DIRECTORY BasicTime USING [GetClockPulses, MicrosecondsToPulses, Pulses], Booting USING [CheckpointProc, RegisterProcs, RollbackProc], BufferDefs USING [PupBuffer], CommUtilDefs USING [AllocateIocb], DriverDefs USING [ChangeNumberOfInputBuffers], DriverTypes USING [Encapsulation, ethernetEncapsulationBytes, ethernetEncapsulationOffset], EthernetOneFace USING [ControlBlock, ControlBlockRecord, controlBlockSize, DeviceHandle, GetNextDevice, GetStatus, hearSelf, nullDeviceHandle, QueueOutput], PrincOpsUtils USING [IsBound, LongCopy, PsbHandleToIndex, ReadPSB], Process USING [Detach, MsecToTicks, Pause, Yield], PrincOps USING [PsbIndex, PsbNull], PupDefs USING [AnyLocalPupAddress, GetFreePupBuffer, GetHopsToNetwork, PupAddress, PupPackageMake, PupRouterSendThis, PupSocket, PupSocketDestroy, PupSocketMake, ReturnFreePupBuffer, veryLongWait], PupRouterDefs USING [maxHop], PupTypes USING [PupAddress, PupHostID, PupNetID, PupSocketID], RPC USING [CallFailed, unencrypted], RPCInternal USING [DecryptPkt, DoSignal, EncryptPkt, ReplyToRFA, RPCBinding, RPCPktStreams, RPCSecurity, ServerMain], RPCLupine USING [DataLength, Dispatcher, Header, RPCPkt], RPCPkt USING [CallCount, Header, Machine, PktExchangeState, PktID, pktLengthOverhead], RPCPrivate USING [GetRPCPackets, rpcSocket, ReturnBuffer], RPCWatch USING []; RPCPktIO: MONITOR IMPORTS BasicTime, Booting, CommUtilDefs, DriverDefs, EthernetOneFace, PrincOpsUtils, Process, PupDefs, RPC, RPCInternal, RPCPrivate EXPORTS RPCLupine--Encapsulation,Header--, RPCPkt--PktExchange,IdleReceive--, RPCWatch--SetSpyProc-- SHARES BufferDefs, RPCLupine = { Encapsulation: PUBLIC TYPE = DriverTypes.Encapsulation; Header: PUBLIC TYPE = RPCPkt.Header; ConcreteHeader: PROC [abstract: LONG POINTER TO RPCLupine.Header] RETURNS [LONG POINTER TO Header] = INLINE { RETURN [ abstract ]; }; callSequence: RPCPkt.CallCount _ 0; -- monotonic from this host -- IOCBrecord: TYPE = RECORD[next: IOCB]; IOCB: TYPE = LONG POINTER TO IOCBrecord; iocbSize: CARDINAL = MAX[EthernetOneFace.controlBlockSize, SIZE[IOCBrecord]]; freeIOCBs: IOCB _ NIL; firstDevice: EthernetOneFace.DeviceHandle = EthernetOneFace.GetNextDevice[EthernetOneFace.nullDeviceHandle]; myAddr: PupTypes.PupAddress; myNet: PupTypes.PupNetID; myDeviceHost: PupTypes.PupHostID; myHost: RPCPkt.Machine; sent: CARDINAL _ 0; recvd: CARDINAL _ 0; retransmitted: CARDINAL _ 0; minRetransmitMsecs: CARDINAL = 100; -- retransmit delay for local net -- msecsPerHop: CARDINAL = 500; -- approximate typical gateway hop delay? -- minPingMsecs: CARDINAL = 5000; -- initial interval between pings -- maxPingSecs: CARDINAL = 300; -- long-term ping interval -- maxTransmissions: CARDINAL _ 20; -- give up after too many transmissions -- signalTimeout: BOOL _ TRUE; -- debugging switch -- minRetransmitPulses: BasicTime.Pulses = BasicTime.MicrosecondsToPulses[LONG[1000] * minRetransmitMsecs]; pulsesPerHop: BasicTime.Pulses = BasicTime.MicrosecondsToPulses[LONG[1000] * msecsPerHop]; minPingPulses: BasicTime.Pulses = BasicTime.MicrosecondsToPulses[LONG[1000] * minPingMsecs]; maxPingPulses: BasicTime.Pulses = BasicTime.MicrosecondsToPulses[LONG[1000]*LONG[1000] * maxPingSecs]; transmitLocalPkts: BOOL _ TRUE; shortWait: BasicTime.Pulses = -- 10 msecs -- BasicTime.MicrosecondsToPulses[LONG[1000] * 10]; longerWait: BasicTime.Pulses = -- 5 secs -- BasicTime.MicrosecondsToPulses[LONG[1000]*LONG[1000] * 5]; idlerPkt: BufferDefs.PupBuffer _ NIL; idlerCond: CONDITION _ [timeout:0]; waiterCond: CONDITION _ [timeout:Process.MsecToTicks[minRetransmitMsecs]]; waiterPkts: REF WaiterArray = NEW[WaiterArray _ ALL[NIL]]; WaiterArray: TYPE = ARRAY PrincOps.PsbIndex OF BufferDefs.PupBuffer; wanting: REF WantingArray = NEW[WantingArray _ ALL[FALSE]]; WantingArray: TYPE = PACKED ARRAY PrincOps.PsbIndex OF BOOL; RecvdPktTooLong: ERROR = CODE; KillServer: ERROR = CODE; servers: CARDINAL _ 0; serversMax: CARDINAL _ 20; idlers: CARDINAL _ 0; idlersMax: NAT _ 4; idlersMin: NAT _ 2; PktExchange: PUBLIC PROC [inPkt: RPCLupine.RPCPkt, length: RPCLupine.DataLength, maxlength: RPCLupine.DataLength, state: RPCPkt.PktExchangeState, signalHandler: RPCLupine.Dispatcher _ NIL] RETURNS [newPkt: BOOL, newLength: RPCLupine.DataLength] = { outPkt: RPCLupine.RPCPkt _ inPkt; -- altered after a signal -- outPktFrame: POINTER _ NIL; -- DoSignal's local frame -- newLen: NAT _ 0; DO -- loop for signal handlers -- sentTime: BasicTime.Pulses; -- initialized after sending any packet -- iocb: IOCB _ NIL; GetIOCB: ENTRY PROC = INLINE { IF freeIOCBs # NIL THEN { iocb _ freeIOCBs; freeIOCBs _ freeIOCBs.next } ELSE { iocb _ CommUtilDefs.AllocateIocb[iocbSize] } }; ControlBlock: PROC RETURNS [ EthernetOneFace.ControlBlock ] = INLINE { RETURN [LOOPHOLE[iocb]]; }; ReturnIOCB: PROC = INLINE { InnerReturn: ENTRY PROC = INLINE { iocb.next _ freeIOCBs; freeIOCBs _ iocb; }; IF iocb # NIL THEN { WaitUntilSent[]; InnerReturn[] }; }; WaitUntilSent: PROC = INLINE { WHILE EthernetOneFace.GetStatus[ControlBlock[]] = pending DO IF BasicTime.GetClockPulses[] - sentTime < shortWait THEN Process.Yield[] ELSE IF BasicTime.GetClockPulses[] - sentTime < longerWait THEN Process.Pause[1] ELSE EXIT -- assume someone reset the microcode --; ENDLOOP; }; NewCallNumber: ENTRY PROC RETURNS [RPCPkt.CallCount] = INLINE { RETURN [ callSequence _ callSequence+1 ]; }; reply: BufferDefs.PupBuffer; recvdHeader: LONG POINTER TO Header; myPSB: PrincOps.PsbIndex = PrincOpsUtils.PsbHandleToIndex[PrincOpsUtils.ReadPSB[]]; acked: BOOL; thisPktID: RPCPkt.PktID; header: LONG POINTER TO Header = @outPkt.header; localHost: BOOL = header.destHost = myHost; localNet: BOOL = header.destHost.net = myNet; pingPulses: BasicTime.Pulses _ minPingPulses; header.srceHost _ myHost; header.srceSoc _ RPCPrivate.rpcSocket; header.srcePSB _ myPSB; IF header.pktID.pktSeq = 0 -- first packet of a call; yucky interface! -- THEN { header.type _ SELECT state FROM sending => [0, rpc, notEnd, pleaseAck, call], call => [0, rpc, end, dontAck, call], authReq => [0, rpc, end, dontAck, rfa], ENDCASE => --receiving, endCall-- ERROR; header.pktID.callSeq _ NewCallNumber[]; header.pktID.pktSeq _ 1; acked _ FALSE; } ELSE { header.type _ SELECT state FROM sending => [0, rpc, notEnd, pleaseAck, data], receiving => [0, rpc, end, dontAck, ack], call => [0, rpc, end, dontAck, data], endCall => [0, rpc, end, dontAck, data], ENDCASE => --authReq-- ERROR; IF state # receiving --header.type.class = data -- THEN { header.pktID.pktSeq _ header.pktID.pktSeq+1; acked_FALSE } ELSE acked _ TRUE; }; thisPktID _ header.pktID; SetWanting[myPSB]; DO -- loop for pings -- ENABLE UNWIND => { ClearWanting[myPSB]; ReturnIOCB[]; }; { foo: CARDINAL _ 0; transmissions: CARDINAL _ 0; hops: CARDINAL _ IF localNet THEN 0 ELSE PupDefs.GetHopsToNetwork[header.destHost.net]; retransmitPulses: BasicTime.Pulses _ minRetransmitPulses; IF hops IN [1..PupRouterDefs.maxHop] THEN retransmitPulses _ minRetransmitPulses + pulsesPerHop * hops; IF outPkt.convHandle # RPC.unencrypted THEN header.length _ RPCInternal.EncryptPkt[outPkt, length] ELSE header.length _ length + RPCPkt.pktLengthOverhead; header.oddByte _ no; DO -- loop for retransmissions -- { IF NOT localNet OR firstDevice = EthernetOneFace.nullDeviceHandle THEN GeneralSend[outPkt] ELSE { IF localHost AND NOT( EthernetOneFace.hearSelf AND transmitLocalPkts ) THEN LocalSend[outPkt]; IF NOT localHost OR transmitLocalPkts THEN { IF iocb = NIL THEN GetIOCB[] ELSE WaitUntilSent[]; -- Pup checksum -- outPkt.data[header.length-RPCPkt.pktLengthOverhead] _ 177777B; outPkt.encapsulation _ Encapsulation[ethernetOne[,,,,,, header.destHost.host, myDeviceHost, pup]]; EthernetOneFace.QueueOutput[firstDevice, @outPkt.encapsulation + DriverTypes.ethernetEncapsulationOffset, header.length + (1+DriverTypes.ethernetEncapsulationBytes)/2, ControlBlock[]] }; }; sentTime _ BasicTime.GetClockPulses[]; sent _ sent+1; DO -- loop for each incoming packet (including garbage) -- reply _ MyReceive[ myPSB, sentTime, (IF acked THEN pingPulses ELSE retransmitPulses)]; IF reply = NIL THEN IF acked THEN GOTO ping ELSE { header.type.ack _ pleaseAck; GOTO retransmit }; recvdHeader _ LOOPHOLE[@reply.pupLength]; IF recvdHeader.type.class = rfa THEN { [] _ RPCInternal.ReplyToRFA[ reply, header--encrypted--, thisPktID--clear--, inPkt.convHandle]; LOOP; }; IF outPkt.convHandle # RPC.unencrypted AND recvdHeader.conv = header.conv AND recvdHeader.srceHost = header.destHost THEN { ok: BOOL; [ok, newLen] _ RPCInternal.DecryptPkt[recvdHeader, outPkt.convHandle]; IF ~ok AND recvdHeader.type.class#ack THEN ERROR RPC.CallFailed[runtimeProtocol ! UNWIND => GiveBackBuffer[reply] ]; } ELSE newLen _ recvdHeader.length - RPCPkt.pktLengthOverhead; IF recvdHeader.conv = header.conv AND recvdHeader.srceHost = header.destHost AND recvdHeader.pktID.activity = thisPktID.activity THEN -- pkt is related to our call -- SELECT TRUE FROM recvdHeader.pktID.callSeq = thisPktID.callSeq => SELECT TRUE FROM recvdHeader.pktID.pktSeq = 1+thisPktID.pktSeq => { IF state = sending OR state = endCall THEN ERROR RPC.CallFailed[runtimeProtocol ! UNWIND => GiveBackBuffer[reply] ]; SELECT recvdHeader.type.class FROM data => GOTO done; ack => { acked _ TRUE; GiveBackBuffer[reply]; }; ENDCASE => --call,rfa-- ERROR RPC.CallFailed[runtimeProtocol ! UNWIND => GiveBackBuffer[reply] ]; }; recvdHeader.pktID.pktSeq = thisPktID.pktSeq => { SELECT recvdHeader.type.class FROM ack => { IF header.type.class = call THEN header.destPSB _ recvdHeader.srcePSB; acked _ TRUE; IF state = sending OR state = endCall THEN {GiveBackBuffer[reply]; reply_NIL; GOTO done} ELSE -- state = call, authReq, or receiving -- GiveBackBuffer[reply]; }; data, call => -- retransmisson of his packet -- IF state = receiving THEN IF recvdHeader.type.ack = pleaseAck THEN { GiveBackBuffer[reply]; reply _ NIL; GOTO retransmit -- we're already sending an ack -- } ELSE GiveBackBuffer[reply] ELSE ERROR RPC.CallFailed[runtimeProtocol ! UNWIND => GiveBackBuffer[reply] ]; ENDCASE => --rfa -- ERROR RPC.CallFailed[runtimeProtocol ! UNWIND => GiveBackBuffer[reply] ]; }; recvdHeader.pktID.pktSeq < thisPktID.pktSeq => GiveBackBuffer[reply]; -- no need to ack it -- ENDCASE => ERROR RPC.CallFailed[runtimeProtocol ! UNWIND => GiveBackBuffer[reply] ]; recvdHeader.pktID.callSeq > thisPktID.callSeq AND state=endCall => { IF recvdHeader.type.class # call THEN ERROR RPC.CallFailed[runtimeProtocol ! UNWIND => GiveBackBuffer[reply] ]; GOTO done } ENDCASE => { recvdHeader.destPSB _ PrincOps.PsbNull; EnqueueAgain[reply]; } ELSE { recvdHeader.destPSB _ PrincOps.PsbNull; EnqueueAgain[reply]; }; ENDLOOP--for each incoming packet--; EXITS retransmit => { transmissions _ transmissions+1; IF (transmissions = maxTransmissions AND signalTimeout) OR state = authReq THEN { SIGNAL RPC.CallFailed[timeout]; transmissions _ 0 }; retransmitted _ retransmitted+1; retransmitPulses _ retransmitPulses + minRetransmitPulses; }; }; ENDLOOP-- for each transmission --; EXITS ping => { header.type _ [0, rpc, end, pleaseAck, ack]; length _ 0; header.pktID _ thisPktID; acked _ FALSE; pingPulses _ MIN[maxPingPulses, pingPulses * 2]; }; }; REPEAT done => { ClearWanting[myPSB]; ReturnIOCB[]; IF reply = NIL THEN { --restore clear pktID-- header.pktID _ thisPktID; RETURN [FALSE, newLen] } ELSE { IF recvdHeader.outcome = signal AND state = call AND signalHandler # NIL THEN [outPkt, length, outPktFrame] _ RPCInternal.DoSignal[reply, newLen, signalHandler, inPkt.convHandle] ELSE { IF newLen > maxlength THEN ERROR RPC.CallFailed[runtimeProtocol ! UNWIND => GiveBackBuffer[reply]]; PrincOpsUtils.LongCopy[ from: recvdHeader, to: @inPkt.header, nwords: recvdHeader.length]; GiveBackBuffer[reply]; RETURN [TRUE, newLen] }; } }; ENDLOOP-- for each ping--; ENDLOOP-- for signal handlers --; }; GeneralSend: PROC [pkt: RPCLupine.RPCPkt] = { b: BufferDefs.PupBuffer = PupDefs.GetFreePupBuffer[]; PrincOpsUtils.LongCopy[from: @(pkt.header), to: @(b.pupLength), nwords: ConcreteHeader[@pkt.header].length]; PupDefs.PupRouterSendThis[b]; }; LocalSend: PROC [pkt: RPCLupine.RPCPkt] = { b: BufferDefs.PupBuffer = PupDefs.GetFreePupBuffer[]; PrincOpsUtils.LongCopy[ from: @(pkt.header), to: @(b.pupLength), nwords: ConcreteHeader[@pkt.header].length]; IF NOT AcceptPkt[b] THEN PupDefs.ReturnFreePupBuffer[b]; }; SetWanting: ENTRY PROC [myPSB: PrincOps.PsbIndex] = INLINE { wanting[myPSB] _ TRUE; }; ClearWanting: PROC [myPSB: PrincOps.PsbIndex] = INLINE { spare: BufferDefs.PupBuffer; InnerClear: ENTRY PROC = INLINE { wanting[myPSB] _ FALSE; IF (spare _ waiterPkts[myPSB]) # NIL THEN waiterPkts[myPSB] _ NIL; }; InnerClear[]; IF spare # NIL THEN GiveBackBuffer[spare] --ignore it, outside monitor--; }; MyReceive: ENTRY PROC [myPSB: PrincOps.PsbIndex, sentTime, waitTime: BasicTime.Pulses] RETURNS [recvd: BufferDefs.PupBuffer] = INLINE { ENABLE UNWIND => NULL; DO IF (recvd _ waiterPkts[myPSB]) = NIL THEN IF BasicTime.GetClockPulses[] - sentTime < waitTime THEN WAIT waiterCond ELSE EXIT ELSE { waiterPkts[myPSB] _ NIL; EXIT }; ENDLOOP; }; IdleReceive: PUBLIC PROC [pkt: RPCLupine.RPCPkt, maxlength: CARDINAL] = { b: BufferDefs.PupBuffer; InnerIdler: ENTRY PROC = { IF idlers >= idlersMax THEN { servers_servers-1; RETURN WITH ERROR KillServer[] }; idlers _ idlers + 1; DO WAIT idlerCond; IF idlerPkt # NIL THEN EXIT ENDLOOP; IF idlers < idlersMin AND servers < serversMax THEN { servers_servers+1; Process.Detach[FORK Server[]]; }; b _ idlerPkt; { recvdHeader: LONG POINTER TO Header = LOOPHOLE[@b.pupLength]; idlerPkt _ LOOPHOLE[idlerPkt.next, BufferDefs.PupBuffer]; b.next _ NIL; IF recvdHeader.length > maxlength THEN ERROR RecvdPktTooLong[] --NULL??-- ELSE PrincOpsUtils.LongCopy[ from: @b.pupLength, to: @pkt.header, nwords: recvdHeader.length]; }; }; InnerIdler[]; GiveBackBuffer[b];--outside monitor-- }; QueuesScrambled: ERROR = CODE; spyProc: PROC [BufferDefs.PupBuffer] _ NIL; SetSpyProc: PUBLIC ENTRY SAFE PROC [p: PROC [BufferDefs.PupBuffer]] = CHECKED { spyProc _ p; }; EnqueueRecvd: ENTRY PROC [b: BufferDefs.PupBuffer, report: BOOL] RETURNS [BOOL] = { header: LONG POINTER TO Header = LOOPHOLE[@b.pupLength]; IF report AND spyProc # NIL THEN spyProc[b]; IF header.destHost = myHost AND header.type.subType = rpc THEN { destPSB: PrincOps.PsbIndex = header.destPSB; recvd _ recvd+1; IF destPSB NOT IN (PrincOps.PsbNull..LAST[PrincOps.PsbIndex]] OR NOT wanting[destPSB] THEN { IF idlers = 0 THEN RETURN [FALSE]; -- too busy, drop the packet b.next _ idlerPkt; idlerPkt _ b; idlers _ idlers-1; NOTIFY idlerCond; } ELSE { IF waiterPkts[destPSB] # NIL THEN RETURN [FALSE]; waiterPkts[destPSB] _ b; BROADCAST waiterCond; }; RETURN [TRUE] } ELSE RETURN [FALSE]; }; GiveBackBuffer: PROC [b: BufferDefs.PupBuffer] = IF PrincOpsUtils.IsBound[LOOPHOLE[RPCPrivate.ReturnBuffer]] THEN RPCPrivate.ReturnBuffer ELSE PupDefs.ReturnFreePupBuffer; AcceptPkt: PROC [b: BufferDefs.PupBuffer] RETURNS [BOOL] = { RETURN [ EnqueueRecvd[b: b, report: TRUE] ]; }; EnqueueAgain: PUBLIC PROC [b: BufferDefs.PupBuffer] = { IF NOT EnqueueRecvd[b: b, report: FALSE] THEN GiveBackBuffer[b]; }; Listener: PROC = { soc: PupDefs.PupSocket = PupDefs.PupSocketMake[ local: RPCPrivate.rpcSocket, remote:, ticks: PupDefs.veryLongWait]; DO ENABLE ABORTED => EXIT; b: BufferDefs.PupBuffer = soc.get[]; IF b = NIL THEN LOOP; IF NOT AcceptPkt[b] THEN PupDefs.ReturnFreePupBuffer[b]; ENDLOOP; PupDefs.PupSocketDestroy[soc]; }; listenerProcess: PROCESS; Server: PROC = { RPCInternal.ServerMain[ ! KillServer => CONTINUE ]; }; Initialize: ENTRY PROC = { PupDefs.PupPackageMake[]; DriverDefs.ChangeNumberOfInputBuffers[TRUE]; myAddr _ PupDefs.AnyLocalPupAddress[RPCPrivate.rpcSocket]; myNet _ myAddr.net; myDeviceHost _ myAddr.host; myHost _ [myNet, myAddr.host]; START RPCInternal.RPCBinding; -- exports "RPCInternal.exportTable" -- START RPCInternal.RPCSecurity; -- exports "RPCInternal.firstConversation" -- START RPCInternal.RPCPktStreams; -- initialize connection states -- Booting.RegisterProcs[c: Checkpoint, r: Rollback]; servers _ servers+1; Process.Detach[FORK Server[]]; listenerProcess _ FORK Listener[]; }; Checkpoint: Booting.CheckpointProc = TRUSTED { RPCPrivate.GetRPCPackets[NIL]; }; Rollback: Booting.RollbackProc = TRUSTED { InnerRollback: ENTRY PROC = TRUSTED { RESTART RPCInternal.RPCPktStreams; -- forget connection counts -- RESTART RPCInternal.RPCSecurity; -- invalidate local conversations -- RESTART RPCInternal.RPCBinding; -- nothing? -- }; InnerRollback[]; RPCPrivate.GetRPCPackets[AcceptPkt]; }; Initialize[]; RPCPrivate.GetRPCPackets[AcceptPkt]; }. ŠRPCPktIO.mesa - Reliable transmission and reception of packets Copyright c 1984, 1986 by Xerox Corporation. All rights reserved. Bob Hagmann, February 11, 1985 4:37:25 pm PST Swinehart, August 1, 1985 10:37:08 am PDT Polle Zellweger (PTZ) August 2, 1985 1:39:38 pm PDT Russ Atkinson (RRA) April 25, 1986 10:08:11 am PST ******** IOCB management ******** IOCB's are kept on free chain. Allocation and freeing are imbedded in "PktExchange" procedure. IOCB's are allocated in first 64K of memory, in resident memory. Use "ControlBlock" proc to get pointer to give to EthernetFace. ******** sending and receiving packets ******** "PktExchange" implements a reliable packet exchange. There are five cases: sending: transmit data, wait for ack receiving: transmit ack, wait for data call: transmit data, wait for data endCall: transmit data, wait for ack or data (data => start of new call) authReq: transmit RFA, wait for data (like "call", but no retransmissions) Data and RFA packets are retransmitted until an ack is received. Ack packets are retransmitted only in response to "pleaseAck" requests. No acknowledgement after 14 transmissions is fatal (CallFailed[timeout]). When the transmitted packet has been acknowledged (if needed), a ping is sent periodically (ack packet saying pleaseAck). If necessary the ping is retransmitted until it has been acked. Failure to receive an ack for the ping is fatal (CallFailed[timeout]). Provided pings continue to be acknowledged, there is no limit on how long we will wait for the next data packet. If the client gets impatient, he can abort this process. (This corresponds to the local-machine semantics of a procedure call.) The retransmission delay is incremented by minPingMsecs each time we timeout, but is reset when we receive the desired packet. If n=maxTransmissions and i=minRetransmitMsecs and j=hops*msecsPerHop, we give up after i*(n*n+n)/2+n*j msecs. For the local network, that comes to 21 seconds. For a two-hop route, that comes to 41 seconds. The ping delay is doubled at each ping, up to maxPingSecs, which is 5 minutes. The maxPingSecs value is reached after about 5 minutes. Constants for WaitUntilSent (inside PktExchange) Waiting and wanting Serving and idling Number of server processes will never exceed "serversMax". If number of idle servers exceeds "idlersMax", one will abort. If number of idle servers drops below "idlersMin", one is forked. On exit if newPkt=TRUE, the packet has been decrypted if needed. Normally, transmits inPkt and copies result into inPkt. If a signal occurs, calls DoSignal which handles the signal protocol up to the last resumption packet. DoSignal returns the last resume packet for us to transmit, which we do by assigning it to outPkt; that packet was allocated in DoSignal's local frame, which we must later deallocate. We use this internally to represent newLength, since it is possible for a newLength calculation to exceed the bounds of RPCLupine.DataLength (for received packets that are encrypted, but not ours.) IOCB management procs are imbedded for efficiency! Horrible! We must ensure that the ethernet microcode isn't still using our IOCB when we free or re-use it. There are two problems: (a) a suitable response coming in before we've finished retransmitting our packet; (b) the standard EthernetOneDriver resetting the microcode (so it forgets our request). To handle (a) we busy-wait for up to 10msec, then wait for single ticks thereafter; to handle (b) we assume our iocb is no longer being used after it's pending for 5 secs. To do better seems to require changes to the EthernetOneFace. IF outPktFrame # NIL THEN PrincOpsUtils.Free[outPktFrame]; For localNet stuff OR "can't get there" we time out fairly quickly wait for response: an ack or the reply or a timeout can't set "acked", because we must retransmit our data packet until we obtain the correct destPSB from some ack pkt pkt is in our call a) pkt has next sequence number to ours he's not allowed to generate that pktSeq! This can happen if state=call and callee sent next data pkt, but it was lost and now he is responding to our retransmission or ping. Soon, he will retransmit his data pkt. b) pkt has same sequence number as ours acknowledgement of our packet Even if "pleaseAck", we don't need to ack it, because other end should send data pkt soon -- c) pkt has earlier sequence number than ours d) pkt has some future sequence number acks our last packet, so we can handle the call wrong call: let someone else do it wrong conversation or activity: let someone else do it Incoming RFA packets don't reach here. Don't retransmit RFA: caller will retransmit call pkt. Otherwise, if a spurious worker process occurred because of call pkt retransmission before response to RFA, then the spurious worker process sits needlessly retransmitting RFA's until it times out. only exit from loop is "GOTO done" or UNWIND This isn't covered by any UNWIND IF outPktFrame # NIL THEN PrincOpsUtils.Free[outPktFrame]; We get here only after coming back from a call of DoSignal we can't get here! handle talking to ourselves if the ethernet head can't Returns NIL if no packet arrives within waitTime pulses after sentTime Dispatch packet to appropriate RPC process, if any. Packet is known to be a Pup, and is addressed to our socket. give to idle process to deal with Pkts are dealt with LIFO by idlers, but it doesn't matter (much) someone wants this packet: give them it NOTE: calls of this must be made outside our monitor, because RPCPrivate.ReturnBuffer acquires the EthernetDriver monitor, and the EthernetDriver may call EnqueueRecvd which acquires our monitor! Catch any packets that get as far as the Pup socket level RRA: be prepared for a few glitchy NILs to get through ******** Initialization ******** Bob Hagmann November 1, 1984 7:45:11 am maxTransmissions _ 20 == this was set up to 100 during the time when Luther was thrashing Bob Hagmann February 11, 1985 4:37:25 pm PST changes to: GiveBackBuffer Polle Zellweger (PTZ) August 2, 1985 1:39:27 pm PDT changes to: PktExchange -- use newLen (NAT) rather than newLength [0..254] so that full-sized encrypted packets for other conversations don't cause bounds faults (the padding and/or the key can add a few words) Ê)˜codešœ>™>Kšœ Ïmœ7™BKšœ.™.K™)K™3K™2K˜šÏk ˜ Kšœ žœ0˜?Kšœžœ/˜Kšžœžœ˜$Kšœ žœd˜uKšœ žœ*˜9KšœžœJ˜VKšœ žœ*˜:Kšœ žœ˜——headšœ ž˜Kšžœažœ˜„Kšžœ ÏcœŸœ Ÿ˜dKšžœ˜ —K˜Kšœžœžœ˜7K˜Kšœžœžœ˜$K˜šÏnœžœ žœžœžœž œžœžœžœ žœ˜mKšžœ˜Kšœ˜K˜—Kšœ$Ÿ˜BK˜šœ!™!K˜Kšœ_™_Kšœ@™@Kšœ?™?K˜Kšœ žœžœžœ˜&Kš žœžœžœžœžœ ˜(Kšœ žœžœ#žœ˜MK˜Kšœ žœžœ˜K˜—šœ/™/K˜˜+K˜@K˜—K˜K˜K˜!K˜K˜Kšœžœ˜Kšœžœ˜Kšœžœ˜K˜šœK™KKšœ$™$Kšœ&™&Kšœ"™"KšœH™HKšœJ™J—KšœÌ™ÌK˜KšœžœŸ$˜HKšœ žœŸ,˜IKšœžœ Ÿ$˜CKšœ žœŸ˜:KšœžœŸ*˜KKšœžœžœŸ˜2K˜KšœÖ™ÖK˜˜'Kšœžœ˜@—˜ Kšœžœ˜9—˜!Kšœžœ˜:—˜!Kšœžœžœ˜D—K˜Kšœžœžœ˜K˜Kšœ0™0K˜šœŸ˜,Kšœžœ ˜0—šœŸ ˜+Kšœžœžœ ˜:K˜——šœ™K˜Kšœ!žœ˜%Kšœ ž œ˜#Kšœ ž œ5˜Jš œ žœžœžœžœ˜:Kšœ žœžœžœ˜D—š œ žœžœžœžœ˜;Kš œžœžœžœžœžœ˜<—K˜—™K˜Kšœ½™½K™Kšœžœžœ˜Kšœ žœžœ˜Kšœ žœ˜Kšœ žœ˜Kšœžœ˜Kšœ žœ˜Kšœ žœ˜K˜—š   œžœžœŸžœž œ žœ&˜øKšœ@™@K˜KšœØ™ØK˜Kšœ"Ÿ˜>Kšœ žœžœŸ˜8šœžœ˜KšœÅ™Å—K˜šžœŸ˜!K˜KšœŸ*˜FKšœžœžœ˜K˜Kšœ2™2K˜š œžœžœžœ˜šžœ ž˜Kšžœ1˜5Kšžœ/˜3—Kšœ˜K˜—š  œžœžœ#žœ˜FKšžœžœ˜Kšœ˜K˜—š  œžœžœ˜š  œžœžœžœ˜"Kšœ˜Kšœ˜Kšœ˜—Kšžœžœžœ$˜6Kšœ˜K˜—š  œžœžœ˜šœƒ™ƒKšœR™RKšœW™W—Kšœë™ëšžœ4ž˜<šžœ2˜4Kšžœ˜šžœžœ3˜:Kšžœ˜KšžœžœŸ(œ˜3——Kšžœ˜—Kšœ˜K˜—š   œžœžœžœžœ˜?Kšžœ#˜)Kšœ˜K˜—K˜Kšœ žœžœžœ˜$KšœS˜SKšœžœ˜ K˜Kšœžœžœžœ˜0Kšœ žœ˜+Kšœ žœ˜-K˜-K˜K˜K˜&K˜K˜šžœŸ/˜Jšžœ˜šœžœž˜K˜-K˜*K˜,KšžœŸœžœ˜(—K˜'K˜Kšœžœ˜Kšœ˜—šžœ˜šœžœž˜K˜-K˜)K˜&K˜(KšžœŸ œžœ˜—šžœŸ˜2Kšžœ6žœ˜AKšžœ žœ˜—Kšœ˜——K˜K˜K˜šžœŸ˜šžœžœ˜Kšœ˜Kšœ ˜ Kšžœžœžœ!™:Kšœ˜—Kšœ˜Kšœžœ˜Kšœžœ˜Kš œžœžœ žœžœ/˜Wšœ9˜9Kšœžœ-™B—šžœžœž˜)Kšœ=˜=—K˜šžœžœ ˜&Kšžœ7˜;Kšžœ3˜7—K˜K˜šžœŸ˜!Kšœ˜šžœžœ žœ/˜AKšžœ˜šžœ˜šžœ žœžœžœ˜FKšžœ˜—šžœžœ žœžœ˜,Kšžœžœžœ žœ˜2KšŸ˜K˜>˜7K˜*—˜(K˜@K˜=K˜—Kšœ˜—Kšœ˜——K˜&K˜K˜Kšœ3™3K˜šžœŸ7˜:šœ˜Kšœžœžœ žœ˜C—K˜šžœ ž˜šžœ˜Kšžœžœ˜Kšžœ žœ˜6——K˜Kšœžœ˜)K˜šžœžœ˜&šœ˜Kšœ Ÿ œ Ÿ œ˜B—KšŸs™sKšžœ˜Kšœ˜—K˜šžœžœ ˜&Kšžœ˜"Kšžœ'˜*šžœ˜Kšœžœ˜ KšœF˜Fšžœžœžœ˜+šžœžœ˜$Kšœžœ˜$——Kšœ˜—Kšžœ8˜<—K˜šžœ˜!Kšžœ'˜*Kšžœ0˜3šžœŸ ˜%šžœžœž˜˜0Kšœ™šžœžœž˜Kšœ'™'šœ2˜2šžœžœž˜*Kšœ)™)šžœžœ˜$Kšœžœ˜$——šžœž˜"Kšœžœ˜šœ˜Kšœ¬™¬Kšœžœ˜ K˜Kšœ˜——šžœŸ ˜šžœžœ˜$Kšœžœ˜$——Kšœ˜—Kšœ'™'šœ0˜0šžœž˜"šœ˜Kšœ™šžœž˜ Kšœ%˜%—Kšœžœ˜ šžœžœ˜%Kšžœžœžœ˜2šžœŸ)˜.Kšœ-™-Kšœ.™.K˜——Kšœ˜—šœŸ!˜/šžœ˜šžœžœ!˜(šžœ˜Kšœžœ˜#Kšžœ Ÿ"˜2Kšœ˜—Kšžœ˜—šžœžœžœ˜)Kšœžœ˜$————šžœŸ˜šžœžœ˜$Kšœžœ˜$——Kšœ˜—Kšœ,™,˜.KšœŸ˜.—Kšœ&™&—šžœ˜ Kšžœžœžœ˜I——šœ.žœ˜DKšžœ˜ Kšžœžœžœžœ˜NKšœ/™/Kšžœ˜ Kšœ˜——šžœ˜ Kšœ"™"Kšœ'˜'Kšœ˜Kšœ˜——šžœ˜Kšœ6™6Kšœ'˜'Kšœ˜Kšœ˜——Kšœ&™&K˜KšžŸœ˜$—šž˜šœ˜K˜ šžœ#žœžœ˜JKšœý™ýKšžœžœžœ*˜;—K˜ K˜:Kšœ˜——Kšœ˜—K˜KšžŸœ˜#šž˜šœ ˜ K˜,K˜%Kšœžœ˜Kšœ žœ ˜0Kšœ˜——Kšœ˜—K˜Kšœ,™,šžœ ˜Kšœ ™ K˜K˜ Kšžœžœžœ!™:šžœ ž˜KšžœŸœžœžœ ˜Qšžœ˜šžœžœ ˜0Kšžœž˜šžœ ˜$K˜D—šžœ˜šžœž˜Kšžœžœžœ˜H—šœ˜K˜B—K˜Kšžœžœ ˜Kšœ˜——Kšœ˜——Kšœ˜—K˜KšžŸœ˜K˜Kšœ:™:—K˜KšžŸœ˜!K˜Kšœ™K˜Kšœ˜K˜—š  œžœ˜-K˜5šœ?˜?K˜,—K˜Kšœ˜K˜—š  œžœ˜+Kšœ6™6K˜5šœ˜K˜U—Kšžœžœžœ ˜8Kšœ˜K˜—š  œžœžœžœ˜