pfil.c revision 1.37 1 1.37 nat /* $NetBSD: pfil.c,v 1.37 2020/04/27 23:05:31 nat Exp $ */
2 1.1 mrg
3 1.1 mrg /*
4 1.28 rmind * Copyright (c) 2013 Mindaugas Rasiukevicius <rmind at NetBSD org>
5 1.1 mrg * Copyright (c) 1996 Matthew R. Green
6 1.1 mrg * All rights reserved.
7 1.1 mrg *
8 1.1 mrg * Redistribution and use in source and binary forms, with or without
9 1.1 mrg * modification, are permitted provided that the following conditions
10 1.1 mrg * are met:
11 1.1 mrg * 1. Redistributions of source code must retain the above copyright
12 1.1 mrg * notice, this list of conditions and the following disclaimer.
13 1.1 mrg * 2. Redistributions in binary form must reproduce the above copyright
14 1.1 mrg * notice, this list of conditions and the following disclaimer in the
15 1.1 mrg * documentation and/or other materials provided with the distribution.
16 1.1 mrg *
17 1.1 mrg * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18 1.1 mrg * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19 1.1 mrg * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20 1.1 mrg * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21 1.1 mrg * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
22 1.1 mrg * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
23 1.1 mrg * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
24 1.1 mrg * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
25 1.1 mrg * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26 1.1 mrg * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27 1.1 mrg * SUCH DAMAGE.
28 1.1 mrg */
29 1.20 lukem
30 1.20 lukem #include <sys/cdefs.h>
31 1.37 nat __KERNEL_RCSID(0, "$NetBSD: pfil.c,v 1.37 2020/04/27 23:05:31 nat Exp $");
32 1.34 ozaki
33 1.34 ozaki #if defined(_KERNEL_OPT)
34 1.34 ozaki #include "opt_net_mpsafe.h"
35 1.34 ozaki #endif
36 1.1 mrg
37 1.1 mrg #include <sys/param.h>
38 1.1 mrg #include <sys/systm.h>
39 1.1 mrg #include <sys/queue.h>
40 1.28 rmind #include <sys/kmem.h>
41 1.32 ryo #include <sys/psref.h>
42 1.1 mrg
43 1.1 mrg #include <net/if.h>
44 1.1 mrg #include <net/pfil.h>
45 1.1 mrg
46 1.28 rmind #define MAX_HOOKS 8
47 1.16 thorpej
48 1.29 christos /* Func is either pfil_func_t or pfil_ifunc_t. */
49 1.29 christos typedef void (*pfil_polyfunc_t)(void);
50 1.29 christos
51 1.28 rmind typedef struct {
52 1.29 christos pfil_polyfunc_t pfil_func;
53 1.28 rmind void * pfil_arg;
54 1.28 rmind } pfil_hook_t;
55 1.28 rmind
56 1.28 rmind typedef struct {
57 1.28 rmind pfil_hook_t hooks[MAX_HOOKS];
58 1.28 rmind u_int nhooks;
59 1.32 ryo struct psref_target psref;
60 1.28 rmind } pfil_list_t;
61 1.28 rmind
62 1.32 ryo typedef struct {
63 1.32 ryo pfil_list_t *active; /* lists[0] or lists[1] */
64 1.32 ryo pfil_list_t lists[2];
65 1.32 ryo } pfil_listset_t;
66 1.32 ryo
67 1.29 christos CTASSERT(PFIL_IN == 1);
68 1.29 christos CTASSERT(PFIL_OUT == 2);
69 1.29 christos
70 1.28 rmind struct pfil_head {
71 1.32 ryo pfil_listset_t ph_in;
72 1.32 ryo pfil_listset_t ph_out;
73 1.32 ryo pfil_listset_t ph_ifaddr;
74 1.32 ryo pfil_listset_t ph_ifevent;
75 1.28 rmind int ph_type;
76 1.28 rmind void * ph_key;
77 1.28 rmind LIST_ENTRY(pfil_head) ph_list;
78 1.28 rmind };
79 1.28 rmind
80 1.28 rmind static const int pfil_flag_cases[] = {
81 1.31 ryo PFIL_IN, PFIL_OUT
82 1.28 rmind };
83 1.16 thorpej
84 1.28 rmind static LIST_HEAD(, pfil_head) pfil_head_list __read_mostly =
85 1.16 thorpej LIST_HEAD_INITIALIZER(&pfil_head_list);
86 1.16 thorpej
87 1.32 ryo static kmutex_t pfil_mtx __cacheline_aligned;
88 1.32 ryo static struct psref_class *pfil_psref_class __read_mostly;
89 1.32 ryo static pserialize_t pfil_psz;
90 1.32 ryo
91 1.32 ryo void
92 1.32 ryo pfil_init(void)
93 1.32 ryo {
94 1.32 ryo mutex_init(&pfil_mtx, MUTEX_DEFAULT, IPL_NONE);
95 1.32 ryo pfil_psz = pserialize_create();
96 1.32 ryo pfil_psref_class = psref_class_create("pfil", IPL_SOFTNET);
97 1.32 ryo }
98 1.32 ryo
99 1.32 ryo static inline void
100 1.32 ryo pfil_listset_init(pfil_listset_t *pflistset)
101 1.32 ryo {
102 1.32 ryo pflistset->active = &pflistset->lists[0];
103 1.32 ryo psref_target_init(&pflistset->active->psref, pfil_psref_class);
104 1.32 ryo }
105 1.32 ryo
106 1.16 thorpej /*
107 1.28 rmind * pfil_head_create: create and register a packet filter head.
108 1.16 thorpej */
109 1.28 rmind pfil_head_t *
110 1.28 rmind pfil_head_create(int type, void *key)
111 1.16 thorpej {
112 1.28 rmind pfil_head_t *ph;
113 1.1 mrg
114 1.28 rmind if (pfil_head_get(type, key)) {
115 1.28 rmind return NULL;
116 1.16 thorpej }
117 1.28 rmind ph = kmem_zalloc(sizeof(pfil_head_t), KM_SLEEP);
118 1.28 rmind ph->ph_type = type;
119 1.28 rmind ph->ph_key = key;
120 1.16 thorpej
121 1.32 ryo pfil_listset_init(&ph->ph_in);
122 1.32 ryo pfil_listset_init(&ph->ph_out);
123 1.32 ryo pfil_listset_init(&ph->ph_ifaddr);
124 1.32 ryo pfil_listset_init(&ph->ph_ifevent);
125 1.32 ryo
126 1.16 thorpej LIST_INSERT_HEAD(&pfil_head_list, ph, ph_list);
127 1.28 rmind return ph;
128 1.16 thorpej }
129 1.16 thorpej
130 1.16 thorpej /*
131 1.28 rmind * pfil_head_destroy: remove and destroy a packet filter head.
132 1.16 thorpej */
133 1.28 rmind void
134 1.28 rmind pfil_head_destroy(pfil_head_t *pfh)
135 1.16 thorpej {
136 1.16 thorpej LIST_REMOVE(pfh, ph_list);
137 1.32 ryo
138 1.32 ryo psref_target_destroy(&pfh->ph_in.active->psref, pfil_psref_class);
139 1.32 ryo psref_target_destroy(&pfh->ph_out.active->psref, pfil_psref_class);
140 1.32 ryo psref_target_destroy(&pfh->ph_ifaddr.active->psref, pfil_psref_class);
141 1.32 ryo psref_target_destroy(&pfh->ph_ifevent.active->psref, pfil_psref_class);
142 1.32 ryo
143 1.28 rmind kmem_free(pfh, sizeof(pfil_head_t));
144 1.16 thorpej }
145 1.16 thorpej
146 1.16 thorpej /*
147 1.28 rmind * pfil_head_get: returns the packer filter head for a given key.
148 1.16 thorpej */
149 1.28 rmind pfil_head_t *
150 1.28 rmind pfil_head_get(int type, void *key)
151 1.16 thorpej {
152 1.28 rmind pfil_head_t *ph;
153 1.16 thorpej
154 1.27 dyoung LIST_FOREACH(ph, &pfil_head_list, ph_list) {
155 1.28 rmind if (ph->ph_type == type && ph->ph_key == key)
156 1.16 thorpej break;
157 1.16 thorpej }
158 1.28 rmind return ph;
159 1.1 mrg }
160 1.1 mrg
161 1.32 ryo static pfil_listset_t *
162 1.28 rmind pfil_hook_get(int dir, pfil_head_t *ph)
163 1.1 mrg {
164 1.28 rmind switch (dir) {
165 1.28 rmind case PFIL_IN:
166 1.30 ryo return &ph->ph_in;
167 1.28 rmind case PFIL_OUT:
168 1.30 ryo return &ph->ph_out;
169 1.28 rmind case PFIL_IFADDR:
170 1.28 rmind return &ph->ph_ifaddr;
171 1.28 rmind case PFIL_IFNET:
172 1.28 rmind return &ph->ph_ifevent;
173 1.21 itojun }
174 1.28 rmind return NULL;
175 1.1 mrg }
176 1.1 mrg
177 1.13 darrenr static int
178 1.32 ryo pfil_list_add(pfil_listset_t *phlistset, pfil_polyfunc_t func, void *arg,
179 1.32 ryo int flags)
180 1.1 mrg {
181 1.32 ryo u_int nhooks;
182 1.32 ryo pfil_list_t *newlist, *oldlist;
183 1.28 rmind pfil_hook_t *pfh;
184 1.1 mrg
185 1.32 ryo mutex_enter(&pfil_mtx);
186 1.32 ryo
187 1.28 rmind /* Check if we have a free slot. */
188 1.32 ryo nhooks = phlistset->active->nhooks;
189 1.28 rmind if (nhooks == MAX_HOOKS) {
190 1.32 ryo mutex_exit(&pfil_mtx);
191 1.28 rmind return ENOSPC;
192 1.28 rmind }
193 1.28 rmind KASSERT(nhooks < MAX_HOOKS);
194 1.28 rmind
195 1.32 ryo if (phlistset->active == &phlistset->lists[0]) {
196 1.32 ryo oldlist = &phlistset->lists[0];
197 1.32 ryo newlist = &phlistset->lists[1];
198 1.32 ryo } else{
199 1.32 ryo oldlist = &phlistset->lists[1];
200 1.32 ryo newlist = &phlistset->lists[0];
201 1.32 ryo }
202 1.32 ryo
203 1.28 rmind /* Make sure the hook is not already added. */
204 1.28 rmind for (u_int i = 0; i < nhooks; i++) {
205 1.32 ryo pfh = &oldlist->hooks[i];
206 1.32 ryo if (pfh->pfil_func == func && pfh->pfil_arg == arg) {
207 1.32 ryo mutex_exit(&pfil_mtx);
208 1.16 thorpej return EEXIST;
209 1.32 ryo }
210 1.16 thorpej }
211 1.16 thorpej
212 1.32 ryo /* create new pfil_list_t copied from old */
213 1.32 ryo memcpy(newlist, oldlist, sizeof(pfil_list_t));
214 1.32 ryo psref_target_init(&newlist->psref, pfil_psref_class);
215 1.32 ryo
216 1.28 rmind /*
217 1.28 rmind * Finally, add the hook. Note: for PFIL_IN we insert the hooks in
218 1.28 rmind * reverse order of the PFIL_OUT so that the same path is followed
219 1.28 rmind * in or out of the kernel.
220 1.28 rmind */
221 1.28 rmind if (flags & PFIL_IN) {
222 1.28 rmind /* XXX: May want to revisit this later; */
223 1.28 rmind size_t len = sizeof(pfil_hook_t) * nhooks;
224 1.32 ryo pfh = &newlist->hooks[0];
225 1.32 ryo memmove(&newlist->hooks[1], pfh, len);
226 1.28 rmind } else {
227 1.32 ryo pfh = &newlist->hooks[nhooks];
228 1.28 rmind }
229 1.32 ryo newlist->nhooks++;
230 1.16 thorpej
231 1.1 mrg pfh->pfil_func = func;
232 1.16 thorpej pfh->pfil_arg = arg;
233 1.32 ryo
234 1.32 ryo /* switch from oldlist to newlist */
235 1.36 riastrad atomic_store_release(&phlistset->active, newlist);
236 1.34 ozaki #ifdef NET_MPSAFE
237 1.32 ryo pserialize_perform(pfil_psz);
238 1.34 ozaki #endif
239 1.32 ryo mutex_exit(&pfil_mtx);
240 1.32 ryo
241 1.32 ryo /* Wait for all readers */
242 1.34 ozaki #ifdef NET_MPSAFE
243 1.32 ryo psref_target_destroy(&oldlist->psref, pfil_psref_class);
244 1.34 ozaki #endif
245 1.32 ryo
246 1.13 darrenr return 0;
247 1.1 mrg }
248 1.1 mrg
249 1.1 mrg /*
250 1.28 rmind * pfil_add_hook: add a function (hook) to the packet filter head.
251 1.28 rmind * The possible flags are:
252 1.28 rmind *
253 1.28 rmind * PFIL_IN call on incoming packets
254 1.28 rmind * PFIL_OUT call on outgoing packets
255 1.28 rmind * PFIL_ALL call on all of the above
256 1.1 mrg */
257 1.13 darrenr int
258 1.28 rmind pfil_add_hook(pfil_func_t func, void *arg, int flags, pfil_head_t *ph)
259 1.1 mrg {
260 1.28 rmind int error = 0;
261 1.28 rmind
262 1.28 rmind KASSERT(func != NULL);
263 1.29 christos KASSERT((flags & ~PFIL_ALL) == 0);
264 1.28 rmind
265 1.28 rmind for (u_int i = 0; i < __arraycount(pfil_flag_cases); i++) {
266 1.28 rmind const int fcase = pfil_flag_cases[i];
267 1.32 ryo pfil_listset_t *phlistset;
268 1.1 mrg
269 1.28 rmind if ((flags & fcase) == 0) {
270 1.28 rmind continue;
271 1.28 rmind }
272 1.32 ryo phlistset = pfil_hook_get(fcase, ph);
273 1.32 ryo error = pfil_list_add(phlistset, (pfil_polyfunc_t)func, arg,
274 1.32 ryo flags);
275 1.32 ryo if (error && (error != EEXIST))
276 1.28 rmind break;
277 1.28 rmind }
278 1.32 ryo if (error && (error != EEXIST)) {
279 1.28 rmind pfil_remove_hook(func, arg, flags, ph);
280 1.28 rmind }
281 1.28 rmind return error;
282 1.1 mrg }
283 1.1 mrg
284 1.1 mrg /*
285 1.31 ryo * pfil_add_ihook: add an interface-event function (hook) to the packet
286 1.29 christos * filter head. The possible flags are:
287 1.29 christos *
288 1.31 ryo * PFIL_IFADDR call on interface reconfig (cmd is ioctl #)
289 1.31 ryo * PFIL_IFNET call on interface attach/detach (cmd is PFIL_IFNET_*)
290 1.29 christos */
291 1.29 christos int
292 1.29 christos pfil_add_ihook(pfil_ifunc_t func, void *arg, int flags, pfil_head_t *ph)
293 1.29 christos {
294 1.32 ryo pfil_listset_t *phlistset;
295 1.29 christos
296 1.31 ryo KASSERT(func != NULL);
297 1.29 christos KASSERT(flags == PFIL_IFADDR || flags == PFIL_IFNET);
298 1.31 ryo
299 1.32 ryo phlistset = pfil_hook_get(flags, ph);
300 1.32 ryo return pfil_list_add(phlistset, (pfil_polyfunc_t)func, arg, flags);
301 1.29 christos }
302 1.29 christos
303 1.29 christos /*
304 1.28 rmind * pfil_list_remove: remove the hook from a specified list.
305 1.1 mrg */
306 1.13 darrenr static int
307 1.32 ryo pfil_list_remove(pfil_listset_t *phlistset, pfil_polyfunc_t func, void *arg)
308 1.1 mrg {
309 1.32 ryo u_int nhooks;
310 1.32 ryo pfil_list_t *oldlist, *newlist;
311 1.32 ryo
312 1.32 ryo mutex_enter(&pfil_mtx);
313 1.1 mrg
314 1.32 ryo /* create new pfil_list_t copied from old */
315 1.32 ryo if (phlistset->active == &phlistset->lists[0]) {
316 1.32 ryo oldlist = &phlistset->lists[0];
317 1.32 ryo newlist = &phlistset->lists[1];
318 1.32 ryo } else{
319 1.32 ryo oldlist = &phlistset->lists[1];
320 1.32 ryo newlist = &phlistset->lists[0];
321 1.32 ryo }
322 1.32 ryo memcpy(newlist, oldlist, sizeof(*newlist));
323 1.32 ryo psref_target_init(&newlist->psref, pfil_psref_class);
324 1.32 ryo
325 1.32 ryo nhooks = newlist->nhooks;
326 1.28 rmind for (u_int i = 0; i < nhooks; i++) {
327 1.32 ryo pfil_hook_t *last, *pfh = &newlist->hooks[i];
328 1.28 rmind
329 1.28 rmind if (pfh->pfil_func != func || pfh->pfil_arg != arg) {
330 1.28 rmind continue;
331 1.28 rmind }
332 1.32 ryo if ((last = &newlist->hooks[nhooks - 1]) != pfh) {
333 1.28 rmind memcpy(pfh, last, sizeof(pfil_hook_t));
334 1.1 mrg }
335 1.32 ryo newlist->nhooks--;
336 1.32 ryo
337 1.32 ryo /* switch from oldlist to newlist */
338 1.36 riastrad atomic_store_release(&phlistset->active, newlist);
339 1.34 ozaki #ifdef NET_MPSAFE
340 1.32 ryo pserialize_perform(pfil_psz);
341 1.34 ozaki #endif
342 1.32 ryo mutex_exit(&pfil_mtx);
343 1.32 ryo
344 1.32 ryo /* Wait for all readers */
345 1.34 ozaki #ifdef NET_MPSAFE
346 1.32 ryo psref_target_destroy(&oldlist->psref, pfil_psref_class);
347 1.34 ozaki #endif
348 1.32 ryo
349 1.28 rmind return 0;
350 1.16 thorpej }
351 1.32 ryo mutex_exit(&pfil_mtx);
352 1.13 darrenr return ENOENT;
353 1.1 mrg }
354 1.28 rmind
355 1.28 rmind /*
356 1.28 rmind * pfil_remove_hook: remove the hook from the packet filter head.
357 1.28 rmind */
358 1.28 rmind int
359 1.28 rmind pfil_remove_hook(pfil_func_t func, void *arg, int flags, pfil_head_t *ph)
360 1.28 rmind {
361 1.31 ryo KASSERT((flags & ~PFIL_ALL) == 0);
362 1.31 ryo
363 1.28 rmind for (u_int i = 0; i < __arraycount(pfil_flag_cases); i++) {
364 1.28 rmind const int fcase = pfil_flag_cases[i];
365 1.32 ryo pfil_listset_t *pflistset;
366 1.28 rmind
367 1.28 rmind if ((flags & fcase) == 0) {
368 1.28 rmind continue;
369 1.28 rmind }
370 1.32 ryo pflistset = pfil_hook_get(fcase, ph);
371 1.32 ryo (void)pfil_list_remove(pflistset, (pfil_polyfunc_t)func, arg);
372 1.28 rmind }
373 1.28 rmind return 0;
374 1.28 rmind }
375 1.28 rmind
376 1.29 christos int
377 1.29 christos pfil_remove_ihook(pfil_ifunc_t func, void *arg, int flags, pfil_head_t *ph)
378 1.29 christos {
379 1.32 ryo pfil_listset_t *pflistset;
380 1.29 christos
381 1.29 christos KASSERT(flags == PFIL_IFADDR || flags == PFIL_IFNET);
382 1.32 ryo pflistset = pfil_hook_get(flags, ph);
383 1.32 ryo (void)pfil_list_remove(pflistset, (pfil_polyfunc_t)func, arg);
384 1.29 christos return 0;
385 1.29 christos }
386 1.29 christos
387 1.28 rmind /*
388 1.28 rmind * pfil_run_hooks: run the specified packet filter hooks.
389 1.28 rmind */
390 1.28 rmind int
391 1.28 rmind pfil_run_hooks(pfil_head_t *ph, struct mbuf **mp, ifnet_t *ifp, int dir)
392 1.28 rmind {
393 1.29 christos struct mbuf *m = mp ? *mp : NULL;
394 1.32 ryo pfil_listset_t *phlistset;
395 1.28 rmind pfil_list_t *phlist;
396 1.32 ryo struct psref psref;
397 1.33 ozaki int s, bound;
398 1.28 rmind int ret = 0;
399 1.28 rmind
400 1.31 ryo KASSERT(dir == PFIL_IN || dir == PFIL_OUT);
401 1.37 nat
402 1.37 nat if (__predict_false(ph == NULL)) {
403 1.37 nat return ret;
404 1.37 nat }
405 1.37 nat
406 1.32 ryo if (__predict_false((phlistset = pfil_hook_get(dir, ph)) == NULL)) {
407 1.28 rmind return ret;
408 1.28 rmind }
409 1.28 rmind
410 1.33 ozaki bound = curlwp_bind();
411 1.32 ryo s = pserialize_read_enter();
412 1.36 riastrad phlist = atomic_load_consume(&phlistset->active);
413 1.32 ryo psref_acquire(&psref, &phlist->psref, pfil_psref_class);
414 1.32 ryo pserialize_read_exit(s);
415 1.28 rmind for (u_int i = 0; i < phlist->nhooks; i++) {
416 1.28 rmind pfil_hook_t *pfh = &phlist->hooks[i];
417 1.29 christos pfil_func_t func = (pfil_func_t)pfh->pfil_func;
418 1.28 rmind
419 1.29 christos ret = (*func)(pfh->pfil_arg, &m, ifp, dir);
420 1.29 christos if (m == NULL || ret)
421 1.28 rmind break;
422 1.28 rmind }
423 1.32 ryo psref_release(&psref, &phlist->psref, pfil_psref_class);
424 1.33 ozaki curlwp_bindx(bound);
425 1.28 rmind
426 1.29 christos if (mp) {
427 1.28 rmind *mp = m;
428 1.28 rmind }
429 1.28 rmind return ret;
430 1.28 rmind }
431 1.29 christos
432 1.32 ryo static void
433 1.32 ryo pfil_run_arg(pfil_listset_t *phlistset, u_long cmd, void *arg)
434 1.29 christos {
435 1.32 ryo pfil_list_t *phlist;
436 1.32 ryo struct psref psref;
437 1.33 ozaki int s, bound;
438 1.29 christos
439 1.33 ozaki bound = curlwp_bind();
440 1.32 ryo s = pserialize_read_enter();
441 1.36 riastrad phlist = atomic_load_consume(&phlistset->active);
442 1.32 ryo psref_acquire(&psref, &phlist->psref, pfil_psref_class);
443 1.32 ryo pserialize_read_exit(s);
444 1.29 christos for (u_int i = 0; i < phlist->nhooks; i++) {
445 1.29 christos pfil_hook_t *pfh = &phlist->hooks[i];
446 1.29 christos pfil_ifunc_t func = (pfil_ifunc_t)pfh->pfil_func;
447 1.32 ryo (*func)(pfh->pfil_arg, cmd, arg);
448 1.29 christos }
449 1.32 ryo psref_release(&psref, &phlist->psref, pfil_psref_class);
450 1.33 ozaki curlwp_bindx(bound);
451 1.32 ryo }
452 1.32 ryo
453 1.32 ryo void
454 1.32 ryo pfil_run_addrhooks(pfil_head_t *ph, u_long cmd, struct ifaddr *ifa)
455 1.32 ryo {
456 1.32 ryo pfil_run_arg(&ph->ph_ifaddr, cmd, ifa);
457 1.29 christos }
458 1.29 christos
459 1.29 christos void
460 1.29 christos pfil_run_ifhooks(pfil_head_t *ph, u_long cmd, struct ifnet *ifp)
461 1.29 christos {
462 1.32 ryo pfil_run_arg(&ph->ph_ifevent, cmd, ifp);
463 1.29 christos }
464