You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
398 lines
11 KiB
398 lines
11 KiB
//+-------------------------------------------------------------------------
|
|
//
|
|
// Microsoft Windows
|
|
//
|
|
// Copyright (C) Microsoft Corporation, 1996 - 1999
|
|
//
|
|
// File: wiatsvc.cpp
|
|
//
|
|
// Contents: wait for service to start
|
|
//
|
|
// History: 19-Jun-00 reidk created
|
|
//
|
|
//--------------------------------------------------------------------------
|
|
|
|
#include <windows.h>
|
|
#include "unicode.h"
|
|
#include "errlog.h"
|
|
#include "waitsvc.h"
|
|
|
|
#include <assert.h>
|
|
|
|
#define WAITSVC_LOGERR_LASTERR(x) if (x) \
|
|
{ \
|
|
ErrLog_LogError(NULL, \
|
|
ERRLOG_CLIENT_ID_WAITSVC, \
|
|
__LINE__, \
|
|
0, \
|
|
FALSE, \
|
|
FALSE); \
|
|
}
|
|
|
|
BOOL
|
|
WaitForCryptService(
|
|
IN LPWSTR pwszService,
|
|
IN BOOL *pfDone,
|
|
IN BOOL fLogErrors
|
|
)
|
|
/*++
|
|
|
|
This routine determines if the protected storage service is
|
|
pending start. If the service is pending start, this routine
|
|
waits until the service is running before returning to the
|
|
caller.
|
|
|
|
If the Service is running when this routine returns, the
|
|
return value is TRUE.
|
|
|
|
If the service is not running, or an error occurred, the
|
|
return value is FALSE.
|
|
|
|
When the return value is FALSE, the value is only advisory, and may not
|
|
indicate the current state of the service. The reasoning here is that
|
|
if the service did not start the first time this call is made, is will
|
|
not likely be running the next time around, and hence we avoid checking
|
|
on subsequent calls.
|
|
|
|
For current situations, the caller should ignore the return value; when
|
|
the return value is FALSE, the caller should just try making the call
|
|
into the service. If the service is still down, the call into it will fail
|
|
appropriately.
|
|
|
|
--*/
|
|
{
|
|
SC_HANDLE schSCM;
|
|
SC_HANDLE schService = NULL;
|
|
DWORD dwStopCount = 0;
|
|
static BOOL fSuccess = FALSE;
|
|
BOOL fCheckDisabled = TRUE;
|
|
HANDLE hToken = NULL;
|
|
BOOL fSystemAccount = FALSE;
|
|
BOOL fStartServiceCalled = FALSE;
|
|
DWORD dwErr = ERROR_SUCCESS;
|
|
|
|
if( !FIsWinNT() )
|
|
return TRUE;
|
|
|
|
if( *pfDone )
|
|
return fSuccess;
|
|
|
|
schSCM = OpenSCManagerW( NULL, NULL, SC_MANAGER_CONNECT );
|
|
if(schSCM == NULL)
|
|
{
|
|
assert(0);
|
|
WAITSVC_LOGERR_LASTERR(fLogErrors)
|
|
return FALSE;
|
|
}
|
|
|
|
//
|
|
// open the protected storage service so we can query it's
|
|
// current state.
|
|
//
|
|
|
|
schService = OpenServiceW(schSCM, pwszService, SERVICE_QUERY_STATUS | SERVICE_QUERY_CONFIG);
|
|
if(schService == NULL)
|
|
{
|
|
WAITSVC_LOGERR_LASTERR(fLogErrors)
|
|
fCheckDisabled = FALSE;
|
|
schService = OpenServiceW(schSCM, pwszService, SERVICE_QUERY_STATUS);
|
|
}
|
|
|
|
if(schService == NULL)
|
|
{
|
|
assert(0);
|
|
WAITSVC_LOGERR_LASTERR(fLogErrors)
|
|
goto cleanup;
|
|
}
|
|
|
|
//
|
|
// check if the service is disabled. If it is, bailout.
|
|
//
|
|
|
|
if( fCheckDisabled ) {
|
|
LPQUERY_SERVICE_CONFIG pServiceConfig;
|
|
BYTE TempBuffer[ 1024 ];
|
|
DWORD cbServiceConfig;
|
|
|
|
pServiceConfig = (LPQUERY_SERVICE_CONFIG)TempBuffer;
|
|
cbServiceConfig = sizeof(TempBuffer);
|
|
|
|
if(QueryServiceConfig( schService, pServiceConfig, cbServiceConfig, &cbServiceConfig )) {
|
|
|
|
if( pServiceConfig->dwStartType == SERVICE_DISABLED )
|
|
{
|
|
SetLastError(ERROR_SERVICE_DISABLED);
|
|
WAITSVC_LOGERR_LASTERR(fLogErrors)
|
|
goto cleanup;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
assert(0);
|
|
WAITSVC_LOGERR_LASTERR(fLogErrors)
|
|
goto cleanup;
|
|
}
|
|
}
|
|
|
|
|
|
//
|
|
// check if calling process is SYSTEM account.
|
|
// if it is, use a larger timeout value.
|
|
//
|
|
|
|
if( OpenProcessToken( GetCurrentProcess(), TOKEN_QUERY, &hToken ) ) {
|
|
|
|
do {
|
|
|
|
BYTE FastBuffer[ 256 ];
|
|
PTOKEN_USER TokenInformation;
|
|
DWORD cbTokenInformation;
|
|
SID_IDENTIFIER_AUTHORITY sia = SECURITY_NT_AUTHORITY;
|
|
PSID psidLocalSystem;
|
|
|
|
TokenInformation = (PTOKEN_USER)FastBuffer;
|
|
cbTokenInformation = sizeof(FastBuffer);
|
|
|
|
if(!GetTokenInformation(
|
|
hToken,
|
|
TokenUser,
|
|
TokenInformation,
|
|
cbTokenInformation,
|
|
&cbTokenInformation
|
|
))
|
|
{
|
|
WAITSVC_LOGERR_LASTERR(fLogErrors)
|
|
break;
|
|
}
|
|
|
|
if(!AllocateAndInitializeSid(
|
|
&sia,
|
|
1,
|
|
SECURITY_LOCAL_SYSTEM_RID,
|
|
0, 0, 0, 0, 0, 0, 0,
|
|
&psidLocalSystem
|
|
))
|
|
{
|
|
WAITSVC_LOGERR_LASTERR(fLogErrors)
|
|
break;
|
|
}
|
|
|
|
fSystemAccount = EqualSid(
|
|
psidLocalSystem,
|
|
TokenInformation->User.Sid
|
|
);
|
|
|
|
FreeSid( psidLocalSystem );
|
|
|
|
} while (FALSE);
|
|
|
|
CloseHandle( hToken );
|
|
}
|
|
|
|
|
|
|
|
//
|
|
// number of seconds to Sleep per loop interation.
|
|
//
|
|
|
|
#define SLEEP_SECONDS (5)
|
|
|
|
|
|
if( fSystemAccount ) {
|
|
|
|
//
|
|
// 15 minutes for SYSTEM account.
|
|
//
|
|
|
|
dwStopCount = 900 / SLEEP_SECONDS;
|
|
|
|
} else {
|
|
|
|
//
|
|
//
|
|
// loop checking the service status every 5 seconds, for up to 2 minutes
|
|
// total (120 seconds, 5*24=120)
|
|
//
|
|
|
|
dwStopCount = 120 / SLEEP_SECONDS;
|
|
}
|
|
|
|
|
|
for( ; dwStopCount != 0 ; dwStopCount--, Sleep(SLEEP_SECONDS*1000) ) {
|
|
SERVICE_STATUS sServiceStatus;
|
|
DWORD dwWaitForStatus = 0;
|
|
|
|
//
|
|
// find out current service status
|
|
//
|
|
|
|
if(!QueryServiceStatus( schService, &sServiceStatus ))
|
|
{
|
|
WAITSVC_LOGERR_LASTERR(fLogErrors)
|
|
break;
|
|
}
|
|
|
|
//
|
|
// if service is running, indicate success
|
|
//
|
|
|
|
if( sServiceStatus.dwCurrentState == SERVICE_RUNNING ) {
|
|
|
|
if (fStartServiceCalled)
|
|
{
|
|
ErrLog_LogString(
|
|
NULL,
|
|
L"WAITSVC: Service is running: ",
|
|
pwszService,
|
|
TRUE);
|
|
}
|
|
|
|
fSuccess = TRUE;
|
|
break;
|
|
}
|
|
|
|
|
|
if( sServiceStatus.dwCurrentState == SERVICE_STOP_PENDING )
|
|
{
|
|
WAITSVC_LOGERR_LASTERR(fLogErrors)
|
|
// Wait until stopped
|
|
continue;
|
|
}
|
|
|
|
if( sServiceStatus.dwCurrentState == SERVICE_PAUSE_PENDING )
|
|
{
|
|
WAITSVC_LOGERR_LASTERR(fLogErrors)
|
|
// Wait until paused
|
|
continue;
|
|
}
|
|
|
|
//
|
|
// if start pending, wait and re-query.
|
|
//
|
|
|
|
if( sServiceStatus.dwCurrentState == SERVICE_START_PENDING )
|
|
{
|
|
// Wait until started
|
|
continue;
|
|
}
|
|
|
|
if(SERVICE_STOPPED == sServiceStatus.dwCurrentState)
|
|
{
|
|
// Attempt to start the service
|
|
|
|
|
|
SC_HANDLE schManualStartService = NULL;
|
|
DWORD dwError = ERROR_SUCCESS;
|
|
|
|
// The service is manual start
|
|
// so attempt to start it.
|
|
|
|
schManualStartService = OpenServiceW(schSCM,
|
|
pwszService,
|
|
SERVICE_START);
|
|
if(NULL == schManualStartService)
|
|
{
|
|
assert(0);
|
|
WAITSVC_LOGERR_LASTERR(fLogErrors)
|
|
goto cleanup;
|
|
}
|
|
|
|
|
|
ErrLog_LogString(
|
|
NULL,
|
|
L"WAITSVC: Calling StartService(): ",
|
|
pwszService,
|
|
TRUE);
|
|
fStartServiceCalled = TRUE;
|
|
|
|
|
|
if(!StartService(schManualStartService, 0, NULL))
|
|
{
|
|
dwError = GetLastError();
|
|
}
|
|
if(ERROR_SERVICE_ALREADY_RUNNING == dwError)
|
|
{
|
|
dwError = ERROR_SUCCESS;
|
|
}
|
|
|
|
CloseServiceHandle(schManualStartService);
|
|
if(ERROR_SUCCESS != dwError)
|
|
{
|
|
assert(0);
|
|
SetLastError(dwError);
|
|
WAITSVC_LOGERR_LASTERR(fLogErrors)
|
|
goto cleanup;
|
|
}
|
|
continue;
|
|
|
|
}
|
|
|
|
if(SERVICE_PAUSED == sServiceStatus.dwCurrentState)
|
|
{
|
|
// Attempt to start the service
|
|
|
|
|
|
SC_HANDLE schManualStartService = NULL;
|
|
DWORD dwError = ERROR_SUCCESS;
|
|
|
|
// The service is manual start
|
|
// so attempt to start it.
|
|
|
|
schManualStartService = OpenServiceW(schSCM,
|
|
pwszService,
|
|
SERVICE_PAUSE_CONTINUE);
|
|
if(NULL == schManualStartService)
|
|
{
|
|
assert(0);
|
|
WAITSVC_LOGERR_LASTERR(fLogErrors)
|
|
goto cleanup;
|
|
}
|
|
|
|
|
|
if(!ControlService(schManualStartService, SERVICE_CONTROL_CONTINUE, &sServiceStatus))
|
|
{
|
|
dwError = GetLastError();
|
|
|
|
}
|
|
if(ERROR_SERVICE_ALREADY_RUNNING == dwError)
|
|
{
|
|
dwError = ERROR_SUCCESS;
|
|
}
|
|
|
|
CloseServiceHandle(schManualStartService);
|
|
if(ERROR_SUCCESS != dwError)
|
|
{
|
|
assert(0);
|
|
SetLastError(dwError);
|
|
WAITSVC_LOGERR_LASTERR(fLogErrors)
|
|
goto cleanup;
|
|
}
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
//
|
|
// bail out on any other dwCurrentState
|
|
// eg: service stopped, error condition, etc.
|
|
//
|
|
|
|
break;
|
|
}
|
|
|
|
*pfDone = TRUE;
|
|
|
|
cleanup:
|
|
|
|
dwErr = GetLastError();
|
|
|
|
if(schService)
|
|
CloseServiceHandle(schService);
|
|
|
|
CloseServiceHandle(schSCM);
|
|
|
|
SetLastError(dwErr);
|
|
|
|
return fSuccess;
|
|
}
|