Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

1032 lines
24 KiB

/*++
Copyright (c) 1991 Microsoft Corporation
Module Name:
services.c
Abstract:
This is the service dispatcher for the security process. It contains
the service dispatcher initialization routine and the routines to
load the DLL for the individual serices and execute them.
Author:
Rajen Shah (rajens) 11-Apr-1991
[Environment:]
User Mode - Win32
Revision History:
11-Apr-1991 RajenS
created
27-Sep-1991 JohnRo
More work toward UNICODE.
24-Jan-1991 CliffV
Converted to be service dispatcher for the security process.
--*/
#include <lsapch2.h>
#include <lmcons.h>
#include <lmerr.h> // NERR_ and ERROR_ equates.
#include <lmsname.h>
#include <crypt.h>
#include <logonmsv.h>
#include <ntdsa.h>
#include <netlib.h> // SET_SERVICE_EXITCODE
//
// Names of services run in-proc
//
#ifndef SERVICE_KDC
#define SERVICE_KDC TEXT("KDC")
#endif
#ifndef SERVICE_SAM
#define SERVICE_SAM TEXT("SAMSS")
#endif
#ifndef SERVICE_IPSECPOLICYAGENT
#define SERVICE_IPSECPOLICYAGENT TEXT("PolicyAgent")
#endif
#ifndef SERVICE_PSTORE
#define SERVICE_PSTORE TEXT("ProtectedStorage")
#endif
#ifndef SERVICE_HTTPFILTER
#define SERVICE_HTTPFILTER TEXT("HTTPFilter")
#endif
//
// Private API to tell the Service Controller
// that this is the LSA.
//
VOID
I_ScIsSecurityProcess(
VOID
);
//
// Internal service table structure/enum definitions
//
typedef struct _LSAP_SERVICE_TABLE
{
LPCSTR lpDllName;
LPCSTR lpEntryPoint;
LPCWSTR lpServiceName;
}
LSAP_SERVICE_TABLE, *PLSAP_SERVICE_TABLE;
typedef enum
{
LSAP_SERVICE_NETLOGON,
LSAP_SERVICE_KDC,
LSAP_SERVICE_IPSECPOLICYAGENT,
LSAP_SERVICE_PROTECTEDSTORAGE,
LSAP_SERVICE_HTTPFILTER,
LSAP_SERVICE_MAX
}
LSAP_SERVICE_TYPE, *PLSAP_SERVICE_TYPE;
//
// Keep this list in order with the service types above
//
LSAP_SERVICE_TABLE g_LsaServiceTable[LSAP_SERVICE_MAX] = {
{ "netlogon.dll" , "NlNetlogonMain" , SERVICE_NETLOGON } ,
{ "kdcsvc.dll" , "KdcServiceMain" , SERVICE_KDC } ,
{ "ipsecsvc.dll" , "SPDServiceMain" , SERVICE_IPSECPOLICYAGENT } ,
{ "pstorsvc.dll" , "PSTOREServiceMain", SERVICE_PSTORE } ,
{ "w3ssl.dll" , "HTTPFilterServiceMain" , SERVICE_HTTPFILTER }
};
//
// Prototypes for the service-specific start routines themselves
//
VOID
SrvLoadNetlogon(
IN DWORD dwNumServicesArgs,
IN LPTSTR *lpServiceArgVectors
);
VOID
SrvLoadKdc(
IN DWORD dwNumServicesArgs,
IN LPTSTR *lpServiceArgVectors
);
VOID
SrvLoadIPSecSvcs(
IN DWORD dwNumServicesArgs,
IN LPTSTR *lpServiceArgVectors
);
VOID
SrvLoadNtlmssp(
IN DWORD dwNumServicesArgs,
IN LPTSTR *lpServiceArgVectors
);
VOID
SrvLoadPSTORE(
IN DWORD dwNumServicesArgs,
IN LPTSTR *lpServiceArgVectors
);
VOID
SrvLoadSamss(
IN DWORD dwNumServicesArgs,
IN LPTSTR *lpServiceArgVectors
);
VOID
SrvLoadHTTPFilter(
IN DWORD dwNumServicesArgs,
IN LPTSTR *lpServiceArgVectors
);
//
// The actual dispatch table for the in-proc services and their start routines
//
SERVICE_TABLE_ENTRY SecurityServiceDispatchTable[] = {
{ SERVICE_NETLOGON, SrvLoadNetlogon },
{ SERVICE_KDC, SrvLoadKdc },
{ SERVICE_NTLMSSP, SrvLoadNtlmssp },
{ SERVICE_IPSECPOLICYAGENT, SrvLoadIPSecSvcs },
{ SERVICE_PSTORE, SrvLoadPSTORE },
{ SERVICE_SAM, SrvLoadSamss },
{ SERVICE_HTTPFILTER, SrvLoadHTTPFilter },
{ NULL, NULL }
};
BOOLEAN
LsapWaitForSamService(
SERVICE_STATUS_HANDLE hService,
SERVICE_STATUS *SStatus
);
VOID
DummyControlHandler(
IN DWORD opcode
)
/*++
Routine Description:
Process and respond to a control signal from the service controller.
Arguments:
opcode - Supplies a value which specifies the action for the Netlogon
service to perform.
Return Value:
None.
NOTE : this is a dummy handler, used to uninstall the netlogon service
when we unable to load netlogon dll.
--*/
{
DebugLog((DEB_TRACE, "[Security Process] in control handler\n"));
return;
}
VOID
LsapStartService(
IN LSAP_SERVICE_TYPE ServiceType,
IN DWORD dwNumServicesArgs,
IN LPTSTR *lpServiceArgVectors,
IN BOOLEAN fUnload
)
{
NET_API_STATUS NetStatus;
HANDLE DllHandle = NULL;
LPSERVICE_MAIN_FUNCTION pfnServiceMain;
SERVICE_STATUS_HANDLE ServiceHandle;
SERVICE_STATUS ServiceStatus;
//
// Load the service DLL
//
DllHandle = LoadLibraryA(g_LsaServiceTable[ServiceType].lpDllName);
if (DllHandle == NULL)
{
NetStatus = GetLastError();
DebugLog((DEB_ERROR,
"[Security process] load library %s failed %ld\n",
g_LsaServiceTable[ServiceType].lpDllName,
NetStatus));
goto Cleanup;
}
//
// Find the main entry point for the service
//
pfnServiceMain = (LPSERVICE_MAIN_FUNCTION) GetProcAddress(DllHandle,
g_LsaServiceTable[ServiceType].lpEntryPoint);
if (pfnServiceMain == NULL)
{
NetStatus = GetLastError();
DebugLog((DEB_ERROR,
"[Security process] GetProcAddress %s failed %ld\n",
g_LsaServiceTable[ServiceType].lpEntryPoint,
NetStatus));
goto Cleanup;
}
//
// Call the service entrypoint
//
(*pfnServiceMain)(dwNumServicesArgs, lpServiceArgVectors);
//
// Note that it's inherently unsafe to load/unload a service DLL, which is why
// no LSA-hosted service in the product should have this set to TRUE for a
// call to LsapStartService. Leave this code in here, however, as it facilitates
// debugging and fast swapping of private binaries for developers of said services.
//
if(fUnload)
{
FreeLibrary(DllHandle);
}
return;
Cleanup:
if (DllHandle != NULL)
{
FreeLibrary(DllHandle);
}
//
// Register the service to the Service Controller
//
ServiceHandle = RegisterServiceCtrlHandler(g_LsaServiceTable[ServiceType].lpServiceName,
DummyControlHandler);
if (ServiceHandle != 0)
{
//
// inform service controller that the service can't start.
//
ServiceStatus.dwServiceType = SERVICE_WIN32;
ServiceStatus.dwCurrentState = SERVICE_STOPPED;
ServiceStatus.dwControlsAccepted = SERVICE_ACCEPT_STOP | SERVICE_ACCEPT_PAUSE_CONTINUE;
ServiceStatus.dwCheckPoint = 0;
ServiceStatus.dwWaitHint = 0;
SET_SERVICE_EXITCODE(NetStatus,
ServiceStatus.dwWin32ExitCode,
ServiceStatus.dwServiceSpecificExitCode);
if (!SetServiceStatus( ServiceHandle, &ServiceStatus))
{
DebugLog((DEB_ERROR,
"[Security process] SetServiceStatus for %ws failed %ld\n",
g_LsaServiceTable[ServiceType].lpServiceName,
GetLastError()));
}
}
else
{
DebugLog((DEB_ERROR,
"[Security process] RegisterServiceCtrlHandler for %ws failed %ld\n",
g_LsaServiceTable[ServiceType].lpServiceName,
GetLastError()));
}
return;
}
VOID
SrvLoadNetlogon (
IN DWORD dwNumServicesArgs,
IN LPTSTR *lpServiceArgVectors
)
/*++
Routine Description:
This routine is the 'main' routine for the netlogon service. It loads
Netlogon.dll (which contains the remainder of the service) and
calls the main entry point there.
Arguments:
dwNumServicesArgs - Number of arguments in lpServiceArgVectors.
lpServiceArgVectors - Argument strings.
Return Value:
return nothing.
Note:
--*/
{
LsapStartService(LSAP_SERVICE_NETLOGON, dwNumServicesArgs, lpServiceArgVectors, FALSE);
}
VOID
SrvLoadKdc (
IN DWORD dwNumServicesArgs,
IN LPTSTR *lpServiceArgVectors
)
/*++
Routine Description:
This routine is the 'main' routine for the KDC service. It loads
Netlogon.dll (which contains the remainder of the service) and
calls the main entry point there.
Arguments:
dwNumServicesArgs - Number of arguments in lpServiceArgVectors.
lpServiceArgVectors - Argument strings.
Return Value:
return nothing.
Note:
--*/
{
LsapStartService(LSAP_SERVICE_KDC, dwNumServicesArgs, lpServiceArgVectors, FALSE);
}
SERVICE_STATUS_HANDLE hService;
SERVICE_STATUS SStatus;
void
NtlmsspHandler(DWORD dwControl)
{
switch (dwControl)
{
case SERVICE_CONTROL_STOP:
SStatus.dwCurrentState = SERVICE_STOPPED;
if (!SetServiceStatus(hService, &SStatus)) {
KdPrint(("Failed to set service status: %d\n",GetLastError()));
hService = 0;
}
break;
default:
break;
}
}
VOID
SrvLoadNtlmssp (
IN DWORD dwNumServicesArgs,
IN LPTSTR *lpServiceArgVectors
)
/*++
Routine Description:
This routine is the 'main' routine for the KDC service. It loads
Netlogon.dll (which contains the remainder of the service) and
calls the main entry point there.
Arguments:
dwNumServicesArgs - Number of arguments in lpServiceArgVectors.
lpServiceArgVectors - Argument strings.
Return Value:
return nothing.
Note:
--*/
{
//
// Notify the service controller that we are starting.
//
hService = RegisterServiceCtrlHandler(SERVICE_NTLMSSP, NtlmsspHandler);
if (hService)
{
SStatus.dwServiceType = SERVICE_WIN32_SHARE_PROCESS;
SStatus.dwCurrentState = SERVICE_RUNNING;
SStatus.dwControlsAccepted = SERVICE_ACCEPT_STOP;
SStatus.dwWin32ExitCode = 0;
SStatus.dwServiceSpecificExitCode = 0;
SStatus.dwCheckPoint = 0;
SStatus.dwWaitHint = 0;
if (!SetServiceStatus(hService, &SStatus)) {
KdPrint(("Failed to set service status: %d\n",GetLastError()));
}
}
else
{
KdPrint(("Could not register handler, %d\n", GetLastError()));
}
return;
}
VOID
SrvLoadIPSecSvcs (
IN DWORD dwNumServicesArgs,
IN LPTSTR *lpServiceArgVectors
)
/*++
Routine Description:
This routine is the 'main' routine for the IPSEC Services. It loads
ipsecsvc.dll (which contains the service implementation) and
calls the main entry point there.
Arguments:
dwNumServicesArgs - Number of arguments in lpServiceArgVectors.
lpServiceArgVectors - Argument strings.
Return Value:
return nothing.
Note:
--*/
{
LsapStartService(LSAP_SERVICE_IPSECPOLICYAGENT, dwNumServicesArgs, lpServiceArgVectors, FALSE);
}
VOID
SrvLoadPSTORE (
IN DWORD dwNumServicesArgs,
IN LPTSTR *lpServiceArgVectors
)
/*++
Routine Description:
This routine is the 'main' routine for the PSTORE service. It loads
cryptsvc.dll (which contains the service implementation) and
calls the main entry point there.
Arguments:
dwNumServicesArgs - Number of arguments in lpServiceArgVectors.
lpServiceArgVectors - Argument strings.
Return Value:
return nothing.
Note:
--*/
{
LsapStartService(LSAP_SERVICE_PROTECTEDSTORAGE, dwNumServicesArgs, lpServiceArgVectors, FALSE);
}
VOID
SrvLoadHTTPFilter(
IN DWORD dwNumServicesArgs,
IN LPTSTR *lpServiceArgVectors
)
/*++
Routine Description:
This routine is the 'main' routine for the w3ssl service, run in-proc
for improving SSL performance. It loads w3ssl.dll (which contains the
remainder of the service) and calls the main entry point there.
Arguments:
dwNumServicesArgs - Number of arguments in lpServiceArgVectors.
lpServiceArgVectors - Argument strings.
Return Value:
return nothing.
Note:
--*/
{
LsapStartService(LSAP_SERVICE_HTTPFILTER, dwNumServicesArgs, lpServiceArgVectors, FALSE);
}
VOID
SrvLoadSamss (
IN DWORD dwNumServicesArgs,
IN LPTSTR *lpServiceArgVectors
)
/*++
Routine Description:
This routine is the 'main' routine for the KDC service. It loads
Netlogon.dll (which contains the remainder of the service) and
calls the main entry point there.
Arguments:
dwNumServicesArgs - Number of arguments in lpServiceArgVectors.
lpServiceArgVectors - Argument strings.
Return Value:
return nothing.
Note:
--*/
{
SERVICE_STATUS_HANDLE hService;
SERVICE_STATUS SStatus;
HANDLE hDsStartup = NULL;
DWORD err = 0;
DWORD netError = ERROR_GEN_FAILURE;
NT_PRODUCT_TYPE prod;
//
// Notify the service controller that we are starting.
//
hService = RegisterServiceCtrlHandler(SERVICE_SAM, DummyControlHandler);
if (hService == 0 ) {
KdPrint(("Could not register handler, %d\n", GetLastError()));
return;
}
//
// Which product are we running on?
//
if ( !RtlGetNtProductType( &prod ) ) {
KdPrint(("RtlGetNtProductType failed with %d. Defaulting to Winnt\n",
GetLastError()));
prod = NtProductWinNt;
}
//
// if this is a DS, also wait for the DS
//
if ( prod == NtProductLanManNt ) {
if ( SampUsingDsData() ) {
hDsStartup = CreateEvent(NULL, TRUE, FALSE,
NTDS_DELAYED_STARTUP_COMPLETED_EVENT);
if ( hDsStartup == NULL ) {
KdPrint(("SrvLoadSamss: CreateEvent failed with %d\n",GetLastError()));
}
}
}
SStatus.dwServiceType = SERVICE_WIN32_SHARE_PROCESS;
SStatus.dwCurrentState = SERVICE_START_PENDING;
SStatus.dwControlsAccepted = 0;
SStatus.dwWin32ExitCode = 0;
SStatus.dwServiceSpecificExitCode = 0;
SStatus.dwCheckPoint = 1;
SStatus.dwWaitHint = 30*1000; // 30 sec
//
// Wait for sam startup
//
if (!LsapWaitForSamService(hService, &SStatus)) {
KdPrint(("error waiting for sam\n"));
goto exit;
}
//
// Wait for DS
//
if ( hDsStartup != NULL ) {
SStatus.dwWaitHint = 64*1000; // 64 sec
do {
if (!SetServiceStatus(hService, &SStatus)) {
KdPrint(("LoadSamss: Failed to set service status: %d\n",GetLastError()));
}
SStatus.dwCheckPoint++;
err = WaitForSingleObject(hDsStartup, 60 * 1000);
} while ( err == WAIT_TIMEOUT );
} else {
err = WAIT_OBJECT_0;
}
exit:
if ( err == WAIT_OBJECT_0 ) {
SStatus.dwCurrentState = SERVICE_RUNNING;
} else {
KdPrint(("SAM service failed to start[Error %d].\n", netError));
SStatus.dwCurrentState = SERVICE_STOPPED;
SET_SERVICE_EXITCODE(
netError,
SStatus.dwWin32ExitCode,
SStatus.dwServiceSpecificExitCode
);
}
SStatus.dwCheckPoint = 0;
SStatus.dwWaitHint = 0;
if (!SetServiceStatus(hService, &SStatus)) {
KdPrint(("LoadSamss: Failed to set service status: %d\n",GetLastError()));
}
if ( hDsStartup != NULL ) {
CloseHandle(hDsStartup);
}
return;
} // SrvLoadSamss
DWORD
ServiceDispatcherThread (
LPVOID Parameter
)
/*++
Routine Description:
This routine synchronizes with the service controller. It waits
for the service controller to set the SECURITY_SERVICES_STARTED
event then starts up the main
thread that is going to handle the control requests from the service
controller.
It basically sets up the ControlDispatcher and, on return, exits from
this main thread. The call to NetServiceStartCtrlDispatcher does
not return until all services have terminated, and this process can
go away.
It will be up to the ControlDispatcher thread to start/stop/pause/continue
any services. If a service is to be started, it will create a thread
and then call the main routine of that service.
Arguments:
EventHandle - Event handle to wait on before continuing.
Return Value:
Exit status of thread.
Note:
--*/
{
DWORD WaitStatus;
HANDLE EventHandle;
BOOL StartStatus;
//
// Create an event for us to wait on.
//
EventHandle = CreateEventW( NULL, // No special security
TRUE, // Must be manually reset
FALSE, // The event is initially not signalled
SECURITY_SERVICES_STARTED );
if ( EventHandle == NULL ) {
WaitStatus = GetLastError();
//
// If the event already exists,
// the service controller already created it. Just open it.
//
if ( WaitStatus == ERROR_ALREADY_EXISTS ) {
EventHandle = OpenEventW( EVENT_ALL_ACCESS,
FALSE,
SECURITY_SERVICES_STARTED );
if ( EventHandle == NULL ) {
WaitStatus = GetLastError();
DebugLog((DEB_ERROR,
"[Security process] OpenEvent failed %ld\n",
WaitStatus));
return WaitStatus;
}
} else {
DebugLog((DEB_ERROR,
"[Security process] CreateEvent failed %ld\n",
WaitStatus));
return WaitStatus;
}
}
//
// Wait for the service controller to come up.
//
WaitStatus = WaitForSingleObject( (HANDLE) EventHandle, (DWORD) -1 );
CloseHandle( EventHandle );
if ( WaitStatus != 0 ) {
DebugLog((DEB_ERROR,
"[Security process] WaitForSingleObject failed %ld\n",
WaitStatus));
return WaitStatus;
}
//
// Let the client side of the Service Controller know that
// is the security process
//
I_ScIsSecurityProcess();
//
// Call NetServiceStartCtrlDispatcher to set up the control interface.
// The API won't return until all services have been terminated. At that
// point, we just exit.
//
StartStatus = StartServiceCtrlDispatcher(SecurityServiceDispatchTable);
DebugLog((DEB_ERROR,
"[Security process] return from StartCtrlDispatcher %ld \n",
StartStatus));
return StartStatus;
UNREFERENCED_PARAMETER(Parameter);
}
NTSTATUS
ServiceInit (
VOID
)
/*++
Routine Description:
This is a main routine for the service dispatcher of the security process.
It starts up a thread responsible for coordinating with the
service controller.
Arguments:
NONE.
Return Value:
Status of the thread creation operation.
Note:
--*/
{
DWORD ThreadId;
HANDLE ThreadHandle;
//
// The control dispatcher runs in a thread of its own.
//
ThreadHandle = CreateThread(
NULL, // No special thread attributes
0, // No special stack size
&ServiceDispatcherThread,
NULL, // No special parameter
0, // No special creation flags
&ThreadId);
if ( ThreadHandle == NULL ) {
return (NTSTATUS) GetLastError();
} else {
CloseHandle(ThreadHandle);
}
return STATUS_SUCCESS;
}
BOOLEAN
LsapWaitForSamService(
SERVICE_STATUS_HANDLE hService,
SERVICE_STATUS* SStatus
)
/*++
Routine Description:
This procedure waits for the SAM service to start and to complete
all its initialization.
Arguments:
NetlogonServiceCalling:
TRUE if this is the netlogon service proper calling
FALSE if this is the changelog worker thread calling
Return Value:
TRUE : if the SAM service is successfully starts.
FALSE : if the SAM service can't start.
--*/
{
NTSTATUS Status;
DWORD WaitStatus;
UNICODE_STRING EventName;
HANDLE EventHandle;
OBJECT_ATTRIBUTES EventAttributes;
//
// open SAM event
//
RtlInitUnicodeString( &EventName, L"\\SAM_SERVICE_STARTED");
InitializeObjectAttributes( &EventAttributes, &EventName, 0, 0, NULL );
Status = NtOpenEvent( &EventHandle,
SYNCHRONIZE|EVENT_MODIFY_STATE,
&EventAttributes );
if ( !NT_SUCCESS(Status)) {
if( Status == STATUS_OBJECT_NAME_NOT_FOUND ) {
//
// SAM hasn't created this event yet, let us create it now.
// SAM opens this event to set it.
//
Status = NtCreateEvent(
&EventHandle,
SYNCHRONIZE|EVENT_MODIFY_STATE,
&EventAttributes,
NotificationEvent,
FALSE // The event is initially not signaled
);
if( Status == STATUS_OBJECT_NAME_EXISTS ||
Status == STATUS_OBJECT_NAME_COLLISION ) {
//
// second change, if the SAM created the event before we
// do.
//
Status = NtOpenEvent( &EventHandle,
SYNCHRONIZE|EVENT_MODIFY_STATE,
&EventAttributes );
}
}
if ( !NT_SUCCESS(Status)) {
//
// could not make the event handle
//
KdPrint(("NlWaitForSamService couldn't make the event handle : "
"%lx\n", Status));
return( FALSE );
}
}
//
// Loop waiting.
//
for (;;) {
WaitStatus = WaitForSingleObject( EventHandle,
5*1000 ); // 5 Seconds
if ( WaitStatus == WAIT_TIMEOUT ) {
if (!SetServiceStatus(hService, SStatus)) {
KdPrint(("LoadSamss: Failed to set service status: %d\n",GetLastError()));
}
SStatus->dwCheckPoint++;
continue;
} else if ( WaitStatus == WAIT_OBJECT_0 ) {
break;
} else {
KdPrint(("NlWaitForSamService: error %ld %ld\n",
GetLastError(),
WaitStatus ));
(VOID) NtClose( EventHandle );
return FALSE;
}
}
(VOID) NtClose( EventHandle );
return TRUE;
} // LsapWaitForSamService