windows-nt/Source/XPSP1/NT/net/tcpip/services/tftp/tftpd.c
2020-09-26 16:20:57 +08:00

1690 lines
40 KiB
C

/*++
Copyright (c) 1992-1996 Microsoft Corporation
Module Name:
tftpd.c
Author:
Sam Patton (sampa) 08-Apr-1992
History:
MohsinA, 02-Dec-96. - Winsock2 asynchronous version with
synchronisation events, graceful termination,
event logging, debugging info.
Credits: Anirudh Sahni - Info on SC.
AdamBa, 11-Jun-97 - add security
--*/
#include "tftpd.h"
char USAGE[] =
" ======================================================================== \n"
"Abstract: \n"
" This implements an RFC 783 tftp daemon. \n"
" It listens on port 69 for requests \n"
" and spawns a thread to process each request. \n"
" \n"
"TFTPD USAGE and Installation: \n"
" \n"
" md d:/tftpd (the StartDirectory). \n"
" copy //MohsinA_p90/test/tftpd.exe . \n"
" sc create tftpd binPath= d:/tftpd/tftpd.exe (give full path). \n"
" sc query tftpd (check if installed). \n"
" \n"
"Start: \n"
" sc start tftpd -f (creates a log file). \n"
"or sc start tftpd \n"
"or net start tftpd \n"
"or sc start tftpd [-dStartDirectory] [-e] [-f] \n"
" Options: -e use event log. \n"
" -f log to file. \n"
" -dStartDirectory \n"
"Info: \n"
" sc interrogate tftpd (logs will be updated). \n"
" sc query tftpd Check whether running. \n"
"Stop: \n"
" sc stop tftpd \n"
" net stop tftpd \n"
" \n"
"Variables that control what files can be read/written and by whom: \n"
" StartDirectory - only files there will be accessible. \n"
" LogFile is created here. \n"
" ValidClients - Clients matching this ip address can read files. \n"
" eg. you can set it to \"157.55.8?.*\" \n"
" ValidMasters - clients matching this can write and read files. \n"
" eg. you can set it to \"\" and no one can write. \n"
" ValidReadFiles - only matching files will be served out, eg. \"r*.t?t\"\n"
" ValidWriteFiles- only matching files will be accepted, eg. \"w*.txt\" \n"
" \n"
"Client: \n"
" tftp [-i] servername {get|put} src_file dest_file \n"
" -i from binary mode, else ascii mode is used. \n"
" \n"
" ======================================================================== \n"
;
#define NUM_INITIAL_THREADS 1
#define MAX_THREAD_COUNT 25
#define RCV_WAIT_INTERVAL_MSEC 5
#define RECEIVE_HEAP_THREASHOLD1 10
#define RECEIVE_HEAP_THREASHOLD2 3
#define RECEIVE_NUM_FREE 2
#define MAX_SOCKET_INIT_ATTEMPT 10
#define LOOPBACK 0x100007f
#define SE_SOCKET_REOPEN 0x1
#define MAX_LOCK_TRIES 125
SERVICE_STATUS TftpdServiceStatus;
SERVICE_STATUS_HANDLE TftpdServiceStatusHandle;
char TftpdServiceName[] = TEXT("Tftpd");
HANDLE MasterThreadHandle;
DWORD MasterThreadId;
WSADATA WsaData;
FILE * LogFile = NULL;
BOOL LoggingEvent = FALSE;
BOOL LoggingFile = FALSE;
HANDLE eMasterTerminate = NULL; // Event to stop main thread.
HANDLE eSock = NULL; // Event to start WSARecvFrom
DWORD TotalThreadCount=0; // total worker threads
DWORD AvailableThreads=0; // number of idle worker threads
TFTP_GLOBALS Globals;
HANDLE MasterSocketEvent; // set when data available on TFTPD socket
HANDLE MasterSocketWait; // handle to RtlRegisterWait for above event
LIST_ENTRY ReceiveList;
CRITICAL_SECTION ReceiveLock;
LIST_ENTRY SocketList;
CRITICAL_SECTION SocketLock;
HANDLE ReceiveHeap=0;
HANDLE ReaperWait;
DWORD ReceiveHeapSize=0;
DWORD ActiveReceive=0;
OVERLAPPED AddrChangeOverlapped;
HANDLE AddrChangeEvent=NULL;
HANDLE AddrChangeWaitHandle=NULL;
HANDLE AddrChangeHandle=NULL;
const char BuildString[] =
__FILE__ " built " __DATE__ " " __TIME__ "\n";
struct TFTPD_STAT tftpd_stat;
// See sdk/inc/winsvc.h
SERVICE_TABLE_ENTRY TftpdDispatchTable[] = {
{
TftpdServiceName, // TEXT "Tftpd"
TftpdStart // main function.
},
{ NULL, NULL }
};
#if defined(REMOTE_BOOT_SECURITY)
BOOL
TftpdInitSecurityArray(
VOID
);
VOID
TftpdUninitSecurityArray(
VOID
);
#endif //defined(REMOTE_BOOT_SECURITY)
// ========================================================================
void
__cdecl
main(
int argc,
char * argv[]
)
{
int ok;
DbgPrint( "main: %s"
"Starting service \"%s\".\n",
BuildString,
TftpdDispatchTable[0].lpServiceName );
if( argc > 1 && !strcmp( argv[1], "-?" ) ){
printf( USAGE );
printf( " TFTPD_DEFAULT_DIR is %s\n", TFTPD_DEFAULT_DIR );
printf( " TFTPD_LOGFILE is %s\n\n", TFTPD_LOGFILE );
printf( "Registry key names, all strings: HKEY_LOCAL_MACHINE %s\n",
TFTPD_REGKEY );
printf( " o StartDirectory keyname \"%s\"\n", TFTPD_REGKEY_DIR );
printf( "These keys are shell patterns with * and ? (see examples above):\n");
printf( " o ValidClients keyname \"%s\"\n", TFTPD_REGKEY_CLIENTS );
printf( " o ValidMasters keyname \"%s\"\n", TFTPD_REGKEY_MASTERS );
printf( " o Readable files keyname \"%s\"\n", TFTPD_REGKEY_READABLE );
printf( " o writable files keyname \"%s\"\n", TFTPD_REGKEY_WRITEABLE);
exit( -1 );
}
ok =
StartServiceCtrlDispatcher(TftpdDispatchTable);
if( ok ){
DbgPrint("tftpd StartServiceCtrlDispatcher ok.\n" );
}else{
DbgPrint("tftpd StartServiceCtrlDispatcher error=%d\n",
GetLastError() );
}
ExitProcess(0);
}
// ========================================================================
// Main function called by service controller.
DWORD
TftpdStart(
IN DWORD argc,
IN LPTSTR argv[]
)
/*++
Routine Description:
This sits waiting on the tftpd well-known port (69) until it gets a request
Then it spawns a thread to either TftpdHandleRead or TftpdHandleWrite which
processes the request.
Arguments:
argc:
argv: [-dStartDirectory] option.
Return Value:
None
Error?
--*/
{
int Status;
struct sockaddr_in TftpdAddress;
int err, ok, i;
DWORD WaitStatus;
//
// Initialize all the status fields so that subsequent calls to
// SetServiceStatus need to only update fields that changed.
//
TftpdServiceStatus.dwServiceType = SERVICE_WIN32;
TftpdServiceStatus.dwCurrentState = SERVICE_START_PENDING;
TftpdServiceStatus.dwControlsAccepted = 0;
TftpdServiceStatus.dwCheckPoint = 1;
TftpdServiceStatus.dwWaitHint = 20000; // 20 seconds
SET_SERVICE_EXITCODE(
NO_ERROR,
TftpdServiceStatus.dwWin32ExitCode,
TftpdServiceStatus.dwServiceSpecificExitCode
);
//
// Initialize server to receive service requests by registering the
// control handler.
//
TftpdServiceStatusHandle =
RegisterServiceCtrlHandler(
TftpdServiceName,
TftpdControlHandler
);
if ( TftpdServiceStatusHandle == 0 ) {
DbgPrint("TftpdStart: RegisterServiceCtrlHandler failed: %lx\n",
GetLastError());
goto failed;
}
ok =
SetServiceStatus( TftpdServiceStatusHandle, &TftpdServiceStatus);
if( !ok ){
DbgPrint("TftpdStart: SetServiceStatus failed=%d\n",
GetLastError() );
goto failed;
}
//
// Create the main synchronisation events.
//
eMasterTerminate =
CreateEvent(
NULL, // LPSECURITY_ATTRIBUTES.
FALSE, // bManualReset,
FALSE, // bInitialState
NULL // LPCTSTR pointer to event-object name
);
eSock = CreateEvent( NULL, FALSE, FALSE, NULL );
if( ! eMasterTerminate || ! eSock ){
DbgPrint("TftpdStart: CreateEvent failed.\n");
goto failed;
}
//
// Start Winsock
//
err =
WSAStartup( 0x0101, &WsaData );
if (err == SOCKET_ERROR ) {
DbgPrint("TftpdStart: WSAStartup failed, Error=%d.\n",
WSAGetLastError() );
goto failed;
}
DbgPrint("TftpdStart: winsock: %x/%x, %s\n %s\n",
WsaData.wVersion, WsaData.wHighVersion,
WsaData.szDescription, WsaData.szSystemStatus );
#if defined(REMOTE_BOOT_SECURITY)
//
// Initialize security-related info.
//
if (!TftpdInitSecurityArray()) {
DbgPrint("TftpdStart: cannot initialize security array\n");
goto failed;
}
#endif //defined(REMOTE_BOOT_SECURITY)
//
// Startup worked - announce that we're all done.
//
TftpdServiceStatus.dwCurrentState = SERVICE_RUNNING;
TftpdServiceStatus.dwControlsAccepted =
SERVICE_ACCEPT_STOP
| SERVICE_ACCEPT_PAUSE_CONTINUE
| SERVICE_ACCEPT_SHUTDOWN;
TftpdServiceStatus.dwCheckPoint = 0;
TftpdServiceStatus.dwWaitHint = 0;
ok =
SetServiceStatus(
TftpdServiceStatusHandle,
&TftpdServiceStatus
);
if( !ok ){
DbgPrint("TftpdStart: SetServiceStatus failed=%d\n",
GetLastError() );
goto failed;
}
//
// Clear the stats.
//
memset( &tftpd_stat, '\0', sizeof( struct TFTPD_STAT ) );
time( &tftpd_stat.started_at );
//
// Process Command line arguments/options.
//
#ifdef DBG
DbgPrint("TftpdStart: argc=%d\n", argc);
for( ok = 0; ok < (int) argc; ok++ ){
DbgPrint("\targv[%d]=%s.\n", ok, argv[ok] );
}
#endif
while( --argc > 0 && argv[argc][0] == '-' ){
switch( argv[argc][1] ){
case 'd' : // ie. -ddirectory.
strcpy( StartDirectory, &argv[argc][2] );
DbgPrint("TftpdStart: StartDirectory=%s\n", StartDirectory );
break;
case 'e' :
LoggingEvent = TRUE;
break;
case 'f' :
LoggingFile = TRUE;
break;
default:
DbgPrint("TftpdStart: invalid option %s\n", argv[0] );
break;
}
}
ReadRegistryValues();
Set_StartDirectory();
//
// Start in the dir from where we want to export files.
//
err = _chdir( StartDirectory );
if( err == -1 ){
DbgPrint( "TftpdStart: _chdir(%s) failed, errno=%d\n",
StartDirectory, errno
);
err = _mkdir(StartDirectory);
if (err == ERROR_SUCCESS) {
err = _chdir( StartDirectory );
}
if (err != ERROR_SUCCESS) {
goto failed;
}
}
//
// Open Logfile only after chdir.
//
if( LoggingFile ){
LogFile = fopen( TFTPD_LOGFILE, "a+" );
if( LogFile == NULL ){
LoggingFile = FALSE;
DbgPrint( "Cannot open TFTPD_LOGFILE=%s\n", TFTPD_LOGFILE );
}
}
//
// Only the risque and successful come here.
//
DbgPrint("TftpdStart in %s at %s.\n",
StartDirectory,
ctime( &tftpd_stat.started_at )
);
// Initialize Thread Pool
TftpdInitializeThreadPool();
TftpdInitializeReceiveHeap();
WaitStatus=WaitForSingleObject(eMasterTerminate,INFINITE);
if (WaitStatus != WAIT_OBJECT_0) {
DbgPrint("Wait for termination error %d",GetLastError());
}
// Thread pool thread still active, but oh well ... exiting process.
return(0);
//
// Failures jump here.
//
failed:
TftpdServiceExit(ERROR_GEN_FAILURE);
exit(1);
return(0);
}
HANDLE RegisterSocket(SOCKET Sock, HANDLE Event, DWORD Flag)
/*++
Routine Description:
Schedule calling of TftpdReceive when data received on socket Sock
Arguments:
Return Value:
Handle to registered function, NULL on failure
--*/
{
NTSTATUS status;
HANDLE MasterSocketWait;
DbgPrint("RegisterSocket: Socket %d, Event %d\n",Sock,Event);
if (WSAEventSelect(Sock,Event,FD_READ|FD_WRITE) != 0) {
DbgPrint("EventSelect failed %d",GetLastError());
return 0;
}
if (Flag & REG_NEW_SOCKET) {
status = RtlRegisterWait(&MasterSocketWait,
Event,
TftpdNewReceive,
(PVOID)Sock,
INFINITE,
0);
} else {
status = RtlRegisterWait(&MasterSocketWait,
Event,
TftpdContinueReceive,
(PVOID)Sock,
INFINITE,
0);
}
if (!NT_SUCCESS(status)) {
DbgPrint("Failed to register wait %d",status);
}
return MasterSocketWait;
}
DWORD TftpdInitializeThreadPool()
/*++
Routine Description:
Create initial pool of thread
Arguments:
Return Value:
Exit status
0 == success
1 == failure
--*/
{
DWORD i;
HANDLE ThreadHandle;
DWORD ThreadId;
NTSTATUS status;
PMIB_IPADDRTABLE IpAddrTable;
InitializeCriticalSection(&Globals.Lock);
InitializeCriticalSection(&SocketLock);
InitializeListHead(&Globals.WorkList);
InitializeListHead(&SocketList);
if (GetIpTable(&IpAddrTable) == ERROR_SUCCESS) {
for (i=0; i < IpAddrTable->dwNumEntries; i++) {
if ( (IpAddrTable->table[i].dwAddr != 0) &&
(IpAddrTable->table[i].dwAddr != LOOPBACK)) {
AddSocket(IpAddrTable->table[i].dwAddr);
}
}
free(IpAddrTable);
}
status=RtlCreateTimerQueue(&Globals.TimerQueueHandle);
if (status != ERROR_SUCCESS) {
return status;
}
status=RtlCreateTimer(Globals.TimerQueueHandle,
&ReaperWait,
TftpdReaper,
(PVOID)NULL,
REAPER_INTERVAL_SEC*1000,
REAPER_INTERVAL_SEC*1000,
0);
if (!NT_SUCCESS(status)) {
DbgPrint("Failed to Arm Timer %d",status);
}
AddrChangeEvent=CreateEvent(NULL,FALSE,FALSE,NULL);
if (!AddrChangeEvent) {
return status;
}
status =
RtlRegisterWait(
&AddrChangeWaitHandle,
AddrChangeEvent,
InterfaceChange,
NULL,
INFINITE,
0
);
if (status != ERROR_SUCCESS) {
return status;
}
memset(&AddrChangeOverlapped,0,sizeof(OVERLAPPED));
AddrChangeOverlapped.hEvent=AddrChangeEvent;
status = NotifyAddrChange(&AddrChangeHandle,&AddrChangeOverlapped);
if (status != ERROR_SUCCESS && status != ERROR_IO_PENDING) {
return status;
}
return ERROR_SUCCESS;
}
VOID TftpdInitializeReceiveHeap()
{
DWORD size;
InitializeListHead(&ReceiveList);
InitializeCriticalSection(&ReceiveLock);
size = 5 * (sizeof(TFTP_REQUEST));
ReceiveHeap = HeapCreate(0, size ,0);
ASSERT(ReceiveHeap);
}
/*
Called on the reaper interval. Cleanup extra heap entries
*/
VOID TftpdCleanHeap()
{
DWORD i=0;
PLIST_ENTRY pEntry;
PTFTP_REQUEST Request=NULL;
DWORD NumToFree=0;
EnterCriticalSection(&ReceiveLock);
if (ReceiveHeapSize - ActiveReceive > RECEIVE_HEAP_THREASHOLD1) {
NumToFree = ((ReceiveHeapSize - ActiveReceive) / 2);
} else if ((ReceiveHeapSize - ActiveReceive > RECEIVE_HEAP_THREASHOLD2)) {
NumToFree = RECEIVE_NUM_FREE;
}
while(i < NumToFree) {
pEntry=RemoveHeadList(&ReceiveList);
Request=CONTAINING_RECORD(pEntry,TFTP_REQUEST,RequestLinkage);
CloseHandle(Request->RcvEvent);
HeapFree(ReceiveHeap,0,Request);
i++;
ReceiveHeapSize--;
}
LeaveCriticalSection(&ReceiveLock);
}
DWORD HandleRequest(SOCKET Sock, IPAddr MyAddr)
{
unsigned short Opcode;
struct sockaddr_in PeerAddress;
int PeerAddressLength;
PTFTP_REQUEST Request;
char RequestPacket[MAX_TFTP_DATAGRAM + 1];
int Status;
struct sockaddr_in TftpdAddress;
HANDLE ThreadHandle;
DWORD ThreadId;
LPTHREAD_START_ROUTINE ThreadRoutine=NULL;
WSABUF RecvBuf[1];
WSAOVERLAPPED Overlap;
DWORD dwNumberBytes = 0;
DWORD dwFlags = 0;
int err, ok;
HANDLE handle_list[2];
DWORD handle_ready;
PLIST_ENTRY pEntry;
DWORD size;
DWORD IterCount=0;
SocketEntry *SE;
IterCount=0;
while(1) {
// loop while data available on this socket
{
int ret;
DWORD DataAvail;
ret=ioctlsocket(Sock,
FIONREAD,
&DataAvail);
if (ret != 0) {
DbgPrint("ioctlsocket failed %d",WSAGetLastError());
return 0;
}
if (DataAvail == 0) {
return 0;
}
}
err = 0;
handle_ready = 0;
memset( &Overlap, 0, sizeof(WSAOVERLAPPED));
EnterCriticalSection(&ReceiveLock);
if (!IsListEmpty(&ReceiveList)) {
pEntry=RemoveHeadList(&ReceiveList);
Request=CONTAINING_RECORD(pEntry,TFTP_REQUEST,RequestLinkage);
ResetEvent(Request->RcvEvent);
Overlap.hEvent = Request->RcvEvent;
} else {
size = sizeof(TFTP_REQUEST);
Request = HeapAlloc(ReceiveHeap, HEAP_ZERO_MEMORY, size);
if (Request == NULL) {
DWORD bytesReceived = 0, flags = 0;
// Failed to allocate REQUEST structure, perform no-op winsock recv
// so as to re-enable its event-signalling mechanism.
if (WSARecvFrom(Sock, NULL, 0, &bytesReceived, &flags,
NULL, NULL, NULL, NULL) == SOCKET_ERROR)
DbgPrint("HandleRequest: Failed to allocate REQUEST structure, "
"and failed to re-enable socket event.\n");
LeaveCriticalSection(&ReceiveLock);
return 0;
}
ReceiveHeapSize++;
Request->RcvEvent = CreateEvent(NULL, FALSE, FALSE, NULL);
if (Request->RcvEvent == NULL) {
DWORD bytesReceived = 0, flags = 0;
HeapFree(ReceiveHeap, 0, Request);
ReceiveHeapSize--;
// Failed to create event, perform no-op winsock recv
// so as to re-enable its event-signalling mechanism.
if (WSARecvFrom(Sock, NULL, 0, &bytesReceived, &flags,
NULL, NULL, NULL, NULL) == SOCKET_ERROR)
DbgPrint("HandleRequest: Failed to allocate REQUEST structure, "
"and failed to re-enable socket event.\n");
LeaveCriticalSection(&ReceiveLock);
return 0;
}
Overlap.hEvent = Request->RcvEvent;
}
LeaveCriticalSection(&ReceiveLock);
ActiveReceive++;
// Zero the request packet, to streamline option negotiation code.
memset( Request->Packet1, 0, MAX_TFTP_DATAGRAM + 1);
RecvBuf[0].buf = (char*)&Request->Packet1;
RecvBuf[0].len = MAX_TFTP_DATAGRAM + 1;
PeerAddressLength = sizeof(PeerAddress);
Request->MyAddr=MyAddr;
Status =
WSARecvFrom(
Sock,
RecvBuf,
1,
&Request->DataSize,
&dwFlags,
(struct sockaddr *) &Request->ForeignAddress,
&PeerAddressLength,
&Overlap,
NULL
);
DbgPrint("Received from Peer Addr: %x Port %d\n",Request->ForeignAddress.sin_addr.s_addr,
ntohs(Request->ForeignAddress.sin_port));
if( Status ){
err = WSAGetLastError();
DbgPrint("err %d\n",err);
if( err == WSA_IO_PENDING){
DbgPrint("Operation pending\n");
handle_list[0] = eMasterTerminate;
handle_list[1] = Overlap.hEvent;
handle_ready =
WaitForMultipleObjects(
2,
handle_list,
FALSE,
INFINITE
);
if( handle_ready == WAIT_FAILED ){
DbgPrint("TftpdMasterThread: WAIT_FAILED\n");
goto failed;
}
if (handle_ready == WAIT_TIMEOUT) {
DbgPrint("Wait timed out Socket %d\n",Sock);
goto failed;
}
if( handle_ready == WAIT_OBJECT_0 ){
goto terminated;
} else {
ok =
WSAGetOverlappedResult(
Sock, // SOCKET s,
&Overlap, // LPWSAOVERLAPPED lpOverlapped,
&Request->DataSize, // LPDWORD lpcbTransfer,
FALSE, // BOOL fWait,
&dwFlags // LPDWORD lpdwFlags
);
if( ! ok ){
DbgPrint("WSAGetOverlappedResult failed=%d",
WSAGetLastError() );
goto cleanup;
}
}
}else{
DbgPrint("TftpdMasterThread: WSARecvFrom failed=%d.\n", err );
goto failed;
}
}
IterCount++;
if( WaitForSingleObject( eMasterTerminate, 0 ) == WAIT_OBJECT_0 ){
goto terminated;
}
Status = Request->DataSize; // winsock1 <= winsock2.
if( Status >= 2 ){
//
// Process the packet
//
if (MyAddr != 0) {
// New request
ThreadRoutine=NULL;
Opcode = *((unsigned short *) &Request->Packet1[0]);
Opcode = htons(Opcode);
switch(Opcode) {
case TFTPD_RRQ:
case TFTPD_WRQ:
#if defined(REMOTE_BOOT_SECURITY)
case TFTPD_LOGIN:
case TFTPD_KEY:
#endif // defined(REMOTE_BOOT_SECURITY)
if ( Opcode == TFTPD_RRQ ) {
tftpd_stat.req_read++;
ThreadRoutine = TftpdHandleRead;
} else if ( Opcode == TFTPD_WRQ ) {
tftpd_stat.req_write++;
ThreadRoutine = TftpdHandleWrite;
}
#if defined(REMOTE_BOOT_SECURITY)
else if ( Opcode == TFTPD_LOGIN ) {
tftpd_stat.req_login++;
ThreadRoutine = TftpdHandleLogin;
} else {
tftpd_stat.req_key++;
ThreadRoutine = TftpdHandleKey;
}
#endif //defined(REMOTE_BOOT_SECURITY)
Request->TftpdPort = Sock;
DbgPrint("Posting work");
if (ThreadRoutine) {
(*ThreadRoutine)(Request);
}
break;
case TFTPD_ERROR:
break;
case TFTPD_ACK:
case TFTPD_DATA:
case TFTPD_OACK:
default:
DbgPrint("TftpdMasterThread: invalid TFTPD_(%d).\n", Opcode );
tftpd_stat.req_error++;
TftpdErrorPacket(
(struct sockaddr *) &PeerAddress,
RequestPacket,
Sock,
TFTPD_ERROR_ILLEGAL_OPERATION,
NULL);
}
} else {
// Continue serving existing request
Request->TftpdPort=Sock;
TftpdResumeProcessing(Request);
}
}
cleanup:
EnterCriticalSection(&ReceiveLock);
pEntry=&Request->RequestLinkage;
InsertHeadList(&ReceiveList,pEntry);
InterlockedIncrement(&AvailableThreads);
ActiveReceive--;
LeaveCriticalSection(&ReceiveLock);
}
terminated:
DbgPrint("TftpdReceive: exiting\n");
failed:
EnterCriticalSection(&ReceiveLock);
pEntry=&Request->RequestLinkage;
InsertHeadList(&ReceiveList,pEntry);
InterlockedIncrement(&AvailableThreads);
ActiveReceive--;
LeaveCriticalSection(&ReceiveLock);
return (0);
}
// ========================================================================
DWORD
TftpdNewReceive(
PVOID Argument,
BYTE Flags
)
/*++
Routine Description:
This handles all incoming requests and dispatches them to appropriate
worker threads.
Arguments:
Argument - not used
Return Value:
Exit status
0 == success
1 == failure, stop service and exit if severe error.
--*/
{
IPAddr MyAddr=0;
DWORD IterCount=0;
BOOL LockHeld=FALSE;
SocketEntry *SE;
DbgPrint("TftpdReceive: entered. Socket %d\n", (DWORD)((DWORD_PTR)Argument));
LockHeld=TryEnterCriticalSection(&SocketLock);
while(IterCount < MAX_LOCK_TRIES && !LockHeld) {
//Potential for deadlock on interface change if this socket is being deleted.
// Break the deadlock by not waiting forever
Sleep(200);
LockHeld=TryEnterCriticalSection(&SocketLock);
IterCount++;
}
if (!LockHeld) {
DbgPrint("TftpdReceived: SocketLock held. Dropping packet");
return 0;
}
if (LookupSocketEntryBySock((SOCKET)Argument,&SE) == ERROR_SUCCESS) {
MyAddr=SE->IPAddress;
DbgPrint("TftpdReceive: Found Addr in SocketList %x\n",MyAddr);
}
LeaveCriticalSection(&SocketLock);
HandleRequest((SOCKET)Argument,MyAddr);
return(0);
}
DWORD
TftpdContinueReceive(
PVOID Argument,
BYTE Flags
)
/*++
Routine Description:
This handles all incoming requests and dispatches them to appropriate
worker threads.
Arguments:
Argument - not used
Return Value:
Exit status
0 == success
1 == failure, stop service and exit if severe error.
--*/
{
DbgPrint("TftpdReceive: entered. Socket %d\n", (DWORD)((DWORD_PTR)Argument));
HandleRequest((SOCKET)Argument,0);
return(0);
}
// ========================================================================
VOID
TftpdControlHandler(
DWORD Opcode)
/*++
Routine Description:
This does a write with the appropriate conversions for netascii or octet
modes.
Arguments:
WriteFd - file to read from
Buffer - Buffer to read into
BufferSize - size of buffer
WriteMode - O_TEXT or O_BINARY
O_TEXT means the netascii conversions must be done
O_BINARY means octet mode
Return Value:
BytesWritten
Error?
--*/
{
int ok;
time_t current_time;
time( &current_time );
TftpdServiceStatus.dwCheckPoint++;
DbgPrint("TftpdControlHandler(%d) dwCheckPoint=%d, at %s.\n",
Opcode,
TftpdServiceStatus.dwCheckPoint,
ctime( &current_time ) );
switch (Opcode) {
case SERVICE_CONTROL_PAUSE:
// Actually can we pause listening?
DbgPrint("TftpdControlHandler: got SERVICE_CONTROL_PAUSE\n");
SuspendThread(MasterThreadHandle);
TftpdServiceStatus.dwCurrentState = SERVICE_PAUSED;
break;
case SERVICE_CONTROL_CONTINUE:
DbgPrint("TftpdControlHandler: got SERVICE_CONTROL_CONTINUE\n");
ResumeThread(MasterThreadHandle);
TftpdServiceStatus.dwCurrentState = SERVICE_RUNNING;
break;
case SERVICE_CONTROL_STOP:
case SERVICE_CONTROL_SHUTDOWN:
DbgPrint("TftpdControlHandler: got SERVICE_CONTROL_STOP/SHUTDOWN\n");
// TerminateThread(MasterThreadHandle, 0);
TftpdServiceExit(NO_ERROR);
goto done;
break;
case SERVICE_CONTROL_INTERROGATE:
DbgPrint("TftpdControlHandler: got SERVICE_CONTROL_INTERROGATE\n");
DbgPrint( " req_read=%d, req_write=%d, req_error=%d",
tftpd_stat.req_read,
tftpd_stat.req_write,
tftpd_stat.req_error);
#if defined(REMOTE_BOOT_SECURITY)
DbgPrint("req_login=%d, req_key=%d.\n",
tftpd_stat.req_login,
tftpd_stat.req_key );
#endif //defined(REMOTE_BOOT_SECURITY)
break;
default:
DbgPrint("TftpdControlHandler: got SERVICE_CONTROL_(%d)?\n", Opcode );
break;
}
/** Send a status response **/
ok =
SetServiceStatus( TftpdServiceStatusHandle,
&TftpdServiceStatus );
if( !ok ){
DbgPrint("TftpdControlHandler: SetServiceStatus failed=%d\n",
GetLastError() );
}
done:
return;
}
// ========================================================================
//
// Announce that we're going down, clean up, stop master thread.
//
VOID
TftpdServiceExit(
IN ULONG Error
)
{
int ok;
DbgPrint("TftpdServiceExit(%d)\n", Error );
// ====================
// stage one, stop pending, signal master thread.
// ====================
TftpdServiceStatus.dwCurrentState = SERVICE_STOP_PENDING;
ok =
SetServiceStatus( TftpdServiceStatusHandle,
&TftpdServiceStatus );
if( !ok ){
DbgPrint("TftpdServiceExit: SetServiceStatus failed=%d\n",
GetLastError() );
}
SetEvent( eMasterTerminate );
// ====================
// stage two, stop.
// ====================
TftpdServiceStatus.dwCurrentState = SERVICE_STOPPED;
TftpdServiceStatus.dwCheckPoint = 0;
TftpdServiceStatus.dwWaitHint = 0;
SET_SERVICE_EXITCODE(
Error,
TftpdServiceStatus.dwWin32ExitCode,
TftpdServiceStatus.dwServiceSpecificExitCode
);
ok =
SetServiceStatus( TftpdServiceStatusHandle,
&TftpdServiceStatus );
if( !ok ){
DbgPrint("TftpdServiceExit: SetServiceStatus failed=%d\n",
GetLastError() );
}
// ====================
// stage three, cleanup.
// ====================
if( eSock ){
CloseHandle( eSock );
eSock = NULL;
}
if( eMasterTerminate ){
CloseHandle( eMasterTerminate );
eMasterTerminate = NULL;
}
if( LogFile ){
fclose( LogFile );
LogFile = NULL;
}
#if defined(REMOTE_BOOT_SECURITY)
TftpdUninitSecurityArray();
#endif //defined(REMOTE_BOOT_SECURITY)
}
/*++
Remove Entry from list, and free it. SocketLock must be held by caller.
--*/
VOID DeleteSocketEntry(SocketEntry *SE)
{
DbgPrint("Deregister wait %x",SE->WaitHandle);
RtlDeregisterWaitEx(SE->WaitHandle,INVALID_HANDLE_VALUE);
closesocket(SE->Sock);
WSACloseEvent(SE->WaitEvent);
if (SE->Linkage.Flink == SE->Linkage.Blink) {
// single entry case
RemoveHeadList(&SocketList);
} else {
SE->Linkage.Blink->Flink=SE->Linkage.Flink;
SE->Linkage.Flink->Blink=SE->Linkage.Blink;
}
DbgPrint("removing socket to %x",SE->IPAddress);
free(SE);
}
DWORD GetIpTable(PMIB_IPADDRTABLE *AddrTable)
{
HRESULT hr;
DWORD IpAddrTableSize=0;
PMIB_IPADDRTABLE IpAddrTable=NULL, TmpAddrTable=NULL;
DWORD ReturnValue=STATUS_NO_MEMORY;
*AddrTable=NULL;
hr=GetIpAddrTable(NULL,
&IpAddrTableSize,
FALSE);
if (hr != ERROR_SUCCESS && hr != ERROR_INSUFFICIENT_BUFFER) {
DbgPrint("GetIpAddrTable failed with %x",hr);
goto ret;
}
IpAddrTable=(PMIB_IPADDRTABLE)malloc(IpAddrTableSize);
if (IpAddrTable == NULL) {
goto ret;
}
while (1) {
hr=GetIpAddrTable(IpAddrTable,
&IpAddrTableSize,
FALSE);
if (hr == ERROR_SUCCESS) {
break;
}
if (hr == ERROR_INSUFFICIENT_BUFFER) {
TmpAddrTable=realloc(IpAddrTable,IpAddrTableSize);
if (TmpAddrTable == NULL) {
free(IpAddrTable);
goto ret;
} else {
IpAddrTable = TmpAddrTable;
}
continue;
}
DbgPrint("GetIpAddrTable failed with %x",hr);
goto ret;
}
ReturnValue=ERROR_SUCCESS;
*AddrTable=IpAddrTable;
ret:
return ReturnValue;
}
VOID inet_ntoa_copy(struct in_addr IP, BYTE* IPString)
{
BYTE *Tmp;
Tmp=inet_ntoa(IP);
if (Tmp) {
strcpy(IPString,Tmp);
}
}
/*++
Addr : IP Addr to bind socket to.
Return: NULL of failure. Pointer to SocketEntry that is added to SocketList on success.
SocketLock must be held by caller.
--*/
SocketEntry* AddSocket(IPAddr Addr)
{
struct sockaddr_in TftpdAddress;
SOCKET Sock;
HANDLE SocketEvent;
SocketEntry *SE;
struct servent * serventry;
int Count=0;
DWORD ErrStatus;
do {
Sock = WSASocket(AF_INET, SOCK_DGRAM, 0, NULL, 0, WSA_FLAG_OVERLAPPED);
if (Sock != INVALID_SOCKET) {
memset(&TftpdAddress, 0, sizeof(struct sockaddr_in));
serventry = getservbyname("tftp", "udp");
if (serventry == NULL) {
DbgPrint("TftpdStart: getservbyname cannot find tftp port.\n");
continue;
}
TftpdAddress.sin_family = AF_INET;
TftpdAddress.sin_port = serventry->s_port;
TftpdAddress.sin_addr.s_addr = Addr;
if (bind(Sock, (struct sockaddr *)&TftpdAddress, sizeof(struct sockaddr_in))) {
DWORD err=GetLastError();
DbgPrint("Bind failed %d\n",err);
return NULL;
} else {
break;
}
}
ErrStatus=WSAGetLastError();
DbgPrint("WSASocket failed with %d\n",ErrStatus);
Sleep(750);
Count++;
} while (Count < MAX_SOCKET_INIT_ATTEMPT);
if (Sock == INVALID_SOCKET) {
DbgPrint("Failed to create socket for addr %x\n",Addr);
return NULL;
}
SE=(SocketEntry*)malloc(sizeof(SocketEntry));
if (!SE) {
goto out;
} else {
BYTE TmpAddr[20];
memset(SE,0,sizeof(SocketEntry));
SE->Sock=Sock;
SE->IPAddress=Addr;
inet_ntoa_copy(*((struct in_addr*)&Addr),TmpAddr);
SocketEvent=CreateEvent(NULL,FALSE,FALSE,NULL);
if (SocketEvent == NULL) {
goto out;
}
SE->WaitEvent=SocketEvent;
SE->WaitHandle=RegisterSocket(Sock,SocketEvent,REG_NEW_SOCKET);
if (SE->WaitHandle == 0) {
goto out;
}
InsertHeadList(&SocketList,&SE->Linkage);
DbgPrint("Adding socket: %d addr: %s\n",Sock,TmpAddr);
}
return SE;
out:
closesocket(Sock);
if (SocketEvent) {
CloseHandle(SocketEvent);
}
if (SE) {
free(SE);
}
return NULL;
}
/*++
Walk through SocketList, deleting unreferenced entries, cleaning reference on referenced entries.
SocketList lock must be held by caller.
--*/
DWORD CleanSocketList()
{
PLIST_ENTRY pEntry, pNextEntry;
SocketEntry *SE;
BOOL DeletedEntry=FALSE;
pEntry = SocketList.Flink;
while ( pEntry != &SocketList) {
SE = CONTAINING_RECORD(pEntry,
SocketEntry,
Linkage);
pNextEntry=pEntry->Flink;
if (!SE->Referenced) {
DeleteSocketEntry(SE);
DeletedEntry=TRUE;
} else {
SE->Referenced = FALSE;
}
pEntry=pNextEntry;
}
return DeletedEntry;
}
/*++
SocketLock must be held by caller.
Returns: S_OK if found. SE contains pointer.
S_FALSE if failed. SE contains NULL.
--*/
DWORD LookupInterfaceEntry(IPAddr Addr,SocketEntry **SE)
{
PLIST_ENTRY pEntry;
SocketEntry *LocalSE;
*SE=NULL;
for ( pEntry = SocketList.Flink;
pEntry != &SocketList;
pEntry = pEntry->Flink) {
LocalSE = CONTAINING_RECORD(pEntry,
SocketEntry,
Linkage);
if (LocalSE->IPAddress == Addr) {
*SE=LocalSE;
return TRUE;
}
}
return FALSE;
}
/*++
SocketLock must be held by caller.
Returns: S_OK if found. SE contains pointer.
S_FALSE if failed. SE contains NULL.
--*/
DWORD LookupSocketEntryBySock(SOCKET Sock, SocketEntry **SE)
{
PLIST_ENTRY pEntry;
SocketEntry *LocalSE;
*SE=NULL;
for ( pEntry = SocketList.Flink;
pEntry != &SocketList;
pEntry = pEntry->Flink) {
LocalSE = CONTAINING_RECORD(pEntry,
SocketEntry,
Linkage);
if (LocalSE->Sock == Sock) {
*SE=LocalSE;
break;
}
}
if (*SE) {
return ERROR_SUCCESS;
} else {
return ERROR_INVALID_PARAMETER;
}
}
/*++
Handle interface change event signalled by PA.
--*/
VOID NTAPI InterfaceChange(PVOID Context, BOOLEAN Flag)
{
PMIB_IPADDRTABLE IpAddrTable;
DWORD i;
DWORD EntryCount=0;
PLIST_ENTRY pEntry,pNextEntry;
SocketEntry *SE,*NewSE;
int Count=0;
DWORD ErrStatus;
DWORD Added=FALSE, Removed=FALSE;
IPAddr IPAddress;
DbgPrint("InterfaceChange\n");
EnterCriticalSection(&SocketLock);
if (GetIpTable(&IpAddrTable) == ERROR_SUCCESS) {
for (i=0; i < IpAddrTable->dwNumEntries; i++) {
if ( (IpAddrTable->table[i].dwAddr != 0) &&
(IpAddrTable->table[i].dwAddr != LOOPBACK)) {
if (LookupInterfaceEntry(IpAddrTable->table[i].dwAddr,&SE)) {
SE->Referenced=TRUE;
} else {
Added=TRUE;
SE=AddSocket(IpAddrTable->table[i].dwAddr);
if (SE) {
SE->Referenced=TRUE;
}
}
DbgPrint("Referenced Socket %x\n",IpAddrTable->table[i].dwAddr);
}
}
Removed=CleanSocketList();
free(IpAddrTable);
}
if (!Added && !Removed) {
// Got a notify, and didn't detect any differences. Could be a race condition, and
// addr got removed, and readded before we could process the notify
// Reopen all sockets to handle this case
pEntry=SocketList.Flink;
while (pEntry != &SocketList) {
SE = CONTAINING_RECORD(pEntry,
SocketEntry,
Linkage);
pNextEntry=pEntry->Flink;
if (!(SE->Flags & SE_SOCKET_REOPEN)) {
IPAddress=SE->IPAddress;
DeleteSocketEntry(SE);
NewSE=AddSocket(IPAddress);
if (NewSE) {
NewSE->Flags |= SE_SOCKET_REOPEN;
}
}
pEntry=pNextEntry;
}
}
ErrStatus = NotifyAddrChange(&AddrChangeHandle,&AddrChangeOverlapped);
if (ErrStatus != ERROR_SUCCESS && ErrStatus != ERROR_IO_PENDING) {
DbgPrint("NotifyAddrChange failed %d",ErrStatus);
}
LeaveCriticalSection(&SocketLock);
}
// ========================================================================
// EOF.