2 * COPYRIGHT: See COPYING in the top level directory
3 * PROJECT: ReactOS TCP/IP protocol driver
4 * FILE: transport/tcp/event.c
5 * PURPOSE: Transmission Control Protocol -- Events from oskittcp
6 * PROGRAMMERS: Art Yerkes
8 * CSH 01/08-2000 Created
13 int TCPSocketState(void *ClientData
,
15 void *WhichConnection
,
17 PCONNECTION_ENDPOINT Connection
= WhichConnection
;
21 ASSERT_LOCKED(&TCPLock
);
23 TI_DbgPrint(MID_TRACE
,("Flags: %c%c%c%c\n",
24 NewState
& SEL_CONNECT
? 'C' : 'c',
25 NewState
& SEL_READ
? 'R' : 'r',
26 NewState
& SEL_FIN
? 'F' : 'f',
27 NewState
& SEL_ACCEPT
? 'A' : 'a'));
29 TI_DbgPrint(DEBUG_TCP
,("Called: NewState %x (Conn %x) (Change %x)\n",
31 Connection
? Connection
->SignalState
^ NewState
:
35 TI_DbgPrint(DEBUG_TCP
,("Socket closing.\n"));
36 Connection
= FileFindConnectionByContext( WhichSocket
);
40 TI_DbgPrint(DEBUG_TCP
,("Found socket %x\n", Connection
));
43 OldState
= Connection
->SignalState
;
45 Connection
->SignalState
|= NewState
;
47 NewState
= HandleSignalledConnection(Connection
);
49 KeAcquireSpinLock(&SignalledConnectionsLock
, &OldIrql
);
50 if ((NewState
== 0 || NewState
== SEL_FIN
) &&
51 (OldState
!= 0 && OldState
!= SEL_FIN
))
53 RemoveEntryList(&Connection
->SignalList
);
55 else if (NewState
!= 0 && NewState
!= SEL_FIN
)
57 InsertTailList(&SignalledConnectionsList
, &Connection
->SignalList
);
59 KeReleaseSpinLock(&SignalledConnectionsLock
, OldIrql
);
64 void TCPPacketSendComplete( PVOID Context
,
65 PNDIS_PACKET NdisPacket
,
66 NDIS_STATUS NdisStatus
) {
67 TI_DbgPrint(DEBUG_TCP
,("called %x\n", NdisPacket
));
68 FreeNdisPacket(NdisPacket
);
69 TI_DbgPrint(DEBUG_TCP
,("done\n"));
72 #define STRINGIFY(x) #x
74 int TCPPacketSend(void *ClientData
, OSK_PCHAR data
, OSK_UINT len
) {
75 NDIS_STATUS NdisStatus
;
76 PNEIGHBOR_CACHE_ENTRY NCE
;
77 IP_PACKET Packet
= { 0 };
78 IP_ADDRESS RemoteAddress
, LocalAddress
;
81 ASSERT_LOCKED(&TCPLock
);
83 if( *data
== 0x45 ) { /* IPv4 */
84 Header
= (PIPv4_HEADER
)data
;
85 LocalAddress
.Type
= IP_ADDRESS_V4
;
86 LocalAddress
.Address
.IPv4Address
= Header
->SrcAddr
;
87 RemoteAddress
.Type
= IP_ADDRESS_V4
;
88 RemoteAddress
.Address
.IPv4Address
= Header
->DstAddr
;
90 TI_DbgPrint(MIN_TRACE
,("Outgoing packet is not IPv4\n"));
91 OskitDumpBuffer( data
, len
);
95 if(!(NCE
= RouteGetRouteToDestination( &RemoteAddress
))) {
96 TI_DbgPrint(MIN_TRACE
,("No route to %s\n", A2S(&RemoteAddress
)));
97 return OSK_EADDRNOTAVAIL
;
100 NdisStatus
= AllocatePacketWithBuffer( &Packet
.NdisPacket
, NULL
, len
);
102 if (NdisStatus
!= NDIS_STATUS_SUCCESS
) {
103 TI_DbgPrint(DEBUG_TCP
, ("Error from NDIS: %08x\n", NdisStatus
));
107 GetDataPtr( Packet
.NdisPacket
, 0,
108 (PCHAR
*)&Packet
.Header
, &Packet
.ContigSize
);
110 RtlCopyMemory( Packet
.Header
, data
, len
);
112 Packet
.HeaderSize
= sizeof(IPv4_HEADER
);
113 Packet
.TotalSize
= len
;
114 Packet
.SrcAddr
= LocalAddress
;
115 Packet
.DstAddr
= RemoteAddress
;
117 if (!NT_SUCCESS(IPSendDatagram( &Packet
, NCE
, TCPPacketSendComplete
, NULL
)))
119 FreeNdisPacket(Packet
.NdisPacket
);
126 int TCPSleep( void *ClientData
, void *token
, int priority
, char *msg
,
128 PSLEEPING_THREAD SleepingThread
;
129 LARGE_INTEGER Timeout
;
131 ASSERT_LOCKED(&TCPLock
);
133 TI_DbgPrint(DEBUG_TCP
,
134 ("Called TSLEEP: tok = %x, pri = %d, wmesg = %s, tmio = %x\n",
135 token
, priority
, msg
, tmio
));
137 SleepingThread
= exAllocatePool( NonPagedPool
, sizeof( *SleepingThread
) );
138 if( SleepingThread
) {
139 KeInitializeEvent( &SleepingThread
->Event
, NotificationEvent
, FALSE
);
140 SleepingThread
->SleepToken
= token
;
142 /* We're going to sleep and need to release the lock, otherwise
143 it's impossible to re-enter oskittcp to deliver the event that's
145 TcpipRecursiveMutexLeave( &TCPLock
);
147 TcpipAcquireFastMutex( &SleepingThreadsLock
);
148 InsertTailList( &SleepingThreadsList
, &SleepingThread
->Entry
);
149 TcpipReleaseFastMutex( &SleepingThreadsLock
);
151 Timeout
.QuadPart
= Int32x32To64(tmio
, -10000);
153 TI_DbgPrint(DEBUG_TCP
,("Waiting on %x\n", token
));
154 KeWaitForSingleObject( &SleepingThread
->Event
,
158 (tmio
!= 0) ? &Timeout
: NULL
);
160 TcpipAcquireFastMutex( &SleepingThreadsLock
);
161 RemoveEntryList( &SleepingThread
->Entry
);
162 TcpipReleaseFastMutex( &SleepingThreadsLock
);
164 TcpipRecursiveMutexEnter( &TCPLock
, TRUE
);
166 exFreePool( SleepingThread
);
170 TI_DbgPrint(DEBUG_TCP
,("Waiting finished: %x\n", token
));
174 void TCPWakeup( void *ClientData
, void *token
) {
176 PSLEEPING_THREAD SleepingThread
;
178 ASSERT_LOCKED(&TCPLock
);
180 TcpipAcquireFastMutex( &SleepingThreadsLock
);
181 Entry
= SleepingThreadsList
.Flink
;
182 while( Entry
!= &SleepingThreadsList
) {
183 SleepingThread
= CONTAINING_RECORD(Entry
, SLEEPING_THREAD
, Entry
);
184 TI_DbgPrint(DEBUG_TCP
,("Sleeper @ %x\n", SleepingThread
));
185 if( SleepingThread
->SleepToken
== token
) {
186 TI_DbgPrint(DEBUG_TCP
,("Setting event to wake %x\n", token
));
187 KeSetEvent( &SleepingThread
->Event
, IO_NETWORK_INCREMENT
, FALSE
);
189 Entry
= Entry
->Flink
;
191 TcpipReleaseFastMutex( &SleepingThreadsLock
);
194 /* Memory management routines
196 * By far the most requests for memory are either for 128 or 2048 byte blocks,
197 * so we want to satisfy those from lookaside lists. Unfortunately, the
198 * TCPFree() function doesn't pass the size of the block to be freed, so we
199 * need to keep track of it ourselves. We do it by prepending each block with
200 * 4 bytes, indicating if this is a 'L'arge (2048), 'S'mall (128) or 'O'ther
204 /* Set to some non-zero value to get a profile of memory allocation sizes */
205 #define MEM_PROFILE 0
207 #define SMALL_SIZE 128
208 #define LARGE_SIZE 2048
210 #define SIGNATURE_LARGE 'LLLL'
211 #define SIGNATURE_SMALL 'SSSS'
212 #define SIGNATURE_OTHER 'OOOO'
213 #define TCP_TAG ' PCT'
215 static NPAGED_LOOKASIDE_LIST LargeLookasideList
;
216 static NPAGED_LOOKASIDE_LIST SmallLookasideList
;
219 TCPMemStartup( void )
221 ExInitializeNPagedLookasideList( &LargeLookasideList
,
225 LARGE_SIZE
+ sizeof( ULONG
),
228 ExInitializeNPagedLookasideList( &SmallLookasideList
,
232 SMALL_SIZE
+ sizeof( ULONG
),
236 return STATUS_SUCCESS
;
239 void *TCPMalloc( void *ClientData
,
240 OSK_UINT Bytes
, OSK_PCHAR File
, OSK_UINT Line
) {
244 ASSERT_LOCKED(&TCPLock
);
247 static OSK_UINT
*Sizes
= NULL
, *Counts
= NULL
, ArrayAllocated
= 0;
248 static OSK_UINT ArrayUsed
= 0, AllocationCount
= 0;
249 OSK_UINT i
, NewSize
, *NewArray
;
253 for ( i
= 0; i
< ArrayUsed
&& ! Found
; i
++ ) {
254 Found
= ( Sizes
[i
] == Bytes
);
260 if ( ArrayAllocated
<= ArrayUsed
) {
261 NewSize
= ( 0 == ArrayAllocated
? 16 : 2 * ArrayAllocated
);
262 NewArray
= exAllocatePool( NonPagedPool
, 2 * NewSize
* sizeof( OSK_UINT
) );
263 if ( NULL
!= NewArray
) {
264 if ( 0 != ArrayAllocated
) {
265 memcpy( NewArray
, Sizes
,
266 ArrayAllocated
* sizeof( OSK_UINT
) );
268 memcpy( NewArray
+ NewSize
, Counts
,
269 ArrayAllocated
* sizeof( OSK_UINT
) );
270 exFreePool( Counts
);
273 Counts
= NewArray
+ NewSize
;
274 ArrayAllocated
= NewSize
;
275 } else if ( 0 != ArrayAllocated
) {
277 exFreePool( Counts
);
281 if ( ArrayUsed
< ArrayAllocated
) {
282 Sizes
[ArrayUsed
] = Bytes
;
283 Counts
[ArrayUsed
] = 1;
288 if ( 0 == (++AllocationCount
% MEM_PROFILE
) ) {
289 TI_DbgPrint(DEBUG_TCP
, ("Memory allocation size profile:\n"));
290 for ( i
= 0; i
< ArrayUsed
; i
++ ) {
291 TI_DbgPrint(DEBUG_TCP
,
292 ("Size %4u Count %5u\n", Sizes
[i
], Counts
[i
]));
294 TI_DbgPrint(DEBUG_TCP
, ("End of memory allocation size profile\n"));
296 #endif /* MEM_PROFILE */
298 if ( SMALL_SIZE
== Bytes
) {
299 v
= ExAllocateFromNPagedLookasideList( &SmallLookasideList
);
300 Signature
= SIGNATURE_SMALL
;
301 } else if ( LARGE_SIZE
== Bytes
) {
302 v
= ExAllocateFromNPagedLookasideList( &LargeLookasideList
);
303 Signature
= SIGNATURE_LARGE
;
305 v
= ExAllocatePool( NonPagedPool
, Bytes
+ sizeof(ULONG
) );
306 Signature
= SIGNATURE_OTHER
;
309 *((ULONG
*) v
) = Signature
;
310 v
= (void *)((char *) v
+ sizeof(ULONG
));
311 TrackWithTag( FOURCC('f','b','s','d'), v
, (PCHAR
)File
, Line
);
317 void TCPFree( void *ClientData
,
318 void *data
, OSK_PCHAR File
, OSK_UINT Line
) {
321 ASSERT_LOCKED(&TCPLock
);
323 UntrackFL( (PCHAR
)File
, Line
, data
, FOURCC('f','b','s','d') );
324 data
= (void *)((char *) data
- sizeof(ULONG
));
325 Signature
= *((ULONG
*) data
);
326 if ( SIGNATURE_SMALL
== Signature
) {
327 ExFreeToNPagedLookasideList( &SmallLookasideList
, data
);
328 } else if ( SIGNATURE_LARGE
== Signature
) {
329 ExFreeToNPagedLookasideList( &LargeLookasideList
, data
);
330 } else if ( SIGNATURE_OTHER
== Signature
) {
338 TCPMemShutdown( void )
340 ExDeleteNPagedLookasideList( &SmallLookasideList
);
341 ExDeleteNPagedLookasideList( &LargeLookasideList
);