Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

2297 lines
57 KiB

/*++
Copyright (c) 1995 Microsoft Corporation
Module Name:
routing\ip\ipinip\tdix.c
Abstract:
Interface to TDI
Revision History:
Derived from Steve Cobb's ndis\l2tp code
About ALLOCATEIRPS:
This driver is lower level code than typical TDI drivers. It has locked
MDL-mapped input buffers readily available and does not need to provide any
mapping to user mode client requests on completion. This allows a
performance gain from allocating and deallocating IRPs directly, thus
avoiding unnecessary setup in TdiBuildInternalDeviceControlIrp and
unnecessary APC queuing in IoCompleteRequest. Define ALLOCATEIRPs=1 to
make this optimization, or define it 0 to use the strictly TDI-compliant
TdiBuildInternalDeviceControlIrp method.
About NDISBUFFERISMDL:
Calls to TdiBuildSendDatagram assume the NDIS_BUFFER can be passed in place
of an MDL which avoids a pointless copy. If this is not the case, an
explicit MDL buffer would need to be allocated and caller's buffer copied
to the MDL buffer before sending. Same issue for TdiBuildReceiveDatagram,
except of course that the copy would be from the MDL buffer to caller's
buffer after receiving.
--*/
#define __FILE_SIG__ TDIX_SIG
#include "inc.h"
#if NDISBUFFERISMDL
#else
#error Additional code to copy NDIS_BUFFER to/from MDL NYI.
#endif
//
// The Handle for the IP in IP (proto 4) transport address
//
HANDLE g_hIpIpHandle;
//
// The pointer to the file object for the above handle
//
PFILE_OBJECT g_pIpIpFileObj;
//
// The Handle for the ICMP (proto 1) transport address
//
HANDLE g_hIcmpHandle;
//
// The pointer to the file object for the above handle
//
PFILE_OBJECT g_pIcmpFileObj;
//
// Handle for address changes
//
HANDLE g_hAddressChange;
NPAGED_LOOKASIDE_LIST g_llSendCtxtBlocks;
NPAGED_LOOKASIDE_LIST g_llTransferCtxtBlocks;
NPAGED_LOOKASIDE_LIST g_llQueueNodeBlocks;
#pragma alloc_text(PAGE, TdixInitialize)
VOID
TdixInitialize(
PVOID pvContext
)
/*++
Routine Description
Initialize the TDI related globals.
Open the TDI transport address for Raw IP, protocol number 4.
Sets the address object for HEADER_INCLUDE
Also opens Raw IP for ICMP (used to manager TUNNEL MTU)
Register to receive datagrams at the selected handler
Locks
This call must be made at PASSIVE IRQL.
Arguments
None
Return Value
STATUS_SUCCESS if successful
STATUS_UNSUCCESSFUL otherwise
--*/
{
PIRP pIrp;
IO_STATUS_BLOCK iosb;
NTSTATUS nStatus;
TDIObjectID *pTdiObjId;
KEVENT keWait;
POPEN_CONTEXT pOpenCtxt;
PIO_STACK_LOCATION pIrpSp;
TCP_REQUEST_SET_INFORMATION_EX tcpSetInfo;
TDI_CLIENT_INTERFACE_INFO tdiInterface;
TraceEnter(TDI, "TdixInitialize");
PAGED_CODE();
pOpenCtxt = (POPEN_CONTEXT)pvContext;
//
// Init the Handle and pointer to file object for RAW IP
//
g_hIpIpHandle = NULL;
g_pIpIpFileObj = NULL;
g_hIcmpHandle = NULL;
g_pIcmpFileObj = NULL;
//
// Initialize lookaside lists for our send and receive contexts
//
ExInitializeNPagedLookasideList(&g_llSendCtxtBlocks,
NULL,
NULL,
0,
sizeof(SEND_CONTEXT),
SEND_CONTEXT_TAG,
SEND_CONTEXT_LOOKASIDE_DEPTH);
ExInitializeNPagedLookasideList(&g_llTransferCtxtBlocks,
NULL,
NULL,
0,
sizeof(TRANSFER_CONTEXT),
TRANSFER_CONTEXT_TAG,
TRANSFER_CONTEXT_LOOKASIDE_DEPTH);
ExInitializeNPagedLookasideList(&g_llQueueNodeBlocks,
NULL,
NULL,
0,
sizeof(QUEUE_NODE),
QUEUE_NODE_TAG,
QUEUE_NODE_LOOKASIDE_DEPTH);
InitializeListHead(&g_leAddressList);
//
// Open file and handle objects for both IP in IP and ICMP
//
nStatus = TdixOpenRawIp(PROTO_IPINIP,
&g_hIpIpHandle,
&g_pIpIpFileObj);
if(nStatus isnot STATUS_SUCCESS)
{
Trace(TDI, ERROR,
("TdixInitialize: Couldnt open raw IP for IP in IP\n"));
TdixDeinitialize(g_pIpIpDevice,
NULL);
TraceLeave(TDI, "TdixInitialize");
pOpenCtxt->nStatus = nStatus;
KeSetEvent(pOpenCtxt->pkeEvent,
0,
FALSE);
return;
}
nStatus = TdixOpenRawIp(PROTO_ICMP,
&g_hIcmpHandle,
&g_pIcmpFileObj);
if(nStatus isnot STATUS_SUCCESS)
{
Trace(TDI, ERROR,
("TdixInitialize: Couldnt open raw IP for ICMP\n"));
TdixDeinitialize(g_pIpIpDevice,
NULL);
TraceLeave(TDI, "TdixInitialize");
pOpenCtxt->nStatus = nStatus;
KeSetEvent(pOpenCtxt->pkeEvent,
0,
FALSE);
return;
}
//
// Set HeaderInclude option on this AddressObject
//
tcpSetInfo.BufferSize = 1;
tcpSetInfo.Buffer[0] = TRUE;
pTdiObjId = &tcpSetInfo.ID;
pTdiObjId->toi_entity.tei_entity = CL_TL_ENTITY;
pTdiObjId->toi_entity.tei_instance = 0;
pTdiObjId->toi_class = INFO_CLASS_PROTOCOL;
pTdiObjId->toi_type = INFO_TYPE_ADDRESS_OBJECT;
pTdiObjId->toi_id = AO_OPTION_IP_HDRINCL;
//
// Init the event needed to wait on the IRP
//
KeInitializeEvent(&keWait,
SynchronizationEvent,
FALSE);
pIrp = IoBuildDeviceIoControlRequest(IOCTL_TCP_SET_INFORMATION_EX,
g_pIpIpFileObj->DeviceObject,
(PVOID)&tcpSetInfo,
sizeof(TCP_REQUEST_SET_INFORMATION_EX),
NULL,
0,
FALSE,
&keWait,
&iosb);
if (pIrp is NULL)
{
Trace(TDI, ERROR,
("TdixInitialize: Couldnt build Irp for IP\n"));
nStatus = STATUS_UNSUCCESSFUL;
}
else
{
//
// Io subsystem doesnt do anything for us in kernel mode
// so we need to set up the IRP ourselves
//
pIrpSp = IoGetNextIrpStackLocation(pIrp);
pIrpSp->FileObject = g_pIpIpFileObj;
//
// Submit the request to the forwarder
//
nStatus = IoCallDriver(g_pIpIpFileObj->DeviceObject,
pIrp);
if(nStatus isnot STATUS_SUCCESS)
{
if(nStatus is STATUS_PENDING)
{
Trace(TDI, INFO,
("TdixInitialize: IP returned pending when setting HDRINCL option\n"));
KeWaitForSingleObject(&keWait,
Executive,
KernelMode,
FALSE,
0);
nStatus = STATUS_SUCCESS;
}
}
}
if(nStatus isnot STATUS_SUCCESS)
{
Trace(TDI, ERROR,
("TdixInitialize: IOCTL to IP Forwarder for HDRINCL failed %x\n",
nStatus));
TdixDeinitialize(g_pIpIpDevice,
NULL);
TraceLeave(TDI, "TdixInitialize");
pOpenCtxt->nStatus = nStatus;
KeSetEvent(pOpenCtxt->pkeEvent,
0,
FALSE);
return;
}
//
// Install our receive datagram handler. Caller's 'pReceiveHandler' will
// be called by our handler when a datagram arrives and TDI business is
// out of the way.
//
nStatus = TdixInstallEventHandler(g_pIpIpFileObj,
TDI_EVENT_RECEIVE_DATAGRAM,
TdixReceiveIpIpDatagram,
NULL);
if(nStatus isnot STATUS_SUCCESS)
{
Trace(TDI, ERROR,
("TdixOpen: Status %x installing IpIpReceiveDatagram Event\n",
nStatus));
TdixDeinitialize(g_pIpIpDevice,
NULL);
TraceLeave(TDI, "TdixInitialize");
pOpenCtxt->nStatus = nStatus;
KeSetEvent(pOpenCtxt->pkeEvent,
0,
FALSE);
return;
}
nStatus = TdixInstallEventHandler(g_pIcmpFileObj,
TDI_EVENT_RECEIVE_DATAGRAM,
TdixReceiveIcmpDatagram,
NULL);
if(nStatus isnot STATUS_SUCCESS)
{
Trace(TDI, ERROR,
("TdixOpen: Status %x installing IcmpReceiveDatagram Event\n",
nStatus));
TdixDeinitialize(g_pIpIpDevice,
NULL);
TraceLeave(TDI, "TdixInitialize");
pOpenCtxt->nStatus = nStatus;
KeSetEvent(pOpenCtxt->pkeEvent,
0,
FALSE);
return;
}
RtlZeroMemory(&tdiInterface,
sizeof(TDI_CLIENT_INTERFACE_INFO));
tdiInterface.MajorTdiVersion = TDI_CURRENT_MAJOR_VERSION;
tdiInterface.MinorTdiVersion = TDI_CURRENT_MINOR_VERSION;
tdiInterface.AddAddressHandlerV2 = TdixAddressArrival;
tdiInterface.DelAddressHandlerV2 = TdixAddressDeletion;
TdiRegisterPnPHandlers(&tdiInterface,
sizeof(TDI_CLIENT_INTERFACE_INFO),
&g_hAddressChange);
pOpenCtxt->nStatus = STATUS_SUCCESS;
KeSetEvent(pOpenCtxt->pkeEvent,
0,
FALSE);
TraceLeave(TDI, "TdixInitialize");
return;
}
#pragma alloc_text(PAGE, TdixOpenRawIp)
NTSTATUS
TdixOpenRawIp(
IN DWORD dwProtoId,
OUT HANDLE *phAddrHandle,
OUT FILE_OBJECT **ppAddrFileObj
)
/*++
Routine Description
This routine opens a Raw IP transport address for a given protocol
Locks
None
Arguments
dwProtoId Protocol to be opened
phAddrHandle Pointer to transport Address Handle opened
ppAddrFileObject Pointer to pointer to file object for transport address
handle
Return Value
STATUS_SUCCESS
--*/
{
ULONG ulEaLength;
BYTE rgbyEa[100];
WCHAR rgwcRawIpDevice[sizeof(DD_RAW_IP_DEVICE_NAME) + 10];
WCHAR rgwcProtocolNumber[10];
NTSTATUS nStatus;
OBJECT_ATTRIBUTES oa;
IO_STATUS_BLOCK iosb;
PTA_IP_ADDRESS pTaIp;
PTDI_ADDRESS_IP pTdiIp;
UNICODE_STRING usDevice;
UNICODE_STRING usProtocolNumber;
HANDLE hTransportAddrHandle;
PFILE_OBJECT pTransportAddrFileObj;
PFILE_FULL_EA_INFORMATION pEa;
PAGED_CODE();
TraceEnter(TDI, "TdixOpenRawIp");
*phAddrHandle = NULL;
*ppAddrFileObj = NULL;
//
// FILE_FULL_EA_INFORMATION wants null terminated buffers now
//
RtlZeroMemory(rgbyEa,
sizeof(rgbyEa));
RtlZeroMemory(rgwcRawIpDevice,
sizeof(rgwcRawIpDevice));
RtlZeroMemory(rgwcProtocolNumber,
sizeof(rgwcProtocolNumber));
//
// Set up parameters needed to open the transport address. First, the
// object attributes.
//
//
// Build the raw IP device name as a counted string. The device name
// is followed by a path separator then the protocol number of
// interest.
//
usDevice.Buffer = rgwcRawIpDevice;
usDevice.Length = 0;
usDevice.MaximumLength = sizeof(rgwcRawIpDevice);
RtlAppendUnicodeToString(&usDevice,
DD_RAW_IP_DEVICE_NAME);
usDevice.Buffer[usDevice.Length/sizeof(WCHAR)] = OBJ_NAME_PATH_SEPARATOR;
usDevice.Length += sizeof(WCHAR);
usProtocolNumber.Buffer = rgwcProtocolNumber;
usProtocolNumber.MaximumLength = sizeof(rgwcProtocolNumber);
RtlIntegerToUnicodeString((ULONG)dwProtoId,
10,
&usProtocolNumber);
RtlAppendUnicodeStringToString(&usDevice,
&usProtocolNumber);
RtAssert(usDevice.Length < sizeof(rgwcRawIpDevice));
InitializeObjectAttributes(&oa,
&usDevice,
OBJ_CASE_INSENSITIVE,
NULL,
NULL);
//
// Set up the extended attribute that tells the IP stack the IP
// address/port on which we want to receive.
// We "bind" to INADDR_ANY
//
RtAssert((sizeof(FILE_FULL_EA_INFORMATION) +
TDI_TRANSPORT_ADDRESS_LENGTH +
sizeof(TA_IP_ADDRESS))
<= 100);
pEa = (PFILE_FULL_EA_INFORMATION)rgbyEa;
pEa->NextEntryOffset = 0;
pEa->Flags = 0;
pEa->EaNameLength = TDI_TRANSPORT_ADDRESS_LENGTH;
pEa->EaValueLength = sizeof(TA_IP_ADDRESS);
NdisMoveMemory(pEa->EaName,
TdiTransportAddress,
TDI_TRANSPORT_ADDRESS_LENGTH);
//
// Note: The unused byte represented by the "+ 1" below is to match up
// with what the IP stack expects, though it doesn't appear in the
// current docs.
//
pTaIp = (PTA_IP_ADDRESS)(pEa->EaName + TDI_TRANSPORT_ADDRESS_LENGTH + 1);
pTaIp->TAAddressCount = 1;
pTaIp->Address[0].AddressLength = TDI_ADDRESS_LENGTH_IP;
pTaIp->Address[0].AddressType = TDI_ADDRESS_TYPE_IP;
pTdiIp = &(pTaIp->Address[0].Address[0]);
pTdiIp->sin_port = 0;
pTdiIp->in_addr = 0;
NdisZeroMemory(pTdiIp->sin_zero,
sizeof(pTdiIp->sin_zero));
ulEaLength = (ULONG) ((UINT_PTR)(pTaIp + 1) - (UINT_PTR)pEa);
//
// Open the transport address.
// Settin FILE_SHARE_READ|FILE_SHARE_WRITE is equivalent to the
// SO_REUSEADDR option
//
nStatus = ZwCreateFile(&hTransportAddrHandle,
FILE_READ_DATA | FILE_WRITE_DATA,
&oa,
&iosb,
NULL,
FILE_ATTRIBUTE_NORMAL,
0,
FILE_OPEN,
0,
pEa,
ulEaLength);
if(nStatus isnot STATUS_SUCCESS)
{
Trace(TDI, ERROR,
("TdixOpenRawIp: Unable to open %S. Status %x\n",
usDevice.Buffer,
nStatus));
TraceLeave(TDI, "TdixOpenRawIp");
return STATUS_UNSUCCESSFUL;
}
//
// Get the object address from the handle. This also checks our
// permissions on the object.
//
nStatus = ObReferenceObjectByHandle(hTransportAddrHandle,
0,
NULL,
KernelMode,
&pTransportAddrFileObj,
NULL);
if(nStatus isnot STATUS_SUCCESS)
{
Trace(TDI, ERROR,
("TdixOpenRawIp: Unable to open object for handle %x. Status %x\n",
hTransportAddrHandle,
nStatus));
TraceLeave(TDI, "TdixOpenRawIp");
return STATUS_UNSUCCESSFUL;
}
*phAddrHandle = hTransportAddrHandle;
*ppAddrFileObj = pTransportAddrFileObj;
TraceLeave(TDI, "TdixOpenRawIp");
return STATUS_SUCCESS;
}
#pragma alloc_text(PAGE, TdixDeinitialize)
VOID
TdixDeinitialize(
IN PDEVICE_OBJECT pDeviceObject,
IN PVOID pvContext
)
/*++
Routine Description
Undo TdixInitialize actions
Locks
This call must be made at PASSIVE IRQL in the context of the system process
Arguments
pvContext
Return Value
None
--*/
{
POPEN_CONTEXT pOpenCtxt;
PAGED_CODE();
TraceEnter(TDI, "TdixDeinitialize");
UNREFERENCED_PARAMETER(pDeviceObject);
pOpenCtxt = (POPEN_CONTEXT)pvContext;
if(g_hAddressChange isnot NULL)
{
TdiDeregisterPnPHandlers(g_hAddressChange);
}
ExDeleteNPagedLookasideList(&g_llSendCtxtBlocks);
ExDeleteNPagedLookasideList(&g_llTransferCtxtBlocks);
ExDeleteNPagedLookasideList(&g_llQueueNodeBlocks);
if(g_pIpIpFileObj)
{
//
// Install a NULL handler, effectively uninstalling.
//
TdixInstallEventHandler(g_pIpIpFileObj,
TDI_EVENT_RECEIVE_DATAGRAM,
NULL,
NULL);
ObDereferenceObject(g_pIpIpFileObj);
g_pIpIpFileObj = NULL;
}
if(g_hIpIpHandle)
{
ZwClose(g_hIpIpHandle);
g_hIpIpHandle = NULL;
}
if(g_pIcmpFileObj)
{
TdixInstallEventHandler(g_pIcmpFileObj,
TDI_EVENT_RECEIVE_DATAGRAM,
NULL,
NULL);
ObDereferenceObject(g_pIcmpFileObj);
g_pIcmpFileObj = NULL;
}
if(g_hIcmpHandle)
{
ZwClose(g_hIcmpHandle);
g_hIcmpHandle = NULL;
}
if(pOpenCtxt)
{
KeSetEvent(pOpenCtxt->pkeEvent,
0,
FALSE);
}
TraceLeave(TDI, "TdixDeinitialize");
}
#pragma alloc_text(PAGE, TdixInstallEventHandler)
NTSTATUS
TdixInstallEventHandler(
IN PFILE_OBJECT pAddrFileObj,
IN INT iEventType,
IN PVOID pfnEventHandler,
IN PVOID pvEventContext
)
/*++
Routine Description
Install a TDI event handler routine
Locks
The call must be made at PASSIVE
Arguments
iEventType The event for which the handler is to be set
pfnEventHandler The event handler
pvEventContext The context passed to the event handler
Return Value
STATUS_INSUFFICIENT_RESOURCES
STATUS_SUCCESS
--*/
{
NTSTATUS nStatus;
PIRP pIrp;
PAGED_CODE();
TraceEnter(TDI, "TdixInstallEventHandler");
//
// Allocate a "set event" IRP with base initialization.
//
pIrp = TdiBuildInternalDeviceControlIrp(
TDI_SET_EVENT_HANDLER,
pAddrFileObj->DeviceObject,
pAddrFileObj,
NULL,
NULL);
if(pIrp is NULL)
{
Trace(TDI, ERROR,
("TdixInstallEventHandler: Could not allocate IRP\n"));
return STATUS_INSUFFICIENT_RESOURCES;
}
//
// Complete the "set event" IRP initialization.
//
TdiBuildSetEventHandler(pIrp,
pAddrFileObj->DeviceObject,
pAddrFileObj,
NULL,
NULL,
iEventType,
pfnEventHandler,
pvEventContext);
/*
Trace(GLOBAL, ERROR,
("**FileObj 0x%x Irp 0x%x fscontext to callee 0x%x\n",
pAddrFileObj,
pIrp,
IoGetNextIrpStackLocation(pIrp)->FileObject));
*/
//
// Tell the I/O manager to pass our IRP to the transport for processing.
//
nStatus = IoCallDriver(pAddrFileObj->DeviceObject,
pIrp);
if(nStatus isnot STATUS_SUCCESS)
{
Trace(TDI, ERROR,
("TdixInstallEventHandler: Error %X sending IRP\n",
nStatus));
}
TraceLeave(TDI, "TdixInstallEventHandler");
return nStatus;
}
VOID
TdixAddressArrival(
PTA_ADDRESS pAddr,
PUNICODE_STRING pusDeviceName,
PTDI_PNP_CONTEXT pContext
)
/*++
Routine Description
Our handler called by TDI whenever a new address is added to the
system
We see if this is an IP Address and if we have any tunnels that
use this address as an endpoint. If any do, then we mark all those
tunnels as up
Locks
Acquires the g_rwlTunnelLock as WRITER.
Also locks each of the tunnels
Arguments
pAddr
pusDeviceName
pContext
Return Value
--*/
{
KIRQL kiIrql;
PADDRESS_BLOCK pAddrBlock;
PTDI_ADDRESS_IP pTdiIpAddr;
PLIST_ENTRY pleNode;
TraceEnter(TDI, "TdixAddressArrival");
if(pAddr->AddressType isnot TDI_ADDRESS_TYPE_IP)
{
TraceLeave(TDI, "TdixAddressArrival");
return;
}
RtAssert(pAddr->AddressLength >= sizeof(TDI_ADDRESS_IP));
pTdiIpAddr = (PTDI_ADDRESS_IP)pAddr->Address;
Trace(TDI, TRACE,
("TdixAddressArrival: New address %d.%d.%d.%d\n",
PRINT_IPADDR(pTdiIpAddr->in_addr)));
EnterWriter(&g_rwlTunnelLock,
&kiIrql);
pAddrBlock = GetAddressBlock(pTdiIpAddr->in_addr);
if(pAddrBlock isnot NULL)
{
RtAssert(pAddrBlock->dwAddress is pTdiIpAddr->in_addr);
if(pAddrBlock->bAddressPresent is TRUE)
{
Trace(TDI, ERROR,
("TdixAddressArrival: Multiple notification on %d.%d.%d.%d\n",
PRINT_IPADDR(pTdiIpAddr->in_addr)));
ExitWriter(&g_rwlTunnelLock,
kiIrql);
TraceLeave(TDI, "TdixAddressArrival");
return;
}
pAddrBlock->bAddressPresent = TRUE;
}
else
{
pAddrBlock = RtAllocate(NonPagedPool,
sizeof(ADDRESS_BLOCK),
TUNNEL_TAG);
if(pAddrBlock is NULL)
{
Trace(TDI, ERROR,
("TdixAddressArrival: Unable to allocate address block\n"));
ExitWriter(&g_rwlTunnelLock,
kiIrql);
TraceLeave(TDI, "TdixAddressArrival");
return;
}
pAddrBlock->dwAddress = pTdiIpAddr->in_addr;
pAddrBlock->bAddressPresent = TRUE;
InitializeListHead(&(pAddrBlock->leTunnelList));
InsertHeadList(&g_leAddressList,
&(pAddrBlock->leAddressLink));
}
//
// Walk the list of tunnels on this address and
// set them up
//
for(pleNode = pAddrBlock->leTunnelList.Flink;
pleNode isnot &(pAddrBlock->leTunnelList);
pleNode = pleNode->Flink)
{
PTUNNEL pTunnel;
DWORD dwLocalNet;
RouteCacheEntry *pDummyRce;
BYTE byType;
USHORT usMtu;
IPOptInfo OptInfo;
pTunnel = CONTAINING_RECORD(pleNode,
TUNNEL,
leAddressLink);
RtAcquireSpinLockAtDpcLevel(&(pTunnel->rlLock));
RtAssert(pTunnel->LOCALADDR is pTdiIpAddr->in_addr);
RtAssert(pTunnel->dwOperState is IF_OPER_STATUS_NON_OPERATIONAL);
pTunnel->dwAdminState |= TS_ADDRESS_PRESENT;
if(GetAdminState(pTunnel) is IF_ADMIN_STATUS_UP)
{
pTunnel->dwOperState = IF_OPER_STATUS_OPERATIONAL;
//
// See if the remote address is reachable and what the MTU is.
//
UpdateMtuAndReachability(pTunnel);
}
RtReleaseSpinLockFromDpcLevel(&(pTunnel->rlLock));
}
ExitWriter(&g_rwlTunnelLock,
kiIrql);
TraceLeave(TDI, "TdixAddressArrival");
return;
}
VOID
TdixAddressDeletion(
PTA_ADDRESS pAddr,
PUNICODE_STRING pusDeviceName,
PTDI_PNP_CONTEXT pContext
)
/*++
Routine Description
Our handler called by TDI whenever an address is removed from to the
system
We see if this is an IP Address and if we have any tunnels that
use this address as an endpoint. If any do, then we mark all those
tunnels as down
Locks
Acquires the g_rwlTunnelLock as WRITER.
Also locks each of the tunnels
Arguments
pAddr
pusDeviceName
pContext
Return Value
--*/
{
KIRQL kiIrql;
PADDRESS_BLOCK pAddrBlock;
PTDI_ADDRESS_IP pTdiIpAddr;
PLIST_ENTRY pleNode;
TraceEnter(TDI, "TdixAddressDeletion");
if(pAddr->AddressType isnot TDI_ADDRESS_TYPE_IP)
{
TraceLeave(TDI, "TdixAddressDeletion");
return;
}
RtAssert(pAddr->AddressLength >= sizeof(TDI_ADDRESS_IP));
pTdiIpAddr = (PTDI_ADDRESS_IP)pAddr->Address;
Trace(TDI, TRACE,
("TdixAddressDeletion: Address %d.%d.%d.%d\n",
PRINT_IPADDR(pTdiIpAddr->in_addr)));
EnterWriter(&g_rwlTunnelLock,
&kiIrql);
pAddrBlock = GetAddressBlock(pTdiIpAddr->in_addr);
if(pAddrBlock is NULL)
{
ExitWriter(&g_rwlTunnelLock,
kiIrql);
TraceLeave(TDI, "TdixAddressDeletion");
return;
}
RtAssert(pAddrBlock->dwAddress is pTdiIpAddr->in_addr);
RtAssert(pAddrBlock->bAddressPresent);
//
// Walk the list of tunnels on this address and
// set them down
//
for(pleNode = pAddrBlock->leTunnelList.Flink;
pleNode isnot &(pAddrBlock->leTunnelList);
pleNode = pleNode->Flink)
{
PTUNNEL pTunnel;
pTunnel = CONTAINING_RECORD(pleNode,
TUNNEL,
leAddressLink);
RtAcquireSpinLockAtDpcLevel(&(pTunnel->rlLock));
RtAssert(pTunnel->LOCALADDR is pTdiIpAddr->in_addr);
RtAssert(pTunnel->dwAdminState & TS_ADDRESS_PRESENT);
RtAssert(IsTunnelMapped(pTunnel));
pTunnel->dwOperState = IF_OPER_STATUS_NON_OPERATIONAL;
//
// Reset the admin state to UP/DOWN|MAPPED (It has to be mapped)
//
pTunnel->dwAdminState = GetAdminState(pTunnel);
MarkTunnelMapped(pTunnel);
RtReleaseSpinLockFromDpcLevel(&(pTunnel->rlLock));
}
ExitWriter(&g_rwlTunnelLock,
kiIrql);
TraceLeave(TDI, "TdixAddressDeletion");
return;
}
NTSTATUS
TdixReceiveIpIpDatagram(
IN PVOID pvTdiEventContext,
IN LONG lSourceAddressLen,
IN PVOID pvSourceAddress,
IN LONG plOptionsLen,
IN PVOID pvOptions,
IN ULONG ulReceiveDatagramFlags,
IN ULONG ulBytesIndicated,
IN ULONG ulBytesAvailable,
OUT PULONG pulBytesTaken,
IN PVOID pvTsdu,
OUT IRP **ppIoRequestPacket
)
/*++
Routine Description
ClientEventReceiveDatagram indication handler. We figure out the
tunnel with which to associate the lookahead data. We increment some
stats and then indicate the data to IP (taking care to skip over the
outer IP header) along with a receive context.
If all the data is there, IP copies the data out and returns.
Otherwise IP requests a TransferData.
In our TransferData function, we set a flag in the receive context (the
same one is being passed around) to indicate the IP requested a
TransferData, and return PENDING.
The control then returns back to this function. We look at the pXferCtxt
to see if IP requested a transfer, and if so, we call
TdiBuildReceiveDatagram() to create the IRP to pass back to complete
the receive.
There is some funky stuff that needs to be done with offsets into the
lookahead as well as destination buffers and care should be taken to
understand those before change is made to the code.
Locks
Runs at DISPATCH IRQL.
Arguments
Return Value
NO_ERROR
--*/
{
PTRANSFER_CONTEXT pXferCtxt;
PNDIS_BUFFER pnbFirstBuffer;
PVOID pvData;
PIRP pIrp;
PIP_HEADER pOutHeader, pInHeader;
ULARGE_INTEGER uliTunnelId;
PTA_IP_ADDRESS ptiaAddress;
PTUNNEL pTunnel;
ULONG ulOutHdrLen, ulDataLen;
BOOLEAN bNonUnicast;
TraceEnter(RCV, "TdixReceiveIpIp");
//
// The TSDU is the data and NOT the MDL
//
pvData = (PVOID)pvTsdu;
//
// Figure out the tunnel for this receive
// Since the transport indicates atleast 128 bytes, we can safely read out
// the IP Header
//
RtAssert(ulBytesIndicated > sizeof(IP_HEADER));
pOutHeader = (PIP_HEADER)pvData;
RtAssert(pOutHeader->byProtocol is PROTO_IPINIP);
RtAssert((pOutHeader->byVerLen >> 4) is IP_VERSION_4);
//
// These defines depend upon a variable being named "uliTunnelId"
//
REMADDR = pOutHeader->dwSrc;
LOCALADDR = pOutHeader->dwDest;
//
// Make sure that the source address given and the IP Header are in
// synch
//
ptiaAddress = (PTA_IP_ADDRESS)pvSourceAddress;
//
// Bunch of checks to make sure the packet and the handler
// are telling us the same thing
//
RtAssert(lSourceAddressLen is sizeof(TA_IP_ADDRESS));
RtAssert(ptiaAddress->TAAddressCount is 1);
RtAssert(ptiaAddress->Address[0].AddressType is TDI_ADDRESS_TYPE_IP);
RtAssert(ptiaAddress->Address[0].AddressLength is TDI_ADDRESS_LENGTH_IP);
RtAssert(ptiaAddress->Address[0].Address[0].in_addr is pOutHeader->dwSrc);
//
// Get a pointer to the inside header. By TDI spec we should get
// enough data to get at the inner header
//
ulDataLen = RtlUshortByteSwap(pOutHeader->wLength);
ulOutHdrLen = LengthOfIPHeader(pOutHeader);
if(ulDataLen < ulOutHdrLen + MIN_IP_HEADER_LENGTH)
{
//
// Malformed packet. Doesnt have a inner header
//
Trace(RCV, ERROR,
("TdixReceiveIpIp: Packet %d.%d.%d.%d -> %d.%d.%d.%d had size %d\n",
PRINT_IPADDR(pOutHeader->dwSrc),
PRINT_IPADDR(pOutHeader->dwDest),
ulDataLen));
TraceLeave(RCV, "TdixReceiveIpIp");
return STATUS_DATA_NOT_ACCEPTED;
}
//
// This cant be more than 128 (60 + 20)
//
RtAssert(ulBytesIndicated > ulOutHdrLen + MIN_IP_HEADER_LENGTH);
pInHeader = (PIP_HEADER)((PBYTE)pOutHeader + ulOutHdrLen);
//
// If the inside header is also IP in IP and is for one of our tunnels,
// drop the packet. If we dont, someone could build a series of
// encapsulated headers which would cause this function to be called
// recursively making us overflow our stack. Ofcourse, a better fix
// would be to switch processing to another thread at this point
// for multiply encapsulated packets, but that is too much work; so
// currently we just dont allow an IP in IP tunnel within an IP in IP
// tunnel
//
if(pInHeader->byProtocol is PROTO_IPINIP)
{
ULARGE_INTEGER uliInsideId;
PTUNNEL pInTunnel;
//
// See if this is for us
//
uliInsideId.LowPart = pInHeader->dwSrc;
uliInsideId.HighPart = pInHeader->dwDest;
//
// Find the TUNNEL. We need to acquire the tunnel lock
//
EnterReaderAtDpcLevel(&g_rwlTunnelLock);
pInTunnel = FindTunnel(&uliInsideId);
ExitReaderFromDpcLevel(&g_rwlTunnelLock);
if(pInTunnel isnot NULL)
{
RtReleaseSpinLockFromDpcLevel(&(pInTunnel->rlLock));
DereferenceTunnel(pInTunnel);
Trace(RCV, WARN,
("TdixReceiveIpIp: Packet on tunnel for %d.%d.%d.%d/%d.%d.%d.%d contained another IPinIP packet for tunnel %d.%d.%d.%d/%d.%d.%d.%d\n",
PRINT_IPADDR(REMADDR),
PRINT_IPADDR(LOCALADDR),
PRINT_IPADDR(uliInsideId.LowPart),
PRINT_IPADDR(uliInsideId.HighPart)));
TraceLeave(RCV, "TdixReceiveIpIp");
return STATUS_DATA_NOT_ACCEPTED;
}
}
#if DBG
//
// The size of the inner data must be total bytes - outer header
//
ulDataLen = RtlUshortByteSwap(pInHeader->wLength);
RtAssert((ulDataLen + ulOutHdrLen) is ulBytesAvailable);
//
// The outer header should also give a good length
//
ulDataLen = RtlUshortByteSwap(pOutHeader->wLength);
//
// Data length and bytes available must match
//
RtAssert(ulDataLen is ulBytesAvailable);
#endif
//
// Find the TUNNEL. We need to acquire the tunnel lock
//
EnterReaderAtDpcLevel(&g_rwlTunnelLock);
pTunnel = FindTunnel(&uliTunnelId);
ExitReaderFromDpcLevel(&g_rwlTunnelLock);
if(pTunnel is NULL)
{
Trace(RCV, WARN,
("TdixReceiveIpIp: Couldnt find tunnel for %d.%d.%d.%d/%d.%d.%d.%d\n",
PRINT_IPADDR(REMADDR),
PRINT_IPADDR(LOCALADDR)));
//
// Could not find a matching tunnel
//
TraceLeave(RCV, "TdixReceiveIpIp");
return STATUS_DATA_NOT_ACCEPTED;
}
//
// Ok, so we have the tunnel and it is ref counted and locked
//
//
// The number of octets received
//
pTunnel->ulInOctets += ulBytesAvailable;
//
// Check the actual (inside) destination
//
if(IsUnicastAddr(pInHeader->dwDest))
{
//
// TODO: should we check to see that the address is not 0.0.0.0?
//
pTunnel->ulInUniPkts++;
bNonUnicast = FALSE;
}
else
{
pTunnel->ulInNonUniPkts++;
if(IsClassEAddr(pInHeader->dwDest))
{
//
// Bad address - throw it away
//
pTunnel->ulInErrors++;
//
// Releaselock, free buffer chain
//
}
bNonUnicast = TRUE;
}
if(pTunnel->dwOperState isnot IF_OPER_STATUS_OPERATIONAL)
{
Trace(RCV, WARN,
("TdixReceiveIpIp: Tunnel %x is not up\n",
pTunnel));
pTunnel->ulInDiscards++;
RtReleaseSpinLockFromDpcLevel(&(pTunnel->rlLock));
DereferenceTunnel(pTunnel);
TraceLeave(RCV, "TdixReceiveIpIp");
return STATUS_DATA_NOT_ACCEPTED;
}
//
// Allocate a receive context
//
pXferCtxt = AllocateTransferContext();
if(pXferCtxt is NULL)
{
Trace(RCV, ERROR,
("TdixReceiveIpIp: Couldnt allocate transfer context\n"));
//
// Could not allocate context, free the data, unlock and deref
// the tunnel
//
pTunnel->ulInDiscards++;
RtReleaseSpinLockFromDpcLevel(&(pTunnel->rlLock));
DereferenceTunnel(pTunnel);
TraceLeave(RCV, "TdixReceiveIpIp");
return STATUS_DATA_NOT_ACCEPTED;
}
//
// Fill in the read-datagram context with the information that won't
// otherwise be available in the completion routine.
//
pXferCtxt->pTunnel = pTunnel;
//
// Ok, all statistics are done.
// Release the lock on the tunnel and indicate the data (or part
// thereof) to IP
//
RtReleaseSpinLockFromDpcLevel(&(pTunnel->rlLock));
//
// The data starts at pInHeader
// We indicate (ulBytesIndicated - outer header length) up to IP
// The total data is the (ulBytesAvailable - outer header)
// We associate a TRANSFER_CONTEXT with this indication,
// The Protocol Offset is just our outer header
//
pXferCtxt->bRequestTransfer = FALSE;
#if PROFILE
KeQueryTickCount((PLARGE_INTEGER)&(pXferCtxt->llRcvTime));
#endif
g_pfnIpRcv(pTunnel->pvIpContext,
pInHeader,
ulBytesIndicated - ulOutHdrLen,
ulBytesAvailable - ulOutHdrLen,
pXferCtxt,
ulOutHdrLen,
bNonUnicast,
NULL);
//
// IP calls our TransferData synchronously, and since we also handle
// that call synchronously. If IP requests a data transfer, we set
// bRequestTransfer to true in the pXferCtxt
//
if(pXferCtxt->bRequestTransfer is FALSE)
{
#if PROFILE
LONGLONG llTime;
KeQueryTickCount((PLARGE_INTEGER)&llTime);
llTime -= pXferCtxt->llRcvTime;
llTime *= KeQueryTimeIncrement();
Trace(RCV, ERROR,
("Profile: Rcv took %d.%d units\n",
((PLARGE_INTEGER)&llTime)->HighPart,
((PLARGE_INTEGER)&llTime)->LowPart));
#endif
Trace(RCV, TRACE,
("TdixReceiveIpIp: IP did not request transfer\n"));
//
// For some reason or another IP did not want this packet
// We are done with it
//
FreeTransferContext(pXferCtxt);
DereferenceTunnel(pTunnel);
TraceLeave(RCV, "TdixReceiveIpIp");
return STATUS_SUCCESS;
}
//
// Make sure that the things looks the same before and after the call
//
RtAssert(pXferCtxt->pvContext is pTunnel);
RtAssert(pXferCtxt->uiProtoOffset is ulOutHdrLen);
//
// Should not be asking to transfer more than was indicated
//
RtAssert(pXferCtxt->uiTransferLength <= ulBytesAvailable);
//
// So IP did want it transferred
//
#if ALLOCATEIRPS
//
// Allocate the IRP directly.
//
pIrp = IoAllocateIrp(g_pIpIpFileObj->DeviceObject->StackSize,
FALSE);
#else
//
// Allocate a "receive datagram" IRP with base initialization.
//
pIrp = TdiBuildInternalDeviceControlIrp(TDI_RECEIVE_DATAGRAM,
g_pIpIpFileObj->DeviceObject,
g_pIpIpFileObj,
NULL,
NULL);
#endif
if(!pIrp)
{
Trace(RCV, ERROR,
("TdixReceiveIpIp: Unable to build IRP for receive\n"));
pTunnel->ulInDiscards++;
FreeTransferContext(pXferCtxt);
//
// Call IP's TDComplete to signal the failure of this
// transfer
//
DereferenceTunnel(pTunnel);
TraceLeave(RCV, "TdixReceiveIpIp");
return STATUS_DATA_NOT_ACCEPTED;
}
//
// IP gives us an NDIS_PACKET to which to transfer data
// TDI wants just an MDL chain
//
#if NDISBUFFERISMDL
NdisQueryPacket(pXferCtxt->pnpTransferPacket,
NULL,
NULL,
&pnbFirstBuffer,
NULL);
#else
#error "Fix This"
#endif
//
// Complete the "receive datagram" IRP initialization.
//
TdiBuildReceiveDatagram(pIrp,
g_pIpIpFileObj->DeviceObject,
g_pIpIpFileObj,
TdixReceiveIpIpDatagramComplete,
pXferCtxt,
pnbFirstBuffer,
pXferCtxt->uiTransferLength,
NULL,
NULL,
0);
//
// Adjust the IRP's stack location to make the transport's stack current.
// Normally IoCallDriver handles this, but this IRP doesn't go thru
// IoCallDriver. Seems like it would be the transport's job to make this
// adjustment, but IP for one doesn't seem to do it. There is a similar
// adjustment in both the redirector and PPTP.
//
IoSetNextIrpStackLocation(pIrp);
*ppIoRequestPacket = pIrp;
*pulBytesTaken = pXferCtxt->uiTransferOffset + ulOutHdrLen;
//
// we DONT dereference the TUNNEL here
// That is done in the completion routine
//
TraceLeave(RCV, "TdixReceiveIpIp");
return STATUS_MORE_PROCESSING_REQUIRED;
}
NTSTATUS
TdixReceiveIpIpDatagramComplete(
IN PDEVICE_OBJECT DeviceObject,
IN PIRP Irp,
IN PVOID Context
)
/*++
Routine Description
Standard I/O completion routine.
Called to signal the completion of a receive. The context is the
TRANSFER_CONTEXT setup with TdiBuildReceiveDatagram.
Locks
Takes the TUNNEL's lock.
Arguments
Return Value
STATUS_SUCCESS
--*/
{
PTRANSFER_CONTEXT pXferCtxt;
PTUNNEL pTunnel;
LONGLONG llTime;
TraceEnter(RCV, "TdixReceiveIpIpDatagramComplete");
pXferCtxt = (PTRANSFER_CONTEXT) Context;
//
// The tunnel has been referenced but not locked
//
pTunnel = pXferCtxt->pTunnel;
RtAssert(pXferCtxt->uiTransferLength is Irp->IoStatus.Information);
g_pfnIpTDComplete(pTunnel->pvIpContext,
pXferCtxt->pnpTransferPacket,
Irp->IoStatus.Status,
(ULONG)(Irp->IoStatus.Information));
#if PROFILE
KeQueryTickCount((PLARGE_INTEGER)&llTime);
Trace(RCV, ERROR,
("Profile: %d.%d %d.%d\n",
((PLARGE_INTEGER)&llTime)->HighPart,
((PLARGE_INTEGER)&llTime)->LowPart,
((PLARGE_INTEGER)&pXferCtxt->llRcvTime)->HighPart,
((PLARGE_INTEGER)&pXferCtxt->llRcvTime)->LowPart));
llTime -= pXferCtxt->llRcvTime;
llTime *= KeQueryTimeIncrement();
Trace(RCV, ERROR,
("Profile: Rcv took %d.%d units\n",
((PLARGE_INTEGER)&llTime)->HighPart,
((PLARGE_INTEGER)&llTime)->LowPart));
#endif
FreeTransferContext(pXferCtxt);
//
// Deref the tunnel (finally)
//
DereferenceTunnel(pTunnel);
#if ALLOCATEIRPS
//
// Releae the IRP resources and tell the I/O manager to forget it existed
// in the standard way.
//
IoFreeIrp(Irp);
TraceLeave(RCV, "TdixReceiveIpIpDatagramComplete");
return STATUS_MORE_PROCESSING_REQUIRED;
#else
//
// Let the I/O manager release the IRP resources.
//
TraceLeave(RCV, "TdixReceiveIpIpDatagramComplete");
return STATUS_SUCCESS;
#endif
}
#pragma alloc_text(PAGE, TdixSendDatagram)
#if PROFILE
NTSTATUS
TdixSendDatagram(
IN PTUNNEL pTunnel,
IN PNDIS_PACKET pnpPacket,
IN PNDIS_BUFFER pnbFirstBuffer,
IN ULONG ulBufferLength,
IN LONGLONG llSendTime,
IN LONGLONG llCallTime,
IN LONGLONG llTransmitTime
)
#else
NTSTATUS
TdixSendDatagram(
IN PTUNNEL pTunnel,
IN PNDIS_PACKET pnpPacket,
IN PNDIS_BUFFER pnbFirstBuffer,
IN ULONG ulBufferLength
)
#endif
/*++
Routine Description
Sends a datagram over a tunnel. The remote endpoint is that of the tunnel
and the send complete handler is TdixSendCompleteHandler
A SendContext is associated with the send
Locks
This call needs to be at PASSIVE level
The TUNNEL needs to be ref counted but not locked
Arguments
pTunnel TUNNEL over which the datagram is to be sent
pnpPacket Packet descriptor allocate from PACKET_POOL of the tunnel
pnbFirstBuffer The first buffer in the chain (the outer IP header)
ulBufferLength The lenght of the complete packet (including outer header)
Return Value
--*/
{
NTSTATUS nStatus;
PSEND_CONTEXT pSendCtxt;
PIRP pIrp;
TraceEnter(SEND, "TdixSendDatagram");
do
{
//
// Allocate a context for this send-datagram from our lookaside list.
//
pSendCtxt = AllocateSendContext();
if(pSendCtxt is NULL)
{
Trace(SEND, ERROR,
("TdixSendDatagram: Unable to allocate send context\n"));
nStatus = STATUS_INSUFFICIENT_RESOURCES;
break;
}
#if ALLOCATEIRPS
//
// Allocate the IRP directly.
//
pIrp = IoAllocateIrp(g_pIpIpFileObj->DeviceObject->StackSize,
FALSE);
// Trace(GLOBAL, ERROR,
// ("TdixSendDatagram: irp = 0x%x\n",pIrp));
#else
//
// Allocate a "send datagram" IRP with base initialization.
//
pIrp = TdiBuildInternalDeviceControlIrp(TDI_SEND_DATAGRAM,
g_pIpIpFileObj->DeviceObject,
g_pIpIpFileObj,
NULL,
NULL);
#endif
if(!pIrp)
{
Trace(SEND, ERROR,
("TdixSendDatagram: Unable to build IRP\n"));
nStatus = STATUS_INSUFFICIENT_RESOURCES;
break;
}
//
// Fill in the send-datagram context.
//
pSendCtxt->pTunnel = pTunnel;
pSendCtxt->pnpPacket = pnpPacket;
pSendCtxt->ulOutOctets = ulBufferLength;
#if PROFILE
pSendCtxt->llSendTime = llSendTime;
pSendCtxt->llCallTime = llCallTime;
pSendCtxt->llTransmitTime = llTransmitTime;
#endif
//
// Complete the "send datagram" IRP initialization.
//
TdiBuildSendDatagram(pIrp,
g_pIpIpFileObj->DeviceObject,
g_pIpIpFileObj,
TdixSendDatagramComplete,
pSendCtxt,
pnbFirstBuffer,
ulBufferLength,
&(pTunnel->tciConnInfo));
//
// Tell the I/O manager to pass our IRP to the transport for
// processing.
//
#if PROFILE
KeQueryTickCount((PLARGE_INTEGER)&pSendCtxt->llCall2Time);
#endif
nStatus = IoCallDriver(g_pIpIpFileObj->DeviceObject,
pIrp);
RtAssert(nStatus is STATUS_PENDING);
nStatus = STATUS_SUCCESS;
}while (FALSE);
if(nStatus isnot STATUS_SUCCESS)
{
Trace(SEND, ERROR,
("TdixSendDatagram: Status %X sending\n",
nStatus));
//
// Pull a half Jameel, i.e. convert a synchronous failure to an
// asynchronous failure from client's perspective. However, clean up
// context here.
//
if(pSendCtxt)
{
FreeSendContext(pSendCtxt);
}
IpIpSendComplete(nStatus,
pTunnel,
pnpPacket,
ulBufferLength);
}
TraceLeave(SEND, "TdixSendDatagram");
return STATUS_PENDING;
}
NTSTATUS
TdixSendDatagramComplete(
IN PDEVICE_OBJECT DeviceObject,
IN PIRP Irp,
IN PVOID Context
)
{
PSEND_CONTEXT pSendCtxt;
PTUNNEL pTunnel;
PNDIS_PACKET pnpPacket;
PNDIS_BUFFER pnbFirstBuffer;
ULONG ulBufferLength;
KIRQL irql;
LONGLONG llTime, llSendTime, llQTime, llTxTime, llCallTime;
ULONG ulInc;
TraceEnter(SEND, "TdixSendDatagramComplete");
pSendCtxt = (PSEND_CONTEXT) Context;
#if PROFILE
KeQueryTickCount((PLARGE_INTEGER)&llTime);
ulInc = KeQueryTimeIncrement();
llSendTime = pSendCtxt->llCallTime - pSendCtxt->llSendTime;
llSendTime *= ulInc;
llQTime = pSendCtxt->llTransmitTime - pSendCtxt->llCallTime;
llQTime *= ulInc;
llTxTime = pSendCtxt->llCall2Time - pSendCtxt->llTransmitTime;
llTxTime *= ulInc;
llCallTime = llTime - pSendCtxt->llCall2Time;
llCallTime *= ulInc;
llTime = llTime - pSendCtxt->llSendTime;
llTime *= ulInc;
DbgPrint("SendProfile: Send %d.%d Q %d.%d Tx %d.%d Call %d.%d \nTotal %d.%d\n",
((PLARGE_INTEGER)&llSendTime)->HighPart,
((PLARGE_INTEGER)&llSendTime)->LowPart,
((PLARGE_INTEGER)&llQTime)->HighPart,
((PLARGE_INTEGER)&llQTime)->LowPart,
((PLARGE_INTEGER)&llTxTime)->HighPart,
((PLARGE_INTEGER)&llTxTime)->LowPart,
((PLARGE_INTEGER)&llCallTime)->HighPart,
((PLARGE_INTEGER)&llCallTime)->LowPart,
((PLARGE_INTEGER)&llTime)->HighPart,
((PLARGE_INTEGER)&llTime)->LowPart);
#endif
//
// Just call our SendComplete function with the right args
//
pTunnel = pSendCtxt->pTunnel;
pnpPacket = pSendCtxt->pnpPacket;
ulBufferLength = pSendCtxt->ulOutOctets;
//
// Free the send-complete context.
//
FreeSendContext(pSendCtxt);
IpIpSendComplete(Irp->IoStatus.Status,
pTunnel,
pnpPacket,
ulBufferLength);
#if ALLOCATEIRPS
//
// Release the IRP resources and tell the I/O manager to forget it existed
// in the standard way.
//
IoFreeIrp(Irp);
TraceLeave(SEND, "TdixSendDatagramComplete");
return STATUS_MORE_PROCESSING_REQUIRED;
#else
//
// Let the I/O manager release the IRP resources.
//
TraceLeave(SEND, "TdixSendDatagramComplete");
return STATUS_SUCCESS;
#endif
}
NTSTATUS
TdixReceiveIcmpDatagram(
IN PVOID pvTdiEventContext,
IN LONG lSourceAddressLen,
IN PVOID pvSourceAddress,
IN LONG plOptionsLeng,
IN PVOID pvOptions,
IN ULONG ulReceiveDatagramFlags,
IN ULONG ulBytesIndicated,
IN ULONG ulBytesAvailable,
OUT PULONG pulBytesTaken,
IN PVOID pvTsdu,
OUT IRP **ppIoRequestPacket
)
/*++
Routine Description
ClientEventReceiveDatagram indication handler for ICMP messages.
ICMP messages are used to monitor the state of the tunnel
We currently only look for Type 3 Code 4 messages (fragmentation
needed, but don't fragment bit is set). This is done to support
PATH MTU over tunnels.
We look at the IP header inside the ICMP packet. We see if it was an
IP in IP packet that caused this ICMP message, and if so we try and match
it to one of our TUNNELS.
Locks
Runs at DISPATCH IRQL.
Arguments
Return Value
NO_ERROR
--*/
{
PVOID pvData;
PIRP pIrp;
PIP_HEADER pOutHeader, pInHeader;
PICMP_HEADER pIcmpHdr;
ULARGE_INTEGER uliTunnelId;
PTA_IP_ADDRESS ptiaAddress;
PTUNNEL pTunnel;
ULONG ulOutHdrLen, ulDataLen, ulIcmpLen;
BOOLEAN bNonUnicast;
PICMP_HANDLER pfnHandler;
NTSTATUS nStatus;
pfnHandler = NULL;
//
// The TSDU is the data and NOT the MDL
//
pvData = (PVOID)pvTsdu;
//
// Figure out the tunnel for this receive
// Since the transport indicates atleast 128 bytes, we can safely read out
// the IP Header
//
RtAssert(ulBytesIndicated > sizeof(IP_HEADER));
pOutHeader = (PIP_HEADER)pvData;
RtAssert(pOutHeader->byProtocol is PROTO_ICMP);
RtAssert(pOutHeader->byVerLen >> 4 is IP_VERSION_4);
//
// Since the ICMP packet is small, we expect all the data to be
// give to us, instead of having to do a transfer data
//
ulDataLen = RtlUshortByteSwap(pOutHeader->wLength);
ulOutHdrLen = LengthOfIPHeader(pOutHeader);
if(ulDataLen < ulOutHdrLen + sizeof(ICMP_HEADER))
{
//
// Malformed packet. Doesnt have a inner header
//
Trace(RCV, ERROR,
("TdixReceiveIcmp: Packet %d.%d.%d.%d -> %d.%d.%d.%d had size %d\n",
PRINT_IPADDR(pOutHeader->dwSrc),
PRINT_IPADDR(pOutHeader->dwDest),
ulDataLen));
return STATUS_DATA_NOT_ACCEPTED;
}
//
// This cant be more than 128 (60 + 4)
//
RtAssert(ulBytesIndicated > ulOutHdrLen + sizeof(ICMP_HEADER));
pIcmpHdr = (PICMP_HEADER)((PBYTE)pOutHeader + ulOutHdrLen);
ulIcmpLen = ulDataLen - ulOutHdrLen;
//
// See if this is one of the types we are interested in
//
switch(pIcmpHdr->byType)
{
case ICMP_TYPE_DEST_UNREACHABLE:
{
//
// Only interested in codes 0 - 4
//
if(pIcmpHdr->byCode > ICMP_CODE_DGRAM_TOO_BIG)
{
return STATUS_DATA_NOT_ACCEPTED;
}
if(ulIcmpLen < (DEST_UNREACH_LENGTH + MIN_IP_HEADER_LENGTH))
{
//
// Not enough data to get at the tunnel
//
return STATUS_DATA_NOT_ACCEPTED;
}
pInHeader = (PIP_HEADER)((ULONG_PTR)pIcmpHdr + DEST_UNREACH_LENGTH);
pfnHandler = HandleDestUnreachable;
break;
}
case ICMP_TYPE_TIME_EXCEEDED:
{
if(ulIcmpLen < (TIME_EXCEED_LENGTH + MIN_IP_HEADER_LENGTH))
{
//
// Not enough data to get at the tunnel
//
return STATUS_DATA_NOT_ACCEPTED;
}
pInHeader = (PIP_HEADER)((PBYTE)pIcmpHdr + TIME_EXCEED_LENGTH);
pfnHandler = HandleTimeExceeded;
break;
}
case ICMP_TYPE_PARAM_PROBLEM:
default:
{
//
// Not interested in this
//
return STATUS_DATA_NOT_ACCEPTED;
}
}
//
// See if the packet that caused the ICMP was an IP in IP packet
//
if(pInHeader->byProtocol isnot PROTO_IPINIP)
{
//
// Someother packet caused this
//
return STATUS_DATA_NOT_ACCEPTED;
}
//
// See if we can find a tunnel associated with the original packet
// These defines depend upon a variable being named "uliTunnelId"
//
REMADDR = pInHeader->dwDest;
LOCALADDR = pInHeader->dwSrc;
//
// Make sure that the source address given and the IP Header are in
// synch
//
ptiaAddress = (PTA_IP_ADDRESS)pvSourceAddress;
//
// Bunch of checks to make sure the packet and the handler
// are telling us the same thing
//
RtAssert(lSourceAddressLen is sizeof(TA_IP_ADDRESS));
RtAssert(ptiaAddress->TAAddressCount is 1);
RtAssert(ptiaAddress->Address[0].AddressType is TDI_ADDRESS_TYPE_IP);
RtAssert(ptiaAddress->Address[0].AddressLength is TDI_ADDRESS_LENGTH_IP);
RtAssert(ptiaAddress->Address[0].Address[0].in_addr is pOutHeader->dwSrc);
//
// Find the TUNNEL. We need to acquire the tunnel lock
//
EnterReaderAtDpcLevel(&g_rwlTunnelLock);
pTunnel = FindTunnel(&uliTunnelId);
ExitReaderFromDpcLevel(&g_rwlTunnelLock);
if(pTunnel is NULL)
{
//
// Could not find a matching tunnel
//
return STATUS_DATA_NOT_ACCEPTED;
}
//
// Ok, so we have the tunnel and it is ref counted and locked
//
nStatus = pfnHandler(pTunnel,
pIcmpHdr,
pInHeader);
RtReleaseSpinLockFromDpcLevel(&(pTunnel->rlLock));
DereferenceTunnel(pTunnel);
return STATUS_SUCCESS;
}