Sweden-Number/dlls/nsiproxy.sys/tcp.c

822 lines
27 KiB
C

/*
* nsiproxy.sys tcp module
*
* Copyright 2003, 2006, 2011 Juan Lang
* Copyright 2007 TransGaming Technologies Inc.
* Copyright 2021 Huw Davies
*
* This library is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public
* License as published by the Free Software Foundation; either
* version 2.1 of the License, or (at your option) any later version.
*
* This library is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public
* License along with this library; if not, write to the Free Software
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
*/
#if 0
#pragma makedep unix
#endif
#include "config.h"
#include <stdarg.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <dirent.h>
#include <unistd.h>
#ifdef HAVE_SYS_PARAM_H
#include <sys/param.h>
#endif
#ifdef HAVE_SYS_SOCKETVAR_H
#include <sys/socketvar.h>
#endif
#ifdef HAVE_NETINET_IN_H
#include <netinet/in.h>
#endif
#ifdef HAVE_NETINET_IN_PCB_H
#include <netinet/in_pcb.h>
#endif
#ifdef HAVE_NETINET_IP_VAR_H
#include <netinet/ip_var.h>
#endif
#ifdef HAVE_SYS_QUEUE_H
#include <sys/queue.h>
#endif
#ifdef HAVE_NETINET_TCP_VAR_H
#include <netinet/tcp_var.h>
#endif
#ifdef HAVE_NETINET_TCP_FSM_H
#include <netinet/tcp_fsm.h>
#endif
#ifdef HAVE_SYS_SYSCTL_H
#include <sys/sysctl.h>
#endif
#ifdef HAVE_IFADDRS_H
#include <ifaddrs.h>
#endif
#ifdef HAVE_LIBPROCSTAT_H
#include <libprocstat.h>
#endif
#ifdef HAVE_LIBPROC_H
#include <libproc.h>
#endif
#include "ntstatus.h"
#define WIN32_NO_STATUS
#include "windef.h"
#include "winbase.h"
#include "winternl.h"
#define USE_WS_PREFIX
#include "winsock2.h"
#include "ifdef.h"
#include "netiodef.h"
#include "ws2ipdef.h"
#include "tcpmib.h"
#include "wine/nsi.h"
#include "wine/debug.h"
#include "wine/server.h"
#include "unix_private.h"
#ifndef HAVE_NETINET_TCP_FSM_H
#define TCPS_ESTABLISHED 1
#define TCPS_SYN_SENT 2
#define TCPS_SYN_RECEIVED 3
#define TCPS_FIN_WAIT_1 4
#define TCPS_FIN_WAIT_2 5
#define TCPS_TIME_WAIT 6
#define TCPS_CLOSED 7
#define TCPS_CLOSE_WAIT 8
#define TCPS_LAST_ACK 9
#define TCPS_LISTEN 10
#define TCPS_CLOSING 11
#endif
WINE_DEFAULT_DEBUG_CHANNEL(nsi);
static NTSTATUS tcp_stats_get_all_parameters( const void *key, DWORD key_size, void *rw_data, DWORD rw_size,
void *dynamic_data, DWORD dynamic_size, void *static_data, DWORD static_size )
{
struct nsi_tcp_stats_dynamic dyn;
struct nsi_tcp_stats_static stat;
const USHORT *family = key;
TRACE( "%p %d %p %d %p %d %p %d\n", key, key_size, rw_data, rw_size, dynamic_data, dynamic_size,
static_data, static_size );
if (*family != WS_AF_INET && *family != WS_AF_INET6) return STATUS_NOT_SUPPORTED;
memset( &dyn, 0, sizeof(dyn) );
memset( &stat, 0, sizeof(stat) );
#ifdef __linux__
{
NTSTATUS status = STATUS_NOT_SUPPORTED;
static const char hdr[] = "Tcp:";
char buf[512], *ptr;
FILE *fp;
/* linux merges tcp4 and tcp6 stats, so simply supply that for either family */
if (!(fp = fopen( "/proc/net/snmp", "r" ))) return STATUS_NOT_SUPPORTED;
while ((ptr = fgets( buf, sizeof(buf), fp )))
{
if (ascii_strncasecmp( buf, hdr, sizeof(hdr) - 1 )) continue;
/* last line was a header, get another */
if (!(ptr = fgets( buf, sizeof(buf), fp ))) break;
if (!ascii_strncasecmp( buf, hdr, sizeof(hdr) - 1 ))
{
DWORD in_segs, out_segs;
ptr += sizeof(hdr);
sscanf( ptr, "%u %u %u %u %u %u %u %u %u %u %u %u %u %u",
&stat.rto_algo,
&stat.rto_min,
&stat.rto_max,
&stat.max_conns,
&dyn.active_opens,
&dyn.passive_opens,
&dyn.attempt_fails,
&dyn.est_rsts,
&dyn.cur_est,
&in_segs,
&out_segs,
&dyn.retrans_segs,
&dyn.in_errs,
&dyn.out_rsts );
dyn.in_segs = in_segs;
dyn.out_segs = out_segs;
if (dynamic_data) *(struct nsi_tcp_stats_dynamic *)dynamic_data = dyn;
if (static_data) *(struct nsi_tcp_stats_static *)static_data = stat;
status = STATUS_SUCCESS;
break;
}
}
fclose( fp );
return status;
}
#elif defined(HAVE_SYS_SYSCTL_H) && defined(TCPCTL_STATS) && (defined(HAVE_STRUCT_TCPSTAT_TCPS_CONNATTEMPT) || defined(HAVE_STRUCT_TCP_STATS_TCPS_CONNATTEMPT))
{
#ifndef TCPTV_MIN /* got removed in Mac OS X for some reason */
#define TCPTV_MIN 2
#define TCPTV_REXMTMAX 128
#endif
int mib[] = { CTL_NET, PF_INET, IPPROTO_TCP, TCPCTL_STATS };
#define hz 1000
#if defined(HAVE_STRUCT_TCPSTAT_TCPS_CONNATTEMPT)
struct tcpstat tcp_stat;
#elif defined(HAVE_STRUCT_TCP_STATS_TCPS_CONNATTEMPT)
struct tcp_stats tcp_stat;
#endif
size_t needed = sizeof(tcp_stat);
if (sysctl( mib, ARRAY_SIZE(mib), &tcp_stat, &needed, NULL, 0 ) == -1) return STATUS_NOT_SUPPORTED;
stat.rto_algo = MIB_TCP_RTO_VANJ;
stat.rto_min = TCPTV_MIN;
stat.rto_max = TCPTV_REXMTMAX;
stat.max_conns = -1;
dyn.active_opens = tcp_stat.tcps_connattempt;
dyn.passive_opens = tcp_stat.tcps_accepts;
dyn.attempt_fails = tcp_stat.tcps_conndrops;
dyn.est_rsts = tcp_stat.tcps_drops;
dyn.cur_est = 0;
dyn.pad = 0;
dyn.in_segs = tcp_stat.tcps_rcvtotal;
dyn.out_segs = tcp_stat.tcps_sndtotal - tcp_stat.tcps_sndrexmitpack;
dyn.retrans_segs = tcp_stat.tcps_sndrexmitpack;
dyn.out_rsts = tcp_stat.tcps_sndctrl - tcp_stat.tcps_closed;
dyn.in_errs = tcp_stat.tcps_rcvbadsum + tcp_stat.tcps_rcvbadoff + tcp_stat.tcps_rcvmemdrop + tcp_stat.tcps_rcvshort;
dyn.num_conns = tcp_stat.tcps_connects;
if (dynamic_data) *(struct nsi_tcp_stats_dynamic *)dynamic_data = dyn;
if (static_data) *(struct nsi_tcp_stats_static *)static_data = stat;
return STATUS_SUCCESS;
}
#else
FIXME( "not implemented\n" );
return STATUS_NOT_IMPLEMENTED;
#endif
}
static inline MIB_TCP_STATE tcp_state_to_mib_state( int state )
{
switch (state)
{
case TCPS_ESTABLISHED: return MIB_TCP_STATE_ESTAB;
case TCPS_SYN_SENT: return MIB_TCP_STATE_SYN_SENT;
case TCPS_SYN_RECEIVED: return MIB_TCP_STATE_SYN_RCVD;
case TCPS_FIN_WAIT_1: return MIB_TCP_STATE_FIN_WAIT1;
case TCPS_FIN_WAIT_2: return MIB_TCP_STATE_FIN_WAIT2;
case TCPS_TIME_WAIT: return MIB_TCP_STATE_TIME_WAIT;
case TCPS_CLOSE_WAIT: return MIB_TCP_STATE_CLOSE_WAIT;
case TCPS_LAST_ACK: return MIB_TCP_STATE_LAST_ACK;
case TCPS_LISTEN: return MIB_TCP_STATE_LISTEN;
case TCPS_CLOSING: return MIB_TCP_STATE_CLOSING;
default:
case TCPS_CLOSED: return MIB_TCP_STATE_CLOSED;
}
}
struct ipv6_addr_scope *get_ipv6_addr_scope_table( unsigned int *size )
{
struct ipv6_addr_scope *table = NULL, *new_table;
unsigned int table_size = 0, num = 0;
#ifdef __linux__
{
char buf[512], *ptr;
FILE *fp;
if (!(fp = fopen( "/proc/net/if_inet6", "r" ))) goto failed;
while ((ptr = fgets( buf, sizeof(buf), fp )))
{
WORD a[8];
DWORD scope;
struct ipv6_addr_scope *entry;
unsigned int i;
if (sscanf( ptr, "%4hx%4hx%4hx%4hx%4hx%4hx%4hx%4hx %*s %*s %x",
a, a + 1, a + 2, a + 3, a + 4, a + 5, a + 6, a + 7, &scope ) != 9)
continue;
if (++num > table_size)
{
if (!table_size) table_size = 4;
else table_size *= 2;
if (!(new_table = realloc( table, table_size * sizeof(table[0]) )))
{
fclose( fp );
goto failed;
}
table = new_table;
}
entry = table + num - 1;
for (i = 0; i < 8; i++)
entry->addr.u.Word[i] = htons( a[i] );
entry->scope = htons( scope );
}
fclose( fp );
}
#elif defined(HAVE_GETIFADDRS)
{
struct ifaddrs *addrs, *cur;
if (getifaddrs( &addrs ) == -1) goto failed;
for (cur = addrs; cur; cur = cur->ifa_next)
{
struct sockaddr_in6 *sin6;
struct ipv6_addr_scope *entry;
if (cur->ifa_addr->sa_family != AF_INET6) continue;
if (++num > table_size)
{
if (!table_size) table_size = 4;
else table_size *= 2;
if (!(new_table = realloc( table, table_size * sizeof(table[0]) )))
{
freeifaddrs( addrs );
goto failed;
}
table = new_table;
}
sin6 = (struct sockaddr_in6 *)cur->ifa_addr;
entry = table + num - 1;
memcpy( &entry->addr, &sin6->sin6_addr, sizeof(entry->addr) );
entry->scope = sin6->sin6_scope_id;
}
freeifaddrs( addrs );
}
#else
FIXME( "not implemented\n" );
goto failed;
#endif
*size = num;
return table;
failed:
free( table );
return NULL;
}
DWORD find_ipv6_addr_scope( const IN6_ADDR *addr, const struct ipv6_addr_scope *table, unsigned int size )
{
const BYTE multicast_scope_mask = 0x0F;
const BYTE multicast_scope_shift = 0;
unsigned int i;
if (WS_IN6_IS_ADDR_UNSPECIFIED( addr )) return 0;
if (WS_IN6_IS_ADDR_MULTICAST( addr ))
return htons( (addr->u.Byte[1] & multicast_scope_mask) >> multicast_scope_shift );
if (!table) return -1;
for (i = 0; i < size; i++)
if (!memcmp( &table[i].addr, addr, sizeof(table[i].addr) ))
return table[i].scope;
return -1;
}
struct pid_map *get_pid_map( unsigned int *num_entries )
{
struct pid_map *map;
unsigned int i = 0, buffer_len = 4096, process_count, pos = 0;
NTSTATUS ret;
char *buffer = NULL, *new_buffer;
if (!(buffer = malloc( buffer_len ))) return NULL;
for (;;)
{
SERVER_START_REQ( list_processes )
{
wine_server_set_reply( req, buffer, buffer_len );
ret = wine_server_call( req );
buffer_len = reply->info_size;
process_count = reply->process_count;
}
SERVER_END_REQ;
if (ret != STATUS_INFO_LENGTH_MISMATCH) break;
if (!(new_buffer = realloc( buffer, buffer_len )))
{
free( buffer );
return NULL;
}
buffer = new_buffer;
}
if (!(map = malloc( process_count * sizeof(*map) )))
{
free( buffer );
return NULL;
}
for (i = 0; i < process_count; ++i)
{
const struct process_info *process;
pos = (pos + 7) & ~7;
process = (const struct process_info *)(buffer + pos);
map[i].pid = process->pid;
map[i].unix_pid = process->unix_pid;
pos += sizeof(struct process_info) + process->name_len;
pos = (pos + 7) & ~7;
pos += process->thread_count * sizeof(struct thread_info);
}
free( buffer );
*num_entries = process_count;
return map;
}
unsigned int find_owning_pid( struct pid_map *map, unsigned int num_entries, UINT_PTR inode )
{
#ifdef __linux__
unsigned int i, len_socket;
char socket[32];
sprintf( socket, "socket:[%lu]", inode );
len_socket = strlen( socket );
for (i = 0; i < num_entries; i++)
{
char dir[32];
struct dirent *dirent;
DIR *dirfd;
sprintf( dir, "/proc/%u/fd", map[i].unix_pid );
if ((dirfd = opendir( dir )))
{
while ((dirent = readdir( dirfd )))
{
char link[sizeof(dirent->d_name) + 32], name[32];
int len;
sprintf( link, "/proc/%u/fd/%s", map[i].unix_pid, dirent->d_name );
if ((len = readlink( link, name, sizeof(name) - 1 )) > 0) name[len] = 0;
if (len == len_socket && !strcmp( socket, name ))
{
closedir( dirfd );
return map[i].pid;
}
}
closedir( dirfd );
}
}
return 0;
#elif defined(HAVE_LIBPROCSTAT)
struct procstat *pstat;
struct kinfo_proc *proc;
struct filestat_list *fds;
struct filestat *fd;
struct sockstat sock;
unsigned int i, proc_count;
pstat = procstat_open_sysctl();
if (!pstat) return 0;
for (i = 0; i < num_entries; i++)
{
proc = procstat_getprocs( pstat, KERN_PROC_PID, map[i].unix_pid, &proc_count );
if (!proc || proc_count < 1) continue;
fds = procstat_getfiles( pstat, proc, 0 );
if (!fds)
{
procstat_freeprocs( pstat, proc );
continue;
}
STAILQ_FOREACH( fd, fds, next )
{
char errbuf[_POSIX2_LINE_MAX];
if (fd->fs_type != PS_FST_TYPE_SOCKET) continue;
procstat_get_socket_info( pstat, fd, &sock, errbuf );
if (sock.so_pcb == inode)
{
procstat_freefiles( pstat, fds );
procstat_freeprocs( pstat, proc );
procstat_close( pstat );
return map[i].pid;
}
}
procstat_freefiles( pstat, fds );
procstat_freeprocs( pstat, proc );
}
procstat_close( pstat );
return 0;
#elif defined(HAVE_PROC_PIDINFO)
struct proc_fdinfo *fds;
struct socket_fdinfo sock;
unsigned int i, j, n;
for (i = 0; i < num_entries; i++)
{
int fd_len = proc_pidinfo( map[i].unix_pid, PROC_PIDLISTFDS, 0, NULL, 0 );
if (fd_len <= 0) continue;
fds = malloc( fd_len );
if (!fds) continue;
proc_pidinfo( map[i].unix_pid, PROC_PIDLISTFDS, 0, fds, fd_len );
n = fd_len / sizeof(struct proc_fdinfo);
for (j = 0; j < n; j++)
{
if (fds[j].proc_fdtype != PROX_FDTYPE_SOCKET) continue;
proc_pidfdinfo( map[i].unix_pid, fds[j].proc_fd, PROC_PIDFDSOCKETINFO, &sock, sizeof(sock) );
if (sock.psi.soi_pcb == inode)
{
free( fds );
return map[i].pid;
}
}
free( fds );
}
return 0;
#else
FIXME( "not implemented\n" );
return 0;
#endif
}
static NTSTATUS tcp_conns_enumerate_all( DWORD filter, struct nsi_tcp_conn_key *key_data, DWORD key_size,
void *rw, DWORD rw_size,
struct nsi_tcp_conn_dynamic *dynamic_data, DWORD dynamic_size,
struct nsi_tcp_conn_static *static_data, DWORD static_size, DWORD_PTR *count )
{
DWORD num = 0;
NTSTATUS status = STATUS_SUCCESS;
BOOL want_data = key_size || rw_size || dynamic_size || static_size;
struct nsi_tcp_conn_key key;
struct nsi_tcp_conn_dynamic dyn;
struct nsi_tcp_conn_static stat;
struct ipv6_addr_scope *addr_scopes = NULL;
unsigned int addr_scopes_size = 0, pid_map_size = 0;
struct pid_map *pid_map = NULL;
#ifdef __linux__
{
FILE *fp;
char buf[512], *ptr;
int inode;
if (!(fp = fopen( "/proc/net/tcp", "r" ))) return ERROR_NOT_SUPPORTED;
memset( &key, 0, sizeof(key) );
memset( &dyn, 0, sizeof(dyn) );
memset( &stat, 0, sizeof(stat) );
if (static_data) pid_map = get_pid_map( &pid_map_size );
/* skip header line */
ptr = fgets( buf, sizeof(buf), fp );
while ((ptr = fgets( buf, sizeof(buf), fp )))
{
if (sscanf( ptr, "%*x: %x:%hx %x:%hx %x %*s %*s %*s %*s %*s %d",
&key.local.Ipv4.sin_addr.WS_s_addr, &key.local.Ipv4.sin_port,
&key.remote.Ipv4.sin_addr.WS_s_addr, &key.remote.Ipv4.sin_port,
&dyn.state, &inode ) != 6)
continue;
dyn.state = tcp_state_to_mib_state( dyn.state );
if (filter && filter != dyn.state ) continue;
key.local.Ipv4.sin_family = key.remote.Ipv4.sin_family = WS_AF_INET;
key.local.Ipv4.sin_port = htons( key.local.Ipv4.sin_port );
key.remote.Ipv4.sin_port = htons( key.remote.Ipv4.sin_port );
if (num < *count)
{
if (key_data) *key_data++ = key;
if (dynamic_data) *dynamic_data++ = dyn;
if (static_data)
{
stat.pid = find_owning_pid( pid_map, pid_map_size, inode );
stat.create_time = 0; /* FIXME */
stat.mod_info = 0; /* FIXME */
*static_data++ = stat;
}
}
num++;
}
fclose( fp );
if ((fp = fopen( "/proc/net/tcp6", "r" )))
{
memset( &key, 0, sizeof(key) );
memset( &dyn, 0, sizeof(dyn) );
memset( &stat, 0, sizeof(stat) );
addr_scopes = get_ipv6_addr_scope_table( &addr_scopes_size );
/* skip header line */
ptr = fgets( buf, sizeof(buf), fp );
while ((ptr = fgets( buf, sizeof(buf), fp )))
{
DWORD *local_addr = (DWORD *)&key.local.Ipv6.sin6_addr;
DWORD *remote_addr = (DWORD *)&key.remote.Ipv6.sin6_addr;
if (sscanf( ptr, "%*u: %8x%8x%8x%8x:%hx %8x%8x%8x%8x:%hx %x %*s %*s %*s %*s %*s %*s %*s %d",
local_addr, local_addr + 1, local_addr + 2, local_addr + 3, &key.local.Ipv6.sin6_port,
remote_addr, remote_addr + 1, remote_addr + 2, remote_addr + 3, &key.remote.Ipv6.sin6_port,
&dyn.state, &inode ) != 12)
continue;
dyn.state = tcp_state_to_mib_state( dyn.state );
if (filter && filter != dyn.state ) continue;
key.local.Ipv6.sin6_family = key.remote.Ipv6.sin6_family = WS_AF_INET6;
key.local.Ipv6.sin6_port = htons( key.local.Ipv6.sin6_port );
key.remote.Ipv6.sin6_port = htons( key.remote.Ipv6.sin6_port );
key.local.Ipv6.sin6_scope_id = find_ipv6_addr_scope( &key.local.Ipv6.sin6_addr, addr_scopes,
addr_scopes_size );
key.remote.Ipv6.sin6_scope_id = find_ipv6_addr_scope( &key.remote.Ipv6.sin6_addr, addr_scopes,
addr_scopes_size );
if (num < *count)
{
if (key_data) *key_data++ = key;
if (dynamic_data) *dynamic_data++ = dyn;
if (static_data)
{
stat.pid = find_owning_pid( pid_map, pid_map_size, inode );
stat.create_time = 0; /* FIXME */
stat.mod_info = 0; /* FIXME */
*static_data++ = stat;
}
}
num++;
}
fclose( fp );
}
}
#elif defined(HAVE_SYS_SYSCTL_H) && defined(TCPCTL_PCBLIST) && defined(HAVE_STRUCT_XINPGEN)
{
int mib[] = { CTL_NET, PF_INET, IPPROTO_TCP, TCPCTL_PCBLIST };
size_t len = 0;
char *buf = NULL;
struct xinpgen *xig, *orig_xig;
if (sysctl( mib, ARRAY_SIZE(mib), NULL, &len, NULL, 0 ) < 0)
{
ERR( "Failure to read net.inet.tcp.pcblist via sysctl\n" );
status = STATUS_NOT_SUPPORTED;
goto err;
}
buf = malloc( len );
if (!buf)
{
status = STATUS_NO_MEMORY;
goto err;
}
if (sysctl( mib, ARRAY_SIZE(mib), buf, &len, NULL, 0 ) < 0)
{
ERR( "Failure to read net.inet.tcp.pcblist via sysctl\n" );
status = STATUS_NOT_SUPPORTED;
goto err;
}
/* Might be nothing here; first entry is just a header it seems */
if (len <= sizeof(struct xinpgen)) goto err;
addr_scopes = get_ipv6_addr_scope_table( &addr_scopes_size );
if (static_data) pid_map = get_pid_map( &pid_map_size );
orig_xig = (struct xinpgen *)buf;
xig = orig_xig;
for (xig = (struct xinpgen *)((char *)xig + xig->xig_len);
xig->xig_len > sizeof(struct xinpgen);
xig = (struct xinpgen *)((char *)xig + xig->xig_len))
{
#if __FreeBSD_version >= 1200026
struct xtcpcb *tcp = (struct xtcpcb *)xig;
struct xinpcb *in = &tcp->xt_inp;
struct xsocket *sock = &in->xi_socket;
#else
struct tcpcb *tcp = &((struct xtcpcb *)xig)->xt_tp;
struct inpcb *in = &((struct xtcpcb *)xig)->xt_inp;
struct xsocket *sock = &((struct xtcpcb *)xig)->xt_socket;
#endif
static const struct in6_addr zero;
/* Ignore sockets for other protocols */
if (sock->xso_protocol != IPPROTO_TCP) continue;
/* Ignore PCBs that were freed while generating the data */
if (in->inp_gencnt > orig_xig->xig_gen) continue;
/* we're only interested in IPv4 and IPV6 addresses */
if (!(in->inp_vflag & (INP_IPV4 | INP_IPV6))) continue;
/* If all 0's, skip it */
if (in->inp_vflag & INP_IPV4 && !in->inp_laddr.s_addr && !in->inp_lport &&
!in->inp_faddr.s_addr && !in->inp_fport) continue;
if (in->inp_vflag & INP_IPV6 && !memcmp( &in->in6p_laddr, &zero, sizeof(zero) ) && !in->inp_lport &&
!memcmp( &in->in6p_faddr, &zero, sizeof(zero) ) && !in->inp_fport) continue;
dyn.state = tcp_state_to_mib_state( tcp->t_state );
if (filter && filter != dyn.state ) continue;
if (in->inp_vflag & INP_IPV4)
{
key.local.Ipv4.sin_family = key.remote.Ipv4.sin_family = WS_AF_INET;
key.local.Ipv4.sin_addr.WS_s_addr = in->inp_laddr.s_addr;
key.local.Ipv4.sin_port = in->inp_lport;
key.remote.Ipv4.sin_addr.WS_s_addr = in->inp_faddr.s_addr;
key.remote.Ipv4.sin_port = in->inp_fport;
}
else
{
key.local.Ipv6.sin6_family = key.remote.Ipv6.sin6_family = WS_AF_INET6;
memcpy( &key.local.Ipv6.sin6_addr, &in->in6p_laddr, sizeof(in->in6p_laddr) );
key.local.Ipv6.sin6_port = in->inp_lport;
key.local.Ipv6.sin6_scope_id = find_ipv6_addr_scope( &key.local.Ipv6.sin6_addr, addr_scopes,
addr_scopes_size );
memcpy( &key.remote.Ipv6.sin6_addr, &in->in6p_faddr, sizeof(in->in6p_faddr) );
key.remote.Ipv6.sin6_port = in->inp_fport;
key.remote.Ipv6.sin6_scope_id = find_ipv6_addr_scope( &key.remote.Ipv6.sin6_addr, addr_scopes,
addr_scopes_size );
}
if (num < *count)
{
if (key_data) *key_data++ = key;
if (dynamic_data) *dynamic_data++ = dyn;
if (static_data)
{
stat.pid = find_owning_pid( pid_map, pid_map_size, (UINT_PTR)sock->so_pcb );
stat.create_time = 0; /* FIXME */
stat.mod_info = 0; /* FIXME */
*static_data++ = stat;
}
}
num++;
}
err:
free( buf );
}
#else
FIXME( "not implemented\n" );
status = STATUS_NOT_IMPLEMENTED;
#endif
if (!want_data || num <= *count) *count = num;
else status = STATUS_BUFFER_OVERFLOW;
free( pid_map );
free( addr_scopes );
return status;
}
static NTSTATUS tcp_all_enumerate_all( void *key_data, DWORD key_size, void *rw_data, DWORD rw_size,
void *dynamic_data, DWORD dynamic_size,
void *static_data, DWORD static_size, DWORD_PTR *count )
{
TRACE( "%p %d %p %d %p %d %p %d %p\n", key_data, key_size, rw_data, rw_size,
dynamic_data, dynamic_size, static_data, static_size, count );
return tcp_conns_enumerate_all( 0, key_data, key_size, rw_data, rw_size,
dynamic_data, dynamic_size, static_data, static_size, count );
}
static NTSTATUS tcp_estab_enumerate_all( void *key_data, DWORD key_size, void *rw_data, DWORD rw_size,
void *dynamic_data, DWORD dynamic_size,
void *static_data, DWORD static_size, DWORD_PTR *count )
{
TRACE( "%p %d %p %d %p %d %p %d %p\n", key_data, key_size, rw_data, rw_size,
dynamic_data, dynamic_size, static_data, static_size, count );
return tcp_conns_enumerate_all( MIB_TCP_STATE_ESTAB, key_data, key_size, rw_data, rw_size,
dynamic_data, dynamic_size, static_data, static_size, count );
}
static NTSTATUS tcp_listen_enumerate_all( void *key_data, DWORD key_size, void *rw_data, DWORD rw_size,
void *dynamic_data, DWORD dynamic_size,
void *static_data, DWORD static_size, DWORD_PTR *count )
{
TRACE( "%p %d %p %d %p %d %p %d %p\n", key_data, key_size, rw_data, rw_size,
dynamic_data, dynamic_size, static_data, static_size, count );
return tcp_conns_enumerate_all( MIB_TCP_STATE_LISTEN, key_data, key_size, rw_data, rw_size,
dynamic_data, dynamic_size, static_data, static_size, count );
}
static struct module_table tcp_tables[] =
{
{
NSI_TCP_STATS_TABLE,
{
sizeof(USHORT), 0,
sizeof(struct nsi_tcp_stats_dynamic), sizeof(struct nsi_tcp_stats_static)
},
NULL,
tcp_stats_get_all_parameters,
},
{
NSI_TCP_ALL_TABLE,
{
sizeof(struct nsi_tcp_conn_key), 0,
sizeof(struct nsi_tcp_conn_dynamic), sizeof(struct nsi_tcp_conn_static)
},
tcp_all_enumerate_all,
},
{
NSI_TCP_ESTAB_TABLE,
{
sizeof(struct nsi_tcp_conn_key), 0,
sizeof(struct nsi_tcp_conn_dynamic), sizeof(struct nsi_tcp_conn_static)
},
tcp_estab_enumerate_all,
},
{
NSI_TCP_LISTEN_TABLE,
{
sizeof(struct nsi_tcp_conn_key), 0,
sizeof(struct nsi_tcp_conn_dynamic), sizeof(struct nsi_tcp_conn_static)
},
tcp_listen_enumerate_all,
},
{
~0u
}
};
const struct module tcp_module =
{
&NPI_MS_TCP_MODULEID,
tcp_tables
};