winecfg: Update Japanese translation.
[wine] / programs / services / rpc.c
1 /*
2  * Services.exe - RPC functions
3  *
4  * Copyright 2007 Google (Mikolaj Zalewski)
5  *
6  * This library is free software; you can redistribute it and/or
7  * modify it under the terms of the GNU Lesser General Public
8  * License as published by the Free Software Foundation; either
9  * version 2.1 of the License, or (at your option) any later version.
10  *
11  * This library is distributed in the hope that it will be useful,
12  * but WITHOUT ANY WARRANTY; without even the implied warranty of
13  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
14  * Lesser General Public License for more details.
15  *
16  * You should have received a copy of the GNU Lesser General Public
17  * License along with this library; if not, write to the Free Software
18  * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
19  */
20
21 #define WIN32_LEAN_AND_MEAN
22
23 #include <stdarg.h>
24 #include <windows.h>
25 #include <winternl.h>
26 #include <winsvc.h>
27 #include <ntsecapi.h>
28 #include <rpc.h>
29
30 #include "wine/list.h"
31 #include "wine/unicode.h"
32 #include "wine/debug.h"
33
34 #include "services.h"
35 #include "svcctl.h"
36
37 extern HANDLE CDECL __wine_make_process_system(void);
38
39 WINE_DEFAULT_DEBUG_CHANNEL(service);
40
41 static const GENERIC_MAPPING g_scm_generic =
42 {
43     (STANDARD_RIGHTS_READ | SC_MANAGER_ENUMERATE_SERVICE | SC_MANAGER_QUERY_LOCK_STATUS),
44     (STANDARD_RIGHTS_WRITE | SC_MANAGER_CREATE_SERVICE | SC_MANAGER_MODIFY_BOOT_CONFIG),
45     (STANDARD_RIGHTS_EXECUTE | SC_MANAGER_CONNECT | SC_MANAGER_LOCK),
46     SC_MANAGER_ALL_ACCESS
47 };
48
49 static const GENERIC_MAPPING g_svc_generic =
50 {
51     (STANDARD_RIGHTS_READ | SERVICE_QUERY_CONFIG | SERVICE_QUERY_STATUS | SERVICE_INTERROGATE | SERVICE_ENUMERATE_DEPENDENTS),
52     (STANDARD_RIGHTS_WRITE | SERVICE_CHANGE_CONFIG),
53     (STANDARD_RIGHTS_EXECUTE | SERVICE_START | SERVICE_STOP | SERVICE_PAUSE_CONTINUE | SERVICE_USER_DEFINED_CONTROL),
54     SERVICE_ALL_ACCESS
55 };
56
57 typedef enum
58 {
59     SC_HTYPE_DONT_CARE = 0,
60     SC_HTYPE_MANAGER,
61     SC_HTYPE_SERVICE
62 } SC_HANDLE_TYPE;
63
64 struct sc_handle
65 {
66     SC_HANDLE_TYPE type;
67     DWORD access;
68 };
69
70 struct sc_manager_handle       /* service control manager handle */
71 {
72     struct sc_handle hdr;
73     struct scmdatabase *db;
74 };
75
76 struct sc_service_handle       /* service handle */
77 {
78     struct sc_handle hdr;
79     struct service_entry *service_entry;
80 };
81
82 struct sc_lock
83 {
84     struct scmdatabase *db;
85 };
86
87 static void free_service_strings(struct service_entry *old, struct service_entry *new)
88 {
89     QUERY_SERVICE_CONFIGW *old_cfg = &old->config;
90     QUERY_SERVICE_CONFIGW *new_cfg = &new->config;
91
92     if (old_cfg->lpBinaryPathName != new_cfg->lpBinaryPathName)
93         HeapFree(GetProcessHeap(), 0, old_cfg->lpBinaryPathName);
94
95     if (old_cfg->lpLoadOrderGroup != new_cfg->lpLoadOrderGroup)
96         HeapFree(GetProcessHeap(), 0, old_cfg->lpLoadOrderGroup);
97
98     if (old_cfg->lpServiceStartName != new_cfg->lpServiceStartName)
99         HeapFree(GetProcessHeap(), 0, old_cfg->lpServiceStartName);
100
101     if (old_cfg->lpDisplayName != new_cfg->lpDisplayName)
102         HeapFree(GetProcessHeap(), 0, old_cfg->lpDisplayName);
103
104     if (old->dependOnServices != new->dependOnServices)
105         HeapFree(GetProcessHeap(), 0, old->dependOnServices);
106
107     if (old->dependOnGroups != new->dependOnGroups)
108         HeapFree(GetProcessHeap(), 0, old->dependOnGroups);
109 }
110
111 /* Check if the given handle is of the required type and allows the requested access. */
112 static DWORD validate_context_handle(SC_RPC_HANDLE handle, DWORD type, DWORD needed_access, struct sc_handle **out_hdr)
113 {
114     struct sc_handle *hdr = handle;
115
116     if (type != SC_HTYPE_DONT_CARE && hdr->type != type)
117     {
118         WINE_ERR("Handle is of an invalid type (%d, %d)\n", hdr->type, type);
119         return ERROR_INVALID_HANDLE;
120     }
121
122     if ((needed_access & hdr->access) != needed_access)
123     {
124         WINE_ERR("Access denied - handle created with access %x, needed %x\n", hdr->access, needed_access);
125         return ERROR_ACCESS_DENIED;
126     }
127
128     *out_hdr = hdr;
129     return ERROR_SUCCESS;
130 }
131
132 static DWORD validate_scm_handle(SC_RPC_HANDLE handle, DWORD needed_access, struct sc_manager_handle **manager)
133 {
134     struct sc_handle *hdr;
135     DWORD err = validate_context_handle(handle, SC_HTYPE_MANAGER, needed_access, &hdr);
136     if (err == ERROR_SUCCESS)
137         *manager = (struct sc_manager_handle *)hdr;
138     return err;
139 }
140
141 static DWORD validate_service_handle(SC_RPC_HANDLE handle, DWORD needed_access, struct sc_service_handle **service)
142 {
143     struct sc_handle *hdr;
144     DWORD err = validate_context_handle(handle, SC_HTYPE_SERVICE, needed_access, &hdr);
145     if (err == ERROR_SUCCESS)
146         *service = (struct sc_service_handle *)hdr;
147     return err;
148 }
149
150 DWORD svcctl_OpenSCManagerW(
151     MACHINE_HANDLEW MachineName, /* Note: this parameter is ignored */
152     LPCWSTR DatabaseName,
153     DWORD dwAccessMask,
154     SC_RPC_HANDLE *handle)
155 {
156     struct sc_manager_handle *manager;
157
158     WINE_TRACE("(%s, %s, %x)\n", wine_dbgstr_w(MachineName), wine_dbgstr_w(DatabaseName), dwAccessMask);
159
160     if (DatabaseName != NULL && DatabaseName[0])
161     {
162         if (strcmpW(DatabaseName, SERVICES_FAILED_DATABASEW) == 0)
163             return ERROR_DATABASE_DOES_NOT_EXIST;
164         if (strcmpW(DatabaseName, SERVICES_ACTIVE_DATABASEW) != 0)
165             return ERROR_INVALID_NAME;
166     }
167
168     if (!(manager = HeapAlloc(GetProcessHeap(), 0, sizeof(*manager))))
169         return ERROR_NOT_ENOUGH_SERVER_MEMORY;
170
171     manager->hdr.type = SC_HTYPE_MANAGER;
172
173     if (dwAccessMask & MAXIMUM_ALLOWED)
174         dwAccessMask |= SC_MANAGER_ALL_ACCESS;
175     manager->hdr.access = dwAccessMask;
176     RtlMapGenericMask(&manager->hdr.access, &g_scm_generic);
177     manager->db = active_database;
178     *handle = &manager->hdr;
179
180     return ERROR_SUCCESS;
181 }
182
183 static void SC_RPC_HANDLE_destroy(SC_RPC_HANDLE handle)
184 {
185     struct sc_handle *hdr = handle;
186     switch (hdr->type)
187     {
188         case SC_HTYPE_MANAGER:
189         {
190             struct sc_manager_handle *manager = (struct sc_manager_handle *)hdr;
191             HeapFree(GetProcessHeap(), 0, manager);
192             break;
193         }
194         case SC_HTYPE_SERVICE:
195         {
196             struct sc_service_handle *service = (struct sc_service_handle *)hdr;
197             release_service(service->service_entry);
198             HeapFree(GetProcessHeap(), 0, service);
199             break;
200         }
201         default:
202             WINE_ERR("invalid handle type %d\n", hdr->type);
203             RpcRaiseException(ERROR_INVALID_HANDLE);
204     }
205 }
206
207 DWORD svcctl_GetServiceDisplayNameW(
208     SC_RPC_HANDLE hSCManager,
209     LPCWSTR lpServiceName,
210     WCHAR *lpBuffer,
211     DWORD *cchBufSize)
212 {
213     struct sc_manager_handle *manager;
214     struct service_entry *entry;
215     DWORD err;
216
217     WINE_TRACE("(%s, %d)\n", wine_dbgstr_w(lpServiceName), *cchBufSize);
218
219     if ((err = validate_scm_handle(hSCManager, 0, &manager)) != ERROR_SUCCESS)
220         return err;
221
222     scmdatabase_lock_shared(manager->db);
223
224     entry = scmdatabase_find_service(manager->db, lpServiceName);
225     if (entry != NULL)
226     {
227         LPCWSTR name;
228         int len;
229         service_lock_shared(entry);
230         name = get_display_name(entry);
231         len = strlenW(name);
232         if (len <= *cchBufSize)
233         {
234             err = ERROR_SUCCESS;
235             memcpy(lpBuffer, name, (len + 1)*sizeof(*name));
236         }
237         else
238             err = ERROR_INSUFFICIENT_BUFFER;
239         *cchBufSize = len;
240         service_unlock(entry);
241     }
242     else
243         err = ERROR_SERVICE_DOES_NOT_EXIST;
244
245     scmdatabase_unlock(manager->db);
246
247     if (err != ERROR_SUCCESS)
248         lpBuffer[0] = 0;
249
250     return err;
251 }
252
253 DWORD svcctl_GetServiceKeyNameW(
254     SC_RPC_HANDLE hSCManager,
255     LPCWSTR lpServiceDisplayName,
256     WCHAR *lpBuffer,
257     DWORD *cchBufSize)
258 {
259     struct service_entry *entry;
260     struct sc_manager_handle *manager;
261     DWORD err;
262
263     WINE_TRACE("(%s, %d)\n", wine_dbgstr_w(lpServiceDisplayName), *cchBufSize);
264
265     if ((err = validate_scm_handle(hSCManager, 0, &manager)) != ERROR_SUCCESS)
266         return err;
267
268     scmdatabase_lock_shared(manager->db);
269
270     entry = scmdatabase_find_service_by_displayname(manager->db, lpServiceDisplayName);
271     if (entry != NULL)
272     {
273         int len;
274         service_lock_shared(entry);
275         len = strlenW(entry->name);
276         if (len <= *cchBufSize)
277         {
278             err = ERROR_SUCCESS;
279             memcpy(lpBuffer, entry->name, (len + 1)*sizeof(*entry->name));
280         }
281         else
282             err = ERROR_INSUFFICIENT_BUFFER;
283         *cchBufSize = len;
284         service_unlock(entry);
285     }
286     else
287         err = ERROR_SERVICE_DOES_NOT_EXIST;
288
289     scmdatabase_unlock(manager->db);
290
291     if (err != ERROR_SUCCESS)
292         lpBuffer[0] = 0;
293
294     return err;
295 }
296
297 static DWORD create_handle_for_service(struct service_entry *entry, DWORD dwDesiredAccess, SC_RPC_HANDLE *phService)
298 {
299     struct sc_service_handle *service;
300
301     if (!(service = HeapAlloc(GetProcessHeap(), 0, sizeof(*service))))
302     {
303         release_service(entry);
304         return ERROR_NOT_ENOUGH_SERVER_MEMORY;
305     }
306
307     service->hdr.type = SC_HTYPE_SERVICE;
308     service->hdr.access = dwDesiredAccess;
309     RtlMapGenericMask(&service->hdr.access, &g_svc_generic);
310     service->service_entry = entry;
311     if (dwDesiredAccess & MAXIMUM_ALLOWED)
312         dwDesiredAccess |= SERVICE_ALL_ACCESS;
313
314     *phService = &service->hdr;
315     return ERROR_SUCCESS;
316 }
317
318 DWORD svcctl_OpenServiceW(
319     SC_RPC_HANDLE hSCManager,
320     LPCWSTR lpServiceName,
321     DWORD dwDesiredAccess,
322     SC_RPC_HANDLE *phService)
323 {
324     struct sc_manager_handle *manager;
325     struct service_entry *entry;
326     DWORD err;
327
328     WINE_TRACE("(%s, 0x%x)\n", wine_dbgstr_w(lpServiceName), dwDesiredAccess);
329
330     if ((err = validate_scm_handle(hSCManager, 0, &manager)) != ERROR_SUCCESS)
331         return err;
332     if (!validate_service_name(lpServiceName))
333         return ERROR_INVALID_NAME;
334
335     scmdatabase_lock_shared(manager->db);
336     entry = scmdatabase_find_service(manager->db, lpServiceName);
337     if (entry != NULL)
338         InterlockedIncrement(&entry->ref_count);
339     scmdatabase_unlock(manager->db);
340
341     if (entry == NULL)
342         return ERROR_SERVICE_DOES_NOT_EXIST;
343
344     return create_handle_for_service(entry, dwDesiredAccess, phService);
345 }
346
347 static DWORD parse_dependencies(const WCHAR *dependencies, struct service_entry *entry)
348 {
349     WCHAR *services = NULL, *groups, *s;
350     DWORD len, len_services = 0, len_groups = 0;
351     const WCHAR *ptr = dependencies;
352
353     if (!dependencies || !dependencies[0])
354     {
355         entry->dependOnServices = NULL;
356         entry->dependOnGroups = NULL;
357         return ERROR_SUCCESS;
358     }
359
360     while (*ptr)
361     {
362         len = strlenW(ptr) + 1;
363         if (ptr[0] == '+' && ptr[1])
364             len_groups += len - 1;
365         else
366             len_services += len;
367         ptr += len;
368     }
369     if (!len_services) entry->dependOnServices = NULL;
370     else
371     {
372         services = HeapAlloc(GetProcessHeap(), 0, (len_services + 1) * sizeof(WCHAR));
373         if (!services)
374             return ERROR_OUTOFMEMORY;
375
376         s = services;
377         ptr = dependencies;
378         while (*ptr)
379         {
380             len = strlenW(ptr) + 1;
381             if (*ptr != '+')
382             {
383                 strcpyW(s, ptr);
384                 s += len;
385             }
386             ptr += len;
387         }
388         *s = 0;
389         entry->dependOnServices = services;
390     }
391     if (!len_groups) entry->dependOnGroups = NULL;
392     else
393     {
394         groups = HeapAlloc(GetProcessHeap(), 0, (len_groups + 1) * sizeof(WCHAR));
395         if (!groups)
396         {
397             HeapFree(GetProcessHeap(), 0, services);
398             return ERROR_OUTOFMEMORY;
399         }
400         s = groups;
401         ptr = dependencies;
402         while (*ptr)
403         {
404             len = strlenW(ptr) + 1;
405             if (ptr[0] == '+' && ptr[1])
406             {
407                 strcpyW(s, ptr + 1);
408                 s += len - 1;
409             }
410             ptr += len;
411         }
412         *s = 0;
413         entry->dependOnGroups = groups;
414     }
415
416     return ERROR_SUCCESS;
417 }
418
419 DWORD svcctl_CreateServiceW(
420     SC_RPC_HANDLE hSCManager,
421     LPCWSTR lpServiceName,
422     LPCWSTR lpDisplayName,
423     DWORD dwDesiredAccess,
424     DWORD dwServiceType,
425     DWORD dwStartType,
426     DWORD dwErrorControl,
427     LPCWSTR lpBinaryPathName,
428     LPCWSTR lpLoadOrderGroup,
429     DWORD *lpdwTagId,
430     const BYTE *lpDependencies,
431     DWORD dwDependenciesSize,
432     LPCWSTR lpServiceStartName,
433     const BYTE *lpPassword,
434     DWORD dwPasswordSize,
435     SC_RPC_HANDLE *phService)
436 {
437     struct sc_manager_handle *manager;
438     struct service_entry *entry;
439     DWORD err;
440
441     WINE_TRACE("(%s, %s, 0x%x, %s)\n", wine_dbgstr_w(lpServiceName), wine_dbgstr_w(lpDisplayName), dwDesiredAccess, wine_dbgstr_w(lpBinaryPathName));
442
443     if ((err = validate_scm_handle(hSCManager, SC_MANAGER_CREATE_SERVICE, &manager)) != ERROR_SUCCESS)
444         return err;
445
446     if (!validate_service_name(lpServiceName))
447         return ERROR_INVALID_NAME;
448     if (!check_multisz((LPCWSTR)lpDependencies, dwDependenciesSize) || !lpServiceName[0] || !lpBinaryPathName[0])
449         return ERROR_INVALID_PARAMETER;
450
451     if (lpPassword)
452         WINE_FIXME("Don't know how to add a password\n");   /* I always get ERROR_GEN_FAILURE */
453
454     err = service_create(lpServiceName, &entry);
455     if (err != ERROR_SUCCESS)
456         return err;
457
458     err = parse_dependencies((LPCWSTR)lpDependencies, entry);
459     if (err != ERROR_SUCCESS)
460         return err;
461
462     entry->ref_count = 1;
463     entry->config.dwServiceType = entry->status.dwServiceType = dwServiceType;
464     entry->config.dwStartType = dwStartType;
465     entry->config.dwErrorControl = dwErrorControl;
466     entry->config.lpBinaryPathName = strdupW(lpBinaryPathName);
467     entry->config.lpLoadOrderGroup = strdupW(lpLoadOrderGroup);
468     entry->config.lpServiceStartName = strdupW(lpServiceStartName);
469     entry->config.lpDisplayName = strdupW(lpDisplayName);
470
471     if (lpdwTagId)      /* TODO: In most situations a non-NULL TagId will generate an ERROR_INVALID_PARAMETER. */
472         entry->config.dwTagId = *lpdwTagId;
473     else
474         entry->config.dwTagId = 0;
475
476     /* other fields NULL*/
477
478     if (!validate_service_config(entry))
479     {
480         WINE_ERR("Invalid data while trying to create service\n");
481         free_service_entry(entry);
482         return ERROR_INVALID_PARAMETER;
483     }
484
485     scmdatabase_lock_exclusive(manager->db);
486
487     if (scmdatabase_find_service(manager->db, lpServiceName))
488     {
489         scmdatabase_unlock(manager->db);
490         free_service_entry(entry);
491         return ERROR_SERVICE_EXISTS;
492     }
493
494     if (scmdatabase_find_service_by_displayname(manager->db, get_display_name(entry)))
495     {
496         scmdatabase_unlock(manager->db);
497         free_service_entry(entry);
498         return ERROR_DUPLICATE_SERVICE_NAME;
499     }
500
501     err = scmdatabase_add_service(manager->db, entry);
502     if (err != ERROR_SUCCESS)
503     {
504         scmdatabase_unlock(manager->db);
505         free_service_entry(entry);
506         return err;
507     }
508     scmdatabase_unlock(manager->db);
509
510     return create_handle_for_service(entry, dwDesiredAccess, phService);
511 }
512
513 DWORD svcctl_DeleteService(
514     SC_RPC_HANDLE hService)
515 {
516     struct sc_service_handle *service;
517     DWORD err;
518
519     if ((err = validate_service_handle(hService, DELETE, &service)) != ERROR_SUCCESS)
520         return err;
521
522     scmdatabase_lock_exclusive(service->service_entry->db);
523     service_lock_exclusive(service->service_entry);
524
525     if (!is_marked_for_delete(service->service_entry))
526         err = scmdatabase_remove_service(service->service_entry->db, service->service_entry);
527     else
528         err = ERROR_SERVICE_MARKED_FOR_DELETE;
529
530     service_unlock(service->service_entry);
531     scmdatabase_unlock(service->service_entry->db);
532
533     return err;
534 }
535
536 DWORD svcctl_QueryServiceConfigW(
537         SC_RPC_HANDLE hService,
538         QUERY_SERVICE_CONFIGW *config)
539 {
540     struct sc_service_handle *service;
541     DWORD err;
542
543     WINE_TRACE("(%p)\n", config);
544
545     if ((err = validate_service_handle(hService, SERVICE_QUERY_CONFIG, &service)) != 0)
546         return err;
547
548     service_lock_shared(service->service_entry);
549     config->dwServiceType = service->service_entry->config.dwServiceType;
550     config->dwStartType = service->service_entry->config.dwStartType;
551     config->dwErrorControl = service->service_entry->config.dwErrorControl;
552     config->lpBinaryPathName = strdupW(service->service_entry->config.lpBinaryPathName);
553     config->lpLoadOrderGroup = strdupW(service->service_entry->config.lpLoadOrderGroup);
554     config->dwTagId = service->service_entry->config.dwTagId;
555     config->lpDependencies = NULL; /* TODO */
556     config->lpServiceStartName = strdupW(service->service_entry->config.lpServiceStartName);
557     config->lpDisplayName = strdupW(service->service_entry->config.lpDisplayName);
558     service_unlock(service->service_entry);
559
560     return ERROR_SUCCESS;
561 }
562
563 DWORD svcctl_ChangeServiceConfigW(
564         SC_RPC_HANDLE hService,
565         DWORD dwServiceType,
566         DWORD dwStartType,
567         DWORD dwErrorControl,
568         LPCWSTR lpBinaryPathName,
569         LPCWSTR lpLoadOrderGroup,
570         DWORD *lpdwTagId,
571         const BYTE *lpDependencies,
572         DWORD dwDependenciesSize,
573         LPCWSTR lpServiceStartName,
574         const BYTE *lpPassword,
575         DWORD dwPasswordSize,
576         LPCWSTR lpDisplayName)
577 {
578     struct service_entry new_entry, *entry;
579     struct sc_service_handle *service;
580     DWORD err;
581
582     WINE_TRACE("\n");
583
584     if ((err = validate_service_handle(hService, SERVICE_CHANGE_CONFIG, &service)) != 0)
585         return err;
586
587     if (!check_multisz((LPCWSTR)lpDependencies, dwDependenciesSize))
588         return ERROR_INVALID_PARAMETER;
589
590     /* first check if the new configuration is correct */
591     service_lock_exclusive(service->service_entry);
592
593     if (is_marked_for_delete(service->service_entry))
594     {
595         service_unlock(service->service_entry);
596         return ERROR_SERVICE_MARKED_FOR_DELETE;
597     }
598
599     if (lpDisplayName != NULL &&
600         (entry = scmdatabase_find_service_by_displayname(service->service_entry->db, lpDisplayName)) &&
601         (entry != service->service_entry))
602     {
603         service_unlock(service->service_entry);
604         return ERROR_DUPLICATE_SERVICE_NAME;
605     }
606
607     new_entry = *service->service_entry;
608
609     if (dwServiceType != SERVICE_NO_CHANGE)
610         new_entry.config.dwServiceType = dwServiceType;
611
612     if (dwStartType != SERVICE_NO_CHANGE)
613         new_entry.config.dwStartType = dwStartType;
614
615     if (dwErrorControl != SERVICE_NO_CHANGE)
616         new_entry.config.dwErrorControl = dwErrorControl;
617
618     if (lpBinaryPathName != NULL)
619         new_entry.config.lpBinaryPathName = (LPWSTR)lpBinaryPathName;
620
621     if (lpLoadOrderGroup != NULL)
622         new_entry.config.lpLoadOrderGroup = (LPWSTR)lpLoadOrderGroup;
623
624     if (lpdwTagId != NULL)
625         WINE_FIXME("Changing tag id not supported\n");
626
627     if (lpServiceStartName != NULL)
628         new_entry.config.lpServiceStartName = (LPWSTR)lpServiceStartName;
629
630     if (lpPassword != NULL)
631         WINE_FIXME("Setting password not supported\n");
632
633     if (lpDisplayName != NULL)
634         new_entry.config.lpDisplayName = (LPWSTR)lpDisplayName;
635
636     err = parse_dependencies((LPCWSTR)lpDependencies, &new_entry);
637     if (err != ERROR_SUCCESS)
638     {
639         service_unlock(service->service_entry);
640         return err;
641     }
642
643     if (!validate_service_config(&new_entry))
644     {
645         WINE_ERR("The configuration after the change wouldn't be valid\n");
646         service_unlock(service->service_entry);
647         return ERROR_INVALID_PARAMETER;
648     }
649
650     /* configuration OK. The strings needs to be duplicated */
651     if (lpBinaryPathName != NULL)
652         new_entry.config.lpBinaryPathName = strdupW(lpBinaryPathName);
653
654     if (lpLoadOrderGroup != NULL)
655         new_entry.config.lpLoadOrderGroup = strdupW(lpLoadOrderGroup);
656
657     if (lpServiceStartName != NULL)
658         new_entry.config.lpServiceStartName = strdupW(lpServiceStartName);
659
660     if (lpDisplayName != NULL)
661         new_entry.config.lpDisplayName = strdupW(lpDisplayName);
662
663     /* try to save to Registry, commit or rollback depending on success */
664     err = save_service_config(&new_entry);
665     if (ERROR_SUCCESS == err)
666     {
667         free_service_strings(service->service_entry, &new_entry);
668         *service->service_entry = new_entry;
669     }
670     else free_service_strings(&new_entry, service->service_entry);
671     service_unlock(service->service_entry);
672
673     return err;
674 }
675
676 DWORD svcctl_SetServiceStatus(
677     SC_RPC_HANDLE hServiceStatus,
678     LPSERVICE_STATUS lpServiceStatus)
679 {
680     struct sc_service_handle *service;
681     DWORD err;
682
683     WINE_TRACE("(%p, %p)\n", hServiceStatus, lpServiceStatus);
684
685     if ((err = validate_service_handle(hServiceStatus, SERVICE_SET_STATUS, &service)) != 0)
686         return err;
687
688     service_lock_exclusive(service->service_entry);
689     /* FIXME: be a bit more discriminant about what parts of the status we set
690      * and check that fields are valid */
691     service->service_entry->status.dwServiceType = lpServiceStatus->dwServiceType;
692     service->service_entry->status.dwCurrentState = lpServiceStatus->dwCurrentState;
693     service->service_entry->status.dwControlsAccepted = lpServiceStatus->dwControlsAccepted;
694     service->service_entry->status.dwWin32ExitCode = lpServiceStatus->dwWin32ExitCode;
695     service->service_entry->status.dwServiceSpecificExitCode = lpServiceStatus->dwServiceSpecificExitCode;
696     service->service_entry->status.dwCheckPoint = lpServiceStatus->dwCheckPoint;
697     service->service_entry->status.dwWaitHint = lpServiceStatus->dwWaitHint;
698     service_unlock(service->service_entry);
699
700     if (service->service_entry->status_changed_event)
701         SetEvent(service->service_entry->status_changed_event);
702
703     return ERROR_SUCCESS;
704 }
705
706 DWORD svcctl_ChangeServiceConfig2W( SC_RPC_HANDLE hService, DWORD level, SERVICE_CONFIG2W *config )
707 {
708     struct sc_service_handle *service;
709     DWORD err;
710
711     if ((err = validate_service_handle(hService, SERVICE_CHANGE_CONFIG, &service)) != 0)
712         return err;
713
714     switch (level)
715     {
716     case SERVICE_CONFIG_DESCRIPTION:
717         {
718             WCHAR *descr = NULL;
719
720             if (config->descr.lpDescription[0])
721             {
722                 if (!(descr = strdupW( config->descr.lpDescription )))
723                     return ERROR_NOT_ENOUGH_MEMORY;
724             }
725
726             WINE_TRACE( "changing service %p descr to %s\n", service, wine_dbgstr_w(descr) );
727             service_lock_exclusive( service->service_entry );
728             HeapFree( GetProcessHeap(), 0, service->service_entry->description );
729             service->service_entry->description = descr;
730             save_service_config( service->service_entry );
731             service_unlock( service->service_entry );
732         }
733         break;
734     case SERVICE_CONFIG_FAILURE_ACTIONS:
735         WINE_FIXME( "SERVICE_CONFIG_FAILURE_ACTIONS not implemented: period %u msg %s cmd %s\n",
736                     config->actions.dwResetPeriod,
737                     wine_dbgstr_w(config->actions.lpRebootMsg),
738                     wine_dbgstr_w(config->actions.lpCommand) );
739         break;
740     default:
741         WINE_FIXME("level %u not implemented\n", level);
742         err = ERROR_INVALID_LEVEL;
743         break;
744     }
745     return err;
746 }
747
748 DWORD svcctl_QueryServiceConfig2W( SC_RPC_HANDLE hService, DWORD level,
749                                    BYTE *buffer, DWORD size, LPDWORD needed )
750 {
751     struct sc_service_handle *service;
752     DWORD err;
753
754     memset(buffer, 0, size);
755
756     if ((err = validate_service_handle(hService, SERVICE_QUERY_STATUS, &service)) != 0)
757         return err;
758
759     switch (level)
760     {
761     case SERVICE_CONFIG_DESCRIPTION:
762         {
763             SERVICE_DESCRIPTIONW *descr = (SERVICE_DESCRIPTIONW *)buffer;
764
765             service_lock_shared(service->service_entry);
766             *needed = sizeof(*descr);
767             if (service->service_entry->description)
768                 *needed += (strlenW(service->service_entry->description) + 1) * sizeof(WCHAR);
769             if (size >= *needed)
770             {
771                 if (service->service_entry->description)
772                 {
773                     /* store a buffer offset instead of a pointer */
774                     descr->lpDescription = (WCHAR *)((BYTE *)(descr + 1) - buffer);
775                     strcpyW( (WCHAR *)(descr + 1), service->service_entry->description );
776                 }
777                 else descr->lpDescription = NULL;
778             }
779             else err = ERROR_INSUFFICIENT_BUFFER;
780             service_unlock(service->service_entry);
781         }
782         break;
783
784     default:
785         WINE_FIXME("level %u not implemented\n", level);
786         err = ERROR_INVALID_LEVEL;
787         break;
788     }
789     return err;
790 }
791
792 DWORD svcctl_QueryServiceStatusEx(
793     SC_RPC_HANDLE hService,
794     SC_STATUS_TYPE InfoLevel,
795     BYTE *lpBuffer,
796     DWORD cbBufSize,
797     LPDWORD pcbBytesNeeded)
798 {
799     struct sc_service_handle *service;
800     DWORD err;
801     LPSERVICE_STATUS_PROCESS pSvcStatusData;
802
803     memset(lpBuffer, 0, cbBufSize);
804
805     if ((err = validate_service_handle(hService, SERVICE_QUERY_STATUS, &service)) != 0)
806         return err;
807
808     if (InfoLevel != SC_STATUS_PROCESS_INFO)
809         return ERROR_INVALID_LEVEL;
810
811     pSvcStatusData = (LPSERVICE_STATUS_PROCESS) lpBuffer;
812     if (pSvcStatusData == NULL)
813         return ERROR_INVALID_PARAMETER;
814
815     if (cbBufSize < sizeof(SERVICE_STATUS_PROCESS))
816     {
817         if( pcbBytesNeeded != NULL)
818             *pcbBytesNeeded = sizeof(SERVICE_STATUS_PROCESS);
819
820         return ERROR_INSUFFICIENT_BUFFER;
821     }
822
823     service_lock_shared(service->service_entry);
824
825     pSvcStatusData->dwServiceType = service->service_entry->status.dwServiceType;
826     pSvcStatusData->dwCurrentState = service->service_entry->status.dwCurrentState;
827     pSvcStatusData->dwControlsAccepted = service->service_entry->status.dwControlsAccepted;
828     pSvcStatusData->dwWin32ExitCode = service->service_entry->status.dwWin32ExitCode;
829     pSvcStatusData->dwServiceSpecificExitCode = service->service_entry->status.dwServiceSpecificExitCode;
830     pSvcStatusData->dwCheckPoint = service->service_entry->status.dwCheckPoint;
831     pSvcStatusData->dwWaitHint = service->service_entry->status.dwWaitHint;
832     pSvcStatusData->dwProcessId = service->service_entry->status.dwProcessId;
833     pSvcStatusData->dwServiceFlags = service->service_entry->status.dwServiceFlags;
834
835     service_unlock(service->service_entry);
836
837     return ERROR_SUCCESS;
838 }
839
840 /******************************************************************************
841  * service_accepts_control
842  */
843 static BOOL service_accepts_control(const struct service_entry *service, DWORD dwControl)
844 {
845     DWORD a = service->status.dwControlsAccepted;
846
847     switch (dwControl)
848     {
849     case SERVICE_CONTROL_INTERROGATE:
850         return TRUE;
851     case SERVICE_CONTROL_STOP:
852         if (a&SERVICE_ACCEPT_STOP)
853             return TRUE;
854         break;
855     case SERVICE_CONTROL_SHUTDOWN:
856         if (a&SERVICE_ACCEPT_SHUTDOWN)
857             return TRUE;
858         break;
859     case SERVICE_CONTROL_PAUSE:
860     case SERVICE_CONTROL_CONTINUE:
861         if (a&SERVICE_ACCEPT_PAUSE_CONTINUE)
862             return TRUE;
863         break;
864     case SERVICE_CONTROL_PARAMCHANGE:
865         if (a&SERVICE_ACCEPT_PARAMCHANGE)
866             return TRUE;
867         break;
868     case SERVICE_CONTROL_NETBINDADD:
869     case SERVICE_CONTROL_NETBINDREMOVE:
870     case SERVICE_CONTROL_NETBINDENABLE:
871     case SERVICE_CONTROL_NETBINDDISABLE:
872         if (a&SERVICE_ACCEPT_NETBINDCHANGE)
873             return TRUE;
874     case SERVICE_CONTROL_HARDWAREPROFILECHANGE:
875         if (a&SERVICE_ACCEPT_HARDWAREPROFILECHANGE)
876             return TRUE;
877         break;
878     case SERVICE_CONTROL_POWEREVENT:
879         if (a&SERVICE_ACCEPT_POWEREVENT)
880             return TRUE;
881         break;
882     case SERVICE_CONTROL_SESSIONCHANGE:
883         if (a&SERVICE_ACCEPT_SESSIONCHANGE)
884             return TRUE;
885         break;
886     }
887     return FALSE;
888 }
889
890 /******************************************************************************
891  * service_send_command
892  */
893 BOOL service_send_command( struct service_entry *service, HANDLE pipe,
894                            const void *data, DWORD size, DWORD *result )
895 {
896     OVERLAPPED overlapped;
897     DWORD count;
898     BOOL r;
899
900     overlapped.hEvent = service->overlapped_event;
901     r = WriteFile(pipe, data, size, &count, &overlapped);
902     if (!r && GetLastError() == ERROR_IO_PENDING)
903     {
904         WaitForSingleObject( service->overlapped_event, service_pipe_timeout );
905         r = GetOverlappedResult( pipe, &overlapped, &count, FALSE );
906     }
907     if (!r || count != size)
908     {
909         WINE_ERR("service protocol error - failed to write pipe!\n");
910         return FALSE;
911     }
912     r = ReadFile(pipe, result, sizeof *result, &count, &overlapped);
913     if (!r && GetLastError() == ERROR_IO_PENDING)
914     {
915         WaitForSingleObject( service->overlapped_event, service_pipe_timeout );
916         r = GetOverlappedResult( pipe, &overlapped, &count, FALSE );
917     }
918     if (!r || count != sizeof *result)
919     {
920         WINE_ERR("service protocol error - failed to read pipe "
921             "r = %d  count = %d!\n", r, count);
922         return FALSE;
923     }
924     return r;
925 }
926
927 /******************************************************************************
928  * service_send_control
929  */
930 static BOOL service_send_control(struct service_entry *service, HANDLE pipe, DWORD dwControl, DWORD *result)
931 {
932     service_start_info *ssi;
933     DWORD len;
934     BOOL r;
935
936     /* calculate how much space we need to send the startup info */
937     len = strlenW(service->name) + 1;
938
939     ssi = HeapAlloc(GetProcessHeap(),0,FIELD_OFFSET(service_start_info, data[len]));
940     ssi->cmd = WINESERV_SENDCONTROL;
941     ssi->control = dwControl;
942     ssi->total_size = FIELD_OFFSET(service_start_info, data[len]);
943     ssi->name_size = strlenW(service->name) + 1;
944     strcpyW( ssi->data, service->name );
945
946     r = service_send_command( service, pipe, ssi, ssi->total_size, result );
947     HeapFree( GetProcessHeap(), 0, ssi );
948     return r;
949 }
950
951 DWORD svcctl_StartServiceW(
952     SC_RPC_HANDLE hService,
953     DWORD dwNumServiceArgs,
954     LPCWSTR *lpServiceArgVectors)
955 {
956     struct sc_service_handle *service;
957     DWORD err;
958
959     WINE_TRACE("(%p, %d, %p)\n", hService, dwNumServiceArgs, lpServiceArgVectors);
960
961     if ((err = validate_service_handle(hService, SERVICE_START, &service)) != 0)
962         return err;
963
964     err = service_start(service->service_entry, dwNumServiceArgs, lpServiceArgVectors);
965
966     return err;
967 }
968
969 DWORD svcctl_ControlService(
970     SC_RPC_HANDLE hService,
971     DWORD dwControl,
972     SERVICE_STATUS *lpServiceStatus)
973 {
974     DWORD access_required;
975     struct sc_service_handle *service;
976     DWORD err;
977     BOOL ret;
978     HANDLE control_mutex;
979     HANDLE control_pipe;
980
981     WINE_TRACE("(%p, %d, %p)\n", hService, dwControl, lpServiceStatus);
982
983     switch (dwControl)
984     {
985     case SERVICE_CONTROL_CONTINUE:
986     case SERVICE_CONTROL_NETBINDADD:
987     case SERVICE_CONTROL_NETBINDDISABLE:
988     case SERVICE_CONTROL_NETBINDENABLE:
989     case SERVICE_CONTROL_NETBINDREMOVE:
990     case SERVICE_CONTROL_PARAMCHANGE:
991     case SERVICE_CONTROL_PAUSE:
992         access_required = SERVICE_PAUSE_CONTINUE;
993         break;
994     case SERVICE_CONTROL_INTERROGATE:
995         access_required = SERVICE_INTERROGATE;
996         break;
997     case SERVICE_CONTROL_STOP:
998         access_required = SERVICE_STOP;
999         break;
1000     default:
1001         if (dwControl >= 128 && dwControl <= 255)
1002             access_required = SERVICE_USER_DEFINED_CONTROL;
1003         else
1004             return ERROR_INVALID_PARAMETER;
1005     }
1006
1007     if ((err = validate_service_handle(hService, access_required, &service)) != 0)
1008         return err;
1009
1010     service_lock_exclusive(service->service_entry);
1011
1012     if (lpServiceStatus)
1013     {
1014         lpServiceStatus->dwServiceType = service->service_entry->status.dwServiceType;
1015         lpServiceStatus->dwCurrentState = service->service_entry->status.dwCurrentState;
1016         lpServiceStatus->dwControlsAccepted = service->service_entry->status.dwControlsAccepted;
1017         lpServiceStatus->dwWin32ExitCode = service->service_entry->status.dwWin32ExitCode;
1018         lpServiceStatus->dwServiceSpecificExitCode = service->service_entry->status.dwServiceSpecificExitCode;
1019         lpServiceStatus->dwCheckPoint = service->service_entry->status.dwCheckPoint;
1020         lpServiceStatus->dwWaitHint = service->service_entry->status.dwWaitHint;
1021     }
1022
1023     if (!service_accepts_control(service->service_entry, dwControl))
1024     {
1025         service_unlock(service->service_entry);
1026         return ERROR_INVALID_SERVICE_CONTROL;
1027     }
1028
1029     switch (service->service_entry->status.dwCurrentState)
1030     {
1031     case SERVICE_STOPPED:
1032         service_unlock(service->service_entry);
1033         return ERROR_SERVICE_NOT_ACTIVE;
1034     case SERVICE_START_PENDING:
1035         if (dwControl==SERVICE_CONTROL_STOP)
1036             break;
1037         /* fall thru */
1038     case SERVICE_STOP_PENDING:
1039         service_unlock(service->service_entry);
1040         return ERROR_SERVICE_CANNOT_ACCEPT_CTRL;
1041     }
1042
1043     /* prevent races by caching these variables and clearing them on
1044      * stop here instead of outside the services lock */
1045     control_mutex = service->service_entry->control_mutex;
1046     control_pipe = service->service_entry->control_pipe;
1047     if (dwControl == SERVICE_CONTROL_STOP)
1048     {
1049         service->service_entry->control_mutex = NULL;
1050         service->service_entry->control_pipe = INVALID_HANDLE_VALUE;
1051     }
1052
1053     service_unlock(service->service_entry);
1054
1055     ret = WaitForSingleObject(control_mutex, 30000);
1056     if (ret == WAIT_OBJECT_0)
1057     {
1058         DWORD result = ERROR_SUCCESS;
1059
1060         ret = service_send_control(service->service_entry, control_pipe, dwControl, &result);
1061
1062         if (dwControl == SERVICE_CONTROL_STOP)
1063         {
1064             CloseHandle(control_mutex);
1065             CloseHandle(control_pipe);
1066         }
1067         else
1068             ReleaseMutex(control_mutex);
1069
1070         return result;
1071     }
1072     else
1073     {
1074         if (dwControl == SERVICE_CONTROL_STOP)
1075         {
1076             CloseHandle(control_mutex);
1077             CloseHandle(control_pipe);
1078         }
1079         return ERROR_SERVICE_REQUEST_TIMEOUT;
1080     }
1081 }
1082
1083 DWORD svcctl_CloseServiceHandle(
1084     SC_RPC_HANDLE *handle)
1085 {
1086     WINE_TRACE("(&%p)\n", *handle);
1087
1088     SC_RPC_HANDLE_destroy(*handle);
1089     *handle = NULL;
1090
1091     return ERROR_SUCCESS;
1092 }
1093
1094 static void SC_RPC_LOCK_destroy(SC_RPC_LOCK hLock)
1095 {
1096     struct sc_lock *lock = hLock;
1097     scmdatabase_unlock_startup(lock->db);
1098     HeapFree(GetProcessHeap(), 0, lock);
1099 }
1100
1101 void __RPC_USER SC_RPC_LOCK_rundown(SC_RPC_LOCK hLock)
1102 {
1103     SC_RPC_LOCK_destroy(hLock);
1104 }
1105
1106 DWORD svcctl_LockServiceDatabase(
1107     SC_RPC_HANDLE hSCManager,
1108     SC_RPC_LOCK *phLock)
1109 {
1110     struct sc_manager_handle *manager;
1111     struct sc_lock *lock;
1112     DWORD err;
1113
1114     WINE_TRACE("(%p, %p)\n", hSCManager, phLock);
1115
1116     if ((err = validate_scm_handle(hSCManager, SC_MANAGER_LOCK, &manager)) != ERROR_SUCCESS)
1117         return err;
1118
1119     err = scmdatabase_lock_startup(manager->db);
1120     if (err != ERROR_SUCCESS)
1121         return err;
1122
1123     lock = HeapAlloc(GetProcessHeap(), 0, sizeof(struct sc_lock));
1124     if (!lock)
1125     {
1126         scmdatabase_unlock_startup(manager->db);
1127         return ERROR_NOT_ENOUGH_SERVER_MEMORY;
1128     }
1129
1130     lock->db = manager->db;
1131     *phLock = lock;
1132
1133     return ERROR_SUCCESS;
1134 }
1135
1136 DWORD svcctl_UnlockServiceDatabase(
1137     SC_RPC_LOCK *phLock)
1138 {
1139     WINE_TRACE("(&%p)\n", *phLock);
1140
1141     SC_RPC_LOCK_destroy(*phLock);
1142     *phLock = NULL;
1143
1144     return ERROR_SUCCESS;
1145 }
1146
1147 static BOOL map_state(DWORD state, DWORD mask)
1148 {
1149     switch (state)
1150     {
1151     case SERVICE_START_PENDING:
1152     case SERVICE_STOP_PENDING:
1153     case SERVICE_RUNNING:
1154     case SERVICE_CONTINUE_PENDING:
1155     case SERVICE_PAUSE_PENDING:
1156     case SERVICE_PAUSED:
1157         if (SERVICE_ACTIVE & mask) return TRUE;
1158         break;
1159     case SERVICE_STOPPED:
1160         if (SERVICE_INACTIVE & mask) return TRUE;
1161         break;
1162     default:
1163         WINE_ERR("unknown state %u\n", state);
1164         break;
1165     }
1166     return FALSE;
1167 }
1168
1169 DWORD svcctl_EnumServicesStatusW(
1170     SC_RPC_HANDLE hmngr,
1171     DWORD type,
1172     DWORD state,
1173     BYTE *buffer,
1174     DWORD size,
1175     LPDWORD needed,
1176     LPDWORD returned)
1177 {
1178     DWORD err, sz, total_size, num_services;
1179     DWORD_PTR offset;
1180     struct sc_manager_handle *manager;
1181     struct service_entry *service;
1182     ENUM_SERVICE_STATUSW *s;
1183
1184     WINE_TRACE("(%p, 0x%x, 0x%x, %p, %u, %p, %p)\n", hmngr, type, state, buffer, size, needed, returned);
1185
1186     if (!type || !state)
1187         return ERROR_INVALID_PARAMETER;
1188
1189     if ((err = validate_scm_handle(hmngr, SC_MANAGER_ENUMERATE_SERVICE, &manager)) != ERROR_SUCCESS)
1190         return err;
1191
1192     scmdatabase_lock_exclusive(manager->db);
1193
1194     total_size = num_services = 0;
1195     LIST_FOR_EACH_ENTRY(service, &manager->db->services, struct service_entry, entry)
1196     {
1197         if ((service->status.dwServiceType & type) && map_state(service->status.dwCurrentState, state))
1198         {
1199             total_size += sizeof(ENUM_SERVICE_STATUSW);
1200             total_size += (strlenW(service->name) + 1) * sizeof(WCHAR);
1201             if (service->config.lpDisplayName)
1202             {
1203                 total_size += (strlenW(service->config.lpDisplayName) + 1) * sizeof(WCHAR);
1204             }
1205             num_services++;
1206         }
1207     }
1208     *returned = 0;
1209     *needed = total_size;
1210     if (total_size > size)
1211     {
1212         scmdatabase_unlock(manager->db);
1213         return ERROR_MORE_DATA;
1214     }
1215     s = (ENUM_SERVICE_STATUSW *)buffer;
1216     offset = num_services * sizeof(ENUM_SERVICE_STATUSW);
1217     LIST_FOR_EACH_ENTRY(service, &manager->db->services, struct service_entry, entry)
1218     {
1219         if ((service->status.dwServiceType & type) && map_state(service->status.dwCurrentState, state))
1220         {
1221             sz = (strlenW(service->name) + 1) * sizeof(WCHAR);
1222             memcpy(buffer + offset, service->name, sz);
1223             s->lpServiceName = (WCHAR *)offset; /* store a buffer offset instead of a pointer */
1224             offset += sz;
1225
1226             if (!service->config.lpDisplayName) s->lpDisplayName = NULL;
1227             else
1228             {
1229                 sz = (strlenW(service->config.lpDisplayName) + 1) * sizeof(WCHAR);
1230                 memcpy(buffer + offset, service->config.lpDisplayName, sz);
1231                 s->lpDisplayName = (WCHAR *)offset;
1232                 offset += sz;
1233             }
1234             memcpy(&s->ServiceStatus, &service->status, sizeof(SERVICE_STATUS));
1235             s++;
1236         }
1237     }
1238     *returned = num_services;
1239     *needed = 0;
1240     scmdatabase_unlock(manager->db);
1241     return ERROR_SUCCESS;
1242 }
1243
1244 static struct service_entry *find_service_by_group(struct scmdatabase *db, const WCHAR *group)
1245 {
1246     struct service_entry *service;
1247     LIST_FOR_EACH_ENTRY(service, &db->services, struct service_entry, entry)
1248     {
1249         if (service->config.lpLoadOrderGroup && !strcmpiW(group, service->config.lpLoadOrderGroup))
1250             return service;
1251     }
1252     return NULL;
1253 }
1254
1255 static BOOL match_group(const WCHAR *g1, const WCHAR *g2)
1256 {
1257     if (!g2) return TRUE;
1258     if (!g2[0] && (!g1 || !g1[0])) return TRUE;
1259     if (g1 && !strcmpW(g1, g2)) return TRUE;
1260     return FALSE;
1261 }
1262
1263 DWORD svcctl_EnumServicesStatusExW(
1264     SC_RPC_HANDLE hmngr,
1265     DWORD type,
1266     DWORD state,
1267     BYTE *buffer,
1268     DWORD size,
1269     LPDWORD needed,
1270     LPDWORD returned,
1271     LPCWSTR group)
1272 {
1273     DWORD err, sz, total_size, num_services;
1274     DWORD_PTR offset;
1275     struct sc_manager_handle *manager;
1276     struct service_entry *service;
1277     ENUM_SERVICE_STATUS_PROCESSW *s;
1278
1279     WINE_TRACE("(%p, 0x%x, 0x%x, %p, %u, %p, %p, %s)\n", hmngr, type, state, buffer, size,
1280                needed, returned, wine_dbgstr_w(group));
1281
1282     if (!type || !state)
1283         return ERROR_INVALID_PARAMETER;
1284
1285     if ((err = validate_scm_handle(hmngr, SC_MANAGER_ENUMERATE_SERVICE, &manager)) != ERROR_SUCCESS)
1286         return err;
1287
1288     scmdatabase_lock_exclusive(manager->db);
1289
1290     if (group && !find_service_by_group(manager->db, group))
1291     {
1292         scmdatabase_unlock(manager->db);
1293         return ERROR_SERVICE_DOES_NOT_EXIST;
1294     }
1295
1296     total_size = num_services = 0;
1297     LIST_FOR_EACH_ENTRY(service, &manager->db->services, struct service_entry, entry)
1298     {
1299         if ((service->status.dwServiceType & type) && map_state(service->status.dwCurrentState, state)
1300             && match_group(service->config.lpLoadOrderGroup, group))
1301         {
1302             total_size += sizeof(ENUM_SERVICE_STATUS_PROCESSW);
1303             total_size += (strlenW(service->name) + 1) * sizeof(WCHAR);
1304             if (service->config.lpDisplayName)
1305             {
1306                 total_size += (strlenW(service->config.lpDisplayName) + 1) * sizeof(WCHAR);
1307             }
1308             num_services++;
1309         }
1310     }
1311     *returned = 0;
1312     *needed = total_size;
1313     if (total_size > size)
1314     {
1315         scmdatabase_unlock(manager->db);
1316         return ERROR_MORE_DATA;
1317     }
1318     s = (ENUM_SERVICE_STATUS_PROCESSW *)buffer;
1319     offset = num_services * sizeof(ENUM_SERVICE_STATUS_PROCESSW);
1320     LIST_FOR_EACH_ENTRY(service, &manager->db->services, struct service_entry, entry)
1321     {
1322         if ((service->status.dwServiceType & type) && map_state(service->status.dwCurrentState, state)
1323             && match_group(service->config.lpLoadOrderGroup, group))
1324         {
1325             sz = (strlenW(service->name) + 1) * sizeof(WCHAR);
1326             memcpy(buffer + offset, service->name, sz);
1327             s->lpServiceName = (WCHAR *)offset; /* store a buffer offset instead of a pointer */
1328             offset += sz;
1329
1330             if (!service->config.lpDisplayName) s->lpDisplayName = NULL;
1331             else
1332             {
1333                 sz = (strlenW(service->config.lpDisplayName) + 1) * sizeof(WCHAR);
1334                 memcpy(buffer + offset, service->config.lpDisplayName, sz);
1335                 s->lpDisplayName = (WCHAR *)offset;
1336                 offset += sz;
1337             }
1338             s->ServiceStatusProcess = service->status;
1339             s++;
1340         }
1341     }
1342     *returned = num_services;
1343     *needed = 0;
1344     scmdatabase_unlock(manager->db);
1345     return ERROR_SUCCESS;
1346 }
1347
1348 DWORD svcctl_QueryServiceObjectSecurity(
1349     void)
1350 {
1351     WINE_FIXME("\n");
1352     return ERROR_CALL_NOT_IMPLEMENTED;
1353 }
1354
1355 DWORD svcctl_SetServiceObjectSecurity(
1356     void)
1357 {
1358     WINE_FIXME("\n");
1359     return ERROR_CALL_NOT_IMPLEMENTED;
1360 }
1361
1362 DWORD svcctl_QueryServiceStatus(
1363     void)
1364 {
1365     WINE_FIXME("\n");
1366     return ERROR_CALL_NOT_IMPLEMENTED;
1367 }
1368
1369
1370 DWORD svcctl_NotifyBootConfigStatus(
1371     void)
1372 {
1373     WINE_FIXME("\n");
1374     return ERROR_CALL_NOT_IMPLEMENTED;
1375 }
1376
1377 DWORD svcctl_SCSetServiceBitsW(
1378     void)
1379 {
1380     WINE_FIXME("\n");
1381     return ERROR_CALL_NOT_IMPLEMENTED;
1382 }
1383
1384
1385 DWORD svcctl_EnumDependentServicesW(
1386     void)
1387 {
1388     WINE_FIXME("\n");
1389     return ERROR_CALL_NOT_IMPLEMENTED;
1390 }
1391
1392 DWORD svcctl_QueryServiceLockStatusW(
1393     void)
1394 {
1395     WINE_FIXME("\n");
1396     return ERROR_CALL_NOT_IMPLEMENTED;
1397 }
1398
1399 DWORD svcctl_SCSetServiceBitsA(
1400     void)
1401 {
1402     WINE_FIXME("\n");
1403     return ERROR_CALL_NOT_IMPLEMENTED;
1404 }
1405
1406 DWORD svcctl_ChangeServiceConfigA(
1407     void)
1408 {
1409     WINE_FIXME("\n");
1410     return ERROR_CALL_NOT_IMPLEMENTED;
1411 }
1412
1413 DWORD svcctl_CreateServiceA(
1414     void)
1415 {
1416     WINE_FIXME("\n");
1417     return ERROR_CALL_NOT_IMPLEMENTED;
1418 }
1419
1420 DWORD svcctl_EnumDependentServicesA(
1421     void)
1422 {
1423     WINE_FIXME("\n");
1424     return ERROR_CALL_NOT_IMPLEMENTED;
1425 }
1426
1427 DWORD svcctl_EnumServicesStatusA(
1428     void)
1429 {
1430     WINE_FIXME("\n");
1431     return ERROR_CALL_NOT_IMPLEMENTED;
1432 }
1433
1434 DWORD svcctl_OpenSCManagerA(
1435     void)
1436 {
1437     WINE_FIXME("\n");
1438     return ERROR_CALL_NOT_IMPLEMENTED;
1439 }
1440
1441 DWORD svcctl_OpenServiceA(
1442     void)
1443 {
1444     WINE_FIXME("\n");
1445     return ERROR_CALL_NOT_IMPLEMENTED;
1446 }
1447
1448 DWORD svcctl_QueryServiceConfigA(
1449     void)
1450 {
1451     WINE_FIXME("\n");
1452     return ERROR_CALL_NOT_IMPLEMENTED;
1453 }
1454
1455 DWORD svcctl_QueryServiceLockStatusA(
1456     void)
1457 {
1458     WINE_FIXME("\n");
1459     return ERROR_CALL_NOT_IMPLEMENTED;
1460 }
1461
1462 DWORD svcctl_StartServiceA(
1463     void)
1464 {
1465     WINE_FIXME("\n");
1466     return ERROR_CALL_NOT_IMPLEMENTED;
1467 }
1468
1469 DWORD svcctl_GetServiceDisplayNameA(
1470     void)
1471 {
1472     WINE_FIXME("\n");
1473     return ERROR_CALL_NOT_IMPLEMENTED;
1474 }
1475
1476 DWORD svcctl_GetServiceKeyNameA(
1477     void)
1478 {
1479     WINE_FIXME("\n");
1480     return ERROR_CALL_NOT_IMPLEMENTED;
1481 }
1482
1483 DWORD svcctl_GetCurrentGroupStateW(
1484     void)
1485 {
1486     WINE_FIXME("\n");
1487     return ERROR_CALL_NOT_IMPLEMENTED;
1488 }
1489
1490 DWORD svcctl_EnumServiceGroupW(
1491     void)
1492 {
1493     WINE_FIXME("\n");
1494     return ERROR_CALL_NOT_IMPLEMENTED;
1495 }
1496
1497 DWORD svcctl_ChangeServiceConfig2A(
1498     void)
1499 {
1500     WINE_FIXME("\n");
1501     return ERROR_CALL_NOT_IMPLEMENTED;
1502 }
1503
1504 DWORD svcctl_QueryServiceConfig2A(
1505     void)
1506 {
1507     WINE_FIXME("\n");
1508     return ERROR_CALL_NOT_IMPLEMENTED;
1509 }
1510
1511
1512 DWORD RPC_Init(void)
1513 {
1514     WCHAR transport[] = SVCCTL_TRANSPORT;
1515     WCHAR endpoint[] = SVCCTL_ENDPOINT;
1516     DWORD err;
1517
1518     if ((err = RpcServerUseProtseqEpW(transport, 0, endpoint, NULL)) != ERROR_SUCCESS)
1519     {
1520         WINE_ERR("RpcServerUseProtseq failed with error %u\n", err);
1521         return err;
1522     }
1523
1524     if ((err = RpcServerRegisterIf(svcctl_v2_0_s_ifspec, 0, 0)) != ERROR_SUCCESS)
1525     {
1526         WINE_ERR("RpcServerRegisterIf failed with error %u\n", err);
1527         return err;
1528     }
1529
1530     if ((err = RpcServerListen(1, RPC_C_LISTEN_MAX_CALLS_DEFAULT, TRUE)) != ERROR_SUCCESS)
1531     {
1532         WINE_ERR("RpcServerListen failed with error %u\n", err);
1533         return err;
1534     }
1535     return ERROR_SUCCESS;
1536 }
1537
1538 DWORD RPC_MainLoop(void)
1539 {
1540     DWORD err;
1541     HANDLE hExitEvent = __wine_make_process_system();
1542
1543     SetEvent(g_hStartedEvent);
1544
1545     WINE_TRACE("Entered main loop\n");
1546
1547     do
1548     {
1549         err = WaitForSingleObjectEx(hExitEvent, INFINITE, TRUE);
1550         WINE_TRACE("Wait returned %d\n", err);
1551     } while (err != WAIT_OBJECT_0);
1552
1553     WINE_TRACE("Object signaled - wine shutdown\n");
1554     CloseHandle(hExitEvent);
1555     return ERROR_SUCCESS;
1556 }
1557
1558 void __RPC_USER SC_RPC_HANDLE_rundown(SC_RPC_HANDLE handle)
1559 {
1560     SC_RPC_HANDLE_destroy(handle);
1561 }
1562
1563 void  __RPC_FAR * __RPC_USER MIDL_user_allocate(SIZE_T len)
1564 {
1565     return HeapAlloc(GetProcessHeap(), 0, len);
1566 }
1567
1568 void __RPC_USER MIDL_user_free(void __RPC_FAR * ptr)
1569 {
1570     HeapFree(GetProcessHeap(), 0, ptr);
1571 }