pfil.c revision 1.40 1 1.40 riastrad /* $NetBSD: pfil.c,v 1.40 2022/05/17 10:27:37 riastradh Exp $ */
2 1.1 mrg
3 1.1 mrg /*
4 1.28 rmind * Copyright (c) 2013 Mindaugas Rasiukevicius <rmind at NetBSD org>
5 1.1 mrg * Copyright (c) 1996 Matthew R. Green
6 1.1 mrg * All rights reserved.
7 1.1 mrg *
8 1.1 mrg * Redistribution and use in source and binary forms, with or without
9 1.1 mrg * modification, are permitted provided that the following conditions
10 1.1 mrg * are met:
11 1.1 mrg * 1. Redistributions of source code must retain the above copyright
12 1.1 mrg * notice, this list of conditions and the following disclaimer.
13 1.1 mrg * 2. Redistributions in binary form must reproduce the above copyright
14 1.1 mrg * notice, this list of conditions and the following disclaimer in the
15 1.1 mrg * documentation and/or other materials provided with the distribution.
16 1.1 mrg *
17 1.1 mrg * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18 1.1 mrg * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19 1.1 mrg * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20 1.1 mrg * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21 1.1 mrg * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
22 1.1 mrg * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
23 1.1 mrg * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
24 1.1 mrg * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
25 1.1 mrg * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26 1.1 mrg * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27 1.1 mrg * SUCH DAMAGE.
28 1.1 mrg */
29 1.20 lukem
30 1.20 lukem #include <sys/cdefs.h>
31 1.40 riastrad __KERNEL_RCSID(0, "$NetBSD: pfil.c,v 1.40 2022/05/17 10:27:37 riastradh Exp $");
32 1.34 ozaki
33 1.34 ozaki #if defined(_KERNEL_OPT)
34 1.34 ozaki #include "opt_net_mpsafe.h"
35 1.34 ozaki #endif
36 1.1 mrg
37 1.1 mrg #include <sys/param.h>
38 1.1 mrg #include <sys/systm.h>
39 1.1 mrg #include <sys/queue.h>
40 1.28 rmind #include <sys/kmem.h>
41 1.32 ryo #include <sys/psref.h>
42 1.1 mrg
43 1.1 mrg #include <net/if.h>
44 1.1 mrg #include <net/pfil.h>
45 1.1 mrg
46 1.28 rmind #define MAX_HOOKS 8
47 1.16 thorpej
48 1.29 christos /* Func is either pfil_func_t or pfil_ifunc_t. */
49 1.29 christos typedef void (*pfil_polyfunc_t)(void);
50 1.29 christos
51 1.28 rmind typedef struct {
52 1.29 christos pfil_polyfunc_t pfil_func;
53 1.28 rmind void * pfil_arg;
54 1.28 rmind } pfil_hook_t;
55 1.28 rmind
56 1.28 rmind typedef struct {
57 1.28 rmind pfil_hook_t hooks[MAX_HOOKS];
58 1.28 rmind u_int nhooks;
59 1.32 ryo struct psref_target psref;
60 1.28 rmind } pfil_list_t;
61 1.28 rmind
62 1.32 ryo typedef struct {
63 1.32 ryo pfil_list_t *active; /* lists[0] or lists[1] */
64 1.32 ryo pfil_list_t lists[2];
65 1.32 ryo } pfil_listset_t;
66 1.32 ryo
67 1.29 christos CTASSERT(PFIL_IN == 1);
68 1.29 christos CTASSERT(PFIL_OUT == 2);
69 1.29 christos
70 1.28 rmind struct pfil_head {
71 1.32 ryo pfil_listset_t ph_in;
72 1.32 ryo pfil_listset_t ph_out;
73 1.32 ryo pfil_listset_t ph_ifaddr;
74 1.32 ryo pfil_listset_t ph_ifevent;
75 1.28 rmind int ph_type;
76 1.28 rmind void * ph_key;
77 1.28 rmind LIST_ENTRY(pfil_head) ph_list;
78 1.28 rmind };
79 1.28 rmind
80 1.28 rmind static const int pfil_flag_cases[] = {
81 1.31 ryo PFIL_IN, PFIL_OUT
82 1.28 rmind };
83 1.16 thorpej
84 1.28 rmind static LIST_HEAD(, pfil_head) pfil_head_list __read_mostly =
85 1.16 thorpej LIST_HEAD_INITIALIZER(&pfil_head_list);
86 1.16 thorpej
87 1.32 ryo static kmutex_t pfil_mtx __cacheline_aligned;
88 1.32 ryo static struct psref_class *pfil_psref_class __read_mostly;
89 1.39 maxv #ifdef NET_MPSAFE
90 1.32 ryo static pserialize_t pfil_psz;
91 1.39 maxv #endif
92 1.32 ryo
93 1.32 ryo void
94 1.32 ryo pfil_init(void)
95 1.32 ryo {
96 1.32 ryo mutex_init(&pfil_mtx, MUTEX_DEFAULT, IPL_NONE);
97 1.39 maxv #ifdef NET_MPSAFE
98 1.32 ryo pfil_psz = pserialize_create();
99 1.39 maxv #endif
100 1.32 ryo pfil_psref_class = psref_class_create("pfil", IPL_SOFTNET);
101 1.32 ryo }
102 1.32 ryo
103 1.32 ryo static inline void
104 1.32 ryo pfil_listset_init(pfil_listset_t *pflistset)
105 1.32 ryo {
106 1.32 ryo pflistset->active = &pflistset->lists[0];
107 1.32 ryo psref_target_init(&pflistset->active->psref, pfil_psref_class);
108 1.32 ryo }
109 1.32 ryo
110 1.16 thorpej /*
111 1.28 rmind * pfil_head_create: create and register a packet filter head.
112 1.16 thorpej */
113 1.28 rmind pfil_head_t *
114 1.28 rmind pfil_head_create(int type, void *key)
115 1.16 thorpej {
116 1.28 rmind pfil_head_t *ph;
117 1.1 mrg
118 1.28 rmind if (pfil_head_get(type, key)) {
119 1.28 rmind return NULL;
120 1.16 thorpej }
121 1.28 rmind ph = kmem_zalloc(sizeof(pfil_head_t), KM_SLEEP);
122 1.28 rmind ph->ph_type = type;
123 1.28 rmind ph->ph_key = key;
124 1.16 thorpej
125 1.32 ryo pfil_listset_init(&ph->ph_in);
126 1.32 ryo pfil_listset_init(&ph->ph_out);
127 1.32 ryo pfil_listset_init(&ph->ph_ifaddr);
128 1.32 ryo pfil_listset_init(&ph->ph_ifevent);
129 1.32 ryo
130 1.16 thorpej LIST_INSERT_HEAD(&pfil_head_list, ph, ph_list);
131 1.28 rmind return ph;
132 1.16 thorpej }
133 1.16 thorpej
134 1.16 thorpej /*
135 1.28 rmind * pfil_head_destroy: remove and destroy a packet filter head.
136 1.16 thorpej */
137 1.28 rmind void
138 1.28 rmind pfil_head_destroy(pfil_head_t *pfh)
139 1.16 thorpej {
140 1.16 thorpej LIST_REMOVE(pfh, ph_list);
141 1.32 ryo
142 1.32 ryo psref_target_destroy(&pfh->ph_in.active->psref, pfil_psref_class);
143 1.32 ryo psref_target_destroy(&pfh->ph_out.active->psref, pfil_psref_class);
144 1.32 ryo psref_target_destroy(&pfh->ph_ifaddr.active->psref, pfil_psref_class);
145 1.32 ryo psref_target_destroy(&pfh->ph_ifevent.active->psref, pfil_psref_class);
146 1.32 ryo
147 1.28 rmind kmem_free(pfh, sizeof(pfil_head_t));
148 1.16 thorpej }
149 1.16 thorpej
150 1.16 thorpej /*
151 1.28 rmind * pfil_head_get: returns the packer filter head for a given key.
152 1.16 thorpej */
153 1.28 rmind pfil_head_t *
154 1.28 rmind pfil_head_get(int type, void *key)
155 1.16 thorpej {
156 1.28 rmind pfil_head_t *ph;
157 1.16 thorpej
158 1.27 dyoung LIST_FOREACH(ph, &pfil_head_list, ph_list) {
159 1.28 rmind if (ph->ph_type == type && ph->ph_key == key)
160 1.16 thorpej break;
161 1.16 thorpej }
162 1.28 rmind return ph;
163 1.1 mrg }
164 1.1 mrg
165 1.32 ryo static pfil_listset_t *
166 1.28 rmind pfil_hook_get(int dir, pfil_head_t *ph)
167 1.1 mrg {
168 1.28 rmind switch (dir) {
169 1.28 rmind case PFIL_IN:
170 1.30 ryo return &ph->ph_in;
171 1.28 rmind case PFIL_OUT:
172 1.30 ryo return &ph->ph_out;
173 1.28 rmind case PFIL_IFADDR:
174 1.28 rmind return &ph->ph_ifaddr;
175 1.28 rmind case PFIL_IFNET:
176 1.28 rmind return &ph->ph_ifevent;
177 1.21 itojun }
178 1.28 rmind return NULL;
179 1.1 mrg }
180 1.1 mrg
181 1.13 darrenr static int
182 1.32 ryo pfil_list_add(pfil_listset_t *phlistset, pfil_polyfunc_t func, void *arg,
183 1.32 ryo int flags)
184 1.1 mrg {
185 1.32 ryo u_int nhooks;
186 1.32 ryo pfil_list_t *newlist, *oldlist;
187 1.28 rmind pfil_hook_t *pfh;
188 1.1 mrg
189 1.32 ryo mutex_enter(&pfil_mtx);
190 1.32 ryo
191 1.28 rmind /* Check if we have a free slot. */
192 1.32 ryo nhooks = phlistset->active->nhooks;
193 1.28 rmind if (nhooks == MAX_HOOKS) {
194 1.32 ryo mutex_exit(&pfil_mtx);
195 1.28 rmind return ENOSPC;
196 1.28 rmind }
197 1.28 rmind KASSERT(nhooks < MAX_HOOKS);
198 1.28 rmind
199 1.32 ryo if (phlistset->active == &phlistset->lists[0]) {
200 1.32 ryo oldlist = &phlistset->lists[0];
201 1.32 ryo newlist = &phlistset->lists[1];
202 1.32 ryo } else{
203 1.32 ryo oldlist = &phlistset->lists[1];
204 1.32 ryo newlist = &phlistset->lists[0];
205 1.32 ryo }
206 1.32 ryo
207 1.28 rmind /* Make sure the hook is not already added. */
208 1.28 rmind for (u_int i = 0; i < nhooks; i++) {
209 1.32 ryo pfh = &oldlist->hooks[i];
210 1.32 ryo if (pfh->pfil_func == func && pfh->pfil_arg == arg) {
211 1.32 ryo mutex_exit(&pfil_mtx);
212 1.16 thorpej return EEXIST;
213 1.32 ryo }
214 1.16 thorpej }
215 1.16 thorpej
216 1.32 ryo /* create new pfil_list_t copied from old */
217 1.32 ryo memcpy(newlist, oldlist, sizeof(pfil_list_t));
218 1.32 ryo psref_target_init(&newlist->psref, pfil_psref_class);
219 1.32 ryo
220 1.28 rmind /*
221 1.28 rmind * Finally, add the hook. Note: for PFIL_IN we insert the hooks in
222 1.28 rmind * reverse order of the PFIL_OUT so that the same path is followed
223 1.28 rmind * in or out of the kernel.
224 1.28 rmind */
225 1.28 rmind if (flags & PFIL_IN) {
226 1.28 rmind /* XXX: May want to revisit this later; */
227 1.28 rmind size_t len = sizeof(pfil_hook_t) * nhooks;
228 1.32 ryo pfh = &newlist->hooks[0];
229 1.32 ryo memmove(&newlist->hooks[1], pfh, len);
230 1.28 rmind } else {
231 1.32 ryo pfh = &newlist->hooks[nhooks];
232 1.28 rmind }
233 1.32 ryo newlist->nhooks++;
234 1.16 thorpej
235 1.1 mrg pfh->pfil_func = func;
236 1.16 thorpej pfh->pfil_arg = arg;
237 1.32 ryo
238 1.32 ryo /* switch from oldlist to newlist */
239 1.36 riastrad atomic_store_release(&phlistset->active, newlist);
240 1.34 ozaki #ifdef NET_MPSAFE
241 1.32 ryo pserialize_perform(pfil_psz);
242 1.34 ozaki #endif
243 1.32 ryo mutex_exit(&pfil_mtx);
244 1.32 ryo
245 1.32 ryo /* Wait for all readers */
246 1.34 ozaki #ifdef NET_MPSAFE
247 1.32 ryo psref_target_destroy(&oldlist->psref, pfil_psref_class);
248 1.34 ozaki #endif
249 1.32 ryo
250 1.13 darrenr return 0;
251 1.1 mrg }
252 1.1 mrg
253 1.1 mrg /*
254 1.28 rmind * pfil_add_hook: add a function (hook) to the packet filter head.
255 1.28 rmind * The possible flags are:
256 1.28 rmind *
257 1.28 rmind * PFIL_IN call on incoming packets
258 1.28 rmind * PFIL_OUT call on outgoing packets
259 1.28 rmind * PFIL_ALL call on all of the above
260 1.1 mrg */
261 1.13 darrenr int
262 1.28 rmind pfil_add_hook(pfil_func_t func, void *arg, int flags, pfil_head_t *ph)
263 1.1 mrg {
264 1.28 rmind int error = 0;
265 1.28 rmind
266 1.28 rmind KASSERT(func != NULL);
267 1.29 christos KASSERT((flags & ~PFIL_ALL) == 0);
268 1.28 rmind
269 1.40 riastrad ASSERT_SLEEPABLE();
270 1.40 riastrad
271 1.28 rmind for (u_int i = 0; i < __arraycount(pfil_flag_cases); i++) {
272 1.28 rmind const int fcase = pfil_flag_cases[i];
273 1.32 ryo pfil_listset_t *phlistset;
274 1.1 mrg
275 1.28 rmind if ((flags & fcase) == 0) {
276 1.28 rmind continue;
277 1.28 rmind }
278 1.32 ryo phlistset = pfil_hook_get(fcase, ph);
279 1.32 ryo error = pfil_list_add(phlistset, (pfil_polyfunc_t)func, arg,
280 1.32 ryo flags);
281 1.32 ryo if (error && (error != EEXIST))
282 1.28 rmind break;
283 1.28 rmind }
284 1.32 ryo if (error && (error != EEXIST)) {
285 1.28 rmind pfil_remove_hook(func, arg, flags, ph);
286 1.28 rmind }
287 1.28 rmind return error;
288 1.1 mrg }
289 1.1 mrg
290 1.1 mrg /*
291 1.31 ryo * pfil_add_ihook: add an interface-event function (hook) to the packet
292 1.29 christos * filter head. The possible flags are:
293 1.29 christos *
294 1.31 ryo * PFIL_IFADDR call on interface reconfig (cmd is ioctl #)
295 1.31 ryo * PFIL_IFNET call on interface attach/detach (cmd is PFIL_IFNET_*)
296 1.29 christos */
297 1.29 christos int
298 1.29 christos pfil_add_ihook(pfil_ifunc_t func, void *arg, int flags, pfil_head_t *ph)
299 1.29 christos {
300 1.32 ryo pfil_listset_t *phlistset;
301 1.29 christos
302 1.31 ryo KASSERT(func != NULL);
303 1.29 christos KASSERT(flags == PFIL_IFADDR || flags == PFIL_IFNET);
304 1.31 ryo
305 1.40 riastrad ASSERT_SLEEPABLE();
306 1.40 riastrad
307 1.32 ryo phlistset = pfil_hook_get(flags, ph);
308 1.32 ryo return pfil_list_add(phlistset, (pfil_polyfunc_t)func, arg, flags);
309 1.29 christos }
310 1.29 christos
311 1.29 christos /*
312 1.28 rmind * pfil_list_remove: remove the hook from a specified list.
313 1.1 mrg */
314 1.13 darrenr static int
315 1.32 ryo pfil_list_remove(pfil_listset_t *phlistset, pfil_polyfunc_t func, void *arg)
316 1.1 mrg {
317 1.32 ryo u_int nhooks;
318 1.32 ryo pfil_list_t *oldlist, *newlist;
319 1.32 ryo
320 1.32 ryo mutex_enter(&pfil_mtx);
321 1.1 mrg
322 1.32 ryo /* create new pfil_list_t copied from old */
323 1.32 ryo if (phlistset->active == &phlistset->lists[0]) {
324 1.32 ryo oldlist = &phlistset->lists[0];
325 1.32 ryo newlist = &phlistset->lists[1];
326 1.32 ryo } else{
327 1.32 ryo oldlist = &phlistset->lists[1];
328 1.32 ryo newlist = &phlistset->lists[0];
329 1.32 ryo }
330 1.32 ryo memcpy(newlist, oldlist, sizeof(*newlist));
331 1.32 ryo psref_target_init(&newlist->psref, pfil_psref_class);
332 1.32 ryo
333 1.32 ryo nhooks = newlist->nhooks;
334 1.28 rmind for (u_int i = 0; i < nhooks; i++) {
335 1.32 ryo pfil_hook_t *last, *pfh = &newlist->hooks[i];
336 1.28 rmind
337 1.28 rmind if (pfh->pfil_func != func || pfh->pfil_arg != arg) {
338 1.28 rmind continue;
339 1.28 rmind }
340 1.32 ryo if ((last = &newlist->hooks[nhooks - 1]) != pfh) {
341 1.28 rmind memcpy(pfh, last, sizeof(pfil_hook_t));
342 1.1 mrg }
343 1.32 ryo newlist->nhooks--;
344 1.32 ryo
345 1.32 ryo /* switch from oldlist to newlist */
346 1.36 riastrad atomic_store_release(&phlistset->active, newlist);
347 1.34 ozaki #ifdef NET_MPSAFE
348 1.32 ryo pserialize_perform(pfil_psz);
349 1.34 ozaki #endif
350 1.32 ryo mutex_exit(&pfil_mtx);
351 1.32 ryo
352 1.32 ryo /* Wait for all readers */
353 1.34 ozaki #ifdef NET_MPSAFE
354 1.32 ryo psref_target_destroy(&oldlist->psref, pfil_psref_class);
355 1.34 ozaki #endif
356 1.32 ryo
357 1.28 rmind return 0;
358 1.16 thorpej }
359 1.32 ryo mutex_exit(&pfil_mtx);
360 1.13 darrenr return ENOENT;
361 1.1 mrg }
362 1.28 rmind
363 1.28 rmind /*
364 1.28 rmind * pfil_remove_hook: remove the hook from the packet filter head.
365 1.28 rmind */
366 1.28 rmind int
367 1.28 rmind pfil_remove_hook(pfil_func_t func, void *arg, int flags, pfil_head_t *ph)
368 1.28 rmind {
369 1.31 ryo KASSERT((flags & ~PFIL_ALL) == 0);
370 1.31 ryo
371 1.40 riastrad ASSERT_SLEEPABLE();
372 1.40 riastrad
373 1.28 rmind for (u_int i = 0; i < __arraycount(pfil_flag_cases); i++) {
374 1.28 rmind const int fcase = pfil_flag_cases[i];
375 1.32 ryo pfil_listset_t *pflistset;
376 1.28 rmind
377 1.28 rmind if ((flags & fcase) == 0) {
378 1.28 rmind continue;
379 1.28 rmind }
380 1.32 ryo pflistset = pfil_hook_get(fcase, ph);
381 1.32 ryo (void)pfil_list_remove(pflistset, (pfil_polyfunc_t)func, arg);
382 1.28 rmind }
383 1.28 rmind return 0;
384 1.28 rmind }
385 1.28 rmind
386 1.29 christos int
387 1.29 christos pfil_remove_ihook(pfil_ifunc_t func, void *arg, int flags, pfil_head_t *ph)
388 1.29 christos {
389 1.32 ryo pfil_listset_t *pflistset;
390 1.29 christos
391 1.29 christos KASSERT(flags == PFIL_IFADDR || flags == PFIL_IFNET);
392 1.40 riastrad
393 1.40 riastrad ASSERT_SLEEPABLE();
394 1.40 riastrad
395 1.32 ryo pflistset = pfil_hook_get(flags, ph);
396 1.32 ryo (void)pfil_list_remove(pflistset, (pfil_polyfunc_t)func, arg);
397 1.29 christos return 0;
398 1.29 christos }
399 1.29 christos
400 1.28 rmind /*
401 1.28 rmind * pfil_run_hooks: run the specified packet filter hooks.
402 1.28 rmind */
403 1.28 rmind int
404 1.28 rmind pfil_run_hooks(pfil_head_t *ph, struct mbuf **mp, ifnet_t *ifp, int dir)
405 1.28 rmind {
406 1.29 christos struct mbuf *m = mp ? *mp : NULL;
407 1.32 ryo pfil_listset_t *phlistset;
408 1.28 rmind pfil_list_t *phlist;
409 1.32 ryo struct psref psref;
410 1.33 ozaki int s, bound;
411 1.28 rmind int ret = 0;
412 1.28 rmind
413 1.31 ryo KASSERT(dir == PFIL_IN || dir == PFIL_OUT);
414 1.37 nat
415 1.38 nat if (ph == NULL) {
416 1.37 nat return ret;
417 1.37 nat }
418 1.37 nat
419 1.32 ryo if (__predict_false((phlistset = pfil_hook_get(dir, ph)) == NULL)) {
420 1.28 rmind return ret;
421 1.28 rmind }
422 1.28 rmind
423 1.33 ozaki bound = curlwp_bind();
424 1.32 ryo s = pserialize_read_enter();
425 1.36 riastrad phlist = atomic_load_consume(&phlistset->active);
426 1.32 ryo psref_acquire(&psref, &phlist->psref, pfil_psref_class);
427 1.32 ryo pserialize_read_exit(s);
428 1.28 rmind for (u_int i = 0; i < phlist->nhooks; i++) {
429 1.28 rmind pfil_hook_t *pfh = &phlist->hooks[i];
430 1.29 christos pfil_func_t func = (pfil_func_t)pfh->pfil_func;
431 1.28 rmind
432 1.29 christos ret = (*func)(pfh->pfil_arg, &m, ifp, dir);
433 1.29 christos if (m == NULL || ret)
434 1.28 rmind break;
435 1.28 rmind }
436 1.32 ryo psref_release(&psref, &phlist->psref, pfil_psref_class);
437 1.33 ozaki curlwp_bindx(bound);
438 1.28 rmind
439 1.29 christos if (mp) {
440 1.28 rmind *mp = m;
441 1.28 rmind }
442 1.28 rmind return ret;
443 1.28 rmind }
444 1.29 christos
445 1.32 ryo static void
446 1.32 ryo pfil_run_arg(pfil_listset_t *phlistset, u_long cmd, void *arg)
447 1.29 christos {
448 1.32 ryo pfil_list_t *phlist;
449 1.32 ryo struct psref psref;
450 1.33 ozaki int s, bound;
451 1.29 christos
452 1.33 ozaki bound = curlwp_bind();
453 1.32 ryo s = pserialize_read_enter();
454 1.36 riastrad phlist = atomic_load_consume(&phlistset->active);
455 1.32 ryo psref_acquire(&psref, &phlist->psref, pfil_psref_class);
456 1.32 ryo pserialize_read_exit(s);
457 1.29 christos for (u_int i = 0; i < phlist->nhooks; i++) {
458 1.29 christos pfil_hook_t *pfh = &phlist->hooks[i];
459 1.29 christos pfil_ifunc_t func = (pfil_ifunc_t)pfh->pfil_func;
460 1.32 ryo (*func)(pfh->pfil_arg, cmd, arg);
461 1.29 christos }
462 1.32 ryo psref_release(&psref, &phlist->psref, pfil_psref_class);
463 1.33 ozaki curlwp_bindx(bound);
464 1.32 ryo }
465 1.32 ryo
466 1.32 ryo void
467 1.32 ryo pfil_run_addrhooks(pfil_head_t *ph, u_long cmd, struct ifaddr *ifa)
468 1.32 ryo {
469 1.32 ryo pfil_run_arg(&ph->ph_ifaddr, cmd, ifa);
470 1.29 christos }
471 1.29 christos
472 1.29 christos void
473 1.29 christos pfil_run_ifhooks(pfil_head_t *ph, u_long cmd, struct ifnet *ifp)
474 1.29 christos {
475 1.32 ryo pfil_run_arg(&ph->ph_ifevent, cmd, ifp);
476 1.29 christos }
477