xref: /netbsd-src/sys/kern/uipc_domain.c (revision b7b7574d3bf8eeb51a1fa3977b59142ec6434a55)
1 /*	$NetBSD: uipc_domain.c,v 1.93 2014/04/23 17:05:18 pooka Exp $	*/
2 
3 /*
4  * Copyright (c) 1982, 1986, 1993
5  *	The Regents of the University of California.  All rights reserved.
6  *
7  * Redistribution and use in source and binary forms, with or without
8  * modification, are permitted provided that the following conditions
9  * are met:
10  * 1. Redistributions of source code must retain the above copyright
11  *    notice, this list of conditions and the following disclaimer.
12  * 2. Redistributions in binary form must reproduce the above copyright
13  *    notice, this list of conditions and the following disclaimer in the
14  *    documentation and/or other materials provided with the distribution.
15  * 3. Neither the name of the University nor the names of its contributors
16  *    may be used to endorse or promote products derived from this software
17  *    without specific prior written permission.
18  *
19  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
20  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
23  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29  * SUCH DAMAGE.
30  *
31  *	@(#)uipc_domain.c	8.3 (Berkeley) 2/14/95
32  */
33 
34 #include <sys/cdefs.h>
35 __KERNEL_RCSID(0, "$NetBSD: uipc_domain.c,v 1.93 2014/04/23 17:05:18 pooka Exp $");
36 
37 #include <sys/param.h>
38 #include <sys/socket.h>
39 #include <sys/socketvar.h>
40 #include <sys/protosw.h>
41 #include <sys/domain.h>
42 #include <sys/mbuf.h>
43 #include <sys/time.h>
44 #include <sys/kernel.h>
45 #include <sys/systm.h>
46 #include <sys/callout.h>
47 #include <sys/queue.h>
48 #include <sys/proc.h>
49 #include <sys/sysctl.h>
50 #include <sys/un.h>
51 #include <sys/unpcb.h>
52 #include <sys/file.h>
53 #include <sys/filedesc.h>
54 #include <sys/kauth.h>
55 #include <netinet/in.h>
56 
57 MALLOC_DECLARE(M_SOCKADDR);
58 
59 MALLOC_DEFINE(M_SOCKADDR, "sockaddr", "socket endpoints");
60 
61 void	pffasttimo(void *);
62 void	pfslowtimo(void *);
63 
64 struct domainhead domains = STAILQ_HEAD_INITIALIZER(domains);
65 static struct domain *domain_array[AF_MAX];
66 
67 callout_t pffasttimo_ch, pfslowtimo_ch;
68 
69 /*
70  * Current time values for fast and slow timeouts.  We can use u_int
71  * relatively safely.  The fast timer will roll over in 27 years and
72  * the slow timer in 68 years.
73  */
74 u_int	pfslowtimo_now;
75 u_int	pffasttimo_now;
76 
77 static struct sysctllog *domain_sysctllog;
78 static void sysctl_net_setup(void);
79 
80 /* ensure successful linkage even without any domains in link sets */
81 static struct domain domain_dummy;
82 __link_set_add_rodata(domains,domain_dummy);
83 
84 void
85 domaininit(bool addroute)
86 {
87 	__link_set_decl(domains, struct domain);
88 	struct domain * const * dpp;
89 	struct domain *rt_domain = NULL;
90 
91 	sysctl_net_setup();
92 
93 	/*
94 	 * Add all of the domains.  Make sure the PF_ROUTE
95 	 * domain is added last.
96 	 */
97 	__link_set_foreach(dpp, domains) {
98 		if (*dpp == &domain_dummy)
99 			continue;
100 		if ((*dpp)->dom_family == PF_ROUTE)
101 			rt_domain = *dpp;
102 		else
103 			domain_attach(*dpp);
104 	}
105 	if (rt_domain && addroute)
106 		domain_attach(rt_domain);
107 
108 	callout_init(&pffasttimo_ch, CALLOUT_MPSAFE);
109 	callout_init(&pfslowtimo_ch, CALLOUT_MPSAFE);
110 
111 	callout_reset(&pffasttimo_ch, 1, pffasttimo, NULL);
112 	callout_reset(&pfslowtimo_ch, 1, pfslowtimo, NULL);
113 }
114 
115 void
116 domain_attach(struct domain *dp)
117 {
118 	const struct protosw *pr;
119 
120 	STAILQ_INSERT_TAIL(&domains, dp, dom_link);
121 	if (dp->dom_family < __arraycount(domain_array))
122 		domain_array[dp->dom_family] = dp;
123 
124 	if (dp->dom_init)
125 		(*dp->dom_init)();
126 
127 #ifdef MBUFTRACE
128 	if (dp->dom_mowner.mo_name[0] == '\0') {
129 		strncpy(dp->dom_mowner.mo_name, dp->dom_name,
130 		    sizeof(dp->dom_mowner.mo_name));
131 		MOWNER_ATTACH(&dp->dom_mowner);
132 	}
133 #endif
134 	for (pr = dp->dom_protosw; pr < dp->dom_protoswNPROTOSW; pr++) {
135 		if (pr->pr_init)
136 			(*pr->pr_init)();
137 	}
138 
139 	if (max_linkhdr < 16)		/* XXX */
140 		max_linkhdr = 16;
141 	max_hdr = max_linkhdr + max_protohdr;
142 	max_datalen = MHLEN - max_hdr;
143 }
144 
145 struct domain *
146 pffinddomain(int family)
147 {
148 	struct domain *dp;
149 
150 	if (family < __arraycount(domain_array) && domain_array[family] != NULL)
151 		return domain_array[family];
152 
153 	DOMAIN_FOREACH(dp)
154 		if (dp->dom_family == family)
155 			return dp;
156 	return NULL;
157 }
158 
159 const struct protosw *
160 pffindtype(int family, int type)
161 {
162 	struct domain *dp;
163 	const struct protosw *pr;
164 
165 	dp = pffinddomain(family);
166 	if (dp == NULL)
167 		return NULL;
168 
169 	for (pr = dp->dom_protosw; pr < dp->dom_protoswNPROTOSW; pr++)
170 		if (pr->pr_type && pr->pr_type == type)
171 			return pr;
172 
173 	return NULL;
174 }
175 
176 const struct protosw *
177 pffindproto(int family, int protocol, int type)
178 {
179 	struct domain *dp;
180 	const struct protosw *pr;
181 	const struct protosw *maybe = NULL;
182 
183 	if (family == 0)
184 		return NULL;
185 
186 	dp = pffinddomain(family);
187 	if (dp == NULL)
188 		return NULL;
189 
190 	for (pr = dp->dom_protosw; pr < dp->dom_protoswNPROTOSW; pr++) {
191 		if ((pr->pr_protocol == protocol) && (pr->pr_type == type))
192 			return pr;
193 
194 		if (type == SOCK_RAW && pr->pr_type == SOCK_RAW &&
195 		    pr->pr_protocol == 0 && maybe == NULL)
196 			maybe = pr;
197 	}
198 	return maybe;
199 }
200 
201 void *
202 sockaddr_addr(struct sockaddr *sa, socklen_t *slenp)
203 {
204 	const struct domain *dom;
205 
206 	if ((dom = pffinddomain(sa->sa_family)) == NULL ||
207 	    dom->dom_sockaddr_addr == NULL)
208 		return NULL;
209 
210 	return (*dom->dom_sockaddr_addr)(sa, slenp);
211 }
212 
213 const void *
214 sockaddr_const_addr(const struct sockaddr *sa, socklen_t *slenp)
215 {
216 	const struct domain *dom;
217 
218 	if ((dom = pffinddomain(sa->sa_family)) == NULL ||
219 	    dom->dom_sockaddr_const_addr == NULL)
220 		return NULL;
221 
222 	return (*dom->dom_sockaddr_const_addr)(sa, slenp);
223 }
224 
225 const struct sockaddr *
226 sockaddr_any_by_family(int family)
227 {
228 	const struct domain *dom;
229 
230 	if ((dom = pffinddomain(family)) == NULL)
231 		return NULL;
232 
233 	return dom->dom_sa_any;
234 }
235 
236 const struct sockaddr *
237 sockaddr_any(const struct sockaddr *sa)
238 {
239 	return sockaddr_any_by_family(sa->sa_family);
240 }
241 
242 const void *
243 sockaddr_anyaddr(const struct sockaddr *sa, socklen_t *slenp)
244 {
245 	const struct sockaddr *any;
246 
247 	if ((any = sockaddr_any(sa)) == NULL)
248 		return NULL;
249 
250 	return sockaddr_const_addr(any, slenp);
251 }
252 
253 struct sockaddr *
254 sockaddr_alloc(sa_family_t af, socklen_t socklen, int flags)
255 {
256 	struct sockaddr *sa;
257 	socklen_t reallen = MAX(socklen, offsetof(struct sockaddr, sa_data[0]));
258 
259 	if ((sa = malloc(reallen, M_SOCKADDR, flags)) == NULL)
260 		return NULL;
261 
262 	sa->sa_family = af;
263 	sa->sa_len = reallen;
264 	return sa;
265 }
266 
267 struct sockaddr *
268 sockaddr_copy(struct sockaddr *dst, socklen_t socklen,
269     const struct sockaddr *src)
270 {
271 	if (__predict_false(socklen < src->sa_len)) {
272 		panic("%s: source too long, %d < %d bytes", __func__, socklen,
273 		    src->sa_len);
274 	}
275 	return memcpy(dst, src, src->sa_len);
276 }
277 
278 struct sockaddr *
279 sockaddr_externalize(struct sockaddr *dst, socklen_t socklen,
280     const struct sockaddr *src)
281 {
282 	struct domain *dom;
283 
284 	dom = pffinddomain(src->sa_family);
285 
286 	if (dom != NULL && dom->dom_sockaddr_externalize != NULL)
287 		return (*dom->dom_sockaddr_externalize)(dst, socklen, src);
288 
289 	return sockaddr_copy(dst, socklen, src);
290 }
291 
292 int
293 sockaddr_cmp(const struct sockaddr *sa1, const struct sockaddr *sa2)
294 {
295 	int len, rc;
296 	struct domain *dom;
297 
298 	if (sa1->sa_family != sa2->sa_family)
299 		return sa1->sa_family - sa2->sa_family;
300 
301 	dom = pffinddomain(sa1->sa_family);
302 
303 	if (dom != NULL && dom->dom_sockaddr_cmp != NULL)
304 		return (*dom->dom_sockaddr_cmp)(sa1, sa2);
305 
306 	len = MIN(sa1->sa_len, sa2->sa_len);
307 
308 	if (dom == NULL || dom->dom_sa_cmplen == 0) {
309 		if ((rc = memcmp(sa1, sa2, len)) != 0)
310 			return rc;
311 		return sa1->sa_len - sa2->sa_len;
312 	}
313 
314 	if ((rc = memcmp((const char *)sa1 + dom->dom_sa_cmpofs,
315 		         (const char *)sa2 + dom->dom_sa_cmpofs,
316 			 MIN(dom->dom_sa_cmplen,
317 			     len - MIN(len, dom->dom_sa_cmpofs)))) != 0)
318 		return rc;
319 
320 	return MIN(dom->dom_sa_cmplen + dom->dom_sa_cmpofs, sa1->sa_len) -
321 	       MIN(dom->dom_sa_cmplen + dom->dom_sa_cmpofs, sa2->sa_len);
322 }
323 
324 struct sockaddr *
325 sockaddr_dup(const struct sockaddr *src, int flags)
326 {
327 	struct sockaddr *dst;
328 
329 	if ((dst = sockaddr_alloc(src->sa_family, src->sa_len, flags)) == NULL)
330 		return NULL;
331 
332 	return sockaddr_copy(dst, dst->sa_len, src);
333 }
334 
335 void
336 sockaddr_free(struct sockaddr *sa)
337 {
338 	free(sa, M_SOCKADDR);
339 }
340 
341 void
342 sockaddr_format(const struct sockaddr *sa, char *buf, size_t len)
343 {
344 	const struct sockaddr_un *sun = (const struct sockaddr_un *)sa;
345 	const struct sockaddr_in *sin = (const struct sockaddr_in *)sa;
346 	const struct sockaddr_in6 *sin6 = (const struct sockaddr_in6 *)sa;
347 	const uint8_t *data;
348 	size_t data_len;
349 
350 	if (sa == NULL) {
351 		strlcpy(buf, "(null)", len);
352 		return;
353 	}
354 
355 	switch (sa->sa_family) {
356 	default:
357 		snprintf(buf, len, "(unknown socket family %d)",
358 		    (int)sa->sa_family);
359 		return;
360 	case AF_LOCAL:
361 		strlcpy(buf, "unix:", len);
362 		strlcat(buf, sun->sun_path, len);
363 		return;
364 	case AF_INET:
365 		strlcpy(buf, "inet:", len);
366 		if (len < 6)
367 			return;
368 		buf += 5;
369 		len -= 5;
370 		data = (const uint8_t *)&sin->sin_addr;
371 		data_len = sizeof(sin->sin_addr);
372 		break;
373 	case AF_INET6:
374 		strlcpy(buf, "inet6:", len);
375 		if (len < 7)
376 			return;
377 		buf += 6;
378 		len -= 6;
379 		data = (const uint8_t *)&sin6->sin6_addr;
380 		data_len = sizeof(sin6->sin6_addr);
381 		break;
382 	}
383 	for (;;) {
384 		if (--len == 0)
385 			break;
386 
387 		uint8_t hi = *data >> 4;
388 		uint8_t lo = *data & 15;
389 		--data_len;
390 		++data;
391 		*buf++ = hi + (hi >= 10 ? 'a' - 10 : '0');
392 		if (--len == 0)
393 			break;
394 		*buf++ = lo + (lo >= 10 ? 'a' - 10 : '0');
395 		if (data_len == 0)
396 			break;
397 	}
398 	*buf = 0;
399 }
400 
401 /*
402  * sysctl helper to stuff PF_LOCAL pcbs into sysctl structures
403  */
404 static void
405 sysctl_dounpcb(struct kinfo_pcb *pcb, const struct socket *so)
406 {
407 	struct unpcb *unp = sotounpcb(so);
408 	struct sockaddr_un *un = unp->unp_addr;
409 
410 	memset(pcb, 0, sizeof(*pcb));
411 
412 	pcb->ki_family = so->so_proto->pr_domain->dom_family;
413 	pcb->ki_type = so->so_proto->pr_type;
414 	pcb->ki_protocol = so->so_proto->pr_protocol;
415 	pcb->ki_pflags = unp->unp_flags;
416 
417 	pcb->ki_pcbaddr = PTRTOUINT64(unp);
418 	/* pcb->ki_ppcbaddr = unp has no ppcb... */
419 	pcb->ki_sockaddr = PTRTOUINT64(so);
420 
421 	pcb->ki_sostate = so->so_state;
422 	/* pcb->ki_prstate = unp has no state... */
423 
424 	pcb->ki_rcvq = so->so_rcv.sb_cc;
425 	pcb->ki_sndq = so->so_snd.sb_cc;
426 
427 	un = (struct sockaddr_un *)pcb->ki_spad;
428 	/*
429 	 * local domain sockets may bind without having a local
430 	 * endpoint.  bleah!
431 	 */
432 	if (unp->unp_addr != NULL) {
433 		/*
434 		 * We've added one to sun_len when allocating to
435 		 * hold terminating NUL which we want here.  See
436 		 * makeun().
437 		 */
438 		memcpy(un, unp->unp_addr,
439 		    min(sizeof(pcb->ki_spad), unp->unp_addr->sun_len + 1));
440 	}
441 	else {
442 		un->sun_len = offsetof(struct sockaddr_un, sun_path);
443 		un->sun_family = pcb->ki_family;
444 	}
445 	if (unp->unp_conn != NULL) {
446 		un = (struct sockaddr_un *)pcb->ki_dpad;
447 		if (unp->unp_conn->unp_addr != NULL) {
448 			memcpy(un, unp->unp_conn->unp_addr,
449 			    min(sizeof(pcb->ki_dpad), unp->unp_conn->unp_addr->sun_len + 1));
450 		}
451 		else {
452 			un->sun_len = offsetof(struct sockaddr_un, sun_path);
453 			un->sun_family = pcb->ki_family;
454 		}
455 	}
456 
457 	pcb->ki_inode = unp->unp_ino;
458 	pcb->ki_vnode = PTRTOUINT64(unp->unp_vnode);
459 	pcb->ki_conn = PTRTOUINT64(unp->unp_conn);
460 	pcb->ki_refs = PTRTOUINT64(unp->unp_refs);
461 	pcb->ki_nextref = PTRTOUINT64(unp->unp_nextref);
462 }
463 
464 static int
465 sysctl_unpcblist(SYSCTLFN_ARGS)
466 {
467 	struct file *fp, *dfp;
468 	struct socket *so;
469 	struct kinfo_pcb pcb;
470 	char *dp;
471 	size_t len, needed, elem_size, out_size;
472 	int error, elem_count, pf, type;
473 
474 	if (namelen == 1 && name[0] == CTL_QUERY)
475 		return sysctl_query(SYSCTLFN_CALL(rnode));
476 
477 	if (namelen != 4)
478 		return EINVAL;
479 
480 	if (oldp != NULL) {
481 		len = *oldlenp;
482 		elem_size = name[2];
483 		elem_count = name[3];
484 		if (elem_size != sizeof(pcb))
485 			return EINVAL;
486 	} else {
487 		len = 0;
488 		elem_size = sizeof(pcb);
489 		elem_count = INT_MAX;
490 	}
491 	error = 0;
492 	dp = oldp;
493 	out_size = elem_size;
494 	needed = 0;
495 
496 	if (name - oname != 4)
497 		return EINVAL;
498 
499 	pf = oname[1];
500 	type = oname[2];
501 
502 	/*
503 	 * allocate dummy file descriptor to make position in list.
504 	 */
505 	sysctl_unlock();
506 	if ((dfp = fgetdummy()) == NULL) {
507 	 	sysctl_relock();
508 		return ENOMEM;
509 	}
510 
511 	/*
512 	 * there's no "list" of local domain sockets, so we have
513 	 * to walk the file list looking for them.  :-/
514 	 */
515 	mutex_enter(&filelist_lock);
516 	LIST_FOREACH(fp, &filehead, f_list) {
517 		if (fp->f_count == 0 || fp->f_type != DTYPE_SOCKET ||
518 		    fp->f_data == NULL)
519 			continue;
520 		so = (struct socket *)fp->f_data;
521 		if (so->so_type != type)
522 			continue;
523 		if (so->so_proto->pr_domain->dom_family != pf)
524 			continue;
525 		if (kauth_authorize_network(l->l_cred, KAUTH_NETWORK_SOCKET,
526 		    KAUTH_REQ_NETWORK_SOCKET_CANSEE, so, NULL, NULL) != 0)
527 			continue;
528 		if (len >= elem_size && elem_count > 0) {
529 			mutex_enter(&fp->f_lock);
530 			fp->f_count++;
531 			mutex_exit(&fp->f_lock);
532 			LIST_INSERT_AFTER(fp, dfp, f_list);
533 			mutex_exit(&filelist_lock);
534 			sysctl_dounpcb(&pcb, so);
535 			error = copyout(&pcb, dp, out_size);
536 			closef(fp);
537 			mutex_enter(&filelist_lock);
538 			LIST_REMOVE(dfp, f_list);
539 			if (error)
540 				break;
541 			dp += elem_size;
542 			len -= elem_size;
543 		}
544 		needed += elem_size;
545 		if (elem_count > 0 && elem_count != INT_MAX)
546 			elem_count--;
547 	}
548 	mutex_exit(&filelist_lock);
549 	fputdummy(dfp);
550  	*oldlenp = needed;
551 	if (oldp == NULL)
552 		*oldlenp += PCB_SLOP * sizeof(struct kinfo_pcb);
553  	sysctl_relock();
554 
555 	return error;
556 }
557 
558 static void
559 sysctl_net_setup(void)
560 {
561 
562 	KASSERT(domain_sysctllog == NULL);
563 	sysctl_createv(&domain_sysctllog, 0, NULL, NULL,
564 		       CTLFLAG_PERMANENT,
565 		       CTLTYPE_NODE, "local",
566 		       SYSCTL_DESCR("PF_LOCAL related settings"),
567 		       NULL, 0, NULL, 0,
568 		       CTL_NET, PF_LOCAL, CTL_EOL);
569 	sysctl_createv(&domain_sysctllog, 0, NULL, NULL,
570 		       CTLFLAG_PERMANENT,
571 		       CTLTYPE_NODE, "stream",
572 		       SYSCTL_DESCR("SOCK_STREAM settings"),
573 		       NULL, 0, NULL, 0,
574 		       CTL_NET, PF_LOCAL, SOCK_STREAM, CTL_EOL);
575 	sysctl_createv(&domain_sysctllog, 0, NULL, NULL,
576 		       CTLFLAG_PERMANENT,
577 		       CTLTYPE_NODE, "seqpacket",
578 		       SYSCTL_DESCR("SOCK_SEQPACKET settings"),
579 		       NULL, 0, NULL, 0,
580 		       CTL_NET, PF_LOCAL, SOCK_SEQPACKET, CTL_EOL);
581 	sysctl_createv(&domain_sysctllog, 0, NULL, NULL,
582 		       CTLFLAG_PERMANENT,
583 		       CTLTYPE_NODE, "dgram",
584 		       SYSCTL_DESCR("SOCK_DGRAM settings"),
585 		       NULL, 0, NULL, 0,
586 		       CTL_NET, PF_LOCAL, SOCK_DGRAM, CTL_EOL);
587 
588 	sysctl_createv(&domain_sysctllog, 0, NULL, NULL,
589 		       CTLFLAG_PERMANENT,
590 		       CTLTYPE_STRUCT, "pcblist",
591 		       SYSCTL_DESCR("SOCK_STREAM protocol control block list"),
592 		       sysctl_unpcblist, 0, NULL, 0,
593 		       CTL_NET, PF_LOCAL, SOCK_STREAM, CTL_CREATE, CTL_EOL);
594 	sysctl_createv(&domain_sysctllog, 0, NULL, NULL,
595 		       CTLFLAG_PERMANENT,
596 		       CTLTYPE_STRUCT, "pcblist",
597 		       SYSCTL_DESCR("SOCK_SEQPACKET protocol control "
598 				    "block list"),
599 		       sysctl_unpcblist, 0, NULL, 0,
600 		       CTL_NET, PF_LOCAL, SOCK_SEQPACKET, CTL_CREATE, CTL_EOL);
601 	sysctl_createv(&domain_sysctllog, 0, NULL, NULL,
602 		       CTLFLAG_PERMANENT,
603 		       CTLTYPE_STRUCT, "pcblist",
604 		       SYSCTL_DESCR("SOCK_DGRAM protocol control block list"),
605 		       sysctl_unpcblist, 0, NULL, 0,
606 		       CTL_NET, PF_LOCAL, SOCK_DGRAM, CTL_CREATE, CTL_EOL);
607 }
608 
609 void
610 pfctlinput(int cmd, const struct sockaddr *sa)
611 {
612 	struct domain *dp;
613 	const struct protosw *pr;
614 
615 	DOMAIN_FOREACH(dp) {
616 		for (pr = dp->dom_protosw; pr < dp->dom_protoswNPROTOSW; pr++) {
617 			if (pr->pr_ctlinput != NULL)
618 				(*pr->pr_ctlinput)(cmd, sa, NULL);
619 		}
620 	}
621 }
622 
623 void
624 pfctlinput2(int cmd, const struct sockaddr *sa, void *ctlparam)
625 {
626 	struct domain *dp;
627 	const struct protosw *pr;
628 
629 	if (sa == NULL)
630 		return;
631 
632 	DOMAIN_FOREACH(dp) {
633 		/*
634 		 * the check must be made by xx_ctlinput() anyways, to
635 		 * make sure we use data item pointed to by ctlparam in
636 		 * correct way.  the following check is made just for safety.
637 		 */
638 		if (dp->dom_family != sa->sa_family)
639 			continue;
640 
641 		for (pr = dp->dom_protosw; pr < dp->dom_protoswNPROTOSW; pr++) {
642 			if (pr->pr_ctlinput != NULL)
643 				(*pr->pr_ctlinput)(cmd, sa, ctlparam);
644 		}
645 	}
646 }
647 
648 void
649 pfslowtimo(void *arg)
650 {
651 	struct domain *dp;
652 	const struct protosw *pr;
653 
654 	pfslowtimo_now++;
655 
656 	DOMAIN_FOREACH(dp) {
657 		for (pr = dp->dom_protosw; pr < dp->dom_protoswNPROTOSW; pr++)
658 			if (pr->pr_slowtimo)
659 				(*pr->pr_slowtimo)();
660 	}
661 	callout_schedule(&pfslowtimo_ch, hz / PR_SLOWHZ);
662 }
663 
664 void
665 pffasttimo(void *arg)
666 {
667 	struct domain *dp;
668 	const struct protosw *pr;
669 
670 	pffasttimo_now++;
671 
672 	DOMAIN_FOREACH(dp) {
673 		for (pr = dp->dom_protosw; pr < dp->dom_protoswNPROTOSW; pr++)
674 			if (pr->pr_fasttimo)
675 				(*pr->pr_fasttimo)();
676 	}
677 	callout_schedule(&pffasttimo_ch, hz / PR_FASTHZ);
678 }
679