Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

300 lines
10 KiB

/*++
Copyright (c) 1989 Microsoft Corporation
Module Name:
smss.c
Abstract:
Author:
Mark Lucovsky (markl) 04-Oct-1989
Revision History:
--*/
#include "smsrvp.h"
#if defined(REMOTE_BOOT)
char SmpFormatKeyword[] = "NETBOOTFORMAT";
char SmpDisconnectedKeyword[] = "NETBOOTDISCONNECTED";
char SmpNetbootKeyword[] = "NETBOOT";
char SmpHalKeyword[] = "NETBOOTHAL";
BOOLEAN SmpAutoFormat = FALSE;
BOOLEAN SmpNetboot = FALSE;
BOOLEAN SmpNetbootDisconnected = FALSE;
char SmpHalName[MAX_HAL_NAME_LENGTH + 1] = "";
#endif // defined(REMOTE_BOOT)
void
SmpTerminate(
ULONG_PTR Parameters[]
);
EXCEPTION_DISPOSITION
SmpUnhandledExceptionFilter(
struct _EXCEPTION_POINTERS *ExceptionInfo,
ULONG_PTR Parameters[]
);
void
__cdecl main(
int argc,
char *argv[],
char *envp[],
ULONG DebugParameter OPTIONAL
)
{
NTSTATUS Status;
KPRIORITY SetBasePriority;
UNICODE_STRING InitialCommand, DebugInitialCommand, UnicodeParameter;
HANDLE ProcessHandles[ 2 ];
ULONG_PTR Parameters[ 4 ];
PROCESS_BASIC_INFORMATION ProcessInfo;
ULONG MuSessionId = 0; // First instance (console) has MuSessionId = 0
RtlSetProcessIsCritical(TRUE, NULL, TRUE);
RtlSetThreadIsCritical(TRUE, NULL, TRUE);
SetBasePriority = FOREGROUND_BASE_PRIORITY+2;
Status = NtSetInformationProcess( NtCurrentProcess(),
ProcessBasePriority,
(PVOID) &SetBasePriority,
sizeof( SetBasePriority )
);
ASSERT(NT_SUCCESS(Status));
if (ARGUMENT_PRESENT( (PVOID)(ULONG_PTR) DebugParameter )) {
SmpDebug = DebugParameter;
}
try {
Parameters[ 0 ] = (ULONG_PTR)&UnicodeParameter;
Parameters[ 1 ] = 0;
Parameters[ 2 ] = 0;
Parameters[ 3 ] = 0;
Status = SmpInit( &InitialCommand, &ProcessHandles[ 0 ] );
if (!NT_SUCCESS( Status )) {
KdPrint(( "SMSS: SmpInit return failure - Status == %x\n", Status ));
RtlInitUnicodeString( &UnicodeParameter, L"Session Manager Initialization" );
Parameters[ 1 ] = (ULONG)Status;
} else {
SYSTEM_FLAGS_INFORMATION FlagInfo;
Status = NtQuerySystemInformation( SystemFlagsInformation,
&FlagInfo,
sizeof( FlagInfo ),
NULL);
ASSERT(NT_SUCCESS(Status));
if (FlagInfo.Flags & (FLG_DEBUG_INITIAL_COMMAND | FLG_DEBUG_INITIAL_COMMAND_EX) ) {
DebugInitialCommand.MaximumLength = InitialCommand.Length + 64;
DebugInitialCommand.Length = 0;
DebugInitialCommand.Buffer = RtlAllocateHeap( RtlProcessHeap(),
MAKE_TAG( INIT_TAG ),
DebugInitialCommand.MaximumLength
);
if (DebugInitialCommand.Buffer == NULL) {
Status = STATUS_NO_MEMORY;
KdPrint(( "SMSS: SmpInit heap allocation failed\n"));
} else {
if (FlagInfo.Flags & FLG_ENABLE_CSRDEBUG) {
RtlAppendUnicodeToString( &DebugInitialCommand, L"ntsd -isd -p -1 -d " );
} else {
RtlAppendUnicodeToString( &DebugInitialCommand, L"ntsd -isd -d " );
}
if (FlagInfo.Flags & FLG_DEBUG_INITIAL_COMMAND_EX ) {
RtlAppendUnicodeToString( &DebugInitialCommand, L"-g -x " );
}
RtlAppendUnicodeStringToString( &DebugInitialCommand, &InitialCommand );
InitialCommand = DebugInitialCommand;
}
}
if (NT_SUCCESS( Status )) {
Status = SmpExecuteInitialCommand( 0L, &InitialCommand, &ProcessHandles[ 1 ], NULL );
}
if (NT_SUCCESS( Status )) {
//
// Detach the session manager from the session space as soon as
// we have executed the initial command (winlogon).
//
PVOID State;
Status = SmpAcquirePrivilege( SE_LOAD_DRIVER_PRIVILEGE, &State );
if (NT_SUCCESS( Status )) {
//
// If we are attached to a session space, leave it
// so we can create a new one
//
if( (AttachedSessionId != (-1)) ) {
Status = NtSetSystemInformation(
SystemSessionDetach,
(PVOID)&AttachedSessionId,
sizeof(MuSessionId)
);
ASSERT(NT_SUCCESS(Status));
AttachedSessionId = (-1);
}
SmpReleasePrivilege( State );
}
}
if (NT_SUCCESS( Status )) {
Status = NtWaitForMultipleObjects( 2,
ProcessHandles,
WaitAny,
FALSE,
NULL
);
}
if (Status == STATUS_WAIT_0) {
RtlInitUnicodeString( &UnicodeParameter, L"Windows SubSystem" );
Status = NtQueryInformationProcess( ProcessHandles[ 0 ],
ProcessBasicInformation,
&ProcessInfo,
sizeof( ProcessInfo ),
NULL
);
KdPrint(( "SMSS: Windows subsystem terminated when it wasn't supposed to.\n" ));
} else {
RtlInitUnicodeString( &UnicodeParameter, L"Windows Logon Process" );
if (Status == STATUS_WAIT_1) {
Status = NtQueryInformationProcess( ProcessHandles[ 1 ],
ProcessBasicInformation,
&ProcessInfo,
sizeof( ProcessInfo ),
NULL
);
} else {
ProcessInfo.ExitStatus = Status;
Status = STATUS_SUCCESS;
}
KdPrint(( "SMSS: Initial command '%wZ' terminated when it wasn't supposed to.\n", &InitialCommand ));
}
if (NT_SUCCESS( Status )) {
Parameters[ 1 ] = (ULONG)ProcessInfo.ExitStatus;
} else {
Parameters[ 1 ] = (ULONG)STATUS_UNSUCCESSFUL;
}
}
} except( SmpUnhandledExceptionFilter( GetExceptionInformation(), Parameters ) ) {
/* not reached */
}
SmpTerminate(Parameters);
/* not reached */
}
void
SmpTerminate(
ULONG_PTR Parameters[]
)
{
NTSTATUS Status;
ULONG Response;
BOOLEAN WasEnabled;
//
// We are hosed, so raise a fatal system error to shutdown the system.
// (Basically a user mode KeBugCheck).
//
Status = RtlAdjustPrivilege( SE_SHUTDOWN_PRIVILEGE,
(BOOLEAN)TRUE,
TRUE,
&WasEnabled
);
if (Status == STATUS_NO_TOKEN) {
//
// No thread token, use the process token.
//
Status = RtlAdjustPrivilege( SE_SHUTDOWN_PRIVILEGE,
(BOOLEAN)TRUE,
FALSE,
&WasEnabled
);
}
Status = NtRaiseHardError( STATUS_SYSTEM_PROCESS_TERMINATED,
4,
1,
Parameters,
OptionShutdownSystem,
&Response
);
//
// If this returns, give up.
//
NtTerminateProcess( NtCurrentProcess(), Status );
}
EXCEPTION_DISPOSITION
SmpUnhandledExceptionFilter(
struct _EXCEPTION_POINTERS *ExceptionInfo,
ULONG_PTR Parameters[]
)
{
UNICODE_STRING ExUnicodeParameter;
#if DBG
DbgPrint( "SMSS: Unhandled exception - Status == %x IP == %x\n",
ExceptionInfo->ExceptionRecord->ExceptionCode,
ExceptionInfo->ExceptionRecord->ExceptionAddress
);
DbgPrint( " Memory Address: %x Read/Write: %x\n",
ExceptionInfo->ExceptionRecord->ExceptionInformation[ 0 ],
ExceptionInfo->ExceptionRecord->ExceptionInformation[ 1 ]
);
DbgBreakPoint();
#endif
RtlInitUnicodeString( &ExUnicodeParameter, L"Unhandled Exception in Session Manager" );
Parameters[ 0 ] = (ULONG_PTR)&ExUnicodeParameter;
Parameters[ 1 ] = (ULONG_PTR)ExceptionInfo->ExceptionRecord->ExceptionCode;
Parameters[ 2 ] = (ULONG_PTR)ExceptionInfo->ExceptionRecord->ExceptionAddress;
Parameters[ 3 ] = (ULONG_PTR)ExceptionInfo->ContextRecord;
//
// SmpTerminate will raise a hard error with the exception info still valid.
//
SmpTerminate(Parameters);
// not reached
return EXCEPTION_EXECUTE_HANDLER;
}