/* * nsiproxy.sys ipv4 and ipv6 modules * * Copyright 2003, 2006, 2011 Juan Lang * Copyright 2021 Huw Davies * * This library is free software; you can redistribute it and/or * modify it under the terms of the GNU Lesser General Public * License as published by the Free Software Foundation; either * version 2.1 of the License, or (at your option) any later version. * * This library is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public * License along with this library; if not, write to the Free Software * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA */ #if 0 #pragma makedep unix #endif #include "config.h" #include #include #include #ifdef HAVE_NET_ROUTE_H #include #endif #ifdef HAVE_SYS_SYSCTL_H #include #endif #ifdef HAVE_NETINET_IN_H #include #endif #ifdef HAVE_NETINET_IP_H #include #endif #ifdef HAVE_NETINET_IN_SYSTM_H #include #endif #ifdef HAVE_NETINET_IP_ICMP_H #include #endif #ifdef HAVE_NETINET_IP_VAR_H #include #endif #ifdef HAVE_NETINET_ICMP_VAR_H #include #endif #ifdef HAVE_NETINET_IF_ETHER_H #include #endif #ifdef HAVE_NET_IF_ARP_H #include #endif #ifdef HAVE_NET_IF_DL_H #include #endif #ifdef HAVE_IFADDRS_H #include #endif #ifdef HAVE_ARPA_INET_H #include #endif #include "ntstatus.h" #define WIN32_NO_STATUS #include "windef.h" #include "winbase.h" #include "winternl.h" #include "winioctl.h" #define USE_WS_PREFIX #include "winsock2.h" #include "ws2ipdef.h" #include "nldef.h" #include "ifdef.h" #include "ipmib.h" #include "netiodef.h" #include "wine/nsi.h" #include "wine/debug.h" #include "unix_private.h" WINE_DEFAULT_DEBUG_CHANNEL(nsi); static inline DWORD nsi_popcount( DWORD m ) { #ifdef HAVE___BUILTIN_POPCOUNT return __builtin_popcount( m ); #else m -= m >> 1 & 0x55555555; m = (m & 0x33333333) + (m >> 2 & 0x33333333); return ((m + (m >> 4)) & 0x0f0f0f0f) * 0x01010101 >> 24; #endif } static DWORD mask_v4_to_prefix( struct in_addr *addr ) { return nsi_popcount( addr->s_addr ); } static DWORD mask_v6_to_prefix( struct in6_addr *addr ) { DWORD ret; ret = nsi_popcount( *(DWORD *)addr->s6_addr ); ret += nsi_popcount( *(DWORD *)(addr->s6_addr + 4) ); ret += nsi_popcount( *(DWORD *)(addr->s6_addr + 8) ); ret += nsi_popcount( *(DWORD *)(addr->s6_addr + 12) ); return ret; } static ULONG64 get_boot_time( void ) { SYSTEM_TIMEOFDAY_INFORMATION ti; NtQuerySystemInformation( SystemTimeOfDayInformation, &ti, sizeof(ti), NULL ); return ti.BootTime.QuadPart; } #if __linux__ static NTSTATUS read_sysctl_int( const char *file, int *val ) { FILE *fp; char buf[128], *endptr = buf; fp = fopen( file, "r" ); if (!fp) return STATUS_NOT_SUPPORTED; if (fgets( buf, sizeof(buf), fp )) *val = strtol( buf, &endptr, 10 ); fclose( fp ); return (endptr == buf) ? STATUS_NOT_SUPPORTED : STATUS_SUCCESS; } #endif static NTSTATUS ip_cmpt_get_all_parameters( DWORD fam, const DWORD *key, DWORD key_size, struct nsi_ip_cmpt_rw *rw_data, DWORD rw_size, struct nsi_ip_cmpt_dynamic *dynamic_data, DWORD dynamic_size, void *static_data, DWORD static_size ) { const NPI_MODULEID *ip_mod = (fam == AF_INET) ? &NPI_MS_IPV4_MODULEID : &NPI_MS_IPV6_MODULEID; struct nsi_ip_cmpt_rw rw; struct nsi_ip_cmpt_dynamic dyn; DWORD count; memset( &rw, 0, sizeof(rw) ); memset( &dyn, 0, sizeof(dyn) ); if (*key != 1) return STATUS_NOT_SUPPORTED; #if __linux__ { const char *fwd = (fam == AF_INET) ? "/proc/sys/net/ipv4/conf/default/forwarding" : "/proc/sys/net/ipv6/conf/default/forwarding"; const char *ttl = (fam == AF_INET) ? "/proc/sys/net/ipv4/ip_default_ttl" : "/proc/sys/net/ipv6/conf/default/hop_limit"; int value; if (!read_sysctl_int( fwd, &value )) rw.not_forwarding = !value; if (!read_sysctl_int( ttl, &value )) rw.default_ttl = value; } #elif defined(HAVE_SYS_SYSCTL_H) { int fwd_4[] = { CTL_NET, PF_INET, IPPROTO_IP, IPCTL_FORWARDING }; int fwd_6[] = { CTL_NET, PF_INET6, IPPROTO_IPV6, IPV6CTL_FORWARDING }; int ttl_4[] = { CTL_NET, PF_INET, IPPROTO_IP, IPCTL_DEFTTL }; int ttl_6[] = { CTL_NET, PF_INET6, IPPROTO_IPV6, IPV6CTL_DEFHLIM }; int value; size_t needed; needed = sizeof(value); if (!sysctl( (fam == AF_INET) ? fwd_4 : fwd_6, ARRAY_SIZE(fwd_4), &value, &needed, NULL, 0 )) rw.not_forwarding = value; needed = sizeof(value); if (!sysctl( (fam == AF_INET) ? ttl_4 : ttl_6, ARRAY_SIZE(ttl_4), &value, &needed, NULL, 0 )) rw.default_ttl = value; } #else FIXME( "forwarding and default ttl not implemented\n" ); #endif count = 0; if (!nsi_enumerate_all( 1, 0, &NPI_MS_NDIS_MODULEID, NSI_NDIS_IFINFO_TABLE, NULL, 0, NULL, 0, NULL, 0, NULL, 0, &count )) dyn.num_ifs = count; count = 0; if (!nsi_enumerate_all( 1, 0, ip_mod, NSI_IP_FORWARD_TABLE, NULL, 0, NULL, 0, NULL, 0, NULL, 0, &count )) dyn.num_routes = count; count = 0; if (!nsi_enumerate_all( 1, 0, ip_mod, NSI_IP_UNICAST_TABLE, NULL, 0, NULL, 0, NULL, 0, NULL, 0, &count )) dyn.num_addrs = count; if (rw_data) *rw_data = rw; if (dynamic_data) *dynamic_data = dyn; return STATUS_SUCCESS; } static NTSTATUS ipv4_cmpt_get_all_parameters( const void *key, DWORD key_size, void *rw_data, DWORD rw_size, void *dynamic_data, DWORD dynamic_size, void *static_data, DWORD static_size ) { TRACE( "%p %d %p %d %p %d %p %d\n", key, key_size, rw_data, rw_size, dynamic_data, dynamic_size, static_data, static_size ); return ip_cmpt_get_all_parameters( AF_INET, key, key_size, rw_data, rw_size, dynamic_data, dynamic_size, static_data, static_size ); } static NTSTATUS ipv6_cmpt_get_all_parameters( const void *key, DWORD key_size, void *rw_data, DWORD rw_size, void *dynamic_data, DWORD dynamic_size, void *static_data, DWORD static_size ) { TRACE( "%p %d %p %d %p %d %p %d\n", key, key_size, rw_data, rw_size, dynamic_data, dynamic_size, static_data, static_size ); return ip_cmpt_get_all_parameters( AF_INET6, key, key_size, rw_data, rw_size, dynamic_data, dynamic_size, static_data, static_size ); } static NTSTATUS ipv4_icmpstats_get_all_parameters( const void *key, DWORD key_size, void *rw_data, DWORD rw_size, void *dynamic_data, DWORD dynamic_size, void *static_data, DWORD static_size ) { struct nsi_ip_icmpstats_dynamic dyn; TRACE( "%p %d %p %d %p %d %p %d\n", key, key_size, rw_data, rw_size, dynamic_data, dynamic_size, static_data, static_size ); memset( &dyn, 0, sizeof(dyn) ); #ifdef __linux__ { NTSTATUS status = STATUS_NOT_SUPPORTED; static const char hdr[] = "Icmp:"; char buf[512], *ptr; FILE *fp; if (!(fp = fopen( "/proc/net/snmp", "r" ))) return STATUS_NOT_SUPPORTED; while ((ptr = fgets( buf, sizeof(buf), fp ))) { if (ascii_strncasecmp( buf, hdr, sizeof(hdr) - 1 )) continue; /* last line was a header, get another */ if (!(ptr = fgets( buf, sizeof(buf), fp ))) break; if (!ascii_strncasecmp( buf, hdr, sizeof(hdr) - 1 )) { ptr += sizeof(hdr); sscanf( ptr, "%u %u %*u %u %u %u %u %u %u %u %u %u %u %u %u %u %u %u %u %u %u %u %u %u %u %u %u", &dyn.in_msgs, &dyn.in_errors, &dyn.in_type_counts[ICMP4_DST_UNREACH], &dyn.in_type_counts[ICMP4_TIME_EXCEEDED], &dyn.in_type_counts[ICMP4_PARAM_PROB], &dyn.in_type_counts[ICMP4_SOURCE_QUENCH], &dyn.in_type_counts[ICMP4_REDIRECT], &dyn.in_type_counts[ICMP4_ECHO_REQUEST], &dyn.in_type_counts[ICMP4_ECHO_REPLY], &dyn.in_type_counts[ICMP4_TIMESTAMP_REQUEST], &dyn.in_type_counts[ICMP4_TIMESTAMP_REPLY], &dyn.in_type_counts[ICMP4_MASK_REQUEST], &dyn.in_type_counts[ICMP4_MASK_REPLY], &dyn.out_msgs, &dyn.out_errors, &dyn.out_type_counts[ICMP4_DST_UNREACH], &dyn.out_type_counts[ICMP4_TIME_EXCEEDED], &dyn.out_type_counts[ICMP4_PARAM_PROB], &dyn.out_type_counts[ICMP4_SOURCE_QUENCH], &dyn.out_type_counts[ICMP4_REDIRECT], &dyn.out_type_counts[ICMP4_ECHO_REQUEST], &dyn.out_type_counts[ICMP4_ECHO_REPLY], &dyn.out_type_counts[ICMP4_TIMESTAMP_REQUEST], &dyn.out_type_counts[ICMP4_TIMESTAMP_REPLY], &dyn.out_type_counts[ICMP4_MASK_REQUEST], &dyn.out_type_counts[ICMP4_MASK_REPLY] ); status = STATUS_SUCCESS; if (dynamic_data) *(struct nsi_ip_icmpstats_dynamic *)dynamic_data = dyn; break; } } fclose( fp ); return status; } #elif defined(HAVE_SYS_SYSCTL_H) && defined(ICMPCTL_STATS) { int mib[] = { CTL_NET, PF_INET, IPPROTO_ICMP, ICMPCTL_STATS }; struct icmpstat icmp_stat; size_t needed = sizeof(icmp_stat); int i; if (sysctl( mib, ARRAY_SIZE(mib), &icmp_stat, &needed, NULL, 0 ) == -1) return STATUS_NOT_SUPPORTED; dyn.in_msgs = icmp_stat.icps_badcode + icmp_stat.icps_checksum + icmp_stat.icps_tooshort + icmp_stat.icps_badlen; for (i = 0; i <= ICMP_MAXTYPE; i++) dyn.in_msgs += icmp_stat.icps_inhist[i]; dyn.in_errors = icmp_stat.icps_badcode + icmp_stat.icps_tooshort + icmp_stat.icps_checksum + icmp_stat.icps_badlen; dyn.in_type_counts[ICMP4_DST_UNREACH] = icmp_stat.icps_inhist[ICMP_UNREACH]; dyn.in_type_counts[ICMP4_TIME_EXCEEDED] = icmp_stat.icps_inhist[ICMP_TIMXCEED]; dyn.in_type_counts[ICMP4_PARAM_PROB] = icmp_stat.icps_inhist[ICMP_PARAMPROB]; dyn.in_type_counts[ICMP4_SOURCE_QUENCH] = icmp_stat.icps_inhist[ICMP_SOURCEQUENCH]; dyn.in_type_counts[ICMP4_REDIRECT] = icmp_stat.icps_inhist[ICMP_REDIRECT]; dyn.in_type_counts[ICMP4_ECHO_REQUEST] = icmp_stat.icps_inhist[ICMP_ECHO]; dyn.in_type_counts[ICMP4_ECHO_REPLY] = icmp_stat.icps_inhist[ICMP_ECHOREPLY]; dyn.in_type_counts[ICMP4_TIMESTAMP_REQUEST] = icmp_stat.icps_inhist[ICMP_TSTAMP]; dyn.in_type_counts[ICMP4_TIMESTAMP_REPLY] = icmp_stat.icps_inhist[ICMP_TSTAMPREPLY]; dyn.in_type_counts[ICMP4_MASK_REQUEST] = icmp_stat.icps_inhist[ICMP_MASKREQ]; dyn.in_type_counts[ICMP4_MASK_REPLY] = icmp_stat.icps_inhist[ICMP_MASKREPLY]; dyn.out_msgs = icmp_stat.icps_oldshort + icmp_stat.icps_oldicmp; for (i = 0; i <= ICMP_MAXTYPE; i++) dyn.out_msgs += icmp_stat.icps_outhist[i]; dyn.out_errors = icmp_stat.icps_oldshort + icmp_stat.icps_oldicmp; dyn.out_type_counts[ICMP4_DST_UNREACH] = icmp_stat.icps_outhist[ICMP_UNREACH]; dyn.out_type_counts[ICMP4_TIME_EXCEEDED] = icmp_stat.icps_outhist[ICMP_TIMXCEED]; dyn.out_type_counts[ICMP4_PARAM_PROB] = icmp_stat.icps_outhist[ICMP_PARAMPROB]; dyn.out_type_counts[ICMP4_SOURCE_QUENCH] = icmp_stat.icps_outhist[ICMP_SOURCEQUENCH]; dyn.out_type_counts[ICMP4_REDIRECT] = icmp_stat.icps_outhist[ICMP_REDIRECT]; dyn.out_type_counts[ICMP4_ECHO_REQUEST] = icmp_stat.icps_outhist[ICMP_ECHO]; dyn.out_type_counts[ICMP4_ECHO_REPLY] = icmp_stat.icps_outhist[ICMP_ECHOREPLY]; dyn.out_type_counts[ICMP4_TIMESTAMP_REQUEST] = icmp_stat.icps_outhist[ICMP_TSTAMP]; dyn.out_type_counts[ICMP4_TIMESTAMP_REPLY] = icmp_stat.icps_outhist[ICMP_TSTAMPREPLY]; dyn.out_type_counts[ICMP4_MASK_REQUEST] = icmp_stat.icps_outhist[ICMP_MASKREQ]; dyn.out_type_counts[ICMP4_MASK_REPLY] = icmp_stat.icps_outhist[ICMP_MASKREPLY]; if (dynamic_data) *(struct nsi_ip_icmpstats_dynamic *)dynamic_data = dyn; return STATUS_SUCCESS; } #else FIXME( "not implemented\n" ); return STATUS_NOT_IMPLEMENTED; #endif } static NTSTATUS ipv6_icmpstats_get_all_parameters( const void *key, DWORD key_size, void *rw_data, DWORD rw_size, void *dynamic_data, DWORD dynamic_size, void *static_data, DWORD static_size ) { struct nsi_ip_icmpstats_dynamic dyn; TRACE( "%p %d %p %d %p %d %p %d\n", key, key_size, rw_data, rw_size, dynamic_data, dynamic_size, static_data, static_size ); memset( &dyn, 0, sizeof(dyn) ); #ifdef __linux__ { struct data { const char *name; DWORD pos; }; static const struct data in_list[] = { { "Icmp6InDestUnreachs", ICMP6_DST_UNREACH }, { "Icmp6InPktTooBigs", ICMP6_PACKET_TOO_BIG }, { "Icmp6InTimeExcds", ICMP6_TIME_EXCEEDED }, { "Icmp6InParmProblems", ICMP6_PARAM_PROB }, { "Icmp6InEchos", ICMP6_ECHO_REQUEST }, { "Icmp6InEchoReplies", ICMP6_ECHO_REPLY }, { "Icmp6InGroupMembQueries", ICMP6_MEMBERSHIP_QUERY }, { "Icmp6InGroupMembResponses", ICMP6_MEMBERSHIP_REPORT }, { "Icmp6InGroupMembReductions", ICMP6_MEMBERSHIP_REDUCTION }, { "Icmp6InRouterSolicits", ND_ROUTER_SOLICIT }, { "Icmp6InRouterAdvertisements", ND_ROUTER_ADVERT }, { "Icmp6InNeighborSolicits", ND_NEIGHBOR_SOLICIT }, { "Icmp6InNeighborAdvertisements", ND_NEIGHBOR_ADVERT }, { "Icmp6InRedirects", ND_REDIRECT }, { "Icmp6InMLDv2Reports", ICMP6_V2_MEMBERSHIP_REPORT }, }; static const struct data out_list[] = { { "Icmp6OutDestUnreachs", ICMP6_DST_UNREACH }, { "Icmp6OutPktTooBigs", ICMP6_PACKET_TOO_BIG }, { "Icmp6OutTimeExcds", ICMP6_TIME_EXCEEDED }, { "Icmp6OutParmProblems", ICMP6_PARAM_PROB }, { "Icmp6OutEchos", ICMP6_ECHO_REQUEST }, { "Icmp6OutEchoReplies", ICMP6_ECHO_REPLY }, { "Icmp6OutGroupMembQueries", ICMP6_MEMBERSHIP_QUERY }, { "Icmp6OutGroupMembResponses", ICMP6_MEMBERSHIP_REPORT }, { "Icmp6OutGroupMembReductions", ICMP6_MEMBERSHIP_REDUCTION }, { "Icmp6OutRouterSolicits", ND_ROUTER_SOLICIT }, { "Icmp6OutRouterAdvertisements", ND_ROUTER_ADVERT }, { "Icmp6OutNeighborSolicits", ND_NEIGHBOR_SOLICIT }, { "Icmp6OutNeighborAdvertisements", ND_NEIGHBOR_ADVERT }, { "Icmp6OutRedirects", ND_REDIRECT }, { "Icmp6OutMLDv2Reports", ICMP6_V2_MEMBERSHIP_REPORT }, }; char buf[512], *ptr, *value; DWORD res, i; FILE *fp; if (!(fp = fopen( "/proc/net/snmp6", "r" ))) return STATUS_NOT_SUPPORTED; while ((ptr = fgets( buf, sizeof(buf), fp ))) { if (!(value = strchr( buf, ' ' ))) continue; /* terminate the valuename */ ptr = value - 1; *(ptr + 1) = '\0'; /* and strip leading spaces from value */ value += 1; while (*value == ' ') value++; if ((ptr = strchr( value, '\n' ))) *ptr='\0'; if (!ascii_strcasecmp( buf, "Icmp6InMsgs" )) { if (sscanf( value, "%d", &res )) dyn.in_msgs = res; continue; } if (!ascii_strcasecmp( buf, "Icmp6InErrors" )) { if (sscanf( value, "%d", &res )) dyn.in_errors = res; continue; } for (i = 0; i < ARRAY_SIZE(in_list); i++) { if (!ascii_strcasecmp( buf, in_list[i].name )) { if (sscanf( value, "%d", &res )) dyn.in_type_counts[in_list[i].pos] = res; break; } } if (!ascii_strcasecmp( buf, "Icmp6OutMsgs" )) { if (sscanf( value, "%d", &res )) dyn.out_msgs = res; continue; } if (!ascii_strcasecmp( buf, "Icmp6OutErrors" )) { if (sscanf( value, "%d", &res )) dyn.out_errors = res; continue; } for (i = 0; i < ARRAY_SIZE(out_list); i++) { if (!ascii_strcasecmp( buf, out_list[i].name )) { if (sscanf( value, "%d", &res )) dyn.out_type_counts[out_list[i].pos] = res; break; } } } fclose( fp ); if (dynamic_data) *(struct nsi_ip_icmpstats_dynamic *)dynamic_data = dyn; return STATUS_SUCCESS; } #else FIXME( "not implemented\n" ); return STATUS_NOT_IMPLEMENTED; #endif } static NTSTATUS ipv4_ipstats_get_all_parameters( const void *key, DWORD key_size, void *rw_data, DWORD rw_size, void *dynamic_data, DWORD dynamic_size, void *static_data, DWORD static_size ) { struct nsi_ip_ipstats_dynamic dyn; struct nsi_ip_ipstats_static stat; TRACE( "%p %d %p %d %p %d %p %d\n", key, key_size, rw_data, rw_size, dynamic_data, dynamic_size, static_data, static_size ); memset( &dyn, 0, sizeof(dyn) ); memset( &stat, 0, sizeof(stat) ); #ifdef __linux__ { NTSTATUS status = STATUS_NOT_SUPPORTED; static const char hdr[] = "Ip:"; char buf[512], *ptr; FILE *fp; if (!(fp = fopen( "/proc/net/snmp", "r" ))) return STATUS_NOT_SUPPORTED; while ((ptr = fgets( buf, sizeof(buf), fp ))) { if (ascii_strncasecmp( buf, hdr, sizeof(hdr) - 1 )) continue; /* last line was a header, get another */ if (!(ptr = fgets( buf, sizeof(buf), fp ))) break; if (!ascii_strncasecmp( buf, hdr, sizeof(hdr) - 1 )) { DWORD in_recv, in_hdr_errs, fwd_dgrams, in_delivers, out_reqs; ptr += sizeof(hdr); sscanf( ptr, "%*u %*u %u %u %u %u %u %u %u %u %u %u %u %u %u %u %u %u %u", &in_recv, &in_hdr_errs, &dyn.in_addr_errs, &fwd_dgrams, &dyn.in_unk_protos, &dyn.in_discards, &in_delivers, &out_reqs, &dyn.out_discards, &dyn.out_no_routes, &stat.reasm_timeout, &dyn.reasm_reqds, &dyn.reasm_oks, &dyn.reasm_fails, &dyn.frag_oks, &dyn.frag_fails, &dyn.frag_creates ); /* no routingDiscards */ dyn.in_recv = in_recv; dyn.in_hdr_errs = in_hdr_errs; dyn.fwd_dgrams = fwd_dgrams; dyn.in_delivers = in_delivers; dyn.out_reqs = out_reqs; if (dynamic_data) *(struct nsi_ip_ipstats_dynamic *)dynamic_data = dyn; if (static_data) *(struct nsi_ip_ipstats_static *)static_data = stat; status = STATUS_SUCCESS; break; } } fclose( fp ); return status; } #elif defined(HAVE_SYS_SYSCTL_H) && defined(IPCTL_STATS) && (defined(HAVE_STRUCT_IPSTAT_IPS_TOTAL) || defined(HAVE_STRUCT_IP_STATS_IPS_TOTAL)) { int mib[] = { CTL_NET, PF_INET, IPPROTO_IP, IPCTL_STATS }; #if defined(HAVE_STRUCT_IPSTAT_IPS_TOTAL) struct ipstat ip_stat; #elif defined(HAVE_STRUCT_IP_STATS_IPS_TOTAL) struct ip_stats ip_stat; #endif size_t needed; needed = sizeof(ip_stat); if (sysctl( mib, ARRAY_SIZE(mib), &ip_stat, &needed, NULL, 0 ) == -1) return STATUS_NOT_SUPPORTED; dyn.in_recv = ip_stat.ips_total; dyn.in_hdr_errs = ip_stat.ips_badhlen + ip_stat.ips_badsum + ip_stat.ips_tooshort + ip_stat.ips_badlen + ip_stat.ips_badvers + ip_stat.ips_badoptions; /* ips_badaddr also includes outgoing packets with a bad address, but we can't account for that right now */ dyn.in_addr_errs = ip_stat.ips_cantforward + ip_stat.ips_badaddr + ip_stat.ips_notmember; dyn.fwd_dgrams = ip_stat.ips_forward; dyn.in_unk_protos = ip_stat.ips_noproto; dyn.in_discards = ip_stat.ips_fragdropped; dyn.in_delivers = ip_stat.ips_delivered; dyn.out_reqs = ip_stat.ips_localout; dyn.out_discards = ip_stat.ips_odropped; dyn.out_no_routes = ip_stat.ips_noroute; stat.reasm_timeout = ip_stat.ips_fragtimeout; dyn.reasm_reqds = ip_stat.ips_fragments; dyn.reasm_oks = ip_stat.ips_reassembled; dyn.reasm_fails = ip_stat.ips_fragments - ip_stat.ips_reassembled; dyn.frag_oks = ip_stat.ips_fragmented; dyn.frag_fails = ip_stat.ips_cantfrag; dyn.frag_creates = ip_stat.ips_ofragments; if (dynamic_data) *(struct nsi_ip_ipstats_dynamic *)dynamic_data = dyn; if (static_data) *(struct nsi_ip_ipstats_static *)static_data = stat; return STATUS_SUCCESS; } #else FIXME( "not implemented\n" ); return STATUS_NOT_IMPLEMENTED; #endif } static NTSTATUS ipv6_ipstats_get_all_parameters( const void *key, DWORD key_size, void *rw_data, DWORD rw_size, void *dynamic_data, DWORD dynamic_size, void *static_data, DWORD static_size ) { struct nsi_ip_ipstats_dynamic dyn; struct nsi_ip_ipstats_static stat; memset( &dyn, 0, sizeof(dyn) ); memset( &stat, 0, sizeof(stat) ); #ifdef __linux__ { struct { const char *name; void *elem; int size; } ipstatlist[] = { #define X(x) &x, sizeof(x) { "Ip6InReceives", X( dyn.in_recv ) }, { "Ip6InHdrErrors", X( dyn.in_hdr_errs ) }, { "Ip6InAddrErrors", X( dyn.in_addr_errs ) }, { "Ip6OutForwDatagrams", X( dyn.fwd_dgrams ) }, { "Ip6InUnknownProtos", X( dyn.in_unk_protos ) }, { "Ip6InDiscards", X( dyn.in_discards ) }, { "Ip6InDelivers", X( dyn.in_delivers ) }, { "Ip6OutRequests", X( dyn.out_reqs ) }, { "Ip6OutDiscards", X( dyn.out_discards ) }, { "Ip6OutNoRoutes", X( dyn.out_no_routes ) }, { "Ip6ReasmTimeout", X( stat.reasm_timeout ) }, { "Ip6ReasmReqds", X( dyn.reasm_reqds ) }, { "Ip6ReasmOKs", X( dyn.reasm_oks ) }, { "Ip6ReasmFails", X( dyn.reasm_fails ) }, { "Ip6FragOKs", X( dyn.frag_oks ) }, { "Ip6FragFails", X( dyn.frag_fails ) }, { "Ip6FragCreates", X( dyn.frag_creates ) }, /* no routingDiscards */ #undef X }; NTSTATUS status = STATUS_NOT_SUPPORTED; char buf[512], *ptr, *value; DWORD i; FILE *fp; if (!(fp = fopen( "/proc/net/snmp6", "r" ))) return STATUS_NOT_SUPPORTED; while ((ptr = fgets( buf, sizeof(buf), fp ))) { if (!(value = strchr( buf, ' ' ))) continue; /* terminate the valuename */ *value++ = '\0'; /* and strip leading spaces from value */ while (*value == ' ') value++; if ((ptr = strchr( value, '\n' ))) *ptr = '\0'; for (i = 0; i < ARRAY_SIZE(ipstatlist); i++) if (!ascii_strcasecmp( buf, ipstatlist[i].name )) { if (ipstatlist[i].size == sizeof(long)) *(long *)ipstatlist[i].elem = strtoul( value, NULL, 10 ); else *(long long *)ipstatlist[i].elem = strtoull( value, NULL, 10 ); status = STATUS_SUCCESS; } } fclose( fp ); if (dynamic_data) *(struct nsi_ip_ipstats_dynamic *)dynamic_data = dyn; if (static_data) *(struct nsi_ip_ipstats_static *)static_data = stat; return status; } #else FIXME( "not implemented\n" ); return STATUS_NOT_IMPLEMENTED; #endif } static void unicast_fill_entry( struct ifaddrs *entry, void *key, struct nsi_ip_unicast_rw *rw, struct nsi_ip_unicast_dynamic *dyn, struct nsi_ip_unicast_static *stat ) { struct nsi_ipv6_unicast_key placeholder, *key6 = key; struct nsi_ipv4_unicast_key *key4 = key; DWORD scope_id = 0; if (!key) { key6 = &placeholder; key4 = (struct nsi_ipv4_unicast_key *)&placeholder; } convert_unix_name_to_luid( entry->ifa_name, &key6->luid ); if (entry->ifa_addr->sa_family == AF_INET) { memcpy( &key4->addr, &((struct sockaddr_in *)entry->ifa_addr)->sin_addr, sizeof(key4->addr) ); key4->pad = 0; } else if (entry->ifa_addr->sa_family == AF_INET6) { memcpy( &key6->addr, &((struct sockaddr_in6 *)entry->ifa_addr)->sin6_addr, sizeof(key6->addr) ); scope_id = ((struct sockaddr_in6 *)entry->ifa_addr)->sin6_scope_id; } if (rw) { rw->preferred_lifetime = 60000; rw->valid_lifetime = 60000; if (key6->luid.Info.IfType != IF_TYPE_SOFTWARE_LOOPBACK) { rw->prefix_origin = IpPrefixOriginDhcp; rw->suffix_origin = IpSuffixOriginDhcp; } else { rw->prefix_origin = IpPrefixOriginManual; rw->suffix_origin = IpSuffixOriginManual; } if (entry->ifa_netmask && entry->ifa_netmask->sa_family == AF_INET) rw->on_link_prefix = mask_v4_to_prefix( &((struct sockaddr_in *)entry->ifa_netmask)->sin_addr ); else if (entry->ifa_netmask && entry->ifa_netmask->sa_family == AF_INET6) rw->on_link_prefix = mask_v6_to_prefix( &((struct sockaddr_in6 *)entry->ifa_netmask)->sin6_addr ); else rw->on_link_prefix = 0; rw->unk[0] = 0; rw->unk[1] = 0; } if (dyn) { dyn->scope_id = scope_id; dyn->dad_state = IpDadStatePreferred; } if (stat) stat->creation_time = get_boot_time(); } static NTSTATUS ip_unicast_enumerate_all( int family, void *key_data, DWORD key_size, void *rw_data, DWORD rw_size, void *dynamic_data, DWORD dynamic_size, void *static_data, DWORD static_size, DWORD_PTR *count ) { DWORD num = 0; NTSTATUS status = STATUS_SUCCESS; BOOL want_data = key_size || rw_size || dynamic_size || static_size; struct ifaddrs *addrs, *entry; TRACE( "%p %d %p %d %p %d %p %d %p\n", key_data, key_size, rw_data, rw_size, dynamic_data, dynamic_size, static_data, static_size, count ); if (getifaddrs( &addrs )) return STATUS_NO_MORE_ENTRIES; for (entry = addrs; entry; entry = entry->ifa_next) { if (!entry->ifa_addr || entry->ifa_addr->sa_family != family) continue; if (num < *count) { unicast_fill_entry( entry, key_data, rw_data, dynamic_data, static_data ); key_data = (BYTE *)key_data + key_size; rw_data = (BYTE *)rw_data + rw_size; dynamic_data = (BYTE *)dynamic_data + dynamic_size; static_data = (BYTE *)static_data + static_size; } num++; } freeifaddrs( addrs ); if (!want_data || num <= *count) *count = num; else status = STATUS_BUFFER_OVERFLOW; return status; } static NTSTATUS ipv4_unicast_enumerate_all( void *key_data, DWORD key_size, void *rw_data, DWORD rw_size, void *dynamic_data, DWORD dynamic_size, void *static_data, DWORD static_size, DWORD_PTR *count ) { return ip_unicast_enumerate_all( AF_INET, key_data, key_size, rw_data, rw_size, dynamic_data, dynamic_size, static_data, static_size, count ); } static NTSTATUS ipv6_unicast_enumerate_all( void *key_data, DWORD key_size, void *rw_data, DWORD rw_size, void *dynamic_data, DWORD dynamic_size, void *static_data, DWORD static_size, DWORD_PTR *count ) { return ip_unicast_enumerate_all( AF_INET6, key_data, key_size, rw_data, rw_size, dynamic_data, dynamic_size, static_data, static_size, count ); } static NTSTATUS ip_unicast_get_all_parameters( const void *key, DWORD key_size, void *rw_data, DWORD rw_size, void *dynamic_data, DWORD dynamic_size, void *static_data, DWORD static_size ) { int family = (key_size == sizeof(struct nsi_ipv4_unicast_key)) ? AF_INET : AF_INET6; NTSTATUS status = STATUS_NOT_FOUND; const struct nsi_ipv6_unicast_key *key6 = key; const struct nsi_ipv4_unicast_key *key4 = key; struct ifaddrs *addrs, *entry; const char *unix_name; TRACE( "%p %d %p %d %p %d %p %d\n", key, key_size, rw_data, rw_size, dynamic_data, dynamic_size, static_data, static_size ); if (!convert_luid_to_unix_name( &key6->luid, &unix_name )) return STATUS_NOT_FOUND; if (getifaddrs( &addrs )) return STATUS_NO_MORE_ENTRIES; for (entry = addrs; entry; entry = entry->ifa_next) { if (!entry->ifa_addr || entry->ifa_addr->sa_family != family) continue; if (strcmp( entry->ifa_name, unix_name )) continue; if (family == AF_INET && memcmp( &key4->addr, &((struct sockaddr_in *)entry->ifa_addr)->sin_addr, sizeof(key4->addr) )) continue; if (family == AF_INET6 && memcmp( &key6->addr, &((struct sockaddr_in6 *)entry->ifa_addr)->sin6_addr, sizeof(key6->addr) )) continue; unicast_fill_entry( entry, NULL, rw_data, dynamic_data, static_data ); status = STATUS_SUCCESS; break; } freeifaddrs( addrs ); return status; } struct ipv4_neighbour_data { NET_LUID luid; DWORD if_index; struct in_addr addr; BYTE phys_addr[IF_MAX_PHYS_ADDRESS_LENGTH]; DWORD state; USHORT phys_addr_len; BOOL is_router; BOOL is_unreachable; }; static void ipv4_neighbour_fill_entry( struct ipv4_neighbour_data *entry, struct nsi_ipv4_neighbour_key *key, struct nsi_ip_neighbour_rw *rw, struct nsi_ip_neighbour_dynamic *dyn, void *stat ) { USHORT phys_addr_len = entry->phys_addr_len > sizeof(rw->phys_addr) ? 0 : entry->phys_addr_len; if (key) { key->luid = entry->luid; key->luid2 = entry->luid; key->addr.WS_s_addr = entry->addr.s_addr; key->pad = 0; } if (rw) { memcpy( rw->phys_addr, entry->phys_addr, phys_addr_len ); memset( rw->phys_addr + entry->phys_addr_len, 0, sizeof(rw->phys_addr) - phys_addr_len ); } if (dyn) { memset( dyn, 0, sizeof(*dyn) ); dyn->state = entry->state; dyn->flags.is_router = entry->is_router; dyn->flags.is_unreachable = entry->is_unreachable; dyn->phys_addr_len = phys_addr_len; } } static NTSTATUS ipv4_neighbour_enumerate_all( void *key_data, DWORD key_size, void *rw_data, DWORD rw_size, void *dynamic_data, DWORD dynamic_size, void *static_data, DWORD static_size, DWORD_PTR *count ) { DWORD num = 0; NTSTATUS status = STATUS_SUCCESS; BOOL want_data = key_size || rw_size || dynamic_size || static_size; struct ipv4_neighbour_data entry; TRACE( "%p %d %p %d %p %d %p %d %p\n", key_data, key_size, rw_data, rw_size, dynamic_data, dynamic_size, static_data, static_size, count ); #ifdef __linux__ { char buf[512], *ptr; DWORD atf_flags; FILE *fp; if (!(fp = fopen( "/proc/net/arp", "r" ))) return STATUS_NOT_SUPPORTED; /* skip header line */ ptr = fgets( buf, sizeof(buf), fp ); while ((ptr = fgets( buf, sizeof(buf), fp ))) { entry.addr.s_addr = inet_addr( ptr ); while (*ptr && !isspace( *ptr )) ptr++; strtoul( ptr + 1, &ptr, 16 ); /* hw type (skip) */ atf_flags = strtoul( ptr + 1, &ptr, 16 ); if (atf_flags & ATF_PERM) entry.state = NlnsPermanent; else if (atf_flags & ATF_COM) entry.state = NlnsReachable; else entry.state = NlnsStale; entry.is_router = 0; entry.is_unreachable = !(atf_flags & (ATF_PERM | ATF_COM)); while (*ptr && isspace( *ptr )) ptr++; entry.phys_addr_len = 0; while (*ptr && !isspace( *ptr )) { if (entry.phys_addr_len >= sizeof(entry.phys_addr)) { entry.phys_addr_len = 0; while (*ptr && !isspace( *ptr )) ptr++; break; } entry.phys_addr[entry.phys_addr_len++] = strtoul( ptr, &ptr, 16 ); if (*ptr) ptr++; } while (*ptr && isspace( *ptr )) ptr++; while (*ptr && !isspace( *ptr )) ptr++; /* mask (skip) */ while (*ptr && isspace( *ptr )) ptr++; if (!convert_unix_name_to_luid( ptr, &entry.luid )) continue; if (!convert_luid_to_index( &entry.luid, &entry.if_index )) continue; if (num < *count) { ipv4_neighbour_fill_entry( &entry, key_data, rw_data, dynamic_data, static_data ); if (key_data) key_data = (BYTE *)key_data + key_size; if (rw_data) rw_data = (BYTE *)rw_data + rw_size; if (dynamic_data) dynamic_data = (BYTE *)dynamic_data + dynamic_size; if (static_data) static_data = (BYTE *)static_data + static_size; } num++; } fclose( fp ); } #elif defined(HAVE_SYS_SYSCTL_H) { int mib[] = { CTL_NET, PF_ROUTE, 0, AF_INET, NET_RT_FLAGS, RTF_LLINFO }, sinarp_len; size_t needed; char *buf = NULL, *lim, *next; struct rt_msghdr *rtm; struct sockaddr_inarp *sinarp; struct sockaddr_dl *sdl; if (sysctl( mib, ARRAY_SIZE(mib), NULL, &needed, NULL, 0 ) == -1) return STATUS_NOT_SUPPORTED; buf = malloc( needed ); if (!buf) return STATUS_NO_MEMORY; if (sysctl( mib, ARRAY_SIZE(mib), buf, &needed, NULL, 0 ) == -1) { free( buf ); return STATUS_NOT_SUPPORTED; } lim = buf + needed; next = buf; while (next < lim) { rtm = (struct rt_msghdr *)next; sinarp = (struct sockaddr_inarp *)(rtm + 1); if (sinarp->sin_len) sinarp_len = (sinarp->sin_len + sizeof(int)-1) & ~(sizeof(int)-1); else sinarp_len = sizeof(int); sdl = (struct sockaddr_dl *)((char *)sinarp + sinarp_len); if (sdl->sdl_alen) /* arp entry */ { entry.addr = sinarp->sin_addr; entry.if_index = sdl->sdl_index; if (!convert_index_to_luid( entry.if_index, &entry.luid )) break; entry.phys_addr_len = min( 8, sdl->sdl_alen ); if (entry.phys_addr_len > sizeof(entry.phys_addr)) entry.phys_addr_len = 0; memcpy( entry.phys_addr, &sdl->sdl_data[sdl->sdl_nlen], entry.phys_addr_len ); if (rtm->rtm_rmx.rmx_expire == 0) entry.state = NlnsPermanent; else entry.state = NlnsReachable; #ifdef SIN_ROUTER entry.is_router = sinarp->sin_other & SIN_ROUTER; #else entry.is_router = 0; #endif entry.is_unreachable = 0; /* FIXME */ if (num < *count) { ipv4_neighbour_fill_entry( &entry, key_data, rw_data, dynamic_data, static_data ); if (key_data) key_data = (BYTE *)key_data + key_size; if (rw_data) rw_data = (BYTE *)rw_data + rw_size; if (dynamic_data) dynamic_data = (BYTE *)dynamic_data + dynamic_size; if (static_data) static_data = (BYTE *)static_data + static_size; } num++; } next += rtm->rtm_msglen; } free( buf ); } #else FIXME( "not implemented\n" ); return STATUS_NOT_IMPLEMENTED; #endif if (!want_data || num <= *count) *count = num; else status = STATUS_BUFFER_OVERFLOW; return status; } static NTSTATUS ipv6_neighbour_enumerate_all( void *key_data, DWORD key_size, void *rw_data, DWORD rw_size, void *dynamic_data, DWORD dynamic_size, void *static_data, DWORD static_size, DWORD_PTR *count ) { FIXME( "not implemented\n" ); return STATUS_NOT_IMPLEMENTED; } struct ipv4_route_data { NET_LUID luid; DWORD if_index; struct in_addr prefix; DWORD prefix_len; struct in_addr next_hop; DWORD metric; DWORD protocol; BYTE loopback; }; static void ipv4_forward_fill_entry( struct ipv4_route_data *entry, struct nsi_ipv4_forward_key *key, struct nsi_ip_forward_rw *rw, struct nsi_ipv4_forward_dynamic *dyn, struct nsi_ip_forward_static *stat ) { if (key) { key->unk = 0; key->prefix.WS_s_addr = entry->prefix.s_addr; key->prefix_len = entry->prefix_len; memset( key->unk2, 0, sizeof(key->unk2) ); memset( key->unk3, 0, sizeof(key->unk3) ); key->luid = entry->luid; key->luid2 = entry->luid; key->next_hop.WS_s_addr = entry->next_hop.s_addr; key->pad = 0; } if (rw) { rw->site_prefix_len = 0; rw->valid_lifetime = ~0u; rw->preferred_lifetime = ~0u; rw->metric = entry->metric; rw->protocol = entry->protocol; rw->loopback = entry->loopback; rw->autoconf = 1; rw->publish = 0; rw->immortal = 1; memset( rw->unk, 0, sizeof(rw->unk) ); rw->unk2 = 0; } if (dyn) { memset( dyn, 0, sizeof(*dyn) ); } if (stat) { stat->origin = NlroManual; stat->if_index = entry->if_index; } } static NTSTATUS ipv4_forward_enumerate_all( void *key_data, DWORD key_size, void *rw_data, DWORD rw_size, void *dynamic_data, DWORD dynamic_size, void *static_data, DWORD static_size, DWORD_PTR *count ) { DWORD num = 0; NTSTATUS status = STATUS_SUCCESS; BOOL want_data = key_size || rw_size || dynamic_size || static_size; struct ipv4_route_data entry; TRACE( "%p %d %p %d %p %d %p %d %p\n", key_data, key_size, rw_data, rw_size, dynamic_data, dynamic_size, static_data, static_size, count ); #ifdef __linux__ { char buf[512], *ptr; struct in_addr mask; DWORD rtf_flags; FILE *fp; if (!(fp = fopen( "/proc/net/route", "r" ))) return STATUS_NOT_SUPPORTED; /* skip header line */ fgets( buf, sizeof(buf), fp ); while ((ptr = fgets( buf, sizeof(buf), fp ))) { while (!isspace( *ptr )) ptr++; *ptr++ = '\0'; if (!convert_unix_name_to_luid( buf, &entry.luid )) continue; if (!convert_luid_to_index( &entry.luid, &entry.if_index )) continue; entry.prefix.s_addr = strtoul( ptr, &ptr, 16 ); entry.next_hop.s_addr = strtoul( ptr + 1, &ptr, 16 ); rtf_flags = strtoul( ptr + 1, &ptr, 16 ); strtoul( ptr + 1, &ptr, 16 ); /* refcount, skip */ strtoul( ptr + 1, &ptr, 16 ); /* use, skip */ entry.metric = strtoul( ptr + 1, &ptr, 16 ); mask.s_addr = strtoul( ptr + 1, &ptr, 16 ); entry.prefix_len = mask_v4_to_prefix( &mask ); entry.protocol = (rtf_flags & RTF_GATEWAY) ? MIB_IPPROTO_NETMGMT : MIB_IPPROTO_LOCAL; entry.loopback = entry.protocol == MIB_IPPROTO_LOCAL && entry.prefix_len == 32; if (num < *count) { ipv4_forward_fill_entry( &entry, key_data, rw_data, dynamic_data, static_data ); key_data = (BYTE *)key_data + key_size; rw_data = (BYTE *)rw_data + rw_size; dynamic_data = (BYTE *)dynamic_data + dynamic_size; static_data = (BYTE *)static_data + static_size; } num++; } fclose( fp ); } #elif defined(HAVE_SYS_SYSCTL_H) && defined(NET_RT_DUMP) { int mib[6] = { CTL_NET, PF_ROUTE, 0, PF_INET, NET_RT_DUMP, 0 }; size_t needed; char *buf = NULL, *lim, *next, *addr_ptr; struct rt_msghdr *rtm; if (sysctl( mib, ARRAY_SIZE(mib), NULL, &needed, NULL, 0 ) < 0) return STATUS_NOT_SUPPORTED; buf = malloc( needed ); if (!buf) return STATUS_NO_MEMORY; if (sysctl( mib, 6, buf, &needed, NULL, 0 ) < 0) { free( buf ); return STATUS_NOT_SUPPORTED; } lim = buf + needed; for (next = buf; next < lim; next += rtm->rtm_msglen) { int i; sa_family_t dst_family = AF_UNSPEC; rtm = (struct rt_msghdr *)next; if (rtm->rtm_type != RTM_GET) { WARN( "Got unexpected message type 0x%x!\n", rtm->rtm_type ); continue; } /* Ignore gateway routes which are multicast */ if ((rtm->rtm_flags & RTF_GATEWAY) && (rtm->rtm_flags & RTF_MULTICAST)) continue; entry.if_index = rtm->rtm_index; if (!convert_index_to_luid( entry.if_index, &entry.luid )) continue; entry.protocol = (rtm->rtm_flags & RTF_GATEWAY) ? MIB_IPPROTO_NETMGMT : MIB_IPPROTO_LOCAL; entry.metric = rtm->rtm_rmx.rmx_hopcount; addr_ptr = (char *)(rtm + 1); for (i = 1; i; i <<= 1) { struct sockaddr *sa; struct in_addr addr; if (!(i & rtm->rtm_addrs)) continue; sa = (struct sockaddr *)addr_ptr; if (addr_ptr + sa->sa_len > next + rtm->rtm_msglen) { ERR( "struct sockaddr extends beyond the route message, %p > %p\n", addr_ptr + sa->sa_len, next + rtm->rtm_msglen ); } if (sa->sa_len) addr_ptr += (sa->sa_len + sizeof(int)-1) & ~(sizeof(int)-1); else addr_ptr += sizeof(int); /* Apple's netstat prints the netmask together with the destination * and only looks at the destination's address family. The netmask's * sa_family sometimes contains the non-existent value 0xff. */ switch (i == RTA_NETMASK ? dst_family : sa->sa_family) { case AF_INET: { /* Netmasks (and possibly other addresses) have only enough size * to represent the non-zero bits, e.g. a netmask of 255.0.0.0 has * 5 bytes (1 sa_len, 1 sa_family, 2 sa_port and 1 for the first * byte of sin_addr). */ struct sockaddr_in sin = {0}; memcpy( &sin, sa, sa->sa_len ); addr = sin.sin_addr; break; } #ifdef AF_LINK case AF_LINK: if (i == RTA_GATEWAY && entry.protocol == MIB_IPPROTO_NETMGMT) { /* For direct route we may simply use dest addr as next hop */ C_ASSERT(RTA_DST < RTA_GATEWAY); addr = entry.prefix; break; } /* fallthrough */ #endif default: WARN( "Received unsupported sockaddr family 0x%x\n", sa->sa_family ); addr.s_addr = 0; } switch (i) { case RTA_DST: entry.prefix = addr; dst_family = sa->sa_family; break; case RTA_GATEWAY: entry.next_hop = addr; break; case RTA_NETMASK: entry.prefix_len = mask_v4_to_prefix( &addr ); break; default: WARN( "Unexpected address type 0x%x\n", i ); } } if (num < *count) { ipv4_forward_fill_entry( &entry, key_data, rw_data, dynamic_data, static_data ); key_data = (BYTE *)key_data + key_size; rw_data = (BYTE *)rw_data + rw_size; dynamic_data = (BYTE *)dynamic_data + dynamic_size; static_data = (BYTE *)static_data + static_size; } num++; } free( buf ); } #else FIXME( "not implemented\n" ); return STATUS_NOT_IMPLEMENTED; #endif if (!want_data || num <= *count) *count = num; else status = STATUS_BUFFER_OVERFLOW; return status; } static NTSTATUS ipv6_forward_enumerate_all( void *key_data, DWORD key_size, void *rw_data, DWORD rw_size, void *dynamic_data, DWORD dynamic_size, void *static_data, DWORD static_size, DWORD_PTR *count ) { FIXME( "not implemented\n" ); *count = 0; return STATUS_SUCCESS; } static struct module_table ipv4_tables[] = { { NSI_IP_COMPARTMENT_TABLE, { sizeof(DWORD), sizeof(struct nsi_ip_cmpt_rw), sizeof(struct nsi_ip_cmpt_dynamic), 0 }, NULL, ipv4_cmpt_get_all_parameters, }, { NSI_IP_ICMPSTATS_TABLE, { 0, 0, sizeof(struct nsi_ip_icmpstats_dynamic), 0 }, NULL, ipv4_icmpstats_get_all_parameters, }, { NSI_IP_IPSTATS_TABLE, { 0, 0, sizeof(struct nsi_ip_ipstats_dynamic), sizeof(struct nsi_ip_ipstats_static) }, NULL, ipv4_ipstats_get_all_parameters, }, { NSI_IP_UNICAST_TABLE, { sizeof(struct nsi_ipv4_unicast_key), sizeof(struct nsi_ip_unicast_rw), sizeof(struct nsi_ip_unicast_dynamic), sizeof(struct nsi_ip_unicast_static) }, ipv4_unicast_enumerate_all, ip_unicast_get_all_parameters, }, { NSI_IP_NEIGHBOUR_TABLE, { sizeof(struct nsi_ipv4_neighbour_key), sizeof(struct nsi_ip_neighbour_rw), sizeof(struct nsi_ip_neighbour_dynamic), 0 }, ipv4_neighbour_enumerate_all, }, { NSI_IP_FORWARD_TABLE, { sizeof(struct nsi_ipv4_forward_key), sizeof(struct nsi_ip_forward_rw), sizeof(struct nsi_ipv4_forward_dynamic), sizeof(struct nsi_ip_forward_static) }, ipv4_forward_enumerate_all, }, { ~0u } }; const struct module ipv4_module = { &NPI_MS_IPV4_MODULEID, ipv4_tables }; static struct module_table ipv6_tables[] = { { NSI_IP_COMPARTMENT_TABLE, { sizeof(DWORD), sizeof(struct nsi_ip_cmpt_rw), sizeof(struct nsi_ip_cmpt_dynamic), 0 }, NULL, ipv6_cmpt_get_all_parameters, }, { NSI_IP_ICMPSTATS_TABLE, { 0, 0, sizeof(struct nsi_ip_icmpstats_dynamic), 0 }, NULL, ipv6_icmpstats_get_all_parameters, }, { NSI_IP_IPSTATS_TABLE, { 0, 0, sizeof(struct nsi_ip_ipstats_dynamic), sizeof(struct nsi_ip_ipstats_static) }, NULL, ipv6_ipstats_get_all_parameters, }, { NSI_IP_UNICAST_TABLE, { sizeof(struct nsi_ipv6_unicast_key), sizeof(struct nsi_ip_unicast_rw), sizeof(struct nsi_ip_unicast_dynamic), sizeof(struct nsi_ip_unicast_static) }, ipv6_unicast_enumerate_all, ip_unicast_get_all_parameters, }, { NSI_IP_NEIGHBOUR_TABLE, { sizeof(struct nsi_ipv6_neighbour_key), sizeof(struct nsi_ip_neighbour_rw), sizeof(struct nsi_ip_neighbour_dynamic), 0 }, ipv6_neighbour_enumerate_all, }, { NSI_IP_FORWARD_TABLE, { sizeof(struct nsi_ipv6_forward_key), sizeof(struct nsi_ip_forward_rw), sizeof(struct nsi_ipv6_forward_dynamic), sizeof(struct nsi_ip_forward_static) }, ipv6_forward_enumerate_all, }, { ~0u } }; const struct module ipv6_module = { &NPI_MS_IPV6_MODULEID, ipv6_tables };