npf.c revision 1.53 1 1.1 rmind /*-
2 1.49 rmind * Copyright (c) 2010-2020 The NetBSD Foundation, Inc.
3 1.1 rmind * All rights reserved.
4 1.1 rmind *
5 1.1 rmind * This material is based upon work partially supported by The
6 1.1 rmind * NetBSD Foundation under a contract with Mindaugas Rasiukevicius.
7 1.1 rmind *
8 1.1 rmind * Redistribution and use in source and binary forms, with or without
9 1.1 rmind * modification, are permitted provided that the following conditions
10 1.1 rmind * are met:
11 1.1 rmind * 1. Redistributions of source code must retain the above copyright
12 1.1 rmind * notice, this list of conditions and the following disclaimer.
13 1.1 rmind * 2. Redistributions in binary form must reproduce the above copyright
14 1.1 rmind * notice, this list of conditions and the following disclaimer in the
15 1.1 rmind * documentation and/or other materials provided with the distribution.
16 1.1 rmind *
17 1.1 rmind * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
18 1.1 rmind * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
19 1.1 rmind * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
20 1.1 rmind * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
21 1.1 rmind * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
22 1.1 rmind * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
23 1.1 rmind * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
24 1.1 rmind * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
25 1.1 rmind * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
26 1.1 rmind * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
27 1.1 rmind * POSSIBILITY OF SUCH DAMAGE.
28 1.1 rmind */
29 1.1 rmind
30 1.1 rmind #include <sys/cdefs.h>
31 1.53 joe __KERNEL_RCSID(0, "$NetBSD: npf.c,v 1.53 2025/05/31 23:32:03 joe Exp $");
32 1.1 rmind
33 1.1 rmind #include <sys/types.h>
34 1.44 rmind #include <sys/mman.h>
35 1.44 rmind #include <sys/stat.h>
36 1.49 rmind #if !defined(_NPF_STANDALONE)
37 1.49 rmind #include <sys/ioctl.h>
38 1.49 rmind #endif
39 1.1 rmind #include <netinet/in_systm.h>
40 1.1 rmind #include <netinet/in.h>
41 1.11 rmind #include <net/if.h>
42 1.1 rmind
43 1.1 rmind #include <stdlib.h>
44 1.1 rmind #include <string.h>
45 1.7 rmind #include <assert.h>
46 1.44 rmind #include <unistd.h>
47 1.1 rmind #include <errno.h>
48 1.1 rmind #include <err.h>
49 1.1 rmind
50 1.44 rmind #include <nv.h>
51 1.44 rmind #include <dnv.h>
52 1.44 rmind
53 1.44 rmind #include <cdbw.h>
54 1.44 rmind
55 1.1 rmind #define _NPF_PRIVATE
56 1.1 rmind #include "npf.h"
57 1.1 rmind
58 1.1 rmind struct nl_rule {
59 1.44 rmind nvlist_t * rule_dict;
60 1.1 rmind };
61 1.1 rmind
62 1.1 rmind struct nl_rproc {
63 1.44 rmind nvlist_t * rproc_dict;
64 1.1 rmind };
65 1.1 rmind
66 1.1 rmind struct nl_table {
67 1.44 rmind nvlist_t * table_dict;
68 1.1 rmind };
69 1.1 rmind
70 1.19 christos struct nl_alg {
71 1.44 rmind nvlist_t * alg_dict;
72 1.19 christos };
73 1.19 christos
74 1.13 rmind struct nl_ext {
75 1.44 rmind nvlist_t * ext_dict;
76 1.13 rmind };
77 1.13 rmind
78 1.20 rmind struct nl_config {
79 1.44 rmind nvlist_t * ncf_dict;
80 1.44 rmind
81 1.44 rmind /* Temporary rule list. */
82 1.44 rmind nvlist_t ** ncf_rule_list;
83 1.44 rmind unsigned ncf_rule_count;
84 1.20 rmind
85 1.20 rmind /* Iterators. */
86 1.44 rmind unsigned ncf_reduce[16];
87 1.44 rmind unsigned ncf_nlevel;
88 1.46 rmind
89 1.44 rmind nl_rule_t ncf_cur_rule;
90 1.44 rmind nl_table_t ncf_cur_table;
91 1.44 rmind nl_rproc_t ncf_cur_rproc;
92 1.20 rmind };
93 1.20 rmind
94 1.44 rmind /*
95 1.44 rmind * Various helper routines.
96 1.44 rmind */
97 1.16 rmind
98 1.36 christos static bool
99 1.44 rmind _npf_add_addr(nvlist_t *nvl, const char *name, int af, const npf_addr_t *addr)
100 1.36 christos {
101 1.36 christos size_t sz;
102 1.36 christos
103 1.36 christos if (af == AF_INET) {
104 1.36 christos sz = sizeof(struct in_addr);
105 1.36 christos } else if (af == AF_INET6) {
106 1.36 christos sz = sizeof(struct in6_addr);
107 1.36 christos } else {
108 1.36 christos return false;
109 1.36 christos }
110 1.44 rmind nvlist_add_binary(nvl, name, addr, sz);
111 1.44 rmind return nvlist_error(nvl) == 0;
112 1.36 christos }
113 1.36 christos
114 1.41 christos static unsigned
115 1.44 rmind _npf_get_addr(const nvlist_t *nvl, const char *name, npf_addr_t *addr)
116 1.36 christos {
117 1.44 rmind const void *d;
118 1.44 rmind size_t sz = 0;
119 1.36 christos
120 1.44 rmind d = nvlist_get_binary(nvl, name, &sz);
121 1.36 christos switch (sz) {
122 1.36 christos case sizeof(struct in_addr):
123 1.36 christos case sizeof(struct in6_addr):
124 1.36 christos memcpy(addr, d, sz);
125 1.41 christos return (unsigned)sz;
126 1.36 christos }
127 1.44 rmind return 0;
128 1.36 christos }
129 1.40 christos
130 1.44 rmind static bool
131 1.44 rmind _npf_dataset_lookup(const nvlist_t *dict, const char *dataset,
132 1.44 rmind const char *key, const char *name)
133 1.1 rmind {
134 1.44 rmind const nvlist_t * const *items;
135 1.44 rmind size_t nitems;
136 1.1 rmind
137 1.44 rmind if (!nvlist_exists_nvlist_array(dict, dataset)) {
138 1.44 rmind return false;
139 1.44 rmind }
140 1.44 rmind items = nvlist_get_nvlist_array(dict, dataset, &nitems);
141 1.44 rmind for (unsigned i = 0; i < nitems; i++) {
142 1.44 rmind const char *item_name;
143 1.44 rmind
144 1.44 rmind item_name = dnvlist_get_string(items[i], key, NULL);
145 1.44 rmind if (item_name && strcmp(item_name, name) == 0) {
146 1.44 rmind return true;
147 1.44 rmind }
148 1.1 rmind }
149 1.44 rmind return false;
150 1.1 rmind }
151 1.1 rmind
152 1.44 rmind static const nvlist_t *
153 1.44 rmind _npf_dataset_getelement(nvlist_t *dict, const char *dataset, unsigned i)
154 1.1 rmind {
155 1.44 rmind const nvlist_t * const *items;
156 1.44 rmind size_t nitems;
157 1.1 rmind
158 1.44 rmind if (!nvlist_exists_nvlist_array(dict, dataset)) {
159 1.40 christos return NULL;
160 1.1 rmind }
161 1.44 rmind items = nvlist_get_nvlist_array(dict, dataset, &nitems);
162 1.44 rmind if (i < nitems) {
163 1.44 rmind return items[i];
164 1.16 rmind }
165 1.44 rmind return NULL;
166 1.40 christos }
167 1.1 rmind
168 1.44 rmind /*
169 1.44 rmind * _npf_rules_process: transform the ruleset representing nested rules
170 1.44 rmind * with sublists into a single array with skip-to marks.
171 1.44 rmind */
172 1.44 rmind static void
173 1.44 rmind _npf_rules_process(nl_config_t *ncf, nvlist_t *dict, const char *key)
174 1.40 christos {
175 1.44 rmind nvlist_t **items;
176 1.44 rmind size_t nitems;
177 1.40 christos
178 1.44 rmind if (!nvlist_exists_nvlist_array(dict, key)) {
179 1.44 rmind return;
180 1.40 christos }
181 1.44 rmind items = nvlist_take_nvlist_array(dict, key, &nitems);
182 1.44 rmind for (unsigned i = 0; i < nitems; i++) {
183 1.44 rmind nvlist_t *rule_dict = items[i];
184 1.44 rmind size_t len = (ncf->ncf_rule_count + 1) * sizeof(nvlist_t *);
185 1.44 rmind void *p = realloc(ncf->ncf_rule_list, len);
186 1.44 rmind
187 1.44 rmind /*
188 1.44 rmind * - Add rule to the transformed array.
189 1.44 rmind * - Process subrules recursively.
190 1.44 rmind * - Add the skip-to position.
191 1.44 rmind */
192 1.44 rmind ncf->ncf_rule_list = p;
193 1.44 rmind ncf->ncf_rule_list[ncf->ncf_rule_count] = rule_dict;
194 1.44 rmind ncf->ncf_rule_count++;
195 1.44 rmind
196 1.44 rmind if (nvlist_exists_nvlist_array(rule_dict, "subrules")) {
197 1.44 rmind unsigned idx;
198 1.44 rmind
199 1.44 rmind _npf_rules_process(ncf, rule_dict, "subrules");
200 1.44 rmind idx = ncf->ncf_rule_count; // post-recursion index
201 1.44 rmind nvlist_add_number(rule_dict, "skip-to", idx);
202 1.44 rmind }
203 1.44 rmind assert(nvlist_error(rule_dict) == 0);
204 1.1 rmind }
205 1.44 rmind free(items);
206 1.1 rmind }
207 1.1 rmind
208 1.44 rmind /*
209 1.50 christos * _npf_init_error: initialize the error structure with the message
210 1.50 christos * from the current error number
211 1.50 christos */
212 1.50 christos static int
213 1.50 christos _npf_init_error(int error, npf_error_t *errinfo)
214 1.50 christos {
215 1.50 christos if (error && errinfo) {
216 1.50 christos memset(errinfo, 0, sizeof(*errinfo));
217 1.50 christos errinfo->error_msg = strerror(error);
218 1.50 christos }
219 1.50 christos return error;
220 1.50 christos }
221 1.50 christos
222 1.50 christos /*
223 1.47 rmind * _npf_extract_error: check the error number field and extract the
224 1.47 rmind * error details into the npf_error_t structure.
225 1.47 rmind */
226 1.47 rmind static int
227 1.47 rmind _npf_extract_error(nvlist_t *resp, npf_error_t *errinfo)
228 1.47 rmind {
229 1.47 rmind int error;
230 1.47 rmind
231 1.47 rmind error = dnvlist_get_number(resp, "errno", 0);
232 1.47 rmind if (error && errinfo) {
233 1.47 rmind memset(errinfo, 0, sizeof(npf_error_t));
234 1.47 rmind
235 1.47 rmind errinfo->id = dnvlist_get_number(resp, "id", 0);
236 1.47 rmind errinfo->error_msg =
237 1.47 rmind dnvlist_take_string(resp, "error-msg", NULL);
238 1.47 rmind errinfo->source_file =
239 1.47 rmind dnvlist_take_string(resp, "source-file", NULL);
240 1.47 rmind errinfo->source_line =
241 1.47 rmind dnvlist_take_number(resp, "source-line", 0);
242 1.47 rmind }
243 1.47 rmind return error;
244 1.47 rmind }
245 1.47 rmind
246 1.47 rmind /*
247 1.49 rmind * npf_xfer_fd: transfer the given request and receive a response.
248 1.49 rmind *
249 1.49 rmind * => Sets the 'operation' key on the 'req' dictionary.
250 1.49 rmind * => On success: returns 0 and valid nvlist in 'resp'.
251 1.49 rmind * => On failure: returns an error number.
252 1.49 rmind */
253 1.49 rmind static int
254 1.49 rmind _npf_xfer_fd(int fd, unsigned long cmd, nvlist_t *req, nvlist_t **resp)
255 1.49 rmind {
256 1.49 rmind struct stat st;
257 1.49 rmind int kernver;
258 1.49 rmind
259 1.49 rmind /*
260 1.49 rmind * Set the NPF version and operation.
261 1.49 rmind */
262 1.49 rmind if (!nvlist_exists(req, "version")) {
263 1.49 rmind nvlist_add_number(req, "version", NPF_VERSION);
264 1.49 rmind }
265 1.49 rmind nvlist_add_number(req, "operation", cmd);
266 1.49 rmind
267 1.49 rmind /*
268 1.49 rmind * Determine the type of file descriptor:
269 1.49 rmind * - If socket, then perform nvlist_send()/nvlist_recv().
270 1.49 rmind * - If a character device, then use ioctl.
271 1.49 rmind */
272 1.49 rmind if (fstat(fd, &st) == -1) {
273 1.49 rmind goto err;
274 1.49 rmind }
275 1.49 rmind switch (st.st_mode & S_IFMT) {
276 1.49 rmind #if !defined(__NetBSD__)
277 1.49 rmind case S_IFSOCK:
278 1.49 rmind if (nvlist_send(fd, req) == -1) {
279 1.49 rmind goto err;
280 1.49 rmind }
281 1.49 rmind if (resp && (*resp = nvlist_recv(fd, 0)) == NULL) {
282 1.49 rmind goto err;
283 1.49 rmind }
284 1.49 rmind break;
285 1.49 rmind #endif
286 1.49 rmind #if !defined(_NPF_STANDALONE)
287 1.49 rmind case S_IFBLK:
288 1.49 rmind case S_IFCHR:
289 1.49 rmind if (ioctl(fd, IOC_NPF_VERSION, &kernver) == -1) {
290 1.49 rmind goto err;
291 1.49 rmind }
292 1.49 rmind if (kernver != NPF_VERSION) {
293 1.49 rmind errno = EPROGMISMATCH;
294 1.49 rmind goto err;
295 1.49 rmind }
296 1.49 rmind if (nvlist_xfer_ioctl(fd, cmd, req, resp) == -1) {
297 1.49 rmind goto err;
298 1.49 rmind }
299 1.49 rmind break;
300 1.49 rmind #else
301 1.49 rmind (void)kernver;
302 1.49 rmind #endif
303 1.49 rmind default:
304 1.49 rmind errno = ENOTSUP;
305 1.49 rmind goto err;
306 1.49 rmind }
307 1.49 rmind return 0;
308 1.49 rmind err:
309 1.49 rmind return errno ? errno : EIO;
310 1.49 rmind }
311 1.49 rmind
312 1.49 rmind /*
313 1.49 rmind * npf_xfer_fd_errno: same as npf_xfer_fd(), but:
314 1.49 rmind *
315 1.49 rmind * => After successful retrieval of the response, inspects it, extracts
316 1.49 rmind * the 'errno' value (if any) and returns it.
317 1.49 rmind * => Destroys the response.
318 1.49 rmind */
319 1.49 rmind static int
320 1.49 rmind _npf_xfer_fd_errno(int fd, unsigned long cmd, nvlist_t *req)
321 1.49 rmind {
322 1.49 rmind nvlist_t *resp;
323 1.49 rmind int error;
324 1.49 rmind
325 1.49 rmind error = _npf_xfer_fd(fd, cmd, req, &resp);
326 1.49 rmind if (error) {
327 1.49 rmind return error;
328 1.49 rmind }
329 1.49 rmind error = _npf_extract_error(resp, NULL);
330 1.49 rmind nvlist_destroy(resp);
331 1.49 rmind return error;
332 1.49 rmind }
333 1.49 rmind
334 1.49 rmind /*
335 1.44 rmind * CONFIGURATION INTERFACE.
336 1.44 rmind */
337 1.44 rmind
338 1.44 rmind nl_config_t *
339 1.44 rmind npf_config_create(void)
340 1.30 rmind {
341 1.30 rmind nl_config_t *ncf;
342 1.30 rmind
343 1.44 rmind ncf = calloc(1, sizeof(nl_config_t));
344 1.44 rmind if (!ncf) {
345 1.30 rmind return NULL;
346 1.30 rmind }
347 1.44 rmind ncf->ncf_dict = nvlist_create(0);
348 1.44 rmind nvlist_add_number(ncf->ncf_dict, "version", NPF_VERSION);
349 1.30 rmind return ncf;
350 1.30 rmind }
351 1.30 rmind
352 1.44 rmind int
353 1.44 rmind npf_config_submit(nl_config_t *ncf, int fd, npf_error_t *errinfo)
354 1.44 rmind {
355 1.49 rmind nvlist_t *resp = NULL;
356 1.44 rmind int error;
357 1.44 rmind
358 1.44 rmind /* Ensure the config is built. */
359 1.44 rmind (void)npf_config_build(ncf);
360 1.44 rmind
361 1.49 rmind error = _npf_xfer_fd(fd, IOC_NPF_LOAD, ncf->ncf_dict, &resp);
362 1.49 rmind if (error) {
363 1.50 christos return _npf_init_error(errno, errinfo);
364 1.44 rmind }
365 1.49 rmind error = _npf_extract_error(resp, errinfo);
366 1.49 rmind nvlist_destroy(resp);
367 1.44 rmind return error;
368 1.44 rmind }
369 1.44 rmind
370 1.8 rmind nl_config_t *
371 1.40 christos npf_config_retrieve(int fd)
372 1.8 rmind {
373 1.8 rmind nl_config_t *ncf;
374 1.49 rmind nvlist_t *req, *resp = NULL;
375 1.49 rmind int error;
376 1.8 rmind
377 1.44 rmind ncf = calloc(1, sizeof(nl_config_t));
378 1.44 rmind if (!ncf) {
379 1.8 rmind return NULL;
380 1.8 rmind }
381 1.49 rmind
382 1.49 rmind req = nvlist_create(0);
383 1.49 rmind error = _npf_xfer_fd(fd, IOC_NPF_SAVE, req, &resp);
384 1.49 rmind nvlist_destroy(req);
385 1.49 rmind
386 1.49 rmind if (error || _npf_extract_error(resp, NULL) != 0) {
387 1.49 rmind nvlist_destroy(resp);
388 1.44 rmind free(ncf);
389 1.8 rmind return NULL;
390 1.8 rmind }
391 1.49 rmind ncf->ncf_dict = resp;
392 1.8 rmind return ncf;
393 1.8 rmind }
394 1.8 rmind
395 1.40 christos void *
396 1.40 christos npf_config_export(nl_config_t *ncf, size_t *length)
397 1.30 rmind {
398 1.44 rmind /* Ensure the config is built. */
399 1.44 rmind (void)npf_config_build(ncf);
400 1.44 rmind return nvlist_pack(ncf->ncf_dict, length);
401 1.30 rmind }
402 1.30 rmind
403 1.30 rmind nl_config_t *
404 1.44 rmind npf_config_import(const void *blob, size_t len)
405 1.30 rmind {
406 1.30 rmind nl_config_t *ncf;
407 1.30 rmind
408 1.44 rmind ncf = calloc(1, sizeof(nl_config_t));
409 1.44 rmind if (!ncf) {
410 1.30 rmind return NULL;
411 1.30 rmind }
412 1.44 rmind ncf->ncf_dict = nvlist_unpack(blob, len, 0);
413 1.44 rmind if (!ncf->ncf_dict) {
414 1.44 rmind free(ncf);
415 1.30 rmind return NULL;
416 1.30 rmind }
417 1.30 rmind return ncf;
418 1.30 rmind }
419 1.30 rmind
420 1.30 rmind int
421 1.6 rmind npf_config_flush(int fd)
422 1.6 rmind {
423 1.6 rmind nl_config_t *ncf;
424 1.40 christos npf_error_t errinfo;
425 1.6 rmind int error;
426 1.6 rmind
427 1.6 rmind ncf = npf_config_create();
428 1.44 rmind if (!ncf) {
429 1.6 rmind return ENOMEM;
430 1.6 rmind }
431 1.44 rmind nvlist_add_bool(ncf->ncf_dict, "flush", true);
432 1.40 christos error = npf_config_submit(ncf, fd, &errinfo);
433 1.6 rmind npf_config_destroy(ncf);
434 1.6 rmind return error;
435 1.6 rmind }
436 1.6 rmind
437 1.40 christos bool
438 1.40 christos npf_config_active_p(nl_config_t *ncf)
439 1.40 christos {
440 1.44 rmind return dnvlist_get_bool(ncf->ncf_dict, "active", false);
441 1.40 christos }
442 1.40 christos
443 1.40 christos bool
444 1.40 christos npf_config_loaded_p(nl_config_t *ncf)
445 1.40 christos {
446 1.44 rmind return nvlist_exists_nvlist_array(ncf->ncf_dict, "rules");
447 1.40 christos }
448 1.40 christos
449 1.49 rmind const void *
450 1.40 christos npf_config_build(nl_config_t *ncf)
451 1.7 rmind {
452 1.44 rmind _npf_rules_process(ncf, ncf->ncf_dict, "__rules");
453 1.44 rmind if (ncf->ncf_rule_list) {
454 1.44 rmind /* Set the transformed ruleset. */
455 1.44 rmind nvlist_move_nvlist_array(ncf->ncf_dict, "rules",
456 1.44 rmind ncf->ncf_rule_list, ncf->ncf_rule_count);
457 1.44 rmind
458 1.44 rmind /* Clear the temporary list. */
459 1.44 rmind ncf->ncf_rule_list = NULL;
460 1.44 rmind ncf->ncf_rule_count = 0;
461 1.40 christos }
462 1.44 rmind assert(nvlist_error(ncf->ncf_dict) == 0);
463 1.40 christos return (void *)ncf->ncf_dict;
464 1.7 rmind }
465 1.7 rmind
466 1.7 rmind void
467 1.1 rmind npf_config_destroy(nl_config_t *ncf)
468 1.1 rmind {
469 1.44 rmind nvlist_destroy(ncf->ncf_dict);
470 1.1 rmind free(ncf);
471 1.1 rmind }
472 1.1 rmind
473 1.1 rmind /*
474 1.46 rmind * PARAMETERS.
475 1.46 rmind */
476 1.46 rmind
477 1.46 rmind int
478 1.46 rmind npf_param_get(nl_config_t *ncf, const char *name, int *valp)
479 1.46 rmind {
480 1.46 rmind const nvlist_t *params;
481 1.46 rmind
482 1.46 rmind params = dnvlist_get_nvlist(ncf->ncf_dict, "params", NULL);
483 1.46 rmind if (params == NULL || !nvlist_exists(params, name)) {
484 1.46 rmind return ENOENT;
485 1.46 rmind }
486 1.46 rmind *valp = (int)dnvlist_get_number(params, name, 0);
487 1.46 rmind return 0;
488 1.46 rmind }
489 1.46 rmind
490 1.46 rmind int
491 1.46 rmind npf_param_set(nl_config_t *ncf, const char *name, int val)
492 1.46 rmind {
493 1.46 rmind nvlist_t *params;
494 1.46 rmind
495 1.46 rmind /* Ensure params dictionary. */
496 1.46 rmind if (nvlist_exists(ncf->ncf_dict, "params")) {
497 1.46 rmind params = nvlist_take_nvlist(ncf->ncf_dict, "params");
498 1.46 rmind } else {
499 1.46 rmind params = nvlist_create(0);
500 1.46 rmind }
501 1.46 rmind
502 1.46 rmind /*
503 1.46 rmind * If the parameter is already set, then free it first.
504 1.46 rmind * Set the parameter. Note: values can be negative.
505 1.46 rmind */
506 1.46 rmind if (nvlist_exists(params, name)) {
507 1.46 rmind nvlist_free_number(params, name);
508 1.46 rmind }
509 1.46 rmind nvlist_add_number(params, name, (uint64_t)val);
510 1.46 rmind nvlist_add_nvlist(ncf->ncf_dict, "params", params);
511 1.46 rmind return 0;
512 1.46 rmind }
513 1.46 rmind
514 1.49 rmind const char *
515 1.49 rmind npf_param_iterate(nl_config_t *ncf, nl_iter_t *iter, int *val, int *defval)
516 1.49 rmind {
517 1.49 rmind void *cookie = (void *)(intptr_t)*iter;
518 1.49 rmind const nvlist_t *params, *dparams;
519 1.49 rmind const char *name;
520 1.49 rmind int type;
521 1.49 rmind
522 1.49 rmind assert(sizeof(nl_iter_t) >= sizeof(void *));
523 1.49 rmind
524 1.49 rmind params = dnvlist_get_nvlist(ncf->ncf_dict, "params", NULL);
525 1.49 rmind if (params == NULL) {
526 1.49 rmind return NULL;
527 1.49 rmind }
528 1.49 rmind skip:
529 1.49 rmind if ((name = nvlist_next(params, &type, &cookie)) == NULL) {
530 1.49 rmind *iter = NPF_ITER_BEGIN;
531 1.49 rmind return NULL;
532 1.49 rmind }
533 1.49 rmind if (type != NV_TYPE_NUMBER) {
534 1.49 rmind goto skip; // should never happen, though
535 1.49 rmind }
536 1.49 rmind if (defval) {
537 1.49 rmind dparams = dnvlist_get_nvlist(ncf->ncf_dict,
538 1.49 rmind "params-defaults", NULL);
539 1.49 rmind if (dparams == NULL) {
540 1.49 rmind errno = EINVAL;
541 1.49 rmind return NULL;
542 1.49 rmind }
543 1.49 rmind *defval = (int)nvlist_get_number(dparams, name);
544 1.49 rmind }
545 1.49 rmind
546 1.49 rmind *val = (int)nvlist_get_number(params, name);
547 1.49 rmind *iter = (intptr_t)cookie;
548 1.49 rmind return name;
549 1.49 rmind }
550 1.49 rmind
551 1.46 rmind /*
552 1.16 rmind * DYNAMIC RULESET INTERFACE.
553 1.16 rmind */
554 1.16 rmind
555 1.48 rmind static inline bool
556 1.48 rmind _npf_nat_ruleset_p(const char *name)
557 1.48 rmind {
558 1.48 rmind return strncmp(name, NPF_RULESET_MAP_PREF,
559 1.48 rmind sizeof(NPF_RULESET_MAP_PREF) - 1) == 0;
560 1.48 rmind }
561 1.48 rmind
562 1.16 rmind int
563 1.18 rmind npf_ruleset_add(int fd, const char *rname, nl_rule_t *rl, uint64_t *id)
564 1.16 rmind {
565 1.48 rmind const bool natset = _npf_nat_ruleset_p(rname);
566 1.49 rmind nvlist_t *rule_nvl = rl->rule_dict, *resp;
567 1.49 rmind int error;
568 1.16 rmind
569 1.49 rmind nvlist_add_number(rule_nvl, "attr",
570 1.49 rmind NPF_RULE_DYNAMIC | nvlist_take_number(rule_nvl, "attr"));
571 1.48 rmind
572 1.49 rmind if (natset && !dnvlist_get_bool(rule_nvl, "nat-rule", false)) {
573 1.48 rmind errno = EINVAL;
574 1.48 rmind return errno;
575 1.48 rmind }
576 1.49 rmind nvlist_add_string(rule_nvl, "ruleset-name", rname);
577 1.49 rmind nvlist_add_bool(rule_nvl, "nat-ruleset", natset);
578 1.49 rmind nvlist_add_number(rule_nvl, "command", NPF_CMD_RULE_ADD);
579 1.48 rmind
580 1.49 rmind error = _npf_xfer_fd(fd, IOC_NPF_RULE, rule_nvl, &resp);
581 1.49 rmind if (error) {
582 1.49 rmind return error;
583 1.16 rmind }
584 1.49 rmind *id = nvlist_get_number(resp, "id");
585 1.49 rmind nvlist_destroy(resp);
586 1.44 rmind return 0;
587 1.16 rmind }
588 1.16 rmind
589 1.16 rmind int
590 1.18 rmind npf_ruleset_remove(int fd, const char *rname, uint64_t id)
591 1.16 rmind {
592 1.48 rmind const bool natset = _npf_nat_ruleset_p(rname);
593 1.49 rmind nvlist_t *rule_nvl = nvlist_create(0);
594 1.49 rmind int error;
595 1.16 rmind
596 1.49 rmind nvlist_add_string(rule_nvl, "ruleset-name", rname);
597 1.49 rmind nvlist_add_bool(rule_nvl, "nat-ruleset", natset);
598 1.49 rmind nvlist_add_number(rule_nvl, "command", NPF_CMD_RULE_REMOVE);
599 1.49 rmind nvlist_add_number(rule_nvl, "id", id);
600 1.48 rmind
601 1.49 rmind error = _npf_xfer_fd_errno(fd, IOC_NPF_RULE, rule_nvl);
602 1.49 rmind nvlist_destroy(rule_nvl);
603 1.49 rmind return error;
604 1.16 rmind }
605 1.16 rmind
606 1.16 rmind int
607 1.16 rmind npf_ruleset_remkey(int fd, const char *rname, const void *key, size_t len)
608 1.16 rmind {
609 1.48 rmind const bool natset = _npf_nat_ruleset_p(rname);
610 1.49 rmind nvlist_t *rule_nvl = nvlist_create(0);
611 1.49 rmind int error;
612 1.16 rmind
613 1.49 rmind nvlist_add_string(rule_nvl, "ruleset-name", rname);
614 1.49 rmind nvlist_add_bool(rule_nvl, "nat-ruleset", natset);
615 1.49 rmind nvlist_add_number(rule_nvl, "command", NPF_CMD_RULE_REMKEY);
616 1.49 rmind nvlist_add_binary(rule_nvl, "key", key, len);
617 1.48 rmind
618 1.49 rmind error = _npf_xfer_fd_errno(fd, IOC_NPF_RULE, rule_nvl);
619 1.49 rmind nvlist_destroy(rule_nvl);
620 1.49 rmind return error;
621 1.16 rmind }
622 1.16 rmind
623 1.17 rmind int
624 1.17 rmind npf_ruleset_flush(int fd, const char *rname)
625 1.17 rmind {
626 1.48 rmind const bool natset = _npf_nat_ruleset_p(rname);
627 1.49 rmind nvlist_t *rule_nvl = nvlist_create(0);
628 1.49 rmind int error;
629 1.17 rmind
630 1.49 rmind nvlist_add_string(rule_nvl, "ruleset-name", rname);
631 1.49 rmind nvlist_add_bool(rule_nvl, "nat-ruleset", natset);
632 1.49 rmind nvlist_add_number(rule_nvl, "command", NPF_CMD_RULE_FLUSH);
633 1.48 rmind
634 1.49 rmind error = _npf_xfer_fd_errno(fd, IOC_NPF_RULE, rule_nvl);
635 1.49 rmind nvlist_destroy(rule_nvl);
636 1.49 rmind return error;
637 1.16 rmind }
638 1.16 rmind
639 1.16 rmind /*
640 1.13 rmind * NPF EXTENSION INTERFACE.
641 1.13 rmind */
642 1.13 rmind
643 1.13 rmind nl_ext_t *
644 1.13 rmind npf_ext_construct(const char *name)
645 1.13 rmind {
646 1.13 rmind nl_ext_t *ext;
647 1.13 rmind
648 1.13 rmind ext = malloc(sizeof(*ext));
649 1.44 rmind if (!ext) {
650 1.13 rmind return NULL;
651 1.13 rmind }
652 1.44 rmind ext->ext_dict = nvlist_create(0);
653 1.44 rmind nvlist_add_string(ext->ext_dict, "name", name);
654 1.13 rmind return ext;
655 1.13 rmind }
656 1.13 rmind
657 1.13 rmind void
658 1.13 rmind npf_ext_param_u32(nl_ext_t *ext, const char *key, uint32_t val)
659 1.13 rmind {
660 1.44 rmind nvlist_add_number(ext->ext_dict, key, val);
661 1.13 rmind }
662 1.13 rmind
663 1.13 rmind void
664 1.13 rmind npf_ext_param_bool(nl_ext_t *ext, const char *key, bool val)
665 1.13 rmind {
666 1.44 rmind nvlist_add_bool(ext->ext_dict, key, val);
667 1.13 rmind }
668 1.13 rmind
669 1.29 jakllsch void
670 1.29 jakllsch npf_ext_param_string(nl_ext_t *ext, const char *key, const char *val)
671 1.29 jakllsch {
672 1.44 rmind nvlist_add_string(ext->ext_dict, key, val);
673 1.29 jakllsch }
674 1.29 jakllsch
675 1.13 rmind /*
676 1.1 rmind * RULE INTERFACE.
677 1.1 rmind */
678 1.1 rmind
679 1.1 rmind nl_rule_t *
680 1.22 rmind npf_rule_create(const char *name, uint32_t attr, const char *ifname)
681 1.1 rmind {
682 1.1 rmind nl_rule_t *rl;
683 1.1 rmind
684 1.44 rmind rl = malloc(sizeof(nl_rule_t));
685 1.44 rmind if (!rl) {
686 1.1 rmind return NULL;
687 1.1 rmind }
688 1.44 rmind rl->rule_dict = nvlist_create(0);
689 1.44 rmind nvlist_add_number(rl->rule_dict, "attr", attr);
690 1.1 rmind if (name) {
691 1.44 rmind nvlist_add_string(rl->rule_dict, "name", name);
692 1.1 rmind }
693 1.22 rmind if (ifname) {
694 1.44 rmind nvlist_add_string(rl->rule_dict, "ifname", ifname);
695 1.1 rmind }
696 1.1 rmind return rl;
697 1.1 rmind }
698 1.1 rmind
699 1.1 rmind int
700 1.16 rmind npf_rule_setcode(nl_rule_t *rl, int type, const void *code, size_t len)
701 1.1 rmind {
702 1.44 rmind if (type != NPF_CODE_BPF) {
703 1.1 rmind return ENOTSUP;
704 1.1 rmind }
705 1.44 rmind nvlist_add_number(rl->rule_dict, "code-type", (unsigned)type);
706 1.44 rmind nvlist_add_binary(rl->rule_dict, "code", code, len);
707 1.44 rmind return nvlist_error(rl->rule_dict);
708 1.1 rmind }
709 1.1 rmind
710 1.1 rmind int
711 1.16 rmind npf_rule_setkey(nl_rule_t *rl, const void *key, size_t len)
712 1.1 rmind {
713 1.44 rmind nvlist_add_binary(rl->rule_dict, "key", key, len);
714 1.44 rmind return nvlist_error(rl->rule_dict);
715 1.16 rmind }
716 1.16 rmind
717 1.16 rmind int
718 1.20 rmind npf_rule_setinfo(nl_rule_t *rl, const void *info, size_t len)
719 1.20 rmind {
720 1.44 rmind nvlist_add_binary(rl->rule_dict, "info", info, len);
721 1.44 rmind return nvlist_error(rl->rule_dict);
722 1.20 rmind }
723 1.20 rmind
724 1.20 rmind int
725 1.40 christos npf_rule_setprio(nl_rule_t *rl, int pri)
726 1.16 rmind {
727 1.44 rmind nvlist_add_number(rl->rule_dict, "prio", (uint64_t)pri);
728 1.44 rmind return nvlist_error(rl->rule_dict);
729 1.16 rmind }
730 1.16 rmind
731 1.16 rmind int
732 1.16 rmind npf_rule_setproc(nl_rule_t *rl, const char *name)
733 1.16 rmind {
734 1.44 rmind nvlist_add_string(rl->rule_dict, "rproc", name);
735 1.44 rmind return nvlist_error(rl->rule_dict);
736 1.1 rmind }
737 1.1 rmind
738 1.53 joe /* both user and group */
739 1.53 joe int
740 1.53 joe npf_rule_setrid(nl_rule_t *rl, struct r_id rid, const char *name)
741 1.53 joe {
742 1.53 joe uint64_t uid_element[3] = { rid.id[0], rid.id[1], rid.op };
743 1.53 joe nvlist_add_number_array(rl->rule_dict, name, uid_element, 3);
744 1.53 joe return nvlist_error(rl->rule_dict);
745 1.53 joe }
746 1.53 joe
747 1.16 rmind void *
748 1.16 rmind npf_rule_export(nl_rule_t *rl, size_t *length)
749 1.16 rmind {
750 1.44 rmind return nvlist_pack(rl->rule_dict, length);
751 1.16 rmind }
752 1.16 rmind
753 1.1 rmind bool
754 1.1 rmind npf_rule_exists_p(nl_config_t *ncf, const char *name)
755 1.1 rmind {
756 1.49 rmind const char *key = nvlist_exists_nvlist_array(ncf->ncf_dict,
757 1.49 rmind "rules") ? "rules" : "__rules"; // config may not be built yet
758 1.49 rmind return _npf_dataset_lookup(ncf->ncf_dict, key, "name", name);
759 1.1 rmind }
760 1.1 rmind
761 1.1 rmind int
762 1.16 rmind npf_rule_insert(nl_config_t *ncf, nl_rule_t *parent, nl_rule_t *rl)
763 1.1 rmind {
764 1.44 rmind nvlist_t *rule_dict = rl->rule_dict;
765 1.44 rmind nvlist_t *target;
766 1.44 rmind const char *key;
767 1.1 rmind
768 1.1 rmind if (parent) {
769 1.44 rmind /* Subrule of the parent. */
770 1.44 rmind target = parent->rule_dict;
771 1.44 rmind key = "subrules";
772 1.1 rmind } else {
773 1.44 rmind /* Global ruleset. */
774 1.44 rmind target = ncf->ncf_dict;
775 1.44 rmind key = "__rules";
776 1.1 rmind }
777 1.44 rmind nvlist_append_nvlist_array(target, key, rule_dict);
778 1.44 rmind nvlist_destroy(rule_dict);
779 1.44 rmind free(rl);
780 1.1 rmind return 0;
781 1.1 rmind }
782 1.1 rmind
783 1.20 rmind static nl_rule_t *
784 1.46 rmind _npf_rule_iterate1(nl_config_t *ncf, const char *key,
785 1.46 rmind nl_iter_t *iter, unsigned *level)
786 1.20 rmind {
787 1.46 rmind unsigned i = *iter;
788 1.44 rmind const nvlist_t *rule_dict;
789 1.44 rmind uint32_t skipto;
790 1.20 rmind
791 1.44 rmind if (i == 0) {
792 1.20 rmind /* Initialise the iterator. */
793 1.20 rmind ncf->ncf_nlevel = 0;
794 1.20 rmind ncf->ncf_reduce[0] = 0;
795 1.20 rmind }
796 1.20 rmind
797 1.44 rmind rule_dict = _npf_dataset_getelement(ncf->ncf_dict, key, i);
798 1.44 rmind if (!rule_dict) {
799 1.46 rmind *iter = NPF_ITER_BEGIN;
800 1.20 rmind return NULL;
801 1.20 rmind }
802 1.46 rmind *iter = i + 1; // next
803 1.20 rmind *level = ncf->ncf_nlevel;
804 1.20 rmind
805 1.44 rmind skipto = dnvlist_get_number(rule_dict, "skip-to", 0);
806 1.20 rmind if (skipto) {
807 1.20 rmind ncf->ncf_nlevel++;
808 1.20 rmind ncf->ncf_reduce[ncf->ncf_nlevel] = skipto;
809 1.20 rmind }
810 1.46 rmind if (ncf->ncf_reduce[ncf->ncf_nlevel] == (i + 1)) {
811 1.20 rmind assert(ncf->ncf_nlevel > 0);
812 1.20 rmind ncf->ncf_nlevel--;
813 1.20 rmind }
814 1.46 rmind
815 1.46 rmind ncf->ncf_cur_rule.rule_dict = __UNCONST(rule_dict); // XXX
816 1.20 rmind return &ncf->ncf_cur_rule;
817 1.20 rmind }
818 1.20 rmind
819 1.20 rmind nl_rule_t *
820 1.46 rmind npf_rule_iterate(nl_config_t *ncf, nl_iter_t *iter, unsigned *level)
821 1.20 rmind {
822 1.46 rmind return _npf_rule_iterate1(ncf, "rules", iter, level);
823 1.20 rmind }
824 1.20 rmind
825 1.20 rmind const char *
826 1.20 rmind npf_rule_getname(nl_rule_t *rl)
827 1.20 rmind {
828 1.44 rmind return dnvlist_get_string(rl->rule_dict, "name", NULL);
829 1.20 rmind }
830 1.20 rmind
831 1.20 rmind uint32_t
832 1.20 rmind npf_rule_getattr(nl_rule_t *rl)
833 1.20 rmind {
834 1.44 rmind return dnvlist_get_number(rl->rule_dict, "attr", 0);
835 1.20 rmind }
836 1.20 rmind
837 1.22 rmind const char *
838 1.20 rmind npf_rule_getinterface(nl_rule_t *rl)
839 1.20 rmind {
840 1.44 rmind return dnvlist_get_string(rl->rule_dict, "ifname", NULL);
841 1.20 rmind }
842 1.20 rmind
843 1.20 rmind const void *
844 1.20 rmind npf_rule_getinfo(nl_rule_t *rl, size_t *len)
845 1.20 rmind {
846 1.44 rmind return dnvlist_get_binary(rl->rule_dict, "info", len, NULL, 0);
847 1.20 rmind }
848 1.20 rmind
849 1.20 rmind const char *
850 1.20 rmind npf_rule_getproc(nl_rule_t *rl)
851 1.20 rmind {
852 1.44 rmind return dnvlist_get_string(rl->rule_dict, "rproc", NULL);
853 1.20 rmind }
854 1.20 rmind
855 1.35 rmind uint64_t
856 1.35 rmind npf_rule_getid(nl_rule_t *rl)
857 1.35 rmind {
858 1.44 rmind return dnvlist_get_number(rl->rule_dict, "id", 0);
859 1.35 rmind }
860 1.35 rmind
861 1.35 rmind const void *
862 1.35 rmind npf_rule_getcode(nl_rule_t *rl, int *type, size_t *len)
863 1.35 rmind {
864 1.44 rmind *type = (int)dnvlist_get_number(rl->rule_dict, "code-type", 0);
865 1.44 rmind return dnvlist_get_binary(rl->rule_dict, "code", len, NULL, 0);
866 1.35 rmind }
867 1.35 rmind
868 1.17 rmind int
869 1.17 rmind _npf_ruleset_list(int fd, const char *rname, nl_config_t *ncf)
870 1.17 rmind {
871 1.48 rmind const bool natset = _npf_nat_ruleset_p(rname);
872 1.49 rmind nvlist_t *req, *resp;
873 1.49 rmind int error;
874 1.44 rmind
875 1.44 rmind req = nvlist_create(0);
876 1.44 rmind nvlist_add_string(req, "ruleset-name", rname);
877 1.48 rmind nvlist_add_bool(req, "nat-ruleset", natset);
878 1.44 rmind nvlist_add_number(req, "command", NPF_CMD_RULE_LIST);
879 1.17 rmind
880 1.49 rmind error = _npf_xfer_fd(fd, IOC_NPF_RULE, req, &resp);
881 1.49 rmind nvlist_destroy(req);
882 1.49 rmind if (error) {
883 1.49 rmind return error;
884 1.17 rmind }
885 1.49 rmind
886 1.49 rmind if (nvlist_exists_nvlist_array(resp, "rules")) {
887 1.44 rmind nvlist_t **rules;
888 1.44 rmind size_t n;
889 1.44 rmind
890 1.49 rmind rules = nvlist_take_nvlist_array(resp, "rules", &n);
891 1.44 rmind nvlist_move_nvlist_array(ncf->ncf_dict, "rules", rules, n);
892 1.17 rmind }
893 1.49 rmind nvlist_destroy(resp);
894 1.44 rmind return 0;
895 1.17 rmind }
896 1.17 rmind
897 1.1 rmind void
898 1.1 rmind npf_rule_destroy(nl_rule_t *rl)
899 1.1 rmind {
900 1.44 rmind nvlist_destroy(rl->rule_dict);
901 1.1 rmind free(rl);
902 1.1 rmind }
903 1.1 rmind
904 1.1 rmind /*
905 1.1 rmind * RULE PROCEDURE INTERFACE.
906 1.1 rmind */
907 1.1 rmind
908 1.1 rmind nl_rproc_t *
909 1.1 rmind npf_rproc_create(const char *name)
910 1.1 rmind {
911 1.44 rmind nl_rproc_t *rp;
912 1.1 rmind
913 1.44 rmind rp = malloc(sizeof(nl_rproc_t));
914 1.44 rmind if (!rp) {
915 1.1 rmind return NULL;
916 1.1 rmind }
917 1.44 rmind rp->rproc_dict = nvlist_create(0);
918 1.44 rmind nvlist_add_string(rp->rproc_dict, "name", name);
919 1.44 rmind return rp;
920 1.1 rmind }
921 1.1 rmind
922 1.1 rmind int
923 1.13 rmind npf_rproc_extcall(nl_rproc_t *rp, nl_ext_t *ext)
924 1.1 rmind {
925 1.44 rmind nvlist_t *rproc_dict = rp->rproc_dict;
926 1.44 rmind const char *name = dnvlist_get_string(ext->ext_dict, "name", NULL);
927 1.1 rmind
928 1.44 rmind if (_npf_dataset_lookup(rproc_dict, "extcalls", "name", name)) {
929 1.13 rmind return EEXIST;
930 1.13 rmind }
931 1.44 rmind nvlist_append_nvlist_array(rproc_dict, "extcalls", ext->ext_dict);
932 1.44 rmind nvlist_destroy(ext->ext_dict);
933 1.44 rmind free(ext);
934 1.1 rmind return 0;
935 1.1 rmind }
936 1.1 rmind
937 1.13 rmind bool
938 1.13 rmind npf_rproc_exists_p(nl_config_t *ncf, const char *name)
939 1.1 rmind {
940 1.44 rmind return _npf_dataset_lookup(ncf->ncf_dict, "rprocs", "name", name);
941 1.1 rmind }
942 1.1 rmind
943 1.1 rmind int
944 1.1 rmind npf_rproc_insert(nl_config_t *ncf, nl_rproc_t *rp)
945 1.1 rmind {
946 1.1 rmind const char *name;
947 1.1 rmind
948 1.44 rmind name = dnvlist_get_string(rp->rproc_dict, "name", NULL);
949 1.44 rmind if (!name) {
950 1.1 rmind return EINVAL;
951 1.1 rmind }
952 1.1 rmind if (npf_rproc_exists_p(ncf, name)) {
953 1.1 rmind return EEXIST;
954 1.1 rmind }
955 1.44 rmind nvlist_append_nvlist_array(ncf->ncf_dict, "rprocs", rp->rproc_dict);
956 1.44 rmind nvlist_destroy(rp->rproc_dict);
957 1.44 rmind free(rp);
958 1.1 rmind return 0;
959 1.1 rmind }
960 1.1 rmind
961 1.20 rmind nl_rproc_t *
962 1.46 rmind npf_rproc_iterate(nl_config_t *ncf, nl_iter_t *iter)
963 1.20 rmind {
964 1.44 rmind const nvlist_t *rproc_dict;
965 1.46 rmind unsigned i = *iter;
966 1.20 rmind
967 1.44 rmind rproc_dict = _npf_dataset_getelement(ncf->ncf_dict, "rprocs", i);
968 1.44 rmind if (!rproc_dict) {
969 1.46 rmind *iter = NPF_ITER_BEGIN;
970 1.20 rmind return NULL;
971 1.20 rmind }
972 1.46 rmind *iter = i + 1; // next
973 1.44 rmind ncf->ncf_cur_rproc.rproc_dict = __UNCONST(rproc_dict); // XXX
974 1.20 rmind return &ncf->ncf_cur_rproc;
975 1.20 rmind }
976 1.20 rmind
977 1.20 rmind const char *
978 1.20 rmind npf_rproc_getname(nl_rproc_t *rp)
979 1.20 rmind {
980 1.44 rmind return dnvlist_get_string(rp->rproc_dict, "name", NULL);
981 1.20 rmind }
982 1.20 rmind
983 1.1 rmind /*
984 1.32 rmind * NAT INTERFACE.
985 1.1 rmind */
986 1.1 rmind
987 1.1 rmind nl_nat_t *
988 1.45 rmind npf_nat_create(int type, unsigned flags, const char *ifname)
989 1.1 rmind {
990 1.1 rmind nl_rule_t *rl;
991 1.44 rmind nvlist_t *rule_dict;
992 1.1 rmind uint32_t attr;
993 1.1 rmind
994 1.1 rmind attr = NPF_RULE_PASS | NPF_RULE_FINAL |
995 1.2 rmind (type == NPF_NATOUT ? NPF_RULE_OUT : NPF_RULE_IN);
996 1.1 rmind
997 1.32 rmind /* Create a rule for NAT policy. Next, will add NAT data. */
998 1.22 rmind rl = npf_rule_create(NULL, attr, ifname);
999 1.44 rmind if (!rl) {
1000 1.1 rmind return NULL;
1001 1.1 rmind }
1002 1.44 rmind rule_dict = rl->rule_dict;
1003 1.1 rmind
1004 1.1 rmind /* Translation type and flags. */
1005 1.44 rmind nvlist_add_number(rule_dict, "type", type);
1006 1.44 rmind nvlist_add_number(rule_dict, "flags", flags);
1007 1.46 rmind nvlist_add_bool(rule_dict, "nat-rule", true);
1008 1.1 rmind return (nl_nat_t *)rl;
1009 1.1 rmind }
1010 1.1 rmind
1011 1.1 rmind int
1012 1.46 rmind npf_nat_insert(nl_config_t *ncf, nl_nat_t *nt)
1013 1.1 rmind {
1014 1.44 rmind nvlist_append_nvlist_array(ncf->ncf_dict, "nat", nt->rule_dict);
1015 1.44 rmind nvlist_destroy(nt->rule_dict);
1016 1.44 rmind free(nt);
1017 1.1 rmind return 0;
1018 1.1 rmind }
1019 1.1 rmind
1020 1.20 rmind nl_nat_t *
1021 1.46 rmind npf_nat_iterate(nl_config_t *ncf, nl_iter_t *iter)
1022 1.20 rmind {
1023 1.44 rmind unsigned level;
1024 1.46 rmind return _npf_rule_iterate1(ncf, "nat", iter, &level);
1025 1.20 rmind }
1026 1.20 rmind
1027 1.20 rmind int
1028 1.45 rmind npf_nat_setaddr(nl_nat_t *nt, int af, npf_addr_t *addr, npf_netmask_t mask)
1029 1.45 rmind {
1030 1.45 rmind /* Translation IP and mask. */
1031 1.46 rmind if (!_npf_add_addr(nt->rule_dict, "nat-addr", af, addr)) {
1032 1.45 rmind return nvlist_error(nt->rule_dict);
1033 1.45 rmind }
1034 1.45 rmind nvlist_add_number(nt->rule_dict, "nat-mask", (uint32_t)mask);
1035 1.45 rmind return nvlist_error(nt->rule_dict);
1036 1.45 rmind }
1037 1.45 rmind
1038 1.45 rmind int
1039 1.45 rmind npf_nat_setport(nl_nat_t *nt, in_port_t port)
1040 1.45 rmind {
1041 1.45 rmind /* Translation port (for redirect case). */
1042 1.45 rmind nvlist_add_number(nt->rule_dict, "nat-port", port);
1043 1.45 rmind return nvlist_error(nt->rule_dict);
1044 1.45 rmind }
1045 1.45 rmind
1046 1.45 rmind int
1047 1.45 rmind npf_nat_settable(nl_nat_t *nt, unsigned tid)
1048 1.45 rmind {
1049 1.46 rmind /*
1050 1.46 rmind * Translation table ID; the address/mask will then serve as a filter.
1051 1.46 rmind */
1052 1.45 rmind nvlist_add_number(nt->rule_dict, "nat-table-id", tid);
1053 1.45 rmind return nvlist_error(nt->rule_dict);
1054 1.45 rmind }
1055 1.45 rmind
1056 1.45 rmind int
1057 1.44 rmind npf_nat_setalgo(nl_nat_t *nt, unsigned algo)
1058 1.28 rmind {
1059 1.44 rmind nvlist_add_number(nt->rule_dict, "nat-algo", algo);
1060 1.44 rmind return nvlist_error(nt->rule_dict);
1061 1.28 rmind }
1062 1.28 rmind
1063 1.28 rmind int
1064 1.28 rmind npf_nat_setnpt66(nl_nat_t *nt, uint16_t adj)
1065 1.28 rmind {
1066 1.28 rmind int error;
1067 1.28 rmind
1068 1.28 rmind if ((error = npf_nat_setalgo(nt, NPF_ALGO_NPT66)) != 0) {
1069 1.28 rmind return error;
1070 1.28 rmind }
1071 1.44 rmind nvlist_add_number(nt->rule_dict, "npt66-adj", adj);
1072 1.44 rmind return nvlist_error(nt->rule_dict);
1073 1.28 rmind }
1074 1.28 rmind
1075 1.28 rmind int
1076 1.20 rmind npf_nat_gettype(nl_nat_t *nt)
1077 1.20 rmind {
1078 1.44 rmind return dnvlist_get_number(nt->rule_dict, "type", 0);
1079 1.20 rmind }
1080 1.20 rmind
1081 1.44 rmind unsigned
1082 1.27 rmind npf_nat_getflags(nl_nat_t *nt)
1083 1.27 rmind {
1084 1.44 rmind return dnvlist_get_number(nt->rule_dict, "flags", 0);
1085 1.27 rmind }
1086 1.27 rmind
1087 1.45 rmind unsigned
1088 1.45 rmind npf_nat_getalgo(nl_nat_t *nt)
1089 1.45 rmind {
1090 1.45 rmind return dnvlist_get_number(nt->rule_dict, "nat-algo", 0);
1091 1.45 rmind }
1092 1.45 rmind
1093 1.45 rmind const npf_addr_t *
1094 1.45 rmind npf_nat_getaddr(nl_nat_t *nt, size_t *alen, npf_netmask_t *mask)
1095 1.45 rmind {
1096 1.45 rmind const void *data;
1097 1.45 rmind
1098 1.46 rmind if (nvlist_exists(nt->rule_dict, "nat-addr")) {
1099 1.46 rmind data = nvlist_get_binary(nt->rule_dict, "nat-addr", alen);
1100 1.45 rmind *mask = nvlist_get_number(nt->rule_dict, "nat-mask");
1101 1.45 rmind } else {
1102 1.45 rmind data = NULL;
1103 1.45 rmind *alen = 0;
1104 1.45 rmind *mask = NPF_NO_NETMASK;
1105 1.45 rmind }
1106 1.45 rmind return data;
1107 1.45 rmind }
1108 1.45 rmind
1109 1.45 rmind in_port_t
1110 1.45 rmind npf_nat_getport(nl_nat_t *nt)
1111 1.45 rmind {
1112 1.45 rmind return (uint16_t)dnvlist_get_number(nt->rule_dict, "nat-port", 0);
1113 1.45 rmind }
1114 1.45 rmind
1115 1.45 rmind unsigned
1116 1.45 rmind npf_nat_gettable(nl_nat_t *nt)
1117 1.20 rmind {
1118 1.45 rmind return dnvlist_get_number(nt->rule_dict, "nat-table-id", 0);
1119 1.20 rmind }
1120 1.20 rmind
1121 1.1 rmind /*
1122 1.1 rmind * TABLE INTERFACE.
1123 1.1 rmind */
1124 1.1 rmind
1125 1.1 rmind nl_table_t *
1126 1.44 rmind npf_table_create(const char *name, unsigned id, int type)
1127 1.1 rmind {
1128 1.1 rmind nl_table_t *tl;
1129 1.1 rmind
1130 1.5 christos tl = malloc(sizeof(*tl));
1131 1.44 rmind if (!tl) {
1132 1.1 rmind return NULL;
1133 1.1 rmind }
1134 1.44 rmind tl->table_dict = nvlist_create(0);
1135 1.44 rmind nvlist_add_string(tl->table_dict, "name", name);
1136 1.44 rmind nvlist_add_number(tl->table_dict, "id", id);
1137 1.44 rmind nvlist_add_number(tl->table_dict, "type", type);
1138 1.1 rmind return tl;
1139 1.1 rmind }
1140 1.1 rmind
1141 1.1 rmind int
1142 1.15 rmind npf_table_add_entry(nl_table_t *tl, int af, const npf_addr_t *addr,
1143 1.15 rmind const npf_netmask_t mask)
1144 1.1 rmind {
1145 1.44 rmind nvlist_t *entry;
1146 1.1 rmind
1147 1.44 rmind entry = nvlist_create(0);
1148 1.44 rmind if (!entry) {
1149 1.1 rmind return ENOMEM;
1150 1.1 rmind }
1151 1.44 rmind if (!_npf_add_addr(entry, "addr", af, addr)) {
1152 1.44 rmind nvlist_destroy(entry);
1153 1.15 rmind return EINVAL;
1154 1.15 rmind }
1155 1.44 rmind nvlist_add_number(entry, "mask", mask);
1156 1.44 rmind nvlist_append_nvlist_array(tl->table_dict, "entries", entry);
1157 1.44 rmind nvlist_destroy(entry);
1158 1.1 rmind return 0;
1159 1.1 rmind }
1160 1.1 rmind
1161 1.44 rmind static inline int
1162 1.47 rmind _npf_table_build_const(nl_table_t *tl)
1163 1.26 rmind {
1164 1.44 rmind struct cdbw *cdbw;
1165 1.44 rmind const nvlist_t * const *entries;
1166 1.44 rmind int error = 0, fd = -1;
1167 1.44 rmind size_t nitems, len;
1168 1.44 rmind void *cdb, *buf;
1169 1.44 rmind struct stat sb;
1170 1.44 rmind char sfn[32];
1171 1.44 rmind
1172 1.47 rmind if (dnvlist_get_number(tl->table_dict, "type", 0) != NPF_TABLE_CONST) {
1173 1.47 rmind return 0;
1174 1.47 rmind }
1175 1.47 rmind
1176 1.44 rmind if (!nvlist_exists_nvlist_array(tl->table_dict, "entries")) {
1177 1.44 rmind return 0;
1178 1.44 rmind }
1179 1.44 rmind
1180 1.44 rmind /*
1181 1.44 rmind * Create a constant database and put all the entries.
1182 1.44 rmind */
1183 1.44 rmind if ((cdbw = cdbw_open()) == NULL) {
1184 1.44 rmind return errno;
1185 1.44 rmind }
1186 1.44 rmind entries = nvlist_get_nvlist_array(tl->table_dict, "entries", &nitems);
1187 1.44 rmind for (unsigned i = 0; i < nitems; i++) {
1188 1.44 rmind const nvlist_t *entry = entries[i];
1189 1.44 rmind const npf_addr_t *addr;
1190 1.44 rmind size_t alen;
1191 1.44 rmind
1192 1.44 rmind addr = dnvlist_get_binary(entry, "addr", &alen, NULL, 0);
1193 1.44 rmind if (addr == NULL || alen == 0 || alen > sizeof(npf_addr_t)) {
1194 1.44 rmind error = EINVAL;
1195 1.44 rmind goto out;
1196 1.44 rmind }
1197 1.44 rmind if (cdbw_put(cdbw, addr, alen, addr, alen) == -1) {
1198 1.44 rmind error = errno;
1199 1.44 rmind goto out;
1200 1.44 rmind }
1201 1.44 rmind }
1202 1.26 rmind
1203 1.44 rmind /*
1204 1.46 rmind * Write the constant database into a temporary file.
1205 1.44 rmind */
1206 1.44 rmind strncpy(sfn, "/tmp/npfcdb.XXXXXX", sizeof(sfn));
1207 1.44 rmind sfn[sizeof(sfn) - 1] = '\0';
1208 1.44 rmind
1209 1.44 rmind if ((fd = mkstemp(sfn)) == -1) {
1210 1.44 rmind error = errno;
1211 1.44 rmind goto out;
1212 1.26 rmind }
1213 1.44 rmind unlink(sfn);
1214 1.26 rmind
1215 1.52 riastrad if (cdbw_output(cdbw, fd, "npf-table-cdb", NULL) == -1) {
1216 1.44 rmind error = errno;
1217 1.44 rmind goto out;
1218 1.44 rmind }
1219 1.44 rmind if (fstat(fd, &sb) == -1) {
1220 1.44 rmind error = errno;
1221 1.44 rmind goto out;
1222 1.44 rmind }
1223 1.44 rmind len = sb.st_size;
1224 1.1 rmind
1225 1.44 rmind /*
1226 1.44 rmind * Memory-map the database and copy it into a buffer.
1227 1.44 rmind */
1228 1.44 rmind buf = malloc(len);
1229 1.44 rmind if (!buf) {
1230 1.44 rmind error = ENOMEM;
1231 1.44 rmind goto out;
1232 1.44 rmind }
1233 1.44 rmind cdb = mmap(NULL, len, PROT_READ, MAP_FILE | MAP_PRIVATE, fd, 0);
1234 1.44 rmind if (cdb == MAP_FAILED) {
1235 1.44 rmind error = errno;
1236 1.44 rmind free(buf);
1237 1.44 rmind goto out;
1238 1.44 rmind }
1239 1.44 rmind munmap(cdb, len);
1240 1.24 rmind
1241 1.44 rmind /*
1242 1.44 rmind * Move the data buffer to the nvlist.
1243 1.44 rmind */
1244 1.44 rmind nvlist_move_binary(tl->table_dict, "data", buf, len);
1245 1.44 rmind error = nvlist_error(tl->table_dict);
1246 1.44 rmind out:
1247 1.44 rmind if (fd != -1) {
1248 1.44 rmind close(fd);
1249 1.1 rmind }
1250 1.44 rmind cdbw_close(cdbw);
1251 1.44 rmind return error;
1252 1.1 rmind }
1253 1.1 rmind
1254 1.1 rmind int
1255 1.1 rmind npf_table_insert(nl_config_t *ncf, nl_table_t *tl)
1256 1.1 rmind {
1257 1.44 rmind const char *name;
1258 1.44 rmind int error;
1259 1.1 rmind
1260 1.44 rmind name = dnvlist_get_string(tl->table_dict, "name", NULL);
1261 1.44 rmind if (!name) {
1262 1.1 rmind return EINVAL;
1263 1.1 rmind }
1264 1.44 rmind if (_npf_dataset_lookup(ncf->ncf_dict, "tables", "name", name)) {
1265 1.1 rmind return EEXIST;
1266 1.1 rmind }
1267 1.47 rmind if ((error = _npf_table_build_const(tl)) != 0) {
1268 1.47 rmind return error;
1269 1.44 rmind }
1270 1.44 rmind nvlist_append_nvlist_array(ncf->ncf_dict, "tables", tl->table_dict);
1271 1.44 rmind nvlist_destroy(tl->table_dict);
1272 1.44 rmind free(tl);
1273 1.1 rmind return 0;
1274 1.1 rmind }
1275 1.1 rmind
1276 1.47 rmind int
1277 1.47 rmind npf_table_replace(int fd, nl_table_t *tl, npf_error_t *errinfo)
1278 1.47 rmind {
1279 1.49 rmind nvlist_t *resp = NULL;
1280 1.47 rmind int error;
1281 1.47 rmind
1282 1.47 rmind /* Ensure const tables are built. */
1283 1.47 rmind if ((error = _npf_table_build_const(tl)) != 0) {
1284 1.50 christos return _npf_init_error(errno, errinfo);
1285 1.47 rmind }
1286 1.49 rmind error = _npf_xfer_fd(fd, IOC_NPF_TABLE_REPLACE, tl->table_dict, &resp);
1287 1.49 rmind if (error) {
1288 1.49 rmind assert(resp == NULL);
1289 1.50 christos return _npf_init_error(errno, errinfo);
1290 1.47 rmind }
1291 1.49 rmind error = _npf_extract_error(resp, errinfo);
1292 1.49 rmind nvlist_destroy(resp);
1293 1.47 rmind return error;
1294 1.47 rmind }
1295 1.47 rmind
1296 1.20 rmind nl_table_t *
1297 1.46 rmind npf_table_iterate(nl_config_t *ncf, nl_iter_t *iter)
1298 1.20 rmind {
1299 1.44 rmind const nvlist_t *table_dict;
1300 1.46 rmind unsigned i = *iter;
1301 1.20 rmind
1302 1.44 rmind table_dict = _npf_dataset_getelement(ncf->ncf_dict, "tables", i);
1303 1.44 rmind if (!table_dict) {
1304 1.46 rmind *iter = NPF_ITER_BEGIN;
1305 1.20 rmind return NULL;
1306 1.20 rmind }
1307 1.46 rmind *iter = i + 1; // next
1308 1.44 rmind ncf->ncf_cur_table.table_dict = __UNCONST(table_dict); // XXX
1309 1.20 rmind return &ncf->ncf_cur_table;
1310 1.20 rmind }
1311 1.20 rmind
1312 1.20 rmind unsigned
1313 1.20 rmind npf_table_getid(nl_table_t *tl)
1314 1.20 rmind {
1315 1.44 rmind return dnvlist_get_number(tl->table_dict, "id", (unsigned)-1);
1316 1.20 rmind }
1317 1.20 rmind
1318 1.23 rmind const char *
1319 1.23 rmind npf_table_getname(nl_table_t *tl)
1320 1.23 rmind {
1321 1.44 rmind return dnvlist_get_string(tl->table_dict, "name", NULL);
1322 1.23 rmind }
1323 1.23 rmind
1324 1.20 rmind int
1325 1.20 rmind npf_table_gettype(nl_table_t *tl)
1326 1.20 rmind {
1327 1.44 rmind return dnvlist_get_number(tl->table_dict, "type", 0);
1328 1.20 rmind }
1329 1.20 rmind
1330 1.1 rmind void
1331 1.1 rmind npf_table_destroy(nl_table_t *tl)
1332 1.1 rmind {
1333 1.44 rmind nvlist_destroy(tl->table_dict);
1334 1.1 rmind free(tl);
1335 1.1 rmind }
1336 1.1 rmind
1337 1.1 rmind /*
1338 1.19 christos * ALG INTERFACE.
1339 1.19 christos */
1340 1.19 christos
1341 1.19 christos int
1342 1.46 rmind npf_alg_load(nl_config_t *ncf, const char *name)
1343 1.19 christos {
1344 1.44 rmind nvlist_t *alg_dict;
1345 1.19 christos
1346 1.44 rmind if (_npf_dataset_lookup(ncf->ncf_dict, "algs", "name", name)) {
1347 1.19 christos return EEXIST;
1348 1.44 rmind }
1349 1.44 rmind alg_dict = nvlist_create(0);
1350 1.44 rmind nvlist_add_string(alg_dict, "name", name);
1351 1.44 rmind nvlist_append_nvlist_array(ncf->ncf_dict, "algs", alg_dict);
1352 1.44 rmind nvlist_destroy(alg_dict);
1353 1.19 christos return 0;
1354 1.19 christos }
1355 1.19 christos
1356 1.19 christos /*
1357 1.44 rmind * CONNECTION / NAT ENTRY INTERFACE.
1358 1.1 rmind */
1359 1.1 rmind
1360 1.49 rmind typedef struct {
1361 1.49 rmind unsigned alen;
1362 1.49 rmind unsigned proto;
1363 1.49 rmind npf_addr_t addr[3];
1364 1.49 rmind in_port_t port[3];
1365 1.49 rmind } npf_connpoint_t;
1366 1.49 rmind
1367 1.49 rmind static int
1368 1.49 rmind _npf_conn_lookup(int fd, const int af, npf_addr_t *addr[2], in_port_t port[2],
1369 1.49 rmind unsigned proto, const char *ifname, unsigned di)
1370 1.36 christos {
1371 1.49 rmind nvlist_t *req = NULL, *resp = NULL, *key_nv;
1372 1.44 rmind const nvlist_t *nat;
1373 1.36 christos int error = EINVAL;
1374 1.36 christos
1375 1.44 rmind /*
1376 1.44 rmind * Setup the connection lookup key.
1377 1.44 rmind */
1378 1.49 rmind if ((key_nv = nvlist_create(0)) == NULL) {
1379 1.36 christos return ENOMEM;
1380 1.44 rmind }
1381 1.49 rmind if (!_npf_add_addr(key_nv, "saddr", af, addr[0])) {
1382 1.49 rmind nvlist_destroy(key_nv);
1383 1.38 christos goto out;
1384 1.49 rmind }
1385 1.49 rmind if (!_npf_add_addr(key_nv, "daddr", af, addr[1])) {
1386 1.49 rmind nvlist_destroy(key_nv);
1387 1.38 christos goto out;
1388 1.49 rmind }
1389 1.49 rmind nvlist_add_number(key_nv, "sport", htons(port[0]));
1390 1.49 rmind nvlist_add_number(key_nv, "dport", htons(port[1]));
1391 1.49 rmind nvlist_add_number(key_nv, "proto", proto);
1392 1.49 rmind if (ifname) {
1393 1.49 rmind nvlist_add_string(key_nv, "ifname", ifname);
1394 1.49 rmind }
1395 1.49 rmind if (di) {
1396 1.49 rmind nvlist_add_number(key_nv, "di", di);
1397 1.49 rmind }
1398 1.44 rmind
1399 1.44 rmind /*
1400 1.44 rmind * Setup the request.
1401 1.44 rmind */
1402 1.49 rmind if ((req = nvlist_create(0)) == NULL) {
1403 1.44 rmind error = ENOMEM;
1404 1.38 christos goto out;
1405 1.44 rmind }
1406 1.49 rmind nvlist_move_nvlist(req, "key", key_nv);
1407 1.36 christos
1408 1.44 rmind /* Lookup: retrieve the connection entry. */
1409 1.49 rmind error = _npf_xfer_fd(fd, IOC_NPF_CONN_LOOKUP, req, &resp);
1410 1.49 rmind if (error) {
1411 1.36 christos goto out;
1412 1.44 rmind }
1413 1.36 christos
1414 1.44 rmind /*
1415 1.44 rmind * Get the NAT entry and extract the translated pair.
1416 1.44 rmind */
1417 1.49 rmind if ((nat = dnvlist_get_nvlist(resp, "nat", NULL)) == NULL) {
1418 1.49 rmind error = ENOENT;
1419 1.36 christos goto out;
1420 1.36 christos }
1421 1.49 rmind if (_npf_get_addr(nat, "oaddr", addr[0]) == 0 ||
1422 1.49 rmind _npf_get_addr(nat, "taddr", addr[1]) == 0) {
1423 1.36 christos error = EINVAL;
1424 1.36 christos goto out;
1425 1.36 christos }
1426 1.49 rmind port[0] = ntohs(nvlist_get_number(nat, "oport"));
1427 1.49 rmind port[1] = ntohs(nvlist_get_number(nat, "tport"));
1428 1.36 christos out:
1429 1.49 rmind if (resp) {
1430 1.49 rmind nvlist_destroy(resp);
1431 1.44 rmind }
1432 1.44 rmind if (req) {
1433 1.44 rmind nvlist_destroy(req);
1434 1.44 rmind }
1435 1.36 christos return error;
1436 1.36 christos }
1437 1.41 christos
1438 1.49 rmind int
1439 1.49 rmind npf_nat_lookup(int fd, int af, npf_addr_t *addr[2], in_port_t port[2],
1440 1.49 rmind int proto, int di __unused)
1441 1.49 rmind {
1442 1.49 rmind int error;
1443 1.49 rmind
1444 1.49 rmind port[0] = ntohs(port[0]); port[1] = ntohs(port[1]);
1445 1.49 rmind error = _npf_conn_lookup(fd, af, addr, port, proto, NULL, 0);
1446 1.49 rmind port[0] = htons(port[0]); port[1] = htons(port[1]);
1447 1.49 rmind return error;
1448 1.49 rmind }
1449 1.41 christos
1450 1.41 christos static bool
1451 1.49 rmind npf_connkey_handle(const nvlist_t *key_nv, npf_connpoint_t *ep)
1452 1.41 christos {
1453 1.49 rmind unsigned alen1, alen2;
1454 1.44 rmind
1455 1.49 rmind alen1 = _npf_get_addr(key_nv, "saddr", &ep->addr[0]);
1456 1.49 rmind alen2 = _npf_get_addr(key_nv, "daddr", &ep->addr[1]);
1457 1.49 rmind if (alen1 == 0 || alen1 != alen2) {
1458 1.41 christos return false;
1459 1.49 rmind }
1460 1.49 rmind ep->alen = alen1;
1461 1.49 rmind ep->port[0] = ntohs(nvlist_get_number(key_nv, "sport"));
1462 1.49 rmind ep->port[1] = ntohs(nvlist_get_number(key_nv, "dport"));
1463 1.49 rmind ep->proto = nvlist_get_number(key_nv, "proto");
1464 1.41 christos return true;
1465 1.41 christos }
1466 1.41 christos
1467 1.41 christos static void
1468 1.44 rmind npf_conn_handle(const nvlist_t *conn, npf_conn_func_t func, void *arg)
1469 1.41 christos {
1470 1.49 rmind const nvlist_t *key_nv, *nat_nv;
1471 1.41 christos const char *ifname;
1472 1.49 rmind npf_connpoint_t ep;
1473 1.49 rmind
1474 1.49 rmind memset(&ep, 0, sizeof(npf_connpoint_t));
1475 1.41 christos
1476 1.44 rmind ifname = dnvlist_get_string(conn, "ifname", NULL);
1477 1.49 rmind key_nv = dnvlist_get_nvlist(conn, "forw-key", NULL);
1478 1.49 rmind if (!npf_connkey_handle(key_nv, &ep)) {
1479 1.41 christos goto err;
1480 1.41 christos }
1481 1.49 rmind if ((nat_nv = dnvlist_get_nvlist(conn, "nat", NULL)) != NULL) {
1482 1.49 rmind if (_npf_get_addr(nat_nv, "taddr", &ep.addr[2]) != ep.alen) {
1483 1.49 rmind goto err;
1484 1.49 rmind }
1485 1.49 rmind ep.port[2] = ntohs(nvlist_get_number(nat_nv, "tport"));
1486 1.44 rmind }
1487 1.49 rmind /*
1488 1.49 rmind * XXX: add 'proto' and 'flow'; perhaps expand and pass the
1489 1.49 rmind * whole to npf_connpoint_t?
1490 1.49 rmind */
1491 1.49 rmind (*func)((unsigned)ep.alen, ep.addr, ep.port, ifname, arg);
1492 1.41 christos err:
1493 1.41 christos return;
1494 1.41 christos }
1495 1.41 christos
1496 1.41 christos int
1497 1.44 rmind npf_conn_list(int fd, npf_conn_func_t func, void *arg)
1498 1.41 christos {
1499 1.41 christos nl_config_t *ncf;
1500 1.44 rmind const nvlist_t * const *conns;
1501 1.44 rmind size_t nitems;
1502 1.41 christos
1503 1.41 christos ncf = npf_config_retrieve(fd);
1504 1.44 rmind if (!ncf) {
1505 1.41 christos return errno;
1506 1.41 christos }
1507 1.44 rmind if (!nvlist_exists_nvlist_array(ncf->ncf_dict, "conn-list")) {
1508 1.44 rmind return 0;
1509 1.44 rmind }
1510 1.44 rmind conns = nvlist_get_nvlist_array(ncf->ncf_dict, "conn-list", &nitems);
1511 1.44 rmind for (unsigned i = 0; i < nitems; i++) {
1512 1.44 rmind const nvlist_t *conn = conns[i];
1513 1.44 rmind npf_conn_handle(conn, func, arg);
1514 1.44 rmind }
1515 1.49 rmind npf_config_destroy(ncf);
1516 1.44 rmind return 0;
1517 1.44 rmind }
1518 1.42 rmind
1519 1.44 rmind /*
1520 1.44 rmind * MISC.
1521 1.44 rmind */
1522 1.44 rmind
1523 1.44 rmind void
1524 1.44 rmind _npf_debug_addif(nl_config_t *ncf, const char *ifname)
1525 1.44 rmind {
1526 1.44 rmind nvlist_t *debug;
1527 1.44 rmind
1528 1.44 rmind /*
1529 1.44 rmind * Initialise the debug dictionary on the first call.
1530 1.44 rmind */
1531 1.44 rmind debug = dnvlist_take_nvlist(ncf->ncf_dict, "debug", NULL);
1532 1.44 rmind if (debug == NULL) {
1533 1.44 rmind debug = nvlist_create(0);
1534 1.44 rmind }
1535 1.44 rmind if (!_npf_dataset_lookup(debug, "interfaces", "name", ifname)) {
1536 1.44 rmind nvlist_t *ifdict = nvlist_create(0);
1537 1.44 rmind nvlist_add_string(ifdict, "name", ifname);
1538 1.44 rmind nvlist_add_number(ifdict, "index", if_nametoindex(ifname));
1539 1.44 rmind nvlist_append_nvlist_array(debug, "interfaces", ifdict);
1540 1.44 rmind nvlist_destroy(ifdict);
1541 1.42 rmind }
1542 1.44 rmind nvlist_move_nvlist(ncf->ncf_dict, "debug", debug);
1543 1.44 rmind }
1544 1.42 rmind
1545 1.44 rmind void
1546 1.44 rmind _npf_config_dump(nl_config_t *ncf, int fd)
1547 1.44 rmind {
1548 1.44 rmind (void)npf_config_build(ncf);
1549 1.44 rmind nvlist_dump(ncf->ncf_dict, fd);
1550 1.41 christos }
1551