mirror of https://github.com/tongzx/nt5src
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
3005 lines
97 KiB
3005 lines
97 KiB
// -*- mode: C++; tab-width: 4; indent-tabs-mode: nil -*- (for GNU Emacs)
|
|
//
|
|
// Copyright (c) 1985-2000 Microsoft Corporation
|
|
//
|
|
// This file is part of the Microsoft Research IPv6 Network Protocol Stack.
|
|
// You should have received a copy of the Microsoft End-User License Agreement
|
|
// for this software along with this release; see the file "license.txt".
|
|
// If not, please see http://www.research.microsoft.com/msripv6/license.htm,
|
|
// or write to Microsoft Research, One Microsoft Way, Redmond, WA 98052-6399.
|
|
//
|
|
// Abstract:
|
|
//
|
|
// Code for TCP connection management.
|
|
//
|
|
// This file contains the code handling TCP connection related requests,
|
|
// such as connecting and disconnecting.
|
|
//
|
|
|
|
|
|
#include "oscfg.h"
|
|
#include "ndis.h"
|
|
#include "ip6imp.h"
|
|
#include "ip6def.h"
|
|
#include "tdi.h"
|
|
#include "tdint.h"
|
|
#include "tdistat.h"
|
|
#include "queue.h"
|
|
#include "transprt.h"
|
|
#include "addr.h"
|
|
#include "tcp.h"
|
|
#include "tcb.h"
|
|
#include "tcpconn.h"
|
|
#include "tcpsend.h"
|
|
#include "tcprcv.h"
|
|
#include "tcpdeliv.h"
|
|
#include "info.h"
|
|
#include "tcpcfg.h"
|
|
#include "route.h"
|
|
#include "security.h"
|
|
#include "tcpmd5.h"
|
|
#include "md5.h"
|
|
#include "crypto\rc4.h"
|
|
#include "ntddksec.h"
|
|
|
|
SLIST_HEADER ConnReqFree; // Connection request free list.
|
|
|
|
//
|
|
// ISN globals.
|
|
//
|
|
#define ISN_KEY_SIZE 256 // 2048 bits.
|
|
#define ISN_DEF_RAND_STORE_SIZE 256
|
|
#define ISN_MIN_RAND_STORE_SIZE 1
|
|
#define ISN_MAX_RAND_STORE_SIZE 16384
|
|
|
|
|
|
typedef struct _ISN_RAND_STORE {
|
|
MD5_CONTEXT Md5Context;
|
|
ulong iBuf;
|
|
ushort* pBuf;
|
|
} ISN_RAND_STORE, *PISN_RAND_STORE;
|
|
|
|
RC4_KEYSTRUCT ISNRC4Key;
|
|
PISN_RAND_STORE ISNStore;
|
|
uint ISNStoreSize = ISN_DEF_RAND_STORE_SIZE;
|
|
uint ISNStoreMask;
|
|
SeqNum ISNMonotonicPortion = 0;
|
|
int ISNCredits;
|
|
int ISNLastIsnUpdateTime;
|
|
int ISNMaxCredits;
|
|
|
|
extern PDRIVER_OBJECT TCPDriverObject;
|
|
|
|
KSPIN_LOCK ConnReqFreeLock; // Lock to protect conn req free list.
|
|
uint NumConnReq; // Current number of ConnReqs.
|
|
uint MaxConnReq = 0xffffffff; // Maximum allowed number of ConnReqs.
|
|
uint ConnPerBlock = MAX_CONN_PER_BLOCK;
|
|
uint NextConnBlock = 0; // Cached index of next unfilled block.
|
|
uint MaxAllocatedConnBlocks = 0; // Current number of blocks in the
|
|
// ConnTable.
|
|
TCPConnBlock **ConnTable = NULL; // The current connection table.
|
|
|
|
KSPIN_LOCK ConnTableLock;
|
|
extern KSPIN_LOCK AddrObjTableLock;
|
|
extern KSPIN_LOCK TCBTableLock;
|
|
|
|
TCPAddrCheckElement *AddrCheckTable = NULL; // The current check table.
|
|
|
|
extern void RemoveConnFromAO(AddrObj *AO, TCPConn *Conn);
|
|
|
|
|
|
//
|
|
// All of the init code can be discarded.
|
|
//
|
|
#ifdef ALLOC_PRAGMA
|
|
|
|
int InitTCPConn(void);
|
|
int InitISNGenerator(void);
|
|
void UnloadISNGenerator(void);
|
|
int GetRandBits();
|
|
uint GetDeltaTime();
|
|
|
|
#pragma alloc_text(INIT, InitTCPConn)
|
|
#pragma alloc_text(INIT, InitISNGenerator)
|
|
#pragma alloc_text(PAGE, UnloadISNGenerator)
|
|
|
|
#endif // ALLOC_PRAGMA
|
|
|
|
void CompleteConnReq(TCB *CmpltTCB, TDI_STATUS Status);
|
|
|
|
|
|
//* UnloadISNGenerator - Unload the support for the ISN generator.
|
|
//
|
|
// Called when we are unloading the driver.
|
|
//
|
|
void // Returns: Nothing.
|
|
UnloadISNGenerator(void)
|
|
{
|
|
CCHAR i;
|
|
|
|
ASSERT(ISNStore);
|
|
|
|
for (i = 0; i < KeNumberProcessors; i++) {
|
|
if (ISNStore[i].pBuf != NULL) {
|
|
ExFreePool(ISNStore[i].pBuf);
|
|
ISNStore[i].pBuf = NULL;
|
|
}
|
|
}
|
|
ExFreePool(ISNStore);
|
|
ISNStore = NULL;
|
|
}
|
|
|
|
//* InitISNGenerator - Initialize the support for the ISN generator.
|
|
//
|
|
// Called when the driver is loaded. Get 2048 bits of randomness and
|
|
// use them to create an RC4 key.
|
|
//
|
|
int //Returns: TRUE if successful.
|
|
InitISNGenerator(void)
|
|
{
|
|
UNICODE_STRING DeviceName;
|
|
NTSTATUS NtStatus;
|
|
PFILE_OBJECT pFileObject;
|
|
PDEVICE_OBJECT pDeviceObject;
|
|
unsigned char pBuf[ISN_KEY_SIZE];
|
|
PIRP pIrp;
|
|
IO_STATUS_BLOCK ioStatusBlock;
|
|
KEVENT kEvent;
|
|
ULONG cBits = 0;
|
|
ULONG i;
|
|
ULONG cProcs = KeNumberProcessors;
|
|
ULONG ISNRandomValue;
|
|
|
|
//
|
|
// Start with the credits that would last for 1 tick.
|
|
//
|
|
ISNMaxCredits = ISNCredits = MAX_ISN_INCREMENTABLE_CONNECTIONS_PER_100MS;
|
|
ISNLastIsnUpdateTime = (int)X100NSTOMS(KeQueryInterruptTime());
|
|
|
|
|
|
//
|
|
// Request a block of random bits from the KSecDD driver.
|
|
// To do so, retrieve its device object pointer, build an I/O control
|
|
// request to be submitted to the driver, and submit the request.
|
|
// If any failure occurs, we fall back on the somewhat less-random
|
|
// approach of requesting the bits from the randlibk library.
|
|
//
|
|
|
|
do {
|
|
|
|
RtlInitUnicodeString(&DeviceName,
|
|
DD_KSEC_DEVICE_NAME_U);
|
|
|
|
KeInitializeEvent(&kEvent, SynchronizationEvent, FALSE);
|
|
|
|
//
|
|
// Get the file and device objects for KDSECDD,
|
|
// acquire a reference to the device-object,
|
|
// release the unneeded reference to the file-object,
|
|
// and build the I/O control request to issued to KSecDD.
|
|
//
|
|
|
|
NtStatus = IoGetDeviceObjectPointer(&DeviceName,
|
|
FILE_ALL_ACCESS,
|
|
&pFileObject,
|
|
&pDeviceObject);
|
|
|
|
if (!NT_SUCCESS(NtStatus)) {
|
|
KdPrintEx((DPFLTR_TCPIP6_ID, DPFLTR_INFO_RARE,
|
|
"Tcpip: IoGetDeviceObjectPointer(KSecDD)=%08x\n",
|
|
NtStatus));
|
|
break;
|
|
}
|
|
ObReferenceObject(pDeviceObject);
|
|
ObDereferenceObject(pFileObject);
|
|
|
|
pIrp = IoBuildDeviceIoControlRequest(IOCTL_KSEC_RNG,
|
|
pDeviceObject,
|
|
NULL, // No input buffer.
|
|
0,
|
|
pBuf, // Output buffer stores rng.
|
|
ISN_KEY_SIZE,
|
|
FALSE,
|
|
&kEvent,
|
|
&ioStatusBlock);
|
|
|
|
if (pIrp == NULL) {
|
|
ObDereferenceObject(pDeviceObject);
|
|
NtStatus = STATUS_UNSUCCESSFUL;
|
|
break;
|
|
}
|
|
//
|
|
// Issue the I/O control request, wait for it to complete
|
|
// if necessary, and release the reference to KSecDD's device-object.
|
|
//
|
|
NtStatus = IoCallDriver(pDeviceObject, pIrp);
|
|
|
|
if (NtStatus == STATUS_PENDING) {
|
|
KeWaitForSingleObject(&kEvent,
|
|
Executive,
|
|
KernelMode,
|
|
FALSE, // Not alertable.
|
|
NULL); // No timeout.
|
|
|
|
NtStatus = ioStatusBlock.Status;
|
|
}
|
|
ObDereferenceObject(pDeviceObject);
|
|
|
|
if (!NT_SUCCESS(NtStatus)) {
|
|
KdPrintEx((DPFLTR_TCPIP6_ID, DPFLTR_INFO_RARE,
|
|
"Tcpip: IoCallDriver IOCTL_KSEC_RNG failed %#x\n",
|
|
NtStatus));
|
|
break;
|
|
}
|
|
} while (FALSE);
|
|
|
|
if (!NT_SUCCESS(NtStatus)) {
|
|
return FALSE;
|
|
}
|
|
|
|
//
|
|
// Generate the key control structure.
|
|
//
|
|
rc4_key(&ISNRC4Key, ISN_KEY_SIZE, pBuf);
|
|
|
|
//
|
|
// Initalialize the current sequence number to a random value.
|
|
//
|
|
rc4(&ISNRC4Key, sizeof(SeqNum), (uchar*)&ISNMonotonicPortion);
|
|
|
|
//
|
|
// Obtain a random value to be used along with the invariants to compute the
|
|
// MD5 hash .
|
|
//
|
|
rc4(&ISNRC4Key, sizeof(ISNRandomValue), (uchar*)&ISNRandomValue);
|
|
|
|
//
|
|
// Round down the store size to power of 2. Verify in range.
|
|
//
|
|
|
|
while (ISNStoreSize = ISNStoreSize >> 1) {
|
|
cBits++;
|
|
}
|
|
|
|
ISNStoreSize = 1 << cBits;
|
|
|
|
if (ISNStoreSize < ISN_MIN_RAND_STORE_SIZE ||
|
|
ISNStoreSize > ISN_MAX_RAND_STORE_SIZE) {
|
|
ISNStoreSize = ISN_DEF_RAND_STORE_SIZE;
|
|
}
|
|
|
|
//
|
|
// The mask is store size - 1.
|
|
//
|
|
ISNStoreMask = ISNStoreSize - 1;
|
|
|
|
//
|
|
// Initialize the random ISN store. One array/index per processor.
|
|
//
|
|
|
|
ISNStore = ExAllocatePool(NonPagedPool, cProcs * sizeof(ISN_RAND_STORE));
|
|
|
|
if (ISNStore == NULL) {
|
|
KdPrintEx((DPFLTR_TCPIP6_ID, DPFLTR_INFO_RARE,
|
|
"Tcpip: failed to allocate ISN rand store\n"));
|
|
return FALSE;
|
|
}
|
|
RtlZeroMemory(ISNStore, sizeof(ISN_RAND_STORE) * cProcs);
|
|
|
|
for (i = 0; i < cProcs; i++) {
|
|
ISNStore[i].pBuf = ExAllocatePool(NonPagedPool, sizeof(ushort) * ISNStoreSize);
|
|
|
|
if (ISNStore[i].pBuf == NULL) {
|
|
goto error1;
|
|
}
|
|
rc4(&ISNRC4Key,
|
|
sizeof(ushort) * ISNStoreSize,
|
|
(uchar*)ISNStore[i].pBuf);
|
|
|
|
//
|
|
// Initialize structures required to call the MD5 transform.
|
|
//
|
|
|
|
MD5InitializeData(&ISNStore[i].Md5Context, ISNRandomValue);
|
|
}
|
|
|
|
return TRUE;
|
|
|
|
error1:
|
|
|
|
UnloadISNGenerator();
|
|
return FALSE;
|
|
}
|
|
|
|
|
|
//* GetRandomISN - Gets a random Initial Sequence Number.
|
|
//
|
|
// Called when an Initial Sequence Number (ISN) is needed. Calls crypto
|
|
// functions for random number generation.
|
|
//
|
|
void // Returns: Nothing.
|
|
GetRandomISN(
|
|
SeqNum *Seq, // Returned sequence number
|
|
uchar *TcbInvariants) // Connection invariants
|
|
{
|
|
ulong randbits;
|
|
ulong iProc;
|
|
KIRQL irql;
|
|
PMD5_CONTEXT Md5Context;
|
|
|
|
//
|
|
// Raise IRQL to DISPATCH so that we don't get swapped out while accessing
|
|
// the processor specific array. Check to see if already at DISPATCH
|
|
// before doing the work.
|
|
//
|
|
|
|
ASSERT(KeGetCurrentIrql() >= DISPATCH_LEVEL);
|
|
|
|
iProc = KeGetCurrentProcessorNumber();
|
|
|
|
//
|
|
// Add the random number only if the number of connections that can
|
|
// increment the sequence number within this time period is non zero.
|
|
// [Note: This could make the ISNCredits less than 0, but it is not a
|
|
// problem].
|
|
//
|
|
if ((ISNCredits > 0) && (InterlockedDecrement(&ISNCredits) > 0)) {
|
|
randbits = GetRandBits();
|
|
|
|
//
|
|
// We want to add between 16K and 32K of random, so adjust. There are
|
|
// 15 bits of randomness, just ensure that the high order bit is set
|
|
// and we have >= 16K and <= (32K-1)::14bits of randomness.
|
|
//
|
|
randbits &= 0x7FFF;
|
|
randbits |= 0x4000;
|
|
|
|
} else {
|
|
int Delta = GetDeltaTime();
|
|
|
|
if (Delta > 0) {
|
|
randbits = GetRandBits();
|
|
|
|
//
|
|
// We can add anywhere from 256 to 512 per ms.
|
|
//
|
|
randbits &= 0x1FF;
|
|
randbits |= 0x100;
|
|
|
|
randbits *= Delta;
|
|
} else {
|
|
randbits = 0;
|
|
}
|
|
}
|
|
|
|
//
|
|
// Update global CurISN. InterlockedExchangeAdd returns initial value
|
|
// (not the added value).
|
|
//
|
|
*Seq = InterlockedExchangeAdd(&ISNMonotonicPortion, randbits);
|
|
|
|
//
|
|
// Move the invariants from the connection.
|
|
//
|
|
Md5Context = &ISNStore[iProc].Md5Context;
|
|
MD5InitializeScratch(Md5Context);
|
|
RtlCopyMemory(Md5Context->Data, TcbInvariants, TCP_MD5_DATA_LENGTH);
|
|
TransformMD5(Md5Context->Scratch, Md5Context->Data);
|
|
|
|
//
|
|
// Add the Invariant hash to the sequence number.
|
|
//
|
|
*Seq += (ULONG)(Md5Context->Scratch[0]);
|
|
|
|
return;
|
|
}
|
|
|
|
|
|
//* GetRandBits
|
|
//
|
|
// Returns 16 random bits from the random number array generated using RC4.
|
|
// When the store is exhausted, it will be replenished.
|
|
//
|
|
int // Returns: 16 bits of random data.
|
|
GetRandBits()
|
|
{
|
|
ulong iStore;
|
|
int randbits;
|
|
ulong iProc = KeGetCurrentProcessorNumber();
|
|
|
|
//
|
|
// Get index into the random store. Mask performs mod operation.
|
|
//
|
|
iStore = ++ISNStore[iProc].iBuf & ISNStoreMask;
|
|
|
|
ASSERT(iStore < ISNStoreSize);
|
|
|
|
randbits = ISNStore[iProc].pBuf[iStore];
|
|
|
|
if (iStore == 0) {
|
|
rc4(&ISNRC4Key,
|
|
sizeof(ushort) * ISNStoreSize,
|
|
(uchar*) ISNStore[iProc].pBuf);
|
|
}
|
|
|
|
return randbits;
|
|
}
|
|
|
|
//* GetRandBits
|
|
//
|
|
// Tracks the time-based updates of ISN. It will return the time elapsed since
|
|
// the last time this function was called. This would be used by the caller to
|
|
// increment the ISN by an appropriate amount. Note that the maximum value
|
|
// is function returns is 200 MS.
|
|
//
|
|
uint // Returns: Delta time in milli-seconds.
|
|
GetDeltaTime()
|
|
{
|
|
//
|
|
// If the time has changed since the ISN was updated last time, it
|
|
// can be incremented now.
|
|
//
|
|
int PreviousUpdateTime, Delta;
|
|
int CurrentUpdateTime = (int)X100NSTOMS(KeQueryInterruptTime());
|
|
|
|
PreviousUpdateTime = InterlockedExchange(&ISNLastIsnUpdateTime,
|
|
CurrentUpdateTime);
|
|
|
|
Delta = CurrentUpdateTime - PreviousUpdateTime;
|
|
|
|
if (Delta > 0) {
|
|
return MIN(Delta, 200);
|
|
} else {
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
|
|
//
|
|
// Routines for handling conn refcount going to 0.
|
|
//
|
|
|
|
//* DummyDone - Called when nothing to do.
|
|
//
|
|
// Called with TCPConnBlock.cb_lock held.
|
|
//
|
|
void // Returns: Nothing.
|
|
DummyDone(TCPConn *Conn, // Connection going to 0.
|
|
KIRQL PreLockIrql) // IRQL prior to TCPConnBlock.cb_lock acquisition.
|
|
{
|
|
KeReleaseSpinLock(&Conn->tc_ConnBlock->cb_lock, PreLockIrql);
|
|
}
|
|
|
|
//* DummyCmplt - Dummy close completion routine.
|
|
void
|
|
DummyCmplt(PVOID Dummy1, uint Dummy2, uint Dummy3)
|
|
{
|
|
}
|
|
|
|
//* CloseDone - Called when we need to complete a close.
|
|
//
|
|
// Called with TCPConnBlock.cb_lock held.
|
|
//
|
|
void // Returns: Nothing.
|
|
CloseDone(TCPConn *Conn, // Connection going to 0.
|
|
KIRQL Irql0) // IRQL prior to TCPConnBlock.cb_lock acquisition.
|
|
{
|
|
RequestCompleteRoutine Rtn; // Completion routine.
|
|
PVOID Context; // User context for completion routine.
|
|
AddrObj *AO;
|
|
KIRQL Irql1, Irql2;
|
|
|
|
ASSERT(Conn->tc_flags & CONN_CLOSING);
|
|
|
|
Rtn = Conn->tc_rtn;
|
|
Context = Conn->tc_rtncontext;
|
|
KeReleaseSpinLock(&Conn->tc_ConnBlock->cb_lock, Irql0);
|
|
|
|
KeAcquireSpinLock(&AddrObjTableLock, &Irql0);
|
|
KeAcquireSpinLock(&Conn->tc_ConnBlock->cb_lock, &Irql1);
|
|
|
|
if ((AO = Conn->tc_ao) != NULL) {
|
|
|
|
CHECK_STRUCT(AO, ao);
|
|
|
|
// It's associated.
|
|
KeAcquireSpinLock(&AO->ao_lock, &Irql2);
|
|
RemoveConnFromAO(AO, Conn);
|
|
// We've pulled him from the AO, we can free the lock now.
|
|
KeReleaseSpinLock(&AO->ao_lock, Irql2);
|
|
}
|
|
|
|
KeReleaseSpinLock(&Conn->tc_ConnBlock->cb_lock, Irql1);
|
|
KeReleaseSpinLock(&AddrObjTableLock, Irql0);
|
|
|
|
ExFreePool(Conn);
|
|
|
|
(*Rtn)(Context, TDI_SUCCESS, 0);
|
|
}
|
|
|
|
//* DisassocDone - Called when we need to complete a disassociate.
|
|
//
|
|
// Called with TCPConnBlock.cb_lock held.
|
|
//
|
|
void // Returns: Nothing.
|
|
DisassocDone(TCPConn *Conn, // Connection going to 0.
|
|
KIRQL Irql0) // IRQL prior to TCPConnBlock.cb_lock acquisition.
|
|
{
|
|
RequestCompleteRoutine Rtn; // Completion routine.
|
|
PVOID Context; // User context for completion routine.
|
|
AddrObj *AO;
|
|
uint NeedClose = FALSE;
|
|
KIRQL Irql1, Irql2;
|
|
|
|
ASSERT(Conn->tc_flags & CONN_DISACC);
|
|
ASSERT(!(Conn->tc_flags & CONN_CLOSING));
|
|
ASSERT(Conn->tc_refcnt == 0);
|
|
|
|
Rtn = Conn->tc_rtn;
|
|
Context = Conn->tc_rtncontext;
|
|
Conn->tc_refcnt = 1;
|
|
KeReleaseSpinLock(&Conn->tc_ConnBlock->cb_lock, Irql0);
|
|
|
|
KeAcquireSpinLock(&AddrObjTableLock, &Irql0);
|
|
KeAcquireSpinLock(&Conn->tc_ConnBlock->cb_lock, &Irql1);
|
|
if (!(Conn->tc_flags & CONN_CLOSING)) {
|
|
|
|
AO = Conn->tc_ao;
|
|
if (AO != NULL) {
|
|
KeAcquireSpinLock(&AO->ao_lock, &Irql2);
|
|
RemoveConnFromAO(AO, Conn);
|
|
KeReleaseSpinLock(&AO->ao_lock, Irql2);
|
|
}
|
|
|
|
ASSERT(Conn->tc_refcnt == 1);
|
|
Conn->tc_flags &= ~CONN_DISACC;
|
|
} else
|
|
NeedClose = TRUE;
|
|
|
|
Conn->tc_refcnt = 0;
|
|
KeReleaseSpinLock(&AddrObjTableLock, Irql1);
|
|
|
|
if (NeedClose) {
|
|
CloseDone(Conn, Irql0);
|
|
} else {
|
|
KeReleaseSpinLock(&Conn->tc_ConnBlock->cb_lock, Irql0);
|
|
(*Rtn)(Context, TDI_SUCCESS, 0);
|
|
}
|
|
}
|
|
|
|
|
|
//* FreeConnReq - Free a connection request structure.
|
|
//
|
|
// Called to free a connection request structure.
|
|
//
|
|
void // Returns: Nothing.
|
|
FreeConnReq(
|
|
TCPConnReq *FreedReq) // Connection request structure to be freed.
|
|
{
|
|
PSLIST_ENTRY BufferLink;
|
|
|
|
CHECK_STRUCT(FreedReq, tcr);
|
|
|
|
BufferLink = CONTAINING_RECORD(&(FreedReq->tcr_req.tr_q.q_next),
|
|
SLIST_ENTRY, Next);
|
|
|
|
ExInterlockedPushEntrySList(&ConnReqFree, BufferLink, &ConnReqFreeLock);
|
|
}
|
|
|
|
|
|
//* GetConnReq - Get a connection request structure.
|
|
//
|
|
// Called to get a connection request structure.
|
|
//
|
|
TCPConnReq * // Returns: Pointer to ConnReq structure, or NULL if none.
|
|
GetConnReq(void) // Nothing.
|
|
{
|
|
TCPConnReq *Temp;
|
|
PSLIST_ENTRY BufferLink;
|
|
Queue *QueuePtr;
|
|
TCPReq *ReqPtr;
|
|
|
|
BufferLink = ExInterlockedPopEntrySList(&ConnReqFree, &ConnReqFreeLock);
|
|
|
|
if (BufferLink != NULL) {
|
|
QueuePtr = CONTAINING_RECORD(BufferLink, Queue, q_next);
|
|
ReqPtr = CONTAINING_RECORD(QueuePtr, TCPReq, tr_q);
|
|
Temp = CONTAINING_RECORD(ReqPtr, TCPConnReq, tcr_req);
|
|
CHECK_STRUCT(Temp, tcr);
|
|
} else {
|
|
if (NumConnReq < MaxConnReq)
|
|
Temp = ExAllocatePool(NonPagedPool, sizeof(TCPConnReq));
|
|
else
|
|
Temp = NULL;
|
|
|
|
if (Temp != NULL) {
|
|
ExInterlockedAddUlong(&NumConnReq, 1, &ConnReqFreeLock);
|
|
#if DBG
|
|
Temp->tcr_req.tr_sig = tr_signature;
|
|
Temp->tcr_sig = tcr_signature;
|
|
#endif
|
|
}
|
|
}
|
|
|
|
return Temp;
|
|
}
|
|
|
|
|
|
//* GetConnFromConnID - Get a Connection from a connection ID.
|
|
//
|
|
// Called to obtain a Connection pointer from a ConnID. We don't actually
|
|
// check the connection pointer here, but we do bounds check the input ConnID
|
|
// and make sure the instance fields match.
|
|
// If successful, returns with TCPConnBlock.cb_lock held.
|
|
//
|
|
TCPConn * // Returns: Pointer to the TCPConn, or NULL.
|
|
GetConnFromConnID(
|
|
uint ConnID, // Connection ID to find a pointer for.
|
|
KIRQL* Irql) // Receives IRQL prior to TCPConnBlock.cb_lock acquisition.
|
|
{
|
|
uint ConnIndex = CONN_INDEX(ConnID);
|
|
uint ConnBlockId = CONN_BLOCKID(ConnID);
|
|
TCPConn *MatchingConn = NULL;
|
|
TCPConnBlock *ConnBlock;
|
|
|
|
if (ConnIndex < MAX_CONN_PER_BLOCK && ConnBlockId < MaxAllocatedConnBlocks) {
|
|
|
|
ConnBlock = ConnTable[ConnBlockId];
|
|
if (ConnBlock) {
|
|
MatchingConn = ConnBlock->cb_conn[ConnIndex];
|
|
}
|
|
if (MatchingConn != NULL) {
|
|
KeAcquireSpinLock(&ConnBlock->cb_lock, Irql);
|
|
CHECK_STRUCT(MatchingConn, tc);
|
|
if (MatchingConn->tc_inst != CONN_INST(ConnID)) {
|
|
MatchingConn = NULL;
|
|
KeReleaseSpinLock(&ConnBlock->cb_lock, *Irql);
|
|
}
|
|
}
|
|
} else
|
|
MatchingConn = NULL;
|
|
|
|
return MatchingConn;
|
|
}
|
|
|
|
|
|
//* GetConnID - Get a ConnTable slot.
|
|
//
|
|
// Called during OpenConnection to find a free slot in the ConnTable and
|
|
// set it up with a connection.
|
|
// If successful, returns with TCPConnBlock.cb_lock held.
|
|
//
|
|
uint // Returns: A ConnId to use.
|
|
GetConnID(
|
|
TCPConn *NewConn, // Connection to enter into slot.
|
|
KIRQL *Irql0) // Receives IRQL prior to TCPConnBlock.cb_lock
|
|
// acquisition.
|
|
{
|
|
uint CurrConnID = NewConn->tc_connid;
|
|
uint i, j, BlockID, ConnIndex;
|
|
|
|
//
|
|
// If NewConn contains a valid ConnID and that location is unoccupied,
|
|
// reuse it.
|
|
//
|
|
if (CurrConnID != INVALID_CONN_ID &&
|
|
!NewConn->tc_ConnBlock->cb_conn[CONN_INDEX(CurrConnID)]) {
|
|
KeAcquireSpinLock(&NewConn->tc_ConnBlock->cb_lock, Irql0);
|
|
//
|
|
// Reconfirm under lock that the location is unoccupied and, if so,
|
|
// claim it.
|
|
//
|
|
if (!NewConn->tc_ConnBlock->cb_conn[CONN_INDEX(CurrConnID)]) {
|
|
NewConn->tc_ConnBlock->cb_conn[CONN_INDEX(CurrConnID)] = NewConn;
|
|
NewConn->tc_ConnBlock->cb_freecons--;
|
|
NewConn->tc_inst = NewConn->tc_ConnBlock->cb_conninst++;
|
|
NewConn->tc_connid = MAKE_CONN_ID(CONN_INDEX(CurrConnID),
|
|
NewConn->tc_ConnBlock->cb_blockid,
|
|
NewConn->tc_inst);
|
|
return NewConn->tc_connid;
|
|
}
|
|
KeReleaseSpinLock(&NewConn->tc_ConnBlock->cb_lock, *Irql0);
|
|
}
|
|
|
|
//
|
|
// NewConn's last spot is taken; search from the block from which
|
|
// a ConnID was claimed most recently.
|
|
//
|
|
if (MaxAllocatedConnBlocks) {
|
|
//
|
|
// Capture the global counters without acquiring the lock.
|
|
//
|
|
uint TempMaxAllocatedConnBlocks = MaxAllocatedConnBlocks;
|
|
uint TempNextConnBlock = NextConnBlock;
|
|
|
|
for (i = 0; i < TempMaxAllocatedConnBlocks; i++) {
|
|
BlockID = (TempNextConnBlock + i) % TempMaxAllocatedConnBlocks;
|
|
|
|
if (!ConnTable[BlockID]->cb_freecons) {
|
|
continue;
|
|
}
|
|
|
|
//
|
|
// Reconfirm under lock that the TCPConnBlock has free slots.
|
|
//
|
|
KeAcquireSpinLock(&ConnTable[BlockID]->cb_lock, Irql0);
|
|
if (!ConnTable[BlockID]->cb_freecons) {
|
|
KeReleaseSpinLock(&ConnTable[BlockID]->cb_lock, *Irql0);
|
|
continue;
|
|
}
|
|
for (j = 0; j < MAX_CONN_PER_BLOCK; j++) {
|
|
ConnIndex = (ConnTable[BlockID]->cb_nextfree + j) %
|
|
MAX_CONN_PER_BLOCK;
|
|
if (ConnTable[BlockID]->cb_conn[ConnIndex]) {
|
|
continue;
|
|
}
|
|
|
|
//
|
|
// Found the free slot; fill it in.
|
|
//
|
|
ConnTable[BlockID]->cb_conn[ConnIndex] = NewConn;
|
|
ConnTable[BlockID]->cb_nextfree = ConnIndex + 1;
|
|
ConnTable[BlockID]->cb_freecons--;
|
|
if (!ConnTable[BlockID]->cb_freecons) {
|
|
InterlockedCompareExchange(&NextConnBlock,
|
|
TempNextConnBlock,
|
|
TempNextConnBlock + 1);
|
|
}
|
|
NewConn->tc_ConnBlock = ConnTable[BlockID];
|
|
NewConn->tc_inst = ConnTable[BlockID]->cb_conninst++;
|
|
NewConn->tc_connid = MAKE_CONN_ID(ConnIndex, BlockID,
|
|
NewConn->tc_inst);
|
|
return NewConn->tc_connid;
|
|
}
|
|
KeReleaseSpinLock(&ConnTable[BlockID]->cb_lock, *Irql0);
|
|
}
|
|
}
|
|
|
|
//
|
|
// The entire table is occupied; if we have room to grow,
|
|
// allocate a new block.
|
|
//
|
|
|
|
KeAcquireSpinLock(&ConnTableLock, Irql0);
|
|
if (MaxAllocatedConnBlocks < MaxConnBlocks) {
|
|
TCPConnBlock* ConnBlock;
|
|
BlockID = MaxAllocatedConnBlocks;
|
|
ConnBlock = ExAllocatePool(NonPagedPool, sizeof(TCPConnBlock));
|
|
if (ConnBlock) {
|
|
RtlZeroMemory(ConnBlock, sizeof(TCPConnBlock));
|
|
KeInitializeSpinLock(&ConnBlock->cb_lock);
|
|
|
|
KeAcquireSpinLockAtDpcLevel(&ConnBlock->cb_lock);
|
|
|
|
ConnBlock->cb_blockid = BlockID;
|
|
ConnBlock->cb_freecons = MAX_CONN_PER_BLOCK - 1;
|
|
ConnBlock->cb_nextfree = 1;
|
|
ConnBlock->cb_conninst = 2;
|
|
ConnBlock->cb_conn[0] = NewConn;
|
|
|
|
NewConn->tc_ConnBlock = ConnBlock;
|
|
NewConn->tc_inst = 1;
|
|
NewConn->tc_connid = MAKE_CONN_ID(0, BlockID, NewConn->tc_inst);
|
|
|
|
ConnTable[BlockID] = ConnBlock;
|
|
InterlockedIncrement(&MaxAllocatedConnBlocks);
|
|
|
|
KeReleaseSpinLockFromDpcLevel(&ConnTableLock);
|
|
|
|
return NewConn->tc_connid;
|
|
}
|
|
}
|
|
|
|
KeReleaseSpinLock(&ConnTableLock, *Irql0);
|
|
return INVALID_CONN_ID;
|
|
}
|
|
|
|
|
|
//* FreeConnID - Free a ConnTable slot.
|
|
//
|
|
// Called when we're done with a ConnID. We assume the caller holds the lock
|
|
// on the TCPConnBlock when we are called.
|
|
//
|
|
void // Returns: Nothing.
|
|
FreeConnID(
|
|
TCPConn *Conn) // Conn to be freed.
|
|
{
|
|
uint ConnIndex = CONN_INDEX(Conn->tc_connid); // Index into conn table.
|
|
uint BlockID = CONN_BLOCKID(Conn->tc_connid);
|
|
TCPConnBlock* ConnBlock = Conn->tc_ConnBlock;
|
|
|
|
ASSERT(ConnIndex < MAX_CONN_PER_BLOCK);
|
|
ASSERT(BlockID < MaxAllocatedConnBlocks);
|
|
ASSERT(ConnBlock->cb_conn[ConnIndex] != NULL);
|
|
|
|
if (ConnBlock->cb_conn[ConnIndex]) {
|
|
ConnBlock->cb_conn[ConnIndex] = NULL;
|
|
ConnBlock->cb_freecons++;
|
|
ConnBlock->cb_nextfree = ConnIndex;
|
|
ASSERT(ConnBlock->cb_freecons <= MAX_CONN_PER_BLOCK);
|
|
} else {
|
|
ASSERT(0);
|
|
}
|
|
}
|
|
|
|
|
|
//* MapIPError - Map an IP error to a TDI error.
|
|
//
|
|
// Called to map an input IP error code to a TDI error code. If we can't,
|
|
// we return the provided default.
|
|
//
|
|
TDI_STATUS // Returns: Mapped TDI error.
|
|
MapIPError(
|
|
IP_STATUS IPError, // Error code to be mapped.
|
|
TDI_STATUS Default) // Default error code to return.
|
|
{
|
|
switch (IPError) {
|
|
|
|
case IP_DEST_NO_ROUTE:
|
|
return TDI_DEST_NET_UNREACH;
|
|
case IP_DEST_ADDR_UNREACHABLE:
|
|
return TDI_DEST_HOST_UNREACH;
|
|
case IP_UNRECOGNIZED_NEXT_HEADER:
|
|
return TDI_DEST_PROT_UNREACH;
|
|
case IP_DEST_PORT_UNREACHABLE:
|
|
return TDI_DEST_PORT_UNREACH;
|
|
default:
|
|
return Default;
|
|
}
|
|
}
|
|
|
|
|
|
//* FinishRemoveTCBFromConn - Finish removing a TCB from a conn structure.
|
|
//
|
|
// Called when we have the locks we need and we just want to pull the
|
|
// TCB off the connection.
|
|
//
|
|
void // Returns: Nothing.
|
|
FinishRemoveTCBFromConn(
|
|
TCB *RemovedTCB) // TCB to be removed.
|
|
{
|
|
TCPConn *Conn;
|
|
AddrObj *AO;
|
|
KIRQL Irql;
|
|
TCPConnBlock *ConnBlock = NULL;
|
|
|
|
if (((Conn = RemovedTCB->tcb_conn) != NULL) &&
|
|
(Conn->tc_tcb == RemovedTCB)) {
|
|
CHECK_STRUCT(Conn, tc);
|
|
ConnBlock = Conn->tc_ConnBlock;
|
|
|
|
KeAcquireSpinLock(&ConnBlock->cb_lock, &Irql);
|
|
|
|
AO = Conn->tc_ao;
|
|
|
|
if (AO != NULL) {
|
|
KeAcquireSpinLockAtDpcLevel(&AO->ao_lock);
|
|
if (AO_VALID(AO)) {
|
|
KeAcquireSpinLockAtDpcLevel(&RemovedTCB->tcb_lock);
|
|
|
|
// Need to double check this is still correct.
|
|
|
|
if (Conn == RemovedTCB->tcb_conn) {
|
|
// Everything still looks good.
|
|
REMOVEQ(&Conn->tc_q);
|
|
PUSHQ(&AO->ao_idleq, &Conn->tc_q);
|
|
} else
|
|
Conn = RemovedTCB->tcb_conn;
|
|
} else {
|
|
KeAcquireSpinLockAtDpcLevel(&RemovedTCB->tcb_lock);
|
|
Conn = RemovedTCB->tcb_conn;
|
|
}
|
|
|
|
KeReleaseSpinLockFromDpcLevel(&AO->ao_lock);
|
|
} else {
|
|
KeAcquireSpinLockAtDpcLevel(&RemovedTCB->tcb_lock);
|
|
Conn = RemovedTCB->tcb_conn;
|
|
}
|
|
|
|
if (Conn != NULL) {
|
|
if (Conn->tc_tcb == RemovedTCB)
|
|
Conn->tc_tcb = NULL;
|
|
else
|
|
ASSERT(Conn->tc_tcb == NULL);
|
|
}
|
|
|
|
KeReleaseSpinLockFromDpcLevel(&RemovedTCB->tcb_lock);
|
|
KeReleaseSpinLock(&ConnBlock->cb_lock, Irql);
|
|
}
|
|
}
|
|
|
|
|
|
//* RemoveTCBFromConn - Remove a TCB from a Conn structure.
|
|
//
|
|
// Called when we need to disassociate a TCB from a connection structure.
|
|
// All we do is get the appropriate locks and call FinishRemoveTCBFromConn.
|
|
//
|
|
void // Returns: Nothing.
|
|
RemoveTCBFromConn(
|
|
TCB *RemovedTCB) // TCB to be removed.
|
|
{
|
|
CHECK_STRUCT(RemovedTCB, tcb);
|
|
|
|
FinishRemoveTCBFromConn(RemovedTCB);
|
|
}
|
|
|
|
|
|
//* RemoveConnFromTCB - Remove a conn from a TCB.
|
|
//
|
|
// Called when we want to break the final association between a connection
|
|
// and a TCB.
|
|
//
|
|
void // Returns: Nothing.
|
|
RemoveConnFromTCB(
|
|
TCB *RemoveTCB) // TCB to be removed.
|
|
{
|
|
ConnDoneRtn DoneRtn = NULL;
|
|
KIRQL Irql;
|
|
TCPConn *Conn;
|
|
|
|
if ((Conn = RemoveTCB->tcb_conn) != NULL) {
|
|
KeAcquireSpinLock(&Conn->tc_ConnBlock->cb_lock, &Irql);
|
|
KeAcquireSpinLockAtDpcLevel(&RemoveTCB->tcb_lock);
|
|
|
|
CHECK_STRUCT(Conn, tc);
|
|
|
|
if (--(Conn->tc_refcnt) == 0)
|
|
DoneRtn = Conn->tc_donertn;
|
|
|
|
RemoveTCB->tcb_conn = NULL;
|
|
KeReleaseSpinLockFromDpcLevel(&RemoveTCB->tcb_lock);
|
|
}
|
|
|
|
if (DoneRtn != NULL)
|
|
(*DoneRtn)(Conn, Irql);
|
|
else if (Conn) {
|
|
KeReleaseSpinLock(&Conn->tc_ConnBlock->cb_lock, Irql);
|
|
}
|
|
}
|
|
|
|
|
|
//* CloseTCB - Close a TCB.
|
|
//
|
|
// Called when we are done with a TCB, and want to free it. We'll remove
|
|
// him from any tables that he's in, and destroy any outstanding requests.
|
|
//
|
|
void // Returns: Nothing.
|
|
CloseTCB(
|
|
TCB *ClosedTCB, // TCB to be closed.
|
|
KIRQL OldIrql) // IRQL prior to acquiring TCB lock.
|
|
{
|
|
uchar OrigState = ClosedTCB->tcb_state;
|
|
TDI_STATUS Status;
|
|
uint OKToFree;
|
|
|
|
CHECK_STRUCT(ClosedTCB, tcb);
|
|
ASSERT(ClosedTCB->tcb_refcnt == 0);
|
|
ASSERT(ClosedTCB->tcb_state != TCB_CLOSED);
|
|
ASSERT(ClosedTCB->tcb_pending & DEL_PENDING);
|
|
|
|
//
|
|
// We'll check to make sure that our state isn't CLOSED. This should never
|
|
// happen, since nobody should call TryToCloseTCB when the state is
|
|
// closed, or take the reference count if we're closing. Nevertheless,
|
|
// we'll double check as a safety measure.
|
|
//
|
|
if (ClosedTCB->tcb_state == TCB_CLOSED) {
|
|
KeReleaseSpinLock(&ClosedTCB->tcb_lock, OldIrql);
|
|
return;
|
|
}
|
|
|
|
//
|
|
// Update SNMP counters. If we're in SYN-SENT or SYN-RCVD, this is a
|
|
// failed connection attempt. If we're in ESTABLISED or CLOSE-WAIT,
|
|
// treat this as an 'Established Reset' event.
|
|
//
|
|
if (ClosedTCB->tcb_state == TCB_SYN_SENT ||
|
|
ClosedTCB->tcb_state == TCB_SYN_RCVD)
|
|
TStats.ts_attemptfails++;
|
|
else
|
|
if (ClosedTCB->tcb_state == TCB_ESTAB ||
|
|
ClosedTCB->tcb_state == TCB_CLOSE_WAIT) {
|
|
TStats.ts_estabresets++;
|
|
TStats.ts_currestab--;
|
|
ASSERT(*(int *)&TStats.ts_currestab >= 0);
|
|
}
|
|
|
|
ClosedTCB->tcb_state = TCB_CLOSED;
|
|
KeReleaseSpinLockFromDpcLevel(&ClosedTCB->tcb_lock);
|
|
|
|
//
|
|
// Remove the TCB from it's associated TCPConn structure, if it has one.
|
|
//
|
|
FinishRemoveTCBFromConn(ClosedTCB);
|
|
|
|
KeAcquireSpinLockAtDpcLevel(&TCBTableLock);
|
|
KeAcquireSpinLockAtDpcLevel(&ClosedTCB->tcb_lock);
|
|
|
|
OKToFree = RemoveTCB(ClosedTCB);
|
|
|
|
//
|
|
// He's been pulled from the appropriate places so nobody can find him.
|
|
// Free the locks, and proceed to destroy any requests, etc.
|
|
//
|
|
KeReleaseSpinLockFromDpcLevel(&ClosedTCB->tcb_lock);
|
|
KeReleaseSpinLock(&TCBTableLock, OldIrql);
|
|
|
|
if (SYNC_STATE(OrigState) && !GRACEFUL_CLOSED_STATE(OrigState)) {
|
|
if (ClosedTCB->tcb_flags & NEED_RST)
|
|
SendRSTFromTCB(ClosedTCB);
|
|
}
|
|
|
|
//
|
|
// REVIEW: Is this the right place to drop the reference on our RCE?
|
|
// REVIEW: The IPv4 code called down to IP to close the RCE here.
|
|
//
|
|
if (ClosedTCB->tcb_rce != NULL)
|
|
ReleaseRCE(ClosedTCB->tcb_rce);
|
|
|
|
if (ClosedTCB->tcb_closereason & TCB_CLOSE_RST)
|
|
Status = TDI_CONNECTION_RESET;
|
|
else if (ClosedTCB->tcb_closereason & TCB_CLOSE_ABORTED)
|
|
Status = TDI_CONNECTION_ABORTED;
|
|
else if (ClosedTCB->tcb_closereason & TCB_CLOSE_TIMEOUT)
|
|
Status = MapIPError(ClosedTCB->tcb_error, TDI_TIMED_OUT);
|
|
else if (ClosedTCB->tcb_closereason & TCB_CLOSE_REFUSED)
|
|
Status = TDI_CONN_REFUSED;
|
|
else if (ClosedTCB->tcb_closereason & TCB_CLOSE_UNREACH)
|
|
Status = MapIPError(ClosedTCB->tcb_error, TDI_DEST_UNREACHABLE);
|
|
else
|
|
Status = TDI_SUCCESS;
|
|
|
|
//
|
|
// Now complete any outstanding requests on the TCB.
|
|
//
|
|
if (ClosedTCB->tcb_connreq != NULL) {
|
|
TCPConnReq *ConnReq = ClosedTCB->tcb_connreq;
|
|
|
|
CHECK_STRUCT(ConnReq, tcr);
|
|
|
|
(*ConnReq->tcr_req.tr_rtn)(ConnReq->tcr_req.tr_context, Status, 0);
|
|
FreeConnReq(ConnReq);
|
|
}
|
|
|
|
if (ClosedTCB->tcb_discwait != NULL) {
|
|
TCPConnReq *ConnReq = ClosedTCB->tcb_discwait;
|
|
|
|
CHECK_STRUCT(ConnReq, tcr);
|
|
|
|
(*ConnReq->tcr_req.tr_rtn)(ConnReq->tcr_req.tr_context, Status, 0);
|
|
FreeConnReq(ConnReq);
|
|
}
|
|
|
|
while (!EMPTYQ(&ClosedTCB->tcb_sendq)) {
|
|
TCPReq *Req;
|
|
TCPSendReq *SendReq;
|
|
long Result;
|
|
|
|
DEQUEUE(&ClosedTCB->tcb_sendq, Req, TCPReq, tr_q);
|
|
|
|
CHECK_STRUCT(Req, tr);
|
|
SendReq = (TCPSendReq *)Req;
|
|
CHECK_STRUCT(SendReq, tsr);
|
|
|
|
//
|
|
// Decrement the initial reference put on the buffer when it was
|
|
// allocated. This reference would have been decremented if the
|
|
// send had been acknowledged, but then the send would not still
|
|
// be on the tcb_sendq.
|
|
//
|
|
Result = InterlockedDecrement(&(SendReq->tsr_refcnt));
|
|
|
|
ASSERT(Result >= 0);
|
|
|
|
if (Result <= 0) {
|
|
// If we've sent directly from this send, NULL out the next
|
|
// pointer for the last buffer in the chain.
|
|
if (SendReq->tsr_lastbuf != NULL) {
|
|
NDIS_BUFFER_LINKAGE(SendReq->tsr_lastbuf) = NULL;
|
|
SendReq->tsr_lastbuf = NULL;
|
|
}
|
|
|
|
(*Req->tr_rtn)(Req->tr_context, Status, 0);
|
|
FreeSendReq(SendReq);
|
|
} else {
|
|
// The send request will be freed when all outstanding references
|
|
// to it have completed.
|
|
SendReq->tsr_req.tr_status = Status;
|
|
}
|
|
}
|
|
|
|
while (ClosedTCB->tcb_rcvhead != NULL) {
|
|
TCPRcvReq *RcvReq;
|
|
|
|
RcvReq = ClosedTCB->tcb_rcvhead;
|
|
CHECK_STRUCT(RcvReq, trr);
|
|
ClosedTCB->tcb_rcvhead = RcvReq->trr_next;
|
|
(*RcvReq->trr_rtn)(RcvReq->trr_context, Status, 0);
|
|
FreeRcvReq(RcvReq);
|
|
}
|
|
|
|
while (ClosedTCB->tcb_exprcv != NULL) {
|
|
TCPRcvReq *RcvReq;
|
|
|
|
RcvReq = ClosedTCB->tcb_exprcv;
|
|
CHECK_STRUCT(RcvReq, trr);
|
|
ClosedTCB->tcb_exprcv = RcvReq->trr_next;
|
|
(*RcvReq->trr_rtn)(RcvReq->trr_context, Status, 0);
|
|
FreeRcvReq(RcvReq);
|
|
}
|
|
|
|
if (ClosedTCB->tcb_pendhead != NULL)
|
|
FreePacketChain(ClosedTCB->tcb_pendhead);
|
|
|
|
if (ClosedTCB->tcb_urgpending != NULL)
|
|
FreePacketChain(ClosedTCB->tcb_urgpending);
|
|
|
|
while (ClosedTCB->tcb_raq != NULL) {
|
|
TCPRAHdr *Hdr;
|
|
|
|
Hdr = ClosedTCB->tcb_raq;
|
|
CHECK_STRUCT(Hdr, trh);
|
|
ClosedTCB->tcb_raq = Hdr->trh_next;
|
|
if (Hdr->trh_buffer != NULL)
|
|
FreePacketChain(Hdr->trh_buffer);
|
|
|
|
ExFreePool(Hdr);
|
|
}
|
|
|
|
RemoveConnFromTCB(ClosedTCB);
|
|
|
|
if (OKToFree) {
|
|
FreeTCB(ClosedTCB);
|
|
} else {
|
|
KeAcquireSpinLock(&TCBTableLock, &OldIrql);
|
|
ClosedTCB->tcb_walkcount--;
|
|
if (ClosedTCB->tcb_walkcount == 0) {
|
|
FreeTCB(ClosedTCB);
|
|
}
|
|
KeReleaseSpinLock(&TCBTableLock, OldIrql);
|
|
}
|
|
}
|
|
|
|
|
|
//* TryToCloseTCB - Try to close a TCB.
|
|
//
|
|
// Called when we need to close a TCB, but don't know if we can.
|
|
// If the reference count is 0, we'll call CloseTCB to deal with it.
|
|
// Otherwise we'll set the DELETE_PENDING bit and deal with it when the
|
|
// ref. count goes to 0. We assume the TCB is locked when we are called.
|
|
//
|
|
void // Returns: Nothing.
|
|
TryToCloseTCB (
|
|
TCB *ClosedTCB, // TCB to be closed.
|
|
uchar Reason, // Reason we're closing.
|
|
KIRQL PreLockIrql) // IRQL prior to acquiring the TCB lock.
|
|
{
|
|
CHECK_STRUCT(ClosedTCB, tcb);
|
|
ASSERT(ClosedTCB->tcb_state != TCB_CLOSED);
|
|
|
|
ClosedTCB->tcb_closereason |= Reason;
|
|
|
|
if (ClosedTCB->tcb_pending & DEL_PENDING) {
|
|
KeReleaseSpinLock(&ClosedTCB->tcb_lock, PreLockIrql);
|
|
return;
|
|
}
|
|
|
|
ClosedTCB->tcb_pending |= DEL_PENDING;
|
|
ClosedTCB->tcb_slowcount++;
|
|
ClosedTCB->tcb_fastchk |= TCP_FLAG_SLOW;
|
|
|
|
if (ClosedTCB->tcb_refcnt == 0)
|
|
CloseTCB(ClosedTCB, PreLockIrql);
|
|
else {
|
|
KeReleaseSpinLock(&ClosedTCB->tcb_lock, PreLockIrql);
|
|
}
|
|
}
|
|
|
|
|
|
//* DerefTCB - Dereference a TCB.
|
|
//
|
|
// Called when we're done with a TCB, and want to let exclusive user
|
|
// have a shot. We dec. the refcount, and if it goes to zero and there
|
|
// are pending actions, we'll perform one of the pending actions.
|
|
//
|
|
void // Returns: Nothing.
|
|
DerefTCB(
|
|
TCB *DoneTCB, // TCB to be dereffed.
|
|
KIRQL PreLockIrql) // IRQL prior to acquiring the TCB lock.
|
|
{
|
|
|
|
ASSERT(DoneTCB->tcb_refcnt != 0);
|
|
if (--DoneTCB->tcb_refcnt == 0) {
|
|
if (DoneTCB->tcb_pending == 0) {
|
|
KeReleaseSpinLock(&DoneTCB->tcb_lock, PreLockIrql);
|
|
return;
|
|
} else {
|
|
if (DoneTCB->tcb_pending & DEL_PENDING)
|
|
CloseTCB(DoneTCB, PreLockIrql);
|
|
else
|
|
DbgBreakPoint(); // Fatal condition.
|
|
return;
|
|
}
|
|
}
|
|
|
|
KeReleaseSpinLock(&DoneTCB->tcb_lock, PreLockIrql);
|
|
return;
|
|
}
|
|
|
|
|
|
//* CalculateMSSForTCB - Update MSS, etc. after PMTU changes.
|
|
//
|
|
// Calculate our connection's MSS based on our PMTU, the sizes
|
|
// of various headers, and the remote side's advertised MSS.
|
|
// It's expected that this routine will be called whenever
|
|
// our cached copy of the PMTU has been updated to a new value.
|
|
//
|
|
void
|
|
CalculateMSSForTCB(
|
|
TCB *ThisTCB) // The TCB we're running our calculations on.
|
|
{
|
|
uint PMTU;
|
|
IPSecProc *IPSecToDo;
|
|
uint TrailerLength = 0;
|
|
uint IPSecBytes = 0;
|
|
uint Dummy;
|
|
|
|
ASSERT(ThisTCB->tcb_pmtu != 0); // Should be set before entering.
|
|
|
|
//
|
|
// First check that the PMTU size is reasonable. IP won't
|
|
// let it get below minimum, but we have our own maximum since
|
|
// currently TCP can only handle an MSS that fits in 16 bits.
|
|
// TBD: If we add IPv6 Jumbogram support, we should also add LFN
|
|
// TBD: support to TCP and change this to handle a larger MSS.
|
|
//
|
|
PMTU = ThisTCB->tcb_pmtu;
|
|
if (PMTU > 65535) {
|
|
KdPrintEx((DPFLTR_TCPIP6_ID, DPFLTR_INFO_RARE,
|
|
"TCPSend: PMTU update value too large %u\n", PMTU));
|
|
PMTU = 65535;
|
|
}
|
|
|
|
//
|
|
// Determine size of IPSec headers, if any.
|
|
//
|
|
IPSecToDo = OutboundSPLookup(&ThisTCB->tcb_saddr, &ThisTCB->tcb_daddr,
|
|
IP_PROTOCOL_TCP,
|
|
net_short(ThisTCB->tcb_sport),
|
|
net_short(ThisTCB->tcb_dport),
|
|
ThisTCB->tcb_rce->NTE->IF, &Dummy);
|
|
if (IPSecToDo != NULL) {
|
|
//
|
|
// Calculate the space needed for the IPSec headers.
|
|
//
|
|
IPSecBytes = IPSecBytesToInsert(IPSecToDo, &Dummy, &TrailerLength);
|
|
FreeIPSecToDo(IPSecToDo, IPSecToDo->BundleSize);
|
|
IPSecBytes += TrailerLength;
|
|
}
|
|
IF_TCPDBG(TCP_DEBUG_MSS) {
|
|
KdPrintEx((DPFLTR_TCPIP6_ID, DPFLTR_INFO_TCPDBG,
|
|
"CalculateMSSForTCB: IPSecBytes is %u\n", IPSecBytes));
|
|
}
|
|
|
|
//
|
|
// Subtract out the header sizes to yield the TCP MSS.
|
|
// If there is an ESP trailer on this connection, round down
|
|
// the MSS to allow the trailer to end on a 4-byte boundary.
|
|
//
|
|
PMTU -= sizeof(IPv6Header) + sizeof(TCPHeader) + IPSecBytes;
|
|
if (TrailerLength)
|
|
PMTU -= (PMTU & 3);
|
|
|
|
//
|
|
// Don't let MSS exceed what our peer advertised, regardless of how
|
|
// large the Path MTU is.
|
|
//
|
|
IF_TCPDBG(TCP_DEBUG_MSS) {
|
|
KdPrintEx((DPFLTR_TCPIP6_ID, DPFLTR_INFO_TCPDBG,
|
|
"CalculateMSSForTCB: Old MSS is %u ", ThisTCB->tcb_mss));
|
|
}
|
|
ThisTCB->tcb_mss = (ushort)MIN(PMTU, ThisTCB->tcb_remmss);
|
|
IF_TCPDBG(TCP_DEBUG_MSS) {
|
|
KdPrintEx((DPFLTR_TCPIP6_ID, DPFLTR_INFO_TCPDBG,
|
|
"New MSS is %u\n", ThisTCB->tcb_mss));
|
|
}
|
|
|
|
ASSERT(ThisTCB->tcb_mss != 0);
|
|
|
|
//
|
|
// We don't want our Congestion Window to be smaller than one maximum
|
|
// segment, so we may need to increase it when our MSS grows.
|
|
//
|
|
if (ThisTCB->tcb_cwin < ThisTCB->tcb_mss) {
|
|
ThisTCB->tcb_cwin = ThisTCB->tcb_mss;
|
|
|
|
//
|
|
// Make sure the slow start threshold is at
|
|
// least 2 segments.
|
|
//
|
|
if (ThisTCB->tcb_ssthresh < ((uint) ThisTCB->tcb_mss * 2)) {
|
|
ThisTCB->tcb_ssthresh = ThisTCB->tcb_mss * 2;
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
//** TdiOpenConnection - Open a connection.
|
|
//
|
|
// This is the TDI Open Connection entry point. We open a connection,
|
|
// and save the caller's connection context. A TCPConn structure is allocated
|
|
// here, but a TCB isn't allocated until the Connect or Listen is done.
|
|
//
|
|
TDI_STATUS // Returns: Status of attempt to open connection.
|
|
TdiOpenConnection(
|
|
PTDI_REQUEST Request, // This TDI request.
|
|
PVOID Context) // Connection context to be save for connection.
|
|
{
|
|
TCPConn *NewConn; // The newly opened connection.
|
|
KIRQL OldIrql; // Irql prior to acquiring TCPConnBlock lock.
|
|
uint ConnID; // New ConnID.
|
|
TDI_STATUS Status; // Status of this request.
|
|
|
|
NewConn = ExAllocatePool(NonPagedPool, sizeof(TCPConn));
|
|
|
|
if (NewConn != NULL) {
|
|
//
|
|
// We allocated a connection.
|
|
//
|
|
RtlZeroMemory(NewConn, sizeof(TCPConn));
|
|
#if DBG
|
|
NewConn->tc_sig = tc_signature;
|
|
#endif
|
|
NewConn->tc_tcb = NULL;
|
|
NewConn->tc_ao = NULL;
|
|
NewConn->tc_context = Context;
|
|
NewConn->tc_connid = INVALID_CONN_ID;
|
|
|
|
ConnID = GetConnID(NewConn, &OldIrql);
|
|
if (ConnID != INVALID_CONN_ID) {
|
|
//
|
|
// We successfully got a ConnID.
|
|
//
|
|
Request->Handle.ConnectionContext = (CONNECTION_CONTEXT)UIntToPtr(ConnID);
|
|
NewConn->tc_refcnt = 0;
|
|
NewConn->tc_flags = 0;
|
|
NewConn->tc_tcbflags = NAGLING | (BSDUrgent ? BSD_URGENT : 0);
|
|
if (DefaultRcvWin != 0) {
|
|
NewConn->tc_window = DefaultRcvWin;
|
|
NewConn->tc_flags |= CONN_WINSET;
|
|
} else
|
|
NewConn->tc_window = DEFAULT_RCV_WIN;
|
|
|
|
NewConn->tc_donertn = DummyDone;
|
|
NewConn->tc_owningpid = HandleToUlong(PsGetCurrentProcessId());
|
|
Status = TDI_SUCCESS;
|
|
KeReleaseSpinLock(&NewConn->tc_ConnBlock->cb_lock, OldIrql);
|
|
} else {
|
|
ExFreePool(NewConn);
|
|
Status = TDI_NO_RESOURCES;
|
|
}
|
|
|
|
return Status;
|
|
}
|
|
|
|
//
|
|
// Couldn't get a connection.
|
|
//
|
|
return TDI_NO_RESOURCES;
|
|
}
|
|
|
|
|
|
//* RemoveConnFromAO - Remove a connection from an AddrObj.
|
|
//
|
|
// A little utility routine to remove a connection from an AddrObj.
|
|
// We run down the connections on the AO, and when we find him we splice
|
|
// him out. We assume the caller holds the locks on the AddrObj and the
|
|
// TCPConnBlock lock.
|
|
//
|
|
void // Returns: Nothing.
|
|
RemoveConnFromAO(
|
|
AddrObj *AO, // AddrObj to remove from.
|
|
TCPConn *Conn) // Conn to remove.
|
|
{
|
|
CHECK_STRUCT(AO, ao);
|
|
CHECK_STRUCT(Conn, tc);
|
|
|
|
REMOVEQ(&Conn->tc_q);
|
|
Conn->tc_ao = NULL;
|
|
}
|
|
|
|
|
|
//* TdiCloseConnection - Close a connection.
|
|
//
|
|
// Called when the user is done with a connection, and wants to close it.
|
|
// We look the connection up in our table, and if we find it we'll remove
|
|
// the connection from the AddrObj it's associate with (if any). If there's
|
|
// a TCB associated with the connection we'll close it also.
|
|
//
|
|
// There are some interesting wrinkles related to closing while a TCB
|
|
// is still referencing the connection (i.e. tc_refcnt != 0) or while a
|
|
// disassociate address is in progress. See below for more details.
|
|
//
|
|
TDI_STATUS // Returns: Status of attempt to close.
|
|
TdiCloseConnection(
|
|
PTDI_REQUEST Request) // Request identifying connection to be closed.
|
|
{
|
|
uint ConnID = PtrToUlong(Request->Handle.ConnectionContext);
|
|
KIRQL Irql0;
|
|
TCPConn *Conn;
|
|
TDI_STATUS Status;
|
|
|
|
//
|
|
// We have the locks we need. Try to find a connection.
|
|
//
|
|
Conn = GetConnFromConnID(ConnID, &Irql0);
|
|
|
|
if (Conn != NULL) {
|
|
KIRQL Irql1;
|
|
TCB *ConnTCB;
|
|
|
|
//
|
|
// We found the connection. Free the ConnID and mark the connection
|
|
// as closing.
|
|
//
|
|
CHECK_STRUCT(Conn, tc);
|
|
|
|
FreeConnID(Conn);
|
|
|
|
Conn->tc_flags |= CONN_CLOSING;
|
|
|
|
//
|
|
// See if there's a TCB referencing this connection.
|
|
// If there is, we'll need to wait until he's done before closing him.
|
|
// We'll hurry the process along if we still have a pointer to him.
|
|
//
|
|
if (Conn->tc_refcnt != 0) {
|
|
RequestCompleteRoutine Rtn;
|
|
PVOID Context;
|
|
|
|
//
|
|
// A connection still references him. Save the current rtn stuff
|
|
// in case we are in the middle of disassociating him from an
|
|
// address, and store the caller's callback routine and our done
|
|
// routine.
|
|
//
|
|
Rtn = Conn->tc_rtn;
|
|
Context = Conn->tc_rtncontext;
|
|
|
|
Conn->tc_rtn = Request->RequestNotifyObject;
|
|
Conn->tc_rtncontext = Request->RequestContext;
|
|
Conn->tc_donertn = CloseDone;
|
|
|
|
//
|
|
// See if we're in the middle of disassociating him.
|
|
//
|
|
if (Conn->tc_flags & CONN_DISACC) {
|
|
|
|
//
|
|
// We are disassociating him. We'll free the conn table lock
|
|
// now and fail the disassociate request. Note that when
|
|
// we free the lock the refcount could go to zero. This is
|
|
// OK, because we've already stored the neccessary info. in
|
|
// the connection so the caller will get called back if it
|
|
// does. From this point out we return PENDING, so a callback
|
|
// is OK. We've marked him as closing, so the disassoc done
|
|
// routine will bail out if we've interrupted him. If the ref.
|
|
// count does go to zero, Conn->tc_tcb would have to be NULL,
|
|
// so in that case we'll just fall out of this routine.
|
|
//
|
|
KeReleaseSpinLock(&Conn->tc_ConnBlock->cb_lock, Irql0);
|
|
(*Rtn)(Context, (uint) TDI_REQ_ABORTED, 0);
|
|
KeAcquireSpinLock(&Conn->tc_ConnBlock->cb_lock, &Irql0);
|
|
}
|
|
|
|
ConnTCB = Conn->tc_tcb;
|
|
if (ConnTCB != NULL) {
|
|
CHECK_STRUCT(ConnTCB, tcb);
|
|
//
|
|
// We have a TCB. Take the lock on him and get ready to
|
|
// close him.
|
|
//
|
|
KeAcquireSpinLock(&ConnTCB->tcb_lock, &Irql1);
|
|
if (ConnTCB->tcb_state != TCB_CLOSED) {
|
|
ConnTCB->tcb_flags |= NEED_RST;
|
|
KeReleaseSpinLock(&Conn->tc_ConnBlock->cb_lock, Irql1);
|
|
if (!CLOSING(ConnTCB))
|
|
TryToCloseTCB(ConnTCB, TCB_CLOSE_ABORTED, Irql0);
|
|
else
|
|
KeReleaseSpinLock(&ConnTCB->tcb_lock, Irql0);
|
|
return TDI_PENDING;
|
|
} else {
|
|
//
|
|
// He's already closing. This should be harmless, but
|
|
// check this case.
|
|
//
|
|
KeReleaseSpinLock(&ConnTCB->tcb_lock, Irql1);
|
|
}
|
|
}
|
|
Status = TDI_PENDING;
|
|
|
|
} else {
|
|
//
|
|
// We have a connection that we can close. Finish the close.
|
|
//
|
|
Conn->tc_rtn = DummyCmplt;
|
|
CloseDone(Conn, Irql0);
|
|
return TDI_SUCCESS;
|
|
}
|
|
|
|
KeReleaseSpinLock(&Conn->tc_ConnBlock->cb_lock, Irql0);
|
|
|
|
} else
|
|
Status = TDI_INVALID_CONNECTION;
|
|
|
|
//
|
|
// We're done with the connection. Go ahead and free him.
|
|
//
|
|
|
|
return Status;
|
|
}
|
|
|
|
|
|
//* TdiAssociateAddress - Associate an address with a connection.
|
|
//
|
|
// Called to associate an address with a connection. We do a minimal
|
|
// amount of sanity checking, and then put the connection on the AddrObj's
|
|
// list.
|
|
//
|
|
TDI_STATUS // Returns: Status of attempt to associate.
|
|
TdiAssociateAddress(
|
|
PTDI_REQUEST Request, // Structure for this request.
|
|
HANDLE AddrHandle) // Address handle to associate connection with.
|
|
{
|
|
KIRQL Irql0, Irql1; // One per lock nesting level.
|
|
AddrObj *AO;
|
|
uint ConnID = PtrToUlong(Request->Handle.ConnectionContext);
|
|
TCPConn *Conn;
|
|
TDI_STATUS Status;
|
|
|
|
AO = (AddrObj *)AddrHandle;
|
|
CHECK_STRUCT(AO, ao);
|
|
|
|
Conn = GetConnFromConnID(ConnID, &Irql0);
|
|
KeAcquireSpinLock(&AO->ao_lock, &Irql1);
|
|
if (!AO_VALID(AO)) {
|
|
KeReleaseSpinLock(&AO->ao_lock, Irql1);
|
|
if (Conn != NULL) {
|
|
KeReleaseSpinLock(&Conn->tc_ConnBlock->cb_lock, Irql0);
|
|
}
|
|
return TDI_INVALID_PARAMETER;
|
|
}
|
|
|
|
if (Conn != NULL) {
|
|
CHECK_STRUCT(Conn, tc);
|
|
|
|
if (Conn->tc_ao != NULL) {
|
|
//
|
|
// It's already associated. Error out.
|
|
//
|
|
KdBreakPoint();
|
|
Status = TDI_ALREADY_ASSOCIATED;
|
|
} else {
|
|
Conn->tc_ao = AO;
|
|
ASSERT(Conn->tc_tcb == NULL);
|
|
PUSHQ(&AO->ao_idleq, &Conn->tc_q);
|
|
Status = TDI_SUCCESS;
|
|
}
|
|
KeReleaseSpinLock(&AO->ao_lock, Irql1);
|
|
KeReleaseSpinLock(&Conn->tc_ConnBlock->cb_lock, Irql0);
|
|
return Status;
|
|
} else
|
|
Status = TDI_INVALID_CONNECTION;
|
|
|
|
KeReleaseSpinLock(&AO->ao_lock, Irql1);
|
|
return Status;
|
|
}
|
|
|
|
|
|
//* TdiDisAssociateAddress - Disassociate a connection from an address.
|
|
//
|
|
// The TDI entry point to disassociate a connection from an address. The
|
|
// connection must actually be associated and not connected to anything.
|
|
//
|
|
TDI_STATUS // Returns: Status of request.
|
|
TdiDisAssociateAddress(
|
|
PTDI_REQUEST Request) // Structure for this request.
|
|
{
|
|
uint ConnID = PtrToUlong(Request->Handle.ConnectionContext);
|
|
KIRQL Irql0, Irql1, Irql2; // One per lock nesting level.
|
|
TCPConn *Conn;
|
|
AddrObj *AO;
|
|
TDI_STATUS Status;
|
|
|
|
KeAcquireSpinLock(&AddrObjTableLock, &Irql0);
|
|
Conn = GetConnFromConnID(ConnID, &Irql1);
|
|
|
|
if (Conn != NULL) {
|
|
//
|
|
// The connection actually exists!
|
|
//
|
|
CHECK_STRUCT(Conn, tc);
|
|
AO = Conn->tc_ao;
|
|
if (AO != NULL) {
|
|
CHECK_STRUCT(AO, ao);
|
|
//
|
|
// And it's associated.
|
|
//
|
|
KeAcquireSpinLock(&AO->ao_lock, &Irql2);
|
|
//
|
|
// If there's no connection currently active, go ahead and remove
|
|
// him from the AddrObj. If a connection is active error the
|
|
// request out.
|
|
//
|
|
if (Conn->tc_tcb == NULL) {
|
|
if (Conn->tc_refcnt == 0) {
|
|
RemoveConnFromAO(AO, Conn);
|
|
Status = TDI_SUCCESS;
|
|
} else {
|
|
//
|
|
// He shouldn't be closing, or we couldn't have found him.
|
|
//
|
|
ASSERT(!(Conn->tc_flags & CONN_CLOSING));
|
|
|
|
Conn->tc_rtn = Request->RequestNotifyObject;
|
|
Conn->tc_rtncontext = Request->RequestContext;
|
|
Conn->tc_donertn = DisassocDone;
|
|
Conn->tc_flags |= CONN_DISACC;
|
|
Status = TDI_PENDING;
|
|
}
|
|
|
|
} else
|
|
Status = TDI_CONNECTION_ACTIVE;
|
|
KeReleaseSpinLock(&AO->ao_lock, Irql2);
|
|
} else
|
|
Status = TDI_NOT_ASSOCIATED;
|
|
KeReleaseSpinLock(&Conn->tc_ConnBlock->cb_lock, Irql1);
|
|
} else
|
|
Status = TDI_INVALID_CONNECTION;
|
|
|
|
KeReleaseSpinLock(&AddrObjTableLock, Irql0);
|
|
|
|
return Status;
|
|
}
|
|
|
|
|
|
//* ProcessUserOptions - Process options from the user.
|
|
//
|
|
// A utility routine to process options from the user. We fill in the
|
|
// optinfo structure, and if we have options we call ip to check on them.
|
|
//
|
|
TDI_STATUS // Returns: TDI_STATUS of attempt.
|
|
ProcessUserOptions(
|
|
PTDI_CONNECTION_INFORMATION Info) // Contains options to be processed.
|
|
{
|
|
#if 0
|
|
TDI_STATUS Status;
|
|
|
|
if (Info != NULL && Info->Options != NULL) {
|
|
IP_STATUS OptStatus;
|
|
|
|
// REVIEW: IPv4 had code here to call into IP to copy options here.
|
|
|
|
if (OptStatus != IP_SUCCESS) {
|
|
if (OptStatus == IP_NO_RESOURCES)
|
|
Status = TDI_NO_RESOURCES;
|
|
else
|
|
Status = TDI_BAD_OPTION;
|
|
} else
|
|
Status = TDI_SUCCESS;
|
|
} else {
|
|
Status = TDI_SUCCESS;
|
|
}
|
|
|
|
return Status;
|
|
#else
|
|
return TDI_SUCCESS;
|
|
#endif
|
|
}
|
|
|
|
|
|
//* InitTCBFromConn - Initialize a TCB from information in a Connection.
|
|
//
|
|
// Called from Connect and Listen processing to initialize a new TCB from
|
|
// information in the connection. We assume the AddrObjTableLock and
|
|
// TCPConnBlock locks are held when we are called, or that the caller has some
|
|
// other way of making sure that the referenced AO doesn't go away in the
|
|
// middle of operation.
|
|
//
|
|
// Input: Conn - Connection to initialize from.
|
|
// NewTCB - TCB to be initialized.
|
|
// Addr - Remote addressing and option info for NewTCB.
|
|
// AOLocked - True if the called has the address object locked.
|
|
//
|
|
|
|
//
|
|
TDI_STATUS // Returns: TDI_STATUS of init attempt.
|
|
InitTCBFromConn(
|
|
TCPConn *Conn, // Connection to initialize from.
|
|
TCB *NewTCB, // TCB to be initialized.
|
|
PTDI_CONNECTION_INFORMATION Addr, // Remove addr info, etc. for NewTCB.
|
|
uint AOLocked) // True if caller has addr object lock.
|
|
{
|
|
KIRQL OldIrql;
|
|
TDI_STATUS Status;
|
|
|
|
CHECK_STRUCT(Conn, tc);
|
|
|
|
//
|
|
// We have a connection. Make sure it's associated with an address and
|
|
// doesn't already have a TCB attached.
|
|
//
|
|
if (Conn->tc_flags & CONN_INVALID)
|
|
return TDI_INVALID_CONNECTION;
|
|
|
|
if (Conn->tc_tcb == NULL) {
|
|
AddrObj *ConnAO;
|
|
|
|
ConnAO = Conn->tc_ao;
|
|
if (ConnAO != NULL) {
|
|
CHECK_STRUCT(ConnAO, ao);
|
|
|
|
if (!AOLocked) {
|
|
KeAcquireSpinLock(&ConnAO->ao_lock, &OldIrql);
|
|
}
|
|
if (!(NewTCB->tcb_flags & ACCEPT_PENDING)) {
|
|
//
|
|
// These fields are already initialized
|
|
// when ACCEPT_PENDING is on.
|
|
//
|
|
NewTCB->tcb_saddr = ConnAO->ao_addr;
|
|
NewTCB->tcb_sscope_id = ConnAO->ao_scope_id;
|
|
NewTCB->tcb_sport = ConnAO->ao_port;
|
|
NewTCB->tcb_defaultwin = Conn->tc_window;
|
|
NewTCB->tcb_rcvwin = Conn->tc_window;
|
|
}
|
|
|
|
NewTCB->tcb_rcvind = ConnAO->ao_rcv;
|
|
NewTCB->tcb_ricontext = ConnAO->ao_rcvcontext;
|
|
if (NewTCB->tcb_rcvind == NULL)
|
|
NewTCB->tcb_rcvhndlr = PendData;
|
|
else
|
|
NewTCB->tcb_rcvhndlr = IndicateData;
|
|
|
|
NewTCB->tcb_conncontext = Conn->tc_context;
|
|
NewTCB->tcb_flags |= Conn->tc_tcbflags;
|
|
|
|
if (Conn->tc_flags & CONN_WINSET)
|
|
NewTCB->tcb_flags |= WINDOW_SET;
|
|
|
|
if (NewTCB->tcb_flags & KEEPALIVE) {
|
|
NewTCB->tcb_alive = TCPTime;
|
|
NewTCB->tcb_kacount = 0;
|
|
}
|
|
|
|
if (!AOLocked) {
|
|
KeReleaseSpinLock(&ConnAO->ao_lock, OldIrql);
|
|
}
|
|
|
|
//
|
|
// If we've been given options, we need to process them now.
|
|
//
|
|
if (Addr != NULL && Addr->Options != NULL)
|
|
NewTCB->tcb_flags |= CLIENT_OPTIONS;
|
|
Status = ProcessUserOptions(Addr);
|
|
|
|
return Status;
|
|
} else
|
|
return TDI_NOT_ASSOCIATED;
|
|
} else
|
|
return TDI_CONNECTION_ACTIVE;
|
|
}
|
|
|
|
|
|
//* TdiConnect - Establish a connection.
|
|
//
|
|
// The TDI connection establishment routine. Called when the client wants to
|
|
// establish a connection, we validate his incoming parameters and kick
|
|
// things off by sending a SYN.
|
|
//
|
|
// Note: The format of the timeout (TO) parameter is system specific -
|
|
// we use a macro to convert to ticks.
|
|
//
|
|
TDI_STATUS // Returns: Status of attempt to connect.
|
|
TdiConnect(
|
|
PTDI_REQUEST Request, // This command request.
|
|
void *TO, // How long to wait for request.
|
|
PTDI_CONNECTION_INFORMATION RequestAddr, // Describes the destination.
|
|
PTDI_CONNECTION_INFORMATION ReturnAddr) // Where to return information.
|
|
{
|
|
TCPConnReq *ConnReq; // Connection request to use.
|
|
IPv6Addr DestAddr;
|
|
ulong DestScopeId;
|
|
ushort DestPort;
|
|
TCPConn *Conn;
|
|
TCB *NewTCB;
|
|
uint ConnID = PtrToUlong(Request->Handle.ConnectionContext);
|
|
KIRQL Irql0, Irql1, Irql2; // One per lock nesting level.
|
|
AddrObj *AO;
|
|
TDI_STATUS Status;
|
|
IP_STATUS IPStatus;
|
|
ushort MSS;
|
|
TCP_TIME *Timeout;
|
|
NetTableEntry *NTE;
|
|
NetTableEntryOrInterface *NTEorIF;
|
|
int WildcardSourceAddress = FALSE;
|
|
|
|
//
|
|
// First, get and validate the remote address.
|
|
//
|
|
if (RequestAddr == NULL || RequestAddr->RemoteAddress == NULL ||
|
|
!GetAddress((PTRANSPORT_ADDRESS)RequestAddr->RemoteAddress, &DestAddr,
|
|
&DestScopeId, &DestPort))
|
|
return TDI_BAD_ADDR;
|
|
|
|
//
|
|
// REVIEW: IPv4 performed other remote address sanity checks here.
|
|
// REVIEW: E.g., should we check that remote addr isn't multicast?
|
|
//
|
|
|
|
//
|
|
// REVIEW: I can't find an RFC which states 0 is not a valid port number.
|
|
//
|
|
if (DestPort == 0)
|
|
return TDI_BAD_ADDR;
|
|
|
|
//
|
|
// Get a connection request. If we can't, bail out now.
|
|
//
|
|
ConnReq = GetConnReq();
|
|
if (ConnReq == NULL)
|
|
return TDI_NO_RESOURCES;
|
|
|
|
//
|
|
// Get a TCB, assuming we'll need one.
|
|
//
|
|
NewTCB = AllocTCB();
|
|
if (NewTCB == NULL) {
|
|
// Couldn't get a TCB.
|
|
FreeConnReq(ConnReq);
|
|
return TDI_NO_RESOURCES;
|
|
}
|
|
|
|
Timeout = (TCP_TIME *)TO;
|
|
|
|
if (Timeout != NULL && !INFINITE_CONN_TO(*Timeout)) {
|
|
ulong Ticks = TCP_TIME_TO_TICKS(*Timeout);
|
|
|
|
if (Ticks > MAX_CONN_TO_TICKS)
|
|
Ticks = MAX_CONN_TO_TICKS;
|
|
else
|
|
Ticks++;
|
|
ConnReq->tcr_timeout = (ushort)Ticks;
|
|
} else
|
|
ConnReq->tcr_timeout = 0;
|
|
|
|
ConnReq->tcr_flags = 0;
|
|
ConnReq->tcr_conninfo = ReturnAddr;
|
|
ConnReq->tcr_addrinfo = NULL;
|
|
ConnReq->tcr_req.tr_rtn = Request->RequestNotifyObject;
|
|
ConnReq->tcr_req.tr_context = Request->RequestContext;
|
|
NewTCB->tcb_daddr = DestAddr;
|
|
NewTCB->tcb_dscope_id = DestScopeId;
|
|
NewTCB->tcb_dport = DestPort;
|
|
|
|
//
|
|
// Now find the real connection.
|
|
//
|
|
KeAcquireSpinLock(&AddrObjTableLock, &Irql0);
|
|
Conn = GetConnFromConnID(ConnID, &Irql1);
|
|
if (Conn != NULL) {
|
|
uint Inserted;
|
|
|
|
CHECK_STRUCT(Conn, tc);
|
|
|
|
//
|
|
// We found the connection. Check for an associated address object.
|
|
//
|
|
AO = Conn->tc_ao;
|
|
if (AO != NULL) {
|
|
KeAcquireSpinLock(&AO->ao_lock, &Irql2);
|
|
|
|
CHECK_STRUCT(AO, ao);
|
|
|
|
Status = InitTCBFromConn(Conn, NewTCB, RequestAddr, TRUE);
|
|
if (Status == TDI_SUCCESS) {
|
|
//
|
|
// We've initialized our TCB. Mark it that we initiated this
|
|
// connection (i.e. active open). Also, we're done with the
|
|
// AddrObjTable, so we can free it's lock.
|
|
//
|
|
NewTCB->tcb_flags |= ACTIVE_OPEN;
|
|
KeReleaseSpinLock(&AddrObjTableLock, Irql2);
|
|
|
|
//
|
|
// Determine NTE to send on (if user cares).
|
|
//
|
|
if (IsUnspecified(&NewTCB->tcb_saddr)) {
|
|
//
|
|
// Caller didn't specify a source address.
|
|
// Let the routing code pick one.
|
|
//
|
|
NTE = NULL;
|
|
NTEorIF = NULL;
|
|
WildcardSourceAddress = TRUE;
|
|
|
|
} else {
|
|
//
|
|
// Our TCB has a specific source address. Determine
|
|
// which NTE corresponds to it and the scope id.
|
|
//
|
|
NTE = FindNetworkWithAddress(&NewTCB->tcb_saddr,
|
|
NewTCB->tcb_sscope_id);
|
|
if (NTE == NULL) {
|
|
//
|
|
// Bad source address. We don't have a network with
|
|
// the requested address. Error out.
|
|
//
|
|
// REVIEW: Will the AddrObj code even let this happen?
|
|
//
|
|
KdPrintEx((DPFLTR_TCPIP6_ID, DPFLTR_USER_ERROR,
|
|
"TdiConnect: Bad source address\n"));
|
|
KeReleaseSpinLock(&AO->ao_lock, Irql1);
|
|
KeReleaseSpinLock(&Conn->tc_ConnBlock->cb_lock, Irql0);
|
|
Status = TDI_BAD_ADDR;
|
|
goto error;
|
|
}
|
|
|
|
NTEorIF = CastFromNTE(NTE);
|
|
}
|
|
|
|
//
|
|
// Get the route.
|
|
//
|
|
ASSERT(NewTCB->tcb_rce == NULL);
|
|
IPStatus = RouteToDestination(&DestAddr, DestScopeId,
|
|
NTEorIF, RTD_FLAG_NORMAL,
|
|
&NewTCB->tcb_rce);
|
|
if (NTE != NULL)
|
|
ReleaseNTE(NTE);
|
|
NTE = NULL; // Protect against accidental use.
|
|
if (IPStatus != IP_SUCCESS) {
|
|
//
|
|
// Failed to get a route to the destination. Error out.
|
|
//
|
|
KdPrintEx((DPFLTR_TCPIP6_ID, DPFLTR_INTERNAL_ERROR,
|
|
"TdiConnect: Failed to get route to dest.\n"));
|
|
KeReleaseSpinLock(&AO->ao_lock, Irql1);
|
|
KeReleaseSpinLock(&Conn->tc_ConnBlock->cb_lock, Irql0);
|
|
if ((IPStatus == IP_PARAMETER_PROBLEM) ||
|
|
(IPStatus == IP_BAD_ROUTE))
|
|
Status = TDI_BAD_ADDR;
|
|
else if (IPStatus == IP_NO_RESOURCES)
|
|
Status = TDI_NO_RESOURCES;
|
|
else
|
|
Status = TDI_DEST_UNREACHABLE;
|
|
goto error;
|
|
}
|
|
|
|
ASSERT(NewTCB->tcb_rce != NULL);
|
|
if (IsDisconnectedAndNotLoopbackRCE(NewTCB->tcb_rce)) {
|
|
//
|
|
// Fail new connection requests for TCBs with a
|
|
// disconnected outgoing interface, except when a
|
|
// loopback route is used.
|
|
//
|
|
KdPrintEx((DPFLTR_TCPIP6_ID, DPFLTR_INTERNAL_ERROR,
|
|
"TdiConnect: Interface disconnected.\n"));
|
|
KeReleaseSpinLock(&AO->ao_lock, Irql1);
|
|
KeReleaseSpinLock(&Conn->tc_ConnBlock->cb_lock, Irql0);
|
|
|
|
//
|
|
// Drop the reference on the route we obtained.
|
|
//
|
|
ReleaseRCE(NewTCB->tcb_rce);
|
|
|
|
Status = TDI_INVALID_STATE;
|
|
goto error;
|
|
}
|
|
|
|
|
|
//
|
|
// OK, we got a route. Enter the TCB into the connection
|
|
// and send a SYN.
|
|
//
|
|
KeAcquireSpinLock(&NewTCB->tcb_lock, &Irql2);
|
|
Conn->tc_tcb = NewTCB;
|
|
Conn->tc_refcnt++;
|
|
NewTCB->tcb_conn = Conn;
|
|
NewTCB->tcb_connid = Conn->tc_connid;
|
|
REMOVEQ(&Conn->tc_q);
|
|
ENQUEUE(&AO->ao_activeq, &Conn->tc_q);
|
|
KeReleaseSpinLock(&Conn->tc_ConnBlock->cb_lock, Irql2);
|
|
KeReleaseSpinLock(&AO->ao_lock, Irql1);
|
|
|
|
//
|
|
// Initialize path-specific TCB settings, based on the RCE:
|
|
//
|
|
// If packets on the path will be looped back in software,
|
|
// don't use the Nagle algorithm for this TCB.
|
|
//
|
|
if (IsLoopbackRCE(NewTCB->tcb_rce)) {
|
|
NewTCB->tcb_flags &= ~NAGLING;
|
|
}
|
|
|
|
if (WildcardSourceAddress) {
|
|
//
|
|
// We let the routing code pick the source NTE above.
|
|
// Remember this address for later use.
|
|
//
|
|
// REVIEW: Hold onto the NTE instead? It's more changes...
|
|
//
|
|
NewTCB->tcb_saddr = NewTCB->tcb_rce->NTE->Address;
|
|
NewTCB->tcb_sscope_id =
|
|
DetermineScopeId(&NewTCB->tcb_saddr,
|
|
NewTCB->tcb_rce->NTE->IF);
|
|
}
|
|
|
|
//
|
|
// Similarly, the routing code may have picked
|
|
// the destination scope id if it was left unspecified.
|
|
// REVIEW - getpeername will not return the new DestScopeId.
|
|
//
|
|
DestScopeId = DetermineScopeId(&NewTCB->tcb_daddr,
|
|
NewTCB->tcb_rce->NTE->IF);
|
|
ASSERT((NewTCB->tcb_dscope_id == DestScopeId) ||
|
|
(NewTCB->tcb_dscope_id == 0));
|
|
NewTCB->tcb_dscope_id = DestScopeId;
|
|
|
|
//
|
|
// Initialize our Maximum Segment Size (MSS).
|
|
// Cache our current Path Maximum Transmission Unit (PMTU)
|
|
// so that we'll know if it changes.
|
|
//
|
|
NewTCB->tcb_pmtu = GetEffectivePathMTUFromRCE(NewTCB->tcb_rce);
|
|
IF_TCPDBG(TCP_DEBUG_MSS) {
|
|
KdPrintEx((DPFLTR_TCPIP6_ID, DPFLTR_INFO_TCPDBG,
|
|
"TCP TdiConnect: PMTU from RCE is %d\n",
|
|
NewTCB->tcb_pmtu));
|
|
}
|
|
NewTCB->tcb_remmss = MAXUSHORT;
|
|
NewTCB->tcb_security = SecurityStateValidationCounter;
|
|
CalculateMSSForTCB(NewTCB);
|
|
|
|
// Now initialize our send state.
|
|
InitSendState(NewTCB);
|
|
NewTCB->tcb_refcnt = 1;
|
|
NewTCB->tcb_state = TCB_SYN_SENT;
|
|
TStats.ts_activeopens++;
|
|
|
|
// Need to put the ConnReq on the TCB now, in case the timer
|
|
// fires after we've inserted.
|
|
NewTCB->tcb_connreq = ConnReq;
|
|
KeReleaseSpinLock(&NewTCB->tcb_lock, Irql0);
|
|
|
|
Inserted = InsertTCB(NewTCB);
|
|
KeAcquireSpinLock(&NewTCB->tcb_lock, &Irql0);
|
|
|
|
if (!Inserted) {
|
|
// Insert failed. We must already have a connection. Pull
|
|
// the connreq from the TCB first, so we can return the
|
|
// correct error code for it.
|
|
NewTCB->tcb_connreq = NULL;
|
|
NewTCB->tcb_refcnt--;
|
|
TryToCloseTCB(NewTCB, TCB_CLOSE_ABORTED, Irql0);
|
|
FreeConnReq(ConnReq);
|
|
return TDI_ADDR_IN_USE;
|
|
}
|
|
|
|
// If it's closing somehow, stop now. It can't have gone to
|
|
// closed, as we hold a reference on it. It could have gone
|
|
// to some other state (for example SYN-RCVD) so we need to
|
|
// check that now too.
|
|
if (!CLOSING(NewTCB) && NewTCB->tcb_state == TCB_SYN_SENT) {
|
|
SendSYN(NewTCB, Irql0);
|
|
KeAcquireSpinLock(&NewTCB->tcb_lock, &Irql0);
|
|
}
|
|
DerefTCB(NewTCB, Irql0);
|
|
|
|
return TDI_PENDING;
|
|
} else
|
|
KeReleaseSpinLock(&AO->ao_lock, Irql2);
|
|
} else
|
|
Status = TDI_NOT_ASSOCIATED;
|
|
KeReleaseSpinLock(&Conn->tc_ConnBlock->cb_lock, Irql1);
|
|
} else
|
|
Status = TDI_INVALID_CONNECTION;
|
|
|
|
KeReleaseSpinLock(&AddrObjTableLock, Irql0);
|
|
error:
|
|
FreeTCB(NewTCB);
|
|
FreeConnReq(ConnReq);
|
|
return Status;
|
|
}
|
|
|
|
|
|
//* TdiListen - Listen for a connection.
|
|
//
|
|
// The TDI listen handling routine. Called when the client wants to
|
|
// post a listen, we validate his incoming parameters, allocate a TCB
|
|
// and return.
|
|
//
|
|
TDI_STATUS // Returns: Status of attempt to connect.
|
|
TdiListen(
|
|
PTDI_REQUEST Request, // Structure for this request.
|
|
ushort Flags, // Listen flags for listen.
|
|
PTDI_CONNECTION_INFORMATION AcceptableAddr, // Acceptable remote addrs.
|
|
PTDI_CONNECTION_INFORMATION ConnectedAddr) // Where to return conn addr.
|
|
{
|
|
TCPConnReq *ConnReq; // Connection request to use.
|
|
IPv6Addr RemoteAddr; // Remote address to take conn. from.
|
|
ulong RemoteScopeId; // Scope identifier for remote addr (0 is none).
|
|
ushort RemotePort; // Acceptable remote port.
|
|
TCPConn *Conn; // Pointer to the Connection being listened upon.
|
|
TCB *NewTCB; // Pointer to the new TCB we'll use.
|
|
uint ConnID = PtrToUlong(Request->Handle.ConnectionContext);
|
|
KIRQL OldIrql; // Save IRQL value prior to taking lock.
|
|
TDI_STATUS Status;
|
|
|
|
//
|
|
// If we've been given remote addressing criteria, check it out.
|
|
//
|
|
if (AcceptableAddr != NULL && AcceptableAddr->RemoteAddress != NULL) {
|
|
if (!GetAddress((PTRANSPORT_ADDRESS)AcceptableAddr->RemoteAddress,
|
|
&RemoteAddr, &RemoteScopeId, &RemotePort))
|
|
return TDI_BAD_ADDR;
|
|
|
|
//
|
|
// REVIEW: IPv4 version did some other address sanity checks here.
|
|
// REVIEW: E.g., should we check that remote addr isn't multicast?
|
|
//
|
|
|
|
} else {
|
|
RemoteAddr = UnspecifiedAddr;
|
|
RemoteScopeId = 0;
|
|
RemotePort = 0;
|
|
}
|
|
|
|
//
|
|
// The remote address is valid. Get a ConnReq, and maybe a TCB.
|
|
//
|
|
ConnReq = GetConnReq();
|
|
if (ConnReq == NULL)
|
|
return TDI_NO_RESOURCES; // Couldn't get one.
|
|
|
|
//
|
|
// Now try to get a TCB.
|
|
//
|
|
NewTCB = AllocTCB();
|
|
if (NewTCB == NULL) {
|
|
//
|
|
// Couldn't get a TCB. Return an error.
|
|
//
|
|
FreeConnReq(ConnReq);
|
|
return TDI_NO_RESOURCES;
|
|
}
|
|
|
|
//
|
|
// We have the resources we need. Initialize them, and then check the
|
|
// state of the connection.
|
|
//
|
|
ConnReq->tcr_flags = Flags;
|
|
ConnReq->tcr_conninfo = ConnectedAddr;
|
|
ConnReq->tcr_addrinfo = NULL;
|
|
ConnReq->tcr_req.tr_rtn = Request->RequestNotifyObject;
|
|
ConnReq->tcr_req.tr_context = Request->RequestContext;
|
|
NewTCB->tcb_connreq = ConnReq;
|
|
NewTCB->tcb_daddr = RemoteAddr;
|
|
NewTCB->tcb_dscope_id = RemoteScopeId;
|
|
NewTCB->tcb_dport = RemotePort;
|
|
NewTCB->tcb_state = TCB_LISTEN;
|
|
|
|
//
|
|
// Now find the real connection. If we find it, we'll make sure it's
|
|
// associated.
|
|
//
|
|
Conn = GetConnFromConnID(ConnID, &OldIrql);
|
|
if (Conn != NULL) {
|
|
AddrObj *ConnAO;
|
|
|
|
CHECK_STRUCT(Conn, tc);
|
|
//
|
|
// We have a connection. Make sure it's associated with an address and
|
|
// doesn't already have a TCB attached.
|
|
//
|
|
ConnAO = Conn->tc_ao;
|
|
|
|
if (ConnAO != NULL) {
|
|
CHECK_STRUCT(ConnAO, ao);
|
|
KeAcquireSpinLockAtDpcLevel(&ConnAO->ao_lock);
|
|
|
|
if (AO_VALID(ConnAO)) {
|
|
Status = InitTCBFromConn(Conn, NewTCB, AcceptableAddr, TRUE);
|
|
} else {
|
|
Status = TDI_ADDR_INVALID;
|
|
}
|
|
|
|
if (Status == TDI_SUCCESS) {
|
|
//
|
|
// The initialization worked. Assign the new TCB to the
|
|
// connection, and return.
|
|
//
|
|
REMOVEQ(&Conn->tc_q);
|
|
PUSHQ(&ConnAO->ao_listenq, &Conn->tc_q);
|
|
|
|
Conn->tc_tcb = NewTCB;
|
|
NewTCB->tcb_conn = Conn;
|
|
NewTCB->tcb_connid = Conn->tc_connid;
|
|
Conn->tc_refcnt++;
|
|
|
|
ConnAO->ao_listencnt++;
|
|
KeReleaseSpinLockFromDpcLevel(&ConnAO->ao_lock);
|
|
|
|
Status = TDI_PENDING;
|
|
} else {
|
|
FreeTCB(NewTCB);
|
|
KeReleaseSpinLockFromDpcLevel(&ConnAO->ao_lock);
|
|
}
|
|
} else {
|
|
FreeTCB(NewTCB);
|
|
Status = TDI_NOT_ASSOCIATED;
|
|
}
|
|
KeReleaseSpinLock(&Conn->tc_ConnBlock->cb_lock, OldIrql);
|
|
} else {
|
|
FreeTCB(NewTCB);
|
|
Status = TDI_INVALID_CONNECTION;
|
|
}
|
|
|
|
//
|
|
// We're all done.
|
|
//
|
|
return Status;
|
|
}
|
|
|
|
|
|
//* InitRCE - Initialize an RCE.
|
|
//
|
|
// A utility routine to open an RCE and determine the maximum segment size
|
|
// for a connection. This function is called with the TCB lock held
|
|
// when transitioning out of the SYN_SENT or LISTEN states.
|
|
//
|
|
void // Returns: Nothing.
|
|
InitRCE(
|
|
TCB *NewTCB) // TCB for which an RCE is to be opened.
|
|
{
|
|
NetTableEntry *NTE;
|
|
IP_STATUS Status;
|
|
ushort MSS;
|
|
|
|
//
|
|
// We are called when receiving an incoming connection attempt,
|
|
// so tcb_saddr will always be initialized.
|
|
//
|
|
ASSERT(! IsUnspecified(&NewTCB->tcb_saddr));
|
|
|
|
//
|
|
// Determine NTE we're using for this connection.
|
|
//
|
|
NTE = FindNetworkWithAddress(&NewTCB->tcb_saddr,
|
|
NewTCB->tcb_sscope_id);
|
|
if (NTE == NULL) {
|
|
//
|
|
// Failed to get a route to the destination.
|
|
//
|
|
KdPrintEx((DPFLTR_TCPIP6_ID, DPFLTR_INTERNAL_ERROR,
|
|
"TCP InitRCE: Can't find the NTE for address?!?\n"));
|
|
goto ErrorReturn;
|
|
}
|
|
|
|
//
|
|
// Get the route.
|
|
//
|
|
ASSERT(NewTCB->tcb_rce == NULL);
|
|
Status = RouteToDestination(&NewTCB->tcb_daddr, NewTCB->tcb_dscope_id,
|
|
CastFromNTE(NTE), RTD_FLAG_NORMAL,
|
|
&NewTCB->tcb_rce);
|
|
ReleaseNTE(NTE);
|
|
if (Status != IP_SUCCESS) {
|
|
//
|
|
// Failed to get a route to the destination.
|
|
//
|
|
KdPrintEx((DPFLTR_TCPIP6_ID, DPFLTR_INTERNAL_ERROR,
|
|
"TCP InitRCE: Can't get a route?!?\n"));
|
|
ErrorReturn:
|
|
//
|
|
// Until we have a real route, use conservative values.
|
|
//
|
|
NewTCB->tcb_pmtu = IPv6_MINIMUM_MTU;
|
|
NewTCB->tcb_mss = (ushort)MIN(DEFAULT_MSS, NewTCB->tcb_remmss);
|
|
return;
|
|
}
|
|
|
|
//
|
|
// Initialize path-specific TCB settings, based on the RCE:
|
|
//
|
|
// If packets on the path will be looped back in software,
|
|
// don't use the Nagle algorithm for this TCB.
|
|
//
|
|
if (IsLoopbackRCE(NewTCB->tcb_rce)) {
|
|
NewTCB->tcb_flags &= ~NAGLING;
|
|
}
|
|
|
|
//
|
|
// Initialize the maximum segement size (MSS) for this connection.
|
|
// Cache our current Path Maximum Transmission Unit (PMTU)
|
|
// so that we'll know if it changes.
|
|
//
|
|
NewTCB->tcb_pmtu = GetEffectivePathMTUFromRCE(NewTCB->tcb_rce);
|
|
IF_TCPDBG(TCP_DEBUG_MSS) {
|
|
KdPrintEx((DPFLTR_TCPIP6_ID, DPFLTR_INFO_TCPDBG,
|
|
"TCP InitRCE: PMTU from RCE is %d\n", NewTCB->tcb_pmtu));
|
|
}
|
|
NewTCB->tcb_security = SecurityStateValidationCounter;
|
|
CalculateMSSForTCB(NewTCB);
|
|
}
|
|
|
|
|
|
//* AcceptConn - Accept a connection on a TCB.
|
|
//
|
|
// Called to accept a connection on a TCB, either from an incoming
|
|
// receive segment or via a user's accept. We initialize the RCE
|
|
// and the send state, and send out a SYN. We assume the TCB is locked
|
|
// and referenced when we get it.
|
|
//
|
|
void // Returns: Nothing.
|
|
AcceptConn(
|
|
TCB *AcceptTCB, // TCB to accept on.
|
|
KIRQL PreLockIrql) // IRQL prior to acquiring TCB lock.
|
|
{
|
|
CHECK_STRUCT(AcceptTCB, tcb);
|
|
ASSERT(AcceptTCB->tcb_refcnt != 0);
|
|
|
|
InitRCE(AcceptTCB);
|
|
InitSendState(AcceptTCB);
|
|
|
|
AdjustRcvWin(AcceptTCB);
|
|
SendSYN(AcceptTCB, PreLockIrql);
|
|
|
|
KeAcquireSpinLock(&AcceptTCB->tcb_lock, &PreLockIrql);
|
|
|
|
|
|
DerefTCB(AcceptTCB, PreLockIrql);
|
|
|
|
}
|
|
|
|
|
|
//* TdiAccept - Accept a connection.
|
|
//
|
|
// The TDI accept routine. Called when the client wants to
|
|
// accept a connection for which a listen had previously completed. We
|
|
// examine the state of the connection - it has to be in SYN-RCVD, with
|
|
// a TCB, with no pending connreq, etc.
|
|
//
|
|
TDI_STATUS // Returns: Status of attempt to connect.
|
|
TdiAccept(
|
|
PTDI_REQUEST Request, // Structure for this request.
|
|
PTDI_CONNECTION_INFORMATION AcceptInfo, // Info for this accept.
|
|
PTDI_CONNECTION_INFORMATION ConnectedInfo) // Where to return conn addr.
|
|
{
|
|
TCPConnReq *ConnReq; // ConnReq we'll use for this connection.
|
|
uint ConnID = PtrToUlong(Request->Handle.ConnectionContext);
|
|
TCPConn *Conn; // Connection being accepted upon.
|
|
TCB *AcceptTCB; // TCB for Conn.
|
|
KIRQL Irql0, Irql1; // One per lock nesting level.
|
|
TDI_STATUS Status;
|
|
|
|
//
|
|
// First, get the ConnReq we'll need.
|
|
//
|
|
ConnReq = GetConnReq();
|
|
if (ConnReq == NULL)
|
|
return TDI_NO_RESOURCES;
|
|
|
|
ConnReq->tcr_conninfo = ConnectedInfo;
|
|
ConnReq->tcr_addrinfo = NULL;
|
|
ConnReq->tcr_req.tr_rtn = Request->RequestNotifyObject;
|
|
ConnReq->tcr_req.tr_context = Request->RequestContext;
|
|
|
|
//
|
|
// Now look up the connection.
|
|
//
|
|
Conn = GetConnFromConnID(ConnID, &Irql0);
|
|
if (Conn != NULL) {
|
|
CHECK_STRUCT(Conn, tc);
|
|
|
|
//
|
|
// We have the connection. Make sure is has a TCB, and that the
|
|
// TCB is in the SYN-RCVD state, etc.
|
|
//
|
|
AcceptTCB = Conn->tc_tcb;
|
|
|
|
if (AcceptTCB != NULL) {
|
|
CHECK_STRUCT(AcceptTCB, tcb);
|
|
|
|
KeAcquireSpinLock(&AcceptTCB->tcb_lock, &Irql1);
|
|
KeReleaseSpinLock(&Conn->tc_ConnBlock->cb_lock, Irql1);
|
|
|
|
if (!CLOSING(AcceptTCB) && AcceptTCB->tcb_state == TCB_SYN_RCVD) {
|
|
//
|
|
// State is valid. Make sure this TCB had a delayed accept on
|
|
// it, and that there is currently no connect request pending.
|
|
//
|
|
if (!(AcceptTCB->tcb_flags & CONN_ACCEPTED) &&
|
|
AcceptTCB->tcb_connreq == NULL) {
|
|
|
|
//
|
|
// If the caller gave us options, they'll override any
|
|
// that are already present, if they're valid.
|
|
//
|
|
if (AcceptInfo != NULL && AcceptInfo->Options != NULL) {
|
|
//
|
|
// We have options.
|
|
// Copy them to make sure they're valid.
|
|
//
|
|
Status = ProcessUserOptions(AcceptInfo);
|
|
if (Status == TDI_SUCCESS) {
|
|
AcceptTCB->tcb_flags |= CLIENT_OPTIONS;
|
|
} else
|
|
goto connerror;
|
|
}
|
|
|
|
AcceptTCB->tcb_connreq = ConnReq;
|
|
AcceptTCB->tcb_flags |= CONN_ACCEPTED;
|
|
AcceptTCB->tcb_refcnt++;
|
|
//
|
|
// Everything's set. Accept the connection now.
|
|
//
|
|
AcceptConn(AcceptTCB, Irql0);
|
|
return TDI_PENDING;
|
|
}
|
|
}
|
|
connerror:
|
|
KeReleaseSpinLock(&AcceptTCB->tcb_lock, Irql0);
|
|
Status = TDI_INVALID_CONNECTION;
|
|
goto error;
|
|
}
|
|
KeReleaseSpinLock(&Conn->tc_ConnBlock->cb_lock, Irql0);
|
|
}
|
|
Status = TDI_INVALID_CONNECTION;
|
|
|
|
error:
|
|
FreeConnReq(ConnReq);
|
|
return Status;
|
|
}
|
|
|
|
|
|
//* TdiDisConnect - Disconnect a connection.
|
|
//
|
|
// The TDI disconnection routine. Called when the client wants to disconnect
|
|
// a connection. There are two types of disconnection we support, graceful
|
|
// and abortive. A graceful close will cause us to send a FIN and not complete
|
|
// the request until we get the ACK back. An abortive close causes us to send
|
|
// a RST. In that case we'll just get things going and return immediately.
|
|
//
|
|
// Note: The format of the Timeout (TO) is system specific - we use
|
|
// a macro to convert to ticks.
|
|
//
|
|
TDI_STATUS // Returns: Status of attempt to disconnect.
|
|
TdiDisconnect(
|
|
PTDI_REQUEST Request, // Structure for this request.
|
|
void *TO, // How long to wait.
|
|
ushort Flags, // Type of disconnect.
|
|
PTDI_CONNECTION_INFORMATION DiscConnInfo, // Ignored.
|
|
PTDI_CONNECTION_INFORMATION ReturnInfo) // Ignored.
|
|
{
|
|
TCPConnReq *ConnReq; // Connection request to use.
|
|
TCPConn *Conn;
|
|
TCB *DiscTCB;
|
|
KIRQL Irql0, Irql1; // One per lock nesting level.
|
|
TDI_STATUS Status;
|
|
TCP_TIME *Timeout;
|
|
|
|
Conn = GetConnFromConnID(PtrToUlong(Request->Handle.ConnectionContext),
|
|
&Irql0);
|
|
|
|
if (Conn != NULL) {
|
|
CHECK_STRUCT(Conn, tc);
|
|
|
|
DiscTCB = Conn->tc_tcb;
|
|
if (DiscTCB != NULL) {
|
|
CHECK_STRUCT(DiscTCB, tcb);
|
|
KeAcquireSpinLock(&DiscTCB->tcb_lock, &Irql1);
|
|
|
|
//
|
|
// We have the TCB. See what kind of disconnect this is.
|
|
//
|
|
if (Flags & TDI_DISCONNECT_ABORT) {
|
|
//
|
|
// This is an abortive disconnect. If we're not already
|
|
// closed or closing, blow the connection away.
|
|
//
|
|
if (DiscTCB->tcb_state != TCB_CLOSED) {
|
|
KeReleaseSpinLock(&Conn->tc_ConnBlock->cb_lock, Irql1);
|
|
|
|
if (!CLOSING(DiscTCB)) {
|
|
DiscTCB->tcb_flags |= NEED_RST;
|
|
TryToCloseTCB(DiscTCB, TCB_CLOSE_ABORTED,
|
|
Irql0);
|
|
} else
|
|
KeReleaseSpinLock(&DiscTCB->tcb_lock, Irql0);
|
|
|
|
return TDI_SUCCESS;
|
|
} else {
|
|
//
|
|
// The TCB isn't connected.
|
|
//
|
|
KeReleaseSpinLock(&Conn->tc_ConnBlock->cb_lock, Irql1);
|
|
KeReleaseSpinLock(&DiscTCB->tcb_lock, Irql0);
|
|
return TDI_INVALID_STATE;
|
|
}
|
|
} else {
|
|
//
|
|
// This is not an abortive close. For graceful close we'll
|
|
// need a ConnReq.
|
|
//
|
|
KeReleaseSpinLock(&Conn->tc_ConnBlock->cb_lock, Irql1);
|
|
|
|
//
|
|
// Make sure we aren't in the middle of an abortive close.
|
|
//
|
|
if (CLOSING(DiscTCB)) {
|
|
KeReleaseSpinLock(&DiscTCB->tcb_lock, Irql0);
|
|
return TDI_INVALID_CONNECTION;
|
|
}
|
|
|
|
ConnReq = GetConnReq();
|
|
if (ConnReq != NULL) {
|
|
//
|
|
// Got the ConnReq. See if this is a DISCONNECT_WAIT
|
|
// primitive or not.
|
|
//
|
|
ConnReq->tcr_flags = 0;
|
|
ConnReq->tcr_conninfo = NULL;
|
|
ConnReq->tcr_addrinfo = NULL;
|
|
ConnReq->tcr_req.tr_rtn = Request->RequestNotifyObject;
|
|
ConnReq->tcr_req.tr_context = Request->RequestContext;
|
|
|
|
if (!(Flags & TDI_DISCONNECT_WAIT)) {
|
|
Timeout = (TCP_TIME *)TO;
|
|
|
|
if (Timeout != NULL && !INFINITE_CONN_TO(*Timeout)) {
|
|
ulong Ticks = TCP_TIME_TO_TICKS(*Timeout);
|
|
if (Ticks > MAX_CONN_TO_TICKS)
|
|
Ticks = MAX_CONN_TO_TICKS;
|
|
else
|
|
Ticks++;
|
|
ConnReq->tcr_timeout = (ushort)Ticks;
|
|
} else
|
|
ConnReq->tcr_timeout = 0;
|
|
|
|
//
|
|
// OK, we're just about set. We need to update
|
|
// the TCB state, and send the FIN.
|
|
//
|
|
if (DiscTCB->tcb_state == TCB_ESTAB) {
|
|
DiscTCB->tcb_state = TCB_FIN_WAIT1;
|
|
//
|
|
// Since we left established, we're off the fast
|
|
// receive path.
|
|
//
|
|
DiscTCB->tcb_slowcount++;
|
|
DiscTCB->tcb_fastchk |= TCP_FLAG_SLOW;
|
|
} else
|
|
if (DiscTCB->tcb_state == TCB_CLOSE_WAIT)
|
|
DiscTCB->tcb_state = TCB_LAST_ACK;
|
|
else {
|
|
KeReleaseSpinLock(&DiscTCB->tcb_lock, Irql0);
|
|
FreeConnReq(ConnReq);
|
|
return TDI_INVALID_STATE;
|
|
}
|
|
|
|
TStats.ts_currestab--; // Update SNMP info.
|
|
ASSERT(*(int *)&TStats.ts_currestab >= 0);
|
|
|
|
ASSERT(DiscTCB->tcb_connreq == NULL);
|
|
DiscTCB->tcb_connreq = ConnReq;
|
|
DiscTCB->tcb_flags |= FIN_NEEDED;
|
|
DiscTCB->tcb_refcnt++;
|
|
TCPSend(DiscTCB, Irql0);
|
|
|
|
return TDI_PENDING;
|
|
} else {
|
|
//
|
|
// This is a DISC_WAIT request.
|
|
//
|
|
ConnReq->tcr_timeout = 0;
|
|
if (DiscTCB->tcb_discwait == NULL) {
|
|
DiscTCB->tcb_discwait = ConnReq;
|
|
Status = TDI_PENDING;
|
|
} else
|
|
Status = TDI_INVALID_STATE;
|
|
|
|
KeReleaseSpinLock(&DiscTCB->tcb_lock, Irql0);
|
|
return Status;
|
|
}
|
|
} else {
|
|
//
|
|
// Couldn't get a ConnReq.
|
|
//
|
|
KeReleaseSpinLock(&DiscTCB->tcb_lock, Irql0);
|
|
return TDI_NO_RESOURCES;
|
|
}
|
|
}
|
|
} else
|
|
KeReleaseSpinLock(&Conn->tc_ConnBlock->cb_lock, Irql0);
|
|
}
|
|
|
|
//
|
|
// No Conn, or no TCB on conn. Return an error.
|
|
//
|
|
return TDI_INVALID_CONNECTION;
|
|
}
|
|
|
|
|
|
//* OKToNotify - See if it's OK to notify about a DISC.
|
|
//
|
|
// A little utility function, called to see it it's OK to notify the client
|
|
// of an incoming FIN.
|
|
//
|
|
uint // Returns: TRUE if it's OK, False otherwise.
|
|
OKToNotify(
|
|
TCB *NotifyTCB) // TCB to check.
|
|
{
|
|
CHECK_STRUCT(NotifyTCB, tcb);
|
|
if (NotifyTCB->tcb_pendingcnt == 0 && NotifyTCB->tcb_urgcnt == 0 &&
|
|
NotifyTCB->tcb_rcvhead == NULL && NotifyTCB->tcb_exprcv == NULL)
|
|
return TRUE;
|
|
else
|
|
return FALSE;
|
|
}
|
|
|
|
|
|
//* NotifyOfDisc - Notify a client that a TCB is being disconnected.
|
|
//
|
|
// Called when we're disconnecting a TCB because we've received a FIN or
|
|
// RST from the remote peer, or because we're aborting for some reason.
|
|
// We'll complete a DISCONNECT_WAIT request if we have one, or try and
|
|
// issue an indication otherwise. This is only done if we're in a
|
|
// synchronized state and not in TIMED-WAIT.
|
|
//
|
|
void // Returns: Nothing.
|
|
NotifyOfDisc(
|
|
TCB *DiscTCB, // TCB we're notifying.
|
|
TDI_STATUS Status) // Status code for notification.
|
|
{
|
|
KIRQL Irql0, Irql1;
|
|
TCPConnReq *DiscReq;
|
|
TCPConn *Conn;
|
|
AddrObj *DiscAO;
|
|
PVOID ConnContext;
|
|
|
|
CHECK_STRUCT(DiscTCB, tcb);
|
|
ASSERT(DiscTCB->tcb_refcnt != 0);
|
|
|
|
KeAcquireSpinLock(&DiscTCB->tcb_lock, &Irql0);
|
|
if (SYNC_STATE(DiscTCB->tcb_state) &&
|
|
!(DiscTCB->tcb_flags & DISC_NOTIFIED)) {
|
|
|
|
//
|
|
// We can't notify him if there's still data to be taken.
|
|
//
|
|
if (Status == TDI_GRACEFUL_DISC && !OKToNotify(DiscTCB)) {
|
|
DiscTCB->tcb_flags |= DISC_PENDING;
|
|
KeReleaseSpinLock(&DiscTCB->tcb_lock, Irql0);
|
|
return;
|
|
}
|
|
|
|
DiscTCB->tcb_flags |= DISC_NOTIFIED;
|
|
DiscTCB->tcb_flags &= ~DISC_PENDING;
|
|
|
|
//
|
|
// We're in a state where a disconnect is meaningful, and we haven't
|
|
// already notified the client.
|
|
// See if we have a DISC-WAIT request pending.
|
|
//
|
|
if ((DiscReq = DiscTCB->tcb_discwait) != NULL) {
|
|
//
|
|
// We have a disconnect wait request. Complete it and we're done.
|
|
//
|
|
DiscTCB->tcb_discwait = NULL;
|
|
KeReleaseSpinLock(&DiscTCB->tcb_lock, Irql0);
|
|
(*DiscReq->tcr_req.tr_rtn)(DiscReq->tcr_req.tr_context, Status, 0);
|
|
FreeConnReq(DiscReq);
|
|
return;
|
|
}
|
|
|
|
//
|
|
// No DISC-WAIT. Find the AddrObj for the connection, and see if
|
|
// there is a disconnect handler registered.
|
|
//
|
|
ConnContext = DiscTCB->tcb_conncontext;
|
|
KeReleaseSpinLock(&DiscTCB->tcb_lock, Irql0);
|
|
|
|
KeAcquireSpinLock(&AddrObjTableLock, &Irql0);
|
|
if ((Conn = DiscTCB->tcb_conn) != NULL) {
|
|
CHECK_STRUCT(Conn, tc);
|
|
KeAcquireSpinLock(&Conn->tc_ConnBlock->cb_lock, &Irql1);
|
|
|
|
DiscAO = Conn->tc_ao;
|
|
if (DiscAO != NULL) {
|
|
KIRQL Irql2;
|
|
PDisconnectEvent DiscEvent;
|
|
PVOID DiscContext;
|
|
|
|
CHECK_STRUCT(DiscAO, ao);
|
|
KeAcquireSpinLock(&DiscAO->ao_lock, &Irql2);
|
|
KeReleaseSpinLock(&Conn->tc_ConnBlock->cb_lock, Irql2);
|
|
KeReleaseSpinLock(&AddrObjTableLock, Irql1);
|
|
|
|
DiscEvent = DiscAO->ao_disconnect;
|
|
DiscContext = DiscAO->ao_disconncontext;
|
|
|
|
if (DiscEvent != NULL) {
|
|
|
|
REF_AO(DiscAO);
|
|
KeReleaseSpinLock(&DiscAO->ao_lock, Irql0);
|
|
|
|
IF_TCPDBG(TCP_DEBUG_CLOSE) {
|
|
KdPrintEx((DPFLTR_TCPIP6_ID, DPFLTR_INFO_TCPDBG,
|
|
"TCP: indicating %s disconnect\n",
|
|
(Status == TDI_GRACEFUL_DISC) ?
|
|
"graceful" : "abortive"));
|
|
}
|
|
|
|
(*DiscEvent)(DiscContext, ConnContext, 0, NULL, 0,
|
|
NULL, (Status == TDI_GRACEFUL_DISC) ?
|
|
TDI_DISCONNECT_RELEASE :
|
|
TDI_DISCONNECT_ABORT);
|
|
|
|
DELAY_DEREF_AO(DiscAO);
|
|
return;
|
|
} else {
|
|
KeReleaseSpinLock(&DiscAO->ao_lock, Irql0);
|
|
return;
|
|
}
|
|
}
|
|
KeReleaseSpinLock(&Conn->tc_ConnBlock->cb_lock, Irql1);
|
|
}
|
|
|
|
KeReleaseSpinLock(&AddrObjTableLock, Irql0);
|
|
return;
|
|
|
|
}
|
|
KeReleaseSpinLock(&DiscTCB->tcb_lock, Irql0);
|
|
}
|
|
|
|
|
|
//* GracefulClose - Complete the transition to a gracefully closed state.
|
|
//
|
|
// Called when we need to complete the transition to a gracefully closed
|
|
// state, either TIME_WAIT or CLOSED. This completion involves removing
|
|
// the TCB from it's associated connection (if it has one), notifying the
|
|
// upper layer client either via completing a request or calling a disc.
|
|
// notification handler, and actually doing the transition.
|
|
//
|
|
// The tricky part here is if we need to notify him (instead of completing
|
|
// a graceful disconnect request). We can't notify him if there is pending
|
|
// data on the connection, so in that case we have to pend the disconnect
|
|
// notification until we deliver the data.
|
|
//
|
|
void // Returns: Nothing.
|
|
GracefulClose(
|
|
TCB *CloseTCB, // TCB to transition.
|
|
uint ToTimeWait, // TRUE if we're going to TIME_WAIT, FALSE if
|
|
// we're going to close the TCB.
|
|
uint Notify, // TRUE if via notification, FALSE if via completing
|
|
// a disconnect request.
|
|
KIRQL PreLockIrql) // IRQL prior to acquiring TCB lock.
|
|
{
|
|
|
|
CHECK_STRUCT(CloseTCB, tcb);
|
|
ASSERT(CloseTCB->tcb_refcnt != 0);
|
|
|
|
//
|
|
// First, see if we need to notify the client of a FIN.
|
|
//
|
|
if (Notify) {
|
|
//
|
|
// We do need to notify him. See if it's OK to do so.
|
|
//
|
|
if (OKToNotify(CloseTCB)) {
|
|
//
|
|
// We can notify him. Change his state, pull him from the conn.,
|
|
// and notify him.
|
|
//
|
|
if (ToTimeWait) {
|
|
//
|
|
// Save the time we went into time wait, in case we need to
|
|
// scavenge.
|
|
//
|
|
CloseTCB->tcb_alive = SystemUpTime();
|
|
CloseTCB->tcb_state = TCB_TIME_WAIT;
|
|
KeReleaseSpinLock(&CloseTCB->tcb_lock, PreLockIrql);
|
|
} else {
|
|
//
|
|
// He's going to close. Mark him as closing with TryToCloseTCB
|
|
// (he won't actually close since we have a ref. on him). We
|
|
// do this so that anyone touching him after we free the
|
|
// lock will fail.
|
|
//
|
|
TryToCloseTCB(CloseTCB, TDI_SUCCESS, PreLockIrql);
|
|
}
|
|
|
|
RemoveTCBFromConn(CloseTCB);
|
|
NotifyOfDisc(CloseTCB, TDI_GRACEFUL_DISC);
|
|
|
|
} else {
|
|
//
|
|
// Can't notify him now. Set the appropriate flags, and return.
|
|
//
|
|
CloseTCB->tcb_flags |= (GC_PENDING |
|
|
(ToTimeWait ? TW_PENDING : 0));
|
|
DerefTCB(CloseTCB, PreLockIrql);
|
|
return;
|
|
}
|
|
} else {
|
|
//
|
|
// We're not notifying this guy, we just need to complete a conn. req.
|
|
// We need to check and see if he's been notified, and if not
|
|
// we'll complete the request and notify him later.
|
|
//
|
|
if (CloseTCB->tcb_flags & DISC_NOTIFIED) {
|
|
//
|
|
// He's been notified.
|
|
//
|
|
if (ToTimeWait) {
|
|
//
|
|
// Save the time we went into time wait, in case we need to
|
|
// scavenge.
|
|
//
|
|
CloseTCB->tcb_alive = SystemUpTime();
|
|
CloseTCB->tcb_state = TCB_TIME_WAIT;
|
|
KeReleaseSpinLock(&CloseTCB->tcb_lock, PreLockIrql);
|
|
} else {
|
|
//
|
|
// Mark him as closed. See comments above.
|
|
//
|
|
TryToCloseTCB(CloseTCB, TDI_SUCCESS, PreLockIrql);
|
|
}
|
|
|
|
RemoveTCBFromConn(CloseTCB);
|
|
|
|
KeAcquireSpinLock(&CloseTCB->tcb_lock, &PreLockIrql);
|
|
CompleteConnReq(CloseTCB, TDI_SUCCESS);
|
|
KeReleaseSpinLock(&CloseTCB->tcb_lock, PreLockIrql);
|
|
} else {
|
|
//
|
|
// He hasn't been notified. He should be pending already.
|
|
//
|
|
ASSERT(CloseTCB->tcb_flags & DISC_PENDING);
|
|
CloseTCB->tcb_flags |= (GC_PENDING |
|
|
(ToTimeWait ? TW_PENDING : 0));
|
|
|
|
CompleteConnReq(CloseTCB, TDI_SUCCESS);
|
|
|
|
DerefTCB(CloseTCB, PreLockIrql);
|
|
return;
|
|
}
|
|
}
|
|
|
|
//
|
|
// If we're going to TIME_WAIT, start the TIME_WAIT timer now.
|
|
// Otherwise close the TCB.
|
|
//
|
|
KeAcquireSpinLock(&CloseTCB->tcb_lock, &PreLockIrql);
|
|
if (!CLOSING(CloseTCB) && ToTimeWait) {
|
|
START_TCB_TIMER(CloseTCB->tcb_rexmittimer, MAX_REXMIT_TO);
|
|
KeReleaseSpinLock(&CloseTCB->tcb_lock, PreLockIrql);
|
|
RemoveConnFromTCB(CloseTCB);
|
|
KeAcquireSpinLock(&CloseTCB->tcb_lock, &PreLockIrql);
|
|
}
|
|
|
|
DerefTCB(CloseTCB, PreLockIrql);
|
|
}
|
|
|
|
#if 0 // REVIEW: Unused function?
|
|
//* ConnCheckPassed - Check to see if we have exceeded the connect limit.
|
|
//
|
|
// Called when a SYN is received to determine whether we will accept
|
|
// the incoming connection. If there is an empty slot or if the IP address
|
|
// is already in the table, we accept it.
|
|
//
|
|
int // Returns: TRUE is connect is accepted, FALSE if rejected.
|
|
ConnCheckPassed(
|
|
IPv6Addr *Src, // Source address of incoming connection.
|
|
ulong Prt) // Destination port of incoming connection.
|
|
{
|
|
UNREFERENCED_PARAMETER(Src);
|
|
UNREFERENCED_PARAMETER(Prt);
|
|
|
|
return TRUE;
|
|
}
|
|
#endif
|
|
|
|
void InitAddrChecks()
|
|
{
|
|
return;
|
|
}
|
|
|
|
|
|
//* EnumerateConnectionList - Enumerate Connection List database.
|
|
//
|
|
// This routine enumerates the contents of the connection limit database.
|
|
//
|
|
// Note: The comments found with this routine upon IPv6 port imply that
|
|
// there may have been code here once that actually did something.
|
|
// What's here now is a no-op.
|
|
//
|
|
void // Returns: Nothing.
|
|
EnumerateConnectionList(
|
|
uchar *Buffer, // Buffer to fill with connection list entries.
|
|
ulong BufferSize, // Size of Buffer in bytes.
|
|
ulong *EntriesReturned, // Where to put the number of entries returned.
|
|
ulong *EntriesAvailable) // Where to return number of avail conn. entries.
|
|
{
|
|
|
|
UNREFERENCED_PARAMETER(Buffer);
|
|
UNREFERENCED_PARAMETER(BufferSize);
|
|
|
|
*EntriesAvailable = 0;
|
|
*EntriesReturned = 0;
|
|
|
|
return;
|
|
}
|
|
|
|
|
|
#pragma BEGIN_INIT
|
|
|
|
//* InitTCPConn - Initialize TCP connection management code.
|
|
//
|
|
// Called during init time to initialize our TCP connection management.
|
|
//
|
|
int // Returns: TRUE.
|
|
InitTCPConn(
|
|
void) // Input: Nothing.
|
|
{
|
|
ExInitializeSListHead(&ConnReqFree);
|
|
KeInitializeSpinLock(&ConnReqFreeLock);
|
|
KeInitializeSpinLock(&ConnTableLock);
|
|
MaxAllocatedConnBlocks = 0;
|
|
ConnTable = ExAllocatePool(NonPagedPool,
|
|
MaxConnBlocks * sizeof(TCPConnBlock *));
|
|
if (ConnTable == NULL) {
|
|
return FALSE;
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
#pragma END_INIT
|
|
|
|
//* UnloadTCPConn
|
|
//
|
|
// Cleanup and prepare for stack unload.
|
|
//
|
|
void
|
|
UnloadTCPConn(void)
|
|
{
|
|
PSLIST_ENTRY BufferLink;
|
|
KIRQL OldIrql;
|
|
TCPConnBlock **OldTable;
|
|
|
|
while ((BufferLink = ExInterlockedPopEntrySList(&ConnReqFree,
|
|
&ConnReqFreeLock))
|
|
!= NULL) {
|
|
Queue *QueuePtr = CONTAINING_RECORD(BufferLink, Queue, q_next);
|
|
TCPReq *Req = CONTAINING_RECORD(QueuePtr, TCPReq, tr_q);
|
|
TCPConnReq *ConnReq = CONTAINING_RECORD(Req, TCPConnReq, tcr_req);
|
|
|
|
CHECK_STRUCT(ConnReq, tcr);
|
|
ExFreePool(ConnReq);
|
|
}
|
|
|
|
KeAcquireSpinLock(&ConnTableLock, &OldIrql);
|
|
OldTable = ConnTable;
|
|
ConnTable = NULL;
|
|
KeReleaseSpinLock(&ConnTableLock, OldIrql);
|
|
|
|
if (OldTable != NULL) {
|
|
uint i;
|
|
for (i = 0; i < MaxAllocatedConnBlocks; i++) {
|
|
ExFreePool(OldTable[i]);
|
|
}
|
|
ExFreePool(OldTable);
|
|
}
|
|
}
|