You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
3284 lines
100 KiB
3284 lines
100 KiB
/*++
|
|
|
|
Copyright (c) 1989-1999 Microsoft Corporation
|
|
|
|
Module Name:
|
|
|
|
accept.c
|
|
|
|
Abstract:
|
|
|
|
This module contains the handling code for IOCTL_AFD_ACCEPT.
|
|
as well as IOCTL_AFD_SUPER_ACCEPT
|
|
|
|
Author:
|
|
|
|
David Treadwell (davidtr) 21-Feb-1992
|
|
|
|
Revision History:
|
|
Vadim Eydelman (vadime) 1999 - No spinlock performance path in super accept,
|
|
general code restructuring.
|
|
|
|
--*/
|
|
|
|
#include "afdp.h"
|
|
|
|
VOID
|
|
AfdDoListenBacklogReplenish (
|
|
IN PVOID Context
|
|
);
|
|
|
|
NTSTATUS
|
|
AfdReplenishListenBacklog (
|
|
IN PAFD_ENDPOINT Endpoint
|
|
);
|
|
|
|
VOID
|
|
AfdReportConnectionAllocationFailure (
|
|
PAFD_ENDPOINT Endpoint,
|
|
NTSTATUS Status
|
|
);
|
|
|
|
|
|
NTSTATUS
|
|
AfdContinueSuperAccept (
|
|
IN PIRP Irp,
|
|
PAFD_CONNECTION Connection
|
|
);
|
|
|
|
NTSTATUS
|
|
AfdRestartSuperAcceptGetAddress (
|
|
IN PDEVICE_OBJECT DeviceObject,
|
|
IN PIRP Irp,
|
|
IN PVOID Context
|
|
);
|
|
|
|
NTSTATUS
|
|
AfdRestartSuperAcceptReceive (
|
|
IN PDEVICE_OBJECT DeviceObject,
|
|
IN PIRP Irp,
|
|
IN PVOID Context
|
|
);
|
|
|
|
NTSTATUS
|
|
AfdRestartDelayedAccept (
|
|
IN PDEVICE_OBJECT DeviceObject,
|
|
IN PIRP Irp,
|
|
IN PVOID Context
|
|
);
|
|
|
|
VOID
|
|
AfdSuperAcceptApcKernelRoutine (
|
|
IN struct _KAPC *Apc,
|
|
IN OUT PKNORMAL_ROUTINE *NormalRoutine,
|
|
IN OUT PVOID *NormalContext,
|
|
IN OUT PVOID *SystemArgument1,
|
|
IN OUT PVOID *SystemArgument2
|
|
);
|
|
|
|
VOID
|
|
AfdSuperAcceptApcRundownRoutine (
|
|
IN struct _KAPC *Apc
|
|
);
|
|
|
|
#ifdef ALLOC_PRAGMA
|
|
#pragma alloc_text( PAGEAFD, AfdAccept )
|
|
#pragma alloc_text( PAGEAFD, AfdSuperAccept )
|
|
#pragma alloc_text( PAGEAFD, AfdDeferAccept )
|
|
#pragma alloc_text( PAGEAFD, AfdDoListenBacklogReplenish )
|
|
#pragma alloc_text( PAGEAFD, AfdSetupAcceptEndpoint )
|
|
#pragma alloc_text( PAGE, AfdReplenishListenBacklog )
|
|
#pragma alloc_text( PAGEAFD, AfdReportConnectionAllocationFailure )
|
|
#pragma alloc_text( PAGEAFD, AfdInitiateListenBacklogReplenish )
|
|
#pragma alloc_text( PAGEAFD, AfdRestartSuperAccept )
|
|
#pragma alloc_text( PAGEAFD, AfdRestartSuperAcceptListen )
|
|
#pragma alloc_text( PAGEAFD, AfdContinueSuperAccept )
|
|
#pragma alloc_text( PAGEAFD, AfdServiceSuperAccept )
|
|
#pragma alloc_text( PAGEAFD, AfdRestartSuperAcceptGetAddress )
|
|
#pragma alloc_text( PAGEAFD, AfdRestartSuperAcceptReceive )
|
|
#pragma alloc_text( PAGE, AfdSuperAcceptApcKernelRoutine )
|
|
#pragma alloc_text( PAGE, AfdSuperAcceptApcRundownRoutine )
|
|
#pragma alloc_text( PAGEAFD, AfdCancelSuperAccept )
|
|
#pragma alloc_text( PAGEAFD, AfdCleanupSuperAccept )
|
|
#pragma alloc_text( PAGEAFD, AfdRestartDelayedAccept)
|
|
#pragma alloc_text( PAGEAFD, AfdRestartDelayedSuperAccept)
|
|
#endif
|
|
|
|
|
|
//
|
|
// Macros to make the super accept restart code more maintainable.
|
|
//
|
|
|
|
#define AfdRestartSuperAcceptInfo DeviceIoControl
|
|
|
|
// Used while IRP is in AFD queue (otherwise AfdAcceptFileObject
|
|
// is stored as completion routine context).
|
|
#define AfdAcceptFileObject Type3InputBuffer
|
|
// Used when IRP is passed to the transport (otherwise MdlAddress
|
|
// is stored in the IRP itself).
|
|
#define AfdMdlAddress Type3InputBuffer
|
|
|
|
#define AfdReceiveDataLength OutputBufferLength
|
|
#define AfdRemoteAddressLength InputBufferLength
|
|
#define AfdLocalAddressLength IoControlCode
|
|
|
|
|
|
//
|
|
// Similar macros for delayed accept restart code.
|
|
//
|
|
#define AfdRestartDelayedAcceptInfo DeviceIoControl
|
|
#define AfdSystemBuffer Type3InputBuffer
|
|
|
|
|
|
NTSTATUS
|
|
FASTCALL
|
|
AfdAccept (
|
|
IN PIRP Irp,
|
|
IN PIO_STACK_LOCATION IrpSp
|
|
)
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Accepts an incoming connection. The connection is identified by the
|
|
sequence number returned in the wait for listen IRP, and then
|
|
associated with the endpoint specified in this request. When this
|
|
request completes, the connection is fully established and ready for
|
|
data transfer.
|
|
|
|
Arguments:
|
|
|
|
Irp - a pointer to a transmit file IRP.
|
|
|
|
IrpSp - Our stack location for this IRP.
|
|
|
|
Return Value:
|
|
|
|
STATUS_SUCCESS if the request was completed successfully, or a
|
|
failure status code if there was an error.
|
|
|
|
--*/
|
|
|
|
{
|
|
NTSTATUS status;
|
|
PAFD_ACCEPT_INFO acceptInfo;
|
|
PAFD_ENDPOINT listenEndpoint;
|
|
PFILE_OBJECT acceptFileObject;
|
|
PAFD_ENDPOINT acceptEndpoint;
|
|
PAFD_CONNECTION connection;
|
|
|
|
|
|
//
|
|
// Set up local variables.
|
|
//
|
|
|
|
listenEndpoint = IrpSp->FileObject->FsContext;
|
|
Irp->IoStatus.Information = 0;
|
|
|
|
#ifdef _WIN64
|
|
if (IoIs32bitProcess (Irp)) {
|
|
PAFD_ACCEPT_INFO newSystemBuffer;
|
|
PAFD_ACCEPT_INFO32 oldSystemBuffer = Irp->AssociatedIrp.SystemBuffer;
|
|
|
|
if (IrpSp->Parameters.DeviceIoControl.InputBufferLength <
|
|
sizeof(AFD_ACCEPT_INFO32) ) {
|
|
status = STATUS_INVALID_PARAMETER;
|
|
goto complete;
|
|
}
|
|
|
|
try {
|
|
newSystemBuffer = ExAllocatePoolWithQuotaTag (
|
|
NonPagedPool|POOL_RAISE_IF_ALLOCATION_FAILURE,
|
|
sizeof (AFD_ACCEPT_INFO),
|
|
AFD_SYSTEM_BUFFER_POOL_TAG);
|
|
|
|
}
|
|
except (EXCEPTION_EXECUTE_HANDLER) {
|
|
status = GetExceptionCode ();
|
|
goto complete;
|
|
}
|
|
|
|
newSystemBuffer->SanActive = oldSystemBuffer->SanActive;
|
|
newSystemBuffer->AcceptHandle = oldSystemBuffer->AcceptHandle;
|
|
newSystemBuffer->Sequence = oldSystemBuffer->Sequence;
|
|
|
|
ExFreePool (Irp->AssociatedIrp.SystemBuffer);
|
|
Irp->AssociatedIrp.SystemBuffer = newSystemBuffer;
|
|
IrpSp->Parameters.DeviceIoControl.InputBufferLength = sizeof (AFD_ACCEPT_INFO);
|
|
}
|
|
#endif // _WIN64
|
|
|
|
acceptInfo = Irp->AssociatedIrp.SystemBuffer;
|
|
|
|
//
|
|
// Make sure that this request is valid.
|
|
//
|
|
|
|
if ( !listenEndpoint->Listening ||
|
|
IrpSp->Parameters.DeviceIoControl.InputBufferLength <
|
|
sizeof(AFD_ACCEPT_INFO) ||
|
|
Irp->MdlAddress!=NULL) {
|
|
status = STATUS_INVALID_PARAMETER;
|
|
goto complete;
|
|
}
|
|
|
|
ASSERT ((listenEndpoint->Type & AfdBlockTypeVcListening)==AfdBlockTypeVcListening);
|
|
|
|
//
|
|
// Check for if the caller is unaware of the SAN
|
|
// provider activation and report the error.
|
|
//
|
|
if (!acceptInfo->SanActive && AfdSanServiceHelper!=NULL) {
|
|
KdPrintEx(( DPFLTR_WSOCKTRANSPORT_ID, DPFLTR_INFO_LEVEL,
|
|
"AFD: Process %p is being told to enable SAN on accept\n",
|
|
PsGetCurrentProcessId ()));
|
|
status = STATUS_INVALID_PARAMETER_12;
|
|
goto complete;
|
|
}
|
|
|
|
//
|
|
// Add another free connection to replace the one we're accepting.
|
|
// Also, add extra to account for past failures in calls to
|
|
// AfdAddFreeConnection().
|
|
//
|
|
|
|
InterlockedIncrement(
|
|
&listenEndpoint->Common.VcListening.FailedConnectionAdds
|
|
);
|
|
|
|
AfdReplenishListenBacklog( listenEndpoint );
|
|
|
|
//
|
|
// Obtain a pointer to the endpoint on which we're going to
|
|
// accept the connection.
|
|
//
|
|
|
|
status = ObReferenceObjectByHandle(
|
|
acceptInfo->AcceptHandle,
|
|
(IrpSp->Parameters.DeviceIoControl.IoControlCode>>14) & 3,
|
|
// DesiredAccess
|
|
*IoFileObjectType,
|
|
Irp->RequestorMode,
|
|
(PVOID *)&acceptFileObject,
|
|
NULL
|
|
);
|
|
|
|
if ( !NT_SUCCESS(status) ) {
|
|
goto complete;
|
|
}
|
|
|
|
|
|
//
|
|
// We may have a file object that is not an AFD endpoint. Make sure
|
|
// that this is an actual AFD endpoint.
|
|
//
|
|
|
|
if ( acceptFileObject->DeviceObject!=AfdDeviceObject) {
|
|
status = STATUS_INVALID_HANDLE;
|
|
goto complete_deref;
|
|
}
|
|
|
|
acceptEndpoint = acceptFileObject->FsContext;
|
|
if (acceptEndpoint->TransportInfo!=listenEndpoint->TransportInfo) {
|
|
status = STATUS_INVALID_PARAMETER;
|
|
goto complete_deref;
|
|
}
|
|
|
|
ASSERT( InterlockedIncrement( &acceptEndpoint->ObReferenceBias ) > 0 );
|
|
|
|
IF_DEBUG(ACCEPT) {
|
|
KdPrintEx(( DPFLTR_WSOCKTRANSPORT_ID, DPFLTR_TRACE_LEVEL,
|
|
"AfdAccept: file object %p, accept endpoint %p, listen endpoint %p\n",
|
|
acceptFileObject, acceptEndpoint, listenEndpoint ));
|
|
}
|
|
|
|
if (AFD_START_STATE_CHANGE (acceptEndpoint, AfdEndpointStateConnected)) {
|
|
if (acceptEndpoint->State!=AfdEndpointStateOpen ||
|
|
acceptEndpoint->TransportInfo!=listenEndpoint->TransportInfo ||
|
|
acceptEndpoint->SecurityDescriptor!=NULL) {
|
|
status = STATUS_INVALID_PARAMETER;
|
|
}
|
|
else {
|
|
AFD_LOCK_QUEUE_HANDLE lockHandle;
|
|
AfdAcquireSpinLock (&listenEndpoint->SpinLock, &lockHandle);
|
|
connection = AfdGetReturnedConnection (listenEndpoint,
|
|
acceptInfo->Sequence);
|
|
if (connection==NULL) {
|
|
AfdReleaseSpinLock (&listenEndpoint->SpinLock, &lockHandle);
|
|
status = STATUS_INVALID_PARAMETER;
|
|
}
|
|
else if (connection->SanConnection) {
|
|
Irp->Tail.Overlay.DriverContext[3] = acceptInfo->AcceptHandle;
|
|
IrpSp->Parameters.AfdRestartSuperAcceptInfo.AfdAcceptFileObject = acceptFileObject;
|
|
IrpSp->Parameters.AfdRestartSuperAcceptInfo.AfdReceiveDataLength = 0;
|
|
IrpSp->Parameters.AfdRestartSuperAcceptInfo.AfdLocalAddressLength = 0;
|
|
IrpSp->Parameters.AfdRestartSuperAcceptInfo.AfdRemoteAddressLength = 0;
|
|
status = AfdSanAcceptCore (Irp, acceptFileObject, connection, &lockHandle);
|
|
if (status==STATUS_PENDING) {
|
|
return STATUS_PENDING;
|
|
}
|
|
}
|
|
else {
|
|
status = AfdAcceptCore (Irp, acceptEndpoint, connection);
|
|
AfdReleaseSpinLock (&listenEndpoint->SpinLock, &lockHandle);
|
|
|
|
AFD_RETURN_REMOTE_ADDRESS (
|
|
connection->RemoteAddress,
|
|
connection->RemoteAddressLength
|
|
);
|
|
connection->RemoteAddress = NULL;
|
|
|
|
if (status==STATUS_SUCCESS) {
|
|
NOTHING;
|
|
}
|
|
else if (status==STATUS_PENDING) {
|
|
|
|
//
|
|
// Remember that a TDI accept has started on this endpoint.
|
|
//
|
|
|
|
InterlockedIncrement(
|
|
&listenEndpoint->Common.VcListening.TdiAcceptPendingCount
|
|
);
|
|
|
|
IrpSp->Parameters.AfdRestartDelayedAcceptInfo.AfdSystemBuffer =
|
|
Irp->AssociatedIrp.SystemBuffer;
|
|
Irp->AssociatedIrp.SystemBuffer = NULL;
|
|
|
|
ASSERT (Irp->MdlAddress==NULL);
|
|
|
|
IoSetCompletionRoutine(
|
|
Irp,
|
|
AfdRestartDelayedAccept,
|
|
acceptFileObject,
|
|
TRUE,
|
|
TRUE,
|
|
TRUE
|
|
);
|
|
|
|
AfdIoCallDriver (
|
|
acceptEndpoint,
|
|
connection->DeviceObject,
|
|
Irp
|
|
);
|
|
|
|
return STATUS_PENDING;
|
|
}
|
|
else {
|
|
AfdAbortConnection (connection);
|
|
ASSERT (status==STATUS_CANCELLED);
|
|
}
|
|
}
|
|
}
|
|
AFD_END_STATE_CHANGE (acceptEndpoint);
|
|
}
|
|
else {
|
|
status = STATUS_INVALID_PARAMETER;
|
|
}
|
|
|
|
ASSERT( InterlockedDecrement( &acceptEndpoint->ObReferenceBias ) >= 0 );
|
|
|
|
complete_deref:
|
|
ObDereferenceObject( acceptFileObject );
|
|
|
|
complete:
|
|
|
|
Irp->IoStatus.Status = status;
|
|
ASSERT( Irp->CancelRoutine == NULL );
|
|
|
|
IoCompleteRequest( Irp, AfdPriorityBoost );
|
|
|
|
return status;
|
|
|
|
} // AfdAccept
|
|
|
|
|
|
|
|
NTSTATUS
|
|
AfdAcceptCore (
|
|
IN PIRP AcceptIrp,
|
|
IN PAFD_ENDPOINT AcceptEndpoint,
|
|
IN PAFD_CONNECTION Connection
|
|
)
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Performs the key functions of associating a connection accepted
|
|
on a listening endpoint with a new endpoint.
|
|
|
|
Arguments:
|
|
|
|
AcceptIrp - Irp used for accept operation
|
|
|
|
AcceptEndpoint - the new endpoint with which to associate the
|
|
connectuion.
|
|
|
|
Connection - the connection being accepted.
|
|
|
|
Return Value:
|
|
|
|
STATUS_SUCCESS if the operation was completed successfully,
|
|
STATUS_PENDING if IRP was passed further to the transport
|
|
failure status code if there was an error.
|
|
|
|
--*/
|
|
|
|
{
|
|
PAFD_ENDPOINT listenEndpoint;
|
|
NTSTATUS status;
|
|
PIO_STACK_LOCATION irpSp;
|
|
AFD_LOCK_QUEUE_HANDLE lockHandle;
|
|
|
|
irpSp = IoGetCurrentIrpStackLocation (AcceptIrp);
|
|
listenEndpoint = irpSp->FileObject->FsContext;
|
|
|
|
//
|
|
// Reenable the accept event bit, and if there are additional
|
|
// unaccepted connections on the endpoint, post another event.
|
|
//
|
|
|
|
|
|
listenEndpoint->EventsActive &= ~AFD_POLL_ACCEPT;
|
|
|
|
IF_DEBUG(EVENT_SELECT) {
|
|
KdPrintEx(( DPFLTR_WSOCKTRANSPORT_ID, DPFLTR_TRACE_LEVEL,
|
|
"AfdAcceptCore: Endp %08lX, Active %08lX\n",
|
|
listenEndpoint,
|
|
listenEndpoint->EventsActive
|
|
));
|
|
}
|
|
|
|
if( !IsListEmpty( &listenEndpoint->Common.VcListening.UnacceptedConnectionListHead ) ) {
|
|
|
|
AfdIndicateEventSelectEvent(
|
|
listenEndpoint,
|
|
AFD_POLL_ACCEPT,
|
|
STATUS_SUCCESS
|
|
);
|
|
|
|
}
|
|
|
|
//
|
|
// Do not release the listening endpoint spinlock here.
|
|
// We are going to be chaning connection object which assumes
|
|
// protection from listening endpoint spinlock until it is associated
|
|
// with accept endpoint (this plugs nasty racing conditions when
|
|
// receive is indicated rigth before connection object is updated, so
|
|
// it takes listening endpoint spinlock, and rigth before it queues
|
|
// the buffer to the connection object, it gets associated with accept
|
|
// endpoint and AcceptEx'es receive does not notice the buffer because
|
|
// it takes accept endpoint spinlock)
|
|
//
|
|
// AfdReleaseSpinLock( &ListenEndpoint->SpinLock, &lockHandle );
|
|
|
|
//
|
|
// Check the state of the accepting endpoint under the guard
|
|
// of the endpoint's spinlock.
|
|
//
|
|
|
|
AfdAcquireSpinLockAtDpcLevel( &AcceptEndpoint->SpinLock, &lockHandle);
|
|
status = AfdSetupAcceptEndpoint (listenEndpoint, AcceptEndpoint, Connection);
|
|
if (status==STATUS_SUCCESS) {
|
|
|
|
|
|
if (IS_DELAYED_ACCEPTANCE_ENDPOINT (listenEndpoint)) {
|
|
PTDI_CONNECTION_INFORMATION requestConnectionInformation;
|
|
|
|
if( Connection->ConnectDataBuffers != NULL ) {
|
|
|
|
//
|
|
// We allocated extra space at the end of the connect data
|
|
// buffers structure. We'll use this for the
|
|
// TDI_CONNECTION_INFORMATION structure that holds response
|
|
// connect data and options. Not pretty, but the fastest
|
|
// and easiest way to accomplish this.
|
|
//
|
|
|
|
requestConnectionInformation =
|
|
&Connection->ConnectDataBuffers->RequestConnectionInfo;
|
|
|
|
RtlZeroMemory(
|
|
requestConnectionInformation,
|
|
sizeof(*requestConnectionInformation)
|
|
);
|
|
|
|
requestConnectionInformation->UserData =
|
|
Connection->ConnectDataBuffers->SendConnectData.Buffer;
|
|
requestConnectionInformation->UserDataLength =
|
|
Connection->ConnectDataBuffers->SendConnectData.BufferLength;
|
|
requestConnectionInformation->Options =
|
|
Connection->ConnectDataBuffers->SendConnectOptions.Buffer;
|
|
requestConnectionInformation->OptionsLength =
|
|
Connection->ConnectDataBuffers->SendConnectOptions.BufferLength;
|
|
|
|
} else {
|
|
|
|
requestConnectionInformation = NULL;
|
|
|
|
}
|
|
|
|
TdiBuildAccept(
|
|
AcceptIrp,
|
|
Connection->DeviceObject,
|
|
Connection->FileObject,
|
|
NULL,
|
|
NULL,
|
|
requestConnectionInformation,
|
|
NULL
|
|
);
|
|
|
|
status = STATUS_PENDING;
|
|
}
|
|
else {
|
|
//
|
|
// Set the endpoint to the connected state.
|
|
//
|
|
|
|
AcceptEndpoint->State = AfdEndpointStateConnected;
|
|
Connection->State = AfdConnectionStateConnected;
|
|
|
|
//
|
|
// Set events active field base on data accumulated on the connection.
|
|
//
|
|
|
|
if( IS_DATA_ON_CONNECTION( Connection ) ||
|
|
( AcceptEndpoint->InLine &&
|
|
IS_EXPEDITED_DATA_ON_CONNECTION( Connection ) ) ) {
|
|
|
|
AcceptEndpoint->EventsActive |= AFD_POLL_RECEIVE;
|
|
|
|
}
|
|
|
|
if( !AcceptEndpoint->InLine &&
|
|
IS_EXPEDITED_DATA_ON_CONNECTION( Connection ) ) {
|
|
|
|
AcceptEndpoint->EventsActive |= AFD_POLL_RECEIVE_EXPEDITED;
|
|
|
|
}
|
|
|
|
AcceptEndpoint->EventsActive |= AFD_POLL_SEND;
|
|
|
|
if( Connection->DisconnectIndicated ) {
|
|
|
|
AcceptEndpoint->EventsActive |= AFD_POLL_DISCONNECT;
|
|
}
|
|
|
|
|
|
if( Connection->Aborted ) {
|
|
|
|
AcceptEndpoint->EventsActive |= AFD_POLL_ABORT;
|
|
|
|
}
|
|
|
|
|
|
IF_DEBUG(EVENT_SELECT) {
|
|
KdPrintEx(( DPFLTR_WSOCKTRANSPORT_ID, DPFLTR_TRACE_LEVEL,
|
|
"AfdAcceptCore: Endp %08lX, Active %08lX\n",
|
|
AcceptEndpoint,
|
|
AcceptEndpoint->EventsActive
|
|
));
|
|
}
|
|
|
|
status = STATUS_SUCCESS;
|
|
}
|
|
}
|
|
|
|
AfdReleaseSpinLockFromDpcLevel( &AcceptEndpoint->SpinLock, &lockHandle);
|
|
return status;
|
|
} // AfdAcceptCore
|
|
|
|
|
|
VOID
|
|
AfdInitiateListenBacklogReplenish (
|
|
IN PAFD_ENDPOINT Endpoint
|
|
)
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Queues a work item to begin replenishing the listen backlog
|
|
on a listening endpoint.
|
|
|
|
Arguments:
|
|
|
|
Endpoint - the listening endpoint on which to replenish the
|
|
backlog.
|
|
|
|
Return Value:
|
|
|
|
None.
|
|
|
|
--*/
|
|
|
|
{
|
|
AFD_LOCK_QUEUE_HANDLE lockHandle;
|
|
|
|
//
|
|
// Check if backlog replenish is active already.
|
|
//
|
|
AfdAcquireSpinLock (&Endpoint->SpinLock, &lockHandle);
|
|
if (!Endpoint->Common.VcListening.BacklogReplenishActive) {
|
|
|
|
Endpoint->Common.VcListening.BacklogReplenishActive = TRUE;
|
|
//
|
|
// Reference the endpoint so that it won't go away until we're
|
|
// done with it.
|
|
//
|
|
|
|
REFERENCE_ENDPOINT( Endpoint );
|
|
|
|
|
|
AfdQueueWorkItem(
|
|
AfdDoListenBacklogReplenish,
|
|
&Endpoint->WorkItem
|
|
);
|
|
}
|
|
|
|
AfdReleaseSpinLock (&Endpoint->SpinLock, &lockHandle);
|
|
return;
|
|
} // AfdInitiateListenBacklogReplenish
|
|
|
|
|
|
VOID
|
|
AfdDoListenBacklogReplenish (
|
|
IN PVOID Context
|
|
)
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
The worker routine for replenishing the listen backlog on a
|
|
listening endpoint. This routine only runs in the context of
|
|
an executive worker thread.
|
|
|
|
Arguments:
|
|
|
|
Context - Points to an AFD_WORK_ITEM structure. The Context field
|
|
of this structure points to the endpoint on which to replenish
|
|
the listen backlog.
|
|
|
|
Return Value:
|
|
|
|
None.
|
|
|
|
--*/
|
|
|
|
{
|
|
PAFD_ENDPOINT endpoint;
|
|
NTSTATUS status;
|
|
AFD_LOCK_QUEUE_HANDLE lockHandle;
|
|
|
|
|
|
endpoint = CONTAINING_RECORD(
|
|
Context,
|
|
AFD_ENDPOINT,
|
|
WorkItem
|
|
);
|
|
|
|
ASSERT( endpoint->Type == AfdBlockTypeVcListening ||
|
|
endpoint->Type == AfdBlockTypeVcBoth );
|
|
|
|
ASSERT (endpoint->Common.VcListening.BacklogReplenishActive == TRUE);
|
|
|
|
AfdAcquireSpinLock (&endpoint->SpinLock, &lockHandle);
|
|
endpoint->Common.VcListening.BacklogReplenishActive = FALSE;
|
|
AfdReleaseSpinLock (&endpoint->SpinLock, &lockHandle);
|
|
|
|
//
|
|
// Fill up the free connection backlog.
|
|
//
|
|
|
|
status = AfdReplenishListenBacklog( endpoint );
|
|
if (!NT_SUCCESS (status)) {
|
|
//
|
|
// If we failed, try to notify application
|
|
//
|
|
AfdReportConnectionAllocationFailure (endpoint, status);
|
|
}
|
|
|
|
|
|
//
|
|
// Clean up and return.
|
|
//
|
|
|
|
DEREFERENCE_ENDPOINT( endpoint );
|
|
|
|
return;
|
|
|
|
} // AfdDoListenBacklogReplenish
|
|
|
|
|
|
NTSTATUS
|
|
AfdReplenishListenBacklog (
|
|
IN PAFD_ENDPOINT Endpoint
|
|
)
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Does the actual work of filling up the listen backlog on a listening
|
|
endpoint.
|
|
|
|
Arguments:
|
|
|
|
Endpoint - the listening endpoint on which to replenish the
|
|
listen backlog.
|
|
|
|
Return Value:
|
|
|
|
STATUS_SUCCESS - if new connection was allocated or we already
|
|
had enough
|
|
status of conneciton allocation failure otherwise
|
|
--*/
|
|
|
|
{
|
|
NTSTATUS status;
|
|
LONG result;
|
|
|
|
PAGED_CODE( );
|
|
|
|
ASSERT( Endpoint->Type == AfdBlockTypeVcListening ||
|
|
Endpoint->Type == AfdBlockTypeVcBoth );
|
|
|
|
|
|
//
|
|
// Decrement the count of failed connection additions.
|
|
//
|
|
|
|
result = InterlockedDecrement(
|
|
&Endpoint->Common.VcListening.FailedConnectionAdds
|
|
);
|
|
|
|
//
|
|
// Continue opening new free conections until we've hit the
|
|
// backlog or a connection open fails.
|
|
//
|
|
// If the result of the decrement is negative, then we are either
|
|
// all set on the connection count or else have available extra
|
|
// connection objects on the listening endpoint. These connections
|
|
// have been reused from prior connections which have now
|
|
// terminated.
|
|
//
|
|
|
|
while ( result >= 0 ) {
|
|
|
|
status = AfdAddFreeConnection( Endpoint );
|
|
|
|
if ( !NT_SUCCESS(status) ) {
|
|
|
|
InterlockedIncrement(
|
|
&Endpoint->Common.VcListening.FailedConnectionAdds
|
|
);
|
|
|
|
IF_DEBUG(LISTEN) {
|
|
KdPrintEx(( DPFLTR_WSOCKTRANSPORT_ID, DPFLTR_TRACE_LEVEL,
|
|
"AfdReplenishListenBacklog: AfdAddFreeConnection failed: %X, fail count = %ld\n", status,
|
|
Endpoint->Common.VcListening.FailedConnectionAdds ));
|
|
}
|
|
|
|
//
|
|
// Return connection allocation failure to the application
|
|
// if it cares to know (posted accept request).
|
|
//
|
|
|
|
return status;
|
|
}
|
|
|
|
result = InterlockedDecrement(
|
|
&Endpoint->Common.VcListening.FailedConnectionAdds
|
|
);
|
|
}
|
|
|
|
//
|
|
// Correct the counter to reflect the number of connections
|
|
// we have available. Then just return from here.
|
|
//
|
|
|
|
InterlockedIncrement(
|
|
&Endpoint->Common.VcListening.FailedConnectionAdds
|
|
);
|
|
|
|
return STATUS_SUCCESS;
|
|
|
|
} // AfdReplenishListenBacklog
|
|
|
|
|
|
|
|
VOID
|
|
AfdReportConnectionAllocationFailure (
|
|
PAFD_ENDPOINT Endpoint,
|
|
NTSTATUS Status
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Reports connection allocation failure to the application by
|
|
failing then first wait for listen irp in the queue (if application
|
|
has AcceptEx or blockin accept outstanding, it will get this notification).
|
|
|
|
Arguments:
|
|
|
|
Endpoint - the listening endpoint on which to report an error
|
|
Status - status code to report
|
|
|
|
Return Value:
|
|
|
|
None
|
|
--*/
|
|
{
|
|
AFD_LOCK_QUEUE_HANDLE lockHandle;
|
|
|
|
AfdAcquireSpinLock (&Endpoint->SpinLock, &lockHandle);
|
|
if ((Endpoint->Common.VcListening.FailedConnectionAdds>0) &&
|
|
IsListEmpty (&Endpoint->Common.VcListening.UnacceptedConnectionListHead) &&
|
|
!IsListEmpty (&Endpoint->Common.VcListening.ListeningIrpListHead)) {
|
|
PIRP irp;
|
|
PIO_STACK_LOCATION irpSp;
|
|
|
|
irp = CONTAINING_RECORD (Endpoint->Common.VcListening.ListeningIrpListHead.Flink,
|
|
IRP,
|
|
Tail.Overlay.ListEntry);
|
|
irpSp = IoGetCurrentIrpStackLocation (irp);
|
|
RemoveEntryList (&irp->Tail.Overlay.ListEntry);
|
|
irp->Tail.Overlay.ListEntry.Flink = NULL;
|
|
|
|
AfdReleaseSpinLock (&Endpoint->SpinLock, &lockHandle);
|
|
|
|
if (IoSetCancelRoutine (irp, NULL)==NULL) {
|
|
KIRQL cancelIrql;
|
|
//
|
|
// If the cancel routine was NULL then cancel routine
|
|
// may be running. Wait on the cancel spinlock until
|
|
// the cancel routine is done.
|
|
//
|
|
// Note: The cancel routine will not find the IRP
|
|
// since it is not in the list.
|
|
//
|
|
|
|
IoAcquireCancelSpinLock( &cancelIrql );
|
|
ASSERT( irp->Cancel );
|
|
IoReleaseCancelSpinLock( cancelIrql );
|
|
}
|
|
if (irpSp->MajorFunction==IRP_MJ_INTERNAL_DEVICE_CONTROL) {
|
|
AfdCleanupSuperAccept (irp, Status);
|
|
}
|
|
else {
|
|
irp->IoStatus.Status = Status;
|
|
irp->IoStatus.Information = 0;
|
|
}
|
|
IoCompleteRequest (irp, AfdPriorityBoost);
|
|
}
|
|
else {
|
|
AfdReleaseSpinLock (&Endpoint->SpinLock, &lockHandle);
|
|
}
|
|
}
|
|
|
|
|
|
|
|
|
|
NTSTATUS
|
|
FASTCALL
|
|
AfdSuperAccept (
|
|
IN PIRP Irp,
|
|
IN PIO_STACK_LOCATION IrpSp
|
|
)
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Initial entrypoint for handling super accept IRPs. A super accept
|
|
combines several operations for high-performance connection
|
|
acceptance. The combined operations are waiting for an incoming
|
|
connection, accepting it, retrieving the local and remote socket
|
|
addresses, and receiving the first chunk of data on the connection.
|
|
|
|
This routine verifies parameters, initializes data structures to be
|
|
used for the request, and initiates the I/O.
|
|
|
|
Arguments:
|
|
|
|
Irp - a pointer to a transmit file IRP.
|
|
|
|
IrpSp - Our stack location for this IRP.
|
|
|
|
Return Value:
|
|
|
|
STATUS_PENDING if the request was initiated successfully, or a
|
|
failure status code if there was an error.
|
|
|
|
--*/
|
|
|
|
{
|
|
PAFD_ENDPOINT listenEndpoint;
|
|
PAFD_ENDPOINT acceptEndpoint;
|
|
PFILE_OBJECT acceptFileObject;
|
|
HANDLE acceptHandle;
|
|
ULONG receiveDataLength, localAddressLength, remoteAddressLength;
|
|
BOOLEAN sanActive;
|
|
#ifndef i386
|
|
BOOLEAN fixAddressAlignment;
|
|
#endif
|
|
NTSTATUS status;
|
|
ULONG totalLength;
|
|
PSLIST_ENTRY listEntry;
|
|
PAFD_CONNECTION connection;
|
|
AFD_LOCK_QUEUE_HANDLE lockHandle;
|
|
|
|
//
|
|
// Set up local variables.
|
|
//
|
|
|
|
listenEndpoint = IrpSp->FileObject->FsContext;
|
|
acceptFileObject = NULL;
|
|
acceptEndpoint = NULL;
|
|
|
|
#ifdef _WIN64
|
|
if (IoIs32bitProcess (Irp)) {
|
|
PAFD_SUPER_ACCEPT_INFO32 superAcceptInfo32;
|
|
superAcceptInfo32 = IrpSp->Parameters.DeviceIoControl.Type3InputBuffer;
|
|
|
|
if (IrpSp->Parameters.DeviceIoControl.InputBufferLength <
|
|
sizeof(AFD_SUPER_ACCEPT_INFO32) ) {
|
|
status = STATUS_INVALID_PARAMETER;
|
|
goto complete;
|
|
}
|
|
|
|
AFD_W4_INIT status = STATUS_SUCCESS;
|
|
try {
|
|
if (Irp->RequestorMode!=KernelMode) {
|
|
ProbeForReadSmallStructure (superAcceptInfo32,
|
|
sizeof (*superAcceptInfo32),
|
|
PROBE_ALIGNMENT32 (AFD_SUPER_ACCEPT_INFO32));
|
|
}
|
|
|
|
acceptHandle = superAcceptInfo32->AcceptHandle;
|
|
receiveDataLength = superAcceptInfo32->ReceiveDataLength;
|
|
localAddressLength = superAcceptInfo32->LocalAddressLength;
|
|
remoteAddressLength = superAcceptInfo32->RemoteAddressLength;
|
|
sanActive = superAcceptInfo32->SanActive;
|
|
fixAddressAlignment = superAcceptInfo32->FixAddressAlignment;
|
|
}
|
|
except (AFD_EXCEPTION_FILTER (status)) {
|
|
ASSERT (NT_ERROR (status));
|
|
goto complete;
|
|
}
|
|
}
|
|
else
|
|
#endif // _WIN64
|
|
{
|
|
PAFD_SUPER_ACCEPT_INFO superAcceptInfo;
|
|
superAcceptInfo = IrpSp->Parameters.DeviceIoControl.Type3InputBuffer;
|
|
|
|
AFD_W4_INIT status = STATUS_SUCCESS;
|
|
try {
|
|
if (Irp->RequestorMode!=KernelMode) {
|
|
ProbeForReadSmallStructure (superAcceptInfo,
|
|
sizeof (*superAcceptInfo),
|
|
PROBE_ALIGNMENT (AFD_SUPER_ACCEPT_INFO));
|
|
}
|
|
acceptHandle = superAcceptInfo->AcceptHandle;
|
|
receiveDataLength = superAcceptInfo->ReceiveDataLength;
|
|
localAddressLength = superAcceptInfo->LocalAddressLength;
|
|
remoteAddressLength = superAcceptInfo->RemoteAddressLength;
|
|
sanActive = superAcceptInfo->SanActive;
|
|
#ifndef i386
|
|
fixAddressAlignment = superAcceptInfo->FixAddressAlignment;
|
|
#endif
|
|
}
|
|
except (AFD_EXCEPTION_FILTER (status)) {
|
|
ASSERT (NT_ERROR (status));
|
|
goto complete;
|
|
}
|
|
}
|
|
|
|
|
|
//
|
|
// Check for if the caller is unaware of the SAN
|
|
// provider activation and report the error.
|
|
//
|
|
if (!sanActive && AfdSanServiceHelper!=NULL) {
|
|
KdPrintEx(( DPFLTR_WSOCKTRANSPORT_ID, DPFLTR_INFO_LEVEL,
|
|
"AFD: Process %p is being told to enable SAN on AcceptEx\n",
|
|
PsGetCurrentProcessId ()));
|
|
status = STATUS_INVALID_PARAMETER_12;
|
|
goto complete;
|
|
}
|
|
//
|
|
// Validate the input information. The input buffer must be large
|
|
// enough to hold all the input information, plus some extra to use
|
|
// here to hold the local address. The output buffer must be
|
|
// non-NULL and large enough to hold the specified information.
|
|
//
|
|
//
|
|
|
|
if ( !listenEndpoint->Listening
|
|
|
|
||
|
|
|
|
remoteAddressLength < (ULONG)FIELD_OFFSET (TRANSPORT_ADDRESS,
|
|
Address[0].Address)
|
|
|
|
||
|
|
|
|
//
|
|
// Do the check in such a manner that integer overflow
|
|
// (which is not enabled by the compiler) does not
|
|
// affect the validity of the result.
|
|
//
|
|
(totalLength=IrpSp->Parameters.DeviceIoControl.OutputBufferLength)<
|
|
receiveDataLength
|
|
|
|
||
|
|
|
|
(totalLength-=receiveDataLength) < localAddressLength
|
|
|
|
||
|
|
|
|
(totalLength-=localAddressLength) < remoteAddressLength
|
|
|
|
) {
|
|
|
|
if( !listenEndpoint->Listening ) {
|
|
KdPrintEx(( DPFLTR_WSOCKTRANSPORT_ID, DPFLTR_INFO_LEVEL,
|
|
"AfdSuperAccept: non-listening endpoint @ %08lX\n",
|
|
listenEndpoint
|
|
));
|
|
status = STATUS_INVALID_PARAMETER;
|
|
}
|
|
else {
|
|
status = STATUS_BUFFER_TOO_SMALL;
|
|
}
|
|
|
|
goto complete;
|
|
}
|
|
|
|
AFD_W4_INIT ASSERT (status == STATUS_SUCCESS);
|
|
try {
|
|
if (IoAllocateMdl(Irp->UserBuffer,
|
|
IrpSp->Parameters.DeviceIoControl.OutputBufferLength,
|
|
FALSE, // Secondary buffer
|
|
TRUE, // Charge quota
|
|
Irp
|
|
)==NULL) {
|
|
status = STATUS_INSUFFICIENT_RESOURCES;
|
|
goto complete;
|
|
}
|
|
|
|
MmProbeAndLockPages (Irp->MdlAddress, Irp->RequestorMode, IoWriteAccess);
|
|
}
|
|
__except (AFD_EXCEPTION_FILTER (status)) {
|
|
ASSERT (NT_ERROR (status));
|
|
goto complete;
|
|
}
|
|
|
|
ASSERT ((listenEndpoint->Type & AfdBlockTypeVcListening) == AfdBlockTypeVcListening);
|
|
//
|
|
// Obtain a pointer to the endpoint on which we're going to
|
|
// accept the connection.
|
|
//
|
|
|
|
status = ObReferenceObjectByHandle(
|
|
acceptHandle,
|
|
(IrpSp->Parameters.DeviceIoControl.IoControlCode>>14) & 3,
|
|
// DesiredAccess
|
|
*IoFileObjectType,
|
|
Irp->RequestorMode,
|
|
&acceptFileObject,
|
|
NULL
|
|
);
|
|
|
|
if ( !NT_SUCCESS(status) ) {
|
|
goto complete;
|
|
}
|
|
|
|
|
|
//
|
|
// We may have a file object that is not an AFD endpoint. Make sure
|
|
// that this is an actual AFD endpoint.
|
|
//
|
|
|
|
if (acceptFileObject->DeviceObject!= AfdDeviceObject) {
|
|
status = STATUS_INVALID_HANDLE;
|
|
goto complete;
|
|
}
|
|
|
|
|
|
acceptEndpoint = acceptFileObject->FsContext;
|
|
ASSERT( InterlockedIncrement( &acceptEndpoint->ObReferenceBias ) > 0 );
|
|
|
|
|
|
if (!AFD_START_STATE_CHANGE (acceptEndpoint, AfdEndpointStateConnected)) {
|
|
status = STATUS_INVALID_PARAMETER;
|
|
goto complete;
|
|
}
|
|
|
|
if (acceptEndpoint->TransportInfo!=listenEndpoint->TransportInfo ||
|
|
acceptEndpoint->State != AfdEndpointStateOpen ||
|
|
acceptEndpoint->SecurityDescriptor!=NULL) {
|
|
status = STATUS_INVALID_PARAMETER;
|
|
goto complete_state_change;
|
|
}
|
|
|
|
|
|
#ifndef i386
|
|
acceptEndpoint->Common.VcConnecting.FixAddressAlignment = fixAddressAlignment;
|
|
#endif
|
|
Irp->Tail.Overlay.DriverContext[3] = acceptHandle;
|
|
|
|
//
|
|
// Save common IRP parameters in our stack location so
|
|
// we can retreive them when necessary
|
|
//
|
|
|
|
IrpSp->Parameters.AfdRestartSuperAcceptInfo.AfdAcceptFileObject = acceptFileObject;
|
|
IrpSp->Parameters.AfdRestartSuperAcceptInfo.AfdReceiveDataLength = receiveDataLength;
|
|
IrpSp->Parameters.AfdRestartSuperAcceptInfo.AfdLocalAddressLength = localAddressLength;
|
|
IrpSp->Parameters.AfdRestartSuperAcceptInfo.AfdRemoteAddressLength = remoteAddressLength;
|
|
|
|
//
|
|
// Add another free connection to replace the one we're accepting.
|
|
// Also, add extra to account for past failures in calls to
|
|
// AfdAddFreeConnection().
|
|
//
|
|
|
|
InterlockedIncrement(
|
|
&listenEndpoint->Common.VcListening.FailedConnectionAdds
|
|
);
|
|
|
|
status = AfdReplenishListenBacklog( listenEndpoint );
|
|
|
|
|
|
//
|
|
// Save the IRP, so that accept enpoint cleanup can find it.
|
|
// Note, that even if found, the cleanup won't touch the IRP
|
|
// until cancel routine is set in it.
|
|
//
|
|
ASSERT (acceptEndpoint->Irp==NULL);
|
|
acceptEndpoint->Irp = Irp;
|
|
|
|
//
|
|
// Get free connection from the list, if none is available,
|
|
// or direct super accept is disabled, go through the regular
|
|
// listen-accept path.
|
|
//
|
|
|
|
if (AfdDisableDirectSuperAccept ||
|
|
IS_DELAYED_ACCEPTANCE_ENDPOINT (listenEndpoint) ||
|
|
ExQueryDepthSList (&listenEndpoint->Common.VcListening.PreacceptedConnectionsListHead)
|
|
> AFD_MAXIMUM_FREE_CONNECTIONS ||
|
|
((listEntry = InterlockedPopEntrySList (
|
|
&listenEndpoint->Common.VcListening.FreeConnectionListHead
|
|
))==NULL)) {
|
|
|
|
//
|
|
// Setup super accept IRP to be put into the wait for
|
|
// listen queue. Internal device control distinguishes this
|
|
// from the regular wait for listen IRPs that come directly
|
|
// from the application.
|
|
//
|
|
IrpSp->MajorFunction = IRP_MJ_INTERNAL_DEVICE_CONTROL;
|
|
|
|
//
|
|
// Mark this IRP as pending since we are going to return
|
|
// STATUS_PENDING no matter what (sometimes the actual
|
|
// status is hidden very deep inside the call stack and
|
|
// it is impossible to propagate it all the way up).
|
|
//
|
|
IoMarkIrpPending (Irp);
|
|
|
|
AfdWaitForListen (Irp, IrpSp);
|
|
|
|
//
|
|
// If connection allocation failed above, we need to report
|
|
// this to application. We delay this call in case there is
|
|
// already a preaccepted connection, so the allocation failure
|
|
// is not important.
|
|
//
|
|
if (!NT_SUCCESS (status)) {
|
|
AfdReportConnectionAllocationFailure (listenEndpoint, status);
|
|
}
|
|
|
|
return STATUS_PENDING;
|
|
}
|
|
|
|
//
|
|
// Get connection object of the list entry
|
|
//
|
|
connection = CONTAINING_RECORD(
|
|
listEntry,
|
|
AFD_CONNECTION,
|
|
SListEntry
|
|
);
|
|
|
|
|
|
//
|
|
// Stuff special constant into the connection object accept IRP
|
|
// pointer, so that cancel routine does not complete the IRP
|
|
// while we are still looking at it, but in the same time we
|
|
// can detect that the IRP was cancelled (cancel routine will
|
|
// replace the -1 with NULL to indicate that it has been ran).
|
|
// This technique avoids extra spinlock acquire/release and
|
|
// associated IRQL raise/lower on an extremely performance-sensitive
|
|
// code path.
|
|
//
|
|
|
|
connection->AcceptIrp = (PIRP)-1;
|
|
Irp->Tail.Overlay.DriverContext[0] = connection;
|
|
|
|
//
|
|
// We are going to pend this Irp, so mark it as pending
|
|
// and set up the cancel routine.
|
|
//
|
|
|
|
IoMarkIrpPending (Irp);
|
|
|
|
IoSetCancelRoutine( Irp, AfdCancelSuperAccept );
|
|
|
|
|
|
//
|
|
// Check if the IRP has already been canceled.
|
|
// If the cancel routine ran, it just reset the connection
|
|
// object accept pointer to NULL (instead of -1 that we stuffed
|
|
// in it above), but it did not complete the IRP.
|
|
//
|
|
|
|
if ( !Irp->Cancel &&
|
|
(InterlockedCompareExchangePointer (
|
|
(PVOID *)&connection->AcceptIrp,
|
|
Irp,
|
|
(PVOID)-1)==(PVOID)-1)) {
|
|
//
|
|
// Can't touch the IRP after this point since it may have already
|
|
// been canceled.
|
|
//
|
|
DEBUG Irp = NULL;
|
|
|
|
//
|
|
// Push the connection and associated Irp/endpoint
|
|
// onto preaccepted connection list.
|
|
//
|
|
|
|
if (InterlockedPushEntrySList(
|
|
&listenEndpoint->Common.VcListening.PreacceptedConnectionsListHead,
|
|
&connection->SListEntry
|
|
)==NULL) {
|
|
|
|
//
|
|
// This is the first Irp in the list, we need to check
|
|
// if there are any unaccepted connections that we
|
|
// can use to satisfy super accept.
|
|
//
|
|
|
|
AfdAcquireSpinLock (&listenEndpoint->SpinLock, &lockHandle);
|
|
|
|
if (!listenEndpoint->EndpointCleanedUp) {
|
|
LIST_ENTRY irpList;
|
|
InitializeListHead (&irpList);
|
|
|
|
//
|
|
// First see if there is an unaccepted connection
|
|
//
|
|
while (!IsListEmpty (&listenEndpoint->Common.VcListening.UnacceptedConnectionListHead)) {
|
|
connection = CONTAINING_RECORD(
|
|
listenEndpoint->Common.VcListening.UnacceptedConnectionListHead.Flink,
|
|
AFD_CONNECTION,
|
|
ListEntry
|
|
);
|
|
RemoveEntryList (&connection->ListEntry);
|
|
//
|
|
// Now make sure we still have super accept irp
|
|
//
|
|
if (AfdServiceSuperAccept (listenEndpoint, connection, &lockHandle, &irpList)) {
|
|
//
|
|
// The routine has found and completed super accept IRP
|
|
// Reaquire a spinlock and continue searching for more.
|
|
//
|
|
AfdAcquireSpinLock (&listenEndpoint->SpinLock, &lockHandle);
|
|
}
|
|
else {
|
|
//
|
|
// No super accept Irps, put connection back onto the list
|
|
// while we are still holding the lock and bail out.
|
|
//
|
|
InsertHeadList (&listenEndpoint->Common.VcListening.UnacceptedConnectionListHead,
|
|
&connection->ListEntry);
|
|
break;
|
|
}
|
|
}
|
|
AfdReleaseSpinLock (&listenEndpoint->SpinLock, &lockHandle);
|
|
|
|
//
|
|
// Complete failed super accept IRPs (if any)
|
|
//
|
|
if (!IsListEmpty (&irpList)) {
|
|
KIRQL cancelIrql;
|
|
//
|
|
// Make sure cancel routines will
|
|
// not access the completed IRPs
|
|
//
|
|
IoAcquireCancelSpinLock (&cancelIrql);
|
|
IoReleaseCancelSpinLock (cancelIrql);
|
|
while (!IsListEmpty (&irpList)) {
|
|
PIRP irp;
|
|
irp = CONTAINING_RECORD (irpList.Flink, IRP, Tail.Overlay.ListEntry);
|
|
RemoveEntryList (&irp->Tail.Overlay.ListEntry);
|
|
IoCompleteRequest (irp, AfdPriorityBoost);
|
|
}
|
|
}
|
|
}
|
|
else {
|
|
AfdReleaseSpinLock (&listenEndpoint->SpinLock, &lockHandle);
|
|
AfdFreeQueuedConnections (listenEndpoint);
|
|
}
|
|
}
|
|
else {
|
|
USHORT depth =
|
|
ExQueryDepthSList (&listenEndpoint->Common.VcListening.PreacceptedConnectionsListHead);
|
|
|
|
if (depth > listenEndpoint->Common.VcListening.MaxExtraConnections) {
|
|
//
|
|
// Update under the lock, so we do not corrupt
|
|
// other fields in the same memory access granularity unit.
|
|
// This should be infrequent operation anyway.
|
|
//
|
|
AfdAcquireSpinLock (&listenEndpoint->SpinLock, &lockHandle);
|
|
listenEndpoint->Common.VcListening.MaxExtraConnections = depth;
|
|
AfdReleaseSpinLock (&listenEndpoint->SpinLock, &lockHandle);
|
|
}
|
|
}
|
|
}
|
|
else {
|
|
//
|
|
// Reset and call the cancel routine, since
|
|
// even if cancel routine ran, it could not complete
|
|
// the irp because it was not set in the connection
|
|
// object. Note that cancel routine is done with the IRP
|
|
// once it releases cancel spinlock which we acquire here.
|
|
//
|
|
AfdCleanupSuperAccept (Irp, STATUS_CANCELLED);
|
|
if (IoSetCancelRoutine (Irp, NULL)==NULL) {
|
|
KIRQL cancelIrql;
|
|
IoAcquireCancelSpinLock (&cancelIrql);
|
|
IoReleaseCancelSpinLock (cancelIrql);
|
|
}
|
|
|
|
IoCompleteRequest (Irp, AfdPriorityBoost);
|
|
|
|
//
|
|
// We have to return pending because we have already
|
|
// marked the Irp as pending.
|
|
//
|
|
}
|
|
|
|
return STATUS_PENDING;
|
|
|
|
complete_state_change:
|
|
AFD_END_STATE_CHANGE (acceptEndpoint);
|
|
|
|
complete:
|
|
|
|
if ( acceptFileObject != NULL ) {
|
|
if (acceptEndpoint!=NULL) {
|
|
ASSERT( InterlockedDecrement( &acceptEndpoint->ObReferenceBias ) >= 0 );
|
|
}
|
|
ObDereferenceObject( acceptFileObject );
|
|
}
|
|
|
|
//
|
|
// Free MDL here as IO system can't do it if it is
|
|
// not locked.
|
|
//
|
|
if (Irp->MdlAddress!=NULL) {
|
|
if (Irp->MdlAddress->MdlFlags & MDL_PAGES_LOCKED) {
|
|
MmUnlockPages (Irp->MdlAddress);
|
|
}
|
|
|
|
IoFreeMdl (Irp->MdlAddress);
|
|
Irp->MdlAddress = NULL;
|
|
}
|
|
|
|
Irp->IoStatus.Information = 0;
|
|
Irp->IoStatus.Status = status;
|
|
IoCompleteRequest( Irp, 0 );
|
|
|
|
return status;
|
|
|
|
} // AfdSuperAccept
|
|
|
|
|
|
|
|
NTSTATUS
|
|
AfdRestartSuperAccept (
|
|
IN PDEVICE_OBJECT DeviceObject,
|
|
IN PIRP Irp,
|
|
IN PVOID Context
|
|
)
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
The completion routine for the AFD wait for listen IRP portion
|
|
of a super accept.
|
|
|
|
Arguments:
|
|
|
|
DeviceObject - the devoce object on which the request is completing.
|
|
|
|
Irp - The super accept IRP.
|
|
|
|
Context - points to accept file object.
|
|
|
|
Return Value:
|
|
|
|
STATUS_SUCCESS if the I/O system should complete the super accept
|
|
request, or STATUS_MORE_PROCESSING_REQUIRED if the super accept
|
|
request is still being processed.
|
|
|
|
--*/
|
|
|
|
{
|
|
PAFD_ENDPOINT listenEndpoint;
|
|
PFILE_OBJECT acceptFileObject;
|
|
PAFD_ENDPOINT acceptEndpoint;
|
|
PAFD_CONNECTION connection;
|
|
|
|
PIO_STACK_LOCATION irpSp;
|
|
AFD_LOCK_QUEUE_HANDLE lockHandle;
|
|
|
|
UNREFERENCED_PARAMETER (DeviceObject);
|
|
|
|
//
|
|
// Initialize some locals.
|
|
//
|
|
|
|
irpSp = IoGetCurrentIrpStackLocation( Irp );
|
|
|
|
listenEndpoint = irpSp->FileObject->FsContext;
|
|
|
|
acceptFileObject = Context;
|
|
acceptEndpoint = acceptFileObject->FsContext;
|
|
ASSERT (IS_AFD_ENDPOINT_TYPE (acceptEndpoint));
|
|
|
|
connection = acceptEndpoint->Common.VcConnecting.Connection;
|
|
ASSERT (connection->Type==AfdBlockTypeConnection);
|
|
ASSERT (connection->Endpoint==acceptEndpoint);
|
|
|
|
|
|
//
|
|
// Overwrite listen file object with accept file object
|
|
// since we won't be using listen file object anymore,
|
|
// while we still need to deference accept file object
|
|
// upon IRP completion.
|
|
//
|
|
irpSp->FileObject = acceptFileObject;
|
|
|
|
|
|
//
|
|
// Fix up the MDL pointer in the IRP.
|
|
//
|
|
|
|
ASSERT (Irp->MdlAddress==NULL);
|
|
Irp->MdlAddress = irpSp->Parameters.AfdRestartSuperAcceptInfo.AfdMdlAddress;
|
|
|
|
//
|
|
// If pending has been returned for this irp then mark the current
|
|
// stack as pending.
|
|
//
|
|
|
|
if ( Irp->PendingReturned ) {
|
|
IoMarkIrpPending( Irp );
|
|
}
|
|
|
|
//
|
|
// Remember that a TDI accept has completed on this endpoint.
|
|
//
|
|
|
|
InterlockedDecrement(
|
|
&listenEndpoint->Common.VcListening.TdiAcceptPendingCount
|
|
);
|
|
|
|
connection->ConnectTime = KeQueryInterruptTime();
|
|
|
|
if ( NT_SUCCESS(Irp->IoStatus.Status)) {
|
|
|
|
//
|
|
// Set the endpoint to the connected state.
|
|
//
|
|
|
|
AfdAcquireSpinLock (&acceptEndpoint->SpinLock, &lockHandle);
|
|
|
|
acceptEndpoint->State = AfdEndpointStateConnected;
|
|
connection->State = AfdConnectionStateConnected;
|
|
acceptEndpoint->EventsActive |= AFD_POLL_SEND;
|
|
|
|
|
|
//
|
|
// Remove the TDI accept IRP reference to the connection.
|
|
// Combine with reference below to optimize.
|
|
//
|
|
|
|
// DEREFERENCE_CONNECTION( connection );
|
|
|
|
//
|
|
// Reference connection to prevent it from going away during
|
|
// accept process as the result of transmit file completion.
|
|
// (transmit file can now occur at any time since we
|
|
// marked the endpoint as connected and about to end state change)
|
|
//
|
|
|
|
// REFERENCE_CONNECTION (connection);
|
|
|
|
AfdReleaseSpinLock (&acceptEndpoint->SpinLock, &lockHandle);
|
|
AFD_END_STATE_CHANGE(acceptEndpoint);
|
|
|
|
return AfdContinueSuperAccept (Irp, connection);
|
|
}
|
|
else {
|
|
//
|
|
// If the accept failed, treat it like an abortive disconnect.
|
|
// This way the application still gets a new endpoint, but it gets
|
|
// told about the reset.
|
|
//
|
|
|
|
AFD_END_STATE_CHANGE(acceptEndpoint);
|
|
AfdDisconnectEventHandler(
|
|
NULL,
|
|
connection,
|
|
0,
|
|
NULL,
|
|
0,
|
|
NULL,
|
|
TDI_DISCONNECT_ABORT
|
|
);
|
|
|
|
ASSERT( InterlockedDecrement( &acceptEndpoint->ObReferenceBias ) >= 0 );
|
|
ObDereferenceObject( acceptFileObject );
|
|
|
|
//
|
|
// Check if we have secondary MDL for local address query and
|
|
// free it.
|
|
//
|
|
if (Irp->MdlAddress->Next!=NULL) {
|
|
//
|
|
// We never lock pages for this one (they are locked
|
|
// as part of main MDL).
|
|
//
|
|
ASSERT (irpSp->Parameters.AfdRestartSuperAcceptInfo.AfdLocalAddressLength>0);
|
|
ASSERT ((Irp->MdlAddress->Next->MdlFlags & MDL_PAGES_LOCKED)==0);
|
|
IoFreeMdl (Irp->MdlAddress->Next);
|
|
Irp->MdlAddress->Next = NULL;
|
|
}
|
|
|
|
//
|
|
// Remove the TDI accept IRP reference to the connection.
|
|
//
|
|
|
|
DEREFERENCE_CONNECTION( connection );
|
|
|
|
return STATUS_SUCCESS;
|
|
}
|
|
|
|
} // AfdRestartSuperAccept
|
|
|
|
|
|
VOID
|
|
AfdRestartSuperAcceptListen (
|
|
IN PIRP Irp,
|
|
IN PAFD_CONNECTION Connection
|
|
)
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
The completion routine for the AFD wait for listen IRP portion
|
|
of a super accept.
|
|
|
|
Arguments:
|
|
|
|
Irp - The super accept IRP.
|
|
|
|
Connection - points to the connection object
|
|
|
|
Return Value:
|
|
|
|
None
|
|
--*/
|
|
|
|
{
|
|
PAFD_ENDPOINT acceptEndpoint;
|
|
PIO_STACK_LOCATION irpSp;
|
|
NTSTATUS status;
|
|
|
|
//
|
|
// Initialize some locals.
|
|
//
|
|
|
|
irpSp = IoGetCurrentIrpStackLocation( Irp );
|
|
|
|
acceptEndpoint = irpSp->FileObject->FsContext;
|
|
ASSERT (IS_AFD_ENDPOINT_TYPE (acceptEndpoint));
|
|
AFD_END_STATE_CHANGE(acceptEndpoint);
|
|
|
|
//
|
|
// Fix up the system buffer and MDL pointers in the IRP.
|
|
//
|
|
|
|
ASSERT (Irp->MdlAddress==NULL);
|
|
ASSERT (Irp->AssociatedIrp.SystemBuffer == NULL);
|
|
Irp->MdlAddress = irpSp->Parameters.AfdRestartSuperAcceptInfo.AfdMdlAddress;
|
|
|
|
//
|
|
// This routine shouldn't have been called if accept failed
|
|
//
|
|
ASSERT ( NT_SUCCESS(Irp->IoStatus.Status) );
|
|
|
|
//
|
|
// Reference connection to prevent it from going away during
|
|
// accept process as the result of transmit file completion.
|
|
// (transmit file can now occur at any time since we
|
|
// marked the endpoint as connected and about to end state change)
|
|
//
|
|
REFERENCE_CONNECTION (Connection);
|
|
|
|
status = AfdContinueSuperAccept (Irp, Connection);
|
|
|
|
//
|
|
// If completion routine return anything other
|
|
// than STATUS_MORE_PROCESSING_REQUIRED, the IRP
|
|
// is ready to be completed. Otherwise, is was
|
|
// reused to call transport driver and will be completed
|
|
// by the driver. Note that in the latter case
|
|
// the IRP cannot be touched because
|
|
// it could have been completed inside of the
|
|
// completion routine or by the driver before the
|
|
// completion routine returned.
|
|
//
|
|
if (status!=STATUS_MORE_PROCESSING_REQUIRED) {
|
|
IoCompleteRequest (Irp, AfdPriorityBoost);
|
|
}
|
|
|
|
} // AfdRestartSuperAcceptListen
|
|
|
|
NTSTATUS
|
|
AfdRestartDelayedSuperAccept (
|
|
IN PDEVICE_OBJECT DeviceObject,
|
|
IN PIRP Irp,
|
|
IN PVOID Context
|
|
)
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
The completion routine for the AFD wait for delayed accept IRP portion
|
|
of a super accept.
|
|
|
|
Arguments:
|
|
|
|
DeviceObject - the devoce object on which the request is completing.
|
|
|
|
Irp - The super accept IRP.
|
|
|
|
Context - points to accept file object
|
|
|
|
Return Value:
|
|
|
|
STATUS_SUCCESS if the I/O system should complete the super accept
|
|
request, or STATUS_MORE_PROCESSING_REQUIRED if the super accept
|
|
request is still being processed.
|
|
|
|
--*/
|
|
|
|
{
|
|
PAFD_ENDPOINT listenEndpoint;
|
|
PFILE_OBJECT acceptFileObject;
|
|
PAFD_ENDPOINT acceptEndpoint;
|
|
PAFD_CONNECTION connection;
|
|
|
|
PIO_STACK_LOCATION irpSp;
|
|
AFD_LOCK_QUEUE_HANDLE lockHandle;
|
|
|
|
UNREFERENCED_PARAMETER (DeviceObject);
|
|
|
|
//
|
|
// Initialize some locals.
|
|
//
|
|
|
|
irpSp = IoGetCurrentIrpStackLocation( Irp );
|
|
|
|
listenEndpoint = irpSp->FileObject->FsContext;
|
|
acceptFileObject = Context;
|
|
acceptEndpoint = acceptFileObject->FsContext;
|
|
ASSERT (IS_AFD_ENDPOINT_TYPE (acceptEndpoint));
|
|
|
|
//
|
|
// Overwrite listen file object with accept file object
|
|
// since we won't be using listen file object anymore,
|
|
// while we still need to deference accept file object
|
|
// upon IRP completion.
|
|
//
|
|
irpSp->FileObject = acceptFileObject;
|
|
|
|
//
|
|
// Fix up the MDL pointer in the IRP.
|
|
//
|
|
|
|
ASSERT (Irp->MdlAddress==NULL);
|
|
Irp->MdlAddress = irpSp->Parameters.AfdRestartSuperAcceptInfo.AfdMdlAddress;
|
|
|
|
AfdCompleteOutstandingIrp (acceptEndpoint, Irp);
|
|
|
|
//
|
|
// If pending has been returned for this irp then mark the current
|
|
// stack as pending.
|
|
//
|
|
|
|
if ( Irp->PendingReturned ) {
|
|
IoMarkIrpPending( Irp );
|
|
}
|
|
|
|
//
|
|
// Remember that a TDI accept has completed on this endpoint.
|
|
//
|
|
|
|
InterlockedDecrement(
|
|
&listenEndpoint->Common.VcListening.TdiAcceptPendingCount
|
|
);
|
|
|
|
AfdAcquireSpinLock (&acceptEndpoint->SpinLock, &lockHandle);
|
|
//
|
|
// The AFD connection object should now be in the endpoiont.
|
|
//
|
|
|
|
connection = AFD_CONNECTION_FROM_ENDPOINT( acceptEndpoint );
|
|
if (connection!=NULL) {
|
|
//
|
|
// If the IRP failed, quit processing.
|
|
//
|
|
|
|
if ( NT_SUCCESS(Irp->IoStatus.Status) ) {
|
|
|
|
acceptEndpoint->State = AfdEndpointStateConnected;
|
|
connection->State = AfdConnectionStateConnected;
|
|
acceptEndpoint->EventsActive |= AFD_POLL_SEND;
|
|
|
|
//
|
|
// Reference connection to prevent it from going away during
|
|
// accept process as the result of transmit file completion.
|
|
// (transmit file can now occur at any time since we
|
|
// marked the endpoint as connected and about to end state change)
|
|
//
|
|
REFERENCE_CONNECTION (connection);
|
|
|
|
AfdReleaseSpinLock (&acceptEndpoint->SpinLock, &lockHandle);
|
|
AFD_END_STATE_CHANGE(acceptEndpoint);
|
|
|
|
return AfdContinueSuperAccept (Irp, connection);
|
|
|
|
}
|
|
else {
|
|
//
|
|
// If the accept failed, treat it like an abortive disconnect.
|
|
// This way the application still gets a new endpoint, but it gets
|
|
// told about the reset.
|
|
//
|
|
|
|
AfdReleaseSpinLock (&acceptEndpoint->SpinLock, &lockHandle);
|
|
|
|
AFD_END_STATE_CHANGE(acceptEndpoint);
|
|
AfdDisconnectEventHandler(
|
|
NULL,
|
|
connection,
|
|
0,
|
|
NULL,
|
|
0,
|
|
NULL,
|
|
TDI_DISCONNECT_ABORT
|
|
);
|
|
|
|
ASSERT( InterlockedDecrement( &acceptEndpoint->ObReferenceBias ) >= 0 );
|
|
ObDereferenceObject( acceptFileObject );
|
|
//
|
|
// After dereferencing file object we shouldn't be accessing it
|
|
// or associated endpoint structure
|
|
//
|
|
}
|
|
}
|
|
else {
|
|
// this could happed if transmit file cleaned up the object
|
|
// really quickly somehow,
|
|
AfdReleaseSpinLock (&acceptEndpoint->SpinLock, &lockHandle);
|
|
|
|
ASSERT( InterlockedDecrement( &acceptEndpoint->ObReferenceBias ) >= 0 );
|
|
ObDereferenceObject( acceptFileObject );
|
|
//
|
|
// After dereferencing file object we shouldn't be accessing it
|
|
// or associated endpoint structure
|
|
//
|
|
}
|
|
|
|
//
|
|
// Check if we have secondary MDL for local address query and
|
|
// free it.
|
|
//
|
|
if (Irp->MdlAddress->Next!=NULL) {
|
|
//
|
|
// We never lock pages for this one (they are locked
|
|
// as part of main MDL).
|
|
//
|
|
ASSERT (irpSp->Parameters.AfdRestartSuperAcceptInfo.AfdLocalAddressLength>0);
|
|
ASSERT ((Irp->MdlAddress->Next->MdlFlags & MDL_PAGES_LOCKED)==0);
|
|
IoFreeMdl (Irp->MdlAddress->Next);
|
|
Irp->MdlAddress->Next = NULL;
|
|
}
|
|
|
|
return STATUS_SUCCESS;
|
|
|
|
} // AfdRestartDelayedSuperAccept
|
|
|
|
NTSTATUS
|
|
AfdContinueSuperAccept (
|
|
IN PIRP Irp,
|
|
PAFD_CONNECTION Connection
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Continues super accept IRP processing after the initial accept
|
|
phase by requesting local address and/or first portion of the
|
|
received data.
|
|
|
|
Arguments:
|
|
|
|
Irp - a pointer to the super accept IRP
|
|
Connection - pointer to the accepted connection
|
|
|
|
|
|
Return Value:
|
|
STATUS_SUCCESS if Irp processing is completed
|
|
STATUS_MORE_PROCESSING_REQUIRED if it submits another request
|
|
and processing will ocurr in the completion routine.
|
|
|
|
--*/
|
|
|
|
{
|
|
PAFD_ENDPOINT acceptEndpoint;
|
|
PIO_STACK_LOCATION irpSp;
|
|
ULONG length;
|
|
|
|
|
|
//
|
|
// Initialize locals
|
|
//
|
|
irpSp = IoGetCurrentIrpStackLocation (Irp);
|
|
acceptEndpoint = irpSp->FileObject->FsContext;
|
|
|
|
//
|
|
// See if we need to get local address.
|
|
//
|
|
if (irpSp->Parameters.AfdRestartSuperAcceptInfo.AfdLocalAddressLength>0) {
|
|
|
|
ASSERT (Irp->MdlAddress->Next!=NULL);
|
|
|
|
//
|
|
// Get the MDL that describes local address part of the user buffer
|
|
// The oritinal mdl chain address is safe in our stack location
|
|
//
|
|
Irp->MdlAddress = Irp->MdlAddress->Next;
|
|
|
|
//
|
|
// Unchain the address MDL from the receive MDL - we will
|
|
// free it upon completion of the address query operation
|
|
//
|
|
((PMDL)irpSp->Parameters.AfdRestartSuperAcceptInfo.AfdMdlAddress)->Next = NULL;
|
|
|
|
ASSERT (irpSp->Parameters.AfdRestartSuperAcceptInfo.AfdLocalAddressLength
|
|
== MmGetMdlByteCount (Irp->MdlAddress));
|
|
|
|
IoBuildPartialMdl (
|
|
irpSp->Parameters.AfdRestartSuperAcceptInfo.AfdMdlAddress,
|
|
Irp->MdlAddress,
|
|
MmGetMdlVirtualAddress (Irp->MdlAddress),
|
|
MmGetMdlByteCount (Irp->MdlAddress)
|
|
);
|
|
|
|
|
|
TdiBuildQueryInformation(
|
|
Irp,
|
|
Connection->DeviceObject,
|
|
Connection->FileObject,
|
|
AfdRestartSuperAcceptGetAddress,
|
|
Connection,
|
|
TDI_QUERY_ADDRESS_INFO,
|
|
Irp->MdlAddress
|
|
);
|
|
|
|
//
|
|
// Perform the local address query. We'll continue processing from
|
|
// the completion routine.
|
|
//
|
|
|
|
AfdIoCallDriver( acceptEndpoint, Connection->DeviceObject, Irp );
|
|
return STATUS_MORE_PROCESSING_REQUIRED;
|
|
}
|
|
//
|
|
// See if want to get first portion of the data
|
|
//
|
|
else if (irpSp->Parameters.AfdRestartSuperAcceptInfo.AfdReceiveDataLength>0) {
|
|
PIO_STACK_LOCATION nextIrpSp;
|
|
|
|
ASSERT (Irp->MdlAddress->Next==NULL);
|
|
//
|
|
// Get the length of the receive portion of the buffer
|
|
// and save the length of the MDL to restore in the completion routine
|
|
// Set the length of the MDL to match that of the receive request
|
|
//
|
|
|
|
length = irpSp->Parameters.AfdRestartSuperAcceptInfo.AfdReceiveDataLength;
|
|
irpSp->Parameters.AfdRestartSuperAcceptInfo.AfdReceiveDataLength =
|
|
MmGetMdlByteCount (Irp->MdlAddress);
|
|
Irp->MdlAddress->ByteCount = length;
|
|
|
|
//
|
|
// Prepare the IRP to be used to receive the first chunk of data on
|
|
// the connection.
|
|
//
|
|
// Also note that we send ourselves an IRP_MJ_READ IRP because
|
|
// the I/O subsystem has already probed & locked the output buffer,
|
|
// which just happens to look just like an IRP_MJ_READ IRP.
|
|
//
|
|
|
|
nextIrpSp = IoGetNextIrpStackLocation( Irp );
|
|
|
|
nextIrpSp->FileObject = irpSp->FileObject;
|
|
nextIrpSp->DeviceObject = IoGetRelatedDeviceObject( nextIrpSp->FileObject );
|
|
nextIrpSp->MajorFunction = IRP_MJ_READ;
|
|
|
|
nextIrpSp->Parameters.Read.Length = length;
|
|
nextIrpSp->Parameters.Read.Key = 0;
|
|
nextIrpSp->Parameters.Read.ByteOffset.QuadPart = 0;
|
|
|
|
|
|
IoSetCompletionRoutine(
|
|
Irp,
|
|
AfdRestartSuperAcceptReceive,
|
|
Connection,
|
|
TRUE,
|
|
TRUE,
|
|
TRUE
|
|
);
|
|
|
|
|
|
//
|
|
// Perform the receive. We'll continue processing from
|
|
// the completion routine.
|
|
//
|
|
|
|
AfdIoCallDriver( acceptEndpoint, nextIrpSp->DeviceObject, Irp );
|
|
return STATUS_MORE_PROCESSING_REQUIRED;
|
|
|
|
}
|
|
|
|
Irp->IoStatus.Information = 0;
|
|
|
|
if (Connection->Aborted && NT_SUCCESS (Irp->IoStatus.Status)) {
|
|
Irp->IoStatus.Status = STATUS_CONNECTION_RESET;
|
|
}
|
|
|
|
if (NT_SUCCESS (Irp->IoStatus.Status) &&
|
|
(Connection->RemoteAddress!=NULL) &&
|
|
(KeInitializeApc (&acceptEndpoint->Common.VcConnecting.Apc,
|
|
PsGetThreadTcb (Irp->Tail.Overlay.Thread),
|
|
Irp->ApcEnvironment,
|
|
AfdSuperAcceptApcKernelRoutine,
|
|
AfdSuperAcceptApcRundownRoutine,
|
|
(PKNORMAL_ROUTINE)NULL,
|
|
KernelMode,
|
|
NULL
|
|
),
|
|
KeInsertQueueApc (&acceptEndpoint->Common.VcConnecting.Apc,
|
|
Irp,
|
|
Connection,
|
|
AfdPriorityBoost))) {
|
|
return STATUS_MORE_PROCESSING_REQUIRED;
|
|
}
|
|
else {
|
|
//
|
|
// Dereference the accept file object and tell IO to complete this IRP.
|
|
//
|
|
|
|
ASSERT( InterlockedDecrement( &acceptEndpoint->ObReferenceBias ) >= 0 );
|
|
|
|
ObDereferenceObject( irpSp->FileObject );
|
|
|
|
//
|
|
// After dereferencing file object we shouldn't be accessing it
|
|
// or associated endpoint structure
|
|
//
|
|
DEREFERENCE_CONNECTION (Connection);
|
|
return STATUS_SUCCESS;
|
|
}
|
|
|
|
}
|
|
|
|
|
|
NTSTATUS
|
|
AfdRestartSuperAcceptGetAddress (
|
|
IN PDEVICE_OBJECT DeviceObject,
|
|
IN PIRP Irp,
|
|
IN PVOID Context
|
|
)
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
The completion routine for the AFD wait for query local address
|
|
portion of a super accept.
|
|
|
|
Arguments:
|
|
|
|
DeviceObject - the devoce object on which the request is completing.
|
|
|
|
Irp - The super accept IRP.
|
|
|
|
Context - points to the accepted connection
|
|
|
|
Return Value:
|
|
|
|
STATUS_SUCCESS if the I/O system should complete the super accept
|
|
request, or STATUS_MORE_PROCESSING_REQUIRED if the super accept
|
|
request is still being processed.
|
|
|
|
--*/
|
|
|
|
{
|
|
PAFD_ENDPOINT acceptEndpoint;
|
|
PAFD_CONNECTION connection;
|
|
|
|
PIO_STACK_LOCATION irpSp;
|
|
|
|
UNREFERENCED_PARAMETER (DeviceObject);
|
|
|
|
//
|
|
// Initialize some locals.
|
|
//
|
|
|
|
irpSp = IoGetCurrentIrpStackLocation (Irp);
|
|
|
|
acceptEndpoint = irpSp->FileObject->FsContext;
|
|
ASSERT (IS_AFD_ENDPOINT_TYPE (acceptEndpoint));
|
|
|
|
connection = Context;
|
|
ASSERT (connection->Type==AfdBlockTypeConnection);
|
|
ASSERT (connection->Endpoint==acceptEndpoint);
|
|
|
|
AfdCompleteOutstandingIrp (acceptEndpoint, Irp);
|
|
|
|
//
|
|
// If pending has been returned for this irp then mark the current
|
|
// stack as pending.
|
|
//
|
|
|
|
if ( Irp->PendingReturned ) {
|
|
IoMarkIrpPending( Irp );
|
|
}
|
|
|
|
|
|
ASSERT (Irp->MdlAddress->MdlFlags & MDL_PARTIAL);
|
|
IoFreeMdl( Irp->MdlAddress );
|
|
|
|
//
|
|
// Fix up the MDL pointer in the IRP and set local address length
|
|
// to 0 to use the common routine for receive part of the super
|
|
// accept Irp
|
|
//
|
|
|
|
Irp->MdlAddress = irpSp->Parameters.AfdRestartSuperAcceptInfo.AfdMdlAddress;
|
|
|
|
if (NT_SUCCESS (Irp->IoStatus.Status)) {
|
|
#ifndef i386
|
|
if (acceptEndpoint->Common.VcConnecting.FixAddressAlignment) {
|
|
PTDI_ADDRESS_INFO addressInfo = (PVOID)
|
|
((PUCHAR)MmGetSystemAddressForMdl(Irp->MdlAddress)
|
|
+ irpSp->Parameters.AfdRestartSuperAcceptInfo.AfdReceiveDataLength);
|
|
USHORT addressLength = addressInfo->Address.Address[0].AddressLength+sizeof(USHORT);
|
|
USHORT UNALIGNED *pAddrLength = (PVOID)
|
|
((PUCHAR)addressInfo
|
|
+irpSp->Parameters.AfdRestartSuperAcceptInfo.AfdLocalAddressLength
|
|
-sizeof(USHORT));
|
|
RtlMoveMemory (addressInfo,
|
|
&addressInfo->Address.Address[0].AddressType,
|
|
addressLength);
|
|
*pAddrLength = addressLength;
|
|
}
|
|
#endif // ifndef i386
|
|
irpSp->Parameters.AfdRestartSuperAcceptInfo.AfdLocalAddressLength = 0;
|
|
return AfdContinueSuperAccept (Irp, connection);
|
|
}
|
|
else {
|
|
//
|
|
// Dereference the accept file object and tell IO to complete this IRP.
|
|
//
|
|
|
|
ASSERT( InterlockedDecrement( &acceptEndpoint->ObReferenceBias ) >= 0 );
|
|
|
|
ObDereferenceObject( irpSp->FileObject );
|
|
//
|
|
// After dereferencing file object we shouldn't be accessing it
|
|
// or associated endpoint structure
|
|
//
|
|
DEREFERENCE_CONNECTION (connection);
|
|
|
|
return STATUS_SUCCESS;
|
|
}
|
|
|
|
} // AfdRestartSuperAcceptGetAddress
|
|
|
|
|
|
NTSTATUS
|
|
AfdRestartSuperAcceptReceive (
|
|
IN PDEVICE_OBJECT DeviceObject,
|
|
IN PIRP Irp,
|
|
IN PVOID Context
|
|
)
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
The completion routine for the AFD receive portion of a super accept.
|
|
|
|
Arguments:
|
|
|
|
DeviceObject - the devoce object on which the request is completing.
|
|
|
|
Irp - The super accept IRP.
|
|
|
|
Context - points to the accepted connection
|
|
|
|
Return Value:
|
|
|
|
STATUS_SUCCESS if the I/O system should complete the super accept
|
|
request, or STATUS_MORE_PROCESSING_REQUIRED if the super accept
|
|
request is still being processed.
|
|
|
|
--*/
|
|
|
|
{
|
|
PAFD_ENDPOINT acceptEndpoint;
|
|
PAFD_CONNECTION connection;
|
|
|
|
PIO_STACK_LOCATION irpSp;
|
|
|
|
UNREFERENCED_PARAMETER (DeviceObject);
|
|
|
|
//
|
|
// Initialize some locals.
|
|
//
|
|
|
|
irpSp = IoGetCurrentIrpStackLocation (Irp);
|
|
|
|
acceptEndpoint = irpSp->FileObject->FsContext;
|
|
ASSERT (IS_AFD_ENDPOINT_TYPE (acceptEndpoint));
|
|
|
|
connection = Context;
|
|
ASSERT (connection->Type == AfdBlockTypeConnection);
|
|
ASSERT (connection->Endpoint==acceptEndpoint);
|
|
|
|
AfdCompleteOutstandingIrp (acceptEndpoint, Irp);
|
|
|
|
|
|
//
|
|
// Restore MDL length so that IO system can properly unmap
|
|
// and unlock it when it completes the IRP
|
|
//
|
|
|
|
ASSERT (Irp->MdlAddress!=NULL);
|
|
ASSERT (Irp->MdlAddress->Next==NULL);
|
|
Irp->MdlAddress->ByteCount =
|
|
irpSp->Parameters.AfdRestartSuperAcceptInfo.AfdReceiveDataLength;
|
|
|
|
//
|
|
// If pending has been returned for this irp then mark the current
|
|
// stack as pending.
|
|
//
|
|
|
|
if ( Irp->PendingReturned ) {
|
|
IoMarkIrpPending( Irp );
|
|
}
|
|
|
|
|
|
|
|
|
|
if (NT_SUCCESS (Irp->IoStatus.Status) &&
|
|
(connection->RemoteAddress!=NULL) &&
|
|
(KeInitializeApc (&acceptEndpoint->Common.VcConnecting.Apc,
|
|
PsGetThreadTcb (Irp->Tail.Overlay.Thread),
|
|
Irp->ApcEnvironment,
|
|
AfdSuperAcceptApcKernelRoutine,
|
|
AfdSuperAcceptApcRundownRoutine,
|
|
(PKNORMAL_ROUTINE)NULL,
|
|
KernelMode,
|
|
NULL
|
|
),
|
|
KeInsertQueueApc (&acceptEndpoint->Common.VcConnecting.Apc,
|
|
Irp,
|
|
connection,
|
|
AfdPriorityBoost))) {
|
|
return STATUS_MORE_PROCESSING_REQUIRED;
|
|
}
|
|
else {
|
|
//
|
|
// Dereference the accept file object and tell IO to complete this IRP.
|
|
//
|
|
|
|
ASSERT( InterlockedDecrement( &acceptEndpoint->ObReferenceBias ) >= 0 );
|
|
|
|
ObDereferenceObject( irpSp->FileObject );
|
|
|
|
//
|
|
// After dereferencing file object we shouldn't be accessing it
|
|
// or associated endpoint structure
|
|
//
|
|
DEREFERENCE_CONNECTION (connection);
|
|
return STATUS_SUCCESS;
|
|
}
|
|
|
|
|
|
} // AfdRestartSuperAcceptReceive
|
|
|
|
VOID
|
|
AfdSuperAcceptApcKernelRoutine (
|
|
IN struct _KAPC *Apc,
|
|
IN OUT PKNORMAL_ROUTINE *NormalRoutine,
|
|
IN OUT PVOID *NormalContext,
|
|
IN OUT PVOID *SystemArgument1,
|
|
IN OUT PVOID *SystemArgument2
|
|
)
|
|
{
|
|
PIRP irp;
|
|
PIO_STACK_LOCATION irpSp;
|
|
PAFD_ENDPOINT endpoint;
|
|
PAFD_CONNECTION connection;
|
|
PVOID context;
|
|
|
|
PAGED_CODE ();
|
|
UNREFERENCED_PARAMETER (NormalContext);
|
|
#if DBG
|
|
try {
|
|
ASSERT (*NormalRoutine == NULL);
|
|
#else
|
|
UNREFERENCED_PARAMETER (NormalRoutine);
|
|
#endif
|
|
|
|
|
|
|
|
endpoint = CONTAINING_RECORD (Apc, AFD_ENDPOINT, Common.VcConnecting.Apc);
|
|
ASSERT (IS_AFD_ENDPOINT_TYPE (endpoint));
|
|
|
|
irp = *SystemArgument1;
|
|
irpSp = IoGetCurrentIrpStackLocation( irp );
|
|
ASSERT (irpSp->FileObject->FsContext==endpoint);
|
|
|
|
connection = *SystemArgument2;
|
|
ASSERT( connection->Type == AfdBlockTypeConnection );
|
|
|
|
ASSERT (connection->Endpoint==endpoint);
|
|
|
|
//
|
|
// Copy remote address to the user mode context
|
|
//
|
|
context = AfdLockEndpointContext (endpoint);
|
|
if ( (((CLONG)(endpoint->Common.VcConnecting.RemoteSocketAddressOffset+
|
|
endpoint->Common.VcConnecting.RemoteSocketAddressLength)) <
|
|
endpoint->ContextLength) &&
|
|
(endpoint->Common.VcConnecting.RemoteSocketAddressLength >=
|
|
connection->RemoteAddress->Address[0].AddressLength +
|
|
sizeof(u_short))) {
|
|
|
|
RtlMoveMemory ((PUCHAR)context +
|
|
endpoint->Common.VcConnecting.RemoteSocketAddressOffset,
|
|
&connection->RemoteAddress->Address[0].AddressType,
|
|
connection->RemoteAddress->Address[0].AddressLength +
|
|
sizeof(u_short));
|
|
}
|
|
else {
|
|
KdPrintEx(( DPFLTR_WSOCKTRANSPORT_ID, DPFLTR_WARNING_LEVEL,
|
|
"AfdSuperAcceptApcKernelRoutine: Could not copy remote address for AcceptEx on endpoint: %p, process: %p\n",
|
|
endpoint, endpoint->OwningProcess));
|
|
}
|
|
AfdUnlockEndpointContext (endpoint, context);
|
|
|
|
AFD_RETURN_REMOTE_ADDRESS (
|
|
connection->RemoteAddress,
|
|
connection->RemoteAddressLength
|
|
);
|
|
connection->RemoteAddress = NULL;
|
|
|
|
//
|
|
// Dereference the accept file object and tell IO to complete this IRP.
|
|
//
|
|
|
|
ASSERT( InterlockedDecrement( &endpoint->ObReferenceBias ) >= 0 );
|
|
|
|
ObDereferenceObject( irpSp->FileObject );
|
|
|
|
//
|
|
// After dereferencing file object we shouldn't be accessing it
|
|
// or associated endpoint structure
|
|
//
|
|
DEREFERENCE_CONNECTION (connection);
|
|
|
|
IoCompleteRequest (irp, AfdPriorityBoost);
|
|
#if DBG
|
|
}
|
|
except (AfdApcExceptionFilter (
|
|
GetExceptionInformation(),
|
|
(LPSTR)__FILE__,
|
|
(LONG)__LINE__)) {
|
|
DbgBreakPoint ();
|
|
}
|
|
#endif
|
|
|
|
}
|
|
|
|
VOID
|
|
AfdSuperAcceptApcRundownRoutine (
|
|
IN struct _KAPC *Apc
|
|
)
|
|
{
|
|
PIRP irp;
|
|
PIO_STACK_LOCATION irpSp;
|
|
PAFD_ENDPOINT endpoint;
|
|
PAFD_CONNECTION connection;
|
|
|
|
PAGED_CODE ();
|
|
|
|
endpoint = CONTAINING_RECORD (Apc, AFD_ENDPOINT, Common.VcConnecting.Apc);
|
|
ASSERT (IS_AFD_ENDPOINT_TYPE (endpoint));
|
|
|
|
irp = Apc->SystemArgument1;
|
|
irpSp = IoGetCurrentIrpStackLocation( irp );
|
|
ASSERT (irpSp->FileObject->FsContext==endpoint);
|
|
|
|
connection = Apc->SystemArgument2;
|
|
ASSERT( connection->Type == AfdBlockTypeConnection );
|
|
|
|
ASSERT (connection->Endpoint==endpoint);
|
|
|
|
//
|
|
// Dereference the accept file object and tell IO to complete this IRP.
|
|
//
|
|
|
|
ASSERT( InterlockedDecrement( &endpoint->ObReferenceBias ) >= 0 );
|
|
|
|
ObDereferenceObject( irpSp->FileObject );
|
|
|
|
//
|
|
// After dereferencing file object we shouldn't be accessing it
|
|
// or associated endpoint structure
|
|
//
|
|
DEREFERENCE_CONNECTION (connection);
|
|
|
|
IoCompleteRequest (irp, AfdPriorityBoost);
|
|
}
|
|
|
|
|
|
NTSTATUS
|
|
FASTCALL
|
|
AfdDeferAccept (
|
|
IN PIRP Irp,
|
|
IN PIO_STACK_LOCATION IrpSp
|
|
)
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Defers acceptance of an incoming connection for which an
|
|
AFD_WAIT_FOR_LISTEN IOCTL has already completed. The caller
|
|
may specify that the connection be deferred for later acceptance
|
|
or rejected totally.
|
|
|
|
Arguments:
|
|
|
|
Irp - a pointer to a transmit file IRP.
|
|
|
|
IrpSp - Our stack location for this IRP.
|
|
|
|
Return Value:
|
|
|
|
STATUS_SUCCESS if the request was completed successfully, or a
|
|
failure status code if there was an error.
|
|
|
|
--*/
|
|
|
|
{
|
|
NTSTATUS status;
|
|
PAFD_DEFER_ACCEPT_INFO deferAcceptInfo;
|
|
PAFD_ENDPOINT endpoint;
|
|
PAFD_CONNECTION connection;
|
|
AFD_LOCK_QUEUE_HANDLE lockHandle;
|
|
|
|
//
|
|
// Set up local variables.
|
|
//
|
|
|
|
endpoint = IrpSp->FileObject->FsContext;
|
|
deferAcceptInfo = Irp->AssociatedIrp.SystemBuffer;
|
|
|
|
Irp->IoStatus.Information = 0;
|
|
|
|
//
|
|
// Make sure that this request is valid.
|
|
//
|
|
|
|
if( !endpoint->Listening ||
|
|
IrpSp->Parameters.DeviceIoControl.InputBufferLength <
|
|
sizeof(AFD_DEFER_ACCEPT_INFO) ) {
|
|
|
|
status = STATUS_INVALID_PARAMETER;
|
|
goto complete;
|
|
|
|
}
|
|
|
|
ASSERT ((endpoint->Type & AfdBlockTypeVcListening) == AfdBlockTypeVcListening);
|
|
|
|
AfdAcquireSpinLock( &endpoint->SpinLock, &lockHandle );
|
|
//
|
|
// Find the specified connection. If it cannot be found, then this
|
|
// is a bogus request.
|
|
//
|
|
|
|
connection = AfdGetReturnedConnection(
|
|
endpoint,
|
|
deferAcceptInfo->Sequence
|
|
);
|
|
|
|
if( connection == NULL ) {
|
|
|
|
AfdReleaseSpinLock( &endpoint->SpinLock, &lockHandle );
|
|
status = STATUS_INVALID_PARAMETER;
|
|
goto complete;
|
|
|
|
}
|
|
|
|
ASSERT( connection->Type == AfdBlockTypeConnection );
|
|
|
|
//
|
|
// If this is a request to reject the accepted connection, then
|
|
// abort the connection. Otherwise (this is a request to defer
|
|
// acceptance until later) then insert the connection at the *head*
|
|
// of the endpoint's unaccepted connection queue.
|
|
//
|
|
|
|
if( deferAcceptInfo->Reject ) {
|
|
|
|
|
|
//
|
|
// Reenable the accept event bit, and if there are additional
|
|
// unaccepted connections on the endpoint, post another event.
|
|
//
|
|
|
|
|
|
endpoint->EventsActive &= ~AFD_POLL_ACCEPT;
|
|
|
|
IF_DEBUG(EVENT_SELECT) {
|
|
KdPrintEx(( DPFLTR_WSOCKTRANSPORT_ID, DPFLTR_TRACE_LEVEL,
|
|
"AfdDeferAccept: Endp %08lX, Active %08lX\n",
|
|
endpoint,
|
|
endpoint->EventsActive
|
|
));
|
|
}
|
|
|
|
if( !IsListEmpty( &endpoint->Common.VcListening.UnacceptedConnectionListHead ) ) {
|
|
|
|
AfdIndicateEventSelectEvent(
|
|
endpoint,
|
|
AFD_POLL_ACCEPT,
|
|
STATUS_SUCCESS
|
|
);
|
|
|
|
}
|
|
|
|
//
|
|
// Special handling for SAN connections
|
|
//
|
|
if (connection->SanConnection) {
|
|
PIRP connectIrp;
|
|
//
|
|
// Snag the connect indication IRP
|
|
//
|
|
connectIrp = connection->ConnectIrp;
|
|
ASSERT (connectIrp!=NULL);
|
|
connection->ConnectIrp = NULL;
|
|
|
|
//
|
|
// We can now release listen endpoint spinlock
|
|
// The cancel routine will not find IRP in the connection
|
|
//
|
|
if (IoSetCancelRoutine (connectIrp, NULL)==NULL) {
|
|
KIRQL cancelIrql;
|
|
AfdReleaseSpinLock( &endpoint->SpinLock, &lockHandle );
|
|
//
|
|
// Cancel routine is running, make sure
|
|
// it finishes before proceeding further
|
|
//
|
|
IoAcquireCancelSpinLock (&cancelIrql);
|
|
IoReleaseCancelSpinLock (cancelIrql);
|
|
connectIrp->IoStatus.Status = STATUS_CANCELLED;
|
|
}
|
|
else {
|
|
AfdReleaseSpinLock( &endpoint->SpinLock, &lockHandle );
|
|
connectIrp->IoStatus.Status = STATUS_CONNECTION_REFUSED;
|
|
}
|
|
|
|
|
|
//
|
|
// Return the connection and complete SAN provider IRP
|
|
//
|
|
|
|
connection->Endpoint = NULL;
|
|
connection->SanConnection = FALSE;
|
|
|
|
AfdSanReleaseConnection (endpoint, connection, FALSE);
|
|
DEREFERENCE_ENDPOINT (endpoint);
|
|
|
|
connectIrp->IoStatus.Information = 0;
|
|
IoCompleteRequest (connectIrp, AfdPriorityBoost);
|
|
}
|
|
else {
|
|
AfdReleaseSpinLock( &endpoint->SpinLock, &lockHandle );
|
|
|
|
//
|
|
// Abort the connection.
|
|
//
|
|
|
|
AfdAbortConnection( connection );
|
|
|
|
//
|
|
// Add another free connection to replace the one we're rejecting.
|
|
// Also, add extra to account for past failures in calls to
|
|
// AfdAddFreeConnection().
|
|
//
|
|
|
|
InterlockedIncrement(
|
|
&endpoint->Common.VcListening.FailedConnectionAdds
|
|
);
|
|
|
|
AfdReplenishListenBacklog( endpoint );
|
|
}
|
|
|
|
} else {
|
|
|
|
//
|
|
// Restore the connection's state before putting it back
|
|
// on the queue.
|
|
//
|
|
|
|
connection->State = AfdConnectionStateUnaccepted;
|
|
|
|
InsertHeadList(
|
|
&endpoint->Common.VcListening.UnacceptedConnectionListHead,
|
|
&connection->ListEntry
|
|
);
|
|
AfdReleaseSpinLock( &endpoint->SpinLock, &lockHandle );
|
|
}
|
|
|
|
status = STATUS_SUCCESS;
|
|
|
|
complete:
|
|
|
|
Irp->IoStatus.Status = status;
|
|
ASSERT( Irp->CancelRoutine == NULL );
|
|
|
|
IoCompleteRequest( Irp, AfdPriorityBoost );
|
|
|
|
return status;
|
|
|
|
} // AfdDeferAccept
|
|
|
|
|
|
|
|
NTSTATUS
|
|
AfdRestartDelayedAccept (
|
|
IN PDEVICE_OBJECT DeviceObject,
|
|
IN PIRP Irp,
|
|
IN PVOID Context
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
The completion routine for the AFD wait for delayed accept IRP portion
|
|
of an accept.
|
|
|
|
Arguments:
|
|
|
|
DeviceObject - the devoce object on which the request is completing.
|
|
|
|
Irp - The accept IRP.
|
|
|
|
Context - points to accept file object
|
|
|
|
Return Value:
|
|
|
|
STATUS_SUCCESS if the I/O system should complete the super accept
|
|
request, or STATUS_MORE_PROCESSING_REQUIRED if the super accept
|
|
request is still being processed.
|
|
|
|
--*/
|
|
{
|
|
PIO_STACK_LOCATION irpSp;
|
|
PFILE_OBJECT acceptFileObject;
|
|
PAFD_ENDPOINT acceptEndpoint;
|
|
PAFD_CONNECTION connection;
|
|
PAFD_ENDPOINT listenEndpoint;
|
|
AFD_LOCK_QUEUE_HANDLE lockHandle;
|
|
|
|
UNREFERENCED_PARAMETER (DeviceObject);
|
|
|
|
acceptFileObject = Context;
|
|
acceptEndpoint = acceptFileObject->FsContext;
|
|
|
|
irpSp = IoGetCurrentIrpStackLocation (Irp);
|
|
listenEndpoint = irpSp->FileObject->FsContext;
|
|
|
|
//
|
|
// Remember that a TDI accept has completed on this endpoint.
|
|
//
|
|
|
|
InterlockedDecrement(
|
|
&listenEndpoint->Common.VcListening.TdiAcceptPendingCount
|
|
);
|
|
|
|
AfdCompleteOutstandingIrp (acceptEndpoint, Irp);
|
|
|
|
if ( Irp->PendingReturned ) {
|
|
IoMarkIrpPending( Irp );
|
|
}
|
|
|
|
AfdAcquireSpinLock (&acceptEndpoint->SpinLock, &lockHandle);
|
|
//
|
|
// The AFD connection object should now be in the endpoiont.
|
|
//
|
|
|
|
connection = AFD_CONNECTION_FROM_ENDPOINT( acceptEndpoint );
|
|
if (connection!=NULL) {
|
|
if (NT_SUCCESS (Irp->IoStatus.Status)) {
|
|
acceptEndpoint->State = AfdEndpointStateConnected;
|
|
connection->State = AfdConnectionStateConnected;
|
|
acceptEndpoint->EventsActive |= AFD_POLL_SEND;
|
|
acceptEndpoint->EnableSendEvent = TRUE;
|
|
AfdReleaseSpinLock (&acceptEndpoint->SpinLock, &lockHandle);
|
|
AFD_END_STATE_CHANGE (acceptEndpoint);
|
|
}
|
|
else {
|
|
//
|
|
// If the accept failed, treat it like an abortive disconnect.
|
|
// This way the application still gets a new endpoint, but it gets
|
|
// told about the reset.
|
|
//
|
|
REFERENCE_CONNECTION (connection);
|
|
|
|
AfdReleaseSpinLock (&acceptEndpoint->SpinLock, &lockHandle);
|
|
|
|
AFD_END_STATE_CHANGE (acceptEndpoint);
|
|
|
|
AfdDisconnectEventHandler(
|
|
NULL,
|
|
connection,
|
|
0,
|
|
NULL,
|
|
0,
|
|
NULL,
|
|
TDI_DISCONNECT_ABORT
|
|
);
|
|
DEREFERENCE_CONNECTION (connection);
|
|
}
|
|
}
|
|
|
|
|
|
ASSERT( InterlockedDecrement( &acceptEndpoint->ObReferenceBias ) >= 0 );
|
|
|
|
ObDereferenceObject( acceptFileObject );
|
|
|
|
Irp->AssociatedIrp.SystemBuffer = irpSp->Parameters.AfdRestartDelayedAcceptInfo.AfdSystemBuffer;
|
|
|
|
return STATUS_SUCCESS;
|
|
}
|
|
|
|
|
|
|
|
VOID
|
|
AfdCleanupSuperAccept (
|
|
IN PIRP Irp,
|
|
IN NTSTATUS Status
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Cleans up a super accept IRP and prepeares it for completion
|
|
|
|
Arguments:
|
|
|
|
Irp - the IRP to cleanup.
|
|
Status - failure status
|
|
|
|
Return Value:
|
|
|
|
None.
|
|
|
|
--*/
|
|
|
|
{
|
|
|
|
PAFD_ENDPOINT listenEndpoint;
|
|
PFILE_OBJECT acceptFileObject;
|
|
PAFD_ENDPOINT acceptEndpoint;
|
|
PIO_STACK_LOCATION irpSp;
|
|
AFD_LOCK_QUEUE_HANDLE lockHandle;
|
|
|
|
ASSERT (!NT_SUCCESS (Status));
|
|
//
|
|
// Initialize some locals.
|
|
//
|
|
|
|
irpSp = IoGetCurrentIrpStackLocation (Irp);
|
|
listenEndpoint = irpSp->FileObject->FsContext;
|
|
|
|
//
|
|
// Reduce the count of failed connection adds on the listening
|
|
// endpoint to account for this connection object which we're
|
|
// adding back onto the queue once it is pulled from pre-accepted connection
|
|
// list.
|
|
//
|
|
InterlockedDecrement (&listenEndpoint->Common.VcListening.FailedConnectionAdds);
|
|
|
|
|
|
acceptFileObject = irpSp->Parameters.AfdRestartSuperAcceptInfo.AfdAcceptFileObject;
|
|
acceptEndpoint = acceptFileObject->FsContext;
|
|
ASSERT (IS_AFD_ENDPOINT_TYPE (acceptEndpoint));
|
|
|
|
//
|
|
// Cleanup super accept IRP out of endpoint.
|
|
//
|
|
AfdAcquireSpinLock (&acceptEndpoint->SpinLock, &lockHandle);
|
|
ASSERT (acceptEndpoint->Irp==Irp); // May need to remove this assert
|
|
// in the future.
|
|
acceptEndpoint->Irp = NULL;
|
|
AfdReleaseSpinLock (&acceptEndpoint->SpinLock, &lockHandle);
|
|
|
|
//
|
|
// Mark the end of state change letting the endpoint
|
|
// to be used again in state change operation (e.g. accept).
|
|
//
|
|
|
|
AFD_END_STATE_CHANGE (acceptEndpoint);
|
|
|
|
//
|
|
// Dereference accept file object
|
|
//
|
|
ASSERT( InterlockedDecrement( &acceptEndpoint->ObReferenceBias ) >= 0 );
|
|
|
|
ObDereferenceObject( acceptFileObject );
|
|
|
|
//
|
|
// Check if we have secondary MDL for local address query and
|
|
// free it.
|
|
//
|
|
if (Irp->MdlAddress->Next!=NULL) {
|
|
//
|
|
// We never lock pages for this one (they are locked
|
|
// as part of main MDL).
|
|
//
|
|
ASSERT (irpSp->Parameters.AfdRestartSuperAcceptInfo.AfdLocalAddressLength>0);
|
|
ASSERT ((Irp->MdlAddress->Next->MdlFlags & MDL_PAGES_LOCKED)==0);
|
|
IoFreeMdl (Irp->MdlAddress->Next);
|
|
Irp->MdlAddress->Next = NULL;
|
|
}
|
|
|
|
|
|
//
|
|
// Set the status specified in the IRP and return
|
|
// The caller will eventually complete it.
|
|
//
|
|
|
|
Irp->IoStatus.Status = Status;
|
|
Irp->IoStatus.Information = 0;
|
|
|
|
return;
|
|
}
|
|
|
|
|
|
VOID
|
|
AfdCancelSuperAccept (
|
|
IN PDEVICE_OBJECT DeviceObject,
|
|
IN PIRP Irp
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Cancels a super accept IRP that is pended in AFD.
|
|
|
|
Arguments:
|
|
|
|
DeviceObject - not used.
|
|
|
|
Irp - the IRP to cancel.
|
|
|
|
Return Value:
|
|
|
|
None.
|
|
|
|
--*/
|
|
|
|
{
|
|
PAFD_CONNECTION connection;
|
|
|
|
UNREFERENCED_PARAMETER (DeviceObject);
|
|
|
|
connection = Irp->Tail.Overlay.DriverContext[0];
|
|
ASSERT (connection->Type==AfdBlockTypeConnection);
|
|
ASSERT (connection->Endpoint==NULL);
|
|
//
|
|
// If IRP is in the connection object, cleanup and complete it
|
|
//
|
|
if (InterlockedExchangePointer (
|
|
(PVOID *)&connection->AcceptIrp,
|
|
NULL)==Irp) {
|
|
IoReleaseCancelSpinLock( Irp->CancelIrql );
|
|
AfdCleanupSuperAccept (Irp, STATUS_CANCELLED);
|
|
IoCompleteRequest( Irp, AfdPriorityBoost );
|
|
|
|
}
|
|
else {
|
|
IoReleaseCancelSpinLock( Irp->CancelIrql );
|
|
}
|
|
|
|
return;
|
|
}
|
|
|
|
|
|
BOOLEAN
|
|
AfdServiceSuperAccept (
|
|
IN PAFD_ENDPOINT Endpoint,
|
|
IN PAFD_CONNECTION Connection,
|
|
IN PAFD_LOCK_QUEUE_HANDLE LockHandle,
|
|
OUT PLIST_ENTRY AcceptIrpList
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Attemts to satisfy super accept irp using the incoming
|
|
connection. This routine must be called with listening endpoint
|
|
spinlock held.
|
|
|
|
Arguments:
|
|
|
|
Endpoint - listening endpoint on which connection is
|
|
being accepted
|
|
Connection - connection being accepted.
|
|
AcceptIrpList - returns a list of accept Irps which were failed and
|
|
need to be completed after listening endpoint spinlock
|
|
is released.
|
|
|
|
|
|
Return Value:
|
|
|
|
TRUE - the super accept IRP was found and is in the head of the list
|
|
FALSE - no usable super accept IRP exists.
|
|
|
|
--*/
|
|
|
|
|
|
{
|
|
PSLIST_ENTRY listEntry;
|
|
PIRP acceptIrp;
|
|
PAFD_CONNECTION oldConnection;
|
|
|
|
//
|
|
// Keep removing super accept IRPs while there are any there
|
|
//
|
|
while ((listEntry = InterlockedPopEntrySList (
|
|
&Endpoint->Common.VcListening.PreacceptedConnectionsListHead
|
|
))!=NULL) {
|
|
NTSTATUS status;
|
|
|
|
//
|
|
// Find the connection pointer from the list entry and return a
|
|
// pointer to the connection object.
|
|
//
|
|
|
|
oldConnection = CONTAINING_RECORD(
|
|
listEntry,
|
|
AFD_CONNECTION,
|
|
SListEntry
|
|
);
|
|
|
|
acceptIrp = InterlockedExchangePointer ((PVOID *)&oldConnection->AcceptIrp, NULL);
|
|
//
|
|
// Check if there is accept irp associated with
|
|
// this connection, if not just put it back on the free list
|
|
// (the IRP must have been cancelled)
|
|
//
|
|
if (acceptIrp!=NULL) {
|
|
if (IoSetCancelRoutine (acceptIrp, NULL)!=NULL) {
|
|
|
|
PFILE_OBJECT acceptFileObject;
|
|
PAFD_ENDPOINT acceptEndpoint;
|
|
PIO_STACK_LOCATION irpSp;
|
|
|
|
//
|
|
// Initialize some locals.
|
|
//
|
|
|
|
irpSp = IoGetCurrentIrpStackLocation (acceptIrp);
|
|
acceptFileObject = irpSp->Parameters.AfdRestartSuperAcceptInfo.AfdAcceptFileObject;
|
|
acceptEndpoint = acceptFileObject->FsContext;
|
|
ASSERT (IS_AFD_ENDPOINT_TYPE (acceptEndpoint));
|
|
|
|
//
|
|
// Check if super accept Irp has enough space for
|
|
// the remote address
|
|
//
|
|
if (Connection->RemoteAddressLength>
|
|
irpSp->Parameters.AfdRestartSuperAcceptInfo.AfdRemoteAddressLength) {
|
|
|
|
status = STATUS_BUFFER_TOO_SMALL;
|
|
|
|
}
|
|
//
|
|
// Check if we have enough system PTE's to map
|
|
// the buffer.
|
|
//
|
|
else if ((status = AfdMapMdlChain (acceptIrp->MdlAddress)),
|
|
!NT_SUCCESS (status)) {
|
|
NOTHING;
|
|
}
|
|
else if (Connection->SanConnection) {
|
|
status = AfdSanAcceptCore (acceptIrp, acceptFileObject, Connection, LockHandle);
|
|
if (status==STATUS_PENDING) {
|
|
//
|
|
// Accept IRP is pending waiting for Switch
|
|
// completion notification
|
|
// Release old connection object
|
|
//
|
|
ASSERT (oldConnection->Endpoint==NULL);
|
|
InterlockedPushEntrySList (
|
|
&Endpoint->Common.VcListening.FreeConnectionListHead,
|
|
&oldConnection->SListEntry);
|
|
|
|
|
|
}
|
|
else {
|
|
//
|
|
// Something failed, we need to complete accept IRP
|
|
//
|
|
ASSERT (NT_ERROR (status));
|
|
AfdCleanupSuperAccept (acceptIrp, status);
|
|
IoCompleteRequest (acceptIrp, AfdPriorityBoost);
|
|
//
|
|
// This connection has already been diassociated from endpoint.
|
|
// If backlog is below the level we need, put it on the free
|
|
// list, otherwise, get rid of it.
|
|
//
|
|
|
|
ASSERT (oldConnection->Endpoint==NULL);
|
|
if (InterlockedIncrement (&Endpoint->Common.VcListening.FailedConnectionAdds)>0) {
|
|
InterlockedDecrement (&Endpoint->Common.VcListening.FailedConnectionAdds);
|
|
InterlockedPushEntrySList (
|
|
&Endpoint->Common.VcListening.FreeConnectionListHead,
|
|
&oldConnection->SListEntry);
|
|
}
|
|
else {
|
|
DEREFERENCE_CONNECTION (oldConnection);
|
|
}
|
|
}
|
|
//
|
|
// Complete previously failed accept irps if any.
|
|
//
|
|
while (!IsListEmpty (AcceptIrpList)) {
|
|
PIRP irp;
|
|
irp = CONTAINING_RECORD (AcceptIrpList->Flink, IRP, Tail.Overlay.ListEntry);
|
|
RemoveEntryList (&irp->Tail.Overlay.ListEntry);
|
|
IoCompleteRequest (irp, AfdPriorityBoost);
|
|
}
|
|
return TRUE;
|
|
}
|
|
//
|
|
// Allocate MDL for local address query if requested
|
|
//
|
|
else if ((irpSp->Parameters.AfdRestartSuperAcceptInfo.AfdLocalAddressLength>0) &&
|
|
(IoAllocateMdl ((PUCHAR)acceptIrp->UserBuffer+irpSp->Parameters.AfdRestartSuperAcceptInfo.AfdReceiveDataLength,
|
|
irpSp->Parameters.AfdRestartSuperAcceptInfo.AfdLocalAddressLength,
|
|
TRUE,
|
|
FALSE,
|
|
acceptIrp)==NULL)){
|
|
status = STATUS_INSUFFICIENT_RESOURCES;
|
|
}
|
|
else {
|
|
//
|
|
// Copy over the address information to the user's buffer.
|
|
//
|
|
#ifndef i386
|
|
if (acceptEndpoint->Common.VcConnecting.FixAddressAlignment) {
|
|
USHORT addressLength =
|
|
Connection->RemoteAddress->Address[0].AddressLength
|
|
+ sizeof (USHORT);
|
|
USHORT UNALIGNED *pAddrLength = (PVOID)
|
|
((PUCHAR)MmGetSystemAddressForMdl (acceptIrp->MdlAddress)
|
|
+ irpSp->Parameters.AfdRestartSuperAcceptInfo.AfdReceiveDataLength
|
|
+ irpSp->Parameters.AfdRestartSuperAcceptInfo.AfdLocalAddressLength
|
|
+ irpSp->Parameters.AfdRestartSuperAcceptInfo.AfdRemoteAddressLength
|
|
- sizeof (USHORT));
|
|
RtlMoveMemory (
|
|
(PUCHAR)MmGetSystemAddressForMdl (acceptIrp->MdlAddress)
|
|
+ irpSp->Parameters.AfdRestartSuperAcceptInfo.AfdReceiveDataLength
|
|
+ irpSp->Parameters.AfdRestartSuperAcceptInfo.AfdLocalAddressLength,
|
|
&Connection->RemoteAddress->Address[0].AddressType,
|
|
addressLength);
|
|
*pAddrLength = addressLength;
|
|
}
|
|
else
|
|
#endif
|
|
{
|
|
RtlMoveMemory (
|
|
(PUCHAR)MmGetSystemAddressForMdl (acceptIrp->MdlAddress)
|
|
+ irpSp->Parameters.AfdRestartSuperAcceptInfo.AfdReceiveDataLength
|
|
+ irpSp->Parameters.AfdRestartSuperAcceptInfo.AfdLocalAddressLength,
|
|
Connection->RemoteAddress,
|
|
Connection->RemoteAddressLength);
|
|
}
|
|
status = AfdAcceptCore (acceptIrp, acceptEndpoint, Connection);
|
|
if (status==STATUS_SUCCESS) {
|
|
AfdReleaseSpinLock (&Endpoint->SpinLock, LockHandle);
|
|
|
|
|
|
//
|
|
// Decrement counter to account for connection being
|
|
// returned to the free pool. No need to do this because
|
|
// we are picking up a connection from the free pool
|
|
// InterlockedDecrement (&Endpoint->Common.VcListening.FailedConnectionAdds);
|
|
//
|
|
ASSERT (oldConnection->Endpoint==NULL);
|
|
InterlockedPushEntrySList (
|
|
&Endpoint->Common.VcListening.FreeConnectionListHead,
|
|
&oldConnection->SListEntry);
|
|
|
|
|
|
|
|
//
|
|
// Complete previously failed accept irps if any.
|
|
//
|
|
while (!IsListEmpty (AcceptIrpList)) {
|
|
PIRP irp;
|
|
irp = CONTAINING_RECORD (AcceptIrpList->Flink, IRP, Tail.Overlay.ListEntry);
|
|
RemoveEntryList (&irp->Tail.Overlay.ListEntry);
|
|
IoCompleteRequest (irp, AfdPriorityBoost);
|
|
}
|
|
|
|
//
|
|
// Make irp look like it is completed by the
|
|
// transport.
|
|
//
|
|
acceptIrp->IoStatus.Status = STATUS_SUCCESS;
|
|
irpSp->Parameters.AfdRestartSuperAcceptInfo.AfdMdlAddress = acceptIrp->MdlAddress;
|
|
acceptIrp->MdlAddress = NULL;
|
|
irpSp->FileObject = acceptFileObject;
|
|
|
|
//
|
|
// Call completion routine directly to simulate
|
|
// completion by the transport stack
|
|
//
|
|
AfdRestartSuperAcceptListen (acceptIrp, Connection);
|
|
|
|
return TRUE;
|
|
}
|
|
else {
|
|
ASSERT (status!=STATUS_PENDING);
|
|
}
|
|
}
|
|
}
|
|
else { // if (IoSetCancelRoutine (accpetIrp, NULL)!=NULL)
|
|
status = STATUS_CANCELLED;
|
|
}
|
|
|
|
//
|
|
// Cleanup the IRP and insert it into the completion list
|
|
//
|
|
AfdCleanupSuperAccept (acceptIrp, status);
|
|
InsertTailList (AcceptIrpList,
|
|
&acceptIrp->Tail.Overlay.ListEntry);
|
|
} // if (acceptIrp!=NULL)
|
|
else {
|
|
status = STATUS_CANCELLED;
|
|
}
|
|
|
|
//
|
|
// This connection has already been diassociated from endpoint.
|
|
// If backlog is below the level we need, put it on the free
|
|
// list, otherwise, get rid of it.
|
|
//
|
|
|
|
ASSERT (oldConnection->Endpoint==NULL);
|
|
if (Endpoint->Common.VcListening.FailedConnectionAdds>=0 &&
|
|
status!=STATUS_INSUFFICIENT_RESOURCES &&
|
|
ExQueryDepthSList (&Endpoint->Common.VcListening.FreeConnectionListHead)<AFD_MAXIMUM_FREE_CONNECTIONS) {
|
|
InterlockedPushEntrySList (
|
|
&Endpoint->Common.VcListening.FreeConnectionListHead,
|
|
&oldConnection->SListEntry);
|
|
}
|
|
else {
|
|
InterlockedIncrement (&Endpoint->Common.VcListening.FailedConnectionAdds);
|
|
DEREFERENCE_CONNECTION (oldConnection);
|
|
}
|
|
}
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
|
|
NTSTATUS
|
|
AfdSetupAcceptEndpoint (
|
|
PAFD_ENDPOINT ListenEndpoint,
|
|
PAFD_ENDPOINT AcceptEndpoint,
|
|
PAFD_CONNECTION Connection
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Sets up the accept endpoint to get ready to accept connection
|
|
(copies parameters of the listening endpoint on which connection
|
|
was indicated)
|
|
|
|
Arguments:
|
|
|
|
ListenEndpoint - endpoint on which connection was indicated
|
|
AcceptEndpoint - endpoint on which to accept the connection
|
|
Connection - connection to accept
|
|
|
|
Return Value:
|
|
|
|
STATUS_SUCCESS - endpoint state/parameters adjusted OK
|
|
STATUS_CANCELLED - endpoint has already been cleaned up.
|
|
|
|
Note:
|
|
Accepting endpoint spinlock must be held when calling this routine.
|
|
Listen endpoint spinlock needs to be held only if connection has already
|
|
been accepted (transport was told to accept it). This is necessary
|
|
to synchronize with receive indication handler since it uses endpoint
|
|
spinlock pointed to by the connection structure and we switch this pointer
|
|
inside this routine.
|
|
|
|
--*/
|
|
{
|
|
//
|
|
// Check the state of the accepting endpoint.
|
|
//
|
|
|
|
|
|
if ( AcceptEndpoint->EndpointCleanedUp ) {
|
|
return STATUS_CANCELLED;
|
|
}
|
|
|
|
|
|
//
|
|
// Note that the returned connection structure already has a
|
|
// referenced pointer to the listening endpoint. Rather than
|
|
// removing the reference here, only to re-add it later, we'll
|
|
// just not touch the reference count.
|
|
//
|
|
|
|
ASSERT( Connection->Endpoint == ListenEndpoint );
|
|
|
|
//
|
|
// Set up the accept endpoint. Note that we already have a reference to
|
|
// the endpoint by the virtue of its file object
|
|
//
|
|
|
|
//
|
|
// Place the connection on the endpoint we'll accept it on. It is
|
|
// still referenced from when it was created.
|
|
//
|
|
|
|
AcceptEndpoint->Common.VcConnecting.Connection = Connection;
|
|
|
|
//
|
|
// Remove super accept IRP from the endpoint
|
|
//
|
|
AcceptEndpoint->Irp = NULL;
|
|
|
|
//
|
|
// Set up the accept endpoint's type, and remember blocking
|
|
// characteristics of the TDI provider.
|
|
//
|
|
|
|
AcceptEndpoint->Type = AfdBlockTypeVcConnecting;
|
|
AcceptEndpoint->TdiServiceFlags = ListenEndpoint->TdiServiceFlags;
|
|
|
|
ASSERT (AcceptEndpoint->TransportInfo == ListenEndpoint->TransportInfo);
|
|
ASSERT (AcceptEndpoint->TransportInfo->ReferenceCount>0);
|
|
|
|
|
|
//
|
|
// Set up a referenced pointer to the listening endpoint. This is
|
|
// necessary so that the endpoint does not go away until all
|
|
// accepted endpoints have gone away. Without this, a connect
|
|
// indication could occur on a TDI address object held open
|
|
// by an accepted endpoint after the listening endpoint has
|
|
// been closed and the memory for it deallocated.
|
|
//
|
|
// Note that, since we didn't remove the reference above, we don't
|
|
// need to add it here.
|
|
//
|
|
|
|
AcceptEndpoint->Common.VcConnecting.ListenEndpoint = ListenEndpoint;
|
|
|
|
//
|
|
// Set up a referenced pointer in the accepted endpoint to the
|
|
// TDI address object.
|
|
//
|
|
|
|
ObReferenceObject( ListenEndpoint->AddressFileObject );
|
|
AfdRecordAddrRef();
|
|
|
|
AcceptEndpoint->AddressFileObject = ListenEndpoint->AddressFileObject;
|
|
AcceptEndpoint->AddressDeviceObject = ListenEndpoint->AddressDeviceObject;
|
|
|
|
//
|
|
// Copy the pointer to the local address. Because we keep listen
|
|
// endpoint alive for as long as any of its connection is
|
|
// active, we can rely on the fact that address structure won't go
|
|
// away as well.
|
|
//
|
|
AcceptEndpoint->LocalAddress = ListenEndpoint->LocalAddress;
|
|
AcceptEndpoint->LocalAddressLength = ListenEndpoint->LocalAddressLength;
|
|
|
|
//
|
|
// Set up a referenced pointer from the connection to the accept
|
|
// endpoint.
|
|
//
|
|
REFERENCE_ENDPOINT( AcceptEndpoint );
|
|
Connection->Endpoint = AcceptEndpoint;
|
|
|
|
return STATUS_SUCCESS;
|
|
}
|
|
|
|
|