1 /*-
2 * SPDX-License-Identifier: BSD-2-Clause
3 *
4 * Copyright (c) 2001 Daniel Hartmeier
5 * Copyright (c) 2003 Cedric Berger
6 * Copyright (c) 2005 Henning Brauer <henning@openbsd.org>
7 * Copyright (c) 2005 Ryan McBride <mcbride@openbsd.org>
8 * Copyright (c) 2012 Gleb Smirnoff <glebius@FreeBSD.org>
9 * All rights reserved.
10 *
11 * Redistribution and use in source and binary forms, with or without
12 * modification, are permitted provided that the following conditions
13 * are met:
14 *
15 * - Redistributions of source code must retain the above copyright
16 * notice, this list of conditions and the following disclaimer.
17 * - Redistributions in binary form must reproduce the above
18 * copyright notice, this list of conditions and the following
19 * disclaimer in the documentation and/or other materials provided
20 * with the distribution.
21 *
22 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
23 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
24 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
25 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
26 * COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
27 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
28 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
29 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
30 * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
32 * ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
33 * POSSIBILITY OF SUCH DAMAGE.
34 *
35 * $OpenBSD: pf_if.c,v 1.54 2008/06/14 16:55:28 mk Exp $
36 */
37
38 #include <sys/cdefs.h>
39 #include "opt_inet.h"
40 #include "opt_inet6.h"
41
42 #include <sys/param.h>
43 #include <sys/kernel.h>
44 #include <sys/eventhandler.h>
45 #include <sys/lock.h>
46 #include <sys/mbuf.h>
47 #include <sys/socket.h>
48
49 #include <net/if.h>
50 #include <net/if_var.h>
51 #include <net/if_private.h>
52 #include <net/vnet.h>
53 #include <net/pfvar.h>
54 #include <net/route.h>
55
56 VNET_DEFINE(struct pfi_kkif *, pfi_all);
57 VNET_DEFINE_STATIC(long, pfi_update);
58 #define V_pfi_update VNET(pfi_update)
59 #define PFI_BUFFER_MAX 0x10000
60
61 VNET_DECLARE(int, pf_vnet_active);
62 #define V_pf_vnet_active VNET(pf_vnet_active)
63
64 VNET_DEFINE_STATIC(struct pfr_addr *, pfi_buffer);
65 VNET_DEFINE_STATIC(int, pfi_buffer_cnt);
66 VNET_DEFINE_STATIC(int, pfi_buffer_max);
67 #define V_pfi_buffer VNET(pfi_buffer)
68 #define V_pfi_buffer_cnt VNET(pfi_buffer_cnt)
69 #define V_pfi_buffer_max VNET(pfi_buffer_max)
70
71 #ifdef PF_WANT_32_TO_64_COUNTER
72 VNET_DEFINE(struct allkiflist_head, pf_allkiflist);
73 VNET_DEFINE(size_t, pf_allkifcount);
74 VNET_DEFINE(struct pfi_kkif *, pf_kifmarker);
75 #endif
76
77 eventhandler_tag pfi_attach_cookie;
78 eventhandler_tag pfi_detach_cookie;
79 eventhandler_tag pfi_attach_group_cookie;
80 eventhandler_tag pfi_change_group_cookie;
81 eventhandler_tag pfi_detach_group_cookie;
82 eventhandler_tag pfi_ifaddr_event_cookie;
83
84 static void pfi_attach_ifnet(struct ifnet *, struct pfi_kkif *);
85 static void pfi_attach_ifgroup(struct ifg_group *, struct pfi_kkif *);
86
87 static void pfi_kkif_update(struct pfi_kkif *);
88 static void pfi_dynaddr_update(struct pfi_dynaddr *dyn);
89 static void pfi_table_update(struct pfr_ktable *, struct pfi_kkif *, uint8_t,
90 int);
91 static void pfi_instance_add(struct ifnet *, uint8_t, int);
92 static void pfi_address_add(struct sockaddr *, sa_family_t, uint8_t);
93 static int pfi_kkif_compare(struct pfi_kkif *, struct pfi_kkif *);
94 static int pfi_skip_if(const char *, struct pfi_kkif *);
95 static int pfi_unmask(void *);
96 static void pfi_attach_ifnet_event(void * __unused, struct ifnet *);
97 static void pfi_detach_ifnet_event(void * __unused, struct ifnet *);
98 static void pfi_attach_group_event(void * __unused, struct ifg_group *);
99 static void pfi_change_group_event(void * __unused, char *);
100 static void pfi_detach_group_event(void * __unused, struct ifg_group *);
101 static void pfi_ifaddr_event(void * __unused, struct ifnet *);
102
103 RB_HEAD(pfi_ifhead, pfi_kkif);
104 static RB_PROTOTYPE(pfi_ifhead, pfi_kkif, pfik_tree, pfi_kkif_compare);
105 static RB_GENERATE(pfi_ifhead, pfi_kkif, pfik_tree, pfi_kkif_compare);
106 VNET_DEFINE_STATIC(struct pfi_ifhead, pfi_ifs);
107 #define V_pfi_ifs VNET(pfi_ifs)
108
109 #define PFI_BUFFER_MAX 0x10000
110 MALLOC_DEFINE(PFI_MTYPE, "pf_ifnet", "pf(4) interface database");
111
112 LIST_HEAD(pfi_list, pfi_kkif);
113 VNET_DEFINE_STATIC(struct pfi_list, pfi_unlinked_kifs);
114 #define V_pfi_unlinked_kifs VNET(pfi_unlinked_kifs)
115 static struct mtx pfi_unlnkdkifs_mtx;
116 MTX_SYSINIT(pfi_unlnkdkifs_mtx, &pfi_unlnkdkifs_mtx, "pf unlinked interfaces",
117 MTX_DEF);
118
119 void
pfi_initialize_vnet(void)120 pfi_initialize_vnet(void)
121 {
122 struct pfi_list kifs = LIST_HEAD_INITIALIZER();
123 struct epoch_tracker et;
124 struct pfi_kkif *kif;
125 struct ifg_group *ifg;
126 struct ifnet *ifp;
127 int nkifs;
128
129 V_pfi_buffer_max = 64;
130 V_pfi_buffer = malloc(V_pfi_buffer_max * sizeof(*V_pfi_buffer),
131 PFI_MTYPE, M_WAITOK);
132
133 nkifs = 1; /* one for V_pfi_all */
134 IFNET_RLOCK();
135 CK_STAILQ_FOREACH(ifg, &V_ifg_head, ifg_next)
136 nkifs++;
137 CK_STAILQ_FOREACH(ifp, &V_ifnet, if_link)
138 nkifs++;
139
140 for (int n = 0; n < nkifs; n++) {
141 kif = pf_kkif_create(M_WAITOK);
142 LIST_INSERT_HEAD(&kifs, kif, pfik_list);
143 }
144
145 NET_EPOCH_ENTER(et);
146 PF_RULES_WLOCK();
147 kif = LIST_FIRST(&kifs);
148 LIST_REMOVE(kif, pfik_list);
149 V_pfi_all = pfi_kkif_attach(kif, IFG_ALL);
150 CK_STAILQ_FOREACH(ifg, &V_ifg_head, ifg_next) {
151 kif = LIST_FIRST(&kifs);
152 LIST_REMOVE(kif, pfik_list);
153 pfi_attach_ifgroup(ifg, kif);
154 }
155 CK_STAILQ_FOREACH(ifp, &V_ifnet, if_link) {
156 kif = LIST_FIRST(&kifs);
157 LIST_REMOVE(kif, pfik_list);
158 pfi_attach_ifnet(ifp, kif);
159 }
160 PF_RULES_WUNLOCK();
161 NET_EPOCH_EXIT(et);
162 IFNET_RUNLOCK();
163
164 MPASS(LIST_EMPTY(&kifs));
165 }
166
167 void
pfi_initialize(void)168 pfi_initialize(void)
169 {
170
171 pfi_attach_cookie = EVENTHANDLER_REGISTER(ifnet_arrival_event,
172 pfi_attach_ifnet_event, NULL, EVENTHANDLER_PRI_ANY);
173 pfi_detach_cookie = EVENTHANDLER_REGISTER(ifnet_departure_event,
174 pfi_detach_ifnet_event, NULL, EVENTHANDLER_PRI_ANY);
175 pfi_attach_group_cookie = EVENTHANDLER_REGISTER(group_attach_event,
176 pfi_attach_group_event, NULL, EVENTHANDLER_PRI_ANY);
177 pfi_change_group_cookie = EVENTHANDLER_REGISTER(group_change_event,
178 pfi_change_group_event, NULL, EVENTHANDLER_PRI_ANY);
179 pfi_detach_group_cookie = EVENTHANDLER_REGISTER(group_detach_event,
180 pfi_detach_group_event, NULL, EVENTHANDLER_PRI_ANY);
181 pfi_ifaddr_event_cookie = EVENTHANDLER_REGISTER(ifaddr_event,
182 pfi_ifaddr_event, NULL, EVENTHANDLER_PRI_ANY);
183 }
184
185 void
pfi_cleanup_vnet(void)186 pfi_cleanup_vnet(void)
187 {
188 struct pfi_kkif *kif;
189
190 PF_RULES_WASSERT();
191
192 V_pfi_all = NULL;
193 while ((kif = RB_MIN(pfi_ifhead, &V_pfi_ifs))) {
194 RB_REMOVE(pfi_ifhead, &V_pfi_ifs, kif);
195 if (kif->pfik_group)
196 kif->pfik_group->ifg_pf_kif = NULL;
197 if (kif->pfik_ifp) {
198 if_rele(kif->pfik_ifp);
199 kif->pfik_ifp->if_pf_kif = NULL;
200 }
201 pf_kkif_free(kif);
202 }
203
204 mtx_lock(&pfi_unlnkdkifs_mtx);
205 while ((kif = LIST_FIRST(&V_pfi_unlinked_kifs))) {
206 LIST_REMOVE(kif, pfik_list);
207 pf_kkif_free(kif);
208 }
209 mtx_unlock(&pfi_unlnkdkifs_mtx);
210
211 free(V_pfi_buffer, PFI_MTYPE);
212 }
213
214 void
pfi_cleanup(void)215 pfi_cleanup(void)
216 {
217
218 EVENTHANDLER_DEREGISTER(ifnet_arrival_event, pfi_attach_cookie);
219 EVENTHANDLER_DEREGISTER(ifnet_departure_event, pfi_detach_cookie);
220 EVENTHANDLER_DEREGISTER(group_attach_event, pfi_attach_group_cookie);
221 EVENTHANDLER_DEREGISTER(group_change_event, pfi_change_group_cookie);
222 EVENTHANDLER_DEREGISTER(group_detach_event, pfi_detach_group_cookie);
223 EVENTHANDLER_DEREGISTER(ifaddr_event, pfi_ifaddr_event_cookie);
224 }
225
226 struct pfi_kkif*
pf_kkif_create(int flags)227 pf_kkif_create(int flags)
228 {
229 struct pfi_kkif *kif;
230 #ifdef PF_WANT_32_TO_64_COUNTER
231 bool wowned;
232 #endif
233
234 kif = malloc(sizeof(*kif), PFI_MTYPE, flags | M_ZERO);
235 if (! kif)
236 return (kif);
237
238 for (int i = 0; i < 2; i++) {
239 for (int j = 0; j < 2; j++) {
240 for (int k = 0; k < 2; k++) {
241 if (pf_counter_u64_init(&kif->pfik_packets[i][j][k], flags) != 0) {
242 pf_kkif_free(kif);
243 return (NULL);
244 }
245
246 if (pf_counter_u64_init(&kif->pfik_bytes[i][j][k], flags) != 0) {
247 pf_kkif_free(kif);
248 return (NULL);
249 }
250 }
251 }
252 }
253
254 #ifdef PF_WANT_32_TO_64_COUNTER
255 wowned = PF_RULES_WOWNED();
256 if (!wowned)
257 PF_RULES_WLOCK();
258 LIST_INSERT_HEAD(&V_pf_allkiflist, kif, pfik_allkiflist);
259 V_pf_allkifcount++;
260 if (!wowned)
261 PF_RULES_WUNLOCK();
262 #endif
263
264 return (kif);
265 }
266
267 void
pf_kkif_free(struct pfi_kkif * kif)268 pf_kkif_free(struct pfi_kkif *kif)
269 {
270 #ifdef PF_WANT_32_TO_64_COUNTER
271 bool wowned;
272 #endif
273
274 if (! kif)
275 return;
276
277 #ifdef INVARIANTS
278 if (kif->pfik_ifp) {
279 struct ifnet *ifp = kif->pfik_ifp;
280 MPASS(ifp->if_pf_kif == NULL || ifp->if_pf_kif == kif);
281 }
282 #endif
283
284 #ifdef PF_WANT_32_TO_64_COUNTER
285 wowned = PF_RULES_WOWNED();
286 if (!wowned)
287 PF_RULES_WLOCK();
288 LIST_REMOVE(kif, pfik_allkiflist);
289 V_pf_allkifcount--;
290 if (!wowned)
291 PF_RULES_WUNLOCK();
292 #endif
293
294 for (int i = 0; i < 2; i++) {
295 for (int j = 0; j < 2; j++) {
296 for (int k = 0; k < 2; k++) {
297 pf_counter_u64_deinit(&kif->pfik_packets[i][j][k]);
298 pf_counter_u64_deinit(&kif->pfik_bytes[i][j][k]);
299 }
300 }
301 }
302
303 free(kif, PFI_MTYPE);
304 }
305
306 void
pf_kkif_zero(struct pfi_kkif * kif)307 pf_kkif_zero(struct pfi_kkif *kif)
308 {
309
310 for (int i = 0; i < 2; i++) {
311 for (int j = 0; j < 2; j++) {
312 for (int k = 0; k < 2; k++) {
313 pf_counter_u64_zero(&kif->pfik_packets[i][j][k]);
314 pf_counter_u64_zero(&kif->pfik_bytes[i][j][k]);
315 }
316 }
317 }
318 kif->pfik_tzero = time_second;
319 }
320
321 struct pfi_kkif *
pfi_kkif_find(const char * kif_name)322 pfi_kkif_find(const char *kif_name)
323 {
324 struct pfi_kif_cmp s;
325
326 PF_RULES_ASSERT();
327
328 memset(&s, 0, sizeof(s));
329 strlcpy(s.pfik_name, kif_name, sizeof(s.pfik_name));
330
331 return (RB_FIND(pfi_ifhead, &V_pfi_ifs, (struct pfi_kkif *)&s));
332 }
333
334 struct pfi_kkif *
pfi_kkif_attach(struct pfi_kkif * kif,const char * kif_name)335 pfi_kkif_attach(struct pfi_kkif *kif, const char *kif_name)
336 {
337 struct pfi_kkif *kif1;
338
339 PF_RULES_WASSERT();
340 KASSERT(kif != NULL, ("%s: null kif", __func__));
341
342 kif1 = pfi_kkif_find(kif_name);
343 if (kif1 != NULL) {
344 pf_kkif_free(kif);
345 return (kif1);
346 }
347
348 pf_kkif_zero(kif);
349 strlcpy(kif->pfik_name, kif_name, sizeof(kif->pfik_name));
350 /*
351 * It seems that the value of time_second is in unintialzied state
352 * when pf sets interface statistics clear time in boot phase if pf
353 * was statically linked to kernel. Instead of setting the bogus
354 * time value have pfi_get_ifaces handle this case. In
355 * pfi_get_ifaces it uses time_second if it sees the time is 0.
356 */
357 kif->pfik_tzero = time_second > 1 ? time_second : 0;
358 TAILQ_INIT(&kif->pfik_dynaddrs);
359
360 if (!strcmp(kif->pfik_name, "any")) {
361 /* both so it works in the ioctl and the regular case */
362 kif->pfik_flags |= PFI_IFLAG_ANY;
363 }
364
365 RB_INSERT(pfi_ifhead, &V_pfi_ifs, kif);
366
367 return (kif);
368 }
369
370 void
pfi_kkif_ref(struct pfi_kkif * kif)371 pfi_kkif_ref(struct pfi_kkif *kif)
372 {
373
374 PF_RULES_WASSERT();
375 kif->pfik_rulerefs++;
376 }
377
378 static void
pfi_kkif_remove_if_unref(struct pfi_kkif * kif)379 pfi_kkif_remove_if_unref(struct pfi_kkif *kif)
380 {
381
382 PF_RULES_WASSERT();
383
384 if (kif->pfik_rulerefs > 0)
385 return;
386
387 /* kif referencing an existing ifnet or group or holding flags should
388 * exist. */
389 if (kif->pfik_ifp != NULL || kif->pfik_group != NULL ||
390 kif == V_pfi_all || kif->pfik_flags != 0)
391 return;
392
393 /*
394 * We can get here in at least two distinct paths:
395 * - when the struct ifnet is removed, via pfi_detach_ifnet_event()
396 * - when a rule referencing us is removed, via pfi_kkif_unref().
397 * These two events can race against each other, leading us to free this kif
398 * twice. That leads to a loop in V_pfi_unlinked_kifs, and an eventual
399 * deadlock.
400 *
401 * Avoid this by making sure we only ever insert the kif into
402 * V_pfi_unlinked_kifs once.
403 * If we don't find it in V_pfi_ifs it's already been removed. Check that it
404 * exists in V_pfi_unlinked_kifs.
405 */
406 if (! RB_FIND(pfi_ifhead, &V_pfi_ifs, kif)) {
407 #ifdef INVARIANTS
408 struct pfi_kkif *tmp;
409 bool found = false;
410 mtx_lock(&pfi_unlnkdkifs_mtx);
411 LIST_FOREACH(tmp, &V_pfi_unlinked_kifs, pfik_list) {
412 if (tmp == kif) {
413 found = true;
414 break;
415 }
416 }
417 mtx_unlock(&pfi_unlnkdkifs_mtx);
418 MPASS(found);
419 #endif
420 return;
421 }
422 RB_REMOVE(pfi_ifhead, &V_pfi_ifs, kif);
423
424 kif->pfik_flags |= PFI_IFLAG_REFS;
425
426 mtx_lock(&pfi_unlnkdkifs_mtx);
427 LIST_INSERT_HEAD(&V_pfi_unlinked_kifs, kif, pfik_list);
428 mtx_unlock(&pfi_unlnkdkifs_mtx);
429 }
430
431 void
pfi_kkif_unref(struct pfi_kkif * kif)432 pfi_kkif_unref(struct pfi_kkif *kif)
433 {
434
435 PF_RULES_WASSERT();
436 KASSERT(kif->pfik_rulerefs > 0, ("%s: %p has zero refs", __func__, kif));
437
438 kif->pfik_rulerefs--;
439
440 pfi_kkif_remove_if_unref(kif);
441 }
442
443 void
pfi_kkif_purge(void)444 pfi_kkif_purge(void)
445 {
446 struct pfi_kkif *kif, *kif1;
447
448 /*
449 * Do naive mark-and-sweep garbage collecting of old kifs.
450 * Reference flag is raised by pf_purge_expired_states().
451 */
452 mtx_lock(&pfi_unlnkdkifs_mtx);
453 LIST_FOREACH_SAFE(kif, &V_pfi_unlinked_kifs, pfik_list, kif1) {
454 if (!(kif->pfik_flags & PFI_IFLAG_REFS)) {
455 LIST_REMOVE(kif, pfik_list);
456 pf_kkif_free(kif);
457 } else
458 kif->pfik_flags &= ~PFI_IFLAG_REFS;
459 }
460 mtx_unlock(&pfi_unlnkdkifs_mtx);
461 }
462
463 int
pfi_kkif_match(struct pfi_kkif * rule_kif,struct pfi_kkif * packet_kif)464 pfi_kkif_match(struct pfi_kkif *rule_kif, struct pfi_kkif *packet_kif)
465 {
466 struct ifg_list *p;
467
468 NET_EPOCH_ASSERT();
469
470 MPASS(packet_kif != NULL);
471 MPASS(packet_kif->pfik_ifp != NULL);
472
473 if (rule_kif == NULL || rule_kif == packet_kif)
474 return (1);
475
476 if (rule_kif->pfik_group != NULL) {
477 CK_STAILQ_FOREACH(p, &packet_kif->pfik_ifp->if_groups, ifgl_next)
478 if (p->ifgl_group == rule_kif->pfik_group)
479 return (1);
480 }
481
482 if (rule_kif->pfik_flags & PFI_IFLAG_ANY && packet_kif->pfik_ifp &&
483 !(packet_kif->pfik_ifp->if_flags & IFF_LOOPBACK))
484 return (1);
485
486 return (0);
487 }
488
489 static void
pfi_attach_ifnet(struct ifnet * ifp,struct pfi_kkif * kif)490 pfi_attach_ifnet(struct ifnet *ifp, struct pfi_kkif *kif)
491 {
492
493 PF_RULES_WASSERT();
494
495 V_pfi_update++;
496 kif = pfi_kkif_attach(kif, ifp->if_xname);
497 if_ref(ifp);
498 kif->pfik_ifp = ifp;
499 ifp->if_pf_kif = kif;
500 pfi_kkif_update(kif);
501 }
502
503 static void
pfi_attach_ifgroup(struct ifg_group * ifg,struct pfi_kkif * kif)504 pfi_attach_ifgroup(struct ifg_group *ifg, struct pfi_kkif *kif)
505 {
506
507 PF_RULES_WASSERT();
508
509 V_pfi_update++;
510 kif = pfi_kkif_attach(kif, ifg->ifg_group);
511 kif->pfik_group = ifg;
512 ifg->ifg_pf_kif = kif;
513 }
514
515 int
pfi_match_addr(struct pfi_dynaddr * dyn,struct pf_addr * a,sa_family_t af)516 pfi_match_addr(struct pfi_dynaddr *dyn, struct pf_addr *a, sa_family_t af)
517 {
518 switch (af) {
519 #ifdef INET
520 case AF_INET:
521 switch (dyn->pfid_acnt4) {
522 case 0:
523 return (0);
524 case 1:
525 return (PF_MATCHA(0, &dyn->pfid_addr4,
526 &dyn->pfid_mask4, a, AF_INET));
527 default:
528 return (pfr_match_addr(dyn->pfid_kt, a, AF_INET));
529 }
530 break;
531 #endif /* INET */
532 #ifdef INET6
533 case AF_INET6:
534 switch (dyn->pfid_acnt6) {
535 case 0:
536 return (0);
537 case 1:
538 return (PF_MATCHA(0, &dyn->pfid_addr6,
539 &dyn->pfid_mask6, a, AF_INET6));
540 default:
541 return (pfr_match_addr(dyn->pfid_kt, a, AF_INET6));
542 }
543 break;
544 #endif /* INET6 */
545 default:
546 return (0);
547 }
548 }
549
550 int
pfi_dynaddr_setup(struct pf_addr_wrap * aw,sa_family_t af)551 pfi_dynaddr_setup(struct pf_addr_wrap *aw, sa_family_t af)
552 {
553 struct epoch_tracker et;
554 struct pfi_dynaddr *dyn;
555 char tblname[PF_TABLE_NAME_SIZE];
556 struct pf_kruleset *ruleset = NULL;
557 struct pfi_kkif *kif;
558 int rv = 0;
559
560 PF_RULES_WASSERT();
561 KASSERT(aw->type == PF_ADDR_DYNIFTL, ("%s: type %u",
562 __func__, aw->type));
563 KASSERT(aw->p.dyn == NULL, ("%s: dyn is %p", __func__, aw->p.dyn));
564
565 if ((dyn = malloc(sizeof(*dyn), PFI_MTYPE, M_NOWAIT | M_ZERO)) == NULL)
566 return (ENOMEM);
567
568 if ((kif = pf_kkif_create(M_NOWAIT)) == NULL) {
569 free(dyn, PFI_MTYPE);
570 return (ENOMEM);
571 }
572
573 if (!strcmp(aw->v.ifname, "self"))
574 dyn->pfid_kif = pfi_kkif_attach(kif, IFG_ALL);
575 else
576 dyn->pfid_kif = pfi_kkif_attach(kif, aw->v.ifname);
577 kif = NULL;
578 pfi_kkif_ref(dyn->pfid_kif);
579
580 dyn->pfid_net = pfi_unmask(&aw->v.a.mask);
581 if (af == AF_INET && dyn->pfid_net == 32)
582 dyn->pfid_net = 128;
583 strlcpy(tblname, aw->v.ifname, sizeof(tblname));
584 if (aw->iflags & PFI_AFLAG_NETWORK)
585 strlcat(tblname, ":network", sizeof(tblname));
586 if (aw->iflags & PFI_AFLAG_BROADCAST)
587 strlcat(tblname, ":broadcast", sizeof(tblname));
588 if (aw->iflags & PFI_AFLAG_PEER)
589 strlcat(tblname, ":peer", sizeof(tblname));
590 if (aw->iflags & PFI_AFLAG_NOALIAS)
591 strlcat(tblname, ":0", sizeof(tblname));
592 if (dyn->pfid_net != 128)
593 snprintf(tblname + strlen(tblname),
594 sizeof(tblname) - strlen(tblname), "/%d", dyn->pfid_net);
595 if ((ruleset = pf_find_or_create_kruleset(PF_RESERVED_ANCHOR)) == NULL) {
596 rv = ENOMEM;
597 goto _bad;
598 }
599
600 if ((dyn->pfid_kt = pfr_attach_table(ruleset, tblname)) == NULL) {
601 rv = ENOMEM;
602 goto _bad;
603 }
604
605 dyn->pfid_kt->pfrkt_flags |= PFR_TFLAG_ACTIVE;
606 dyn->pfid_iflags = aw->iflags;
607 dyn->pfid_af = af;
608
609 TAILQ_INSERT_TAIL(&dyn->pfid_kif->pfik_dynaddrs, dyn, entry);
610 aw->p.dyn = dyn;
611 NET_EPOCH_ENTER(et);
612 pfi_kkif_update(dyn->pfid_kif);
613 NET_EPOCH_EXIT(et);
614
615 return (0);
616
617 _bad:
618 if (dyn->pfid_kt != NULL)
619 pfr_detach_table(dyn->pfid_kt);
620 if (ruleset != NULL)
621 pf_remove_if_empty_kruleset(ruleset);
622 pfi_kkif_unref(dyn->pfid_kif);
623 free(dyn, PFI_MTYPE);
624
625 return (rv);
626 }
627
628 static void
pfi_kkif_update(struct pfi_kkif * kif)629 pfi_kkif_update(struct pfi_kkif *kif)
630 {
631 struct ifg_list *ifgl;
632 struct ifg_member *ifgm;
633 struct pfi_dynaddr *p;
634 struct pfi_kkif *tmpkif;
635
636 NET_EPOCH_ASSERT();
637 PF_RULES_WASSERT();
638
639 /* update all dynaddr */
640 TAILQ_FOREACH(p, &kif->pfik_dynaddrs, entry)
641 pfi_dynaddr_update(p);
642
643 /* Apply group flags to new members. */
644 if (kif->pfik_group != NULL) {
645 CK_STAILQ_FOREACH(ifgm, &kif->pfik_group->ifg_members,
646 ifgm_next) {
647 tmpkif = (struct pfi_kkif *)ifgm->ifgm_ifp->if_pf_kif;
648 if (tmpkif == NULL)
649 continue;
650
651 tmpkif->pfik_flags |= kif->pfik_flags;
652 }
653 }
654
655 /* again for all groups kif is member of */
656 if (kif->pfik_ifp != NULL) {
657 CK_STAILQ_FOREACH(ifgl, &kif->pfik_ifp->if_groups, ifgl_next)
658 pfi_kkif_update((struct pfi_kkif *)
659 ifgl->ifgl_group->ifg_pf_kif);
660 }
661 }
662
663 static void
pfi_dynaddr_update(struct pfi_dynaddr * dyn)664 pfi_dynaddr_update(struct pfi_dynaddr *dyn)
665 {
666 struct pfi_kkif *kif;
667 struct pfr_ktable *kt;
668
669 PF_RULES_WASSERT();
670 KASSERT(dyn && dyn->pfid_kif && dyn->pfid_kt,
671 ("%s: bad argument", __func__));
672
673 kif = dyn->pfid_kif;
674 kt = dyn->pfid_kt;
675
676 if (kt->pfrkt_larg != V_pfi_update) {
677 /* this table needs to be brought up-to-date */
678 pfi_table_update(kt, kif, dyn->pfid_net, dyn->pfid_iflags);
679 kt->pfrkt_larg = V_pfi_update;
680 }
681 pfr_dynaddr_update(kt, dyn);
682 }
683
684 static void
pfi_table_update(struct pfr_ktable * kt,struct pfi_kkif * kif,uint8_t net,int flags)685 pfi_table_update(struct pfr_ktable *kt, struct pfi_kkif *kif, uint8_t net,
686 int flags)
687 {
688 int e, size2 = 0;
689 struct ifg_member *ifgm;
690
691 NET_EPOCH_ASSERT();
692
693 V_pfi_buffer_cnt = 0;
694
695 if (kif->pfik_ifp != NULL)
696 pfi_instance_add(kif->pfik_ifp, net, flags);
697 else if (kif->pfik_group != NULL) {
698 CK_STAILQ_FOREACH(ifgm, &kif->pfik_group->ifg_members, ifgm_next)
699 pfi_instance_add(ifgm->ifgm_ifp, net, flags);
700 }
701
702 if ((e = pfr_set_addrs(&kt->pfrkt_t, V_pfi_buffer, V_pfi_buffer_cnt, &size2,
703 NULL, NULL, NULL, 0, PFR_TFLAG_ALLMASK)))
704 printf("%s: cannot set %d new addresses into table %s: %d\n",
705 __func__, V_pfi_buffer_cnt, kt->pfrkt_name, e);
706 }
707
708 static void
pfi_instance_add(struct ifnet * ifp,uint8_t net,int flags)709 pfi_instance_add(struct ifnet *ifp, uint8_t net, int flags)
710 {
711 struct ifaddr *ia;
712 int got4 = 0, got6 = 0;
713 sa_family_t af;
714 uint8_t net2;
715
716 NET_EPOCH_ASSERT();
717
718 CK_STAILQ_FOREACH(ia, &ifp->if_addrhead, ifa_link) {
719 if (ia->ifa_addr == NULL)
720 continue;
721 af = ia->ifa_addr->sa_family;
722 if (af != AF_INET && af != AF_INET6)
723 continue;
724 /*
725 * XXX: For point-to-point interfaces, (ifname:0) and IPv4,
726 * jump over addresses without a proper route to work
727 * around a problem with ppp not fully removing the
728 * address used during IPCP.
729 */
730 if ((ifp->if_flags & IFF_POINTOPOINT) &&
731 !(ia->ifa_flags & IFA_ROUTE) &&
732 (flags & PFI_AFLAG_NOALIAS) && (af == AF_INET))
733 continue;
734 if ((flags & PFI_AFLAG_BROADCAST) && af == AF_INET6)
735 continue;
736 if ((flags & PFI_AFLAG_BROADCAST) &&
737 !(ifp->if_flags & IFF_BROADCAST))
738 continue;
739 if ((flags & PFI_AFLAG_PEER) &&
740 !(ifp->if_flags & IFF_POINTOPOINT))
741 continue;
742 if ((flags & (PFI_AFLAG_NETWORK | PFI_AFLAG_NOALIAS)) &&
743 af == AF_INET6 &&
744 IN6_IS_ADDR_LINKLOCAL(
745 &((struct sockaddr_in6 *)ia->ifa_addr)->sin6_addr))
746 continue;
747 if (flags & PFI_AFLAG_NOALIAS) {
748 if (af == AF_INET && got4)
749 continue;
750 if (af == AF_INET6 && got6)
751 continue;
752 }
753 if (af == AF_INET)
754 got4 = 1;
755 else if (af == AF_INET6)
756 got6 = 1;
757 net2 = net;
758 if (net2 == 128 && (flags & PFI_AFLAG_NETWORK)) {
759 if (af == AF_INET)
760 net2 = pfi_unmask(&((struct sockaddr_in *)
761 ia->ifa_netmask)->sin_addr);
762 else if (af == AF_INET6)
763 net2 = pfi_unmask(&((struct sockaddr_in6 *)
764 ia->ifa_netmask)->sin6_addr);
765 }
766 if (af == AF_INET && net2 > 32)
767 net2 = 32;
768 if (flags & PFI_AFLAG_BROADCAST)
769 pfi_address_add(ia->ifa_broadaddr, af, net2);
770 else if (flags & PFI_AFLAG_PEER)
771 pfi_address_add(ia->ifa_dstaddr, af, net2);
772 else
773 pfi_address_add(ia->ifa_addr, af, net2);
774 }
775 }
776
777 static void
pfi_address_add(struct sockaddr * sa,sa_family_t af,uint8_t net)778 pfi_address_add(struct sockaddr *sa, sa_family_t af, uint8_t net)
779 {
780 struct pfr_addr *p;
781 int i;
782
783 if (V_pfi_buffer_cnt >= V_pfi_buffer_max) {
784 int new_max = V_pfi_buffer_max * 2;
785
786 if (new_max > PFI_BUFFER_MAX) {
787 printf("%s: address buffer full (%d/%d)\n", __func__,
788 V_pfi_buffer_cnt, PFI_BUFFER_MAX);
789 return;
790 }
791 p = malloc(new_max * sizeof(*V_pfi_buffer), PFI_MTYPE,
792 M_NOWAIT);
793 if (p == NULL) {
794 printf("%s: no memory to grow buffer (%d/%d)\n",
795 __func__, V_pfi_buffer_cnt, PFI_BUFFER_MAX);
796 return;
797 }
798 memcpy(p, V_pfi_buffer, V_pfi_buffer_max * sizeof(*V_pfi_buffer));
799 /* no need to zero buffer */
800 free(V_pfi_buffer, PFI_MTYPE);
801 V_pfi_buffer = p;
802 V_pfi_buffer_max = new_max;
803 }
804 if (af == AF_INET && net > 32)
805 net = 128;
806 p = V_pfi_buffer + V_pfi_buffer_cnt++;
807 memset(p, 0, sizeof(*p));
808 p->pfra_af = af;
809 p->pfra_net = net;
810 if (af == AF_INET)
811 p->pfra_ip4addr = ((struct sockaddr_in *)sa)->sin_addr;
812 else if (af == AF_INET6) {
813 p->pfra_ip6addr = ((struct sockaddr_in6 *)sa)->sin6_addr;
814 if (IN6_IS_SCOPE_EMBED(&p->pfra_ip6addr))
815 p->pfra_ip6addr.s6_addr16[1] = 0;
816 }
817 /* mask network address bits */
818 if (net < 128)
819 ((caddr_t)p)[p->pfra_net/8] &= ~(0xFF >> (p->pfra_net%8));
820 for (i = (p->pfra_net+7)/8; i < sizeof(p->pfra_u); i++)
821 ((caddr_t)p)[i] = 0;
822 }
823
824 void
pfi_dynaddr_remove(struct pfi_dynaddr * dyn)825 pfi_dynaddr_remove(struct pfi_dynaddr *dyn)
826 {
827
828 KASSERT(dyn->pfid_kif != NULL, ("%s: null pfid_kif", __func__));
829 KASSERT(dyn->pfid_kt != NULL, ("%s: null pfid_kt", __func__));
830
831 TAILQ_REMOVE(&dyn->pfid_kif->pfik_dynaddrs, dyn, entry);
832 pfi_kkif_unref(dyn->pfid_kif);
833 pfr_detach_table(dyn->pfid_kt);
834 free(dyn, PFI_MTYPE);
835 }
836
837 void
pfi_dynaddr_copyout(struct pf_addr_wrap * aw)838 pfi_dynaddr_copyout(struct pf_addr_wrap *aw)
839 {
840
841 KASSERT(aw->type == PF_ADDR_DYNIFTL,
842 ("%s: type %u", __func__, aw->type));
843
844 if (aw->p.dyn == NULL || aw->p.dyn->pfid_kif == NULL)
845 return;
846 aw->p.dyncnt = aw->p.dyn->pfid_acnt4 + aw->p.dyn->pfid_acnt6;
847 }
848
849 static int
pfi_kkif_compare(struct pfi_kkif * p,struct pfi_kkif * q)850 pfi_kkif_compare(struct pfi_kkif *p, struct pfi_kkif *q)
851 {
852 return (strncmp(p->pfik_name, q->pfik_name, IFNAMSIZ));
853 }
854
855 void
pfi_update_status(const char * name,struct pf_status * pfs)856 pfi_update_status(const char *name, struct pf_status *pfs)
857 {
858 struct pfi_kkif *p;
859 struct pfi_kif_cmp key;
860 struct ifg_member p_member, *ifgm;
861 CK_STAILQ_HEAD(, ifg_member) ifg_members;
862 int i, j, k;
863
864 if (pfs) {
865 memset(pfs->pcounters, 0, sizeof(pfs->pcounters));
866 memset(pfs->bcounters, 0, sizeof(pfs->bcounters));
867 }
868
869 strlcpy(key.pfik_name, name, sizeof(key.pfik_name));
870 p = RB_FIND(pfi_ifhead, &V_pfi_ifs, (struct pfi_kkif *)&key);
871 if (p == NULL) {
872 return;
873 }
874
875 if (p->pfik_group != NULL) {
876 memcpy(&ifg_members, &p->pfik_group->ifg_members,
877 sizeof(ifg_members));
878 } else {
879 /* build a temporary list for p only */
880 memset(&p_member, 0, sizeof(p_member));
881 p_member.ifgm_ifp = p->pfik_ifp;
882 CK_STAILQ_INIT(&ifg_members);
883 CK_STAILQ_INSERT_TAIL(&ifg_members, &p_member, ifgm_next);
884 }
885 CK_STAILQ_FOREACH(ifgm, &ifg_members, ifgm_next) {
886 if (ifgm->ifgm_ifp == NULL || ifgm->ifgm_ifp->if_pf_kif == NULL)
887 continue;
888 p = (struct pfi_kkif *)ifgm->ifgm_ifp->if_pf_kif;
889
890 /* just clear statistics */
891 if (pfs == NULL) {
892 pf_kkif_zero(p);
893 continue;
894 }
895 for (i = 0; i < 2; i++)
896 for (j = 0; j < 2; j++)
897 for (k = 0; k < 2; k++) {
898 pfs->pcounters[i][j][k] +=
899 pf_counter_u64_fetch(&p->pfik_packets[i][j][k]);
900 pfs->bcounters[i][j] +=
901 pf_counter_u64_fetch(&p->pfik_bytes[i][j][k]);
902 }
903 }
904 }
905
906 static void
pf_kkif_to_kif(struct pfi_kkif * kkif,struct pfi_kif * kif)907 pf_kkif_to_kif(struct pfi_kkif *kkif, struct pfi_kif *kif)
908 {
909
910 memset(kif, 0, sizeof(*kif));
911 strlcpy(kif->pfik_name, kkif->pfik_name, sizeof(kif->pfik_name));
912 for (int i = 0; i < 2; i++) {
913 for (int j = 0; j < 2; j++) {
914 for (int k = 0; k < 2; k++) {
915 kif->pfik_packets[i][j][k] =
916 pf_counter_u64_fetch(&kkif->pfik_packets[i][j][k]);
917 kif->pfik_bytes[i][j][k] =
918 pf_counter_u64_fetch(&kkif->pfik_bytes[i][j][k]);
919 }
920 }
921 }
922 kif->pfik_flags = kkif->pfik_flags;
923 kif->pfik_tzero = kkif->pfik_tzero;
924 kif->pfik_rulerefs = kkif->pfik_rulerefs;
925 /*
926 * Userspace relies on this pointer to decide if this is a group or
927 * not. We don't want to share the actual pointer, because it's
928 * useless to userspace and leaks kernel memory layout information.
929 * So instead we provide 0xfeedcode as 'true' and NULL as 'false'.
930 */
931 kif->pfik_group =
932 kkif->pfik_group ? (struct ifg_group *)0xfeedc0de : NULL;
933 }
934
935 void
pfi_get_ifaces(const char * name,struct pfi_kif * buf,int * size)936 pfi_get_ifaces(const char *name, struct pfi_kif *buf, int *size)
937 {
938 struct epoch_tracker et;
939 struct pfi_kkif *p, *nextp;
940 int n = 0;
941
942 NET_EPOCH_ENTER(et);
943 for (p = RB_MIN(pfi_ifhead, &V_pfi_ifs); p; p = nextp) {
944 nextp = RB_NEXT(pfi_ifhead, &V_pfi_ifs, p);
945 if (pfi_skip_if(name, p))
946 continue;
947 if (*size <= n++)
948 break;
949 if (!p->pfik_tzero)
950 p->pfik_tzero = time_second;
951 pf_kkif_to_kif(p, buf++);
952 nextp = RB_NEXT(pfi_ifhead, &V_pfi_ifs, p);
953 }
954 *size = n;
955 NET_EPOCH_EXIT(et);
956 }
957
958 static int
pfi_skip_if(const char * filter,struct pfi_kkif * p)959 pfi_skip_if(const char *filter, struct pfi_kkif *p)
960 {
961 struct ifg_list *i;
962 int n;
963
964 NET_EPOCH_ASSERT();
965
966 if (filter == NULL || !*filter)
967 return (0);
968 if (!strcmp(p->pfik_name, filter))
969 return (0); /* exact match */
970 n = strlen(filter);
971 if (n < 1 || n >= IFNAMSIZ)
972 return (1); /* sanity check */
973 if (filter[n-1] >= '0' && filter[n-1] <= '9')
974 return (1); /* group names may not end in a digit */
975 if (p->pfik_ifp == NULL)
976 return (1);
977 CK_STAILQ_FOREACH(i, &p->pfik_ifp->if_groups, ifgl_next)
978 if (!strncmp(i->ifgl_group->ifg_group, filter, IFNAMSIZ))
979 return (0); /* iface is in group "filter" */
980 return (1);
981 }
982
983 int
pfi_set_flags(const char * name,int flags)984 pfi_set_flags(const char *name, int flags)
985 {
986 struct epoch_tracker et;
987 struct pfi_kkif *p, *kif;
988
989 kif = pf_kkif_create(M_NOWAIT);
990 if (kif == NULL)
991 return (ENOMEM);
992
993 NET_EPOCH_ENTER(et);
994
995 kif = pfi_kkif_attach(kif, name);
996
997 RB_FOREACH(p, pfi_ifhead, &V_pfi_ifs) {
998 if (pfi_skip_if(name, p))
999 continue;
1000 p->pfik_flags |= flags;
1001 }
1002 NET_EPOCH_EXIT(et);
1003 return (0);
1004 }
1005
1006 int
pfi_clear_flags(const char * name,int flags)1007 pfi_clear_flags(const char *name, int flags)
1008 {
1009 struct epoch_tracker et;
1010 struct pfi_kkif *p, *tmp;
1011
1012 NET_EPOCH_ENTER(et);
1013 RB_FOREACH_SAFE(p, pfi_ifhead, &V_pfi_ifs, tmp) {
1014 if (pfi_skip_if(name, p))
1015 continue;
1016 p->pfik_flags &= ~flags;
1017
1018 if (p->pfik_ifp == NULL && p->pfik_group == NULL &&
1019 p->pfik_flags == 0 && p->pfik_rulerefs == 0) {
1020 /* Delete this kif. */
1021 RB_REMOVE(pfi_ifhead, &V_pfi_ifs, p);
1022 pf_kkif_free(p);
1023 }
1024 }
1025 NET_EPOCH_EXIT(et);
1026 return (0);
1027 }
1028
1029 /* from pf_print_state.c */
1030 static int
pfi_unmask(void * addr)1031 pfi_unmask(void *addr)
1032 {
1033 struct pf_addr *m = addr;
1034 int i = 31, j = 0, b = 0;
1035 u_int32_t tmp;
1036
1037 while (j < 4 && m->addr32[j] == 0xffffffff) {
1038 b += 32;
1039 j++;
1040 }
1041 if (j < 4) {
1042 tmp = ntohl(m->addr32[j]);
1043 for (i = 31; tmp & (1 << i); --i)
1044 b++;
1045 }
1046 return (b);
1047 }
1048
1049 static void
pfi_attach_ifnet_event(void * arg __unused,struct ifnet * ifp)1050 pfi_attach_ifnet_event(void *arg __unused, struct ifnet *ifp)
1051 {
1052 struct epoch_tracker et;
1053 struct pfi_kkif *kif;
1054
1055 if (V_pf_vnet_active == 0) {
1056 /* Avoid teardown race in the least expensive way. */
1057 return;
1058 }
1059 kif = pf_kkif_create(M_NOWAIT);
1060 NET_EPOCH_ENTER(et);
1061 PF_RULES_WLOCK();
1062 pfi_attach_ifnet(ifp, kif);
1063 #ifdef ALTQ
1064 pf_altq_ifnet_event(ifp, 0);
1065 #endif
1066 PF_RULES_WUNLOCK();
1067 NET_EPOCH_EXIT(et);
1068 }
1069
1070 static void
pfi_detach_ifnet_event(void * arg __unused,struct ifnet * ifp)1071 pfi_detach_ifnet_event(void *arg __unused, struct ifnet *ifp)
1072 {
1073 struct epoch_tracker et;
1074 struct pfi_kkif *kif = (struct pfi_kkif *)ifp->if_pf_kif;
1075
1076 if (pfsync_detach_ifnet_ptr)
1077 pfsync_detach_ifnet_ptr(ifp);
1078
1079 if (kif == NULL)
1080 return;
1081
1082 if (V_pf_vnet_active == 0) {
1083 /* Avoid teardown race in the least expensive way. */
1084 return;
1085 }
1086
1087 NET_EPOCH_ENTER(et);
1088 PF_RULES_WLOCK();
1089 V_pfi_update++;
1090 pfi_kkif_update(kif);
1091
1092 if (kif->pfik_ifp)
1093 if_rele(kif->pfik_ifp);
1094
1095 kif->pfik_ifp = NULL;
1096 ifp->if_pf_kif = NULL;
1097 #ifdef ALTQ
1098 pf_altq_ifnet_event(ifp, 1);
1099 #endif
1100 pfi_kkif_remove_if_unref(kif);
1101
1102 PF_RULES_WUNLOCK();
1103 NET_EPOCH_EXIT(et);
1104 }
1105
1106 static void
pfi_attach_group_event(void * arg __unused,struct ifg_group * ifg)1107 pfi_attach_group_event(void *arg __unused, struct ifg_group *ifg)
1108 {
1109 struct epoch_tracker et;
1110 struct pfi_kkif *kif;
1111
1112 if (V_pf_vnet_active == 0) {
1113 /* Avoid teardown race in the least expensive way. */
1114 return;
1115 }
1116 kif = pf_kkif_create(M_WAITOK);
1117 NET_EPOCH_ENTER(et);
1118 PF_RULES_WLOCK();
1119 pfi_attach_ifgroup(ifg, kif);
1120 PF_RULES_WUNLOCK();
1121 NET_EPOCH_EXIT(et);
1122 }
1123
1124 static void
pfi_change_group_event(void * arg __unused,char * gname)1125 pfi_change_group_event(void *arg __unused, char *gname)
1126 {
1127 struct epoch_tracker et;
1128 struct pfi_kkif *kif;
1129
1130 if (V_pf_vnet_active == 0) {
1131 /* Avoid teardown race in the least expensive way. */
1132 return;
1133 }
1134
1135 kif = pf_kkif_create(M_WAITOK);
1136 NET_EPOCH_ENTER(et);
1137 PF_RULES_WLOCK();
1138 V_pfi_update++;
1139 kif = pfi_kkif_attach(kif, gname);
1140 pfi_kkif_update(kif);
1141 PF_RULES_WUNLOCK();
1142 NET_EPOCH_EXIT(et);
1143 }
1144
1145 static void
pfi_detach_group_event(void * arg __unused,struct ifg_group * ifg)1146 pfi_detach_group_event(void *arg __unused, struct ifg_group *ifg)
1147 {
1148 struct pfi_kkif *kif = (struct pfi_kkif *)ifg->ifg_pf_kif;
1149
1150 if (kif == NULL)
1151 return;
1152
1153 if (V_pf_vnet_active == 0) {
1154 /* Avoid teardown race in the least expensive way. */
1155 return;
1156 }
1157 PF_RULES_WLOCK();
1158 V_pfi_update++;
1159
1160 kif->pfik_group = NULL;
1161 ifg->ifg_pf_kif = NULL;
1162
1163 pfi_kkif_remove_if_unref(kif);
1164 PF_RULES_WUNLOCK();
1165 }
1166
1167 static void
pfi_ifaddr_event(void * arg __unused,struct ifnet * ifp)1168 pfi_ifaddr_event(void *arg __unused, struct ifnet *ifp)
1169 {
1170
1171 KASSERT(ifp, ("ifp == NULL"));
1172
1173 if (ifp->if_pf_kif == NULL)
1174 return;
1175
1176 if (V_pf_vnet_active == 0) {
1177 /* Avoid teardown race in the least expensive way. */
1178 return;
1179 }
1180 PF_RULES_WLOCK();
1181 if (ifp->if_pf_kif) {
1182 struct epoch_tracker et;
1183
1184 V_pfi_update++;
1185 NET_EPOCH_ENTER(et);
1186 pfi_kkif_update(ifp->if_pf_kif);
1187 NET_EPOCH_EXIT(et);
1188 }
1189 PF_RULES_WUNLOCK();
1190 }
1191