Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

849 lines
19 KiB

/*++
Copyright (c) 1997 Microsoft Corporation
Module Name:
director.c
Abstract:
This module contains the code for director management.
Author:
Abolade Gbadegesin (t-abolag) 16-Feb-1998
Revision History:
Abolade Gbadegesin (aboladeg) 19-Apr-1998
Added support for wildcards in protocol/port of a director registration.
--*/
#include "precomp.h"
#pragma hdrstop
//
// GLOBAL DATA DEFINITIONS
//
//
// Count of NAT directors
//
ULONG DirectorCount;
//
// List of NAT directors
//
LIST_ENTRY DirectorList;
//
// Spin-lock controlling access to 'DirectorList'
//
KSPIN_LOCK DirectorLock;
//
// Spin-lock controlling access to the 'MappingList' field of all directors
//
KSPIN_LOCK DirectorMappingLock;
VOID
NatCleanupDirector(
PNAT_DIRECTOR Director
)
/*++
Routine Description:
Called to perform final cleanup for an director.
Arguments:
Director - the director to be cleaned up.
Return Value:
none.
--*/
{
KIRQL Irql;
PLIST_ENTRY Link;
PNAT_DYNAMIC_MAPPING Mapping;
CALLTRACE(("NatCleanupDirector\n"));
//
// Detach the director from all of its mappings
//
KeAcquireSpinLock(&DirectorLock, &Irql);
KeAcquireSpinLockAtDpcLevel(&DirectorMappingLock);
for (Link = Director->MappingList.Flink; Link != &Director->MappingList;
Link = Link->Flink) {
Mapping = CONTAINING_RECORD(Link, NAT_DYNAMIC_MAPPING, DirectorLink);
Link = Link->Blink;
NatMappingDetachDirector(
Director,
Mapping->DirectorContext,
Mapping,
NatCleanupDirectorDeleteReason
);
}
KeReleaseSpinLockFromDpcLevel(&DirectorMappingLock);
KeReleaseSpinLock(&DirectorLock, Irql);
if (Director->UnloadHandler) {
Director->UnloadHandler(Director->Context);
}
ExFreePool(Director);
} // NatCleanupDirector
NTSTATUS
NatCreateDirector(
PIP_NAT_REGISTER_DIRECTOR RegisterContext
)
/*++
Routine Description:
This routine is invoked when an director attempts to register.
It handles creation of a context-block for the director.
Arguments:
RegisterContext - information about the registering director
Return Value:
NTSTATUS - status code.
--*/
{
PNAT_DIRECTOR Director;
PLIST_ENTRY InsertionPoint;
KIRQL Irql;
ULONG Key;
CALLTRACE(("NatCreateDirector\n"));
RegisterContext->DirectorHandle = NULL;
//
// Validate the registration information
//
if (!RegisterContext->QueryHandler &&
!RegisterContext->CreateHandler &&
!RegisterContext->DeleteHandler &&
!RegisterContext->UnloadHandler) {
ERROR(("NatCreateDirector: bad argument\n"));
return STATUS_INVALID_PARAMETER;
}
//
// Allocate a new director-struct
//
Director =
ExAllocatePoolWithTag(
NonPagedPool, sizeof(NAT_DIRECTOR), NAT_TAG_DIRECTOR
);
if (!Director) {
ERROR(("NatCreateDirector: allocation failed\n"));
return STATUS_NO_MEMORY;
}
KeInitializeSpinLock(&Director->Lock);
Director->ReferenceCount = 1;
Director->Flags = RegisterContext->Flags;
Director->Key =
MAKE_DIRECTOR_KEY(RegisterContext->Protocol, RegisterContext->Port);
InitializeListHead(&Director->MappingList);
Director->Context = RegisterContext->DirectorContext;
Director->CreateHandler = RegisterContext->CreateHandler;
Director->DeleteHandler = RegisterContext->DeleteHandler;
Director->QueryHandler = RegisterContext->QueryHandler;
Director->UnloadHandler = RegisterContext->UnloadHandler;
KeAcquireSpinLock(&DirectorLock, &Irql);
if (NatLookupDirector(Director->Key, &InsertionPoint)) {
KeReleaseSpinLock(&DirectorLock, Irql);
ERROR(
("NatCreateDirector: duplicate director %d/%d\n",
RegisterContext->Protocol, RegisterContext->Port)
);
ExFreePool(Director);
return STATUS_UNSUCCESSFUL;
}
InsertTailList(InsertionPoint, &Director->Link);
KeReleaseSpinLock(&DirectorLock, Irql);
InterlockedIncrement(&DirectorCount);
//
// Supply the caller with 'out' information
//
RegisterContext->DirectorHandle = (PVOID)Director;
RegisterContext->QueryInfoSession = NatDirectorQueryInfoSession;
RegisterContext->Deregister = NatDirectorDeregister;
RegisterContext->DissociateSession = NatDirectorDissociateSession;
return STATUS_SUCCESS;
} // NatCreateDirector
NTSTATUS
NatDeleteDirector(
PNAT_DIRECTOR Director
)
/*++
Routine Description:
Handles director deletion.
Arguments:
Director - specifies the director to be deleted.
Return Value
NTSTATUS - status code.
--*/
{
KIRQL Irql;
CALLTRACE(("NatDeleteDirector\n"));
if (!Director) { return STATUS_INVALID_PARAMETER; }
InterlockedDecrement(&DirectorCount);
//
// Remove the director from the list
//
KeAcquireSpinLock(&DirectorLock, &Irql);
RemoveEntryList(&Director->Link);
Director->Flags |= NAT_DIRECTOR_FLAG_DELETED;
KeReleaseSpinLock(&DirectorLock, Irql);
//
// Drop its reference count and cleanup if necessary
//
if (InterlockedDecrement(&Director->ReferenceCount) > 0) {
return STATUS_PENDING;
}
NatCleanupDirector(Director);
return STATUS_SUCCESS;
} // NatDeleteDirector
VOID
NatInitializeDirectorManagement(
VOID
)
/*++
Routine Description:
This routine prepares the director-management module for operation.
Arguments:
none.
Return Value:
none.
--*/
{
CALLTRACE(("NatInitializeDirectorManagement\n"));
DirectorCount = 0;
KeInitializeSpinLock(&DirectorLock);
InitializeListHead(&DirectorList);
KeInitializeSpinLock(&DirectorMappingLock);
} // NatInitializeDirectorManagement
PNAT_DIRECTOR
NatLookupAndReferenceDirector(
UCHAR Protocol,
USHORT Port
)
/*++
Routine Description:
This routine is called to search for a director for the given
incoming protocol and port, and to obtain a referenced pointer
to such a director.
This routine must be invoked at DISPATCH_LEVEL.
Arguments:
Protocol - the protocol of the director to be looked up
Port - the port-number of the director to be looked up
Return Value:
PNAT_DIRECTOR - the references director if found; NULL otherwise.
--*/
{
PNAT_DIRECTOR Director;
ULONG Key;
PLIST_ENTRY Link;
KeAcquireSpinLockAtDpcLevel(&DirectorLock);
if (IsListEmpty(&DirectorList)) {
KeReleaseSpinLockFromDpcLevel(&DirectorLock); return NULL;
}
Key = MAKE_DIRECTOR_KEY(Protocol, Port);
//
// Our support for wildcards takes advantage of the fact that
// all wildcards are designated by zero; hence, since our list
// is in descending order we only need to look for wildcards
// at the point where we would break off a normal search.
//
for (Link = DirectorList.Flink; Link != &DirectorList; Link = Link->Flink) {
Director = CONTAINING_RECORD(Link, NAT_DIRECTOR, Link);
if (Key < Director->Key) {
continue;
} else if (Key > Director->Key) {
//
// End of normal search. Now look for wildcards
//
do {
if ((!DIRECTOR_KEY_PROTOCOL(Director->Key) ||
Protocol == DIRECTOR_KEY_PROTOCOL(Director->Key)) &&
(!DIRECTOR_KEY_PORT(Director->Key) ||
Port == DIRECTOR_KEY_PORT(Director->Key))) {
//
// We have a matching wildcard.
//
break;
}
Link = Link->Flink;
Director = CONTAINING_RECORD(Link, NAT_DIRECTOR, Link);
} while (Link != &DirectorList);
if (Link == &DirectorList) { break; }
}
//
// We've found it. Reference it and return.
//
if (!NatReferenceDirector(Director)) { Director = NULL; }
KeReleaseSpinLockFromDpcLevel(&DirectorLock);
return Director;
}
KeReleaseSpinLockFromDpcLevel(&DirectorLock);
return NULL;
} // NatLookupAndReferenceDirector
PNAT_DIRECTOR
NatLookupDirector(
ULONG Key,
PLIST_ENTRY* InsertionPoint
)
/*++
Routine Description:
This routine is called to retrieve the director corresponding to the given
key.
Arguments:
Key - the key for which an director is to be found
InsertionPoint - receives the point at which the director should be
inserted if not found
Return Value:
PNAT_DIRECTOR - the required director, if found
--*/
{
PNAT_DIRECTOR Director;
PLIST_ENTRY Link;
for (Link = DirectorList.Flink; Link != &DirectorList; Link = Link->Flink) {
Director = CONTAINING_RECORD(Link, NAT_DIRECTOR, Link);
if (Key < Director->Key) {
continue;
} else if (Key > Director->Key) {
break;
}
return Director;
}
if (InsertionPoint) { *InsertionPoint = Link; }
return NULL;
} // NatLookupDirector
VOID
NatMappingAttachDirector(
PNAT_DIRECTOR Director,
PVOID DirectorSessionContext,
PNAT_DYNAMIC_MAPPING Mapping
)
/*++
Routine Description:
This routine is invoked to attach a mapping to a director.
It serves as a notification that there is one more mapping
associated with the director.
Arguments:
Director - the director for the mapping
DirectorSessionContext - context associated with the mapping by the director
Mapping - the mapping to be attached.
Return Value:
none.
Environment:
Always invoked at dispatch level with 'DirectorLock' and
'DirectorMappingLock' held by the caller.
--*/
{
Mapping->Director = Director;
Mapping->DirectorContext = DirectorSessionContext;
InsertTailList(&Director->MappingList, &Mapping->DirectorLink);
if (Director->CreateHandler) {
Director->CreateHandler(
Mapping,
Director->Context,
DirectorSessionContext
);
}
} // NatMappingAttachDirector
VOID
NatMappingDetachDirector(
PNAT_DIRECTOR Director,
PVOID DirectorSessionContext,
PNAT_DYNAMIC_MAPPING Mapping,
IP_NAT_DELETE_REASON DeleteReason
)
/*++
Routine Description:
This routine is invoked to detach a mapping from a director.
It serves as a notification that there is one less mapping
associated with the director.
Arguments:
Director - director to be detached
DirectorSessionContext - context associated with the director
Mapping - the mapping to be detached, or NULL if a mapping could not be
created.
Return Value:
none.
Environment:
Always invoked at dispatch level with 'DirectorLock' and
'DirectorMappingLock' held, in that order.
--*/
{
KIRQL Irql;
if (!Mapping) {
if (Director->DeleteHandler) {
Director->DeleteHandler(
NULL,
Director->Context,
DirectorSessionContext,
DeleteReason
);
}
} else {
if (Director->DeleteHandler) {
Director->DeleteHandler(
Mapping,
Director->Context,
Mapping->DirectorContext,
DeleteReason
);
}
RemoveEntryList(&Mapping->DirectorLink);
Mapping->Director = NULL;
Mapping->DirectorContext = NULL;
}
} // NatMappingDetachDirector
NTSTATUS
NatQueryDirectorTable(
IN PIP_NAT_ENUMERATE_DIRECTORS InputBuffer,
IN PIP_NAT_ENUMERATE_DIRECTORS OutputBuffer,
IN PULONG OutputBufferLength
)
/*++
Routine Description:
This routine is used for enumerating the registered directors.
Arguments:
InputBuffer - supplies context information for the information
OutputBuffer - receives the result of the enumeration
OutputBufferLength - size of the i/o buffer
Return Value:
STATUS_SUCCESS if successful, error code otherwise.
--*/
{
ULONG Count;
ULONG i;
KIRQL Irql;
ULONG Key;
PLIST_ENTRY Link;
PNAT_DIRECTOR Director;
NTSTATUS status;
PIP_NAT_DIRECTOR Table;
CALLTRACE(("NatQueryDirectorTable\n"));
Key = InputBuffer->EnumerateContext;
KeAcquireSpinLock(&DirectorLock, &Irql);
//
// See if this is a new enumeration or a continuation of an old one.
//
if (!Key) {
//
// This is a new enumeration. We start with the first item
// in the list of entries
//
Director =
IsListEmpty(&DirectorList)
? NULL
: CONTAINING_RECORD(DirectorList.Flink, NAT_DIRECTOR, Link);
} else {
//
// This is a continuation. The context therefore contains
// the key for the next entry.
//
Director = NatLookupDirector(Key, NULL);
}
if (!Director) {
OutputBuffer->EnumerateCount = 0;
OutputBuffer->EnumerateContext = 0;
OutputBuffer->EnumerateTotalHint = DirectorCount;
*OutputBufferLength =
FIELD_OFFSET(IP_NAT_ENUMERATE_DIRECTORS, EnumerateTable);
KeReleaseSpinLock(&DirectorLock, Irql);
return STATUS_SUCCESS;
}
//
// Compute the maximum number of entries we can store
//
Count =
*OutputBufferLength -
FIELD_OFFSET(IP_NAT_ENUMERATE_DIRECTORS, EnumerateTable);
Count /= sizeof(IP_NAT_DIRECTOR);
//
// Walk the list storing entries in the caller's buffer
//
Table = OutputBuffer->EnumerateTable;
for (i = 0, Link = &Director->Link; i < Count && Link != &DirectorList;
i++, Link = Link->Flink) {
Director = CONTAINING_RECORD(Link, NAT_DIRECTOR, Link);
Table[i].Protocol = DIRECTOR_KEY_PROTOCOL(Director->Key);
Table[i].Port = DIRECTOR_KEY_PORT(Director->Key);
}
//
// The enumeration is over; update the output structure
//
*OutputBufferLength =
i * sizeof(IP_NAT_DIRECTOR) +
FIELD_OFFSET(IP_NAT_ENUMERATE_DIRECTORS, EnumerateTable);
OutputBuffer->EnumerateCount = i;
OutputBuffer->EnumerateTotalHint = DirectorCount;
if (Link == &DirectorList) {
//
// We reached the end of the list
//
OutputBuffer->EnumerateContext = 0;
} else {
//
// Save the continuation context
//
OutputBuffer->EnumerateContext =
CONTAINING_RECORD(Link, NAT_DIRECTOR, Link)->Key;
}
KeReleaseSpinLock(&DirectorLock, Irql);
return STATUS_SUCCESS;
} // NatQueryDirectorTable
VOID
NatShutdownDirectorManagement(
VOID
)
/*++
Routine Description:
This routine shuts down the director-management module.
Arguments:
none.
Return Value:
none.
--*/
{
PNAT_DIRECTOR Director;
KIRQL Irql;
CALLTRACE(("NatShutdownDirectorManagement\n"));
//
// Delete all directors
//
KeAcquireSpinLock(&DirectorLock, &Irql);
while (!IsListEmpty(&DirectorList)) {
Director = CONTAINING_RECORD(DirectorList.Flink, NAT_DIRECTOR, Link);
RemoveEntryList(&Director->Link);
KeReleaseSpinLockFromDpcLevel(&DirectorLock);
NatCleanupDirector(Director);
KeAcquireSpinLockAtDpcLevel(&DirectorLock);
}
KeReleaseSpinLock(&DirectorLock, Irql);
} // NatShutdownDirectorManagement
//
// DIRECTOR HELPER ROUTINES
//
// The caller is assumed to be running at DISPATCH_LEVEL.
//
NTSTATUS
NatDirectorDeregister(
IN PVOID DirectorHandle
)
/*++
Routine Description:
This routine is called by a director to remove itself
from the director list.
Arguments:
DirectorHandle - handle of the director to be removed.
Return Value:
NTSTATUS - status code.
--*/
{
CALLTRACE(("NatDirectorDeregister\n"));
return NatDeleteDirector((PNAT_DIRECTOR)DirectorHandle);
} // NatDirectorDeregister
NTSTATUS
NatDirectorDissociateSession(
IN PVOID DirectorHandle,
IN PVOID SessionHandle
)
/*++
Routine Description:
This routine is called by a director to dissociate itself from a specific
session.
Arguments:
DirectorHandle - the director which wishes to dissociate itself.
SessionHandle - the session from which the director is disssociating itself.
Return Value:
NTSTATUS - indicates success/failure
Environment:
Invoked at dispatch level with neither 'DirectorLock' nor
'DirectorMappingLock' held by the caller.
--*/
{
PNAT_DIRECTOR Director = (PNAT_DIRECTOR)DirectorHandle;
KIRQL Irql;
PNAT_DYNAMIC_MAPPING Mapping = (PNAT_DYNAMIC_MAPPING)SessionHandle;
CALLTRACE(("NatDirectorDissociateSession\n"));
KeAcquireSpinLock(&DirectorLock, &Irql);
if (Mapping->Director != Director) {
KeReleaseSpinLock(&DirectorLock, Irql);
return STATUS_INVALID_PARAMETER;
}
KeAcquireSpinLockAtDpcLevel(&DirectorMappingLock);
NatMappingDetachDirector(
Director,
Mapping->DirectorContext,
Mapping,
NatDissociateDirectorDeleteReason
);
KeReleaseSpinLockFromDpcLevel(&DirectorMappingLock);
if (!NAT_MAPPING_DELETE_ON_DISSOCIATE_DIRECTOR(Mapping)) {
KeReleaseSpinLock(&DirectorLock, Irql);
} else {
KeReleaseSpinLockFromDpcLevel(&DirectorLock);
KeAcquireSpinLockAtDpcLevel(&MappingLock);
NatDeleteMapping(Mapping);
KeReleaseSpinLock(&MappingLock, Irql);
}
return STATUS_SUCCESS;
} // NatDirectorDissociateSession
VOID
NatDirectorQueryInfoSession(
IN PVOID SessionHandle,
OUT PIP_NAT_SESSION_MAPPING_STATISTICS Statistics OPTIONAL
)
/*++
Routine Description:
This routine is invoked by a director to obtain information
about a session.
Arguments:
SessionHandle - the session for which information is required
Statistics - receives statistics for the session
Return Value:
none.
Environment:
Invoked
--*/
{
KIRQL Irql;
KeAcquireSpinLock(&MappingLock, &Irql);
NatQueryInformationMapping(
(PNAT_DYNAMIC_MAPPING)SessionHandle,
NULL,
NULL,
NULL,
NULL,
NULL,
NULL,
NULL,
Statistics
);
KeReleaseSpinLock(&MappingLock, Irql);
} // NatDirectorQueryInfoSession