Vadim Smirnov

Forum Replies Created

Viewing 15 posts - 1,201 through 1,215 (of 1,499 total)
  • Author
    Posts
  • in reply to: NAT and IP Shaper status for NeT Firewall #6139
    Vadim Smirnov
    Keymaster

      1. Do you have any news on this since I very interested by this and this is the only part that is currently missing in my evaluation of your product (I’m particularly interessted by the NAT feature in priority, traffic shaper is a high priority too but less than NAT).

      NAT is already implemented in “under development” version of NeT Firewall. Regretfully I can’t point yet the exact release date, all newly addde features should be well tested before it,

      2. Do you plan to support Vista too (32 bits), do you have an idea of date (note really for me urgent, but I need to know for future).

      Yes, Windows Vista is planned to be supported.

      3. Do you have any API that enable me to communication with the Firewall (like the winPkFilter?

      In the meantime NeT Firewall interface is not published. However, could you specify for what particular tasks you’d like to use it?

      For your information image in the online help are not displayed the link is bad.

      Could you point the exact URL for the broken link?

      in reply to: Modify TTL of the packets #6004
      Vadim Smirnov
      Keymaster

        “fatal error LNK1104: cannot open file D:Program.obj”

        Try to move project to the path without complex names (with spaces inside) like “D:Program Files…”.

        in reply to: pktfilter vs connectix Virtual PC #6137
        Vadim Smirnov
        Keymaster

          Do you run WinpkFilter inside Virtual PC (guest) system? It should work fine in this environment unless you also have installed some software which conflicts with WinpkFilter drivers.

          What ListAdapters does show you? Also could you specify host and guest operating systems along with version of Virtual PC?

          in reply to: SetWANEvent vs SetPacketEvent #6134
          Vadim Smirnov
          Keymaster

            The event you set into driver with SetWANEvent is signaled when the new dial-up (VPN, PPPoE and etc…) connection is established or dropped, so you could reinitialize your configuration information. It is rather similar to SetAdapterListChangeEvent than SetPacketEvent which is signaled when new packet is queued.

            in reply to: IoCallDriver to NDIS IM #6133
            Vadim Smirnov
            Keymaster

              I would trace through the IRP processing to figure out the exact reason to fail the IRP. May be there is a workaround for this.

              in reply to: IoCallDriver to NDIS IM #6131
              Vadim Smirnov
              Keymaster

                Is device created with NdisMRegisterDevice? Well, it is difficult to say who exactly fails your IRP (NDIS, IM driver itself or filter driver attached to the IM created device), but you can check it yourself in kernel mode debugger. Probably one of these components checks the IRP origination (user or kernel) and if kernel mode component issues IRP_MJ_DEVICE_CONTROL then it fails. Basically as DDK documentation says kernel mode component usually issues IRP_MJ_INTERNAL_DEVICE_CONTROL:

                IRP_MJ_DEVICE_CONTROL
                A driver receives this I/O control code because user-mode thread has called the Microsoft® Win32® DeviceIoControl function, or a higher-level kernel-mode driver has set up the request.

                IRP_MJ_INTERNAL_DEVICE_CONTROL

                This I/O control code has been defined for communication between paired and layered kernel-mode drivers, such as one or more class drivers layered over a port driver. The higher-level driver sets up IRPs with device- or driver-specific I/O control codes, requesting support from the next-lower driver.

                I suppose it is far easier to change NDIS IM driver to process IRP_MJ_INTERNAL_DEVICE_CONTROL along with IRP_MJ_DEVICE_CONTROL.

                case IRP_MJ_DEVICE_CONTROL:
                case IRP_MJ_INTERNAL_DEVICE_CONTROL:
                {… PUT YOUR I/O PROCESSING CODE HERE…}

                in reply to: Install Remotely NeT Firewall #6128
                Vadim Smirnov
                Keymaster

                  The configuration seems ok and I hope it fits your requirements. However, I would make rules stricter. An example, your rule for HTTP is very common. Basically it passes any TCP packet which has source or destination port equal to 80. If this rule is intended to allow you internet browsing I would make it to apply to OUTGOING packets (instead both directions) or/and specified local IP in the source address field (if it is fixed, if not then your ISP subnet). If you want to create the rule for WWW server at your side then you could set it to INCOMING and specify your server IP in the destination field (along with port 80).

                  in reply to: can I invoke winpkfilter functions in C#? #6129
                  Vadim Smirnov
                  Keymaster

                    ndisapi.dll is a Win32 DLL and you can call it from C#. Please check the links below about calling Win32 DLL from C#

                    http://www.codeproject.com/Purgatory/C_DLL_with_Csharp.asp
                    http://msdn.microsoft.com/msdnmag/issues/02/08/CQA/
                    http://msdn.microsoft.com/msdnmag/issues/03/07/NET/

                    in reply to: Install Remotely NeT Firewall #6126
                    Vadim Smirnov
                    Keymaster

                      My question, is that possible to intall remotely Net-Firewall to our dedicated server over VNC?

                      Yes, you can install NeT Firewall rmotely using Remote Desktop or VNC.

                      Is your program will blocked my VNC traffic after restart the machine?

                      After installation NeT Firewall start in PASS ALL default mode and it won’t block VNC. You have to configure NeT Firewall after this and be carefull with setting rules and modes because one of the rules or modes may block VNC. I would recommend to create ALLOW rule for VNC traffic before creating any other rules.

                      in reply to: Blocking All Access for an IP address #6125
                      Vadim Smirnov
                      Keymaster

                        It should be enough to create the single rule with NeT Firewall to block the specific IP address (create the DENY rule which specifies the source IP and leave all other fields unchanged).

                        If you still have problem with it then could you please send some screenshots (firewall rules, log) to support(at)ntkernel.com?

                        in reply to: retrieving full process image path name in kernel mode #5878
                        Vadim Smirnov
                        Keymaster

                          Also isn’t IoGetCurrentProcess() is a kernel routine not user mode?

                          It is kernel routine but see the topic title “retrieving full process image path name in kernel mode”. 8)

                          And can show me your EPROCESS structure?

                          EPROCESS definitions for NT 4.0, 2000, XP, 2003 are below:

                          typedef struct _EPROCESS_NT4
                          {
                          KPROCESS_NT4 Pcb;
                          NTSTATUS ExitStatus;
                          KEVENT LockEvent;
                          ULONG LockCount;
                          LARGE_INTEGER CreateTime;
                          LARGE_INTEGER ExitTime;
                          PKTHREAD_NT4 LockOwner;
                          ULONG UniqueProcessId;
                          LIST_ENTRY ActiveProcessLinks;
                          ULONGLONG QuotaPeakPoolUsage;
                          ULONGLONG QuotaPoolUsage;
                          ULONG PagefileUsage;
                          ULONG CommitCharge;
                          ULONG PeakPagefileUsage;
                          ULONG PeakVirtualSize;
                          ULONGLONG VirtualSize;
                          MMSUPPORT_NT4 Vm;
                          ULONG LastProtoPteFault;
                          ULONG DebugPort;
                          ULONG ExceptionPort;
                          PHANDLE_TABLE ObjectTable;
                          PACCESS_TOKEN Token;
                          FAST_MUTEX WorkingSetLock;
                          ULONG WorkingSetPage;
                          BOOLEAN ProcessOutswapEnabled;
                          BOOLEAN ProcessOutswapped;
                          BOOLEAN AddressSpaceInitialized;
                          BOOLEAN AddressSpaceDeleted;
                          FAST_MUTEX AddressCreationLock;
                          KSPIN_LOCK HyperSpaceLock;
                          PETHREAD_NT4 ForkInProgress;
                          USHORT VmOperation;
                          BOOLEAN ForkWasSuccessful;
                          UCHAR MmAgressiveWsTrimMask;
                          PKEVENT VmOperationEvent;
                          HARDWARE_PTE PageDirectoryPte;
                          ULONG LastFaultCount;
                          ULONG ModifiedPageCount;
                          PVOID VadRoot;
                          PVOID VadHint;
                          ULONG CloneRoot;
                          ULONG NumberOfPrivatePages;
                          ULONG NumberOfLockedPages;
                          USHORT NextPageColor;
                          BOOLEAN ExitProcessCalled;
                          BOOLEAN CreateProcessReported;
                          HANDLE SectionHandle;
                          PPEB Peb;
                          PVOID SectionBaseAddress;
                          PEPROCESS_QUOTA_BLOCK QuotaBlock;
                          NTSTATUS LastThreadExitStatus;
                          PPROCESS_WS_WATCH_INFORMATION WorkingSetWatch;
                          HANDLE Win32WindowStation;
                          HANDLE InheritedFromUniqueProcessId;
                          ACCESS_MASK GrantedAccess;
                          ULONG DefaultHardErrorProcessing;
                          PVOID LdtInformation;
                          PVOID VadFreeHint;
                          PVOID VdmObjects;
                          KMUTANT ProcessMutant;
                          UCHAR ImageFileName[16];
                          ULONG VmTrimFaultValue;
                          UCHAR SetTimerResolution;
                          UCHAR PriorityClass;
                          union
                          {
                          struct
                          {
                          UCHAR SubSystemMinorVersion;
                          UCHAR SubSystemMajorVersion;
                          };
                          USHORT SubSystemVersion;
                          };
                          PVOID Win32Process;
                          } EPROCESS_NT4, *PEPROCESS_NT4;

                          typedef struct _EPROCESS_W2K
                          {
                          KPROCESS_W2K Pcb;
                          NTSTATUS ExitStatus;
                          KEVENT LockEvent;
                          ULONG LockCount;
                          LARGE_INTEGER CreateTime;
                          LARGE_INTEGER ExitTime;
                          PKTHREAD_W2K LockOwner;
                          ULONG UniqueProcessId;
                          LIST_ENTRY ActiveProcessLinks;
                          ULONGLONG QuotaPeakPoolUsage;
                          ULONGLONG QuotaPoolUsage;
                          ULONG PagefileUsage;
                          ULONG CommitCharge;
                          ULONG PeakPagefileUsage;
                          ULONG PeakVirtualSize;
                          ULONGLONG VirtualSize;
                          MMSUPPORT_W2K Vm;
                          LIST_ENTRY SessionProcessLinks;
                          ULONG DebugPort;
                          ULONG ExceptionPort;
                          PHANDLE_TABLE ObjectTable;
                          PACCESS_TOKEN Token;
                          FAST_MUTEX WorkingSetLock;
                          ULONG WorkingSetPage;
                          BOOLEAN ProcessOutswapEnabled;
                          BOOLEAN ProcessOutswapped;
                          BOOLEAN AddressSpaceInitialized;
                          BOOLEAN AddressSpaceDeleted;
                          FAST_MUTEX AddressCreationLock;
                          KSPIN_LOCK HyperSpaceLock;
                          PETHREAD_W2K ForkInProgress;
                          USHORT VmOperation;
                          BOOLEAN ForkWasSuccessful;
                          UCHAR MmAgressiveWsTrimMask;
                          PKEVENT VmOperationEvent;
                          PVOID PaeTop;
                          ULONG LastFaultCount;
                          ULONG ModifiedPageCount;
                          PVOID VadRoot;
                          PVOID VadHint;
                          ULONG CloneRoot;
                          ULONG NumberOfPrivatePages;
                          ULONG NumberOfLockedPages;
                          USHORT NextPageColor;
                          BOOLEAN ExitProcessCalled;
                          BOOLEAN CreateProcessReported;
                          HANDLE SectionHandle;
                          PPEB Peb;
                          PVOID SectionBaseAddress;
                          PEPROCESS_QUOTA_BLOCK QuotaBlock;
                          NTSTATUS LastThreadExitStatus;
                          PPROCESS_WS_WATCH_INFORMATION WorkingSetWatch;
                          HANDLE Win32WindowStation;
                          HANDLE InheritedFromUniqueProcessId;
                          ACCESS_MASK GrantedAccess;
                          ULONG DefaultHardErrorProcessing;
                          PVOID LdtInformation;
                          PVOID VadFreeHint;
                          PVOID VdmObjects;
                          PDEVICE_MAP DeviceMap;
                          ULONG SessionId;
                          LIST_ENTRY PhysicalVadList;
                          HARDWARE_PTE PageDirectoryPte;
                          ULONG Filler;
                          ULONG PaePageDirectoryPage;
                          UCHAR ImageFileName[16];
                          ULONG VmTrimFaultValue;
                          UCHAR SetTimerResolution;
                          UCHAR PriorityClass;
                          union
                          {
                          struct
                          {
                          UCHAR SubSystemMinorVersion;
                          UCHAR SubSystemMajorVersion;
                          };
                          USHORT SubSystemVersion;
                          };
                          PVOID Win32Process;
                          PEJOB Job;
                          ULONG JobStatus;
                          LIST_ENTRY JobLinks;
                          PVOID LockedPageList;
                          PVOID SecurityPort;
                          PWOW64_PROCESS Wow64Process;
                          LARGE_INTEGER ReadOperationCount;
                          LARGE_INTEGER WriteOperationCount;
                          LARGE_INTEGER OtherOperationCount;
                          LARGE_INTEGER ReadTransferCount;
                          LARGE_INTEGER WriteTransferCount;
                          LARGE_INTEGER OtherTransferCount;
                          ULONG CommitChargeLimit;
                          ULONG CommitChargePeek;
                          LIST_ENTRY ThreadListHead;
                          PRTL_BITMAP VadPhysicalPagesBitMap;
                          ULONG VadPhysicalPages;
                          ULONG AweLock;
                          } EPROCESS_W2K, *PEPROCESS_W2K;

                          typedef struct _EPROCESS_XP
                          {
                          KPROCESS_XP Pcb;
                          EX_PUSH_LOCK ProcessLock;
                          LARGE_INTEGER CreateTime;
                          LARGE_INTEGER ExitTime;
                          EX_RUNDOWN_REF RundownProtect;
                          PVOID UniqueProcessId;
                          LIST_ENTRY ActiveProcessLinks;
                          ULONG QuotaUsage[3];
                          ULONG QuotaPeak[3];
                          ULONG CommitCharge;
                          ULONG PeakVirtualSize;
                          ULONG VirtualSize;
                          LIST_ENTRY SessionProcessLinks;
                          PVOID DebugPort;
                          PVOID ExceptionPort;
                          PHANDLE_TABLE ObjectTable;
                          EX_FAST_REF Token;
                          FAST_MUTEX WorkingSetLock;
                          ULONG WorkingSetPage;
                          FAST_MUTEX AddressCreationLock;
                          KSPIN_LOCK HyperSpaceLock;
                          PETHREAD_XP ForkInProgress;
                          ULONG HardwareTrigger;
                          PVOID VadRoot;
                          PVOID VadHint;
                          PVOID CloneRoot;
                          ULONG NumberOfPrivatePages;
                          ULONG NumberOfLockedPages;
                          PVOID Win32Process;
                          PEJOB Job;
                          PSECTION_OBJECT SectionObject;
                          PVOID SectionBaseAddress;
                          PEPROCESS_QUOTA_BLOCK QuotaBlock;
                          PPAGEFAULT_HISTORY WorkingSetWatch;
                          PVOID Win32WindowStation;
                          PVOID InheritedFromUniqueProcessId;
                          PVOID LdtInformation;
                          PVOID VadFreeHint;
                          PVOID VdmObjects;
                          PDEVICE_MAP DeviceMap;
                          LIST_ENTRY PhysicalVadList;
                          union
                          {
                          HARDWARE_PTE PageDirectoryPte;
                          ULONGLONG Filler;
                          };
                          PVOID Session;
                          UCHAR ImageFileName[16];
                          LIST_ENTRY JobLinks;
                          PVOID LockedPageList;
                          LIST_ENTRY ThreadListHead;
                          PVOID SecurityPort;
                          PVOID PaeTop;
                          ULONG ActiveThreads;
                          ULONG GrantedAccess;
                          ULONG DefaultHardErrorProcessing;
                          NTSTATUS LastThreadExitStatus;
                          PPEB Peb;
                          EX_FAST_REF PrefetchTrace;
                          LARGE_INTEGER ReadOperationCount;
                          LARGE_INTEGER WriteOperationCount;
                          LARGE_INTEGER OtherOperationCount;
                          LARGE_INTEGER ReadTransferCount;
                          LARGE_INTEGER WriteTransferCount;
                          LARGE_INTEGER OtherTransferCount;
                          ULONG CommitChargeLimit;
                          ULONG CommitChargePeek;
                          PVOID AweInfo;
                          SE_AUDIT_PROCESS_CREATION_INFO SeAuditProcessCreationInfo;
                          MMSUPPORT_XP Vm;
                          ULONG LastFaultCount;
                          ULONG ModifiedPageCount;
                          ULONG NumberOfVads;
                          ULONG JobStatus;
                          union
                          {
                          ULONG Flags;
                          struct
                          {
                          ULONG CreateReported : 1;
                          ULONG NoDebugInherit : 1;
                          ULONG ProcessExiting : 1;
                          ULONG ProcessDelete : 1;
                          ULONG Wow64SplitPages : 1;
                          ULONG VmDeleted : 1;
                          ULONG OutswapEnabled : 1;
                          ULONG Outswapped : 1;
                          ULONG ForkFailed : 1;
                          ULONG HasPhysicalVad : 1;
                          ULONG AddressSpaceInitialized : 2;
                          ULONG SetTimerResolution : 1;
                          ULONG BreakOnTermination : 1;
                          ULONG SessionCreationUnderway : 1;
                          ULONG WriteWatch : 1;
                          ULONG ProcessInSession : 1;
                          ULONG OverrideAddressSpace : 1;
                          ULONG HasAddressSpace : 1;
                          ULONG LaunchPrefetched : 1;
                          ULONG InjectInpageErrors : 1;
                          ULONG Unused : 11;
                          };
                          };
                          NTSTATUS ExitStatus;
                          USHORT NextPageColor;
                          union
                          {
                          struct
                          {
                          UCHAR SubSystemMinorVersion;
                          UCHAR SubSystemMajorVersion;
                          };
                          USHORT SubSystemVersion;
                          };
                          UCHAR PriorityClass;
                          BOOLEAN WorkingSetAcquiredUnsafe;
                          } EPROCESS_XP, *PEPROCESS_XP;

                          typedef struct _EPROCESS_2K3
                          {
                          /*+0x000*/ KPROCESS_2K3 Pcb;
                          /*+0x06c*/ EX_PUSH_LOCK ProcessLock;
                          /*+0x070*/ LARGE_INTEGER CreateTime;
                          /*+0x078*/ LARGE_INTEGER ExitTime;
                          /*+0x080*/ EX_RUNDOWN_REF RundownProtect;
                          /*+0x084*/ PVOID UniqueProcessId;
                          /*+0x088*/ LIST_ENTRY ActiveProcessLinks;
                          /*+0x090*/ ULONG QuotaUsage[3];
                          /*+0x09c*/ ULONG QuotaPeak[3];
                          /*+0x0a8*/ ULONG CommitCharge;
                          /*+0x0ac*/ ULONG PeakVirtualSize;
                          /*+0x0b0*/ ULONG VirtualSize;
                          /*+0x0b4*/ LIST_ENTRY SessionProcessLinks;
                          /*+0x0bc*/ PVOID DebugPort;
                          /*+0x0c0*/ PVOID ExceptionPort;
                          /*+0x0c4*/ PHANDLE_TABLE ObjectTable;
                          /*+0x0c8*/ EX_FAST_REF Token;
                          /*+0x0cc*/ ULONG WorkingSetPage;
                          /*+0x0d0*/ KGUARDED_MUTEX AddressCreationLock;
                          /*+0x0f0*/ KSPIN_LOCK HyperSpaceLock;
                          /*+0x0f4*/ PETHREAD_2K3 ForkInProgress;
                          /*+0x0f8*/ ULONG HardwareTrigger;
                          /*+0x0fc*/ PMM_AVL_TABLE PhysicalVadRoot;
                          /*+0x100*/ PVOID CloneRoot;
                          /*+0x104*/ ULONG NumberOfPrivatePages;
                          /*+0x108*/ ULONG NumberOfLockedPages;
                          /*+0x10c*/ PVOID Win32Process;
                          /*+0x110*/ PEJOB Job;
                          /*+0x114*/ PSECTION_OBJECT SectionObject;
                          /*+0x118*/ PVOID SectionBaseAddress;
                          /*+0x11c*/ PEPROCESS_QUOTA_BLOCK QuotaBlock;
                          /*+0x120*/ PPAGEFAULT_HISTORY WorkingSetWatch;
                          /*+0x124*/ PVOID Win32WindowStation;
                          /*+0x128*/ PVOID InheritedFromUniqueProcessId;
                          /*+0x12c*/ PVOID LdtInformation;
                          /*+0x130*/ PVOID VadFreeHint;
                          /*+0x134*/ PVOID VdmObjects;
                          /*+0x138*/ PVOID DeviceMap;
                          /*+0x13c*/ PVOID Spare0[3];
                          union {
                          /*+0x148*/HARDWARE_PTE PageDirectoryPte;
                          /*+0x148*/ULONGLONG Filler;
                          };
                          /*+0x150*/ PVOID Session;
                          /*+0x154*/ UCHAR ImageFileName[16];
                          /*+0x164*/ LIST_ENTRY JobLinks;
                          /*+0x16c*/ PVOID LockedPagesList;
                          /*+0x170*/ LIST_ENTRY ThreadListHead;
                          /*+0x178*/ PVOID SecurityPort;
                          /*+0x17c*/ PVOID PaeTop;
                          /*+0x180*/ ULONG ActiveThreads;
                          /*+0x184*/ ULONG GrantedAccess;
                          /*+0x188*/ ULONG DefaultHardErrorProcessing;
                          /*+0x18c*/ NTSTATUS LastThreadExitStatus;
                          /*+0x190*/ PPEB Peb;
                          /*+0x194*/ EX_FAST_REF PrefetchTrace;
                          /*+0x198*/ LARGE_INTEGER ReadOperationCount;
                          /*+0x1a0*/ LARGE_INTEGER WriteOperationCount;
                          /*+0x1a8*/ LARGE_INTEGER OtherOperationCount;
                          /*+0x1b0*/ LARGE_INTEGER ReadTransferCount;
                          /*+0x1b8*/ LARGE_INTEGER WriteTransferCount;
                          /*+0x1c0*/ LARGE_INTEGER OtherTransferCount;
                          /*+0x1c8*/ ULONG CommitChargeLimit;
                          /*+0x1cc*/ ULONG CommitChargePeak;
                          /*+0x1d0*/ PVOID AweInfo;
                          /*+0x1d4*/ SE_AUDIT_PROCESS_CREATION_INFO SeAuditProcessCreationInfo;
                          /*+0x1d8*/ MMSUPPORT_2K3 Vm;
                          /*+0x238*/ LIST_ENTRY MmProcessLinks;
                          /*+0x240*/ ULONG ModifiedPageCount;
                          /*+0x244*/ ULONG JobStatus;
                          union{
                          /*+0x248*/ ULONG Flags;
                          struct{
                          /*+0x248*/ ULONG CreateReported : 1;
                          /*+0x248*/ ULONG NoDebugInherit : 1;
                          /*+0x248*/ ULONG ProcessExiting : 1;
                          /*+0x248*/ ULONG ProcessDelete : 1;
                          /*+0x248*/ ULONG Wow64SplitPages : 1;
                          /*+0x248*/ ULONG VmDeleted : 1;
                          /*+0x248*/ ULONG OutswapEnabled : 1;
                          /*+0x248*/ ULONG Outswapped : 1;
                          /*+0x248*/ ULONG ForkFailed : 1;
                          /*+0x248*/ ULONG Wow64VaSpace4Gb : 1;
                          /*+0x248*/ ULONG AddressSpaceInitialized :2;
                          /*+0x248*/ ULONG SetTimerResolution : 1;
                          /*+0x248*/ ULONG BreakOnTermination : 1;
                          /*+0x248*/ ULONG SessionCreationUnderway :1;
                          /*+0x248*/ ULONG WriteWatch : 1;
                          /*+0x248*/ ULONG ProcessInSession : 1;
                          /*+0x248*/ ULONG OverrideAddressSpace : 1;
                          /*+0x248*/ ULONG HasAddressSpace : 1;
                          /*+0x248*/ ULONG LaunchPrefetched : 1;
                          /*+0x248*/ ULONG InjectInpageErrors : 1;
                          /*+0x248*/ ULONG VmTopDown : 1;
                          /*+0x248*/ ULONG ImageNotifyDone : 1;
                          /*+0x248*/ ULONG PdeUpdateNeeded : 1;
                          /*+0x248*/ ULONG VdmAllowed : 1;
                          /*+0x248*/ ULONG Unused : 7;
                          };
                          };
                          /*+0x24c*/ NTSTATUS ExitStatus;
                          /*+0x250*/ USHORT NextPageColor;
                          union {
                          struct {
                          /*+0x252*/ UCHAR SubSystemMinorVersion;
                          /*+0x253*/ UCHAR SubSystemMajorVersion;
                          };
                          /*+0x252*/ USHORT SubSystemVersion;
                          };

                          /*+0x254*/ UCHAR PriorityClass;
                          /*+0x258*/ MM_AVL_TABLE VadRoot;
                          } EPROCESS_2K3, *PEPROCESS_2K3;
                          in reply to: Receive() indications and IRQL #6123
                          Vadim Smirnov
                          Keymaster

                            So, in this case, I wonder if it’s a good idea to raise IRQL to dispatch prior invoking Receive() handlers?

                            Yes, this is basically what you have to do.

                            in reply to: Receive() indications and IRQL #6121
                            Vadim Smirnov
                            Keymaster

                              Protocol driver expects that its ProtocolReceive handler is called at DISPATCH_LEVEL (refer the DDK documentation where it is explicitely specified “…ProtocolReceive runs at IRQL = DISPATCH_LEVEL…”).

                              Since protocol driver assumes that it was called at DISPATCH_LEVEL then it could use KeAcquireSpinLock/KeReleaseSpinLockFromDpcLevel, an example instead KeAcquireSpinLock/KeReleaseSpinLock or something similar. It is not a good sample but when called on DISPATCH_LEVEL both pairs work on the same way.

                              in reply to: how many adapters can we capture and modify packets on? #6118
                              Vadim Smirnov
                              Keymaster

                                Basically I don’t see any problems with processing packet from the single thread (processing packets does not really consumes all processor time and queue never grows as large unless your system is overloaded, but you can also assign the higher priority to the packet processing thread to avoid this). However, if you are looking for better packet scheduling between adapters you can create one thread per interface…

                                in reply to: how can I detect an active Internet connection? #6115
                                Vadim Smirnov
                                Keymaster

                                  Two lines are most important here:

                                  Network Destination Netmask Gateway Interface Metric
                                  0.0.0.0 0.0.0.0 172.19.0.2 172.19.3.182 30
                                  0.0.0.0 0.0.0.0 207.162.10.253 207.162.10.161 20

                                  One route has metric 20, and another one 30. First of all Windows tries to connect thru adapter with better (less) metric, if it fails then it tries another one. So your default internet connection is thru 207.162.10.161 and it is also confirmed by your default gateway 207.162.10.253.

                                Viewing 15 posts - 1,201 through 1,215 (of 1,499 total)