| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376 |
- /*
- * General mechanism for wrapping up reading/writing of Windows
- * HANDLEs into a PuTTY Socket abstraction.
- */
- #include <stdio.h>
- #include <assert.h>
- #include <limits.h>
- #define DEFINE_PLUG_METHOD_MACROS
- #include "tree234.h"
- #include "putty.h"
- #include "network.h"
- typedef struct Socket_handle_tag *Handle_Socket;
- #ifdef MPEXT
- extern char *do_select(Plug plug, SOCKET skt, int startup);
- #endif
- struct Socket_handle_tag {
- const struct socket_function_table *fn;
- /* the above variable absolutely *must* be the first in this structure */
- HANDLE send_H, recv_H, stderr_H;
- struct handle *send_h, *recv_h, *stderr_h;
- /*
- * Freezing one of these sockets is a slightly fiddly business,
- * because the reads from the handle are happening in a separate
- * thread as blocking system calls and so once one is in progress
- * it can't sensibly be interrupted. Hence, after the user tries
- * to freeze one of these sockets, it's unavoidable that we may
- * receive one more load of data before we manage to get
- * winhandl.c to stop reading.
- */
- enum {
- UNFROZEN, /* reading as normal */
- FREEZING, /* have been set to frozen but winhandl is still reading */
- FROZEN, /* really frozen - winhandl has been throttled */
- THAWING /* we're gradually releasing our remaining data */
- } frozen;
- /* We buffer data here if we receive it from winhandl while frozen. */
- bufchain inputdata;
- /* Data received from stderr_H, if we have one. */
- bufchain stderrdata;
- int defer_close, deferred_close; /* in case of re-entrance */
- char *error;
- Plug plug;
- };
- static int handle_gotdata(struct handle *h, void *data, int len)
- {
- Handle_Socket ps = (Handle_Socket) handle_get_privdata(h);
- if (len < 0) {
- plug_closing(ps->plug, "Read error from handle", 0, 0);
- return 0;
- } else if (len == 0) {
- plug_closing(ps->plug, NULL, 0, 0);
- return 0;
- } else {
- assert(ps->frozen != FROZEN && ps->frozen != THAWING);
- if (ps->frozen == FREEZING) {
- /*
- * If we've received data while this socket is supposed to
- * be frozen (because the read winhandl.c started before
- * sk_set_frozen was called has now returned) then buffer
- * the data for when we unfreeze.
- */
- bufchain_add(&ps->inputdata, data, len);
- ps->frozen = FROZEN;
- /*
- * And return a very large backlog, to prevent further
- * data arriving from winhandl until we unfreeze.
- */
- return INT_MAX;
- } else {
- plug_receive(ps->plug, 0, data, len);
- return 0;
- }
- }
- }
- static int handle_stderr(struct handle *h, void *data, int len)
- {
- Handle_Socket ps = (Handle_Socket) handle_get_privdata(h);
- if (len > 0)
- {
- log_proxy_stderr(ps->plug, &ps->stderrdata, data, len);
- }
- return 0;
- }
- static void handle_sentdata(struct handle *h, int new_backlog)
- {
- Handle_Socket ps = (Handle_Socket) handle_get_privdata(h);
- if (new_backlog < 0) {
- /* Special case: this is actually reporting an error writing
- * to the underlying handle, and our input value is the error
- * code itself, negated. */
- plug_closing(ps->plug, win_strerror(-new_backlog), -new_backlog, 0);
- return;
- }
- plug_sent(ps->plug, new_backlog);
- }
- static Plug sk_handle_plug(Socket s, Plug p)
- {
- Handle_Socket ps = (Handle_Socket) s;
- Plug ret = ps->plug;
- if (p)
- ps->plug = p;
- return ret;
- }
- static void sk_handle_close(Socket s)
- {
- Handle_Socket ps = (Handle_Socket) s;
- if (ps->defer_close) {
- ps->deferred_close = TRUE;
- return;
- }
- #ifdef MPEXT
- // WinSCP core uses do_select as signalization of connection up/down
- do_select(ps->plug, INVALID_SOCKET, 0);
- #endif
- handle_free(ps->send_h);
- handle_free(ps->recv_h);
- CloseHandle(ps->send_H);
- if (ps->recv_H != ps->send_H)
- CloseHandle(ps->recv_H);
- #ifdef MPEXT
- if (ps->stderr_h)
- {
- handle_free(ps->stderr_h);
- }
- if (ps->stderr_H)
- {
- CloseHandle(ps->stderr_H);
- }
- #endif
- bufchain_clear(&ps->inputdata);
- bufchain_clear(&ps->stderrdata);
- sfree(ps);
- }
- static int sk_handle_write(Socket s, const char *data, int len)
- {
- Handle_Socket ps = (Handle_Socket) s;
- return handle_write(ps->send_h, data, len);
- }
- static int sk_handle_write_oob(Socket s, const char *data, int len)
- {
- /*
- * oob data is treated as inband; nasty, but nothing really
- * better we can do
- */
- return sk_handle_write(s, data, len);
- }
- static void sk_handle_write_eof(Socket s)
- {
- Handle_Socket ps = (Handle_Socket) s;
- handle_write_eof(ps->send_h);
- }
- static void sk_handle_flush(Socket s)
- {
- /* Handle_Socket ps = (Handle_Socket) s; */
- /* do nothing */
- }
- static void handle_socket_unfreeze(void *psv)
- {
- Handle_Socket ps = (Handle_Socket) psv;
- void *data;
- int len;
- /*
- * If we've been put into a state other than THAWING since the
- * last callback, then we're done.
- */
- if (ps->frozen != THAWING)
- return;
- /*
- * Get some of the data we've buffered.
- */
- bufchain_prefix(&ps->inputdata, &data, &len);
- assert(len > 0);
- /*
- * Hand it off to the plug. Be careful of re-entrance - that might
- * have the effect of trying to close this socket.
- */
- ps->defer_close = TRUE;
- plug_receive(ps->plug, 0, data, len);
- bufchain_consume(&ps->inputdata, len);
- ps->defer_close = FALSE;
- if (ps->deferred_close) {
- sk_handle_close(ps);
- return;
- }
- if (bufchain_size(&ps->inputdata) > 0) {
- /*
- * If there's still data in our buffer, stay in THAWING state,
- * and reschedule ourself.
- */
- queue_toplevel_callback(handle_socket_unfreeze, ps);
- } else {
- /*
- * Otherwise, we've successfully thawed!
- */
- ps->frozen = UNFROZEN;
- handle_unthrottle(ps->recv_h, 0);
- }
- }
- static void sk_handle_set_frozen(Socket s, int is_frozen)
- {
- Handle_Socket ps = (Handle_Socket) s;
- if (is_frozen) {
- switch (ps->frozen) {
- case FREEZING:
- case FROZEN:
- return; /* nothing to do */
- case THAWING:
- /*
- * We were in the middle of emptying our bufchain, and got
- * frozen again. In that case, winhandl.c is already
- * throttled, so just return to FROZEN state. The toplevel
- * callback will notice and disable itself.
- */
- ps->frozen = FROZEN;
- break;
- case UNFROZEN:
- /*
- * The normal case. Go to FREEZING, and expect one more
- * load of data from winhandl if we're unlucky.
- */
- ps->frozen = FREEZING;
- break;
- }
- } else {
- switch (ps->frozen) {
- case UNFROZEN:
- case THAWING:
- return; /* nothing to do */
- case FREEZING:
- /*
- * If winhandl didn't send us any data throughout the time
- * we were frozen, then we'll still be in this state and
- * can just unfreeze in the trivial way.
- */
- assert(bufchain_size(&ps->inputdata) == 0);
- ps->frozen = UNFROZEN;
- break;
- case FROZEN:
- /*
- * If we have buffered data, go to THAWING and start
- * releasing it in top-level callbacks.
- */
- ps->frozen = THAWING;
- queue_toplevel_callback(handle_socket_unfreeze, ps);
- }
- }
- }
- static const char *sk_handle_socket_error(Socket s)
- {
- Handle_Socket ps = (Handle_Socket) s;
- return ps->error;
- }
- static char *sk_handle_peer_info(Socket s)
- {
- Handle_Socket ps = (Handle_Socket) s;
- ULONG pid;
- static HMODULE kernel32_module;
- DECL_WINDOWS_FUNCTION(static, BOOL, GetNamedPipeClientProcessId,
- (HANDLE, PULONG));
- if (!kernel32_module) {
- kernel32_module = load_system32_dll("kernel32.dll");
- #if (defined _MSC_VER && _MSC_VER < 1900) || defined __MINGW32__ || defined COVERITY
- /* For older Visual Studio, and MinGW too (at least as of
- * Ubuntu 16.04), this function isn't available in the header
- * files to type-check. Ditto the toolchain I use for
- * Coveritying the Windows code. */
- GET_WINDOWS_FUNCTION_NO_TYPECHECK(
- kernel32_module, GetNamedPipeClientProcessId);
- #else
- GET_WINDOWS_FUNCTION(
- kernel32_module, GetNamedPipeClientProcessId);
- #endif
- }
- /*
- * Of course, not all handles managed by this module will be
- * server ends of named pipes, but if they are, then it's useful
- * to log what we can find out about the client end.
- */
- if (p_GetNamedPipeClientProcessId &&
- p_GetNamedPipeClientProcessId(ps->send_H, &pid))
- return dupprintf("process id %lu", (unsigned long)pid);
- return NULL;
- }
- Socket make_handle_socket(HANDLE send_H, HANDLE recv_H, HANDLE stderr_H,
- Plug plug, int overlapped)
- {
- static const struct socket_function_table socket_fn_table = {
- sk_handle_plug,
- sk_handle_close,
- sk_handle_write,
- sk_handle_write_oob,
- sk_handle_write_eof,
- sk_handle_flush,
- sk_handle_set_frozen,
- sk_handle_socket_error,
- sk_handle_peer_info,
- };
- Handle_Socket ret;
- int flags = (overlapped ? HANDLE_FLAG_OVERLAPPED : 0);
- ret = snew(struct Socket_handle_tag);
- ret->fn = &socket_fn_table;
- ret->plug = plug;
- ret->error = NULL;
- ret->frozen = UNFROZEN;
- bufchain_init(&ret->inputdata);
- bufchain_init(&ret->stderrdata);
- ret->recv_H = recv_H;
- ret->recv_h = handle_input_new(ret->recv_H, handle_gotdata, ret, flags);
- ret->send_H = send_H;
- ret->send_h = handle_output_new(ret->send_H, handle_sentdata, ret, flags);
- ret->stderr_H = stderr_H;
- if (ret->stderr_H)
- ret->stderr_h = handle_input_new(ret->stderr_H, handle_stderr,
- ret, flags);
- ret->defer_close = ret->deferred_close = FALSE;
- #ifdef MPEXT
- // WinSCP core uses do_select as signalization of connection up/down
- do_select(plug, INVALID_SOCKET, 1);
- #endif
- return (Socket) ret;
- }
|