https://git.reactos.org/?p=reactos.git;a=commitdiff;h=fa0eef085c9fe5b9b1de5…
commit fa0eef085c9fe5b9b1de5a9dac39946f27999540
Author: Eric Kohl <eric.kohl(a)reactos.org>
AuthorDate: Sat Aug 31 18:17:14 2019 +0200
Commit: Eric Kohl <eric.kohl(a)reactos.org>
CommitDate: Sat Aug 31 18:17:14 2019 +0200
[BOOTDATA][LSASRV] Add the security service(s)
- Add the service routines for the SamSs service.
- Start the SamSs service.
---
boot/bootdata/hivesys.inf | 23 ++++++++
dll/win32/lsasrv/service.c | 133 ++++++++++++++++++++++++++++++++++++++++++++-
2 files changed, 153 insertions(+), 3 deletions(-)
diff --git a/boot/bootdata/hivesys.inf b/boot/bootdata/hivesys.inf
index dde3a8e9fd8..667104ed7b4 100644
--- a/boot/bootdata/hivesys.inf
+++ b/boot/bootdata/hivesys.inf
@@ -1964,6 +1964,17 @@
HKLM,"SYSTEM\CurrentControlSet\Services\Rpcss","ObjectName",0x00000000,"LocalSys
HKLM,"SYSTEM\CurrentControlSet\Services\Rpcss","Start",0x00010001,0x00000002
HKLM,"SYSTEM\CurrentControlSet\Services\Rpcss","Type",0x00010001,0x00000010
+; SamSs service
+HKLM,"SYSTEM\CurrentControlSet\Services\SamSs","DependOnService",0x00010000,"RPCSS"
+HKLM,"SYSTEM\CurrentControlSet\Services\SamSs","Description",0x00000000,%SAMSS_SERVICE_DESCRIPTION%
+HKLM,"SYSTEM\CurrentControlSet\Services\SamSs","DisplayName",0x00000000,%SAMSS_SERVICE%
+HKLM,"SYSTEM\CurrentControlSet\Services\SamSs","ErrorControl",0x00010001,0x00000001
+HKLM,"SYSTEM\CurrentControlSet\Services\SamSs","Group",0x00000000,"LocalValidation"
+HKLM,"SYSTEM\CurrentControlSet\Services\SamSs","ImagePath",0x00020000,"%SystemRoot%\system32\lsass.exe"
+HKLM,"SYSTEM\CurrentControlSet\Services\SamSs","ObjectName",0x00000000,"LocalSystem"
+HKLM,"SYSTEM\CurrentControlSet\Services\SamSs","Start",0x00010001,0x00000002
+HKLM,"SYSTEM\CurrentControlSet\Services\SamSs","Type",0x00010001,0x00000020
+
; Scheduler service
HKLM,"SYSTEM\CurrentControlSet\Services\Schedule","DependOnService",0x00010000,"RPCSS"
HKLM,"SYSTEM\CurrentControlSet\Services\Schedule","Description",0x00000000,%SCHEDULE_SERVICE_DESCRIPTION%
@@ -2231,6 +2242,9 @@ PLUGPLAY_SERVICE_DESCRIPTION="Detects hardware changes and
installs needed softw
RPCSS_SERVICE="Remote Procedure Call"
RPCSS_SERVICE_DESCRIPTION="RPC subsystem which is responsible for Remote Procedure
Calls on the local machine."
+SAMSS_SERVICE="Security Accounts Manager"
+SAMSS_SERVICE_DESCRIPTION="The startup of this service signals other services that
the Security Accounts Manager (SAM) is ready to accept requests. Disabling this service
will prevent other services in the system from being notified when the SAM is ready, which
may in turn cause those services to fail to start correctly. This service should not be
disabled."
+
SCHEDULE_SERVICE="Scheduler service"
SCHEDULE_SERVICE_DESCRIPTION="Allows starting of programs at specific times."
@@ -2379,6 +2393,9 @@ PLUGPLAY_SERVICE_DESCRIPTION="Wykrywa zmiany w sprzęcie i
instaluje potrzebne o
RPCSS_SERVICE="Zdalne wykonywanie procedur"
RPCSS_SERVICE_DESCRIPTION="Podsystem RPC, który jest odpowiedzialny za zdalne
wykonywanie procedur na tym komputerze."
+SAMSS_SERVICE="Security Accounts Manager"
+SAMSS_SERVICE_DESCRIPTION="The startup of this service signals other services that
the Security Accounts Manager (SAM) is ready to accept requests. Disabling this service
will prevent other services in the system from being notified when the SAM is ready, which
may in turn cause those services to fail to start correctly. This service should not be
disabled."
+
SCHEDULE_SERVICE="Usługa Harmonogram"
SCHEDULE_SERVICE_DESCRIPTION="Umożliwia uruchamianie programów w określonym
czasie."
@@ -2521,6 +2538,9 @@ PLUGPLAY_SERVICE_DESCRIPTION="Detectează schimbările în
configurația fizică
RPCSS_SERVICE="Apel procedural la distanță"
RPCSS_SERVICE_DESCRIPTION="Subsistemul responsabil pentru apel procedural la
distanță în calculatorul local."
+SAMSS_SERVICE="Security Accounts Manager"
+SAMSS_SERVICE_DESCRIPTION="The startup of this service signals other services that
the Security Accounts Manager (SAM) is ready to accept requests. Disabling this service
will prevent other services in the system from being notified when the SAM is ready, which
may in turn cause those services to fail to start correctly. This service should not be
disabled."
+
SCHEDULE_SERVICE="Serviciu de planificare"
SCHEDULE_SERVICE_DESCRIPTION="Permite pornirea de programe la o anumită oră."
@@ -2663,6 +2683,9 @@ PLUGPLAY_SERVICE_DESCRIPTION="Обнаруживает изменения обо
RPCSS_SERVICE="Удаленный вызов процедур (RPC)"
RPCSS_SERVICE_DESCRIPTION="Подсистема для вызова удаленных процедур на локальной
машине."
+SAMSS_SERVICE="Security Accounts Manager"
+SAMSS_SERVICE_DESCRIPTION="The startup of this service signals other services that
the Security Accounts Manager (SAM) is ready to accept requests. Disabling this service
will prevent other services in the system from being notified when the SAM is ready, which
may in turn cause those services to fail to start correctly. This service should not be
disabled."
+
SCHEDULE_SERVICE="Планировщик заданий"
SCHEDULE_SERVICE_DESCRIPTION="Позволяет запускать программы в определенное
время."
diff --git a/dll/win32/lsasrv/service.c b/dll/win32/lsasrv/service.c
index ed4b97c01b8..9c207811135 100644
--- a/dll/win32/lsasrv/service.c
+++ b/dll/win32/lsasrv/service.c
@@ -2,22 +2,149 @@
* PROJECT: Local Security Authority Server DLL
* LICENSE: GPL - See COPYING in the top level directory
* FILE: dll/win32/lsasrv/service.c
- * PURPOSE: Main file
- * COPYRIGHT: Copyright 2016 Eric Kohl
+ * PURPOSE: Security service
+ * COPYRIGHT: Copyright 2016, 2019 Eric Kohl <eric.kohl(a)reactos.org>
*/
/* INCLUDES ****************************************************************/
#include "lsasrv.h"
+#include <winsvc.h>
+
+VOID WINAPI I_ScIsSecurityProcess(VOID);
+
+static VOID WINAPI SamSsServiceMain(DWORD dwArgc, PWSTR *pszArgv);
+
+SERVICE_TABLE_ENTRYW ServiceTable[] =
+{
+ {L"SAMSS", SamSsServiceMain},
+ {NULL, NULL}
+};
+
/* FUNCTIONS ***************************************************************/
+static
+VOID
+WINAPI
+SamSsControlHandler(
+ _In_ DWORD fdwControl)
+{
+ TRACE("SamSsControlHandler(%lu)\n", fdwControl);
+}
+
+
+static
+VOID
+WINAPI
+SamSsServiceMain(
+ _In_ DWORD dwArgc,
+ _In_ PWSTR *pszArgv)
+{
+ SERVICE_STATUS_HANDLE hStatus;
+ SERVICE_STATUS ServiceStatus;
+
+ TRACE("SamSsServiceMain(%lu %p)\n", dwArgc, pszArgv);
+
+ hStatus = RegisterServiceCtrlHandlerW(L"SAMSS",
+ SamSsControlHandler);
+ if (hStatus == NULL)
+ return;
+
+ ServiceStatus.dwServiceType = SERVICE_WIN32_SHARE_PROCESS;
+ ServiceStatus.dwCurrentState = SERVICE_START_PENDING;
+ ServiceStatus.dwControlsAccepted = 0;
+ ServiceStatus.dwWin32ExitCode = ERROR_SUCCESS;
+ ServiceStatus.dwServiceSpecificExitCode = ERROR_SUCCESS;
+ ServiceStatus.dwCheckPoint = 1;
+ ServiceStatus.dwWaitHint = 0x7530;
+
+ SetServiceStatus(hStatus, &ServiceStatus);
+
+ ServiceStatus.dwCurrentState = SERVICE_RUNNING;
+ ServiceStatus.dwCheckPoint = 0;
+ ServiceStatus.dwWaitHint = 0;
+
+ SetServiceStatus(hStatus, &ServiceStatus);
+}
+
+
+static
+DWORD
+WINAPI
+DispatcherThread(
+ _In_ PVOID pParameter)
+{
+ HANDLE hEvent;
+ DWORD dwError;
+
+ TRACE("DispatcherThread(%p)\n", pParameter);
+
+ /* Create or open the SECURITY_SERVICES_STARTED event */
+ hEvent = CreateEventW(NULL,
+ TRUE,
+ FALSE,
+ L"SECURITY_SERVICES_STARTED");
+ if (hEvent == NULL)
+ {
+ dwError = GetLastError();
+ if (dwError != ERROR_ALREADY_EXISTS)
+ return dwError;
+
+ hEvent = OpenEventW(SYNCHRONIZE,
+ FALSE,
+ L"SECURITY_SERVICES_STARTED");
+ if (hEvent == NULL)
+ return GetLastError();
+ }
+
+ /* Wait for the SECURITY_SERVICES_STARTED event to be signaled */
+ TRACE("Waiting for the SECURITY_SERVICES_STARTED event!\n");
+ dwError = WaitForSingleObject(hEvent, INFINITE);
+ TRACE("WaitForSingleObject returned %lu\n", dwError);
+
+ /* Close the event handle */
+ CloseHandle(hEvent);
+
+ /* Fail, if the event was not signaled */
+ if (dwError != WAIT_OBJECT_0)
+ {
+ ERR("Wait failed!\n");
+ return dwError;
+ }
+
+ /* This is the security process */
+ I_ScIsSecurityProcess();
+
+ /* Start the services */
+ TRACE("Start the security services!\n");
+ if (!StartServiceCtrlDispatcherW(ServiceTable))
+ return GetLastError();
+
+ TRACE("Done!\n");
+
+ return ERROR_SUCCESS;
+}
+
NTSTATUS
WINAPI
ServiceInit(VOID)
{
- TRACE("ServiceInit() called\n");
+ HANDLE hThread;
+ DWORD dwThreadId;
+
+ TRACE("ServiceInit()\n");
+
+ hThread = CreateThread(NULL,
+ 0,
+ DispatcherThread,
+ NULL,
+ 0,
+ &dwThreadId);
+ if (hThread == NULL)
+ return (NTSTATUS)GetLastError();
+
return STATUS_SUCCESS;
}