Home | History | Annotate | Line # | Download | only in npf
      1   1.1  christos /*-
      2   1.1  christos  * Copyright (c) 2009-2016 The NetBSD Foundation, Inc.
      3   1.1  christos  * All rights reserved.
      4   1.1  christos  *
      5   1.1  christos  * This material is based upon work partially supported by The
      6   1.1  christos  * NetBSD Foundation under a contract with Mindaugas Rasiukevicius.
      7   1.1  christos  *
      8   1.1  christos  * Redistribution and use in source and binary forms, with or without
      9   1.1  christos  * modification, are permitted provided that the following conditions
     10   1.1  christos  * are met:
     11   1.1  christos  * 1. Redistributions of source code must retain the above copyright
     12   1.1  christos  *    notice, this list of conditions and the following disclaimer.
     13   1.1  christos  * 2. Redistributions in binary form must reproduce the above copyright
     14   1.1  christos  *    notice, this list of conditions and the following disclaimer in the
     15   1.1  christos  *    documentation and/or other materials provided with the distribution.
     16   1.1  christos  *
     17   1.1  christos  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     18   1.1  christos  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     19   1.1  christos  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     20   1.1  christos  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     21   1.1  christos  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     22   1.1  christos  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     23   1.1  christos  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     24   1.1  christos  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     25   1.1  christos  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     26   1.1  christos  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     27   1.1  christos  * POSSIBILITY OF SUCH DAMAGE.
     28   1.1  christos  */
     29   1.1  christos 
     30   1.1  christos /*
     31   1.1  christos  * NPF main: dynamic load/initialisation and unload routines.
     32   1.1  christos  */
     33   1.1  christos 
     34   1.1  christos #ifdef _KERNEL
     35   1.1  christos #include <sys/cdefs.h>
     36  1.23       joe __KERNEL_RCSID(0, "$NetBSD: npf_os.c,v 1.23 2025/07/01 18:42:37 joe Exp $");
     37   1.1  christos 
     38   1.1  christos #ifdef _KERNEL_OPT
     39   1.1  christos #include "pf.h"
     40   1.1  christos #if NPF > 0
     41   1.1  christos #error "NPF and PF are mutually exclusive; please select one"
     42   1.1  christos #endif
     43   1.1  christos #endif
     44   1.1  christos 
     45   1.1  christos #include <sys/param.h>
     46   1.1  christos #include <sys/types.h>
     47   1.1  christos 
     48   1.1  christos #include <sys/conf.h>
     49   1.1  christos #include <sys/kauth.h>
     50   1.1  christos #include <sys/kmem.h>
     51   1.1  christos #include <sys/lwp.h>
     52   1.1  christos #include <sys/module.h>
     53  1.16     rmind #include <sys/pserialize.h>
     54   1.1  christos #include <sys/socketvar.h>
     55   1.1  christos #include <sys/uio.h>
     56   1.4  christos 
     57   1.4  christos #include <netinet/in.h>
     58   1.4  christos #include <netinet6/in6_var.h>
     59   1.1  christos #endif
     60   1.1  christos 
     61   1.1  christos #include "npf_impl.h"
     62   1.1  christos #include "npfkern.h"
     63   1.1  christos 
     64   1.1  christos #ifdef _KERNEL
     65   1.1  christos #ifndef _MODULE
     66   1.1  christos #include "opt_modular.h"
     67   1.6       ryo #include "opt_net_mpsafe.h"
     68   1.1  christos #endif
     69   1.1  christos #include "ioconf.h"
     70   1.1  christos #endif
     71   1.1  christos 
     72   1.1  christos /*
     73   1.1  christos  * Module and device structures.
     74   1.1  christos  */
     75   1.1  christos #ifndef _MODULE
     76   1.1  christos /*
     77   1.1  christos  * Modular kernels load drivers too early, and we need percpu to be inited
     78   1.1  christos  * So we make this misc; a better way would be to have early boot and late
     79   1.1  christos  * boot drivers.
     80   1.1  christos  */
     81   1.7  pgoyette MODULE(MODULE_CLASS_MISC, npf, "bpf");
     82   1.1  christos #else
     83   1.1  christos /* This module autoloads via /dev/npf so it needs to be a driver */
     84   1.7  pgoyette MODULE(MODULE_CLASS_DRIVER, npf, "bpf");
     85   1.1  christos #endif
     86   1.1  christos 
     87  1.18     rmind #define	NPF_IOCTL_DATA_LIMIT	(4 * 1024 * 1024)
     88  1.18     rmind 
     89  1.17     rmind static int	npf_pfil_register(bool);
     90  1.17     rmind static void	npf_pfil_unregister(bool);
     91  1.17     rmind 
     92   1.1  christos static int	npf_dev_open(dev_t, int, int, lwp_t *);
     93   1.1  christos static int	npf_dev_close(dev_t, int, int, lwp_t *);
     94   1.1  christos static int	npf_dev_ioctl(dev_t, u_long, void *, int, lwp_t *);
     95   1.1  christos static int	npf_dev_poll(dev_t, int, lwp_t *);
     96   1.1  christos static int	npf_dev_read(dev_t, struct uio *, int);
     97   1.1  christos 
     98   1.1  christos const struct cdevsw npf_cdevsw = {
     99   1.1  christos 	.d_open = npf_dev_open,
    100   1.1  christos 	.d_close = npf_dev_close,
    101   1.1  christos 	.d_read = npf_dev_read,
    102   1.1  christos 	.d_write = nowrite,
    103   1.1  christos 	.d_ioctl = npf_dev_ioctl,
    104   1.1  christos 	.d_stop = nostop,
    105   1.1  christos 	.d_tty = notty,
    106   1.1  christos 	.d_poll = npf_dev_poll,
    107   1.1  christos 	.d_mmap = nommap,
    108   1.1  christos 	.d_kqfilter = nokqfilter,
    109   1.1  christos 	.d_discard = nodiscard,
    110   1.1  christos 	.d_flag = D_OTHER | D_MPSAFE
    111   1.1  christos };
    112   1.1  christos 
    113  1.18     rmind static const char *	npf_ifop_getname(npf_t *, ifnet_t *);
    114  1.18     rmind static ifnet_t *	npf_ifop_lookup(npf_t *, const char *);
    115  1.18     rmind static void		npf_ifop_flush(npf_t *, void *);
    116  1.18     rmind static void *		npf_ifop_getmeta(npf_t *, const ifnet_t *);
    117  1.18     rmind static void		npf_ifop_setmeta(npf_t *, ifnet_t *, void *);
    118   1.1  christos 
    119   1.1  christos static const unsigned	nworkers = 1;
    120   1.1  christos 
    121   1.1  christos static bool		pfil_registered = false;
    122   1.1  christos static pfil_head_t *	npf_ph_if = NULL;
    123   1.1  christos static pfil_head_t *	npf_ph_inet = NULL;
    124   1.1  christos static pfil_head_t *	npf_ph_inet6 = NULL;
    125  1.23       joe static pfil_head_t *	npf_ph_etherlist[NPF_MAX_IFMAP];
    126   1.1  christos 
    127   1.1  christos static const npf_ifops_t kern_ifops = {
    128   1.1  christos 	.getname	= npf_ifop_getname,
    129   1.1  christos 	.lookup		= npf_ifop_lookup,
    130   1.1  christos 	.flush		= npf_ifop_flush,
    131   1.1  christos 	.getmeta	= npf_ifop_getmeta,
    132   1.1  christos 	.setmeta	= npf_ifop_setmeta,
    133   1.1  christos };
    134   1.1  christos 
    135   1.1  christos static int
    136   1.1  christos npf_fini(void)
    137   1.1  christos {
    138   1.1  christos 	npf_t *npf = npf_getkernctx();
    139   1.1  christos 
    140   1.1  christos 	/* At first, detach device and remove pfil hooks. */
    141   1.1  christos #ifdef _MODULE
    142   1.1  christos 	devsw_detach(NULL, &npf_cdevsw);
    143   1.1  christos #endif
    144   1.1  christos 	npf_pfil_unregister(true);
    145  1.14     rmind 	npfk_destroy(npf);
    146  1.14     rmind 	npfk_sysfini();
    147   1.1  christos 	return 0;
    148   1.1  christos }
    149   1.1  christos 
    150   1.1  christos static int
    151   1.1  christos npf_init(void)
    152   1.1  christos {
    153   1.1  christos 	npf_t *npf;
    154   1.1  christos 	int error = 0;
    155   1.1  christos 
    156  1.14     rmind 	error = npfk_sysinit(nworkers);
    157   1.1  christos 	if (error)
    158   1.1  christos 		return error;
    159  1.18     rmind 	npf = npfk_create(0, NULL, &kern_ifops, NULL);
    160   1.1  christos 	npf_setkernctx(npf);
    161   1.1  christos 	npf_pfil_register(true);
    162   1.1  christos 
    163   1.1  christos #ifdef _MODULE
    164   1.1  christos 	devmajor_t bmajor = NODEVMAJOR, cmajor = NODEVMAJOR;
    165   1.1  christos 
    166   1.1  christos 	/* Attach /dev/npf device. */
    167   1.1  christos 	error = devsw_attach("npf", NULL, &bmajor, &npf_cdevsw, &cmajor);
    168   1.1  christos 	if (error) {
    169   1.1  christos 		/* It will call devsw_detach(), which is safe. */
    170   1.1  christos 		(void)npf_fini();
    171   1.1  christos 	}
    172   1.1  christos #endif
    173   1.1  christos 	return error;
    174   1.1  christos }
    175   1.1  christos 
    176   1.1  christos 
    177   1.1  christos /*
    178   1.1  christos  * Module interface.
    179   1.1  christos  */
    180   1.1  christos static int
    181   1.1  christos npf_modcmd(modcmd_t cmd, void *arg)
    182   1.1  christos {
    183   1.1  christos 	switch (cmd) {
    184   1.1  christos 	case MODULE_CMD_INIT:
    185   1.1  christos 		return npf_init();
    186   1.1  christos 	case MODULE_CMD_FINI:
    187   1.1  christos 		return npf_fini();
    188   1.1  christos 	case MODULE_CMD_AUTOUNLOAD:
    189  1.22  pgoyette /*
    190  1.22  pgoyette  * XXX npf_autounload_p() is insufficient here.  At least one other
    191  1.22  pgoyette  * XXX path leads to unloading while something tries later on to
    192  1.22  pgoyette  * XXX continue (perhaps closing of an open fd).  For now, just
    193  1.22  pgoyette  * XXX disabble autounload.
    194  1.22  pgoyette  */
    195  1.22  pgoyette 		return EBUSY;
    196   1.1  christos 	default:
    197   1.1  christos 		return ENOTTY;
    198   1.1  christos 	}
    199   1.1  christos 	return 0;
    200   1.1  christos }
    201   1.1  christos 
    202   1.1  christos void
    203   1.1  christos npfattach(int nunits)
    204   1.1  christos {
    205   1.1  christos 	/* Nothing */
    206   1.1  christos }
    207   1.1  christos 
    208   1.1  christos static int
    209   1.1  christos npf_dev_open(dev_t dev, int flag, int mode, lwp_t *l)
    210   1.1  christos {
    211   1.1  christos 	/* Available only for super-user. */
    212   1.1  christos 	if (kauth_authorize_network(l->l_cred, KAUTH_NETWORK_FIREWALL,
    213   1.1  christos 	    KAUTH_REQ_NETWORK_FIREWALL_FW, NULL, NULL, NULL)) {
    214   1.1  christos 		return EPERM;
    215   1.1  christos 	}
    216   1.1  christos 	return 0;
    217   1.1  christos }
    218   1.1  christos 
    219   1.1  christos static int
    220   1.1  christos npf_dev_close(dev_t dev, int flag, int mode, lwp_t *l)
    221   1.1  christos {
    222   1.1  christos 	return 0;
    223   1.1  christos }
    224   1.1  christos 
    225   1.1  christos static int
    226   1.1  christos npf_stats_export(npf_t *npf, void *data)
    227   1.1  christos {
    228   1.1  christos 	uint64_t *fullst, *uptr = *(uint64_t **)data;
    229   1.1  christos 	int error;
    230   1.1  christos 
    231   1.1  christos 	fullst = kmem_alloc(NPF_STATS_SIZE, KM_SLEEP);
    232  1.14     rmind 	npfk_stats(npf, fullst); /* will zero the buffer */
    233   1.1  christos 	error = copyout(fullst, uptr, NPF_STATS_SIZE);
    234   1.1  christos 	kmem_free(fullst, NPF_STATS_SIZE);
    235   1.1  christos 	return error;
    236   1.1  christos }
    237   1.1  christos 
    238  1.17     rmind /*
    239  1.17     rmind  * npfctl_switch: enable or disable packet inspection.
    240  1.17     rmind  */
    241  1.17     rmind static int
    242  1.17     rmind npfctl_switch(void *data)
    243  1.17     rmind {
    244  1.17     rmind 	const bool onoff = *(int *)data ? true : false;
    245  1.17     rmind 	int error;
    246  1.17     rmind 
    247  1.17     rmind 	if (onoff) {
    248  1.17     rmind 		/* Enable: add pfil hooks. */
    249  1.17     rmind 		error = npf_pfil_register(false);
    250  1.17     rmind 	} else {
    251  1.17     rmind 		/* Disable: remove pfil hooks. */
    252  1.17     rmind 		npf_pfil_unregister(false);
    253  1.17     rmind 		error = 0;
    254  1.17     rmind 	}
    255  1.17     rmind 	return error;
    256  1.17     rmind }
    257  1.17     rmind 
    258   1.1  christos static int
    259   1.1  christos npf_dev_ioctl(dev_t dev, u_long cmd, void *data, int flag, lwp_t *l)
    260   1.1  christos {
    261   1.1  christos 	npf_t *npf = npf_getkernctx();
    262  1.18     rmind 	nvlist_t *req, *resp;
    263   1.1  christos 	int error;
    264   1.1  christos 
    265   1.1  christos 	/* Available only for super-user. */
    266   1.1  christos 	if (kauth_authorize_network(l->l_cred, KAUTH_NETWORK_FIREWALL,
    267   1.1  christos 	    KAUTH_REQ_NETWORK_FIREWALL_FW, NULL, NULL, NULL)) {
    268   1.1  christos 		return EPERM;
    269   1.1  christos 	}
    270   1.1  christos 
    271   1.1  christos 	switch (cmd) {
    272  1.18     rmind 	case IOC_NPF_VERSION:
    273  1.18     rmind 		*(int *)data = NPF_VERSION;
    274  1.18     rmind 		return 0;
    275  1.18     rmind 	case IOC_NPF_SWITCH:
    276  1.18     rmind 		return npfctl_switch(data);
    277   1.1  christos 	case IOC_NPF_TABLE:
    278  1.18     rmind 		return npfctl_table(npf, data);
    279   1.1  christos 	case IOC_NPF_STATS:
    280  1.18     rmind 		return npf_stats_export(npf, data);
    281  1.19      maxv 	case IOC_NPF_LOAD:
    282  1.19      maxv 	case IOC_NPF_SAVE:
    283  1.19      maxv 	case IOC_NPF_RULE:
    284  1.19      maxv 	case IOC_NPF_CONN_LOOKUP:
    285  1.19      maxv 	case IOC_NPF_TABLE_REPLACE:
    286  1.19      maxv 		/* nvlist_ref_t argument, handled below */
    287  1.19      maxv 		break;
    288  1.19      maxv 	default:
    289  1.19      maxv 		return EINVAL;
    290  1.18     rmind 	}
    291  1.18     rmind 
    292  1.18     rmind 	error = nvlist_copyin(data, &req, NPF_IOCTL_DATA_LIMIT);
    293  1.18     rmind 	if (__predict_false(error)) {
    294  1.18     rmind #ifdef __NetBSD__
    295  1.18     rmind 		/* Until the version bump. */
    296  1.18     rmind 		if (cmd != IOC_NPF_SAVE) {
    297  1.18     rmind 			return error;
    298  1.18     rmind 		}
    299  1.18     rmind 		req = nvlist_create(0);
    300  1.18     rmind #else
    301  1.18     rmind 		return error;
    302  1.18     rmind #endif
    303   1.1  christos 	}
    304  1.18     rmind 	resp = nvlist_create(0);
    305  1.21  christos 
    306  1.21  christos 	if ((error = npfctl_run_op(npf, cmd, req, resp)) == 0) {
    307  1.21  christos 		error = nvlist_copyout(data, resp);
    308  1.21  christos 	}
    309  1.21  christos 
    310  1.18     rmind 	nvlist_destroy(resp);
    311  1.18     rmind 	nvlist_destroy(req);
    312  1.18     rmind 
    313   1.1  christos 	return error;
    314   1.1  christos }
    315   1.1  christos 
    316   1.1  christos static int
    317   1.1  christos npf_dev_poll(dev_t dev, int events, lwp_t *l)
    318   1.1  christos {
    319   1.1  christos 	return ENOTSUP;
    320   1.1  christos }
    321   1.1  christos 
    322   1.1  christos static int
    323   1.1  christos npf_dev_read(dev_t dev, struct uio *uio, int flag)
    324   1.1  christos {
    325   1.1  christos 	return ENOTSUP;
    326   1.1  christos }
    327   1.1  christos 
    328   1.1  christos bool
    329   1.1  christos npf_autounload_p(void)
    330   1.1  christos {
    331  1.20  christos 	if (npf_active_p())
    332  1.20  christos 		return false;
    333  1.20  christos 
    334   1.1  christos 	npf_t *npf = npf_getkernctx();
    335  1.20  christos 
    336  1.20  christos 	npf_config_enter(npf);
    337  1.20  christos 	bool pass = npf_default_pass(npf);
    338  1.20  christos 	npf_config_exit(npf);
    339  1.20  christos 
    340  1.20  christos 	return pass;
    341   1.1  christos }
    342   1.1  christos 
    343   1.1  christos /*
    344   1.1  christos  * Interface operations.
    345   1.1  christos  */
    346   1.1  christos 
    347   1.1  christos static const char *
    348  1.18     rmind npf_ifop_getname(npf_t *npf __unused, ifnet_t *ifp)
    349   1.1  christos {
    350   1.1  christos 	return ifp->if_xname;
    351   1.1  christos }
    352   1.1  christos 
    353   1.1  christos static ifnet_t *
    354  1.18     rmind npf_ifop_lookup(npf_t *npf __unused, const char *name)
    355   1.1  christos {
    356   1.1  christos 	return ifunit(name);
    357   1.1  christos }
    358   1.1  christos 
    359   1.1  christos static void
    360  1.18     rmind npf_ifop_flush(npf_t *npf __unused, void *arg)
    361   1.1  christos {
    362   1.1  christos 	ifnet_t *ifp;
    363   1.1  christos 
    364   1.1  christos 	KERNEL_LOCK(1, NULL);
    365   1.9     ozaki 	IFNET_GLOBAL_LOCK();
    366   1.1  christos 	IFNET_WRITER_FOREACH(ifp) {
    367  1.13     rmind 		ifp->if_npf_private = arg;
    368   1.1  christos 	}
    369   1.9     ozaki 	IFNET_GLOBAL_UNLOCK();
    370   1.1  christos 	KERNEL_UNLOCK_ONE(NULL);
    371   1.1  christos }
    372   1.1  christos 
    373   1.1  christos static void *
    374  1.18     rmind npf_ifop_getmeta(npf_t *npf __unused, const ifnet_t *ifp)
    375   1.1  christos {
    376  1.13     rmind 	return ifp->if_npf_private;
    377   1.1  christos }
    378   1.1  christos 
    379   1.1  christos static void
    380  1.18     rmind npf_ifop_setmeta(npf_t *npf __unused, ifnet_t *ifp, void *arg)
    381   1.1  christos {
    382  1.13     rmind 	ifp->if_npf_private = arg;
    383   1.1  christos }
    384   1.1  christos 
    385   1.1  christos #ifdef _KERNEL
    386   1.1  christos 
    387   1.1  christos /*
    388   1.1  christos  * Wrapper of the main packet handler to pass the kernel NPF context.
    389   1.1  christos  */
    390   1.1  christos static int
    391  1.14     rmind npfos_packet_handler(void *arg, struct mbuf **mp, ifnet_t *ifp, int di)
    392   1.1  christos {
    393   1.1  christos 	npf_t *npf = npf_getkernctx();
    394  1.14     rmind 	return npfk_packet_handler(npf, mp, ifp, di);
    395   1.1  christos }
    396   1.1  christos 
    397  1.23       joe static int
    398  1.23       joe npfos_layer2_handler(void *arg, struct mbuf **mp, ifnet_t *ifp, int di)
    399  1.23       joe {
    400  1.23       joe 	npf_t *npf = npf_getkernctx();
    401  1.23       joe 	return npfk_layer2_handler(npf, mp, ifp, di);
    402  1.23       joe }
    403  1.23       joe 
    404   1.1  christos /*
    405   1.1  christos  * npf_ifhook: hook handling interface changes.
    406   1.1  christos  */
    407   1.2     rmind static void
    408   1.2     rmind npf_ifhook(void *arg, unsigned long cmd, void *arg2)
    409   1.1  christos {
    410   1.1  christos 	npf_t *npf = npf_getkernctx();
    411   1.2     rmind 	ifnet_t *ifp = arg2;
    412   1.1  christos 
    413   1.2     rmind 	switch (cmd) {
    414   1.2     rmind 	case PFIL_IFNET_ATTACH:
    415  1.14     rmind 		npfk_ifmap_attach(npf, ifp);
    416   1.3     rmind 		npf_ifaddr_sync(npf, ifp);
    417   1.2     rmind 		break;
    418   1.2     rmind 	case PFIL_IFNET_DETACH:
    419  1.14     rmind 		npfk_ifmap_detach(npf, ifp);
    420   1.3     rmind 		npf_ifaddr_flush(npf, ifp);
    421   1.2     rmind 		break;
    422   1.1  christos 	}
    423   1.1  christos }
    424   1.1  christos 
    425   1.3     rmind static void
    426   1.3     rmind npf_ifaddrhook(void *arg, u_long cmd, void *arg2)
    427   1.3     rmind {
    428   1.3     rmind 	npf_t *npf = npf_getkernctx();
    429   1.3     rmind 	struct ifaddr *ifa = arg2;
    430   1.3     rmind 
    431   1.3     rmind 	switch (cmd) {
    432   1.3     rmind 	case SIOCSIFADDR:
    433   1.3     rmind 	case SIOCAIFADDR:
    434   1.3     rmind 	case SIOCDIFADDR:
    435   1.3     rmind #ifdef INET6
    436   1.3     rmind 	case SIOCSIFADDR_IN6:
    437   1.3     rmind 	case SIOCAIFADDR_IN6:
    438   1.3     rmind 	case SIOCDIFADDR_IN6:
    439   1.3     rmind #endif
    440  1.12     rmind 		KASSERT(ifa != NULL);
    441   1.3     rmind 		break;
    442   1.3     rmind 	default:
    443   1.3     rmind 		return;
    444   1.3     rmind 	}
    445   1.3     rmind 	npf_ifaddr_sync(npf, ifa->ifa_ifp);
    446   1.3     rmind }
    447   1.3     rmind 
    448  1.23       joe static int
    449  1.23       joe register_etherpfil_hook(npf_t *npf, ifnet_t *ifp, int i)
    450  1.23       joe {
    451  1.23       joe 	int error = 0;
    452  1.23       joe 	static pfil_head_t *npf_ph_ether;
    453  1.23       joe 	/* Capture points of activity at link layer */
    454  1.23       joe 	if ((npf_ph_ether = pfil_head_get(PFIL_TYPE_IFNET, ifp)) == NULL) {
    455  1.23       joe 		error = ENOENT;
    456  1.23       joe 		return error;
    457  1.23       joe 	}
    458  1.23       joe 
    459  1.23       joe 	if (npf_ph_ether) {
    460  1.23       joe 		error = pfil_add_hook(npfos_layer2_handler, npf,
    461  1.23       joe 		    PFIL_ALL, npf_ph_ether);
    462  1.23       joe 		KASSERT(error == 0);
    463  1.23       joe 	}
    464  1.23       joe 	npf_ph_etherlist[i] = npf_ph_ether;
    465  1.23       joe 
    466  1.23       joe 	return error;
    467  1.23       joe }
    468  1.23       joe 
    469  1.23       joe static int
    470  1.23       joe get_etherpfil_head(npf_t *npf)
    471  1.23       joe {
    472  1.23       joe 	int error = 0, i = 0;
    473  1.23       joe 	ifnet_t *ifp;
    474  1.23       joe 
    475  1.23       joe 	KERNEL_LOCK(1, NULL);
    476  1.23       joe 	IFNET_GLOBAL_LOCK();
    477  1.23       joe 	IFNET_WRITER_FOREACH(ifp) {
    478  1.23       joe 		error = register_etherpfil_hook(npf, ifp, i);
    479  1.23       joe 		if (!error)
    480  1.23       joe 			break;
    481  1.23       joe 		i++;
    482  1.23       joe 	}
    483  1.23       joe 	IFNET_GLOBAL_UNLOCK();
    484  1.23       joe 	KERNEL_UNLOCK_ONE(NULL);
    485  1.23       joe 	return error;
    486  1.23       joe }
    487  1.23       joe 
    488  1.23       joe static void
    489  1.23       joe destroy_pfilether_hook(npf_t *npf)
    490  1.23       joe {
    491  1.23       joe 	int i = 0;
    492  1.23       joe 	while (npf_ph_etherlist[i]) {
    493  1.23       joe 		pfil_head_t *npf_ph_ether = npf_ph_etherlist[i];
    494  1.23       joe 
    495  1.23       joe 		if (npf_ph_ether) {
    496  1.23       joe 			(void)pfil_remove_hook(npfos_layer2_handler, npf,
    497  1.23       joe 				PFIL_ALL, npf_ph_ether);
    498  1.23       joe 		}
    499  1.23       joe 		i++;
    500  1.23       joe 	}
    501  1.23       joe }
    502  1.23       joe 
    503   1.1  christos /*
    504   1.1  christos  * npf_pfil_register: register pfil(9) hooks.
    505   1.1  christos  */
    506  1.17     rmind static int
    507   1.1  christos npf_pfil_register(bool init)
    508   1.1  christos {
    509   1.1  christos 	npf_t *npf = npf_getkernctx();
    510   1.1  christos 	int error = 0;
    511   1.1  christos 
    512   1.8     ozaki 	SOFTNET_KERNEL_LOCK_UNLESS_NET_MPSAFE();
    513   1.1  christos 
    514   1.1  christos 	/* Init: interface re-config and attach/detach hook. */
    515   1.1  christos 	if (!npf_ph_if) {
    516   1.1  christos 		npf_ph_if = pfil_head_get(PFIL_TYPE_IFNET, 0);
    517   1.1  christos 		if (!npf_ph_if) {
    518   1.1  christos 			error = ENOENT;
    519   1.1  christos 			goto out;
    520   1.1  christos 		}
    521   1.3     rmind 
    522   1.3     rmind 		error = pfil_add_ihook(npf_ifhook, NULL,
    523   1.3     rmind 		    PFIL_IFNET, npf_ph_if);
    524   1.3     rmind 		KASSERT(error == 0);
    525   1.3     rmind 
    526   1.3     rmind 		error = pfil_add_ihook(npf_ifaddrhook, NULL,
    527   1.3     rmind 		    PFIL_IFADDR, npf_ph_if);
    528   1.1  christos 		KASSERT(error == 0);
    529   1.1  christos 	}
    530   1.1  christos 	if (init) {
    531   1.1  christos 		goto out;
    532   1.1  christos 	}
    533   1.1  christos 
    534   1.1  christos 	/* Check if pfil hooks are not already registered. */
    535   1.1  christos 	if (pfil_registered) {
    536   1.1  christos 		error = EEXIST;
    537   1.1  christos 		goto out;
    538   1.1  christos 	}
    539   1.1  christos 
    540   1.1  christos 	/* Capture points of the activity in the IP layer. */
    541   1.1  christos 	npf_ph_inet = pfil_head_get(PFIL_TYPE_AF, (void *)AF_INET);
    542   1.1  christos 	npf_ph_inet6 = pfil_head_get(PFIL_TYPE_AF, (void *)AF_INET6);
    543   1.1  christos 	if (!npf_ph_inet && !npf_ph_inet6) {
    544   1.1  christos 		error = ENOENT;
    545   1.1  christos 		goto out;
    546   1.1  christos 	}
    547   1.1  christos 
    548   1.1  christos 	/* Packet IN/OUT handlers for IP layer. */
    549   1.1  christos 	if (npf_ph_inet) {
    550  1.14     rmind 		error = pfil_add_hook(npfos_packet_handler, npf,
    551   1.1  christos 		    PFIL_ALL, npf_ph_inet);
    552   1.1  christos 		KASSERT(error == 0);
    553   1.1  christos 	}
    554   1.1  christos 	if (npf_ph_inet6) {
    555  1.14     rmind 		error = pfil_add_hook(npfos_packet_handler, npf,
    556   1.1  christos 		    PFIL_ALL, npf_ph_inet6);
    557   1.1  christos 		KASSERT(error == 0);
    558   1.1  christos 	}
    559   1.5     rmind 
    560  1.23       joe 	get_etherpfil_head(npf);
    561  1.23       joe 
    562   1.5     rmind 	/*
    563   1.5     rmind 	 * It is necessary to re-sync all/any interface address tables,
    564   1.5     rmind 	 * since we did not listen for any changes.
    565   1.5     rmind 	 */
    566   1.5     rmind 	npf_ifaddr_syncall(npf);
    567   1.1  christos 	pfil_registered = true;
    568   1.1  christos out:
    569   1.8     ozaki 	SOFTNET_KERNEL_UNLOCK_UNLESS_NET_MPSAFE();
    570   1.1  christos 
    571   1.1  christos 	return error;
    572   1.1  christos }
    573   1.1  christos 
    574   1.1  christos /*
    575   1.1  christos  * npf_pfil_unregister: unregister pfil(9) hooks.
    576   1.1  christos  */
    577  1.17     rmind static void
    578   1.1  christos npf_pfil_unregister(bool fini)
    579   1.1  christos {
    580   1.1  christos 	npf_t *npf = npf_getkernctx();
    581   1.1  christos 
    582   1.8     ozaki 	SOFTNET_KERNEL_LOCK_UNLESS_NET_MPSAFE();
    583   1.1  christos 
    584   1.1  christos 	if (fini && npf_ph_if) {
    585   1.3     rmind 		(void)pfil_remove_ihook(npf_ifhook, NULL,
    586   1.3     rmind 		    PFIL_IFNET, npf_ph_if);
    587   1.3     rmind 		(void)pfil_remove_ihook(npf_ifaddrhook, NULL,
    588   1.3     rmind 		    PFIL_IFADDR, npf_ph_if);
    589   1.1  christos 	}
    590   1.1  christos 	if (npf_ph_inet) {
    591  1.14     rmind 		(void)pfil_remove_hook(npfos_packet_handler, npf,
    592   1.1  christos 		    PFIL_ALL, npf_ph_inet);
    593   1.1  christos 	}
    594   1.1  christos 	if (npf_ph_inet6) {
    595  1.14     rmind 		(void)pfil_remove_hook(npfos_packet_handler, npf,
    596   1.1  christos 		    PFIL_ALL, npf_ph_inet6);
    597   1.1  christos 	}
    598  1.23       joe 	destroy_pfilether_hook(npf);
    599   1.1  christos 	pfil_registered = false;
    600   1.1  christos 
    601   1.8     ozaki 	SOFTNET_KERNEL_UNLOCK_UNLESS_NET_MPSAFE();
    602   1.1  christos }
    603   1.1  christos 
    604   1.1  christos bool
    605  1.17     rmind npf_active_p(void)
    606   1.1  christos {
    607   1.1  christos 	return pfil_registered;
    608   1.1  christos }
    609  1.17     rmind 
    610   1.1  christos #endif
    611  1.16     rmind 
    612  1.16     rmind #ifdef __NetBSD__
    613  1.16     rmind 
    614  1.18     rmind /*
    615  1.18     rmind  * Epoch-Based Reclamation (EBR) wrappers: in NetBSD, we rely on the
    616  1.18     rmind  * passive serialization mechanism (see pserialize(9) manual page),
    617  1.18     rmind  * which provides sufficient guarantees for NPF.
    618  1.18     rmind  */
    619  1.18     rmind 
    620  1.16     rmind ebr_t *
    621  1.16     rmind npf_ebr_create(void)
    622  1.16     rmind {
    623  1.16     rmind 	return pserialize_create();
    624  1.16     rmind }
    625  1.16     rmind 
    626  1.16     rmind void
    627  1.16     rmind npf_ebr_destroy(ebr_t *ebr)
    628  1.16     rmind {
    629  1.16     rmind 	pserialize_destroy(ebr);
    630  1.16     rmind }
    631  1.16     rmind 
    632  1.16     rmind void
    633  1.16     rmind npf_ebr_register(ebr_t *ebr)
    634  1.16     rmind {
    635  1.16     rmind 	KASSERT(ebr != NULL); (void)ebr;
    636  1.16     rmind }
    637  1.16     rmind 
    638  1.16     rmind void
    639  1.16     rmind npf_ebr_unregister(ebr_t *ebr)
    640  1.16     rmind {
    641  1.16     rmind 	KASSERT(ebr != NULL); (void)ebr;
    642  1.16     rmind }
    643  1.16     rmind 
    644  1.16     rmind int
    645  1.16     rmind npf_ebr_enter(ebr_t *ebr)
    646  1.16     rmind {
    647  1.16     rmind 	KASSERT(ebr != NULL); (void)ebr;
    648  1.16     rmind 	return pserialize_read_enter();
    649  1.16     rmind }
    650  1.16     rmind 
    651  1.16     rmind void
    652  1.16     rmind npf_ebr_exit(ebr_t *ebr, int s)
    653  1.16     rmind {
    654  1.16     rmind 	KASSERT(ebr != NULL); (void)ebr;
    655  1.16     rmind 	pserialize_read_exit(s);
    656  1.16     rmind }
    657  1.16     rmind 
    658  1.16     rmind void
    659  1.16     rmind npf_ebr_full_sync(ebr_t *ebr)
    660  1.16     rmind {
    661  1.16     rmind 	pserialize_perform(ebr);
    662  1.16     rmind }
    663  1.16     rmind 
    664  1.16     rmind bool
    665  1.16     rmind npf_ebr_incrit_p(ebr_t *ebr)
    666  1.16     rmind {
    667  1.16     rmind 	KASSERT(ebr != NULL); (void)ebr;
    668  1.16     rmind 	return pserialize_in_read_section();
    669  1.16     rmind }
    670  1.16     rmind 
    671  1.16     rmind #endif
    672