1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 /* 22 * Copyright 2008 Sun Microsystems, Inc. All rights reserved. 23 * Use is subject to license terms. 24 */ 25 26 #include <stdio.h> 27 #include <stddef.h> 28 #include <ctype.h> 29 #include <string.h> 30 #include <fcntl.h> 31 #include <string.h> 32 #include <sys/types.h> 33 #include <sys/time.h> 34 #include <sys/isa_defs.h> 35 36 #include <sys/socket.h> 37 #include <sys/vlan.h> 38 #include <net/if.h> 39 #include <netinet/in_systm.h> 40 #include <netinet/in.h> 41 #include <netinet/ip.h> 42 #include <netinet/if_ether.h> 43 #include <netinet/tcp.h> 44 #include <netinet/udp.h> 45 #include <inet/ip.h> 46 #include <inet/ip6.h> 47 #include <netdb.h> 48 #include <rpc/rpc.h> 49 #include <setjmp.h> 50 51 #include <sys/pfmod.h> 52 #include "snoop.h" 53 #include "snoop_vlan.h" 54 55 /* 56 * This module generates code for the kernel packet filter. 57 * The kernel packet filter is more efficient since it 58 * operates without context switching or moving data into 59 * the capture buffer. On the other hand, it is limited 60 * in its filtering ability i.e. can't cope with variable 61 * length headers, can't compare the packet size, 1 and 4 octet 62 * comparisons are awkward, code space is limited to ENMAXFILTERS 63 * halfwords, etc. 64 * The parser is the same for the user-level packet filter though 65 * more limited in the variety of expressions it can generate 66 * code for. If the pf compiler finds an expression it can't 67 * handle, it tries to set up a split filter in kernel and do the 68 * remaining filtering in userland. If that also fails, it resorts 69 * to userland filter. (See additional comment in pf_compile) 70 */ 71 72 extern struct Pf_ext_packetfilt pf; 73 static ushort_t *pfp; 74 jmp_buf env; 75 76 int eaddr; /* need ethernet addr */ 77 78 int opstack; /* operand stack depth */ 79 80 #define EQ(val) (strcmp(token, val) == 0) 81 #define IPV4_ONLY 0 82 #define IPV6_ONLY 1 83 #define IPV4_AND_IPV6 2 84 85 typedef struct { 86 int transport_protocol; 87 int network_protocol; 88 /* 89 * offset is the offset in bytes from the beginning 90 * of the network protocol header to where the transport 91 * protocol type is. 92 */ 93 int offset; 94 } transport_table_t; 95 96 typedef struct network_table { 97 char *nmt_name; 98 int nmt_val; 99 } network_table_t; 100 101 static network_table_t ether_network_mapping_table[] = { 102 { "pup", ETHERTYPE_PUP }, 103 { "ip", ETHERTYPE_IP }, 104 { "arp", ETHERTYPE_ARP }, 105 { "revarp", ETHERTYPE_REVARP }, 106 { "at", ETHERTYPE_AT }, 107 { "aarp", ETHERTYPE_AARP }, 108 { "vlan", ETHERTYPE_VLAN }, 109 { "ip6", ETHERTYPE_IPV6 }, 110 { "slow", ETHERTYPE_SLOW }, 111 { "ppoed", ETHERTYPE_PPPOED }, 112 { "ppoes", ETHERTYPE_PPPOES }, 113 { "NULL", -1 } 114 115 }; 116 117 static network_table_t ib_network_mapping_table[] = { 118 { "pup", ETHERTYPE_PUP }, 119 { "ip", ETHERTYPE_IP }, 120 { "arp", ETHERTYPE_ARP }, 121 { "revarp", ETHERTYPE_REVARP }, 122 { "at", ETHERTYPE_AT }, 123 { "aarp", ETHERTYPE_AARP }, 124 { "vlan", ETHERTYPE_VLAN }, 125 { "ip6", ETHERTYPE_IPV6 }, 126 { "slow", ETHERTYPE_SLOW }, 127 { "ppoed", ETHERTYPE_PPPOED }, 128 { "ppoes", ETHERTYPE_PPPOES }, 129 { "NULL", -1 } 130 131 }; 132 133 static network_table_t ipnet_network_mapping_table[] = { 134 { "ip", (DL_IPNETINFO_VERSION << 8 | IPV4_VERSION) }, 135 { "ip6", (DL_IPNETINFO_VERSION << 8 | IPV6_VERSION) }, 136 { "NULL", -1 } 137 138 }; 139 140 static transport_table_t ether_transport_mapping_table[] = { 141 {IPPROTO_TCP, ETHERTYPE_IP, IPV4_TYPE_HEADER_OFFSET}, 142 {IPPROTO_TCP, ETHERTYPE_IPV6, IPV6_TYPE_HEADER_OFFSET}, 143 {IPPROTO_UDP, ETHERTYPE_IP, IPV4_TYPE_HEADER_OFFSET}, 144 {IPPROTO_UDP, ETHERTYPE_IPV6, IPV6_TYPE_HEADER_OFFSET}, 145 {IPPROTO_OSPF, ETHERTYPE_IP, IPV4_TYPE_HEADER_OFFSET}, 146 {IPPROTO_OSPF, ETHERTYPE_IPV6, IPV6_TYPE_HEADER_OFFSET}, 147 {IPPROTO_SCTP, ETHERTYPE_IP, IPV4_TYPE_HEADER_OFFSET}, 148 {IPPROTO_SCTP, ETHERTYPE_IPV6, IPV6_TYPE_HEADER_OFFSET}, 149 {IPPROTO_ICMP, ETHERTYPE_IP, IPV4_TYPE_HEADER_OFFSET}, 150 {IPPROTO_ICMPV6, ETHERTYPE_IPV6, IPV6_TYPE_HEADER_OFFSET}, 151 {IPPROTO_ENCAP, ETHERTYPE_IP, IPV4_TYPE_HEADER_OFFSET}, 152 {IPPROTO_ESP, ETHERTYPE_IP, IPV4_TYPE_HEADER_OFFSET}, 153 {IPPROTO_ESP, ETHERTYPE_IPV6, IPV6_TYPE_HEADER_OFFSET}, 154 {IPPROTO_AH, ETHERTYPE_IP, IPV4_TYPE_HEADER_OFFSET}, 155 {IPPROTO_AH, ETHERTYPE_IPV6, IPV6_TYPE_HEADER_OFFSET}, 156 {-1, 0, 0} /* must be the final entry */ 157 }; 158 159 static transport_table_t ipnet_transport_mapping_table[] = { 160 {IPPROTO_TCP, (DL_IPNETINFO_VERSION << 8 | IPV4_VERSION), 161 IPV4_TYPE_HEADER_OFFSET}, 162 {IPPROTO_TCP, (DL_IPNETINFO_VERSION << 8 | IPV6_VERSION), 163 IPV6_TYPE_HEADER_OFFSET}, 164 {IPPROTO_UDP, (DL_IPNETINFO_VERSION << 8 | IPV4_VERSION), 165 IPV4_TYPE_HEADER_OFFSET}, 166 {IPPROTO_UDP, (DL_IPNETINFO_VERSION << 8 | IPV6_VERSION), 167 IPV6_TYPE_HEADER_OFFSET}, 168 {IPPROTO_OSPF, (DL_IPNETINFO_VERSION << 8 | IPV4_VERSION), 169 IPV4_TYPE_HEADER_OFFSET}, 170 {IPPROTO_OSPF, (DL_IPNETINFO_VERSION << 8 | IPV6_VERSION), 171 IPV6_TYPE_HEADER_OFFSET}, 172 {IPPROTO_SCTP, (DL_IPNETINFO_VERSION << 8 | IPV4_VERSION), 173 IPV4_TYPE_HEADER_OFFSET}, 174 {IPPROTO_SCTP, (DL_IPNETINFO_VERSION << 8 | IPV6_VERSION), 175 IPV6_TYPE_HEADER_OFFSET}, 176 {IPPROTO_ICMP, (DL_IPNETINFO_VERSION << 8 | IPV4_VERSION), 177 IPV4_TYPE_HEADER_OFFSET}, 178 {IPPROTO_ICMPV6, (DL_IPNETINFO_VERSION << 8 | IPV6_VERSION), 179 IPV6_TYPE_HEADER_OFFSET}, 180 {IPPROTO_ENCAP, (DL_IPNETINFO_VERSION << 8 | IPV4_VERSION), 181 IPV4_TYPE_HEADER_OFFSET}, 182 {IPPROTO_ESP, (DL_IPNETINFO_VERSION << 8 | IPV4_VERSION), 183 IPV4_TYPE_HEADER_OFFSET}, 184 {IPPROTO_ESP, (DL_IPNETINFO_VERSION << 8 | IPV6_VERSION), 185 IPV6_TYPE_HEADER_OFFSET}, 186 {IPPROTO_AH, (DL_IPNETINFO_VERSION << 8 | IPV4_VERSION), 187 IPV4_TYPE_HEADER_OFFSET}, 188 {IPPROTO_AH, (DL_IPNETINFO_VERSION << 8 | IPV6_VERSION), 189 IPV6_TYPE_HEADER_OFFSET}, 190 {-1, 0, 0} /* must be the final entry */ 191 }; 192 193 static transport_table_t ib_transport_mapping_table[] = { 194 {IPPROTO_TCP, ETHERTYPE_IP, IPV4_TYPE_HEADER_OFFSET}, 195 {IPPROTO_TCP, ETHERTYPE_IPV6, IPV6_TYPE_HEADER_OFFSET}, 196 {IPPROTO_UDP, ETHERTYPE_IP, IPV4_TYPE_HEADER_OFFSET}, 197 {IPPROTO_UDP, ETHERTYPE_IPV6, IPV6_TYPE_HEADER_OFFSET}, 198 {IPPROTO_OSPF, ETHERTYPE_IP, IPV4_TYPE_HEADER_OFFSET}, 199 {IPPROTO_OSPF, ETHERTYPE_IPV6, IPV6_TYPE_HEADER_OFFSET}, 200 {IPPROTO_SCTP, ETHERTYPE_IP, IPV4_TYPE_HEADER_OFFSET}, 201 {IPPROTO_SCTP, ETHERTYPE_IPV6, IPV6_TYPE_HEADER_OFFSET}, 202 {IPPROTO_ICMP, ETHERTYPE_IP, IPV4_TYPE_HEADER_OFFSET}, 203 {IPPROTO_ICMPV6, ETHERTYPE_IPV6, IPV6_TYPE_HEADER_OFFSET}, 204 {IPPROTO_ENCAP, ETHERTYPE_IP, IPV4_TYPE_HEADER_OFFSET}, 205 {IPPROTO_ESP, ETHERTYPE_IP, IPV4_TYPE_HEADER_OFFSET}, 206 {IPPROTO_ESP, ETHERTYPE_IPV6, IPV6_TYPE_HEADER_OFFSET}, 207 {IPPROTO_AH, ETHERTYPE_IP, IPV4_TYPE_HEADER_OFFSET}, 208 {IPPROTO_AH, ETHERTYPE_IPV6, IPV6_TYPE_HEADER_OFFSET}, 209 {-1, 0, 0} /* must be the final entry */ 210 }; 211 212 typedef struct datalink { 213 uint_t dl_type; 214 void (*dl_match_fn)(uint_t datatype); 215 transport_table_t *dl_trans_map_tbl; 216 network_table_t *dl_net_map_tbl; 217 int dl_link_header_len; 218 int dl_link_type_offset; 219 int dl_link_dest_offset; 220 int dl_link_src_offset; 221 int dl_link_addr_len; 222 } datalink_t; 223 224 datalink_t dl; 225 226 #define IPV4_SRCADDR_OFFSET (dl.dl_link_header_len + 12) 227 #define IPV4_DSTADDR_OFFSET (dl.dl_link_header_len + 16) 228 #define IPV6_SRCADDR_OFFSET (dl.dl_link_header_len + 8) 229 #define IPV6_DSTADDR_OFFSET (dl.dl_link_header_len + 24) 230 231 #define IPNET_SRCZONE_OFFSET 8 232 #define IPNET_DSTZONE_OFFSET 16 233 234 static int inBrace = 0, inBraceOR = 0; 235 static int foundOR = 0; 236 char *tkp, *sav_tkp; 237 char *token; 238 enum { EOL, ALPHA, NUMBER, FIELD, ADDR_IP, ADDR_ETHER, SPECIAL, 239 ADDR_IP6 } tokentype; 240 uint_t tokenval; 241 242 enum direction { ANY, TO, FROM }; 243 enum direction dir; 244 245 extern void next(); 246 247 static void pf_expression(); 248 static void pf_check_vlan_tag(uint_t offset); 249 static void pf_clear_offset_register(); 250 static void pf_emit_load_offset(uint_t offset); 251 static void pf_match_ethertype(uint_t ethertype); 252 static void pf_match_ipnettype(uint_t type); 253 static void pf_match_ibtype(uint_t type); 254 static void pf_check_transport_protocol(uint_t transport_protocol); 255 static void pf_compare_value_mask_generic(int offset, uint_t len, 256 uint_t val, int mask, uint_t op); 257 static void pf_matchfn(const char *name); 258 259 /* 260 * This pointer points to the function that last generated 261 * instructions to change the offset register. It's used 262 * for comparisons to see if we need to issue more instructions 263 * to change the register. 264 * 265 * It's initialized to pf_clear_offset_register because the offset 266 * register in pfmod is initialized to zero, similar to the state 267 * it would be in after executing the instructions issued by 268 * pf_clear_offset_register. 269 */ 270 static void *last_offset_operation = (void*)pf_clear_offset_register; 271 272 static void 273 pf_emit(x) 274 ushort_t x; 275 { 276 if (pfp > &pf.Pf_Filter[PF_MAXFILTERS - 1]) 277 longjmp(env, 1); 278 *pfp++ = x; 279 } 280 281 static void 282 pf_codeprint(code, len) 283 ushort_t *code; 284 int len; 285 { 286 ushort_t *pc; 287 ushort_t *plast = code + len; 288 int op, action; 289 290 if (len > 0) { 291 printf("Kernel Filter:\n"); 292 } 293 294 for (pc = code; pc < plast; pc++) { 295 printf("\t%3d: ", pc - code); 296 297 op = *pc & 0xfc00; /* high 10 bits */ 298 action = *pc & 0x3ff; /* low 6 bits */ 299 300 switch (action) { 301 case ENF_PUSHLIT: 302 printf("PUSHLIT "); 303 break; 304 case ENF_PUSHZERO: 305 printf("PUSHZERO "); 306 break; 307 #ifdef ENF_PUSHONE 308 case ENF_PUSHONE: 309 printf("PUSHONE "); 310 break; 311 #endif 312 #ifdef ENF_PUSHFFFF 313 case ENF_PUSHFFFF: 314 printf("PUSHFFFF "); 315 break; 316 #endif 317 #ifdef ENF_PUSHFF00 318 case ENF_PUSHFF00: 319 printf("PUSHFF00 "); 320 break; 321 #endif 322 #ifdef ENF_PUSH00FF 323 case ENF_PUSH00FF: 324 printf("PUSH00FF "); 325 break; 326 #endif 327 case ENF_LOAD_OFFSET: 328 printf("LOAD_OFFSET "); 329 break; 330 case ENF_BRTR: 331 printf("BRTR "); 332 break; 333 case ENF_BRFL: 334 printf("BRFL "); 335 break; 336 case ENF_POP: 337 printf("POP "); 338 break; 339 } 340 341 if (action >= ENF_PUSHWORD) 342 printf("PUSHWORD %d ", action - ENF_PUSHWORD); 343 344 switch (op) { 345 case ENF_EQ: 346 printf("EQ "); 347 break; 348 case ENF_LT: 349 printf("LT "); 350 break; 351 case ENF_LE: 352 printf("LE "); 353 break; 354 case ENF_GT: 355 printf("GT "); 356 break; 357 case ENF_GE: 358 printf("GE "); 359 break; 360 case ENF_AND: 361 printf("AND "); 362 break; 363 case ENF_OR: 364 printf("OR "); 365 break; 366 case ENF_XOR: 367 printf("XOR "); 368 break; 369 case ENF_COR: 370 printf("COR "); 371 break; 372 case ENF_CAND: 373 printf("CAND "); 374 break; 375 case ENF_CNOR: 376 printf("CNOR "); 377 break; 378 case ENF_CNAND: 379 printf("CNAND "); 380 break; 381 case ENF_NEQ: 382 printf("NEQ "); 383 break; 384 } 385 386 if (action == ENF_PUSHLIT || 387 action == ENF_LOAD_OFFSET || 388 action == ENF_BRTR || 389 action == ENF_BRFL) { 390 pc++; 391 printf("\n\t%3d: %d (0x%04x)", pc - code, *pc, *pc); 392 } 393 394 printf("\n"); 395 } 396 } 397 398 /* 399 * Emit packet filter code to check a 400 * field in the packet for a particular value. 401 * Need different code for each field size. 402 * Since the pf can only compare 16 bit quantities 403 * we have to use masking to compare byte values. 404 * Long word (32 bit) quantities have to be done 405 * as two 16 bit comparisons. 406 */ 407 static void 408 pf_compare_value(int offset, uint_t len, uint_t val) 409 { 410 /* 411 * If the property being filtered on is absent in the media 412 * packet, error out. 413 */ 414 if (offset == -1) 415 pr_err("filter option unsupported on media"); 416 417 switch (len) { 418 case 1: 419 pf_emit(ENF_PUSHWORD + offset / 2); 420 #if defined(_BIG_ENDIAN) 421 if (offset % 2) 422 #else 423 if (!(offset % 2)) 424 #endif 425 { 426 #ifdef ENF_PUSH00FF 427 pf_emit(ENF_PUSH00FF | ENF_AND); 428 #else 429 pf_emit(ENF_PUSHLIT | ENF_AND); 430 pf_emit(0x00FF); 431 #endif 432 pf_emit(ENF_PUSHLIT | ENF_EQ); 433 pf_emit(val); 434 } else { 435 #ifdef ENF_PUSHFF00 436 pf_emit(ENF_PUSHFF00 | ENF_AND); 437 #else 438 pf_emit(ENF_PUSHLIT | ENF_AND); 439 pf_emit(0xFF00); 440 #endif 441 pf_emit(ENF_PUSHLIT | ENF_EQ); 442 pf_emit(val << 8); 443 } 444 break; 445 446 case 2: 447 pf_emit(ENF_PUSHWORD + offset / 2); 448 pf_emit(ENF_PUSHLIT | ENF_EQ); 449 pf_emit((ushort_t)val); 450 break; 451 452 case 4: 453 pf_emit(ENF_PUSHWORD + offset / 2); 454 pf_emit(ENF_PUSHLIT | ENF_EQ); 455 #if defined(_BIG_ENDIAN) 456 pf_emit(val >> 16); 457 #elif defined(_LITTLE_ENDIAN) 458 pf_emit(val & 0xffff); 459 #else 460 #error One of _BIG_ENDIAN and _LITTLE_ENDIAN must be defined 461 #endif 462 pf_emit(ENF_PUSHWORD + (offset / 2) + 1); 463 pf_emit(ENF_PUSHLIT | ENF_EQ); 464 #if defined(_BIG_ENDIAN) 465 pf_emit(val & 0xffff); 466 #else 467 pf_emit(val >> 16); 468 #endif 469 pf_emit(ENF_AND); 470 break; 471 } 472 } 473 474 /* 475 * same as pf_compare_value, but only for emiting code to 476 * compare ipv6 addresses. 477 */ 478 static void 479 pf_compare_value_v6(int offset, uint_t len, struct in6_addr val) 480 { 481 int i; 482 483 for (i = 0; i < len; i += 2) { 484 pf_emit(ENF_PUSHWORD + offset / 2 + i / 2); 485 pf_emit(ENF_PUSHLIT | ENF_EQ); 486 pf_emit(*(uint16_t *)&val.s6_addr[i]); 487 if (i != 0) 488 pf_emit(ENF_AND); 489 } 490 } 491 492 493 /* 494 * Same as above except mask the field value 495 * before doing the comparison. The comparison checks 496 * to make sure the values are equal. 497 */ 498 static void 499 pf_compare_value_mask(int offset, uint_t len, uint_t val, int mask) 500 { 501 pf_compare_value_mask_generic(offset, len, val, mask, ENF_EQ); 502 } 503 504 /* 505 * Same as above except the values are compared to see if they are not 506 * equal. 507 */ 508 static void 509 pf_compare_value_mask_neq(int offset, uint_t len, uint_t val, int mask) 510 { 511 pf_compare_value_mask_generic(offset, len, val, mask, ENF_NEQ); 512 } 513 514 /* 515 * Similar to pf_compare_value. 516 * 517 * This is the utility function that does the actual work to compare 518 * two values using a mask. The comparison operation is passed into 519 * the function. 520 */ 521 static void 522 pf_compare_value_mask_generic(int offset, uint_t len, uint_t val, int mask, 523 uint_t op) 524 { 525 /* 526 * If the property being filtered on is absent in the media 527 * packet, error out. 528 */ 529 if (offset == -1) 530 pr_err("filter option unsupported on media"); 531 532 switch (len) { 533 case 1: 534 pf_emit(ENF_PUSHWORD + offset / 2); 535 #if defined(_BIG_ENDIAN) 536 if (offset % 2) 537 #else 538 if (!offset % 2) 539 #endif 540 { 541 pf_emit(ENF_PUSHLIT | ENF_AND); 542 pf_emit(mask & 0x00ff); 543 pf_emit(ENF_PUSHLIT | op); 544 pf_emit(val); 545 } else { 546 pf_emit(ENF_PUSHLIT | ENF_AND); 547 pf_emit((mask << 8) & 0xff00); 548 pf_emit(ENF_PUSHLIT | op); 549 pf_emit(val << 8); 550 } 551 break; 552 553 case 2: 554 pf_emit(ENF_PUSHWORD + offset / 2); 555 pf_emit(ENF_PUSHLIT | ENF_AND); 556 pf_emit(htons((ushort_t)mask)); 557 pf_emit(ENF_PUSHLIT | op); 558 pf_emit(htons((ushort_t)val)); 559 break; 560 561 case 4: 562 pf_emit(ENF_PUSHWORD + offset / 2); 563 pf_emit(ENF_PUSHLIT | ENF_AND); 564 pf_emit(htons((ushort_t)((mask >> 16) & 0xffff))); 565 pf_emit(ENF_PUSHLIT | op); 566 pf_emit(htons((ushort_t)((val >> 16) & 0xffff))); 567 568 pf_emit(ENF_PUSHWORD + (offset / 2) + 1); 569 pf_emit(ENF_PUSHLIT | ENF_AND); 570 pf_emit(htons((ushort_t)(mask & 0xffff))); 571 pf_emit(ENF_PUSHLIT | op); 572 pf_emit(htons((ushort_t)(val & 0xffff))); 573 574 pf_emit(ENF_AND); 575 break; 576 } 577 } 578 579 /* 580 * Like pf_compare_value() but compare on a 64-bit zoneid value. 581 * The argument val passed in is in network byte order. 582 */ 583 static void 584 pf_compare_zoneid(int offset, uint64_t val) 585 { 586 int i; 587 588 for (i = 0; i < sizeof (uint64_t) / 2; i ++) { 589 pf_emit(ENF_PUSHWORD + offset / 2 + i); 590 pf_emit(ENF_PUSHLIT | ENF_EQ); 591 pf_emit(((uint16_t *)&val)[i]); 592 if (i != 0) 593 pf_emit(ENF_AND); 594 } 595 } 596 597 /* 598 * Generate pf code to match an IPv4 or IPv6 address. 599 */ 600 static void 601 pf_ipaddr_match(which, hostname, inet_type) 602 enum direction which; 603 char *hostname; 604 int inet_type; 605 { 606 bool_t found_host; 607 uint_t *addr4ptr; 608 uint_t addr4; 609 struct in6_addr *addr6ptr; 610 int h_addr_index; 611 struct hostent *hp = NULL; 612 int error_num = 0; 613 boolean_t first = B_TRUE; 614 int pass = 0; 615 int i; 616 617 /* 618 * The addr4offset and addr6offset variables simplify the code which 619 * generates the address comparison filter. With these two variables, 620 * duplicate code need not exist for the TO and FROM case. 621 * A value of -1 describes the ANY case (TO and FROM). 622 */ 623 int addr4offset; 624 int addr6offset; 625 626 found_host = 0; 627 628 if (tokentype == ADDR_IP) { 629 hp = getipnodebyname(hostname, AF_INET, 0, &error_num); 630 if (hp == NULL) { 631 if (error_num == TRY_AGAIN) { 632 pr_err("could not resolve %s (try again later)", 633 hostname); 634 } else { 635 pr_err("could not resolve %s", hostname); 636 } 637 } 638 inet_type = IPV4_ONLY; 639 } else if (tokentype == ADDR_IP6) { 640 hp = getipnodebyname(hostname, AF_INET6, 0, &error_num); 641 if (hp == NULL) { 642 if (error_num == TRY_AGAIN) { 643 pr_err("could not resolve %s (try again later)", 644 hostname); 645 } else { 646 pr_err("could not resolve %s", hostname); 647 } 648 } 649 inet_type = IPV6_ONLY; 650 } else if (tokentype == ALPHA) { 651 /* Some hostname i.e. tokentype is ALPHA */ 652 switch (inet_type) { 653 case IPV4_ONLY: 654 /* Only IPv4 address is needed */ 655 hp = getipnodebyname(hostname, AF_INET, 0, &error_num); 656 if (hp != NULL) { 657 found_host = 1; 658 } 659 break; 660 case IPV6_ONLY: 661 /* Only IPv6 address is needed */ 662 hp = getipnodebyname(hostname, AF_INET6, 0, &error_num); 663 if (hp != NULL) { 664 found_host = 1; 665 } 666 break; 667 case IPV4_AND_IPV6: 668 /* Both IPv4 and IPv6 are needed */ 669 hp = getipnodebyname(hostname, AF_INET6, 670 AI_ALL | AI_V4MAPPED, &error_num); 671 if (hp != NULL) { 672 found_host = 1; 673 } 674 break; 675 default: 676 found_host = 0; 677 } 678 679 if (!found_host) { 680 if (error_num == TRY_AGAIN) { 681 pr_err("could not resolve %s (try again later)", 682 hostname); 683 } else { 684 pr_err("could not resolve %s", hostname); 685 } 686 } 687 } else { 688 pr_err("unknown token type: %s", hostname); 689 } 690 691 switch (which) { 692 case TO: 693 addr4offset = IPV4_DSTADDR_OFFSET; 694 addr6offset = IPV6_DSTADDR_OFFSET; 695 break; 696 case FROM: 697 addr4offset = IPV4_SRCADDR_OFFSET; 698 addr6offset = IPV6_SRCADDR_OFFSET; 699 break; 700 case ANY: 701 addr4offset = -1; 702 addr6offset = -1; 703 break; 704 } 705 706 if (hp != NULL && hp->h_addrtype == AF_INET) { 707 pf_matchfn("ip"); 708 if (dl.dl_type == DL_ETHER) 709 pf_check_vlan_tag(ENCAP_ETHERTYPE_OFF/2); 710 h_addr_index = 0; 711 addr4ptr = (uint_t *)hp->h_addr_list[h_addr_index]; 712 while (addr4ptr != NULL) { 713 if (addr4offset == -1) { 714 pf_compare_value(IPV4_SRCADDR_OFFSET, 4, 715 *addr4ptr); 716 if (h_addr_index != 0) 717 pf_emit(ENF_OR); 718 pf_compare_value(IPV4_DSTADDR_OFFSET, 4, 719 *addr4ptr); 720 pf_emit(ENF_OR); 721 } else { 722 pf_compare_value(addr4offset, 4, 723 *addr4ptr); 724 if (h_addr_index != 0) 725 pf_emit(ENF_OR); 726 } 727 addr4ptr = (uint_t *)hp->h_addr_list[++h_addr_index]; 728 } 729 pf_emit(ENF_AND); 730 } else { 731 /* first pass: IPv4 addresses */ 732 h_addr_index = 0; 733 addr6ptr = (struct in6_addr *)hp->h_addr_list[h_addr_index]; 734 first = B_TRUE; 735 while (addr6ptr != NULL) { 736 if (IN6_IS_ADDR_V4MAPPED(addr6ptr)) { 737 if (first) { 738 pf_matchfn("ip"); 739 if (dl.dl_type == DL_ETHER) { 740 pf_check_vlan_tag( 741 ENCAP_ETHERTYPE_OFF/2); 742 } 743 pass++; 744 } 745 IN6_V4MAPPED_TO_INADDR(addr6ptr, 746 (struct in_addr *)&addr4); 747 if (addr4offset == -1) { 748 pf_compare_value(IPV4_SRCADDR_OFFSET, 4, 749 addr4); 750 if (!first) 751 pf_emit(ENF_OR); 752 pf_compare_value(IPV4_DSTADDR_OFFSET, 4, 753 addr4); 754 pf_emit(ENF_OR); 755 } else { 756 pf_compare_value(addr4offset, 4, 757 addr4); 758 if (!first) 759 pf_emit(ENF_OR); 760 } 761 if (first) 762 first = B_FALSE; 763 } 764 addr6ptr = (struct in6_addr *) 765 hp->h_addr_list[++h_addr_index]; 766 } 767 if (!first) { 768 pf_emit(ENF_AND); 769 } 770 /* second pass: IPv6 addresses */ 771 h_addr_index = 0; 772 addr6ptr = (struct in6_addr *)hp->h_addr_list[h_addr_index]; 773 first = B_TRUE; 774 while (addr6ptr != NULL) { 775 if (!IN6_IS_ADDR_V4MAPPED(addr6ptr)) { 776 if (first) { 777 pf_matchfn("ip6"); 778 if (dl.dl_type == DL_ETHER) { 779 pf_check_vlan_tag( 780 ENCAP_ETHERTYPE_OFF/2); 781 } 782 pass++; 783 } 784 if (addr6offset == -1) { 785 pf_compare_value_v6(IPV6_SRCADDR_OFFSET, 786 16, *addr6ptr); 787 if (!first) 788 pf_emit(ENF_OR); 789 pf_compare_value_v6(IPV6_DSTADDR_OFFSET, 790 16, *addr6ptr); 791 pf_emit(ENF_OR); 792 } else { 793 pf_compare_value_v6(addr6offset, 16, 794 *addr6ptr); 795 if (!first) 796 pf_emit(ENF_OR); 797 } 798 if (first) 799 first = B_FALSE; 800 } 801 addr6ptr = (struct in6_addr *) 802 hp->h_addr_list[++h_addr_index]; 803 } 804 if (!first) { 805 pf_emit(ENF_AND); 806 } 807 if (pass == 2) { 808 pf_emit(ENF_OR); 809 } 810 } 811 812 if (hp != NULL) { 813 freehostent(hp); 814 } 815 } 816 817 818 static void 819 pf_compare_address(int offset, uint_t len, uchar_t *addr) 820 { 821 uint32_t val; 822 uint16_t sval; 823 boolean_t didone = B_FALSE; 824 825 /* 826 * If the property being filtered on is absent in the media 827 * packet, error out. 828 */ 829 if (offset == -1) 830 pr_err("filter option unsupported on media"); 831 832 while (len > 0) { 833 if (len >= 4) { 834 (void) memcpy(&val, addr, 4); 835 pf_compare_value(offset, 4, val); 836 addr += 4; 837 offset += 4; 838 len -= 4; 839 } else if (len >= 2) { 840 (void) memcpy(&sval, addr, 2); 841 pf_compare_value(offset, 2, sval); 842 addr += 2; 843 offset += 2; 844 len -= 2; 845 } else { 846 pf_compare_value(offset++, 1, *addr++); 847 len--; 848 } 849 if (didone) 850 pf_emit(ENF_AND); 851 didone = B_TRUE; 852 } 853 } 854 855 /* 856 * Compare ethernet addresses. 857 */ 858 static void 859 pf_etheraddr_match(which, hostname) 860 enum direction which; 861 char *hostname; 862 { 863 struct ether_addr e, *ep = NULL; 864 865 if (isxdigit(*hostname)) 866 ep = ether_aton(hostname); 867 if (ep == NULL) { 868 if (ether_hostton(hostname, &e)) 869 if (!arp_for_ether(hostname, &e)) 870 pr_err("cannot obtain ether addr for %s", 871 hostname); 872 ep = &e; 873 } 874 875 pf_clear_offset_register(); 876 877 switch (which) { 878 case TO: 879 pf_compare_address(dl.dl_link_dest_offset, dl.dl_link_addr_len, 880 (uchar_t *)ep); 881 break; 882 case FROM: 883 pf_compare_address(dl.dl_link_src_offset, dl.dl_link_addr_len, 884 (uchar_t *)ep); 885 break; 886 case ANY: 887 pf_compare_address(dl.dl_link_dest_offset, dl.dl_link_addr_len, 888 (uchar_t *)ep); 889 pf_compare_address(dl.dl_link_src_offset, dl.dl_link_addr_len, 890 (uchar_t *)ep); 891 pf_emit(ENF_OR); 892 break; 893 } 894 } 895 896 /* 897 * Emit code to compare the network part of 898 * an IP address. 899 */ 900 static void 901 pf_netaddr_match(which, netname) 902 enum direction which; 903 char *netname; 904 { 905 uint_t addr; 906 uint_t mask = 0xff000000; 907 struct netent *np; 908 909 if (isdigit(*netname)) { 910 addr = inet_network(netname); 911 } else { 912 np = getnetbyname(netname); 913 if (np == NULL) 914 pr_err("net %s not known", netname); 915 addr = np->n_net; 916 } 917 918 /* 919 * Left justify the address and figure 920 * out a mask based on the supplied address. 921 * Set the mask according to the number of zero 922 * low-order bytes. 923 * Note: this works only for whole octet masks. 924 */ 925 if (addr) { 926 while ((addr & ~mask) != 0) { 927 mask |= (mask >> 8); 928 } 929 } 930 931 pf_check_vlan_tag(ENCAP_ETHERTYPE_OFF/2); 932 933 switch (which) { 934 case TO: 935 pf_compare_value_mask(IPV4_DSTADDR_OFFSET, 4, addr, mask); 936 break; 937 case FROM: 938 pf_compare_value_mask(IPV4_SRCADDR_OFFSET, 4, addr, mask); 939 break; 940 case ANY: 941 pf_compare_value_mask(IPV4_SRCADDR_OFFSET, 4, addr, mask); 942 pf_compare_value_mask(IPV4_DSTADDR_OFFSET, 4, addr, mask); 943 pf_emit(ENF_OR); 944 break; 945 } 946 } 947 948 /* 949 * Emit code to match on src or destination zoneid. 950 * The zoneid passed in is in network byte order. 951 */ 952 static void 953 pf_match_zone(enum direction which, uint64_t zoneid) 954 { 955 if (dl.dl_type != DL_IPNET) 956 pr_err("zone filter option unsupported on media"); 957 958 switch (which) { 959 case TO: 960 pf_compare_zoneid(IPNET_DSTZONE_OFFSET, zoneid); 961 break; 962 case FROM: 963 pf_compare_zoneid(IPNET_SRCZONE_OFFSET, zoneid); 964 break; 965 case ANY: 966 pf_compare_zoneid(IPNET_SRCZONE_OFFSET, zoneid); 967 pf_compare_zoneid(IPNET_DSTZONE_OFFSET, zoneid); 968 pf_emit(ENF_OR); 969 break; 970 } 971 } 972 973 /* 974 * A helper function to keep the code to emit instructions 975 * to change the offset register in one place. 976 * 977 * INPUTS: offset - An value representing an offset in 16-bit 978 * words. 979 * OUTPUTS: If there is enough room in the storage for the 980 * packet filtering program, instructions to load 981 * a constant to the offset register. Otherwise, 982 * nothing. 983 */ 984 static void 985 pf_emit_load_offset(uint_t offset) 986 { 987 pf_emit(ENF_LOAD_OFFSET | ENF_NOP); 988 pf_emit(offset); 989 } 990 991 /* 992 * Clear pfmod's offset register. 993 * 994 * INPUTS: none 995 * OUTPUTS: Instructions to clear the offset register if 996 * there is enough space remaining in the packet 997 * filtering program structure's storage, and 998 * the last thing done to the offset register was 999 * not clearing the offset register. Otherwise, 1000 * nothing. 1001 */ 1002 static void 1003 pf_clear_offset_register() 1004 { 1005 if (last_offset_operation != (void*)pf_clear_offset_register) { 1006 pf_emit_load_offset(0); 1007 last_offset_operation = (void*)pf_clear_offset_register; 1008 } 1009 } 1010 1011 /* 1012 * This function will issue opcodes to check if a packet 1013 * is VLAN tagged, and if so, update the offset register 1014 * with the appropriate offset. 1015 * 1016 * Note that if the packet is not VLAN tagged, then the offset 1017 * register will be cleared. 1018 * 1019 * If the interface type is not an ethernet type, then this 1020 * function returns without doing anything. 1021 * 1022 * If the last attempt to change the offset register occured because 1023 * of a call to this function that was called with the same offset, 1024 * then we don't issue packet filtering instructions. 1025 * 1026 * INPUTS: offset - an offset in 16 bit words. The function 1027 * will set the offset register to this 1028 * value if the packet is VLAN tagged. 1029 * OUTPUTS: If the conditions are met, packet filtering instructions. 1030 */ 1031 static void 1032 pf_check_vlan_tag(uint_t offset) 1033 { 1034 static uint_t last_offset = 0; 1035 1036 if ((interface->mac_type == DL_ETHER || 1037 interface->mac_type == DL_CSMACD) && 1038 (last_offset_operation != (void*)pf_check_vlan_tag || 1039 last_offset != offset)) { 1040 /* 1041 * First thing is to clear the offset register. 1042 * We don't know what state it is in, and if it 1043 * is not zero, then we have no idea what we load 1044 * when we execute ENF_PUSHWORD. 1045 */ 1046 pf_clear_offset_register(); 1047 1048 /* 1049 * Check the ethertype. 1050 */ 1051 pf_compare_value(dl.dl_link_type_offset, 2, 1052 htons(ETHERTYPE_VLAN)); 1053 1054 /* 1055 * And if it's not VLAN, don't load offset to the offset 1056 * register. 1057 */ 1058 pf_emit(ENF_BRFL | ENF_NOP); 1059 pf_emit(3); 1060 1061 /* 1062 * Otherwise, load offset to the offset register. 1063 */ 1064 pf_emit_load_offset(offset); 1065 1066 /* 1067 * Now get rid of the results of the comparison, 1068 * we don't want the results of the comparison to affect 1069 * other logic in the packet filtering program. 1070 */ 1071 pf_emit(ENF_POP | ENF_NOP); 1072 1073 /* 1074 * Set the last operation at the end, or any time 1075 * after the call to pf_clear_offset because 1076 * pf_clear_offset uses it. 1077 */ 1078 last_offset_operation = (void*)pf_check_vlan_tag; 1079 last_offset = offset; 1080 } 1081 } 1082 1083 /* 1084 * Utility function used to emit packet filtering code 1085 * to match an ethertype. 1086 * 1087 * INPUTS: ethertype - The ethertype we want to check for. 1088 * Don't call htons on the ethertype before 1089 * calling this function. 1090 * OUTPUTS: If there is sufficient storage available, packet 1091 * filtering code to check an ethertype. Otherwise, 1092 * nothing. 1093 */ 1094 static void 1095 pf_match_ethertype(uint_t ethertype) 1096 { 1097 /* 1098 * If the user wants to filter on ethertype VLAN, 1099 * then clear the offset register so that the offset 1100 * for ENF_PUSHWORD points to the right place in the 1101 * packet. 1102 * 1103 * Otherwise, call pf_check_vlan_tag to set the offset 1104 * register such that the contents of the offset register 1105 * plus the argument for ENF_PUSHWORD point to the right 1106 * part of the packet, whether or not the packet is VLAN 1107 * tagged. We call pf_check_vlan_tag with an offset of 1108 * two words because if the packet is VLAN tagged, we have 1109 * to move past the ethertype in the ethernet header, and 1110 * past the lower two octets of the VLAN header to get to 1111 * the ethertype in the VLAN header. 1112 */ 1113 if (ethertype == ETHERTYPE_VLAN) 1114 pf_clear_offset_register(); 1115 else 1116 pf_check_vlan_tag(2); 1117 1118 pf_compare_value(dl.dl_link_type_offset, 2, htons(ethertype)); 1119 } 1120 1121 static void 1122 pf_match_ipnettype(uint_t type) 1123 { 1124 pf_compare_value(dl.dl_link_type_offset, 2, htons(type)); 1125 } 1126 1127 static void 1128 pf_match_ibtype(uint_t type) 1129 { 1130 pf_compare_value(dl.dl_link_type_offset, 2, htons(type)); 1131 } 1132 1133 /* 1134 * This function uses the table above to generate a 1135 * piece of a packet filtering program to check a transport 1136 * protocol type. 1137 * 1138 * INPUTS: tranport_protocol - the transport protocol we're 1139 * interested in. 1140 * OUTPUTS: If there is sufficient storage, then packet filtering 1141 * code to check a transport protocol type. Otherwise, 1142 * nothing. 1143 */ 1144 static void 1145 pf_check_transport_protocol(uint_t transport_protocol) 1146 { 1147 int i; 1148 uint_t number_of_matches = 0; 1149 1150 for (i = 0; dl.dl_trans_map_tbl[i].transport_protocol != -1; i++) { 1151 if (transport_protocol == 1152 (uint_t)dl.dl_trans_map_tbl[i].transport_protocol) { 1153 number_of_matches++; 1154 dl.dl_match_fn(dl.dl_trans_map_tbl[i].network_protocol); 1155 pf_check_vlan_tag(ENCAP_ETHERTYPE_OFF/2); 1156 pf_compare_value(dl.dl_trans_map_tbl[i].offset + 1157 dl.dl_link_header_len, 1, 1158 transport_protocol); 1159 pf_emit(ENF_AND); 1160 if (number_of_matches > 1) { 1161 /* 1162 * Since we have two or more matches, in 1163 * order to have a correct and complete 1164 * program we need to OR the result of 1165 * each block of comparisons together. 1166 */ 1167 pf_emit(ENF_OR); 1168 } 1169 } 1170 } 1171 } 1172 1173 static void 1174 pf_matchfn(const char *proto) 1175 { 1176 int i; 1177 1178 for (i = 0; dl.dl_net_map_tbl[i].nmt_val != -1; i++) { 1179 if (strcmp(proto, dl.dl_net_map_tbl[i].nmt_name) == 0) { 1180 dl.dl_match_fn(dl.dl_net_map_tbl[i].nmt_val); 1181 break; 1182 } 1183 } 1184 } 1185 1186 static void 1187 pf_primary() 1188 { 1189 for (;;) { 1190 if (tokentype == FIELD) 1191 break; 1192 1193 if (EQ("ip")) { 1194 pf_matchfn("ip"); 1195 opstack++; 1196 next(); 1197 break; 1198 } 1199 1200 if (EQ("ip6")) { 1201 pf_matchfn("ip6"); 1202 opstack++; 1203 next(); 1204 break; 1205 } 1206 1207 if (EQ("pppoe")) { 1208 pf_matchfn("pppoe"); 1209 pf_match_ethertype(ETHERTYPE_PPPOES); 1210 pf_emit(ENF_OR); 1211 opstack++; 1212 next(); 1213 break; 1214 } 1215 1216 if (EQ("pppoed")) { 1217 pf_matchfn("pppoed"); 1218 opstack++; 1219 next(); 1220 break; 1221 } 1222 1223 if (EQ("pppoes")) { 1224 pf_matchfn("pppoes"); 1225 opstack++; 1226 next(); 1227 break; 1228 } 1229 1230 if (EQ("arp")) { 1231 pf_matchfn("arp"); 1232 opstack++; 1233 next(); 1234 break; 1235 } 1236 1237 if (EQ("vlan")) { 1238 pf_matchfn("vlan"); 1239 pf_compare_value_mask_neq(VLAN_ID_OFFSET, 2, 1240 0, VLAN_ID_MASK); 1241 pf_emit(ENF_AND); 1242 opstack++; 1243 next(); 1244 break; 1245 } 1246 1247 if (EQ("vlan-id")) { 1248 next(); 1249 if (tokentype != NUMBER) 1250 pr_err("VLAN ID expected"); 1251 pf_matchfn("vlan-id"); 1252 pf_compare_value_mask(VLAN_ID_OFFSET, 2, tokenval, 1253 VLAN_ID_MASK); 1254 pf_emit(ENF_AND); 1255 opstack++; 1256 next(); 1257 break; 1258 } 1259 1260 if (EQ("rarp")) { 1261 pf_matchfn("rarp"); 1262 opstack++; 1263 next(); 1264 break; 1265 } 1266 1267 if (EQ("tcp")) { 1268 pf_check_transport_protocol(IPPROTO_TCP); 1269 opstack++; 1270 next(); 1271 break; 1272 } 1273 1274 if (EQ("udp")) { 1275 pf_check_transport_protocol(IPPROTO_UDP); 1276 opstack++; 1277 next(); 1278 break; 1279 } 1280 1281 if (EQ("ospf")) { 1282 pf_check_transport_protocol(IPPROTO_OSPF); 1283 opstack++; 1284 next(); 1285 break; 1286 } 1287 1288 1289 if (EQ("sctp")) { 1290 pf_check_transport_protocol(IPPROTO_SCTP); 1291 opstack++; 1292 next(); 1293 break; 1294 } 1295 1296 if (EQ("icmp")) { 1297 pf_check_transport_protocol(IPPROTO_ICMP); 1298 opstack++; 1299 next(); 1300 break; 1301 } 1302 1303 if (EQ("icmp6")) { 1304 pf_check_transport_protocol(IPPROTO_ICMPV6); 1305 opstack++; 1306 next(); 1307 break; 1308 } 1309 1310 if (EQ("ip-in-ip")) { 1311 pf_check_transport_protocol(IPPROTO_ENCAP); 1312 opstack++; 1313 next(); 1314 break; 1315 } 1316 1317 if (EQ("esp")) { 1318 pf_check_transport_protocol(IPPROTO_ESP); 1319 opstack++; 1320 next(); 1321 break; 1322 } 1323 1324 if (EQ("ah")) { 1325 pf_check_transport_protocol(IPPROTO_AH); 1326 opstack++; 1327 next(); 1328 break; 1329 } 1330 1331 if (EQ("(")) { 1332 inBrace++; 1333 next(); 1334 pf_expression(); 1335 if (EQ(")")) { 1336 if (inBrace) 1337 inBraceOR--; 1338 inBrace--; 1339 next(); 1340 } 1341 break; 1342 } 1343 1344 if (EQ("to") || EQ("dst")) { 1345 dir = TO; 1346 next(); 1347 continue; 1348 } 1349 1350 if (EQ("from") || EQ("src")) { 1351 dir = FROM; 1352 next(); 1353 continue; 1354 } 1355 1356 if (EQ("ether")) { 1357 eaddr = 1; 1358 next(); 1359 continue; 1360 } 1361 1362 if (EQ("inet")) { 1363 next(); 1364 if (EQ("host")) 1365 next(); 1366 if (tokentype != ALPHA && tokentype != ADDR_IP) 1367 pr_err("host/IPv4 addr expected after inet"); 1368 pf_ipaddr_match(dir, token, IPV4_ONLY); 1369 opstack++; 1370 next(); 1371 break; 1372 } 1373 1374 if (EQ("inet6")) { 1375 next(); 1376 if (EQ("host")) 1377 next(); 1378 if (tokentype != ALPHA && tokentype != ADDR_IP6) 1379 pr_err("host/IPv6 addr expected after inet6"); 1380 pf_ipaddr_match(dir, token, IPV6_ONLY); 1381 opstack++; 1382 next(); 1383 break; 1384 } 1385 1386 if (EQ("proto")) { 1387 next(); 1388 if (tokentype != NUMBER) 1389 pr_err("IP proto type expected"); 1390 pf_check_vlan_tag(ENCAP_ETHERTYPE_OFF/2); 1391 pf_compare_value( 1392 IPV4_TYPE_HEADER_OFFSET + dl.dl_link_header_len, 1, 1393 tokenval); 1394 opstack++; 1395 next(); 1396 break; 1397 } 1398 1399 if (EQ("broadcast")) { 1400 pf_clear_offset_register(); 1401 pf_compare_value(dl.dl_link_dest_offset, 4, 0xffffffff); 1402 opstack++; 1403 next(); 1404 break; 1405 } 1406 1407 if (EQ("multicast")) { 1408 pf_clear_offset_register(); 1409 pf_compare_value_mask( 1410 dl.dl_link_dest_offset, 1, 0x01, 0x01); 1411 opstack++; 1412 next(); 1413 break; 1414 } 1415 1416 if (EQ("ethertype")) { 1417 next(); 1418 if (tokentype != NUMBER) 1419 pr_err("ether type expected"); 1420 pf_match_ethertype(tokenval); 1421 opstack++; 1422 next(); 1423 break; 1424 } 1425 1426 if (EQ("net") || EQ("dstnet") || EQ("srcnet")) { 1427 if (EQ("dstnet")) 1428 dir = TO; 1429 else if (EQ("srcnet")) 1430 dir = FROM; 1431 next(); 1432 pf_netaddr_match(dir, token); 1433 dir = ANY; 1434 opstack++; 1435 next(); 1436 break; 1437 } 1438 1439 if (EQ("zone")) { 1440 next(); 1441 if (tokentype != NUMBER) 1442 pr_err("zoneid expected after inet"); 1443 pf_match_zone(dir, BE_64((uint64_t)(tokenval))); 1444 opstack++; 1445 next(); 1446 break; 1447 } 1448 1449 /* 1450 * Give up on anything that's obviously 1451 * not a primary. 1452 */ 1453 if (EQ("and") || EQ("or") || 1454 EQ("not") || EQ("decnet") || EQ("apple") || 1455 EQ("length") || EQ("less") || EQ("greater") || 1456 EQ("port") || EQ("srcport") || EQ("dstport") || 1457 EQ("rpc") || EQ("gateway") || EQ("nofrag") || 1458 EQ("bootp") || EQ("dhcp") || EQ("dhcp6") || 1459 EQ("slp") || EQ("ldap")) { 1460 break; 1461 } 1462 1463 if (EQ("host") || EQ("between") || 1464 tokentype == ALPHA || /* assume its a hostname */ 1465 tokentype == ADDR_IP || 1466 tokentype == ADDR_IP6 || 1467 tokentype == ADDR_ETHER) { 1468 if (EQ("host") || EQ("between")) 1469 next(); 1470 if (eaddr || tokentype == ADDR_ETHER) { 1471 pf_etheraddr_match(dir, token); 1472 } else if (tokentype == ALPHA) { 1473 pf_ipaddr_match(dir, token, IPV4_AND_IPV6); 1474 } else if (tokentype == ADDR_IP) { 1475 pf_ipaddr_match(dir, token, IPV4_ONLY); 1476 } else { 1477 pf_ipaddr_match(dir, token, IPV6_ONLY); 1478 } 1479 dir = ANY; 1480 eaddr = 0; 1481 opstack++; 1482 next(); 1483 break; 1484 } 1485 1486 break; /* unknown token */ 1487 } 1488 } 1489 1490 static void 1491 pf_alternation() 1492 { 1493 int s = opstack; 1494 1495 pf_primary(); 1496 for (;;) { 1497 if (EQ("and")) 1498 next(); 1499 pf_primary(); 1500 if (opstack != s + 2) 1501 break; 1502 pf_emit(ENF_AND); 1503 opstack--; 1504 } 1505 } 1506 1507 static void 1508 pf_expression() 1509 { 1510 pf_alternation(); 1511 while (EQ("or") || EQ(",")) { 1512 if (inBrace) 1513 inBraceOR++; 1514 else 1515 foundOR++; 1516 next(); 1517 pf_alternation(); 1518 pf_emit(ENF_OR); 1519 opstack--; 1520 } 1521 } 1522 1523 /* 1524 * Attempt to compile the expression 1525 * in the string "e". If we can generate 1526 * pf code for it then return 1 - otherwise 1527 * return 0 and leave it up to the user-level 1528 * filter. 1529 */ 1530 int 1531 pf_compile(e, print) 1532 char *e; 1533 int print; 1534 { 1535 char *argstr; 1536 char *sav_str, *ptr, *sav_ptr; 1537 int inBr = 0, aheadOR = 0; 1538 1539 argstr = strdup(e); 1540 sav_str = e; 1541 tkp = argstr; 1542 dir = ANY; 1543 1544 pfp = &pf.Pf_Filter[0]; 1545 if (setjmp(env)) { 1546 return (0); 1547 } 1548 1549 /* 1550 * Set media specific packet offsets that this code uses. 1551 */ 1552 if (interface->mac_type == DL_ETHER) { 1553 dl.dl_type = DL_ETHER; 1554 dl.dl_match_fn = pf_match_ethertype; 1555 dl.dl_trans_map_tbl = ether_transport_mapping_table; 1556 dl.dl_net_map_tbl = ether_network_mapping_table; 1557 dl.dl_link_header_len = 14; 1558 dl.dl_link_type_offset = 12; 1559 dl.dl_link_dest_offset = 0; 1560 dl.dl_link_src_offset = 6; 1561 dl.dl_link_addr_len = 6; 1562 } 1563 1564 if (interface->mac_type == DL_IB) { 1565 dl.dl_type = DL_IB; 1566 dl.dl_link_header_len = 4; 1567 dl.dl_link_type_offset = 0; 1568 dl.dl_link_dest_offset = dl.dl_link_src_offset = -1; 1569 dl.dl_link_addr_len = 20; 1570 dl.dl_match_fn = pf_match_ibtype; 1571 dl.dl_trans_map_tbl = ib_transport_mapping_table; 1572 dl.dl_net_map_tbl = ib_network_mapping_table; 1573 } 1574 1575 if (interface->mac_type == DL_IPNET) { 1576 dl.dl_type = DL_IPNET; 1577 dl.dl_link_header_len = 24; 1578 dl.dl_link_type_offset = 0; 1579 dl.dl_link_dest_offset = dl.dl_link_src_offset = -1; 1580 dl.dl_link_addr_len = -1; 1581 dl.dl_match_fn = pf_match_ipnettype; 1582 dl.dl_trans_map_tbl = ipnet_transport_mapping_table; 1583 dl.dl_net_map_tbl = ipnet_network_mapping_table; 1584 } 1585 1586 next(); 1587 pf_expression(); 1588 1589 if (tokentype != EOL) { 1590 /* 1591 * The idea here is to do as much filtering as possible in 1592 * the kernel. So even if we find a token we don't understand, 1593 * we try to see if we can still set up a portion of the filter 1594 * in the kernel and use the userland filter to filter the 1595 * remaining stuff. Obviously, if our filter expression is of 1596 * type A AND B, we can filter A in kernel and then apply B 1597 * to the packets that got through. The same is not true for 1598 * a filter of type A OR B. We can't apply A first and then B 1599 * on the packets filtered through A. 1600 * 1601 * (We need to keep track of the fact when we find an OR, 1602 * and the fact that we are inside brackets when we find OR. 1603 * The variable 'foundOR' tells us if there was an OR behind, 1604 * 'inBraceOR' tells us if we found an OR before we could find 1605 * the end brace i.e. ')', and variable 'aheadOR' checks if 1606 * there is an OR in the expression ahead. if either of these 1607 * cases become true, we can't split the filtering) 1608 */ 1609 1610 if (foundOR || inBraceOR) { 1611 /* FORGET IN KERNEL FILTERING */ 1612 return (0); 1613 } else { 1614 1615 /* CHECK IF NO OR AHEAD */ 1616 sav_ptr = (char *)((uintptr_t)sav_str + 1617 (uintptr_t)sav_tkp - 1618 (uintptr_t)argstr); 1619 ptr = sav_ptr; 1620 while (*ptr != '\0') { 1621 switch (*ptr) { 1622 case '(': 1623 inBr++; 1624 break; 1625 case ')': 1626 inBr--; 1627 break; 1628 case 'o': 1629 case 'O': 1630 if ((*(ptr + 1) == 'R' || 1631 *(ptr + 1) == 'r') && !inBr) 1632 aheadOR = 1; 1633 break; 1634 case ',': 1635 if (!inBr) 1636 aheadOR = 1; 1637 break; 1638 } 1639 ptr++; 1640 } 1641 if (!aheadOR) { 1642 /* NO OR AHEAD, SPLIT UP THE FILTERING */ 1643 pf.Pf_FilterLen = pfp - &pf.Pf_Filter[0]; 1644 pf.Pf_Priority = 5; 1645 if (print) { 1646 pf_codeprint(&pf.Pf_Filter[0], 1647 pf.Pf_FilterLen); 1648 } 1649 compile(sav_ptr, print); 1650 return (2); 1651 } else 1652 return (0); 1653 } 1654 } 1655 1656 pf.Pf_FilterLen = pfp - &pf.Pf_Filter[0]; 1657 pf.Pf_Priority = 5; /* unimportant, so long as > 2 */ 1658 if (print) { 1659 pf_codeprint(&pf.Pf_Filter[0], pf.Pf_FilterLen); 1660 } 1661 return (1); 1662 } 1663