npf_rproc.c revision 1.14 1 /* $NetBSD: npf_rproc.c,v 1.14 2016/12/26 23:05:06 christos Exp $ */
2
3 /*-
4 * Copyright (c) 2009-2013 The NetBSD Foundation, Inc.
5 * All rights reserved.
6 *
7 * This material is based upon work partially supported by The
8 * NetBSD Foundation under a contract with Mindaugas Rasiukevicius.
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 * 1. Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
18 *
19 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
20 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
21 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
22 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
23 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
24 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
25 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
27 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
28 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
29 * POSSIBILITY OF SUCH DAMAGE.
30 */
31
32 /*
33 * NPF extension and rule procedure interface.
34 */
35
36 #ifdef _KERNEL
37 #include <sys/cdefs.h>
38 __KERNEL_RCSID(0, "$NetBSD");
39
40 #include <sys/param.h>
41 #include <sys/types.h>
42
43 #include <sys/atomic.h>
44 #include <sys/kmem.h>
45 #include <sys/mutex.h>
46 #include <sys/module.h>
47 #endif
48
49 #include "npf_impl.h"
50
51 #define EXT_NAME_LEN 32
52
53 typedef struct npf_ext {
54 char ext_callname[EXT_NAME_LEN];
55 LIST_ENTRY(npf_ext) ext_entry;
56 const npf_ext_ops_t * ext_ops;
57 unsigned ext_refcnt;
58 } npf_ext_t;
59
60 struct npf_rprocset {
61 LIST_HEAD(, npf_rproc) rps_list;
62 };
63
64 #define RPROC_NAME_LEN 32
65 #define RPROC_EXT_COUNT 16
66
67 struct npf_rproc {
68 /* Flags and reference count. */
69 uint32_t rp_flags;
70 u_int rp_refcnt;
71
72 /* Associated extensions and their metadata . */
73 unsigned rp_ext_count;
74 npf_ext_t * rp_ext[RPROC_EXT_COUNT];
75 void * rp_ext_meta[RPROC_EXT_COUNT];
76
77 /* Name of the procedure and list entry. */
78 char rp_name[RPROC_NAME_LEN];
79 LIST_ENTRY(npf_rproc) rp_entry;
80 };
81
82 void
83 npf_ext_init(npf_t *npf)
84 {
85 mutex_init(&npf->ext_lock, MUTEX_DEFAULT, IPL_NONE);
86 LIST_INIT(&npf->ext_list);
87 }
88
89 void
90 npf_ext_fini(npf_t *npf)
91 {
92 KASSERT(LIST_EMPTY(&npf->ext_list));
93 mutex_destroy(&npf->ext_lock);
94 }
95
96 /*
97 * NPF extension management for the rule procedures.
98 */
99
100 static const char npf_ext_prefix[] = "npf_ext_";
101 #define NPF_EXT_PREFLEN (sizeof(npf_ext_prefix) - 1)
102
103 static npf_ext_t *
104 npf_ext_lookup(npf_t *npf, const char *name, bool autoload)
105 {
106 npf_ext_t *ext;
107 char modname[RPROC_NAME_LEN + NPF_EXT_PREFLEN];
108 int error;
109
110 KASSERT(mutex_owned(&npf->ext_lock));
111
112 again:
113 LIST_FOREACH(ext, &npf->ext_list, ext_entry)
114 if (strcmp(ext->ext_callname, name) == 0)
115 break;
116
117 if (ext != NULL || !autoload)
118 return ext;
119
120 mutex_exit(&npf->ext_lock);
121 autoload = false;
122 snprintf(modname, sizeof(modname), "%s%s", npf_ext_prefix, name);
123 error = module_autoload(modname, MODULE_CLASS_MISC);
124 mutex_enter(&npf->ext_lock);
125
126 if (error)
127 return NULL;
128 goto again;
129 }
130
131 void *
132 npf_ext_register(npf_t *npf, const char *name, const npf_ext_ops_t *ops)
133 {
134 npf_ext_t *ext;
135
136 ext = kmem_zalloc(sizeof(npf_ext_t), KM_SLEEP);
137 strlcpy(ext->ext_callname, name, EXT_NAME_LEN);
138 ext->ext_ops = ops;
139
140 mutex_enter(&npf->ext_lock);
141 if (npf_ext_lookup(npf, name, false)) {
142 mutex_exit(&npf->ext_lock);
143 kmem_free(ext, sizeof(npf_ext_t));
144 return NULL;
145 }
146 LIST_INSERT_HEAD(&npf->ext_list, ext, ext_entry);
147 mutex_exit(&npf->ext_lock);
148
149 return (void *)ext;
150 }
151
152 int
153 npf_ext_unregister(npf_t *npf, void *extid)
154 {
155 npf_ext_t *ext = extid;
156
157 /*
158 * Check if in-use first (re-check with the lock held).
159 */
160 if (ext->ext_refcnt) {
161 return EBUSY;
162 }
163
164 mutex_enter(&npf->ext_lock);
165 if (ext->ext_refcnt) {
166 mutex_exit(&npf->ext_lock);
167 return EBUSY;
168 }
169 KASSERT(npf_ext_lookup(npf, ext->ext_callname, false));
170 LIST_REMOVE(ext, ext_entry);
171 mutex_exit(&npf->ext_lock);
172
173 kmem_free(ext, sizeof(npf_ext_t));
174 return 0;
175 }
176
177 int
178 npf_ext_construct(npf_t *npf, const char *name,
179 npf_rproc_t *rp, prop_dictionary_t params)
180 {
181 const npf_ext_ops_t *extops;
182 npf_ext_t *ext;
183 unsigned i;
184 int error;
185
186 if (rp->rp_ext_count >= RPROC_EXT_COUNT) {
187 return ENOSPC;
188 }
189
190 mutex_enter(&npf->ext_lock);
191 ext = npf_ext_lookup(npf, name, true);
192 if (ext) {
193 atomic_inc_uint(&ext->ext_refcnt);
194 }
195 mutex_exit(&npf->ext_lock);
196
197 if (!ext) {
198 return ENOENT;
199 }
200
201 extops = ext->ext_ops;
202 KASSERT(extops != NULL);
203
204 error = extops->ctor(rp, params);
205 if (error) {
206 atomic_dec_uint(&ext->ext_refcnt);
207 return error;
208 }
209 i = rp->rp_ext_count++;
210 rp->rp_ext[i] = ext;
211 return 0;
212 }
213
214 /*
215 * Rule procedure management.
216 */
217
218 npf_rprocset_t *
219 npf_rprocset_create(void)
220 {
221 npf_rprocset_t *rpset;
222
223 rpset = kmem_zalloc(sizeof(npf_rprocset_t), KM_SLEEP);
224 LIST_INIT(&rpset->rps_list);
225 return rpset;
226 }
227
228 void
229 npf_rprocset_destroy(npf_rprocset_t *rpset)
230 {
231 npf_rproc_t *rp;
232
233 while ((rp = LIST_FIRST(&rpset->rps_list)) != NULL) {
234 LIST_REMOVE(rp, rp_entry);
235 npf_rproc_release(rp);
236 }
237 kmem_free(rpset, sizeof(npf_rprocset_t));
238 }
239
240 /*
241 * npf_rproc_lookup: find a rule procedure by the name.
242 */
243 npf_rproc_t *
244 npf_rprocset_lookup(npf_rprocset_t *rpset, const char *name)
245 {
246 npf_rproc_t *rp;
247
248 LIST_FOREACH(rp, &rpset->rps_list, rp_entry) {
249 if (strncmp(rp->rp_name, name, RPROC_NAME_LEN) == 0)
250 break;
251 }
252 return rp;
253 }
254
255 /*
256 * npf_rproc_insert: insert a new rule procedure into the set.
257 */
258 void
259 npf_rprocset_insert(npf_rprocset_t *rpset, npf_rproc_t *rp)
260 {
261 LIST_INSERT_HEAD(&rpset->rps_list, rp, rp_entry);
262 }
263
264 int
265 npf_rprocset_export(const npf_rprocset_t *rpset, prop_array_t rprocs)
266 {
267 prop_dictionary_t rpdict;
268 const npf_rproc_t *rp;
269
270 LIST_FOREACH(rp, &rpset->rps_list, rp_entry) {
271 rpdict = prop_dictionary_create();
272 prop_array_t extcalls = prop_array_create();
273 prop_dictionary_set_and_rel(rpdict, "extcalls", extcalls);
274 prop_dictionary_set_cstring(rpdict, "name", rp->rp_name);
275 prop_dictionary_set_uint32(rpdict, "flags", rp->rp_flags);
276 prop_array_add(rprocs, rpdict);
277 prop_object_release(rpdict);
278 }
279 return 0;
280 }
281
282 /*
283 * npf_rproc_create: construct a new rule procedure, lookup and associate
284 * the extension calls with it.
285 */
286 npf_rproc_t *
287 npf_rproc_create(prop_dictionary_t rpdict)
288 {
289 const char *name;
290 npf_rproc_t *rp;
291
292 if (!prop_dictionary_get_cstring_nocopy(rpdict, "name", &name)) {
293 return NULL;
294 }
295
296 rp = kmem_intr_zalloc(sizeof(npf_rproc_t), KM_SLEEP);
297 rp->rp_refcnt = 1;
298
299 strlcpy(rp->rp_name, name, RPROC_NAME_LEN);
300 prop_dictionary_get_uint32(rpdict, "flags", &rp->rp_flags);
301 return rp;
302 }
303
304 /*
305 * npf_rproc_acquire: acquire the reference on the rule procedure.
306 */
307 void
308 npf_rproc_acquire(npf_rproc_t *rp)
309 {
310 atomic_inc_uint(&rp->rp_refcnt);
311 }
312
313 /*
314 * npf_rproc_release: drop the reference count and destroy the rule
315 * procedure on the last reference.
316 */
317 void
318 npf_rproc_release(npf_rproc_t *rp)
319 {
320
321 KASSERT(rp->rp_refcnt > 0);
322 if (atomic_dec_uint_nv(&rp->rp_refcnt) != 0) {
323 return;
324 }
325 /* XXXintr */
326 for (unsigned i = 0; i < rp->rp_ext_count; i++) {
327 npf_ext_t *ext = rp->rp_ext[i];
328 const npf_ext_ops_t *extops = ext->ext_ops;
329
330 extops->dtor(rp, rp->rp_ext_meta[i]);
331 atomic_dec_uint(&ext->ext_refcnt);
332 }
333 kmem_intr_free(rp, sizeof(npf_rproc_t));
334 }
335
336 void
337 npf_rproc_assign(npf_rproc_t *rp, void *params)
338 {
339 unsigned i = rp->rp_ext_count;
340
341 /* Note: params may be NULL. */
342 KASSERT(i < RPROC_EXT_COUNT);
343 rp->rp_ext_meta[i] = params;
344 }
345
346 /*
347 * npf_rproc_run: run the rule procedure by executing each extension call.
348 *
349 * => Reference on the rule procedure must be held.
350 */
351 bool
352 npf_rproc_run(npf_cache_t *npc, npf_rproc_t *rp, int *decision)
353 {
354 const unsigned extcount = rp->rp_ext_count;
355
356 KASSERT(!nbuf_flag_p(npc->npc_nbuf, NBUF_DATAREF_RESET));
357 KASSERT(rp->rp_refcnt > 0);
358
359 for (unsigned i = 0; i < extcount; i++) {
360 const npf_ext_t *ext = rp->rp_ext[i];
361 const npf_ext_ops_t *extops = ext->ext_ops;
362
363 KASSERT(ext->ext_refcnt > 0);
364 if (!extops->proc(npc, rp->rp_ext_meta[i], decision)) {
365 return false;
366 }
367
368 if (nbuf_flag_p(npc->npc_nbuf, NBUF_DATAREF_RESET)) {
369 npf_recache(npc);
370 }
371 }
372
373 return true;
374 }
375