windows-nt/Source/XPSP1/NT/inetsrv/iis/svcs/restart/iisrsta/iisrestart.cpp

2637 lines
76 KiB
C++
Raw Normal View History

2020-09-26 03:20:57 -05:00
/*
IisRestart.cpp
Implementation of CIisRestart ( IIisServiceControl )
FILE HISTORY:
Phillich 06-Oct-1998 Created
*/
#include "stdafx.h"
#include "IisRsta.h"
#include "IisRstam.h"
#include "IisRestart.h"
#include "common.h"
#define MAX_TASKS 8
//#define VERBOSE_DEBUG
//
// RETURNCODETOHRESULT() maps a return code to an HRESULT. If the return
// code is a Win32 error (identified by a zero high word) then it is mapped
// using the standard HRESULT_FROM_WIN32() macro. Otherwise, the return
// code is assumed to already be an HRESULT and is returned unchanged.
//
#define RETURNCODETOHRESULT(rc) \
(((rc) < 0x10000) \
? HRESULT_FROM_WIN32(rc) \
: (rc))
typedef BOOL (*PFNQUERYSERVICECONFIG2)(SC_HANDLE,DWORD,LPBYTE,DWORD,LPDWORD) ;
typedef BOOL (*PFNCHANGESERVICECONFIG2)(SC_HANDLE,DWORD,LPVOID);
//
// sample code for remote shutdown:
// \\orville\razzle\src\ntreskit\source\shutgui\reboot.c
//
//
// Global functions
//
BOOL
W3SVCandW3SSL(
DWORD currentIndex,
ENUM_SERVICE_STATUS* pessRoot,
DWORD dwNumServices
);
VOID EnableShutdownPrivilege(
VOID
);
HRESULT
EnumStartServices(
SC_HANDLE schSCM,
LPTSTR pszRoot,
DWORD dwTargetState,
LPBYTE abServiceList,
DWORD dwInitializeServiceListSize,
LPBYTE* ppbServiceList,
LPDWORD pdwNumServices,
BOOL fAddIisadmin
);
HRESULT
SerializeEnumServiceBuffer(
LPENUM_SERVICE_STATUS pessDependentServices,
DWORD dwNumServices,
LPBYTE pbBuffer,
DWORD dwBufferSize,
LPDWORD pdwMDRequiredBufferSize
);
BOOL
IsEnableRemote(
);
HRESULT
StopIIsAdmin(
DWORD dwTimeoutMsecs
);
HRESULT
StartStopAll(
LPTSTR pszRoot,
BOOL fStart,
DWORD dwTimeoutMsecs
);
BOOL
WaitForServiceStatus(
SC_HANDLE schDependent,
DWORD dwDesiredServiceState,
DWORD dwTimeoutMsecs
);
HRESULT
KillTaskByName(
LPTSTR pname,
LPSTR pszMandatoryModule
);
VOID
ReportStatus(
DWORD dwId,
DWORD dwStatus
);
HRESULT
SendControlToService(
SC_HANDLE hServiceHandle,
DWORD dwCmd,
LPDWORD pdwTimeoutOutMsecs
);
StartStopAllRecursive(
SC_HANDLE schSCM,
ENUM_SERVICE_STATUS* pessRoot,
DWORD dwNumServices,
BOOL fStart,
BOOL fForceDemandStart,
LPDWORD pdwTimeoutMsecs
);
HRESULT
WhoAmI(
LPTSTR* pPrincipal
);
BOOL
CloseSystemExceptionHandler(
LPCTSTR pszWindowName
);
/////////////////////////////////////////////////////////////////////////////
// CIisRestart
STDMETHODIMP
CIisRestart::Stop(
DWORD dwTimeoutMsecs,
DWORD dwForce
)
/*++
Stop
Stop all internet services ( services dependent on IISADMIN )
first using SCM then optionaly using TerminateProcess if failure
Arguments:
dwTimeoutMsecs - timeout for status check ( in ms )
dwForce - !0 to force TerminateProcess if failure to stop services using SCM
Returns:
ERROR_RESOURCE_DISABLED if remote access to IIisRestart disabled
ERROR_SERVICE_REQUEST_TIMEOUT if timeout waiting for all internet services status
to be stopped
otherwise COM status
--*/
{
HRESULT hres = S_OK;
if ( !IsEnableRemote() )
{
hres = RETURNCODETOHRESULT( ERROR_RESOURCE_DISABLED );
}
else
{
#if defined(VERBOSE_DEBUG)
OutputDebugString(_T("Attempt to kill dr watson\n"));
#endif
//
// Always kill Dr Watson, as the Dr Watson window may be still present after inetinfo process
// was terminated after an exception, and in this case the Dr Watson process apparently still owns
// some sockets resources preventing inetinfo to properly restart ( specifically binding TCP/IP sockets
// fails during inetinfo restart )
//
KillTaskByName(_T("drwtsn32"), NULL);
hres = StartStopAll( _T("IISADMIN"), FALSE, dwTimeoutMsecs );
if ( dwForce && FAILED( hres ) )
{
hres = Kill();
}
}
ReportStatus( IRSTAM_STOP, hres );
return hres;
}
STDMETHODIMP
CIisRestart::Start(
DWORD dwTimeoutMsecs
)
/*++
Start
Start all internet services ( services dependent on IISADMIN )
using SCM
Arguments:
dwTimeoutMsecs - timeout for status check ( in ms )
Returns:
ERROR_RESOURCE_DISABLED if remote access to IIisRestart disabled
ERROR_SERVICE_REQUEST_TIMEOUT if timeout waiting for all internet services status
to be started
otherwise COM status
--*/
{
HRESULT hres = S_OK;
if ( !IsEnableRemote() )
{
hres = RETURNCODETOHRESULT( ERROR_RESOURCE_DISABLED );
}
else
{
//
// In 6.0 we will use IIS Reset /Start to bring up the
// service again without stopping the services that can
// keep running. We still want to kill any dr watson's
// thou. This should be harmless on a regular start.
//
#if defined(VERBOSE_DEBUG)
OutputDebugString(_T("Attempt to kill dr watson\n"));
#endif
//
// Always kill Dr Watson, as the Dr Watson window may be still present after inetinfo process
// was terminated after an exception, and in this case the Dr Watson process apparently still owns
// some sockets resources preventing inetinfo to properly restart ( specifically binding TCP/IP sockets
// fails during inetinfo restart )
//
KillTaskByName(_T("drwtsn32"), NULL);
hres = StartStopAll( _T("IISADMIN"), TRUE, dwTimeoutMsecs );
}
ReportStatus( IRSTAM_START, hres );
return hres;
}
STDMETHODIMP
CIisRestart::Reboot(
DWORD dwTimeoutMsecs,
DWORD dwForceAppsClosed
)
/*++
Reboot
Reboot the computer
Arguments:
dwTimeoutMsecs - timeout for apps to be closed by user ( in ms )
dwForceAppsClosed - force apps to be closed if hung
Returns:
ERROR_RESOURCE_DISABLED if remote access to IIisRestart disabled
otherwise COM status
--*/
{
HRESULT hres = S_OK;
if ( !IsEnableRemote() )
{
hres = RETURNCODETOHRESULT( ERROR_RESOURCE_DISABLED );
}
else
{
//
// If this fails then we will get an error back from ExitWindowsEx()
//
EnableShutdownPrivilege();
//
// Make sure we will always reboot even if process(es) stuck
//
#if 1
TCHAR* pPrincipal;
TCHAR* pBuf;
//
// Format message to operator, includes name of user requesting shutdown.
//
if ( SUCCEEDED( hres = WhoAmI( &pPrincipal ) ) )
{
if ( FormatMessage( FORMAT_MESSAGE_ALLOCATE_BUFFER|FORMAT_MESSAGE_FROM_HMODULE|FORMAT_MESSAGE_ARGUMENT_ARRAY,
(LPCVOID)NULL, //GetModuleHandle(NULL),
IRSTAM_SYSSHUT,
0,
(LPTSTR)&pBuf,
1,
(va_list *)&pPrincipal ) )
{
if (InitiateSystemShutdown( NULL,
pBuf,
dwTimeoutMsecs/1000, // timeout in seconds
dwForceAppsClosed,
TRUE ) == 0)
{
hres = RETURNCODETOHRESULT( GetLastError() );
}
LocalFree( (LPVOID)pBuf );
}
LocalFree( pPrincipal );
}
#else
if ( !ExitWindowsEx( EWX_REBOOT|EWX_FORCE, 0 ) )
{
hres = RETURNCODETOHRESULT( GetLastError() );
}
#endif
}
ReportStatus( IRSTAM_REBOOT, hres );
return hres;
}
STDMETHODIMP
CIisRestart::Kill(
)
/*++
Kill
Kill all internet services ( services dependent on IISADMIN )
using TerminateProcess()
Arguments:
None
Returns:
ERROR_RESOURCE_DISABLED if remote access to IIisRestart disabled
otherwise COM status
--*/
{
HRESULT hres = S_OK;
HRESULT hresReapply;
BYTE abServiceList[2048];
LPBYTE pbServiceList = NULL;
DWORD dwNumServices = 0;
SC_HANDLE schSCM = NULL;
SC_HANDLE schSrv;
LPBYTE* ppInfo = NULL;
LPENUM_SERVICE_STATUS pessDependentServices;
DWORD dwNeeded;
HINSTANCE hAdvapi;
PFNQUERYSERVICECONFIG2 pfnQueryServiceConfig2 = NULL;
PFNCHANGESERVICECONFIG2 pfnChangeServiceConfig2 = NULL;
SERVICE_FAILURE_ACTIONS sfaNoAction;
SC_ACTION saNoAction[3];
DWORD i;
BYTE abTemp[64]; // work-around for NT5 bug
if ( !IsEnableRemote() )
{
return RETURNCODETOHRESULT( ERROR_RESOURCE_DISABLED );
}
//
// Take a snapshot of Restart configuration
// If unable to get ptr to service config2 API then consider this a success:
// there is nothing to preserve.
//
if ( hAdvapi = LoadLibrary(_T("ADVAPI32.DLL")) )
{
pfnQueryServiceConfig2 = (PFNQUERYSERVICECONFIG2)GetProcAddress( hAdvapi, "QueryServiceConfig2W" );
pfnChangeServiceConfig2 = (PFNCHANGESERVICECONFIG2)GetProcAddress( hAdvapi, "ChangeServiceConfig2W" );
}
if ( pfnQueryServiceConfig2
&& pfnChangeServiceConfig2 )
{
schSCM = OpenSCManager(NULL,
NULL,
SC_MANAGER_ALL_ACCESS);
if ( schSCM == NULL )
{
hres = RETURNCODETOHRESULT( GetLastError() );
}
else
{
//
// Setup control block for no restart action.
// We will replace existing actions with this control block
//
sfaNoAction.dwResetPeriod = INFINITE;
sfaNoAction.lpCommand = _T("");
sfaNoAction.lpRebootMsg = _T("");
sfaNoAction.cActions = 3;
sfaNoAction.lpsaActions = saNoAction;
saNoAction[0].Type = SC_ACTION_NONE;
saNoAction[0].Delay = 0;
saNoAction[1].Type = SC_ACTION_NONE;
saNoAction[1].Delay = 0;
saNoAction[2].Type = SC_ACTION_NONE;
saNoAction[2].Delay = 0;
//
// Enumerate all services dependent on IISADMIN ( including itself )
//
hres = EnumStartServices( schSCM,
_T("IISADMIN"),
SERVICE_STATE_ALL,
abServiceList,
sizeof(abServiceList),
&pbServiceList,
&dwNumServices,
TRUE );
if ( SUCCEEDED( hres ) )
{
//
// Store existing info in ppInfo array
//
ppInfo = (LPBYTE*)LocalAlloc( LMEM_FIXED|LMEM_ZEROINIT, sizeof(LPBYTE) * dwNumServices );
if ( ppInfo )
{
pessDependentServices = (LPENUM_SERVICE_STATUS)pbServiceList;
for ( i = 0 ;
(i < dwNumServices) && SUCCEEDED(hres) ;
++i )
{
schSrv = OpenService( schSCM,
pessDependentServices[i].lpServiceName,
SERVICE_ALL_ACCESS);
if ( schSrv )
{
//
// 1st query config size, then alloc buffer and retrieve
// config. Note than ppInfo[] may be NULL is no config
// associated with this service.
//
// WARNING: must specify ptr to writable buffer even if specified
// buffer size is 0 due to bug in NT5 implementation of
// QueryServiceConfig2. Not sure about minimum buffer size
// ( sizeof(SERVICE_FAILURE_ACTIONS) ) ?
//
if ( !pfnQueryServiceConfig2( schSrv,
SERVICE_CONFIG_FAILURE_ACTIONS,
(LPBYTE)abTemp,
0,
&dwNeeded ) )
{
if ( GetLastError() == ERROR_INSUFFICIENT_BUFFER )
{
if ( ppInfo[i] = (LPBYTE)LocalAlloc( LMEM_FIXED, dwNeeded ) )
{
if ( !pfnQueryServiceConfig2( schSrv,
SERVICE_CONFIG_FAILURE_ACTIONS,
ppInfo[i],
dwNeeded,
&dwNeeded ) )
{
hres = RETURNCODETOHRESULT( GetLastError() );
}
}
else
{
hres = RETURNCODETOHRESULT( ERROR_NOT_ENOUGH_MEMORY );
}
}
else
{
hres = RETURNCODETOHRESULT( GetLastError() );
}
}
if ( SUCCEEDED( hres ) )
{
#if defined(VERBOSE_DEBUG)
OutputDebugString(_T("Got config for "));
OutputDebugString(pessDependentServices[i].lpServiceName);
OutputDebugString(_T("\n"));
#endif
if ( !pfnChangeServiceConfig2( schSrv,
SERVICE_CONFIG_FAILURE_ACTIONS,
&sfaNoAction ) )
{
hres = RETURNCODETOHRESULT( GetLastError() );
}
}
CloseServiceHandle( schSrv );
}
else
{
hres = RETURNCODETOHRESULT( GetLastError() );
}
}
}
else
{
hres = RETURNCODETOHRESULT( ERROR_NOT_ENOUGH_MEMORY );
}
}
CloseServiceHandle( schSCM );
}
}
//
// Graceful exit failed, kill the IIS processes.
// First, kill inetinfo, then kill the WAM instances.
//
CloseSystemExceptionHandler( _T("inetinfo.exe") );
//
// Always kill Dr Watson, as the Dr Watson window may be still present after inetinfo process
// was terminated after an exception, and in this case the Dr Watson process apparently still owns
// some sockets resources preventing inetinfo to properly restart ( specifically binding TCP/IP sockets
// fails during inetinfo restart )
//
KillTaskByName(_T("drwtsn32"), NULL);
if ( SUCCEEDED( hres ) )
{
#if defined(VERBOSE_DEBUG)
OutputDebugString(_T("Attempt to kill INETINFO\n"));
#endif
hres = KillTaskByName(_T("INETINFO"), NULL);
}
if ( SUCCEEDED( hres ) )
{
#if defined(VERBOSE_DEBUG)
OutputDebugString(_T("Attempt to kill svhost\n"));
#endif
hres = KillTaskByName(_T("SVCHOST"), "iisw3adm.dll"); // MTS WAM containers
}
if ( SUCCEEDED( hres ) )
{
#if defined(VERBOSE_DEBUG)
OutputDebugString(_T("Attempt to kill w3wp\n"));
#endif
hres = KillTaskByName(_T("W3WP"), NULL); // MTS WAM containers
}
if ( SUCCEEDED( hres ) )
{
#if defined(VERBOSE_DEBUG)
OutputDebugString(_T("Attempt to kill MTX\n"));
#endif
hres = KillTaskByName(_T("MTX"), "wam.dll"); // MTS WAM containers
}
if ( SUCCEEDED( hres ) )
{
#if defined(VERBOSE_DEBUG)
OutputDebugString(_T("Attempt to kill DLLHOST\n"));
#endif
hres = KillTaskByName(_T("DLLHOST"),"wam.dll"); // COM+ WAM Containers
}
if ( SUCCEEDED( hres ) )
{
#if defined(VERBOSE_DEBUG)
OutputDebugString(_T("Attempt to kill XSPWP\n"));
#endif
hres = KillTaskByName(_T("XSPWP"), NULL); // ASP+ processes
}
// the following code will check the IISAdmin registry parameters for
// a KillProcsOnFailure MULTI_SZ. Any process names in this list will
// be killed.
if ( SUCCEEDED( hres ) )
{
HKEY hKey;
DWORD dwValue;
DWORD dwType;
DWORD dwSize;
TCHAR achBuffer[1024];
if ( RegOpenKeyEx( HKEY_LOCAL_MACHINE,
TEXT("system\\CurrentControlSet\\services\\IISAdmin"),
0,
KEY_READ,
&hKey ) == ERROR_SUCCESS )
{
dwSize = sizeof( achBuffer );
if ( RegQueryValueEx( hKey,
TEXT("KillProcsOnFailure"),
0,
&dwType,
(LPBYTE)achBuffer,
&dwSize ) != ERROR_SUCCESS )
{
RegCloseKey( hKey );
return FALSE;
}
TCHAR *pT = achBuffer;
// parse the multisz. The format is NULL Terminated strings
// with an extra null terminator after the list.
while ((dwSize > 0) && *pT) {
#if defined(VERBOSE_DEBUG)
OutputDebugString(_T("Attempt to kill\n"));
OutputDebugString(pT);
#endif
hres = KillTaskByName(pT, NULL);
dwSize -= _tcsnbcnt(pT,_tcslen(pT)) + sizeof(TCHAR);
pT += _tcslen(pT) + 1;
}
}
}
#if defined(VERBOSE_DEBUG)
if ( FAILED(hres) )
{
OutputDebugString(_T("Kill failed\n"));
}
#endif
hresReapply = S_OK;
//
// Reapply restart configuration
//
if ( ppInfo )
{
schSCM = OpenSCManager(NULL,
NULL,
SC_MANAGER_ALL_ACCESS);
if ( schSCM == NULL )
{
hresReapply = RETURNCODETOHRESULT( GetLastError() );
}
else
{
for ( i = 0 ; i < dwNumServices ; ++i )
{
if ( ppInfo[i] )
{
schSrv = OpenService( schSCM,
pessDependentServices[i].lpServiceName,
SERVICE_ALL_ACCESS);
if ( schSrv )
{
if ( !pfnChangeServiceConfig2( schSrv,
SERVICE_CONFIG_FAILURE_ACTIONS,
ppInfo[i] ) )
{
hresReapply = RETURNCODETOHRESULT( GetLastError() );
}
else
{
#if defined(VERBOSE_DEBUG)
OutputDebugString(_T("Reapply config for "));
OutputDebugString(pessDependentServices[i].lpServiceName);
OutputDebugString(_T(" : "));
TCHAR achErr[80];
wsprintf( achErr, _T("%d actions "), ((SERVICE_FAILURE_ACTIONS*)ppInfo[i])->cActions );
OutputDebugString(achErr);
OutputDebugString(_T("\n"));
#endif
}
CloseServiceHandle( schSrv );
}
else
{
hresReapply = RETURNCODETOHRESULT( GetLastError() );
}
}
}
CloseServiceHandle( schSCM );
}
}
if ( SUCCEEDED(hres) && FAILED(hresReapply) )
{
hres = hresReapply;
}
ReportStatus( IRSTAM_KILL, hres );
if ( hAdvapi )
{
FreeLibrary( hAdvapi );
}
//
// cleanup
//
if ( ppInfo )
{
for ( i = 0 ; i < dwNumServices ; ++i )
{
if ( ppInfo[i] )
{
LocalFree( ppInfo[i] );
}
}
LocalFree( ppInfo );
}
if ( pbServiceList != NULL
&& pbServiceList != abServiceList )
{
LocalFree( pbServiceList );
}
return hres;
}
//
// Helper functions
//
VOID
EnableShutdownPrivilege(
VOID
)
/*++
EnableShutdownPrivilege
Enable shutdown privilege ( required to call ExitWindowsEx )
Arguments:
None
Returns:
Nothing. If error enabling the privilege the dependent operation
will fail.
--*/
{
HANDLE ProcessHandle;
HANDLE TokenHandle = NULL;
BOOL Result;
LUID ShutdownValue;
TOKEN_PRIVILEGES * TokenPrivileges;
CHAR buf[ 5 * sizeof(TOKEN_PRIVILEGES) ];
ProcessHandle = OpenProcess(
PROCESS_QUERY_INFORMATION,
FALSE,
GetCurrentProcessId()
);
if ( ProcessHandle == NULL ) {
//
// This should not happen
//
goto Cleanup;
}
Result = OpenProcessToken (
ProcessHandle,
TOKEN_ADJUST_PRIVILEGES | TOKEN_QUERY,
&TokenHandle
);
if ( !Result ) {
//
// This should not happen
//
goto Cleanup;
}
//
// Find out the value of Shutdown privilege
//
Result = LookupPrivilegeValue(
NULL,
SE_SHUTDOWN_NAME,
&ShutdownValue
);
if ( !Result ) {
goto Cleanup;
}
//
// Set up the privilege set we will need
//
TokenPrivileges = (TOKEN_PRIVILEGES *) buf;
TokenPrivileges->PrivilegeCount = 1;
TokenPrivileges->Privileges[0].Luid = ShutdownValue;
TokenPrivileges->Privileges[0].Attributes = SE_PRIVILEGE_ENABLED;
(VOID) AdjustTokenPrivileges (
TokenHandle,
FALSE,
TokenPrivileges,
sizeof(buf),
NULL,
NULL
);
Cleanup:
if ( TokenHandle )
{
CloseHandle( TokenHandle );
}
if ( ProcessHandle )
{
CloseHandle( ProcessHandle );
}
}
#define SLEEP_INTERVAL 1000
#if 0
HRESULT
StopIIsAdmin(
DWORD dwTimeoutMsecs
)
/*++
StopIIsAdmin
Stop the IISADMIN service using SCM
Arguments:
dwTimeoutMsecs - timeout for status check ( in ms )
Returns:
COM status
--*/
{
SC_HANDLE schSCM = NULL;
SC_HANDLE schIISADMIN = NULL;
HRESULT hresReturn = S_OK;
SERVICE_STATUS ssServiceStop;
schSCM = OpenSCManager( NULL,
NULL,
SC_MANAGER_ALL_ACCESS );
if ( schSCM == NULL )
{
hresReturn = RETURNCODETOHRESULT( GetLastError() );
}
else
{
schIISADMIN = OpenService( schSCM,
TEXT("IISADMIN"),
SERVICE_ALL_ACCESS);
if (schIISADMIN != NULL)
{
ControlService( schIISADMIN, SERVICE_CONTROL_STOP, &ssServiceStop );
if ( !WaitForServiceStatus(schIISADMIN, SERVICE_STOPPED, dwTimeoutMsecs) )
{
hresReturn = RETURNCODETOHRESULT( ERROR_SERVICE_REQUEST_TIMEOUT );
}
CloseServiceHandle( schIISADMIN );
}
else
{
hresReturn = RETURNCODETOHRESULT( GetLastError() );
}
CloseServiceHandle( schSCM );
}
return hresReturn;
}
BOOL
WaitForServiceStatus(
SC_HANDLE schDependent,
DWORD dwDesiredServiceState,
DWORD dwTimeoutMsecs
)
/*++
WaitForServiceStatus
Wait for given state using timeout
Arguments:
schDependent - service to check
dwDesiredServiceState - target state
dwTimeoutMsecs - timeout for status check ( in ms )
Returns:
COM status
--*/
{
DWORD dwSleepTotal = 0;
DWORD dwSleepInterval = SLEEP_INTERVAL;
SERVICE_STATUS ssDependent;
BOOL fSt = FALSE;
if ( dwTimeoutMsecs < dwSleepInterval && dwTimeoutMsecs )
{
dwSleepInterval = dwTimeoutMsecs;
}
for ( ;; )
{
if ( QueryServiceStatus(schDependent, &ssDependent) )
{
if ( ssDependent.dwCurrentState == dwDesiredServiceState )
{
fSt = TRUE;
break;
}
else
{
//
// Still pending...
//
if ( dwSleepTotal + dwSleepInterval > dwTimeoutMsecs )
{
break;
}
Sleep( dwSleepInterval );
dwSleepTotal += dwSleepInterval;
}
}
else
{
break;
}
}
return fSt;
}
#endif
HRESULT
StartStopAll(
LPTSTR pszRoot,
BOOL fStart,
DWORD dwTimeoutMsecs
)
/*++
StartStopAll
start or stop services dependency tree starting with specified root service
Arguments:
pszRoot - root of the service tree
fStart - TRUE to start services, FALSE to stop
dwTimeoutMsecs - timeout for status check ( in ms )
Returns:
COM status
--*/
{
SC_HANDLE schSCM = NULL;
SC_HANDLE schRoot = NULL;
HRESULT hresReturn = S_OK;
ENUM_SERVICE_STATUS ess;
SERVICE_STATUS ServiceStatus;
schSCM = OpenSCManager(NULL,
NULL,
SC_MANAGER_ALL_ACCESS);
if ( schSCM == NULL )
{
hresReturn = RETURNCODETOHRESULT( GetLastError() );
}
else
{
if ( schRoot = OpenService( schSCM, pszRoot, SERVICE_ALL_ACCESS ) )
{
if ( !QueryServiceStatus( schRoot, &ess.ServiceStatus ) )
{
hresReturn = RETURNCODETOHRESULT( GetLastError() );
}
CloseServiceHandle( schRoot );
if ( SUCCEEDED( hresReturn )
&& ( fStart
|| ess.ServiceStatus.dwCurrentState != SERVICE_STOPPED) )
{
ess.lpServiceName = pszRoot;
// if it's stopped, then whack the dllhosts that have wam.dll loaded
if (ess.ServiceStatus.dwCurrentState == SERVICE_STOPPED)
{
#if defined(VERBOSE_DEBUG)
OutputDebugString(_T("Attempt to kill MTX\n"));
#endif
KillTaskByName(_T("MTX"), "wam.dll"); // MTS WAM containers
#if defined(VERBOSE_DEBUG)
OutputDebugString(_T("Attempt to kill DLLHOST\n"));
#endif
KillTaskByName(_T("DLLHOST"),"wam.dll"); // COM+ WAM Containers
}
hresReturn = StartStopAllRecursive( schSCM, &ess, 1, fStart, TRUE, &dwTimeoutMsecs );
}
// check out the current state of the service
if ( schRoot = OpenService( schSCM, pszRoot, SERVICE_ALL_ACCESS ) )
{
if ( QueryServiceStatus( schRoot, &ess.ServiceStatus ) )
{
// if it's stopped, then whack the dllhosts that have wam.dll loaded
if (ess.ServiceStatus.dwCurrentState == SERVICE_STOPPED)
{
#if defined(VERBOSE_DEBUG)
OutputDebugString(_T("Attempt to kill MTX\n"));
#endif
KillTaskByName(_T("MTX"), "wam.dll"); // MTS WAM containers
#if defined(VERBOSE_DEBUG)
OutputDebugString(_T("Attempt to kill DLLHOST\n"));
#endif
KillTaskByName(_T("DLLHOST"),"wam.dll"); // COM+ WAM Containers
}
}
CloseServiceHandle( schRoot );
}
}
else
{
hresReturn = RETURNCODETOHRESULT( GetLastError() );
}
CloseServiceHandle( schSCM );
}
return hresReturn;
}
StartStopAllRecursive(
SC_HANDLE schSCM,
ENUM_SERVICE_STATUS* pessRoot,
DWORD dwNumServices,
BOOL fStart,
BOOL fForceDemandStart,
LPDWORD pdwTimeoutMsecs
)
/*++
StartStopAllRecursive
start or stop services dependency tree starting with specified root service
Arguments:
schSCM - handle to SCM
pessRoot - list of services to start/stop recursively
fStart - TRUE to start services, FALSE to stop
fForceDemandStart - for start requests: TRUE to force start
if SERVICE_DEMAND_START. Otherwise only start if service
is auto start ( including boot & system start )
dwTimeoutMsecs - timeout for status check ( in ms )
Returns:
COM status
--*/
{
DWORD dwBytesNeeded;
DWORD dwNumRecServices = 0;
HRESULT hresReturn = S_OK;
BYTE abServiceList[2048];
LPBYTE pbServiceList = NULL;
BYTE abServiceConfig[1024];
LPQUERY_SERVICE_CONFIG pServiceConfig = NULL;
SC_HANDLE* phServiceHandle = NULL;
DWORD i;
DWORD dwServiceConfigSize;
SERVICE_STATUS ServiceStatus;
DWORD dwSleepTotal = 0;
DWORD dwSleepInterval = SLEEP_INTERVAL;
LPENUM_SERVICE_STATUS pessDependentServices;
if ( (phServiceHandle = (SC_HANDLE*)LocalAlloc( LMEM_FIXED|LMEM_ZEROINIT,
dwNumServices * sizeof(SC_HANDLE) )) == NULL )
{
hresReturn = RETURNCODETOHRESULT( ERROR_NOT_ENOUGH_MEMORY );
}
if ( SUCCEEDED(hresReturn) )
{
//
// All services will be started/stopped at once
// then periodically checked for status until all of them are running/stopped
// or some error occured or timeout
//
if ( dwNumServices != 0 )
{
pServiceConfig = (LPQUERY_SERVICE_CONFIG)abServiceConfig;
dwServiceConfigSize = sizeof( abServiceConfig );
//
// Open handles and send service control start command
//
for ( i = 0 ;
i < dwNumServices && SUCCEEDED(hresReturn) ;
i++)
{
//
// Send command to Services
//
#if defined(VERBOSE_DEBUG)
WCHAR buffer[200];
_snwprintf(buffer, 200, L"Working on the '%s' service\n", pessRoot[i].lpServiceName );
buffer[199] = L'\0';
OutputDebugString( buffer );
#endif
phServiceHandle[i] = OpenService( schSCM,
pessRoot[i].lpServiceName,
SERVICE_ALL_ACCESS );
if ( phServiceHandle[i] != NULL )
{
if ( fStart )
{
//
// Query service config to check if service should be started
// based on its Start Type.
//
if ( !QueryServiceConfig( phServiceHandle[i],
(LPQUERY_SERVICE_CONFIG)&abServiceConfig,
dwServiceConfigSize,
&dwBytesNeeded ) )
{
if ( GetLastError() == ERROR_INSUFFICIENT_BUFFER )
{
if ( (pServiceConfig = (LPQUERY_SERVICE_CONFIG)LocalAlloc(
LMEM_FIXED,
dwBytesNeeded )) == NULL )
{
hresReturn = RETURNCODETOHRESULT( ERROR_NOT_ENOUGH_MEMORY );
}
else
{
dwServiceConfigSize = dwBytesNeeded;
if ( !QueryServiceConfig( phServiceHandle[i],
(LPQUERY_SERVICE_CONFIG)pServiceConfig,
dwServiceConfigSize,
&dwBytesNeeded ) )
{
hresReturn = RETURNCODETOHRESULT( GetLastError() );
}
}
}
else
{
hresReturn = RETURNCODETOHRESULT( GetLastError() );
}
}
if ( SUCCEEDED(hresReturn) )
{
//
// Check if service auto start except if fForceDemandStart
// specified. ForceDemandStart will only be specified for
// the service that the command is directly issued on. This
// means that it will only be specified for IISADMIN.
//
if ( ( fForceDemandStart && pServiceConfig->dwStartType == SERVICE_DEMAND_START )
|| ( pServiceConfig->dwStartType == SERVICE_BOOT_START ||
pServiceConfig->dwStartType == SERVICE_SYSTEM_START ||
pServiceConfig->dwStartType == SERVICE_AUTO_START ) )
{
StartService( phServiceHandle[i], 0, NULL );
//
// Ask for only the services that are inactive. So, for instance,
// if we are attempting to restart the iisadmin service,
// and W3SVC is still active, we won't send it a command to restart.
//
hresReturn = EnumStartServices( schSCM,
pessRoot[i].lpServiceName,
SERVICE_INACTIVE,
abServiceList,
sizeof(abServiceList),
&pbServiceList,
&dwNumRecServices,
FALSE );
if ( SUCCEEDED( hresReturn ) )
{
hresReturn = StartStopAllRecursive( schSCM,
(ENUM_SERVICE_STATUS*)pbServiceList,
dwNumRecServices,
fStart,
FALSE,
pdwTimeoutMsecs );
if ( pbServiceList != NULL
&& pbServiceList != abServiceList )
{
LocalFree( pbServiceList );
}
}
}
else
{
//
// Don't want to start this service, so mark it
// as already running
//
if (wcscmp(pessRoot[i].lpServiceName,_T("IISADMIN")) == 0)
{
hresReturn = RETURNCODETOHRESULT(ERROR_SERVICE_NOT_ACTIVE);
}
else
{
pessRoot[i].ServiceStatus.dwCurrentState = SERVICE_RUNNING;
}
}
}
}
else // handle stopping the service
{
if ( W3SVCandW3SSL(i, pessRoot, dwNumServices) )
{
continue;
}
// Remember if the service was stopped to start with.
BOOL fServiceWasStoppedToStartWith = ( pessRoot[i].ServiceStatus.dwCurrentState == SERVICE_STOPPED );
// We will also need to stop dependent services if the are started all ready.
BOOL fHasDependentServices = FALSE;
if ( !fServiceWasStoppedToStartWith )
{
//
// if the service was not stopped to start with
// we need to tell the service to stop.
//
#if defined(VERBOSE_DEBUG)
WCHAR buffer[200];
_snwprintf(buffer, 200, L"Sending a stop to %s\n", pessRoot[i].lpServiceName );
buffer[199] = L'\0';
OutputDebugString( buffer );
#endif
hresReturn = SendControlToService( phServiceHandle[i],
SERVICE_CONTROL_STOP,
pdwTimeoutMsecs );
if ( hresReturn == RETURNCODETOHRESULT( ERROR_SERVICE_REQUEST_TIMEOUT ) )
{
//
// WARNING!
//
// We're in trouble. Service did not respond in a timely fashion,
// and further attempt to use this handle ( including closing it )
// will also hang, so cancel the handle and leak it
//
phServiceHandle[i] = NULL;
}
else if ( hresReturn == RETURNCODETOHRESULT( ERROR_DEPENDENT_SERVICES_RUNNING ) )
{
fHasDependentServices = TRUE;
}
}
//
// If it was stopped to start with, or if it was not but it couldn't
// be stopped because it has dependent services. Go ahead and stop
// the dependent services.
//
if ( fHasDependentServices || fServiceWasStoppedToStartWith )
{
#if defined(VERBOSE_DEBUG)
WCHAR buffer[200];
_snwprintf(buffer, 200, L"Enuming services for %s\n", pessRoot[i].lpServiceName );
buffer[199] = L'\0';
OutputDebugString( buffer );
#endif
//
// Get the services that are active because we
// are only interested in stopping services that
// are actually running.
//
hresReturn = EnumStartServices( schSCM,
pessRoot[i].lpServiceName,
SERVICE_ACTIVE,
abServiceList,
sizeof(abServiceList),
&pbServiceList,
&dwNumRecServices,
FALSE );
if ( SUCCEEDED( hresReturn ) )
{
hresReturn = StartStopAllRecursive( schSCM,
(ENUM_SERVICE_STATUS*)pbServiceList,
dwNumRecServices,
fStart,
FALSE,
pdwTimeoutMsecs );
if ( pbServiceList != NULL
&& pbServiceList != abServiceList )
{
LocalFree( pbServiceList );
}
}
if ( SUCCEEDED( hresReturn ) )
{
//
// If the service itself is not all ready stopped, then stop
// the service. It could be that it is stopped ( due to a crash )
// and the other services that were dependent on them are still
// running.
//
if ( !fServiceWasStoppedToStartWith )
{
#if defined(VERBOSE_DEBUG)
WCHAR buffer[200];
_snwprintf(buffer, 200, L"Sending a 2nd stop to %s\n", pessRoot[i].lpServiceName );
buffer[199] = L'\0';
OutputDebugString( buffer );
#endif
hresReturn = SendControlToService( phServiceHandle[i],
SERVICE_CONTROL_STOP,
pdwTimeoutMsecs );
}
}
}
if ( FAILED( hresReturn ) )
{
#if defined(VERBOSE_DEBUG)
WCHAR buffer[200];
_snwprintf(buffer, 200, L"Failed to stop service %s with %x hresult\n", pessRoot[i].lpServiceName, hresReturn );
buffer[199] = L'\0';
OutputDebugString( buffer );
#endif
break;
}
} // end of stopping code
} // end of valid service handle
} // end of loop
//
// Check service running
//
if ( (*pdwTimeoutMsecs < dwSleepInterval) && *pdwTimeoutMsecs )
{
dwSleepInterval = *pdwTimeoutMsecs;
}
for ( ;
SUCCEEDED( hresReturn );
)
{
for ( i = 0 ;
i < dwNumServices;
i++)
{
//
// Only query status for services known to be not running
//
if ( pessRoot[i].ServiceStatus.dwCurrentState
!= (DWORD)(fStart ? SERVICE_RUNNING : SERVICE_STOPPED) )
{
if ( QueryServiceStatus( phServiceHandle[i], &ServiceStatus ) )
{
//
// remember status
//
pessRoot[i].ServiceStatus.dwCurrentState = ServiceStatus.dwCurrentState;
if ( fStart && ServiceStatus.dwCurrentState == SERVICE_STOPPED )
{
//
// Service died during startup. no point keeping polling
// for service state : return an error
//
hresReturn = RETURNCODETOHRESULT( ERROR_SERVICE_NOT_ACTIVE );
break;
}
if ( ServiceStatus.dwCurrentState != (DWORD)(fStart ? SERVICE_RUNNING : SERVICE_STOPPED) )
{
//
// will keep looping waiting for target service state
//
break;
}
}
else
{
hresReturn = RETURNCODETOHRESULT( GetLastError() );
break;
}
}
}
//
// if we did not checked all services then at least one of them
// is not running ( or some error occured )
//
if ( SUCCEEDED( hresReturn ) && i != dwNumServices )
{
if ( dwSleepInterval > *pdwTimeoutMsecs )
{
hresReturn = RETURNCODETOHRESULT( ERROR_SERVICE_REQUEST_TIMEOUT );
}
else
{
Sleep( dwSleepInterval );
*pdwTimeoutMsecs -= dwSleepInterval;
}
}
else
{
break;
}
}
//
// close service handles
//
for ( i = 0 ;
i < dwNumServices;
i++)
{
if ( phServiceHandle[i] != 0 )
{
CloseServiceHandle( phServiceHandle[i] );
}
}
}
LocalFree( phServiceHandle );
}
if ( pServiceConfig != NULL
&& pServiceConfig != (LPQUERY_SERVICE_CONFIG)abServiceConfig )
{
LocalFree( pServiceConfig );
}
return hresReturn;
}
//
// control block for control command requests
//
typedef struct {
HRESULT hres;
LONG lRefCount;
DWORD dwCmd;
SC_HANDLE hServiceHandle;
} SERVICE_COMMAND_CONTROL_BLOCK;
extern "C"
DWORD WINAPI
ControlServiceThread(
LPVOID p
)
/*++
ControlServiceThread
Send a command to a service
Arguments:
p - ptr to SERVICE_COMMAND_CONTROL_BLOCK
Returns:
0
--*/
{
SERVICE_STATUS ssStatus;
SERVICE_COMMAND_CONTROL_BLOCK* pCB = (SERVICE_COMMAND_CONTROL_BLOCK*)p;
if ( !ControlService( pCB->hServiceHandle, pCB->dwCmd, &ssStatus ) )
{
pCB->hres = RETURNCODETOHRESULT( GetLastError() );
}
else
{
pCB->hres = S_OK;
}
if ( InterlockedDecrement( &pCB->lRefCount ) == 0 )
{
delete pCB;
}
return 0;
}
HRESULT
SendControlToService(
SC_HANDLE hServiceHandle,
DWORD dwCmd,
LPDWORD pdwTimeoutMsecs
)
/*++
ControlServiceThread
Send a command to a service with timeout
Arguments:
hServiceHandle - service to control
dwCmd - command to send to service
pdwTimeoutMsecs - timeout ( in ms ). updated on output based on time
spent waiting for service status
Returns:
ERROR_SERVICE_REQUEST_TIMEOUT if timeout
otherwise COM status
--*/
{
HANDLE hT;
DWORD dwID;
DWORD dwBefore;
DWORD dwAfter;
SERVICE_COMMAND_CONTROL_BLOCK* pCB;
DWORD dwTimeoutMsecs = *pdwTimeoutMsecs;
HRESULT hres;
//
// Default timeout for ControlService is 120s, which is too long for us
// so we create a thread to call ControlService and wait for thread
// termination.
// Communication between threads is handled by a refcounted control block
//
if ( pCB = new SERVICE_COMMAND_CONTROL_BLOCK )
{
pCB->lRefCount = 2; // 1 for caller, 1 for callee
pCB->dwCmd = dwCmd;
pCB->hServiceHandle = hServiceHandle;
pCB->hres = S_OK;
dwBefore = GetTickCount();
if ( hT = CreateThread( NULL,
0,
(LPTHREAD_START_ROUTINE)ControlServiceThread,
(LPVOID)pCB,
0,
&dwID ) )
{
if ( WaitForSingleObject( hT, dwTimeoutMsecs ) == WAIT_OBJECT_0 )
{
hres = pCB->hres;
}
else
{
hres = RETURNCODETOHRESULT( ERROR_SERVICE_REQUEST_TIMEOUT );
}
CloseHandle( hT );
if ( InterlockedDecrement( &pCB->lRefCount ) == 0 )
{
delete pCB;
}
//
// Update caller's timeout
//
dwAfter = GetTickCount();
if ( dwAfter > dwBefore )
{
if ( dwAfter - dwBefore <= dwTimeoutMsecs )
{
*pdwTimeoutMsecs -= dwAfter - dwBefore;
}
else
{
*pdwTimeoutMsecs = 0;
}
}
}
else
{
delete pCB;
hres = RETURNCODETOHRESULT( GetLastError() );
}
}
else
{
hres = RETURNCODETOHRESULT( ERROR_NOT_ENOUGH_MEMORY );
}
return hres;
}
HRESULT
SerializeEnumServiceBuffer(
LPENUM_SERVICE_STATUS pessDependentServices,
DWORD dwNumServices,
LPBYTE pbBuffer,
DWORD dwBufferSize,
LPDWORD pdwMDRequiredBufferSize
)
/*++
SerializeEnumServiceBuffer
Serialize array of ENUM_SERVICE_STATUS to buffer,
replacing ptr by offset in buffer
Arguments:
pessDependentServices - array of ENUM_SERVICE_STATUS to serialize
dwNumServices - # of entries in pessDependentServices
pbBuffer - buffer filled with serialized status as array of SERIALIZED_ENUM_SERVICE_STATUS
dwBufferSize - maximum size of pbBuffer
pdwMDRequiredBufferSize - updated with required size if dwBufferSize too small
Returns:
ERROR_INSUFFICIENT_BUFFER if dwBufferSize too small
otherwise COM status
--*/
{
HRESULT hresReturn = S_OK;
DWORD dwMinSize = 0;
UINT i;
if ( !pbBuffer )
{
dwBufferSize = 0;
}
//
// size of output buffer is based on size of array of SERIALIZED_ENUM_SERVICE_STATUS
// plus size of all strings : service name & display name for each entry
//
dwMinSize = sizeof(SERIALIZED_ENUM_SERVICE_STATUS) * dwNumServices;
for ( i = 0 ;
i < dwNumServices ;
++i )
{
UINT cServiceName = _tcslen( pessDependentServices[i].lpServiceName ) + 1;
UINT cDisplayName = _tcslen( pessDependentServices[i].lpDisplayName ) + 1;
//
// do not update if output buffer is too small, but keep looping to determine
// total size
//
if ( dwBufferSize >= dwMinSize + (cServiceName + cDisplayName) * sizeof(TCHAR) )
{
//
// copy service status as is
//
((SERIALIZED_ENUM_SERVICE_STATUS*)pbBuffer)[i].ServiceStatus =
pessDependentServices[i].ServiceStatus;
//
// copy string and convert ptr to string to index in output buffer
//
memcpy( pbBuffer + dwMinSize, pessDependentServices[i].lpServiceName, cServiceName * sizeof(TCHAR) );
((SERIALIZED_ENUM_SERVICE_STATUS*)pbBuffer)[i].iServiceName = dwMinSize ;
memcpy( pbBuffer + dwMinSize + cServiceName * sizeof(TCHAR), pessDependentServices[i].lpDisplayName, cDisplayName * sizeof(TCHAR) );
((SERIALIZED_ENUM_SERVICE_STATUS*)pbBuffer)[i].iDisplayName = dwMinSize + cServiceName * sizeof(TCHAR) ;
}
dwMinSize += (cServiceName + cDisplayName) * sizeof(TCHAR) ;
}
if ( dwBufferSize < dwMinSize )
{
*pdwMDRequiredBufferSize = dwMinSize;
hresReturn = RETURNCODETOHRESULT( ERROR_INSUFFICIENT_BUFFER );
}
return hresReturn;
}
STDMETHODIMP
CIisRestart::Status(
DWORD dwBufferSize,
unsigned char * pbBuffer,
DWORD * pdwMDRequiredBufferSize,
DWORD * pdwNumServices
)
/*++
Status
Return status of all internet services as array of ENUM_SERVICE_STATUS
Arguments:
dwBufferSize - maximum size of pbBuffer
pbBuffer - buffer filled with serialized status as array of SERIALIZED_ENUM_SERVICE_STATUS
pdwMDRequiredBufferSize - updated with required size if dwBufferSize too small
pdwNumServices - updated with number of entries stored in pbBuffer
Returns:
ERROR_RESOURCE_DISABLED if access to restart commands disabled
ERROR_INSUFFICIENT_BUFFER if dwBufferSize too small
otherwise COM status
--*/
{
SC_HANDLE schSCM = NULL;
DWORD dwBytesNeeded;
DWORD dwNumServices = 0;
HRESULT hresReturn = E_FAIL;
BYTE abServiceList[2048];
LPBYTE pbServiceList = NULL;
LPENUM_SERVICE_STATUS pessDependentServices;
if ( !IsEnableRemote() )
{
hresReturn = RETURNCODETOHRESULT( ERROR_RESOURCE_DISABLED );
}
else
{
schSCM = OpenSCManager(NULL,
NULL,
SC_MANAGER_ALL_ACCESS);
if ( schSCM == NULL )
{
hresReturn = RETURNCODETOHRESULT( GetLastError() );
}
else
{
hresReturn = EnumStartServices( schSCM,
_T("IISADMIN"),
SERVICE_STATE_ALL,
abServiceList,
sizeof(abServiceList),
&pbServiceList,
pdwNumServices,
FALSE );
if ( SUCCEEDED(hresReturn) )
{
pessDependentServices = (LPENUM_SERVICE_STATUS)pbServiceList;
hresReturn = SerializeEnumServiceBuffer( (LPENUM_SERVICE_STATUS)pbServiceList,
*pdwNumServices,
pbBuffer,
dwBufferSize,
pdwMDRequiredBufferSize );
if ( pbServiceList != NULL
&& pbServiceList != abServiceList )
{
LocalFree( pbServiceList );
}
}
CloseServiceHandle(schSCM);
}
}
return hresReturn;
}
HRESULT
EnumStartServices(
SC_HANDLE schSCM,
LPTSTR pszRoot,
DWORD dwTargetState,
LPBYTE abServiceList,
DWORD dwInitializeServiceListSize,
LPBYTE* ppbServiceList,
LPDWORD pdwNumServices,
BOOL fAddIisadmin
)
/*++
EnumStartServices
Enumerate dependent services to output buffer as array of ENUM_SERVICE_STATUS
Arguments:
schSCM - handle to SCM
pszRoot - service for which to enumerate dependencies
dwTargetState - dwServiceState for call to EnumDependentServices()
abServiceList - initial output buffer
dwInitializeServiceListSize - maximum size of abServiceList
ppbServiceList - updated with output buffer, may be abServiceList if long enough
otherwise returned buffer is to be freed using LocalFree()
pdwNumServices - updated with number of entries stored in pbBuffer
fAddIisadmin - TRUE to add IISADMIN to list of dependent services
Returns:
COM status
--*/
{
HRESULT hresReturn = S_OK;
SC_HANDLE schIISADMIN = NULL;
DWORD dwBytesNeeded;
DWORD dwAddSize = 0;
DWORD dwOffsetSize = 0;
*ppbServiceList = NULL;
schIISADMIN = OpenService(schSCM,
pszRoot,
STANDARD_RIGHTS_REQUIRED | SERVICE_ENUMERATE_DEPENDENTS);
if (schIISADMIN == NULL)
{
hresReturn = RETURNCODETOHRESULT(GetLastError());
}
else
{
if ( fAddIisadmin )
{
//
// if initial size too small for Iisadmin description then fail
//
dwOffsetSize = sizeof(ENUM_SERVICE_STATUS );
dwAddSize = dwOffsetSize;
if ( dwAddSize > dwInitializeServiceListSize )
{
hresReturn = RETURNCODETOHRESULT( ERROR_NOT_ENOUGH_MEMORY );
goto Cleanup;
}
//
// Use global static name for IISADMIN, no need to copy it to output buffer
//
((LPENUM_SERVICE_STATUS)abServiceList)->lpDisplayName = _T("IISADMIN");
((LPENUM_SERVICE_STATUS)abServiceList)->lpServiceName = _T("IISADMIN");
//
// don't want to check service status at this point as it may be stuck
// so assume RUNNING.
//
((LPENUM_SERVICE_STATUS)abServiceList)->ServiceStatus.dwCurrentState = SERVICE_RUNNING;
}
if (!EnumDependentServices( schIISADMIN,
dwTargetState,
(LPENUM_SERVICE_STATUS)(abServiceList + dwOffsetSize),
dwInitializeServiceListSize - dwAddSize,
&dwBytesNeeded,
pdwNumServices))
{
if (GetLastError() == ERROR_MORE_DATA)
{
if ( (*ppbServiceList = (LPBYTE)LocalAlloc( LMEM_FIXED,
dwBytesNeeded + dwAddSize )) == NULL )
{
hresReturn = RETURNCODETOHRESULT( ERROR_NOT_ENOUGH_MEMORY );
}
else
{
memcpy( *ppbServiceList, abServiceList, dwOffsetSize );
if (!EnumDependentServices( schIISADMIN,
SERVICE_INACTIVE,
(LPENUM_SERVICE_STATUS)(*ppbServiceList + dwOffsetSize),
dwBytesNeeded,
&dwBytesNeeded,
pdwNumServices))
{
hresReturn = RETURNCODETOHRESULT( GetLastError() );
LocalFree( *ppbServiceList );
*ppbServiceList = NULL;
}
}
}
else
{
hresReturn = RETURNCODETOHRESULT( GetLastError() );
}
}
else
{
*ppbServiceList = abServiceList;
}
}
Cleanup:
if ( schIISADMIN )
{
CloseServiceHandle( schIISADMIN );
}
if ( fAddIisadmin && SUCCEEDED( hresReturn ) )
{
++*pdwNumServices;
}
return hresReturn;
}
BOOL
IsEnableRemote(
)
/*++
IsEnableRemote
Check if restart I/F enabled
( based on HKLM\SOFTWARE\Microsoft\INetStp::EnableRestart::REG_DWORD )
Arguments:
None
Returns:
TRUE if enabled, otherwise FALSE
--*/
{
BOOL fSt = FALSE;
HKEY hKey;
DWORD dwValue;
DWORD dwType;
DWORD dwSize;
if ( RegOpenKeyEx( HKEY_LOCAL_MACHINE,
TEXT("SOFTWARE\\Microsoft\\INetStp"),
0,
KEY_READ,
&hKey ) == ERROR_SUCCESS )
{
dwSize = sizeof( dwValue );
if ( RegQueryValueEx( hKey,
TEXT("EnableRestart"),
0,
&dwType,
(LPBYTE)&dwValue,
&dwSize ) == ERROR_SUCCESS )
{
fSt = dwValue == 1;
}
else
{
fSt = TRUE;
}
RegCloseKey( hKey );
}
return fSt;
}
BOOL
CloseSystemExceptionHandler(
LPCTSTR pszWindowName
)
/*++
CloseSystemExceptionHandler
Send a close ( e.g. terminate apps without debugging ) command to the window
created by NT when a debugger is not configured to automatically start after app exception.
This window stays on screen until interactive user select either OK or debug app, which is
a problem for automated restart.
So we locate this window and send it a command requesting stop w/o debugging.
We locate the window by enumerating all windows and checking for window name beginning with the name
of the application that raised an exception, e.g. "inetinfo.exe"
Arguments:
pszWindowName - window name where to send terminate command
Returns:
TRUE if SUCCESS, otherwise FALSE
--*/
{
BOOL fSt = TRUE;
HKEY hKey;
DWORD dwValue;
DWORD dwType;
DWORD dwSize;
TASK_LIST tl;
TCHAR achBuffer[MAX_PATH];
GetPidFromTitle( &tl.dwProcessId, (HWND*)&tl.hwnd, pszWindowName );
if ( tl.dwProcessId )
{
#if 0
//
// Original idea was to close the exception window, but this fires up the debugger, so I attempted
// to disable the debugger before closing the window, but this does not work as this setting is
// apparently not dynamic, i.e. you have to restart NT for this to take effect.
//
if ( RegOpenKeyEx( HKEY_LOCAL_MACHINE,
TEXT("SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\AeDebug"),
0,
KEY_READ|KEY_WRITE,
&hKey ) == ERROR_SUCCESS )
{
dwSize = sizeof( achBuffer );
if ( RegQueryValueEx( hKey,
TEXT("Debugger"),
0,
&dwType,
(LPBYTE)achBuffer,
&dwSize ) != ERROR_SUCCESS )
{
RegCloseKey( hKey );
return FALSE;
}
if ( RegSetValueEx( hKey,
TEXT("Debugger"),
0,
REG_SZ,
(const BYTE*)TEXT(""),
sizeof(TCHAR) ) != ERROR_SUCCESS )
{
}
RegCloseKey( hKey );
}
else
{
return FALSE;
}
#endif
#if defined(VERBOSE_DEBUG)
OutputDebugString(_T("located exception window, try to close it\n"));
#endif
//PostMessage( (HWND)tl.hwnd, WM_CLOSE, 0, 0 );
//
// WARNING: major hack: turns out that WM_COMMAND 1 is the command to send to
// the exception handler to ask it to close application w/o debugging
// This works for NT5, may change in the future...
//
PostMessage( (HWND)tl.hwnd, WM_COMMAND, 1, 0 );
Sleep( 1000 );
#if 0
if ( RegOpenKeyEx( HKEY_LOCAL_MACHINE,
TEXT("SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\AeDebug"),
0,
KEY_WRITE,
&hKey ) == ERROR_SUCCESS )
{
if ( RegSetValueEx( hKey,
TEXT("Debugger"),
0,
REG_SZ,
(const BYTE*)achBuffer,
dwSize ) == ERROR_SUCCESS )
{
fSt = TRUE;
}
RegCloseKey( hKey );
}
#endif
}
else
{
fSt = TRUE;
}
return fSt;
}
HRESULT
KillTaskByName(
LPTSTR pname,
LPSTR pszMandatoryModule
)
/*++
KillTaskByName
Kill a process by name
Most of the code was taken from the Platform SDK kill,c sample, and
utilizes the common.c module included in this project.
Works only on NT platforms ( NOT Win 9x )
Arguments:
pname - name of process to kill ( name of executable w/o extension )
pszMandatoryModule - module name to look for, e.g. "wam.dll"
can be NULL for unconditional kill
Returns:
COM status
--*/
{
TASK_LIST tlist[MAX_TASKS];
DWORD i;
DWORD numTasks;
TASK_LIST_ENUM te;
TCHAR tname[PROCESS_SIZE];
LPTSTR p;
OSVERSIONINFO verInfo = {0};
LPGetTaskList GetTaskList;
LPEnableDebugPriv EnableDebugPriv;
BOOL fSuccess = TRUE;
HRESULT hres = S_OK;
//
// Determine what system we're on and do the right thing
//
verInfo.dwOSVersionInfoSize = sizeof (verInfo);
GetVersionEx(&verInfo);
switch (verInfo.dwPlatformId)
{
case VER_PLATFORM_WIN32_NT:
GetTaskList = GetTaskListNT;
EnableDebugPriv = EnableDebugPrivNT;
break;
#if 0
case VER_PLATFORM_WIN32_WINDOWS:
GetTaskList = GetTaskList95;
EnableDebugPriv = EnableDebugPriv95;
break;
#endif
default:
return RETURNCODETOHRESULT(ERROR_INVALID_PARAMETER);
}
//
// Obtain the ability to manipulate other processes
//
EnableDebugPriv();
//
// get the task list for the system
//
hres = GetTaskList( tlist, MAX_TASKS, pname, &numTasks, TRUE, pszMandatoryModule );
#if 0
//
// enumerate all windows and try to get the window
// titles for each task
//
te.tlist = tlist;
te.numtasks = numTasks;
GetWindowTitles( &te );
for (i=0; i<numTasks; i++)
{
tname[0] = 0;
lstrcpy( tname, tlist[i].ProcessName );
p = _tcschr( tname, _T('.') );
if (p)
{
p[0] = _T('\0');
}
if (MatchPattern( tname, pname ))
{
tlist[i].flags = TRUE;
}
else if (MatchPattern( tlist[i].ProcessName, pname ))
{
tlist[i].flags = TRUE;
}
else if (MatchPattern( tlist[i].WindowTitle, pname ))
{
tlist[i].flags = TRUE;
}
}
#endif
#if 0
for (i=0; i<numTasks; i++)
{
if (tlist[i].flags)
{
if ( FAILED( hres = KillProcess( &tlist[i], TRUE ) ) )
{
break;
}
}
}
#endif
return hres;
}
VOID
ReportStatus(
DWORD dwId,
DWORD dwStatus
)
/*++
ReportStatus
Log status event
Arguments:
dwId - ID of event to log ( source is "IISCTLS" , SYSTEM log )
dwStatus - status of operation ( HRESULT )
Returns:
Nothing
--*/
{
HANDLE hLog;
LPTSTR aParams[1];
if ( (hLog = RegisterEventSource( NULL, _T("IISCTLS") )) != NULL )
{
if ( SUCCEEDED( WhoAmI( aParams + 0 ) ) )
{
ReportEvent( hLog,
EVENTLOG_INFORMATION_TYPE,
0,
dwId,
NULL,
1,
sizeof(DWORD),
(LPCTSTR*)aParams,
&dwStatus );
LocalFree( aParams[0] );
}
DeregisterEventSource( hLog );
}
}
HRESULT
WhoAmI(
LPTSTR* ppPrincipal
)
/*++
WhoAmI
Return currently impersonated user
As this is a COM server running under the identity of the invoker
this means we access the process token. So we might end up getting
the wrong user name if the object is invoked in close succession
( within the 5s server exit timeout ) by different users.
Arguments:
ppPrincipal - update with ptr to string containing user name ( domain\acct )
must be freed using LocalFree()
Returns:
Error status
--*/
{
TCHAR* pPrincipal;
TCHAR achUserName[512];
TCHAR achDomain[512];
DWORD dwLen;
DWORD dwDomainLen;
DWORD SIDsize = 256;
SID_NAME_USE SIDtype = SidTypeUser;
LPSTR lpszUsr;
HRESULT hres = E_FAIL;
#if 0
//
// naive attempt to retrieve user name and domain.
// Unfortunately a LookupAccountName() followed by LookupAccountSid always return
// the local domain ( typically the local computer name )
// even if the account is a domain account.
// So we can't use this...
//
PSID pUserSID = (PSID)LocalAlloc( LMEM_FIXED, SIDsize);
if ( !GetUserName( achUserName, &dwLen ) )
wcscpy(achUserName, _T("Unknown user"));
LookupAccountName(NULL, achUserName, pUserSID, &SIDsize,
achDomain, &dwDomainLen, &SIDtype);
dwLen = sizeof( achUserName );
dwDomainLen = sizeof(achDomain);
LookupAccountSid(NULL, pUserSID, achUserName, &dwLen,
achDomain, &dwDomainLen, &SIDtype);
_wcsupr(achDomain);
wcscat(szMsg,achDomain);
wcscat(szMsg,_T("\\"));
wcscat(szMsg,achUserName);
#else
#if 0
//
// Attempt to retrieve the thread token instead of the process token.
// doesn't work for COM servers
//
IServerSecurity* pSec;
if ( SUCCEEDED( CoGetCallContext( IID_IServerSecurity,
(void**)&pSec ) ) )
{
DWORD AuthnSvc;
DWORD AuthzSvc;
OLECHAR* pServerPrincName;
DWORD AuthnLevel;
DWORD ImpLevel;
void* pPrivs;
DWORD Capabilities = 0;
//if ( FAILED(pSec->QueryBlanket( &AuthnSvc, &AuthzSvc, &pServerPrincName, &AuthnLevel, &ImpLevel, &pPrivs, &Capabilities)) )
if ( FAILED(pSec->ImpersonateClient()) )
{
}
else
{
#endif
//
// So we have to access the process token and retrieve account & user name
// by using LookupAccountSid()
//
HANDLE hAccTok = NULL;
if ( OpenProcessToken( GetCurrentProcess(),
TOKEN_EXECUTE|TOKEN_QUERY,
&hAccTok ) )
{
BYTE abSidAndInfo[512];
DWORD dwReq;
//
// provide a reasonably sized buffer. If this fails we don't
// retry with a bigger one.
//
if ( GetTokenInformation( hAccTok,
TokenUser,
(LPVOID)abSidAndInfo,
sizeof(abSidAndInfo),
&dwReq) )
{
dwLen = sizeof( achUserName ) / sizeof(TCHAR);
dwDomainLen = sizeof(achDomain) / sizeof(TCHAR);
//
// provide a reasonably sized buffer. If this fails we don't
// retry with a bigger one.
//
if ( LookupAccountSid( NULL,
((SID_AND_ATTRIBUTES*)abSidAndInfo)->Sid,
achUserName,
&dwLen,
achDomain,
&dwDomainLen,
&SIDtype) )
{
//
// We return a LocalAlloc'ed buffer
//
dwLen = _tcslen( achUserName );
dwDomainLen = _tcslen( achDomain );
if ( pPrincipal = (LPTSTR)LocalAlloc( LMEM_FIXED,
(dwLen + 1 + dwDomainLen + 1 ) * sizeof(TCHAR) ) )
{
memcpy( pPrincipal,
achDomain,
sizeof(TCHAR)*dwDomainLen );
pPrincipal[dwDomainLen] = '\\';
memcpy( pPrincipal + dwDomainLen + 1,
achUserName,
sizeof(TCHAR)*(dwLen+1) );
*ppPrincipal = pPrincipal;
hres = S_OK;
}
else
{
hres = RETURNCODETOHRESULT( ERROR_NOT_ENOUGH_MEMORY );
}
}
else
{
hres = RETURNCODETOHRESULT( GetLastError() );
}
}
else
{
hres = RETURNCODETOHRESULT( GetLastError() );
}
CloseHandle( hAccTok );
}
else
{
hres = RETURNCODETOHRESULT( GetLastError() );
}
#if 0
}
pSec->Release();
}
else
{
OutputDebugString(_T("fail to get call context"));
}
#endif
#endif
return hres;
}
BOOL
W3SVCandW3SSL(
DWORD currentIndex,
ENUM_SERVICE_STATUS* pessRoot,
DWORD dwNumServices
)
{
/*++
W3SVCandW3SSL
Return currently impersonated user
As this is a COM server running under the identity of the invoker
this means we access the process token. So we might end up getting
the wrong user name if the object is invoked in close succession
( within the 5s server exit timeout ) by different users.
Arguments:
DWORD currentIndex - index of the service we are deciding if we should process.
ENUM_SERVICE_STATUS* pessRoot - the set of services we are working on.
DWORD dwNumServices - the number of services in the set.
Returns:
TRUE if we found the w3svc and w3ssl on the same line and we are looking at the w3svc
--*/
BOOL bResult = FALSE;
// check if we are looking at the w3svc. If we are find out if the
// w3ssl is on the same level. Note the w3ssl will always be listed
// after the w3svc.
if ( _wcsicmp( pessRoot[currentIndex].lpServiceName, L"w3svc" ) == 0 )
{
for ( DWORD i = currentIndex + 1;
( i < dwNumServices ) && ( bResult == FALSE );
i++ )
{
if ( _wcsicmp( pessRoot[i].lpServiceName, L"w3ssl" ) == 0 )
{
bResult = TRUE;
}
}
}
return bResult;
}