pfil.c revision 1.32 1 1.32 ryo /* $NetBSD: pfil.c,v 1.32 2017/01/16 09:28:40 ryo Exp $ */
2 1.1 mrg
3 1.1 mrg /*
4 1.28 rmind * Copyright (c) 2013 Mindaugas Rasiukevicius <rmind at NetBSD org>
5 1.1 mrg * Copyright (c) 1996 Matthew R. Green
6 1.1 mrg * All rights reserved.
7 1.1 mrg *
8 1.1 mrg * Redistribution and use in source and binary forms, with or without
9 1.1 mrg * modification, are permitted provided that the following conditions
10 1.1 mrg * are met:
11 1.1 mrg * 1. Redistributions of source code must retain the above copyright
12 1.1 mrg * notice, this list of conditions and the following disclaimer.
13 1.1 mrg * 2. Redistributions in binary form must reproduce the above copyright
14 1.1 mrg * notice, this list of conditions and the following disclaimer in the
15 1.1 mrg * documentation and/or other materials provided with the distribution.
16 1.1 mrg *
17 1.1 mrg * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18 1.1 mrg * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19 1.1 mrg * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20 1.1 mrg * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21 1.1 mrg * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
22 1.1 mrg * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
23 1.1 mrg * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
24 1.1 mrg * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
25 1.1 mrg * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26 1.1 mrg * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27 1.1 mrg * SUCH DAMAGE.
28 1.1 mrg */
29 1.20 lukem
30 1.20 lukem #include <sys/cdefs.h>
31 1.32 ryo __KERNEL_RCSID(0, "$NetBSD: pfil.c,v 1.32 2017/01/16 09:28:40 ryo Exp $");
32 1.1 mrg
33 1.1 mrg #include <sys/param.h>
34 1.1 mrg #include <sys/systm.h>
35 1.1 mrg #include <sys/queue.h>
36 1.28 rmind #include <sys/kmem.h>
37 1.32 ryo #include <sys/psref.h>
38 1.1 mrg
39 1.1 mrg #include <net/if.h>
40 1.1 mrg #include <net/pfil.h>
41 1.1 mrg
42 1.28 rmind #define MAX_HOOKS 8
43 1.16 thorpej
44 1.29 christos /* Func is either pfil_func_t or pfil_ifunc_t. */
45 1.29 christos typedef void (*pfil_polyfunc_t)(void);
46 1.29 christos
47 1.28 rmind typedef struct {
48 1.29 christos pfil_polyfunc_t pfil_func;
49 1.28 rmind void * pfil_arg;
50 1.28 rmind } pfil_hook_t;
51 1.28 rmind
52 1.28 rmind typedef struct {
53 1.28 rmind pfil_hook_t hooks[MAX_HOOKS];
54 1.28 rmind u_int nhooks;
55 1.32 ryo struct psref_target psref;
56 1.28 rmind } pfil_list_t;
57 1.28 rmind
58 1.32 ryo typedef struct {
59 1.32 ryo pfil_list_t *active; /* lists[0] or lists[1] */
60 1.32 ryo pfil_list_t lists[2];
61 1.32 ryo } pfil_listset_t;
62 1.32 ryo
63 1.29 christos CTASSERT(PFIL_IN == 1);
64 1.29 christos CTASSERT(PFIL_OUT == 2);
65 1.29 christos
66 1.28 rmind struct pfil_head {
67 1.32 ryo pfil_listset_t ph_in;
68 1.32 ryo pfil_listset_t ph_out;
69 1.32 ryo pfil_listset_t ph_ifaddr;
70 1.32 ryo pfil_listset_t ph_ifevent;
71 1.28 rmind int ph_type;
72 1.28 rmind void * ph_key;
73 1.28 rmind LIST_ENTRY(pfil_head) ph_list;
74 1.28 rmind };
75 1.28 rmind
76 1.28 rmind static const int pfil_flag_cases[] = {
77 1.31 ryo PFIL_IN, PFIL_OUT
78 1.28 rmind };
79 1.16 thorpej
80 1.28 rmind static LIST_HEAD(, pfil_head) pfil_head_list __read_mostly =
81 1.16 thorpej LIST_HEAD_INITIALIZER(&pfil_head_list);
82 1.16 thorpej
83 1.32 ryo static kmutex_t pfil_mtx __cacheline_aligned;
84 1.32 ryo static struct psref_class *pfil_psref_class __read_mostly;
85 1.32 ryo static pserialize_t pfil_psz;
86 1.32 ryo
87 1.32 ryo void
88 1.32 ryo pfil_init(void)
89 1.32 ryo {
90 1.32 ryo mutex_init(&pfil_mtx, MUTEX_DEFAULT, IPL_NONE);
91 1.32 ryo pfil_psz = pserialize_create();
92 1.32 ryo pfil_psref_class = psref_class_create("pfil", IPL_SOFTNET);
93 1.32 ryo }
94 1.32 ryo
95 1.32 ryo static inline void
96 1.32 ryo pfil_listset_init(pfil_listset_t *pflistset)
97 1.32 ryo {
98 1.32 ryo pflistset->active = &pflistset->lists[0];
99 1.32 ryo psref_target_init(&pflistset->active->psref, pfil_psref_class);
100 1.32 ryo }
101 1.32 ryo
102 1.16 thorpej /*
103 1.28 rmind * pfil_head_create: create and register a packet filter head.
104 1.16 thorpej */
105 1.28 rmind pfil_head_t *
106 1.28 rmind pfil_head_create(int type, void *key)
107 1.16 thorpej {
108 1.28 rmind pfil_head_t *ph;
109 1.1 mrg
110 1.28 rmind if (pfil_head_get(type, key)) {
111 1.28 rmind return NULL;
112 1.16 thorpej }
113 1.28 rmind ph = kmem_zalloc(sizeof(pfil_head_t), KM_SLEEP);
114 1.28 rmind ph->ph_type = type;
115 1.28 rmind ph->ph_key = key;
116 1.16 thorpej
117 1.32 ryo pfil_listset_init(&ph->ph_in);
118 1.32 ryo pfil_listset_init(&ph->ph_out);
119 1.32 ryo pfil_listset_init(&ph->ph_ifaddr);
120 1.32 ryo pfil_listset_init(&ph->ph_ifevent);
121 1.32 ryo
122 1.16 thorpej LIST_INSERT_HEAD(&pfil_head_list, ph, ph_list);
123 1.28 rmind return ph;
124 1.16 thorpej }
125 1.16 thorpej
126 1.16 thorpej /*
127 1.28 rmind * pfil_head_destroy: remove and destroy a packet filter head.
128 1.16 thorpej */
129 1.28 rmind void
130 1.28 rmind pfil_head_destroy(pfil_head_t *pfh)
131 1.16 thorpej {
132 1.16 thorpej LIST_REMOVE(pfh, ph_list);
133 1.32 ryo
134 1.32 ryo psref_target_destroy(&pfh->ph_in.active->psref, pfil_psref_class);
135 1.32 ryo psref_target_destroy(&pfh->ph_out.active->psref, pfil_psref_class);
136 1.32 ryo psref_target_destroy(&pfh->ph_ifaddr.active->psref, pfil_psref_class);
137 1.32 ryo psref_target_destroy(&pfh->ph_ifevent.active->psref, pfil_psref_class);
138 1.32 ryo
139 1.28 rmind kmem_free(pfh, sizeof(pfil_head_t));
140 1.16 thorpej }
141 1.16 thorpej
142 1.16 thorpej /*
143 1.28 rmind * pfil_head_get: returns the packer filter head for a given key.
144 1.16 thorpej */
145 1.28 rmind pfil_head_t *
146 1.28 rmind pfil_head_get(int type, void *key)
147 1.16 thorpej {
148 1.28 rmind pfil_head_t *ph;
149 1.16 thorpej
150 1.27 dyoung LIST_FOREACH(ph, &pfil_head_list, ph_list) {
151 1.28 rmind if (ph->ph_type == type && ph->ph_key == key)
152 1.16 thorpej break;
153 1.16 thorpej }
154 1.28 rmind return ph;
155 1.1 mrg }
156 1.1 mrg
157 1.32 ryo static pfil_listset_t *
158 1.28 rmind pfil_hook_get(int dir, pfil_head_t *ph)
159 1.1 mrg {
160 1.28 rmind switch (dir) {
161 1.28 rmind case PFIL_IN:
162 1.30 ryo return &ph->ph_in;
163 1.28 rmind case PFIL_OUT:
164 1.30 ryo return &ph->ph_out;
165 1.28 rmind case PFIL_IFADDR:
166 1.28 rmind return &ph->ph_ifaddr;
167 1.28 rmind case PFIL_IFNET:
168 1.28 rmind return &ph->ph_ifevent;
169 1.21 itojun }
170 1.28 rmind return NULL;
171 1.1 mrg }
172 1.1 mrg
173 1.13 darrenr static int
174 1.32 ryo pfil_list_add(pfil_listset_t *phlistset, pfil_polyfunc_t func, void *arg,
175 1.32 ryo int flags)
176 1.1 mrg {
177 1.32 ryo u_int nhooks;
178 1.32 ryo pfil_list_t *newlist, *oldlist;
179 1.28 rmind pfil_hook_t *pfh;
180 1.1 mrg
181 1.32 ryo mutex_enter(&pfil_mtx);
182 1.32 ryo
183 1.28 rmind /* Check if we have a free slot. */
184 1.32 ryo nhooks = phlistset->active->nhooks;
185 1.28 rmind if (nhooks == MAX_HOOKS) {
186 1.32 ryo mutex_exit(&pfil_mtx);
187 1.28 rmind return ENOSPC;
188 1.28 rmind }
189 1.28 rmind KASSERT(nhooks < MAX_HOOKS);
190 1.28 rmind
191 1.32 ryo if (phlistset->active == &phlistset->lists[0]) {
192 1.32 ryo oldlist = &phlistset->lists[0];
193 1.32 ryo newlist = &phlistset->lists[1];
194 1.32 ryo } else{
195 1.32 ryo oldlist = &phlistset->lists[1];
196 1.32 ryo newlist = &phlistset->lists[0];
197 1.32 ryo }
198 1.32 ryo
199 1.28 rmind /* Make sure the hook is not already added. */
200 1.28 rmind for (u_int i = 0; i < nhooks; i++) {
201 1.32 ryo pfh = &oldlist->hooks[i];
202 1.32 ryo if (pfh->pfil_func == func && pfh->pfil_arg == arg) {
203 1.32 ryo mutex_exit(&pfil_mtx);
204 1.16 thorpej return EEXIST;
205 1.32 ryo }
206 1.16 thorpej }
207 1.16 thorpej
208 1.32 ryo /* create new pfil_list_t copied from old */
209 1.32 ryo memcpy(newlist, oldlist, sizeof(pfil_list_t));
210 1.32 ryo psref_target_init(&newlist->psref, pfil_psref_class);
211 1.32 ryo
212 1.28 rmind /*
213 1.28 rmind * Finally, add the hook. Note: for PFIL_IN we insert the hooks in
214 1.28 rmind * reverse order of the PFIL_OUT so that the same path is followed
215 1.28 rmind * in or out of the kernel.
216 1.28 rmind */
217 1.28 rmind if (flags & PFIL_IN) {
218 1.28 rmind /* XXX: May want to revisit this later; */
219 1.28 rmind size_t len = sizeof(pfil_hook_t) * nhooks;
220 1.32 ryo pfh = &newlist->hooks[0];
221 1.32 ryo memmove(&newlist->hooks[1], pfh, len);
222 1.28 rmind } else {
223 1.32 ryo pfh = &newlist->hooks[nhooks];
224 1.28 rmind }
225 1.32 ryo newlist->nhooks++;
226 1.16 thorpej
227 1.1 mrg pfh->pfil_func = func;
228 1.16 thorpej pfh->pfil_arg = arg;
229 1.32 ryo
230 1.32 ryo /* switch from oldlist to newlist */
231 1.32 ryo phlistset->active = newlist;
232 1.32 ryo membar_producer();
233 1.32 ryo pserialize_perform(pfil_psz);
234 1.32 ryo mutex_exit(&pfil_mtx);
235 1.32 ryo
236 1.32 ryo /* Wait for all readers */
237 1.32 ryo psref_target_destroy(&oldlist->psref, pfil_psref_class);
238 1.32 ryo
239 1.13 darrenr return 0;
240 1.1 mrg }
241 1.1 mrg
242 1.1 mrg /*
243 1.28 rmind * pfil_add_hook: add a function (hook) to the packet filter head.
244 1.28 rmind * The possible flags are:
245 1.28 rmind *
246 1.28 rmind * PFIL_IN call on incoming packets
247 1.28 rmind * PFIL_OUT call on outgoing packets
248 1.28 rmind * PFIL_ALL call on all of the above
249 1.1 mrg */
250 1.13 darrenr int
251 1.28 rmind pfil_add_hook(pfil_func_t func, void *arg, int flags, pfil_head_t *ph)
252 1.1 mrg {
253 1.28 rmind int error = 0;
254 1.28 rmind
255 1.28 rmind KASSERT(func != NULL);
256 1.29 christos KASSERT((flags & ~PFIL_ALL) == 0);
257 1.28 rmind
258 1.28 rmind for (u_int i = 0; i < __arraycount(pfil_flag_cases); i++) {
259 1.28 rmind const int fcase = pfil_flag_cases[i];
260 1.32 ryo pfil_listset_t *phlistset;
261 1.1 mrg
262 1.28 rmind if ((flags & fcase) == 0) {
263 1.28 rmind continue;
264 1.28 rmind }
265 1.32 ryo phlistset = pfil_hook_get(fcase, ph);
266 1.32 ryo error = pfil_list_add(phlistset, (pfil_polyfunc_t)func, arg,
267 1.32 ryo flags);
268 1.32 ryo if (error && (error != EEXIST))
269 1.28 rmind break;
270 1.28 rmind }
271 1.32 ryo if (error && (error != EEXIST)) {
272 1.28 rmind pfil_remove_hook(func, arg, flags, ph);
273 1.28 rmind }
274 1.28 rmind return error;
275 1.1 mrg }
276 1.1 mrg
277 1.1 mrg /*
278 1.31 ryo * pfil_add_ihook: add an interface-event function (hook) to the packet
279 1.29 christos * filter head. The possible flags are:
280 1.29 christos *
281 1.31 ryo * PFIL_IFADDR call on interface reconfig (cmd is ioctl #)
282 1.31 ryo * PFIL_IFNET call on interface attach/detach (cmd is PFIL_IFNET_*)
283 1.29 christos */
284 1.29 christos int
285 1.29 christos pfil_add_ihook(pfil_ifunc_t func, void *arg, int flags, pfil_head_t *ph)
286 1.29 christos {
287 1.32 ryo pfil_listset_t *phlistset;
288 1.29 christos
289 1.31 ryo KASSERT(func != NULL);
290 1.29 christos KASSERT(flags == PFIL_IFADDR || flags == PFIL_IFNET);
291 1.31 ryo
292 1.32 ryo phlistset = pfil_hook_get(flags, ph);
293 1.32 ryo return pfil_list_add(phlistset, (pfil_polyfunc_t)func, arg, flags);
294 1.29 christos }
295 1.29 christos
296 1.29 christos /*
297 1.28 rmind * pfil_list_remove: remove the hook from a specified list.
298 1.1 mrg */
299 1.13 darrenr static int
300 1.32 ryo pfil_list_remove(pfil_listset_t *phlistset, pfil_polyfunc_t func, void *arg)
301 1.1 mrg {
302 1.32 ryo u_int nhooks;
303 1.32 ryo pfil_list_t *oldlist, *newlist;
304 1.32 ryo
305 1.32 ryo mutex_enter(&pfil_mtx);
306 1.1 mrg
307 1.32 ryo /* create new pfil_list_t copied from old */
308 1.32 ryo if (phlistset->active == &phlistset->lists[0]) {
309 1.32 ryo oldlist = &phlistset->lists[0];
310 1.32 ryo newlist = &phlistset->lists[1];
311 1.32 ryo } else{
312 1.32 ryo oldlist = &phlistset->lists[1];
313 1.32 ryo newlist = &phlistset->lists[0];
314 1.32 ryo }
315 1.32 ryo memcpy(newlist, oldlist, sizeof(*newlist));
316 1.32 ryo psref_target_init(&newlist->psref, pfil_psref_class);
317 1.32 ryo
318 1.32 ryo nhooks = newlist->nhooks;
319 1.28 rmind for (u_int i = 0; i < nhooks; i++) {
320 1.32 ryo pfil_hook_t *last, *pfh = &newlist->hooks[i];
321 1.28 rmind
322 1.28 rmind if (pfh->pfil_func != func || pfh->pfil_arg != arg) {
323 1.28 rmind continue;
324 1.28 rmind }
325 1.32 ryo if ((last = &newlist->hooks[nhooks - 1]) != pfh) {
326 1.28 rmind memcpy(pfh, last, sizeof(pfil_hook_t));
327 1.1 mrg }
328 1.32 ryo newlist->nhooks--;
329 1.32 ryo
330 1.32 ryo /* switch from oldlist to newlist */
331 1.32 ryo phlistset->active = newlist;
332 1.32 ryo membar_producer();
333 1.32 ryo pserialize_perform(pfil_psz);
334 1.32 ryo mutex_exit(&pfil_mtx);
335 1.32 ryo
336 1.32 ryo /* Wait for all readers */
337 1.32 ryo psref_target_destroy(&oldlist->psref, pfil_psref_class);
338 1.32 ryo
339 1.28 rmind return 0;
340 1.16 thorpej }
341 1.32 ryo mutex_exit(&pfil_mtx);
342 1.13 darrenr return ENOENT;
343 1.1 mrg }
344 1.28 rmind
345 1.28 rmind /*
346 1.28 rmind * pfil_remove_hook: remove the hook from the packet filter head.
347 1.28 rmind */
348 1.28 rmind int
349 1.28 rmind pfil_remove_hook(pfil_func_t func, void *arg, int flags, pfil_head_t *ph)
350 1.28 rmind {
351 1.31 ryo KASSERT((flags & ~PFIL_ALL) == 0);
352 1.31 ryo
353 1.28 rmind for (u_int i = 0; i < __arraycount(pfil_flag_cases); i++) {
354 1.28 rmind const int fcase = pfil_flag_cases[i];
355 1.32 ryo pfil_listset_t *pflistset;
356 1.28 rmind
357 1.28 rmind if ((flags & fcase) == 0) {
358 1.28 rmind continue;
359 1.28 rmind }
360 1.32 ryo pflistset = pfil_hook_get(fcase, ph);
361 1.32 ryo (void)pfil_list_remove(pflistset, (pfil_polyfunc_t)func, arg);
362 1.28 rmind }
363 1.28 rmind return 0;
364 1.28 rmind }
365 1.28 rmind
366 1.29 christos int
367 1.29 christos pfil_remove_ihook(pfil_ifunc_t func, void *arg, int flags, pfil_head_t *ph)
368 1.29 christos {
369 1.32 ryo pfil_listset_t *pflistset;
370 1.29 christos
371 1.29 christos KASSERT(flags == PFIL_IFADDR || flags == PFIL_IFNET);
372 1.32 ryo pflistset = pfil_hook_get(flags, ph);
373 1.32 ryo (void)pfil_list_remove(pflistset, (pfil_polyfunc_t)func, arg);
374 1.29 christos return 0;
375 1.29 christos }
376 1.29 christos
377 1.28 rmind /*
378 1.28 rmind * pfil_run_hooks: run the specified packet filter hooks.
379 1.28 rmind */
380 1.28 rmind int
381 1.28 rmind pfil_run_hooks(pfil_head_t *ph, struct mbuf **mp, ifnet_t *ifp, int dir)
382 1.28 rmind {
383 1.29 christos struct mbuf *m = mp ? *mp : NULL;
384 1.32 ryo pfil_listset_t *phlistset;
385 1.28 rmind pfil_list_t *phlist;
386 1.32 ryo struct psref psref;
387 1.32 ryo int s;
388 1.28 rmind int ret = 0;
389 1.28 rmind
390 1.31 ryo KASSERT(dir == PFIL_IN || dir == PFIL_OUT);
391 1.32 ryo if (__predict_false((phlistset = pfil_hook_get(dir, ph)) == NULL)) {
392 1.28 rmind return ret;
393 1.28 rmind }
394 1.28 rmind
395 1.32 ryo s = pserialize_read_enter();
396 1.32 ryo phlist = phlistset->active;
397 1.32 ryo membar_datadep_consumer();
398 1.32 ryo psref_acquire(&psref, &phlist->psref, pfil_psref_class);
399 1.32 ryo pserialize_read_exit(s);
400 1.28 rmind for (u_int i = 0; i < phlist->nhooks; i++) {
401 1.28 rmind pfil_hook_t *pfh = &phlist->hooks[i];
402 1.29 christos pfil_func_t func = (pfil_func_t)pfh->pfil_func;
403 1.28 rmind
404 1.29 christos ret = (*func)(pfh->pfil_arg, &m, ifp, dir);
405 1.29 christos if (m == NULL || ret)
406 1.28 rmind break;
407 1.28 rmind }
408 1.32 ryo psref_release(&psref, &phlist->psref, pfil_psref_class);
409 1.28 rmind
410 1.29 christos if (mp) {
411 1.28 rmind *mp = m;
412 1.28 rmind }
413 1.28 rmind return ret;
414 1.28 rmind }
415 1.29 christos
416 1.32 ryo static void
417 1.32 ryo pfil_run_arg(pfil_listset_t *phlistset, u_long cmd, void *arg)
418 1.29 christos {
419 1.32 ryo pfil_list_t *phlist;
420 1.32 ryo struct psref psref;
421 1.32 ryo int s;
422 1.29 christos
423 1.32 ryo s = pserialize_read_enter();
424 1.32 ryo phlist = phlistset->active;
425 1.32 ryo membar_datadep_consumer();
426 1.32 ryo psref_acquire(&psref, &phlist->psref, pfil_psref_class);
427 1.32 ryo pserialize_read_exit(s);
428 1.29 christos for (u_int i = 0; i < phlist->nhooks; i++) {
429 1.29 christos pfil_hook_t *pfh = &phlist->hooks[i];
430 1.29 christos pfil_ifunc_t func = (pfil_ifunc_t)pfh->pfil_func;
431 1.32 ryo (*func)(pfh->pfil_arg, cmd, arg);
432 1.29 christos }
433 1.32 ryo psref_release(&psref, &phlist->psref, pfil_psref_class);
434 1.32 ryo }
435 1.32 ryo
436 1.32 ryo void
437 1.32 ryo pfil_run_addrhooks(pfil_head_t *ph, u_long cmd, struct ifaddr *ifa)
438 1.32 ryo {
439 1.32 ryo pfil_run_arg(&ph->ph_ifaddr, cmd, ifa);
440 1.29 christos }
441 1.29 christos
442 1.29 christos void
443 1.29 christos pfil_run_ifhooks(pfil_head_t *ph, u_long cmd, struct ifnet *ifp)
444 1.29 christos {
445 1.32 ryo pfil_run_arg(&ph->ph_ifevent, cmd, ifp);
446 1.29 christos }
447