return 0;\r
}\r
\r
-static inline int await_service_control_response(unsigned long control, SC_HANDLE service_handle, SERVICE_STATUS *service_status, unsigned long initial_status) {\r
+static inline int await_service_control_response(unsigned long control, SC_HANDLE service_handle, SERVICE_STATUS *service_status, unsigned long initial_status, unsigned long cutoff) {\r
int tries = 0;\r
unsigned long checkpoint = 0;\r
unsigned long waithint = 0;\r
+ unsigned long waited = 0;\r
while (QueryServiceStatus(service_handle, service_status)) {\r
int response = service_control_response(control, service_status->dwCurrentState);\r
/* Alas we can't WaitForSingleObject() on an SC_HANDLE. */\r
checkpoint = service_status->dwCheckPoint;\r
waithint = service_status->dwWaitHint;\r
if (++tries > 10) tries = 10;\r
- Sleep(50 * tries);\r
+ unsigned long wait = 50 * tries;\r
+ if (cutoff) {\r
+ if (waited > cutoff) return response;\r
+ waited += wait;\r
+ }\r
+ Sleep(wait);\r
}\r
else return response;\r
}\r
return -1;\r
}\r
\r
+static inline int await_service_control_response(unsigned long control, SC_HANDLE service_handle, SERVICE_STATUS *service_status, unsigned long initial_status) {\r
+ return await_service_control_response(control, service_handle, service_status, initial_status, 0);\r
+}\r
+\r
static inline void wait_for_hooks(nssm_service_t *service, bool notify) {\r
SERVICE_STATUS_HANDLE status_handle;\r
SERVICE_STATUS *status;\r
TCHAR *username = 0;\r
TCHAR *canon = 0;\r
TCHAR *password = 0;\r
+ boolean virtual_account = false;\r
if (service->usernamelen) {\r
username = service->username;\r
- if (canonicalise_username(username, &canon)) return 5;\r
- if (service->passwordlen) password = service->password;\r
+ if (is_virtual_account(service->name, username)) {\r
+ virtual_account = true;\r
+ canon = (TCHAR *) HeapAlloc(GetProcessHeap(), 0, (service->usernamelen + 1) * sizeof(TCHAR));\r
+ if (! canon) {\r
+ print_message(stderr, NSSM_MESSAGE_OUT_OF_MEMORY, _T("canon"), _T("edit_service()"));\r
+ return 5;\r
+ }\r
+ memmove(canon, username, (service->usernamelen + 1) * sizeof(TCHAR));\r
+ }\r
+ else {\r
+ if (canonicalise_username(username, &canon)) return 5;\r
+ if (service->passwordlen) password = service->password;\r
+ }\r
}\r
else if (editing) username = canon = NSSM_LOCALSYSTEM_ACCOUNT;\r
\r
- if (well_known_username(canon)) password = _T("");\r
- else {\r
- if (grant_logon_as_service(canon)) {\r
- if (canon != username) HeapFree(GetProcessHeap(), 0, canon);\r
- print_message(stderr, NSSM_MESSAGE_GRANT_LOGON_AS_SERVICE_FAILED, username);\r
- return 5;\r
+ if (! virtual_account) {\r
+ if (well_known_username(canon)) password = _T("");\r
+ else {\r
+ if (grant_logon_as_service(canon)) {\r
+ if (canon != username) HeapFree(GetProcessHeap(), 0, canon);\r
+ print_message(stderr, NSSM_MESSAGE_GRANT_LOGON_AS_SERVICE_FAILED, username);\r
+ return 5;\r
+ }\r
}\r
}\r
\r
}\r
\r
if (ret) {\r
- int response = await_service_control_response(control, service_handle, &service_status, initial_status);\r
+ unsigned long cutoff = 0;\r
+\r
+ /* If we manage the service, respect the throttle time. */\r
+ HKEY key = open_registry(service_name, 0, KEY_READ, false);\r
+ if (key) {\r
+ if (get_number(key, NSSM_REG_THROTTLE, &cutoff, false) != 1) cutoff = NSSM_RESET_THROTTLE_RESTART;\r
+ RegCloseKey(key);\r
+ }\r
+\r
+ int response = await_service_control_response(control, service_handle, &service_status, initial_status, cutoff);\r
CloseServiceHandle(service_handle);\r
\r
if (response) {\r
nssm_service_t *service = alloc_nssm_service();\r
if (! service) return;\r
\r
+ static volatile bool await_debugger = (argc > 1 && str_equiv(argv[1], _T("debug")));\r
+ while (await_debugger) Sleep(1000);\r
+\r
if (_sntprintf_s(service->name, _countof(service->name), _TRUNCATE, _T("%s"), argv[0]) < 0) {\r
log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OUT_OF_MEMORY, _T("service->name"), _T("service_main()"), 0);\r
return;\r
service->exit_count++;\r
(void) nssm_hook(&hook_threads, service, NSSM_HOOK_EVENT_EXIT, NSSM_HOOK_ACTION_POST, NULL, NSSM_HOOK_DEADLINE, true);\r
\r
+ /* Exit logging threads. */\r
+ cleanup_loggers(service);\r
+\r
/*\r
The why argument is true if our wait timed out or false otherwise.\r
Our wait is infinite so why will never be true when called by the system.\r
log_event(EVENTLOG_INFORMATION_TYPE, NSSM_EVENT_EXIT_UNCLEAN, service->name, code, exit_action_strings[action], 0);\r
stop_service(service, exitcode, false, default_action);\r
wait_for_hooks(service, false);\r
- free_imports();\r
- exit(exitcode);\r
+ nssm_exit(exitcode);\r
}\r
}\r
\r
return ret;\r
}\r
\r
-int list_nssm_services() {\r
+int list_nssm_services(int argc, TCHAR **argv) {\r
+ bool including_native = (argc > 0 && str_equiv(argv[0], _T("all")));\r
+\r
/* Open service manager. */\r
SC_HANDLE services = open_service_manager(SC_MANAGER_CONNECT | SC_MANAGER_ENUMERATE_SERVICE);\r
if (! services) {\r
\r
get_parameters(service, 0);\r
/* We manage the service if we have an Application. */\r
- if (service->exe[0]) _tprintf(_T("%s\n"), service->name);\r
+ if (including_native || service->exe[0]) _tprintf(_T("%s\n"), service->name);\r
\r
cleanup_nssm_service(service);\r
}\r
HeapFree(GetProcessHeap(), 0, status);\r
return 0;\r
}\r
+\r
+int service_process_tree(int argc, TCHAR **argv) {\r
+ int errors = 0;\r
+ if (argc < 1) return usage(1);\r
+\r
+ SC_HANDLE services = open_service_manager(SC_MANAGER_CONNECT);\r
+ if (! services) {\r
+ print_message(stderr, NSSM_MESSAGE_OPEN_SERVICE_MANAGER_FAILED);\r
+ return 1;\r
+ }\r
+\r
+ /*\r
+ We need SeDebugPrivilege to read the process tree.\r
+ We ignore failure here so that an error will be printed later when we\r
+ try to open a process handle.\r
+ */\r
+ HANDLE token = get_debug_token();\r
+\r
+ TCHAR canonical_name[SERVICE_NAME_LENGTH];\r
+ SERVICE_STATUS_PROCESS service_status;\r
+ nssm_service_t *service;\r
+ kill_t k;\r
+\r
+ int i;\r
+ for (i = 0; i < argc; i++) {\r
+ TCHAR *service_name = argv[i];\r
+ SC_HANDLE service_handle = open_service(services, service_name, SERVICE_QUERY_STATUS, canonical_name, _countof(canonical_name));\r
+ if (! service_handle) {\r
+ errors++;\r
+ continue;\r
+ }\r
+\r
+ unsigned long size;\r
+ int ret = QueryServiceStatusEx(service_handle, SC_STATUS_PROCESS_INFO, (LPBYTE) &service_status, sizeof(service_status), &size);\r
+ long error = GetLastError();\r
+ CloseServiceHandle(service_handle);\r
+ if (! ret) {\r
+ _ftprintf(stderr, _T("%s: %s\n"), canonical_name, error_string(error));\r
+ errors++;\r
+ continue;\r
+ }\r
+\r
+ ZeroMemory(&k, sizeof(k));\r
+ k.pid = service_status.dwProcessId;\r
+ if (! k.pid) continue;\r
+\r
+ k.process_handle = OpenProcess(PROCESS_QUERY_INFORMATION | PROCESS_VM_READ, false, k.pid);\r
+ if (! k.process_handle) {\r
+ _ftprintf(stderr, _T("%s: %lu: %s\n"), canonical_name, k.pid, error_string(GetLastError()));\r
+ continue;\r
+ }\r
+\r
+ if (get_process_creation_time(k.process_handle, &k.creation_time)) continue;\r
+ /* Dummy exit time so we can check processes' parents. */\r
+ GetSystemTimeAsFileTime(&k.exit_time);\r
+\r
+ service = alloc_nssm_service();\r
+ if (! service) {\r
+ errors++;\r
+ continue;\r
+ }\r
+\r
+ _sntprintf_s(service->name, _countof(service->name), _TRUNCATE, _T("%s"), canonical_name);\r
+ k.name = service->name;\r
+ walk_process_tree(service, print_process, &k, k.pid);\r
+\r
+ cleanup_nssm_service(service);\r
+ }\r
+\r
+ CloseServiceHandle(services);\r
+ if (token != INVALID_HANDLE_VALUE) CloseHandle(token);\r
+\r
+ return errors;\r
+}\r