pfil.c revision 1.39 1 1.39 maxv /* $NetBSD: pfil.c,v 1.39 2020/06/22 16:39:56 maxv Exp $ */
2 1.1 mrg
3 1.1 mrg /*
4 1.28 rmind * Copyright (c) 2013 Mindaugas Rasiukevicius <rmind at NetBSD org>
5 1.1 mrg * Copyright (c) 1996 Matthew R. Green
6 1.1 mrg * All rights reserved.
7 1.1 mrg *
8 1.1 mrg * Redistribution and use in source and binary forms, with or without
9 1.1 mrg * modification, are permitted provided that the following conditions
10 1.1 mrg * are met:
11 1.1 mrg * 1. Redistributions of source code must retain the above copyright
12 1.1 mrg * notice, this list of conditions and the following disclaimer.
13 1.1 mrg * 2. Redistributions in binary form must reproduce the above copyright
14 1.1 mrg * notice, this list of conditions and the following disclaimer in the
15 1.1 mrg * documentation and/or other materials provided with the distribution.
16 1.1 mrg *
17 1.1 mrg * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18 1.1 mrg * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19 1.1 mrg * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20 1.1 mrg * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21 1.1 mrg * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
22 1.1 mrg * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
23 1.1 mrg * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
24 1.1 mrg * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
25 1.1 mrg * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26 1.1 mrg * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27 1.1 mrg * SUCH DAMAGE.
28 1.1 mrg */
29 1.20 lukem
30 1.20 lukem #include <sys/cdefs.h>
31 1.39 maxv __KERNEL_RCSID(0, "$NetBSD: pfil.c,v 1.39 2020/06/22 16:39:56 maxv Exp $");
32 1.34 ozaki
33 1.34 ozaki #if defined(_KERNEL_OPT)
34 1.34 ozaki #include "opt_net_mpsafe.h"
35 1.34 ozaki #endif
36 1.1 mrg
37 1.1 mrg #include <sys/param.h>
38 1.1 mrg #include <sys/systm.h>
39 1.1 mrg #include <sys/queue.h>
40 1.28 rmind #include <sys/kmem.h>
41 1.32 ryo #include <sys/psref.h>
42 1.1 mrg
43 1.1 mrg #include <net/if.h>
44 1.1 mrg #include <net/pfil.h>
45 1.1 mrg
46 1.28 rmind #define MAX_HOOKS 8
47 1.16 thorpej
48 1.29 christos /* Func is either pfil_func_t or pfil_ifunc_t. */
49 1.29 christos typedef void (*pfil_polyfunc_t)(void);
50 1.29 christos
51 1.28 rmind typedef struct {
52 1.29 christos pfil_polyfunc_t pfil_func;
53 1.28 rmind void * pfil_arg;
54 1.28 rmind } pfil_hook_t;
55 1.28 rmind
56 1.28 rmind typedef struct {
57 1.28 rmind pfil_hook_t hooks[MAX_HOOKS];
58 1.28 rmind u_int nhooks;
59 1.32 ryo struct psref_target psref;
60 1.28 rmind } pfil_list_t;
61 1.28 rmind
62 1.32 ryo typedef struct {
63 1.32 ryo pfil_list_t *active; /* lists[0] or lists[1] */
64 1.32 ryo pfil_list_t lists[2];
65 1.32 ryo } pfil_listset_t;
66 1.32 ryo
67 1.29 christos CTASSERT(PFIL_IN == 1);
68 1.29 christos CTASSERT(PFIL_OUT == 2);
69 1.29 christos
70 1.28 rmind struct pfil_head {
71 1.32 ryo pfil_listset_t ph_in;
72 1.32 ryo pfil_listset_t ph_out;
73 1.32 ryo pfil_listset_t ph_ifaddr;
74 1.32 ryo pfil_listset_t ph_ifevent;
75 1.28 rmind int ph_type;
76 1.28 rmind void * ph_key;
77 1.28 rmind LIST_ENTRY(pfil_head) ph_list;
78 1.28 rmind };
79 1.28 rmind
80 1.28 rmind static const int pfil_flag_cases[] = {
81 1.31 ryo PFIL_IN, PFIL_OUT
82 1.28 rmind };
83 1.16 thorpej
84 1.28 rmind static LIST_HEAD(, pfil_head) pfil_head_list __read_mostly =
85 1.16 thorpej LIST_HEAD_INITIALIZER(&pfil_head_list);
86 1.16 thorpej
87 1.32 ryo static kmutex_t pfil_mtx __cacheline_aligned;
88 1.32 ryo static struct psref_class *pfil_psref_class __read_mostly;
89 1.39 maxv #ifdef NET_MPSAFE
90 1.32 ryo static pserialize_t pfil_psz;
91 1.39 maxv #endif
92 1.32 ryo
93 1.32 ryo void
94 1.32 ryo pfil_init(void)
95 1.32 ryo {
96 1.32 ryo mutex_init(&pfil_mtx, MUTEX_DEFAULT, IPL_NONE);
97 1.39 maxv #ifdef NET_MPSAFE
98 1.32 ryo pfil_psz = pserialize_create();
99 1.39 maxv #endif
100 1.32 ryo pfil_psref_class = psref_class_create("pfil", IPL_SOFTNET);
101 1.32 ryo }
102 1.32 ryo
103 1.32 ryo static inline void
104 1.32 ryo pfil_listset_init(pfil_listset_t *pflistset)
105 1.32 ryo {
106 1.32 ryo pflistset->active = &pflistset->lists[0];
107 1.32 ryo psref_target_init(&pflistset->active->psref, pfil_psref_class);
108 1.32 ryo }
109 1.32 ryo
110 1.16 thorpej /*
111 1.28 rmind * pfil_head_create: create and register a packet filter head.
112 1.16 thorpej */
113 1.28 rmind pfil_head_t *
114 1.28 rmind pfil_head_create(int type, void *key)
115 1.16 thorpej {
116 1.28 rmind pfil_head_t *ph;
117 1.1 mrg
118 1.28 rmind if (pfil_head_get(type, key)) {
119 1.28 rmind return NULL;
120 1.16 thorpej }
121 1.28 rmind ph = kmem_zalloc(sizeof(pfil_head_t), KM_SLEEP);
122 1.28 rmind ph->ph_type = type;
123 1.28 rmind ph->ph_key = key;
124 1.16 thorpej
125 1.32 ryo pfil_listset_init(&ph->ph_in);
126 1.32 ryo pfil_listset_init(&ph->ph_out);
127 1.32 ryo pfil_listset_init(&ph->ph_ifaddr);
128 1.32 ryo pfil_listset_init(&ph->ph_ifevent);
129 1.32 ryo
130 1.16 thorpej LIST_INSERT_HEAD(&pfil_head_list, ph, ph_list);
131 1.28 rmind return ph;
132 1.16 thorpej }
133 1.16 thorpej
134 1.16 thorpej /*
135 1.28 rmind * pfil_head_destroy: remove and destroy a packet filter head.
136 1.16 thorpej */
137 1.28 rmind void
138 1.28 rmind pfil_head_destroy(pfil_head_t *pfh)
139 1.16 thorpej {
140 1.16 thorpej LIST_REMOVE(pfh, ph_list);
141 1.32 ryo
142 1.32 ryo psref_target_destroy(&pfh->ph_in.active->psref, pfil_psref_class);
143 1.32 ryo psref_target_destroy(&pfh->ph_out.active->psref, pfil_psref_class);
144 1.32 ryo psref_target_destroy(&pfh->ph_ifaddr.active->psref, pfil_psref_class);
145 1.32 ryo psref_target_destroy(&pfh->ph_ifevent.active->psref, pfil_psref_class);
146 1.32 ryo
147 1.28 rmind kmem_free(pfh, sizeof(pfil_head_t));
148 1.16 thorpej }
149 1.16 thorpej
150 1.16 thorpej /*
151 1.28 rmind * pfil_head_get: returns the packer filter head for a given key.
152 1.16 thorpej */
153 1.28 rmind pfil_head_t *
154 1.28 rmind pfil_head_get(int type, void *key)
155 1.16 thorpej {
156 1.28 rmind pfil_head_t *ph;
157 1.16 thorpej
158 1.27 dyoung LIST_FOREACH(ph, &pfil_head_list, ph_list) {
159 1.28 rmind if (ph->ph_type == type && ph->ph_key == key)
160 1.16 thorpej break;
161 1.16 thorpej }
162 1.28 rmind return ph;
163 1.1 mrg }
164 1.1 mrg
165 1.32 ryo static pfil_listset_t *
166 1.28 rmind pfil_hook_get(int dir, pfil_head_t *ph)
167 1.1 mrg {
168 1.28 rmind switch (dir) {
169 1.28 rmind case PFIL_IN:
170 1.30 ryo return &ph->ph_in;
171 1.28 rmind case PFIL_OUT:
172 1.30 ryo return &ph->ph_out;
173 1.28 rmind case PFIL_IFADDR:
174 1.28 rmind return &ph->ph_ifaddr;
175 1.28 rmind case PFIL_IFNET:
176 1.28 rmind return &ph->ph_ifevent;
177 1.21 itojun }
178 1.28 rmind return NULL;
179 1.1 mrg }
180 1.1 mrg
181 1.13 darrenr static int
182 1.32 ryo pfil_list_add(pfil_listset_t *phlistset, pfil_polyfunc_t func, void *arg,
183 1.32 ryo int flags)
184 1.1 mrg {
185 1.32 ryo u_int nhooks;
186 1.32 ryo pfil_list_t *newlist, *oldlist;
187 1.28 rmind pfil_hook_t *pfh;
188 1.1 mrg
189 1.32 ryo mutex_enter(&pfil_mtx);
190 1.32 ryo
191 1.28 rmind /* Check if we have a free slot. */
192 1.32 ryo nhooks = phlistset->active->nhooks;
193 1.28 rmind if (nhooks == MAX_HOOKS) {
194 1.32 ryo mutex_exit(&pfil_mtx);
195 1.28 rmind return ENOSPC;
196 1.28 rmind }
197 1.28 rmind KASSERT(nhooks < MAX_HOOKS);
198 1.28 rmind
199 1.32 ryo if (phlistset->active == &phlistset->lists[0]) {
200 1.32 ryo oldlist = &phlistset->lists[0];
201 1.32 ryo newlist = &phlistset->lists[1];
202 1.32 ryo } else{
203 1.32 ryo oldlist = &phlistset->lists[1];
204 1.32 ryo newlist = &phlistset->lists[0];
205 1.32 ryo }
206 1.32 ryo
207 1.28 rmind /* Make sure the hook is not already added. */
208 1.28 rmind for (u_int i = 0; i < nhooks; i++) {
209 1.32 ryo pfh = &oldlist->hooks[i];
210 1.32 ryo if (pfh->pfil_func == func && pfh->pfil_arg == arg) {
211 1.32 ryo mutex_exit(&pfil_mtx);
212 1.16 thorpej return EEXIST;
213 1.32 ryo }
214 1.16 thorpej }
215 1.16 thorpej
216 1.32 ryo /* create new pfil_list_t copied from old */
217 1.32 ryo memcpy(newlist, oldlist, sizeof(pfil_list_t));
218 1.32 ryo psref_target_init(&newlist->psref, pfil_psref_class);
219 1.32 ryo
220 1.28 rmind /*
221 1.28 rmind * Finally, add the hook. Note: for PFIL_IN we insert the hooks in
222 1.28 rmind * reverse order of the PFIL_OUT so that the same path is followed
223 1.28 rmind * in or out of the kernel.
224 1.28 rmind */
225 1.28 rmind if (flags & PFIL_IN) {
226 1.28 rmind /* XXX: May want to revisit this later; */
227 1.28 rmind size_t len = sizeof(pfil_hook_t) * nhooks;
228 1.32 ryo pfh = &newlist->hooks[0];
229 1.32 ryo memmove(&newlist->hooks[1], pfh, len);
230 1.28 rmind } else {
231 1.32 ryo pfh = &newlist->hooks[nhooks];
232 1.28 rmind }
233 1.32 ryo newlist->nhooks++;
234 1.16 thorpej
235 1.1 mrg pfh->pfil_func = func;
236 1.16 thorpej pfh->pfil_arg = arg;
237 1.32 ryo
238 1.32 ryo /* switch from oldlist to newlist */
239 1.36 riastrad atomic_store_release(&phlistset->active, newlist);
240 1.34 ozaki #ifdef NET_MPSAFE
241 1.32 ryo pserialize_perform(pfil_psz);
242 1.34 ozaki #endif
243 1.32 ryo mutex_exit(&pfil_mtx);
244 1.32 ryo
245 1.32 ryo /* Wait for all readers */
246 1.34 ozaki #ifdef NET_MPSAFE
247 1.32 ryo psref_target_destroy(&oldlist->psref, pfil_psref_class);
248 1.34 ozaki #endif
249 1.32 ryo
250 1.13 darrenr return 0;
251 1.1 mrg }
252 1.1 mrg
253 1.1 mrg /*
254 1.28 rmind * pfil_add_hook: add a function (hook) to the packet filter head.
255 1.28 rmind * The possible flags are:
256 1.28 rmind *
257 1.28 rmind * PFIL_IN call on incoming packets
258 1.28 rmind * PFIL_OUT call on outgoing packets
259 1.28 rmind * PFIL_ALL call on all of the above
260 1.1 mrg */
261 1.13 darrenr int
262 1.28 rmind pfil_add_hook(pfil_func_t func, void *arg, int flags, pfil_head_t *ph)
263 1.1 mrg {
264 1.28 rmind int error = 0;
265 1.28 rmind
266 1.28 rmind KASSERT(func != NULL);
267 1.29 christos KASSERT((flags & ~PFIL_ALL) == 0);
268 1.28 rmind
269 1.28 rmind for (u_int i = 0; i < __arraycount(pfil_flag_cases); i++) {
270 1.28 rmind const int fcase = pfil_flag_cases[i];
271 1.32 ryo pfil_listset_t *phlistset;
272 1.1 mrg
273 1.28 rmind if ((flags & fcase) == 0) {
274 1.28 rmind continue;
275 1.28 rmind }
276 1.32 ryo phlistset = pfil_hook_get(fcase, ph);
277 1.32 ryo error = pfil_list_add(phlistset, (pfil_polyfunc_t)func, arg,
278 1.32 ryo flags);
279 1.32 ryo if (error && (error != EEXIST))
280 1.28 rmind break;
281 1.28 rmind }
282 1.32 ryo if (error && (error != EEXIST)) {
283 1.28 rmind pfil_remove_hook(func, arg, flags, ph);
284 1.28 rmind }
285 1.28 rmind return error;
286 1.1 mrg }
287 1.1 mrg
288 1.1 mrg /*
289 1.31 ryo * pfil_add_ihook: add an interface-event function (hook) to the packet
290 1.29 christos * filter head. The possible flags are:
291 1.29 christos *
292 1.31 ryo * PFIL_IFADDR call on interface reconfig (cmd is ioctl #)
293 1.31 ryo * PFIL_IFNET call on interface attach/detach (cmd is PFIL_IFNET_*)
294 1.29 christos */
295 1.29 christos int
296 1.29 christos pfil_add_ihook(pfil_ifunc_t func, void *arg, int flags, pfil_head_t *ph)
297 1.29 christos {
298 1.32 ryo pfil_listset_t *phlistset;
299 1.29 christos
300 1.31 ryo KASSERT(func != NULL);
301 1.29 christos KASSERT(flags == PFIL_IFADDR || flags == PFIL_IFNET);
302 1.31 ryo
303 1.32 ryo phlistset = pfil_hook_get(flags, ph);
304 1.32 ryo return pfil_list_add(phlistset, (pfil_polyfunc_t)func, arg, flags);
305 1.29 christos }
306 1.29 christos
307 1.29 christos /*
308 1.28 rmind * pfil_list_remove: remove the hook from a specified list.
309 1.1 mrg */
310 1.13 darrenr static int
311 1.32 ryo pfil_list_remove(pfil_listset_t *phlistset, pfil_polyfunc_t func, void *arg)
312 1.1 mrg {
313 1.32 ryo u_int nhooks;
314 1.32 ryo pfil_list_t *oldlist, *newlist;
315 1.32 ryo
316 1.32 ryo mutex_enter(&pfil_mtx);
317 1.1 mrg
318 1.32 ryo /* create new pfil_list_t copied from old */
319 1.32 ryo if (phlistset->active == &phlistset->lists[0]) {
320 1.32 ryo oldlist = &phlistset->lists[0];
321 1.32 ryo newlist = &phlistset->lists[1];
322 1.32 ryo } else{
323 1.32 ryo oldlist = &phlistset->lists[1];
324 1.32 ryo newlist = &phlistset->lists[0];
325 1.32 ryo }
326 1.32 ryo memcpy(newlist, oldlist, sizeof(*newlist));
327 1.32 ryo psref_target_init(&newlist->psref, pfil_psref_class);
328 1.32 ryo
329 1.32 ryo nhooks = newlist->nhooks;
330 1.28 rmind for (u_int i = 0; i < nhooks; i++) {
331 1.32 ryo pfil_hook_t *last, *pfh = &newlist->hooks[i];
332 1.28 rmind
333 1.28 rmind if (pfh->pfil_func != func || pfh->pfil_arg != arg) {
334 1.28 rmind continue;
335 1.28 rmind }
336 1.32 ryo if ((last = &newlist->hooks[nhooks - 1]) != pfh) {
337 1.28 rmind memcpy(pfh, last, sizeof(pfil_hook_t));
338 1.1 mrg }
339 1.32 ryo newlist->nhooks--;
340 1.32 ryo
341 1.32 ryo /* switch from oldlist to newlist */
342 1.36 riastrad atomic_store_release(&phlistset->active, newlist);
343 1.34 ozaki #ifdef NET_MPSAFE
344 1.32 ryo pserialize_perform(pfil_psz);
345 1.34 ozaki #endif
346 1.32 ryo mutex_exit(&pfil_mtx);
347 1.32 ryo
348 1.32 ryo /* Wait for all readers */
349 1.34 ozaki #ifdef NET_MPSAFE
350 1.32 ryo psref_target_destroy(&oldlist->psref, pfil_psref_class);
351 1.34 ozaki #endif
352 1.32 ryo
353 1.28 rmind return 0;
354 1.16 thorpej }
355 1.32 ryo mutex_exit(&pfil_mtx);
356 1.13 darrenr return ENOENT;
357 1.1 mrg }
358 1.28 rmind
359 1.28 rmind /*
360 1.28 rmind * pfil_remove_hook: remove the hook from the packet filter head.
361 1.28 rmind */
362 1.28 rmind int
363 1.28 rmind pfil_remove_hook(pfil_func_t func, void *arg, int flags, pfil_head_t *ph)
364 1.28 rmind {
365 1.31 ryo KASSERT((flags & ~PFIL_ALL) == 0);
366 1.31 ryo
367 1.28 rmind for (u_int i = 0; i < __arraycount(pfil_flag_cases); i++) {
368 1.28 rmind const int fcase = pfil_flag_cases[i];
369 1.32 ryo pfil_listset_t *pflistset;
370 1.28 rmind
371 1.28 rmind if ((flags & fcase) == 0) {
372 1.28 rmind continue;
373 1.28 rmind }
374 1.32 ryo pflistset = pfil_hook_get(fcase, ph);
375 1.32 ryo (void)pfil_list_remove(pflistset, (pfil_polyfunc_t)func, arg);
376 1.28 rmind }
377 1.28 rmind return 0;
378 1.28 rmind }
379 1.28 rmind
380 1.29 christos int
381 1.29 christos pfil_remove_ihook(pfil_ifunc_t func, void *arg, int flags, pfil_head_t *ph)
382 1.29 christos {
383 1.32 ryo pfil_listset_t *pflistset;
384 1.29 christos
385 1.29 christos KASSERT(flags == PFIL_IFADDR || flags == PFIL_IFNET);
386 1.32 ryo pflistset = pfil_hook_get(flags, ph);
387 1.32 ryo (void)pfil_list_remove(pflistset, (pfil_polyfunc_t)func, arg);
388 1.29 christos return 0;
389 1.29 christos }
390 1.29 christos
391 1.28 rmind /*
392 1.28 rmind * pfil_run_hooks: run the specified packet filter hooks.
393 1.28 rmind */
394 1.28 rmind int
395 1.28 rmind pfil_run_hooks(pfil_head_t *ph, struct mbuf **mp, ifnet_t *ifp, int dir)
396 1.28 rmind {
397 1.29 christos struct mbuf *m = mp ? *mp : NULL;
398 1.32 ryo pfil_listset_t *phlistset;
399 1.28 rmind pfil_list_t *phlist;
400 1.32 ryo struct psref psref;
401 1.33 ozaki int s, bound;
402 1.28 rmind int ret = 0;
403 1.28 rmind
404 1.31 ryo KASSERT(dir == PFIL_IN || dir == PFIL_OUT);
405 1.37 nat
406 1.38 nat if (ph == NULL) {
407 1.37 nat return ret;
408 1.37 nat }
409 1.37 nat
410 1.32 ryo if (__predict_false((phlistset = pfil_hook_get(dir, ph)) == NULL)) {
411 1.28 rmind return ret;
412 1.28 rmind }
413 1.28 rmind
414 1.33 ozaki bound = curlwp_bind();
415 1.32 ryo s = pserialize_read_enter();
416 1.36 riastrad phlist = atomic_load_consume(&phlistset->active);
417 1.32 ryo psref_acquire(&psref, &phlist->psref, pfil_psref_class);
418 1.32 ryo pserialize_read_exit(s);
419 1.28 rmind for (u_int i = 0; i < phlist->nhooks; i++) {
420 1.28 rmind pfil_hook_t *pfh = &phlist->hooks[i];
421 1.29 christos pfil_func_t func = (pfil_func_t)pfh->pfil_func;
422 1.28 rmind
423 1.29 christos ret = (*func)(pfh->pfil_arg, &m, ifp, dir);
424 1.29 christos if (m == NULL || ret)
425 1.28 rmind break;
426 1.28 rmind }
427 1.32 ryo psref_release(&psref, &phlist->psref, pfil_psref_class);
428 1.33 ozaki curlwp_bindx(bound);
429 1.28 rmind
430 1.29 christos if (mp) {
431 1.28 rmind *mp = m;
432 1.28 rmind }
433 1.28 rmind return ret;
434 1.28 rmind }
435 1.29 christos
436 1.32 ryo static void
437 1.32 ryo pfil_run_arg(pfil_listset_t *phlistset, u_long cmd, void *arg)
438 1.29 christos {
439 1.32 ryo pfil_list_t *phlist;
440 1.32 ryo struct psref psref;
441 1.33 ozaki int s, bound;
442 1.29 christos
443 1.33 ozaki bound = curlwp_bind();
444 1.32 ryo s = pserialize_read_enter();
445 1.36 riastrad phlist = atomic_load_consume(&phlistset->active);
446 1.32 ryo psref_acquire(&psref, &phlist->psref, pfil_psref_class);
447 1.32 ryo pserialize_read_exit(s);
448 1.29 christos for (u_int i = 0; i < phlist->nhooks; i++) {
449 1.29 christos pfil_hook_t *pfh = &phlist->hooks[i];
450 1.29 christos pfil_ifunc_t func = (pfil_ifunc_t)pfh->pfil_func;
451 1.32 ryo (*func)(pfh->pfil_arg, cmd, arg);
452 1.29 christos }
453 1.32 ryo psref_release(&psref, &phlist->psref, pfil_psref_class);
454 1.33 ozaki curlwp_bindx(bound);
455 1.32 ryo }
456 1.32 ryo
457 1.32 ryo void
458 1.32 ryo pfil_run_addrhooks(pfil_head_t *ph, u_long cmd, struct ifaddr *ifa)
459 1.32 ryo {
460 1.32 ryo pfil_run_arg(&ph->ph_ifaddr, cmd, ifa);
461 1.29 christos }
462 1.29 christos
463 1.29 christos void
464 1.29 christos pfil_run_ifhooks(pfil_head_t *ph, u_long cmd, struct ifnet *ifp)
465 1.29 christos {
466 1.32 ryo pfil_run_arg(&ph->ph_ifevent, cmd, ifp);
467 1.29 christos }
468