Blob Blame History Raw
/*********************************************************/
/*  toksvc: a framework-native token broker service      */
/*  Copyright (C) 2020  SysDeer Technologies, LLC        */
/*  Released under GPLv2 and GPLv3; see COPYING.TOKSVC.  */
/*********************************************************/

#include <psxtypes/psxtypes.h>
#include <ntapi/ntapi.h>
#include <ntapi/nt_atomic.h>

#include <toksvc/toksvc.h>
#include "toksvc_daemon_impl.h"
#include "toksvc_driver_impl.h"

static int32_t toks_daemon_init_impl(
	struct toks_daemon_ctx *    dctx,
	const nt_guid *             svcguid,
	void *                      htty)
{
	int32_t				status;
	nt_daemon_params		dparams;
	wchar16_t *			port_name;
	nt_port_name_keys *		port_name_keys;
	void *				hsvclink;
	nt_sd_common_buffer		sd;

	/* daemon attributes */
	dctx->daemon_attr.type    = NT_PORT_TYPE_DAEMON;
	dctx->daemon_attr.subtype = NT_PORT_SUBTYPE_DEFAULT;

	/* port guid */
	ntapi->tt_guid_copy(
		&dctx->daemon_attr.guid,
		&(nt_guid)TOKS_PORT_GUID_DAEMON);

	/* port keys */
	if ((status = ntapi->tt_port_generate_keys(&dctx->daemon_attr.keys)))
		return status;

	/* port name */
	ntapi->tt_port_name_from_attr(
		&dctx->daemon_name,
		&dctx->daemon_attr);

	/* daemon sd */
	ntapi->acl_init_common_descriptor(
		&sd,0,0,0,0,
		NT_PORT_ALL_ACCESS | NT_SEC_STANDARD_RIGHTS_ALL,
		NT_PORT_CONNECT | NT_SEC_READ_CONTROL,
		NT_PORT_CONNECT | NT_SEC_READ_CONTROL,
		NT_PORT_ALL_ACCESS | NT_SEC_STANDARD_RIGHTS_ALL,
		NT_PORT_ALL_ACCESS | NT_SEC_STANDARD_RIGHTS_ALL,
		0);

	ntapi->tt_aligned_block_memlock(
		&sd,sizeof(sd));

	/* dparams */
	ntapi->tt_aligned_block_memset(
		&dparams,0,sizeof(dparams));

	port_name      = (wchar16_t *)&dctx->daemon_name;
	port_name_keys = (nt_port_name_keys *)&dctx->daemon_name.port_name_keys;

	dparams.port_keys	= &dctx->daemon_keys;
	dparams.port_name	= port_name;
	dparams.port_name_keys	= port_name_keys;
	dparams.port_sd		= &sd.sd;

	dparams.port_msg_size	= sizeof(nt_tty_port_msg);
	dparams.flags		= NT_DSR_INIT_DEFAULT;

	dparams.daemon_once_routine	= 0;
	dparams.daemon_loop_routine	= toks_daemon_loop;
	dparams.daemon_loop_context	= dctx;

	dparams.pport_daemon		= &dctx->hport_daemon;
	dparams.pport_internal_client	= &dctx->hport_internal_client;

	dparams.pevent_daemon_ready		= &dctx->hevent_daemon_ready;
	dparams.pevent_internal_client_ready	= &dctx->hevent_internal_client_ready;

	dparams.stack_size_commit		= 64 * 1024;
	dparams.stack_size_reserve		= 64 * 1024;

	if ((status = ntapi->dsr_init(&dparams)))
		return status;

	if ((status = ntapi->tt_create_dev_object_directory_entry(
			&hsvclink,
			NT_SYMBOLIC_LINK_ALL_ACCESS,
			toks_get_driver_hsvcdir(dctx->driver_ctx),
			dparams.hport_daemon,0,
			svcguid)))
		return status;

	toks_set_driver_hsvclink(
		dctx->driver_ctx,
		hsvclink);

	return (htty == 0)
		? NT_STATUS_SUCCESS
		: ntapi->tty_request_peer(
			htty,
			TOKS_DAEMON_TTYSIGNAL,
			0,&(nt_guid)TTY_PTS_GUID,
			&dctx->daemon_attr);
}

static int32_t toks_daemon_once = 0;

int32_t __stdcall toks_daemon_init(struct toks_daemon_ctx * dctx, const nt_guid * svcguid)
{
	int32_t			status;
	nt_timeout		timeout;
	nt_runtime_data *	rtdata;
	nt_filetime		pcnt;
	nt_guid			cliguid;
	uint32_t *		data;

	/* rtdata */
	if ((status = ntapi->tt_get_runtime_data(&rtdata,0)))
		return status;

	/* arbitrary client uuid */
	if (!svcguid) {
		toks_query_performance_counters(dctx->driver_ctx,&pcnt);

		svcguid = &cliguid;
		data    = &cliguid.data1;

		data[0] = ntapi->tt_buffer_crc32(
			(uint32_t)(uintptr_t)&cliguid,
			&pcnt,sizeof(pcnt));

		data[1] = ntapi->tt_buffer_crc32(
			(uint32_t)(uintptr_t)rtdata,
			rtdata,sizeof(*rtdata));

		data[2] = ntapi->tt_buffer_crc32(
			data[1],dctx,sizeof(*dctx));

		data[3] = ntapi->tt_buffer_crc32(
			data[2],dctx->driver_ctx,
			sizeof(*dctx->driver_ctx));
	}

	/* once */
	switch (at_locked_cas_32(&toks_daemon_once,0,1)) {
		case 0:
			if ((status = toks_daemon_init_impl(dctx,svcguid,rtdata->hsession))) {
				at_locked_add_32(&toks_daemon_once,2);
				return status;
			}

			at_locked_inc_32(&toks_daemon_once);
			return 0;

		case 1:
			timeout.quad = -10;

			for (; (at_locked_cas_32(&toks_daemon_once,0,1) == 1); )
				ntapi->zw_delay_execution(
					NT_SYNC_ALERTABLE,
					&timeout);

			return (toks_daemon_once == 2)
				? 0 : -1;

		case 2:
			return 0;

		case 3:
		default:
			return -1;
	}
}