560 lines
13 KiB
C
560 lines
13 KiB
C
/*++
|
||
|
||
Copyright (c) 1989 Microsoft Corporation
|
||
|
||
Module Name:
|
||
|
||
eventsel.c
|
||
|
||
Abstract:
|
||
|
||
This module contains routines for supporting the WinSock 2.0
|
||
WSAEventSelect() and WSAEnumNetworkEvents() APIs.
|
||
|
||
Author:
|
||
|
||
Keith Moore (keithmo) 02-Aug-1995
|
||
|
||
Revision History:
|
||
|
||
--*/
|
||
|
||
#include "afdp.h"
|
||
|
||
#ifdef ALLOC_PRAGMA
|
||
#pragma alloc_text( PAGEAFD, AfdEventSelect )
|
||
#pragma alloc_text( PAGEAFD, AfdEnumNetworkEvents )
|
||
#endif
|
||
|
||
|
||
|
||
NTSTATUS
|
||
AfdEventSelect (
|
||
IN PFILE_OBJECT FileObject,
|
||
IN ULONG IoctlCode,
|
||
IN KPROCESSOR_MODE RequestorMode,
|
||
IN PVOID InputBuffer,
|
||
IN ULONG InputBufferLength,
|
||
IN PVOID OutputBuffer,
|
||
IN ULONG OutputBufferLength,
|
||
OUT PUINT_PTR Information
|
||
)
|
||
|
||
/*++
|
||
|
||
Routine Description:
|
||
|
||
Associates an event object with the socket such that the event object
|
||
will be signalled when any of the specified network events becomes
|
||
active.
|
||
|
||
Arguments:
|
||
|
||
Irp - Pointer to I/O request packet.
|
||
|
||
IrpSp - pointer to the IO stack location to use for this request.
|
||
|
||
Return Value:
|
||
|
||
NTSTATUS -- Indicates whether the APC was successfully queued.
|
||
|
||
--*/
|
||
|
||
{
|
||
|
||
NTSTATUS status;
|
||
PAFD_ENDPOINT endpoint;
|
||
AFD_LOCK_QUEUE_HANDLE lockHandle;
|
||
PKEVENT eventObject;
|
||
ULONG eventMask;
|
||
AFD_EVENT_SELECT_INFO eventInfo;
|
||
ULONG previousRecord = 0;
|
||
BOOLEAN countsUpdated = FALSE;
|
||
|
||
|
||
*Information = 0;
|
||
status = STATUS_SUCCESS;
|
||
|
||
try {
|
||
#ifdef _WIN64
|
||
if (IoIs32bitProcess (NULL)) {
|
||
|
||
PAFD_EVENT_SELECT_INFO32 eventInfo32 = InputBuffer;
|
||
|
||
if( InputBufferLength < sizeof(*eventInfo32)) {
|
||
return STATUS_INVALID_PARAMETER;
|
||
}
|
||
//
|
||
// Validate the input structure if it comes from the user mode
|
||
// application
|
||
//
|
||
|
||
if (RequestorMode != KernelMode ) {
|
||
ProbeForRead (InputBuffer,
|
||
sizeof (*eventInfo32),
|
||
PROBE_ALIGNMENT32(AFD_EVENT_SELECT_INFO32));
|
||
}
|
||
|
||
//
|
||
// Make local copies of the embeded pointer and parameters
|
||
// that we will be using more than once in case malicios
|
||
// application attempts to change them while we are
|
||
// validating
|
||
//
|
||
|
||
eventInfo.Event = eventInfo32->Event;
|
||
eventInfo.PollEvents = eventInfo32->PollEvents;
|
||
}
|
||
else
|
||
#endif
|
||
{
|
||
|
||
if(InputBufferLength < sizeof(eventInfo)) {
|
||
return STATUS_INVALID_PARAMETER;
|
||
}
|
||
|
||
if (RequestorMode != KernelMode ) {
|
||
ProbeForRead (InputBuffer,
|
||
sizeof (eventInfo),
|
||
PROBE_ALIGNMENT(AFD_EVENT_SELECT_INFO));
|
||
}
|
||
|
||
//
|
||
// Make local copies of the embeded pointer and parameters
|
||
// that we will be using more than once in case malicios
|
||
// application attempts to change them while we are
|
||
// validating
|
||
//
|
||
|
||
eventInfo = *((PAFD_EVENT_SELECT_INFO)InputBuffer);
|
||
}
|
||
}
|
||
except (AFD_EXCEPTION_FILTER (&status)) {
|
||
return status;
|
||
}
|
||
|
||
if ( eventInfo.Event == NULL &&
|
||
eventInfo.PollEvents != 0 ) {
|
||
|
||
return STATUS_INVALID_PARAMETER;
|
||
}
|
||
|
||
//
|
||
// Grab the endpoint from the socket handle.
|
||
//
|
||
|
||
endpoint = FileObject->FsContext;
|
||
ASSERT( IS_AFD_ENDPOINT_TYPE( endpoint ) );
|
||
|
||
//
|
||
// Reference the target event object.
|
||
//
|
||
|
||
|
||
eventObject = NULL;
|
||
|
||
if( eventInfo.Event != NULL ) {
|
||
|
||
status = AfdReferenceEventObjectByHandle(
|
||
eventInfo.Event,
|
||
RequestorMode,
|
||
(PVOID *)&eventObject
|
||
);
|
||
|
||
if( !NT_SUCCESS(status) ) {
|
||
return status;
|
||
}
|
||
|
||
ASSERT( eventObject != NULL );
|
||
|
||
if (IS_SAN_ENDPOINT (endpoint)) {
|
||
//
|
||
// Inform the switch that select is active on this endpoint.
|
||
//
|
||
status = AfdSanPollBegin (endpoint, eventInfo.PollEvents);
|
||
|
||
if (!NT_SUCCESS (status)) {
|
||
ObDereferenceObject (eventObject);
|
||
return status;
|
||
}
|
||
countsUpdated = TRUE;
|
||
}
|
||
|
||
}
|
||
|
||
//
|
||
// Acquire the spinlock protecting the endpoint.
|
||
//
|
||
|
||
AfdAcquireSpinLock( &endpoint->SpinLock, &lockHandle );
|
||
|
||
//
|
||
// If this endpoint has an active EventSelect, dereference the
|
||
// associated event object.
|
||
//
|
||
|
||
if( endpoint->EventObject != NULL ) {
|
||
|
||
ObDereferenceObject( endpoint->EventObject );
|
||
|
||
if (IS_SAN_ENDPOINT (endpoint)) {
|
||
previousRecord = endpoint->EventsEnabled;
|
||
}
|
||
|
||
}
|
||
|
||
//
|
||
// Fill in the info.
|
||
//
|
||
|
||
endpoint->EventObject = eventObject;
|
||
endpoint->EventsEnabled = eventInfo.PollEvents;
|
||
|
||
if (countsUpdated) {
|
||
endpoint->EventsEnabled |= AFD_POLL_SANCOUNTS_UPDATED;
|
||
//
|
||
// AfdSanPollBegin puts latest events into
|
||
// Endpoint->Common.SanEndp.SelectEventsActive. This is fine for
|
||
// select/AsyncSelect, but not for EventSelect. So, if being called
|
||
// for the first time, then read current active events from there.
|
||
//
|
||
if (!(previousRecord & AFD_POLL_SANCOUNTS_UPDATED)) {
|
||
endpoint->EventsActive = endpoint->Common.SanEndp.SelectEventsActive;
|
||
}
|
||
}
|
||
|
||
IF_DEBUG(EVENT_SELECT) {
|
||
KdPrintEx(( DPFLTR_WSOCKTRANSPORT_ID, DPFLTR_TRACE_LEVEL,
|
||
"AfdEventSelect: Endpoint-%p, eventOb-%p, enabled-%lx, active-%lx\n",
|
||
endpoint,
|
||
eventObject,
|
||
endpoint->EventsEnabled,
|
||
endpoint->EventsActive
|
||
));
|
||
}
|
||
|
||
//
|
||
// While we've got the spinlock held, determine if any conditions
|
||
// are met, and if so, signal the event object.
|
||
//
|
||
|
||
eventMask = endpoint->EventsActive & endpoint->EventsEnabled;
|
||
|
||
if( eventMask != 0 && eventObject != NULL ) {
|
||
|
||
IF_DEBUG(EVENT_SELECT) {
|
||
KdPrintEx(( DPFLTR_WSOCKTRANSPORT_ID, DPFLTR_TRACE_LEVEL,
|
||
"AfdEventSelect: Setting event %p\n",
|
||
eventObject
|
||
));
|
||
}
|
||
|
||
KeSetEvent(
|
||
eventObject,
|
||
AfdPriorityBoost,
|
||
FALSE
|
||
);
|
||
|
||
}
|
||
|
||
//
|
||
// Release the spin lock and return.
|
||
//
|
||
|
||
AfdReleaseSpinLock( &endpoint->SpinLock, &lockHandle );
|
||
|
||
if (previousRecord & AFD_POLL_SANCOUNTS_UPDATED) {
|
||
AfdSanPollEnd (endpoint, previousRecord);
|
||
}
|
||
|
||
return STATUS_SUCCESS;
|
||
|
||
} // AfdEventSelect
|
||
|
||
|
||
NTSTATUS
|
||
AfdEnumNetworkEvents (
|
||
IN PFILE_OBJECT FileObject,
|
||
IN ULONG IoctlCode,
|
||
IN KPROCESSOR_MODE RequestorMode,
|
||
IN PVOID InputBuffer,
|
||
IN ULONG InputBufferLength,
|
||
IN PVOID OutputBuffer,
|
||
IN ULONG OutputBufferLength,
|
||
OUT PUINT_PTR Information
|
||
)
|
||
|
||
/*++
|
||
|
||
Routine Description:
|
||
|
||
Retrieves event select information from the socket.
|
||
|
||
Arguments:
|
||
|
||
Irp - Pointer to I/O request packet.
|
||
|
||
IrpSp - pointer to the IO stack location to use for this request.
|
||
|
||
Return Value:
|
||
|
||
NTSTATUS -- Indicates whether the APC was successfully queued.
|
||
|
||
--*/
|
||
|
||
{
|
||
|
||
NTSTATUS status;
|
||
PAFD_ENDPOINT endpoint;
|
||
AFD_ENUM_NETWORK_EVENTS_INFO eventInfo;
|
||
AFD_LOCK_QUEUE_HANDLE lockHandle;
|
||
PKEVENT eventObject;
|
||
ULONG pollEvents;
|
||
|
||
status = STATUS_SUCCESS;
|
||
*Information = 0;
|
||
|
||
//
|
||
// Validate the parameters.
|
||
//
|
||
|
||
if(OutputBufferLength < sizeof(eventInfo) ) {
|
||
|
||
return STATUS_INVALID_PARAMETER;
|
||
|
||
}
|
||
|
||
//
|
||
// Reference the target event object.
|
||
//
|
||
|
||
eventObject = NULL;
|
||
|
||
if( InputBuffer != NULL ) {
|
||
|
||
status = AfdReferenceEventObjectByHandle(
|
||
InputBuffer,
|
||
RequestorMode,
|
||
(PVOID *)&eventObject
|
||
);
|
||
|
||
if( !NT_SUCCESS(status) ) {
|
||
|
||
return status;
|
||
|
||
}
|
||
|
||
ASSERT( eventObject != NULL );
|
||
|
||
}
|
||
|
||
//
|
||
// Grab the endpoint from the socket handle.
|
||
//
|
||
|
||
endpoint = FileObject->FsContext;
|
||
ASSERT( IS_AFD_ENDPOINT_TYPE( endpoint ) );
|
||
|
||
//
|
||
// Acquire the spinlock protecting the endpoint.
|
||
//
|
||
|
||
AfdAcquireSpinLock( &endpoint->SpinLock, &lockHandle );
|
||
|
||
IF_DEBUG(EVENT_SELECT) {
|
||
KdPrintEx(( DPFLTR_WSOCKTRANSPORT_ID, DPFLTR_TRACE_LEVEL,
|
||
"AfdEnumNetworkEvents: endp-%p, eventobj-%p, enabled-%lx, active-%lx\n",
|
||
endpoint,
|
||
eventObject,
|
||
endpoint->EventsEnabled,
|
||
endpoint->EventsActive
|
||
));
|
||
}
|
||
|
||
//
|
||
// Copy the data to the user's structure.
|
||
//
|
||
|
||
pollEvents = endpoint->EventsActive & endpoint->EventsEnabled;
|
||
eventInfo.PollEvents = pollEvents;
|
||
|
||
RtlCopyMemory(
|
||
eventInfo.EventStatus,
|
||
endpoint->EventStatus,
|
||
sizeof(eventInfo.EventStatus)
|
||
);
|
||
|
||
//
|
||
// If there was an event object handle passed in with this
|
||
// request, reset and dereference it.
|
||
//
|
||
|
||
if( eventObject != NULL ) {
|
||
|
||
IF_DEBUG(EVENT_SELECT) {
|
||
KdPrintEx(( DPFLTR_WSOCKTRANSPORT_ID, DPFLTR_TRACE_LEVEL,
|
||
"AfdEnumNetworkEvents: Resetting event %p\n",
|
||
eventObject
|
||
));
|
||
}
|
||
|
||
KeResetEvent( eventObject );
|
||
ObDereferenceObject( eventObject );
|
||
|
||
}
|
||
|
||
|
||
//
|
||
// Reset internal event record for all the events that
|
||
// we could potentially report to the application
|
||
//
|
||
|
||
endpoint->EventsActive &= ~(endpoint->EventsEnabled);
|
||
|
||
//
|
||
// Release the spin lock and return.
|
||
//
|
||
|
||
AfdReleaseSpinLock( &endpoint->SpinLock, &lockHandle );
|
||
|
||
try {
|
||
//
|
||
// Validate the output structure if it comes from the user mode
|
||
// application
|
||
//
|
||
|
||
if (RequestorMode != KernelMode ) {
|
||
ProbeForWrite (OutputBuffer,
|
||
sizeof (eventInfo),
|
||
PROBE_ALIGNMENT (AFD_ENUM_NETWORK_EVENTS_INFO));
|
||
}
|
||
|
||
//
|
||
// Copy parameters back to application's memory
|
||
//
|
||
|
||
*((PAFD_ENUM_NETWORK_EVENTS_INFO)OutputBuffer) = eventInfo;
|
||
|
||
} except( AFD_EXCEPTION_FILTER(&status) ) {
|
||
|
||
return status;
|
||
}
|
||
|
||
//
|
||
// Before returning, tell the I/O subsystem how may bytes to copy
|
||
// to the user's output buffer.
|
||
//
|
||
|
||
*Information = sizeof(eventInfo);
|
||
|
||
return STATUS_SUCCESS;
|
||
|
||
} // AfdEnumNetworkEvents
|
||
|
||
|
||
VOID
|
||
AfdIndicateEventSelectEvent (
|
||
IN PAFD_ENDPOINT Endpoint,
|
||
IN ULONG PollEventMask,
|
||
IN NTSTATUS Status
|
||
)
|
||
{
|
||
ULONG oldEventsActive;
|
||
ULONG eventBit;
|
||
|
||
//
|
||
// Sanity check.
|
||
//
|
||
|
||
ASSERT( IS_AFD_ENDPOINT_TYPE( Endpoint ) );
|
||
ASSERT (PollEventMask!=0);
|
||
ASSERT (((~((1<<AFD_NUM_POLL_EVENTS)-1)) & PollEventMask)==0);
|
||
ASSERT( KeGetCurrentIrql() >= DISPATCH_LEVEL );
|
||
|
||
//
|
||
// Note that AFD_POLL_ABORT implies AFD_POLL_SEND.
|
||
//
|
||
if( PollEventMask & AFD_POLL_ABORT ) {
|
||
PollEventMask |= AFD_POLL_SEND;
|
||
}
|
||
|
||
//
|
||
// Special handling of send event. Don't record if not enabled
|
||
// and disable further indication upon recording (it is only enabled
|
||
// after we fail non-blocking send
|
||
//
|
||
|
||
//
|
||
// Update the counts for the polls that were issued before
|
||
// the endpoint was converted to SAN.
|
||
//
|
||
if ( IS_SAN_ENDPOINT (Endpoint) &&
|
||
!(Endpoint->EventsEnabled & AFD_POLL_SANCOUNTS_UPDATED) &&
|
||
Endpoint->Common.SanEndp.LocalContext!=NULL) {
|
||
AfdSanPollUpdate (Endpoint, Endpoint->EventsEnabled);
|
||
Endpoint->EventsEnabled |= AFD_POLL_SANCOUNTS_UPDATED;
|
||
}
|
||
|
||
if (PollEventMask&AFD_POLL_SEND) {
|
||
if (Endpoint->EnableSendEvent) {
|
||
Endpoint ->EnableSendEvent = FALSE;
|
||
}
|
||
else {
|
||
PollEventMask &= (~AFD_POLL_SEND);
|
||
if (PollEventMask==0) {
|
||
return;
|
||
}
|
||
}
|
||
}
|
||
|
||
//
|
||
// Calculate the actual event bit.
|
||
//
|
||
|
||
oldEventsActive = Endpoint->EventsActive;
|
||
Endpoint->EventsActive |= PollEventMask;
|
||
for (eventBit=0; eventBit<AFD_NUM_POLL_EVENTS; eventBit++) {
|
||
if ((1<<eventBit) & PollEventMask) {
|
||
Endpoint->EventStatus[eventBit] = Status;
|
||
}
|
||
}
|
||
|
||
IF_DEBUG(EVENT_SELECT) {
|
||
KdPrintEx(( DPFLTR_WSOCKTRANSPORT_ID, DPFLTR_TRACE_LEVEL,
|
||
"AfdIndicateEventSelectEvent: endp-%p, eventobj-%p, enabled-%lx, active-%lx, indicated-%lx\n",
|
||
Endpoint,
|
||
Endpoint->EventObject,
|
||
Endpoint->EventsEnabled,
|
||
Endpoint->EventsActive,
|
||
PollEventMask
|
||
));
|
||
}
|
||
|
||
//
|
||
// Only signal the endpoint's event object if the current event
|
||
// is enabled, AND the current event was not already active, AND
|
||
// there is an event object associated with this endpoint.
|
||
//
|
||
|
||
PollEventMask &= Endpoint->EventsEnabled & ~oldEventsActive;
|
||
|
||
if( PollEventMask != 0 && Endpoint->EventObject != NULL ) {
|
||
|
||
IF_DEBUG(EVENT_SELECT) {
|
||
KdPrintEx(( DPFLTR_WSOCKTRANSPORT_ID, DPFLTR_TRACE_LEVEL,
|
||
"AfdIndicateEventSelectEvent: Setting event %p\n",
|
||
Endpoint->EventObject
|
||
));
|
||
}
|
||
|
||
KeSetEvent(
|
||
Endpoint->EventObject,
|
||
AfdPriorityBoost,
|
||
FALSE
|
||
);
|
||
|
||
}
|
||
|
||
} // AfdIndicateEventSelectEvent
|
||
|