xref: /openbsd-src/sys/net/pf_if.c (revision 50b7afb2c2c0993b0894d4e34bf857cb13ed9c80)
1 /*	$OpenBSD: pf_if.c,v 1.73 2014/07/12 18:44:22 tedu Exp $ */
2 
3 /*
4  * Copyright 2005 Henning Brauer <henning@openbsd.org>
5  * Copyright 2005 Ryan McBride <mcbride@openbsd.org>
6  * Copyright (c) 2001 Daniel Hartmeier
7  * Copyright (c) 2003 Cedric Berger
8  * All rights reserved.
9  *
10  * Redistribution and use in source and binary forms, with or without
11  * modification, are permitted provided that the following conditions
12  * are met:
13  *
14  *    - Redistributions of source code must retain the above copyright
15  *      notice, this list of conditions and the following disclaimer.
16  *    - Redistributions in binary form must reproduce the above
17  *      copyright notice, this list of conditions and the following
18  *      disclaimer in the documentation and/or other materials provided
19  *      with the distribution.
20  *
21  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
22  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
23  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
24  * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
25  * COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
26  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
27  * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
28  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
29  * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
31  * ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
32  * POSSIBILITY OF SUCH DAMAGE.
33  */
34 
35 #include <sys/param.h>
36 #include <sys/systm.h>
37 #include <sys/mbuf.h>
38 #include <sys/filio.h>
39 #include <sys/socket.h>
40 #include <sys/socketvar.h>
41 #include <sys/kernel.h>
42 #include <sys/device.h>
43 #include <sys/time.h>
44 #include <sys/pool.h>
45 #include <sys/syslog.h>
46 
47 #include <net/if.h>
48 #include <net/if_types.h>
49 
50 #include <netinet/in.h>
51 #include <netinet/in_systm.h>
52 #include <netinet/ip.h>
53 #include <netinet/ip_var.h>
54 
55 #include <net/pfvar.h>
56 
57 #ifdef INET6
58 #include <netinet/ip6.h>
59 #endif /* INET6 */
60 
61 struct pfi_kif		 *pfi_all = NULL;
62 struct pool		  pfi_addr_pl;
63 struct pfi_ifhead	  pfi_ifs;
64 long			  pfi_update = 1;
65 struct pfr_addr		 *pfi_buffer;
66 int			  pfi_buffer_cnt;
67 int			  pfi_buffer_max;
68 
69 void		 pfi_kif_update(struct pfi_kif *);
70 void		 pfi_dynaddr_update(struct pfi_dynaddr *dyn);
71 void		 pfi_table_update(struct pfr_ktable *, struct pfi_kif *,
72 		    int, int);
73 void		 pfi_kifaddr_update(void *);
74 void		 pfi_instance_add(struct ifnet *, int, int);
75 void		 pfi_address_add(struct sockaddr *, int, int);
76 int		 pfi_if_compare(struct pfi_kif *, struct pfi_kif *);
77 int		 pfi_skip_if(const char *, struct pfi_kif *);
78 int		 pfi_unmask(void *);
79 
80 RB_PROTOTYPE(pfi_ifhead, pfi_kif, pfik_tree, pfi_if_compare);
81 RB_GENERATE(pfi_ifhead, pfi_kif, pfik_tree, pfi_if_compare);
82 
83 #define PFI_BUFFER_MAX		0x10000
84 #define PFI_MTYPE		M_IFADDR
85 
86 void
87 pfi_initialize(void)
88 {
89 	if (pfi_all != NULL)	/* already initialized */
90 		return;
91 
92 	pool_init(&pfi_addr_pl, sizeof(struct pfi_dynaddr), 0, 0, 0,
93 	    "pfiaddrpl", &pool_allocator_nointr);
94 	pfi_buffer_max = 64;
95 	pfi_buffer = malloc(pfi_buffer_max * sizeof(*pfi_buffer),
96 	    PFI_MTYPE, M_WAITOK);
97 
98 	if ((pfi_all = pfi_kif_get(IFG_ALL)) == NULL)
99 		panic("pfi_kif_get for pfi_all failed");
100 }
101 
102 struct pfi_kif *
103 pfi_kif_get(const char *kif_name)
104 {
105 	struct pfi_kif		*kif;
106 	struct pfi_kif_cmp	 s;
107 
108 	bzero(&s, sizeof(s));
109 	strlcpy(s.pfik_name, kif_name, sizeof(s.pfik_name));
110 	if ((kif = RB_FIND(pfi_ifhead, &pfi_ifs, (struct pfi_kif *)&s)) != NULL)
111 		return (kif);
112 
113 	/* create new one */
114 	if ((kif = malloc(sizeof(*kif), PFI_MTYPE, M_NOWAIT|M_ZERO)) == NULL)
115 		return (NULL);
116 
117 	strlcpy(kif->pfik_name, kif_name, sizeof(kif->pfik_name));
118 	kif->pfik_tzero = time_second;
119 	TAILQ_INIT(&kif->pfik_dynaddrs);
120 
121 	if (!strcmp(kif->pfik_name, "any")) {
122 		/* both so it works in the ioctl and the regular case */
123 		kif->pfik_flags |= PFI_IFLAG_ANY;
124 		kif->pfik_flags_new |= PFI_IFLAG_ANY;
125 	}
126 
127 	RB_INSERT(pfi_ifhead, &pfi_ifs, kif);
128 	return (kif);
129 }
130 
131 void
132 pfi_kif_ref(struct pfi_kif *kif, enum pfi_kif_refs what)
133 {
134 	switch (what) {
135 	case PFI_KIF_REF_RULE:
136 		kif->pfik_rules++;
137 		break;
138 	case PFI_KIF_REF_STATE:
139 		kif->pfik_states++;
140 		break;
141 	case PFI_KIF_REF_ROUTE:
142 		kif->pfik_routes++;
143 		break;
144 	default:
145 		panic("pfi_kif_ref with unknown type");
146 	}
147 }
148 
149 void
150 pfi_kif_unref(struct pfi_kif *kif, enum pfi_kif_refs what)
151 {
152 	if (kif == NULL)
153 		return;
154 
155 	switch (what) {
156 	case PFI_KIF_REF_NONE:
157 		break;
158 	case PFI_KIF_REF_RULE:
159 		if (kif->pfik_rules <= 0) {
160 			DPFPRINTF(LOG_ERR,
161 			    "pfi_kif_unref: rules refcount <= 0");
162 			return;
163 		}
164 		kif->pfik_rules--;
165 		break;
166 	case PFI_KIF_REF_STATE:
167 		if (kif->pfik_states <= 0) {
168 			DPFPRINTF(LOG_ERR,
169 			    "pfi_kif_unref: state refcount <= 0");
170 			return;
171 		}
172 		kif->pfik_states--;
173 		break;
174 	case PFI_KIF_REF_ROUTE:
175 		if (kif->pfik_routes <= 0) {
176 			DPFPRINTF(LOG_ERR,
177 			    "pfi_kif_unref: state refcount <= 0");
178 			return;
179 		}
180 		kif->pfik_routes--;
181 		break;
182 	default:
183 		panic("pfi_kif_unref with unknown type");
184 	}
185 
186 	if (kif->pfik_ifp != NULL || kif->pfik_group != NULL || kif == pfi_all)
187 		return;
188 
189 	if (kif->pfik_rules || kif->pfik_states || kif->pfik_routes)
190 		return;
191 
192 	RB_REMOVE(pfi_ifhead, &pfi_ifs, kif);
193 	free(kif, PFI_MTYPE, 0);
194 }
195 
196 int
197 pfi_kif_match(struct pfi_kif *rule_kif, struct pfi_kif *packet_kif)
198 {
199 	struct ifg_list	*p;
200 
201 	if (rule_kif == NULL || rule_kif == packet_kif)
202 		return (1);
203 
204 	if (rule_kif->pfik_group != NULL)
205 		TAILQ_FOREACH(p, &packet_kif->pfik_ifp->if_groups, ifgl_next)
206 			if (p->ifgl_group == rule_kif->pfik_group)
207 				return (1);
208 
209 	if (rule_kif->pfik_flags & PFI_IFLAG_ANY && packet_kif->pfik_ifp &&
210 	    !(packet_kif->pfik_ifp->if_flags & IFF_LOOPBACK))
211 		return (1);
212 
213 	return (0);
214 }
215 
216 void
217 pfi_attach_ifnet(struct ifnet *ifp)
218 {
219 	struct pfi_kif		*kif;
220 	int			 s;
221 
222 	pfi_initialize();
223 	s = splsoftnet();
224 	pfi_update++;
225 	if ((kif = pfi_kif_get(ifp->if_xname)) == NULL)
226 		panic("pfi_kif_get failed");
227 
228 	kif->pfik_ifp = ifp;
229 	ifp->if_pf_kif = (caddr_t)kif;
230 
231 	if ((kif->pfik_ah_cookie = hook_establish(ifp->if_addrhooks, 1,
232 	    pfi_kifaddr_update, kif)) == NULL)
233 		panic("pfi_attach_ifnet: cannot allocate '%s' address hook",
234 		    ifp->if_xname);
235 
236 	pfi_kif_update(kif);
237 
238 	splx(s);
239 }
240 
241 void
242 pfi_detach_ifnet(struct ifnet *ifp)
243 {
244 	int			 s;
245 	struct pfi_kif		*kif;
246 
247 	if ((kif = (struct pfi_kif *)ifp->if_pf_kif) == NULL)
248 		return;
249 
250 	s = splsoftnet();
251 	pfi_update++;
252 	hook_disestablish(ifp->if_addrhooks, kif->pfik_ah_cookie);
253 	pfi_kif_update(kif);
254 
255 	if (HFSC_ENABLED(&ifp->if_snd)) {
256 		pf_remove_queues(ifp);
257 		pf_free_queues(pf_queues_active, ifp);
258 	}
259 
260 	kif->pfik_ifp = NULL;
261 	ifp->if_pf_kif = NULL;
262 	pfi_kif_unref(kif, PFI_KIF_REF_NONE);
263 
264 	splx(s);
265 }
266 
267 void
268 pfi_attach_ifgroup(struct ifg_group *ifg)
269 {
270 	struct pfi_kif	*kif;
271 	int		 s;
272 
273 	pfi_initialize();
274 	s = splsoftnet();
275 	pfi_update++;
276 	if ((kif = pfi_kif_get(ifg->ifg_group)) == NULL)
277 		panic("pfi_kif_get failed");
278 
279 	kif->pfik_group = ifg;
280 	ifg->ifg_pf_kif = (caddr_t)kif;
281 
282 	splx(s);
283 }
284 
285 void
286 pfi_detach_ifgroup(struct ifg_group *ifg)
287 {
288 	int		 s;
289 	struct pfi_kif	*kif;
290 
291 	if ((kif = (struct pfi_kif *)ifg->ifg_pf_kif) == NULL)
292 		return;
293 
294 	s = splsoftnet();
295 	pfi_update++;
296 
297 	kif->pfik_group = NULL;
298 	ifg->ifg_pf_kif = NULL;
299 	pfi_kif_unref(kif, PFI_KIF_REF_NONE);
300 	splx(s);
301 }
302 
303 void
304 pfi_group_change(const char *group)
305 {
306 	struct pfi_kif		*kif;
307 	int			 s;
308 
309 	s = splsoftnet();
310 	pfi_update++;
311 	if ((kif = pfi_kif_get(group)) == NULL)
312 		panic("pfi_kif_get failed");
313 
314 	pfi_kif_update(kif);
315 
316 	splx(s);
317 }
318 
319 int
320 pfi_match_addr(struct pfi_dynaddr *dyn, struct pf_addr *a, sa_family_t af)
321 {
322 	switch (af) {
323 #ifdef INET
324 	case AF_INET:
325 		switch (dyn->pfid_acnt4) {
326 		case 0:
327 			return (0);
328 		case 1:
329 			return (PF_MATCHA(0, &dyn->pfid_addr4,
330 			    &dyn->pfid_mask4, a, AF_INET));
331 		default:
332 			return (pfr_match_addr(dyn->pfid_kt, a, AF_INET));
333 		}
334 		break;
335 #endif /* INET */
336 #ifdef INET6
337 	case AF_INET6:
338 		switch (dyn->pfid_acnt6) {
339 		case 0:
340 			return (0);
341 		case 1:
342 			return (PF_MATCHA(0, &dyn->pfid_addr6,
343 			    &dyn->pfid_mask6, a, AF_INET6));
344 		default:
345 			return (pfr_match_addr(dyn->pfid_kt, a, AF_INET6));
346 		}
347 		break;
348 #endif /* INET6 */
349 	default:
350 		return (0);
351 	}
352 }
353 
354 int
355 pfi_dynaddr_setup(struct pf_addr_wrap *aw, sa_family_t af)
356 {
357 	struct pfi_dynaddr	*dyn;
358 	char			 tblname[PF_TABLE_NAME_SIZE];
359 	struct pf_ruleset	*ruleset = NULL;
360 	int			 s, rv = 0;
361 
362 	if (aw->type != PF_ADDR_DYNIFTL)
363 		return (0);
364 	if ((dyn = pool_get(&pfi_addr_pl, PR_WAITOK | PR_LIMITFAIL | PR_ZERO))
365 	    == NULL)
366 		return (1);
367 
368 	s = splsoftnet();
369 	if (!strcmp(aw->v.ifname, "self"))
370 		dyn->pfid_kif = pfi_kif_get(IFG_ALL);
371 	else
372 		dyn->pfid_kif = pfi_kif_get(aw->v.ifname);
373 	if (dyn->pfid_kif == NULL) {
374 		rv = 1;
375 		goto _bad;
376 	}
377 	pfi_kif_ref(dyn->pfid_kif, PFI_KIF_REF_RULE);
378 
379 	dyn->pfid_net = pfi_unmask(&aw->v.a.mask);
380 	if (af == AF_INET && dyn->pfid_net == 32)
381 		dyn->pfid_net = 128;
382 	strlcpy(tblname, aw->v.ifname, sizeof(tblname));
383 	if (aw->iflags & PFI_AFLAG_NETWORK)
384 		strlcat(tblname, ":network", sizeof(tblname));
385 	if (aw->iflags & PFI_AFLAG_BROADCAST)
386 		strlcat(tblname, ":broadcast", sizeof(tblname));
387 	if (aw->iflags & PFI_AFLAG_PEER)
388 		strlcat(tblname, ":peer", sizeof(tblname));
389 	if (aw->iflags & PFI_AFLAG_NOALIAS)
390 		strlcat(tblname, ":0", sizeof(tblname));
391 	if (dyn->pfid_net != 128)
392 		snprintf(tblname + strlen(tblname),
393 		    sizeof(tblname) - strlen(tblname), "/%d", dyn->pfid_net);
394 	if ((ruleset = pf_find_or_create_ruleset(PF_RESERVED_ANCHOR)) == NULL) {
395 		rv = 1;
396 		goto _bad;
397 	}
398 
399 	if ((dyn->pfid_kt = pfr_attach_table(ruleset, tblname, 1)) == NULL) {
400 		rv = 1;
401 		goto _bad;
402 	}
403 
404 	dyn->pfid_kt->pfrkt_flags |= PFR_TFLAG_ACTIVE;
405 	dyn->pfid_iflags = aw->iflags;
406 	dyn->pfid_af = af;
407 
408 	TAILQ_INSERT_TAIL(&dyn->pfid_kif->pfik_dynaddrs, dyn, entry);
409 	aw->p.dyn = dyn;
410 	pfi_kif_update(dyn->pfid_kif);
411 	splx(s);
412 	return (0);
413 
414 _bad:
415 	if (dyn->pfid_kt != NULL)
416 		pfr_detach_table(dyn->pfid_kt);
417 	if (ruleset != NULL)
418 		pf_remove_if_empty_ruleset(ruleset);
419 	if (dyn->pfid_kif != NULL)
420 		pfi_kif_unref(dyn->pfid_kif, PFI_KIF_REF_RULE);
421 	pool_put(&pfi_addr_pl, dyn);
422 	splx(s);
423 	return (rv);
424 }
425 
426 void
427 pfi_kif_update(struct pfi_kif *kif)
428 {
429 	struct ifg_list		*ifgl;
430 	struct pfi_dynaddr	*p;
431 
432 	/* update all dynaddr */
433 	TAILQ_FOREACH(p, &kif->pfik_dynaddrs, entry)
434 		pfi_dynaddr_update(p);
435 
436 	/* again for all groups kif is member of */
437 	if (kif->pfik_ifp != NULL)
438 		TAILQ_FOREACH(ifgl, &kif->pfik_ifp->if_groups, ifgl_next)
439 			pfi_kif_update((struct pfi_kif *)
440 			    ifgl->ifgl_group->ifg_pf_kif);
441 }
442 
443 void
444 pfi_dynaddr_update(struct pfi_dynaddr *dyn)
445 {
446 	struct pfi_kif		*kif;
447 	struct pfr_ktable	*kt;
448 
449 	if (dyn == NULL || dyn->pfid_kif == NULL || dyn->pfid_kt == NULL)
450 		panic("pfi_dynaddr_update");
451 
452 	kif = dyn->pfid_kif;
453 	kt = dyn->pfid_kt;
454 
455 	if (kt->pfrkt_larg != pfi_update) {
456 		/* this table needs to be brought up-to-date */
457 		pfi_table_update(kt, kif, dyn->pfid_net, dyn->pfid_iflags);
458 		kt->pfrkt_larg = pfi_update;
459 	}
460 	pfr_dynaddr_update(kt, dyn);
461 }
462 
463 void
464 pfi_table_update(struct pfr_ktable *kt, struct pfi_kif *kif, int net, int flags)
465 {
466 	int			 e, size2 = 0;
467 	struct ifg_member	*ifgm;
468 
469 	pfi_buffer_cnt = 0;
470 
471 	if (kif->pfik_ifp != NULL)
472 		pfi_instance_add(kif->pfik_ifp, net, flags);
473 	else if (kif->pfik_group != NULL)
474 		TAILQ_FOREACH(ifgm, &kif->pfik_group->ifg_members, ifgm_next)
475 			pfi_instance_add(ifgm->ifgm_ifp, net, flags);
476 
477 	if ((e = pfr_set_addrs(&kt->pfrkt_t, pfi_buffer, pfi_buffer_cnt, &size2,
478 	    NULL, NULL, NULL, 0, PFR_TFLAG_ALLMASK)))
479 		DPFPRINTF(LOG_ERR,
480 		    "pfi_table_update: cannot set %d new addresses "
481 		    "into table %s: %d", pfi_buffer_cnt, kt->pfrkt_name, e);
482 }
483 
484 void
485 pfi_instance_add(struct ifnet *ifp, int net, int flags)
486 {
487 	struct ifaddr	*ifa;
488 	int		 got4 = 0, got6 = 0;
489 	int		 net2, af;
490 
491 	if (ifp == NULL)
492 		return;
493 	TAILQ_FOREACH(ifa, &ifp->if_addrlist, ifa_list) {
494 		if (ifa->ifa_addr == NULL)
495 			continue;
496 		af = ifa->ifa_addr->sa_family;
497 		if (af != AF_INET && af != AF_INET6)
498 			continue;
499 		if ((flags & PFI_AFLAG_BROADCAST) && af == AF_INET6)
500 			continue;
501 		if ((flags & PFI_AFLAG_BROADCAST) &&
502 		    !(ifp->if_flags & IFF_BROADCAST))
503 			continue;
504 		if ((flags & PFI_AFLAG_PEER) &&
505 		    !(ifp->if_flags & IFF_POINTOPOINT))
506 			continue;
507 		if ((flags & PFI_AFLAG_NETWORK) && af == AF_INET6 &&
508 		    IN6_IS_ADDR_LINKLOCAL(
509 		    &((struct sockaddr_in6 *)ifa->ifa_addr)->sin6_addr))
510 			continue;
511 		if (flags & PFI_AFLAG_NOALIAS) {
512 			if (af == AF_INET && got4)
513 				continue;
514 			if (af == AF_INET6 && got6)
515 				continue;
516 		}
517 		if (af == AF_INET)
518 			got4 = 1;
519 		else if (af == AF_INET6)
520 			got6 = 1;
521 		net2 = net;
522 		if (net2 == 128 && (flags & PFI_AFLAG_NETWORK)) {
523 			if (af == AF_INET)
524 				net2 = pfi_unmask(&((struct sockaddr_in *)
525 				    ifa->ifa_netmask)->sin_addr);
526 			else if (af == AF_INET6)
527 				net2 = pfi_unmask(&((struct sockaddr_in6 *)
528 				    ifa->ifa_netmask)->sin6_addr);
529 		}
530 		if (af == AF_INET && net2 > 32)
531 			net2 = 32;
532 		if (flags & PFI_AFLAG_BROADCAST)
533 			pfi_address_add(ifa->ifa_broadaddr, af, net2);
534 		else if (flags & PFI_AFLAG_PEER)
535 			pfi_address_add(ifa->ifa_dstaddr, af, net2);
536 		else
537 			pfi_address_add(ifa->ifa_addr, af, net2);
538 	}
539 }
540 
541 void
542 pfi_address_add(struct sockaddr *sa, int af, int net)
543 {
544 	struct pfr_addr	*p;
545 	int		 i;
546 
547 	if (pfi_buffer_cnt >= pfi_buffer_max) {
548 		int		 new_max = pfi_buffer_max * 2;
549 
550 		if (new_max > PFI_BUFFER_MAX) {
551 			DPFPRINTF(LOG_ERR,
552 			    "pfi_address_add: address buffer full (%d/%d)",
553 			    pfi_buffer_cnt, PFI_BUFFER_MAX);
554 			return;
555 		}
556 		p = malloc(new_max * sizeof(*pfi_buffer), PFI_MTYPE,
557 		    M_DONTWAIT);
558 		if (p == NULL) {
559 			DPFPRINTF(LOG_ERR,
560 			    "pfi_address_add: no memory to grow buffer "
561 			    "(%d/%d)", pfi_buffer_cnt, PFI_BUFFER_MAX);
562 			return;
563 		}
564 		memcpy(p, pfi_buffer, pfi_buffer_max * sizeof(*pfi_buffer));
565 		/* no need to zero buffer */
566 		free(pfi_buffer, PFI_MTYPE, 0);
567 		pfi_buffer = p;
568 		pfi_buffer_max = new_max;
569 	}
570 	if (af == AF_INET && net > 32)
571 		net = 128;
572 	p = pfi_buffer + pfi_buffer_cnt++;
573 	bzero(p, sizeof(*p));
574 	p->pfra_af = af;
575 	p->pfra_net = net;
576 	if (af == AF_INET)
577 		p->pfra_ip4addr = ((struct sockaddr_in *)sa)->sin_addr;
578 	else if (af == AF_INET6) {
579 		p->pfra_ip6addr = ((struct sockaddr_in6 *)sa)->sin6_addr;
580 		if (IN6_IS_SCOPE_EMBED(&p->pfra_ip6addr))
581 			p->pfra_ip6addr.s6_addr16[1] = 0;
582 	}
583 	/* mask network address bits */
584 	if (net < 128)
585 		((caddr_t)p)[p->pfra_net/8] &= ~(0xFF >> (p->pfra_net%8));
586 	for (i = (p->pfra_net+7)/8; i < sizeof(p->pfra_u); i++)
587 		((caddr_t)p)[i] = 0;
588 }
589 
590 void
591 pfi_dynaddr_remove(struct pf_addr_wrap *aw)
592 {
593 	int	s;
594 
595 	if (aw->type != PF_ADDR_DYNIFTL || aw->p.dyn == NULL ||
596 	    aw->p.dyn->pfid_kif == NULL || aw->p.dyn->pfid_kt == NULL)
597 		return;
598 
599 	s = splsoftnet();
600 	TAILQ_REMOVE(&aw->p.dyn->pfid_kif->pfik_dynaddrs, aw->p.dyn, entry);
601 	pfi_kif_unref(aw->p.dyn->pfid_kif, PFI_KIF_REF_RULE);
602 	aw->p.dyn->pfid_kif = NULL;
603 	pfr_detach_table(aw->p.dyn->pfid_kt);
604 	aw->p.dyn->pfid_kt = NULL;
605 	pool_put(&pfi_addr_pl, aw->p.dyn);
606 	aw->p.dyn = NULL;
607 	splx(s);
608 }
609 
610 void
611 pfi_dynaddr_copyout(struct pf_addr_wrap *aw)
612 {
613 	if (aw->type != PF_ADDR_DYNIFTL || aw->p.dyn == NULL ||
614 	    aw->p.dyn->pfid_kif == NULL)
615 		return;
616 	aw->p.dyncnt = aw->p.dyn->pfid_acnt4 + aw->p.dyn->pfid_acnt6;
617 }
618 
619 void
620 pfi_kifaddr_update(void *v)
621 {
622 	int			 s;
623 	struct pfi_kif		*kif = (struct pfi_kif *)v;
624 
625 	s = splsoftnet();
626 	pfi_update++;
627 	pfi_kif_update(kif);
628 	splx(s);
629 }
630 
631 int
632 pfi_if_compare(struct pfi_kif *p, struct pfi_kif *q)
633 {
634 	return (strncmp(p->pfik_name, q->pfik_name, IFNAMSIZ));
635 }
636 
637 void
638 pfi_update_status(const char *name, struct pf_status *pfs)
639 {
640 	struct pfi_kif		*p;
641 	struct pfi_kif_cmp	 key;
642 	struct ifg_member	 p_member, *ifgm;
643 	TAILQ_HEAD(, ifg_member) ifg_members;
644 	int			 i, j, k, s;
645 
646 	s = splsoftnet();
647 	if (*name == '\0' && pfs == NULL) {
648 		RB_FOREACH(p, pfi_ifhead, &pfi_ifs) {
649 			bzero(p->pfik_packets, sizeof(p->pfik_packets));
650 			bzero(p->pfik_bytes, sizeof(p->pfik_bytes));
651 			p->pfik_tzero = time_second;
652 		}
653 		splx(s);
654 		return;
655 	}
656 
657 	strlcpy(key.pfik_name, name, sizeof(key.pfik_name));
658 	p = RB_FIND(pfi_ifhead, &pfi_ifs, (struct pfi_kif *)&key);
659 	if (p == NULL) {
660 		splx(s);
661 		return;
662 	}
663 	if (p->pfik_group != NULL) {
664 		memcpy(&ifg_members, &p->pfik_group->ifg_members,
665 		    sizeof(ifg_members));
666 	} else {
667 		/* build a temporary list for p only */
668 		bzero(&p_member, sizeof(p_member));
669 		p_member.ifgm_ifp = p->pfik_ifp;
670 		TAILQ_INIT(&ifg_members);
671 		TAILQ_INSERT_TAIL(&ifg_members, &p_member, ifgm_next);
672 	}
673 	if (pfs) {
674 		bzero(pfs->pcounters, sizeof(pfs->pcounters));
675 		bzero(pfs->bcounters, sizeof(pfs->bcounters));
676 	}
677 	TAILQ_FOREACH(ifgm, &ifg_members, ifgm_next) {
678 		if (ifgm->ifgm_ifp == NULL)
679 			continue;
680 		p = (struct pfi_kif *)ifgm->ifgm_ifp->if_pf_kif;
681 
682 		/* just clear statistics */
683 		if (pfs == NULL) {
684 			bzero(p->pfik_packets, sizeof(p->pfik_packets));
685 			bzero(p->pfik_bytes, sizeof(p->pfik_bytes));
686 			p->pfik_tzero = time_second;
687 			continue;
688 		}
689 		for (i = 0; i < 2; i++)
690 			for (j = 0; j < 2; j++)
691 				for (k = 0; k < 2; k++) {
692 					pfs->pcounters[i][j][k] +=
693 						p->pfik_packets[i][j][k];
694 					pfs->bcounters[i][j] +=
695 						p->pfik_bytes[i][j][k];
696 				}
697 	}
698 	splx(s);
699 }
700 
701 int
702 pfi_get_ifaces(const char *name, struct pfi_kif *buf, int *size)
703 {
704 	struct pfi_kif	*p, *nextp;
705 	int		 s, n = 0;
706 
707 	s = splsoftnet();
708 	for (p = RB_MIN(pfi_ifhead, &pfi_ifs); p; p = nextp) {
709 		nextp = RB_NEXT(pfi_ifhead, &pfi_ifs, p);
710 		if (pfi_skip_if(name, p))
711 			continue;
712 		if (*size > n++) {
713 			if (!p->pfik_tzero)
714 				p->pfik_tzero = time_second;
715 			pfi_kif_ref(p, PFI_KIF_REF_RULE);
716 			if (copyout(p, buf++, sizeof(*buf))) {
717 				pfi_kif_unref(p, PFI_KIF_REF_RULE);
718 				splx(s);
719 				return (EFAULT);
720 			}
721 			nextp = RB_NEXT(pfi_ifhead, &pfi_ifs, p);
722 			pfi_kif_unref(p, PFI_KIF_REF_RULE);
723 		}
724 	}
725 	splx(s);
726 	*size = n;
727 	return (0);
728 }
729 
730 int
731 pfi_skip_if(const char *filter, struct pfi_kif *p)
732 {
733 	struct ifg_list	*i;
734 	int		 n;
735 
736 	if (filter == NULL || !*filter)
737 		return (0);
738 	if (!strcmp(p->pfik_name, filter))
739 		return (0);	/* exact match */
740 	n = strlen(filter);
741 	if (n < 1 || n >= IFNAMSIZ)
742 		return (1);	/* sanity check */
743 	if (filter[n-1] >= '0' && filter[n-1] <= '9')
744 		return (1);     /* group names may not end in a digit */
745 	if (p->pfik_ifp != NULL)
746 		TAILQ_FOREACH(i, &p->pfik_ifp->if_groups, ifgl_next)
747 			if (!strncmp(i->ifgl_group->ifg_group, filter, IFNAMSIZ))
748 				return (0);	/* iface is in group "filter" */
749 	return (1);
750 }
751 
752 int
753 pfi_set_flags(const char *name, int flags)
754 {
755 	struct pfi_kif	*p;
756 	int		 s;
757 
758 	s = splsoftnet();
759 	RB_FOREACH(p, pfi_ifhead, &pfi_ifs) {
760 		if (pfi_skip_if(name, p))
761 			continue;
762 		p->pfik_flags_new = p->pfik_flags | flags;
763 	}
764 	splx(s);
765 	return (0);
766 }
767 
768 int
769 pfi_clear_flags(const char *name, int flags)
770 {
771 	struct pfi_kif	*p;
772 	int		 s;
773 
774 	s = splsoftnet();
775 	RB_FOREACH(p, pfi_ifhead, &pfi_ifs) {
776 		if (pfi_skip_if(name, p))
777 			continue;
778 		p->pfik_flags_new = p->pfik_flags & ~flags;
779 	}
780 	splx(s);
781 	return (0);
782 }
783 
784 void
785 pfi_xcommit(void)
786 {
787 	struct pfi_kif	*p;
788 	int		 s;
789 
790 	s = splsoftnet();
791 	RB_FOREACH(p, pfi_ifhead, &pfi_ifs)
792 		p->pfik_flags = p->pfik_flags_new;
793 	splx(s);
794 }
795 
796 /* from pf_print_state.c */
797 int
798 pfi_unmask(void *addr)
799 {
800 	struct pf_addr *m = addr;
801 	int i = 31, j = 0, b = 0;
802 	u_int32_t tmp;
803 
804 	while (j < 4 && m->addr32[j] == 0xffffffff) {
805 		b += 32;
806 		j++;
807 	}
808 	if (j < 4) {
809 		tmp = ntohl(m->addr32[j]);
810 		for (i = 31; tmp & (1 << i); --i)
811 			b++;
812 	}
813 	return (b);
814 }
815 
816