2 * PROJECT: ReactOS Service Control Manager
3 * LICENSE: GPL - See COPYING in the top level directory
4 * FILE: base/system/services/rpcserver.c
5 * PURPOSE: RPC server interface for the advapi32 calls
6 * COPYRIGHT: Copyright 2005-2006 Eric Kohl
7 * Copyright 2006-2007 Hervé Poussineau <hpoussin@reactos.org>
8 * Copyright 2007 Ged Murphy <gedmurphy@reactos.org>
11 /* INCLUDES ****************************************************************/
18 /* GLOBALS *****************************************************************/
20 #define MANAGER_TAG 0x72674D68 /* 'hMgr' */
21 #define SERVICE_TAG 0x63765368 /* 'hSvc' */
23 typedef struct _SCMGR_HANDLE
30 typedef struct _MANAGER_HANDLE
33 WCHAR DatabaseName
[1];
34 } MANAGER_HANDLE
, *PMANAGER_HANDLE
;
37 typedef struct _SERVICE_HANDLE
40 PSERVICE ServiceEntry
;
41 } SERVICE_HANDLE
, *PSERVICE_HANDLE
;
44 #define SC_MANAGER_READ \
45 (STANDARD_RIGHTS_READ | \
46 SC_MANAGER_QUERY_LOCK_STATUS | \
47 SC_MANAGER_ENUMERATE_SERVICE)
49 #define SC_MANAGER_WRITE \
50 (STANDARD_RIGHTS_WRITE | \
51 SC_MANAGER_MODIFY_BOOT_CONFIG | \
52 SC_MANAGER_CREATE_SERVICE)
54 #define SC_MANAGER_EXECUTE \
55 (STANDARD_RIGHTS_EXECUTE | \
57 SC_MANAGER_ENUMERATE_SERVICE | \
58 SC_MANAGER_CONNECT | \
59 SC_MANAGER_CREATE_SERVICE)
62 #define SERVICE_READ \
63 (STANDARD_RIGHTS_READ | \
64 SERVICE_INTERROGATE | \
65 SERVICE_ENUMERATE_DEPENDENTS | \
66 SERVICE_QUERY_STATUS | \
69 #define SERVICE_WRITE \
70 (STANDARD_RIGHTS_WRITE | \
71 SERVICE_CHANGE_CONFIG)
73 #define SERVICE_EXECUTE \
74 (STANDARD_RIGHTS_EXECUTE | \
75 SERVICE_USER_DEFINED_CONTROL | \
76 SERVICE_PAUSE_CONTINUE | \
80 #define TAG_ARRAY_SIZE 32
82 /* VARIABLES ***************************************************************/
84 static GENERIC_MAPPING
85 ScmManagerMapping
= {SC_MANAGER_READ
,
88 SC_MANAGER_ALL_ACCESS
};
90 static GENERIC_MAPPING
91 ScmServiceMapping
= {SERVICE_READ
,
97 /* FUNCTIONS ***************************************************************/
100 ScmStartRpcServer(VOID
)
104 DPRINT("ScmStartRpcServer() called\n");
106 Status
= RpcServerUseProtseqEpW(L
"ncacn_np",
110 if (Status
!= RPC_S_OK
)
112 DPRINT1("RpcServerUseProtseqEpW() failed (Status %lx)\n", Status
);
116 Status
= RpcServerRegisterIf(svcctl_v2_0_s_ifspec
,
119 if (Status
!= RPC_S_OK
)
121 DPRINT1("RpcServerRegisterIf() failed (Status %lx)\n", Status
);
125 Status
= RpcServerListen(1, 20, TRUE
);
126 if (Status
!= RPC_S_OK
)
128 DPRINT1("RpcServerListen() failed (Status %lx)\n", Status
);
132 DPRINT("ScmStartRpcServer() done\n");
137 ScmCreateManagerHandle(LPWSTR lpDatabaseName
,
142 if (lpDatabaseName
== NULL
)
143 lpDatabaseName
= SERVICES_ACTIVE_DATABASEW
;
145 if (_wcsicmp(lpDatabaseName
, SERVICES_FAILED_DATABASEW
) == 0)
147 DPRINT("Database %S, does not exist\n", lpDatabaseName
);
148 return ERROR_DATABASE_DOES_NOT_EXIST
;
150 else if (_wcsicmp(lpDatabaseName
, SERVICES_ACTIVE_DATABASEW
) != 0)
152 DPRINT("Invalid Database name %S.\n", lpDatabaseName
);
153 return ERROR_INVALID_NAME
;
156 Ptr
= HeapAlloc(GetProcessHeap(),
158 FIELD_OFFSET(MANAGER_HANDLE
, DatabaseName
[wcslen(lpDatabaseName
) + 1]));
160 return ERROR_NOT_ENOUGH_MEMORY
;
162 Ptr
->Handle
.Tag
= MANAGER_TAG
;
164 wcscpy(Ptr
->DatabaseName
, lpDatabaseName
);
166 *Handle
= (SC_HANDLE
)Ptr
;
168 return ERROR_SUCCESS
;
173 ScmCreateServiceHandle(PSERVICE lpServiceEntry
,
178 Ptr
= HeapAlloc(GetProcessHeap(),
180 sizeof(SERVICE_HANDLE
));
182 return ERROR_NOT_ENOUGH_MEMORY
;
184 Ptr
->Handle
.Tag
= SERVICE_TAG
;
186 Ptr
->ServiceEntry
= lpServiceEntry
;
188 *Handle
= (SC_HANDLE
)Ptr
;
190 return ERROR_SUCCESS
;
194 static PMANAGER_HANDLE
195 ScmGetServiceManagerFromHandle(SC_RPC_HANDLE Handle
)
197 PMANAGER_HANDLE pManager
= NULL
;
201 if (((PMANAGER_HANDLE
)Handle
)->Handle
.Tag
== MANAGER_TAG
)
202 pManager
= (PMANAGER_HANDLE
)Handle
;
204 _SEH2_EXCEPT(EXCEPTION_EXECUTE_HANDLER
)
206 DPRINT1("Exception: Invalid Service Manager handle!\n");
214 static PSERVICE_HANDLE
215 ScmGetServiceFromHandle(SC_RPC_HANDLE Handle
)
217 PSERVICE_HANDLE pService
= NULL
;
221 if (((PSERVICE_HANDLE
)Handle
)->Handle
.Tag
== SERVICE_TAG
)
222 pService
= (PSERVICE_HANDLE
)Handle
;
224 _SEH2_EXCEPT(EXCEPTION_EXECUTE_HANDLER
)
226 DPRINT1("Exception: Invalid Service handle!\n");
235 ScmCheckAccess(SC_HANDLE Handle
,
236 DWORD dwDesiredAccess
)
238 PMANAGER_HANDLE hMgr
;
240 hMgr
= (PMANAGER_HANDLE
)Handle
;
241 if (hMgr
->Handle
.Tag
== MANAGER_TAG
)
243 RtlMapGenericMask(&dwDesiredAccess
,
246 hMgr
->Handle
.DesiredAccess
= dwDesiredAccess
;
248 return ERROR_SUCCESS
;
250 else if (hMgr
->Handle
.Tag
== SERVICE_TAG
)
252 RtlMapGenericMask(&dwDesiredAccess
,
255 hMgr
->Handle
.DesiredAccess
= dwDesiredAccess
;
257 return ERROR_SUCCESS
;
260 return ERROR_INVALID_HANDLE
;
265 ScmAssignNewTag(PSERVICE lpService
)
269 DWORD dwGroupTagCount
= 0;
270 PDWORD pdwGroupTags
= NULL
;
272 DWORD dwTagUsedBase
= 1;
273 BOOLEAN TagUsed
[TAG_ARRAY_SIZE
];
277 PLIST_ENTRY ServiceEntry
;
278 PSERVICE CurrentService
;
280 ASSERT(lpService
!= NULL
);
281 ASSERT(lpService
->lpGroup
!= NULL
);
283 dwError
= RegOpenKeyExW(HKEY_LOCAL_MACHINE
,
284 L
"System\\CurrentControlSet\\Control\\GroupOrderList",
289 if (dwError
!= ERROR_SUCCESS
)
292 /* query value length */
294 dwError
= RegQueryValueExW(hKey
,
295 lpService
->lpGroup
->szGroupName
,
301 if (dwError
!= ERROR_SUCCESS
&& dwError
!= ERROR_MORE_DATA
)
304 pdwGroupTags
= HeapAlloc(GetProcessHeap(), 0, cbDataSize
);
307 dwError
= ERROR_NOT_ENOUGH_MEMORY
;
311 dwError
= RegQueryValueExW(hKey
,
312 lpService
->lpGroup
->szGroupName
,
315 (LPBYTE
)pdwGroupTags
,
318 if (dwError
!= ERROR_SUCCESS
)
321 if (cbDataSize
< sizeof(pdwGroupTags
[0]))
324 dwGroupTagCount
= min(pdwGroupTags
[0], cbDataSize
/ sizeof(pdwGroupTags
[0]) - 1);
329 /* mark all tags as unused */
330 for (i
= 0; i
< TAG_ARRAY_SIZE
; i
++)
333 /* mark tags in GroupOrderList as used */
334 for (i
= 1; i
<= dwGroupTagCount
; i
++)
336 nTagOffset
= pdwGroupTags
[i
] - dwTagUsedBase
;
337 if (nTagOffset
>= 0 && nTagOffset
< TAG_ARRAY_SIZE
)
338 TagUsed
[nTagOffset
] = TRUE
;
341 /* mark tags in service list as used */
342 ServiceEntry
= lpService
->ServiceListEntry
.Flink
;
343 while (ServiceEntry
!= &lpService
->ServiceListEntry
)
345 ASSERT(ServiceEntry
!= NULL
);
346 CurrentService
= CONTAINING_RECORD(ServiceEntry
, SERVICE
, ServiceListEntry
);
347 if (CurrentService
->lpGroup
== lpService
->lpGroup
)
349 nTagOffset
= CurrentService
->dwTag
- dwTagUsedBase
;
350 if (nTagOffset
>= 0 && nTagOffset
< TAG_ARRAY_SIZE
)
351 TagUsed
[nTagOffset
] = TRUE
;
354 ServiceEntry
= ServiceEntry
->Flink
;
357 /* find unused tag, if any */
358 for (i
= 0; i
< TAG_ARRAY_SIZE
; i
++)
362 dwFreeTag
= dwTagUsedBase
+ i
;
367 dwTagUsedBase
+= TAG_ARRAY_SIZE
;
368 } while (!dwFreeTag
);
372 HeapFree(GetProcessHeap(), 0, pdwGroupTags
);
379 lpService
->dwTag
= dwFreeTag
;
380 DPRINT("Assigning new tag %lu to service %S in group %S\n",
381 lpService
->dwTag
, lpService
->lpServiceName
, lpService
->lpGroup
->szGroupName
);
382 dwError
= ERROR_SUCCESS
;
386 DPRINT1("Failed to assign new tag to service %S, error=%lu\n",
387 lpService
->lpServiceName
, dwError
);
394 /* Create a path suitable for the bootloader out of the full path */
396 ScmConvertToBootPathName(wchar_t *CanonName
, wchar_t **RelativeName
)
398 DWORD ServiceNameLen
, BufferSize
, ExpandedLen
;
401 UNICODE_STRING NtPathName
, SystemRoot
, LinkTarget
;
402 OBJECT_ATTRIBUTES ObjectAttributes
;
404 HANDLE SymbolicLinkHandle
;
406 DPRINT("ScmConvertToBootPathName %S\n", CanonName
);
409 return ERROR_INVALID_PARAMETER
;
411 *RelativeName
= NULL
;
413 ServiceNameLen
= wcslen(CanonName
);
415 /* First check, if it's already good */
416 if (ServiceNameLen
> 12 &&
417 !_wcsnicmp(L
"\\SystemRoot\\", CanonName
, 12))
419 *RelativeName
= HeapAlloc(GetProcessHeap(),
421 (ServiceNameLen
+ 1) * sizeof(WCHAR
));
422 if (*RelativeName
== NULL
)
424 DPRINT("Error allocating memory for boot driver name!\n");
425 return ERROR_NOT_ENOUGH_MEMORY
;
429 wcscpy(*RelativeName
, CanonName
);
431 DPRINT("Bootdriver name %S\n", *RelativeName
);
432 return ERROR_SUCCESS
;
435 /* If it has %SystemRoot% prefix, substitute it to \System*/
436 if (ServiceNameLen
> 13 &&
437 !_wcsnicmp(L
"%SystemRoot%\\", CanonName
, 13))
439 /* There is no +sizeof(wchar_t) because the name is less by 1 wchar */
440 *RelativeName
= HeapAlloc(GetProcessHeap(),
442 ServiceNameLen
* sizeof(WCHAR
));
444 if (*RelativeName
== NULL
)
446 DPRINT("Error allocating memory for boot driver name!\n");
447 return ERROR_NOT_ENOUGH_MEMORY
;
451 wcscpy(*RelativeName
, L
"\\SystemRoot\\");
452 wcscat(*RelativeName
, CanonName
+ 13);
454 DPRINT("Bootdriver name %S\n", *RelativeName
);
455 return ERROR_SUCCESS
;
458 /* Get buffer size needed for expanding env strings */
459 BufferSize
= ExpandEnvironmentStringsW(L
"%SystemRoot%\\", &Dest
, 1);
463 DPRINT("Error during a call to ExpandEnvironmentStringsW()\n");
464 return ERROR_INVALID_ENVIRONMENT
;
467 /* Allocate memory, since the size is known now */
468 Expanded
= HeapAlloc(GetProcessHeap(),
470 (BufferSize
+ 1) * sizeof(WCHAR
));
473 DPRINT("Error allocating memory for boot driver name!\n");
474 return ERROR_NOT_ENOUGH_MEMORY
;
478 if (ExpandEnvironmentStringsW(L
"%SystemRoot%\\", Expanded
, BufferSize
) >
481 DPRINT("Error during a call to ExpandEnvironmentStringsW()\n");
482 HeapFree(GetProcessHeap(), 0, Expanded
);
483 return ERROR_NOT_ENOUGH_MEMORY
;
486 /* Convert to NT-style path */
487 if (!RtlDosPathNameToNtPathName_U(Expanded
, &NtPathName
, NULL
, NULL
))
489 DPRINT("Error during a call to RtlDosPathNameToNtPathName_U()\n");
490 return ERROR_INVALID_ENVIRONMENT
;
493 DPRINT("Converted to NT-style %wZ\n", &NtPathName
);
495 /* No need to keep the dos-path anymore */
496 HeapFree(GetProcessHeap(), 0, Expanded
);
498 /* Copy it to the allocated place */
499 Expanded
= HeapAlloc(GetProcessHeap(),
501 NtPathName
.Length
+ sizeof(UNICODE_NULL
));
504 DPRINT("Error allocating memory for boot driver name!\n");
505 return ERROR_NOT_ENOUGH_MEMORY
;
508 ExpandedLen
= NtPathName
.Length
/ sizeof(WCHAR
);
509 wcsncpy(Expanded
, NtPathName
.Buffer
, ExpandedLen
);
510 Expanded
[ExpandedLen
] = UNICODE_NULL
;
512 if (ServiceNameLen
> ExpandedLen
&&
513 !_wcsnicmp(Expanded
, CanonName
, ExpandedLen
))
515 /* Only \SystemRoot\ is missing */
516 *RelativeName
= HeapAlloc(GetProcessHeap(),
518 (ServiceNameLen
- ExpandedLen
) * sizeof(WCHAR
) + 13*sizeof(WCHAR
));
519 if (*RelativeName
== NULL
)
521 DPRINT("Error allocating memory for boot driver name!\n");
522 HeapFree(GetProcessHeap(), 0, Expanded
);
523 return ERROR_NOT_ENOUGH_MEMORY
;
526 wcscpy(*RelativeName
, L
"\\SystemRoot\\");
527 wcscat(*RelativeName
, CanonName
+ ExpandedLen
);
529 RtlFreeUnicodeString(&NtPathName
);
530 return ERROR_SUCCESS
;
533 /* The most complex case starts here */
534 RtlInitUnicodeString(&SystemRoot
, L
"\\SystemRoot");
535 InitializeObjectAttributes(&ObjectAttributes
,
537 OBJ_CASE_INSENSITIVE
,
541 /* Open this symlink */
542 Status
= NtOpenSymbolicLinkObject(&SymbolicLinkHandle
, SYMBOLIC_LINK_QUERY
, &ObjectAttributes
);
544 if (NT_SUCCESS(Status
))
546 LinkTarget
.Length
= 0;
547 LinkTarget
.MaximumLength
= 0;
549 DPRINT("Opened symbolic link object\n");
551 Status
= NtQuerySymbolicLinkObject(SymbolicLinkHandle
, &LinkTarget
, &BufferSize
);
552 if (NT_SUCCESS(Status
) || Status
== STATUS_BUFFER_TOO_SMALL
)
554 /* Check if required buffer size is sane */
555 if (BufferSize
> 0xFFFD)
557 DPRINT("Too large buffer required\n");
559 if (SymbolicLinkHandle
) NtClose(SymbolicLinkHandle
);
560 HeapFree(GetProcessHeap(), 0, Expanded
);
561 return ERROR_NOT_ENOUGH_MEMORY
;
564 /* Alloc the string */
565 LinkTarget
.Length
= (USHORT
)BufferSize
;
566 LinkTarget
.MaximumLength
= LinkTarget
.Length
+ sizeof(UNICODE_NULL
);
567 LinkTarget
.Buffer
= HeapAlloc(GetProcessHeap(),
569 LinkTarget
.MaximumLength
);
570 if (!LinkTarget
.Buffer
)
572 DPRINT("Unable to alloc buffer\n");
573 if (SymbolicLinkHandle
) NtClose(SymbolicLinkHandle
);
574 HeapFree(GetProcessHeap(), 0, Expanded
);
575 return ERROR_NOT_ENOUGH_MEMORY
;
578 /* Do a real query now */
579 Status
= NtQuerySymbolicLinkObject(SymbolicLinkHandle
, &LinkTarget
, &BufferSize
);
580 if (NT_SUCCESS(Status
))
582 DPRINT("LinkTarget: %wZ\n", &LinkTarget
);
584 ExpandedLen
= LinkTarget
.Length
/ sizeof(WCHAR
);
585 if ((ServiceNameLen
> ExpandedLen
) &&
586 !_wcsnicmp(LinkTarget
.Buffer
, CanonName
, ExpandedLen
))
588 *RelativeName
= HeapAlloc(GetProcessHeap(),
590 (ServiceNameLen
- ExpandedLen
) * sizeof(WCHAR
) + 13*sizeof(WCHAR
));
592 if (*RelativeName
== NULL
)
594 DPRINT("Unable to alloc buffer\n");
595 if (SymbolicLinkHandle
) NtClose(SymbolicLinkHandle
);
596 HeapFree(GetProcessHeap(), 0, Expanded
);
597 RtlFreeUnicodeString(&NtPathName
);
598 return ERROR_NOT_ENOUGH_MEMORY
;
601 /* Copy it over, substituting the first part
603 wcscpy(*RelativeName
, L
"\\SystemRoot\\");
604 wcscat(*RelativeName
, CanonName
+ExpandedLen
+1);
607 if (SymbolicLinkHandle
) NtClose(SymbolicLinkHandle
);
608 HeapFree(GetProcessHeap(), 0, Expanded
);
609 RtlFreeUnicodeString(&NtPathName
);
612 return ERROR_SUCCESS
;
616 if (SymbolicLinkHandle
) NtClose(SymbolicLinkHandle
);
617 HeapFree(GetProcessHeap(), 0, Expanded
);
618 RtlFreeUnicodeString(&NtPathName
);
619 return ERROR_INVALID_PARAMETER
;
624 DPRINT("Error, Status = %08X\n", Status
);
625 if (SymbolicLinkHandle
) NtClose(SymbolicLinkHandle
);
626 HeapFree(GetProcessHeap(), 0, Expanded
);
627 RtlFreeUnicodeString(&NtPathName
);
628 return ERROR_INVALID_PARAMETER
;
633 DPRINT("Error, Status = %08X\n", Status
);
634 if (SymbolicLinkHandle
) NtClose(SymbolicLinkHandle
);
635 HeapFree(GetProcessHeap(), 0, Expanded
);
636 RtlFreeUnicodeString(&NtPathName
);
637 return ERROR_INVALID_PARAMETER
;
643 DPRINT("Error, Status = %08X\n", Status
);
644 HeapFree(GetProcessHeap(), 0, Expanded
);
645 return ERROR_INVALID_PARAMETER
;
651 ScmCanonDriverImagePath(DWORD dwStartType
,
652 const wchar_t *lpServiceName
,
653 wchar_t **lpCanonName
)
655 DWORD ServiceNameLen
, Result
;
656 UNICODE_STRING NtServiceName
;
658 const WCHAR
*SourceName
= lpServiceName
;
660 /* Calculate the length of the service's name */
661 ServiceNameLen
= wcslen(lpServiceName
);
663 /* 12 is wcslen(L"\\SystemRoot\\") */
664 if (ServiceNameLen
> 12 &&
665 !_wcsnicmp(L
"\\SystemRoot\\", lpServiceName
, 12))
667 /* SystemRoot prefix is already included */
668 *lpCanonName
= HeapAlloc(GetProcessHeap(),
670 (ServiceNameLen
+ 1) * sizeof(WCHAR
));
672 if (*lpCanonName
== NULL
)
674 DPRINT("Error allocating memory for canonized service name!\n");
675 return ERROR_NOT_ENOUGH_MEMORY
;
678 /* If it's a boot-time driver, it must be systemroot relative */
679 if (dwStartType
== SERVICE_BOOT_START
)
683 wcscpy(*lpCanonName
, SourceName
);
685 DPRINT("Canonicalized name %S\n", *lpCanonName
);
689 /* Check if it has %SystemRoot% (len=13) */
690 if (ServiceNameLen
> 13 &&
691 !_wcsnicmp(L
"%SystemRoot%\\", lpServiceName
, 13))
693 /* Substitute %SystemRoot% with \\SystemRoot\\ */
694 *lpCanonName
= HeapAlloc(GetProcessHeap(),
696 (ServiceNameLen
+ 1) * sizeof(WCHAR
));
698 if (*lpCanonName
== NULL
)
700 DPRINT("Error allocating memory for canonized service name!\n");
701 return ERROR_NOT_ENOUGH_MEMORY
;
704 /* If it's a boot-time driver, it must be systemroot relative */
705 if (dwStartType
== SERVICE_BOOT_START
)
706 wcscpy(*lpCanonName
, L
"\\SystemRoot\\");
708 wcscat(*lpCanonName
, lpServiceName
+ 13);
710 DPRINT("Canonicalized name %S\n", *lpCanonName
);
714 /* Check if it's a relative path name */
715 if (lpServiceName
[0] != L
'\\' && lpServiceName
[1] != L
':')
717 *lpCanonName
= HeapAlloc(GetProcessHeap(),
719 (ServiceNameLen
+ 1) * sizeof(WCHAR
));
721 if (*lpCanonName
== NULL
)
723 DPRINT("Error allocating memory for canonized service name!\n");
724 return ERROR_NOT_ENOUGH_MEMORY
;
727 /* Just copy it over without changing */
728 wcscpy(*lpCanonName
, lpServiceName
);
733 /* It seems to be a DOS path, convert it */
734 if (!RtlDosPathNameToNtPathName_U(lpServiceName
, &NtServiceName
, NULL
, NULL
))
736 DPRINT("RtlDosPathNameToNtPathName_U() failed!\n");
737 return ERROR_INVALID_PARAMETER
;
740 *lpCanonName
= HeapAlloc(GetProcessHeap(),
742 NtServiceName
.Length
+ sizeof(WCHAR
));
744 if (*lpCanonName
== NULL
)
746 DPRINT("Error allocating memory for canonized service name!\n");
747 RtlFreeUnicodeString(&NtServiceName
);
748 return ERROR_NOT_ENOUGH_MEMORY
;
751 /* Copy the string */
752 wcsncpy(*lpCanonName
, NtServiceName
.Buffer
, NtServiceName
.Length
/ sizeof(WCHAR
));
754 /* The unicode string is not needed anymore */
755 RtlFreeUnicodeString(&NtServiceName
);
757 if (dwStartType
!= SERVICE_BOOT_START
)
759 DPRINT("Canonicalized name %S\n", *lpCanonName
);
763 /* The service is boot-started, so must be relative */
764 Result
= ScmConvertToBootPathName(*lpCanonName
, &RelativeName
);
767 /* There is a problem, free name and return */
768 HeapFree(GetProcessHeap(), 0, *lpCanonName
);
769 DPRINT("Error converting named!\n");
773 ASSERT(RelativeName
);
775 /* Copy that string */
776 wcscpy(*lpCanonName
, RelativeName
+ 12);
778 /* Free the allocated buffer */
779 HeapFree(GetProcessHeap(), 0, RelativeName
);
781 DPRINT("Canonicalized name %S\n", *lpCanonName
);
788 /* Internal recursive function */
789 /* Need to search for every dependency on every service */
791 Int_EnumDependentServicesW(HKEY hServicesKey
,
793 DWORD dwServiceState
,
794 PSERVICE
*lpServices
,
795 LPDWORD pcbBytesNeeded
,
796 LPDWORD lpServicesReturned
)
798 DWORD dwError
= ERROR_SUCCESS
;
799 WCHAR szNameBuf
[MAX_PATH
];
800 WCHAR szValueBuf
[MAX_PATH
];
801 WCHAR
*lpszNameBuf
= szNameBuf
;
802 WCHAR
*lpszValueBuf
= szValueBuf
;
806 PSERVICE lpCurrentService
;
807 HKEY hServiceEnumKey
;
808 DWORD dwCurrentServiceState
= SERVICE_ACTIVE
;
809 DWORD dwDependServiceStrPtr
= 0;
810 DWORD dwRequiredSize
= 0;
812 /* Get the number of service keys */
813 dwError
= RegQueryInfoKeyW(hServicesKey
,
825 if (dwError
!= ERROR_SUCCESS
)
827 DPRINT("ERROR! Unable to get number of services keys.\n");
831 /* Iterate the service keys to see if another service depends on the this service */
832 for (dwIteration
= 0; dwIteration
< dwNumSubKeys
; dwIteration
++)
835 dwError
= RegEnumKeyExW(hServicesKey
,
843 if (dwError
!= ERROR_SUCCESS
)
846 /* Open the Service key */
847 dwError
= RegOpenKeyExW(hServicesKey
,
852 if (dwError
!= ERROR_SUCCESS
)
857 /* Check for the DependOnService Value */
858 dwError
= RegQueryValueExW(hServiceEnumKey
,
862 (LPBYTE
)lpszValueBuf
,
865 /* FIXME: Handle load order. */
867 /* If the service found has a DependOnService value */
868 if (dwError
== ERROR_SUCCESS
)
870 dwDependServiceStrPtr
= 0;
872 /* Can be more than one Dependencies in the DependOnService string */
873 while (wcslen(lpszValueBuf
+ dwDependServiceStrPtr
) > 0)
875 if (_wcsicmp(lpszValueBuf
+ dwDependServiceStrPtr
, lpService
->lpServiceName
) == 0)
877 /* Get the current enumed service pointer */
878 lpCurrentService
= ScmGetServiceEntryByName(lpszNameBuf
);
880 /* Check for valid Service */
881 if (!lpCurrentService
)
883 /* This should never happen! */
884 DPRINT("This should not happen at this point, report to Developer\n");
885 return ERROR_NOT_FOUND
;
888 /* Determine state the service is in */
889 if (lpCurrentService
->Status
.dwCurrentState
== SERVICE_STOPPED
)
890 dwCurrentServiceState
= SERVICE_INACTIVE
;
892 /* If the ServiceState matches that requested or searching for SERVICE_STATE_ALL */
893 if ((dwCurrentServiceState
== dwServiceState
) ||
894 (dwServiceState
== SERVICE_STATE_ALL
))
896 /* Calculate the required size */
897 dwRequiredSize
+= sizeof(SERVICE_STATUS
);
898 dwRequiredSize
+= ((wcslen(lpCurrentService
->lpServiceName
) + 1) * sizeof(WCHAR
));
899 dwRequiredSize
+= ((wcslen(lpCurrentService
->lpDisplayName
) + 1) * sizeof(WCHAR
));
901 /* Add the size for service name and display name pointers */
902 dwRequiredSize
+= (2 * sizeof(PVOID
));
904 /* increase the BytesNeeded size */
905 *pcbBytesNeeded
= *pcbBytesNeeded
+ dwRequiredSize
;
907 /* Don't fill callers buffer yet, as MSDN read that the last service with dependency
910 /* Recursive call to check for its dependencies */
911 Int_EnumDependentServicesW(hServicesKey
,
918 /* If the lpServices is valid set the service pointer */
920 lpServices
[*lpServicesReturned
] = lpCurrentService
;
922 *lpServicesReturned
= *lpServicesReturned
+ 1;
926 dwDependServiceStrPtr
+= (wcslen(lpszValueBuf
+ dwDependServiceStrPtr
) + 1);
929 else if (*pcbBytesNeeded
)
931 dwError
= ERROR_SUCCESS
;
934 RegCloseKey(hServiceEnumKey
);
942 DWORD
RCloseServiceHandle(
943 LPSC_RPC_HANDLE hSCObject
)
945 PMANAGER_HANDLE hManager
;
946 PSERVICE_HANDLE hService
;
950 DWORD pcbBytesNeeded
= 0;
951 DWORD dwServicesReturned
= 0;
953 DPRINT("RCloseServiceHandle() called\n");
955 DPRINT("hSCObject = %p\n", *hSCObject
);
958 return ERROR_INVALID_HANDLE
;
960 hManager
= ScmGetServiceManagerFromHandle(*hSCObject
);
961 hService
= ScmGetServiceFromHandle(*hSCObject
);
963 if (hManager
!= NULL
)
965 DPRINT("Found manager handle\n");
967 /* FIXME: add handle cleanup code */
969 HeapFree(GetProcessHeap(), 0, hManager
);
974 DPRINT("RCloseServiceHandle() done\n");
975 return ERROR_SUCCESS
;
977 else if (hService
!= NULL
)
979 DPRINT("Found service handle\n");
981 /* Lock the service database exlusively */
982 ScmLockDatabaseExclusive();
984 /* Get the pointer to the service record */
985 lpService
= hService
->ServiceEntry
;
987 /* FIXME: add handle cleanup code */
989 /* Free the handle */
990 HeapFree(GetProcessHeap(), 0, hService
);
993 ASSERT(lpService
->dwRefCount
> 0);
995 lpService
->dwRefCount
--;
996 DPRINT("CloseServiceHandle - lpService->dwRefCount %u\n",
997 lpService
->dwRefCount
);
999 if (lpService
->dwRefCount
== 0)
1001 /* If this service has been marked for deletion */
1002 if (lpService
->bDeleted
)
1004 /* Open the Services Reg key */
1005 dwError
= RegOpenKeyExW(HKEY_LOCAL_MACHINE
,
1006 L
"System\\CurrentControlSet\\Services",
1008 KEY_SET_VALUE
| KEY_READ
,
1010 if (dwError
!= ERROR_SUCCESS
)
1012 DPRINT("Failed to open services key\n");
1013 ScmUnlockDatabase();
1017 /* Call the internal function with NULL, just to get bytes we need */
1018 Int_EnumDependentServicesW(hServicesKey
,
1023 &dwServicesReturned
);
1025 /* if pcbBytesNeeded returned a value then there are services running that are dependent on this service */
1028 DPRINT("Deletion failed due to running dependencies.\n");
1029 RegCloseKey(hServicesKey
);
1030 ScmUnlockDatabase();
1031 return ERROR_SUCCESS
;
1034 /* There are no references and no runnning dependencies,
1035 it is now safe to delete the service */
1037 /* Delete the Service Key */
1038 dwError
= RegDeleteKeyW(hServicesKey
,
1039 lpService
->lpServiceName
);
1041 RegCloseKey(hServicesKey
);
1043 if (dwError
!= ERROR_SUCCESS
)
1045 DPRINT("Failed to Delete the Service Registry key\n");
1046 ScmUnlockDatabase();
1050 /* Delete the Service */
1051 ScmDeleteServiceRecord(lpService
);
1055 ScmUnlockDatabase();
1059 DPRINT("RCloseServiceHandle() done\n");
1060 return ERROR_SUCCESS
;
1063 DPRINT("Invalid handle tag (Tag %lx)\n", hManager
->Handle
.Tag
);
1065 return ERROR_INVALID_HANDLE
;
1070 DWORD
RControlService(
1071 SC_RPC_HANDLE hService
,
1073 LPSERVICE_STATUS lpServiceStatus
)
1075 PSERVICE_HANDLE hSvc
;
1077 ACCESS_MASK DesiredAccess
;
1078 DWORD dwError
= ERROR_SUCCESS
;
1079 DWORD pcbBytesNeeded
= 0;
1080 DWORD dwServicesReturned
= 0;
1081 DWORD dwControlsAccepted
;
1082 DWORD dwCurrentState
;
1083 HKEY hServicesKey
= NULL
;
1085 DPRINT("RControlService() called\n");
1088 return ERROR_SHUTDOWN_IN_PROGRESS
;
1090 /* Check the service handle */
1091 hSvc
= ScmGetServiceFromHandle(hService
);
1094 DPRINT1("Invalid service handle!\n");
1095 return ERROR_INVALID_HANDLE
;
1098 /* Check the service entry point */
1099 lpService
= hSvc
->ServiceEntry
;
1100 if (lpService
== NULL
)
1102 DPRINT1("lpService == NULL!\n");
1103 return ERROR_INVALID_HANDLE
;
1106 /* Check access rights */
1109 case SERVICE_CONTROL_STOP
:
1110 DesiredAccess
= SERVICE_STOP
;
1113 case SERVICE_CONTROL_PAUSE
:
1114 case SERVICE_CONTROL_CONTINUE
:
1115 DesiredAccess
= SERVICE_PAUSE_CONTINUE
;
1118 case SERVICE_CONTROL_INTERROGATE
:
1119 DesiredAccess
= SERVICE_INTERROGATE
;
1123 if (dwControl
>= 128 && dwControl
<= 255)
1124 DesiredAccess
= SERVICE_USER_DEFINED_CONTROL
;
1126 return ERROR_INVALID_PARAMETER
;
1130 if (!RtlAreAllAccessesGranted(hSvc
->Handle
.DesiredAccess
,
1132 return ERROR_ACCESS_DENIED
;
1134 /* Return the current service status information */
1135 RtlCopyMemory(lpServiceStatus
,
1137 sizeof(SERVICE_STATUS
));
1139 if (dwControl
== SERVICE_CONTROL_STOP
)
1141 /* Check if the service has dependencies running as windows
1142 doesn't stop a service that does */
1144 /* Open the Services Reg key */
1145 dwError
= RegOpenKeyExW(HKEY_LOCAL_MACHINE
,
1146 L
"System\\CurrentControlSet\\Services",
1150 if (dwError
!= ERROR_SUCCESS
)
1152 DPRINT("Failed to open services key\n");
1156 /* Call the internal function with NULL, just to get bytes we need */
1157 Int_EnumDependentServicesW(hServicesKey
,
1162 &dwServicesReturned
);
1164 RegCloseKey(hServicesKey
);
1166 /* If pcbBytesNeeded is not zero then there are services running that
1167 are dependent on this service */
1168 if (pcbBytesNeeded
!= 0)
1170 DPRINT("Service has running dependencies. Failed to stop service.\n");
1171 return ERROR_DEPENDENT_SERVICES_RUNNING
;
1175 if (lpService
->Status
.dwServiceType
& SERVICE_DRIVER
)
1177 /* Send control code to the driver */
1178 dwError
= ScmControlDriver(lpService
,
1184 dwControlsAccepted
= lpService
->Status
.dwControlsAccepted
;
1185 dwCurrentState
= lpService
->Status
.dwCurrentState
;
1187 /* Return ERROR_SERVICE_NOT_ACTIVE if the service has not been started */
1188 if (lpService
->lpImage
== NULL
|| dwCurrentState
== SERVICE_STOPPED
)
1189 return ERROR_SERVICE_NOT_ACTIVE
;
1191 /* Check the current state before sending a control request */
1192 switch (dwCurrentState
)
1194 case SERVICE_STOP_PENDING
:
1195 case SERVICE_STOPPED
:
1196 return ERROR_SERVICE_CANNOT_ACCEPT_CTRL
;
1198 case SERVICE_START_PENDING
:
1201 case SERVICE_CONTROL_STOP
:
1204 case SERVICE_CONTROL_INTERROGATE
:
1205 RtlCopyMemory(lpServiceStatus
,
1207 sizeof(SERVICE_STATUS
));
1208 return ERROR_SUCCESS
;
1211 return ERROR_SERVICE_CANNOT_ACCEPT_CTRL
;
1216 /* Check if the control code is acceptable to the service */
1219 case SERVICE_CONTROL_STOP
:
1220 if ((dwControlsAccepted
& SERVICE_ACCEPT_STOP
) == 0)
1221 return ERROR_INVALID_SERVICE_CONTROL
;
1224 case SERVICE_CONTROL_PAUSE
:
1225 case SERVICE_CONTROL_CONTINUE
:
1226 if ((dwControlsAccepted
& SERVICE_ACCEPT_PAUSE_CONTINUE
) == 0)
1227 return ERROR_INVALID_SERVICE_CONTROL
;
1231 /* Send control code to the service */
1232 dwError
= ScmControlService(lpService
,
1235 /* Return service status information */
1236 RtlCopyMemory(lpServiceStatus
,
1238 sizeof(SERVICE_STATUS
));
1246 DWORD
RDeleteService(
1247 SC_RPC_HANDLE hService
)
1249 PSERVICE_HANDLE hSvc
;
1253 DPRINT("RDeleteService() called\n");
1256 return ERROR_SHUTDOWN_IN_PROGRESS
;
1258 hSvc
= ScmGetServiceFromHandle(hService
);
1261 DPRINT1("Invalid service handle!\n");
1262 return ERROR_INVALID_HANDLE
;
1265 if (!RtlAreAllAccessesGranted(hSvc
->Handle
.DesiredAccess
,
1267 return ERROR_ACCESS_DENIED
;
1269 lpService
= hSvc
->ServiceEntry
;
1270 if (lpService
== NULL
)
1272 DPRINT("lpService == NULL!\n");
1273 return ERROR_INVALID_HANDLE
;
1276 /* Lock the service database exclusively */
1277 ScmLockDatabaseExclusive();
1279 if (lpService
->bDeleted
)
1281 DPRINT("The service has already been marked for delete!\n");
1282 dwError
= ERROR_SERVICE_MARKED_FOR_DELETE
;
1286 /* Mark service for delete */
1287 lpService
->bDeleted
= TRUE
;
1289 dwError
= ScmMarkServiceForDelete(lpService
);
1292 /* Unlock the service database */
1293 ScmUnlockDatabase();
1295 DPRINT("RDeleteService() done\n");
1302 DWORD
RLockServiceDatabase(
1303 SC_RPC_HANDLE hSCManager
,
1304 LPSC_RPC_LOCK lpLock
)
1306 PMANAGER_HANDLE hMgr
;
1308 DPRINT("RLockServiceDatabase() called\n");
1312 hMgr
= ScmGetServiceManagerFromHandle(hSCManager
);
1315 DPRINT1("Invalid service manager handle!\n");
1316 return ERROR_INVALID_HANDLE
;
1319 if (!RtlAreAllAccessesGranted(hMgr
->Handle
.DesiredAccess
,
1321 return ERROR_ACCESS_DENIED
;
1323 // return ScmLockDatabase(0, hMgr->0xC, hLock);
1325 /* FIXME: Lock the database */
1326 *lpLock
= (SC_RPC_LOCK
)0x12345678; /* Dummy! */
1328 return ERROR_SUCCESS
;
1333 DWORD
RQueryServiceObjectSecurity(
1334 SC_RPC_HANDLE hService
,
1335 SECURITY_INFORMATION dwSecurityInformation
,
1336 LPBYTE lpSecurityDescriptor
,
1338 LPBOUNDED_DWORD_256K pcbBytesNeeded
)
1340 PSERVICE_HANDLE hSvc
;
1342 ULONG DesiredAccess
= 0;
1344 DWORD dwBytesNeeded
;
1348 SECURITY_DESCRIPTOR ObjectDescriptor
;
1350 DPRINT("RQueryServiceObjectSecurity() called\n");
1352 hSvc
= ScmGetServiceFromHandle(hService
);
1355 DPRINT1("Invalid service handle!\n");
1356 return ERROR_INVALID_HANDLE
;
1359 if (dwSecurityInformation
& (DACL_SECURITY_INFORMATION
|
1360 GROUP_SECURITY_INFORMATION
|
1361 OWNER_SECURITY_INFORMATION
))
1362 DesiredAccess
|= READ_CONTROL
;
1364 if (dwSecurityInformation
& SACL_SECURITY_INFORMATION
)
1365 DesiredAccess
|= ACCESS_SYSTEM_SECURITY
;
1367 if (!RtlAreAllAccessesGranted(hSvc
->Handle
.DesiredAccess
,
1370 DPRINT("Insufficient access rights! 0x%lx\n", hSvc
->Handle
.DesiredAccess
);
1371 return ERROR_ACCESS_DENIED
;
1374 lpService
= hSvc
->ServiceEntry
;
1375 if (lpService
== NULL
)
1377 DPRINT("lpService == NULL!\n");
1378 return ERROR_INVALID_HANDLE
;
1381 /* Lock the service database */
1382 ScmLockDatabaseShared();
1386 Status
= RtlCreateSecurityDescriptor(&ObjectDescriptor
, SECURITY_DESCRIPTOR_REVISION
);
1388 Status
= RtlQuerySecurityObject(&ObjectDescriptor
/* lpService->lpSecurityDescriptor */,
1389 dwSecurityInformation
,
1390 (PSECURITY_DESCRIPTOR
)lpSecurityDescriptor
,
1394 /* Unlock the service database */
1395 ScmUnlockDatabase();
1397 if (NT_SUCCESS(Status
))
1399 *pcbBytesNeeded
= dwBytesNeeded
;
1400 dwError
= STATUS_SUCCESS
;
1402 else if (Status
== STATUS_BUFFER_TOO_SMALL
)
1404 *pcbBytesNeeded
= dwBytesNeeded
;
1405 dwError
= ERROR_INSUFFICIENT_BUFFER
;
1407 else if (Status
== STATUS_BAD_DESCRIPTOR_FORMAT
)
1409 dwError
= ERROR_GEN_FAILURE
;
1413 dwError
= RtlNtStatusToDosError(Status
);
1421 DWORD
RSetServiceObjectSecurity(
1422 SC_RPC_HANDLE hService
,
1423 DWORD dwSecurityInformation
,
1424 LPBYTE lpSecurityDescriptor
,
1425 DWORD dwSecuityDescriptorSize
)
1427 PSERVICE_HANDLE hSvc
;
1429 ULONG DesiredAccess
= 0;
1430 /* HANDLE hToken = NULL; */
1432 /* NTSTATUS Status; */
1435 DPRINT("RSetServiceObjectSecurity() called\n");
1437 hSvc
= ScmGetServiceFromHandle(hService
);
1440 DPRINT1("Invalid service handle!\n");
1441 return ERROR_INVALID_HANDLE
;
1444 if (dwSecurityInformation
== 0 ||
1445 dwSecurityInformation
& ~(OWNER_SECURITY_INFORMATION
| GROUP_SECURITY_INFORMATION
1446 | DACL_SECURITY_INFORMATION
| SACL_SECURITY_INFORMATION
))
1447 return ERROR_INVALID_PARAMETER
;
1449 if (!RtlValidSecurityDescriptor((PSECURITY_DESCRIPTOR
)lpSecurityDescriptor
))
1450 return ERROR_INVALID_PARAMETER
;
1452 if (dwSecurityInformation
& SACL_SECURITY_INFORMATION
)
1453 DesiredAccess
|= ACCESS_SYSTEM_SECURITY
;
1455 if (dwSecurityInformation
& DACL_SECURITY_INFORMATION
)
1456 DesiredAccess
|= WRITE_DAC
;
1458 if (dwSecurityInformation
& (OWNER_SECURITY_INFORMATION
| GROUP_SECURITY_INFORMATION
))
1459 DesiredAccess
|= WRITE_OWNER
;
1461 if ((dwSecurityInformation
& OWNER_SECURITY_INFORMATION
) &&
1462 (((PISECURITY_DESCRIPTOR
)lpSecurityDescriptor
)->Owner
== NULL
))
1463 return ERROR_INVALID_PARAMETER
;
1465 if ((dwSecurityInformation
& GROUP_SECURITY_INFORMATION
) &&
1466 (((PISECURITY_DESCRIPTOR
)lpSecurityDescriptor
)->Group
== NULL
))
1467 return ERROR_INVALID_PARAMETER
;
1469 if (!RtlAreAllAccessesGranted(hSvc
->Handle
.DesiredAccess
,
1472 DPRINT("Insufficient access rights! 0x%lx\n", hSvc
->Handle
.DesiredAccess
);
1473 return ERROR_ACCESS_DENIED
;
1476 lpService
= hSvc
->ServiceEntry
;
1477 if (lpService
== NULL
)
1479 DPRINT("lpService == NULL!\n");
1480 return ERROR_INVALID_HANDLE
;
1483 if (lpService
->bDeleted
)
1484 return ERROR_SERVICE_MARKED_FOR_DELETE
;
1487 RpcImpersonateClient(NULL
);
1489 Status
= NtOpenThreadToken(NtCurrentThread(),
1493 if (!NT_SUCCESS(Status
))
1494 return RtlNtStatusToDosError(Status
);
1499 /* Lock the service database exclusive */
1500 ScmLockDatabaseExclusive();
1503 Status
= RtlSetSecurityObject(dwSecurityInformation
,
1504 (PSECURITY_DESCRIPTOR
)lpSecurityDescriptor
,
1505 &lpService
->lpSecurityDescriptor
,
1508 if (!NT_SUCCESS(Status
))
1510 dwError
= RtlNtStatusToDosError(Status
);
1515 dwError
= ScmOpenServiceKey(lpService
->lpServiceName
,
1516 READ_CONTROL
| KEY_CREATE_SUB_KEY
| KEY_SET_VALUE
,
1518 if (dwError
!= ERROR_SUCCESS
)
1522 dwError
= ERROR_SUCCESS
;
1523 // dwError = ScmWriteSecurityDescriptor(hServiceKey,
1524 // lpService->lpSecurityDescriptor);
1526 RegFlushKey(hServiceKey
);
1527 RegCloseKey(hServiceKey
);
1536 /* Unlock service database */
1537 ScmUnlockDatabase();
1539 DPRINT("RSetServiceObjectSecurity() done (Error %lu)\n", dwError
);
1546 DWORD
RQueryServiceStatus(
1547 SC_RPC_HANDLE hService
,
1548 LPSERVICE_STATUS lpServiceStatus
)
1550 PSERVICE_HANDLE hSvc
;
1553 DPRINT("RQueryServiceStatus() called\n");
1556 return ERROR_SHUTDOWN_IN_PROGRESS
;
1558 hSvc
= ScmGetServiceFromHandle(hService
);
1561 DPRINT1("Invalid service handle!\n");
1562 return ERROR_INVALID_HANDLE
;
1565 if (!RtlAreAllAccessesGranted(hSvc
->Handle
.DesiredAccess
,
1566 SERVICE_QUERY_STATUS
))
1568 DPRINT("Insufficient access rights! 0x%lx\n", hSvc
->Handle
.DesiredAccess
);
1569 return ERROR_ACCESS_DENIED
;
1572 lpService
= hSvc
->ServiceEntry
;
1573 if (lpService
== NULL
)
1575 DPRINT("lpService == NULL!\n");
1576 return ERROR_INVALID_HANDLE
;
1579 /* Lock the service database shared */
1580 ScmLockDatabaseShared();
1582 /* Return service status information */
1583 RtlCopyMemory(lpServiceStatus
,
1585 sizeof(SERVICE_STATUS
));
1587 /* Unlock the service database */
1588 ScmUnlockDatabase();
1590 return ERROR_SUCCESS
;
1595 ScmIsValidServiceState(DWORD dwCurrentState
)
1597 switch (dwCurrentState
)
1599 case SERVICE_STOPPED
:
1600 case SERVICE_START_PENDING
:
1601 case SERVICE_STOP_PENDING
:
1602 case SERVICE_RUNNING
:
1603 case SERVICE_CONTINUE_PENDING
:
1604 case SERVICE_PAUSE_PENDING
:
1605 case SERVICE_PAUSED
:
1615 DWORD
RSetServiceStatus(
1616 RPC_SERVICE_STATUS_HANDLE hServiceStatus
,
1617 LPSERVICE_STATUS lpServiceStatus
)
1620 DWORD dwPreviousState
;
1621 LPCWSTR lpErrorStrings
[2];
1622 WCHAR szErrorBuffer
[32];
1624 DPRINT("RSetServiceStatus() called\n");
1625 DPRINT("hServiceStatus = %p\n", hServiceStatus
);
1626 DPRINT("dwServiceType = %lu\n", lpServiceStatus
->dwServiceType
);
1627 DPRINT("dwCurrentState = %lu\n", lpServiceStatus
->dwCurrentState
);
1628 DPRINT("dwControlsAccepted = %lu\n", lpServiceStatus
->dwControlsAccepted
);
1629 DPRINT("dwWin32ExitCode = %lu\n", lpServiceStatus
->dwWin32ExitCode
);
1630 DPRINT("dwServiceSpecificExitCode = %lu\n", lpServiceStatus
->dwServiceSpecificExitCode
);
1631 DPRINT("dwCheckPoint = %lu\n", lpServiceStatus
->dwCheckPoint
);
1632 DPRINT("dwWaitHint = %lu\n", lpServiceStatus
->dwWaitHint
);
1634 if (hServiceStatus
== 0)
1636 DPRINT("hServiceStatus == NULL!\n");
1637 return ERROR_INVALID_HANDLE
;
1640 lpService
= (PSERVICE
)hServiceStatus
;
1641 if (lpService
== NULL
)
1643 DPRINT("lpService == NULL!\n");
1644 return ERROR_INVALID_HANDLE
;
1647 /* Check current state */
1648 if (!ScmIsValidServiceState(lpServiceStatus
->dwCurrentState
))
1650 DPRINT("Invalid service state!\n");
1651 return ERROR_INVALID_DATA
;
1654 /* Check service type */
1655 if (!(lpServiceStatus
->dwServiceType
& SERVICE_WIN32
) &&
1656 (lpServiceStatus
->dwServiceType
& SERVICE_DRIVER
))
1658 DPRINT("Invalid service type!\n");
1659 return ERROR_INVALID_DATA
;
1662 /* Check accepted controls */
1663 if (lpServiceStatus
->dwControlsAccepted
& ~0xFF)
1665 DPRINT("Invalid controls accepted!\n");
1666 return ERROR_INVALID_DATA
;
1669 /* Lock the service database exclusively */
1670 ScmLockDatabaseExclusive();
1672 /* Save the current service state */
1673 dwPreviousState
= lpService
->Status
.dwCurrentState
;
1675 RtlCopyMemory(&lpService
->Status
,
1677 sizeof(SERVICE_STATUS
));
1679 /* Unlock the service database */
1680 ScmUnlockDatabase();
1682 /* Log a failed service stop */
1683 if ((lpServiceStatus
->dwCurrentState
== SERVICE_STOPPED
) &&
1684 (dwPreviousState
!= SERVICE_STOPPED
))
1686 if (lpServiceStatus
->dwWin32ExitCode
!= ERROR_SUCCESS
)
1688 swprintf(szErrorBuffer
, L
"%lu", lpServiceStatus
->dwWin32ExitCode
);
1689 lpErrorStrings
[0] = lpService
->lpDisplayName
;
1690 lpErrorStrings
[1] = szErrorBuffer
;
1692 ScmLogError(EVENT_SERVICE_EXIT_FAILED
,
1698 DPRINT("Set %S to %lu\n", lpService
->lpDisplayName
, lpService
->Status
.dwCurrentState
);
1699 DPRINT("RSetServiceStatus() done\n");
1701 return ERROR_SUCCESS
;
1706 DWORD
RUnlockServiceDatabase(
1710 return ERROR_SUCCESS
;
1715 DWORD
RNotifyBootConfigStatus(
1716 SVCCTL_HANDLEW lpMachineName
,
1717 DWORD BootAcceptable
)
1719 DPRINT1("RNotifyBootConfigStatus(%p %lu) called\n", lpMachineName
, BootAcceptable
);
1720 return ERROR_SUCCESS
;
1723 // return ERROR_CALL_NOT_IMPLEMENTED;
1728 DWORD
RI_ScSetServiceBitsW(
1729 RPC_SERVICE_STATUS_HANDLE hServiceStatus
,
1730 DWORD dwServiceBits
,
1732 int bUpdateImmediately
,
1736 return ERROR_CALL_NOT_IMPLEMENTED
;
1741 DWORD
RChangeServiceConfigW(
1742 SC_RPC_HANDLE hService
,
1743 DWORD dwServiceType
,
1745 DWORD dwErrorControl
,
1746 LPWSTR lpBinaryPathName
,
1747 LPWSTR lpLoadOrderGroup
,
1749 LPBYTE lpDependencies
,
1751 LPWSTR lpServiceStartName
,
1754 LPWSTR lpDisplayName
)
1756 DWORD dwError
= ERROR_SUCCESS
;
1757 PSERVICE_HANDLE hSvc
;
1758 PSERVICE lpService
= NULL
;
1759 HKEY hServiceKey
= NULL
;
1760 LPWSTR lpDisplayNameW
= NULL
;
1761 LPWSTR lpImagePathW
= NULL
;
1763 DPRINT("RChangeServiceConfigW() called\n");
1764 DPRINT("dwServiceType = %lu\n", dwServiceType
);
1765 DPRINT("dwStartType = %lu\n", dwStartType
);
1766 DPRINT("dwErrorControl = %lu\n", dwErrorControl
);
1767 DPRINT("lpBinaryPathName = %S\n", lpBinaryPathName
);
1768 DPRINT("lpLoadOrderGroup = %S\n", lpLoadOrderGroup
);
1769 DPRINT("lpDisplayName = %S\n", lpDisplayName
);
1772 return ERROR_SHUTDOWN_IN_PROGRESS
;
1774 hSvc
= ScmGetServiceFromHandle(hService
);
1777 DPRINT1("Invalid service handle!\n");
1778 return ERROR_INVALID_HANDLE
;
1781 if (!RtlAreAllAccessesGranted(hSvc
->Handle
.DesiredAccess
,
1782 SERVICE_CHANGE_CONFIG
))
1784 DPRINT("Insufficient access rights! 0x%lx\n", hSvc
->Handle
.DesiredAccess
);
1785 return ERROR_ACCESS_DENIED
;
1788 lpService
= hSvc
->ServiceEntry
;
1789 if (lpService
== NULL
)
1791 DPRINT("lpService == NULL!\n");
1792 return ERROR_INVALID_HANDLE
;
1795 /* Lock the service database exclusively */
1796 ScmLockDatabaseExclusive();
1798 if (lpService
->bDeleted
)
1800 DPRINT("The service has already been marked for delete!\n");
1801 dwError
= ERROR_SERVICE_MARKED_FOR_DELETE
;
1805 /* Open the service key */
1806 dwError
= ScmOpenServiceKey(lpService
->szServiceName
,
1809 if (dwError
!= ERROR_SUCCESS
)
1812 /* Write service data to the registry */
1813 /* Set the display name */
1814 if (lpDisplayName
!= NULL
&& *lpDisplayName
!= 0)
1816 RegSetValueExW(hServiceKey
,
1820 (LPBYTE
)lpDisplayName
,
1821 (wcslen(lpDisplayName
) + 1) * sizeof(WCHAR
));
1823 /* Update the display name */
1824 lpDisplayNameW
= HeapAlloc(GetProcessHeap(),
1826 (wcslen(lpDisplayName
) + 1) * sizeof(WCHAR
));
1827 if (lpDisplayNameW
== NULL
)
1829 dwError
= ERROR_NOT_ENOUGH_MEMORY
;
1833 if (lpService
->lpDisplayName
!= lpService
->lpServiceName
)
1834 HeapFree(GetProcessHeap(), 0, lpService
->lpDisplayName
);
1836 lpService
->lpDisplayName
= lpDisplayNameW
;
1839 if (dwServiceType
!= SERVICE_NO_CHANGE
)
1841 /* Set the service type */
1842 dwError
= RegSetValueExW(hServiceKey
,
1846 (LPBYTE
)&dwServiceType
,
1848 if (dwError
!= ERROR_SUCCESS
)
1851 lpService
->Status
.dwServiceType
= dwServiceType
;
1854 if (dwStartType
!= SERVICE_NO_CHANGE
)
1856 /* Set the start value */
1857 dwError
= RegSetValueExW(hServiceKey
,
1861 (LPBYTE
)&dwStartType
,
1863 if (dwError
!= ERROR_SUCCESS
)
1866 lpService
->dwStartType
= dwStartType
;
1869 if (dwErrorControl
!= SERVICE_NO_CHANGE
)
1871 /* Set the error control value */
1872 dwError
= RegSetValueExW(hServiceKey
,
1876 (LPBYTE
)&dwErrorControl
,
1878 if (dwError
!= ERROR_SUCCESS
)
1881 lpService
->dwErrorControl
= dwErrorControl
;
1884 if (lpBinaryPathName
!= NULL
&& *lpBinaryPathName
!= 0)
1886 /* Set the image path */
1887 lpImagePathW
= lpBinaryPathName
;
1889 if (lpService
->Status
.dwServiceType
& SERVICE_DRIVER
)
1891 dwError
= ScmCanonDriverImagePath(lpService
->dwStartType
,
1895 if (dwError
!= ERROR_SUCCESS
)
1899 dwError
= RegSetValueExW(hServiceKey
,
1903 (LPBYTE
)lpImagePathW
,
1904 (wcslen(lpImagePathW
) + 1) * sizeof(WCHAR
));
1906 if (lpImagePathW
!= lpBinaryPathName
)
1907 HeapFree(GetProcessHeap(), 0, lpImagePathW
);
1909 if (dwError
!= ERROR_SUCCESS
)
1913 /* Set the group name */
1914 if (lpLoadOrderGroup
!= NULL
&& *lpLoadOrderGroup
!= 0)
1916 dwError
= RegSetValueExW(hServiceKey
,
1920 (LPBYTE
)lpLoadOrderGroup
,
1921 (wcslen(lpLoadOrderGroup
) + 1) * sizeof(WCHAR
));
1922 if (dwError
!= ERROR_SUCCESS
)
1925 dwError
= ScmSetServiceGroup(lpService
,
1927 if (dwError
!= ERROR_SUCCESS
)
1931 if (lpdwTagId
!= NULL
)
1933 dwError
= ScmAssignNewTag(lpService
);
1934 if (dwError
!= ERROR_SUCCESS
)
1937 dwError
= RegSetValueExW(hServiceKey
,
1941 (LPBYTE
)&lpService
->dwTag
,
1943 if (dwError
!= ERROR_SUCCESS
)
1946 *lpdwTagId
= lpService
->dwTag
;
1949 /* Write dependencies */
1950 if (lpDependencies
!= NULL
&& *lpDependencies
!= 0)
1952 dwError
= ScmWriteDependencies(hServiceKey
,
1953 (LPWSTR
)lpDependencies
,
1955 if (dwError
!= ERROR_SUCCESS
)
1959 if (lpPassword
!= NULL
)
1961 /* FIXME: Write password */
1965 if (hServiceKey
!= NULL
)
1966 RegCloseKey(hServiceKey
);
1968 /* Unlock the service database */
1969 ScmUnlockDatabase();
1971 DPRINT("RChangeServiceConfigW() done (Error %lu)\n", dwError
);
1978 DWORD
RCreateServiceW(
1979 SC_RPC_HANDLE hSCManager
,
1980 LPCWSTR lpServiceName
,
1981 LPCWSTR lpDisplayName
,
1982 DWORD dwDesiredAccess
,
1983 DWORD dwServiceType
,
1985 DWORD dwErrorControl
,
1986 LPCWSTR lpBinaryPathName
,
1987 LPCWSTR lpLoadOrderGroup
,
1989 LPBYTE lpDependencies
,
1991 LPCWSTR lpServiceStartName
,
1994 LPSC_RPC_HANDLE lpServiceHandle
)
1996 PMANAGER_HANDLE hManager
;
1997 DWORD dwError
= ERROR_SUCCESS
;
1998 PSERVICE lpService
= NULL
;
1999 SC_HANDLE hServiceHandle
= NULL
;
2000 LPWSTR lpImagePath
= NULL
;
2001 HKEY hServiceKey
= NULL
;
2002 LPWSTR lpObjectName
;
2004 DPRINT("RCreateServiceW() called\n");
2005 DPRINT("lpServiceName = %S\n", lpServiceName
);
2006 DPRINT("lpDisplayName = %S\n", lpDisplayName
);
2007 DPRINT("dwDesiredAccess = %lx\n", dwDesiredAccess
);
2008 DPRINT("dwServiceType = %lu\n", dwServiceType
);
2009 DPRINT("dwStartType = %lu\n", dwStartType
);
2010 DPRINT("dwErrorControl = %lu\n", dwErrorControl
);
2011 DPRINT("lpBinaryPathName = %S\n", lpBinaryPathName
);
2012 DPRINT("lpLoadOrderGroup = %S\n", lpLoadOrderGroup
);
2013 DPRINT("lpdwTagId = %p\n", lpdwTagId
);
2016 return ERROR_SHUTDOWN_IN_PROGRESS
;
2018 hManager
= ScmGetServiceManagerFromHandle(hSCManager
);
2019 if (hManager
== NULL
)
2021 DPRINT1("Invalid service manager handle!\n");
2022 return ERROR_INVALID_HANDLE
;
2025 /* Check access rights */
2026 if (!RtlAreAllAccessesGranted(hManager
->Handle
.DesiredAccess
,
2027 SC_MANAGER_CREATE_SERVICE
))
2029 DPRINT("Insufficient access rights! 0x%lx\n",
2030 hManager
->Handle
.DesiredAccess
);
2031 return ERROR_ACCESS_DENIED
;
2034 if (wcslen(lpServiceName
) == 0)
2036 return ERROR_INVALID_NAME
;
2039 if (wcslen(lpBinaryPathName
) == 0)
2041 return ERROR_INVALID_PARAMETER
;
2044 /* Check for invalid service type value */
2045 if ((dwServiceType
!= SERVICE_KERNEL_DRIVER
) &&
2046 (dwServiceType
!= SERVICE_FILE_SYSTEM_DRIVER
) &&
2047 ((dwServiceType
& ~SERVICE_INTERACTIVE_PROCESS
) != SERVICE_WIN32_OWN_PROCESS
) &&
2048 ((dwServiceType
& ~SERVICE_INTERACTIVE_PROCESS
) != SERVICE_WIN32_SHARE_PROCESS
))
2049 return ERROR_INVALID_PARAMETER
;
2051 /* Check for invalid start type value */
2052 if ((dwStartType
!= SERVICE_BOOT_START
) &&
2053 (dwStartType
!= SERVICE_SYSTEM_START
) &&
2054 (dwStartType
!= SERVICE_AUTO_START
) &&
2055 (dwStartType
!= SERVICE_DEMAND_START
) &&
2056 (dwStartType
!= SERVICE_DISABLED
))
2057 return ERROR_INVALID_PARAMETER
;
2059 /* Only drivers can be boot start or system start services */
2060 if ((dwStartType
== SERVICE_BOOT_START
) ||
2061 (dwStartType
== SERVICE_SYSTEM_START
))
2063 if ((dwServiceType
!= SERVICE_KERNEL_DRIVER
) &&
2064 (dwServiceType
!= SERVICE_FILE_SYSTEM_DRIVER
))
2065 return ERROR_INVALID_PARAMETER
;
2068 /* Check for invalid error control value */
2069 if ((dwErrorControl
!= SERVICE_ERROR_IGNORE
) &&
2070 (dwErrorControl
!= SERVICE_ERROR_NORMAL
) &&
2071 (dwErrorControl
!= SERVICE_ERROR_SEVERE
) &&
2072 (dwErrorControl
!= SERVICE_ERROR_CRITICAL
))
2073 return ERROR_INVALID_PARAMETER
;
2075 if ((dwServiceType
== (SERVICE_WIN32_OWN_PROCESS
| SERVICE_INTERACTIVE_PROCESS
)) &&
2076 (lpServiceStartName
))
2078 return ERROR_INVALID_PARAMETER
;
2081 if (lpdwTagId
&& (!lpLoadOrderGroup
|| !*lpLoadOrderGroup
))
2083 return ERROR_INVALID_PARAMETER
;
2086 /* Lock the service database exclusively */
2087 ScmLockDatabaseExclusive();
2089 lpService
= ScmGetServiceEntryByName(lpServiceName
);
2092 /* Unlock the service database */
2093 ScmUnlockDatabase();
2095 /* Check if it is marked for deletion */
2096 if (lpService
->bDeleted
)
2097 return ERROR_SERVICE_MARKED_FOR_DELETE
;
2099 /* Return Error exist */
2100 return ERROR_SERVICE_EXISTS
;
2103 if (lpDisplayName
!= NULL
&&
2104 ScmGetServiceEntryByDisplayName(lpDisplayName
) != NULL
)
2106 /* Unlock the service database */
2107 ScmUnlockDatabase();
2109 return ERROR_DUPLICATE_SERVICE_NAME
;
2112 if (dwServiceType
& SERVICE_DRIVER
)
2114 dwError
= ScmCanonDriverImagePath(dwStartType
,
2117 if (dwError
!= ERROR_SUCCESS
)
2122 if (dwStartType
== SERVICE_BOOT_START
||
2123 dwStartType
== SERVICE_SYSTEM_START
)
2125 /* Unlock the service database */
2126 ScmUnlockDatabase();
2128 return ERROR_INVALID_PARAMETER
;
2132 /* Allocate a new service entry */
2133 dwError
= ScmCreateNewServiceRecord(lpServiceName
,
2135 if (dwError
!= ERROR_SUCCESS
)
2138 /* Fill the new service entry */
2139 lpService
->Status
.dwServiceType
= dwServiceType
;
2140 lpService
->dwStartType
= dwStartType
;
2141 lpService
->dwErrorControl
= dwErrorControl
;
2143 /* Fill the display name */
2144 if (lpDisplayName
!= NULL
&&
2145 *lpDisplayName
!= 0 &&
2146 _wcsicmp(lpService
->lpDisplayName
, lpDisplayName
) != 0)
2148 lpService
->lpDisplayName
= HeapAlloc(GetProcessHeap(), 0,
2149 (wcslen(lpDisplayName
) + 1) * sizeof(WCHAR
));
2150 if (lpService
->lpDisplayName
== NULL
)
2152 dwError
= ERROR_NOT_ENOUGH_MEMORY
;
2155 wcscpy(lpService
->lpDisplayName
, lpDisplayName
);
2158 /* Assign the service to a group */
2159 if (lpLoadOrderGroup
!= NULL
&& *lpLoadOrderGroup
!= 0)
2161 dwError
= ScmSetServiceGroup(lpService
,
2163 if (dwError
!= ERROR_SUCCESS
)
2167 /* Assign a new tag */
2168 if (lpdwTagId
!= NULL
)
2170 dwError
= ScmAssignNewTag(lpService
);
2171 if (dwError
!= ERROR_SUCCESS
)
2175 /* Write service data to the registry */
2176 /* Create the service key */
2177 dwError
= ScmCreateServiceKey(lpServiceName
,
2180 if (dwError
!= ERROR_SUCCESS
)
2183 /* Set the display name */
2184 if (lpDisplayName
!= NULL
&& *lpDisplayName
!= 0)
2186 RegSetValueExW(hServiceKey
,
2190 (LPBYTE
)lpDisplayName
,
2191 (wcslen(lpDisplayName
) + 1) * sizeof(WCHAR
));
2194 /* Set the service type */
2195 dwError
= RegSetValueExW(hServiceKey
,
2199 (LPBYTE
)&dwServiceType
,
2201 if (dwError
!= ERROR_SUCCESS
)
2204 /* Set the start value */
2205 dwError
= RegSetValueExW(hServiceKey
,
2209 (LPBYTE
)&dwStartType
,
2211 if (dwError
!= ERROR_SUCCESS
)
2214 /* Set the error control value */
2215 dwError
= RegSetValueExW(hServiceKey
,
2219 (LPBYTE
)&dwErrorControl
,
2221 if (dwError
!= ERROR_SUCCESS
)
2224 /* Set the image path */
2225 if (dwServiceType
& SERVICE_WIN32
)
2227 dwError
= RegSetValueExW(hServiceKey
,
2231 (LPBYTE
)lpBinaryPathName
,
2232 (wcslen(lpBinaryPathName
) + 1) * sizeof(WCHAR
));
2233 if (dwError
!= ERROR_SUCCESS
)
2236 else if (dwServiceType
& SERVICE_DRIVER
)
2238 dwError
= RegSetValueExW(hServiceKey
,
2242 (LPBYTE
)lpImagePath
,
2243 (wcslen(lpImagePath
) + 1) * sizeof(WCHAR
));
2244 if (dwError
!= ERROR_SUCCESS
)
2248 /* Set the group name */
2249 if (lpLoadOrderGroup
!= NULL
&& *lpLoadOrderGroup
!= 0)
2251 dwError
= RegSetValueExW(hServiceKey
,
2255 (LPBYTE
)lpLoadOrderGroup
,
2256 (wcslen(lpLoadOrderGroup
) + 1) * sizeof(WCHAR
));
2257 if (dwError
!= ERROR_SUCCESS
)
2261 if (lpdwTagId
!= NULL
)
2263 dwError
= RegSetValueExW(hServiceKey
,
2267 (LPBYTE
)&lpService
->dwTag
,
2269 if (dwError
!= ERROR_SUCCESS
)
2273 /* Write dependencies */
2274 if (lpDependencies
!= NULL
&& *lpDependencies
!= 0)
2276 dwError
= ScmWriteDependencies(hServiceKey
,
2277 (LPCWSTR
)lpDependencies
,
2279 if (dwError
!= ERROR_SUCCESS
)
2283 /* Write service start name */
2284 if (dwServiceType
& SERVICE_WIN32
)
2286 lpObjectName
= (lpServiceStartName
!= NULL
) ? (LPWSTR
)lpServiceStartName
: L
"LocalSystem";
2287 dwError
= RegSetValueExW(hServiceKey
,
2291 (LPBYTE
)lpObjectName
,
2292 (wcslen(lpObjectName
) + 1) * sizeof(WCHAR
));
2293 if (dwError
!= ERROR_SUCCESS
)
2297 if (lpPassword
!= NULL
)
2299 /* FIXME: Write password */
2302 dwError
= ScmCreateServiceHandle(lpService
,
2304 if (dwError
!= ERROR_SUCCESS
)
2307 dwError
= ScmCheckAccess(hServiceHandle
,
2309 if (dwError
!= ERROR_SUCCESS
)
2312 lpService
->dwRefCount
= 1;
2313 DPRINT("CreateService - lpService->dwRefCount %u\n", lpService
->dwRefCount
);
2316 /* Unlock the service database */
2317 ScmUnlockDatabase();
2319 if (hServiceKey
!= NULL
)
2320 RegCloseKey(hServiceKey
);
2322 if (dwError
== ERROR_SUCCESS
)
2324 DPRINT("hService %p\n", hServiceHandle
);
2325 *lpServiceHandle
= (SC_RPC_HANDLE
)hServiceHandle
;
2327 if (lpdwTagId
!= NULL
)
2328 *lpdwTagId
= lpService
->dwTag
;
2332 if (lpService
!= NULL
&&
2333 lpService
->lpServiceName
!= NULL
)
2335 /* Release the display name buffer */
2336 HeapFree(GetProcessHeap(), 0, lpService
->lpDisplayName
);
2341 /* Remove the service handle */
2342 HeapFree(GetProcessHeap(), 0, hServiceHandle
);
2345 if (lpService
!= NULL
)
2347 /* FIXME: remove the service entry */
2351 if (lpImagePath
!= NULL
)
2352 HeapFree(GetProcessHeap(), 0, lpImagePath
);
2354 DPRINT("RCreateServiceW() done (Error %lu)\n", dwError
);
2361 DWORD
REnumDependentServicesW(
2362 SC_RPC_HANDLE hService
,
2363 DWORD dwServiceState
,
2366 LPBOUNDED_DWORD_256K pcbBytesNeeded
,
2367 LPBOUNDED_DWORD_256K lpServicesReturned
)
2369 DWORD dwError
= ERROR_SUCCESS
;
2370 DWORD dwServicesReturned
= 0;
2371 DWORD dwServiceCount
;
2372 HKEY hServicesKey
= NULL
;
2373 PSERVICE_HANDLE hSvc
;
2374 PSERVICE lpService
= NULL
;
2375 PSERVICE
*lpServicesArray
= NULL
;
2376 LPENUM_SERVICE_STATUSW lpServicesPtr
= NULL
;
2379 *pcbBytesNeeded
= 0;
2380 *lpServicesReturned
= 0;
2382 DPRINT("REnumDependentServicesW() called\n");
2384 hSvc
= ScmGetServiceFromHandle(hService
);
2387 DPRINT1("Invalid service handle!\n");
2388 return ERROR_INVALID_HANDLE
;
2391 lpService
= hSvc
->ServiceEntry
;
2393 /* Check access rights */
2394 if (!RtlAreAllAccessesGranted(hSvc
->Handle
.DesiredAccess
,
2395 SC_MANAGER_ENUMERATE_SERVICE
))
2397 DPRINT("Insufficient access rights! 0x%lx\n",
2398 hSvc
->Handle
.DesiredAccess
);
2399 return ERROR_ACCESS_DENIED
;
2402 /* Open the Services Reg key */
2403 dwError
= RegOpenKeyExW(HKEY_LOCAL_MACHINE
,
2404 L
"System\\CurrentControlSet\\Services",
2408 if (dwError
!= ERROR_SUCCESS
)
2411 /* First determine the bytes needed and get the number of dependent services */
2412 dwError
= Int_EnumDependentServicesW(hServicesKey
,
2417 &dwServicesReturned
);
2418 if (dwError
!= ERROR_SUCCESS
)
2421 /* If buffer size is less than the bytes needed or pointer is null */
2422 if ((!lpServices
) || (cbBufSize
< *pcbBytesNeeded
))
2424 dwError
= ERROR_MORE_DATA
;
2428 /* Allocate memory for array of service pointers */
2429 lpServicesArray
= HeapAlloc(GetProcessHeap(),
2431 (dwServicesReturned
+ 1) * sizeof(PSERVICE
));
2432 if (!lpServicesArray
)
2434 DPRINT1("Could not allocate a buffer!!\n");
2435 dwError
= ERROR_NOT_ENOUGH_MEMORY
;
2439 dwServicesReturned
= 0;
2440 *pcbBytesNeeded
= 0;
2442 dwError
= Int_EnumDependentServicesW(hServicesKey
,
2447 &dwServicesReturned
);
2448 if (dwError
!= ERROR_SUCCESS
)
2453 lpServicesPtr
= (LPENUM_SERVICE_STATUSW
) lpServices
;
2454 lpStr
= (LPWSTR
)(lpServices
+ (dwServicesReturned
* sizeof(ENUM_SERVICE_STATUSW
)));
2456 /* Copy EnumDepenedentService to Buffer */
2457 for (dwServiceCount
= 0; dwServiceCount
< dwServicesReturned
; dwServiceCount
++)
2459 lpService
= lpServicesArray
[dwServiceCount
];
2461 /* Copy status info */
2462 memcpy(&lpServicesPtr
->ServiceStatus
,
2464 sizeof(SERVICE_STATUS
));
2466 /* Copy display name */
2467 wcscpy(lpStr
, lpService
->lpDisplayName
);
2468 lpServicesPtr
->lpDisplayName
= (LPWSTR
)((ULONG_PTR
)lpStr
- (ULONG_PTR
)lpServices
);
2469 lpStr
+= (wcslen(lpService
->lpDisplayName
) + 1);
2471 /* Copy service name */
2472 wcscpy(lpStr
, lpService
->lpServiceName
);
2473 lpServicesPtr
->lpServiceName
= (LPWSTR
)((ULONG_PTR
)lpStr
- (ULONG_PTR
)lpServices
);
2474 lpStr
+= (wcslen(lpService
->lpServiceName
) + 1);
2479 *lpServicesReturned
= dwServicesReturned
;
2482 if (lpServicesArray
!= NULL
)
2483 HeapFree(GetProcessHeap(), 0, lpServicesArray
);
2485 RegCloseKey(hServicesKey
);
2487 DPRINT("REnumDependentServicesW() done (Error %lu)\n", dwError
);
2494 DWORD
REnumServicesStatusW(
2495 SC_RPC_HANDLE hSCManager
,
2496 DWORD dwServiceType
,
2497 DWORD dwServiceState
,
2500 LPBOUNDED_DWORD_256K pcbBytesNeeded
,
2501 LPBOUNDED_DWORD_256K lpServicesReturned
,
2502 LPBOUNDED_DWORD_256K lpResumeHandle
)
2504 /* Enumerate all the services, not regarding of their group */
2505 return REnumServiceGroupW(hSCManager
,
2518 DWORD
ROpenSCManagerW(
2519 LPWSTR lpMachineName
,
2520 LPWSTR lpDatabaseName
,
2521 DWORD dwDesiredAccess
,
2522 LPSC_RPC_HANDLE lpScHandle
)
2527 DPRINT("ROpenSCManagerW() called\n");
2528 DPRINT("lpMachineName = %p\n", lpMachineName
);
2529 DPRINT("lpMachineName: %S\n", lpMachineName
);
2530 DPRINT("lpDataBaseName = %p\n", lpDatabaseName
);
2531 DPRINT("lpDataBaseName: %S\n", lpDatabaseName
);
2532 DPRINT("dwDesiredAccess = %x\n", dwDesiredAccess
);
2535 return ERROR_SHUTDOWN_IN_PROGRESS
;
2538 return ERROR_INVALID_PARAMETER
;
2540 dwError
= ScmCreateManagerHandle(lpDatabaseName
,
2542 if (dwError
!= ERROR_SUCCESS
)
2544 DPRINT("ScmCreateManagerHandle() failed (Error %lu)\n", dwError
);
2548 /* Check the desired access */
2549 dwError
= ScmCheckAccess(hHandle
,
2550 dwDesiredAccess
| SC_MANAGER_CONNECT
);
2551 if (dwError
!= ERROR_SUCCESS
)
2553 DPRINT("ScmCheckAccess() failed (Error %lu)\n", dwError
);
2554 HeapFree(GetProcessHeap(), 0, hHandle
);
2558 *lpScHandle
= (SC_RPC_HANDLE
)hHandle
;
2559 DPRINT("*hScm = %p\n", *lpScHandle
);
2561 DPRINT("ROpenSCManagerW() done\n");
2563 return ERROR_SUCCESS
;
2568 DWORD
ROpenServiceW(
2569 SC_RPC_HANDLE hSCManager
,
2570 LPWSTR lpServiceName
,
2571 DWORD dwDesiredAccess
,
2572 LPSC_RPC_HANDLE lpServiceHandle
)
2575 PMANAGER_HANDLE hManager
;
2577 DWORD dwError
= ERROR_SUCCESS
;
2579 DPRINT("ROpenServiceW() called\n");
2580 DPRINT("hSCManager = %p\n", hSCManager
);
2581 DPRINT("lpServiceName = %p\n", lpServiceName
);
2582 DPRINT("lpServiceName: %S\n", lpServiceName
);
2583 DPRINT("dwDesiredAccess = %x\n", dwDesiredAccess
);
2586 return ERROR_SHUTDOWN_IN_PROGRESS
;
2588 hManager
= ScmGetServiceManagerFromHandle(hSCManager
);
2589 if (hManager
== NULL
)
2591 DPRINT1("Invalid service manager handle!\n");
2592 return ERROR_INVALID_HANDLE
;
2595 if (!lpServiceHandle
)
2596 return ERROR_INVALID_PARAMETER
;
2599 return ERROR_INVALID_ADDRESS
;
2601 /* Lock the service database exclusive */
2602 ScmLockDatabaseExclusive();
2604 /* Get service database entry */
2605 lpService
= ScmGetServiceEntryByName(lpServiceName
);
2606 if (lpService
== NULL
)
2608 DPRINT("Could not find a service!\n");
2609 dwError
= ERROR_SERVICE_DOES_NOT_EXIST
;
2613 /* Create a service handle */
2614 dwError
= ScmCreateServiceHandle(lpService
,
2616 if (dwError
!= ERROR_SUCCESS
)
2618 DPRINT("ScmCreateServiceHandle() failed (Error %lu)\n", dwError
);
2622 /* Check the desired access */
2623 dwError
= ScmCheckAccess(hHandle
,
2625 if (dwError
!= ERROR_SUCCESS
)
2627 DPRINT("ScmCheckAccess() failed (Error %lu)\n", dwError
);
2628 HeapFree(GetProcessHeap(), 0, hHandle
);
2632 lpService
->dwRefCount
++;
2633 DPRINT("OpenService - lpService->dwRefCount %u\n",lpService
->dwRefCount
);
2635 *lpServiceHandle
= (SC_RPC_HANDLE
)hHandle
;
2636 DPRINT("*hService = %p\n", *lpServiceHandle
);
2639 /* Unlock the service database */
2640 ScmUnlockDatabase();
2642 DPRINT("ROpenServiceW() done\n");
2649 DWORD
RQueryServiceConfigW(
2650 SC_RPC_HANDLE hService
,
2651 LPBYTE lpBuf
, //LPQUERY_SERVICE_CONFIGW lpServiceConfig,
2653 LPBOUNDED_DWORD_8K pcbBytesNeeded
)
2655 LPQUERY_SERVICE_CONFIGW lpServiceConfig
= (LPQUERY_SERVICE_CONFIGW
)lpBuf
;
2656 DWORD dwError
= ERROR_SUCCESS
;
2657 PSERVICE_HANDLE hSvc
;
2658 PSERVICE lpService
= NULL
;
2659 HKEY hServiceKey
= NULL
;
2660 LPWSTR lpImagePath
= NULL
;
2661 LPWSTR lpServiceStartName
= NULL
;
2662 LPWSTR lpDependencies
= NULL
;
2663 DWORD dwDependenciesLength
= 0;
2664 DWORD dwRequiredSize
;
2665 LPQUERY_SERVICE_CONFIGW lpConfig
= NULL
;
2666 WCHAR lpEmptyString
[] = {0,0};
2669 DPRINT("RQueryServiceConfigW() called\n");
2672 return ERROR_SHUTDOWN_IN_PROGRESS
;
2674 hSvc
= ScmGetServiceFromHandle(hService
);
2677 DPRINT1("Invalid service handle!\n");
2678 return ERROR_INVALID_HANDLE
;
2681 if (!RtlAreAllAccessesGranted(hSvc
->Handle
.DesiredAccess
,
2682 SERVICE_QUERY_CONFIG
))
2684 DPRINT("Insufficient access rights! 0x%lx\n", hSvc
->Handle
.DesiredAccess
);
2685 return ERROR_ACCESS_DENIED
;
2688 lpService
= hSvc
->ServiceEntry
;
2689 if (lpService
== NULL
)
2691 DPRINT("lpService == NULL!\n");
2692 return ERROR_INVALID_HANDLE
;
2695 /* Lock the service database shared */
2696 ScmLockDatabaseShared();
2698 dwError
= ScmOpenServiceKey(lpService
->lpServiceName
,
2701 if (dwError
!= ERROR_SUCCESS
)
2704 /* Read the image path */
2705 dwError
= ScmReadString(hServiceKey
,
2708 if (dwError
!= ERROR_SUCCESS
)
2711 /* Read the service start name */
2712 ScmReadString(hServiceKey
,
2714 &lpServiceStartName
);
2716 /* Read the dependencies */
2717 ScmReadDependencies(hServiceKey
,
2719 &dwDependenciesLength
);
2721 dwRequiredSize
= sizeof(QUERY_SERVICE_CONFIGW
);
2723 if (lpImagePath
!= NULL
)
2724 dwRequiredSize
+= ((wcslen(lpImagePath
) + 1) * sizeof(WCHAR
));
2726 dwRequiredSize
+= 2 * sizeof(WCHAR
);
2728 if (lpService
->lpGroup
!= NULL
)
2729 dwRequiredSize
+= ((wcslen(lpService
->lpGroup
->lpGroupName
) + 1) * sizeof(WCHAR
));
2731 dwRequiredSize
+= 2 * sizeof(WCHAR
);
2733 if (lpDependencies
!= NULL
)
2734 dwRequiredSize
+= dwDependenciesLength
* sizeof(WCHAR
);
2736 dwRequiredSize
+= 2 * sizeof(WCHAR
);
2738 if (lpServiceStartName
!= NULL
)
2739 dwRequiredSize
+= ((wcslen(lpServiceStartName
) + 1) * sizeof(WCHAR
));
2741 dwRequiredSize
+= 2 * sizeof(WCHAR
);
2743 if (lpService
->lpDisplayName
!= NULL
)
2744 dwRequiredSize
+= ((wcslen(lpService
->lpDisplayName
) + 1) * sizeof(WCHAR
));
2746 dwRequiredSize
+= 2 * sizeof(WCHAR
);
2748 if (lpServiceConfig
== NULL
|| cbBufSize
< dwRequiredSize
)
2750 dwError
= ERROR_INSUFFICIENT_BUFFER
;
2754 lpConfig
= (LPQUERY_SERVICE_CONFIGW
)lpServiceConfig
;
2755 lpConfig
->dwServiceType
= lpService
->Status
.dwServiceType
;
2756 lpConfig
->dwStartType
= lpService
->dwStartType
;
2757 lpConfig
->dwErrorControl
= lpService
->dwErrorControl
;
2758 lpConfig
->dwTagId
= lpService
->dwTag
;
2760 lpStr
= (LPWSTR
)(lpConfig
+ 1);
2762 /* Append the image path */
2763 if (lpImagePath
!= NULL
)
2765 wcscpy(lpStr
, lpImagePath
);
2769 wcscpy(lpStr
, lpEmptyString
);
2772 lpConfig
->lpBinaryPathName
= (LPWSTR
)((ULONG_PTR
)lpStr
- (ULONG_PTR
)lpConfig
);
2773 lpStr
+= (wcslen(lpStr
) + 1);
2775 /* Append the group name */
2776 if (lpService
->lpGroup
!= NULL
)
2778 wcscpy(lpStr
, lpService
->lpGroup
->lpGroupName
);
2782 wcscpy(lpStr
, lpEmptyString
);
2785 lpConfig
->lpLoadOrderGroup
= (LPWSTR
)((ULONG_PTR
)lpStr
- (ULONG_PTR
)lpConfig
);
2786 lpStr
+= (wcslen(lpStr
) + 1);
2788 /* Append Dependencies */
2789 if (lpDependencies
!= NULL
)
2793 dwDependenciesLength
* sizeof(WCHAR
));
2797 wcscpy(lpStr
, lpEmptyString
);
2800 lpConfig
->lpDependencies
= (LPWSTR
)((ULONG_PTR
)lpStr
- (ULONG_PTR
)lpConfig
);
2801 if (lpDependencies
!= NULL
)
2802 lpStr
+= dwDependenciesLength
;
2804 lpStr
+= (wcslen(lpStr
) + 1);
2806 /* Append the service start name */
2807 if (lpServiceStartName
!= NULL
)
2809 wcscpy(lpStr
, lpServiceStartName
);
2813 wcscpy(lpStr
, lpEmptyString
);
2816 lpConfig
->lpServiceStartName
= (LPWSTR
)((ULONG_PTR
)lpStr
- (ULONG_PTR
)lpConfig
);
2817 lpStr
+= (wcslen(lpStr
) + 1);
2819 /* Append the display name */
2820 if (lpService
->lpDisplayName
!= NULL
)
2822 wcscpy(lpStr
, lpService
->lpDisplayName
);
2826 wcscpy(lpStr
, lpEmptyString
);
2829 lpConfig
->lpDisplayName
= (LPWSTR
)((ULONG_PTR
)lpStr
- (ULONG_PTR
)lpConfig
);
2832 if (pcbBytesNeeded
!= NULL
)
2833 *pcbBytesNeeded
= dwRequiredSize
;
2836 /* Unlock the service database */
2837 ScmUnlockDatabase();
2839 if (lpImagePath
!= NULL
)
2840 HeapFree(GetProcessHeap(), 0, lpImagePath
);
2842 if (lpServiceStartName
!= NULL
)
2843 HeapFree(GetProcessHeap(), 0, lpServiceStartName
);
2845 if (lpDependencies
!= NULL
)
2846 HeapFree(GetProcessHeap(), 0, lpDependencies
);
2848 if (hServiceKey
!= NULL
)
2849 RegCloseKey(hServiceKey
);
2851 DPRINT("RQueryServiceConfigW() done\n");
2858 DWORD
RQueryServiceLockStatusW(
2859 SC_RPC_HANDLE hSCManager
,
2860 LPQUERY_SERVICE_LOCK_STATUSW lpLockStatus
,
2862 LPBOUNDED_DWORD_4K pcbBytesNeeded
)
2865 return ERROR_CALL_NOT_IMPLEMENTED
;
2870 DWORD
RStartServiceW(
2871 SC_RPC_HANDLE hService
,
2873 LPSTRING_PTRSW argv
)
2875 DWORD dwError
= ERROR_SUCCESS
;
2876 PSERVICE_HANDLE hSvc
;
2877 PSERVICE lpService
= NULL
;
2880 DPRINT("RStartServiceW(%p %lu %p) called\n", hService
, argc
, argv
);
2881 DPRINT(" argc: %lu\n", argc
);
2884 for (i
= 0; i
< argc
; i
++)
2886 DPRINT(" argv[%lu]: %S\n", i
, argv
[i
]);
2891 return ERROR_SHUTDOWN_IN_PROGRESS
;
2893 hSvc
= ScmGetServiceFromHandle(hService
);
2896 DPRINT1("Invalid service handle!\n");
2897 return ERROR_INVALID_HANDLE
;
2900 if (!RtlAreAllAccessesGranted(hSvc
->Handle
.DesiredAccess
,
2903 DPRINT("Insufficient access rights! 0x%lx\n", hSvc
->Handle
.DesiredAccess
);
2904 return ERROR_ACCESS_DENIED
;
2907 lpService
= hSvc
->ServiceEntry
;
2908 if (lpService
== NULL
)
2910 DPRINT("lpService == NULL!\n");
2911 return ERROR_INVALID_HANDLE
;
2914 if (lpService
->dwStartType
== SERVICE_DISABLED
)
2915 return ERROR_SERVICE_DISABLED
;
2917 if (lpService
->bDeleted
)
2918 return ERROR_SERVICE_MARKED_FOR_DELETE
;
2920 /* Start the service */
2921 dwError
= ScmStartService(lpService
, argc
, (LPWSTR
*)argv
);
2928 DWORD
RGetServiceDisplayNameW(
2929 SC_RPC_HANDLE hSCManager
,
2930 LPCWSTR lpServiceName
,
2931 LPWSTR lpDisplayName
,
2934 // PMANAGER_HANDLE hManager;
2939 DPRINT("RGetServiceDisplayNameW() called\n");
2940 DPRINT("hSCManager = %p\n", hSCManager
);
2941 DPRINT("lpServiceName: %S\n", lpServiceName
);
2942 DPRINT("lpDisplayName: %p\n", lpDisplayName
);
2943 DPRINT("*lpcchBuffer: %lu\n", *lpcchBuffer
);
2945 // hManager = (PMANAGER_HANDLE)hSCManager;
2946 // if (hManager->Handle.Tag != MANAGER_TAG)
2948 // DPRINT("Invalid manager handle!\n");
2949 // return ERROR_INVALID_HANDLE;
2952 /* Get service database entry */
2953 lpService
= ScmGetServiceEntryByName(lpServiceName
);
2954 if (lpService
== NULL
)
2956 DPRINT("Could not find a service!\n");
2958 /* If the service could not be found and lpcchBuffer is less than 2, windows
2959 puts null in lpDisplayName and puts 2 in lpcchBuffer */
2960 if (*lpcchBuffer
< 2)
2963 if (lpDisplayName
!= NULL
)
2965 *lpDisplayName
= '\0';
2969 return ERROR_SERVICE_DOES_NOT_EXIST
;
2972 if (!lpService
->lpDisplayName
)
2974 dwLength
= wcslen(lpService
->lpServiceName
);
2976 if (lpDisplayName
!= NULL
&&
2977 *lpcchBuffer
> dwLength
)
2979 wcscpy(lpDisplayName
, lpService
->lpServiceName
);
2984 dwLength
= wcslen(lpService
->lpDisplayName
);
2986 if (lpDisplayName
!= NULL
&&
2987 *lpcchBuffer
> dwLength
)
2989 wcscpy(lpDisplayName
, lpService
->lpDisplayName
);
2993 dwError
= (*lpcchBuffer
> dwLength
) ? ERROR_SUCCESS
: ERROR_INSUFFICIENT_BUFFER
;
2995 *lpcchBuffer
= dwLength
;
3002 DWORD
RGetServiceKeyNameW(
3003 SC_RPC_HANDLE hSCManager
,
3004 LPCWSTR lpDisplayName
,
3005 LPWSTR lpServiceName
,
3008 // PMANAGER_HANDLE hManager;
3013 DPRINT("RGetServiceKeyNameW() called\n");
3014 DPRINT("hSCManager = %p\n", hSCManager
);
3015 DPRINT("lpDisplayName: %S\n", lpDisplayName
);
3016 DPRINT("lpServiceName: %p\n", lpServiceName
);
3017 DPRINT("*lpcchBuffer: %lu\n", *lpcchBuffer
);
3019 // hManager = (PMANAGER_HANDLE)hSCManager;
3020 // if (hManager->Handle.Tag != MANAGER_TAG)
3022 // DPRINT("Invalid manager handle!\n");
3023 // return ERROR_INVALID_HANDLE;
3026 /* Get service database entry */
3027 lpService
= ScmGetServiceEntryByDisplayName(lpDisplayName
);
3028 if (lpService
== NULL
)
3030 DPRINT("Could not find a service!\n");
3032 /* If the service could not be found and lpcchBuffer is less than 2, windows
3033 puts null in lpDisplayName and puts 2 in lpcchBuffer */
3034 if (*lpcchBuffer
< 2)
3037 if (lpServiceName
!= NULL
)
3039 *lpServiceName
= '\0';
3043 return ERROR_SERVICE_DOES_NOT_EXIST
;
3046 dwLength
= wcslen(lpService
->lpServiceName
);
3048 if (lpServiceName
!= NULL
&&
3049 *lpcchBuffer
> dwLength
)
3051 wcscpy(lpServiceName
, lpService
->lpServiceName
);
3052 *lpcchBuffer
= dwLength
;
3053 return ERROR_SUCCESS
;
3056 dwError
= (*lpcchBuffer
> dwLength
) ? ERROR_SUCCESS
: ERROR_INSUFFICIENT_BUFFER
;
3058 *lpcchBuffer
= dwLength
;
3065 DWORD
RI_ScSetServiceBitsA(
3066 RPC_SERVICE_STATUS_HANDLE hServiceStatus
,
3067 DWORD dwServiceBits
,
3069 int bUpdateImmediately
,
3073 return ERROR_CALL_NOT_IMPLEMENTED
;
3078 DWORD
RChangeServiceConfigA(
3079 SC_RPC_HANDLE hService
,
3080 DWORD dwServiceType
,
3082 DWORD dwErrorControl
,
3083 LPSTR lpBinaryPathName
,
3084 LPSTR lpLoadOrderGroup
,
3086 LPSTR lpDependencies
,
3088 LPSTR lpServiceStartName
,
3091 LPSTR lpDisplayName
)
3093 DWORD dwError
= ERROR_SUCCESS
;
3094 PSERVICE_HANDLE hSvc
;
3095 PSERVICE lpService
= NULL
;
3096 HKEY hServiceKey
= NULL
;
3097 LPWSTR lpDisplayNameW
= NULL
;
3098 LPWSTR lpBinaryPathNameW
= NULL
;
3099 LPWSTR lpCanonicalImagePathW
= NULL
;
3100 LPWSTR lpLoadOrderGroupW
= NULL
;
3101 LPWSTR lpDependenciesW
= NULL
;
3102 // LPWSTR lpPasswordW = NULL;
3104 DPRINT("RChangeServiceConfigA() called\n");
3105 DPRINT("dwServiceType = %lu\n", dwServiceType
);
3106 DPRINT("dwStartType = %lu\n", dwStartType
);
3107 DPRINT("dwErrorControl = %lu\n", dwErrorControl
);
3108 DPRINT("lpBinaryPathName = %s\n", lpBinaryPathName
);
3109 DPRINT("lpLoadOrderGroup = %s\n", lpLoadOrderGroup
);
3110 DPRINT("lpDisplayName = %s\n", lpDisplayName
);
3113 return ERROR_SHUTDOWN_IN_PROGRESS
;
3115 hSvc
= ScmGetServiceFromHandle(hService
);
3118 DPRINT1("Invalid service handle!\n");
3119 return ERROR_INVALID_HANDLE
;
3122 if (!RtlAreAllAccessesGranted(hSvc
->Handle
.DesiredAccess
,
3123 SERVICE_CHANGE_CONFIG
))
3125 DPRINT("Insufficient access rights! 0x%lx\n", hSvc
->Handle
.DesiredAccess
);
3126 return ERROR_ACCESS_DENIED
;
3129 lpService
= hSvc
->ServiceEntry
;
3130 if (lpService
== NULL
)
3132 DPRINT("lpService == NULL!\n");
3133 return ERROR_INVALID_HANDLE
;
3136 /* Lock the service database exclusively */
3137 ScmLockDatabaseExclusive();
3139 if (lpService
->bDeleted
)
3141 DPRINT("The service has already been marked for delete!\n");
3142 dwError
= ERROR_SERVICE_MARKED_FOR_DELETE
;
3146 /* Open the service key */
3147 dwError
= ScmOpenServiceKey(lpService
->szServiceName
,
3150 if (dwError
!= ERROR_SUCCESS
)
3153 /* Write service data to the registry */
3155 if (lpDisplayName
!= NULL
&& *lpDisplayName
!= 0)
3157 /* Set the display name */
3158 lpDisplayNameW
= HeapAlloc(GetProcessHeap(),
3160 (strlen(lpDisplayName
) + 1) * sizeof(WCHAR
));
3161 if (lpDisplayNameW
== NULL
)
3163 dwError
= ERROR_NOT_ENOUGH_MEMORY
;
3167 MultiByteToWideChar(CP_ACP
,
3172 strlen(lpDisplayName
) + 1);
3174 RegSetValueExW(hServiceKey
,
3178 (LPBYTE
)lpDisplayNameW
,
3179 (wcslen(lpDisplayNameW
) + 1) * sizeof(WCHAR
));
3181 /* Update lpService->lpDisplayName */
3182 if (lpService
->lpDisplayName
)
3183 HeapFree(GetProcessHeap(), 0, lpService
->lpDisplayName
);
3185 lpService
->lpDisplayName
= lpDisplayNameW
;
3188 if (dwServiceType
!= SERVICE_NO_CHANGE
)
3190 /* Set the service type */
3191 dwError
= RegSetValueExW(hServiceKey
,
3195 (LPBYTE
)&dwServiceType
,
3197 if (dwError
!= ERROR_SUCCESS
)
3200 lpService
->Status
.dwServiceType
= dwServiceType
;
3203 if (dwStartType
!= SERVICE_NO_CHANGE
)
3205 /* Set the start value */
3206 dwError
= RegSetValueExW(hServiceKey
,
3210 (LPBYTE
)&dwStartType
,
3212 if (dwError
!= ERROR_SUCCESS
)
3215 lpService
->dwStartType
= dwStartType
;
3218 if (dwErrorControl
!= SERVICE_NO_CHANGE
)
3220 /* Set the error control value */
3221 dwError
= RegSetValueExW(hServiceKey
,
3225 (LPBYTE
)&dwErrorControl
,
3227 if (dwError
!= ERROR_SUCCESS
)
3230 lpService
->dwErrorControl
= dwErrorControl
;
3233 if (lpBinaryPathName
!= NULL
&& *lpBinaryPathName
!= 0)
3235 /* Set the image path */
3236 lpBinaryPathNameW
= HeapAlloc(GetProcessHeap(),
3238 (strlen(lpBinaryPathName
) + 1) * sizeof(WCHAR
));
3239 if (lpBinaryPathNameW
== NULL
)
3241 dwError
= ERROR_NOT_ENOUGH_MEMORY
;
3245 MultiByteToWideChar(CP_ACP
,
3250 strlen(lpBinaryPathName
) + 1);
3252 if (lpService
->Status
.dwServiceType
& SERVICE_DRIVER
)
3254 dwError
= ScmCanonDriverImagePath(lpService
->dwStartType
,
3256 &lpCanonicalImagePathW
);
3258 HeapFree(GetProcessHeap(), 0, lpBinaryPathNameW
);
3260 if (dwError
!= ERROR_SUCCESS
)
3263 lpBinaryPathNameW
= lpCanonicalImagePathW
;
3266 dwError
= RegSetValueExW(hServiceKey
,
3270 (LPBYTE
)lpBinaryPathNameW
,
3271 (wcslen(lpBinaryPathNameW
) + 1) *