Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

3801 lines
137 KiB

/*==========================================================================
*
* Copyright (C) 1998-2002 Microsoft Corporation. All Rights Reserved.
*
* File: Receive.cpp
* Content: This file contains code which receives indications of incoming data
* from a ServiceProvider, cracks the data, and handles it appropriately.
* History:
* Date By Reason
* ==== == ======
* 11/06/98 ejs Created
* 07/01/2000 masonb Assumed Ownership
*
****************************************************************************/
#include "dnproti.h"
// local protos
BOOL CancelFrame(PEPD, BYTE, DWORD tNow, PSPRECEIVEDBUFFER* ppRcvBuffToFree);
VOID CompleteSends(PEPD);
VOID DropReceive(PEPD, PRCD, PSPRECEIVEDBUFFER* ppRcvBuffToFree);
HRESULT IndicateReceive(PSPD, PSPIE_DATA);
#ifndef DPNBUILD_NOMULTICAST
HRESULT IndicateReceiveUnknownSender(PSPD, PSPIE_DATA_UNKNOWNSENDER);
#endif // ! DPNBUILD_NOMULTICAST
HRESULT ProcessUnconnectedData(PSPD, PSPIE_DATA_UNCONNECTED);
HRESULT IndicateConnect(PSPD, PSPIE_CONNECT);
HRESULT ProcessEnumQuery( PSPD, PSPIE_QUERY );
HRESULT ProcessQueryResponse( PSPD, PSPIE_QUERYRESPONSE );
VOID ProcessConnectedResponse(PSPD, PEPD, PCFRAME, DWORD);
VOID ProcessConnectedSignedResponse(PSPD, PEPD, CFRAME_CONNECTEDSIGNED * , DWORD);
VOID ProcessConnectRequest(PSPD, PEPD, PCFRAME);
VOID ProcessEndOfStream(PEPD);
VOID ProcessListenStatus(PSPD, PSPIE_LISTENSTATUS);
VOID ProcessConnectAddressInfo(PSPD, PSPIE_CONNECTADDRESSINFO);
VOID ProcessEnumAddressInfo(PSPD, PSPIE_ENUMADDRESSINFO);
VOID ProcessListenAddressInfo(PSPD, PSPIE_LISTENADDRESSINFO);
VOID ProcessSendMask(PEPD, BYTE, ULONG, ULONG, DWORD tNow, PSPRECEIVEDBUFFER* ppRcvBuffToFree);
VOID ProcessSPDisconnect(PSPD, PSPIE_DISCONNECT);
VOID ReceiveInOrderFrame(PEPD, PRCD, PSPRECEIVEDBUFFER* ppRcvBuffToFree);
VOID ReceiveOutOfOrderFrame(PEPD, PRCD, ULONG, PSPRECEIVEDBUFFER* ppRcvBuffToFree);
VOID ProcessHardDisconnect(PEPD);
HRESULT CreateConnectedSignedReply(void * pvReplyBuffer, DWORD * pdwReplySize, DWORD dwSessID, DWORD dwAddressHash,
ULONGLONG ullConnectSecret, DWORD dwSigningFlags, DWORD tNow);
BOOL ValidateIncomingFrameSig(PEPD pEPD, BYTE * pbyFrame, DWORD dwFrameSize, BYTE bSeq, UNALIGNED ULONGLONG * pullFrameSig);
HRESULT CrackCommand(PSPD, PEPD, PSPRECEIVEDBUFFER, DWORD, PSPRECEIVEDBUFFER* ppRcvBuffToFree);
HRESULT CrackDataFrame(PSPD, PEPD, PSPRECEIVEDBUFFER, DWORD, PSPRECEIVEDBUFFER* ppRcvBuffToFree);
/*
** GetDFrameMaskHeaderSize
**
** Returns the size in bytes of the send/sack mask header in a dframe, when give
** the control byte from the dframe header.
**/
#undef DPF_MODNAME
#define DPF_MODNAME "GetDFrameMaskHeaderSize"
inline DWORD GetDFrameMaskHeaderSize(BYTE bControl)
{
DWORD dwLen=0;
if (bControl & PACKET_CONTROL_SACK_MASK1)
{
dwLen += sizeof(DWORD);
}
if (bControl & PACKET_CONTROL_SACK_MASK2)
{
dwLen += sizeof(DWORD);
}
if (bControl & PACKET_CONTROL_SEND_MASK1)
{
dwLen += sizeof(DWORD);
}
if (bControl & PACKET_CONTROL_SEND_MASK2)
{
dwLen += sizeof(DWORD);
}
return dwLen;
}
/*
** Indicate Receive
**
** Service Provider calls this entry when data arrives on the network.
** We will quickly validate the frame and then figure what to do with it...
**
** Poll/Response activity should be handled before data is indicated to
** clients. We want to measure the network latency up to delivery, not including
** delivery.
*/
#undef DPF_MODNAME
#define DPF_MODNAME "DNSP_IndicateEvent"
HRESULT WINAPI DNSP_IndicateEvent(IDP8SPCallback *pIDNSP, SP_EVENT_TYPE Opcode, PVOID DataBlock)
{
HRESULT hr;
PSPD pSPD;
hr = DPN_OK;
pSPD = (PSPD)pIDNSP;
ASSERT_SPD(pSPD);
switch(Opcode)
{
case SPEV_DATA:
hr = IndicateReceive(pSPD, (PSPIE_DATA) DataBlock);
break;
case SPEV_CONNECT:
hr = IndicateConnect(pSPD, (PSPIE_CONNECT) DataBlock);
break;
case SPEV_ENUMQUERY:
hr = ProcessEnumQuery( pSPD, (PSPIE_QUERY) DataBlock );
break;
case SPEV_QUERYRESPONSE:
hr = ProcessQueryResponse( pSPD, (PSPIE_QUERYRESPONSE) DataBlock );
break;
case SPEV_DISCONNECT:
ProcessSPDisconnect(pSPD, (PSPIE_DISCONNECT) DataBlock);
break;
case SPEV_LISTENSTATUS:
ProcessListenStatus(pSPD, (PSPIE_LISTENSTATUS) DataBlock);
break;
case SPEV_LISTENADDRESSINFO:
ProcessListenAddressInfo(pSPD, (PSPIE_LISTENADDRESSINFO) DataBlock);
break;
case SPEV_CONNECTADDRESSINFO:
ProcessConnectAddressInfo(pSPD, (PSPIE_CONNECTADDRESSINFO) DataBlock);
break;
case SPEV_ENUMADDRESSINFO:
ProcessEnumAddressInfo(pSPD, (PSPIE_ENUMADDRESSINFO) DataBlock);
break;
case SPEV_DATA_UNCONNECTED:
hr = ProcessUnconnectedData(pSPD, (PSPIE_DATA_UNCONNECTED) DataBlock);
break;
#ifndef DPNBUILD_NOMULTICAST
case SPEV_DATA_UNKNOWNSENDER:
hr = IndicateReceiveUnknownSender(pSPD, (PSPIE_DATA_UNKNOWNSENDER) DataBlock);
break;
#endif // ! DPNBUILD_NOMULTICAST
// SP passed something unexpected
default:
DPFX(DPFPREP,0, "Unknown Event indicated by SP");
ASSERT(0);
break;
}
AssertNoCriticalSectionsFromGroupTakenByThisThread(&g_blProtocolCritSecsHeld);
return hr;
}
/*
** Process Unconnected Data
**
** This event is indicated when the SP receives data from a sender
** for which we don't have a connected endpoint. We return DPN_OK to
** allow the SP to connect an endpoint and indicate the data again off the
** new endpoint. Alternatively we can have the SP reply to the sender
** without allocating an endpoint, or we can return DPNERR_ABORTED to
** ignore the data.
*/
#undef DPF_MODNAME
#define DPF_MODNAME "ProcessUnconnectedData"
HRESULT ProcessUnconnectedData(PSPD pSPD, PSPIE_DATA_UNCONNECTED pUnconnectedData)
{
PMSD pMSD = (PMSD) pUnconnectedData->pvListenCommandContext;
BYTE byPktCommand=*pUnconnectedData->pReceivedData->BufferDesc.pBufferData;
DWORD dwDataLength = pUnconnectedData->pReceivedData->BufferDesc.dwBufferSize;
ASSERT_MSD(pMSD);
ASSERT(pMSD->pSPD == pSPD);
DPFX(DPFPREP,DPF_CALLIN_LVL, "Parameters: pSPD[%p], pUnconnectedData[%p] - pMSD[%p]", pSPD, pUnconnectedData, pMSD);
//if we've been told to remove the service provider we shouldn't process anything else.
//Tell sp to dump this incoming data
if(pSPD->ulSPFlags & SPFLAGS_TERMINATING)
{
DPFX(DPFPREP, 5, "SP is terminating, returning DPNERR_ABORTED, pSPD[%p]", pSPD);
return DPNERR_ABORTED;
}
//check that we still have a valid listen running to handle this data
Lock(&pMSD->CommandLock);
//make sure this actually is a listen command
//Note sure if its possible for it to be anything else, but we'll code robustly
if(pMSD->CommandID != COMMAND_ID_LISTEN)
{
DPFX(DPFPREP,0, "Received unconnected data and MSD not marked as LISTEN pMSD[%p] "
"pMSD->CommandID[%u]", pMSD, (DWORD ) pMSD->CommandID);
DNASSERTX(FALSE, 0);
Unlock(&pMSD->CommandLock);
return DPNERR_ABORTED;
}
//if the listen has already been cancelled then drop incoming data on the floor
if(pMSD->ulMsgFlags1 & MFLAGS_ONE_CANCELLED)
{
DPFX(DPFPREP, 5, "Received unconnected data on a cancelled listen pSPD[%p] pMSD[%p]", pSPD, pMSD);
Unlock(&pMSD->CommandLock);
return DPNERR_ABORTED;
}
//store the session signing type and the connect secrets
DWORD dwSigningType=0;
ULONGLONG ullLastConnectSecret, ullCurrentConnectSecret;
DWORD tNow=GETTIMESTAMP();
if (pMSD->ulMsgFlags1 & MFLAGS_ONE_SIGNED)
{
if (pMSD->ulMsgFlags1 & MFLAGS_ONE_FAST_SIGNED)
{
dwSigningType=PACKET_SIGNING_FAST;
}
else
{
DNASSERT(pMSD->ulMsgFlags1 & MFLAGS_ONE_FULL_SIGNED);
dwSigningType=PACKET_SIGNING_FULL;
}
//check how much time has elapsed since we last updated the connect secret.
//if its exceed a pre-determined amount then lets pick a new connect secret
if ((tNow-pMSD->dwTimeConnectSecretChanged)>CONNECT_SECRET_CHANGE_INTERVAL)
{
pMSD->ullLastConnectSecret=pMSD->ullCurrentConnectSecret;
DNGetGoodRandomData(&pMSD->ullCurrentConnectSecret, sizeof(pMSD->ullCurrentConnectSecret));
pMSD->dwTimeConnectSecretChanged=tNow;
}
//store the current connect secrets locally.
ullLastConnectSecret=pMSD->ullLastConnectSecret;
ullCurrentConnectSecret=pMSD->ullCurrentConnectSecret;
}
//we're done with the MSD now so can unlock its
Unlock(&pMSD->CommandLock);
//once we get here we've got a valid SP reporting data for a valid listen.
//now need to check if the frame is actually interesting.
//The only things we care about are the cframes CONNECT and CONNECTED_SIGNED and the dframe keep alives
//N.B. We pick up on keep alives because of the possible connect sequence
//Connect recv, ConnectedSigned sent, ConnectSigned should be recv but is dropped
//in this case the connector will think the link is valid but the listener will have no record of them
//we therefore use the keep alive the connector will send at first as a clue to send another ConnectedSigned from the
//listening side
//have we got a dframe?
if( (dwDataLength >= MIN_SEND_DFRAME_HEADER_SIZE) &&
(byPktCommand & PACKET_COMMAND_DATA))
{
PDFRAME pDFrame=(PDFRAME) pUnconnectedData->pReceivedData->BufferDesc.pBufferData;
//if we haven't got a signed session then we don't care what sort of dframe this is. This clearly isn't
//the start of a connection and we don't have to handle the ConnectedSigned dropped case outlined above
if ((dwSigningType & (PACKET_SIGNING_FAST | PACKET_SIGNING_FULL))==0)
{
DPFX(DPFPREP, 5, "Rejecting unconnected dframe received for an unsigned session");
return DPNERR_ABORTED;
}
//only unconnected dframe we care about in a signed session is a new style keep alive.
//i.e. one with a session identity in it, rather than simple zero data
//The control flags for this kind of keep alive are retry=don't care, keepalive=set, coalesce=clear and eos=clear
//it should also have a zero sequence count, since we only care about the keep alive sent on a new connection
if (((pDFrame->bControl & PACKET_CONTROL_KEEPALIVE)==0) ||
(pDFrame->bControl & (PACKET_CONTROL_END_STREAM | PACKET_CONTROL_COALESCE)) ||
pDFrame->bSeq!=0)
{
DPFX(DPFPREP, 5, "Rejecting unconnected dframe that doesn't look like a keep alive");
return DPNERR_ABORTED;
}
//size must be at least big enough to hold data that we require
//i.e. DFRAME header, whatever the mask size is, the signature, and then the DWORD session identity
DWORD dwRequiredSize=sizeof(DFRAME)+GetDFrameMaskHeaderSize(pDFrame->bControl)+sizeof(ULONGLONG)+sizeof(DWORD);
if (dwDataLength<dwRequiredSize)
{
DPFX(DPFPREP, 0, "Rejected unconnected keep alive dframe that's too short");
return DPNERR_ABORTED;
}
//looks like we've got a keep alive that meets all our criteria for sending a CONNECTED_SIGNED response
return CreateConnectedSignedReply(pUnconnectedData->pvReplyBuffer, &pUnconnectedData->dwReplyBufferSize,
*((DWORD * ) ((((BYTE* ) pDFrame)+dwRequiredSize-sizeof(DWORD)))), pUnconnectedData->dwSenderAddressHash,
ullCurrentConnectSecret, dwSigningType, tNow);
}
//have we got a cframe?
if ((dwDataLength >= MIN_SEND_CFRAME_HEADER_SIZE) &&
((byPktCommand == PACKET_COMMAND_CFRAME) ||
(byPktCommand == (PACKET_COMMAND_CFRAME|PACKET_COMMAND_POLL))))
{
//looks like we've got a command frame.
PCFRAME pCFrame=(PCFRAME ) pUnconnectedData->pReceivedData->BufferDesc.pBufferData;
//if its not a type we're interested in then dump it
//N.B. We ignore FRAME_EXOPCODE_CONNECTED frames. If we haven't got a signed session we fall
//back to the connect data path on receiving a CONNECT. Hence, by the time we get the CONNECTED
//we should always have an associated endpoint
if (pCFrame->bExtOpcode!=FRAME_EXOPCODE_CONNECT &&
pCFrame->bExtOpcode!=FRAME_EXOPCODE_CONNECTED_SIGNED)
{
DPFX(DPFPREP, 5, "Rejecting unconnected cframe that is neither a CONNECT or CONNECTEDSIGNED");
return DPNERR_ABORTED;
}
//If the major version number doesn't match ours we can ignore this
if((pCFrame->dwVersion >> 16) != (DNET_VERSION_NUMBER >> 16))
{
DPFX(DPFPREP,1, "Received unconnected CFrame from incompatible version (theirs %x, ours %x)",
pCFrame->dwVersion, DNET_VERSION_NUMBER);
return DPNERR_ABORTED;
}
//if we've got a bogus session identity we can also throw this frame away
if (VersionSupportsSigning(pCFrame->dwVersion) && pCFrame->dwSessID==0)
{
DPFX(DPFPREP,1, "Received unconnected CFrame with invalid session identity");
return DPNERR_ABORTED;
}
if (pCFrame->bExtOpcode==FRAME_EXOPCODE_CONNECT)
{
//if the session isn't signed then fall back to the old code path of allocating an endpoint up front
//and kicking off the connect sequence
if ((dwSigningType & (PACKET_SIGNING_FAST | PACKET_SIGNING_FULL))==0)
{
DPFX(DPFPREP, 5, "Received CONNECT frame for unsigned session. Instructing SP to indicate an endpoint. "
"pSPD[%p] pMSD[%p]", pSPD, pMSD);
return DPN_OK;
}
//We've got a connect request to a signed session. Better make sure they support signing
if (VersionSupportsSigning(pCFrame->dwVersion)==FALSE)
{
//N.B. This approach means we'll appear unresponsive to far end and it'll time out the connect
//It would be nice to send a reject packet, but unfortunately the protocol has no support for that
DPFX(DPFPREP, 1, "Ignoring incoming CONNECT from protocol version that doesn't support signing. "
"pSPD[%p] Their Minor Version [%u]", pSPD, pCFrame->dwVersion & 0xFFFF);
return DPNERR_ABORTED;
}
//Looks like everything is valid and we should respond to the CONNECT with a CONNECTEDSIGNED cframe
return CreateConnectedSignedReply(pUnconnectedData->pvReplyBuffer, &pUnconnectedData->dwReplyBufferSize,
pCFrame->dwSessID, pUnconnectedData->dwSenderAddressHash,
ullCurrentConnectSecret, dwSigningType, tNow);
}
DNASSERT(pCFrame->bExtOpcode==FRAME_EXOPCODE_CONNECTED_SIGNED);
//make sure size matches minimum we expect
if (dwDataLength<sizeof(CFRAME_CONNECTEDSIGNED))
{
DPFX(DPFPREP, 0, "Rejecting CONNECTED_SIGNED cframe that is too short");
return DPNERR_ABORTED;
}
//make sure the signing type matches what we've got for the session
if ((((CFRAME_CONNECTEDSIGNED * ) pCFrame)->dwSigningOpts & (PACKET_SIGNING_FAST | PACKET_SIGNING_FULL))
!=dwSigningType)
{
DPFX(DPFPREP, 0, "Rejecting CONNECTED_SIGNED cframe with invalid signing options");
return DPNERR_ABORTED;
}
//we need to check the connect signature to ensure that we're seeing is a genuine response
//to an original CONNECTED_SIGNED frame we sent out
ULONGLONG ullConnectSig=GenerateConnectSig(pCFrame->dwSessID,
pUnconnectedData->dwSenderAddressHash, ullCurrentConnectSecret);
if (ullConnectSig!=((CFRAME_CONNECTEDSIGNED * ) pCFrame)->ullConnectSig)
{
//possible we're seeing a connect response that's overlapped with a change in the connect secret
//so lets check the previous connect secret
ullConnectSig=GenerateConnectSig(pCFrame->dwSessID,
pUnconnectedData->dwSenderAddressHash, ullLastConnectSecret);
if (ullConnectSig!=((CFRAME_CONNECTEDSIGNED * ) pCFrame)->ullConnectSig)
{
DPFX(DPFPREP, 0, "Rejecting CONNECTED_SIGNED cframe that has an invalid connection signature");
return DPNERR_ABORTED;
}
}
//looks like we've got a valid CONNECTEDSIGNED response. This tells us that the original connect wasn't from
//a fake IP and we've got a valid remote host to form the connection with. Return OK to tell the SP to allocate
//an endpoint for this connection
return DPN_OK;
}
//looks like we got something weird that was neither a dframe or a cframe
DPFX(DPFPREP, 0, "Rejecting unconnected cframe that is neither a dframe or cframe");
return DPNERR_ABORTED;
}
/*
** Indicate Connect
**
** This event is indicated for both calling and listening sides. The
** calling side will do most of its work when the SP Connect call completes
** and the listening side will do most of its work when the CONNECT frame
** gets delivered. All we do here is allocate the EPD and attach it to the
** MSD (for calling case)
**
** Since we have a connect protocol, there will always be a CONNECT
** frame following closely on the heels of this indication. Therefore,
** there is not a whole lot of stuff that we need to do here. We will
** allocate the EndPoint and leave it dormant.
**
** Synchronization Issue: We have decided that if an SP Listen command is cancelled,
** the cancel call will not complete until all ConnectIndications have returned from the
** protocol. This means that we are GUARANTEED that the Listen command in the context
** will be valid throughout this call. This is important because now we can add a reference
** to the Listen's MSD here and now and we will know that it wont disappear on us before we
** do it. Truth, however, is that there will be a race until SP fixes itself to follow
** this behavior.
*/
#undef DPF_MODNAME
#define DPF_MODNAME "IndicateConnect"
HRESULT IndicateConnect(PSPD pSPD, PSPIE_CONNECT pConnData)
{
PEPD pEPD;
PMSD pMSD;
pMSD = (PMSD) pConnData->pCommandContext;
ASSERT_MSD(pMSD);
ASSERT(pMSD->pSPD == pSPD);
DPFX(DPFPREP,DPF_CALLIN_LVL, "Parameters: pSPD[%p], pConnData[%p] - pMSD[%p]", pSPD, pConnData, pMSD);
Lock(&pMSD->CommandLock);
LOCK_MSD(pMSD, "EPD Ref"); // Place a reference on the command object. This prevents it from
// going away during the Connect Protocol, an assumption which simplifies
// life extraordinarily. We will want to ASSERT this fact, however, to make
// sure that SP is playing by our rules.
if ((pMSD->CommandID != COMMAND_ID_CONNECT) && (pMSD->CommandID != COMMAND_ID_LISTEN)
#ifndef DPNBUILD_NOMULTICAST
&& (pMSD->CommandID != COMMAND_ID_CONNECT_MULTICAST_SEND) && (pMSD->CommandID != COMMAND_ID_CONNECT_MULTICAST_RECEIVE)
#endif // DPNBUILD_NOMULTICAST
)
{
DPFX(DPFPREP,1, "Connect Rejected - CommandID is not Connect or Listen, returning DPNERR_ABORTED, pMSD[%p]", pMSD);
RELEASE_MSD(pMSD, "EPD Ref"); // Releases CommandLock
return DPNERR_ABORTED;
}
if ((pMSD->CommandID == COMMAND_ID_CONNECT
#ifndef DPNBUILD_NOMULTICAST
|| (pMSD->CommandID == COMMAND_ID_CONNECT_MULTICAST_SEND)
|| (pMSD->CommandID == COMMAND_ID_CONNECT_MULTICAST_RECEIVE)
#endif // DPNBUILD_NOMULTICAST
) && (pMSD->pEPD != NULL))
{
DPFX(DPFPREP,1, "Connect Rejected - Connect command already has an endpoint, returning DPNERR_ABORTED, pMSD[%p], pEPD[%p]", pMSD, pMSD->pEPD);
RELEASE_MSD(pMSD, "EPD Ref"); // Releases CommandLock
return DPNERR_ABORTED;
}
if(pMSD->ulMsgFlags1 & MFLAGS_ONE_CANCELLED)
{
DPFX(DPFPREP,1, "Connect Rejected - Command is cancelled, returning DPNERR_ABORTED, pMSD[%p]", pMSD);
RELEASE_MSD(pMSD, "EPD Ref"); // Releases CommandLock
return DPNERR_ABORTED;
}
if((pEPD = NewEndPoint(pSPD, pConnData->hEndpoint)) == NULL)
{
DPFX(DPFPREP,0, "Failed to allocate new EPD, returning DPNERR_ABORTED, pMSD[%p]", pMSD);
RELEASE_MSD(pMSD, "EPD Ref"); // Releases CommandLock
return DPNERR_ABORTED; // This error will implicitly DISCONNECT from Endpoint
}
// Associate either the Connect or Listen with this Endpoint, this will be removed when the connection is complete.
// The EPD Ref placed above will be carried around until this is NULL'd.
pEPD->pCommand = pMSD;
if(pMSD->CommandID == COMMAND_ID_CONNECT)
{
DPFX(DPFPREP,5, "INDICATE CONNECT (CALLING) -- EPD = %p, pMSD[%p]", pEPD, pMSD);
pMSD->pEPD = pEPD;
}
#ifndef DPNBUILD_NOMULTICAST
else if (pMSD->CommandID == COMMAND_ID_CONNECT_MULTICAST_SEND)
{
DPFX(DPFPREP,5, "INDICATE MULTICAST SEND CONNECT (CALLING) -- EPD = %p, pMSD[%p]", pEPD, pMSD);
pEPD->ulEPFlags |= EPFLAGS_STATE_CONNECTED | EPFLAGS_STREAM_UNBLOCKED;
pEPD->ulEPFlags2 |= EPFLAGS2_MULTICAST_SEND;
pMSD->pEPD = pEPD;
}
else if (pMSD->CommandID == COMMAND_ID_CONNECT_MULTICAST_RECEIVE)
{
DPFX(DPFPREP,5, "INDICATE MULTICAST RECEIVE CONNECT (CALLING) -- EPD = %p, pMSD[%p]", pEPD, pMSD);
pEPD->ulEPFlags |= EPFLAGS_STATE_CONNECTED | EPFLAGS_STREAM_UNBLOCKED;
pEPD->ulEPFlags2 |= EPFLAGS2_MULTICAST_RECEIVE;
pMSD->pEPD = pEPD;
}
#endif // DPNBUILD_NOMULTICAST
else
{
DPFX(DPFPREP,5, "INDICATE CONNECT (LISTENING) -- EPD = %p, pMSD[%p]", pEPD, pMSD);
ASSERT(pMSD->CommandID == COMMAND_ID_LISTEN);
ASSERT((pEPD->ulEPFlags & EPFLAGS_LINKED_TO_LISTEN)==0);
// For a Listen command, connecting endpoints are held on the blFrameList
pEPD->blSPLinkage.InsertBefore( &pMSD->blFrameList);
pEPD->ulEPFlags |= EPFLAGS_LINKED_TO_LISTEN;
}
pConnData->pEndpointContext = pEPD;
Unlock(&pMSD->CommandLock);
return DPN_OK;
}
/*
** Indicate Receive
**
** A frame has been delivered by the service provider. We are Guaranteed to
** have an active Endpoint in our hash table (or else something is wrong). I have not
** decided whether I will respond to POLL bits at this high level or else let
** each handler repond in its own particular... eh... idiom.
**
** Our return value controls whether SP will recycle the receive buffer, or whether
** we can keep the buffer around until we are ready to indicate it to higher levels
** later on. If we return DPN_OK then we are done with the buffer and it will be recycled.
** If we return DPNERR_PENDING then we may hold on to the buffer until we release them later.
*/
#undef DPF_MODNAME
#define DPF_MODNAME "IndicateReceive"
HRESULT IndicateReceive(PSPD pSPD, PSPIE_DATA pDataBlock)
{
PEPD pEPD;
HRESULT hr;
BYTE byPktCommand;
DWORD tNow;
DWORD dwDataLength;
PSPRECEIVEDBUFFER pRcvBuffToFree;
pEPD = (PEPD)pDataBlock->pEndpointContext;
byPktCommand=*pDataBlock->pReceivedData->BufferDesc.pBufferData;
dwDataLength = pDataBlock->pReceivedData->BufferDesc.dwBufferSize;
tNow = GETTIMESTAMP();
pRcvBuffToFree = NULL;
DPFX(DPFPREP,DPF_CALLIN_LVL, "Parameters: pSPD[%p], pDataBlock[%p] - pEPD[%p]", pSPD, pDataBlock, pEPD);
if(pSPD->ulSPFlags & SPFLAGS_TERMINATING)
{
DPFX(DPFPREP,1, "(%p) SP is terminating, returning DPN_OK, pSPD[%p]", pEPD, pSPD);
return DPN_OK;
}
ASSERT_EPD(pEPD);
ASSERT(pEPD->pSPD == pSPD);
ASSERT(pDataBlock->hEndpoint == pEPD->hEndPt);
#ifndef DPNBUILD_NOMULTICAST
if (pEPD->ulEPFlags2 & EPFLAGS2_MULTICAST_RECEIVE)
{
PSPRECEIVEDBUFFER pRcvBuffer;
pRcvBuffer = pDataBlock->pReceivedData;
DNASSERT(pRcvBuffer != NULL);
DNASSERT(pRcvBuffer->pNext == NULL);
DNASSERT(pRcvBuffer->dwProtocolData == 0);
DNASSERT(pRcvBuffer->pServiceProviderDescriptor == NULL);
pRcvBuffer->dwProtocolData = RBT_SERVICE_PROVIDER_BUFFER;
pRcvBuffer->pServiceProviderDescriptor = pSPD;
DEBUG_ONLY(DNInterlockedIncrement(&pSPD->pPData->ThreadsInReceive));
DEBUG_ONLY(DNInterlockedIncrement(&pSPD->pPData->BuffersInReceive));
AssertNoCriticalSectionsFromGroupTakenByThisThread(&g_blProtocolCritSecsHeld);
DPFX(DPFPREP,DPF_CALLOUT_LVL, "(%p) Calling Core->IndicateReceive(multicast), Core Context[%p]", pEPD, pEPD->Context);
hr = pSPD->pPData->pfVtbl->IndicateReceive( pSPD->pPData->Parent,
pEPD->Context,
pRcvBuffer->BufferDesc.pBufferData,
pRcvBuffer->BufferDesc.dwBufferSize,
pRcvBuffer,
0);
if(hr == DPN_OK)
{
DEBUG_ONLY(DNInterlockedDecrement(&pSPD->pPData->BuffersInReceive));
}
else
{
ASSERT(hr == DPNERR_PENDING);
}
DEBUG_ONLY(DNInterlockedDecrement(&pSPD->pPData->ThreadsInReceive));
}
else
{
#endif // DPNBUILD_NOMULTICAST
// Hold a reference throughout the operation so we don't have to deal with the EPD going away.
LOCK_EPD(pEPD, "LOCK (IND RECEIVE)");
pEPD->tLastPacket = tNow; // Track last time each guy writes to us
#ifdef DBG
// copy this frame to buffer in EPD so we can look after a break.
DWORD dwLen = _MIN(sizeof(pEPD->LastPacket), pDataBlock->pReceivedData->BufferDesc.dwBufferSize);
memcpy(pEPD->LastPacket, pDataBlock->pReceivedData->BufferDesc.pBufferData, dwLen);
#endif // DBG
//take lock on endpoint
Lock(&pEPD->EPLock);
// A valid data packet is one that meets the length requirements and has the Data flag set.
// All other flags are allowed on a data frame (NOTE: even PACKET_COMMAND_CFRAME is allowed
// as it shares its value with PACKET_COMMAND_USER_2).
if( (dwDataLength >= MIN_SEND_DFRAME_HEADER_SIZE) && // Validate the length first
(byPktCommand & PACKET_COMMAND_DATA)) // Data goes this way
{
//if endpoint is marked as either hard disconnect source or target it won't process further data frames
if (pEPD->ulEPFlags & (EPFLAGS_HARD_DISCONNECT_SOURCE | EPFLAGS_HARD_DISCONNECT_TARGET))
{
Unlock(&pEPD->EPLock);
hr=DPN_OK;
}
else
{
hr = CrackDataFrame(pSPD, pEPD, pDataBlock->pReceivedData, tNow, &pRcvBuffToFree);
//above call will release ep lock
}
}
else if ((dwDataLength >= MIN_SEND_CFRAME_HEADER_SIZE) && // Validate the length first
((byPktCommand == PACKET_COMMAND_CFRAME) || // Only the CFRAME and POLL flags are allowed on a CFrame
(byPktCommand == (PACKET_COMMAND_CFRAME|PACKET_COMMAND_POLL))))
{
hr = CrackCommand(pSPD, pEPD, pDataBlock->pReceivedData, tNow, &pRcvBuffToFree);
//above call will release ep lock
}
else
{
DPFX(DPFPREP,1, "(%p) Received frame that is neither Command nor Data, rejecting", pEPD);
DNASSERTX(FALSE, 2);
RejectInvalidPacket(pEPD);
//above call will release ep lock
hr = DPN_OK;
}
// Free any buffers created during the receive
if (pRcvBuffToFree != NULL)
{
AssertNoCriticalSectionsFromGroupTakenByThisThread(&g_blProtocolCritSecsHeld);
DPFX(DPFPREP,DPF_CALLOUT_LVL, "(%p) Calling SP->ReturnReceiveBuffers, pSPD[%p], pRcvBuffToFree[%p]", pEPD, pSPD, pRcvBuffToFree);
IDP8ServiceProvider_ReturnReceiveBuffers(pSPD->IISPIntf, pRcvBuffToFree);
}
Lock(&pEPD->EPLock);
RELEASE_EPD(pEPD, "UNLOCK (IND RCV DONE)"); // Releases EPLock
#ifndef DPNBUILD_NOMULTICAST
}
#endif // DPNBUILD_NOMULTICAST
// This is either DPN_OK or DPNSUCCESS_PENDING. If it is pending we have to return the buffer later.
return hr;
}
#ifndef DPNBUILD_NOMULTICAST
/*
** Indicate Receive from an Unknown Sender
**
** A frame has been delivered by the service provider from some multicast sender for which
** we do not have an endpoint.
**
** Our return value controls whether SP will recycle the receive buffer, or whether
** we can keep the buffer around until we are ready to indicate it to higher levels
** later on. If we return DPN_OK then we are done with the buffer and it will be recycled.
** If we return DPNERR_PENDING then we may hold on to the buffer until we release them later.
*/
#undef DPF_MODNAME
#define DPF_MODNAME "IndicateReceiveUnknownSender"
HRESULT IndicateReceiveUnknownSender(PSPD pSPD, PSPIE_DATA_UNKNOWNSENDER pDataBlock)
{
HRESULT hr;
PMSD pMSD;
PSPRECEIVEDBUFFER pRcvBuffer;
pMSD = (PMSD) pDataBlock->pvListenCommandContext;
DPFX(DPFPREP,DPF_CALLIN_LVL, "Parameters: pSPD[%p], pDataBlock[%p] - pMSD[%p]", pSPD, pDataBlock, pMSD);
ASSERT_MSD(pMSD);
ASSERT(pMSD->pSPD == pSPD);
ASSERT(pMSD->CommandID == COMMAND_ID_LISTEN_MULTICAST);
pRcvBuffer = pDataBlock->pReceivedData;
DNASSERT(pRcvBuffer != NULL);
DNASSERT(pRcvBuffer->pNext == NULL);
DNASSERT(pRcvBuffer->dwProtocolData == 0);
DNASSERT(pRcvBuffer->pServiceProviderDescriptor == NULL);
pRcvBuffer->dwProtocolData = RBT_SERVICE_PROVIDER_BUFFER;
pRcvBuffer->pServiceProviderDescriptor = pSPD;
DEBUG_ONLY(DNInterlockedIncrement(&pSPD->pPData->ThreadsInReceive));
DEBUG_ONLY(DNInterlockedIncrement(&pSPD->pPData->BuffersInReceive));
AssertNoCriticalSectionsFromGroupTakenByThisThread(&g_blProtocolCritSecsHeld);
DPFX(DPFPREP,DPF_CALLOUT_LVL, "(%p) Calling Core->IndicateReceiveUnknownSender, Core Context[%p]", pMSD, pMSD->Context);
hr = pSPD->pPData->pfVtbl->IndicateReceiveUnknownSender(pSPD->pPData->Parent,
pMSD->Context,
pDataBlock->pSenderAddress,
pRcvBuffer->BufferDesc.pBufferData,
pRcvBuffer->BufferDesc.dwBufferSize,
pRcvBuffer);
if(hr == DPN_OK)
{
DEBUG_ONLY(DNInterlockedDecrement(&pSPD->pPData->BuffersInReceive));
}
else
{
ASSERT(hr == DPNERR_PENDING);
}
DEBUG_ONLY(DNInterlockedDecrement(&pSPD->pPData->ThreadsInReceive));
return hr;
}
#endif // ! DPNBUILD_NOMULTICAST
/*
** Process Enum Query
**
** A frame has been delivered by the service provider representing an enumereation
** query.
*/
#undef DPF_MODNAME
#define DPF_MODNAME "ProcessEnumQuery"
HRESULT ProcessEnumQuery( PSPD pSPD, PSPIE_QUERY pQueryBlock )
{
MSD *pMSD;
PROTOCOL_ENUM_DATA EnumData;
pMSD = static_cast<MSD*>( pQueryBlock->pUserContext );
ASSERT_MSD(pMSD);
ASSERT(pMSD->pSPD == pSPD);
DPFX(DPFPREP,DPF_CALLIN_LVL, "Parameters: pSPD[%p], pQueryBlock[%p] - pMSD[%p]", pSPD, pQueryBlock, pMSD);
EnumData.pSenderAddress = pQueryBlock->pAddressSender;
EnumData.pDeviceAddress = pQueryBlock->pAddressDevice;
EnumData.ReceivedData.pBufferData = pQueryBlock->pReceivedData->BufferDesc.pBufferData;
EnumData.ReceivedData.dwBufferSize = pQueryBlock->pReceivedData->BufferDesc.dwBufferSize;
EnumData.hEnumQuery = pQueryBlock;
DBG_CASSERT( sizeof( &EnumData ) == sizeof( PBYTE ) );
AssertNoCriticalSectionsFromGroupTakenByThisThread(&g_blProtocolCritSecsHeld);
DPFX(DPFPREP,DPF_CALLOUT_LVL, "(%p) Calling Core->IndicateEnumQuery, Core Context[%p]", pMSD, pMSD->Context);
pSPD->pPData->pfVtbl->IndicateEnumQuery( pSPD->pPData->Parent,
pMSD->Context,
pMSD,
reinterpret_cast<PBYTE>( &EnumData ),
sizeof( EnumData ));
return DPN_OK;
}
/*
** Process Query Response
**
** A frame has been delivered by the service provider representing a response to an enum.
*/
#undef DPF_MODNAME
#define DPF_MODNAME "ProcessQueryResponse"
HRESULT ProcessQueryResponse( PSPD pSPD, PSPIE_QUERYRESPONSE pQueryResponseBlock)
{
MSD *pMSD;
PROTOCOL_ENUM_RESPONSE_DATA EnumResponseData;
pMSD = static_cast<MSD*>( pQueryResponseBlock->pUserContext );
ASSERT_MSD(pMSD);
ASSERT(pMSD->pSPD == pSPD);
DPFX(DPFPREP,DPF_CALLIN_LVL, "Parameters: pSPD[%p], pQueryResponseBlock[%p] - pMSD[%p]", pSPD, pQueryResponseBlock, pMSD);
EnumResponseData.pSenderAddress = pQueryResponseBlock->pAddressSender;
EnumResponseData.pDeviceAddress = pQueryResponseBlock->pAddressDevice;
EnumResponseData.ReceivedData.pBufferData = pQueryResponseBlock->pReceivedData->BufferDesc.pBufferData;
EnumResponseData.ReceivedData.dwBufferSize = pQueryResponseBlock->pReceivedData->BufferDesc.dwBufferSize;
EnumResponseData.dwRoundTripTime = pQueryResponseBlock->dwRoundTripTime;
DBG_CASSERT( sizeof( &EnumResponseData ) == sizeof( PBYTE ) );
AssertNoCriticalSectionsFromGroupTakenByThisThread(&g_blProtocolCritSecsHeld);
DPFX(DPFPREP,DPF_CALLOUT_LVL, "(%p) Calling Core->IndicateEnumResponse, Core Context[%p]", pMSD, pMSD->Context);
pSPD->pPData->pfVtbl->IndicateEnumResponse( pSPD->pPData->Parent,
pMSD,
pMSD->Context,
reinterpret_cast<PBYTE>( &EnumResponseData ),
sizeof( EnumResponseData ));
return DPN_OK;
}
/*
** Reject Invalid Packet
**
** Called with EP Lock held. Returns with lock released
*/
#undef DPF_MODNAME
#define DPF_MODNAME "RejectInvalidPacket"
VOID RejectInvalidPacket(PEPD pEPD)
{
PMSD pMSD;
AssertCriticalSectionIsTakenByThisThread(&pEPD->EPLock, TRUE);
if(pEPD->ulEPFlags & EPFLAGS_STATE_DORMANT)
{
// Unlink MSD from EPD, there should always be one if we are in the DORMANT state
pMSD = pEPD->pCommand;
ASSERT_MSD(pMSD);
if (pMSD->CommandID == COMMAND_ID_LISTEN)
{
pEPD->pCommand = NULL;
LOCK_EPD(pEPD, "Temp Ref");
DPFX(DPFPREP,1, "(%p) Received invalid frame on a dormant, listening endpoint, dropping link", pEPD);
DropLink(pEPD); // This will release the EPLock
// The order here is important. We call DropLink first without ever leaving the EPLock because
// we need to ensure no new packets try to come in. After calling DropLink we know we stay in the
// TERMINATING state until returning to the pool, so state is not an issue after that call.
Lock(&pMSD->CommandLock);
Lock(&pEPD->EPLock);
// If a cancel on a listen comes in at the same time as this happens, it is possible that the cancel came
// through and already unlinked this EPD from the Listen while we were outside the lock. If so, removing
// it from the pMSD->blFrameList twice is harmless.
pEPD->ulEPFlags &= ~(EPFLAGS_LINKED_TO_LISTEN);
pEPD->blSPLinkage.RemoveFromList(); // Unlink EPD from Listen Queue
// Release MSD before EPD since final EPD will call out to SP and we don't want any locks held
RELEASE_MSD(pMSD, "EPD Ref"); // Releases CommandLock
RELEASE_EPD(pEPD, "Temp Ref"); // Releases EPLock
}
else
{
DPFX(DPFPREP,1, "(%p) Received invalid frame on a dormant, connecting endpoint, ignoring", pEPD);
Unlock(&pEPD->EPLock);
}
}
else
{
DPFX(DPFPREP,1, "(%p) Received invalid frame on a non-dormant endpoint, ignoring", pEPD);
Unlock(&pEPD->EPLock);
}
}
/*
** Crack Command
**
** This frame is a maintainance frame containing no user data
**
** Called with EP lock held, returns with EP lock released
**
*/
#undef DPF_MODNAME
#define DPF_MODNAME "CrackCommand"
HRESULT CrackCommand(PSPD pSPD, PEPD pEPD, PSPRECEIVEDBUFFER pRcvBuffer, DWORD tNow, PSPRECEIVEDBUFFER* ppRcvBuffToFree)
{
DWORD dwDataLength = pRcvBuffer->BufferDesc.dwBufferSize;
UNALIGNED ULONG *array_ptr;
ULONG mask1, mask2;
union
{
BYTE * pbyFrame;
PCFRAME pCFrame;
PSACKFRAME8 pSack;
} pData;
AssertCriticalSectionIsTakenByThisThread(&pEPD->EPLock, TRUE);
pData.pCFrame = (PCFRAME) pRcvBuffer->BufferDesc.pBufferData;
//if ep is marked as a hard disconnect target then it ignore all CFRAMES. Its going to
//drop the link any moment now
if (pEPD->ulEPFlags & EPFLAGS_HARD_DISCONNECT_TARGET)
{
DPFX(DPFPREP, 7, "(%p) Ignoring CFRAME on hard disconnect target ep bExtOpcode[%u]", pEPD,
(DWORD ) pData.pCFrame->bExtOpcode);
Unlock(&pEPD->EPLock);
return DPN_OK;
}
//hard disconnects are handled as a special case, as they're the only CFrame that
//an ep mark as a hard disconnect source is interested in. Hence, we process them
//here before making that check
if (pData.pCFrame->bExtOpcode==FRAME_EXOPCODE_HARD_DISCONNECT)
{
DPFX(DPFPREP,7, "(%p) HARD_DISCONECT Frame Received", pEPD);
//obviously we have to be connected to care about a disconnect event
if(!(pEPD->ulEPFlags & EPFLAGS_STATE_CONNECTED))
{
DPFX(DPFPREP,1, "(%p) Received HARD_DISCONECT on non-connected endpoint, rejecting...", pEPD);
RejectInvalidPacket(pEPD);
//returns with EP lock released
return DPN_OK;
}
//validate size of frame and its signature (if relevant)
if (pEPD->ulEPFlags2 & EPFLAGS2_SIGNED_LINK)
{
if (dwDataLength < (sizeof(CFRAME)+sizeof(ULONGLONG)))
{
DPFX(DPFPREP,1, "(%p) Received short signed HARD DISCONNECT frame, rejecting...", pEPD);
DNASSERTX(FALSE, 2);
RejectInvalidPacket(pEPD);
//returns with EP lock released
return DPN_OK;
}
//for purposes of signing the sender places the next send seq number in the bRespID filed of the hard
//disconnect frame. This is effectively tells us what signature version the hard disconnect was signed with
if (ValidateIncomingFrameSig(pEPD, pData.pbyFrame, dwDataLength, pData.pCFrame->bRspID,
(UNALIGNED ULONGLONG * ) (pData.pbyFrame+sizeof(CFRAME)))==FALSE)
{
DPFX(DPFPREP,1, "(%p) Dropping incorrectly signed hard disconnect frame", pEPD);
DNASSERTX(FALSE, 2);
RejectInvalidPacket(pEPD);
//returns with EP lock released
return DPN_OK;
}
}
else if (dwDataLength < sizeof(CFRAME))
{
DPFX(DPFPREP,1, "(%p) Received short HARD DISCONNECT frame, rejecting...", pEPD);
DNASSERTX(FALSE, 2);
RejectInvalidPacket(pEPD);
//returns with EP lock released
return DPN_OK;
}
//looks like we've got a valid response to a hard disconnect sequence we instigated
ProcessHardDisconnect(pEPD);
//above call release ep lock
return DPN_OK;
}
//as stated above, if ep is marked as a hard disconnect source then it ignores all other CFRAMES.
//Hence, in that case we need proceed no further
if (pEPD->ulEPFlags & EPFLAGS_HARD_DISCONNECT_SOURCE)
{
DPFX(DPFPREP, 7, "(%p) Ignoring CFRAME on hard disconnected source ep bExtOpcode[%u]", pEPD,
(DWORD ) pData.pCFrame->bExtOpcode);
RejectInvalidPacket(pEPD);
//returns with EP lock released
return DPN_OK;
}
switch(pData.pCFrame->bExtOpcode)
{
case FRAME_EXOPCODE_SACK:
DPFX(DPFPREP,7, "(%p) SACK Frame Received", pEPD);
// Check state
if(!(pEPD->ulEPFlags & EPFLAGS_STATE_CONNECTED))
{
DPFX(DPFPREP,1, "(%p) Received SACK on non-connected endpoint, rejecting...", pEPD);
DNASSERTX(FALSE, 4);
RejectInvalidPacket(pEPD);
//returns with EP lock released
break;
}
// Drop short frames (should not happen)
DWORD dwRequiredLength;
dwRequiredLength = sizeof(SACKFRAME8);
array_ptr = (ULONG * ) (pData.pSack+1);
if (pData.pSack->bFlags & SACK_FLAGS_SACK_MASK1)
{
dwRequiredLength += sizeof(DWORD);
}
if (pData.pSack->bFlags & SACK_FLAGS_SACK_MASK2)
{
dwRequiredLength += sizeof(DWORD);
}
if (pData.pSack->bFlags & SACK_FLAGS_SEND_MASK1)
{
dwRequiredLength += sizeof(DWORD);
}
if (pData.pSack->bFlags & SACK_FLAGS_SEND_MASK2)
{
dwRequiredLength += sizeof(DWORD);
}
if (pEPD->ulEPFlags2 & EPFLAGS2_SIGNED_LINK)
{
dwRequiredLength += sizeof(ULONGLONG);
}
if (dwDataLength < dwRequiredLength)
{
DPFX(DPFPREP,1, "(%p) Dropping short ack frame on connected link", pEPD);
DNASSERTX(FALSE, 2);
Unlock(&pEPD->EPLock);
return DPN_OK;
}
//for purposes of signing we use the next send sequence number of the sack frame as an indication
//of what secret it was signed with. i.e. If the sack tells us that the next send is 27 then we treat it
//as being signed the same as data frame 27 will be
if ((pEPD->ulEPFlags2 & EPFLAGS2_SIGNED_LINK) &&
ValidateIncomingFrameSig(pEPD, pData.pbyFrame, dwDataLength, pData.pSack->bNSeq,
(UNALIGNED ULONGLONG * ) (pData.pbyFrame+dwRequiredLength-sizeof(ULONGLONG)))==FALSE)
{
DPFX(DPFPREP,1, "(%p) Dropping incorrectly signed ack frame", pEPD);
DNASSERTX(FALSE, 2);
Unlock(&pEPD->EPLock);
return DPN_OK;
}
if( pData.pSack->bFlags & SACK_FLAGS_RESPONSE )
{
DPFX(DPFPREP,7, "(%p) ACK RESP RCVD: Retry=%d, N(R)=0x%02x", pEPD, pData.pSack->bRetry, pData.pSack->bNRcv);
}
mask1 = pData.pSack->bFlags & SACK_FLAGS_SACK_MASK1 ? *array_ptr++ : 0;
mask2 = pData.pSack->bFlags & SACK_FLAGS_SACK_MASK2 ? *array_ptr++ : 0;
DPFX(DPFPREP,7, "(%p) UpdateXmitState - N(R) 0x%02x Mask 0x%08x 0x%08x", pEPD, (DWORD)pData.pSack->bNRcv, mask2, mask1);
UpdateXmitState(pEPD, pData.pSack->bNRcv, mask1, mask2, tNow);
mask1 = pData.pSack->bFlags & SACK_FLAGS_SEND_MASK1 ? *array_ptr++ : 0;
mask2 = pData.pSack->bFlags & SACK_FLAGS_SEND_MASK2 ? *array_ptr++ : 0;
if(mask1 | mask2)
{
DPFX(DPFPREP,7, "(%p) Processing Send Mask N(S) 0x%02x Mask 0x%08x 0x%08x", pEPD, (DWORD) pData.pSack->bNSeq, mask2, mask1);
ProcessSendMask(pEPD, pData.pSack->bNSeq, mask1, mask2, tNow, ppRcvBuffToFree);
}
if (! pEPD->blCompleteList.IsEmpty())
{
if (! (pEPD->ulEPFlags & EPFLAGS_IN_RECEIVE_COMPLETE))
{
DPFX(DPFPREP,8, "(%p) Completing Receives...", pEPD);
pEPD->ulEPFlags |= EPFLAGS_IN_RECEIVE_COMPLETE; // ReceiveComplete will clear this flag when done
ReceiveComplete(pEPD); // Deliver the goods, returns with EPLock released
}
else
{
DPFX(DPFPREP,7, "(%p) Already in ReceiveComplete, letting other thread handle receives", pEPD);
Unlock(&pEPD->EPLock);
}
}
else
{
Unlock(&pEPD->EPLock);
}
DPFX(DPFPREP,8, "(%p) Completing Sends...", pEPD);
CompleteSends(pEPD);
break;
case FRAME_EXOPCODE_CONNECT:
DPFX(DPFPREP,7, "(%p) CONNECT Frame Received", pEPD);
if (dwDataLength < sizeof(CFRAME))
{
DPFX(DPFPREP,1, "(%p) Received short CONNECT frame, rejecting...", pEPD);
DNASSERTX(FALSE, 2);
RejectInvalidPacket(pEPD);
//returns with EP lock released
return DPN_OK;
}
ProcessConnectRequest(pSPD, pEPD, pData.pCFrame);
//returns with EP lock released
break;
case FRAME_EXOPCODE_CONNECTED:
DPFX(DPFPREP,7, "(%p) CONNECTED Frame Received", pEPD);
if (dwDataLength < sizeof(CFRAME))
{
DPFX(DPFPREP,1, "(%p) Received short CONNECTED frame, rejecting...", pEPD);
DNASSERTX(FALSE, 2);
RejectInvalidPacket(pEPD);
//returns with EP lock released
return DPN_OK;
}
ProcessConnectedResponse(pSPD, pEPD, pData.pCFrame, tNow);
break;
case FRAME_EXOPCODE_HARD_DISCONNECT:
DPFX(DPFPREP,7, "(%p) HARD_DISCONECT Frame Received", pEPD);
if (dwDataLength < sizeof(CFRAME))
{
DPFX(DPFPREP,1, "(%p) Received short HARD_DISCONECT frame, rejecting...", pEPD);
DNASSERTX(FALSE, 2);
RejectInvalidPacket(pEPD);
//returns with EP lock released
return DPN_OK;
}
if(!(pEPD->ulEPFlags & EPFLAGS_STATE_CONNECTED))
{
DPFX(DPFPREP,1, "(%p) Received HARD_DISCONECT on non-connected endpoint, rejecting...", pEPD);
RejectInvalidPacket(pEPD);
//returns with EP lock released
break;
}
ProcessHardDisconnect(pEPD);
//returns with EP lock released
break;
case FRAME_EXOPCODE_CONNECTED_SIGNED:
DPFX(DPFPREP,7, "(%p) CONNECTEDSIGNED Frame Received", pEPD);
if (dwDataLength < sizeof(CFRAME_CONNECTEDSIGNED))
{
DPFX(DPFPREP,1, "(%p) Received short CONNECTEDSIGNED frame, rejecting...", pEPD);
DNASSERTX(FALSE, 2);
RejectInvalidPacket(pEPD);
//returns with EP lock released
return DPN_OK;
}
ProcessConnectedSignedResponse(pSPD, pEPD, (CFRAME_CONNECTEDSIGNED * ) pData.pCFrame, tNow);
break;
default:
DPFX(DPFPREP,1, "(%p) Received invalid CFrame, rejecting...", pEPD);
DNASSERTX(FALSE, 2);
RejectInvalidPacket(pEPD);
//above call will release ep lock
break;
}
return DPN_OK;
}
/*
** Crack Data Frame
**
** In addition to delivering data contained in the frame, we also must
** use the included state info to drive the transmission process. We will update
** our link state according to this info and see if we need to put this session
** back into the sending pipeline.
**
** Of course, data will only be delivered if we have completed an entire message.
**
** This is called with EP lock held and returns with it released.
** CRITICAL SECTION NOTE -- It might seem rather lavish the way we hold the EPD->StateLock
** thru this entire routine, but anything less would require an obscene level of complexity
** to keep ironed out. This is why I defer all ReceiveIndications and buffer mappings until
** the end of the routine when the Lock can be released.
**
*/
#undef DPF_MODNAME
#define DPF_MODNAME "CrackDataFrame"
HRESULT CrackDataFrame(PSPD pSPD, PEPD pEPD, PSPRECEIVEDBUFFER pRcvBuffer, DWORD tNow, PSPRECEIVEDBUFFER* ppRcvBuffToFree)
{
DWORD dwDataLength = pRcvBuffer->BufferDesc.dwBufferSize;
PDFRAME pFrame = (PDFRAME) (pRcvBuffer->BufferDesc.pBufferData);
DWORD dwNumCoalesceHeaders = 0;
PRCD pRCD;
ULONG bit;
UINT count;
UNALIGNED ULONG *array_ptr;
ULONG MaskArray[4];
ULONG mask;
//This is the DFrame header+Masks+Signature (if present), it doesn't include the coalesence headers (if present)
DWORD dwHeaderSize;
//As we walk the coalesce headers validating the packet we store a pointer to the first reliable
//coalesced data block we see. This is then used if we're full signing and this frame is a candidate
//for modifying the remote secret we don't have to walk the packet againt to find the relevant user data
BYTE * pbyRelData=NULL;
DWORD dwRelDataSize;
AssertCriticalSectionIsTakenByThisThread(&pEPD->EPLock, TRUE);
// Data on an unconnected link
//
// There are two possibilities (as I see it today). Either we have dropped our link because partner
// went silent, but now he has started sending again. OR We have disconnected and are now reconnecting
// but there are some old data frames bouncing around (less likely).
//
// If we have dropped and partner is just figuring it out, we must kill the endpoint or else it will hang
// around forever after partner stops bothering us. We can help out partner by sending him a DISC frame
// so he knows that we arent playing anymore, buts its not technically necessary.
//
// In the second case, we do not want to close the EP because that will crush the session startup that
// is supposedly in progress. Therefore, if we are not in a DORMANT state, then we know a session
// startup is in progress, and we will let the EP remain open.
if(!(pEPD->ulEPFlags & EPFLAGS_STATE_CONNECTED))
{
DPFX(DPFPREP,1, "(%p) Received data on non-connected endpoint, rejecting...", pEPD);
DNASSERTX(FALSE, 4);
RejectInvalidPacket(pEPD);
//above call will release ep lock
return DPN_OK; // do not accept data before we have connected
}
BYTE bSeq = pFrame->bSeq;
DPFX(DPFPREP,7, "(%p) Data Frame Arrives Seq=%x; N(R)=%x", pEPD, bSeq, pEPD->bNextReceive);
DWORD dwRequiredLength = sizeof(DFRAME) + GetDFrameMaskHeaderSize(pFrame->bControl);
if (dwDataLength < dwRequiredLength)
{
DPFX(DPFPREP,1, "(%p) Dropping short frame on connected link", pEPD);
DNASSERTX(FALSE, 2);
Unlock(&pEPD->EPLock);
return DPN_OK;
}
//if we've got a signed link, then the next thing in the header should be the signature
if (pEPD->ulEPFlags2 & EPFLAGS2_SIGNED_LINK)
{
UNALIGNED ULONGLONG * pullSig=(UNALIGNED ULONGLONG * ) (((BYTE * ) pFrame)+dwRequiredLength);
dwRequiredLength+=sizeof(ULONGLONG);
if (dwDataLength<dwRequiredLength)
{
DPFX(DPFPREP,1, "(%p) Dropping data frame too short to contain signature on signed link", pEPD);
DNASSERTX(FALSE, 2);
Unlock(&pEPD->EPLock);
return DPN_OK;
}
//check if the signature is valid
if (ValidateIncomingFrameSig(pEPD, (BYTE * ) pFrame, dwDataLength, pFrame->bSeq, pullSig)==FALSE)
{
DPFX(DPFPREP,1, "(%p) Dropping data frame with invalid signature on signed link", pEPD);
DNASSERTX(FALSE, 2);
Unlock(&pEPD->EPLock);
return DPN_OK;
}
}
//at this point the dwRequiredLength is equal to the size of DFrame header, plus masks, plus signature (if present)
dwHeaderSize=dwRequiredLength;
//If we've got a link that supports signing then we'll expect new style keep alives that contain
//a DWORD session identity as data. These frames are marked by a KEEPALIVE control bit being flipped
if ((pEPD->ulEPFlags2 & EPFLAGS2_SUPPORTS_SIGNING) && (pFrame->bControl & PACKET_CONTROL_KEEPALIVE))
{
//take pointer to where the session identity should be in the keep alive
DWORD * pdwKeepAliveSessID=(DWORD * ) (((BYTE * ) pFrame)+dwRequiredLength);
//ensure that the frame is big enough to hold the required data
dwRequiredLength+=sizeof(DWORD);
if (dwDataLength < dwRequiredLength)
{
DPFX(DPFPREP,1, "(%p) Dropping short keepalive frame on connected link", pEPD);
DNASSERTX(FALSE, 2);
Unlock(&pEPD->EPLock);
return DPN_OK;
}
//We should screen out keep alives whose session identity doesn't match what we expect.
//This handles the case when one end has stopped and then restarted. Rather than responding
//to what is now an outdated KeepAlive we'll ignore it, causing the other end to hopefully time out
if (*pdwKeepAliveSessID!=pEPD->dwSessID)
{
DPFX(DPFPREP,1, "(%p) Dropping outdated keepalive frame on connected link KeepAliveSessID[%u] dwSessId[%u]",
pEPD, *pdwKeepAliveSessID, pEPD->dwSessID);
Unlock(&pEPD->EPLock);
return DPN_OK;
}
}
else if (pFrame->bControl & PACKET_CONTROL_COALESCE)
{
PCOALESCEHEADER pCoalesceHeaders = (PCOALESCEHEADER)((BYTE*)pFrame + dwRequiredLength);
DWORD dwCoalesceFrameSize;
BYTE bCommand;
DWORD dwTotalCoalesceDataSize=0;
// Keep looping until we see the last coalesce header.
do
{
// See if we can have a coalesce header
dwRequiredLength+=sizeof(COALESCEHEADER);
if (dwDataLength < dwRequiredLength )
{
DPFX(DPFPREP,1, "(%p) Dropping short coalesce frame (hdr) on connected link", pEPD);
DNASSERTX(FALSE, 2);
Unlock(&pEPD->EPLock);
return DPN_OK;
}
// Now that we know it's valid we can touch the header. Figure out the size.
dwCoalesceFrameSize = pCoalesceHeaders[dwNumCoalesceHeaders].bSize;
bCommand = pCoalesceHeaders[dwNumCoalesceHeaders].bCommand;
dwCoalesceFrameSize |= (DWORD) (bCommand & (PACKET_COMMAND_COALESCE_BIG_1 | PACKET_COMMAND_COALESCE_BIG_2 | PACKET_COMMAND_COALESCE_BIG_3)) << 5;
if (dwCoalesceFrameSize == 0)
{
DPFX(DPFPREP,1, "(%p) Dropping 0 byte coalesce frame on connected link", pEPD);
DNASSERTX(FALSE, 2);
Unlock(&pEPD->EPLock);
return DPN_OK;
}
//if we've hit the first reliable coalesced frame then store the offset from
//the end of the coalesce headers to the start of its data
if (pbyRelData==NULL && (bCommand & PACKET_COMMAND_RELIABLE))
{
pbyRelData=((BYTE * ) pFrame)+dwTotalCoalesceDataSize;
dwRelDataSize=dwCoalesceFrameSize;
}
// Round frame size up to the nearest DWORD alignment unless it's the last subframe.
if (! (bCommand & PACKET_COMMAND_END_COALESCE))
{
dwCoalesceFrameSize = (dwCoalesceFrameSize + 3) & (~3);
}
dwTotalCoalesceDataSize+=dwCoalesceFrameSize;
dwNumCoalesceHeaders++;
}
while (! (bCommand & PACKET_COMMAND_END_COALESCE));
// If we have an odd number of coalesce headers, there needs to be padding for DWORD
// alignment.
DBG_CASSERT(sizeof(COALESCEHEADER) == 2);
if ((dwNumCoalesceHeaders & 1) != 0)
{
dwRequiredLength += 2;
}
//if we found a reliable coalesce header in there, shift the offset to its data by dwRequiredLength
//this adjustment is necessary because when we first assign the pointer we ignore the presence of
//any headers, hence its off by packet header+coalesce header sizes
if (pbyRelData)
{
pbyRelData+=dwRequiredLength;
}
//check that the frame holds all the coalesced user data we expect it to
dwRequiredLength+=dwTotalCoalesceDataSize;
if (dwDataLength < dwRequiredLength)
{
DPFX(DPFPREP,1, "(%p) Dropping short coalesce frame (user data) on connected link", pEPD);
DNASSERTX(FALSE, 2);
Unlock(&pEPD->EPLock);
return DPN_OK;
}
}
// Make sure that new frame is within our receive window
if((BYTE)(bSeq - pEPD->bNextReceive) >= (BYTE) MAX_FRAME_OFFSET)
{
DPFX(DPFPREP,1, "(%p) Rejecting frame that is out of receive window SeqN=%x, N(R)=%x", pEPD, bSeq, pEPD->bNextReceive);
pEPD->ulEPFlags |= EPFLAGS_DELAY_ACKNOWLEDGE;
if(pFrame->bCommand & PACKET_COMMAND_POLL)
{
// Is he asking for an immediate response
DPFX(DPFPREP,7, "(%p) Sending Ack Frame", pEPD);
SendAckFrame(pEPD, 1); // This unlocks the EPLock since param 2 is 1
}
else if(pEPD->DelayedAckTimer == 0)
{
// If timer is not running better start it now
LOCK_EPD(pEPD, "LOCK (DelayedAckTimer)"); // Bump RefCnt for new timer
DPFX(DPFPREP,7, "(%p) Setting Delayed Ack Timer", pEPD);
ScheduleProtocolTimer(pSPD, SHORT_DELAYED_ACK_TIMEOUT, 0, DelayedAckTimeout,
(PVOID) pEPD, &pEPD->DelayedAckTimer, &pEPD->DelayedAckTimerUnique);
Unlock(&pEPD->EPLock);
}
else
{
Unlock(&pEPD->EPLock);
}
return DPN_OK;
}
// Determine what's in the variable length header
mask = (pFrame->bControl & PACKET_CONTROL_VARIABLE_MASKS) / PACKET_CONTROL_SACK_MASK1;
if(mask)
{
array_ptr = (ULONG * ) (pFrame+1);
for(count = 0; count < 4; count++, mask >>= 1)
{
MaskArray[count] = (mask & 1) ? *array_ptr++ : 0;
}
// See if this frame Acknowledges any of our outstanding data
DPFX(DPFPREP,7, "(%p) UpdateXmitState - N(R) 0x%02x Mask 0x%08x 0x%08x", pEPD, (DWORD)pFrame->bNRcv, MaskArray[1], MaskArray[0]);
UpdateXmitState(pEPD, pFrame->bNRcv, MaskArray[0], MaskArray[1], tNow); // Do this before taking StateLock
// Determine if there is a SendMask in this frame which identifies dropped frames as unreliable
if(pFrame->bControl & (PACKET_CONTROL_SEND_MASK1 | PACKET_CONTROL_SEND_MASK2))
{
DPFX(DPFPREP,7, "(%p) Processing Send Mask N(S) 0x%02x Mask 0x%08x 0x%08x", pEPD, (DWORD)pFrame->bSeq, MaskArray[3], MaskArray[2]);
ProcessSendMask(pEPD, pFrame->bSeq, MaskArray[2], MaskArray[3], tNow, ppRcvBuffToFree);
// NOTE: ProcessSendMask may have advanced N(R)
// Re-verify that the new frame is within our receive window
if((BYTE)(bSeq - pEPD->bNextReceive) >= (BYTE) MAX_FRAME_OFFSET)
{
DPFX(DPFPREP,1, "(%p) ProcessSendMask advanced N(R) such that the current frame is out of window, rejecting receive, N(R)=0x%02x, Seq=0x%02x", pEPD, (DWORD)pEPD->bNextReceive, (DWORD)pFrame->bSeq);
Unlock(&pEPD->EPLock);
return DPN_OK;
}
}
}
else
{
DPFX(DPFPREP,7, "(%p) UpdateXmitState - N(R) 0x%02x No Mask", pEPD, (DWORD)pFrame->bNRcv);
UpdateXmitState(pEPD, pFrame->bNRcv, 0, 0, tNow); // Do this before taking StateLock
}
// We can receive this frame.
// If we're full signing, its got reliable data in it and its earlier in the sequence space than the current frame we're proposing
// to modify the remote secret with, then its the new candidate for being the remote secret modifier
if ((pEPD->ulEPFlags2 & EPFLAGS2_FULL_SIGNED_LINK) && (pFrame->bCommand & PACKET_COMMAND_RELIABLE) &&
(pFrame->bSeq<pEPD->byRemoteSecretModifierSeqNum) && (pFrame->bControl & PACKET_CONTROL_KEEPALIVE)==0)
{
//if it was a coalesced frame then we'll already have an offset to a block of reliable data
//if it wasn't then we simply pick the entire user data contents
if (pbyRelData==NULL)
{
DNASSERT((pFrame->bControl & PACKET_CONTROL_COALESCE)==0);
pbyRelData=((PBYTE) pFrame) + dwHeaderSize;
dwRelDataSize=dwDataLength - dwHeaderSize;
}
pEPD->byRemoteSecretModifierSeqNum=pFrame->bSeq;
pEPD->ullRemoteSecretModifier=GenerateRemoteSecretModifier(pbyRelData, dwRelDataSize);
}
//Copy relevant info into Receive descriptor
if((pRCD = (PRCD)POOLALLOC(MEMID_RCD, &RCDPool)) == NULL)
{
DPFX(DPFPREP,0, "(%p) Failed to allocate new RCD", pEPD);
Unlock(&pEPD->EPLock);
return DPN_OK;
}
pEPD->ulEPFlags |= EPFLAGS_DELAY_ACKNOWLEDGE; // State has changed. Make sure it gets sent.
DNASSERT(pRcvBuffer->pNext == NULL);
DNASSERT(pRcvBuffer->dwProtocolData == 0);
DNASSERT(pRcvBuffer->pServiceProviderDescriptor == 0);
pRCD->bSeq = bSeq;
pRCD->bFrameFlags = pFrame->bCommand;
pRCD->bFrameControl = pFrame->bControl;
pRCD->pbData = (PBYTE) (((PBYTE) pFrame) + dwHeaderSize);
pRCD->uiDataSize = dwDataLength - dwHeaderSize;
pRCD->tTimestamp = tNow;
pRCD->dwNumCoalesceHeaders = dwNumCoalesceHeaders;
pRCD->pRcvBuff = pRcvBuffer;
// Update our receiving state info.
//
// RCDs go onto one of two queues. If it is the next numbered (expected) frame then it is
// placed on the ReceiveList (in EPD). If this frame completes a message it can now be
// indicated. If this frame fills a hole left by previous frames then a condensation with
// the second list must occur.
// If it is not the next numbered frame then it is placed, in order, on the MisOrdered frame
// list, and the bitmask is updated.
//
// Condensation of lists is performed by testing the LSB of the ReceiveMask. Each time LSB is set,
// the first frame on the list can be moved to the ReceiveList, and the mask is shifted right.
// As each frame is moved to the ReceiveList, the EOM flag must be checked for and if set, then
// everything on the ReceiveList should be moved to the CompleteList for indication to the user.
BOOL fPoll = pFrame->bCommand & PACKET_COMMAND_POLL;
BOOL fSendInstantAck = pFrame->bControl & PACKET_CONTROL_END_STREAM;
if(bSeq == pEPD->bNextReceive)
{
// Frame is the next expected # in sequence
DPFX(DPFPREP,8, "(%p) Receiving In-Order Frame, pRCD[%p]", pEPD, pRCD);
ReceiveInOrderFrame(pEPD, pRCD, ppRcvBuffToFree); // Build frame into message AND move adjacent frames off OddFrameList
// NOTE: ReceiveInOrderFrame may have caused the frame to be freed via DropReceive
// so we absolutely must not use pFrame past this point!
// See if we need to respond right away...
//
// Because there are lots of way to generate POLL bits (full window, empty queue, poll count) we sometimes find ourselves
// generating too much dedicated ack-traffic. Therefore, we will treat the POLL not as Respond-Immediately but instead as
// Respond-Soon. We will not wait the full Delayed_Ack_Timeout interval but we will wait long enough to allow a quick piggyback
// response (say 5ms) (we may want this longer on a slow connection...)
// Is he asking for an instant response?
if(fSendInstantAck)
{
DPFX(DPFPREP,7, "(%p) Sending Ack Frame", pEPD);
SendAckFrame(pEPD, 0); // Send Ack w/timing info
}
// Is he asking for a response soon?
else if(fPoll)
{
if(pEPD->DelayedAckTimer != NULL)
{
DPFX(DPFPREP,7, "(%p) Cancelling Delayed Ack Timer", pEPD);
if(CancelProtocolTimer(pSPD, pEPD->DelayedAckTimer, pEPD->DelayedAckTimerUnique)!= DPN_OK)
{
DPFX(DPFPREP,7, "(%p) Cancelling Delayed Ack Timer Failed", pEPD);
LOCK_EPD(pEPD, "LOCK (re-start delayed ack timer)");
}
}
else
{
LOCK_EPD(pEPD, "LOCK (start short delayed ack timer)");
}
DPFX(DPFPREP,7, "Delaying POLL RESP");
pEPD->ulEPFlags |= EPFLAGS_DELAY_ACKNOWLEDGE;
DPFX(DPFPREP,7, "(%p) Setting Delayed Ack Timer", pEPD);
ScheduleProtocolTimer(pSPD, 4, 4, DelayedAckTimeout, (PVOID) pEPD,
&pEPD->DelayedAckTimer, &pEPD->DelayedAckTimerUnique);
}
else if(pEPD->DelayedAckTimer == 0)
{
// If timer is not running better start it now
LOCK_EPD(pEPD, "LOCK (DelayedAckTimer)"); // Bump RefCnt for timer
ScheduleProtocolTimer(pSPD, DELAYED_ACK_TIMEOUT, 0, DelayedAckTimeout, (PVOID) pEPD,
&pEPD->DelayedAckTimer, &pEPD->DelayedAckTimerUnique);
}
} // IF frame is in order
else
{
// Frame arrives out of order
// bit location in mask for this frame
bit = (BYTE) ((bSeq - pEPD->bNextReceive) - 1);
// Make sure this is not a duplicate frame
if( ((bit < 32) && (pEPD->ulReceiveMask & (1 << bit))) || ((bit > 31) && (pEPD->ulReceiveMask2 & (1 << (bit - 32)))) )
{
DPFX(DPFPREP,7, "(%p) REJECT DUPLICATE OUT-OF-ORDER Frame Seq=%x", pEPD, bSeq);
Unlock(&pEPD->EPLock);
pRCD->pRcvBuff = NULL;
RELEASE_RCD(pRCD);
return DPN_OK;
}
DPFX(DPFPREP,8, "(%p) Receiving Out-of-Order Frame, pRCD[%p]", pEPD, pRCD);
ReceiveOutOfOrderFrame(pEPD, pRCD, bit, ppRcvBuffToFree);
// NOTE: ReceiveOutOfOrderFrame may have caused the frame to be freed via DropReceive
// so we absolutely must not use pFrame past this point!
if(fPoll)
{
if(pEPD->DelayedAckTimer != NULL)
{
DPFX(DPFPREP,7, "(%p) Cancelling Delayed Ack Timer", pEPD);
if(CancelProtocolTimer(pSPD, pEPD->DelayedAckTimer, pEPD->DelayedAckTimerUnique)!= DPN_OK)
{
DPFX(DPFPREP,7, "(%p) Cancelling Delayed Ack Timer Failed", pEPD);
LOCK_EPD(pEPD, "LOCK (re-start delayed ack timer)");
}
// Start an abreviated delayed ack timer in case NACK gets cancelled
}
else
{
LOCK_EPD(pEPD, "LOCK (start short delayed ack timer)");
}
DPFX(DPFPREP,7, "Delaying POLL RESP");
pEPD->ulEPFlags |= EPFLAGS_DELAY_ACKNOWLEDGE;
DPFX(DPFPREP,7, "(%p) Setting Delayed Ack Timer", pEPD);
ScheduleProtocolTimer(pSPD, 5, 5, DelayedAckTimeout, (PVOID) pEPD,
&pEPD->DelayedAckTimer, &pEPD->DelayedAckTimerUnique);
}
}
// EPD->StateLock is still HELD
//
// We use a FLAG for exclusive access to ReceiveComplete routine. This is safe because the flag is only
// tested and modified while holding the EPD->StateLock. Lets be sure to keep it that way...
if (! pEPD->blCompleteList.IsEmpty())
{
if (! (pEPD->ulEPFlags & EPFLAGS_IN_RECEIVE_COMPLETE))
{
DPFX(DPFPREP,8, "(%p) Completing Receives...", pEPD);
pEPD->ulEPFlags |= EPFLAGS_IN_RECEIVE_COMPLETE; // ReceiveComplete will clear this flag when done
ReceiveComplete(pEPD); // Deliver the goods, returns with EPLock released
}
else
{
DPFX(DPFPREP,7, "(%p) Already in ReceiveComplete, letting other thread handle receives", pEPD);
Unlock(&pEPD->EPLock);
}
}
else
{
Unlock(&pEPD->EPLock);
}
DPFX(DPFPREP,8, "(%p) Completing Sends...", pEPD);
CompleteSends(pEPD);
return DPNERR_PENDING;
}
/*
** Receive In Order Frame
**
** The interesting part of this function is moving frames off of the OddFrameList that
** the new frame adjoins. This may also be called with a NULL frame which will happen when
** a cancelled frame is the next-in-order receive.
**
** One result of having cancelled frames running around is that we may miss the SOM or EOM
** flags which delimit messages. Therefore, we must watch as we assemble messages that we do not
** see unexpected flags, ie a new message w/o an SOM on first frame which means that part of the
** message must have been lost, and the whole thing must be trashed...
**
** ** EPLOCK is HELD through this entire function **
*/
#undef DPF_MODNAME
#define DPF_MODNAME "ReceiveInOrderFrame"
VOID
ReceiveInOrderFrame(PEPD pEPD, PRCD pRCD, PSPRECEIVEDBUFFER* ppRcvBuffToFree)
{
PSPD pSPD = pEPD->pSPD;
CBilink *pLink;
UINT flag;
AssertCriticalSectionIsTakenByThisThread(&pEPD->EPLock, TRUE);
// Condensing Loop WHILE (Next In-Order Frame has been received)
do
{
ASSERT(pRCD->bSeq == pEPD->bNextReceive);
pEPD->tLastDataFrame = pRCD->tTimestamp; // Always keep the receive time of (N(R) - 1)
pEPD->bLastDataRetry = (pRCD->bFrameControl & PACKET_CONTROL_RETRY);
#ifdef DBG
pEPD->bLastDataSeq = pRCD->bSeq;
#endif // DBG
pRCD->pMsgLink = NULL;
if(pEPD->pNewMessage == NULL)
{
// Add this frame to the in-order rcv list
// pNewMessage implies we have no current message, head or tail
ASSERT(pEPD->pNewTail == NULL);
if(!(pRCD->bFrameFlags & PACKET_COMMAND_NEW_MSG))
{
// There is no NEW_MESSAGE flag on the first frame we see. We must
// have lost the first frame or this is an invalid packet. We can throw
// this frame away...
DPFX(DPFPREP,1, "(%p) NEW_MESSAGE flag not set on first frame of message, scrapping frame (%x)", pEPD, pRCD->bSeq);
pRCD->ulRFlags |= RFLAGS_FRAME_LOST;
pRCD->bFrameFlags |= PACKET_COMMAND_END_MSG; // Turn this on so we will release buffer right away
}
//N.B. We don't bother checking to see if the first frame exceeds the maximum message size
//we accept. If its a single frame message then we'll handle scanning out oversize messages
//in the ReceiveComplete function. If its the start of a message spread over multiple frames
//then we'll drop everything when the second frame arrives
// Even if we get rid of it, we will need these below
pEPD->pNewMessage = pRCD;
pEPD->pNewTail = pRCD;
pRCD->uiFrameCount = 1;
pRCD->uiMsgSize = pRCD->uiDataSize;
DPFX(DPFPREP,8, "(%p) Queuing Frame (NEW MESSAGE) (%x)", pEPD, pRCD->bSeq);
}
else
{
if (pRCD->bFrameFlags & PACKET_COMMAND_NEW_MSG)
{
// We are getting the start of a new message in the start of an existing message, drop it all
DPFX(DPFPREP,1, "(%p) NEW_MESSAGE flag set in the middle of existing message, scrapping message (%x, %x)", pEPD, pEPD->pNewMessage->bSeq, pRCD->bSeq);
pRCD->ulRFlags |= RFLAGS_FRAME_LOST;
pRCD->bFrameFlags |= PACKET_COMMAND_END_MSG; // Turn this on so we will release buffer right away
}
ASSERT((pEPD->pNewTail->bSeq) == (BYTE)(pRCD->bSeq - 1)); // Make sure they stay sequential
pEPD->pNewTail->pMsgLink = pRCD;
pEPD->pNewMessage->uiFrameCount++;
pEPD->pNewMessage->uiMsgSize += pRCD->uiDataSize;
pEPD->pNewMessage->ulRFlags |= (pRCD->ulRFlags & RFLAGS_FRAME_LOST);// UNION FRAME_LOST flag from all frames of a message
pEPD->pNewTail = pRCD;
if (pEPD->pNewMessage->uiMsgSize>pSPD->pPData->dwMaxRecvMsgSize)
{
DPFX(DPFPREP,1, "(%p) Message size exceeds maximum accepted. Dropping frames in middle of multipart "
"receive uiMsgSize[%u], MaxRecvMsgSize[%u]", pEPD, pEPD->pNewMessage->uiMsgSize,
pSPD->pPData->dwMaxRecvMsgSize);
pRCD->ulRFlags |= RFLAGS_FRAME_LOST;
pRCD->bFrameFlags |= PACKET_COMMAND_END_MSG; // Turn this on so we will release buffer right away
}
DPFX(DPFPREP,8, "(%p) Queuing Frame (ON TAIL) (%x)", pEPD, pRCD->bSeq);
}
if(pRCD->bFrameFlags & PACKET_COMMAND_END_MSG)
{
// Either this frame completes a message or we decided to drop this one above
// All frames on the ReceiveList should now be removed and delivered
// Get either the message we are dropping above, or the beginning of the sequence of messages we are completing
pRCD = pEPD->pNewMessage;
pEPD->pNewMessage = NULL;
if(pRCD->ulRFlags & RFLAGS_FRAME_LOST)
{
// We need to throw this away
DPFX(DPFPREP,7, "(%p) Throwing away message with missing frames (%x, %x)", pEPD, pRCD->bSeq, pEPD->pNewTail->bSeq);
pEPD->pNewTail = NULL;
DropReceive(pEPD, pRCD, ppRcvBuffToFree);
}
else
{
// We need to complete this sequence
pRCD->blCompleteLinkage.InsertBefore( &pEPD->blCompleteList); // place on end of Completion list
DPFX(DPFPREP,7, "(%p) Adding msg to complete list FirstSeq=%x, LastSeq=%x QueueSize=%d",
pEPD, pRCD->bSeq, pEPD->pNewTail->bSeq, pEPD->uiCompleteMsgCount);
pEPD->pNewTail = NULL;
pEPD->uiCompleteMsgCount++;
#ifdef DBG
// This is guaranteed to at least be 1 since we just incremented it above
if ((pEPD->uiCompleteMsgCount % 128) == 0)
{
DPFX(DPFPREP, 1, "(%p) Receives waiting to be completed count has grown to %d, app is slow processing receives", pEPD, pEPD->uiCompleteMsgCount);
}
#endif // DBG
}
}
// Since we are allowing out of order indication of receives it is possible that frames later than
// the new one have already been indicated. This means that there may be bits set in the ReceiveMask
// whose correlating frames do not need to be indicated. The most straightforward way to implement this
// is to leave the early-indicated frames in the list, but mark them as INDICATED_NONSEQ. So inside this
// master DO loop there will be an inner DO loop which passes over INDICATED frames and just takes them off
// the list.
//
// Now its possible that a NonSeq indicated frame is still sitting on the CompleteList awaiting indication,
// so I am using a ref count. An extra ref is added when a frame is completed non-seq. When a completed frame
// is removed below we will release one reference, and the indication code will release one reference when it
// finishes on that end. Happily, we can release the actual buffers while the RCD turd is still sitting on the
// OddFrameList.
BOOL fIndicatedNonSeq = FALSE;
do
{
flag = pEPD->ulReceiveMask & 1; // set flag if next frame in stream is present
pEPD->bNextReceive += 1; // Update receive window
RIGHT_SHIFT_64(pEPD->ulReceiveMask2, pEPD->ulReceiveMask);// shift mask because base has changed
DPFX(DPFPREP,7, "(%p) N(R) incremented to %x, Mask %x %x", pEPD, pEPD->bNextReceive, pEPD->ulReceiveMask2, pEPD->ulReceiveMask);
//if we're fully signing the link and we just we got 3/4's way through the sequence space then
//we're now in a position to modify the remote secret. We'll still need to hang onto the
//existing secret because for the next 1/4 of the sequence space we'll still need to use it
//to validate incoming data
if ((pEPD->ulEPFlags2 & EPFLAGS2_FULL_SIGNED_LINK) && (pEPD->bNextReceive==SEQ_WINDOW_3Q))
{
pEPD->ullOldRemoteSecret=pEPD->ullCurrentRemoteSecret;
pEPD->byRemoteSecretModifierSeqNum=SEQ_WINDOW_3Q;
pEPD->ullCurrentRemoteSecret=GenerateNewSecret(pEPD->ullCurrentRemoteSecret, pEPD->ullRemoteSecretModifier);
}
if(flag)
{
// The next frame in the sequence has arrived already since low bit of ulReceiveMask was set
// Several things can happen here:
// 1) We are in the middle of a message, in which case, its next piece is on the out of order list
// 2) We have just finished a message, which leaves two subcases:
// a) We are beginning a new message. In this case our first piece is on the out of order list
// b) Out-of-order non-sequential messages have completed while we were completing our in-order message
// In this case there are some already indicated RCDs on the out of order list, and a new partial
// message may or may not follow.
pLink = pEPD->blOddFrameList.GetNext();
ASSERT(pLink != &pEPD->blOddFrameList); // Make sure we didn't run out of RCDs on the list
pRCD = CONTAINING_OBJECT(pLink, RCD, blOddFrameLinkage);
ASSERT_RCD(pRCD);
pLink->RemoveFromList(); // take next frame out of OddFrameList
// Make sure everything previous got removed from the odd frame list, and it is sorted correctly
ASSERT(pRCD->bSeq == pEPD->bNextReceive);
if (pRCD->ulRFlags & RFLAGS_FRAME_INDICATED_NONSEQ)
{
if (pEPD->pNewMessage)
{
// We need to throw this away
PRCD pRCDTemp = pEPD->pNewMessage;
pEPD->pNewMessage = NULL;
DPFX(DPFPREP,1, "(%p) Throwing away non-ended message (%x, %x)", pEPD, pRCDTemp->bSeq, pEPD->pNewTail->bSeq);
pEPD->pNewTail = NULL;
DropReceive(pEPD, pRCDTemp, ppRcvBuffToFree);
}
fIndicatedNonSeq = TRUE;
DPFX(DPFPREP,7, "(%p) Pulling Indicated-NonSequential message off of Out-of-Order List Seq=%x", pEPD, pRCD->bSeq);
pEPD->tLastDataFrame = pRCD->tTimestamp; // Always keep the receive time of (N(R) - 1)
pEPD->bLastDataRetry = (pRCD->bFrameControl & PACKET_CONTROL_RETRY);
DEBUG_ONLY(pEPD->bLastDataSeq = pRCD->bSeq);
RELEASE_RCD(pRCD);
}
else
{
// In the case of cancelling one of the messages in the middle of a large message,
// we will drop all previous, drop that one, and then we will get to a situation where we aren't
// currently working on a new message (pNewMessage was NULL'ed in the cancelling) and the current
// message does not have the NEW_MSG flag, in which case we scrap it above.
ASSERT(!fIndicatedNonSeq || (pRCD->bFrameFlags & PACKET_COMMAND_NEW_MSG) ||
(!pEPD->pNewMessage && !(pRCD->bFrameFlags & PACKET_COMMAND_NEW_MSG)));
// go ahead and move this to the receive list
DPFX(DPFPREP,7, "(%p) Moving OutOfOrder frame to received list Seq=%x", pEPD, pRCD->bSeq);
ASSERT(pRCD->bSeq == pEPD->bNextReceive);
break; // Back to the top
}
}
}
while (flag); // DO WHILE (There are still in order frames that have already arrived with no incomplete messages)
}
while (flag); // DO WHILE (There are still in order frames that have already arrived with an incomplete message)
if((pEPD->ulReceiveMask | pEPD->ulReceiveMask2)==0)
{
pEPD->ulEPFlags &= ~(EPFLAGS_DELAYED_NACK);
if(((pEPD->ulEPFlags & EPFLAGS_DELAYED_SENDMASK)==0)&&(pEPD->DelayedMaskTimer != NULL))
{
DPFX(DPFPREP,7, "(%p) Cancelling Delayed Mask Timer", pEPD);
if(CancelProtocolTimer(pSPD, pEPD->DelayedMaskTimer, pEPD->DelayedMaskTimerUnique) == DPN_OK)
{
DECREMENT_EPD(pEPD, "UNLOCK (cancel DelayedMask)"); // SPLock not already held
pEPD->DelayedMaskTimer = 0;
}
else
{
DPFX(DPFPREP,7, "(%p) Cancelling Delayed Mask Timer Failed", pEPD);
}
}
}
}
/*
** Receive Out Of Order Frame
**
** Its like the title says. We must set the appropriate bit in the 64-bit ReceiveMask
** and then place it into the OddFrameList in its proper sorted place. After that, we must
** scan to see if a complete message has been formed and see if we are able to indicate it
** early.
**
** ** EPLOCK is HELD through this entire function **
*/
#undef DPF_MODNAME
#define DPF_MODNAME "ReceiveOutOfOrderFrame"
VOID
ReceiveOutOfOrderFrame(PEPD pEPD, PRCD pRCD, ULONG bit, PSPRECEIVEDBUFFER* ppRcvBuffToFree)
{
PSPD pSPD = pEPD->pSPD;
PRCD pRCD1;
PRCD pRCD2;
CBilink *pLink;
BYTE NextSeq;
ULONG highbit;
ULONG Mask;
ULONG WorkMaskHigh;
ULONG WorkMaskLow;
ULONG MaskHigh;
ULONG MaskLow;
BOOL nack = FALSE;
UINT count;
BOOL lost = FALSE;
UINT frame_count = 0;
UINT msg_length = 0;
DPFX(DPFPREP,8,"(%p) Received out of order frame, Seq=%x, bit=%x", pEPD, pRCD->bSeq, bit);
// Bit shouldn't be more than 64 (MAX_RECEIVE_RANGE)
ASSERT(bit <= MAX_RECEIVE_RANGE);
AssertCriticalSectionIsTakenByThisThread(&pEPD->EPLock, TRUE);
// RECEIVE OUT OF ORDER FRAME
//
// DO WE SEND IMMEDIATE ACK FOR THIS OUT OF ORDER FRAME?
//
// When we receive an OutOfOrder frame it is almost certainly because the missing frame has been lost.
// So we can accelerate the re-transmission process greatly by telling partner right away that frames
// are missing. HOWEVER, with a large send window we will get many mis-ordered frames for each drop,
// but we only want to send a Negative Ack once. SO, we will only initiate a NACK here if we have
// created a NEW HOLE in our receive mask!
//
// First, we will not have created a new hole unless we added to the END of the OddFrameList.
// Second, we will not have created a new hole unless the FIRST BIT TO THE RIGHT of the new bit
// is CLEAR.
//
// So we will only generate an immediate NACK frame if both of the above cases are true!
// NOTE - if this is the only OoO frame, then we should always send a NACK
//
// ANOTHER NOTE. SP implementation has been changed so that it frequently misorders receives in close
// proximity. One effect of this is that we must not immediately send a NACK for an out of order frame, but
// instead should wait a short period (say ~5ms) and see if the missing frame hasn't shown up.
// Make sure this RCD is within the receive window
// NOTE: Presume SACK arrives with bNSeq of 84, N(R) is 20, and all bits are set except the one representing 20.
// In that case, pRCD->bSeq - pEPD->bNextReceive will be equal to 63 (ie MAX_FRAME_OFFSET).
ASSERT((BYTE)(pRCD->bSeq - pEPD->bNextReceive) <= (BYTE)MAX_FRAME_OFFSET);
// We will insert frame in OddFrameList maintaining sort by Seq number
//
// We can optimize for most likely case, which is new frames are added to END of list. We can
// check for this first case by investigating whether the new bit is the left-most bit in the mask.
// If it is LMB, then it trivially gets added to the END of the list.
//
// Please note that both this and the following algorithms assume that we have already verified
// that the new frame is NOT already in the list
MaskLow = pEPD->ulReceiveMask; // Get scratch copy of Mask
MaskHigh = pEPD->ulReceiveMask2;
if(bit < 32)
{
// Frame is within 32 of N(Rcv)
WorkMaskLow = 1 << bit; // Find bit in mask for new frame
WorkMaskHigh = 0;
pEPD->ulReceiveMask |= WorkMaskLow; // Set appropriate bit in mask
// check immediately preceeding bit for NACK determination
if( (MaskLow & (WorkMaskLow >> 1)) == 0)
{
nack = TRUE; // preceeding bit is not set
}
}
else
{
highbit = bit - 32;
WorkMaskHigh = 1 << highbit;
WorkMaskLow = 0;
pEPD->ulReceiveMask2 |= WorkMaskHigh; // Set appropriate bit in mask
if(highbit)
{
// check preceeding bit for NACK determination
if( (MaskHigh & (WorkMaskHigh >> 1)) == 0)
{
nack = TRUE; // preceeding bit is not set
}
}
else
{
if( (MaskLow & 0x80000000) == 0)
{
nack = TRUE;
}
}
}
// Insert frame in sorted OddFrameList.
//
// First test for trivial insert at tail condition. True if new bit is LEFTMOST set bit in
// both masks.
if( (WorkMaskHigh > MaskHigh) || ( (MaskHigh == 0) && (WorkMaskLow > MaskLow) ) )
{
// TAIL INSERTION
DPFX(DPFPREP,7, "(%p) Received %x OUT OF ORDER - INSERT AT TAIL NRcv=%x MaskL=%x MaskH=%x",
pEPD, pRCD->bSeq, pEPD->bNextReceive, pEPD->ulReceiveMask, pEPD->ulReceiveMask2);
pLink = &pEPD->blOddFrameList;
// Make sure this is either the only RCD in the list, or it is farther in the window than the last one
ASSERT(pLink->IsEmpty() || ((BYTE)(CONTAINING_OBJECT(pLink->GetPrev(), RCD, blOddFrameLinkage))->bSeq - pEPD->bNextReceive) < (BYTE)(pRCD->bSeq - pEPD->bNextReceive));
pRCD->blOddFrameLinkage.InsertBefore( pLink);
// Check to see if we should NACK (negative acknowledge) any frames. We only want to NACK a given
// frame once so we will NACK if this is the first frame added to the OOF list, or if the immediately
// preceeding frame is missing. First condition is trivial to test.
if( ((MaskLow | MaskHigh) == 0) || (nack == 1) )
{
pEPD->ulEPFlags |= EPFLAGS_DELAYED_NACK;
if(pEPD->DelayedMaskTimer == 0)
{
DPFX(DPFPREP,7, "(%p) Setting Delayed Mask Timer", pEPD);
LOCK_EPD(pEPD, "LOCK (DelayedMaskTimer)"); // Bump RefCnt for timer
ScheduleProtocolTimer(pSPD, SHORT_DELAYED_ACK_TIMEOUT, 5, DelayedAckTimeout,
(PVOID) pEPD, &pEPD->DelayedMaskTimer, &pEPD->DelayedMaskTimerUnique);
pEPD->tReceiveMaskDelta = GETTIMESTAMP();
}
else
{
DPFX(DPFPREP,7, "(%p) *** DELAYED NACK *** Timer already running", pEPD);
}
}
}
else
{
// NOT TAIL INSERTION
// This is the non-trivial case, ie new frame goes at beginning or in middle of OddFrameList.
// So we need to count the ONE bits that are to the RIGHT of the new bit in the ReceiveMask.
// We will mask off bits higher then the New Bit and then do a quick bit-count...
DPFX(DPFPREP,7, "(%p) Receive OUT OF ORDER - Walking Frame List (Seq=%x, NRcv=%x) MaskL=%x MaskH=%x", pEPD, pRCD->bSeq, pEPD->bNextReceive, pEPD->ulReceiveMask, pEPD->ulReceiveMask2);
// If we are inserting into high mask, we must count all one-bits in low mask
//
// We will test for the special case of all-bits-set at the outset...
pLink = pEPD->blOddFrameList.GetNext(); // pLink = First frame in list; we will walk list as we count
if(WorkMaskHigh)
{
// new frame in high mask. only count bits to right of new bit
WorkMaskHigh -= 1; // Convert to mask preserving all bits to right of new bit
WorkMaskHigh &= MaskHigh; // WMH now represents all bits to right of new bit
while(WorkMaskHigh)
{
// Make sure this is farther in the window than the one we are skipping
ASSERT(((BYTE)(CONTAINING_OBJECT(pLink, RCD, blOddFrameLinkage))->bSeq - pEPD->bNextReceive) < (BYTE)(pRCD->bSeq - pEPD->bNextReceive));
// Count bits in WMH
Mask = WorkMaskHigh - 1;
WorkMaskHigh &= Mask;
pLink = pLink->GetNext();
}
if(MaskLow == 0xFFFFFFFF)
{
// special case if low mask is full
for(count = 0; count < 32; count++)
{
// Make sure this is farther in the window than the one we are skipping
ASSERT(((BYTE)(CONTAINING_OBJECT(pLink, RCD, blOddFrameLinkage))->bSeq - pEPD->bNextReceive) < (BYTE)(pRCD->bSeq - pEPD->bNextReceive));
pLink = pLink->GetNext();
}
}
else
{
// else count all bits in lower mask
while(MaskLow)
{
// Make sure this is farther in the window than the one we are skipping
ASSERT(((BYTE)(CONTAINING_OBJECT(pLink, RCD, blOddFrameLinkage))->bSeq - pEPD->bNextReceive) < (BYTE)(pRCD->bSeq - pEPD->bNextReceive));
Mask = MaskLow - 1;
MaskLow &= Mask; // Mask off low 1-bit
pLink = pLink->GetNext();
}
}
}
else
{
WorkMaskLow -= 1;
WorkMaskLow &= MaskLow; // WML == bits to the right of new bit
while(WorkMaskLow)
{
// Make sure this is farther in the window than the one we are skipping
ASSERT(((BYTE)(CONTAINING_OBJECT(pLink, RCD, blOddFrameLinkage))->bSeq - pEPD->bNextReceive) < (BYTE)(pRCD->bSeq - pEPD->bNextReceive));
Mask = WorkMaskLow - 1;
WorkMaskLow &= Mask; // Mask off low 1-bit
pLink = pLink->GetNext();
}
}
// Make sure this is farther in the window than the last one
ASSERT(((BYTE)(CONTAINING_OBJECT(pLink->GetPrev(), RCD, blOddFrameLinkage))->bSeq - pEPD->bNextReceive) < (BYTE)(pRCD->bSeq - pEPD->bNextReceive));
pRCD->blOddFrameLinkage.InsertBefore( pLink); // Insert new frame in sorted list
} // Receive not at tail
#ifdef DBG
// Dump the contents of the Out of Order Frame List for verification. There are at most 64 frames.
{
BYTE bCurSeq = pEPD->bNextReceive + 1;
ULONG64 ulMask = ((ULONG64)pEPD->ulReceiveMask2 << 32) | ((ULONG64)pEPD->ulReceiveMask);
CBilink* pTemp;
TCHAR szOOFL[256];
szOOFL[0] = 0;
pTemp = pEPD->blOddFrameList.GetNext();
while (pTemp != &pEPD->blOddFrameList)
{
while (ulMask != 0 && !(ulMask & 1))
{
ulMask >>= 1;
bCurSeq++;
}
ASSERT(ulMask != 0);
PRCD pRCDTemp = CONTAINING_OBJECT(pTemp, RCD, blOddFrameLinkage);
ASSERT_RCD(pRCDTemp);
ASSERT(bCurSeq == pRCDTemp->bSeq);
wsprintf(szOOFL, _T("%s %02x"), szOOFL, pRCDTemp->bSeq);
ulMask >>= 1;
bCurSeq++;
pTemp = pTemp->GetNext();
}
DPFX(DPFPREP, 7, "OOFL contents: %s", szOOFL);
}
#endif // DBG
// ** Non-Sequential Indication
//
// This is the Non-Trivial implementation of non-sequential receive indication.
// We will work from the assumption that we only need to complete messages that are touched by the new frame.
// So we must back up in the OddFrame list until we see either a gap or a Start of Message marker. Then we must work
// forward looking for an End of Message...
//
// One more complication is the fact that dropped packets might in the list via place-holding dummies. Since we
// do not know what SOM/EOM flags would have been present on a dropped frame, we can consider them to have BOTH flags.
// Then we also need to be aware that frames bordering on dropped frames without a delimiter (SOM or EOM) are fragments
// and therefore count as dropped data too. I think to keep this from getting too complex, we wont probe further for
// neighbors of lost data frames. We will discover them when we are building a message later.
//
// pLink = Item after new element in Out of Order list
// pRCD = new Item
// IF this frame is not marked as SEQUENTIAL
if((pRCD->bFrameFlags & PACKET_COMMAND_SEQUENTIAL)==0)
{
DPFX(DPFPREP,7, "(%p) Received Non-Seq %x out of order; flags=%x", pEPD, pRCD->bSeq, pRCD->bFrameFlags);
NextSeq = pRCD->bSeq;
// NOTE: The first pLink will be the passed in RCD so we will have included that in the frame_count and msg_length after leaving this while
while ( (pLink = pLink->GetPrev()) != &pEPD->blOddFrameList )
{
pRCD1 = CONTAINING_OBJECT(pLink, RCD, blOddFrameLinkage);
ASSERT_RCD(pRCD1);
frame_count++;
msg_length += pRCD1->uiDataSize;
if((pRCD1->bFrameFlags & PACKET_COMMAND_NEW_MSG) || (pRCD1->bSeq != NextSeq))
{
break; // Stop probing when we find a NEW_MSG flag OR a gap in the frame sequence numbers
}
--NextSeq;
}
// We have either found a NEW_MSG or a sequence gap. If its a NEW_MSG, then we probe forward for an END_MSG
if((pRCD1->bFrameFlags & PACKET_COMMAND_NEW_MSG) && (pRCD1->bSeq == NextSeq))
{
// So far so good. We have a sequential message start frame
//
// pRCD = frame just arrived
// pRCD1 = Start of message frame
// pLink = Start of message linkage
pLink = &pRCD->blOddFrameLinkage;
NextSeq = pRCD->bSeq;
// Look for the message end or a sequence gap
while ( ( (pRCD->bFrameFlags & PACKET_COMMAND_END_MSG)==0 ) && (pRCD->bSeq == NextSeq))
{
// Stop if we hit the end of the OddFrameList
if((pLink = pLink->GetNext()) == &pEPD->blOddFrameList)
{
break;
}
// NOTE: the first pLink here will be the one after the passed in RCD. If there is a gap that won't
// matter because we are out of here after the next if. If it is the next message we will continue until
// we hit the END_MSG and have a proper frame_count and msg_length.
pRCD = CONTAINING_OBJECT(pLink, RCD, blOddFrameLinkage);
ASSERT_RCD(pRCD);
frame_count++;
msg_length += pRCD->uiDataSize;
NextSeq++;
}
// pLink should not be used after this point due to the way the above while could have left it either valid
// or at &pEPD->blOddFrameList.
pLink = NULL;
if((pRCD->bFrameFlags & PACKET_COMMAND_END_MSG) && (pRCD->bSeq == NextSeq))
{
// We have completed a message
//
// pRCD1 = First frame in message
// pRCD = Last frame in message
DPFX(DPFPREP,7, "(%p) Completed Non-Seq Msg: First=%x, Last=%x", pEPD, pRCD1->bSeq, pRCD->bSeq);
lost = FALSE;
pRCD->ulRFlags |= RFLAGS_FRAME_INDICATED_NONSEQ;
pRCD->pMsgLink = NULL;
lost |= pRCD->ulRFlags & RFLAGS_FRAME_LOST;
// Get the pointer to the next to last message so we can remove the last
pLink = pRCD->blOddFrameLinkage.GetPrev();
LOCK_RCD(pRCD); // ReceiveInOrderFrame must remove this
// Walk from the last message to the first message accumulating lost flags, linking messages,
// setting indicated flag, and pulling off of the odd frame list
while (pRCD != pRCD1)
{
ASSERT(pLink != &pEPD->blOddFrameList); // Make sure we didn't run out of RCDs on the list
pRCD2 = CONTAINING_OBJECT(pLink, RCD, blOddFrameLinkage);
ASSERT_RCD(pRCD2);
pRCD2->pMsgLink = pRCD;
LOCK_RCD(pRCD2); // ReceiveInOrderFrame must remove this
pRCD2->ulRFlags |= RFLAGS_FRAME_INDICATED_NONSEQ;
lost |= pRCD2->ulRFlags & RFLAGS_FRAME_LOST;
pLink = pRCD2->blOddFrameLinkage.GetPrev();
pRCD = pRCD2;
}
// Both RCD and RCD1 point to the first message now
// If any were lost, drop the receive, otherwise complete it
if(!lost)
{
pRCD->uiFrameCount = frame_count;
pRCD->uiMsgSize = msg_length;
DPFX(DPFPREP,7, "(%p) Adding msg to complete list FirstSeq=%x QueueSize=%d", pEPD, pRCD->bSeq, pEPD->uiCompleteMsgCount);
pRCD->blCompleteLinkage.InsertBefore( &pEPD->blCompleteList);
pEPD->uiCompleteMsgCount++;
}
else
{
DPFX(DPFPREP,7, "(%p) Complete Non-Seq MSG is dropped due to missing frames", pEPD);
DropReceive(pEPD, pRCD, ppRcvBuffToFree);
}
}
} // else there is nothing to complete at this time...
} // IF NON SEQUENTIAL
}
/*
** Drop Receive
**
** One or more frames composing a message have been dropped, so the entire message can be scrapped.
** If this was determined during an out of order receive then the RCDs will remain on the OddFrameList
** as usual.
*/
#undef DPF_MODNAME
#define DPF_MODNAME "DropReceive"
VOID
DropReceive(PEPD pEPD, PRCD pRCD, PSPRECEIVEDBUFFER* ppRcvBuffToFree)
{
PRCD pNext;
while(pRCD != NULL)
{
ASSERT_RCD(pRCD);
if (pRCD->bFrameFlags & PACKET_COMMAND_RELIABLE)
{
DPFX(DPFPREP,1, "(%p) Dropping G receive frame %x!!!", pEPD, pRCD->bSeq);
}
else
{
DPFX(DPFPREP,7, "(%p) Dropping NG receive frame %x", pEPD, pRCD->bSeq);
}
RELEASE_SP_BUFFER(*ppRcvBuffToFree, pRCD->pRcvBuff);
pNext = pRCD->pMsgLink;
RELEASE_RCD(pRCD);
pRCD = pNext;
}
}
/*
** Receive Complete
**
** We have received an entire reliable message, potentially spanning
** multiple messages. We are still on the receive thread right now so depending
** upon our desired indication behavior we will either indicate it directly or
** else queue it to be indicated on a background thread of some sort.
**
** Messages spanning multiple frames (for now) will be copied into a contiguous
** buffer for delivery. CODEWORK -- Server implementations should be able to receive
** large messages as buffer chains (or arrays of BufDescs).
**
** This is also where we must notice that an End Of Stream flag is set in a message,
** indicating that the connection is being closed.
**
** *** CALLED WITH EPD->STATELOCK HELD *** RETURNS WITH STATELOCK RELEASED ***
*/
#undef DPF_MODNAME
#define DPF_MODNAME "ReceiveComplete"
VOID
ReceiveComplete(PEPD pEPD)
{
CBilink *pLink;
PRCD pRCD;
PRCD pNext;
PSPRECEIVEDBUFFER pRcvBuff = NULL;
PBIGBUF pBuf;
PBYTE write;
UINT length;
UINT frames;
DWORD flag;
UINT MsgSize;
HRESULT hr;
PProtocolData pPData=pEPD->pSPD->pPData;
AssertCriticalSectionIsTakenByThisThread(&pEPD->EPLock, TRUE);
while((pLink = pEPD->blCompleteList.GetNext()) != &pEPD->blCompleteList)
{
pLink->RemoveFromList();
ASSERT(pEPD->uiCompleteMsgCount > 0);
pEPD->uiCompleteMsgCount--;
Unlock(&pEPD->EPLock);
pRCD = CONTAINING_OBJECT(pLink, RCD, blCompleteLinkage);
ASSERT_RCD(pRCD);
// Handle easy case first
if(pRCD->uiFrameCount == 1) // message is only 1 frame
{
//if data length is zero we've either got an old style keep alive or an EOS
//alternatively if link supports signing and the keep alive bit is flicked we've
//got a new style keep alive
if (pRCD->uiDataSize==0 ||
((pEPD->ulEPFlags2 & EPFLAGS2_SUPPORTS_SIGNING) && (pRCD->bFrameControl & PACKET_CONTROL_KEEPALIVE)))
{
DNASSERT(!(pRCD->bFrameControl & PACKET_CONTROL_COALESCE));
//for EOS or old style keep alive there will be no data
//for a new style keep alive there should be a DWORD session identity
DNASSERT(pRCD->uiDataSize==0 || (pRCD->uiDataSize==sizeof(DWORD)));
//if marked as end of stream handle the closure case
if(pRCD->bFrameControl & PACKET_CONTROL_END_STREAM)
{
// END OF STREAM indicated
DPFX(DPFPREP,7, "(%p) Processing EndOfStream, pRCD[%p]", pEPD, pRCD);
ProcessEndOfStream(pEPD);
}
RELEASE_SP_BUFFER(pRcvBuff, pRCD->pRcvBuff); // Really only queues it to be released
}
//else we've got some user data to indicate up
else
{
DNASSERT(pRCD->pRcvBuff->pNext == NULL);
pRCD->pRcvBuff->pServiceProviderDescriptor = pEPD->pSPD;
if (pRCD->bFrameControl & PACKET_CONTROL_COALESCE)
{
PCOALESCEHEADER pCoalesceHeaders = (PCOALESCEHEADER) pRCD->pbData;
DWORD dwSubFrame;
BYTE* pbData;
DWORD dwCoalesceDataSize;
// Find the start of the data. Skip the alignment padding, if there is any.
pbData = (BYTE*) (pCoalesceHeaders + pRCD->dwNumCoalesceHeaders);
DBG_CASSERT(sizeof(COALESCEHEADER) == 2);
if ((pRCD->dwNumCoalesceHeaders & 1) != 0)
{
pbData += 2;
}
// We will borrow pNext to use as a ref count. We must add one ref at the top of this
// loop to ensure that the count doesn't go to zero before we indicate all of the
// pieces to the Core.
pRCD->pRcvBuff->pNext = (_SPRECEIVEDBUFFER*)1;
pRCD->pRcvBuff->dwProtocolData = RBT_SERVICE_PROVIDER_BUFFER_COALESCE;
for(dwSubFrame = 0; dwSubFrame < pRCD->dwNumCoalesceHeaders; dwSubFrame++)
{
dwCoalesceDataSize = pCoalesceHeaders[dwSubFrame].bSize;
dwCoalesceDataSize |= (DWORD) (pCoalesceHeaders[dwSubFrame].bCommand & (PACKET_COMMAND_COALESCE_BIG_1 | PACKET_COMMAND_COALESCE_BIG_2 | PACKET_COMMAND_COALESCE_BIG_3)) << 5;
ASSERT((UINT) ((UINT_PTR) (pbData + dwCoalesceDataSize - pRCD->pbData)) <= pRCD->uiDataSize);
//if message size exceeds the maximum size we just skip this subframe
//otherwise update stats and indicate it up to core
if (dwCoalesceDataSize>pPData->dwMaxRecvMsgSize)
{
DPFX(DPFPREP, 1, "(%p) Message size exceeds maximum accepted. Skipping subframe "
"MsgSize[%u], MaxRecvMsgSize[%u]", pEPD, dwCoalesceDataSize, pPData->dwMaxRecvMsgSize);
}
else
{
DNInterlockedIncrement((LONG*)&pRCD->pRcvBuff->pNext);
pEPD->uiMessagesReceived++;
if(pCoalesceHeaders[dwSubFrame].bCommand & PACKET_COMMAND_RELIABLE)
{
pEPD->uiGuaranteedFramesReceived++;
pEPD->uiGuaranteedBytesReceived += dwCoalesceDataSize;
}
else
{
pEPD->uiDatagramFramesReceived++;
pEPD->uiDatagramBytesReceived += dwCoalesceDataSize;
}
flag = (((DWORD) pCoalesceHeaders[dwSubFrame].bCommand) & (PACKET_COMMAND_USER_1 | PACKET_COMMAND_USER_2)) * (DN_SENDFLAGS_SET_USER_FLAG / PACKET_COMMAND_USER_1);
DEBUG_ONLY(DNInterlockedIncrement(&pEPD->pSPD->pPData->ThreadsInReceive));
DEBUG_ONLY(DNInterlockedIncrement(&pEPD->pSPD->pPData->BuffersInReceive));
AssertNoCriticalSectionsFromGroupTakenByThisThread(&g_blProtocolCritSecsHeld);
DPFX(DPFPREP,DPF_CALLOUT_LVL, "(%p) Calling Core->IndicateReceive (coalesced), pRCD[%p] (data 0x%p, %u, %u/%u), Core Context[%p]", pEPD, pRCD, pbData, dwCoalesceDataSize, dwSubFrame, pRCD->dwNumCoalesceHeaders, pEPD->Context);
hr = pEPD->pSPD->pPData->pfVtbl->IndicateReceive(pEPD->pSPD->pPData->Parent, pEPD->Context, pbData, dwCoalesceDataSize, pRCD->pRcvBuff, flag);
if(hr == DPN_OK)
{
ASSERT(*((LONG*)&pRCD->pRcvBuff->pNext) > 1);
DNInterlockedDecrement((LONG*)&pRCD->pRcvBuff->pNext);
}
else
{
ASSERT(hr == DPNERR_PENDING);
}
DEBUG_ONLY(DNInterlockedDecrement(&pEPD->pSPD->pPData->ThreadsInReceive));
}
// If this isn't the last packet, round up to the nearest DWORD alignment.
if (! (pCoalesceHeaders[dwSubFrame].bCommand & PACKET_COMMAND_END_COALESCE))
{
dwCoalesceDataSize = (dwCoalesceDataSize + 3) & (~3);
}
pbData += dwCoalesceDataSize;
ASSERT((UINT) ((UINT_PTR) (pbData - pRCD->pbData)) <= pRCD->uiDataSize);
}
DNPReleaseReceiveBuffer(pEPD->pSPD->pPData, pRCD->pRcvBuff);
// The Core owns it now and is responsible for calling DNPReleaseReceiveBuffer to free it
pRCD->pRcvBuff = NULL;
}
else
{
//if message size exceeds the maximum we accept then simply release the SP buffer
if (pRCD->uiDataSize>pPData->dwMaxRecvMsgSize)
{
DPFX(DPFPREP, 1, "(%p) Message size exceeds maximum accepted. Dropping single frame "
"MsgSize[%u], MaxRecvMsgSize[%u]", pEPD, pRCD->uiDataSize, pPData->dwMaxRecvMsgSize);
RELEASE_SP_BUFFER(pRcvBuff, pRCD->pRcvBuff);
}
else
{
pRCD->pRcvBuff->dwProtocolData = RBT_SERVICE_PROVIDER_BUFFER;
pEPD->uiMessagesReceived++;
if(pRCD->bFrameFlags & PACKET_COMMAND_RELIABLE)
{
pEPD->uiGuaranteedFramesReceived++;
pEPD->uiGuaranteedBytesReceived += pRCD->uiDataSize;
}
else
{
pEPD->uiDatagramFramesReceived++;
pEPD->uiDatagramBytesReceived += pRCD->uiDataSize;
}
flag = (((DWORD) pRCD->bFrameFlags) & (PACKET_COMMAND_USER_1 | PACKET_COMMAND_USER_2)) * (DN_SENDFLAGS_SET_USER_FLAG / PACKET_COMMAND_USER_1);
DEBUG_ONLY(DNInterlockedIncrement(&pEPD->pSPD->pPData->ThreadsInReceive));
DEBUG_ONLY(DNInterlockedIncrement(&pEPD->pSPD->pPData->BuffersInReceive));
AssertNoCriticalSectionsFromGroupTakenByThisThread(&g_blProtocolCritSecsHeld);
DPFX(DPFPREP,DPF_CALLOUT_LVL, "(%p) Calling Core->IndicateReceive, pRCD[%p], Core Context[%p]", pEPD, pRCD, pEPD->Context);
hr = pEPD->pSPD->pPData->pfVtbl->IndicateReceive(pEPD->pSPD->pPData->Parent, pEPD->Context, pRCD->pbData, pRCD->uiDataSize, pRCD->pRcvBuff, flag);
if(hr == DPN_OK)
{
RELEASE_SP_BUFFER(pRcvBuff, pRCD->pRcvBuff); // Really only queues it to be released
DEBUG_ONLY(DNInterlockedDecrement(&pEPD->pSPD->pPData->BuffersInReceive));
}
else
{
ASSERT(hr == DPNERR_PENDING);
// The Core owns it now and is responsible for calling DNPReleaseReceiveBuffer to free it
pRCD->pRcvBuff = NULL;
}
DEBUG_ONLY(DNInterlockedDecrement(&pEPD->pSPD->pPData->ThreadsInReceive));
}
}
}
RELEASE_RCD(pRCD); // Release reference for Complete Processing
pRCD = NULL;
}
else // Message spans multiple frames
{
ASSERT(!(pRCD->bFrameControl & PACKET_CONTROL_COALESCE));
//if the message exceeds the maximum size permitted then don't allocate a buffer
//otherwise get a single buffer large enough to hold data from multiple buffers
MsgSize = pRCD->uiMsgSize;
if (MsgSize>pPData->dwMaxRecvMsgSize)
{
DPFX(DPFPREP, 1, "(%p) Message size exceeds maximum accepted. Dropping multiple frames "
"MsgSize[%u], MaxRecvMsgSize[%u]", pEPD, MsgSize, pPData->dwMaxRecvMsgSize);
pBuf=NULL;
}
else if (MsgSize<= SMALL_BUFFER_SIZE)
{
pBuf = (PBIGBUF)POOLALLOC(MEMID_SMALLBUFF, &BufPool);
}
else if (MsgSize <= MEDIUM_BUFFER_SIZE)
{
pBuf = (PBIGBUF)POOLALLOC(MEMID_MEDBUFF, &MedBufPool);
}
else if (MsgSize <= LARGE_BUFFER_SIZE)
{
pBuf = (PBIGBUF)POOLALLOC(MEMID_BIGBUFF, &BigBufPool);
}
else
{
DPFX(DPFPREP,7, "(%p) RECEIVE HUGE MESSAGE", pEPD);
// Receive is larger then our biggest static receive buffer. This means we have to allocate a dynamic buffer.
pBuf = (PBIGBUF) MEMALLOC(MEMID_HUGEBUF, MsgSize + sizeof(DYNBUF));
if(pBuf)
{
pBuf->Type = RBT_DYNAMIC_BUFFER;
}
}
if(pBuf == NULL)
{
DPFX(DPFPREP,0, "(%p) Either mem alloc failed or message too large. Cannot deliver data", pEPD);
while(pRCD != NULL)
{
ASSERT_RCD(pRCD);
pNext = pRCD->pMsgLink;
RELEASE_SP_BUFFER(pRcvBuff, pRCD->pRcvBuff);
RELEASE_RCD(pRCD);
pRCD = pNext;
}
Lock(&pEPD->EPLock);
continue; // blow it off!
}
write = pBuf->data; // initialize write pointer
length = 0;
frames = 0;
while(pRCD != NULL)
{
ASSERT_RCD(pRCD);
memcpy(write, pRCD->pbData, pRCD->uiDataSize);
write += pRCD->uiDataSize;
length += pRCD->uiDataSize;
frames++;
pNext = pRCD->pMsgLink;
flag = (DWORD) pRCD->bFrameFlags;
RELEASE_SP_BUFFER(pRcvBuff, pRCD->pRcvBuff);
RELEASE_RCD(pRCD);
pRCD = pNext;
}
pEPD->uiMessagesReceived++;
if(flag & PACKET_COMMAND_RELIABLE)
{
pEPD->uiGuaranteedFramesReceived += frames;
pEPD->uiGuaranteedBytesReceived += length;
}
else
{
pEPD->uiDatagramFramesReceived += frames;
pEPD->uiDatagramBytesReceived += length;
}
flag = (flag & (PACKET_COMMAND_USER_1 | PACKET_COMMAND_USER_2)) * (DN_SENDFLAGS_SET_USER_FLAG / PACKET_COMMAND_USER_1);
AssertNoCriticalSectionsFromGroupTakenByThisThread(&g_blProtocolCritSecsHeld);
DPFX(DPFPREP,DPF_CALLOUT_LVL, "(%p) Calling Core->IndicateReceive, Core Context[%p]", pEPD, pEPD->Context);
hr = pEPD->pSPD->pPData->pfVtbl->IndicateReceive(pEPD->pSPD->pPData->Parent, pEPD->Context, pBuf->data, length, pBuf, flag);
if(hr == DPN_OK)
{
DNPReleaseReceiveBuffer(pEPD->pSPD->pPData, pBuf);
}
else
{
ASSERT(hr == DPNERR_PENDING);
}
}
Lock(&pEPD->EPLock);
}
ASSERT(pEPD->blCompleteList.IsEmpty());
pEPD->ulEPFlags &= ~(EPFLAGS_IN_RECEIVE_COMPLETE); // Clear this before releasing Lock final time
Unlock(&pEPD->EPLock);
if(pRcvBuff != NULL)
{
AssertNoCriticalSectionsFromGroupTakenByThisThread(&g_blProtocolCritSecsHeld);
DPFX(DPFPREP,DPF_CALLOUT_LVL, "(%p) Calling SP->ReturnReceiveBuffers, pSPD[%p]", pEPD, pEPD->pSPD);
IDP8ServiceProvider_ReturnReceiveBuffers(pEPD->pSPD->IISPIntf, pRcvBuff);
}
}
/*
** Process Send Mask
**
** The send mask is what our partner uses to tell us to stop waiting for particular frames.
** This will happen after an Unreliable frame is dropped. Instead of retransmitting the unreliable
** frame, the sender will forward the appropriate bit in a send mask. In this routine, we attempt
** to update our receive state pursuant to the newly received mask.
**
** THIS IS CALLED WITH STATELOCK HELD AND RETURNS WITH STATELOCK HELD
**
** suffice it to say that we should not release statelock anywhere in the following
*/
#undef DPF_MODNAME
#define DPF_MODNAME "ProcessSendMask"
VOID
ProcessSendMask(PEPD pEPD, BYTE bSeq, ULONG MaskLow, ULONG MaskHigh, DWORD tNow, PSPRECEIVEDBUFFER* ppRcvBuffToFree)
{
PSPD pSPD = pEPD->pSPD;
INT deltaS;
ULONG workmaskS;
BYTE bThisFrame;
UINT skip;
ASSERT(MaskLow | MaskHigh);
DPFX(DPFPREP,7, "(%p) PROCESS SEND MASK N(R)=%x, bSeq=%x, MaskL=%x, MaskH=%x", pEPD, pEPD->bNextReceive, bSeq, MaskLow, MaskHigh);
// The mask can only refer to frames earlier than the Seq number in this frame. So if this frame
// is the next In-Order then the mask can have nothing interesting in it.
//
// The SendMask is coded with decending frame numbers starting at the Seq in this frame - 1.
// The ReceiveMask is coded with ascending frame numbers start at N(Rcv) + 1.
//
// We will walk forward through the rcvmask and backward through the sendmask looking for the magic combo
// of a bit clear in the rcvmask and the corresponding bit set in the sendmask. For each of these matches,
// a dummy cancel frame can be 'received' for that sequence number.
//
// This would be fairly straightforward if it wasn't for the fact that both masks are 64 bits so the code has
// to track which DWORD of each mask we are dealing with at any given time.
//
// NOTE: It is perfectly legitimate for a SACK to come in with a bNSeq at MAX_FRAME_OFFSET from pEPD->bNextReceive. Consider
// the case where pEPD->bNextReceive is 0 and the sender has sent and timed out 0-63. A SACK would arrive with a bNSeq of 64
// and both masks fully set.
top:
if (bSeq != pEPD->bNextReceive)
{
deltaS = (INT) (((BYTE)(bSeq - pEPD->bNextReceive)) - 1); // count of frames between first missing frame and sequence base of mask
bThisFrame = pEPD->bNextReceive;
if ( deltaS <= MAX_FRAME_OFFSET )
{
// If the difference is greater then 32 frames then we need to look at the high mask first and
// then fall through to the low mask. Otherwise, we can ignore the highmask and start with the low.
while((deltaS > 31) && (MaskHigh)) // Any work to do in the upper bits?
{
workmaskS = 1 << (deltaS - 32); // walks bit positions backward in send mask
// See if the next frame we are interested in is covered by this mask
if(workmaskS & MaskHigh)
{
CancelFrame(pEPD, bThisFrame, tNow, ppRcvBuffToFree);
MaskHigh &= ~workmaskS;
// N(R) may have been bumped up multiple times by CancelFrame, reset to make sure we work with
// up to date information.
goto top;
}
else
{
bThisFrame++;
deltaS--;
}
}
if(deltaS > 31)
{
skip = deltaS - 31; // how many bit positions did we skip
bThisFrame += (BYTE) skip;
deltaS -= skip;
}
while((deltaS >= 0) && (MaskLow)) // Any work to do in the lower bits?
{
workmaskS = 1 << deltaS;
if(workmaskS & MaskLow)
{
CancelFrame(pEPD, bThisFrame, tNow, ppRcvBuffToFree);
MaskLow &= ~workmaskS;
// N(R) may have been bumped up multiple times by CancelFrame, reset to make sure we work with
// up to date information.
goto top;
}
else
{
bThisFrame++;
deltaS--;
}
}
}
}
// We need to ACK every time a send mask. Consider the case of one way Non-Guaranteed traffic. If data or an ACK gets lost,
// this will be the only way we get back in sync with the other side.
// If timer is not running better start it now
if(pEPD->DelayedAckTimer == 0)
{
LOCK_EPD(pEPD, "LOCK (DelayedAckTimer)"); // Bump RefCnt for timer
pEPD->ulEPFlags |= EPFLAGS_DELAY_ACKNOWLEDGE;
DPFX(DPFPREP,7, "(%p) Setting Delayed Ack Timer", pEPD);
ScheduleProtocolTimer(pSPD, DELAYED_ACK_TIMEOUT, 0, DelayedAckTimeout,
(PVOID) pEPD, &pEPD->DelayedAckTimer, &pEPD->DelayedAckTimerUnique);
}
}
#undef DPF_MODNAME
#define DPF_MODNAME "BuildCancelledRCD"
PRCD
BuildCancelledRCD(PEPD pEPD, BYTE bSeq, DWORD tNow)
{
PRCD pRCD;
if((pRCD = (PRCD)POOLALLOC(MEMID_CANCEL_RCD, &RCDPool)) == NULL)
{
DPFX(DPFPREP,0, "Failed to allocate RCD");
return NULL;
}
pRCD->bSeq = bSeq;
pRCD->bFrameFlags = PACKET_COMMAND_NEW_MSG | PACKET_COMMAND_END_MSG;
pRCD->bFrameControl = 0;
pRCD->pbData = NULL;
pRCD->uiDataSize = 0;
pRCD->tTimestamp = tNow;
pRCD->pRcvBuff = NULL;
pRCD->ulRFlags = RFLAGS_FRAME_LOST;
return pRCD;
}
/* Cancel Frame
**
** An unreliable frame has been reported as lost by sender. This means we should consider it acknowledged
** and remove it from our receive window. This may require us to place a dummy receive descriptor in the OddFrameList
** to hold its place until the window moves past it.
*/
#undef DPF_MODNAME
#define DPF_MODNAME "CancelFrame"
BOOL
CancelFrame(PEPD pEPD, BYTE bSeq, DWORD tNow, PSPRECEIVEDBUFFER* ppRcvBuffToFree)
{
PRCD pRCD;
ULONG bit;
DPFX(DPFPREP,7, "(%p) CANCEL FRAME: Seq=%x", pEPD, bSeq);
AssertCriticalSectionIsTakenByThisThread(&pEPD->EPLock, TRUE);
// Trivial case is when the cancelled frame is at the front of the window. In this case we can complete not only
// this frame but any contiguous frames following it in the OddFrameList
if(pEPD->bNextReceive == bSeq)
{
if((pRCD = BuildCancelledRCD(pEPD, bSeq, tNow)) == NULL)
{
return FALSE;
}
ReceiveInOrderFrame(pEPD, pRCD, ppRcvBuffToFree);
}
// Here we have to place a dummy node on the OddFrameList to represent this frame.
else
{
// bit location in mask for this frame
bit = (BYTE) ((bSeq - pEPD->bNextReceive) - 1);
// Make sure this is not a duplicate frame
if( ((bit < 32) && (pEPD->ulReceiveMask & (1 << bit))) || ((bit > 31) && (pEPD->ulReceiveMask2 & (1 << (bit - 32)))) )
{
DPFX(DPFPREP,7, "(%p) Received CancelMask for frame that's already received Seq=%x", pEPD, bSeq);
return FALSE;
}
if((pRCD = BuildCancelledRCD(pEPD, bSeq, tNow)) == NULL)
{
return FALSE;
}
ReceiveOutOfOrderFrame(pEPD, pRCD, bit, ppRcvBuffToFree);
}
return TRUE;
}
/*
** Release Receive Buffer
**
** The core calls this function to return buffers previously handed
** over in an IndicateUserData call. This call may be made before the
** actual indication returns.
*/
#undef DPF_MODNAME
#define DPF_MODNAME "DNPReleaseReceiveBuffer"
HRESULT
DNPReleaseReceiveBuffer(HANDLE hProtocolData, HANDLE hBuffer)
{
ProtocolData* pPData;
PSPD pSPD;
HRESULT hr;
union
{
PBIGBUF pBuf;
PSPRECEIVEDBUFFER pRcvBuff;
} pBuffer;
DBG_CASSERT(OFFSETOF(buf, Type) == OFFSETOF(SPRECEIVEDBUFFER, dwProtocolData));
DBG_CASSERT(sizeof(BUFFER_TYPE) == sizeof(DWORD));
DPFX(DPFPREP,DPF_CALLIN_LVL, "Parameters: hProtocolData[%p], hBuffer[%p]", hProtocolData, hBuffer);
hr = DPN_OK;
pPData = (ProtocolData*)hProtocolData;
ASSERT_PPD(pPData);
pBuffer.pBuf = (PBIGBUF) hBuffer;
// NOTE: This is expecting pRcvBuff->pNext to be NULL and for RBT_SERVICE_PROVIDER_BUFFER to equal zero
// to work.
switch(pBuffer.pBuf->Type)
{
case RBT_SERVICE_PROVIDER_BUFFER:
pSPD = (PSPD)pBuffer.pRcvBuff->pServiceProviderDescriptor;
ASSERT_SPD(pSPD);
DEBUG_ONLY(DNInterlockedDecrement(&pSPD->pPData->BuffersInReceive));
pBuffer.pRcvBuff->pNext = NULL;
AssertNoCriticalSectionsFromGroupTakenByThisThread(&g_blProtocolCritSecsHeld);
DPFX(DPFPREP,DPF_CALLOUT_LVL, "Calling SP->ReturnReceiveBuffers, pRcvBuff[%p], pSPD[%p]", pBuffer.pRcvBuff, pSPD);
IDP8ServiceProvider_ReturnReceiveBuffers(pSPD->IISPIntf, pBuffer.pRcvBuff);
break;
case RBT_SERVICE_PROVIDER_BUFFER_COALESCE:
// For coalesced packets we borrow pNext as a ref count. When the ref count gets to zero,
// we change the buffer back to a normal SP buffer and free it.
pSPD = (PSPD)pBuffer.pRcvBuff->pServiceProviderDescriptor;
ASSERT_SPD(pSPD);
DEBUG_ONLY(DNInterlockedDecrement(&pSPD->pPData->BuffersInReceive));
if (DNInterlockedDecrement((LONG*)&pBuffer.pRcvBuff->pNext) == 0)
{
pBuffer.pBuf->Type = RBT_SERVICE_PROVIDER_BUFFER;
hr = DNPReleaseReceiveBuffer(hProtocolData, hBuffer);
}
break;
case RBT_PROTOCOL_NORM_BUFFER:
BufPool.Release(pBuffer.pBuf);
break;
case RBT_PROTOCOL_MED_BUFFER:
MedBufPool.Release(pBuffer.pBuf);
break;
case RBT_PROTOCOL_BIG_BUFFER:
BigBufPool.Release(pBuffer.pBuf);
break;
case RBT_DYNAMIC_BUFFER:
DNFree(hBuffer);
break;
default:
DPFX(DPFPREP,0, "RELEASE RECEIVE BUFFER CALLED WITH BAD PARAMETER");
DNASSERT(FALSE);
hr = DPNERR_INVALIDPARAM;
break;
}
DPFX(DPFPREP,DPF_CALLIN_LVL, "Returning hr[%x]", hr);
AssertNoCriticalSectionsFromGroupTakenByThisThread(&g_blProtocolCritSecsHeld);
return hr;
}
/*
** Complete Sends
**
** Reliable sends are completed upon acknowlegement. Acknowlegements are discovered inside
** the UpdateXmitState routine while walking through the pending window. Since the actual completion
** event requires the user to be called, state can change. So the easiest thing to do is defer these
** completion callbacks until we are finished walking and can release any state locks. Also, this way
** we can defer the callbacks until after we have indicated any data which the acks were piggybacking on,
** something which ought to have priority anyway.
**
** So we will place all completed reliable sends onto a complete list and after all other processing
** we will come here and callback everything on the list.
*/
#undef DPF_MODNAME
#define DPF_MODNAME "CompleteSends"
VOID CompleteSends(PEPD pEPD)
{
PMSD pMSD;
CBilink *pLink;
Lock(&pEPD->EPLock);
pLink = pEPD->blCompleteSendList.GetNext();
while((pEPD->ulEPFlags & EPFLAGS_COMPLETE_SENDS) &&
(pLink != &pEPD->blCompleteSendList))
{
pMSD = CONTAINING_OBJECT(pLink, MSD, blQLinkage);
ASSERT_MSD(pMSD);
if(pMSD->CommandID != COMMAND_ID_SEND_DATAGRAM)
{
// Reliables, Keepalives, and Disconnects will come down this path
if(pMSD->ulMsgFlags2 & (MFLAGS_TWO_SEND_COMPLETE|MFLAGS_TWO_ABORT))
{
if (pMSD->uiFrameCount == 0)
{
DPFX(DPFPREP, DPF_FRAMECNT_LVL, "Completing, pMSD[%p], framecount[%u]", pMSD, pMSD->uiFrameCount);
pLink->RemoveFromList();
Unlock(&pEPD->EPLock);
Lock(&pMSD->CommandLock);
CompleteReliableSend(pEPD->pSPD, pMSD, DPN_OK); // This releases the CommandLock
Lock(&pEPD->EPLock);
pLink = pEPD->blCompleteSendList.GetNext();
}
else
{
DPFX(DPFPREP, DPF_FRAMECNT_LVL, "Frames still out, pMSD[%p], framecount[%u]", pMSD, pMSD->uiFrameCount);
pLink = pLink->GetNext();
}
}
else
{
DPFX(DPFPREP, DPF_FRAMECNT_LVL, "Message not yet complete, pMSD[%p], framecount[%u]", pMSD, pMSD->uiFrameCount);
break; // These will complete in order, so stop checking when we see one that's not Complete.
}
}
else
{
// Datagrams will come down this path
DPFX(DPFPREP, DPF_FRAMECNT_LVL, "Skipping datagram frame on complete list, pMSD[%p], framecount[%u]", pMSD, pMSD->uiFrameCount);
pLink = pLink->GetNext();
}
}
#ifdef DBG
// In DBG we want to assert that no one one the list could have been completed if we are leaving here
pLink = pEPD->blCompleteSendList.GetNext();
while(pLink != &pEPD->blCompleteSendList)
{
pMSD = CONTAINING_OBJECT(pLink, MSD, blQLinkage);
ASSERT_MSD(pMSD);
ASSERT(!(pMSD->ulMsgFlags2 & (MFLAGS_TWO_SEND_COMPLETE|MFLAGS_TWO_ABORT)) || pMSD->uiFrameCount != 0);
pLink = pLink->GetNext();
}
#endif // DBG
pEPD->ulEPFlags &= ~(EPFLAGS_COMPLETE_SENDS);
Unlock(&pEPD->EPLock);
}
/*
** Lookup CheckPoint
**
** Walk the EndPoint's list of active CPs looking for one with the provided
** response correlator.
** We keep the CKPT queue sorted by age so the matches should be at the front
** of the queue. So as we pass by entries at the head we will check the age of each
** and timeout the ones that are 4(RTT) or greater.
** Since DG drops are reported by the partner, we dont need to do any booking about
** the orphaned checkpoints.
**
** *!* This link's StateLock must be held on entry
*/
#ifdef DBG
#undef DPF_MODNAME
#define DPF_MODNAME "DumpChkPtList"
VOID
DumpChkPtList(PEPD pEPD)
{
CBilink *pLink;
PCHKPT pCP;
AssertCriticalSectionIsTakenByThisThread(&pEPD->EPLock, TRUE);
DPFX(DPFPREP,1, "==== DUMPING CHECKPOINT LIST ==== (pEPD = %p)", pEPD);
pLink = pEPD->blChkPtQueue.GetNext();
while(pLink != &pEPD->blChkPtQueue)
{
pCP = CONTAINING_OBJECT(pLink, CHKPT, blLinkage);
DPFX(DPFPREP,1, "(%p) MsgID=%x; Timestamp=%x", pEPD, pCP->bMsgID, pCP->tTimestamp);
pLink = pLink->GetNext();
}
}
#endif // DBG
#undef DPF_MODNAME
#define DPF_MODNAME "LookupCheckPoint"
PCHKPT LookupCheckPoint(PEPD pEPD, BYTE bRspID)
{
CBilink *pLink;
PCHKPT pCP;
AssertCriticalSectionIsTakenByThisThread(&pEPD->EPLock, TRUE);
pCP = CONTAINING_OBJECT((pLink = pEPD->blChkPtQueue.GetNext()), CHKPT, blLinkage);
while(pLink != &pEPD->blChkPtQueue)
{
// Look for checkpoint that matches correlator
if(pCP->bMsgID == bRspID)
{
pLink->RemoveFromList();
return pCP;
}
// We have passed the spot for this correlator!
else if ((bRspID - pCP->bMsgID) & 0x80)
{
DPFX(DPFPREP,1, "(%p) CHECKPOINT NOT FOUND - Later Chkpt found in list (%x)", pEPD, bRspID);
return NULL;
}
else
{
pLink = pLink->GetNext(); // Remove ChkPts prior to the one received
pCP->blLinkage.RemoveFromList(); // ..target and remove the stale ones.
ChkPtPool.Release(pCP); // we expect them to complete in order of queue
pCP = CONTAINING_OBJECT(pLink, CHKPT, blLinkage);
}
}
DPFX(DPFPREP,1, "(%p) CHECKPOINT NOT FOUND - EXHAUSTED LIST W/O MATCH (%x)", pEPD, bRspID);
#ifdef DBG
DumpChkPtList(pEPD);
#endif // DBG
return NULL;
}
#undef DPF_MODNAME
#define DPF_MODNAME "FlushCheckPoints"
VOID FlushCheckPoints(PEPD pEPD)
{
PCHKPT pCP;
AssertCriticalSectionIsTakenByThisThread(&pEPD->EPLock, TRUE);
while(!pEPD->blChkPtQueue.IsEmpty())
{
pCP = CONTAINING_OBJECT(pEPD->blChkPtQueue.GetNext(), CHKPT, blLinkage);
pCP->blLinkage.RemoveFromList();
ChkPtPool.Release(pCP);
}
}
/*
** Process End Of Stream
**
** Our partner has initiated an orderly link termination. He will not be
** sending us any more data. We are allowed to finish sending any data in our
** pipeline, but should not allow any new sends to be accepted. When our send
** pipeline is emptied, we should send an EOS frame and take down our
** link. Easiest way to do this is enqueue the EOS at the end of send queue now.
*/
#undef DPF_MODNAME
#define DPF_MODNAME "ProcessEndOfStream"
VOID ProcessEndOfStream(PEPD pEPD)
{
PMSD pMSD;
Lock(&pEPD->EPLock);
// Since an EOS comes in as a data packet, and we must be Connected to receive data, we know
// we can now be in either the Connected or Terminating state. If we are in the Terminating
// state, someone is already attempting to destroy the link and we will ignore this EOS, and
// let that termination finish. Otherwise, we expect to be in the Connected state, and this
// is a normal disconnect.
if (pEPD->ulEPFlags & EPFLAGS_STATE_TERMINATING)
{
DPFX(DPFPREP,7, "(%p) Received EndOfStream on an already terminating link, ignoring", pEPD);
Unlock(&pEPD->EPLock);
return;
}
ASSERT(pEPD->ulEPFlags & EPFLAGS_STATE_CONNECTED);
DPFX(DPFPREP,7, "(%p) Process EndOfStream", pEPD);
//we should never get both an EOS and a hard disconnect, since the remote ep should only
//ever attempt one type of disconnect, but lets code robustly and guard the case anyway
if (pEPD->ulEPFlags & EPFLAGS_HARD_DISCONNECT_TARGET)
{
DPFX(DPFPREP, 0, "(%p) Received both EOS and hard disconnect", pEPD);
DNASSERT(0);
Unlock(&pEPD->EPLock);
return;
}
//Possible that remote end start closing at the same time we started hard disconnect
//In which case we should ignore this EOS, as the hard disconnect takes priority
//We can't treat the EOS as the equivelant to a hard disconnect response because the sequence
// 1. Send Hard Disconnect. 2. Hard Disconnect Dropped. 3. Receive EOS and drop link
// would leave the far end hung until it timed out. Sending more hard disconnects will resolve this (hopefully!)
if (pEPD->ulEPFlags & EPFLAGS_HARD_DISCONNECT_SOURCE)
{
DPFX(DPFPREP, 7, "(%p) Received EOS with hard disconnect already started. Ignoring EOS", pEPD);
Unlock(&pEPD->EPLock);
return;
}
//if we've already received a disconnect then the close sequence will already have begun on this side
//hence nothing to do in this case
if(pEPD->ulEPFlags & EPFLAGS_RECEIVED_DISCONNECT)
{
DPFX(DPFPREP, 7, "(%p) Received another EOS. Ignoring this one", pEPD);
Unlock(&pEPD->EPLock);
return;
}
// Our side has not started closing yet, so our partner must have initiated a Disconnect.
// We are allowed to finish sending all data in our pipeline, but we should not accept
// any new data. We must deliver an indication to the application telling him that
// Disconnection is now underway.
//
// Please note that we do not set the TERMINATING flag until the Disconnecting indication
// returns. This allows the application to send any final messages (last words) before
// the gate is slammed shut.
DPFX(DPFPREP,7, "(%p) Partner Disconnect received (refcnt=%d)", pEPD, pEPD->lRefCnt);
// Don't let anyone else in here again.
pEPD->ulEPFlags |= EPFLAGS_RECEIVED_DISCONNECT;
// Force 3 disconnect ACKs now since we are going away.
// Setting fFinalAck to TRUE on last ACK so CommandComplete will drop if appropriate
DPFX(DPFPREP,7, "(%p) ACK'ing Partner's Disconnect", pEPD);
SendAckFrame(pEPD, 0);
SendAckFrame(pEPD, 0);
SendAckFrame(pEPD, 0, TRUE);
// There is the possibility that this side initiated a disconnect, and is now receiving a
// disconnect from the other side simultaneously. In this case, we do not want to tell the
// Core on our side about the disconnect, because the Core on our side is already disconnecting
// anyway. We also do not need to send an EOS, because we have sent one already, and can
// just wait for that one to be ACK'd.
if(!(pEPD->ulEPFlags & EPFLAGS_SENT_DISCONNECT))
{
// We know we won't get in here twice because of EPFLAGS_RECEIVED_DISCONNECT above.
Unlock(&pEPD->EPLock);
AssertNoCriticalSectionsFromGroupTakenByThisThread(&g_blProtocolCritSecsHeld);
DPFX(DPFPREP,DPF_CALLOUT_LVL, "(%p) Calling Core->IndicateDisconnect, Core Context[%p]", pEPD, pEPD->Context);
pEPD->pSPD->pPData->pfVtbl->IndicateDisconnect(pEPD->pSPD->pPData->Parent, pEPD->Context);
Lock(&pEPD->EPLock);
// This will prevent any new sends, so don't set it until after calling IndicateDisconnect.
pEPD->ulEPFlags |= EPFLAGS_SENT_DISCONNECT;
if((pMSD = BuildDisconnectFrame(pEPD)) == NULL)
{
DropLink(pEPD); // DROPLINK will release EPLock for us
return;
}
pMSD->CommandID = COMMAND_ID_DISC_RESPONSE; // Mark MSD so we know its not a user command
LOCK_EPD(pEPD, "LOCK (DISC RESP)"); // Add reference for this frame
pEPD->pCommand = pMSD; // Store the DisconnectResp on the Endpoint until it is complete
DPFX(DPFPREP,7, "(%p) Responding to Disconnect. pMSD=0x%p", pEPD, pMSD);
EnqueueMessage(pMSD, pEPD); // Enqueue the DISC frame at end of sendQ
}
Unlock(&pEPD->EPLock);
}
/*
** Process SP Disconnect
**
** Service Provider has told us that an endpoint has gone away. This is probably
** because we have Disconnected it ourselves, in which case the IN_USE flag will be
** clear. Otherwise, we need to clean this thing up ourselves...
*/
#undef DPF_MODNAME
#define DPF_MODNAME "ProcessSPDisconnect"
VOID
ProcessSPDisconnect(PSPD pSPD, PSPIE_DISCONNECT pDataBlock)
{
PEPD pEPD = static_cast<PEPD>( pDataBlock->pEndpointContext );
ASSERT_EPD(pEPD);
ASSERT(pEPD->pSPD == pSPD);
ASSERT(pDataBlock->hEndpoint == pEPD->hEndPt);
PMSD pMSD = NULL;
DPFX(DPFPREP,DPF_CALLIN_LVL, "Parameters: pSPD[%p], pDataBlock[%p] - pEPD[%p]", pSPD, pDataBlock, pEPD);
Lock(&pEPD->EPLock);
// Make sure ReleaseEPD knows that this occurred
pEPD->ulEPFlags |= EPFLAGS_SP_DISCONNECTED;
if (!(pEPD->ulEPFlags & EPFLAGS_STATE_TERMINATING))
{
DECREMENT_EPD(pEPD, "SP reference"); // Remove the SP reference
// If there is an outstanding connection, clean it up
if (pEPD->ulEPFlags & (EPFLAGS_STATE_CONNECTING|EPFLAGS_STATE_DORMANT))
{
// Even if this is COMMAND_ID_CONNECT this is safe to do
pEPD->ulEPFlags &= ~(EPFLAGS_LINKED_TO_LISTEN);
pEPD->blSPLinkage.RemoveFromList(); // Unlink EPD from Listen Queue
// We know this will only happen once because the person who does it will transition us out
// of the CONNECTING state, and we can't get here unless we are in that state.
pMSD = pEPD->pCommand;
pEPD->pCommand = NULL;
}
DropLink(pEPD); // This will release the EPLock
if (pMSD)
{
Lock(&pMSD->CommandLock);
RELEASE_MSD(pMSD, "EPD Ref");
}
}
else
{
#ifndef DPNBUILD_NOMULTICAST
if (pEPD->ulEPFlags2 & (EPFLAGS2_MULTICAST_SEND|EPFLAGS2_MULTICAST_RECEIVE))
{
//
// We will need to generate a completion to the core
//
pMSD = pEPD->pCommand;
Unlock(&pEPD->EPLock);
Lock(&pMSD->CommandLock);
CompleteDisconnect(pMSD,pSPD,pEPD);
pMSD = NULL;
}
else
#endif // DPNBUILD_NOMULTICAST
{
RELEASE_EPD(pEPD, "SP reference"); // releases EPLock
}
}
}
/*
** Process Listen Status
**
** This call tells us that a submitted Listen command has become active. Truth is, we
** dont care. We are just interested in seeing the Connect indications as they arrive. What we
** do care about, however, is the Endpoint handle associated with this listen in case we are
** later asked about the address associated with the listen. So we will pull it out of the
** data block and save it in our MSD.
*/
#undef DPF_MODNAME
#define DPF_MODNAME "ProcessListenStatus"
VOID
ProcessListenStatus(PSPD pSPD, PSPIE_LISTENSTATUS pDataBlock)
{
PMSD pMSD;
DPFX(DPFPREP,DPF_CALLIN_LVL, "Parameters: pSPD[%p], pDataBlock[%p] - hr=%x", pSPD, pDataBlock, pDataBlock->hResult);
pMSD = (PMSD) pDataBlock->pUserContext;
ASSERT_MSD(pMSD);
ASSERT(pMSD->pSPD == pSPD);
#ifdef DPNBUILD_NOMULTICAST
ASSERT(pMSD->CommandID == COMMAND_ID_LISTEN);
#else // ! DPNBUILD_NOMULTICAST
ASSERT((pMSD->CommandID == COMMAND_ID_LISTEN) || (pMSD->CommandID == COMMAND_ID_LISTEN_MULTICAST));
#endif // ! DPNBUILD_NOMULTICAST
ASSERT(pDataBlock->hCommand == pMSD->hCommand || pMSD->hCommand == NULL);
pMSD->hListenEndpoint = pDataBlock->hEndpoint;
AssertNoCriticalSectionsFromGroupTakenByThisThread(&g_blProtocolCritSecsHeld);
DPFX(DPFPREP,DPF_CALLOUT_LVL, "Calling Core->CompleteListen, pMSD[%p], Core Context[%p], hr[%x]", pMSD, pMSD->Context, pDataBlock->hResult);
pSPD->pPData->pfVtbl->CompleteListen(pSPD->pPData->Parent, &pMSD->Context, pDataBlock->hResult, pMSD);
if(pDataBlock->hResult != DPN_OK)
{
// Release the final reference on the MSD AFTER indicating to the Core
Lock(&pMSD->CommandLock);
RELEASE_MSD(pMSD, "Release On Complete");
}
return;
}
/*
** Process Connect Address Info
**
** This call tells us what addressing information has been used to start a connect.
*/
#undef DPF_MODNAME
#define DPF_MODNAME "ProcessConnectAddressInfo"
VOID
ProcessConnectAddressInfo(PSPD pSPD, PSPIE_CONNECTADDRESSINFO pDataBlock)
{
PMSD pMSD;
pMSD = (PMSD) pDataBlock->pCommandContext;
DPFX(DPFPREP,DPF_CALLIN_LVL, "Parameters: pSPD[%p], pDataBlock[%p] - pMSD[%p]", pSPD, pDataBlock, pMSD);
ASSERT_MSD(pMSD);
ASSERT(pMSD->pSPD == pSPD);
#ifdef DPNBUILD_NOMULTICAST
ASSERT(pMSD->CommandID == COMMAND_ID_CONNECT);
#else // ! DPNBUILD_NOMULTICAST
ASSERT((pMSD->CommandID == COMMAND_ID_CONNECT) || (pMSD->CommandID == COMMAND_ID_CONNECT_MULTICAST_SEND) || (pMSD->CommandID == COMMAND_ID_CONNECT_MULTICAST_RECEIVE));
#endif // ! DPNBUILD_NOMULTICAST
AssertNoCriticalSectionsFromGroupTakenByThisThread(&g_blProtocolCritSecsHeld);
DPFX(DPFPREP,DPF_CALLOUT_LVL, "(%p) Calling Core->AddressInfoConnect, Core Context[%p]", pMSD, pMSD->Context);
pSPD->pPData->pfVtbl->AddressInfoConnect( pSPD->pPData->Parent,
pMSD->Context,
pDataBlock->hCommandStatus,
pDataBlock->pHostAddress,
pDataBlock->pDeviceAddress );
return;
}
/*
** Process Enum Address Info
**
** This call tells us what addressing information has been used to start an enum.
*/
#undef DPF_MODNAME
#define DPF_MODNAME "ProcessEnumAddressInfo"
VOID
ProcessEnumAddressInfo(PSPD pSPD, PSPIE_ENUMADDRESSINFO pDataBlock)
{
PMSD pMSD;
pMSD = (PMSD) pDataBlock->pCommandContext;
DPFX(DPFPREP,DPF_CALLIN_LVL, "Parameters: pSPD[%p], pDataBlock[%p] - pMSD[%p]", pSPD, pDataBlock, pMSD);
ASSERT_MSD(pMSD);
ASSERT(pMSD->pSPD == pSPD);
ASSERT(pMSD->CommandID == COMMAND_ID_ENUM );
AssertNoCriticalSectionsFromGroupTakenByThisThread(&g_blProtocolCritSecsHeld);
DPFX(DPFPREP,DPF_CALLOUT_LVL, "(%p) Calling Core->AddressInfoEnum, Core Context[%p]", pMSD, pMSD->Context);
pSPD->pPData->pfVtbl->AddressInfoEnum( pSPD->pPData->Parent,
pMSD->Context,
pDataBlock->hCommandStatus,
pDataBlock->pHostAddress,
pDataBlock->pDeviceAddress );
return;
}
/*
** Process Listen Address Info
**
** This call tells us what addressing information has been used to start a listen.
*/
#undef DPF_MODNAME
#define DPF_MODNAME "ProcessListenAddressInfo"
VOID
ProcessListenAddressInfo(PSPD pSPD, PSPIE_LISTENADDRESSINFO pDataBlock)
{
PMSD pMSD;
pMSD = (PMSD) pDataBlock->pCommandContext;
DPFX(DPFPREP,DPF_CALLIN_LVL, "Parameters: pSPD[%p], pDataBlock[%p] - pMSD[%p]", pSPD, pDataBlock, pMSD);
ASSERT_MSD(pMSD);
ASSERT(pMSD->pSPD == pSPD);
#ifdef DPNBUILD_NOMULTICAST
ASSERT(pMSD->CommandID == COMMAND_ID_LISTEN);
#else // ! DPNBUILD_NOMULTICAST
ASSERT((pMSD->CommandID == COMMAND_ID_LISTEN) || (pMSD->CommandID == COMMAND_ID_LISTEN_MULTICAST));
#endif // ! DPNBUILD_NOMULTICAST
AssertNoCriticalSectionsFromGroupTakenByThisThread(&g_blProtocolCritSecsHeld);
DPFX(DPFPREP,DPF_CALLOUT_LVL, "(%p) Calling Core->AddressInfoListen, Core Context[%p]", pMSD, pMSD->Context);
pSPD->pPData->pfVtbl->AddressInfoListen( pSPD->pPData->Parent,
pMSD->Context,
pDataBlock->hCommandStatus,
pDataBlock->pDeviceAddress );
return;
}
/*
** Process Hard Disconnect
**
** Called when we receive a hard disconnect frame
** CALLED WITH EPLOCK HELD; RETURNS WITH EPLOCK RELEASED
*/
#undef DPF_MODNAME
#define DPF_MODNAME "ProcessHardDisconnect"
VOID
ProcessHardDisconnect(PEPD pEPD)
{
AssertCriticalSectionIsTakenByThisThread(&pEPD->EPLock, TRUE);
//if the ep is in the process of terminating we should do nothing
if (pEPD->ulEPFlags & EPFLAGS_STATE_TERMINATING)
{
DPFX(DPFPREP, 7, "(%p) Ignoring Hard Disconnect on terminating endpoint", pEPD);
Unlock(&pEPD->EPLock);
return;
}
//if we're the source for this hard disconnect sequence then this is our cue to drop the
//link and complete the disconnect
//N.B. Its possible both sides attempted a hard disconnect at the same time. In which case
//they'll both assume each other hard disconnect frames were actually responses to what
//they sent, and everything proceeds swimmingly
if (pEPD->ulEPFlags & EPFLAGS_HARD_DISCONNECT_SOURCE)
{
CompleteHardDisconnect(pEPD);
//above call will release EP lock
return;
}
//if we've already received a hard disconnect frame then we'll already have started
//the respond/drop link sequence, so can ignore this new request
if (pEPD->ulEPFlags & EPFLAGS_HARD_DISCONNECT_TARGET)
{
DPFX(DPFPREP, 7, "(%p) Ignoring Hard Disconnect. Already marked as hard disconnect target", pEPD);
Unlock(&pEPD->EPLock);
return;
}
//looks like remote ep wants to kick off a hard disconnect sequence
pEPD->ulEPFlags|=EPFLAGS_HARD_DISCONNECT_TARGET;
DNASSERT((pEPD->ulEPFlags2 & EPFLAGS2_HARD_DISCONNECT_COMPLETE)==0);
//add a reference to the endpoint to make sure it hangs around whilst we complete our response
//this is dropped in the CompleteHardDisconnect function
LOCK_EPD(pEPD, "LOCK (HARD DISCONNECT RESPONSE)");
//now send 3 hard disconnects back to the other side immediately
//assuming 1 of them gets through this'll tell the originator of the hard disconnect
//he can stop sending hard disconnect frames to us. If they all drop it doesn't matter too much,
//as the originator will give up sending at some point pretty soon anyway
SendCommandFrame(pEPD, FRAME_EXOPCODE_HARD_DISCONNECT, 0, 0, FALSE);
SendCommandFrame(pEPD, FRAME_EXOPCODE_HARD_DISCONNECT, 0, 0, FALSE);
//N.B. The final send command frame has the bSendDirect flag set to TRUE
//this causes the queued send frames to be commited to the SP. It also has the final hard disconnect flag
//set. This ensures when the SP completes the send of this command frame we know to drop the link
HRESULT hr=SendCommandFrame(pEPD, FRAME_EXOPCODE_HARD_DISCONNECT,
0, FFLAGS_FINAL_HARD_DISCONNECT, TRUE);
//EP lock is released by above call (since bSendDirect==TRUE)
//if the final send fails then we can't wait for the send completition from the sp to complete the disconnect
//hence we have to do it now
if (FAILED(hr))
{
Lock(&pEPD->EPLock);
DPFX(DPFPREP, 0, "(%p) Failed to send final HARD_DISCONNECT. Completing disconnect immediately hr[0x%x]", pEPD, hr);
CompleteHardDisconnect(pEPD);
//above call will release ep lock
}
}
/*
** Create Connected Signed Reply
**
** Called when we're listening for connections to a signed session and we either get a CONNECT or a KEEPALIVE that looks
** like the first KEEPALIVE in a session. We want to return a CONNECTEDSIGNED response in the supplied reply buffer
**
*/
#undef DPF_MODNAME
#define DPF_MODNAME "CreateConnectedSignedFrame"
HRESULT CreateConnectedSignedReply(void * pvReplyBuffer, DWORD * pdwReplySize, DWORD dwSessID, DWORD dwAddressHash,
ULONGLONG ullConnectSecret, DWORD dwSigningOpts, DWORD tNow)
{
//if the reply buffer isn't large enough to send our response then tell the SP to do nothing
if (*pdwReplySize<sizeof(CFRAME_CONNECTEDSIGNED))
{
DPFX(DPFPREP, 0, "Unconnected data reply buffer too small to send CONNECTEDSIGNED response");
DNASSERT(0);
return DPNERR_ABORTED;
}
*pdwReplySize=sizeof(CFRAME_CONNECTEDSIGNED);
CFRAME_CONNECTEDSIGNED * pCFrame=(CFRAME_CONNECTEDSIGNED * ) pvReplyBuffer;
//Set members common to all CFrames
//N.B. We set the poll bit to indicate that this is the reponse from the listening side
//When the connector sends its CONNECTSIGNED frame it won't set this bit
pCFrame->bCommand = PACKET_COMMAND_CFRAME | PACKET_COMMAND_POLL;
pCFrame->bExtOpcode = FRAME_EXOPCODE_CONNECTED_SIGNED;
pCFrame->dwVersion = DNET_VERSION_NUMBER;
pCFrame->bRspID = 0;
pCFrame->dwSessID = dwSessID;
pCFrame->tTimestamp = tNow;
pCFrame->bMsgID = 0;
//set members specific just to CONNECTEDSIGNED frames
//N.B. We let the connector pick the secrets, so we zero out the ones we send. And the EchoTimestamp is
//unused because the connecting endpoint will use a checkpoint to track the RTT.
pCFrame->ullConnectSig=GenerateConnectSig(dwSessID, dwAddressHash, ullConnectSecret);
pCFrame->ullSenderSecret=0;
pCFrame->ullReceiverSecret=0;
pCFrame->dwSigningOpts=dwSigningOpts;
pCFrame->dwEchoTimestamp=0;
//tell the sp to send the data we've placed in the reply buffer
return DPNSUCCESS_PENDING;
}
#undef DPF_MODNAME
#define DPF_MODNAME "ValidateIncomingFrameSig"
BOOL ValidateIncomingFrameSig(PEPD pEPD, BYTE * pbyFrame, DWORD dwFrameSize, BYTE bSeq, UNALIGNED ULONGLONG * pullFrameSig)
{
//fast signing is trivial, simply check for a match on the (not very) secret
if (pEPD->ulEPFlags2 & EPFLAGS2_FAST_SIGNED_LINK)
{
if (*pullFrameSig!=pEPD->ullCurrentRemoteSecret)
{
DPFX(DPFPREP,1, "(%p) Invalid signature on fast signed link", pEPD);
return FALSE;
}
return TRUE;
}
DNASSERT(pEPD->ulEPFlags2 & EPFLAGS2_FULL_SIGNED_LINK);
//store the sig from the packet and then zero it out. This ensures the state of the packet
//matches what it should have been when it was originally signed
ULONGLONG ullSuppliedSig=*pullFrameSig;
*pullFrameSig=0;
//sig to use depends on where we are in the sequence space and where the packet is
if ((pEPD->bNextReceive>=SEQ_WINDOW_3Q || pEPD->bNextReceive<SEQ_WINDOW_1Q) && (bSeq>=SEQ_WINDOW_3Q))
{
if (GenerateIncomingFrameSig(pbyFrame, dwFrameSize, pEPD->ullOldRemoteSecret)!=ullSuppliedSig)
{
DPFX(DPFPREP,1, "(%p) Invalid signature on full signed link", pEPD);
return FALSE;
}
}
else
{
if (GenerateIncomingFrameSig(pbyFrame, dwFrameSize, pEPD->ullCurrentRemoteSecret)!=ullSuppliedSig)
{
DPFX(DPFPREP,1, "(%p) Invalid signature on full signed link", pEPD);
return FALSE;
}
}
return TRUE;
}
/*************************************
**
** RECEIVE BUFFER MANAGEMENT
**
** When multiple frame messages arrive we *may* have to copy them in to a single contiguous
** buffer. We are supporting an OPTIONAL scatter-receive option which would allow sophisticated
** clients to receive a BUFFER_DESCRIPTOR array instead of a single cont-buffer, and avoiding
** a large datacopy.
**
** For clients which dont support scatter-receive, we need a pooling strategy for large receive
** buffers. We will only need buffers LARGER then our frame limit because smaller receives are delivered
** in the SPs buffer.
**
** Try placing receives into generally sized buffers. If frame size is usu 1.4K bytes, 2K is a small
** buffer, 4K, 16K, 32K, 64K. If frame size is <1K we can have 1K buffers too.
**
**
*************************************/
/***********************
========SPACER==========
************************/
/*
** RCD Pool support routines
**
** These are the functions called by Fixed Pool Manager as it handles RCDs.
*/
#define pELEMENT ((PRCD) pElement)
#undef DPF_MODNAME
#define DPF_MODNAME "RCD_Allocate"
BOOL RCD_Allocate(PVOID pElement, PVOID pvContext)
{
DPFX(DPFPREP,7, "(%p) Allocating new RCD", pELEMENT);
pELEMENT->blOddFrameLinkage.Initialize();
pELEMENT->blCompleteLinkage.Initialize();
pELEMENT->Sign = RCD_SIGN;
return TRUE;
}
// Get is called each time an MSD is used
#undef DPF_MODNAME
#define DPF_MODNAME "RCD_Get"
VOID RCD_Get(PVOID pElement, PVOID pvContext)
{
DPFX(DPFPREP,DPF_REFCNT_FINAL_LVL, "CREATING RCD %p", pELEMENT);
// NOTE: First sizeof(PVOID) bytes will have been overwritten by the pool code,
// we must set them to acceptable values.
pELEMENT->pRcvBuff = NULL;
pELEMENT->lRefCnt = 1;
pELEMENT->ulRFlags = 0;
ASSERT( pELEMENT->blOddFrameLinkage.IsEmpty());
ASSERT( pELEMENT->blCompleteLinkage.IsEmpty());
ASSERT_RCD(pELEMENT);
}
// RCD Release -- This release call will release an entire chain of RCDs
// that are linked together... or then again maybe not.
#undef DPF_MODNAME
#define DPF_MODNAME "RCD_Release"
VOID RCD_Release(PVOID pElement)
{
ASSERT_RCD(pELEMENT);
ASSERT(pELEMENT->lRefCnt == 0);
ASSERT(pELEMENT->pRcvBuff == NULL);
ASSERT( pELEMENT->blOddFrameLinkage.IsEmpty());
ASSERT( pELEMENT->blCompleteLinkage.IsEmpty());
DPFX(DPFPREP,DPF_REFCNT_FINAL_LVL, "RELEASING RCD %p", pELEMENT);
}
#undef DPF_MODNAME
#define DPF_MODNAME "RCD_Free"
VOID RCD_Free(PVOID pElement)
{
}
#undef pELEMENT
/*
** Buffer pool support
**
**
*/
#define pELEMENT ((PBUF) pElement)
#undef DPF_MODNAME
#define DPF_MODNAME "Buf_Allocate"
BOOL Buf_Allocate(PVOID pElement, PVOID pvContext)
{
DPFX(DPFPREP,7, "(%p) Allocating new Buf", pElement);
return TRUE;
}
#undef DPF_MODNAME
#define DPF_MODNAME "Buf_Get"
VOID Buf_Get(PVOID pElement, PVOID pvContext)
{
// NOTE: First sizeof(PVOID) bytes will have been overwritten by the pool code,
// we must set them to acceptable values.
pELEMENT->Type = RBT_PROTOCOL_NORM_BUFFER;
}
#undef DPF_MODNAME
#define DPF_MODNAME "Buf_GetMed"
VOID Buf_GetMed(PVOID pElement, PVOID pvContext)
{
// NOTE: First sizeof(PVOID) bytes will have been overwritten by the pool code,
// we must set them to acceptable values.
pELEMENT->Type = RBT_PROTOCOL_MED_BUFFER;
}
#undef DPF_MODNAME
#define DPF_MODNAME "Buf_GetBig"
VOID Buf_GetBig(PVOID pElement, PVOID pvContext)
{
// NOTE: First sizeof(PVOID) bytes will have been overwritten by the pool code,
// we must set them to acceptable values.
pELEMENT->Type = RBT_PROTOCOL_BIG_BUFFER;
}
#undef pELEMENT