1 /*
2 * Copyright (c) 2001-2003 Swedish Institute of Computer Science.
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without modification,
6 * are permitted provided that the following conditions are met:
7 *
8 * 1. Redistributions of source code must retain the above copyright notice,
9 * this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright notice,
11 * this list of conditions and the following disclaimer in the documentation
12 * and/or other materials provided with the distribution.
13 * 3. The name of the author may not be used to endorse or promote products
14 * derived from this software without specific prior written permission.
15 *
16 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED
17 * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
18 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
19 * SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
20 * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT
21 * OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
22 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
23 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
24 * IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY
25 * OF SUCH DAMAGE.
26 *
27 * This file is part of the lwIP TCP/IP stack.
28 *
29 * Author: Adam Dunkels <adam@sics.se>
30 * Simon Goldschmidt
31 *
32 */
33
34 #include <stdlib.h>
35 #include <stdio.h> /* sprintf() for task names */
36
37 #ifdef _MSC_VER
38 #pragma warning (push, 3)
39 #endif
40 #include <windows.h>
41 #ifdef _MSC_VER
42 #pragma warning (pop)
43 #endif
44 #include <time.h>
45
46 #include <lwip/opt.h>
47 #include <lwip/arch.h>
48 #include <lwip/stats.h>
49 #include <lwip/debug.h>
50 #include <lwip/sys.h>
51 #include <lwip/tcpip.h>
52
53 /** Set this to 1 to enable assertion checks that SYS_ARCH_PROTECT() is only
54 * called once in a call stack (calling it nested might cause trouble in some
55 * implementations, so let's avoid this in core code as long as we can).
56 */
57 #ifndef LWIP_SYS_ARCH_CHECK_NESTED_PROTECT
58 #define LWIP_SYS_ARCH_CHECK_NESTED_PROTECT 1
59 #endif
60
61 /** Set this to 1 to enable assertion checks that SYS_ARCH_PROTECT() is *not*
62 * called before functions potentiolly involving the OS scheduler.
63 *
64 * This scheme is currently broken only for non-core-locking when waking up
65 * threads waiting on a socket via select/poll.
66 */
67 #ifndef LWIP_SYS_ARCH_CHECK_SCHEDULING_UNPROTECTED
68 #define LWIP_SYS_ARCH_CHECK_SCHEDULING_UNPROTECTED LWIP_TCPIP_CORE_LOCKING
69 #endif
70
71 #define LWIP_WIN32_SYS_ARCH_ENABLE_PROTECT_COUNTER (LWIP_SYS_ARCH_CHECK_NESTED_PROTECT || LWIP_SYS_ARCH_CHECK_SCHEDULING_UNPROTECTED)
72
73 /* These functions are used from NO_SYS also, for precise timer triggering */
74 static LARGE_INTEGER freq, sys_start_time;
75 #define SYS_INITIALIZED() (freq.QuadPart != 0)
76
77 static DWORD netconn_sem_tls_index;
78
79 static HCRYPTPROV hcrypt;
80
81 static void
sys_win_rand_init(void)82 sys_win_rand_init(void)
83 {
84 if (!CryptAcquireContext(&hcrypt, NULL, NULL, PROV_RSA_FULL, 0)) {
85 DWORD err = GetLastError();
86 LWIP_PLATFORM_DIAG(("CryptAcquireContext failed with error %d, trying to create NEWKEYSET", (int)err));
87 if(!CryptAcquireContext(&hcrypt, NULL, NULL, PROV_RSA_FULL, CRYPT_NEWKEYSET)) {
88 char errbuf[128];
89 err = GetLastError();
90 snprintf(errbuf, sizeof(errbuf), "CryptAcquireContext failed with error %d", (int)err);
91 LWIP_UNUSED_ARG(err);
92 LWIP_ASSERT(errbuf, 0);
93 }
94 }
95 }
96
97 unsigned int
lwip_port_rand(void)98 lwip_port_rand(void)
99 {
100 u32_t ret;
101 if (CryptGenRandom(hcrypt, sizeof(ret), (BYTE*)&ret)) {
102 return ret;
103 }
104 /* maybe CryptAcquireContext has not been called... */
105 sys_win_rand_init();
106 if (CryptGenRandom(hcrypt, sizeof(ret), (BYTE*)&ret)) {
107 return ret;
108 }
109 LWIP_ASSERT("CryptGenRandom failed", 0);
110 return 0;
111 }
112
113 static void
sys_init_timing(void)114 sys_init_timing(void)
115 {
116 QueryPerformanceFrequency(&freq);
117 QueryPerformanceCounter(&sys_start_time);
118 }
119
120 static LONGLONG
sys_get_ms_longlong(void)121 sys_get_ms_longlong(void)
122 {
123 LONGLONG ret;
124 LARGE_INTEGER now;
125 #if NO_SYS
126 if (!SYS_INITIALIZED()) {
127 sys_init();
128 LWIP_ASSERT("initialization failed", SYS_INITIALIZED());
129 }
130 #endif /* NO_SYS */
131 QueryPerformanceCounter(&now);
132 ret = now.QuadPart-sys_start_time.QuadPart;
133 return (u32_t)(((ret)*1000)/freq.QuadPart);
134 }
135
136 u32_t
sys_jiffies(void)137 sys_jiffies(void)
138 {
139 return (u32_t)sys_get_ms_longlong();
140 }
141
142 u32_t
sys_now(void)143 sys_now(void)
144 {
145 u32_t now = (u32_t)sys_get_ms_longlong();
146 #ifdef LWIP_FUZZ_SYS_NOW
147 now += sys_now_offset;
148 #endif
149 return now;
150 }
151
152 CRITICAL_SECTION critSec;
153 #if LWIP_WIN32_SYS_ARCH_ENABLE_PROTECT_COUNTER
154 static int protection_depth;
155 #endif
156
157 static void
InitSysArchProtect(void)158 InitSysArchProtect(void)
159 {
160 InitializeCriticalSection(&critSec);
161 }
162
163 sys_prot_t
sys_arch_protect(void)164 sys_arch_protect(void)
165 {
166 #if NO_SYS
167 if (!SYS_INITIALIZED()) {
168 sys_init();
169 LWIP_ASSERT("initialization failed", SYS_INITIALIZED());
170 }
171 #endif
172 EnterCriticalSection(&critSec);
173 #if LWIP_SYS_ARCH_CHECK_NESTED_PROTECT
174 LWIP_ASSERT("nested SYS_ARCH_PROTECT", protection_depth == 0);
175 #endif
176 #if LWIP_WIN32_SYS_ARCH_ENABLE_PROTECT_COUNTER
177 protection_depth++;
178 #endif
179 return 0;
180 }
181
182 void
sys_arch_unprotect(sys_prot_t pval)183 sys_arch_unprotect(sys_prot_t pval)
184 {
185 LWIP_UNUSED_ARG(pval);
186 #if LWIP_SYS_ARCH_CHECK_NESTED_PROTECT
187 LWIP_ASSERT("missing SYS_ARCH_PROTECT", protection_depth == 1);
188 #else
189 LWIP_ASSERT("missing SYS_ARCH_PROTECT", protection_depth > 0);
190 #endif
191 #if LWIP_WIN32_SYS_ARCH_ENABLE_PROTECT_COUNTER
192 protection_depth--;
193 #endif
194 LeaveCriticalSection(&critSec);
195 }
196
197 #if LWIP_SYS_ARCH_CHECK_SCHEDULING_UNPROTECTED
198 /** This checks that SYS_ARCH_PROTECT() hasn't been called by protecting
199 * and then checking the level
200 */
201 static void
sys_arch_check_not_protected(void)202 sys_arch_check_not_protected(void)
203 {
204 sys_arch_protect();
205 LWIP_ASSERT("SYS_ARCH_PROTECT before scheduling", protection_depth == 1);
206 sys_arch_unprotect(0);
207 }
208 #else
209 #define sys_arch_check_not_protected()
210 #endif
211
212 static void
msvc_sys_init(void)213 msvc_sys_init(void)
214 {
215 sys_win_rand_init();
216 sys_init_timing();
217 InitSysArchProtect();
218 netconn_sem_tls_index = TlsAlloc();
219 LWIP_ASSERT("TlsAlloc failed", netconn_sem_tls_index != TLS_OUT_OF_INDEXES);
220 }
221
222 void
sys_init(void)223 sys_init(void)
224 {
225 msvc_sys_init();
226 }
227
228 #if !NO_SYS
229
230 struct threadlist {
231 lwip_thread_fn function;
232 void *arg;
233 DWORD id;
234 struct threadlist *next;
235 };
236
237 static struct threadlist *lwip_win32_threads = NULL;
238
239 err_t
sys_sem_new(sys_sem_t * sem,u8_t count)240 sys_sem_new(sys_sem_t *sem, u8_t count)
241 {
242 HANDLE new_sem = NULL;
243
244 LWIP_ASSERT("sem != NULL", sem != NULL);
245
246 new_sem = CreateSemaphore(0, count, 100000, 0);
247 LWIP_ASSERT("Error creating semaphore", new_sem != NULL);
248 if(new_sem != NULL) {
249 if (SYS_INITIALIZED()) {
250 SYS_ARCH_LOCKED(SYS_STATS_INC_USED(sem));
251 } else {
252 SYS_STATS_INC_USED(sem);
253 }
254 #if LWIP_STATS && SYS_STATS
255 LWIP_ASSERT("sys_sem_new() counter overflow", lwip_stats.sys.sem.used != 0);
256 #endif /* LWIP_STATS && SYS_STATS*/
257 sem->sem = new_sem;
258 return ERR_OK;
259 }
260
261 /* failed to allocate memory... */
262 if (SYS_INITIALIZED()) {
263 SYS_ARCH_LOCKED(SYS_STATS_INC(sem.err));
264 } else {
265 SYS_STATS_INC(sem.err);
266 }
267 sem->sem = NULL;
268 return ERR_MEM;
269 }
270
271 void
sys_sem_free(sys_sem_t * sem)272 sys_sem_free(sys_sem_t *sem)
273 {
274 /* parameter check */
275 LWIP_ASSERT("sem != NULL", sem != NULL);
276 LWIP_ASSERT("sem->sem != NULL", sem->sem != NULL);
277 LWIP_ASSERT("sem->sem != INVALID_HANDLE_VALUE", sem->sem != INVALID_HANDLE_VALUE);
278 CloseHandle(sem->sem);
279
280 SYS_ARCH_LOCKED(SYS_STATS_DEC(sem.used));
281 #if LWIP_STATS && SYS_STATS
282 LWIP_ASSERT("sys_sem_free() closed more than created", lwip_stats.sys.sem.used != (u16_t)-1);
283 #endif /* LWIP_STATS && SYS_STATS */
284 sem->sem = NULL;
285 }
286
287 u32_t
sys_arch_sem_wait(sys_sem_t * sem,u32_t timeout)288 sys_arch_sem_wait(sys_sem_t *sem, u32_t timeout)
289 {
290 DWORD ret;
291 LONGLONG starttime, endtime;
292 LWIP_ASSERT("sem != NULL", sem != NULL);
293 LWIP_ASSERT("sem->sem != NULL", sem->sem != NULL);
294 LWIP_ASSERT("sem->sem != INVALID_HANDLE_VALUE", sem->sem != INVALID_HANDLE_VALUE);
295 if (!timeout) {
296 /* wait infinite */
297 starttime = sys_get_ms_longlong();
298 ret = WaitForSingleObject(sem->sem, INFINITE);
299 LWIP_ASSERT("Error waiting for semaphore", ret == WAIT_OBJECT_0);
300 endtime = sys_get_ms_longlong();
301 /* return the time we waited for the sem */
302 return (u32_t)(endtime - starttime);
303 } else {
304 starttime = sys_get_ms_longlong();
305 ret = WaitForSingleObject(sem->sem, timeout);
306 LWIP_ASSERT("Error waiting for semaphore", (ret == WAIT_OBJECT_0) || (ret == WAIT_TIMEOUT));
307 if (ret == WAIT_OBJECT_0) {
308 endtime = sys_get_ms_longlong();
309 /* return the time we waited for the sem */
310 return (u32_t)(endtime - starttime);
311 } else {
312 /* timeout */
313 return SYS_ARCH_TIMEOUT;
314 }
315 }
316 }
317
318 void
sys_sem_signal(sys_sem_t * sem)319 sys_sem_signal(sys_sem_t *sem)
320 {
321 BOOL ret;
322 sys_arch_check_not_protected();
323 LWIP_ASSERT("sem != NULL", sem != NULL);
324 LWIP_ASSERT("sem->sem != NULL", sem->sem != NULL);
325 LWIP_ASSERT("sem->sem != INVALID_HANDLE_VALUE", sem->sem != INVALID_HANDLE_VALUE);
326 ret = ReleaseSemaphore(sem->sem, 1, NULL);
327 LWIP_ASSERT("Error releasing semaphore", ret != 0);
328 LWIP_UNUSED_ARG(ret);
329 }
330
331 err_t
sys_mutex_new(sys_mutex_t * mutex)332 sys_mutex_new(sys_mutex_t *mutex)
333 {
334 HANDLE new_mut = NULL;
335
336 LWIP_ASSERT("mutex != NULL", mutex != NULL);
337
338 new_mut = CreateMutex(NULL, FALSE, NULL);
339 LWIP_ASSERT("Error creating mutex", new_mut != NULL);
340 if (new_mut != NULL) {
341 SYS_ARCH_LOCKED(SYS_STATS_INC_USED(mutex));
342 #if LWIP_STATS && SYS_STATS
343 LWIP_ASSERT("sys_mutex_new() counter overflow", lwip_stats.sys.mutex.used != 0);
344 #endif /* LWIP_STATS && SYS_STATS*/
345 mutex->mut = new_mut;
346 return ERR_OK;
347 }
348
349 /* failed to allocate memory... */
350 SYS_ARCH_LOCKED(SYS_STATS_INC(mutex.err));
351 mutex->mut = NULL;
352 return ERR_MEM;
353 }
354
355 void
sys_mutex_free(sys_mutex_t * mutex)356 sys_mutex_free(sys_mutex_t *mutex)
357 {
358 /* parameter check */
359 LWIP_ASSERT("mutex != NULL", mutex != NULL);
360 LWIP_ASSERT("mutex->mut != NULL", mutex->mut != NULL);
361 LWIP_ASSERT("mutex->mut != INVALID_HANDLE_VALUE", mutex->mut != INVALID_HANDLE_VALUE);
362 CloseHandle(mutex->mut);
363
364 SYS_ARCH_LOCKED(SYS_STATS_DEC(mutex.used));
365 #if LWIP_STATS && SYS_STATS
366 LWIP_ASSERT("sys_mutex_free() closed more than created", lwip_stats.sys.mutex.used != (u16_t)-1);
367 #endif /* LWIP_STATS && SYS_STATS */
368 mutex->mut = NULL;
369 }
370
sys_mutex_lock(sys_mutex_t * mutex)371 void sys_mutex_lock(sys_mutex_t *mutex)
372 {
373 DWORD ret;
374 LWIP_ASSERT("mutex != NULL", mutex != NULL);
375 LWIP_ASSERT("mutex->mut != NULL", mutex->mut != NULL);
376 LWIP_ASSERT("mutex->mut != INVALID_HANDLE_VALUE", mutex->mut != INVALID_HANDLE_VALUE);
377 /* wait infinite */
378 ret = WaitForSingleObject(mutex->mut, INFINITE);
379 LWIP_ASSERT("Error waiting for mutex", ret == WAIT_OBJECT_0);
380 LWIP_UNUSED_ARG(ret);
381 }
382
383 void
sys_mutex_unlock(sys_mutex_t * mutex)384 sys_mutex_unlock(sys_mutex_t *mutex)
385 {
386 sys_arch_check_not_protected();
387 LWIP_ASSERT("mutex != NULL", mutex != NULL);
388 LWIP_ASSERT("mutex->mut != NULL", mutex->mut != NULL);
389 LWIP_ASSERT("mutex->mut != INVALID_HANDLE_VALUE", mutex->mut != INVALID_HANDLE_VALUE);
390 /* wait infinite */
391 if (!ReleaseMutex(mutex->mut)) {
392 LWIP_ASSERT("Error releasing mutex", 0);
393 }
394 }
395
396
397 #ifdef _MSC_VER
398 const DWORD MS_VC_EXCEPTION=0x406D1388;
399 #pragma pack(push,8)
400 typedef struct tagTHREADNAME_INFO
401 {
402 DWORD dwType; /* Must be 0x1000. */
403 LPCSTR szName; /* Pointer to name (in user addr space). */
404 DWORD dwThreadID; /* Thread ID (-1=caller thread). */
405 DWORD dwFlags; /* Reserved for future use, must be zero. */
406 } THREADNAME_INFO;
407 #pragma pack(pop)
408
409 static void
SetThreadName(DWORD dwThreadID,const char * threadName)410 SetThreadName(DWORD dwThreadID, const char* threadName)
411 {
412 THREADNAME_INFO info;
413 info.dwType = 0x1000;
414 info.szName = threadName;
415 info.dwThreadID = dwThreadID;
416 info.dwFlags = 0;
417
418 __try {
419 RaiseException(MS_VC_EXCEPTION, 0, sizeof(info)/sizeof(ULONG_PTR), (ULONG_PTR*)&info);
420 }
421 __except(EXCEPTION_EXECUTE_HANDLER) {
422 }
423 }
424 #else /* _MSC_VER */
425 static void
SetThreadName(DWORD dwThreadID,const char * threadName)426 SetThreadName(DWORD dwThreadID, const char* threadName)
427 {
428 LWIP_UNUSED_ARG(dwThreadID);
429 LWIP_UNUSED_ARG(threadName);
430 }
431 #endif /* _MSC_VER */
432
433 static DWORD WINAPI
sys_thread_function(void * arg)434 sys_thread_function(void* arg)
435 {
436 struct threadlist* t = (struct threadlist*)arg;
437 #if LWIP_NETCONN_SEM_PER_THREAD
438 sys_arch_netconn_sem_alloc();
439 #endif
440 t->function(t->arg);
441 #if LWIP_NETCONN_SEM_PER_THREAD
442 sys_arch_netconn_sem_free();
443 #endif
444 return 0;
445 }
446
447 sys_thread_t
sys_thread_new(const char * name,lwip_thread_fn function,void * arg,int stacksize,int prio)448 sys_thread_new(const char *name, lwip_thread_fn function, void *arg, int stacksize, int prio)
449 {
450 struct threadlist *new_thread;
451 HANDLE h;
452 SYS_ARCH_DECL_PROTECT(lev);
453
454 LWIP_UNUSED_ARG(name);
455 LWIP_UNUSED_ARG(stacksize);
456 LWIP_UNUSED_ARG(prio);
457
458 new_thread = (struct threadlist*)malloc(sizeof(struct threadlist));
459 LWIP_ASSERT("new_thread != NULL", new_thread != NULL);
460 if (new_thread != NULL) {
461 new_thread->function = function;
462 new_thread->arg = arg;
463 SYS_ARCH_PROTECT(lev);
464 new_thread->next = lwip_win32_threads;
465 lwip_win32_threads = new_thread;
466
467 h = CreateThread(0, 0, sys_thread_function, new_thread, 0, &(new_thread->id));
468 LWIP_ASSERT("h != 0", h != 0);
469 LWIP_ASSERT("h != -1", h != INVALID_HANDLE_VALUE);
470 LWIP_UNUSED_ARG(h);
471 SetThreadName(new_thread->id, name);
472
473 SYS_ARCH_UNPROTECT(lev);
474 return new_thread->id;
475 }
476 return 0;
477 }
478
479 #if !NO_SYS
480 #if LWIP_TCPIP_CORE_LOCKING
481
482 static DWORD lwip_core_lock_holder_thread_id;
483
484 void
sys_lock_tcpip_core(void)485 sys_lock_tcpip_core(void)
486 {
487 sys_mutex_lock(&lock_tcpip_core);
488 lwip_core_lock_holder_thread_id = GetCurrentThreadId();
489 }
490
491 void
sys_unlock_tcpip_core(void)492 sys_unlock_tcpip_core(void)
493 {
494 lwip_core_lock_holder_thread_id = 0;
495 sys_mutex_unlock(&lock_tcpip_core);
496 }
497 #endif /* LWIP_TCPIP_CORE_LOCKING */
498
499 static DWORD lwip_tcpip_thread_id;
500
501 void
sys_mark_tcpip_thread(void)502 sys_mark_tcpip_thread(void)
503 {
504 lwip_tcpip_thread_id = GetCurrentThreadId();
505 }
506
507 void
sys_check_core_locking(void)508 sys_check_core_locking(void)
509 {
510 /* Embedded systems should check we are NOT in an interrupt context here */
511
512 if (lwip_tcpip_thread_id != 0) {
513 DWORD current_thread_id = GetCurrentThreadId();
514
515 #if LWIP_TCPIP_CORE_LOCKING
516 LWIP_ASSERT("Function called without core lock", current_thread_id == lwip_core_lock_holder_thread_id);
517 #else /* LWIP_TCPIP_CORE_LOCKING */
518 LWIP_ASSERT("Function called from wrong thread", current_thread_id == lwip_tcpip_thread_id);
519 #endif /* LWIP_TCPIP_CORE_LOCKING */
520 LWIP_UNUSED_ARG(current_thread_id); /* for LWIP_NOASSERT */
521 }
522 }
523 #endif /* !NO_SYS */
524
525 err_t
sys_mbox_new(sys_mbox_t * mbox,int size)526 sys_mbox_new(sys_mbox_t *mbox, int size)
527 {
528 LWIP_ASSERT("mbox != NULL", mbox != NULL);
529 LWIP_UNUSED_ARG(size);
530
531 mbox->sem = CreateSemaphore(0, 0, MAX_QUEUE_ENTRIES, 0);
532 LWIP_ASSERT("Error creating semaphore", mbox->sem != NULL);
533 if (mbox->sem == NULL) {
534 SYS_ARCH_LOCKED(SYS_STATS_INC(mbox.err));
535 return ERR_MEM;
536 }
537 memset(&mbox->q_mem, 0, sizeof(u32_t)*MAX_QUEUE_ENTRIES);
538 mbox->head = 0;
539 mbox->tail = 0;
540 SYS_ARCH_LOCKED(SYS_STATS_INC_USED(mbox));
541 #if LWIP_STATS && SYS_STATS
542 LWIP_ASSERT("sys_mbox_new() counter overflow", lwip_stats.sys.mbox.used != 0);
543 #endif /* LWIP_STATS && SYS_STATS */
544 return ERR_OK;
545 }
546
547 void
sys_mbox_free(sys_mbox_t * mbox)548 sys_mbox_free(sys_mbox_t *mbox)
549 {
550 /* parameter check */
551 LWIP_ASSERT("mbox != NULL", mbox != NULL);
552 LWIP_ASSERT("mbox->sem != NULL", mbox->sem != NULL);
553 LWIP_ASSERT("mbox->sem != INVALID_HANDLE_VALUE", mbox->sem != INVALID_HANDLE_VALUE);
554
555 CloseHandle(mbox->sem);
556
557 SYS_STATS_DEC(mbox.used);
558 #if LWIP_STATS && SYS_STATS
559 LWIP_ASSERT( "sys_mbox_free() ", lwip_stats.sys.mbox.used != (u16_t)-1);
560 #endif /* LWIP_STATS && SYS_STATS */
561 mbox->sem = NULL;
562 }
563
564 void
sys_mbox_post(sys_mbox_t * q,void * msg)565 sys_mbox_post(sys_mbox_t *q, void *msg)
566 {
567 BOOL ret;
568 SYS_ARCH_DECL_PROTECT(lev);
569 sys_arch_check_not_protected();
570
571 /* parameter check */
572 LWIP_ASSERT("q != SYS_MBOX_NULL", q != SYS_MBOX_NULL);
573 LWIP_ASSERT("q->sem != NULL", q->sem != NULL);
574 LWIP_ASSERT("q->sem != INVALID_HANDLE_VALUE", q->sem != INVALID_HANDLE_VALUE);
575
576 SYS_ARCH_PROTECT(lev);
577 q->q_mem[q->head] = msg;
578 q->head++;
579 if (q->head >= MAX_QUEUE_ENTRIES) {
580 q->head = 0;
581 }
582 LWIP_ASSERT("mbox is full!", q->head != q->tail);
583 ret = ReleaseSemaphore(q->sem, 1, 0);
584 LWIP_ASSERT("Error releasing sem", ret != 0);
585 LWIP_UNUSED_ARG(ret);
586
587 SYS_ARCH_UNPROTECT(lev);
588 }
589
590 err_t
sys_mbox_trypost(sys_mbox_t * q,void * msg)591 sys_mbox_trypost(sys_mbox_t *q, void *msg)
592 {
593 u32_t new_head;
594 BOOL ret;
595 SYS_ARCH_DECL_PROTECT(lev);
596 sys_arch_check_not_protected();
597
598 /* parameter check */
599 LWIP_ASSERT("q != SYS_MBOX_NULL", q != SYS_MBOX_NULL);
600 LWIP_ASSERT("q->sem != NULL", q->sem != NULL);
601 LWIP_ASSERT("q->sem != INVALID_HANDLE_VALUE", q->sem != INVALID_HANDLE_VALUE);
602
603 SYS_ARCH_PROTECT(lev);
604
605 new_head = q->head + 1;
606 if (new_head >= MAX_QUEUE_ENTRIES) {
607 new_head = 0;
608 }
609 if (new_head == q->tail) {
610 SYS_ARCH_UNPROTECT(lev);
611 return ERR_MEM;
612 }
613
614 q->q_mem[q->head] = msg;
615 q->head = new_head;
616 LWIP_ASSERT("mbox is full!", q->head != q->tail);
617 ret = ReleaseSemaphore(q->sem, 1, 0);
618 LWIP_ASSERT("Error releasing sem", ret != 0);
619 LWIP_UNUSED_ARG(ret);
620
621 SYS_ARCH_UNPROTECT(lev);
622 return ERR_OK;
623 }
624
625 err_t
sys_mbox_trypost_fromisr(sys_mbox_t * q,void * msg)626 sys_mbox_trypost_fromisr(sys_mbox_t *q, void *msg)
627 {
628 return sys_mbox_trypost(q, msg);
629 }
630
631 u32_t
sys_arch_mbox_fetch(sys_mbox_t * q,void ** msg,u32_t timeout)632 sys_arch_mbox_fetch(sys_mbox_t *q, void **msg, u32_t timeout)
633 {
634 DWORD ret;
635 LONGLONG starttime, endtime;
636 SYS_ARCH_DECL_PROTECT(lev);
637
638 /* parameter check */
639 LWIP_ASSERT("q != SYS_MBOX_NULL", q != SYS_MBOX_NULL);
640 LWIP_ASSERT("q->sem != NULL", q->sem != NULL);
641 LWIP_ASSERT("q->sem != INVALID_HANDLE_VALUE", q->sem != INVALID_HANDLE_VALUE);
642
643 if (timeout == 0) {
644 timeout = INFINITE;
645 }
646 starttime = sys_get_ms_longlong();
647 ret = WaitForSingleObject(q->sem, timeout);
648 if (ret == WAIT_OBJECT_0) {
649 SYS_ARCH_PROTECT(lev);
650 if (msg != NULL) {
651 *msg = q->q_mem[q->tail];
652 }
653
654 q->tail++;
655 if (q->tail >= MAX_QUEUE_ENTRIES) {
656 q->tail = 0;
657 }
658 SYS_ARCH_UNPROTECT(lev);
659 endtime = sys_get_ms_longlong();
660 return (u32_t)(endtime - starttime);
661 } else {
662 LWIP_ASSERT("Error waiting for sem", ret == WAIT_TIMEOUT);
663 if (msg != NULL) {
664 *msg = NULL;
665 }
666
667 return SYS_ARCH_TIMEOUT;
668 }
669 }
670
671 u32_t
sys_arch_mbox_tryfetch(sys_mbox_t * q,void ** msg)672 sys_arch_mbox_tryfetch(sys_mbox_t *q, void **msg)
673 {
674 DWORD ret;
675 SYS_ARCH_DECL_PROTECT(lev);
676
677 /* parameter check */
678 LWIP_ASSERT("q != SYS_MBOX_NULL", q != SYS_MBOX_NULL);
679 LWIP_ASSERT("q->sem != NULL", q->sem != NULL);
680 LWIP_ASSERT("q->sem != INVALID_HANDLE_VALUE", q->sem != INVALID_HANDLE_VALUE);
681
682 ret = WaitForSingleObject(q->sem, 0);
683 if (ret == WAIT_OBJECT_0) {
684 SYS_ARCH_PROTECT(lev);
685 if (msg != NULL) {
686 *msg = q->q_mem[q->tail];
687 }
688
689 q->tail++;
690 if (q->tail >= MAX_QUEUE_ENTRIES) {
691 q->tail = 0;
692 }
693 SYS_ARCH_UNPROTECT(lev);
694 return 0;
695 } else {
696 LWIP_ASSERT("Error waiting for sem", ret == WAIT_TIMEOUT);
697 if (msg != NULL) {
698 *msg = NULL;
699 }
700
701 return SYS_MBOX_EMPTY;
702 }
703 }
704
705 #if LWIP_NETCONN_SEM_PER_THREAD
706 sys_sem_t*
sys_arch_netconn_sem_get(void)707 sys_arch_netconn_sem_get(void)
708 {
709 LPVOID tls_data = TlsGetValue(netconn_sem_tls_index);
710 return (sys_sem_t*)tls_data;
711 }
712
713 void
sys_arch_netconn_sem_alloc(void)714 sys_arch_netconn_sem_alloc(void)
715 {
716 sys_sem_t *sem;
717 err_t err;
718 BOOL done;
719
720 sem = (sys_sem_t*)malloc(sizeof(sys_sem_t));
721 LWIP_ASSERT("failed to allocate memory for TLS semaphore", sem != NULL);
722 err = sys_sem_new(sem, 0);
723 LWIP_ASSERT("failed to initialise TLS semaphore", err == ERR_OK);
724 done = TlsSetValue(netconn_sem_tls_index, sem);
725 LWIP_UNUSED_ARG(done);
726 LWIP_ASSERT("failed to initialise TLS semaphore storage", done == TRUE);
727 }
728
729 void
sys_arch_netconn_sem_free(void)730 sys_arch_netconn_sem_free(void)
731 {
732 LPVOID tls_data = TlsGetValue(netconn_sem_tls_index);
733 if (tls_data != NULL) {
734 BOOL done;
735 free(tls_data);
736 done = TlsSetValue(netconn_sem_tls_index, NULL);
737 LWIP_UNUSED_ARG(done);
738 LWIP_ASSERT("failed to de-init TLS semaphore storage", done == TRUE);
739 }
740 }
741 #endif /* LWIP_NETCONN_SEM_PER_THREAD */
742
743 #endif /* !NO_SYS */
744
745 /* get keyboard state to terminate the debug app on any kbhit event using win32 API */
746 int
lwip_win32_keypressed(void)747 lwip_win32_keypressed(void)
748 {
749 INPUT_RECORD rec;
750 DWORD num = 0;
751 HANDLE h = GetStdHandle(STD_INPUT_HANDLE);
752 BOOL ret = PeekConsoleInput(h, &rec, 1, &num);
753 if (ret && num) {
754 ReadConsoleInput(h, &rec, 1, &num);
755 if (rec.EventType == KEY_EVENT) {
756 if (rec.Event.KeyEvent.bKeyDown) {
757 /* not a special key? */
758 if (rec.Event.KeyEvent.uChar.AsciiChar != 0) {
759 return 1;
760 }
761 }
762 }
763 }
764 return 0;
765 }
766
767 #include <stdarg.h>
768
769 /* This is an example implementation for LWIP_PLATFORM_DIAG:
770 * format a string and pass it to your output function.
771 */
772 void
lwip_win32_platform_diag(const char * format,...)773 lwip_win32_platform_diag(const char *format, ...)
774 {
775 va_list ap;
776 /* get the varargs */
777 va_start(ap, format);
778 /* print via varargs; to use another output function, you could use
779 vsnprintf here */
780 vprintf(format, ap);
781 va_end(ap);
782 }
783