1e9c7bebfSDarren Reed /* $FreeBSD$ */ 2134ea224SSam Leffler /* $NetBSD: pfil.c,v 1.20 2001/11/12 23:49:46 lukem Exp $ */ 3e9c7bebfSDarren Reed 4c398230bSWarner Losh /*- 5e9c7bebfSDarren Reed * Copyright (c) 1996 Matthew R. Green 6e9c7bebfSDarren Reed * All rights reserved. 7e9c7bebfSDarren Reed * 8e9c7bebfSDarren Reed * Redistribution and use in source and binary forms, with or without 9e9c7bebfSDarren Reed * modification, are permitted provided that the following conditions 10e9c7bebfSDarren Reed * are met: 11e9c7bebfSDarren Reed * 1. Redistributions of source code must retain the above copyright 12e9c7bebfSDarren Reed * notice, this list of conditions and the following disclaimer. 13e9c7bebfSDarren Reed * 2. Redistributions in binary form must reproduce the above copyright 14e9c7bebfSDarren Reed * notice, this list of conditions and the following disclaimer in the 15e9c7bebfSDarren Reed * documentation and/or other materials provided with the distribution. 16e9c7bebfSDarren Reed * 3. The name of the author may not be used to endorse or promote products 17e9c7bebfSDarren Reed * derived from this software without specific prior written permission. 18e9c7bebfSDarren Reed * 19e9c7bebfSDarren Reed * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR 20e9c7bebfSDarren Reed * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 21e9c7bebfSDarren Reed * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 22e9c7bebfSDarren Reed * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, 23e9c7bebfSDarren Reed * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, 24e9c7bebfSDarren Reed * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; 25e9c7bebfSDarren Reed * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED 26e9c7bebfSDarren Reed * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, 27e9c7bebfSDarren Reed * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 28e9c7bebfSDarren Reed * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 29e9c7bebfSDarren Reed * SUCH DAMAGE. 30e9c7bebfSDarren Reed */ 31e9c7bebfSDarren Reed 32e9c7bebfSDarren Reed #include <sys/param.h> 33134ea224SSam Leffler #include <sys/kernel.h> 34e9c7bebfSDarren Reed #include <sys/errno.h> 35604afec4SChristian S.J. Peron #include <sys/lock.h> 36e9c7bebfSDarren Reed #include <sys/malloc.h> 371030a1a9SMax Laier #include <sys/rmlock.h> 38e9c7bebfSDarren Reed #include <sys/socket.h> 39e9c7bebfSDarren Reed #include <sys/socketvar.h> 40e9c7bebfSDarren Reed #include <sys/systm.h> 41134ea224SSam Leffler #include <sys/condvar.h> 42134ea224SSam Leffler #include <sys/lock.h> 43134ea224SSam Leffler #include <sys/mutex.h> 44134ea224SSam Leffler #include <sys/proc.h> 45e9c7bebfSDarren Reed #include <sys/queue.h> 46e9c7bebfSDarren Reed 47e9c7bebfSDarren Reed #include <net/if.h> 48e9c7bebfSDarren Reed #include <net/pfil.h> 49e9c7bebfSDarren Reed 50134ea224SSam Leffler static struct mtx pfil_global_lock; 51e9c7bebfSDarren Reed 5233c89765SRobert Watson MTX_SYSINIT(pfil_heads_lock, &pfil_global_lock, "pfil_head_list lock", 5333c89765SRobert Watson MTX_DEF); 54134ea224SSam Leffler 55*887c60fcSAndre Oppermann static struct packet_filter_hook *pfil_hook_get(int, struct pfil_head *); 56134ea224SSam Leffler static int pfil_list_add(pfil_list_t *, struct packet_filter_hook *, int); 57f13e611fSAndre Oppermann static int pfil_list_remove(pfil_list_t *, pfil_func_t, void *); 58134ea224SSam Leffler 590b4b0b0fSJulian Elischer LIST_HEAD(pfilheadhead, pfil_head); 600b4b0b0fSJulian Elischer VNET_DEFINE(struct pfilheadhead, pfil_head_list); 610b4b0b0fSJulian Elischer #define V_pfil_head_list VNET(pfil_head_list) 624dab1a18SAlexander V. Chernikov VNET_DEFINE(struct rmlock, pfil_lock); 634dab1a18SAlexander V. Chernikov #define V_pfil_lock VNET(pfil_lock) 64134ea224SSam Leffler 65134ea224SSam Leffler /* 66134ea224SSam Leffler * pfil_run_hooks() runs the specified packet filter hooks. 67134ea224SSam Leffler */ 68134ea224SSam Leffler int 69134ea224SSam Leffler pfil_run_hooks(struct pfil_head *ph, struct mbuf **mp, struct ifnet *ifp, 70d6a8d588SMax Laier int dir, struct inpcb *inp) 71134ea224SSam Leffler { 721030a1a9SMax Laier struct rm_priotracker rmpt; 73134ea224SSam Leffler struct packet_filter_hook *pfh; 74134ea224SSam Leffler struct mbuf *m = *mp; 75134ea224SSam Leffler int rv = 0; 76134ea224SSam Leffler 771030a1a9SMax Laier PFIL_RLOCK(ph, &rmpt); 78604afec4SChristian S.J. Peron KASSERT(ph->ph_nhooks >= 0, ("Pfil hook count dropped < 0")); 79134ea224SSam Leffler for (pfh = pfil_hook_get(dir, ph); pfh != NULL; 80134ea224SSam Leffler pfh = TAILQ_NEXT(pfh, pfil_link)) { 81134ea224SSam Leffler if (pfh->pfil_func != NULL) { 8233c89765SRobert Watson rv = (*pfh->pfil_func)(pfh->pfil_arg, &m, ifp, dir, 8333c89765SRobert Watson inp); 84134ea224SSam Leffler if (rv != 0 || m == NULL) 85134ea224SSam Leffler break; 86134ea224SSam Leffler } 87134ea224SSam Leffler } 881030a1a9SMax Laier PFIL_RUNLOCK(ph, &rmpt); 89134ea224SSam Leffler *mp = m; 90134ea224SSam Leffler return (rv); 91134ea224SSam Leffler } 92134ea224SSam Leffler 93*887c60fcSAndre Oppermann static struct packet_filter_hook * 94*887c60fcSAndre Oppermann pfil_hook_get(int dir, struct pfil_head *ph) 95*887c60fcSAndre Oppermann { 96*887c60fcSAndre Oppermann 97*887c60fcSAndre Oppermann if (dir == PFIL_IN) 98*887c60fcSAndre Oppermann return (TAILQ_FIRST(&ph->ph_in)); 99*887c60fcSAndre Oppermann else if (dir == PFIL_OUT) 100*887c60fcSAndre Oppermann return (TAILQ_FIRST(&ph->ph_out)); 101*887c60fcSAndre Oppermann else 102*887c60fcSAndre Oppermann return (NULL); 103*887c60fcSAndre Oppermann } 104*887c60fcSAndre Oppermann 105134ea224SSam Leffler /* 1064dab1a18SAlexander V. Chernikov * pfil_try_rlock() acquires rm reader lock for specified head 1075474386bSAndrey V. Elsukov * if this is immediately possible. 1084dab1a18SAlexander V. Chernikov */ 1094dab1a18SAlexander V. Chernikov int 1104dab1a18SAlexander V. Chernikov pfil_try_rlock(struct pfil_head *ph, struct rm_priotracker *tracker) 1114dab1a18SAlexander V. Chernikov { 1125474386bSAndrey V. Elsukov 1135474386bSAndrey V. Elsukov return (PFIL_TRY_RLOCK(ph, tracker)); 1144dab1a18SAlexander V. Chernikov } 1154dab1a18SAlexander V. Chernikov 1164dab1a18SAlexander V. Chernikov /* 1174dab1a18SAlexander V. Chernikov * pfil_rlock() acquires rm reader lock for specified head. 1184dab1a18SAlexander V. Chernikov */ 1194dab1a18SAlexander V. Chernikov void 1204dab1a18SAlexander V. Chernikov pfil_rlock(struct pfil_head *ph, struct rm_priotracker *tracker) 1214dab1a18SAlexander V. Chernikov { 1225474386bSAndrey V. Elsukov 1234dab1a18SAlexander V. Chernikov PFIL_RLOCK(ph, tracker); 1244dab1a18SAlexander V. Chernikov } 1254dab1a18SAlexander V. Chernikov 1264dab1a18SAlexander V. Chernikov /* 1274dab1a18SAlexander V. Chernikov * pfil_runlock() releases reader lock for specified head. 1284dab1a18SAlexander V. Chernikov */ 1294dab1a18SAlexander V. Chernikov void 1304dab1a18SAlexander V. Chernikov pfil_runlock(struct pfil_head *ph, struct rm_priotracker *tracker) 1314dab1a18SAlexander V. Chernikov { 1325474386bSAndrey V. Elsukov 1334dab1a18SAlexander V. Chernikov PFIL_RUNLOCK(ph, tracker); 1344dab1a18SAlexander V. Chernikov } 1354dab1a18SAlexander V. Chernikov 1364dab1a18SAlexander V. Chernikov /* 1374dab1a18SAlexander V. Chernikov * pfil_wlock() acquires writer lock for specified head. 1384dab1a18SAlexander V. Chernikov */ 1394dab1a18SAlexander V. Chernikov void 1404dab1a18SAlexander V. Chernikov pfil_wlock(struct pfil_head *ph) 1414dab1a18SAlexander V. Chernikov { 1425474386bSAndrey V. Elsukov 1434dab1a18SAlexander V. Chernikov PFIL_WLOCK(ph); 1444dab1a18SAlexander V. Chernikov } 1454dab1a18SAlexander V. Chernikov 1464dab1a18SAlexander V. Chernikov /* 1474dab1a18SAlexander V. Chernikov * pfil_wunlock() releases writer lock for specified head. 1484dab1a18SAlexander V. Chernikov */ 1494dab1a18SAlexander V. Chernikov void 1504dab1a18SAlexander V. Chernikov pfil_wunlock(struct pfil_head *ph) 1514dab1a18SAlexander V. Chernikov { 1525474386bSAndrey V. Elsukov 1534dab1a18SAlexander V. Chernikov PFIL_WUNLOCK(ph); 1544dab1a18SAlexander V. Chernikov } 1554dab1a18SAlexander V. Chernikov 1564dab1a18SAlexander V. Chernikov /* 1575474386bSAndrey V. Elsukov * pfil_wowned() returns a non-zero value if the current thread owns 1585474386bSAndrey V. Elsukov * an exclusive lock. 1594dab1a18SAlexander V. Chernikov */ 1604dab1a18SAlexander V. Chernikov int 1614dab1a18SAlexander V. Chernikov pfil_wowned(struct pfil_head *ph) 1624dab1a18SAlexander V. Chernikov { 1635474386bSAndrey V. Elsukov 1645474386bSAndrey V. Elsukov return (PFIL_WOWNED(ph)); 1654dab1a18SAlexander V. Chernikov } 1664dab1a18SAlexander V. Chernikov /* 167cee81198SRobert Watson * pfil_head_register() registers a pfil_head with the packet filter hook 168cee81198SRobert Watson * mechanism. 169134ea224SSam Leffler */ 170134ea224SSam Leffler int 171134ea224SSam Leffler pfil_head_register(struct pfil_head *ph) 172134ea224SSam Leffler { 173134ea224SSam Leffler struct pfil_head *lph; 174134ea224SSam Leffler 175134ea224SSam Leffler PFIL_LIST_LOCK(); 1760b4b0b0fSJulian Elischer LIST_FOREACH(lph, &V_pfil_head_list, ph_list) { 177134ea224SSam Leffler if (ph->ph_type == lph->ph_type && 178134ea224SSam Leffler ph->ph_un.phu_val == lph->ph_un.phu_val) { 179134ea224SSam Leffler PFIL_LIST_UNLOCK(); 180cee81198SRobert Watson return (EEXIST); 181134ea224SSam Leffler } 182d2c205d5SRobert Watson } 1831030a1a9SMax Laier PFIL_LOCK_INIT(ph); 184604afec4SChristian S.J. Peron ph->ph_nhooks = 0; 185e9c7bebfSDarren Reed TAILQ_INIT(&ph->ph_in); 186e9c7bebfSDarren Reed TAILQ_INIT(&ph->ph_out); 1870b4b0b0fSJulian Elischer LIST_INSERT_HEAD(&V_pfil_head_list, ph, ph_list); 188134ea224SSam Leffler PFIL_LIST_UNLOCK(); 189134ea224SSam Leffler return (0); 190134ea224SSam Leffler } 191134ea224SSam Leffler 192134ea224SSam Leffler /* 193d2c205d5SRobert Watson * pfil_head_unregister() removes a pfil_head from the packet filter hook 194d2c205d5SRobert Watson * mechanism. The producer of the hook promises that all outstanding 195d2c205d5SRobert Watson * invocations of the hook have completed before it unregisters the hook. 196134ea224SSam Leffler */ 197134ea224SSam Leffler int 198134ea224SSam Leffler pfil_head_unregister(struct pfil_head *ph) 199134ea224SSam Leffler { 200134ea224SSam Leffler struct packet_filter_hook *pfh, *pfnext; 201134ea224SSam Leffler 202134ea224SSam Leffler PFIL_LIST_LOCK(); 203134ea224SSam Leffler LIST_REMOVE(ph, ph_list); 204134ea224SSam Leffler PFIL_LIST_UNLOCK(); 205134ea224SSam Leffler TAILQ_FOREACH_SAFE(pfh, &ph->ph_in, pfil_link, pfnext) 206134ea224SSam Leffler free(pfh, M_IFADDR); 207134ea224SSam Leffler TAILQ_FOREACH_SAFE(pfh, &ph->ph_out, pfil_link, pfnext) 208134ea224SSam Leffler free(pfh, M_IFADDR); 2091030a1a9SMax Laier PFIL_LOCK_DESTROY(ph); 210134ea224SSam Leffler return (0); 211134ea224SSam Leffler } 212134ea224SSam Leffler 213134ea224SSam Leffler /* 214134ea224SSam Leffler * pfil_head_get() returns the pfil_head for a given key/dlt. 215134ea224SSam Leffler */ 216134ea224SSam Leffler struct pfil_head * 217134ea224SSam Leffler pfil_head_get(int type, u_long val) 218134ea224SSam Leffler { 219134ea224SSam Leffler struct pfil_head *ph; 220134ea224SSam Leffler 221134ea224SSam Leffler PFIL_LIST_LOCK(); 2220b4b0b0fSJulian Elischer LIST_FOREACH(ph, &V_pfil_head_list, ph_list) 223134ea224SSam Leffler if (ph->ph_type == type && ph->ph_un.phu_val == val) 224134ea224SSam Leffler break; 225134ea224SSam Leffler PFIL_LIST_UNLOCK(); 226134ea224SSam Leffler return (ph); 227e9c7bebfSDarren Reed } 228e9c7bebfSDarren Reed 229e9c7bebfSDarren Reed /* 230e9c7bebfSDarren Reed * pfil_add_hook() adds a function to the packet filter hook. the 231e9c7bebfSDarren Reed * flags are: 232e9c7bebfSDarren Reed * PFIL_IN call me on incoming packets 233e9c7bebfSDarren Reed * PFIL_OUT call me on outgoing packets 234e9c7bebfSDarren Reed * PFIL_ALL call me on all of the above 235a163d034SWarner Losh * PFIL_WAITOK OK to call malloc with M_WAITOK. 236e9c7bebfSDarren Reed */ 237e9c7bebfSDarren Reed int 23825da5060SAndre Oppermann pfil_add_hook(pfil_func_t func, void *arg, int flags, struct pfil_head *ph) 239e9c7bebfSDarren Reed { 240134ea224SSam Leffler struct packet_filter_hook *pfh1 = NULL; 241134ea224SSam Leffler struct packet_filter_hook *pfh2 = NULL; 242134ea224SSam Leffler int err; 243e9c7bebfSDarren Reed 244134ea224SSam Leffler if (flags & PFIL_IN) { 245134ea224SSam Leffler pfh1 = (struct packet_filter_hook *)malloc(sizeof(*pfh1), 246134ea224SSam Leffler M_IFADDR, (flags & PFIL_WAITOK) ? M_WAITOK : M_NOWAIT); 247134ea224SSam Leffler if (pfh1 == NULL) { 248134ea224SSam Leffler err = ENOMEM; 249134ea224SSam Leffler goto error; 250134ea224SSam Leffler } 251134ea224SSam Leffler } 252134ea224SSam Leffler if (flags & PFIL_OUT) { 253134ea224SSam Leffler pfh2 = (struct packet_filter_hook *)malloc(sizeof(*pfh1), 254134ea224SSam Leffler M_IFADDR, (flags & PFIL_WAITOK) ? M_WAITOK : M_NOWAIT); 255134ea224SSam Leffler if (pfh2 == NULL) { 256134ea224SSam Leffler err = ENOMEM; 257134ea224SSam Leffler goto error; 258134ea224SSam Leffler } 259134ea224SSam Leffler } 260134ea224SSam Leffler PFIL_WLOCK(ph); 261134ea224SSam Leffler if (flags & PFIL_IN) { 262134ea224SSam Leffler pfh1->pfil_func = func; 263134ea224SSam Leffler pfh1->pfil_arg = arg; 264134ea224SSam Leffler err = pfil_list_add(&ph->ph_in, pfh1, flags & ~PFIL_OUT); 265134ea224SSam Leffler if (err) 266d2c205d5SRobert Watson goto locked_error; 267604afec4SChristian S.J. Peron ph->ph_nhooks++; 268134ea224SSam Leffler } 269134ea224SSam Leffler if (flags & PFIL_OUT) { 270134ea224SSam Leffler pfh2->pfil_func = func; 271134ea224SSam Leffler pfh2->pfil_arg = arg; 272134ea224SSam Leffler err = pfil_list_add(&ph->ph_out, pfh2, flags & ~PFIL_IN); 273e9c7bebfSDarren Reed if (err) { 274e9c7bebfSDarren Reed if (flags & PFIL_IN) 275134ea224SSam Leffler pfil_list_remove(&ph->ph_in, func, arg); 276d2c205d5SRobert Watson goto locked_error; 277134ea224SSam Leffler } 278604afec4SChristian S.J. Peron ph->ph_nhooks++; 279134ea224SSam Leffler } 280134ea224SSam Leffler PFIL_WUNLOCK(ph); 281cee81198SRobert Watson return (0); 282d2c205d5SRobert Watson locked_error: 283134ea224SSam Leffler PFIL_WUNLOCK(ph); 284134ea224SSam Leffler error: 285134ea224SSam Leffler if (pfh1 != NULL) 286134ea224SSam Leffler free(pfh1, M_IFADDR); 287134ea224SSam Leffler if (pfh2 != NULL) 288134ea224SSam Leffler free(pfh2, M_IFADDR); 289cee81198SRobert Watson return (err); 290e9c7bebfSDarren Reed } 291e9c7bebfSDarren Reed 292e9c7bebfSDarren Reed /* 293cee81198SRobert Watson * pfil_remove_hook removes a specific function from the packet filter hook 294cee81198SRobert Watson * list. 295e9c7bebfSDarren Reed */ 296e9c7bebfSDarren Reed int 29725da5060SAndre Oppermann pfil_remove_hook(pfil_func_t func, void *arg, int flags, struct pfil_head *ph) 298e9c7bebfSDarren Reed { 299e9c7bebfSDarren Reed int err = 0; 300e9c7bebfSDarren Reed 301134ea224SSam Leffler PFIL_WLOCK(ph); 302604afec4SChristian S.J. Peron if (flags & PFIL_IN) { 303134ea224SSam Leffler err = pfil_list_remove(&ph->ph_in, func, arg); 304604afec4SChristian S.J. Peron if (err == 0) 305604afec4SChristian S.J. Peron ph->ph_nhooks--; 306604afec4SChristian S.J. Peron } 307604afec4SChristian S.J. Peron if ((err == 0) && (flags & PFIL_OUT)) { 308134ea224SSam Leffler err = pfil_list_remove(&ph->ph_out, func, arg); 309604afec4SChristian S.J. Peron if (err == 0) 310604afec4SChristian S.J. Peron ph->ph_nhooks--; 311604afec4SChristian S.J. Peron } 312134ea224SSam Leffler PFIL_WUNLOCK(ph); 313cee81198SRobert Watson return (err); 314e9c7bebfSDarren Reed } 315e9c7bebfSDarren Reed 316134ea224SSam Leffler static int 317134ea224SSam Leffler pfil_list_add(pfil_list_t *list, struct packet_filter_hook *pfh1, int flags) 318134ea224SSam Leffler { 319134ea224SSam Leffler struct packet_filter_hook *pfh; 320134ea224SSam Leffler 321134ea224SSam Leffler /* 322134ea224SSam Leffler * First make sure the hook is not already there. 323134ea224SSam Leffler */ 324134ea224SSam Leffler TAILQ_FOREACH(pfh, list, pfil_link) 325134ea224SSam Leffler if (pfh->pfil_func == pfh1->pfil_func && 326134ea224SSam Leffler pfh->pfil_arg == pfh1->pfil_arg) 327cee81198SRobert Watson return (EEXIST); 328cee81198SRobert Watson 329134ea224SSam Leffler /* 330cee81198SRobert Watson * Insert the input list in reverse order of the output list so that 331cee81198SRobert Watson * the same path is followed in or out of the kernel. 332134ea224SSam Leffler */ 333134ea224SSam Leffler if (flags & PFIL_IN) 334134ea224SSam Leffler TAILQ_INSERT_HEAD(list, pfh1, pfil_link); 335134ea224SSam Leffler else 336134ea224SSam Leffler TAILQ_INSERT_TAIL(list, pfh1, pfil_link); 337cee81198SRobert Watson return (0); 338134ea224SSam Leffler } 339134ea224SSam Leffler 340e9c7bebfSDarren Reed /* 341e9c7bebfSDarren Reed * pfil_list_remove is an internal function that takes a function off the 342e9c7bebfSDarren Reed * specified list. 343e9c7bebfSDarren Reed */ 344e9c7bebfSDarren Reed static int 34525da5060SAndre Oppermann pfil_list_remove(pfil_list_t *list, pfil_func_t func, void *arg) 346e9c7bebfSDarren Reed { 347e9c7bebfSDarren Reed struct packet_filter_hook *pfh; 348e9c7bebfSDarren Reed 349fc2ffbe6SPoul-Henning Kamp TAILQ_FOREACH(pfh, list, pfil_link) 350134ea224SSam Leffler if (pfh->pfil_func == func && pfh->pfil_arg == arg) { 351e9c7bebfSDarren Reed TAILQ_REMOVE(list, pfh, pfil_link); 352e9c7bebfSDarren Reed free(pfh, M_IFADDR); 353cee81198SRobert Watson return (0); 354e9c7bebfSDarren Reed } 355cee81198SRobert Watson return (ENOENT); 356e9c7bebfSDarren Reed } 3570b4b0b0fSJulian Elischer 358cee81198SRobert Watson /* 359cee81198SRobert Watson * Stuff that must be initialized for every instance (including the first of 360cee81198SRobert Watson * course). 3610b4b0b0fSJulian Elischer */ 3620b4b0b0fSJulian Elischer static int 3630b4b0b0fSJulian Elischer vnet_pfil_init(const void *unused) 3640b4b0b0fSJulian Elischer { 365cee81198SRobert Watson 3660b4b0b0fSJulian Elischer LIST_INIT(&V_pfil_head_list); 3674dab1a18SAlexander V. Chernikov PFIL_LOCK_INIT_REAL(&V_pfil_lock, "shared"); 3680b4b0b0fSJulian Elischer return (0); 3690b4b0b0fSJulian Elischer } 3700b4b0b0fSJulian Elischer 371cee81198SRobert Watson /* 3720b4b0b0fSJulian Elischer * Called for the removal of each instance. 3730b4b0b0fSJulian Elischer */ 3740b4b0b0fSJulian Elischer static int 3750b4b0b0fSJulian Elischer vnet_pfil_uninit(const void *unused) 3760b4b0b0fSJulian Elischer { 377cee81198SRobert Watson 3780b4b0b0fSJulian Elischer /* XXX should panic if list is not empty */ 3794dab1a18SAlexander V. Chernikov PFIL_LOCK_DESTROY_REAL(&V_pfil_lock); 380cee81198SRobert Watson return (0); 3810b4b0b0fSJulian Elischer } 3820b4b0b0fSJulian Elischer 3830b4b0b0fSJulian Elischer /* Define startup order. */ 3840b4b0b0fSJulian Elischer #define PFIL_SYSINIT_ORDER SI_SUB_PROTO_BEGIN 3850b4b0b0fSJulian Elischer #define PFIL_MODEVENT_ORDER (SI_ORDER_FIRST) /* On boot slot in here. */ 3860b4b0b0fSJulian Elischer #define PFIL_VNET_ORDER (PFIL_MODEVENT_ORDER + 2) /* Later still. */ 3870b4b0b0fSJulian Elischer 3880b4b0b0fSJulian Elischer /* 3890b4b0b0fSJulian Elischer * Starting up. 390cee81198SRobert Watson * 3910b4b0b0fSJulian Elischer * VNET_SYSINIT is called for each existing vnet and each new vnet. 3920b4b0b0fSJulian Elischer */ 3930b4b0b0fSJulian Elischer VNET_SYSINIT(vnet_pfil_init, PFIL_SYSINIT_ORDER, PFIL_VNET_ORDER, 3940b4b0b0fSJulian Elischer vnet_pfil_init, NULL); 3950b4b0b0fSJulian Elischer 3960b4b0b0fSJulian Elischer /* 397cee81198SRobert Watson * Closing up shop. These are done in REVERSE ORDER. Not called on reboot. 398cee81198SRobert Watson * 3990b4b0b0fSJulian Elischer * VNET_SYSUNINIT is called for each exiting vnet as it exits. 4000b4b0b0fSJulian Elischer */ 4010b4b0b0fSJulian Elischer VNET_SYSUNINIT(vnet_pfil_uninit, PFIL_SYSINIT_ORDER, PFIL_VNET_ORDER, 4020b4b0b0fSJulian Elischer vnet_pfil_uninit, NULL); 403