pf_if.c revision 1.3 1 /* $NetBSD: pf_if.c,v 1.3 2004/06/29 04:42:55 itojun Exp $ */
2 /* $OpenBSD: pf_if.c,v 1.11 2004/03/15 11:38:23 cedric Exp $ */
3
4 /*
5 * Copyright (c) 2001 Daniel Hartmeier
6 * Copyright (c) 2003 Cedric Berger
7 * All rights reserved.
8 *
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions
11 * are met:
12 *
13 * - Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
15 * - Redistributions in binary form must reproduce the above
16 * copyright notice, this list of conditions and the following
17 * disclaimer in the documentation and/or other materials provided
18 * with the distribution.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
21 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
22 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
23 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
24 * COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
25 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
26 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
27 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
28 * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
30 * ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
31 * POSSIBILITY OF SUCH DAMAGE.
32 */
33
34 #ifdef _KERNEL_OPT
35 #include "opt_inet.h"
36 #endif
37
38 #include <sys/param.h>
39 #include <sys/systm.h>
40 #include <sys/mbuf.h>
41 #include <sys/filio.h>
42 #include <sys/socket.h>
43 #include <sys/socketvar.h>
44 #include <sys/kernel.h>
45 #include <sys/device.h>
46 #include <sys/time.h>
47
48 #include <net/if.h>
49 #include <net/if_types.h>
50
51 #include <netinet/in.h>
52 #include <netinet/in_var.h>
53 #include <netinet/in_systm.h>
54 #include <netinet/ip.h>
55 #include <netinet/ip_var.h>
56
57 #include <net/pfvar.h>
58
59 #ifdef INET6
60 #include <netinet/ip6.h>
61 #endif /* INET6 */
62
63 #define ACCEPT_FLAGS(oklist) \
64 do { \
65 if ((flags & ~(oklist)) & \
66 PFI_FLAG_ALLMASK) \
67 return (EINVAL); \
68 } while (0)
69
70 #define senderr(e) do { rv = (e); goto _bad; } while (0)
71
72 struct pfi_kif **pfi_index2kif;
73 struct pfi_kif *pfi_self;
74 int pfi_indexlim;
75 struct pfi_ifhead pfi_ifs;
76 struct pfi_statehead pfi_statehead;
77 int pfi_ifcnt;
78 struct pool pfi_addr_pl;
79 long pfi_update = 1;
80 struct pfr_addr *pfi_buffer;
81 int pfi_buffer_cnt;
82 int pfi_buffer_max;
83 char pfi_reserved_anchor[PF_ANCHOR_NAME_SIZE] =
84 PF_RESERVED_ANCHOR;
85 char pfi_interface_ruleset[PF_RULESET_NAME_SIZE] =
86 PF_INTERFACE_RULESET;
87
88 void pfi_dynaddr_update(void *);
89 void pfi_kifaddr_update(void *);
90 void pfi_table_update(struct pfr_ktable *, struct pfi_kif *,
91 int, int);
92 void pfi_instance_add(struct ifnet *, int, int);
93 void pfi_address_add(struct sockaddr *, int, int);
94 int pfi_if_compare(struct pfi_kif *, struct pfi_kif *);
95 struct pfi_kif *pfi_if_create(const char *, struct pfi_kif *, int);
96 void pfi_copy_group(char *, const char *, int);
97 void pfi_dynamic_drivers(void);
98 void pfi_newgroup(const char *, int);
99 int pfi_skip_if(const char *, struct pfi_kif *, int);
100 int pfi_unmask(void *);
101 void pfi_dohooks(struct pfi_kif *);
102
103 RB_PROTOTYPE(pfi_ifhead, pfi_kif, pfik_tree, pfi_if_compare);
104 RB_GENERATE(pfi_ifhead, pfi_kif, pfik_tree, pfi_if_compare);
105
106 #define PFI_DYNAMIC_BUSES { "pcmcia", "cardbus", "uhub" }
107 #define PFI_BUFFER_MAX 0x10000
108 #define PFI_MTYPE M_IFADDR
109
110 #ifdef __NetBSD__
111 static void *hook_establish(struct hook_desc_head *, int, void (*)(void *),
112 void *);
113 static void hook_disestablish(struct hook_desc_head *, void *);
114
115 #define HOOK_REMOVE 0x01
116 #define HOOK_FREE 0x02
117 #endif
118
119 void
120 pfi_initialize(void)
121 {
122 if (pfi_self != NULL) /* already initialized */
123 return;
124
125 TAILQ_INIT(&pfi_statehead);
126 pool_init(&pfi_addr_pl, sizeof(struct pfi_dynaddr), 0, 0, 0,
127 "pfiaddrpl", &pool_allocator_nointr);
128 pfi_buffer_max = 64;
129 pfi_buffer = malloc(pfi_buffer_max * sizeof(*pfi_buffer),
130 PFI_MTYPE, M_WAITOK);
131 pfi_self = pfi_if_create("self", NULL, PFI_IFLAG_GROUP);
132 pfi_dynamic_drivers();
133 }
134
135 #ifdef _LKM
136 void
137 pfi_destroy(void)
138 {
139 struct pfi_kif *p;
140
141 while ((p = TAILQ_FIRST(&pfi_statehead)) != NULL) {
142 TAILQ_REMOVE(&pfi_statehead, p, pfik_w_states);
143 free(p, PFI_MTYPE);
144 }
145 pool_destroy(&pfi_addr_pl);
146
147 pfi_self = NULL;
148 }
149 #endif
150
151 void
152 pfi_attach_clone(struct if_clone *ifc)
153 {
154 pfi_initialize();
155 pfi_newgroup(ifc->ifc_name, PFI_IFLAG_CLONABLE);
156 }
157
158 void
159 pfi_attach_ifnet(struct ifnet *ifp)
160 {
161 struct pfi_kif *p, *q, key;
162 int s;
163
164 pfi_initialize();
165 s = splsoftnet();
166 pfi_update++;
167 if (ifp->if_index >= pfi_indexlim) {
168 /*
169 * grow pfi_index2kif, similar to ifindex2ifnet code in if.c
170 */
171 size_t m, n, oldlim;
172 struct pfi_kif **mp, **np;
173
174 oldlim = pfi_indexlim;
175 if (pfi_indexlim == 0)
176 pfi_indexlim = 64;
177 while (ifp->if_index >= pfi_indexlim)
178 pfi_indexlim <<= 1;
179
180 m = oldlim * sizeof(struct pfi_kif *);
181 mp = pfi_index2kif;
182 n = pfi_indexlim * sizeof(struct pfi_kif *);
183 np = malloc(n, PFI_MTYPE, M_DONTWAIT);
184 if (np == NULL)
185 panic("pfi_attach_ifnet: "
186 "cannot allocate translation table");
187 bzero(np, n);
188 if (mp != NULL)
189 bcopy(mp, np, m);
190 pfi_index2kif = np;
191 if (mp != NULL)
192 free(mp, PFI_MTYPE);
193 }
194
195 strlcpy(key.pfik_name, ifp->if_xname, sizeof(key.pfik_name));
196 p = RB_FIND(pfi_ifhead, &pfi_ifs, &key);
197 if (p == NULL) {
198 /* add group */
199 pfi_copy_group(key.pfik_name, ifp->if_xname,
200 sizeof(key.pfik_name));
201 q = RB_FIND(pfi_ifhead, &pfi_ifs, &key);
202 if (q == NULL)
203 q = pfi_if_create(key.pfik_name, pfi_self, PFI_IFLAG_GROUP);
204 if (q == NULL)
205 panic("pfi_attach_ifnet: "
206 "cannot allocate '%s' group", key.pfik_name);
207
208 /* add interface */
209 p = pfi_if_create(ifp->if_xname, q, PFI_IFLAG_INSTANCE);
210 if (p == NULL)
211 panic("pfi_attach_ifnet: "
212 "cannot allocate '%s' interface", ifp->if_xname);
213 } else
214 q = p->pfik_parent;
215 p->pfik_ifp = ifp;
216 p->pfik_flags |= PFI_IFLAG_ATTACHED;
217 #ifdef __OpenBSD__
218 p->pfik_ah_cookie =
219 hook_establish(ifp->if_addrhooks, 1, pfi_kifaddr_update, p);
220 #else
221 p->pfik_ah_cookie =
222 hook_establish(p->pfik_ifaddrhooks, 1, pfi_kifaddr_update, p);
223 #endif
224 pfi_index2kif[ifp->if_index] = p;
225 pfi_dohooks(p);
226 splx(s);
227 }
228
229 void
230 pfi_detach_ifnet(struct ifnet *ifp)
231 {
232 struct pfi_kif *p, *q, key;
233 int s;
234
235 strlcpy(key.pfik_name, ifp->if_xname, sizeof(key.pfik_name));
236
237 s = splsoftnet();
238 pfi_update++;
239 p = RB_FIND(pfi_ifhead, &pfi_ifs, &key);
240 if (p == NULL) {
241 printf("pfi_detach_ifnet: cannot find %s", ifp->if_xname);
242 splx(s);
243 return;
244 }
245 #ifdef __OpenBSD__
246 hook_disestablish(p->pfik_ifp->if_addrhooks, p->pfik_ah_cookie);
247 #else
248 hook_disestablish(p->pfik_ifaddrhooks, p->pfik_ah_cookie);
249 #endif
250 q = p->pfik_parent;
251 p->pfik_ifp = NULL;
252 p->pfik_flags &= ~PFI_IFLAG_ATTACHED;
253 pfi_index2kif[ifp->if_index] = NULL;
254 pfi_dohooks(p);
255 pfi_maybe_destroy(p);
256 splx(s);
257 }
258
259 struct pfi_kif *
260 pfi_lookup_create(const char *name)
261 {
262 struct pfi_kif *p, *q, key;
263 int s;
264
265 s = splsoftnet();
266 p = pfi_lookup_if(name);
267 if (p == NULL) {
268 pfi_copy_group(key.pfik_name, name, sizeof(key.pfik_name));
269 q = pfi_lookup_if(key.pfik_name);
270 if (q != NULL)
271 p = pfi_if_create(name, q, PFI_IFLAG_INSTANCE);
272 }
273 splx(s);
274 return (p);
275 }
276
277 struct pfi_kif *
278 pfi_attach_rule(const char *name)
279 {
280 struct pfi_kif *p;
281
282 p = pfi_lookup_create(name);
283 if (p != NULL)
284 p->pfik_rules++;
285 return (p);
286 }
287
288 void
289 pfi_detach_rule(struct pfi_kif *p)
290 {
291 if (p == NULL)
292 return;
293 if (p->pfik_rules > 0)
294 p->pfik_rules--;
295 else
296 printf("pfi_detach_rule: reference count at 0\n");
297 pfi_maybe_destroy(p);
298 }
299
300 void
301 pfi_attach_state(struct pfi_kif *p)
302 {
303 if (!p->pfik_states++)
304 TAILQ_INSERT_TAIL(&pfi_statehead, p, pfik_w_states);
305 }
306
307 void
308 pfi_detach_state(struct pfi_kif *p)
309 {
310 if (p == NULL)
311 return;
312 if (p->pfik_states <= 0) {
313 printf("pfi_detach_state: reference count <= 0\n");
314 return;
315 }
316 if (!--p->pfik_states)
317 TAILQ_REMOVE(&pfi_statehead, p, pfik_w_states);
318 pfi_maybe_destroy(p);
319 }
320
321 int
322 pfi_dynaddr_setup(struct pf_addr_wrap *aw, sa_family_t af)
323 {
324 struct pfi_dynaddr *dyn;
325 char tblname[PF_TABLE_NAME_SIZE];
326 struct pf_ruleset *ruleset = NULL;
327 int s, rv = 0;
328
329 if (aw->type != PF_ADDR_DYNIFTL)
330 return (0);
331 dyn = pool_get(&pfi_addr_pl, PR_NOWAIT);
332 if (dyn == NULL)
333 return (1);
334 bzero(dyn, sizeof(*dyn));
335
336 s = splsoftnet();
337 dyn->pfid_kif = pfi_attach_rule(aw->v.ifname);
338 if (dyn->pfid_kif == NULL)
339 senderr(1);
340
341 dyn->pfid_net = pfi_unmask(&aw->v.a.mask);
342 if (af == AF_INET && dyn->pfid_net == 32)
343 dyn->pfid_net = 128;
344 strlcpy(tblname, aw->v.ifname, sizeof(tblname));
345 if (aw->iflags & PFI_AFLAG_NETWORK)
346 strlcat(tblname, ":network", sizeof(tblname));
347 if (aw->iflags & PFI_AFLAG_BROADCAST)
348 strlcat(tblname, ":broadcast", sizeof(tblname));
349 if (aw->iflags & PFI_AFLAG_PEER)
350 strlcat(tblname, ":peer", sizeof(tblname));
351 if (aw->iflags & PFI_AFLAG_NOALIAS)
352 strlcat(tblname, ":0", sizeof(tblname));
353 if (dyn->pfid_net != 128)
354 snprintf(tblname + strlen(tblname),
355 sizeof(tblname) - strlen(tblname), "/%d", dyn->pfid_net);
356 ruleset = pf_find_or_create_ruleset(pfi_reserved_anchor,
357 pfi_interface_ruleset);
358 if (ruleset == NULL)
359 senderr(1);
360
361 dyn->pfid_kt = pfr_attach_table(ruleset, tblname);
362 if (dyn->pfid_kt == NULL)
363 senderr(1);
364
365 dyn->pfid_kt->pfrkt_flags |= PFR_TFLAG_ACTIVE;
366 dyn->pfid_iflags = aw->iflags;
367 dyn->pfid_af = af;
368 dyn->pfid_hook_cookie = hook_establish(dyn->pfid_kif->pfik_ah_head, 1,
369 pfi_dynaddr_update, dyn);
370 if (dyn->pfid_hook_cookie == NULL)
371 senderr(1);
372
373 aw->p.dyn = dyn;
374 pfi_dynaddr_update(aw->p.dyn);
375 splx(s);
376 return (0);
377
378 _bad:
379 if (dyn->pfid_kt != NULL)
380 pfr_detach_table(dyn->pfid_kt);
381 if (ruleset != NULL)
382 pf_remove_if_empty_ruleset(ruleset);
383 if (dyn->pfid_kif != NULL)
384 pfi_detach_rule(dyn->pfid_kif);
385 pool_put(&pfi_addr_pl, dyn);
386 splx(s);
387 return (rv);
388 }
389
390 void
391 pfi_dynaddr_update(void *p)
392 {
393 struct pfi_dynaddr *dyn = (struct pfi_dynaddr *)p;
394 struct pfi_kif *kif = dyn->pfid_kif;
395 struct pfr_ktable *kt = dyn->pfid_kt;
396
397 if (dyn == NULL || kif == NULL || kt == NULL)
398 panic("pfi_dynaddr_update");
399 if (kt->pfrkt_larg != pfi_update) {
400 /* this table needs to be brought up-to-date */
401 pfi_table_update(kt, kif, dyn->pfid_net, dyn->pfid_iflags);
402 kt->pfrkt_larg = pfi_update;
403 }
404 pfr_dynaddr_update(kt, dyn);
405 }
406
407 void
408 pfi_table_update(struct pfr_ktable *kt, struct pfi_kif *kif, int net, int flags)
409 {
410 int e, size2 = 0;
411 struct pfi_kif *p;
412 struct pfr_table t;
413
414 if ((kif->pfik_flags & PFI_IFLAG_INSTANCE) && kif->pfik_ifp == NULL) {
415 pfr_clr_addrs(&kt->pfrkt_t, NULL, 0);
416 return;
417 }
418 pfi_buffer_cnt = 0;
419 if ((kif->pfik_flags & PFI_IFLAG_INSTANCE))
420 pfi_instance_add(kif->pfik_ifp, net, flags);
421 else if (strcmp(kif->pfik_name, "self")) {
422 TAILQ_FOREACH(p, &kif->pfik_grouphead, pfik_instances)
423 pfi_instance_add(p->pfik_ifp, net, flags);
424 } else {
425 RB_FOREACH(p, pfi_ifhead, &pfi_ifs)
426 if (p->pfik_flags & PFI_IFLAG_INSTANCE)
427 pfi_instance_add(p->pfik_ifp, net, flags);
428 }
429 t = kt->pfrkt_t;
430 t.pfrt_flags = 0;
431 if ((e = pfr_set_addrs(&t, pfi_buffer, pfi_buffer_cnt, &size2,
432 NULL, NULL, NULL, 0)))
433 printf("pfi_table_update: cannot set %d new addresses "
434 "into table %s: %d\n", pfi_buffer_cnt, kt->pfrkt_name, e);
435 }
436
437 void
438 pfi_instance_add(struct ifnet *ifp, int net, int flags)
439 {
440 struct ifaddr *ia;
441 int got4 = 0, got6 = 0;
442 int net2, af;
443
444 if (ifp == NULL)
445 return;
446 TAILQ_FOREACH(ia, &ifp->if_addrlist, ifa_list) {
447 if (ia->ifa_addr == NULL)
448 continue;
449 af = ia->ifa_addr->sa_family;
450 if (af != AF_INET && af != AF_INET6)
451 continue;
452 if ((flags & PFI_AFLAG_BROADCAST) && af == AF_INET6)
453 continue;
454 if ((flags & PFI_AFLAG_BROADCAST) &&
455 !(ifp->if_flags & IFF_BROADCAST))
456 continue;
457 if ((flags & PFI_AFLAG_PEER) &&
458 !(ifp->if_flags & IFF_POINTOPOINT))
459 continue;
460 if ((flags & PFI_AFLAG_NETWORK) && af == AF_INET6 &&
461 IN6_IS_ADDR_LINKLOCAL(
462 &((struct sockaddr_in6 *)ia->ifa_addr)->sin6_addr))
463 continue;
464 if (flags & PFI_AFLAG_NOALIAS) {
465 if (af == AF_INET && got4)
466 continue;
467 if (af == AF_INET6 && got6)
468 continue;
469 }
470 if (af == AF_INET)
471 got4 = 1;
472 else
473 got6 = 1;
474 net2 = net;
475 if (net2 == 128 && (flags & PFI_AFLAG_NETWORK)) {
476 if (af == AF_INET) {
477 net2 = pfi_unmask(&((struct sockaddr_in *)
478 ia->ifa_netmask)->sin_addr);
479 } else {
480 net2 = pfi_unmask(&((struct sockaddr_in6 *)
481 ia->ifa_netmask)->sin6_addr);
482 }
483 }
484 if (af == AF_INET && net2 > 32)
485 net2 = 32;
486 if (flags & PFI_AFLAG_BROADCAST)
487 pfi_address_add(ia->ifa_broadaddr, af, net2);
488 else if (flags & PFI_AFLAG_PEER)
489 pfi_address_add(ia->ifa_dstaddr, af, net2);
490 else
491 pfi_address_add(ia->ifa_addr, af, net2);
492 }
493 }
494
495 void
496 pfi_address_add(struct sockaddr *sa, int af, int net)
497 {
498 struct pfr_addr *p;
499 int i;
500
501 if (pfi_buffer_cnt >= pfi_buffer_max) {
502 int new_max = pfi_buffer_max * 2;
503
504 if (new_max > PFI_BUFFER_MAX) {
505 printf("pfi_address_add: address buffer full (%d/%d)\n",
506 pfi_buffer_cnt, PFI_BUFFER_MAX);
507 return;
508 }
509 p = malloc(new_max * sizeof(*pfi_buffer), PFI_MTYPE,
510 M_DONTWAIT);
511 if (p == NULL) {
512 printf("pfi_address_add: no memory to grow buffer "
513 "(%d/%d)\n", pfi_buffer_cnt, PFI_BUFFER_MAX);
514 return;
515 }
516 memcpy(pfi_buffer, p, pfi_buffer_cnt * sizeof(*pfi_buffer));
517 /* no need to zero buffer */
518 free(pfi_buffer, PFI_MTYPE);
519 pfi_buffer = p;
520 pfi_buffer_max = new_max;
521 }
522 if (af == AF_INET && net > 32)
523 net = 128;
524 p = pfi_buffer + pfi_buffer_cnt++;
525 bzero(p, sizeof(*p));
526 p->pfra_af = af;
527 p->pfra_net = net;
528 if (af == AF_INET)
529 p->pfra_ip4addr = ((struct sockaddr_in *)sa)->sin_addr;
530 if (af == AF_INET6) {
531 p->pfra_ip6addr = ((struct sockaddr_in6 *)sa)->sin6_addr;
532 if (IN6_IS_ADDR_LINKLOCAL(&p->pfra_ip6addr))
533 p->pfra_ip6addr.s6_addr16[1] = 0;
534 }
535 /* mask network address bits */
536 if (net < 128)
537 ((caddr_t)p)[p->pfra_net/8] &= ~(0xFF >> (p->pfra_net%8));
538 for (i = (p->pfra_net+7)/8; i < sizeof(p->pfra_u); i++)
539 ((caddr_t)p)[i] = 0;
540 }
541
542 void
543 pfi_dynaddr_remove(struct pf_addr_wrap *aw)
544 {
545 int s;
546
547 if (aw->type != PF_ADDR_DYNIFTL || aw->p.dyn == NULL ||
548 aw->p.dyn->pfid_kif == NULL || aw->p.dyn->pfid_kt == NULL)
549 return;
550
551 s = splsoftnet();
552 hook_disestablish(aw->p.dyn->pfid_kif->pfik_ah_head,
553 aw->p.dyn->pfid_hook_cookie);
554 pfi_detach_rule(aw->p.dyn->pfid_kif);
555 aw->p.dyn->pfid_kif = NULL;
556 pfr_detach_table(aw->p.dyn->pfid_kt);
557 aw->p.dyn->pfid_kt = NULL;
558 pool_put(&pfi_addr_pl, aw->p.dyn);
559 aw->p.dyn = NULL;
560 splx(s);
561 }
562
563 void
564 pfi_dynaddr_copyout(struct pf_addr_wrap *aw)
565 {
566 if (aw->type != PF_ADDR_DYNIFTL || aw->p.dyn == NULL ||
567 aw->p.dyn->pfid_kif == NULL)
568 return;
569 aw->p.dyncnt = aw->p.dyn->pfid_acnt4 + aw->p.dyn->pfid_acnt6;
570 }
571
572 void
573 pfi_kifaddr_update(void *v)
574 {
575 int s;
576
577 s = splsoftnet();
578 pfi_update++;
579 pfi_dohooks(v);
580 splx(s);
581 }
582
583 int
584 pfi_if_compare(struct pfi_kif *p, struct pfi_kif *q)
585 {
586 return (strncmp(p->pfik_name, q->pfik_name, IFNAMSIZ));
587 }
588
589 struct pfi_kif *
590 pfi_if_create(const char *name, struct pfi_kif *q, int flags)
591 {
592 struct pfi_kif *p;
593
594 p = malloc(sizeof(*p), PFI_MTYPE, M_DONTWAIT);
595 if (p == NULL)
596 return (NULL);
597 bzero(p, sizeof(*p));
598 p->pfik_ah_head = malloc(sizeof(*p->pfik_ah_head), PFI_MTYPE,
599 M_DONTWAIT);
600 if (p->pfik_ah_head == NULL) {
601 free(p, PFI_MTYPE);
602 return (NULL);
603 }
604 bzero(p->pfik_ah_head, sizeof(*p->pfik_ah_head));
605 #ifdef __NetBSD__
606 p->pfik_ifaddrhooks = malloc(sizeof(*p->pfik_ifaddrhooks), PFI_MTYPE,
607 M_DONTWAIT);
608 if (p->pfik_ifaddrhooks == NULL) {
609 free(p->pfik_ah_head, PFI_MTYPE);
610 free(p, PFI_MTYPE);
611 return (NULL);
612 }
613 bzero(p->pfik_ifaddrhooks, sizeof(*p->pfik_ifaddrhooks));
614 #endif
615 TAILQ_INIT(p->pfik_ah_head);
616 TAILQ_INIT(&p->pfik_grouphead);
617 #ifdef __NetBSD__
618 TAILQ_INIT(p->pfik_ifaddrhooks);
619 #endif
620 strlcpy(p->pfik_name, name, sizeof(p->pfik_name));
621 RB_INIT(&p->pfik_lan_ext);
622 RB_INIT(&p->pfik_ext_gwy);
623 p->pfik_flags = flags;
624 p->pfik_parent = q;
625 p->pfik_tzero = time.tv_sec;
626
627 RB_INSERT(pfi_ifhead, &pfi_ifs, p);
628 if (q != NULL) {
629 q->pfik_addcnt++;
630 TAILQ_INSERT_TAIL(&q->pfik_grouphead, p, pfik_instances);
631 }
632 pfi_ifcnt++;
633 return (p);
634 }
635
636 int
637 pfi_maybe_destroy(struct pfi_kif *p)
638 {
639 int i, j, k, s;
640 struct pfi_kif *q = p->pfik_parent;
641
642 if ((p->pfik_flags & (PFI_IFLAG_ATTACHED | PFI_IFLAG_GROUP)) ||
643 p->pfik_rules > 0 || p->pfik_states > 0)
644 return (0);
645
646 s = splsoftnet();
647 if (q != NULL) {
648 for (i = 0; i < 2; i++)
649 for (j = 0; j < 2; j++)
650 for (k = 0; k < 2; k++) {
651 q->pfik_bytes[i][j][k] +=
652 p->pfik_bytes[i][j][k];
653 q->pfik_packets[i][j][k] +=
654 p->pfik_packets[i][j][k];
655 }
656 q->pfik_delcnt++;
657 TAILQ_REMOVE(&q->pfik_grouphead, p, pfik_instances);
658 }
659 pfi_ifcnt--;
660 RB_REMOVE(pfi_ifhead, &pfi_ifs, p);
661 splx(s);
662
663 free(p->pfik_ah_head, PFI_MTYPE);
664 free(p, PFI_MTYPE);
665 return (1);
666 }
667
668 void
669 pfi_copy_group(char *p, const char *q, int m)
670 {
671 while (m > 1 && *q && !(*q >= '0' && *q <= '9')) {
672 *p++ = *q++;
673 m--;
674 }
675 if (m > 0)
676 *p++ = '\0';
677 }
678
679 void
680 pfi_dynamic_drivers(void)
681 {
682 #ifdef __OpenBSD__
683 char *buses[] = PFI_DYNAMIC_BUSES;
684 int nbuses = sizeof(buses)/sizeof(buses[0]);
685 int enabled[sizeof(buses)/sizeof(buses[0])];
686 struct device *dev;
687 struct cfdata *cf;
688 struct cfdriver *drv;
689 short *p;
690 int i;
691
692 bzero(enabled, sizeof(enabled));
693 TAILQ_FOREACH(dev, &alldevs, dv_list) {
694 if (!(dev->dv_flags & DVF_ACTIVE))
695 continue;
696 for (i = 0; i < nbuses; i++)
697 if (!enabled[i] && !strcmp(buses[i],
698 dev->dv_cfdata->cf_driver->cd_name))
699 enabled[i] = 1;
700 }
701 for (cf = cfdata; cf->cf_driver; cf++) {
702 if (cf->cf_driver->cd_class != DV_IFNET)
703 continue;
704 for (p = cf->cf_parents; p && *p >= 0; p++) {
705 if ((drv = cfdata[*p].cf_driver) == NULL)
706 continue;
707 for (i = 0; i < nbuses; i++)
708 if (enabled[i] &&
709 !strcmp(drv->cd_name, buses[i]))
710 break;
711 if (i < nbuses) {
712 pfi_newgroup(cf->cf_driver->cd_name,
713 PFI_IFLAG_DYNAMIC);
714 break;
715 }
716 }
717 }
718 #else
719 struct if_clone *ifc;
720 extern LIST_HEAD(if_cloners, if_clone) if_cloners;
721
722 LIST_FOREACH(ifc, &if_cloners, ifc_list)
723 pfi_newgroup(ifc->ifc_name, PFI_IFLAG_DYNAMIC);
724 #endif
725 }
726
727 void
728 pfi_newgroup(const char *name, int flags)
729 {
730 struct pfi_kif *p;
731
732 p = pfi_lookup_if(name);
733 if (p == NULL)
734 p = pfi_if_create(name, pfi_self, PFI_IFLAG_GROUP);
735 if (p == NULL) {
736 printf("pfi_newgroup: cannot allocate '%s' group", name);
737 return;
738 }
739 p->pfik_flags |= flags;
740 }
741
742 void
743 pfi_fill_oldstatus(struct pf_status *pfs)
744 {
745 struct pfi_kif *p, key;
746 int i, j, k, s;
747
748 strlcpy(key.pfik_name, pfs->ifname, sizeof(key.pfik_name));
749 s = splsoftnet();
750 p = RB_FIND(pfi_ifhead, &pfi_ifs, &key);
751 if (p == NULL) {
752 splx(s);
753 return;
754 }
755 bzero(pfs->pcounters, sizeof(pfs->pcounters));
756 bzero(pfs->bcounters, sizeof(pfs->bcounters));
757 for (i = 0; i < 2; i++)
758 for (j = 0; j < 2; j++)
759 for (k = 0; k < 2; k++) {
760 pfs->pcounters[i][j][k] =
761 p->pfik_packets[i][j][k];
762 pfs->bcounters[i][j] +=
763 p->pfik_bytes[i][j][k];
764 }
765 splx(s);
766 }
767
768 int
769 pfi_clr_istats(const char *name, int *nzero, int flags)
770 {
771 struct pfi_kif *p;
772 int n = 0, s;
773 long tzero = time.tv_sec;
774
775 s = splsoftnet();
776 ACCEPT_FLAGS(PFI_FLAG_GROUP|PFI_FLAG_INSTANCE);
777 RB_FOREACH(p, pfi_ifhead, &pfi_ifs) {
778 if (pfi_skip_if(name, p, flags))
779 continue;
780 bzero(p->pfik_packets, sizeof(p->pfik_packets));
781 bzero(p->pfik_bytes, sizeof(p->pfik_bytes));
782 p->pfik_tzero = tzero;
783 n++;
784 }
785 splx(s);
786 if (nzero != NULL)
787 *nzero = n;
788 return (0);
789 }
790
791 int
792 pfi_get_ifaces(const char *name, struct pfi_if *buf, int *size, int flags)
793 {
794 struct pfi_kif *p;
795 int s, n = 0;
796
797 ACCEPT_FLAGS(PFI_FLAG_GROUP|PFI_FLAG_INSTANCE);
798 s = splsoftnet();
799 RB_FOREACH(p, pfi_ifhead, &pfi_ifs) {
800 if (pfi_skip_if(name, p, flags))
801 continue;
802 if (*size > n++) {
803 if (!p->pfik_tzero)
804 p->pfik_tzero = boottime.tv_sec;
805 if (copyout(p, buf++, sizeof(*buf))) {
806 splx(s);
807 return (EFAULT);
808 }
809 }
810 }
811 splx(s);
812 *size = n;
813 return (0);
814 }
815
816 struct pfi_kif *
817 pfi_lookup_if(const char *name)
818 {
819 struct pfi_kif *p, key;
820
821 strlcpy(key.pfik_name, name, sizeof(key.pfik_name));
822 p = RB_FIND(pfi_ifhead, &pfi_ifs, &key);
823 return (p);
824 }
825
826 int
827 pfi_skip_if(const char *filter, struct pfi_kif *p, int f)
828 {
829 int n;
830
831 if ((p->pfik_flags & PFI_IFLAG_GROUP) && !(f & PFI_FLAG_GROUP))
832 return (1);
833 if ((p->pfik_flags & PFI_IFLAG_INSTANCE) && !(f & PFI_FLAG_INSTANCE))
834 return (1);
835 if (filter == NULL || !*filter)
836 return (0);
837 if (!strcmp(p->pfik_name, filter))
838 return (0); /* exact match */
839 n = strlen(filter);
840 if (n < 1 || n >= IFNAMSIZ)
841 return (1); /* sanity check */
842 if (filter[n-1] >= '0' && filter[n-1] <= '9')
843 return (1); /* only do exact match in that case */
844 if (strncmp(p->pfik_name, filter, n))
845 return (1); /* prefix doesn't match */
846 return (p->pfik_name[n] < '0' || p->pfik_name[n] > '9');
847 }
848
849 /* from pf_print_state.c */
850 int
851 pfi_unmask(void *addr)
852 {
853 struct pf_addr *m = addr;
854 int i = 31, j = 0, b = 0;
855 u_int32_t tmp;
856
857 while (j < 4 && m->addr32[j] == 0xffffffff) {
858 b += 32;
859 j++;
860 }
861 if (j < 4) {
862 tmp = ntohl(m->addr32[j]);
863 for (i = 31; tmp & (1 << i); --i)
864 b++;
865 }
866 return (b);
867 }
868
869 void
870 pfi_dohooks(struct pfi_kif *p)
871 {
872
873 #ifdef __OpenBSD__
874 for (; p != NULL; p = p->pfik_parent)
875 dohooks(p->pfik_ah_head, 0);
876 #endif
877 }
878
879 int
880 pfi_match_addr(struct pfi_dynaddr *dyn, struct pf_addr *a, sa_family_t af)
881 {
882 if (af == AF_INET) {
883 switch (dyn->pfid_acnt4) {
884 case 0:
885 return (0);
886 case 1:
887 return (PF_MATCHA(0, &dyn->pfid_addr4,
888 &dyn->pfid_mask4, a, AF_INET));
889 default:
890 return (pfr_match_addr(dyn->pfid_kt, a, AF_INET));
891 }
892 } else {
893 switch (dyn->pfid_acnt6) {
894 case 0:
895 return (0);
896 case 1:
897 return (PF_MATCHA(0, &dyn->pfid_addr6,
898 &dyn->pfid_mask6, a, AF_INET6));
899 default:
900 return (pfr_match_addr(dyn->pfid_kt, a, AF_INET6));
901 }
902 }
903 }
904
905 /* from openbsd/sys/kern/kern_subr.c */
906 #ifdef __NetBSD__
907 static void *
908 hook_establish(head, tail, fn, arg)
909 struct hook_desc_head *head;
910 int tail;
911 void (*fn)(void *);
912 void *arg;
913 {
914 struct hook_desc *hdp;
915
916 hdp = (struct hook_desc *)malloc(sizeof (*hdp), M_DEVBUF, M_NOWAIT);
917 if (hdp == NULL)
918 return (NULL);
919
920 hdp->hd_fn = fn;
921 hdp->hd_arg = arg;
922 if (tail)
923 TAILQ_INSERT_TAIL(head, hdp, hd_list);
924 else
925 TAILQ_INSERT_HEAD(head, hdp, hd_list);
926
927 return (hdp);
928 }
929
930 static void
931 hook_disestablish(head, vhook)
932 struct hook_desc_head *head;
933 void *vhook;
934 {
935 struct hook_desc *hdp;
936
937 #ifdef DIAGNOSTIC
938 for (hdp = TAILQ_FIRST(head); hdp != NULL;
939 hdp = TAILQ_NEXT(hdp, hd_list))
940 if (hdp == vhook)
941 break;
942 if (hdp == NULL)
943 panic("hook_disestablish: hook not established");
944 #endif
945 hdp = vhook;
946 TAILQ_REMOVE(head, hdp, hd_list);
947 free(hdp, M_DEVBUF);
948 }
949 #endif
950