xref: /freebsd/usr.sbin/bsnmpd/modules/snmp_pf/pf_snmp.c (revision aa64588d28258aef88cc33b8043112e8856948d0)
1 /*-
2  * Copyright (c) 2005 Philip Paeps <philip@FreeBSD.org>
3  * All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  * 1. Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  * 2. Redistributions in binary form must reproduce the above copyright
11  *    notice, this list of conditions and the following disclaimer in the
12  *    documentation and/or other materials provided with the distribution.
13  *
14  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
15  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24  * SUCH DAMAGE.
25  *
26  * $FreeBSD$
27  */
28 
29 #include <bsnmp/snmpmod.h>
30 
31 #include <net/pfvar.h>
32 #include <sys/ioctl.h>
33 
34 #include <errno.h>
35 #include <fcntl.h>
36 #include <stdint.h>
37 #include <stdio.h>
38 #include <stdlib.h>
39 #include <string.h>
40 #include <syslog.h>
41 #include <unistd.h>
42 
43 #include "pf_oid.h"
44 #include "pf_tree.h"
45 
46 struct lmodule *module;
47 
48 static int dev = -1;
49 static int started;
50 static uint64_t pf_tick;
51 
52 static struct pf_status pfs;
53 
54 enum { IN, OUT };
55 enum { IPV4, IPV6 };
56 enum { PASS, BLOCK };
57 
58 #define PFI_IFTYPE_GROUP	0
59 #define PFI_IFTYPE_INSTANCE	1
60 #define PFI_IFTYPE_DETACHED	2
61 
62 struct pfi_entry {
63 	struct pfi_kif	pfi;
64 	u_int		index;
65 	TAILQ_ENTRY(pfi_entry) link;
66 };
67 TAILQ_HEAD(pfi_table, pfi_entry);
68 
69 static struct pfi_table pfi_table;
70 static time_t pfi_table_age;
71 static int pfi_table_count;
72 
73 #define PFI_TABLE_MAXAGE	5
74 
75 struct pft_entry {
76 	struct pfr_tstats pft;
77 	u_int		index;
78 	TAILQ_ENTRY(pft_entry) link;
79 };
80 TAILQ_HEAD(pft_table, pft_entry);
81 
82 static struct pft_table pft_table;
83 static time_t pft_table_age;
84 static int pft_table_count;
85 
86 #define PFT_TABLE_MAXAGE	5
87 
88 struct pfa_entry {
89 	struct pfr_astats pfas;
90 	u_int		index;
91 	TAILQ_ENTRY(pfa_entry) link;
92 };
93 TAILQ_HEAD(pfa_table, pfa_entry);
94 
95 static struct pfa_table pfa_table;
96 static time_t pfa_table_age;
97 static int pfa_table_count;
98 
99 #define	PFA_TABLE_MAXAGE	5
100 
101 struct pfq_entry {
102 	struct pf_altq	altq;
103 	u_int		index;
104 	TAILQ_ENTRY(pfq_entry) link;
105 };
106 TAILQ_HEAD(pfq_table, pfq_entry);
107 
108 static struct pfq_table pfq_table;
109 static time_t pfq_table_age;
110 static int pfq_table_count;
111 
112 static int altq_enabled = 0;
113 
114 #define PFQ_TABLE_MAXAGE	5
115 
116 struct pfl_entry {
117 	char		name[MAXPATHLEN + PF_RULE_LABEL_SIZE];
118 	u_int64_t	evals;
119 	u_int64_t	bytes[2];
120 	u_int64_t	pkts[2];
121 	u_int		index;
122 	TAILQ_ENTRY(pfl_entry) link;
123 };
124 TAILQ_HEAD(pfl_table, pfl_entry);
125 
126 static struct pfl_table pfl_table;
127 static time_t pfl_table_age;
128 static int pfl_table_count;
129 
130 #define	PFL_TABLE_MAXAGE	5
131 
132 /* Forward declarations */
133 static int pfi_refresh(void);
134 static int pfq_refresh(void);
135 static int pfs_refresh(void);
136 static int pft_refresh(void);
137 static int pfa_refresh(void);
138 static int pfl_refresh(void);
139 static struct pfi_entry * pfi_table_find(u_int idx);
140 static struct pfq_entry * pfq_table_find(u_int idx);
141 static struct pft_entry * pft_table_find(u_int idx);
142 static struct pfa_entry * pfa_table_find(u_int idx);
143 static struct pfl_entry * pfl_table_find(u_int idx);
144 
145 static int altq_is_enabled(int pfdevice);
146 
147 int
148 pf_status(struct snmp_context __unused *ctx, struct snmp_value *val,
149 	u_int sub, u_int __unused vindex, enum snmp_op op)
150 {
151 	asn_subid_t	which = val->var.subs[sub - 1];
152 	time_t		runtime;
153 	unsigned char	str[128];
154 
155 	if (op == SNMP_OP_SET)
156 		return (SNMP_ERR_NOT_WRITEABLE);
157 
158 	if (op == SNMP_OP_GET) {
159 		if (pfs_refresh() == -1)
160 			return (SNMP_ERR_GENERR);
161 
162 		switch (which) {
163 			case LEAF_pfStatusRunning:
164 			    val->v.uint32 = pfs.running;
165 			    break;
166 			case LEAF_pfStatusRuntime:
167 			    runtime = (pfs.since > 0) ?
168 				time(NULL) - pfs.since : 0;
169 			    val->v.uint32 = runtime * 100;
170 			    break;
171 			case LEAF_pfStatusDebug:
172 			    val->v.uint32 = pfs.debug;
173 			    break;
174 			case LEAF_pfStatusHostId:
175 			    sprintf(str, "0x%08x", ntohl(pfs.hostid));
176 			    return (string_get(val, str, strlen(str)));
177 
178 			default:
179 			    return (SNMP_ERR_NOSUCHNAME);
180 		}
181 
182 		return (SNMP_ERR_NOERROR);
183 	}
184 
185 	abort();
186 }
187 
188 int
189 pf_counter(struct snmp_context __unused *ctx, struct snmp_value *val,
190 	u_int sub, u_int __unused vindex, enum snmp_op op)
191 {
192 	asn_subid_t	which = val->var.subs[sub - 1];
193 
194 	if (op == SNMP_OP_SET)
195 		return (SNMP_ERR_NOT_WRITEABLE);
196 
197 	if (op == SNMP_OP_GET) {
198 		if (pfs_refresh() == -1)
199 			return (SNMP_ERR_GENERR);
200 
201 		switch (which) {
202 			case LEAF_pfCounterMatch:
203 				val->v.counter64 = pfs.counters[PFRES_MATCH];
204 				break;
205 			case LEAF_pfCounterBadOffset:
206 				val->v.counter64 = pfs.counters[PFRES_BADOFF];
207 				break;
208 			case LEAF_pfCounterFragment:
209 				val->v.counter64 = pfs.counters[PFRES_FRAG];
210 				break;
211 			case LEAF_pfCounterShort:
212 				val->v.counter64 = pfs.counters[PFRES_SHORT];
213 				break;
214 			case LEAF_pfCounterNormalize:
215 				val->v.counter64 = pfs.counters[PFRES_NORM];
216 				break;
217 			case LEAF_pfCounterMemDrop:
218 				val->v.counter64 = pfs.counters[PFRES_MEMORY];
219 				break;
220 
221 			default:
222 				return (SNMP_ERR_NOSUCHNAME);
223 		}
224 
225 		return (SNMP_ERR_NOERROR);
226 	}
227 
228 	abort();
229 }
230 
231 int
232 pf_statetable(struct snmp_context __unused *ctx, struct snmp_value *val,
233 	u_int sub, u_int __unused vindex, enum snmp_op op)
234 {
235 	asn_subid_t	which = val->var.subs[sub - 1];
236 
237 	if (op == SNMP_OP_SET)
238 		return (SNMP_ERR_NOT_WRITEABLE);
239 
240 	if (op == SNMP_OP_GET) {
241 		if (pfs_refresh() == -1)
242 			return (SNMP_ERR_GENERR);
243 
244 		switch (which) {
245 			case LEAF_pfStateTableCount:
246 				val->v.uint32 = pfs.states;
247 				break;
248 			case LEAF_pfStateTableSearches:
249 				val->v.counter64 =
250 				    pfs.fcounters[FCNT_STATE_SEARCH];
251 				break;
252 			case LEAF_pfStateTableInserts:
253 				val->v.counter64 =
254 				    pfs.fcounters[FCNT_STATE_INSERT];
255 				break;
256 			case LEAF_pfStateTableRemovals:
257 				val->v.counter64 =
258 				    pfs.fcounters[FCNT_STATE_REMOVALS];
259 				break;
260 
261 			default:
262 				return (SNMP_ERR_NOSUCHNAME);
263 		}
264 
265 		return (SNMP_ERR_NOERROR);
266 	}
267 
268 	abort();
269 }
270 
271 int
272 pf_srcnodes(struct snmp_context __unused *ctx, struct snmp_value *val,
273 	u_int sub, u_int __unused vindex, enum snmp_op op)
274 {
275 	asn_subid_t	which = val->var.subs[sub - 1];
276 
277 	if (op == SNMP_OP_SET)
278 		return (SNMP_ERR_NOT_WRITEABLE);
279 
280 	if (op == SNMP_OP_GET) {
281 		if (pfs_refresh() == -1)
282 			return (SNMP_ERR_GENERR);
283 
284 		switch (which) {
285 			case LEAF_pfSrcNodesCount:
286 				val->v.uint32 = pfs.src_nodes;
287 				break;
288 			case LEAF_pfSrcNodesSearches:
289 				val->v.counter64 =
290 				    pfs.scounters[SCNT_SRC_NODE_SEARCH];
291 				break;
292 			case LEAF_pfSrcNodesInserts:
293 				val->v.counter64 =
294 				    pfs.scounters[SCNT_SRC_NODE_INSERT];
295 				break;
296 			case LEAF_pfSrcNodesRemovals:
297 				val->v.counter64 =
298 				    pfs.scounters[SCNT_SRC_NODE_REMOVALS];
299 				break;
300 
301 			default:
302 				return (SNMP_ERR_NOSUCHNAME);
303 		}
304 
305 		return (SNMP_ERR_NOERROR);
306 	}
307 
308 	abort();
309 }
310 
311 int
312 pf_limits(struct snmp_context __unused *ctx, struct snmp_value *val,
313 	u_int sub, u_int __unused vindex, enum snmp_op op)
314 {
315 	asn_subid_t		which = val->var.subs[sub - 1];
316 	struct pfioc_limit	pl;
317 
318 	if (op == SNMP_OP_SET)
319 		return (SNMP_ERR_NOT_WRITEABLE);
320 
321 	if (op == SNMP_OP_GET) {
322 		bzero(&pl, sizeof(struct pfioc_limit));
323 
324 		switch (which) {
325 			case LEAF_pfLimitsStates:
326 				pl.index = PF_LIMIT_STATES;
327 				break;
328 			case LEAF_pfLimitsSrcNodes:
329 				pl.index = PF_LIMIT_SRC_NODES;
330 				break;
331 			case LEAF_pfLimitsFrags:
332 				pl.index = PF_LIMIT_FRAGS;
333 				break;
334 
335 			default:
336 				return (SNMP_ERR_NOSUCHNAME);
337 		}
338 
339 		if (ioctl(dev, DIOCGETLIMIT, &pl)) {
340 			syslog(LOG_ERR, "pf_limits(): ioctl(): %s",
341 			    strerror(errno));
342 			return (SNMP_ERR_GENERR);
343 		}
344 
345 		val->v.uint32 = pl.limit;
346 
347 		return (SNMP_ERR_NOERROR);
348 	}
349 
350 	abort();
351 }
352 
353 int
354 pf_timeouts(struct snmp_context __unused *ctx, struct snmp_value *val,
355 	u_int sub, u_int __unused vindex, enum snmp_op op)
356 {
357 	asn_subid_t	which = val->var.subs[sub - 1];
358 	struct pfioc_tm	pt;
359 
360 	if (op == SNMP_OP_SET)
361 		return (SNMP_ERR_NOT_WRITEABLE);
362 
363 	if (op == SNMP_OP_GET) {
364 		bzero(&pt, sizeof(struct pfioc_tm));
365 
366 		switch (which) {
367 			case LEAF_pfTimeoutsTcpFirst:
368 				pt.timeout = PFTM_TCP_FIRST_PACKET;
369 				break;
370 			case LEAF_pfTimeoutsTcpOpening:
371 				pt.timeout = PFTM_TCP_OPENING;
372 				break;
373 			case LEAF_pfTimeoutsTcpEstablished:
374 				pt.timeout = PFTM_TCP_ESTABLISHED;
375 				break;
376 			case LEAF_pfTimeoutsTcpClosing:
377 				pt.timeout = PFTM_TCP_CLOSING;
378 				break;
379 			case LEAF_pfTimeoutsTcpFinWait:
380 				pt.timeout = PFTM_TCP_FIN_WAIT;
381 				break;
382 			case LEAF_pfTimeoutsTcpClosed:
383 				pt.timeout = PFTM_TCP_CLOSED;
384 				break;
385 			case LEAF_pfTimeoutsUdpFirst:
386 				pt.timeout = PFTM_UDP_FIRST_PACKET;
387 				break;
388 			case LEAF_pfTimeoutsUdpSingle:
389 				pt.timeout = PFTM_UDP_SINGLE;
390 				break;
391 			case LEAF_pfTimeoutsUdpMultiple:
392 				pt.timeout = PFTM_UDP_MULTIPLE;
393 				break;
394 			case LEAF_pfTimeoutsIcmpFirst:
395 				pt.timeout = PFTM_ICMP_FIRST_PACKET;
396 				break;
397 			case LEAF_pfTimeoutsIcmpError:
398 				pt.timeout = PFTM_ICMP_ERROR_REPLY;
399 				break;
400 			case LEAF_pfTimeoutsOtherFirst:
401 				pt.timeout = PFTM_OTHER_FIRST_PACKET;
402 				break;
403 			case LEAF_pfTimeoutsOtherSingle:
404 				pt.timeout = PFTM_OTHER_SINGLE;
405 				break;
406 			case LEAF_pfTimeoutsOtherMultiple:
407 				pt.timeout = PFTM_OTHER_MULTIPLE;
408 				break;
409 			case LEAF_pfTimeoutsFragment:
410 				pt.timeout = PFTM_FRAG;
411 				break;
412 			case LEAF_pfTimeoutsInterval:
413 				pt.timeout = PFTM_INTERVAL;
414 				break;
415 			case LEAF_pfTimeoutsAdaptiveStart:
416 				pt.timeout = PFTM_ADAPTIVE_START;
417 				break;
418 			case LEAF_pfTimeoutsAdaptiveEnd:
419 				pt.timeout = PFTM_ADAPTIVE_END;
420 				break;
421 			case LEAF_pfTimeoutsSrcNode:
422 				pt.timeout = PFTM_SRC_NODE;
423 				break;
424 
425 			default:
426 				return (SNMP_ERR_NOSUCHNAME);
427 		}
428 
429 		if (ioctl(dev, DIOCGETTIMEOUT, &pt)) {
430 			syslog(LOG_ERR, "pf_timeouts(): ioctl(): %s",
431 			    strerror(errno));
432 			return (SNMP_ERR_GENERR);
433 		}
434 
435 		val->v.integer = pt.seconds;
436 
437 		return (SNMP_ERR_NOERROR);
438 	}
439 
440 	abort();
441 }
442 
443 int
444 pf_logif(struct snmp_context __unused *ctx, struct snmp_value *val,
445 	u_int sub, u_int __unused vindex, enum snmp_op op)
446 {
447 	asn_subid_t	which = val->var.subs[sub - 1];
448 	unsigned char	str[IFNAMSIZ];
449 
450 	if (op == SNMP_OP_SET)
451 		return (SNMP_ERR_NOT_WRITEABLE);
452 
453 	if (op == SNMP_OP_GET) {
454 		if (pfs_refresh() == -1)
455 			return (SNMP_ERR_GENERR);
456 
457 		switch (which) {
458 	 		case LEAF_pfLogInterfaceName:
459 				strlcpy(str, pfs.ifname, sizeof str);
460 				return (string_get(val, str, strlen(str)));
461 			case LEAF_pfLogInterfaceIp4BytesIn:
462 				val->v.counter64 = pfs.bcounters[IPV4][IN];
463 				break;
464 			case LEAF_pfLogInterfaceIp4BytesOut:
465 				val->v.counter64 = pfs.bcounters[IPV4][OUT];
466 				break;
467 			case LEAF_pfLogInterfaceIp4PktsInPass:
468 				val->v.counter64 =
469 				    pfs.pcounters[IPV4][IN][PF_PASS];
470 				break;
471 			case LEAF_pfLogInterfaceIp4PktsInDrop:
472 				val->v.counter64 =
473 				    pfs.pcounters[IPV4][IN][PF_DROP];
474 				break;
475 			case LEAF_pfLogInterfaceIp4PktsOutPass:
476 				val->v.counter64 =
477 				    pfs.pcounters[IPV4][OUT][PF_PASS];
478 				break;
479 			case LEAF_pfLogInterfaceIp4PktsOutDrop:
480 				val->v.counter64 =
481 				    pfs.pcounters[IPV4][OUT][PF_DROP];
482 				break;
483 			case LEAF_pfLogInterfaceIp6BytesIn:
484 				val->v.counter64 = pfs.bcounters[IPV6][IN];
485 				break;
486 			case LEAF_pfLogInterfaceIp6BytesOut:
487 				val->v.counter64 = pfs.bcounters[IPV6][OUT];
488 				break;
489 			case LEAF_pfLogInterfaceIp6PktsInPass:
490 				val->v.counter64 =
491 				    pfs.pcounters[IPV6][IN][PF_PASS];
492 				break;
493 			case LEAF_pfLogInterfaceIp6PktsInDrop:
494 				val->v.counter64 =
495 				    pfs.pcounters[IPV6][IN][PF_DROP];
496 				break;
497 			case LEAF_pfLogInterfaceIp6PktsOutPass:
498 				val->v.counter64 =
499 				    pfs.pcounters[IPV6][OUT][PF_PASS];
500 				break;
501 			case LEAF_pfLogInterfaceIp6PktsOutDrop:
502 				val->v.counter64 =
503 				    pfs.pcounters[IPV6][OUT][PF_DROP];
504 				break;
505 
506 			default:
507 				return (SNMP_ERR_NOSUCHNAME);
508 		}
509 
510 		return (SNMP_ERR_NOERROR);
511 	}
512 
513 	abort();
514 }
515 
516 int
517 pf_interfaces(struct snmp_context __unused *ctx, struct snmp_value *val,
518 	u_int sub, u_int __unused vindex, enum snmp_op op)
519 {
520 	asn_subid_t	which = val->var.subs[sub - 1];
521 
522 	if (op == SNMP_OP_SET)
523 		return (SNMP_ERR_NOT_WRITEABLE);
524 
525 	if (op == SNMP_OP_GET) {
526 		if ((time(NULL) - pfi_table_age) > PFI_TABLE_MAXAGE)
527 			if (pfi_refresh() == -1)
528 			    return (SNMP_ERR_GENERR);
529 
530 		switch (which) {
531 			case LEAF_pfInterfacesIfNumber:
532 				val->v.uint32 = pfi_table_count;
533 				break;
534 
535 			default:
536 				return (SNMP_ERR_NOSUCHNAME);
537 		}
538 
539 		return (SNMP_ERR_NOERROR);
540 	}
541 
542 	abort();
543 }
544 
545 int
546 pf_iftable(struct snmp_context __unused *ctx, struct snmp_value *val,
547 	u_int sub, u_int __unused vindex, enum snmp_op op)
548 {
549 	asn_subid_t	which = val->var.subs[sub - 1];
550 	struct pfi_entry *e = NULL;
551 
552 	if ((time(NULL) - pfi_table_age) > PFI_TABLE_MAXAGE)
553 		pfi_refresh();
554 
555 	switch (op) {
556 		case SNMP_OP_SET:
557 			return (SNMP_ERR_NOT_WRITEABLE);
558 		case SNMP_OP_GETNEXT:
559 			if ((e = NEXT_OBJECT_INT(&pfi_table,
560 			    &val->var, sub)) == NULL)
561 				return (SNMP_ERR_NOSUCHNAME);
562 			val->var.len = sub + 1;
563 			val->var.subs[sub] = e->index;
564 			break;
565 		case SNMP_OP_GET:
566 			if (val->var.len - sub != 1)
567 				return (SNMP_ERR_NOSUCHNAME);
568 			if ((e = pfi_table_find(val->var.subs[sub])) == NULL)
569 				return (SNMP_ERR_NOSUCHNAME);
570 			break;
571 
572 		case SNMP_OP_COMMIT:
573 		case SNMP_OP_ROLLBACK:
574 		default:
575 			abort();
576 	}
577 
578 	switch (which) {
579 		case LEAF_pfInterfacesIfDescr:
580 			return (string_get(val, e->pfi.pfik_name, -1));
581 		case LEAF_pfInterfacesIfType:
582 			val->v.integer = PFI_IFTYPE_INSTANCE;
583 			break;
584 		case LEAF_pfInterfacesIfTZero:
585 			val->v.uint32 =
586 			    (time(NULL) - e->pfi.pfik_tzero) * 100;
587 			break;
588 		case LEAF_pfInterfacesIfRefsState:
589 			val->v.uint32 = e->pfi.pfik_states;
590 			break;
591 		case LEAF_pfInterfacesIfRefsRule:
592 			val->v.uint32 = e->pfi.pfik_rules;
593 			break;
594 		case LEAF_pfInterfacesIf4BytesInPass:
595 			val->v.counter64 =
596 			    e->pfi.pfik_bytes[IPV4][IN][PASS];
597 			break;
598 		case LEAF_pfInterfacesIf4BytesInBlock:
599 			val->v.counter64 =
600 			    e->pfi.pfik_bytes[IPV4][IN][BLOCK];
601 			break;
602 		case LEAF_pfInterfacesIf4BytesOutPass:
603 			val->v.counter64 =
604 			    e->pfi.pfik_bytes[IPV4][OUT][PASS];
605 			break;
606 		case LEAF_pfInterfacesIf4BytesOutBlock:
607 			val->v.counter64 =
608 			    e->pfi.pfik_bytes[IPV4][OUT][BLOCK];
609 			break;
610 		case LEAF_pfInterfacesIf4PktsInPass:
611 			val->v.counter64 =
612 			    e->pfi.pfik_packets[IPV4][IN][PASS];
613 			break;
614 		case LEAF_pfInterfacesIf4PktsInBlock:
615 			val->v.counter64 =
616 			    e->pfi.pfik_packets[IPV4][IN][BLOCK];
617 			break;
618 		case LEAF_pfInterfacesIf4PktsOutPass:
619 			val->v.counter64 =
620 			    e->pfi.pfik_packets[IPV4][OUT][PASS];
621 			break;
622 		case LEAF_pfInterfacesIf4PktsOutBlock:
623 			val->v.counter64 =
624 			    e->pfi.pfik_packets[IPV4][OUT][BLOCK];
625 			break;
626 		case LEAF_pfInterfacesIf6BytesInPass:
627 			val->v.counter64 =
628 			    e->pfi.pfik_bytes[IPV6][IN][PASS];
629 			break;
630 		case LEAF_pfInterfacesIf6BytesInBlock:
631 			val->v.counter64 =
632 			    e->pfi.pfik_bytes[IPV6][IN][BLOCK];
633 			break;
634 		case LEAF_pfInterfacesIf6BytesOutPass:
635 			val->v.counter64 =
636 			    e->pfi.pfik_bytes[IPV6][OUT][PASS];
637 			break;
638 		case LEAF_pfInterfacesIf6BytesOutBlock:
639 			val->v.counter64 =
640 			    e->pfi.pfik_bytes[IPV6][OUT][BLOCK];
641 			break;
642 		case LEAF_pfInterfacesIf6PktsInPass:
643 			val->v.counter64 =
644 			    e->pfi.pfik_packets[IPV6][IN][PASS];
645 			break;
646 		case LEAF_pfInterfacesIf6PktsInBlock:
647 			val->v.counter64 =
648 			    e->pfi.pfik_packets[IPV6][IN][BLOCK];
649 			break;
650 		case LEAF_pfInterfacesIf6PktsOutPass:
651 			val->v.counter64 =
652 			    e->pfi.pfik_packets[IPV6][OUT][PASS];
653 			break;
654 		case LEAF_pfInterfacesIf6PktsOutBlock:
655 			val->v.counter64 =
656 			    e->pfi.pfik_packets[IPV6][OUT][BLOCK];
657 			break;
658 
659 		default:
660 			return (SNMP_ERR_NOSUCHNAME);
661 	}
662 
663 	return (SNMP_ERR_NOERROR);
664 }
665 
666 int
667 pf_tables(struct snmp_context __unused *ctx, struct snmp_value *val,
668 	u_int sub, u_int __unused vindex, enum snmp_op op)
669 {
670 	asn_subid_t	which = val->var.subs[sub - 1];
671 
672 	if (op == SNMP_OP_SET)
673 		return (SNMP_ERR_NOT_WRITEABLE);
674 
675 	if (op == SNMP_OP_GET) {
676 		if ((time(NULL) - pft_table_age) > PFT_TABLE_MAXAGE)
677 			if (pft_refresh() == -1)
678 			    return (SNMP_ERR_GENERR);
679 
680 		switch (which) {
681 			case LEAF_pfTablesTblNumber:
682 				val->v.uint32 = pft_table_count;
683 				break;
684 
685 			default:
686 				return (SNMP_ERR_NOSUCHNAME);
687 		}
688 
689 		return (SNMP_ERR_NOERROR);
690 	}
691 
692 	abort();
693 }
694 
695 int
696 pf_tbltable(struct snmp_context __unused *ctx, struct snmp_value *val,
697 	u_int sub, u_int __unused vindex, enum snmp_op op)
698 {
699 	asn_subid_t	which = val->var.subs[sub - 1];
700 	struct pft_entry *e = NULL;
701 
702 	if ((time(NULL) - pft_table_age) > PFT_TABLE_MAXAGE)
703 		pft_refresh();
704 
705 	switch (op) {
706 		case SNMP_OP_SET:
707 			return (SNMP_ERR_NOT_WRITEABLE);
708 		case SNMP_OP_GETNEXT:
709 			if ((e = NEXT_OBJECT_INT(&pft_table,
710 			    &val->var, sub)) == NULL)
711 				return (SNMP_ERR_NOSUCHNAME);
712 			val->var.len = sub + 1;
713 			val->var.subs[sub] = e->index;
714 			break;
715 		case SNMP_OP_GET:
716 			if (val->var.len - sub != 1)
717 				return (SNMP_ERR_NOSUCHNAME);
718 			if ((e = pft_table_find(val->var.subs[sub])) == NULL)
719 				return (SNMP_ERR_NOSUCHNAME);
720 			break;
721 
722 		case SNMP_OP_COMMIT:
723 		case SNMP_OP_ROLLBACK:
724 		default:
725 			abort();
726 	}
727 
728 	switch (which) {
729 		case LEAF_pfTablesTblDescr:
730 			return (string_get(val, e->pft.pfrts_name, -1));
731 		case LEAF_pfTablesTblCount:
732 			val->v.integer = e->pft.pfrts_cnt;
733 			break;
734 		case LEAF_pfTablesTblTZero:
735 			val->v.uint32 =
736 			    (time(NULL) - e->pft.pfrts_tzero) * 100;
737 			break;
738 		case LEAF_pfTablesTblRefsAnchor:
739 			val->v.integer =
740 			    e->pft.pfrts_refcnt[PFR_REFCNT_ANCHOR];
741 			break;
742 		case LEAF_pfTablesTblRefsRule:
743 			val->v.integer =
744 			    e->pft.pfrts_refcnt[PFR_REFCNT_RULE];
745 			break;
746 		case LEAF_pfTablesTblEvalMatch:
747 			val->v.counter64 = e->pft.pfrts_match;
748 			break;
749 		case LEAF_pfTablesTblEvalNoMatch:
750 			val->v.counter64 = e->pft.pfrts_nomatch;
751 			break;
752 		case LEAF_pfTablesTblBytesInPass:
753 			val->v.counter64 =
754 			    e->pft.pfrts_bytes[PFR_DIR_IN][PFR_OP_PASS];
755 			break;
756 		case LEAF_pfTablesTblBytesInBlock:
757 			val->v.counter64 =
758 			    e->pft.pfrts_bytes[PFR_DIR_IN][PFR_OP_BLOCK];
759 			break;
760 		case LEAF_pfTablesTblBytesInXPass:
761 			val->v.counter64 =
762 			    e->pft.pfrts_bytes[PFR_DIR_IN][PFR_OP_XPASS];
763 			break;
764 		case LEAF_pfTablesTblBytesOutPass:
765 			val->v.counter64 =
766 			    e->pft.pfrts_bytes[PFR_DIR_OUT][PFR_OP_PASS];
767 			break;
768 		case LEAF_pfTablesTblBytesOutBlock:
769 			val->v.counter64 =
770 			    e->pft.pfrts_bytes[PFR_DIR_OUT][PFR_OP_BLOCK];
771 			break;
772 		case LEAF_pfTablesTblBytesOutXPass:
773 			val->v.counter64 =
774 			    e->pft.pfrts_bytes[PFR_DIR_OUT][PFR_OP_XPASS];
775 			break;
776 		case LEAF_pfTablesTblPktsInPass:
777 			val->v.counter64 =
778 			    e->pft.pfrts_packets[PFR_DIR_IN][PFR_OP_PASS];
779 			break;
780 		case LEAF_pfTablesTblPktsInBlock:
781 			val->v.counter64 =
782 			    e->pft.pfrts_packets[PFR_DIR_IN][PFR_OP_BLOCK];
783 			break;
784 		case LEAF_pfTablesTblPktsInXPass:
785 			val->v.counter64 =
786 			    e->pft.pfrts_packets[PFR_DIR_IN][PFR_OP_XPASS];
787 			break;
788 		case LEAF_pfTablesTblPktsOutPass:
789 			val->v.counter64 =
790 			    e->pft.pfrts_packets[PFR_DIR_OUT][PFR_OP_PASS];
791 			break;
792 		case LEAF_pfTablesTblPktsOutBlock:
793 			val->v.counter64 =
794 			    e->pft.pfrts_packets[PFR_DIR_OUT][PFR_OP_BLOCK];
795 			break;
796 		case LEAF_pfTablesTblPktsOutXPass:
797 			val->v.counter64 =
798 			    e->pft.pfrts_packets[PFR_DIR_OUT][PFR_OP_XPASS];
799 			break;
800 
801 		default:
802 			return (SNMP_ERR_NOSUCHNAME);
803 	}
804 
805 	return (SNMP_ERR_NOERROR);
806 }
807 
808 int
809 pf_tbladdr(struct snmp_context __unused *ctx, struct snmp_value __unused *val,
810 	u_int __unused sub, u_int __unused vindex, enum snmp_op __unused op)
811 {
812 	asn_subid_t	which = val->var.subs[sub - 1];
813 	struct pfa_entry *e = NULL;
814 
815 	if ((time(NULL) - pfa_table_age) > PFA_TABLE_MAXAGE)
816 		pfa_refresh();
817 
818 	switch (op) {
819 		case SNMP_OP_SET:
820 			return (SNMP_ERR_NOT_WRITEABLE);
821 		case SNMP_OP_GETNEXT:
822 			if ((e = NEXT_OBJECT_INT(&pfa_table,
823 			    &val->var, sub)) == NULL)
824 				return (SNMP_ERR_NOSUCHNAME);
825 			val->var.len = sub + 1;
826 			val->var.subs[sub] = e->index;
827 			break;
828 		case SNMP_OP_GET:
829 			if (val->var.len - sub != 1)
830 				return (SNMP_ERR_NOSUCHNAME);
831 			if ((e = pfa_table_find(val->var.subs[sub])) == NULL)
832 				return (SNMP_ERR_NOSUCHNAME);
833 			break;
834 
835 		case SNMP_OP_COMMIT:
836 		case SNMP_OP_ROLLBACK:
837 		default:
838 			abort();
839 	}
840 
841 	switch (which) {
842 		case LEAF_pfTablesAddrNetType:
843 			if (e->pfas.pfras_a.pfra_af == AF_INET)
844 				val->v.integer = pfTablesAddrNetType_ipv4;
845 			else if (e->pfas.pfras_a.pfra_af == AF_INET6)
846 				val->v.integer = pfTablesAddrNetType_ipv6;
847 			else
848 				return (SNMP_ERR_GENERR);
849 			break;
850 		case LEAF_pfTablesAddrNet:
851 			if (e->pfas.pfras_a.pfra_af == AF_INET) {
852 				return (string_get(val,
853 				    (u_char *)&e->pfas.pfras_a.pfra_ip4addr, 4));
854 			} else if (e->pfas.pfras_a.pfra_af == AF_INET6)
855 				return (string_get(val,
856 				    (u_char *)&e->pfas.pfras_a.pfra_ip6addr, 16));
857 			else
858 				return (SNMP_ERR_GENERR);
859 			break;
860 		case LEAF_pfTablesAddrPrefix:
861 			val->v.integer = (int32_t) e->pfas.pfras_a.pfra_net;
862 			break;
863 		case LEAF_pfTablesAddrTZero:
864 			val->v.uint32 =
865 			    (time(NULL) - e->pfas.pfras_tzero) * 100;
866 			break;
867 		case LEAF_pfTablesAddrBytesInPass:
868 			val->v.counter64 =
869 			    e->pfas.pfras_bytes[PFR_DIR_IN][PFR_OP_PASS];
870 			break;
871 		case LEAF_pfTablesAddrBytesInBlock:
872 			val->v.counter64 =
873 			    e->pfas.pfras_bytes[PFR_DIR_IN][PFR_OP_BLOCK];
874 			break;
875 		case LEAF_pfTablesAddrBytesOutPass:
876 			val->v.counter64 =
877 			    e->pfas.pfras_bytes[PFR_DIR_OUT][PFR_OP_PASS];
878 			break;
879 		case LEAF_pfTablesAddrBytesOutBlock:
880 			val->v.counter64 =
881 			    e->pfas.pfras_bytes[PFR_DIR_OUT][PFR_OP_BLOCK];
882 			break;
883 		case LEAF_pfTablesAddrPktsInPass:
884 			val->v.counter64 =
885 			    e->pfas.pfras_packets[PFR_DIR_IN][PFR_OP_PASS];
886 			break;
887 		case LEAF_pfTablesAddrPktsInBlock:
888 			val->v.counter64 =
889 			    e->pfas.pfras_packets[PFR_DIR_IN][PFR_OP_BLOCK];
890 			break;
891 		case LEAF_pfTablesAddrPktsOutPass:
892 			val->v.counter64 =
893 			    e->pfas.pfras_packets[PFR_DIR_OUT][PFR_OP_PASS];
894 			break;
895 		case LEAF_pfTablesAddrPktsOutBlock:
896 			val->v.counter64 =
897 			    e->pfas.pfras_packets[PFR_DIR_OUT][PFR_OP_BLOCK];
898 			break;
899 		default:
900 			return (SNMP_ERR_NOSUCHNAME);
901 	}
902 
903 	return (SNMP_ERR_NOERROR);
904 }
905 
906 int
907 pf_altq(struct snmp_context __unused *ctx, struct snmp_value *val,
908 	u_int sub, u_int __unused vindex, enum snmp_op op)
909 {
910 	asn_subid_t	which = val->var.subs[sub - 1];
911 
912 	if (!altq_enabled)
913 	   return (SNMP_ERR_NOSUCHNAME);
914 
915 	if (op == SNMP_OP_SET)
916 		return (SNMP_ERR_NOT_WRITEABLE);
917 
918 	if (op == SNMP_OP_GET) {
919 		if ((time(NULL) - pfq_table_age) > PFQ_TABLE_MAXAGE)
920 			if (pfq_refresh() == -1)
921 			    return (SNMP_ERR_GENERR);
922 
923 		switch (which) {
924 			case LEAF_pfAltqQueueNumber:
925 				val->v.uint32 = pfq_table_count;
926 				break;
927 
928 			default:
929 				return (SNMP_ERR_NOSUCHNAME);
930 		}
931 
932 		return (SNMP_ERR_NOERROR);
933 	}
934 
935 	abort();
936 	return (SNMP_ERR_GENERR);
937 }
938 
939 int
940 pf_altqq(struct snmp_context __unused *ctx, struct snmp_value *val,
941 	u_int sub, u_int __unused vindex, enum snmp_op op)
942 {
943 	asn_subid_t	which = val->var.subs[sub - 1];
944 	struct pfq_entry *e = NULL;
945 
946 	if (!altq_enabled)
947 	   return (SNMP_ERR_NOSUCHNAME);
948 
949 	if ((time(NULL) - pfq_table_age) > PFQ_TABLE_MAXAGE)
950 		pfq_refresh();
951 
952 	switch (op) {
953 		case SNMP_OP_SET:
954 			return (SNMP_ERR_NOT_WRITEABLE);
955 		case SNMP_OP_GETNEXT:
956 			if ((e = NEXT_OBJECT_INT(&pfq_table,
957 			    &val->var, sub)) == NULL)
958 				return (SNMP_ERR_NOSUCHNAME);
959 			val->var.len = sub + 1;
960 			val->var.subs[sub] = e->index;
961 			break;
962 		case SNMP_OP_GET:
963 			if (val->var.len - sub != 1)
964 				return (SNMP_ERR_NOSUCHNAME);
965 			if ((e = pfq_table_find(val->var.subs[sub])) == NULL)
966 				return (SNMP_ERR_NOSUCHNAME);
967 			break;
968 
969 		case SNMP_OP_COMMIT:
970 		case SNMP_OP_ROLLBACK:
971 		default:
972 			abort();
973 	}
974 
975 	switch (which) {
976 		case LEAF_pfAltqQueueDescr:
977 			return (string_get(val, e->altq.qname, -1));
978 		case LEAF_pfAltqQueueParent:
979 			return (string_get(val, e->altq.parent, -1));
980 		case LEAF_pfAltqQueueScheduler:
981 			val->v.integer = e->altq.scheduler;
982 			break;
983 		case LEAF_pfAltqQueueBandwidth:
984 			val->v.uint32 = e->altq.bandwidth;
985 			break;
986 		case LEAF_pfAltqQueuePriority:
987 			val->v.integer = e->altq.priority;
988 			break;
989 		case LEAF_pfAltqQueueLimit:
990 			val->v.integer = e->altq.qlimit;
991 			break;
992 
993 		default:
994 			return (SNMP_ERR_NOSUCHNAME);
995 	}
996 
997 	return (SNMP_ERR_NOERROR);
998 }
999 
1000 int
1001 pf_labels(struct snmp_context __unused *ctx, struct snmp_value *val,
1002 	u_int sub, u_int __unused vindex, enum snmp_op op)
1003 {
1004 	asn_subid_t	which = val->var.subs[sub - 1];
1005 
1006 	if (op == SNMP_OP_SET)
1007 		return (SNMP_ERR_NOT_WRITEABLE);
1008 
1009 	if (op == SNMP_OP_GET) {
1010 		if ((time(NULL) - pfl_table_age) > PFL_TABLE_MAXAGE)
1011 			if (pfl_refresh() == -1)
1012 				return (SNMP_ERR_GENERR);
1013 
1014 		switch (which) {
1015 			case LEAF_pfLabelsLblNumber:
1016 				val->v.uint32 = pfl_table_count;
1017 				break;
1018 
1019 			default:
1020 				return (SNMP_ERR_NOSUCHNAME);
1021 		}
1022 
1023 		return (SNMP_ERR_NOERROR);
1024 	}
1025 
1026 	abort();
1027 	return (SNMP_ERR_GENERR);
1028 }
1029 
1030 int
1031 pf_lbltable(struct snmp_context __unused *ctx, struct snmp_value *val,
1032 	u_int sub, u_int __unused vindex, enum snmp_op op)
1033 {
1034 	asn_subid_t	which = val->var.subs[sub - 1];
1035 	struct pfl_entry *e = NULL;
1036 
1037 	if ((time(NULL) - pfl_table_age) > PFL_TABLE_MAXAGE)
1038 		pfl_refresh();
1039 
1040 	switch (op) {
1041 		case SNMP_OP_SET:
1042 			return (SNMP_ERR_NOT_WRITEABLE);
1043 		case SNMP_OP_GETNEXT:
1044 			if ((e = NEXT_OBJECT_INT(&pfl_table,
1045 			    &val->var, sub)) == NULL)
1046 				return (SNMP_ERR_NOSUCHNAME);
1047 			val->var.len = sub + 1;
1048 			val->var.subs[sub] = e->index;
1049 			break;
1050 		case SNMP_OP_GET:
1051 			if (val->var.len - sub != 1)
1052 				return (SNMP_ERR_NOSUCHNAME);
1053 			if ((e = pfl_table_find(val->var.subs[sub])) == NULL)
1054 				return (SNMP_ERR_NOSUCHNAME);
1055 			break;
1056 
1057 		case SNMP_OP_COMMIT:
1058 		case SNMP_OP_ROLLBACK:
1059 		default:
1060 			abort();
1061 	}
1062 
1063 	switch (which) {
1064 		case LEAF_pfLabelsLblName:
1065 			return (string_get(val, e->name, -1));
1066 		case LEAF_pfLabelsLblEvals:
1067 			val->v.counter64 = e->evals;
1068 			break;
1069 		case LEAF_pfLabelsLblBytesIn:
1070 			val->v.counter64 = e->bytes[IN];
1071 			break;
1072 		case LEAF_pfLabelsLblBytesOut:
1073 			val->v.counter64 = e->bytes[OUT];
1074 			break;
1075 		case LEAF_pfLabelsLblPktsIn:
1076 			val->v.counter64 = e->pkts[IN];
1077 			break;
1078 		case LEAF_pfLabelsLblPktsOut:
1079 			val->v.counter64 = e->pkts[OUT];
1080 			break;
1081 		default:
1082 			return (SNMP_ERR_NOSUCHNAME);
1083 	}
1084 
1085 	return (SNMP_ERR_NOERROR);
1086 }
1087 
1088 static struct pfi_entry *
1089 pfi_table_find(u_int idx)
1090 {
1091 	struct pfi_entry *e;
1092 
1093 	TAILQ_FOREACH(e, &pfi_table, link)
1094 		if (e->index == idx)
1095 			return (e);
1096 	return (NULL);
1097 }
1098 
1099 static struct pfq_entry *
1100 pfq_table_find(u_int idx)
1101 {
1102 	struct pfq_entry *e;
1103 
1104 	TAILQ_FOREACH(e, &pfq_table, link)
1105 		if (e->index == idx)
1106 			return (e);
1107 	return (NULL);
1108 }
1109 
1110 static struct pft_entry *
1111 pft_table_find(u_int idx)
1112 {
1113 	struct pft_entry *e;
1114 
1115 	TAILQ_FOREACH(e, &pft_table, link)
1116 		if (e->index == idx)
1117 			return (e);
1118 	return (NULL);
1119 }
1120 
1121 static struct pfa_entry *
1122 pfa_table_find(u_int idx)
1123 {
1124 	struct pfa_entry *e;
1125 
1126 	TAILQ_FOREACH(e, &pfa_table, link)
1127 		if (e->index == idx)
1128 			return (e);
1129 	return (NULL);
1130 }
1131 
1132 static struct pfl_entry *
1133 pfl_table_find(u_int idx)
1134 {
1135 	struct pfl_entry *e;
1136 
1137 	TAILQ_FOREACH(e, &pfl_table, link)
1138 		if (e->index == idx)
1139 			return (e);
1140 
1141 	return (NULL);
1142 }
1143 
1144 static int
1145 pfi_refresh(void)
1146 {
1147 	struct pfioc_iface io;
1148 	struct pfi_kif *p = NULL;
1149 	struct pfi_entry *e;
1150 	int i, numifs = 1;
1151 
1152 	if (started && this_tick <= pf_tick)
1153 		return (0);
1154 
1155 	while (!TAILQ_EMPTY(&pfi_table)) {
1156 		e = TAILQ_FIRST(&pfi_table);
1157 		TAILQ_REMOVE(&pfi_table, e, link);
1158 		free(e);
1159 	}
1160 
1161 	bzero(&io, sizeof(io));
1162 	io.pfiio_esize = sizeof(struct pfi_kif);
1163 
1164 	for (;;) {
1165 		p = reallocf(p, numifs * sizeof(struct pfi_kif));
1166 		if (p == NULL) {
1167 			syslog(LOG_ERR, "pfi_refresh(): reallocf() numifs=%d: %s",
1168 			    numifs, strerror(errno));
1169 			goto err2;
1170 		}
1171 		io.pfiio_size = numifs;
1172 		io.pfiio_buffer = p;
1173 
1174 		if (ioctl(dev, DIOCIGETIFACES, &io)) {
1175 			syslog(LOG_ERR, "pfi_refresh(): ioctl(): %s",
1176 			    strerror(errno));
1177 			goto err2;
1178 		}
1179 
1180 		if (numifs >= io.pfiio_size)
1181 			break;
1182 
1183 		numifs = io.pfiio_size;
1184 	}
1185 
1186 	for (i = 0; i < numifs; i++) {
1187 		e = malloc(sizeof(struct pfi_entry));
1188 		if (e == NULL)
1189 			goto err1;
1190 		e->index = i + 1;
1191 		memcpy(&e->pfi, p+i, sizeof(struct pfi_kif));
1192 		TAILQ_INSERT_TAIL(&pfi_table, e, link);
1193 	}
1194 
1195 	pfi_table_age = time(NULL);
1196 	pfi_table_count = numifs;
1197 	pf_tick = this_tick;
1198 
1199 	free(p);
1200 	return (0);
1201 
1202 err1:
1203 	while (!TAILQ_EMPTY(&pfi_table)) {
1204 		e = TAILQ_FIRST(&pfi_table);
1205 		TAILQ_REMOVE(&pfi_table, e, link);
1206 		free(e);
1207 	}
1208 err2:
1209 	free(p);
1210 	return(-1);
1211 }
1212 
1213 static int
1214 pfq_refresh(void)
1215 {
1216 	struct pfioc_altq pa;
1217 	struct pfq_entry *e;
1218 	int i, numqs, ticket;
1219 
1220 	if (started && this_tick <= pf_tick)
1221 		return (0);
1222 
1223 	while (!TAILQ_EMPTY(&pfq_table)) {
1224 		e = TAILQ_FIRST(&pfq_table);
1225 		TAILQ_REMOVE(&pfq_table, e, link);
1226 		free(e);
1227 	}
1228 
1229 	bzero(&pa, sizeof(pa));
1230 
1231 	if (ioctl(dev, DIOCGETALTQS, &pa)) {
1232 		syslog(LOG_ERR, "pfq_refresh: ioctl(DIOCGETALTQS): %s",
1233 		    strerror(errno));
1234 		return (-1);
1235 	}
1236 
1237 	numqs = pa.nr;
1238 	ticket = pa.ticket;
1239 
1240 	for (i = 0; i < numqs; i++) {
1241 		e = malloc(sizeof(struct pfq_entry));
1242 		if (e == NULL) {
1243 			syslog(LOG_ERR, "pfq_refresh(): "
1244 			    "malloc(): %s",
1245 			    strerror(errno));
1246 			goto err;
1247 		}
1248 		pa.ticket = ticket;
1249 		pa.nr = i;
1250 
1251 		if (ioctl(dev, DIOCGETALTQ, &pa)) {
1252 			syslog(LOG_ERR, "pfq_refresh(): "
1253 			    "ioctl(DIOCGETALTQ): %s",
1254 			    strerror(errno));
1255 			goto err;
1256 		}
1257 
1258 		if (pa.altq.qid > 0) {
1259 			memcpy(&e->altq, &pa.altq, sizeof(struct pf_altq));
1260 			e->index = pa.altq.qid;
1261 			pfq_table_count = i;
1262 			INSERT_OBJECT_INT_LINK_INDEX(e, &pfq_table, link, index);
1263 		}
1264 	}
1265 
1266 	pfq_table_age = time(NULL);
1267 	pf_tick = this_tick;
1268 
1269 	return (0);
1270 err:
1271 	free(e);
1272 	while (!TAILQ_EMPTY(&pfq_table)) {
1273 		e = TAILQ_FIRST(&pfq_table);
1274 		TAILQ_REMOVE(&pfq_table, e, link);
1275 		free(e);
1276 	}
1277 	return(-1);
1278 }
1279 
1280 static int
1281 pfs_refresh(void)
1282 {
1283 	if (started && this_tick <= pf_tick)
1284 		return (0);
1285 
1286 	bzero(&pfs, sizeof(struct pf_status));
1287 
1288 	if (ioctl(dev, DIOCGETSTATUS, &pfs)) {
1289 		syslog(LOG_ERR, "pfs_refresh(): ioctl(): %s",
1290 		    strerror(errno));
1291 		return (-1);
1292 	}
1293 
1294 	pf_tick = this_tick;
1295 	return (0);
1296 }
1297 
1298 static int
1299 pft_refresh(void)
1300 {
1301 	struct pfioc_table io;
1302 	struct pfr_tstats *t = NULL;
1303 	struct pft_entry *e;
1304 	int i, numtbls = 1;
1305 
1306 	if (started && this_tick <= pf_tick)
1307 		return (0);
1308 
1309 	while (!TAILQ_EMPTY(&pft_table)) {
1310 		e = TAILQ_FIRST(&pft_table);
1311 		TAILQ_REMOVE(&pft_table, e, link);
1312 		free(e);
1313 	}
1314 
1315 	bzero(&io, sizeof(io));
1316 	io.pfrio_esize = sizeof(struct pfr_tstats);
1317 
1318 	for (;;) {
1319 		t = reallocf(t, numtbls * sizeof(struct pfr_tstats));
1320 		if (t == NULL) {
1321 			syslog(LOG_ERR, "pft_refresh(): reallocf() numtbls=%d: %s",
1322 			    numtbls, strerror(errno));
1323 			goto err2;
1324 		}
1325 		io.pfrio_size = numtbls;
1326 		io.pfrio_buffer = t;
1327 
1328 		if (ioctl(dev, DIOCRGETTSTATS, &io)) {
1329 			syslog(LOG_ERR, "pft_refresh(): ioctl(): %s",
1330 			    strerror(errno));
1331 			goto err2;
1332 		}
1333 
1334 		if (numtbls >= io.pfrio_size)
1335 			break;
1336 
1337 		numtbls = io.pfrio_size;
1338 	}
1339 
1340 	for (i = 0; i < numtbls; i++) {
1341 		e = malloc(sizeof(struct pft_entry));
1342 		if (e == NULL)
1343 			goto err1;
1344 		e->index = i + 1;
1345 		memcpy(&e->pft, t+i, sizeof(struct pfr_tstats));
1346 		TAILQ_INSERT_TAIL(&pft_table, e, link);
1347 	}
1348 
1349 	pft_table_age = time(NULL);
1350 	pft_table_count = numtbls;
1351 	pf_tick = this_tick;
1352 
1353 	free(t);
1354 	return (0);
1355 err1:
1356 	while (!TAILQ_EMPTY(&pft_table)) {
1357 		e = TAILQ_FIRST(&pft_table);
1358 		TAILQ_REMOVE(&pft_table, e, link);
1359 		free(e);
1360 	}
1361 err2:
1362 	free(t);
1363 	return(-1);
1364 }
1365 
1366 static int
1367 pfa_table_addrs(u_int sidx, struct pfr_table *pt)
1368 {
1369 	struct pfioc_table io;
1370 	struct pfr_astats *t = NULL;
1371 	struct pfa_entry *e;
1372 	int i, numaddrs = 1;
1373 
1374 	if (pt == NULL)
1375 		return (-1);
1376 
1377 	memset(&io, 0, sizeof(io));
1378 	strlcpy(io.pfrio_table.pfrt_name, pt->pfrt_name,
1379 	    sizeof(io.pfrio_table.pfrt_name));
1380 
1381 	for (;;) {
1382 		t = reallocf(t, numaddrs * sizeof(struct pfr_astats));
1383 		if (t == NULL) {
1384 			syslog(LOG_ERR, "pfa_table_addrs(): reallocf(): %s",
1385 			    strerror(errno));
1386 			numaddrs = -1;
1387 			goto error;
1388 		}
1389 
1390 		memset(t, 0, sizeof(*t));
1391 		io.pfrio_size = numaddrs;
1392 		io.pfrio_buffer = t;
1393 		io.pfrio_esize = sizeof(struct pfr_astats);
1394 
1395 		if (ioctl(dev, DIOCRGETASTATS, &io)) {
1396 			syslog(LOG_ERR, "pfa_table_addrs(): ioctl() on %s: %s",
1397 			    pt->pfrt_name, strerror(errno));
1398 			numaddrs = -1;
1399 			break;
1400 		}
1401 
1402 		if (numaddrs >= io.pfrio_size)
1403 			break;
1404 
1405 		numaddrs = io.pfrio_size;
1406 	}
1407 
1408 	for (i = 0; i < numaddrs; i++) {
1409 		if ((t + i)->pfras_a.pfra_af != AF_INET &&
1410 		    (t + i)->pfras_a.pfra_af != AF_INET6) {
1411 			numaddrs = i;
1412 			break;
1413 		}
1414 
1415 		e = (struct pfa_entry *)malloc(sizeof(struct pfa_entry));
1416 		if (e == NULL) {
1417 			syslog(LOG_ERR, "pfa_table_addrs(): malloc(): %s",
1418 			    strerror(errno));
1419 			numaddrs = -1;
1420 			break;
1421 		}
1422 		e->index = sidx + i;
1423 		memcpy(&e->pfas, t + i, sizeof(struct pfr_astats));
1424 		TAILQ_INSERT_TAIL(&pfa_table, e, link);
1425 	}
1426 
1427 	free(t);
1428 error:
1429 	return (numaddrs);
1430 }
1431 
1432 static int
1433 pfa_refresh(void)
1434 {
1435 	struct pfioc_table io;
1436 	struct pfr_table *pt = NULL, *it = NULL;
1437 	struct pfa_entry *e;
1438 	int i, numtbls = 1, cidx, naddrs;
1439 
1440 	if (started && this_tick <= pf_tick)
1441 		return (0);
1442 
1443 	while (!TAILQ_EMPTY(&pfa_table)) {
1444 		e = TAILQ_FIRST(&pfa_table);
1445 		TAILQ_REMOVE(&pfa_table, e, link);
1446 		free(e);
1447 	}
1448 
1449 	memset(&io, 0, sizeof(io));
1450 	io.pfrio_esize = sizeof(struct pfr_table);
1451 
1452 	for (;;) {
1453 		pt = reallocf(pt, numtbls * sizeof(struct pfr_table));
1454 		if (pt == NULL) {
1455 			syslog(LOG_ERR, "pfa_refresh(): reallocf() %s",
1456 			    strerror(errno));
1457 			return (-1);
1458 		}
1459 		memset(pt, 0, sizeof(*pt));
1460 		io.pfrio_size = numtbls;
1461 		io.pfrio_buffer = pt;
1462 
1463 		if (ioctl(dev, DIOCRGETTABLES, &io)) {
1464 			syslog(LOG_ERR, "pfa_refresh(): ioctl(): %s",
1465 			    strerror(errno));
1466 			goto err2;
1467 		}
1468 
1469 		if (numtbls >= io.pfrio_size)
1470 			break;
1471 
1472 		numtbls = io.pfrio_size;
1473 	}
1474 
1475 	cidx = 1;
1476 
1477 	for (it = pt, i = 0; i < numtbls; it++, i++) {
1478 		/*
1479 		 * Skip the table if not active - ioctl(DIOCRGETASTATS) will
1480 		 * return ESRCH for this entry anyway.
1481 		 */
1482 		if (!(it->pfrt_flags & PFR_TFLAG_ACTIVE))
1483 			continue;
1484 
1485 		if ((naddrs = pfa_table_addrs(cidx, it)) < 0)
1486 			goto err1;
1487 
1488 		cidx += naddrs;
1489 	}
1490 
1491 	pfa_table_age = time(NULL);
1492 	pfa_table_count = cidx;
1493 	pf_tick = this_tick;
1494 
1495 	free(pt);
1496 	return (0);
1497 err1:
1498 	while (!TAILQ_EMPTY(&pfa_table)) {
1499 		e = TAILQ_FIRST(&pfa_table);
1500 		TAILQ_REMOVE(&pfa_table, e, link);
1501 		free(e);
1502 	}
1503 
1504 err2:
1505 	free(pt);
1506 	return (-1);
1507 }
1508 
1509 static int
1510 pfl_scan_ruleset(const char *path)
1511 {
1512 	struct pfioc_rule pr;
1513 	struct pfl_entry *e;
1514 	u_int32_t nr, i;
1515 
1516 	bzero(&pr, sizeof(pr));
1517 	strlcpy(pr.anchor, path, sizeof(pr.anchor));
1518 	pr.rule.action = PF_PASS;
1519 	if (ioctl(dev, DIOCGETRULES, &pr)) {
1520 		syslog(LOG_ERR, "pfl_scan_ruleset: ioctl(DIOCGETRULES): %s",
1521 		    strerror(errno));
1522 		goto err;
1523 	}
1524 
1525 	for (nr = pr.nr, i = 0; i < nr; i++) {
1526 		pr.nr = i;
1527 		if (ioctl(dev, DIOCGETRULE, &pr)) {
1528 			syslog(LOG_ERR, "pfl_scan_ruleset: ioctl(DIOCGETRULE):"
1529 			    " %s", strerror(errno));
1530 			goto err;
1531 		}
1532 
1533 		if (pr.rule.label[0]) {
1534 			e = (struct pfl_entry *)malloc(sizeof(*e));
1535 			if (e == NULL)
1536 				goto err;
1537 
1538 			strlcpy(e->name, path, sizeof(e->name));
1539 			if (path[0])
1540 				strlcat(e->name, "/", sizeof(e->name));
1541 			strlcat(e->name, pr.rule.label, sizeof(e->name));
1542 
1543 			e->evals = pr.rule.evaluations;
1544 			e->bytes[IN] = pr.rule.bytes[IN];
1545 			e->bytes[OUT] = pr.rule.bytes[OUT];
1546 			e->pkts[IN] = pr.rule.packets[IN];
1547 			e->pkts[OUT] = pr.rule.packets[OUT];
1548 			e->index = ++pfl_table_count;
1549 
1550 			TAILQ_INSERT_TAIL(&pfl_table, e, link);
1551 		}
1552 	}
1553 
1554 	return (0);
1555 
1556 err:
1557 	return (-1);
1558 }
1559 
1560 static int
1561 pfl_walk_rulesets(const char *path)
1562 {
1563 	struct pfioc_ruleset prs;
1564 	char newpath[MAXPATHLEN];
1565 	u_int32_t nr, i;
1566 
1567 	if (pfl_scan_ruleset(path))
1568 		goto err;
1569 
1570 	bzero(&prs, sizeof(prs));
1571 	strlcpy(prs.path, path, sizeof(prs.path));
1572 	if (ioctl(dev, DIOCGETRULESETS, &prs)) {
1573 		syslog(LOG_ERR, "pfl_walk_rulesets: ioctl(DIOCGETRULESETS): %s",
1574 		    strerror(errno));
1575 		goto err;
1576 	}
1577 
1578 	for (nr = prs.nr, i = 0; i < nr; i++) {
1579 		prs.nr = i;
1580 		if (ioctl(dev, DIOCGETRULESET, &prs)) {
1581 			syslog(LOG_ERR, "pfl_walk_rulesets: ioctl(DIOCGETRULESET):"
1582 			    " %s", strerror(errno));
1583 			goto err;
1584 		}
1585 
1586 		if (strcmp(prs.name, PF_RESERVED_ANCHOR) == 0)
1587 			continue;
1588 
1589 		strlcpy(newpath, path, sizeof(newpath));
1590 		if (path[0])
1591 			strlcat(newpath, "/", sizeof(newpath));
1592 
1593 		strlcat(newpath, prs.name, sizeof(newpath));
1594 		if (pfl_walk_rulesets(newpath))
1595 			goto err;
1596 	}
1597 
1598 	return (0);
1599 
1600 err:
1601 	return (-1);
1602 }
1603 
1604 static int
1605 pfl_refresh(void)
1606 {
1607 	struct pfl_entry *e;
1608 
1609 	if (started && this_tick <= pf_tick)
1610 		return (0);
1611 
1612 	while (!TAILQ_EMPTY(&pfl_table)) {
1613 		e = TAILQ_FIRST(&pfl_table);
1614 		TAILQ_REMOVE(&pfl_table, e, link);
1615 		free(e);
1616 	}
1617 	pfl_table_count = 0;
1618 
1619 	if (pfl_walk_rulesets(""))
1620 		goto err;
1621 
1622 	pfl_table_age = time(NULL);
1623 	pf_tick = this_tick;
1624 
1625 	return (0);
1626 
1627 err:
1628 	while (!TAILQ_EMPTY(&pfl_table)) {
1629 		e = TAILQ_FIRST(&pfl_table);
1630 		TAILQ_REMOVE(&pfl_table, e, link);
1631 		free(e);
1632 	}
1633 	pfl_table_count = 0;
1634 
1635 	return (-1);
1636 }
1637 
1638 /*
1639  * check whether altq support is enabled in kernel
1640  */
1641 
1642 static int
1643 altq_is_enabled(int pfdev)
1644 {
1645         struct pfioc_altq pa;
1646 
1647 	errno = 0;
1648         if (ioctl(pfdev, DIOCGETALTQS, &pa)) {
1649                 if (errno == ENODEV) {
1650 			syslog(LOG_INFO, "No ALTQ support in kernel\n"
1651 			    "ALTQ related functions disabled\n");
1652                         return (0);
1653                 } else
1654                         syslog(LOG_ERR, "DIOCGETALTQS returned an error: %s",
1655 			    strerror(errno));
1656 			return (-1);
1657         }
1658         return (1);
1659 }
1660 
1661 /*
1662  * Implement the bsnmpd module interface
1663  */
1664 static int
1665 pf_init(struct lmodule *mod, int __unused argc, char __unused *argv[])
1666 {
1667 	module = mod;
1668 
1669 	if ((dev = open("/dev/pf", O_RDONLY)) == -1) {
1670 		syslog(LOG_ERR, "pf_init(): open(): %s\n",
1671 		    strerror(errno));
1672 		return (-1);
1673 	}
1674 
1675 	if ((altq_enabled = altq_is_enabled(dev)) == -1) {
1676 		syslog(LOG_ERR, "pf_init(): altq test failed");
1677 		return (-1);
1678 	}
1679 
1680 	/* Prepare internal state */
1681 	TAILQ_INIT(&pfi_table);
1682 	TAILQ_INIT(&pfq_table);
1683 	TAILQ_INIT(&pft_table);
1684 	TAILQ_INIT(&pfa_table);
1685 	TAILQ_INIT(&pfl_table);
1686 
1687 	pfi_refresh();
1688 	if (altq_enabled) {
1689 		pfq_refresh();
1690 	}
1691 
1692 	pfs_refresh();
1693 	pft_refresh();
1694 	pfa_refresh();
1695 	pfl_refresh();
1696 
1697 	started = 1;
1698 
1699 	return (0);
1700 }
1701 
1702 static int
1703 pf_fini(void)
1704 {
1705 	struct pfi_entry *i1, *i2;
1706 	struct pfq_entry *q1, *q2;
1707 	struct pft_entry *t1, *t2;
1708 	struct pfa_entry *a1, *a2;
1709 	struct pfl_entry *l1, *l2;
1710 
1711 	/* Empty the list of interfaces */
1712 	i1 = TAILQ_FIRST(&pfi_table);
1713 	while (i1 != NULL) {
1714 		i2 = TAILQ_NEXT(i1, link);
1715 		free(i1);
1716 		i1 = i2;
1717 	}
1718 
1719 	/* List of queues */
1720 	q1 = TAILQ_FIRST(&pfq_table);
1721 	while (q1 != NULL) {
1722 		q2 = TAILQ_NEXT(q1, link);
1723 		free(q1);
1724 		q1 = q2;
1725 	}
1726 
1727 	/* List of tables */
1728 	t1 = TAILQ_FIRST(&pft_table);
1729 	while (t1 != NULL) {
1730 		t2 = TAILQ_NEXT(t1, link);
1731 		free(t1);
1732 		t1 = t2;
1733 	}
1734 
1735 	/* List of table addresses */
1736 	a1 = TAILQ_FIRST(&pfa_table);
1737 	while (a1 != NULL) {
1738 		a2 = TAILQ_NEXT(a1, link);
1739 		free(a1);
1740 		a1 = a2;
1741 	}
1742 
1743 	/* And the list of labeled filter rules */
1744 	l1 = TAILQ_FIRST(&pfl_table);
1745 	while (l1 != NULL) {
1746 		l2 = TAILQ_NEXT(l1, link);
1747 		free(l1);
1748 		l1 = l2;
1749 	}
1750 
1751 	close(dev);
1752 	return (0);
1753 }
1754 
1755 static void
1756 pf_dump(void)
1757 {
1758 	pfi_refresh();
1759 	if (altq_enabled) {
1760 		pfq_refresh();
1761 	}
1762 	pft_refresh();
1763 	pfa_refresh();
1764 	pfl_refresh();
1765 
1766 	syslog(LOG_ERR, "Dump: pfi_table_age = %jd",
1767 	    (intmax_t)pfi_table_age);
1768 	syslog(LOG_ERR, "Dump: pfi_table_count = %d",
1769 	    pfi_table_count);
1770 
1771 	syslog(LOG_ERR, "Dump: pfq_table_age = %jd",
1772 	    (intmax_t)pfq_table_age);
1773 	syslog(LOG_ERR, "Dump: pfq_table_count = %d",
1774 	    pfq_table_count);
1775 
1776 	syslog(LOG_ERR, "Dump: pft_table_age = %jd",
1777 	    (intmax_t)pft_table_age);
1778 	syslog(LOG_ERR, "Dump: pft_table_count = %d",
1779 	    pft_table_count);
1780 
1781 	syslog(LOG_ERR, "Dump: pfa_table_age = %jd",
1782 	    (intmax_t)pfa_table_age);
1783 	syslog(LOG_ERR, "Dump: pfa_table_count = %d",
1784 	    pfa_table_count);
1785 
1786 	syslog(LOG_ERR, "Dump: pfl_table_age = %jd",
1787 	    (intmax_t)pfl_table_age);
1788 	syslog(LOG_ERR, "Dump: pfl_table_count = %d",
1789 	    pfl_table_count);
1790 }
1791 
1792 const struct snmp_module config = {
1793 	.comment = "This module implements a MIB for the pf packet filter.",
1794 	.init =		pf_init,
1795 	.fini =		pf_fini,
1796 	.tree =		pf_ctree,
1797 	.dump =		pf_dump,
1798 	.tree_size =	pf_CTREE_SIZE,
1799 };
1800