Home | History | Annotate | Line # | Download | only in net
pfil.c revision 1.35.14.1
      1  1.35.14.1    martin /*	$NetBSD: pfil.c,v 1.35.14.1 2020/04/08 14:08:57 martin Exp $	*/
      2        1.1       mrg 
      3        1.1       mrg /*
      4       1.28     rmind  * Copyright (c) 2013 Mindaugas Rasiukevicius <rmind at NetBSD org>
      5        1.1       mrg  * Copyright (c) 1996 Matthew R. Green
      6        1.1       mrg  * All rights reserved.
      7        1.1       mrg  *
      8        1.1       mrg  * Redistribution and use in source and binary forms, with or without
      9        1.1       mrg  * modification, are permitted provided that the following conditions
     10        1.1       mrg  * are met:
     11        1.1       mrg  * 1. Redistributions of source code must retain the above copyright
     12        1.1       mrg  *    notice, this list of conditions and the following disclaimer.
     13        1.1       mrg  * 2. Redistributions in binary form must reproduce the above copyright
     14        1.1       mrg  *    notice, this list of conditions and the following disclaimer in the
     15        1.1       mrg  *    documentation and/or other materials provided with the distribution.
     16        1.1       mrg  *
     17        1.1       mrg  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
     18        1.1       mrg  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
     19        1.1       mrg  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
     20        1.1       mrg  * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
     21        1.1       mrg  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
     22        1.1       mrg  * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
     23        1.1       mrg  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
     24        1.1       mrg  * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
     25        1.1       mrg  * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     26        1.1       mrg  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     27        1.1       mrg  * SUCH DAMAGE.
     28        1.1       mrg  */
     29       1.20     lukem 
     30       1.20     lukem #include <sys/cdefs.h>
     31  1.35.14.1    martin __KERNEL_RCSID(0, "$NetBSD: pfil.c,v 1.35.14.1 2020/04/08 14:08:57 martin Exp $");
     32       1.34     ozaki 
     33       1.34     ozaki #if defined(_KERNEL_OPT)
     34       1.34     ozaki #include "opt_net_mpsafe.h"
     35       1.34     ozaki #endif
     36        1.1       mrg 
     37        1.1       mrg #include <sys/param.h>
     38        1.1       mrg #include <sys/systm.h>
     39        1.1       mrg #include <sys/queue.h>
     40       1.28     rmind #include <sys/kmem.h>
     41       1.32       ryo #include <sys/psref.h>
     42        1.1       mrg 
     43        1.1       mrg #include <net/if.h>
     44        1.1       mrg #include <net/pfil.h>
     45        1.1       mrg 
     46       1.28     rmind #define	MAX_HOOKS	8
     47       1.16   thorpej 
     48       1.29  christos /* Func is either pfil_func_t or pfil_ifunc_t. */
     49       1.29  christos typedef void		(*pfil_polyfunc_t)(void);
     50       1.29  christos 
     51       1.28     rmind typedef struct {
     52       1.29  christos 	pfil_polyfunc_t pfil_func;
     53       1.28     rmind 	void *		pfil_arg;
     54       1.28     rmind } pfil_hook_t;
     55       1.28     rmind 
     56       1.28     rmind typedef struct {
     57       1.28     rmind 	pfil_hook_t	hooks[MAX_HOOKS];
     58       1.28     rmind 	u_int		nhooks;
     59       1.32       ryo 	struct psref_target psref;
     60       1.28     rmind } pfil_list_t;
     61       1.28     rmind 
     62       1.32       ryo typedef struct {
     63       1.32       ryo 	pfil_list_t	*active;	/* lists[0] or lists[1] */
     64       1.32       ryo 	pfil_list_t	lists[2];
     65       1.32       ryo } pfil_listset_t;
     66       1.32       ryo 
     67       1.29  christos CTASSERT(PFIL_IN == 1);
     68       1.29  christos CTASSERT(PFIL_OUT == 2);
     69       1.29  christos 
     70       1.28     rmind struct pfil_head {
     71       1.32       ryo 	pfil_listset_t	ph_in;
     72       1.32       ryo 	pfil_listset_t	ph_out;
     73       1.32       ryo 	pfil_listset_t	ph_ifaddr;
     74       1.32       ryo 	pfil_listset_t	ph_ifevent;
     75       1.28     rmind 	int		ph_type;
     76       1.28     rmind 	void *		ph_key;
     77       1.28     rmind 	LIST_ENTRY(pfil_head) ph_list;
     78       1.28     rmind };
     79       1.28     rmind 
     80       1.28     rmind static const int pfil_flag_cases[] = {
     81       1.31       ryo 	PFIL_IN, PFIL_OUT
     82       1.28     rmind };
     83       1.16   thorpej 
     84       1.28     rmind static LIST_HEAD(, pfil_head) pfil_head_list __read_mostly =
     85       1.16   thorpej     LIST_HEAD_INITIALIZER(&pfil_head_list);
     86       1.16   thorpej 
     87       1.32       ryo static kmutex_t pfil_mtx __cacheline_aligned;
     88       1.32       ryo static struct psref_class *pfil_psref_class __read_mostly;
     89       1.32       ryo static pserialize_t pfil_psz;
     90       1.32       ryo 
     91       1.32       ryo void
     92       1.32       ryo pfil_init(void)
     93       1.32       ryo {
     94       1.32       ryo 	mutex_init(&pfil_mtx, MUTEX_DEFAULT, IPL_NONE);
     95       1.32       ryo 	pfil_psz = pserialize_create();
     96       1.32       ryo 	pfil_psref_class = psref_class_create("pfil", IPL_SOFTNET);
     97       1.32       ryo }
     98       1.32       ryo 
     99       1.32       ryo static inline void
    100       1.32       ryo pfil_listset_init(pfil_listset_t *pflistset)
    101       1.32       ryo {
    102       1.32       ryo 	pflistset->active = &pflistset->lists[0];
    103       1.32       ryo 	psref_target_init(&pflistset->active->psref, pfil_psref_class);
    104       1.32       ryo }
    105       1.32       ryo 
    106       1.16   thorpej /*
    107       1.28     rmind  * pfil_head_create: create and register a packet filter head.
    108       1.16   thorpej  */
    109       1.28     rmind pfil_head_t *
    110       1.28     rmind pfil_head_create(int type, void *key)
    111       1.16   thorpej {
    112       1.28     rmind 	pfil_head_t *ph;
    113        1.1       mrg 
    114       1.28     rmind 	if (pfil_head_get(type, key)) {
    115       1.28     rmind 		return NULL;
    116       1.16   thorpej 	}
    117       1.28     rmind 	ph = kmem_zalloc(sizeof(pfil_head_t), KM_SLEEP);
    118       1.28     rmind 	ph->ph_type = type;
    119       1.28     rmind 	ph->ph_key = key;
    120       1.16   thorpej 
    121       1.32       ryo 	pfil_listset_init(&ph->ph_in);
    122       1.32       ryo 	pfil_listset_init(&ph->ph_out);
    123       1.32       ryo 	pfil_listset_init(&ph->ph_ifaddr);
    124       1.32       ryo 	pfil_listset_init(&ph->ph_ifevent);
    125       1.32       ryo 
    126       1.16   thorpej 	LIST_INSERT_HEAD(&pfil_head_list, ph, ph_list);
    127       1.28     rmind 	return ph;
    128       1.16   thorpej }
    129       1.16   thorpej 
    130       1.16   thorpej /*
    131       1.28     rmind  * pfil_head_destroy: remove and destroy a packet filter head.
    132       1.16   thorpej  */
    133       1.28     rmind void
    134       1.28     rmind pfil_head_destroy(pfil_head_t *pfh)
    135       1.16   thorpej {
    136       1.16   thorpej 	LIST_REMOVE(pfh, ph_list);
    137       1.32       ryo 
    138       1.32       ryo 	psref_target_destroy(&pfh->ph_in.active->psref, pfil_psref_class);
    139       1.32       ryo 	psref_target_destroy(&pfh->ph_out.active->psref, pfil_psref_class);
    140       1.32       ryo 	psref_target_destroy(&pfh->ph_ifaddr.active->psref, pfil_psref_class);
    141       1.32       ryo 	psref_target_destroy(&pfh->ph_ifevent.active->psref, pfil_psref_class);
    142       1.32       ryo 
    143       1.28     rmind 	kmem_free(pfh, sizeof(pfil_head_t));
    144       1.16   thorpej }
    145       1.16   thorpej 
    146       1.16   thorpej /*
    147       1.28     rmind  * pfil_head_get: returns the packer filter head for a given key.
    148       1.16   thorpej  */
    149       1.28     rmind pfil_head_t *
    150       1.28     rmind pfil_head_get(int type, void *key)
    151       1.16   thorpej {
    152       1.28     rmind 	pfil_head_t *ph;
    153       1.16   thorpej 
    154       1.27    dyoung 	LIST_FOREACH(ph, &pfil_head_list, ph_list) {
    155       1.28     rmind 		if (ph->ph_type == type && ph->ph_key == key)
    156       1.16   thorpej 			break;
    157       1.16   thorpej 	}
    158       1.28     rmind 	return ph;
    159        1.1       mrg }
    160        1.1       mrg 
    161       1.32       ryo static pfil_listset_t *
    162       1.28     rmind pfil_hook_get(int dir, pfil_head_t *ph)
    163        1.1       mrg {
    164       1.28     rmind 	switch (dir) {
    165       1.28     rmind 	case PFIL_IN:
    166       1.30       ryo 		return &ph->ph_in;
    167       1.28     rmind 	case PFIL_OUT:
    168       1.30       ryo 		return &ph->ph_out;
    169       1.28     rmind 	case PFIL_IFADDR:
    170       1.28     rmind 		return &ph->ph_ifaddr;
    171       1.28     rmind 	case PFIL_IFNET:
    172       1.28     rmind 		return &ph->ph_ifevent;
    173       1.21    itojun 	}
    174       1.28     rmind 	return NULL;
    175        1.1       mrg }
    176        1.1       mrg 
    177       1.13   darrenr static int
    178       1.32       ryo pfil_list_add(pfil_listset_t *phlistset, pfil_polyfunc_t func, void *arg,
    179       1.32       ryo               int flags)
    180        1.1       mrg {
    181       1.32       ryo 	u_int nhooks;
    182       1.32       ryo 	pfil_list_t *newlist, *oldlist;
    183       1.28     rmind 	pfil_hook_t *pfh;
    184        1.1       mrg 
    185       1.32       ryo 	mutex_enter(&pfil_mtx);
    186       1.32       ryo 
    187       1.28     rmind 	/* Check if we have a free slot. */
    188       1.32       ryo 	nhooks = phlistset->active->nhooks;
    189       1.28     rmind 	if (nhooks == MAX_HOOKS) {
    190       1.32       ryo 		mutex_exit(&pfil_mtx);
    191       1.28     rmind 		return ENOSPC;
    192       1.28     rmind 	}
    193       1.28     rmind 	KASSERT(nhooks < MAX_HOOKS);
    194       1.28     rmind 
    195       1.32       ryo 	if (phlistset->active == &phlistset->lists[0]) {
    196       1.32       ryo 		oldlist = &phlistset->lists[0];
    197       1.32       ryo 		newlist = &phlistset->lists[1];
    198       1.32       ryo 	} else{
    199       1.32       ryo 		oldlist = &phlistset->lists[1];
    200       1.32       ryo 		newlist = &phlistset->lists[0];
    201       1.32       ryo 	}
    202       1.32       ryo 
    203       1.28     rmind 	/* Make sure the hook is not already added. */
    204       1.28     rmind 	for (u_int i = 0; i < nhooks; i++) {
    205       1.32       ryo 		pfh = &oldlist->hooks[i];
    206       1.32       ryo 		if (pfh->pfil_func == func && pfh->pfil_arg == arg) {
    207       1.32       ryo 			mutex_exit(&pfil_mtx);
    208       1.16   thorpej 			return EEXIST;
    209       1.32       ryo 		}
    210       1.16   thorpej 	}
    211       1.16   thorpej 
    212       1.32       ryo 	/* create new pfil_list_t copied from old */
    213       1.32       ryo 	memcpy(newlist, oldlist, sizeof(pfil_list_t));
    214       1.32       ryo 	psref_target_init(&newlist->psref, pfil_psref_class);
    215       1.32       ryo 
    216       1.28     rmind 	/*
    217       1.28     rmind 	 * Finally, add the hook.  Note: for PFIL_IN we insert the hooks in
    218       1.28     rmind 	 * reverse order of the PFIL_OUT so that the same path is followed
    219       1.28     rmind 	 * in or out of the kernel.
    220       1.28     rmind 	 */
    221       1.28     rmind 	if (flags & PFIL_IN) {
    222       1.28     rmind 		/* XXX: May want to revisit this later; */
    223       1.28     rmind 		size_t len = sizeof(pfil_hook_t) * nhooks;
    224       1.32       ryo 		pfh = &newlist->hooks[0];
    225       1.32       ryo 		memmove(&newlist->hooks[1], pfh, len);
    226       1.28     rmind 	} else {
    227       1.32       ryo 		pfh = &newlist->hooks[nhooks];
    228       1.28     rmind 	}
    229       1.32       ryo 	newlist->nhooks++;
    230       1.16   thorpej 
    231        1.1       mrg 	pfh->pfil_func = func;
    232       1.16   thorpej 	pfh->pfil_arg  = arg;
    233       1.32       ryo 
    234       1.32       ryo 	/* switch from oldlist to newlist */
    235  1.35.14.1    martin 	atomic_store_release(&phlistset->active, newlist);
    236       1.34     ozaki #ifdef NET_MPSAFE
    237       1.32       ryo 	pserialize_perform(pfil_psz);
    238       1.34     ozaki #endif
    239       1.32       ryo 	mutex_exit(&pfil_mtx);
    240       1.32       ryo 
    241       1.32       ryo 	/* Wait for all readers */
    242       1.34     ozaki #ifdef NET_MPSAFE
    243       1.32       ryo 	psref_target_destroy(&oldlist->psref, pfil_psref_class);
    244       1.34     ozaki #endif
    245       1.32       ryo 
    246       1.13   darrenr 	return 0;
    247        1.1       mrg }
    248        1.1       mrg 
    249        1.1       mrg /*
    250       1.28     rmind  * pfil_add_hook: add a function (hook) to the packet filter head.
    251       1.28     rmind  * The possible flags are:
    252       1.28     rmind  *
    253       1.28     rmind  *	PFIL_IN		call on incoming packets
    254       1.28     rmind  *	PFIL_OUT	call on outgoing packets
    255       1.28     rmind  *	PFIL_ALL	call on all of the above
    256        1.1       mrg  */
    257       1.13   darrenr int
    258       1.28     rmind pfil_add_hook(pfil_func_t func, void *arg, int flags, pfil_head_t *ph)
    259        1.1       mrg {
    260       1.28     rmind 	int error = 0;
    261       1.28     rmind 
    262       1.28     rmind 	KASSERT(func != NULL);
    263       1.29  christos 	KASSERT((flags & ~PFIL_ALL) == 0);
    264       1.28     rmind 
    265       1.28     rmind 	for (u_int i = 0; i < __arraycount(pfil_flag_cases); i++) {
    266       1.28     rmind 		const int fcase = pfil_flag_cases[i];
    267       1.32       ryo 		pfil_listset_t *phlistset;
    268        1.1       mrg 
    269       1.28     rmind 		if ((flags & fcase) == 0) {
    270       1.28     rmind 			continue;
    271       1.28     rmind 		}
    272       1.32       ryo 		phlistset = pfil_hook_get(fcase, ph);
    273       1.32       ryo 		error = pfil_list_add(phlistset, (pfil_polyfunc_t)func, arg,
    274       1.32       ryo 		    flags);
    275       1.32       ryo 		if (error && (error != EEXIST))
    276       1.28     rmind 			break;
    277       1.28     rmind 	}
    278       1.32       ryo 	if (error && (error != EEXIST)) {
    279       1.28     rmind 		pfil_remove_hook(func, arg, flags, ph);
    280       1.28     rmind 	}
    281       1.28     rmind 	return error;
    282        1.1       mrg }
    283        1.1       mrg 
    284        1.1       mrg /*
    285       1.31       ryo  * pfil_add_ihook: add an interface-event function (hook) to the packet
    286       1.29  christos  * filter head.  The possible flags are:
    287       1.29  christos  *
    288       1.31       ryo  *	PFIL_IFADDR	call on interface reconfig (cmd is ioctl #)
    289       1.31       ryo  *	PFIL_IFNET	call on interface attach/detach (cmd is PFIL_IFNET_*)
    290       1.29  christos  */
    291       1.29  christos int
    292       1.29  christos pfil_add_ihook(pfil_ifunc_t func, void *arg, int flags, pfil_head_t *ph)
    293       1.29  christos {
    294       1.32       ryo 	pfil_listset_t *phlistset;
    295       1.29  christos 
    296       1.31       ryo 	KASSERT(func != NULL);
    297       1.29  christos 	KASSERT(flags == PFIL_IFADDR || flags == PFIL_IFNET);
    298       1.31       ryo 
    299       1.32       ryo 	phlistset = pfil_hook_get(flags, ph);
    300       1.32       ryo 	return pfil_list_add(phlistset, (pfil_polyfunc_t)func, arg, flags);
    301       1.29  christos }
    302       1.29  christos 
    303       1.29  christos /*
    304       1.28     rmind  * pfil_list_remove: remove the hook from a specified list.
    305        1.1       mrg  */
    306       1.13   darrenr static int
    307       1.32       ryo pfil_list_remove(pfil_listset_t *phlistset, pfil_polyfunc_t func, void *arg)
    308        1.1       mrg {
    309       1.32       ryo 	u_int nhooks;
    310       1.32       ryo 	pfil_list_t *oldlist, *newlist;
    311       1.32       ryo 
    312       1.32       ryo 	mutex_enter(&pfil_mtx);
    313        1.1       mrg 
    314       1.32       ryo 	/* create new pfil_list_t copied from old */
    315       1.32       ryo 	if (phlistset->active == &phlistset->lists[0]) {
    316       1.32       ryo 		oldlist = &phlistset->lists[0];
    317       1.32       ryo 		newlist = &phlistset->lists[1];
    318       1.32       ryo 	} else{
    319       1.32       ryo 		oldlist = &phlistset->lists[1];
    320       1.32       ryo 		newlist = &phlistset->lists[0];
    321       1.32       ryo 	}
    322       1.32       ryo 	memcpy(newlist, oldlist, sizeof(*newlist));
    323       1.32       ryo 	psref_target_init(&newlist->psref, pfil_psref_class);
    324       1.32       ryo 
    325       1.32       ryo 	nhooks = newlist->nhooks;
    326       1.28     rmind 	for (u_int i = 0; i < nhooks; i++) {
    327       1.32       ryo 		pfil_hook_t *last, *pfh = &newlist->hooks[i];
    328       1.28     rmind 
    329       1.28     rmind 		if (pfh->pfil_func != func || pfh->pfil_arg != arg) {
    330       1.28     rmind 			continue;
    331       1.28     rmind 		}
    332       1.32       ryo 		if ((last = &newlist->hooks[nhooks - 1]) != pfh) {
    333       1.28     rmind 			memcpy(pfh, last, sizeof(pfil_hook_t));
    334        1.1       mrg 		}
    335       1.32       ryo 		newlist->nhooks--;
    336       1.32       ryo 
    337       1.32       ryo 		/* switch from oldlist to newlist */
    338  1.35.14.1    martin 		atomic_store_release(&phlistset->active, newlist);
    339       1.34     ozaki #ifdef NET_MPSAFE
    340       1.32       ryo 		pserialize_perform(pfil_psz);
    341       1.34     ozaki #endif
    342       1.32       ryo 		mutex_exit(&pfil_mtx);
    343       1.32       ryo 
    344       1.32       ryo 		/* Wait for all readers */
    345       1.34     ozaki #ifdef NET_MPSAFE
    346       1.32       ryo 		psref_target_destroy(&oldlist->psref, pfil_psref_class);
    347       1.34     ozaki #endif
    348       1.32       ryo 
    349       1.28     rmind 		return 0;
    350       1.16   thorpej 	}
    351       1.32       ryo 	mutex_exit(&pfil_mtx);
    352       1.13   darrenr 	return ENOENT;
    353        1.1       mrg }
    354       1.28     rmind 
    355       1.28     rmind /*
    356       1.28     rmind  * pfil_remove_hook: remove the hook from the packet filter head.
    357       1.28     rmind  */
    358       1.28     rmind int
    359       1.28     rmind pfil_remove_hook(pfil_func_t func, void *arg, int flags, pfil_head_t *ph)
    360       1.28     rmind {
    361       1.31       ryo 	KASSERT((flags & ~PFIL_ALL) == 0);
    362       1.31       ryo 
    363       1.28     rmind 	for (u_int i = 0; i < __arraycount(pfil_flag_cases); i++) {
    364       1.28     rmind 		const int fcase = pfil_flag_cases[i];
    365       1.32       ryo 		pfil_listset_t *pflistset;
    366       1.28     rmind 
    367       1.28     rmind 		if ((flags & fcase) == 0) {
    368       1.28     rmind 			continue;
    369       1.28     rmind 		}
    370       1.32       ryo 		pflistset = pfil_hook_get(fcase, ph);
    371       1.32       ryo 		(void)pfil_list_remove(pflistset, (pfil_polyfunc_t)func, arg);
    372       1.28     rmind 	}
    373       1.28     rmind 	return 0;
    374       1.28     rmind }
    375       1.28     rmind 
    376       1.29  christos int
    377       1.29  christos pfil_remove_ihook(pfil_ifunc_t func, void *arg, int flags, pfil_head_t *ph)
    378       1.29  christos {
    379       1.32       ryo 	pfil_listset_t *pflistset;
    380       1.29  christos 
    381       1.29  christos 	KASSERT(flags == PFIL_IFADDR || flags == PFIL_IFNET);
    382       1.32       ryo 	pflistset = pfil_hook_get(flags, ph);
    383       1.32       ryo 	(void)pfil_list_remove(pflistset, (pfil_polyfunc_t)func, arg);
    384       1.29  christos 	return 0;
    385       1.29  christos }
    386       1.29  christos 
    387       1.28     rmind /*
    388       1.28     rmind  * pfil_run_hooks: run the specified packet filter hooks.
    389       1.28     rmind  */
    390       1.28     rmind int
    391       1.28     rmind pfil_run_hooks(pfil_head_t *ph, struct mbuf **mp, ifnet_t *ifp, int dir)
    392       1.28     rmind {
    393       1.29  christos 	struct mbuf *m = mp ? *mp : NULL;
    394       1.32       ryo 	pfil_listset_t *phlistset;
    395       1.28     rmind 	pfil_list_t *phlist;
    396       1.32       ryo 	struct psref psref;
    397       1.33     ozaki 	int s, bound;
    398       1.28     rmind 	int ret = 0;
    399       1.28     rmind 
    400       1.31       ryo 	KASSERT(dir == PFIL_IN || dir == PFIL_OUT);
    401       1.32       ryo 	if (__predict_false((phlistset = pfil_hook_get(dir, ph)) == NULL)) {
    402       1.28     rmind 		return ret;
    403       1.28     rmind 	}
    404       1.28     rmind 
    405       1.33     ozaki 	bound = curlwp_bind();
    406       1.32       ryo 	s = pserialize_read_enter();
    407  1.35.14.1    martin 	phlist = atomic_load_consume(&phlistset->active);
    408       1.32       ryo 	psref_acquire(&psref, &phlist->psref, pfil_psref_class);
    409       1.32       ryo 	pserialize_read_exit(s);
    410       1.28     rmind 	for (u_int i = 0; i < phlist->nhooks; i++) {
    411       1.28     rmind 		pfil_hook_t *pfh = &phlist->hooks[i];
    412       1.29  christos 		pfil_func_t func = (pfil_func_t)pfh->pfil_func;
    413       1.28     rmind 
    414       1.29  christos 		ret = (*func)(pfh->pfil_arg, &m, ifp, dir);
    415       1.29  christos 		if (m == NULL || ret)
    416       1.28     rmind 			break;
    417       1.28     rmind 	}
    418       1.32       ryo 	psref_release(&psref, &phlist->psref, pfil_psref_class);
    419       1.33     ozaki 	curlwp_bindx(bound);
    420       1.28     rmind 
    421       1.29  christos 	if (mp) {
    422       1.28     rmind 		*mp = m;
    423       1.28     rmind 	}
    424       1.28     rmind 	return ret;
    425       1.28     rmind }
    426       1.29  christos 
    427       1.32       ryo static void
    428       1.32       ryo pfil_run_arg(pfil_listset_t *phlistset, u_long cmd, void *arg)
    429       1.29  christos {
    430       1.32       ryo 	pfil_list_t *phlist;
    431       1.32       ryo 	struct psref psref;
    432       1.33     ozaki 	int s, bound;
    433       1.29  christos 
    434       1.33     ozaki 	bound = curlwp_bind();
    435       1.32       ryo 	s = pserialize_read_enter();
    436  1.35.14.1    martin 	phlist = atomic_load_consume(&phlistset->active);
    437       1.32       ryo 	psref_acquire(&psref, &phlist->psref, pfil_psref_class);
    438       1.32       ryo 	pserialize_read_exit(s);
    439       1.29  christos 	for (u_int i = 0; i < phlist->nhooks; i++) {
    440       1.29  christos 		pfil_hook_t *pfh = &phlist->hooks[i];
    441       1.29  christos 		pfil_ifunc_t func = (pfil_ifunc_t)pfh->pfil_func;
    442       1.32       ryo 		(*func)(pfh->pfil_arg, cmd, arg);
    443       1.29  christos 	}
    444       1.32       ryo 	psref_release(&psref, &phlist->psref, pfil_psref_class);
    445       1.33     ozaki 	curlwp_bindx(bound);
    446       1.32       ryo }
    447       1.32       ryo 
    448       1.32       ryo void
    449       1.32       ryo pfil_run_addrhooks(pfil_head_t *ph, u_long cmd, struct ifaddr *ifa)
    450       1.32       ryo {
    451       1.32       ryo 	pfil_run_arg(&ph->ph_ifaddr, cmd, ifa);
    452       1.29  christos }
    453       1.29  christos 
    454       1.29  christos void
    455       1.29  christos pfil_run_ifhooks(pfil_head_t *ph, u_long cmd, struct ifnet *ifp)
    456       1.29  christos {
    457       1.32       ryo 	pfil_run_arg(&ph->ph_ifevent, cmd, ifp);
    458       1.29  christos }
    459