Sweden-Number/dlls/nsiproxy.sys/icmp_echo.c

732 lines
21 KiB
C
Raw Normal View History

/*
* nsiproxy.sys icmp_echo implementation
*
* Copyright 2021 Huw Davies
*
* This library is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public
* License as published by the Free Software Foundation; either
* version 2.1 of the License, or (at your option) any later version.
*
* This library is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public
* License along with this library; if not, write to the Free Software
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
*/
#if 0
#pragma makedep unix
#endif
#include "config.h"
#include <stdarg.h>
#include <stdlib.h>
#include <unistd.h>
#include <errno.h>
#include <limits.h>
#include <pthread.h>
#include <poll.h>
#ifdef HAVE_SYS_SOCKET_H
#include <sys/socket.h>
#endif
#ifdef HAVE_NETINET_IN_H
#include <netinet/in.h>
#endif
#ifdef HAVE_NETINET_IP_H
#include <netinet/ip.h>
#endif
#include "ntstatus.h"
#define WIN32_NO_STATUS
#include "windef.h"
#include "winbase.h"
#include "winternl.h"
#include "winioctl.h"
#define USE_WS_PREFIX
#include "ddk/wdm.h"
#include "ifdef.h"
#include "netiodef.h"
#include "ipexport.h"
#include "ipmib.h"
#include "wine/nsi.h"
#include "wine/debug.h"
#include "nsiproxy_private.h"
WINE_DEFAULT_DEBUG_CHANNEL(nsi);
static LONG icmp_sequence;
struct ip_hdr
{
uint8_t v_hl; /* version << 4 | hdr_len */
uint8_t tos;
uint16_t tot_len;
uint16_t id;
uint16_t frag_off;
uint8_t ttl;
uint8_t protocol;
uint16_t checksum;
uint32_t saddr;
uint32_t daddr;
};
struct icmp_hdr
{
uint8_t type;
uint8_t code;
uint16_t checksum;
union
{
struct
{
uint16_t id;
uint16_t sequence;
} echo;
} un;
};
struct family_ops;
struct icmp_data
{
LARGE_INTEGER send_time;
int socket;
int cancel_pipe[2];
unsigned short id;
unsigned short seq;
const struct family_ops *ops;
};
#define MAX_HANDLES 256 /* Max number of simultaneous pings - could become dynamic if need be */
static struct icmp_data *handle_table[MAX_HANDLES];
static pthread_mutex_t handle_lock = PTHREAD_MUTEX_INITIALIZER;
static struct icmp_data **next_free, **next_unused = handle_table;
static HANDLE handle_alloc( struct icmp_data *data )
{
struct icmp_data **entry;
HANDLE h;
pthread_mutex_lock( &handle_lock );
entry = next_free;
if (entry) next_free = *(struct icmp_data ***)entry;
else if (next_unused < handle_table + MAX_HANDLES) entry = next_unused++;
else
{
pthread_mutex_unlock( &handle_lock );
FIXME( "Exhausted icmp handle count\n" );
return 0;
}
*entry = data;
h = LongToHandle( entry - handle_table + 1 );
pthread_mutex_unlock( &handle_lock );
TRACE( "returning handle %p\n", h );
return h;
}
static struct icmp_data **handle_entry( HANDLE h )
{
unsigned int idx = HandleToLong( h );
if (!idx || idx > MAX_HANDLES)
{
ERR( "Invalid icmp handle\n" );
return NULL;
}
return handle_table + idx - 1;
}
static struct icmp_data *handle_data( HANDLE h )
{
struct icmp_data **entry = handle_entry( h );
if (!entry) return NULL;
return *entry;
}
static void handle_free( HANDLE h )
{
struct icmp_data **entry;
TRACE( "%p\n", h );
pthread_mutex_lock( &handle_lock );
entry = handle_entry( h );
if (entry)
{
*(struct icmp_data ***)entry = next_free;
next_free = entry;
}
pthread_mutex_unlock( &handle_lock );
}
static void ipv4_init_icmp_hdr( struct icmp_data *data, struct icmp_hdr *icmp_hdr )
{
icmp_hdr->type = ICMP4_ECHO_REQUEST;
icmp_hdr->code = 0;
icmp_hdr->checksum = 0;
icmp_hdr->un.echo.id = data->id = getpid() & 0xffff; /* will be overwritten for linux ping socks */
icmp_hdr->un.echo.sequence = data->seq = InterlockedIncrement( &icmp_sequence ) & 0xffff;
}
/* rfc 1071 checksum */
static unsigned short chksum( BYTE *data, unsigned int count )
{
unsigned int sum = 0, carry = 0;
unsigned short check, s;
while (count > 1)
{
s = *(unsigned short *)data;
data += 2;
sum += carry;
sum += s;
carry = s > sum;
count -= 2;
}
sum += carry; /* This won't produce another carry */
sum = (sum & 0xffff) + (sum >> 16);
if (count) sum += *data; /* LE-only */
sum = (sum & 0xffff) + (sum >> 16);
/* fold in any carry */
sum = (sum & 0xffff) + (sum >> 16);
check = ~sum;
return check;
}
#ifdef __linux__
static unsigned short null_chksum( BYTE *data, unsigned int count )
{
return 0;
}
#endif
static void ipv4_set_socket_opts( struct icmp_data *data, struct icmp_send_echo_params *params )
{
int val;
val = params->ttl;
if (val) setsockopt( data->socket, IPPROTO_IP, IP_TTL, &val, sizeof(val) );
val = params->tos;
if (val) setsockopt( data->socket, IPPROTO_IP, IP_TOS, &val, sizeof(val) );
}
#ifdef __linux__
static void ipv4_linux_ping_set_socket_opts( struct icmp_data *data, struct icmp_send_echo_params *params )
{
static const int val = 1;
ipv4_set_socket_opts( data, params );
setsockopt( data->socket, IPPROTO_IP, IP_RECVTTL, &val, sizeof(val) );
setsockopt( data->socket, IPPROTO_IP, IP_RECVTOS, &val, sizeof(val) );
}
#endif
static int ipv4_reply_buffer_len( int reply_len )
{
return sizeof(struct ip_hdr) + sizeof(struct icmp_hdr) + reply_len - sizeof(struct nsiproxy_icmp_echo_reply);
}
#ifdef __linux__
static int ipv4_linux_ping_reply_buffer_len( int reply_len )
{
return sizeof(struct icmp_hdr) + reply_len - sizeof(struct nsiproxy_icmp_echo_reply);
}
#endif
static BOOL ipv4_parse_ip_hdr( struct msghdr *msg, int recvd,
int *ip_hdr_len, struct nsiproxy_icmp_echo_reply *reply, void **opts )
{
struct ip_hdr *ip_hdr;
if (recvd < sizeof(*ip_hdr)) return FALSE;
ip_hdr = msg->msg_iov[0].iov_base;
if (ip_hdr->v_hl >> 4 != 4 || ip_hdr->protocol != IPPROTO_ICMP) return FALSE;
*ip_hdr_len = (ip_hdr->v_hl & 0xf) << 2;
if (*ip_hdr_len < sizeof(*ip_hdr)) return FALSE;
*opts = ip_hdr + 1;
reply->opts.ttl = ip_hdr->ttl;
reply->opts.tos = ip_hdr->tos;
reply->opts.flags = ip_hdr->frag_off >> 13;
reply->opts.options_size = *ip_hdr_len - sizeof(*ip_hdr);
return TRUE;
}
#ifdef __linux__
static BOOL ipv4_linux_ping_parse_ip_hdr( struct msghdr *msg, int recvd,
int *ip_hdr_len, struct nsiproxy_icmp_echo_reply *reply, void **opts )
{
struct cmsghdr *cmsg;
*ip_hdr_len = 0;
*opts = NULL;
reply->opts.ttl = 0;
reply->opts.tos = 0;
reply->opts.flags = 0;
reply->opts.options_size = 0; /* FIXME from IP_OPTIONS but will require checking for space in the reply */
for (cmsg = CMSG_FIRSTHDR( msg ); cmsg; cmsg = CMSG_NXTHDR( msg, cmsg ))
{
if (cmsg->cmsg_level != IPPROTO_IP) continue;
switch (cmsg->cmsg_type)
{
case IP_TTL:
reply->opts.ttl = *(BYTE *)CMSG_DATA( cmsg );
break;
case IP_TOS:
reply->opts.tos = *(BYTE *)CMSG_DATA( cmsg );
break;
}
}
return TRUE;
}
#endif
static int ipv4_parse_icmp_hdr_( struct icmp_data *data, struct icmp_hdr *icmp, int icmp_size,
struct nsiproxy_icmp_echo_reply *reply, int ping_socket )
{
static const IP_STATUS unreach_codes[] =
{
IP_DEST_NET_UNREACHABLE, /* ICMP_UNREACH_NET */
IP_DEST_HOST_UNREACHABLE, /* ICMP_UNREACH_HOST */
IP_DEST_PROT_UNREACHABLE, /* ICMP_UNREACH_PROTOCOL */
IP_DEST_PORT_UNREACHABLE, /* ICMP_UNREACH_PORT */
IP_PACKET_TOO_BIG, /* ICMP_UNREACH_NEEDFRAG */
IP_BAD_ROUTE, /* ICMP_UNREACH_SRCFAIL */
IP_DEST_NET_UNREACHABLE, /* ICMP_UNREACH_NET_UNKNOWN */
IP_DEST_HOST_UNREACHABLE, /* ICMP_UNREACH_HOST_UNKNOWN */
IP_DEST_HOST_UNREACHABLE, /* ICMP_UNREACH_ISOLATED */
IP_DEST_NET_UNREACHABLE, /* ICMP_UNREACH_NET_PROHIB */
IP_DEST_HOST_UNREACHABLE, /* ICMP_UNREACH_HOST_PROHIB */
IP_DEST_NET_UNREACHABLE, /* ICMP_UNREACH_TOSNET */
IP_DEST_HOST_UNREACHABLE, /* ICMP_UNREACH_TOSHOST */
IP_DEST_HOST_UNREACHABLE, /* ICMP_UNREACH_FILTER_PROHIB */
IP_DEST_HOST_UNREACHABLE, /* ICMP_UNREACH_HOST_PRECEDENCE */
IP_DEST_HOST_UNREACHABLE /* ICMP_UNREACH_PRECEDENCE_CUTOFF */
};
const struct ip_hdr *orig_ip_hdr;
const struct icmp_hdr *orig_icmp_hdr;
int orig_ip_hdr_len;
IP_STATUS status;
switch (icmp->type)
{
case ICMP4_ECHO_REPLY:
if ((!ping_socket && icmp->un.echo.id != data->id) ||
icmp->un.echo.sequence != data->seq) return -1;
reply->status = IP_SUCCESS;
return icmp_size - sizeof(*icmp);
case ICMP4_DST_UNREACH:
if (icmp->code < ARRAY_SIZE(unreach_codes))
status = unreach_codes[icmp->code];
else
status = IP_DEST_HOST_UNREACHABLE;
break;
case ICMP4_TIME_EXCEEDED:
if (icmp->code == 1) /* ICMP_TIMXCEED_REASS */
status = IP_TTL_EXPIRED_REASSEM;
else
status = IP_TTL_EXPIRED_TRANSIT;
break;
case ICMP4_PARAM_PROB:
status = IP_PARAM_PROBLEM;
break;
case ICMP4_SOURCE_QUENCH:
status = IP_SOURCE_QUENCH;
break;
default:
return -1;
}
/* Check that the appended packet is really ours -
* all handled icmp replies have an 8-byte header
* followed by the original ip hdr. */
if (icmp_size < sizeof(*icmp) + sizeof(*orig_ip_hdr)) return -1;
orig_ip_hdr = (struct ip_hdr *)(icmp + 1);
if (orig_ip_hdr->v_hl >> 4 != 4 || orig_ip_hdr->protocol != IPPROTO_ICMP) return -1;
orig_ip_hdr_len = (orig_ip_hdr->v_hl & 0xf) << 2;
if (icmp_size < sizeof(*icmp) + orig_ip_hdr_len + sizeof(*orig_icmp_hdr)) return -1;
orig_icmp_hdr = (const struct icmp_hdr *)((const BYTE *)orig_ip_hdr + orig_ip_hdr_len);
if (orig_icmp_hdr->type != ICMP4_ECHO_REQUEST ||
orig_icmp_hdr->code != 0 ||
(!ping_socket && orig_icmp_hdr->un.echo.id != data->id) ||
orig_icmp_hdr->un.echo.sequence != data->seq) return -1;
reply->status = status;
return 0;
}
static int ipv4_parse_icmp_hdr( struct icmp_data *data, struct icmp_hdr *icmp, int icmp_size,
struct nsiproxy_icmp_echo_reply *reply )
{
return ipv4_parse_icmp_hdr_( data, icmp, icmp_size, reply, 0 );
}
#ifdef __linux__
static int ipv4_linux_ping_parse_icmp_hdr( struct icmp_data *data, struct icmp_hdr *icmp, int icmp_size,
struct nsiproxy_icmp_echo_reply *reply )
{
return ipv4_parse_icmp_hdr_( data, icmp, icmp_size, reply, 1 );
}
#endif
struct family_ops
{
int family;
int icmp_protocol;
void (*init_icmp_hdr)( struct icmp_data *data, struct icmp_hdr *icmp_hdr );
unsigned short (*chksum)( BYTE *data, unsigned int count );
void (*set_socket_opts)( struct icmp_data *data, struct icmp_send_echo_params *params );
int (*reply_buffer_len)( int reply_len );
BOOL (*parse_ip_hdr)( struct msghdr *msg, int recvd,
int *ip_hdr_len, struct nsiproxy_icmp_echo_reply *reply, void **opts );
int (*parse_icmp_hdr)( struct icmp_data *data, struct icmp_hdr *icmp, int icmp_len,
struct nsiproxy_icmp_echo_reply *reply );
};
static const struct family_ops ipv4 =
{
AF_INET,
IPPROTO_ICMP,
ipv4_init_icmp_hdr,
chksum,
ipv4_set_socket_opts,
ipv4_reply_buffer_len,
ipv4_parse_ip_hdr,
ipv4_parse_icmp_hdr,
};
#ifdef __linux__
/* linux ipv4 ping sockets behave more like ipv6 raw sockets */
static const struct family_ops ipv4_linux_ping =
{
AF_INET,
IPPROTO_ICMP,
ipv4_init_icmp_hdr,
null_chksum,
ipv4_linux_ping_set_socket_opts,
ipv4_linux_ping_reply_buffer_len,
ipv4_linux_ping_parse_ip_hdr,
ipv4_linux_ping_parse_icmp_hdr,
};
#endif
static IP_STATUS errno_to_ip_status( int err )
{
switch( err )
{
case EHOSTUNREACH: return IP_DEST_HOST_UNREACHABLE;
default: return IP_GENERAL_FAILURE;
}
}
static int SOCKADDR_INET_to_sockaddr( const SOCKADDR_INET *in, struct sockaddr *out, int len )
{
switch (in->si_family)
{
case WS_AF_INET:
{
struct sockaddr_in *sa = (struct sockaddr_in *)out;
if (len < sizeof(*sa)) return 0;
sa->sin_family = AF_INET;
sa->sin_port = in->Ipv4.sin_port;
sa->sin_addr.s_addr = in->Ipv4.sin_addr.WS_s_addr;
return sizeof(*sa);
}
case WS_AF_INET6:
{
struct sockaddr_in6 *sa = (struct sockaddr_in6 *)out;
if (len < sizeof(*sa)) return 0;
sa->sin6_family = AF_INET6;
sa->sin6_port = in->Ipv6.sin6_port;
sa->sin6_flowinfo = in->Ipv6.sin6_flowinfo;
memcpy( sa->sin6_addr.s6_addr, in->Ipv6.sin6_addr.WS_s6_addr, sizeof(sa->sin6_addr.s6_addr) );
sa->sin6_scope_id = in->Ipv6.sin6_scope_id;
return sizeof(*sa);
}
}
return 0;
}
static BOOL sockaddr_to_SOCKADDR_INET( const struct sockaddr *in, SOCKADDR_INET *out )
{
switch (in->sa_family)
{
case AF_INET:
{
struct sockaddr_in *sa = (struct sockaddr_in *)in;
out->Ipv4.sin_family = WS_AF_INET;
out->Ipv4.sin_port = sa->sin_port;
out->Ipv4.sin_addr.WS_s_addr = sa->sin_addr.s_addr;
return TRUE;
}
case AF_INET6:
{
struct sockaddr_in6 *sa = (struct sockaddr_in6 *)in;
out->Ipv6.sin6_family = WS_AF_INET6;
out->Ipv6.sin6_port = sa->sin6_port;
out->Ipv6.sin6_flowinfo = sa->sin6_flowinfo;
memcpy( out->Ipv6.sin6_addr.WS_s6_addr, sa->sin6_addr.s6_addr, sizeof(sa->sin6_addr.s6_addr) );
out->Ipv6.sin6_scope_id = sa->sin6_scope_id;
return TRUE;
}
}
return FALSE;
}
static NTSTATUS icmp_data_create( ADDRESS_FAMILY win_family, struct icmp_data **icmp_data )
{
struct icmp_data *data;
const struct family_ops *ops;
if (win_family == WS_AF_INET) ops = &ipv4;
else return STATUS_INVALID_PARAMETER;
data = malloc( sizeof(*data) );
if (!data) return STATUS_NO_MEMORY;
data->socket = socket( ops->family, SOCK_RAW, ops->icmp_protocol );
if (data->socket < 0) /* Try a ping-socket */
{
TRACE( "failed to open raw sock, trying a dgram sock\n" );
data->socket = socket( ops->family, SOCK_DGRAM, ops->icmp_protocol );
if (data->socket < 0)
{
WARN( "Unable to create socket\n" );
free( data );
return STATUS_ACCESS_DENIED;
}
#ifdef __linux__
if (ops->family == AF_INET) ops = &ipv4_linux_ping;
#endif
}
if (pipe( data->cancel_pipe ))
{
close( data->socket );
free( data );
return STATUS_ACCESS_DENIED;
}
data->ops = ops;
*icmp_data = data;
return STATUS_SUCCESS;
}
static void icmp_data_free( struct icmp_data *data )
{
close( data->socket );
close( data->cancel_pipe[0] );
close( data->cancel_pipe[1] );
free( data );
}
NTSTATUS icmp_send_echo( void *args )
{
struct icmp_send_echo_params *params = args;
struct icmp_hdr *icmp_hdr; /* this is the same for both ipv4 and ipv6 */
struct sockaddr_storage dst_storage;
struct sockaddr *dst = (struct sockaddr *)&dst_storage;
struct icmp_data *data;
int dst_len, ret;
NTSTATUS status;
status = icmp_data_create( params->dst->si_family, &data );
if (status) return status;
data->ops->set_socket_opts( data, params );
icmp_hdr = malloc( sizeof(*icmp_hdr) + params->request_size );
if (!icmp_hdr)
{
icmp_data_free( data );
return STATUS_NO_MEMORY;
}
data->ops->init_icmp_hdr( data, icmp_hdr );
memcpy( icmp_hdr + 1, params->request, params->request_size );
icmp_hdr->checksum = data->ops->chksum( (BYTE *)icmp_hdr, sizeof(*icmp_hdr) + params->request_size );
dst_len = SOCKADDR_INET_to_sockaddr( params->dst, dst, sizeof(dst_storage) );
NtQueryPerformanceCounter( &data->send_time, NULL );
ret = sendto( data->socket, icmp_hdr, sizeof(*icmp_hdr) + params->request_size, 0, dst, dst_len );
free( icmp_hdr );
if (ret < 0)
{
TRACE( "sendto() rets %d errno %d\n", ret, errno );
icmp_data_free( data );
params->ip_status = errno_to_ip_status( errno );
return STATUS_SUCCESS;
}
params->handle = handle_alloc( data );
if (!params->handle) icmp_data_free( data );
return params->handle ? STATUS_PENDING : STATUS_NO_MEMORY;
}
static NTSTATUS set_reply_ip_status( struct icmp_listen_params *params, IP_STATUS ip_status )
{
struct nsiproxy_icmp_echo_reply *reply = params->reply;
memset( reply, 0, sizeof(*reply) );
reply->status = ip_status;
params->reply_len = sizeof(*reply);
return STATUS_SUCCESS;
}
static int get_timeout( LARGE_INTEGER start, DWORD timeout )
{
LARGE_INTEGER now, end;
end.QuadPart = start.QuadPart + (ULONGLONG)timeout * 10000;
NtQueryPerformanceCounter( &now, NULL );
if (now.QuadPart >= end.QuadPart) return 0;
return min( (end.QuadPart - now.QuadPart) / 10000, INT_MAX );
}
static ULONG get_rtt( LARGE_INTEGER start )
{
LARGE_INTEGER now;
NtQueryPerformanceCounter( &now, NULL );
return (now.QuadPart - start.QuadPart) / 10000;
}
static NTSTATUS recv_msg( struct icmp_data *data, struct icmp_listen_params *params )
{
struct nsiproxy_icmp_echo_reply *reply = (struct nsiproxy_icmp_echo_reply *)params->reply;
struct sockaddr_storage addr;
struct iovec iov[1];
BYTE cmsg_buf[1024];
struct msghdr msg = { .msg_name = &addr, .msg_namelen = sizeof(addr),
.msg_iov = iov, .msg_iovlen = ARRAY_SIZE(iov),
.msg_control = cmsg_buf, .msg_controllen = sizeof(cmsg_buf) };
int ip_hdr_len, recvd, reply_buf_len, data_size;
char *reply_buf;
void *opts;
struct icmp_hdr *icmp_hdr;
reply_buf_len = data->ops->reply_buffer_len( params->reply_len );
reply_buf = malloc( reply_buf_len );
if (!reply_buf) return STATUS_NO_MEMORY;
iov[0].iov_base = reply_buf;
iov[0].iov_len = reply_buf_len;
recvd = recvmsg( data->socket, &msg, 0 );
TRACE( "recvmsg() rets %d errno %d addr_len %d iovlen %d msg_flags %x\n",
recvd, errno, msg.msg_namelen, (int)iov[0].iov_len, msg.msg_flags );
if (!data->ops->parse_ip_hdr( &msg, recvd, &ip_hdr_len, reply, &opts )) goto skip;
if (recvd < ip_hdr_len + sizeof(*icmp_hdr)) goto skip;
icmp_hdr = (struct icmp_hdr *)(reply_buf + ip_hdr_len);
if ((data_size = data->ops->parse_icmp_hdr( data, icmp_hdr, recvd - ip_hdr_len, reply )) < 0) goto skip;
reply->data_size = data_size;
if (reply->data_size && msg.msg_flags & MSG_TRUNC)
{
free( reply_buf );
return set_reply_ip_status( params, IP_GENERAL_FAILURE );
}
sockaddr_to_SOCKADDR_INET( (struct sockaddr *)&addr, &reply->addr );
reply->round_trip_time = get_rtt( data->send_time );
reply->num_of_pkts = 1;
reply->opts.options_offset = sizeof(*reply);
reply->data_offset = sizeof(*reply) + ((reply->opts.options_size + 3) & ~3);
if (reply->opts.options_size)
memcpy( (char *)reply + reply->opts.options_offset, opts, reply->opts.options_size );
if (reply->opts.options_size & 3)
memset( (char *)reply + reply->opts.options_offset + reply->opts.options_size, 0, 4 - (reply->opts.options_size & 3) );
if (reply->data_size)
memcpy( (char *)reply + reply->data_offset, icmp_hdr + 1, reply->data_size );
params->reply_len = reply->data_offset + reply->data_size;
free( reply_buf );
return STATUS_SUCCESS;
skip:
free( reply_buf );
return STATUS_RETRY;
}
NTSTATUS icmp_listen( void *args )
{
struct icmp_listen_params *params = args;
struct icmp_data *data;
struct pollfd fds[2];
NTSTATUS status;
int ret;
data = handle_data( params->handle );
if (!data) return STATUS_INVALID_PARAMETER;
fds[0].fd = data->socket;
fds[0].events = POLLIN;
fds[1].fd = data->cancel_pipe[0];
fds[1].events = POLLIN;
while ((ret = poll( fds, ARRAY_SIZE(fds), get_timeout( data->send_time, params->timeout ) )) > 0)
{
if (fds[1].revents & POLLIN)
{
TRACE( "cancelled\n" );
return STATUS_CANCELLED;
}
status = recv_msg( data, params );
if (status == STATUS_RETRY) continue;
return status;
}
if (!ret) /* timeout */
{
TRACE( "timeout\n" );
return set_reply_ip_status( params, IP_REQ_TIMED_OUT );
}
/* ret < 0 */
return set_reply_ip_status( params, errno_to_ip_status( errno ) );
}
NTSTATUS icmp_cancel_listen( void *args )
{
HANDLE handle = args;
struct icmp_data *data = handle_data( handle );
if (!data) return STATUS_INVALID_PARAMETER;
write( data->cancel_pipe[1], "x", 1 );
return STATUS_SUCCESS;
}
NTSTATUS icmp_close( void *args )
{
HANDLE handle = args;
struct icmp_data *data = handle_data( handle );
if (!data) return STATUS_INVALID_PARAMETER;
icmp_data_free( data );
handle_free( handle );
return STATUS_SUCCESS;
}