&::SetProcessDpiAwareness)>(GetProcAddress( | 
 |           GetModuleHandle(L"user32.dll"), "SetProcessDpiAwarenessInternal")); | 
 |   if (set_process_dpi_awareness_func) { | 
 |     HRESULT hr = set_process_dpi_awareness_func(value); | 
 |     if (SUCCEEDED(hr)) | 
 |       return true; | 
 |     DLOG_IF(ERROR, hr == E_ACCESSDENIED) | 
 |         << "Access denied error from SetProcessDpiAwarenessInternal. Function " | 
 |            "called twice, or manifest was used."; | 
 |     NOTREACHED() | 
 |         << "SetProcessDpiAwarenessInternal failed with unexpected error: " | 
 |         << hr; | 
 |     return false; | 
 |   } | 
 |  | 
 |   DCHECK_LT(GetVersion(), VERSION_WIN8_1) << "SetProcessDpiAwarenessInternal " | 
 |                                              "should be available on all " | 
 |                                              "platforms >= Windows 8.1"; | 
 |   return false; | 
 | } | 
 |  | 
 | }  // namespace | 
 |  | 
 | // Uses the Windows 10 WRL API's to query the current system state. The API's | 
 | // we are using in the function below are supported in Win32 apps as per msdn. | 
 | // It looks like the API implementation is buggy at least on Surface 4 causing | 
 | // it to always return UserInteractionMode_Touch which as per documentation | 
 | // indicates tablet mode. | 
 | bool IsWindows10TabletMode(HWND hwnd) { | 
 |   if (GetVersion() < VERSION_WIN10) | 
 |     return false; | 
 |  | 
 |   if (!ResolveCoreWinRTDelayload() || | 
 |       !ScopedHString::ResolveCoreWinRTStringDelayload()) { | 
 |     return false; | 
 |   } | 
 |  | 
 |   ScopedHString view_settings_guid = ScopedHString::Create( | 
 |       RuntimeClass_Windows_UI_ViewManagement_UIViewSettings); | 
 |   Microsoft::WRL::ComPtr<IUIViewSettingsInterop> view_settings_interop; | 
 |   HRESULT hr = base::win::RoGetActivationFactory( | 
 |       view_settings_guid.get(), IID_PPV_ARGS(&view_settings_interop)); | 
 |   if (FAILED(hr)) | 
 |     return false; | 
 |  | 
 |   Microsoft::WRL::ComPtr<ABI::Windows::UI::ViewManagement::IUIViewSettings> | 
 |       view_settings; | 
 |   hr = view_settings_interop->GetForWindow(hwnd, IID_PPV_ARGS(&view_settings)); | 
 |   if (FAILED(hr)) | 
 |     return false; | 
 |  | 
 |   ABI::Windows::UI::ViewManagement::UserInteractionMode mode = | 
 |       ABI::Windows::UI::ViewManagement::UserInteractionMode_Mouse; | 
 |   view_settings->get_UserInteractionMode(&mode); | 
 |   return mode == ABI::Windows::UI::ViewManagement::UserInteractionMode_Touch; | 
 | } | 
 |  | 
 | // Returns true if a physical keyboard is detected on Windows 8 and up. | 
 | // Uses the Setup APIs to enumerate the attached keyboards and returns true | 
 | // if the keyboard count is 1 or more.. While this will work in most cases | 
 | // it won't work if there are devices which expose keyboard interfaces which | 
 | // are attached to the machine. | 
 | bool IsKeyboardPresentOnSlate(std::string* reason, HWND hwnd) { | 
 |   bool result = false; | 
 |  | 
 |   if (GetVersion() < VERSION_WIN8) { | 
 |     if (reason) | 
 |       *reason = "Detection not supported"; | 
 |     return false; | 
 |   } | 
 |  | 
 |   // This function is only supported for Windows 8 and up. | 
 |   if (CommandLine::ForCurrentProcess()->HasSwitch( | 
 |           switches::kDisableUsbKeyboardDetect)) { | 
 |     if (reason) | 
 |       *reason = "Detection disabled"; | 
 |     return false; | 
 |   } | 
 |  | 
 |   // This function should be only invoked for machines with touch screens. | 
 |   if ((GetSystemMetrics(SM_DIGITIZER) & NID_INTEGRATED_TOUCH) | 
 |         != NID_INTEGRATED_TOUCH) { | 
 |     if (reason) { | 
 |       *reason += "NID_INTEGRATED_TOUCH\n"; | 
 |       result = true; | 
 |     } else { | 
 |       return true; | 
 |     } | 
 |   } | 
 |  | 
 |   // If it is a tablet device we assume that there is no keyboard attached. | 
 |   if (IsTabletDevice(reason, hwnd)) { | 
 |     if (reason) | 
 |       *reason += "Tablet device.\n"; | 
 |     return false; | 
 |   } else { | 
 |     if (reason) { | 
 |       *reason += "Not a tablet device"; | 
 |       result = true; | 
 |     } else { | 
 |       return true; | 
 |     } | 
 |   } | 
 |  | 
 |   // To determine whether a keyboard is present on the device, we do the | 
 |   // following:- | 
 |   // 1. Check whether the device supports auto rotation. If it does then | 
 |   //    it possibly supports flipping from laptop to slate mode. If it | 
 |   //    does not support auto rotation, then we assume it is a desktop | 
 |   //    or a normal laptop and assume that there is a keyboard. | 
 |  | 
 |   // 2. If the device supports auto rotation, then we get its platform role | 
 |   //    and check the system metric SM_CONVERTIBLESLATEMODE to see if it is | 
 |   //    being used in slate mode. If yes then we return false here to ensure | 
 |   //    that the OSK is displayed. | 
 |  | 
 |   // 3. If step 1 and 2 fail then we check attached keyboards and return true | 
 |   //    if we find ACPI\* or HID\VID* keyboards. | 
 |  | 
 |   typedef BOOL (WINAPI* GetAutoRotationState)(PAR_STATE state); | 
 |  | 
 |   GetAutoRotationState get_rotation_state = | 
 |       reinterpret_cast<GetAutoRotationState>(::GetProcAddress( | 
 |           GetModuleHandle(L"user32.dll"), "GetAutoRotationState")); | 
 |  | 
 |   if (get_rotation_state) { | 
 |     AR_STATE auto_rotation_state = AR_ENABLED; | 
 |     get_rotation_state(&auto_rotation_state); | 
 |     if ((auto_rotation_state & AR_NOSENSOR) || | 
 |         (auto_rotation_state & AR_NOT_SUPPORTED)) { | 
 |       // If there is no auto rotation sensor or rotation is not supported in | 
 |       // the current configuration, then we can assume that this is a desktop | 
 |       // or a traditional laptop. | 
 |       if (reason) { | 
 |         *reason += (auto_rotation_state & AR_NOSENSOR) ? "AR_NOSENSOR\n" : | 
 |                                                          "AR_NOT_SUPPORTED\n"; | 
 |         result = true; | 
 |       } else { | 
 |         return true; | 
 |       } | 
 |     } | 
 |   } | 
 |  | 
 |   const GUID KEYBOARD_CLASS_GUID = | 
 |       { 0x4D36E96B, 0xE325,  0x11CE, | 
 |           { 0xBF, 0xC1, 0x08, 0x00, 0x2B, 0xE1, 0x03, 0x18 } }; | 
 |  | 
 |   // Query for all the keyboard devices. | 
 |   HDEVINFO device_info = | 
 |       SetupDiGetClassDevs(&KEYBOARD_CLASS_GUID, NULL, NULL, DIGCF_PRESENT); | 
 |   if (device_info == INVALID_HANDLE_VALUE) { | 
 |     if (reason) | 
 |       *reason += "No keyboard info\n"; | 
 |     return result; | 
 |   } | 
 |  | 
 |   // Enumerate all keyboards and look for ACPI\PNP and HID\VID devices. If | 
 |   // the count is more than 1 we assume that a keyboard is present. This is | 
 |   // under the assumption that there will always be one keyboard device. | 
 |   for (DWORD i = 0;; ++i) { | 
 |     SP_DEVINFO_DATA device_info_data = { 0 }; | 
 |     device_info_data.cbSize = sizeof(device_info_data); | 
 |     if (!SetupDiEnumDeviceInfo(device_info, i, &device_info_data)) | 
 |       break; | 
 |  | 
 |     // Get the device ID. | 
 |     wchar_t device_id[MAX_DEVICE_ID_LEN]; | 
 |     CONFIGRET status = CM_Get_Device_ID(device_info_data.DevInst, | 
 |                                         device_id, | 
 |                                         MAX_DEVICE_ID_LEN, | 
 |                                         0); | 
 |     if (status == CR_SUCCESS) { | 
 |       // To reduce the scope of the hack we only look for ACPI and HID\\VID | 
 |       // prefixes in the keyboard device ids. | 
 |       if (StartsWith(device_id, L"ACPI", CompareCase::INSENSITIVE_ASCII) || | 
 |           StartsWith(device_id, L"HID\\VID", CompareCase::INSENSITIVE_ASCII)) { | 
 |         if (reason) { | 
 |           *reason += "device: "; | 
 |           *reason += WideToUTF8(device_id); | 
 |           *reason += '\n'; | 
 |         } | 
 |         // The heuristic we are using is to check the count of keyboards and | 
 |         // return true if the API's report one or more keyboards. Please note | 
 |         // that this will break for non keyboard devices which expose a | 
 |         // keyboard PDO. | 
 |         result = true; | 
 |       } | 
 |     } | 
 |   } | 
 |   return result; | 
 | } | 
 |  | 
 | static bool g_crash_on_process_detach = false; | 
 |  | 
 | void GetNonClientMetrics(NONCLIENTMETRICS_XP* metrics) { | 
 |   DCHECK(metrics); | 
 |   metrics->cbSize = sizeof(*metrics); | 
 |   const bool success = !!SystemParametersInfo( | 
 |       SPI_GETNONCLIENTMETRICS, | 
 |       metrics->cbSize, | 
 |       reinterpret_cast<NONCLIENTMETRICS*>(metrics), | 
 |       0); | 
 |   DCHECK(success); | 
 | } | 
 |  | 
 | bool GetUserSidString(std::wstring* user_sid) { | 
 |   // Get the current token. | 
 |   HANDLE token = NULL; | 
 |   if (!::OpenProcessToken(::GetCurrentProcess(), TOKEN_QUERY, &token)) | 
 |     return false; | 
 |   ScopedHandle token_scoped(token); | 
 |  | 
 |   DWORD size = sizeof(TOKEN_USER) + SECURITY_MAX_SID_SIZE; | 
 |   std::unique_ptr<BYTE[]> user_bytes(new BYTE[size]); | 
 |   TOKEN_USER* user = reinterpret_cast<TOKEN_USER*>(user_bytes.get()); | 
 |  | 
 |   if (!::GetTokenInformation(token, TokenUser, user, size, &size)) | 
 |     return false; | 
 |  | 
 |   if (!user->User.Sid) | 
 |     return false; | 
 |  | 
 |   // Convert the data to a string. | 
 |   wchar_t* sid_string; | 
 |   if (!::ConvertSidToStringSid(user->User.Sid, &sid_string)) | 
 |     return false; | 
 |  | 
 |   *user_sid = sid_string; | 
 |  | 
 |   ::LocalFree(sid_string); | 
 |  | 
 |   return true; | 
 | } | 
 |  | 
 | bool UserAccountControlIsEnabled() { | 
 |   // This can be slow if Windows ends up going to disk.  Should watch this key | 
 |   // for changes and only read it once, preferably on the file thread. | 
 |   //   http://code.google.com/p/chromium/issues/detail?id=61644 | 
 |   ThreadRestrictions::ScopedAllowIO allow_io; | 
 |  | 
 |   RegKey key(HKEY_LOCAL_MACHINE, | 
 |              L"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\System", | 
 |              KEY_READ); | 
 |   DWORD uac_enabled; | 
 |   if (key.ReadValueDW(L"EnableLUA", &uac_enabled) != ERROR_SUCCESS) | 
 |     return true; | 
 |   // Users can set the EnableLUA value to something arbitrary, like 2, which | 
 |   // Vista will treat as UAC enabled, so we make sure it is not set to 0. | 
 |   return (uac_enabled != 0); | 
 | } | 
 |  | 
 | bool SetBooleanValueForPropertyStore(IPropertyStore* property_store, | 
 |                                      const PROPERTYKEY& property_key, | 
 |                                      bool property_bool_value) { | 
 |   ScopedPropVariant property_value; | 
 |   if (FAILED(InitPropVariantFromBoolean(property_bool_value, | 
 |                                         property_value.Receive()))) { | 
 |     return false; | 
 |   } | 
 |  | 
 |   return SetPropVariantValueForPropertyStore(property_store, | 
 |                                              property_key, | 
 |                                              property_value); | 
 | } | 
 |  | 
 | bool SetStringValueForPropertyStore(IPropertyStore* property_store, | 
 |                                     const PROPERTYKEY& property_key, | 
 |                                     const wchar_t* property_string_value) { | 
 |   ScopedPropVariant property_value; | 
 |   if (FAILED(InitPropVariantFromString(property_string_value, | 
 |                                        property_value.Receive()))) { | 
 |     return false; | 
 |   } | 
 |  | 
 |   return SetPropVariantValueForPropertyStore(property_store, | 
 |                                              property_key, | 
 |                                              property_value); | 
 | } | 
 |  | 
 | bool SetClsidForPropertyStore(IPropertyStore* property_store, | 
 |                               const PROPERTYKEY& property_key, | 
 |                               const CLSID& property_clsid_value) { | 
 |   ScopedPropVariant property_value; | 
 |   if (FAILED(InitPropVariantFromCLSID(property_clsid_value, | 
 |                                       property_value.Receive()))) { | 
 |     return false; | 
 |   } | 
 |  | 
 |   return SetPropVariantValueForPropertyStore(property_store, property_key, | 
 |                                              property_value); | 
 | } | 
 |  | 
 | bool SetAppIdForPropertyStore(IPropertyStore* property_store, | 
 |                               const wchar_t* app_id) { | 
 |   // App id should be less than 64 chars and contain no space. And recommended | 
 |   // format is CompanyName.ProductName[.SubProduct.ProductNumber]. | 
 |   // See http://msdn.microsoft.com/en-us/library/dd378459%28VS.85%29.aspx | 
 |   DCHECK(lstrlen(app_id) < 64 && wcschr(app_id, L' ') == NULL); | 
 |  | 
 |   return SetStringValueForPropertyStore(property_store, | 
 |                                         PKEY_AppUserModel_ID, | 
 |                                         app_id); | 
 | } | 
 |  | 
 | static const char16 kAutoRunKeyPath[] = | 
 |     L"Software\\Microsoft\\Windows\\CurrentVersion\\Run"; | 
 |  | 
 | bool AddCommandToAutoRun(HKEY root_key, const string16& name, | 
 |                          const string16& command) { | 
 |   RegKey autorun_key(root_key, kAutoRunKeyPath, KEY_SET_VALUE); | 
 |   return (autorun_key.WriteValue(name.c_str(), command.c_str()) == | 
 |       ERROR_SUCCESS); | 
 | } | 
 |  | 
 | bool RemoveCommandFromAutoRun(HKEY root_key, const string16& name) { | 
 |   RegKey autorun_key(root_key, kAutoRunKeyPath, KEY_SET_VALUE); | 
 |   return (autorun_key.DeleteValue(name.c_str()) == ERROR_SUCCESS); | 
 | } | 
 |  | 
 | bool ReadCommandFromAutoRun(HKEY root_key, | 
 |                             const string16& name, | 
 |                             string16* command) { | 
 |   RegKey autorun_key(root_key, kAutoRunKeyPath, KEY_QUERY_VALUE); | 
 |   return (autorun_key.ReadValue(name.c_str(), command) == ERROR_SUCCESS); | 
 | } | 
 |  | 
 | void SetShouldCrashOnProcessDetach(bool crash) { | 
 |   g_crash_on_process_detach = crash; | 
 | } | 
 |  | 
 | bool ShouldCrashOnProcessDetach() { | 
 |   return g_crash_on_process_detach; | 
 | } | 
 |  | 
 | void SetAbortBehaviorForCrashReporting() { | 
 |   // Prevent CRT's abort code from prompting a dialog or trying to "report" it. | 
 |   // Disabling the _CALL_REPORTFAULT behavior is important since otherwise it | 
 |   // has the sideffect of clearing our exception filter, which means we | 
 |   // don't get any crash. | 
 |   _set_abort_behavior(0, _WRITE_ABORT_MSG | _CALL_REPORTFAULT); | 
 |  | 
 |   // Set a SIGABRT handler for good measure. We will crash even if the default | 
 |   // is left in place, however this allows us to crash earlier. And it also | 
 |   // lets us crash in response to code which might directly call raise(SIGABRT) | 
 |   signal(SIGABRT, ForceCrashOnSigAbort); | 
 | } | 
 |  | 
 | bool IsTabletDevice(std::string* reason, HWND hwnd) { | 
 |   if (GetVersion() < VERSION_WIN8) { | 
 |     if (reason) | 
 |       *reason = "Tablet device detection not supported below Windows 8\n"; | 
 |     return false; | 
 |   } | 
 |  | 
 |   if (IsWindows10TabletMode(hwnd)) | 
 |     return true; | 
 |  | 
 |   return IsDeviceUsedAsATablet(reason); | 
 | } | 
 |  | 
 | // This method is used to set the right interactions media queries, | 
 | // see https://drafts.csswg.org/mediaqueries-4/#mf-interaction. It doesn't | 
 | // check the Windows 10 tablet mode because it doesn't reflect the actual | 
 | // input configuration of the device and can be manually triggered by the user | 
 | // independently from the hardware state. | 
 | bool IsDeviceUsedAsATablet(std::string* reason) { | 
 |   if (GetVersion() < VERSION_WIN8) { | 
 |     if (reason) | 
 |       *reason = "Tablet device detection not supported below Windows 8\n"; | 
 |     return false; | 
 |   } | 
 |  | 
 |   if (GetSystemMetrics(SM_MAXIMUMTOUCHES) == 0) { | 
 |     if (reason) { | 
 |       *reason += "Device does not support touch.\n"; | 
 |     } else { | 
 |       return false; | 
 |     } | 
 |   } | 
 |  | 
 |   // If the device is docked, the user is treating the device as a PC. | 
 |   if (GetSystemMetrics(SM_SYSTEMDOCKED) != 0) { | 
 |     if (reason) { | 
 |       *reason += "SM_SYSTEMDOCKED\n"; | 
 |     } else { | 
 |       return false; | 
 |     } | 
 |   } | 
 |  | 
 |   // If the device is not supporting rotation, it's unlikely to be a tablet, | 
 |   // a convertible or a detachable. | 
 |   // See | 
 |   // https://msdn.microsoft.com/en-us/library/windows/desktop/dn629263(v=vs.85).aspx | 
 |   typedef decltype(GetAutoRotationState)* GetAutoRotationStateType; | 
 |   GetAutoRotationStateType get_auto_rotation_state_func = | 
 |       reinterpret_cast<GetAutoRotationStateType>(GetProcAddress( | 
 |           GetModuleHandle(L"user32.dll"), "GetAutoRotationState")); | 
 |  | 
 |   if (get_auto_rotation_state_func) { | 
 |     AR_STATE rotation_state = AR_ENABLED; | 
 |     if (get_auto_rotation_state_func(&rotation_state) && | 
 |         (rotation_state & (AR_NOT_SUPPORTED | AR_LAPTOP | AR_NOSENSOR)) != 0) | 
 |       return false; | 
 |   } | 
 |  | 
 |   // PlatformRoleSlate was added in Windows 8+. | 
 |   POWER_PLATFORM_ROLE role = GetPlatformRole(); | 
 |   bool is_tablet = false; | 
 |   if (role == PlatformRoleMobile || role == PlatformRoleSlate) { | 
 |     is_tablet = !GetSystemMetrics(SM_CONVERTIBLESLATEMODE); | 
 |     if (!is_tablet) { | 
 |       if (reason) { | 
 |         *reason += "Not in slate mode.\n"; | 
 |       } else { | 
 |         return false; | 
 |       } | 
 |     } else { | 
 |       if (reason) { | 
 |         *reason += (role == PlatformRoleMobile) ? "PlatformRoleMobile\n" | 
 |                                                 : "PlatformRoleSlate\n"; | 
 |       } | 
 |     } | 
 |   } else { | 
 |     if (reason) | 
 |       *reason += "Device role is not mobile or slate.\n"; | 
 |   } | 
 |   return is_tablet; | 
 | } | 
 |  | 
 | enum DomainEnrollmentState {UNKNOWN = -1, NOT_ENROLLED, ENROLLED}; | 
 | static volatile long int g_domain_state = UNKNOWN; | 
 |  | 
 | bool IsEnrolledToDomain() { | 
 |   // Doesn't make any sense to retry inside a user session because joining a | 
 |   // domain will only kick in on a restart. | 
 |   if (g_domain_state == UNKNOWN) { | 
 |     ::InterlockedCompareExchange(&g_domain_state, | 
 |                                  IsOS(OS_DOMAINMEMBER) ? | 
 |                                      ENROLLED : NOT_ENROLLED, | 
 |                                  UNKNOWN); | 
 |   } | 
 |  | 
 |   return g_domain_state == ENROLLED; | 
 | } | 
 |  | 
 | bool IsDeviceRegisteredWithManagement() { | 
 |   static bool is_device_registered_with_management = []() { | 
 |     ScopedNativeLibrary library( | 
 |         FilePath(FILE_PATH_LITERAL("MDMRegistration.dll"))); | 
 |     if (!library.is_valid()) | 
 |       return false; | 
 |  | 
 |     using IsDeviceRegisteredWithManagementFunction = | 
 |         decltype(&::IsDeviceRegisteredWithManagement); | 
 |     IsDeviceRegisteredWithManagementFunction | 
 |         is_device_registered_with_management_function = | 
 |             reinterpret_cast<IsDeviceRegisteredWithManagementFunction>( | 
 |                 library.GetFunctionPointer("IsDeviceRegisteredWithManagement")); | 
 |     if (!is_device_registered_with_management_function) | 
 |       return false; | 
 |  | 
 |     BOOL is_managed = false; | 
 |     HRESULT hr = | 
 |         is_device_registered_with_management_function(&is_managed, 0, nullptr); | 
 |     return SUCCEEDED(hr) && is_managed; | 
 |   }(); | 
 |   return is_device_registered_with_management; | 
 | } | 
 |  | 
 | bool IsEnterpriseManaged() { | 
 |   // TODO(rogerta): this function should really be: | 
 |   // | 
 |   //    return IsEnrolledToDomain() || IsDeviceRegisteredWithManagement(); | 
 |   // | 
 |   // However, for now it is decided to collect some UMA metrics about | 
 |   // IsDeviceRegisteredWithMdm() before changing chrome's behavior. | 
 |   return IsEnrolledToDomain(); | 
 | } | 
 |  | 
 | void SetDomainStateForTesting(bool state) { | 
 |   g_domain_state = state ? ENROLLED : NOT_ENROLLED; | 
 | } | 
 |  | 
 | bool IsUser32AndGdi32Available() { | 
 |   static auto is_user32_and_gdi32_available = []() { | 
 |     // If win32k syscalls aren't disabled, then user32 and gdi32 are available. | 
 |  | 
 |     // Can't disable win32k prior to windows 8. | 
 |     if (GetVersion() < VERSION_WIN8) | 
 |       return true; | 
 |  | 
 |     typedef decltype( | 
 |         GetProcessMitigationPolicy)* GetProcessMitigationPolicyType; | 
 |     GetProcessMitigationPolicyType get_process_mitigation_policy_func = | 
 |         reinterpret_cast<GetProcessMitigationPolicyType>(GetProcAddress( | 
 |             GetModuleHandle(L"kernel32.dll"), "GetProcessMitigationPolicy")); | 
 |  | 
 |     if (!get_process_mitigation_policy_func) | 
 |       return true; | 
 |  | 
 |     PROCESS_MITIGATION_SYSTEM_CALL_DISABLE_POLICY policy = {}; | 
 |     if (get_process_mitigation_policy_func(GetCurrentProcess(), | 
 |                                            ProcessSystemCallDisablePolicy, | 
 |                                            &policy, sizeof(policy))) { | 
 |       return policy.DisallowWin32kSystemCalls == 0; | 
 |     } | 
 |  | 
 |     return true; | 
 |   }(); | 
 |   return is_user32_and_gdi32_available; | 
 | } | 
 |  | 
 | bool GetLoadedModulesSnapshot(HANDLE process, std::vector<HMODULE>* snapshot) { | 
 |   DCHECK(snapshot); | 
 |   DCHECK_EQ(0u, snapshot->size()); | 
 |   snapshot->resize(128); | 
 |  | 
 |   // We will retry at least once after first determining |bytes_required|. If | 
 |   // the list of modules changes after we receive |bytes_required| we may retry | 
 |   // more than once. | 
 |   int retries_remaining = 5; | 
 |   do { | 
 |     DWORD bytes_required = 0; | 
 |     // EnumProcessModules returns 'success' even if the buffer size is too | 
 |     // small. | 
 |     DCHECK_GE(std::numeric_limits<DWORD>::max(), | 
 |               snapshot->size() * sizeof(HMODULE)); | 
 |     if (!::EnumProcessModules( | 
 |             process, &(*snapshot)[0], | 
 |             static_cast<DWORD>(snapshot->size() * sizeof(HMODULE)), | 
 |             &bytes_required)) { | 
 |       DPLOG(ERROR) << "::EnumProcessModules failed."; | 
 |       return false; | 
 |     } | 
 |     DCHECK_EQ(0u, bytes_required % sizeof(HMODULE)); | 
 |     size_t num_modules = bytes_required / sizeof(HMODULE); | 
 |     if (num_modules <= snapshot->size()) { | 
 |       // Buffer size was too big, presumably because a module was unloaded. | 
 |       snapshot->erase(snapshot->begin() + num_modules, snapshot->end()); | 
 |       return true; | 
 |     } else if (num_modules == 0) { | 
 |       DLOG(ERROR) << "Can't determine the module list size."; | 
 |       return false; | 
 |     } else { | 
 |       // Buffer size was too small. Try again with a larger buffer. A little | 
 |       // more room is given to avoid multiple expensive calls to | 
 |       // ::EnumProcessModules() just because one module has been added. | 
 |       snapshot->resize(num_modules + 8, NULL); | 
 |     } | 
 |   } while (--retries_remaining); | 
 |  | 
 |   DLOG(ERROR) << "Failed to enumerate modules."; | 
 |   return false; | 
 | } | 
 |  | 
 | void EnableFlicks(HWND hwnd) { | 
 |   ::RemoveProp(hwnd, MICROSOFT_TABLETPENSERVICE_PROPERTY); | 
 | } | 
 |  | 
 | void DisableFlicks(HWND hwnd) { | 
 |   ::SetProp(hwnd, MICROSOFT_TABLETPENSERVICE_PROPERTY, | 
 |       reinterpret_cast<HANDLE>(TABLET_DISABLE_FLICKS | | 
 |           TABLET_DISABLE_FLICKFALLBACKKEYS)); | 
 | } | 
 |  | 
 | bool IsProcessPerMonitorDpiAware() { | 
 |   enum class PerMonitorDpiAware { | 
 |     UNKNOWN = 0, | 
 |     PER_MONITOR_DPI_UNAWARE, | 
 |     PER_MONITOR_DPI_AWARE, | 
 |   }; | 
 |   static PerMonitorDpiAware per_monitor_dpi_aware = PerMonitorDpiAware::UNKNOWN; | 
 |   if (per_monitor_dpi_aware == PerMonitorDpiAware::UNKNOWN) { | 
 |     per_monitor_dpi_aware = PerMonitorDpiAware::PER_MONITOR_DPI_UNAWARE; | 
 |     HMODULE shcore_dll = ::LoadLibrary(L"shcore.dll"); | 
 |     if (shcore_dll) { | 
 |       auto get_process_dpi_awareness_func = | 
 |           reinterpret_cast<decltype(::GetProcessDpiAwareness)*>( | 
 |               ::GetProcAddress(shcore_dll, "GetProcessDpiAwareness")); | 
 |       if (get_process_dpi_awareness_func) { | 
 |         PROCESS_DPI_AWARENESS awareness; | 
 |         if (SUCCEEDED(get_process_dpi_awareness_func(nullptr, &awareness)) && | 
 |             awareness == PROCESS_PER_MONITOR_DPI_AWARE) | 
 |           per_monitor_dpi_aware = PerMonitorDpiAware::PER_MONITOR_DPI_AWARE; | 
 |       } | 
 |     } | 
 |   } | 
 |   return per_monitor_dpi_aware == PerMonitorDpiAware::PER_MONITOR_DPI_AWARE; | 
 | } | 
 |  | 
 | void EnableHighDPISupport() { | 
 |   // Enable per-monitor DPI for Win10 or above instead of Win8.1 since Win8.1 | 
 |   // does not have EnableChildWindowDpiMessage, necessary for correct non-client | 
 |   // area scaling across monitors. | 
 |   PROCESS_DPI_AWARENESS process_dpi_awareness = | 
 |       GetVersion() >= VERSION_WIN10 ? PROCESS_PER_MONITOR_DPI_AWARE | 
 |                                     : PROCESS_SYSTEM_DPI_AWARE; | 
 |   if (!SetProcessDpiAwarenessWrapper(process_dpi_awareness)) { | 
 |     // For windows versions where SetProcessDpiAwareness is not available or | 
 |     // failed, try its predecessor. | 
 |     BOOL result = ::SetProcessDPIAware(); | 
 |     DCHECK(result) << "SetProcessDPIAware failed."; | 
 |   } | 
 | } | 
 |  | 
 | }  // namespace win | 
 | }  // namespace base |